default search action
The International Arab Journal of Information Technology, Volume 12
Volume 12, Number 1, January 2015
- Shanmugam Selvamuthukumaran, Shanmugasundaram Hariharan, Thirunavukarasu Ramkumar:
Investigation on iris recognition system adopting cryptographic techniques. 1-8 - Ahmed Abu Hammad, Alaa El-Halees:
An approach for detecting spam in arabic opinion reviews. 9-16 - Preethi Harris, Nedunchezhian Raju:
A greedy approach for coverage-based test suite reduction. 17-23 - Souad Amira-Biad, Toufik Bouden, Mokhtar Nibouche, Ersin Elbasi:
A bi-dimensional empirical mode decomposition based watermarking scheme. 24-31 - Ibrar Hussain, Aasia Khanum, Abdul Qudus Abbasi, Muhammad Younus Javed:
A novel approach for software architecture recovery using particle swarm optimization. 32-41 - Selvaraj Damodharan, Dhanasekaran Raghavan:
Combining tissue segmentation and neural network for brain tumor detection. 42-52 - Sanam Noor, Shariq Bashir:
Evaluating bias in retrieval systems for recall oriented documents retrieval. 53-59 - Faisal Shahzad, Sohail Asghar, Khalid Usmani:
A fuzzy based scheme for sanitizing sensitive sequential patterns. 60-68 - Seyyed Amir Asghari, Hassan Taheri:
An effective soft error detection mechanism using redundant instructions. 69-76 - Sana Nouzri, Abdelaziz El Fazziki:
A mapping from bpmn model to JADEX model. 77-85 - Noureddine Aloui, Chafik Barnoussi, Adnane Cherif:
New algorithm for QMF banks design and its application in speech compression using DWT. 86-93 - Shiva Vafadar, Ahmad Barfourosh:
Towards intelligence engineering in agent-based systems. 94-103 - Tauseef Gulrez, Abdullah Al-Odienat:
A new perspective on principal component analysis using inverse covariance. 104-109
Volume 12, Number 2, March 2015
- Sathishkumar Arthanari, Boopathy Bagank, Mohamedmoideen Mastan:
Chaotic image encryption using modular addition and combinatorial techniques. 110-117 - Esther Perumal, Shanmugalakshmi Ramachandran:
A multimodal biometric system based on palmprint and finger knuckle print recognition methods. 118-128 - Medhat A. Tawfeek, Ashraf El-Sisi, Arabi Keshk, Fawzy A. Torkey:
Cloud task scheduling based on ant colony optimization. 129-137 - Seyed Sadatrasoul, Mohammad R. Gholamian, Kamran Shahanaghi:
Combination of feature selection and optimized fuzzy apriori rules: the case of credit scoring. 138-145 - Sajjad Khan, Waqas Anwar, Xuan Wang, Usama Ijaz Bajwa:
Template based affix stemmer for a morphologically rich language. 146-154 - Usha Subramaniam, Kuppuswami Subbaraya:
A biometric based secure session key agreement using modified elliptic curve cryptography. 155-161 - Mohammad Javidi, Roghiyeh Hosseinpour Fard:
Chaos genetic algorithm instead genetic algorithm. 162-167 - Afnan Alsolamy, M. Rizwan Jameel Qureshi:
The proposal of a qualification based approach to teach software engineering course. 168-174 - Xingsi Xue, Yuping Wang, Weichen Hao:
Optimizing ontology alignments by using NSGA-II. 175-181 - Sajid Ali Khan, Muhammad Nazir, Naveed Riaz Ansari, Muhammad Khan:
Optimized features selection using hybrid PSO-GA for multi-view gender classification. 182-188 - Nazlia Omar, Roiss Alhutaish:
Arabic text classification using k-nearest neighbour algorithm. 189-194 - Safak Saraydemir, Necmi Taspinar, Osman Erogul, Hülya Kayserili:
Effects of training set dimension on recognition of dysmorphic faces with statistical classifiers. 204-210 - Tao Peng, Lu Liu, Wanli Zuo:
Topical web crawling for domain-specific resource discovery enhanced by selectively using link-context. 195-203
Volume 12, Number 3, May 2015
- Rangan Kodandaram, Shashank Mallikarjun, Manikantan Krishnamuthan, Ramachandran Sivan:
