


default search action
The International Arab Journal of Information Technology, Volume 10
Volume 10, Number 1, January 2013
- Aymen I. Zreikat:

QoS-based performance and resource management in 3g wireless networks in realistic environments. 1-9 - Yang Yang, Yupu Hu, Chun-hui Sun, Chao Lv, Leyou Zhang:

An efficient group key agreement scheme for mobile ad-hoc networks. 10-17 - Teng Lv, Ping Yan:

A framework of summarizing XML documents with schemas. 18-27 - Yusuf Abu Sadah, Nijad Al-Najdawi, Sara Tedmori:

Exploiting hybrid methods for enhancing digital x-ray images. 28-35 - Yujin Lim, Sanggil Kang:

Intelligent approach for data collection in wireless sensor networks. 36-42 - Ghulam Muhammad, Khaled Alghathbar:

Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features. 43-50 - Lip Yee Por, Delina Beh Yin, Tan Fong Ang, Sim Ying Ong:

An enhanced mechanism for image steganography using sequential colour cycle algorithm. 51-60 - Hadjila Fethallah, Mohammed Amine Chikh:

Automated retrieval of semantic web services: a matching based on conceptual indexation. 61-66 - Venus Samawi, Mustafa Akram, Ahmad Abeer:

Arabic expert system shell. 67-75 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:

Cyber security using arabic captcha scheme. 76-84 - Prasad Raja, Pentamsetty Kumar:

Joint routing, scheduling and admission control protocol for WiMAX networks. 85-94 - Tong Liu, Sung-Hoon Kim, Sung-Kil Lim, Hyon-Soo Lee:

Selection of distinctive sift feature based on its distribution on feature space and local classifier for face recognition. 95-101 - Md Zahidul Islam, Chi-Min Oh, Chil-Woo Lee:

Effect of resampling steepness on particle filtering performance in visual tracking. 102-109
Volume 10, Number 2, March 2013
- Saeed Farzi, Alireza Rayati Shavazi, Abbas Pandari:

Using quantum-behaved particle swarm optimization for portfolio selection problem. 111-119 - Abdelmadjid Recioui, Hamid Bentarzi:

Null steering of dolph-chebychev arrays using taguchi method. 120-125 - Tanzila Saba, Amjad Rehman:

An intelligent model for visual scene analysis and compression. 126-136 - Li-Chin Huang, Cheng-Chi Lee, Min-Shiang Hwang:

A n2+n MQV key agreement protocol. 137-142 - Baddeti Syam, Yarravarapu Rao:

An effective similarity measure via genetic algorithm for content based image retrieval with extensive features. 143-151 - Khalid A. Eldrandaly, Soad Naguib:

A knowledge-based system for GIS software selection. 152-159 - Abderrezak Brahmi, Ahmed Ech-Cherif, Abdelkader Benyettou:

An arabic lemma-based stemmer for latent topic modeling. 160-168 - Fahad Alshammari, Rodina Binti Ahmad:

Identification of factors that affect the transition time between CMMI levels from geographical region perspective: an empirical study. 169-178 - Djamel Gaceb, Véronique Eglin, Frank Lebourgeois:

A new mixed binarization method used in a real time application of automatic business document and postal mail sorting. 179-188 - Lip Yee Por:

Frequency of occurrence analysis attack and its countermeasure. 189-197 - Mohd Nazri Ismail:

Study the best approach implementation and codec selection for VoIP over virtual private network. 198-203 - Sidi Yassine Idrissi, Samir Belfkih:

Texture image segmentation using a new descriptor and mathematical morphology. 204-208
Volume 10, Number 3, May 2013
- Mohammad Mozammel Chowdhury, Mohammad Al-Amin Bhuiyan:

Fast window based stereo matching for 3D scene reconstruction. 209-214 - Shuhua Wu, Kefei Chen, Yuefei Zhu:

Enhancements of a three-party password-based authenticated key exchange protocol. 215-221 - Mahsa Chitsaz, Chaw-Seng Woo:

Medical image segmentation using a multi-agent system approach. 222-229 - Wafa' Alsharafat:

Applying artificial neural network and extended classifier system for network intrusion detection. 230-238 - Shaukat Ali, Azhar Rauf, Huma Javed:

A technique for handling range and fuzzy match queries on encrypted data. 239-244 - Sulieman Bani-Ahmad:

Submesh allocation in 2D-mesh multicomputers: partitioning at the longest dimension of requests. 245-252 - Mohd Amin Mohd Yunus, Roziati Zainuddin, Noorhidawati Abdullah:

Semantic method for query translation. 253-259 - Vimalkumar Dhanasekar, Tamilarasi Angamuthu:

An efficient approach for effectual mining of relational patterns from multi-relational database. 260-268 - Anmar Aljanabi, Alaa H. Alhamami, Basim Alhadidi:

Query dispatching tool supporting fast access to data warehouse. 269-275 - Khalid A. Eldrandaly:

Developing a GIS-based MCE site selection tool in arcGIS using COM technology. 276-282 - Shadi Abudalfa, Mohammad A. Mikki:

A dynamic linkage clustering using KD-tree. 283-289 - Khaled Maabreh, Alaa Al-Hamami:

Implementing new approach for enhancing performance and throughput in a distributed database. 290-296 - Bugra Karabey, Nazife Baykal:

Attack tree based information security risk assessment method integrating enterprise objectives with vulnerabilities. 297-304 - Igor Chimir, Ameed Ghazi, Waheeb Abu-Dawwas:

Modeling human dialogue transactions in the context of declarative knowledge. 305-315
Volume 10, Number 4, July 2013
- Rytis Maskeliunas, Vidas Raudonis:

ROBOSOFA - Low cost multimodal I/O fusion for smart furniture. 317-328 - Samir Shaltaf, Ahmad A. Mohammad:

A hybrid neural network and maximum likelihood based estimation of chirp signal parameters. 329-333 - Shanmugasundaram Hariharan, Thirunavukkarasu Ramkumar, Rengaramanujam Srinivasan:

Enhanced graph based approach for multi document summarization. 334-341 - Ahmed Otoom, Issa Atoum:

An implementation framework (IF) for the national information assurance and cyber security strategy (NIACSS) of jordan. 342-348 - Mohamed Elammari, Zeinab Issa:

Using model driven architecture to develop multi-agent systems. 349-355 - Abdul Nasir Aimi Salihah, Mohd Yusoff Mashor, Rosline Hassan:

Classification of acute leukaemia cells using multilayer perceptron and simplified fuzzy ARTMAP neural networks. 356-364 - Mostafa H. Dahshan:

Shortest node-disjoint path using dual-network topology in optical switched networks. 365-372 - Adari Satya Srinivasa Rao, Prudhivi Mallikarjuna Rao:

Design and analysis of array weighted wideband antenna using FRFT. 373-377 - Marryam Murtaza, Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah:

Analysis of face recognition under varying facial expression: a survey. 378-388 - Debiao He, Jianhua Chen:

An efficient certificateless designated verifier signature scheme. 389-396 - Abdalla Al-Ameen, Samani A. Talab:

The technical feasibility and security of e-voting. 397-404 - Saritchai Predawan, Chom Kimpan, Chai Wutiwiwatchai:

Thai monosyllabic words recognition using ant-miner algorithm. 405-412 - Necmi Taspinar, Yalçin Isik:

Multiuser detection with neural network MAI detector in CDMA systems for AWGN and rayleigh fading asynchronous channels. 413-419
Volume 10, Number 5, September 2013
- Yunjie Liu, Feng Bao, Zongmin Li, Hua Li:

3D model retrieval based on 3D fractional fourier transform. 421-427 - Saiful Bukhori, Mochamad Hariadi, I. Ketut E. Purnama, Mauridhi Hery Purnomo:

Parrondo's paradox based strategies in the serious game of rtgs using forest fire model. 428-435 - Hassan Yousif Ahmed, Mohammed Elmaleeh, Hilal Adnan Fadhil, Syed Alwee Aljunid:

Optical CDMA: performance of spectral-amplitude coding with new direct recovery scheme using vector combinatorial (VC) code. 436-443 - Jin Sun, Yupu Hu, Leyou Zhang:

A key-policy attribute-based broadcast encryption. 444-452 - Zheng Tang, Chao Sun, Zongwei Liu:

The tracking algorithm for maneuvering target based on adaptive kalman filter. 453-459 - Muazzam Siddiqui, Mohammad Fayoumi, Nidal Yousef:

A corpus based approach to find similar keywords for search engine marketing. 460-466 - Aloysius George:

Efficient high dimension data clustering using constraint-partitioning k-means algorithm. 467-476 - Kunjithapatham Meena, Kulumani R. Subramaniam, Muthusamy Gomathy:

Gender classification in speech recognition using fuzzy logic and neural network. 477-485 - Samia Ijaz, Ehsan Ullah Munir, Waqas Anwar, Wasif Nasir:

Efficient scheduling strategy for task graphs in heterogeneous computing environment. 486-492 - Alfian Abdul Halin, Mandava Rajeswari, Mohammad Abbasnejad:

Soccer event detection via collaborative multimodal feature analysis and candidate ranking. 493-502 - Mohammad Hassan:

Collaborative and integrated network and systems management: management using grid technologies. 503-510 - Syed Khaldoon Khurshid, Muhammad Shoaib:

Rio: rhetorical structure theory based indexing technique for image objects. 511-518 - Hu Ng, Wooi-Haw Tan, Junaidi Abdullah:

Multi-view gait based human identification system with covariate analysis. 519-526
Volume 10, Number 6, November 2013
- Padmanabhareddy Vundela, Varadarajan Sourirajan:

A Robust Multiwavelet-Based Watermarking Scheme for Copyright Protection of Digital Images Using Human Visual System. 527-535 - Jamal Hussain Shah, Muhammad Sharif, Mudassar Raza, Aisha Azeem:

A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques. 536-545 - Noura A. Semary, Mohiy M. Hadhoud, Hatem Abdul-Kader, Alaa M. Abbas:

Novel Compression System for Hue-Saturation and Intensity Color Space. 546-552 - Chandan Rawat, Sukadev Meher:

A Hybrid Image Compression Scheme Using DCT and Fractal Image Compression. 553-562 - Ayman Mousa, Osama S. Faragallah, El-Sayed El-Rabaie, Elsayed Nigm:

Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases. 563-570 - Meiyappan Yuvarani, N. Ch. Sriman Narayana Iyengar:

Interactive Query Expansion Using Concept-Based Directions Finder Based on Wikipedia. 571-578 - Azze-eddine Maredj, Nourredine Tonkin:

mage Compression Scheme Usin Semantic Adaptation of Multimedia Documents. 579-586 - Venus Samawi, Adeeb Sulaiman:

Software Protection via Hiding Function Using Software Obfuscation. 587-594 - Abdullah Jaafar, Azman Samsudin:

An Improved Version of the Visual Digital Signature Scheme. 595-602 - Shanmugavadivu Pichai, Balasubramanian Krishnasamy, Somasundaram Karuppanagounder:

Bi-Level Weighted Histogram Equalization for Scalable Brightness Preservation and Contrast Enhancement for Images. 603-609 - Li Yan:

Modeling Fuzzy Data with Fuzzy Data Types in Fuzzy Database and XML Models. 610-615 - Fazal-e-Malik, Baharum Baharudin:

The Statistical Quantized Histogram Texture Features Analysis for Image Retrieval Based on Median and Laplacian Filters in the DCT Domain. 616-624 - Saleem Raza, Najmus Saqib Malik, Azfar Shakeel, Majid Iqbal Khan:

Implementation and Comparative Analysis of the Fault Attacks on AES. 625-634

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














