ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
About IAJIT
Aims and Scopes
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: fuzzy inference system
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Faculty of Science, Computer Information Systems De partment, Bethlehem University, Palestine
# Brain-Computer interface
# ANFIS algorithm
# fuzzy l ogic
# electroencephalogram
Enhanced Hybrid Prediction Models for Time Series Prediction
as artificial neural networks are considered to be better for prediction of data with non-linear patterns. In the real-life, time-
#Hybrid model
# adaptive neuro-fuzzy inference systems
# soft computing
# neural network
# statistical techniques
A new Model of Multi-Key Generation for RFID Access Control System
handling modern security threats, with access decisions influenced by several factors, including situational, environmental
#Encryption key generation model
# Risk-based access control
# Radio frequency identification
Fuzzy Logic based Decision Support System for
Abstract: Software components are imperative parts of a system which play a fundamental role in the overall function of a
#Software component
# component security
# fuzzy logic
Performance Analysis of FCM Based ANFIS and
Praynlin Edinson1 and Latha Muthuraj2
#Software development
# cost
# effort estimation
# process planning
# ANFIS
A Neuro-Fuzzy System to Detect IPv6 Router Alert Option DoS Packets
Shubair Abdullah
#DoS attacks
# IPv6 router alert option
# Neuro-Fuzzy
# IPv6 network security
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint