default search action
The International Arab Journal of Information Technology, Volume 10
Volume 10, Number 1, January 2013
- Aymen I. Zreikat:
QoS-based performance and resource management in 3g wireless networks in realistic environments. 1-9 - Yang Yang, Yupu Hu, Chun-hui Sun, Chao Lv, Leyou Zhang:
An efficient group key agreement scheme for mobile ad-hoc networks. 10-17 - Teng Lv, Ping Yan:
A framework of summarizing XML documents with schemas. 18-27 - Yusuf Abu Sadah, Nijad Al-Najdawi, Sara Tedmori:
Exploiting hybrid methods for enhancing digital x-ray images. 28-35 - Yujin Lim, Sanggil Kang:
Intelligent approach for data collection in wireless sensor networks. 36-42 - Ghulam Muhammad, Khaled Alghathbar:
Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features. 43-50 - Lip Yee Por, Delina Beh Yin, Tan Fong Ang, Sim Ying Ong:
An enhanced mechanism for image steganography using sequential colour cycle algorithm. 51-60 - Hadjila Fethallah, Mohammed Amine Chikh:
Automated retrieval of semantic web services: a matching based on conceptual indexation. 61-66 - Venus Samawi, Mustafa Akram, Ahmad Abeer:
Arabic expert system shell. 67-75 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Cyber security using arabic captcha scheme. 76-84 - Prasad Raja, Pentamsetty Kumar:
Joint routing, scheduling and admission control protocol for WiMAX networks. 85-94 - Tong Liu, Sung-Hoon Kim, Sung-Kil Lim, Hyon-Soo Lee:
Selection of distinctive sift feature based on its distribution on feature space and local classifier for face recognition. 95-101 - Md Zahidul Islam, Chi-Min Oh, Chil-Woo Lee:
Effect of resampling steepness on particle filtering performance in visual tracking. 102-109
Volume 10, Number 2, March 2013
- Saeed Farzi, Alireza Rayati Shavazi, Abbas Pandari:
Using quantum-behaved particle swarm optimization for portfolio selection problem. 111-119 - Abdelmadjid Recioui, Hamid Bentarzi:
Null steering of dolph-chebychev arrays using taguchi method. 120-125 - Tanzila Saba, Amjad Rehman:
An intelligent model for visual scene analysis and compression. 126-136 - Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:
A n2+n MQV key agreement protocol. 137-142 - Baddeti Syam, Yarravarapu Rao:
An effective similarity measure via genetic algorithm for content based image retrieval with extensive features. 143-151 - Khalid A. Eldrandaly, Soad Naguib:
A knowledge-based system for GIS software selection. 152-159 - Abderrezak Brahmi, Ahmed Ech-Cherif, Abdelkader Benyettou:
An arabic lemma-based stemmer for latent topic modeling. 160-168 - Fahad Alshammari, Rodina Binti Ahmad:
Identification of factors that affect the transition time between CMMI levels from geographical region perspective: an empirical study. 169-178 - Djamel Gaceb, Véronique Eglin, Frank Lebourgeois:
A new mixed binarization method used in a real time application of automatic business document and postal mail sorting. 179-188 - Lip Yee Por:
Frequency of occurrence analysis attack and its countermeasure. 189-197 - Mohd Nazri Ismail:
Study the best approach implementation and codec selection for VoIP over virtual private network. 198-203 - Sidi Yassine Idrissi, Samir Belfkih:
Texture image segmentation using a new descriptor and mathematical morphology. 204-208
Volume 10, Number 3, May 2013
- Mohammad Mozammel Chowdhury, Mohammad Al-Amin Bhuiyan:
Fast window based stereo matching for 3D scene reconstruction. 209-214 - Shuhua Wu, Kefei Chen, Yuefei Zhu:
