


default search action
The International Arab Journal of Information Technology, Volume 12
Volume 12, Number 1, January 2015
- Shanmugam Selvamuthukumaran, Shanmugasundaram Hariharan, Thirunavukarasu Ramkumar:

Investigation on iris recognition system adopting cryptographic techniques. 1-8 - Ahmed Abu Hammad, Alaa El-Halees:

An approach for detecting spam in arabic opinion reviews. 9-16 - Preethi Harris, Nedunchezhian Raju:

A greedy approach for coverage-based test suite reduction. 17-23 - Souad Amira-Biad, Toufik Bouden, Mokhtar Nibouche, Ersin Elbasi:

A bi-dimensional empirical mode decomposition based watermarking scheme. 24-31 - Ibrar Hussain, Aasia Khanum, Abdul Qudus Abbasi, Muhammad Younus Javed:

A novel approach for software architecture recovery using particle swarm optimization. 32-41 - Selvaraj Damodharan, Dhanasekaran Raghavan:

Combining tissue segmentation and neural network for brain tumor detection. 42-52 - Sanam Noor, Shariq Bashir:

Evaluating bias in retrieval systems for recall oriented documents retrieval. 53-59 - Faisal Shahzad, Sohail Asghar, Khalid Usmani:

A fuzzy based scheme for sanitizing sensitive sequential patterns. 60-68 - Seyyed Amir Asghari, Hassan Taheri:

An effective soft error detection mechanism using redundant instructions. 69-76 - Sana Nouzri, Abdelaziz El Fazziki:

A mapping from bpmn model to JADEX model. 77-85 - Noureddine Aloui, Chafik Barnoussi, Adnane Cherif:

New algorithm for QMF banks design and its application in speech compression using DWT. 86-93 - Shiva Vafadar, Ahmad Barfourosh:

Towards intelligence engineering in agent-based systems. 94-103 - Tauseef Gulrez, Abdullah Al-Odienat:

A new perspective on principal component analysis using inverse covariance. 104-109
Volume 12, Number 2, March 2015
- Sathishkumar Arthanari, Boopathy Bagank, Mohamedmoideen Mastan:

Chaotic image encryption using modular addition and combinatorial techniques. 110-117 - Esther Perumal, Shanmugalakshmi Ramachandran:

A multimodal biometric system based on palmprint and finger knuckle print recognition methods. 118-128 - Medhat A. Tawfeek, Ashraf El-Sisi, Arabi Keshk, Fawzy A. Torkey:

Cloud task scheduling based on ant colony optimization. 129-137 - Seyed Sadatrasoul, Mohammad R. Gholamian, Kamran Shahanaghi:

Combination of feature selection and optimized fuzzy apriori rules: the case of credit scoring. 138-145 - Sajjad Khan, Waqas Anwar, Xuan Wang, Usama Ijaz Bajwa:

Template based affix stemmer for a morphologically rich language. 146-154 - Usha Subramaniam, Kuppuswami Subbaraya:

A biometric based secure session key agreement using modified elliptic curve cryptography. 155-161 - Mohammad Javidi, Roghiyeh Hosseinpour Fard:

Chaos genetic algorithm instead genetic algorithm. 162-167 - Afnan Alsolamy, M. Rizwan Jameel Qureshi:

The proposal of a qualification based approach to teach software engineering course. 168-174 - Xingsi Xue, Yuping Wang, Weichen Hao:

Optimizing ontology alignments by using NSGA-II. 175-181 - Sajid Ali Khan, Muhammad Nazir, Naveed Riaz Ansari, Muhammad Khan:

Optimized features selection using hybrid PSO-GA for multi-view gender classification. 182-188 - Nazlia Omar, Roiss Alhutaish:

Arabic text classification using k-nearest neighbour algorithm. 189-194 - Safak Saraydemir, Necmi Taspinar, Osman Erogul, Hülya Kayserili:

Effects of training set dimension on recognition of dysmorphic faces with statistical classifiers. 204-210 - Tao Peng, Lu Liu, Wanli Zuo:

Topical web crawling for domain-specific resource discovery enhanced by selectively using link-context. 195-203
Volume 12, Number 3, May 2015
- Rangan Kodandaram, Shashank Mallikarjun, Manikantan Krishnamuthan, Ramachandran Sivan:

Face recognition using truncated transform domain feature extraction. 211-219 - T. M. Rajkumar, Mrityunjaya V. Latte:

An efficient ROI Encoding Based on LSK and fractal image compression. 220-228 - Manoharan Subramanian, Sathappan Sathappan:

An efficient content based image retrieval using advanced filter approaches. 229-236 - Khalid M. O. Nahar, Husni Al-Muhtaseb, Wasfi G. Al-Khatib, Moustafa Elshafei, Mansour M. Alghamdi:

Arabic phonemes transcription using data driven approach. 237-245 - Tzong-Chen Wu, Tzuoh-Yi Lin, Tzong-Sun Wu, Han-Yu Lin:

Efficient english auction scheme without a secure channel. 246-252 - Preecha Somwang, Woraphon Lilakiatsakun:

Anomaly traffic detection based on PCA and SFAM. 253-260 - Seif Mili, Djamel Meslati:

Multi dimensional taxonomy of bio-inspired systems based on model driven architecture. 261-269 - Ehsan Ullah Munir, Samia Ijaz, Ali Nawaz Khan, Waqas Anwar, Wasif Nasir:

Novel approaches for scheduling task graphs in heterogeneous distributed computing environment. 270-277 - Somayeh Abdi, Sayyed Hashemi:

A hierarchical approach to improve job scheduling and data replication in data grid. 278-285 - Muhammad Khan, Muhammad Akram, Naveed Riaz Ansari:

A comparative analysis of software protection schemes. 286-295 - Walaa Hassan Elashmawi, Jun Hu, Renfa Li:

Stability coalition formation with cost sharing in multi-agent systems based on volume discount. 296-303 - Md. Zia Uddin, Deok-Hwan Kim, Tae-Seong Kim:

A human activity recognition system using hmms with gda on enhanced independent component features. 304-310 - Emad Elabd, Eissa Alshari, Hatem M. Abdelkader:

Semantic boolean arabic information retrieval. 311-316
Volume 12, Number 4, July 2015
- Kiruthika Subramanian, Preetha Gunasekaran, Mercy Selvaraj:

Two layer defending mechanism against DDOS attacks. 317-324 - Jaseema Yasmin, Mohamed Sathik:

An improved iterative segmentation algorithm using canny edge detector for skin lesion border detection. 325-332 - Muthukumaran Narayanaperumal, Ravi Ramraj:

VLSI implementations of compressive image acquisition using block based compression algorithm. 333-339 - Yousof Farzaneh, Mahdi Azizi, Masoud Hadian Dehkordi, Abdolrasoul Mirghadri:

Vulnerability analysis of two ultra lightweight RFID authentication protocols. 340-345 - Asma Kebbeb, Messaoud Mostefai, Fateh Benmerzoug, Youssef Chahir:

Efficient multimodal biometric database construction and protection schemes. 346-351 - Arumugam Kunthavai, Somasundaram Vasantharathna, Swaminathan Thirumurugan:

Pairwise sequence alignment using bio-database compression by improved fine tuned enhanced suffix array. 352-359 - Meng Han, Zhihai Wang, Jidong Yuan:

Mining closed and multi-supports-based sequential pattern in high-dimensional dataset. 360-369 - Tao Li, Nanfeng Xiao:

Solving QBF with heuristic small world optimization search algorithm. 370-378 - Hebat-Allah M. Ragab, Amany M. Sarhan, Al sayed A. H. Sallam, Reda A. Ammar:

Balanced workload clusters for distributed object oriented software. 379-388 - Tahir Mustafa Madani, Muhammad Tahir, Sheikh Ziauddin, Syed Raza, Mirza Ahmed:

An accelerometer-based approach to evaluate 3D unistroke gestures. 389-394 - Shazia Raj, Zobia Rehman, Sonia Rauf, Rehana Siddique, Waqas Anwar:

An artificial neural network approach for sentence boundary disambiguation in urdu language text. 395-400 - Niraimathi Ponnusamy, Bhoopathy Krishnaswamy:

Speed up of reindexing in adaptive particle swarm optimization. 401-409 - Kai Zhang, Jie Guan:

Distinguishing attack on common scrambling algorithm. 410-414
Volume 12, Number 5, September 2015
- Seyed H. Chavoshi, Bernard De Baets, Yi Qiang, Guy De Tré, Tijs Neutens, Nico Van de Weghe:

A Qualitative Approach to the Identification, Visualisation and Interpretation of Repetitive Motion Patterns in Groups of Moving Point Objects. 415-423 - Mohideen Fatima Alias Niraimathi M, Seenivasagam:

Comparison of Segmentation Algorithms by A Mathematical Model For Resolving Islands and Gulfs in Nuclei of Cervical Cell Images. 424-430 - Muthukumar Arunachalam, Kannan Subramanian:

AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print. 431-440 - Soumia Belhadi, Nadjia Benblidia:

Automated Retinal Vessel Segmentation Using Entropic Thresholding Based Spatial Correlation Histogram of Gray Level Images. 441-447 - Ahmed Zaafouri, Mounir Sayadi, Farhat Fnaiech:

A Vision Approach for Expiry Date Recognition using Stretched Gabor Features. 448-455 - Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin:

Optimum Threshold Parameter Estimation of Bidimensional Empirical Mode Decomposition Using Fisher Discriminant Analysis for Speckle Noise Reduction. 456-464 - Murtada Khalafallah Elbashir, Jianxin Wang:

Kernel Logistic Regression Algorithm for Large-Scale Data Classification. 465-472 - Anupriya Elumalai, Sriman Narayana Iyengar:

Adaptive Semantic Indexing Of Documents For Locating Relevant Information In P2P Networks. 473-480 - Abdul Shahid, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:

Lessons Learned: The Complexity of Accurate Identification of in-Text Citations. 481-488 - Fatemeh Boobord, Zalinda Othman, Azuraliza Abu Bakar:

A WK-means Approach for Clustering. 489-493 - Razieh Baradaran, Behrouz Minaei-Bidgoli:

Event Extraction from Classical Arabic Texts. 494-502 - Islam Elhalwany, Ammar Mohammed, Khaled Tawfik Wassif, Hesham A. Hefny:

Using Textual Case-based Reasoning in Intelligent Fatawa QA System. 503-509 - Al-Fahim Mubarak-Ali, Sharifah Mashita Syed-Mohamad, Shahida Sulaiman:

Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer Approach. 510-517
Volume 12, Number 6, November 2015
- Telu Venkata Madhusudhanarao, Sanaboina Pallam Setty, Yarramalle Srinivas:

Model based approach for content based image retrievals based on fusion and relevancy methodology. 519-523 - Seema Verma, Deepak Garg:

Improvement in rebalanced CRT RSA. 524-531 - Romi Rahmat, Muhammad Fermi Pasha, Mohammad Syukur, Rahmat Budiarto:

A gene-regulated nested neural network. 532-539 - Muhammad Attique, Yared Hailu Gudeta, Sololia Gudeta Ayele, Hyung-Ju Cho, Tae-Sun Chung:

A safe exit approach for continuous monitoring of reverse k-nearest neighbors in road networks. 540-549 - Mehmet Kurt, Murat Ersen Berberler, Onur Ugurlu:

A new algorithm for finding vertex-disjoint paths. 550-555 - Wen-Ping Li, Jing Yang, Jianpei Zhang:

A differential geometry perspective about multiple data streams preprocessing. 556-565 - Mohamed Achraf Ben Mohamed, Souheyl Mallat, Mohamed Amine Nahdi, Mounir Zrigui:

Exploring the potential of schemes in building NLP tools for arabic language. 566-573 - Farshad Tajeripour, Mohammad Saberi, Shervan Fekri Ershad:

Developing a novel approach for content based image retrieval using modified local binary patterns and morphological transform. 574-581 - Qaisar Abbas, Irene Fondón, M. Emre Celebi:

A computerized system for detection of spiculated margins based on mammography. 582-588 - Kavitha Adhikesavan:

An integrated approach for measuring semantic similarity between words and sentences using web search engine. 589-596 - Singaravelu Prabhu, Dharmaraj Tensing:

Adapted normalized graph cut segmentation with boundary fuzzy classifier object indexing on road satellite images. 597-603 - Mohamed Ouda, Sameh A. Salem, Ihab Ali, El-Said Saad:

Privacy-preserving data mining in homogeneous collaborative clustering. 604-612 - Saad Abid, Zhiyong Li, Renfa Li:

Smelling the web olfactory display for web objects. 613-619
Volume 12, Number 6A, December 2015
- Hamza Zidoum, Fatma Al-Rasbi, Muna Al-Awfi:

Towards the construction of a comprehensive arabic lexical reference system. 621-626 - Loan T. T. Nguyen, Bay Vo, Tzung-Pei Hong:

CARIM: an efficient algorithm for mining class-association rules with interestingness measures. 627-634 - Thomson Fredrick, Govindaraju Radhamani:

The fuzzy logic based ECA rule processing for XML databases. 635-641 - Muthukumar Arunachalam, Kannan Subramanian:

Finger knuckle print authentication using AES and K-means algorithm. 642-649 - Tameem Eissa, Gihwan Cho:

Lightweight anti-censorship online network for anonymity and privacy in middle eastern countries. 650-657 - Marappagounder Shanker, Keppanagounder Thanushkodi:

An effective approach to software cost estimation based on soft computing techniques. 658-665 - Teena Mittal, Rajendra Kumar Sharma:

Multiclass SVM based spoken hindi numerals recognition. 666-671 - Shyam Lal, Rahul Kumar:

An efficient method for contrast enhancement of real world hyper spectral images. 672-679 - Iyapparaja Meenakshisundaram, Sureshkumar Sreedharan:

Intelligent risk analysis model for mining adaptable reusable component. 680-687 - Subbian Suganthi, Rethanaswamy Nadarajan:

Adaptability metric for adaptation of the dynamic changes. 688-694 - Jaison Bennet, Chilambuchelvan Ganaprakasam, Nirmal Kumar:

A hybrid approach for gene selection and classification using support vector machine. 695-700 - Hemalatha Gunasekaran, ThanushkodiKeppana Gowder:

New bucket join algorithm for faster join query results. 701-707 - L. Jani Anbarasi, G. S. Anandha Mala:

Verifiable multi secret sharing scheme for 3D models. 708-713 - Santosh Kumar Ravva, Challa Narasimham, Pallam Shetty:

Short secret exponent attack on LSBS-RSA. 714-718 - Iman Kashefi, Maryam Kassiri, Mazleena Salleh:

Preventing collusion attack in android. 719-727 - Kaliappan Jeyakumar, Thiagarajan Revathi, Sundararajan Karpagam:

Intrusion detection using artificial neural networks with best set of features. 728-734 - ShanmughaSundaram Mythili, Subramani Sarala:

A measurement of similarity to identify identical code clones. 735-740 - Amit Mahesh Joshi, Vivekanand Mishra, Rajendra M. Patrikar:

Real time implementation of integer DCT based video watermarking architecture. 741-747 - Raman Beena, Subramani Sarala:

An efficient specific update search domain based glowworm swarm optimization for test case prioritization. 748-754 - Satyendr Singh, Tanveer J. Siddiqui:

Utilizing corpus statistics for hindi word sense disambiguation. 755-763 - Thumma Kumar, Kamireddy Reddy:

A technique for burning area identification UIHS transformation and image segmentation. 764-771 - Akila Thiyagarajan, UmaMaheswari Pandurangan:

Comparative analysis of classifier Performance on MR brain images. 772-779 - Siva Sankar Kanahasabapathy, Jebarajan Thanganadar, Padmasuresh Lekshmikanthan:

A novel approach to develop dynamic portable instructional operating system for minimal utilization. 780-784 - Ghulam Mujtaba, David J. Parish:

A statistical framework for identification of tunnelled applications using machine learning. 785-790 - Sanjay K. Dwivedi, Pramod P. Sukhadeve:

Translation rules for english to hindi machine translation system: homoeopathy domain. 791-796 - Krishna Priya Remamany, Thanga Raj Chelliah, Kesavadas Chandrasekharan, Kannan Subraman:

Brain tumor segmentation in MRI images using integrated modified PSO-fuzzy approach. 797-805

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