Face recognition using truncated transform domain feature extraction. 211-219 - T. M. Rajkumar, Mrityunjaya V. Latte:
An efficient ROI Encoding Based on LSK and fractal image compression. 220-228 - Manoharan Subramanian, Sathappan Sathappan:
An efficient content based image retrieval using advanced filter approaches. 229-236 - Khalid M. O. Nahar, Husni Al-Muhtaseb, Wasfi G. Al-Khatib, Moustafa Elshafei, Mansour M. Alghamdi:
Arabic phonemes transcription using data driven approach. 237-245 - Tzong-Chen Wu, Tzuoh-Yi Lin, Tzong-Sun Wu, Han-Yu Lin:
Efficient english auction scheme without a secure channel. 246-252 - Preecha Somwang, Woraphon Lilakiatsakun:
Anomaly traffic detection based on PCA and SFAM. 253-260 - Seif Mili, Djamel Meslati:
Multi dimensional taxonomy of bio-inspired systems based on model driven architecture. 261-269 - Ehsan Ullah Munir, Samia Ijaz, Ali Nawaz Khan, Waqas Anwar, Wasif Nasir:
Novel approaches for scheduling task graphs in heterogeneous distributed computing environment. 270-277 - Somayeh Abdi, Sayyed Hashemi:
A hierarchical approach to improve job scheduling and data replication in data grid. 278-285 - Muhammad Khan, Muhammad Akram, Naveed Riaz Ansari:
A comparative analysis of software protection schemes. 286-295 - Walaa Hassan Elashmawi, Jun Hu, Renfa Li:
Stability coalition formation with cost sharing in multi-agent systems based on volume discount. 296-303 - Md. Zia Uddin, Deok-Hwan Kim, Tae-Seong Kim:
A human activity recognition system using hmms with gda on enhanced independent component features. 304-310 - Emad Elabd, Eissa Alshari, Hatem M. Abdelkader:
Semantic boolean arabic information retrieval. 311-316
Volume 12, Number 4, July 2015
- Kiruthika Subramanian, Preetha Gunasekaran, Mercy Selvaraj:
Two layer defending mechanism against DDOS attacks. 317-324 - Jaseema Yasmin, Mohamed Sathik:
An improved iterative segmentation algorithm using canny edge detector for skin lesion border detection. 325-332 - Muthukumaran Narayanaperumal, Ravi Ramraj:
VLSI implementations of compressive image acquisition using block based compression algorithm. 333-339 - Yousof Farzaneh, Mahdi Azizi, Masoud Hadian Dehkordi, Abdolrasoul Mirghadri:
Vulnerability analysis of two ultra lightweight RFID authentication protocols. 340-345 - Asma Kebbeb, Messaoud Mostefai, Fateh Benmerzoug, Youssef Chahir:
Efficient multimodal biometric database construction and protection schemes. 346-351 - Arumugam Kunthavai, Somasundaram Vasantharathna, Swaminathan Thirumurugan:
Pairwise sequence alignment using bio-database compression by improved fine tuned enhanced suffix array. 352-359 - Meng Han, Zhihai Wang, Jidong Yuan:
Mining closed and multi-supports-based sequential pattern in high-dimensional dataset. 360-369 - Tao Li, Nanfeng Xiao:
Solving QBF with heuristic small world optimization search algorithm. 370-378 - Hebat-Allah M. Ragab, Amany M. Sarhan, Al sayed A. H. Sallam, Reda A. Ammar:
Balanced workload clusters for distributed object oriented software. 379-388 - Tahir Mustafa Madani, Muhammad Tahir, Sheikh Ziauddin, Syed Raza, Mirza Ahmed:
An accelerometer-based approach to evaluate 3D unistroke gestures. 389-394 - Shazia Raj, Zobia Rehman, Sonia Rauf, Rehana Siddique, Waqas Anwar:
An artificial neural network approach for sentence boundary disambiguation in urdu language text. 395-400 - Niraimathi Ponnusamy, Bhoopathy Krishnaswamy:
Speed up of reindexing in adaptive particle swarm optimization. 401-409 - Kai Zhang, Jie Guan:
Distinguishing attack on common scrambling algorithm. 410-414
Volume 12, Number 5, September 2015
- Seyed H. Chavoshi, Bernard De Baets, Yi Qiang, Guy De Tré, Tijs Neutens, Nico Van de Weghe:
