default search action
The International Arab Journal of Information Technology, Volume 11
Volume 11, Number 1, January 2014
- Aisha Azeem, Muhammad Sharif, Mudassar Raza, Marryam Murtaza:
A survey: face recognition techniques under partial occlusion. 1-10 - Karim Kalti, Mohamed Ali Mahjoub:
Image segmentation by gaussian mixture models and modified FCM algorithm. 11-18 - Rytis Maskeliunas:
The evaluation of spoken dialog management models for multimodal HCIs. 19-24 - Chao Zuo, Qian Chen, Xiubao Sui, Jianle Ren:
Brightness preserving image contrast enhancement using spatially weighted histogram equalization. 25-32 - Bhawna Mallick, Deepak Garg, P. S. Grover:
Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary. 33-42 - Habib Mahi, Hadria Isabaten, Chahira Serief:
Zernike moments and svm for shape classification in very high resolution satellite images. 43-51 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:
High-availability decentralized cryptographic multi-agent key recovery. 52-58 - Devangkumar Shah, Chandresh Vithlani:
VLSI-oriented lossy image compression approach using DA-based 2D-discrete wavelet. 59-68 - Sofien Gannouni, Mutaz Beraka, Hassan Mathkour:
A critical comparison for data sharing approaches. 69-77 - Yaser A. Al-Lahham, Mohammad A. Hassan:
Scalable self-organizing structured P2P information retrieval model based on equivalence classes. 78-86 - Faisal Ahmed, Md. Hasanul Kabir, Shayla Bhuyan, Hossain Bari, Emam Hossain:
Automated weed classification with local pattern-based texture descriptors. 87-94 - Shyam Lal, Mahesh Chandra:
Efficient algorithm for contrast enhancement of natural images. 95-102 - Nattha Phiwma, Parinya Sanguansat:
An improved feature extraction and combination of multiple classifiers for query-by-humming. 103-110
Volume 11, Number 2, March 2014
- Dongfu Xie:
Simplified algorithm and hardware implementation for the (24, 12, 8) extended golay soft decoder up to 4 errors. 111-115 - Faten F. Kharbat, Mohammed Odeh, Larry Bull:
A new hybrid architecture for the discovery and compaction of knowledge: breast cancer datasets case study. 116-123 - Sanjay T. Singh, Trimbak R. Sontakke:
An effective mechanism to neutralize the semantic gap in content based image retrieval (CBIR). 124-133 - Saed Alqaraleh, Omar Ramadan:
Elimination of repeated occurrences in multimedia search engines. 134-139 - Shubair Abdulla, Sureswaran Ramadass, Altyeb Altaher Altyeb, Amer Al-Nassiri:
Employing machine learning algorithms to detect unknown scanning and email worms. 140-148 - Marryam Murtaza, Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah:
Face recognition using adaptive margin fisher's criterion and linear discriminant analysis (AMFC-LDA). 149-158 - Sivasubramaniam Nandhini, Senniappan Palaniammal:
Enhanced core stateless fair queuing with multiple queue priority scheduler. 159-167 - Murugappan Ilango, Vasudev Mohan:
PCFA: mining of projected clusters in high dimensional data using modified FCM algorithm. 168-177 - Saeed Amirgholipour Kasmani, Aboosalh Mohammad Sharifi:
A pre-filtering method to improve watermark detection rate in DCT based watermarking. 178-185 - Kalli Srinivasa Nageswara Prasad, S. Ramakrishna:
An efficient traffic forecasting system based on spatial data and decision trees. 186-194 - Faisal Ahmed, Hossain Bari, Emam Hossain:
Person-independent facial expression recognition based on compound local binary pattern (CLBP). 195-203 - Majid Masoumi, Shervin Amiri:
Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks. 204-212
Volume 11, Number 3, May 2014
- Chaobang Gao, Jiliu Zhou, Weihua Zhang:
Edge detection based on the newton interpolation's fractional differentiation. 223-228 - Leonardo Reis, Luis Aguiar, Darío Baptista, Fernando Morgado Dias:
A software tool for automatic generation of neural hardware. 229-235 - Yuhanis Yusof, Zuriani Mustaffa:
LSSVM parameters tuning with enhanced artificial bee colony. 236-242 - Khalid M. Hosny:
Fast computation of accurate pseudo zernike moments for binary and gray-level images. 243-249 - Haneen Talal Jasim, Kais Ismail Ibraheem, Abdul Ghafoor Jasim Salim:
A hybrid algorithm to forecast enrolment based on genetic algorithms and fuzzy time series. 250-257 - Fazal-e-Malik, Baharum Baharudin:
Effective image retrieval based on an experimental combination of texture features and comparison of different histogram quantizations in the DCT domain. 258-267 - Kun Gao, Qin Wang, Lifeng Xi:
Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. 268-275 - Addepalli V. N. Krishna:
Time stamp based ECC encryption and decryption. 276-280 - Khairullah Khan, Baharum Baharudin, Aurangzeb Khan:
Identifying product features from customer reviews using hybrid patterns. 281-286 - Phichhang Ou, Hengshan Wang:
Volatility modelling and prediction by hybrid support vector regression with chaotic genetic algorithms. 287-292 - Fayçal Ykhlef, Messaoud Bensebti:
Comparative performance study of several features for voiced/ non-voiced classification. 293-299 - Sotiris B. Kotsiantis:
Integrating global and local application of naive bayes classifier. 300-307 - Hui Hui Wang, Dzulkifli Mohamad, Nor Azman Ismail:
An efficient parameters selection for object recognition based colour features in traffic image retrieval. 308-314
Volume 11, Number 4, July 2014
- Han-Yu Lin:
