


default search action
The International Arab Journal of Information Technology, Volume 11
Volume 11, Number 1, January 2014
- Aisha Azeem, Muhammad Sharif, Mudassar Raza, Marryam Murtaza:

A survey: face recognition techniques under partial occlusion. 1-10 - Karim Kalti, Mohamed Ali Mahjoub:

Image segmentation by gaussian mixture models and modified FCM algorithm. 11-18 - Rytis Maskeliunas:

The evaluation of spoken dialog management models for multimodal HCIs. 19-24 - Chao Zuo, Qian Chen, Xiubao Sui, Jianle Ren:

Brightness preserving image contrast enhancement using spatially weighted histogram equalization. 25-32 - Bhawna Mallick, Deepak Garg, P. S. Grover:

Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary. 33-42 - Habib Mahi, Hadria Isabaten, Chahira Serief:

Zernike moments and svm for shape classification in very high resolution satellite images. 43-51 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:

High-availability decentralized cryptographic multi-agent key recovery. 52-58 - Devangkumar Shah, Chandresh Vithlani:

VLSI-oriented lossy image compression approach using DA-based 2D-discrete wavelet. 59-68 - Sofien Gannouni, Mutaz Beraka, Hassan Mathkour:

A critical comparison for data sharing approaches. 69-77 - Yaser A. Al-Lahham

, Mohammad A. Hassan
:
Scalable self-organizing structured P2P information retrieval model based on equivalence classes. 78-86 - Faisal Ahmed, Md. Hasanul Kabir, Shayla Bhuyan, Hossain Bari, Emam Hossain:

Automated weed classification with local pattern-based texture descriptors. 87-94 - Shyam Lal, Mahesh Chandra:

Efficient algorithm for contrast enhancement of natural images. 95-102 - Nattha Phiwma, Parinya Sanguansat:

An improved feature extraction and combination of multiple classifiers for query-by-humming. 103-110
Volume 11, Number 2, March 2014
- Dongfu Xie:

Simplified algorithm and hardware implementation for the (24, 12, 8) extended golay soft decoder up to 4 errors. 111-115 - Faten F. Kharbat, Mohammed Odeh, Larry Bull:

A new hybrid architecture for the discovery and compaction of knowledge: breast cancer datasets case study. 116-123 - Sanjay T. Singh, Trimbak R. Sontakke:

An effective mechanism to neutralize the semantic gap in content based image retrieval (CBIR). 124-133 - Saed Alqaraleh, Omar Ramadan:

Elimination of repeated occurrences in multimedia search engines. 134-139 - Shubair Abdulla, Sureswaran Ramadass, Altyeb Altaher Altyeb, Amer Al-Nassiri:

Employing machine learning algorithms to detect unknown scanning and email worms. 140-148 - Marryam Murtaza, Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah:

Face recognition using adaptive margin fisher's criterion and linear discriminant analysis (AMFC-LDA). 149-158 - Sivasubramaniam Nandhini, Senniappan Palaniammal:

Enhanced core stateless fair queuing with multiple queue priority scheduler. 159-167 - Murugappan Ilango, Vasudev Mohan:

PCFA: mining of projected clusters in high dimensional data using modified FCM algorithm. 168-177 - Saeed Amirgholipour Kasmani, Aboosalh Mohammad Sharifi:

A pre-filtering method to improve watermark detection rate in DCT based watermarking. 178-185 - Kalli Srinivasa Nageswara Prasad, S. Ramakrishna:

An efficient traffic forecasting system based on spatial data and decision trees. 186-194 - Faisal Ahmed, Hossain Bari, Emam Hossain:

Person-independent facial expression recognition based on compound local binary pattern (CLBP). 195-203 - Majid Masoumi, Shervin Amiri:

Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks. 204-212
Volume 11, Number 3, May 2014
- Chaobang Gao, Jiliu Zhou, Weihua Zhang:

Edge detection based on the newton interpolation's fractional differentiation. 223-228 - Leonardo Reis, Luis Aguiar, Darío Baptista, Fernando Morgado Dias:

A software tool for automatic generation of neural hardware. 229-235 - Yuhanis Yusof, Zuriani Mustaffa:

LSSVM parameters tuning with enhanced artificial bee colony. 236-242 - Khalid M. Hosny:

Fast computation of accurate pseudo zernike moments for binary and gray-level images. 243-249 - Haneen Talal Jasim, Kais Ismail Ibraheem, Abdul Ghafoor Jasim Salim:

A hybrid algorithm to forecast enrolment based on genetic algorithms and fuzzy time series. 250-257 - Fazal-e-Malik, Baharum Baharudin:

Effective image retrieval based on an experimental combination of texture features and comparison of different histogram quantizations in the DCT domain. 258-267 - Kun Gao, Qin Wang, Lifeng Xi:

Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. 268-275 - Addepalli V. N. Krishna:

Time stamp based ECC encryption and decryption. 276-280 - Khairullah Khan, Baharum Baharudin, Aurangzeb Khan:

Identifying product features from customer reviews using hybrid patterns. 281-286 - Phichhang Ou, Hengshan Wang:

Volatility modelling and prediction by hybrid support vector regression with chaotic genetic algorithms. 287-292 - Fayçal Ykhlef, Messaoud Bensebti:

Comparative performance study of several features for voiced/ non-voiced classification. 293-299 - Sotiris B. Kotsiantis:

Integrating global and local application of naive bayes classifier. 300-307 - Hui Hui Wang, Dzulkifli Mohamad, Nor Azman Ismail:

An efficient parameters selection for object recognition based colour features in traffic image retrieval. 308-314
Volume 11, Number 4, July 2014
- Han-Yu Lin:

