default search action
The International Arab Journal of Information Technology, Volume 8
Volume 8, Number 1, January 2011
- Moussa Benaissa, Yahia Lebbah:
A constraint programming based approach to detect ontology inconsistencies. 1-8 - Ahasanun Nessa, Qinghai Yang, Kyung Sup Kwak:
Performance analysis of dual-hop cooperative MIMO transmission with relay selection in rayleigh fading channel. 9-15 - Anwar Saif, Mohamed Othman:
Network load and packet loss optimization during handoff using multi-scan approach. 16-22 - Hatem Abdul-Kader:
E-learning systems in virtual environment. 23-29 - Mehri Saeid, Abdul Azim Abdul Ghani, Mohd Hasan Selamat:
Rank-order weighting of web application attributes. 30-38 - Sanam Shahla Rizvi, Tae-Sun Chung:
AMI: an advanced eEndurance management technique for flash memory storage systems. 39-47 - Lotfi Messikh, Mouldi Bedda, Noureddine Doghmane:
Binary phoneme classification using fixed and adaptive segment-based neural network approach. 48-51 - Moshaddique Al Ameen, Kyung Sup Kwak:
Social Issues in wireless sensor networks with healthcare perspective. 52-58 - Hatem Abdul-Kader, Mohamed Sherif:
Novel robust multilevel 3D visualization technique for web based GIS. 59-65 - Ibrahim Akman, Hakan Bayindir, Serkan Ozleme, Zehra Akin, Sanjay Misra:
A lossless text compression technique using syllable based morphology. 66-74 - Dilek Basci, Sanjay Misra:
Entropy as a measure of quality of XML schema document. 75-83 - Ihab Sbeity, Mohamed Dbouk, Brigitte Plateau:
Stochastic bounds for microprocessor systems availability. 84-90 - Abderrahim Boudlal, Mohamed Ould Abdallahi Ould Bebah, Abdelhak Lakhouaja, Azzeddine Mazroui, Abdelouafi Meziane:
A Markovian approach for arabic root extraction. 91-98 - Mahamat Issa Hassan, Azween B. Abdullah:
A new grid resource discovery framework. 99-107 - Aitha Nagaraju, Ramachandram Srinadas:
A strategy to reduce the control packet load of AODV using weighted rough set model for MANET. 108-116
Volume 8, Number 2, April 2011
- Arockia Jansirani, Rengansivagurunathan Rajesh, Ramasamy Balasubramanian, Perumal Eswaran:
Hi-tech authentication for pslette images using digital signature and data hiding. 117-123 - Izzat Alsmadi, Mohammed Al-Kabi:
GUI structural metrics. 124-129 - Rukhsana Shahnaz, Anila Usman:
Blocked-based sparse matrix-vector multiplication on distributed memory parallel computers. 130-136 - Nidhal El-Abbadi, Ahmed Nidhal Khdhair, Adel Al-Nasrawi:
Build electronic arabic lexicon. 137-140 - Yadollah Hezarjaribi, Mohd Hamidon, Roslina Mohd Sidek, Keshmiri Hossein, Raja Abdullah, Alireza Bahadorimehr:
Evaluation for diaphragm's deflection for touch mode MEMS pressure sensors. 141-146 - Hayam Mousa, Kamel Moustafa, Waiel Abdel-Wahed, Mohiy M. Hadhoud:
Data hiding based on contrast mapping using DNA medium. 147-154 - Haissam Ziade, Rafic A. Ayoubi, Raoul Velazco, Tareck Idriss:
A new fault injection approach to study the impact of bitflips in the configuration of SRAM-based FPGAs. 155-162 - Ali Ghobadi Tapeh, Maseud Rahgozar:
An ontology-based semantic extraction approach for B2C ecommerce. 163-170 - Mohammad Salameh, Rached Zantout, Nashat Mansour:
Improving the accuracy of English-Arabic statistical sentence alignment. 171-177 - Fernando Valles-Barajas:
A survey of high-level programming languages in control systems. 178-187 - Arafat Awajan:
Multilayer model for Arabic text compression. 188-196 - Muhammad Ghulam:
Extended average magnitude difference function (EAMDF) based pitch detection. 197-203 - Mohd Nasir, Azah Anir Norman, Shukor Sanim Bin Mohd Fauzi, Masliyana Azmi:
An RFID-based validation system for halal food. 204-211 - Haya Sammaneh, Jamal N. Al-Karaki, Sameer M. Bataineh:
End-to-end support for short-lived TCP flows in heterogeneous wired-cum-wireless networks: an analytical study. 212-220 - Allam Mousa:
Speech segmentation in synthesized speech morphing using pitch shifting. 221-226
Volume 8, Number 3, July 2011
- Maâmar Kef, Leila Chergui, Mohamed Benmohammed:
Self-organization and topology's control for mobile ad-hoc networks. 227-234 - Qutaiba Ali:
A flexible design of network devices using reconfigurable content addressable memory. 235-243 - Batri Krishnan, Murugesh Veerasamy, Gopalan Nagammapudur:
Effect of weight assignment in data fusion based information retrieval. 244-250 - Rehab M. Duwairi, Rania Al-Zubaidi:
A hierarchical K-NN classifier for textual data. 251-259 - Abdelmalek Kouadri, Mimoun Zelmat, Alhussein Albarbar:
Prediction of boiler output variables through the PLS linear regression technique. 260-264 - Eyas El-Qawasmeh, Maytham Safar, Talal Kanan:
Investigation of golay code (24, 12, 8) structure in improving search techniques. 265-271 - Rajender Nath, Satinder Bal:
A novel mobile crawler system based on filtering off non-modified pages for reducing load on the network. 272-279 - Omar Nouali, Nadia Nouali-Taboudjemat, Bernard Toursel:
Cognitive filtering of textual information agents based implementation. 280-288 - Quan T. Nguyen, Saïd Bettayeb:
On the genus of pancake network. 289-292 - Majid Ziaratban, Karim Faez:
Detection and compensation of undesirable discontinuities within the farsi/arabic subwords. 293-301 - Shahzad Ali, Sajjad Ahmad Madani:
Distributed efficient multi hop clustering protocol for mobile sensor networks. 302-309 - Hazleen Aris, Siti Salwah Salim:
State of component models usage: justifying the need for a component model selection framework. 310-317 - Mohammed Alharthi, Siti Salwah Salim:
Zest based visualization for requirements negotiation. 318-325 - Ali Al-Haj, Ahmad A. Mohammad, Lama Bata:
DWT-based audio watermarking. 326-333 - Malak Abdullah, Emad Abuelrub, Basel A. Mahafzah:
The chained-cubic tree interconnection network. 334-343
Volume 8, Number 4, October 2011
- Vanniappan Balamurugan, Senthamarai Kannan:
Detection of traffic signal by adaptive approach and shape constraints. 345-349 - Abdelhamid El-Jihad, Abdellah Yousfi, Si Lhoussain Aouragh:
Morpho-syntactic tagging system based on the patterns words for arabic texts. 350-354 - Ashraf El-Sisi:
Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter. 355-363 - Md Sah Bin Hj Salam, Dzulkifli Mohamad, Sheikh Hussain Shaikh Salleh:
Malay isolated speech recognition using neural network: a work in finding number of hidden nodes and learning parameters. 364-371 - Aiman Turani, Faiz M. Al-Shrouf:
Intelligent e-learning framework for practicing educational testing services. 372-375 - Jehad Al-Sadi, Ahmad Awwad:
A new otis-arrangment interconnection network. 376-382 - Zahraa F. Muhsen, Maher Dababneh, Ayman Jameel Al-Nsour:
Wavelet and optimal requantization methodology for lossy fingerprint compression. 383-387 - Eman AlQuraishi, May Al-Roomi, Sobeeh Almukhaizim:
Analysis of the soft error susceptibility and failure rate in logic circuits. 388-396 - Brahmadesam Krishna, Baskaran Kaliaperumal:
Efficient genetic-wrapper algorithm based data mining for feature subset selection in a power quality pattern recognition applicationction in a power quality pattern recognition application. 397-405 - Redouane Tlemsani, Abdelkader Benyettou:
On line isolated characters recognition using dynamic bayesian networks. 406-413 - Shahzad Ali, Sajjad Ahmad Madani:
Distributed grid based robust clustering protocol for mobile sensor networks. 414-421 - Sardar Muhammad Bilal, Sajjad Ahmad Madani, Imran Ali Khan:
Enhanced junction selection mechanism for routing protocol in VANETs. 422-429 - Shuhua Wu, Yuefei Zhu:
Improved two-factor authenticated key exchange protocol. 430-439 - Mohammad Nauman, Sohail Khan:
Design and implementation of a fine-grained resource usage model for the android platform. 440-448
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.