default search action
The International Arab Journal of Information Technology, Volume 7
Volume 7, Number 1, January 2010
- Hilal Adnan Fadhil, Syed Alwee Aljunid, Badlished Ahmed:
Performance of OCDMA Systems Using Random Diagonal Code for Different Decoders Architecture Schemes. 1-5 - Mohammed Awad:
Input Variable Selection Using Parallel Processing of RBF Neural Networks. 6-13 - Monika Sachdeva, Gurvinder Singh, Krishan Kumar, Kuldip Singh:
DDoS Incidents and their Impact: A Review. 14-20 - Amer Draa, Souham Meshoul, Hichem Talbi, Mohamed Batouche:
A Quantum-Inspired Differential Evolution Algorithm for Solving the N-Queens Problem. 21-27 - Abdelkader Dekdouk:
Ontology-Based Intelligent Mobile Search Oriented to Global e-Commerce. 28-33 - Moazzam Hossain, Sadia Al Haque, Farhana Sharmin:
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information. 34-38 - Sohil Shah, Preethi Venkatesan, Deepa Sundar, Muniandi Kannan:
Low Latency, High Throughput, and Less Complex VLSI Architecture for 2D-DFT. 39-44 - Muhammad Islam, Mohsin Ali, Ali Al-Mamun, Motaharul Islam:
Semiotics Explorations on Designing the Information Intensive Web Interfaces. 45-54 - Jehad Alnihoud, Rami Mansi:
An Enhancement of Major Sorting Algorithms. 55-62 - Bassam Haddad, Ahmad Awwad:
Representing Uncertainty in Medical Knowledge: An Interval Based Approach for Binary Fuzzy Relations. 63-69 - Anis Boudabous, Ahmed Ben Atitallah, Lazhar Khriji, Patrice Kadionik, Nouri Masmoudi:
HW/SW Design-Based Implementation of Vector Median Rational Hybrid Filter. 70-74 - Kiran Sree, Ramesh Babu:
Identification of Promoter Region in Genomic DNA Using Cellular Automata Based Text Clustering. 75-78 - Hatem Abdul-Kader, Warda El Kholy:
Modelling of Updating Moving Object Database Using Timed Petri Net Model. 79-85 - Faiza Bouchoul, Mohamed Mostefai:
Specification and Prototyping of Reactive Distributed Systems with Algebraic Term Nets. 86-95 - Imen Werda, Haithem Chaouch, Amine Samet, Mohamed Ali Ben Ayed, Nouri Masmoudi:
Optimal DSP Based Integer Motion Estimation Implementation for H.264/AVC Baseline Encoder. 96-104
Volume 7, Number 2, April 2010
- Mohammed Refai, Ahmad Abdel-Aziz Sharieh, Fahad Alshammari:
Leader Election Algorithm in 2D Torus Networks with the Presence of One Link Failure. 105-114 - Adel Lahsasna, Raja Noor Ainon, Ying Wah Teh:
Credit Scoring Models Using Soft Computing Methods: A Survey. 115-123 - Bashar Al-Khalifa:
A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs. 124-128 - Majed Al Yahya, Rodina Binti Ahmad, Sai Peck Lee:
Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation. 129-137 - Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, Kyung Sup Kwak:
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects. 138-145 - Nasser Hamad:
Hiding Text Information in a Digital Image Based on Entropy Function. 146-151 - Ashraf El-Sisi:
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database. 152-160 - Rami Mansi:
Enhanced Quicksort Algorithm. 161-166 - Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bouchiha:
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach. 167-176 - Lotfi Salhi, Talbi Mourad, Adnane Cherif:
Voice Disorders Identification Using Multilayer Neural Network. 177-185 - Rami Mansi:
A New Algorithm for Sorting Small Integers. 186-191 - Mohammed Al-Zoube, Baha Khasawneh:
A Data Mashup for Dynamic Composition of Adaptive Courses. 192-198 - Mohamad Awad:
An Unsupervised Artificial Neural Network Method for Satellite Image Segmentation. 199-205 - Anis Boudabous, Lazhar Khriji, Nouri Masmoudi:
Implementation of Vector Directional Distance Rational Hybrid Filter Using TMS320C6416. 206-212 - Nawrès Khalifa, Said Ettaeib, Yosra Wahabi, Kamel Hamrouni:
Left Ventricle Tracking in Isotopic Ventriculography Using Statistical Deformable Models. 213-222
Volume 7, Number 3, July 2010
- Abdelhamid Abdesselam, Hui Hui Wang, Narayanan Kulathuramaiyer:
Spiral Bit-string Representation of Color for Image Retrieval. 223-230 - Kamel Faraoun:
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. 231-240 - Animesh Adhikari, Pralhad Ramachandrarao, Bhanu Prasad, Jhimli Adhikari:
Mining Multiple Large Data Sources. 241-249 - Hichem Chaker, Sidi Mohamed Meriah, Fethi Tarik Bendimerad:
Synthesis of Multibeam Antennas Arrays with a Modified Particle Swarm Optimization Algorithm. 250-255 - Rawya Rizk:
Uplink Downlink Limited Round Robin Scheduling Algorithms. 256-263 - Elmustapha Ait Lmaati, Ahmed El Oirrak, Mohammed Najib Kaddioui, Abdellah Ait Ouahman, Mohammed Sadgal:
3D Model Retrieval Based on 3D Discrete Cosine Transform. 264-270 - Elnumeri A. Zanaty, Sultan Alaljahdali:
Improving Fuzzy Algorithms for Automatic Magnetic Resonance Image Segmentation. 271-279 - Basil Al-Kasasbeh, Rafa Al-Qutaish, Mohammad Muhairat:
Innovative Algorithms for the Header Processing Transition from IPv4 to IPv6 and Vice Versa. 280-288 - Lubna Badri:
Development of Neural Networks for Noise Reduction. 289-294 - Latifa Baba-hamed:
Mediation Queries Adaptation After the Removal of a Data Source. 295-301 - Dilip Kumar, Ram Patel, Trilok Chand Aseri:
Prolonging Network Lifetime and Data Accumulation in Heterogeneous Sensor Networks. 302-309 - Jalal Atoum, Mamoun Al Rababaa:
Multiple Warehouses Scheduling Using Steady State. Genetic Algorithms. 310-316 - Md. Saiful Islam, Muhammad Mahbubur Rahman, Zerina Begum, Mohd. Zulfiquar Hafiz:
Realization of a Novel Fault Tolerant Reversible Full Adder Circuit in Nanotechnology. 317-323 - Alaa Al-Hamami, Hisham Al-Rashdan:
Improving the Effectiveness of the Color Coherence Vector. 324-332 - Pooria Varahram, Somayeh Mohammady, Mohd Hamidon, Roslina Mohd Sidek, Sabira Khatun:
Complex Gain Predistortion in WCDMA Power Amplifiers with Memory Effects. 333-341
Volume 7, Number 4, October 2010
- Mohd Ismail:
Measurement of V2oIP over wide area network between countries using soft phone and USB phone. 343-348 - Abdelmalek Amine, Zakaria Elberrichi, Michel Simonet:
Evaluation of text clustering methods using wordnet. 349-357 - Ali Al-Ataby, Fawzi M. Al-Naima:
A modified high capacity image steganography technique based on wavelet transform. 358-364 - Khaled M. Alallayah, Mohamed Amin, Waiel F. Abd El-Wahed, Alaa H. Alhamami:
Attack and construction of simulator for some cipher systems using neuro-Identifier. 365-372 - Mujahid Al-Azzo, Lubna Badri:
Multilayer neural network-burg combination for acoustical detection of buried objects. 373-379 - Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh, Mohammad Saleh:
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF. 380-387 - Lamia Bouafif, Kaïs Ouni, Noureddine Ellouze:
Implementation of a speech coding strategy for auditory implants. 388-394 - Sanam Shahla Rizvi, Tae-Sun Chung:
JAM: justifiable allocation of memory with efficient mounting and fast crash recovery for NAND flash memory file systems. 395-402 - Md. Hasanul Kabir, Mohammad Abdullah-Al-Wadud, Oksam Chae:
Brightness preserving image contrast enhancement using weighted mixture of global and local transformation functions. 403-410 - Muhammad Matondang, Habibollah Haron:
Hybrid computing algorithm in representing solid model. 411-418 - Abbas Hasan Kattoush:
A novel radon-wavelet based OFDM system design and performance under different channel conditions. 419-427 - Sawsan Abu-Taleb, Hossam Mustafa:
Improving web services security models. 428-434 - Shafiullah Khan, Kok-Keong Loo, Zia Ud Din:
Framework for intrusion detection in IEEE 802.11 wireless mesh networks. 435-440 - Shaker K. Ali, Beiji Zou, Abbas Ali:
An algorithm for diagnosis of the three kinds of constitutional jaundice. 441-448
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.