Enhancements of a three-party password-based authenticated key exchange protocol. 215-221 - Mahsa Chitsaz, Chaw-Seng Woo:
Medical image segmentation using a multi-agent system approach. 222-229 - Wafa' Alsharafat:
Applying artificial neural network and extended classifier system for network intrusion detection. 230-238 - Shaukat Ali, Azhar Rauf, Huma Javed:
A technique for handling range and fuzzy match queries on encrypted data. 239-244 - Sulieman Bani-Ahmad:
Submesh allocation in 2D-mesh multicomputers: partitioning at the longest dimension of requests. 245-252 - Mohd Amin Mohd Yunus, Roziati Zainuddin, Noorhidawati Abdullah:
Semantic method for query translation. 253-259 - Vimalkumar Dhanasekar, Tamilarasi Angamuthu:
An efficient approach for effectual mining of relational patterns from multi-relational database. 260-268 - Anmar Aljanabi, Alaa H. Alhamami, Basim Alhadidi:
Query dispatching tool supporting fast access to data warehouse. 269-275 - Khalid A. Eldrandaly:
Developing a GIS-based MCE site selection tool in arcGIS using COM technology. 276-282 - Shadi Abudalfa, Mohammad A. Mikki:
A dynamic linkage clustering using KD-tree. 283-289 - Khaled Maabreh, Alaa Al-Hamami:
Implementing new approach for enhancing performance and throughput in a distributed database. 290-296 - Bugra Karabey, Nazife Baykal:
Attack tree based information security risk assessment method integrating enterprise objectives with vulnerabilities. 297-304 - Igor Chimir, Ameed Ghazi, Waheeb Abu-Dawwas:
Modeling human dialogue transactions in the context of declarative knowledge. 305-315
Volume 10, Number 4, July 2013
- Rytis Maskeliunas, Vidas Raudonis:
ROBOSOFA - Low cost multimodal I/O fusion for smart furniture. 317-328 - Samir Shaltaf, Ahmad A. Mohammad:
A hybrid neural network and maximum likelihood based estimation of chirp signal parameters. 329-333 - Shanmugasundaram Hariharan, Thirunavukkarasu Ramkumar, Rengaramanujam Srinivasan:
Enhanced graph based approach for multi document summarization. 334-341 - Ahmed Otoom, Issa Atoum:
An implementation framework (IF) for the national information assurance and cyber security strategy (NIACSS) of jordan. 342-348 - Mohamed Elammari, Zeinab Issa:
Using model driven architecture to develop multi-agent systems. 349-355 - Abdul Nasir Aimi Salihah, Mohd Yusoff Mashor, Rosline Hassan:
Classification of acute leukaemia cells using multilayer perceptron and simplified fuzzy ARTMAP neural networks. 356-364 - Mostafa H. Dahshan:
Shortest node-disjoint path using dual-network topology in optical switched networks. 365-372 - Adari Satya Srinivasa Rao, Prudhivi Mallikarjuna Rao:
Design and analysis of array weighted wideband antenna using FRFT. 373-377 - Marryam Murtaza, Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah:
Analysis of face recognition under varying facial expression: a survey. 378-388 - Debiao He, Jianhua Chen:
An efficient certificateless designated verifier signature scheme. 389-396 - Abdalla Al-Ameen, Samani A. Talab:
The technical feasibility and security of e-voting. 397-404 - Saritchai Predawan, Chom Kimpan, Chai Wutiwiwatchai:
Thai monosyllabic words recognition using ant-miner algorithm. 405-412 - Necmi Taspinar, Yalçin Isik:
Multiuser detection with neural network MAI detector in CDMA systems for AWGN and rayleigh fading asynchronous channels. 413-419
Volume 10, Number 5, September 2013
- Yunjie Liu, Feng Bao, Zongmin Li, Hua Li:
3D model retrieval based on 3D fractional fourier transform. 421-427 - Saiful Bukhori, Mochamad Hariadi, I. Ketut E. Purnama, Mauridhi Hery Purnomo:
