ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: Monitoring
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
Multicasting Strategies for Increasing Network Efficiency in 5G Using Deep Learning
Wael AlZoubi,Hazem Hatamleh
#Multicasting
#network performance
#artificial intelligence
#deep Q-networks
#deep reinforcement learning
#quality of service
A Novel Space-Efficient Method for Detecting Network-Wide Heavy Hitters in Software-Defined Networking Using P4-Switch
Ali Alhaj,Wilson Bhukya,Rajendra Lal
#Software-defined networking security
#heavy-hitter detection
#P4 switch
#network monitoring
#space-saving
#sketches
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
Forecasting the Spread of Viral Diseases in Jordan Using the SARIMA Statistical Model
Shahed Al-khateeb
#Time series model
#Jordan
#prediction
#diseases
#forecasting model
#sarimax
#seasonal autoregressive integrated moving-average with exogenous regressors
Hybridized Clustering Algorithm and Ensemble Learning for Monitoring Paddy Crop Growth Analysis
Sathiya Priya.R,Rahamathunnisa.U
#Crop monitoring
#satellite images
#vegetation index
#eigenvector
#eigenvalue
#hybridized clustering algorithm
#ensemble learning
Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Shikha Gupta,Neetu Sharma
#FANET
#threats
#genetic
#trust
#reputation
#network reliability
#machine learning
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm
Vimala Devi Parthasarathy,Kalaichelvi Visvalingam
#Healthcare
#RNG
#ECDH
#AES
#cryptography
IoT Based Technique for Network Packet Analyzer
Nouh Alhindawi
#Internet of things
#packet analyzers
#networks monitoring
#cloud processing
A Safe Exit Approach for Continuous Monitoring
Department of Computer Engineering, Ajou University , South Korea
#
Metacognitive Awareness Assessment and Introductory Computer Programming Course
Faculty of Computer Science and Information Technology, University of Malaya, Malaysia
#Noviceprogrammer
#met cognitive
#MAI
#educational psychology
# introductory computer programming
Analysis of Epileptic Events Using Wavelet Packets Nisrine Sinno and Kifah Tout
epileptic brain states. The spatial and temporal dynamics of the epileptogenic process is still not clear completely especially
#Epilepsy analysis
# wavelet
# spike detection
Fuzzy and Neuro-Fuzzy Modeling of a Fermentation Process
Abstract: Neuro-fuzzy modeling may be qualified as a grey-box technique, since it combines the transparency of rule-based
#Yeast fermentation
# fed-batch
# takagi-sugeno model
# levenberg-marquardt algorithm
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Abstract: In this paper, we propose to design a cross-layer b ased intrusion detection technique for wireless networks. In this
# Intrusion detection
# wireless networks
# RSS
# cross layer
# RTS-CTS handshake
# TT
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Abstract: In this paper, we propose to design a cross-layer b ased intrusion detection technique for wireless networks. In this
# Intrusion detection
# wireless networks
# RSS
# cross layer
# RTS-CTS handshake
# TT
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna
# Shamir’s secret sharing
# DoS
# routing cum forwardin g
# certificate revocation
# certification revival
An Automated Real-Time People Tracking System Based on KLT Features Detection
Information Technology Department, Al-Balqa Applied University, Jordan 2Department of Computer Science, Princess Sumaya Uni versity for Technology, Jordan 3Department of Computer Science, Loughborough Univer sity, UK
# Object tracking
# kalman-filter
# features selection
# KLT
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint