default search action
The International Arab Journal of Information Technology, Volume 13
Volume 13, Number 1, January 2016
- Ke Yan, Hong Zhu, Kevin Lü:
VParC: a compression scheme for numeric data in column-oriented databases. 1-11 - Volkan Tunali, Turgay Tugay Bilgin, Ali Camurcu:
An ımproved clustering algorithm for text mining: multi-cluster spherical k-means. 12-19 - Osama M. Abu Zaid, Nawal A. El-Fishawy, Elsayed Nigm:
Encryption quality measurement of a proposed cryptosystem algorithm for the colored images compared with another algorithm. 20-29 - Kamalanathan Chandran, Valarmathy Shanmugasudaram, Kirubakaran Subramani:
Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing. 30-37 - Shivkumar Selvakumaraswamy, Umamaheswari Govindaswamy:
Efficient transmission of PKI certificates using elliptic curve cryptography and its variants. 38-43 - Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palanichamy, Arputharaj Kannan:
An intelligent CRF based feature selection for effective intrusion detection. 44-50 - Morteza Hatefi, Mehdi Fasanghari:
A DEA-based approach for information technology risk assessment through risk information technology framework. 51-58 - Chakchai So-In, Kanokmon Rujirakul:
WPFP-PCA: weighted parallel fixed point PCA Face recognition. 59-69 - Luyi Bai, Li Yan:
A general characterization of representing and determining fuzzy spatial relations. 70-75 - Wafa Basit, Fakhar Lodhi, Usman Bhatti:
Empirical evaluation of syntactic and semantic defects introduced by refactoring support. 76-84 - Sally Almanasra, Khaled Suwais, Muhammad Rafie:
Adaptive automata-based model for iterated n-player's prisoner's dilemma. 85-92 - Abdullah A. Aljumah, Mohammad Khubeb Siddiqui:
Data mining perspective: prognosis of life style on hypertension and diabetes. 93-99 - Kirubakaran Subramani, Valarmathy Shanmugasudaram, Kamalanathan Chandran:
Design and implementation of a synchronous and asynchronous-based data replication technique in cloud computing. 100-107 - Satish Todmal, Suhas Patil:
Enhancing the optimal robust watermarking algorithm to high payload. 108-117 - Sathya Subramaniam, Manavalan Radhakrishnan:
Neural network with bee colony optimization for MRI brain cancer image classification. 118-124 - Nora Taleb:
Using ontologies for extracting differences in the dynamic domain: application on cancer disease. 125-131
Volume 13, Number 1A, Special Issue 2016
- Mutasem Alsmadi:
Facial recognition under expression variations. 133-141 - Sivakami Raja, Saravanan Ramaiah:
Performance comparison of neuro-fuzzy cloud intrusion detection systems. 142-149 - Suzanne Sweiti, Amal Dweik:
Integrated replication checkpoint fault tolerance approach of mobile agents IRCFT. 150-155 - Mohammad Al-Haj Hassan, Osama Al-Haj Hassan:
Constraints aware and user friendly exam scheduling system. 156-162 - Mohammed Al-Kabi, Mahmoud Al-Ayyoub, Izzat Alsmadi, Heider Wahsheh:
A prototype for a standard arabic sentiment analysis corpus. 163-170 - Abdelwahed Motwakel, Adnan Shaout:
Fingerprint image quality fuzzy system. 171-177 - Muthukrishnan Ramprasath, Shanmugasundaram Hariharan:
Algorithm for answer extraction based on pattern learning. 178-183 - Salam Matalqa, Suleiman Mustafa:
The effect of horizontal database table partitioning on query performance. 184-189 - Anas Al-Fayoumi, Mohammad Hassan:
Interactive visual search system based onmachine learning algorithm. 190-195 - Noor Ismail, Syamnd Abdullah:
Principal component regression with artificial neural network to improve prediction of electricity demand. 196-202 - Duraisamy Yuvaraj, Shanmugasundaram Hariharan:
Content-based image retrieval based on integrating region segmentation and colour histogram. 203-207 - Ammar Balouch:
Optimization of position finding step of PCM-oMaRS algorithm with statistical information. 208-214 - Meryeme Hadni, Saïd El Alaoui Ouatik, Abdelmonaime Lachkar:
Word sense disambiguation for arabic text categorization. 215-222
Volume 13, Number 2, March 2016
- Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar, Atta-ur-Rahman:
Spread spectrum based invertible watermarking for medical images using RNS and chaos. 223-231 - Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Mohammed Najib Kaddioui:
Binary data comparison using similarity indices and principal components analysis. 232-237 - Soong-Der Chen:
Human visual perception-based image quality analyzer for assessment of contrast enhancement methods. 238-245 - Majid Mohebbi, Alireza Talebpour:
Texts semantic similarity detection based graph approach. 246-251 - Valarmathi Balasubramanian, Srinivasa Gupta Nagarajan, Palanisamy Veerappagoundar:
Mahalanobis distance-the ultimate measure for sentiment analysis. 252-257 - Govindasamy Vaiyapuri, Thambidurai Perumal:
Probabilistic and fuzzy logic based event processing for effective business intelligence. 258-266 - Shao-Ming Tong, Chien-Cheng Huang, Feng-Yu Lin, Yeali S. Sun:
Patching assignment optimization for security vulnerabilities. 267-273 - Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahmed, Saira Begum:
A group based fault tolerant scheduling mechanism to improve the application turnaround time on desktop grids. 274-280 - Korhan Günel, Refet Polat, Mehmet Kurt:
Analyzing learning concepts in intelligent tutoring systems. 281-286 - Emir Kremic, Abdulhamit Subasi:
Performance of random forest and SVM in face recognition. 287-293 - Jinpeng Chen, Yu Liu, Deyi Li:
Dynamic group recommendation with modified collaborative filtering and temporal factor. 294-301 - Alwar Rengarajan, Rajendran Sugumar, Chinnappan Jayakumar:
Secure verification technique for defending IP spoofing attacks. 302-309 - Imène Issaoui, Nadia Bouassida, Hanêne Ben-Abdallah:
Predicting the existence of design patterns based on semantics and metrics. 310-319 - Omar AlHeyasat:
Investigation and analysis of research gate user's activities using neural networks. 320-325 - Mehraj Ali, John Kumar:
Implementation of image processing system using handover technique with map reduce based on big data in the cloud environment. 326-331 - Abdessalem Kelaiaia, Hayet Farida Merouani:
Clustering with probabilistic topic models on arabic texts: a comparative study of LDA and K-means. 332-338
Volume 13, Number 3, May 2016
Issue 3 was renamed as Issue 6B by the editor
Volume 13, Number 4, July 2016
- Xueyan Jing, Yingtao Bi, Hai Deng:
An innovative two-stage fuzzy kNN-DST classifier for unknown intrusion detection. 359-366 - Seyyed Khorashadizadeh, Ali Latif:
Arabic/farsi handwritten digit recognition using histogram of oriented gradient and chain code histogram. 367-374 - G. Umarani Srikanth, V. Uma Maheswari, Shanthi Palaniswami, Arul Siromoney:
Task scheduling using probabilistic ant colony heuristics. 375-379 - Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan:
Threshold-based steganography: a novel technique for improved payload and SNR. 380-386 - Miroljub Grozdanovic, Dobrivoje Marjanovic, Goran Lj. Janackovic:
Control and management of coal mines with control information systems. 387-395 - Sudhanshu Gupta, Deepak Garg:
Selectivity estimation of range queries in data streams using micro-clustering. 396-402 - Mohammad Ali, Minhaj Ahmad Khan:
Efficient parallel compression and decompression for large XML files. 403-408 - Reza Hassanpour:
Illicit material detection using dual-energy x-ray images. 409-416 - Syed Sabir Mohamed, Shanmugasundaram Hariharan:
Parameters affecting the judgment task while summarizing documents. 417-426 - Duaa Hamed Alsaeed, Ahmed Bouridane, Ali El-Zaart:
A novel fast otsu digital image segmentation method. 427-434 - Kala Rajan, Vasuki Murugesan:
Hyperspectral image compression based on DWT and TD with ALS method. 435-442 - Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine:
Biometric cryptosystems based fuzzy commitment scheme: a security evaluation. 443-449 - Ahcène Abed, Mhania Guerti:
HMM/GMM classification for articulation disorder correction among algerian children. 450-456 - Rayappan Lotus, Justin Varghese, Subash Saudia:
An approach to automatic reconstruction of apictorial hand torn paper document. 457-461 - Qutaiba Ali, Shefa A. Dawwd:
On demand ciphering engine using artificial neural network. 462-470 - Amuthan Arjunan, Praveena Narayanan, Kaviarasan Ramu:
Securing RSA algorithm against timing attack. 471-476
Volume 13, Number 5, September 2016
- Moatamad Hassan:
Solving flow allocation problems and optimizing system reliability of multisource multisink stochastic flow network. 477-483 - Rajeshkannan Sundararajan, Reeba Korah:
A combined approach for stereoscopic 3D reconstruction model based on improved semi global matching. 484-491 - Subashri Thangavelu, Vaidehi Vijayakumar:
Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks. 492-500 - Nagesh Vadaparthi, Yarramalle Srinivas, Suresh Penumatsa, Sitharama Poosapati:
Automatic medical image segmentation based on finite skew gaussian mixture model. 501-508 - Thomas Brindha, Ramaswamy Swarnammal Shaji:
An instance communication channel key organizer model for enhancing security in cloud computing. 509-516 - Priyanka Singh, Suneeta Agarwal:
A region adaptive robust watermarking scheme based on homogeneity analysis. 517-522 - Rangan Kodandaram, Shashank Mallikarjun, Manikantan Krishnamuthan, Ramachandran Sivan:
Face recognition using truncated transform domain feature extraction. 523-530 - Yang Ming, Yumin Wang:
Identity based broadcast encryption with group of prime order. 531-541 - Zoltan Kazi, Ljubica Kazi, Biljana Radulovic, Madhusudan Bhatt:
Ontology-based system for conceptual data model evaluation. 542-551 - Alireza Pirasteh, Keivan Maghooli, Seyed Mousavizadeh:
Iris recognition using localized Zernike's feature and SVM. 552-558 - Tuncay Yigit, Ozkan Unsal:
Using the ant colony algorithm for real-time automatic route of school buses. 559-565 - Kanimozhi Sakthivel, Velumadhava Rajasekaran, Selvamani Kadirvelu, Arputharaj Kannan:
Hierarchical based group key transfer for secure group communication. 566-573 - Elyes Zarrouk, Yassine Benayed:
Hybrid SVM/HMM model for the arab phonemes recognition. 574-582 - Guler Yalcin:
Orthophoto information system in turkey in the view of spatial data infrastructure. 583-589 - Haitham Issa, Sali Issa, Mohammad Issa:
New prototype of hybrid 3D-biometric facial recognition system. 590-594 - Bay Vo, Thien-Phuong Le, Tzung-Pei Hong, Bac Le, Jason J. Jung:
An efficient approach for mining frequent item sets with transaction deletion operation. 595-602
Volume 13, Number 6, November 2016
- Dinesh Kumar Kashyap, Gurpreet Singh Josan:
Prediction of part of speech tags for punjabi using support vector machines. - Kannan Kanagraj:
An adaptiveweighted fuzzy mean filter based on cloud model. - Saravanamoorthi Moorthi:
Modified bee colony optimization for the selection of different combination of food sources. - Ponnusamy Pichamuthu, Karthikeyan Eswaramurthy:
IHPProxy: improving the performance of HPProxy by adding extra hot-points. - Sornapandy Selvarani, Gangadharan Sadhasivam:
An intelligent water drop algorithm for optimizing task scheduling in grid environment. - Kingsy Rajaretnam, Manimegalai Rajkumar, Ranjith Venkatesan:
RPLB: a replica placement algorithm in data grid with load balancing. - Navid Hashemi Taba, Siew Hock Ow:
A new model for software inspection at the requirements analysis and design phases of software development. - Xiang Zhou, Zhiqing Shao:
The refinement check of added dynamic diagrams based on pi-calculus. - Parinya Sanguansat:
Multiple-view face hallucination by a novel regression analysis in tensor space. - Siti Rum, Maizatul Akmar Ismail:
Metacognitive awareness assessment and introductory computer programming course achievement at university. - Chen Yang, Shaofeng Zhao, Dan Zhang, Junxia Ma:
An anti-spam filter based on one-class IB method in small training sets. - Angelin Gladston, Harichandran Khanna Nehemiah, Palanisamy Narayanasamy, Arputharaj Kannan:
Test case prioritization for regression testing using immune operator. - Feras Hanandeh, Mohammed Akour, Essam Al-Daoud, Izzat Alsmadi:
KP-Trie algorithm for update and search operations. - Lin Cao, Dan Liu:
Face image super resolution via adaptive-block PCA. - Abdennour Sebbagh, Hicham Tebbikh:
Parallel particle filters for multiple target tracking. - Asima Abbasi, Muhammad Khan:
Iris-pupil thickness based method for determining age group of a person.
Volume 13, Number 6A, Special Issue 2016
- K. S. Angel Viji, Jayakumari Jayaraj:
Modified texture, intensity and orientation constraint based region growing segmentation of 2D MR brain tumor images. 723-731 - Vani Rajamanickam, Sangeetha Marikkannan:
Efficient block-based motion estimation architecture using particle swarm optimization. 732-739 - K. S. Angel Viji, Jayakumari Jayaraj:
A brain abnormality detection and tissue segmentation technique by using dual mode classifier. 740-747 - Maheswari Sureshbabu, Rameshwaran Kalimuthu, Chandra Vadivel:
A robust DHWT based AES encrypted image watermarking scheme. 748-755 - Dhanalakshmi Samiappan, Venkatesh Chakrapani:
Classification of carotid artery abnormalities in ultrasound images using an artificial neural classifier. 756-762 - Senthilkumar Murugesan, Chidambararajan Balasubramanian:
The influence of non functional characteristics in effort estimation using function point analysis. 763-769 - Eskinder Ayele, Sanjay B. Dhok:
Motion estimation in video coding using simplified optical flow technique. 770-776 - Jana Selvaganesan, Kannan Natarajan:
Unsupervised feature based key-frame extraction towards face recognition. 777-783 - Jayanthi Karuppusamy, Karthikeyan Marappan:
Efficient color and texture feature extraction technique for content based image retrieval system. 784-790 - Hassan Silkan, Saïd El Alaoui Ouatik, Abdelmounaime Lachkar:
Extreme curvature scale space for efficient shape similarity retrieval. 791-800 - Sakthivel Subramaniam, Parameswari Marimuthu, Vinothaa Natarajan:
Comparing performance measures of sparse representation on image restoration algorithms. 801-806 - Brahim Farou, Hamid Seridi, Herman Akdag:
Improved gaussian mixture model with background spotter for the extraction of moving objects. 807-816 - Sameh Zarif, Ibrahima Faye, Dayang Rohaya:
Video completion using gray level co-occurrence matrix and object update. 817-825 - Mritha Ramalingam, Nor Ashidi Mat Isa:
A secured representation of data hiding in wavelet transform domain using video steganography. 826-834 - Sanjivani Shantaiya, Kesari Verma, Kamal K. Mehta:
Multiple class image-based vehicle classification using soft computing algorithms. 835-841 - Alaa El-Din Mohamed, Reham Mostafa, Hamdy K. Elminir:
A novel JFD scheme for DRM systems based on DWT and collusion resistance fingerprint encoding. 842-850 - Jithesh Korothan, Shirivas Kishor, Pradeep Butey:
De-noise steganography by enhancing the cover image: a multi-level security approach.. 851-857 - Kalavathi Palanisamy, Somasundaram Karuppanagounder:
Segmentation of brain from MRI head images using modified chan-vese active contour model. 858-866 - Syed Karim, Muhammad Harris, Muhammad Arif:
Navigational pattern based relevance feedback using user profile in CBIR. 867-872 - Zeeshan Ahmad, Hafiz Umar, Chuandong Li, Ling Chen:
A DNA-based security solution using aggregated chaos cross and cubic map. 873-879 - Pisal Setthawong, Vajirasak Vanijja:
Cascading deformable parts model in the facial feature detection of frontal and side profile images. 880-887 - Farhood Mousavizadeh, Keivan Maghooli, Emad Fatemizadeh, Mohammad Moin:
A robust and efficient anti spoofing method for facial recognition systems using the fusion of fresnel transform and micro-texture analysis. 888-898 - Muthiah Mary, Lekshmi Padma, Maria John:
Modified image segmentation method based on region growing and region merging. 899-907 - Seyed Hashem Davarpanah, Fatimah Khalid, Lili Nurliyana Abdullah:
BGLBP-based image background extraction method. 908-914 - Aymen Mouelhi, Mounir Sayadi, Farhat Fnaiech, Karima Mrad:
Automated nuclei segmentation approach based on mathematical morphology for cancer scoring in breast tissue images. 915-922 - Bharathi Subramaniam, Sudhakar Radhakrishnan:
A novel technique to improve template security for biometric recognition. 923-929 - Khaled Mahmoud, Arwa Husien:
Copy-move forgery detection using zernike and pseudo zernike moments. 930-937 - Peng Liu, Zhipeng Ye, Wei Zhao, Xianglong Tang:
Semantic middleware: multi-layer abstract semantics inference for object categorization. 938-943 - Liping Wang