Parrondo's paradox based strategies in the serious game of rtgs using forest fire model. 428-435 - Hassan Yousif Ahmed, Mohammed Elmaleeh, Hilal Adnan Fadhil, Syed Alwee Aljunid:
Optical CDMA: performance of spectral-amplitude coding with new direct recovery scheme using vector combinatorial (VC) code. 436-443 - Jin Sun, Yupu Hu, Leyou Zhang:
A key-policy attribute-based broadcast encryption. 444-452 - Zheng Tang, Chao Sun, Zongwei Liu:
The tracking algorithm for maneuvering target based on adaptive kalman filter. 453-459 - Muazzam Siddiqui, Mohammad Fayoumi, Nidal Yousef:
A corpus based approach to find similar keywords for search engine marketing. 460-466 - Aloysius George:
Efficient high dimension data clustering using constraint-partitioning k-means algorithm. 467-476 - Kunjithapatham Meena, Kulumani R. Subramaniam, Muthusamy Gomathy:
Gender classification in speech recognition using fuzzy logic and neural network. 477-485 - Samia Ijaz, Ehsan Ullah Munir, Waqas Anwar, Wasif Nasir:
Efficient scheduling strategy for task graphs in heterogeneous computing environment. 486-492 - Alfian Abdul Halin, Mandava Rajeswari, Mohammad Abbasnejad:
Soccer event detection via collaborative multimodal feature analysis and candidate ranking. 493-502 - Mohammad Hassan:
Collaborative and integrated network and systems management: management using grid technologies. 503-510 - Syed Khaldoon Khurshid, Muhammad Shoaib:
Rio: rhetorical structure theory based indexing technique for image objects. 511-518 - Hu Ng, Wooi-Haw Tan, Junaidi Abdullah:
Multi-view gait based human identification system with covariate analysis. 519-526
Volume 10, Number 6, November 2013
- Padmanabhareddy Vundela, Varadarajan Sourirajan:
A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images Using Human Visual System. 527-535 - Jamal Hussain Shah, Muhammad Sharif, Mudassar Raza, Aisha Azeem:
A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques. 536-545 - Noura A. Semary, Mohiy M. Hadhoud, Hatem Abdul-Kader, Alaa M. Abbas:
Novel Compression System for Hue-Saturation and Intensity Color Space. 546-552 - Chandan Rawat, Sukadev Meher:
A Hybrid Image Compression Scheme Using DCT and Fractal Image Compression. 553-562 - Ayman Mousa, Osama S. Faragallah, El-Sayed El-Rabaie, Elsayed Nigm:
Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases. 563-570 - Meiyappan Yuvarani, N. Ch. Sriman Narayana Iyengar:
Interactive Query Expansion Using Concept-Based Directions Finder Based on Wikipedia. 571-578 - Azze-eddine Maredj, Nourredine Tonkin:
mage Compression Scheme Usin Semantic Adaptation of Multimedia Documents. 579-586 - Venus Samawi, Adeeb Sulaiman:
Software Protection via Hiding Function Using Software Obfuscation. 587-594 - Abdullah Jaafar, Azman Samsudin:
An Improved Version of the Visual Digital Signature Scheme. 595-602 - Shanmugavadivu Pichai, Balasubramanian Krishnasamy, Somasundaram Karuppanagounder:
Bi-Level Weighted Histogram Equalization for Scalable Brightness Preservation and Contrast Enhancement for Images. 603-609 - Li Yan:
Modeling Fuzzy Data with Fuzzy Data Types in Fuzzy Database and XML Models. 610-615 - Fazal-e-Malik, Baharum Baharudin:
The Statistical Quantized Histogram Texture Features Analysis for Image Retrieval Based on Median and Laplacian Filters in the DCT Domain. 616-624 - Saleem Raza, Najmus Saqib Malik, Azfar Shakeel, Majid Iqbal Khan:
Implementation and Comparative Analysis of the Fault Attacks on AES. 625-634
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.