A Qualitative Approach to the Identification, Visualisation and Interpretation of Repetitive Motion Patterns in Groups of Moving Point Objects. 415-423 - Mohideen Fatima Alias Niraimathi M, Seenivasagam:
Comparison of Segmentation Algorithms by A Mathematical Model For Resolving Islands and Gulfs in Nuclei of Cervical Cell Images. 424-430 - Muthukumar Arunachalam, Kannan Subramanian:
AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print. 431-440 - Soumia Belhadi, Nadjia Benblidia:
Automated Retinal Vessel Segmentation Using Entropic Thresholding Based Spatial Correlation Histogram of Gray Level Images. 441-447 - Ahmed Zaafouri, Mounir Sayadi, Farhat Fnaiech:
A Vision Approach for Expiry Date Recognition using Stretched Gabor Features. 448-455 - Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin:
Optimum Threshold Parameter Estimation of Bidimensional Empirical Mode Decomposition Using Fisher Discriminant Analysis for Speckle Noise Reduction. 456-464 - Murtada Khalafallah Elbashir, Jianxin Wang:
Kernel Logistic Regression Algorithm for Large-Scale Data Classification. 465-472 - Anupriya Elumalai, Sriman Narayana Iyengar:
Adaptive Semantic Indexing Of Documents For Locating Relevant Information In P2P Networks. 473-480 - Abdul Shahid, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
Lessons Learned: The Complexity of Accurate Identification of in-Text Citations. 481-488 - Fatemeh Boobord, Zalinda Othman, Azuraliza Abu Bakar:
A WK-means Approach for Clustering. 489-493 - Razieh Baradaran, Behrouz Minaei-Bidgoli:
Event Extraction from Classical Arabic Texts. 494-502 - Islam Elhalwany, Ammar Mohammed, Khaled Tawfik Wassif, Hesham A. Hefny:
Using Textual Case-based Reasoning in Intelligent Fatawa QA System. 503-509 - Al-Fahim Mubarak-Ali, Sharifah Mashita Syed-Mohamad, Shahida Sulaiman:
Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer Approach. 510-517
Volume 12, Number 6, November 2015
- Telu Venkata Madhusudhanarao, Sanaboina Pallam Setty, Yarramalle Srinivas:
Model based approach for content based image retrievals based on fusion and relevancy methodology. 519-523 - Seema Verma, Deepak Garg:
Improvement in rebalanced CRT RSA. 524-531 - Romi Rahmat, Muhammad Fermi Pasha, Mohammad Syukur, Rahmat Budiarto:
A gene-regulated nested neural network. 532-539 - Muhammad Attique, Yared Hailu Gudeta, Sololia Gudeta Ayele, Hyung-Ju Cho, Tae-Sun Chung:
A safe exit approach for continuous monitoring of reverse k-nearest neighbors in road networks. 540-549 - Mehmet Kurt, Murat Ersen Berberler, Onur Ugurlu:
A new algorithm for finding vertex-disjoint paths. 550-555 - Wen-Ping Li, Jing Yang, Jianpei Zhang:
A differential geometry perspective about multiple data streams preprocessing. 556-565 - Mohamed Achraf Ben Mohamed, Souheyl Mallat, Mohamed Amine Nahdi, Mounir Zrigui:
Exploring the potential of schemes in building NLP tools for arabic language. 566-573 - Farshad Tajeripour, Mohammad Saberi, Shervan Fekri Ershad:
Developing a novel approach for content based image retrieval using modified local binary patterns and morphological transform. 574-581 - Qaisar Abbas, Irene Fondón, M. Emre Celebi:
A computerized system for detection of spiculated margins based on mammography. 582-588 - Kavitha Adhikesavan:
An integrated approach for measuring semantic similarity between words and sentences using web search engine. 589-596 - Singaravelu Prabhu, Dharmaraj Tensing:
Adapted normalized graph cut segmentation with boundary fuzzy classifier object indexing on road satellite images. 597-603 - Mohamed Ouda, Sameh A. Salem, Ihab Ali, El-Said Saad:
Privacy-preserving data mining in homogeneous collaborative clustering. 604-612 - Saad Abid, Zhiyong Li, Renfa Li:
Smelling the web olfactory display for web objects. 613-619
Volume 12, Number 6A, December 2015
- Hamza Zidoum, Fatma Al-Rasbi, Muna Al-Awfi:
Towards the construction of a comprehensive arabic lexical reference system. 621-626 - Loan T. T. Nguyen, Bay Vo, Tzung-Pei Hong:
CARIM: an efficient algorithm for mining class-association rules with interestingness measures. 627-634 - Thomson Fredrick, Govindaraju Radhamani:
The fuzzy logic based ECA rule processing for XML databases. 635-641 - Muthukumar Arunachalam, Kannan Subramanian:
Finger knuckle print authentication using AES and K-means algorithm. 642-649 - Tameem Eissa, Gihwan Cho:
Lightweight anti-censorship online network for anonymity and privacy in middle eastern countries. 650-657 - Marappagounder Shanker, Keppanagounder Thanushkodi:
An effective approach to software cost estimation based on soft computing techniques. 658-665 - Teena Mittal, Rajendra Kumar Sharma:
Multiclass SVM based spoken hindi numerals recognition. 666-671 - Shyam Lal, Rahul Kumar:
An efficient method for contrast enhancement of real world hyper spectral images. 672-679 - Iyapparaja Meenakshisundaram, Sureshkumar Sreedharan:
Intelligent risk analysis model for mining adaptable reusable component. 680-687 - Subbian Suganthi, Rethanaswamy Nadarajan:
Adaptability metric for adaptation of the dynamic changes. 688-694 - Jaison Bennet, Chilambuchelvan Ganaprakasam, Nirmal Kumar:
A hybrid approach for gene selection and classification using support vector machine. 695-700 - Hemalatha Gunasekaran, ThanushkodiKeppana Gowder:
New bucket join algorithm for faster join query results. 701-707 - L. Jani Anbarasi, G. S. Anandha Mala:
Verifiable multi secret sharing scheme for 3D models. 708-713 - Santosh Kumar Ravva, Challa Narasimham, Pallam Shetty:
Short secret exponent attack on LSBS-RSA. 714-718 - Iman Kashefi, Maryam Kassiri, Mazleena Salleh:
Preventing collusion attack in android. 719-727 - Kaliappan Jeyakumar, Thiagarajan Revathi, Sundararajan Karpagam:
Intrusion detection using artificial neural networks with best set of features. 728-734 - ShanmughaSundaram Mythili, Subramani Sarala:
A measurement of similarity to identify identical code clones. 735-740 - Amit Mahesh Joshi, Vivekanand Mishra, Rajendra M. Patrikar:
Real time implementation of integer DCT based video watermarking architecture. 741-747 - Raman Beena, Subramani Sarala:
An efficient specific update search domain based glowworm swarm optimization for test case prioritization. 748-754 - Satyendr Singh, Tanveer J. Siddiqui:
Utilizing corpus statistics for hindi word sense disambiguation. 755-763 - Thumma Kumar, Kamireddy Reddy:
A technique for burning area identification UIHS transformation and image segmentation. 764-771 - Akila Thiyagarajan, UmaMaheswari Pandurangan:
Comparative analysis of classifier Performance on MR brain images. 772-779 - Siva Sankar Kanahasabapathy, Jebarajan Thanganadar, Padmasuresh Lekshmikanthan:
A novel approach to develop dynamic portable instructional operating system for minimal utilization. 780-784 - Ghulam Mujtaba, David J. Parish:
A statistical framework for identification of tunnelled applications using machine learning. 785-790 - Sanjay K. Dwivedi, Pramod P. Sukhadeve:
Translation rules for english to hindi machine translation system: homoeopathy domain. 791-796 - Krishna Priya Remamany, Thanga Raj Chelliah, Kesavadas Chandrasekharan, Kannan Subraman:
Brain tumor segmentation in MRI images using integrated modified PSO-fuzzy approach. 797-805
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.