Toward secure strong designated verifier signature scheme from identity-based system. 315-321 - Arumugam Sakthivel, Raju Nedunchezhian:

Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. 322-328 - Bacha Rehman, Zahid Halim, Mushtaq Ahmad:

ASCII based GUI system for arabic scripted languages: a case of urdu. 329-337 - Sarra Senhadji, Salim Khiat, Hafida Belbachir:

Association rule mining and load balancing strategy in grid systems. 338-344 - Fatiha Barigou, Bouziane Beldjilali, Baghdad Atmani:

Using cellular automata for improving knn based spam filtering. 345-353 - Mehdi Sadeghi, Keivan Maghooli, Mohammad Shahram Moein:

Using artificial immunity network for face verification. 354-361 - Muhammad Tahir, Tahir Mustafa Madani, Sheikh Ziauddin, Muhammad Arshad Awan, Waqar Hussain Rana:

Wiimote squash: comparing DTW and WFM techniques for 3D gesture recognition. 362-369 - Abdel Karim Al Tamimi, Manar Jaradat, Nuha Al-Jarrah, Sahar Ghanem:

AARI: automatic arabic readability index. 370-378 - ShiNing Li, Zhenhai Zhang, Jiaqi Duan:

An ensemble multi-label feature selection algorithm based on information entropy. 379-386 - Chouaib Moujahdi, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul, Mohammed Rziza:

Inter-communication classification for multi-view face recognition. 387-395 - Marwan Akeel, Ravi Mishra:

ANN and rule based method for english to arabic machine translation. 396-405 - Bassam Rajabi, Sai Peck Lee:

Consistent integration between object oriented and coloured petri nets models. 406-415 - Aymen Chaabouni, Houcine Boubaker, Monji Kherallah, Haikal El Abed, Adel M. Alimi:

Static and dynamic features for writer identification based on multi-fractals. 416-424
Volume 11, Number 5, September 2014
- Chien-Lung Hsu, Han-Yu Lin:

Universal forgery attack on a strong designated verifier signature scheme. 425-428 - Rattan Rana, Deepak Garg:

Anticipatory bound selection procedure (ABSP) for vertex K-center problem 0. 429-436 - Geeta Nagpal, Moin Uddin, Arvinder Kaur:

Grey relational effort analysis technique using regression methods for software estimation. 437-446 - Valliammal Narayan, Geethalakshmi Subbarayan:

An optimal feature subset selection using GA for leaf classification. 447-451 - Tsui-Ping Chang:

Mining frequent user query patterns from XML query streams. 452-458 - Muhammad Naeem, Sohail Asghar:

An information theoretic scoring function in belief network. 459-467 - Hizmawati Madzin, Roziati Zainuddin, Nursabirin Mohamed:

Analysis of visual features in local descriptor for multi-modality medical image. 468-475 - Slami Saadi, Abderrezak Guessoum, Maamar Bettayeb, M. K. Abdelhafidi:

Blind restoration of radiological images using hybrid swarm optimized model implemented on FPGA. 476-486 - Nima Sahba, Keivan Maghooli, Vahid Tavakoli:

An optimized method for B-mode echocardiographic video compression based on motion estimation and wavelet. 487-492 - Hocheol Jeon:

A reference comments crawler for assisting research paper writing. 493-499 - Qais Qassim, Ahmed Patel, Abdullah Mohd Zin:

Strategy to reduce false alarms in intrusion detection and prevention systems. 500-506 - Zaini Arifah Othman, Nor Aniza Abdullah, Zaidi Razak, Mohd. Yakub Zulkifli Bin Mohd. Yusoff:

Speech to text engine for jawi language. 507-513 - Ramzi A. Haraty, Abdul Nasser El-Kassar, Suzan Fanous:

Hardening the elgamal cryptosystem in the setting of the second group of units. 514-520
Volume 11, Number 6, November 2014
- Ramzi A. Haraty, Bassam Zantout:

Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-Based Approach. 526-531 - Abd El-Aziz Abd El-Aziz, Arputharaj Kannan:

XML access control: mapping XACML policies to relational database tables. 532-539 - Mohammad Anagreh, Azman Samsudin, Mohd. Adib Omar:

Parallel method for computing elliptic curve scalar multiplication based on MOF. 521-525 - Khalid Suliman Al-Tahat:

An innovative instructional method for teaching object-oriented modelling. 540-549 - Ellips Masehian, Hossein Akbaripour, Nasrin Mohabbati-Kalejahi:

Solving the n-queens problem using a tuned hybrid imperialist competitive algorithm. 550-559 - Mohammad Ababneh, Salama Hassan, Sulieman Bani-Ahmad:

On static scheduling of tasks in real time multiprocessor systems: an improved GA-based approach. 560-572 - Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin:

Optimum threshold parameter estimation of wavelet coefficients using fisher discriminant analysis for speckle noise reduction. 573-581 - Almas Abbasi, Woo Chaw Seng, Imran Shafiq Ahmad:

Multi block based image watermarking in wavelet domain using genetic programming. 582-589 - Atta-ur-Rahman, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, Muhammad Tahir Naseem:

A real time adaptive resource allocation scheme for OFDM systems using GRBF-neural networks and fuzzy rule base system. 590-598 - Hossein Abbasimehr, Mostafa Setak, Mohammad Jafar Tarokh:

A comparative assessment of the performance of ensemble learning in customer churn prediction. 599-606 - Dhuha Basheer Abdullah, Seddeeq Albana:

Developing an appliance real time control in heterogeneous operating systems. 607-615 - Mohiadeen Abdul Kadhar:

A deadlock-free dynamic reconfiguration protocol for distributed routing on interconnection networks. 616-622 - Weiwei Han:

A provably secure public key encryption scheme based on isogeny star. 623-627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