Toward secure strong designated verifier signature scheme from identity-based system. 315-321 - Arumugam Sakthivel, Raju Nedunchezhian:
Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. 322-328 - Bacha Rehman, Zahid Halim, Mushtaq Ahmad:
ASCII based GUI system for arabic scripted languages: a case of urdu. 329-337 - Sarra Senhadji, Salim Khiat, Hafida Belbachir:
Association rule mining and load balancing strategy in grid systems. 338-344 - Fatiha Barigou, Bouziane Beldjilali, Baghdad Atmani:
Using cellular automata for improving knn based spam filtering. 345-353 - Mehdi Sadeghi, Keivan Maghooli, Mohammad Shahram Moein:
Using artificial immunity network for face verification. 354-361 - Muhammad Tahir, Tahir Mustafa Madani, Sheikh Ziauddin, Muhammad Arshad Awan, Waqar Hussain Rana:
Wiimote squash: comparing DTW and WFM techniques for 3D gesture recognition. 362-369 - Abdel Karim Al Tamimi, Manar Jaradat, Nuha Al-Jarrah, Sahar Ghanem:
AARI: automatic arabic readability index. 370-378 - ShiNing Li, Zhenhai Zhang, Jiaqi Duan:
An ensemble multi-label feature selection algorithm based on information entropy. 379-386 - Chouaib Moujahdi, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul, Mohammed Rziza:
Inter-communication classification for multi-view face recognition. 387-395 - Marwan Akeel, Ravi Mishra:
ANN and rule based method for english to arabic machine translation. 396-405 - Bassam Rajabi, Sai Peck Lee:
Consistent integration between object oriented and coloured petri nets models. 406-415 - Aymen Chaabouni, Houcine Boubaker, Monji Kherallah, Haikal El Abed, Adel M. Alimi:
Static and dynamic features for writer identification based on multi-fractals. 416-424
Volume 11, Number 5, September 2014
- Chien-Lung Hsu, Han-Yu Lin:
Universal forgery attack on a strong designated verifier signature scheme. 425-428 - Rattan Rana, Deepak Garg:
Anticipatory bound selection procedure (ABSP) for vertex K-center problem 0. 429-436 - Geeta Nagpal, Moin Uddin, Arvinder Kaur:
Grey relational effort analysis technique using regression methods for software estimation. 437-446 - Valliammal Narayan, Geethalakshmi Subbarayan:
An optimal feature subset selection using GA for leaf classification. 447-451 - Tsui-Ping Chang:
Mining frequent user query patterns from XML query streams. 452-458 - Muhammad Naeem, Sohail Asghar:
An information theoretic scoring function in belief network. 459-467 - Hizmawati Madzin, Roziati Zainuddin, Nursabirin Mohamed:
Analysis of visual features in local descriptor for multi-modality medical image. 468-475 - Slami Saadi, Abderrezak Guessoum, Maamar Bettayeb, M. K. Abdelhafidi:
Blind restoration of radiological images using hybrid swarm optimized model implemented on FPGA. 476-486 - Nima Sahba, Keivan Maghooli, Vahid Tavakoli:
An optimized method for B-mode echocardiographic video compression based on motion estimation and wavelet. 487-492 - Hocheol Jeon:
A reference comments crawler for assisting research paper writing. 493-499 - Qais Qassim, Ahmed Patel, Abdullah Mohd Zin:
Strategy to reduce false alarms in intrusion detection and prevention systems. 500-506 - Zaini Arifah Othman, Nor Aniza Abdullah, Zaidi Razak, Mohd. Yakub Zulkifli Bin Mohd. Yusoff:
Speech to text engine for jawi language. 507-513 - Ramzi A. Haraty, Abdul Nasser El-Kassar, Suzan Fanous:
Hardening the elgamal cryptosystem in the setting of the second group of units. 514-520
Volume 11, Number 6, November 2014
- Ramzi A. Haraty, Bassam Zantout:
Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-Based Approach. 526-531 - Abd El-Aziz Abd El-Aziz, Arputharaj Kannan:
XML access control: mapping XACML policies to relational database tables. 532-539 - Mohammad Anagreh, Azman Samsudin, Mohd. Adib Omar:
Parallel method for computing elliptic curve scalar multiplication based on MOF. 521-525 - Khalid Suliman Al-Tahat:
An innovative instructional method for teaching object-oriented modelling. 540-549 - Ellips Masehian, Hossein Akbaripour, Nasrin Mohabbati-Kalejahi:
Solving the n-queens problem using a tuned hybrid imperialist competitive algorithm. 550-559 - Mohammad Ababneh, Salama Hassan, Sulieman Bani-Ahmad:
On static scheduling of tasks in real time multiprocessor systems: an improved GA-based approach. 560-572 - Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin:
Optimum threshold parameter estimation of wavelet coefficients using fisher discriminant analysis for speckle noise reduction. 573-581 - Almas Abbasi, Woo Chaw Seng, Imran Shafiq Ahmad:
Multi block based image watermarking in wavelet domain using genetic programming. 582-589 - Atta-ur-Rahman, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, Muhammad Tahir Naseem:
A real time adaptive resource allocation scheme for OFDM systems using GRBF-neural networks and fuzzy rule base system. 590-598 - Hossein Abbasimehr, Mostafa Setak, Mohammad Jafar Tarokh:
A comparative assessment of the performance of ensemble learning in customer churn prediction. 599-606 - Dhuha Basheer Abdullah, Seddeeq Albana:
Developing an appliance real time control in heterogeneous operating systems. 607-615 - Mohiadeen Abdul Kadhar:
A deadlock-free dynamic reconfiguration protocol for distributed routing on interconnection networks. 616-622 - Weiwei Han:
A provably secure public key encryption scheme based on isogeny star. 623-627
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.