


default search action
The International Arab Journal of Information Technology, Volume 13
Volume 13, Number 1, January 2016
- Ke Yan, Hong Zhu, Kevin Lü:

VParC: a compression scheme for numeric data in column-oriented databases. 1-11 - Volkan Tunali, Turgay Tugay Bilgin, Ali Camurcu:

An ımproved clustering algorithm for text mining: multi-cluster spherical k-means. 12-19 - Osama M. Abu Zaid, Nawal A. El-Fishawy, Elsayed Nigm:

Encryption quality measurement of a proposed cryptosystem algorithm for the colored images compared with another algorithm. 20-29 - Kamalanathan Chandran, Valarmathy Shanmugasudaram, Kirubakaran Subramani:

Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing. 30-37 - Shivkumar Selvakumaraswamy, Umamaheswari Govindaswamy:

Efficient transmission of PKI certificates using elliptic curve cryptography and its variants. 38-43 - Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palanichamy, Arputharaj Kannan:

An intelligent CRF based feature selection for effective intrusion detection. 44-50 - Morteza Hatefi, Mehdi Fasanghari:

A DEA-based approach for information technology risk assessment through risk information technology framework. 51-58 - Chakchai So-In, Kanokmon Rujirakul:

WPFP-PCA: weighted parallel fixed point PCA Face recognition. 59-69 - Luyi Bai, Li Yan:

A general characterization of representing and determining fuzzy spatial relations. 70-75 - Wafa Basit, Fakhar Lodhi, Usman Bhatti:

Empirical evaluation of syntactic and semantic defects introduced by refactoring support. 76-84 - Sally Almanasra, Khaled Suwais, Muhammad Rafie:

Adaptive automata-based model for iterated n-player's prisoner's dilemma. 85-92 - Abdullah A. Aljumah, Mohammad Khubeb Siddiqui:

Data mining perspective: prognosis of life style on hypertension and diabetes. 93-99 - Kirubakaran Subramani, Valarmathy Shanmugasudaram, Kamalanathan Chandran:

Design and implementation of a synchronous and asynchronous-based data replication technique in cloud computing. 100-107 - Satish Todmal, Suhas Patil:

Enhancing the optimal robust watermarking algorithm to high payload. 108-117 - Sathya Subramaniam, Manavalan Radhakrishnan:

Neural network with bee colony optimization for MRI brain cancer image classification. 118-124 - Nora Taleb:

Using ontologies for extracting differences in the dynamic domain: application on cancer disease. 125-131
Volume 13, Number 1A, Special Issue 2016
- Mutasem Alsmadi:

Facial recognition under expression variations. 133-141 - Sivakami Raja, Saravanan Ramaiah:

Performance comparison of neuro-fuzzy cloud intrusion detection systems. 142-149 - Suzanne Sweiti, Amal Dweik:

Integrated replication checkpoint fault tolerance approach of mobile agents IRCFT. 150-155 - Mohammad Al-Haj Hassan, Osama Al-Haj Hassan:

Constraints aware and user friendly exam scheduling system. 156-162 - Mohammed Al-Kabi, Mahmoud Al-Ayyoub, Izzat Alsmadi, Heider Wahsheh:

A prototype for a standard arabic sentiment analysis corpus. 163-170 - Abdelwahed Motwakel, Adnan Shaout:

Fingerprint image quality fuzzy system. 171-177 - Muthukrishnan Ramprasath, Shanmugasundaram Hariharan:

Algorithm for answer extraction based on pattern learning. 178-183 - Salam Matalqa, Suleiman Mustafa:

The effect of horizontal database table partitioning on query performance. 184-189 - Anas Al-Fayoumi, Mohammad Hassan:

Interactive visual search system based onmachine learning algorithm. 190-195 - Noor Ismail, Syamnd Abdullah:

Principal component regression with artificial neural network to improve prediction of electricity demand. 196-202 - Duraisamy Yuvaraj, Shanmugasundaram Hariharan:

Content-based image retrieval based on integrating region segmentation and colour histogram. 203-207 - Ammar Balouch:

Optimization of position finding step of PCM-oMaRS algorithm with statistical information. 208-214 - Meryeme Hadni, Saïd El Alaoui Ouatik, Abdelmonaime Lachkar:

Word sense disambiguation for arabic text categorization. 215-222
Volume 13, Number 2, March 2016
- Muhammad Tahir Naseem, Ijaz Mansoor Qureshi, Muhammad Zeeshan Muzaffar, Atta-ur-Rahman:

Spread spectrum based invertible watermarking for medical images using RNS and chaos. 223-231 - Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Mohammed Najib Kaddioui:

Binary data comparison using similarity indices and principal components analysis. 232-237 - Soong-Der Chen:

Human visual perception-based image quality analyzer for assessment of contrast enhancement methods. 238-245 - Majid Mohebbi, Alireza Talebpour:

Texts semantic similarity detection based graph approach. 246-251 - Valarmathi Balasubramanian, Srinivasa Gupta Nagarajan, Palanisamy Veerappagoundar:

Mahalanobis distance-the ultimate measure for sentiment analysis. 252-257 - Govindasamy Vaiyapuri, Thambidurai Perumal:

Probabilistic and fuzzy logic based event processing for effective business intelligence. 258-266 - Shao-Ming Tong, Chien-Cheng Huang, Feng-Yu Lin, Yeali S. Sun:

Patching assignment optimization for security vulnerabilities. 267-273 - Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahmed, Saira Begum:

A group based fault tolerant scheduling mechanism to improve the application turnaround time on desktop grids. 274-280 - Korhan Günel, Refet Polat, Mehmet Kurt:

Analyzing learning concepts in intelligent tutoring systems. 281-286 - Emir Kremic, Abdulhamit Subasi:

Performance of random forest and SVM in face recognition. 287-293 - Jinpeng Chen, Yu Liu, Deyi Li:

Dynamic group recommendation with modified collaborative filtering and temporal factor. 294-301 - Alwar Rengarajan, Rajendran Sugumar, Chinnappan Jayakumar:

Secure verification technique for defending IP spoofing attacks. 302-309 - Imène Issaoui, Nadia Bouassida, Hanêne Ben-Abdallah:

Predicting the existence of design patterns based on semantics and metrics. 310-319 - Omar AlHeyasat:

Investigation and analysis of research gate user's activities using neural networks. 320-325 - Mehraj Ali, John Kumar:

Implementation of image processing system using handover technique with map reduce based on big data in the cloud environment. 326-331 - Abdessalem Kelaiaia, Hayet Farida Merouani:

Clustering with probabilistic topic models on arabic texts: a comparative study of LDA and K-means. 332-338
Volume 13, Number 3, May 2016
Issue 3 was renamed as Issue 6B by the editor
Volume 13, Number 4, July 2016
- Xueyan Jing, Yingtao Bi, Hai Deng:

An innovative two-stage fuzzy kNN-DST classifier for unknown intrusion detection. 359-366 - Seyyed Khorashadizadeh, Ali Latif:

Arabic/farsi handwritten digit recognition using histogram of oriented gradient and chain code histogram. 367-374 - G. Umarani Srikanth, V. Uma Maheswari, Shanthi Palaniswami, Arul Siromoney:

Task scheduling using probabilistic ant colony heuristics. 375-379 - Zakir Khan, Mohsin Shah, Muhammad Naeem, Toqeer Mahmood, Shah Khan:

Threshold-based steganography: a novel technique for improved payload and SNR. 380-386 - Miroljub Grozdanovic, Dobrivoje Marjanovic, Goran Lj. Janackovic:

Control and management of coal mines with control information systems. 387-395 - Sudhanshu Gupta, Deepak Garg:

Selectivity estimation of range queries in data streams using micro-clustering. 396-402 - Mohammad Ali, Minhaj Ahmad Khan:

Efficient parallel compression and decompression for large XML files. 403-408 - Reza Hassanpour:

Illicit material detection using dual-energy x-ray images. 409-416 - Syed Sabir Mohamed, Shanmugasundaram Hariharan:

Parameters affecting the judgment task while summarizing documents. 417-426 - Duaa Hamed Alsaeed, Ahmed Bouridane, Ali El-Zaart:

A novel fast otsu digital image segmentation method. 427-434 - Kala Rajan, Vasuki Murugesan:

Hyperspectral image compression based on DWT and TD with ALS method. 435-442 - Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine:

Biometric cryptosystems based fuzzy commitment scheme: a security evaluation. 443-449 - Ahcène Abed, Mhania Guerti:

HMM/GMM classification for articulation disorder correction among algerian children. 450-456 - Rayappan Lotus, Justin Varghese, Subash Saudia:

An approach to automatic reconstruction of apictorial hand torn paper document. 457-461 - Qutaiba Ali, Shefa A. Dawwd:

On demand ciphering engine using artificial neural network. 462-470 - Amuthan Arjunan, Praveena Narayanan, Kaviarasan Ramu:

Securing RSA algorithm against timing attack. 471-476
Volume 13, Number 5, September 2016
- Moatamad Hassan:

Solving flow allocation problems and optimizing system reliability of multisource multisink stochastic flow network. 477-483 - Rajeshkannan Sundararajan, Reeba Korah:

A combined approach for stereoscopic 3D reconstruction model based on improved semi global matching. 484-491 - Subashri Thangavelu, Vaidehi Vijayakumar:

Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks. 492-500 - Nagesh Vadaparthi, Yarramalle Srinivas, Suresh Penumatsa, Sitharama Poosapati:

Automatic medical image segmentation based on finite skew gaussian mixture model. 501-508 - Thomas Brindha, Ramaswamy Swarnammal Shaji:

An instance communication channel key organizer model for enhancing security in cloud computing. 509-516 - Priyanka Singh, Suneeta Agarwal:

A region adaptive robust watermarking scheme based on homogeneity analysis. 517-522 - Rangan Kodandaram, Shashank Mallikarjun, Manikantan Krishnamuthan, Ramachandran Sivan:

Face recognition using truncated transform domain feature extraction. 523-530 - Yang Ming, Yumin Wang:

Identity based broadcast encryption with group of prime order. 531-541 - Zoltan Kazi, Ljubica Kazi, Biljana Radulovic, Madhusudan Bhatt:

Ontology-based system for conceptual data model evaluation. 542-551 - Alireza Pirasteh, Keivan Maghooli, Seyed Mousavizadeh:

Iris recognition using localized Zernike's feature and SVM. 552-558 - Tuncay Yigit, Ozkan Unsal:

Using the ant colony algorithm for real-time automatic route of school buses. 559-565 - Kanimozhi Sakthivel, Velumadhava Rajasekaran, Selvamani Kadirvelu, Arputharaj Kannan:

Hierarchical based group key transfer for secure group communication. 566-573 - Elyes Zarrouk, Yassine Benayed:

Hybrid SVM/HMM model for the arab phonemes recognition. 574-582 - Guler Yalcin:

Orthophoto information system in turkey in the view of spatial data infrastructure. 583-589 - Haitham Issa, Sali Issa, Mohammad Issa:

New prototype of hybrid 3D-biometric facial recognition system. 590-594 - Bay Vo, Thien-Phuong Le, Tzung-Pei Hong, Bac Le, Jason J. Jung:

An efficient approach for mining frequent item sets with transaction deletion operation. 595-602
Volume 13, Number 6, November 2016
- Dinesh Kumar Kashyap, Gurpreet Singh Josan:

Prediction of part of speech tags for punjabi using support vector machines. - Kannan Kanagraj:

An adaptiveweighted fuzzy mean filter based on cloud model. - Saravanamoorthi Moorthi:

Modified bee colony optimization for the selection of different combination of food sources. - Ponnusamy Pichamuthu, Karthikeyan Eswaramurthy:

IHPProxy: improving the performance of HPProxy by adding extra hot-points. - Sornapandy Selvarani, Gangadharan Sadhasivam:

An intelligent water drop algorithm for optimizing task scheduling in grid environment. - Kingsy Rajaretnam, Manimegalai Rajkumar, Ranjith Venkatesan:

RPLB: a replica placement algorithm in data grid with load balancing. - Navid Hashemi Taba, Siew Hock Ow:

A new model for software inspection at the requirements analysis and design phases of software development. - Xiang Zhou, Zhiqing Shao:

The refinement check of added dynamic diagrams based on pi-calculus. - Parinya Sanguansat:

Multiple-view face hallucination by a novel regression analysis in tensor space. - Siti Rum, Maizatul Akmar Ismail:

Metacognitive awareness assessment and introductory computer programming course achievement at university. - Chen Yang, Shaofeng Zhao, Dan Zhang, Junxia Ma:

An anti-spam filter based on one-class IB method in small training sets. - Angelin Gladston, Harichandran Khanna Nehemiah, Palanisamy Narayanasamy, Arputharaj Kannan:

Test case prioritization for regression testing using immune operator. - Feras Hanandeh, Mohammed Akour, Essam Al-Daoud, Izzat Alsmadi:

KP-Trie algorithm for update and search operations. - Lin Cao, Dan Liu:

Face image super resolution via adaptive-block PCA. - Abdennour Sebbagh, Hicham Tebbikh:

Parallel particle filters for multiple target tracking. - Asima Abbasi, Muhammad Khan:

Iris-pupil thickness based method for determining age group of a person.
Volume 13, Number 6A, Special Issue 2016
- K. S. Angel Viji, Jayakumari Jayaraj:

Modified texture, intensity and orientation constraint based region growing segmentation of 2D MR brain tumor images. 723-731 - Vani Rajamanickam, Sangeetha Marikkannan:

Efficient block-based motion estimation architecture using particle swarm optimization. 732-739 - K. S. Angel Viji, Jayakumari Jayaraj:

A brain abnormality detection and tissue segmentation technique by using dual mode classifier. 740-747 - Maheswari Sureshbabu, Rameshwaran Kalimuthu, Chandra Vadivel:

A robust DHWT based AES encrypted image watermarking scheme. 748-755 - Dhanalakshmi Samiappan, Venkatesh Chakrapani:

Classification of carotid artery abnormalities in ultrasound images using an artificial neural classifier. 756-762 - Senthilkumar Murugesan, Chidambararajan Balasubramanian:

The influence of non functional characteristics in effort estimation using function point analysis. 763-769 - Eskinder Ayele, Sanjay B. Dhok:

Motion estimation in video coding using simplified optical flow technique. 770-776 - Jana Selvaganesan, Kannan Natarajan:

Unsupervised feature based key-frame extraction towards face recognition. 777-783 - Jayanthi Karuppusamy, Karthikeyan Marappan:

Efficient color and texture feature extraction technique for content based image retrieval system. 784-790 - Hassan Silkan, Saïd El Alaoui Ouatik, Abdelmounaime Lachkar:

Extreme curvature scale space for efficient shape similarity retrieval. 791-800 - Sakthivel Subramaniam, Parameswari Marimuthu, Vinothaa Natarajan:

Comparing performance measures of sparse representation on image restoration algorithms. 801-806 - Brahim Farou, Hamid Seridi, Herman Akdag:

Improved gaussian mixture model with background spotter for the extraction of moving objects. 807-816 - Sameh Zarif, Ibrahima Faye, Dayang Rohaya:

Video completion using gray level co-occurrence matrix and object update. 817-825 - Mritha Ramalingam, Nor Ashidi Mat Isa:

A secured representation of data hiding in wavelet transform domain using video steganography. 826-834 - Sanjivani Shantaiya, Kesari Verma, Kamal K. Mehta:

Multiple class image-based vehicle classification using soft computing algorithms. 835-841 - Alaa El-Din Mohamed, Reham Mostafa, Hamdy K. Elminir:

A novel JFD scheme for DRM systems based on DWT and collusion resistance fingerprint encoding. 842-850 - Jithesh Korothan, Shirivas Kishor, Pradeep Butey:

De-noise steganography by enhancing the cover image: a multi-level security approach.. 851-857 - Kalavathi Palanisamy, Somasundaram Karuppanagounder:

Segmentation of brain from MRI head images using modified chan-vese active contour model. 858-866 - Syed Karim, Muhammad Harris, Muhammad Arif:

Navigational pattern based relevance feedback using user profile in CBIR. 867-872 - Zeeshan Ahmad, Hafiz Umar, Chuandong Li, Ling Chen:

A DNA-based security solution using aggregated chaos cross and cubic map. 873-879 - Pisal Setthawong, Vajirasak Vanijja:

Cascading deformable parts model in the facial feature detection of frontal and side profile images. 880-887 - Farhood Mousavizadeh, Keivan Maghooli, Emad Fatemizadeh, Mohammad Moin:

A robust and efficient anti spoofing method for facial recognition systems using the fusion of fresnel transform and micro-texture analysis. 888-898 - Muthiah Mary, Lekshmi Padma, Maria John:

Modified image segmentation method based on region growing and region merging. 899-907 - Seyed Hashem Davarpanah, Fatimah Khalid, Lili Nurliyana Abdullah:

BGLBP-based image background extraction method. 908-914 - Aymen Mouelhi, Mounir Sayadi, Farhat Fnaiech, Karima Mrad:

Automated nuclei segmentation approach based on mathematical morphology for cancer scoring in breast tissue images. 915-922 - Bharathi Subramaniam, Sudhakar Radhakrishnan:

A novel technique to improve template security for biometric recognition. 923-929 - Khaled Mahmoud, Arwa Husien:

Copy-move forgery detection using zernike and pseudo zernike moments. 930-937 - Peng Liu, Zhipeng Ye, Wei Zhao, Xianglong Tang:

Semantic middleware: multi-layer abstract semantics inference for object categorization. 938-943 - Liping Wang, Shangbo Zhou, Karim Awudu:

Image zooming technique based on the split bregman iteration with fractional order variation regularization. 944-950 - Hemlata Arunachalam, Mahesh Motwani:

Image segmentation for the extraction of face using haar like feature. 951-958 - Mohamed Hammad, Mina Ibrahim, Mohiy M. Hadhoud:

A novel biometric based on ECG signals and images for human authentication. 959-964 - Tarig Almehmadi, Zaw Zaw Htike:

Vehicle classification system using viola jones and multi-layer perceptron. 965-971
Volume 13, Number 6B, Edited Issue 2016
- Anshu Parashar, Jitender Kumar Chhabra:

An approach for clustering class coupling metrics to mine object oriented software components. 987-996 - Atallah Al-Shatnawi:

A novel baseline estimation method for arabic handwritten text based on exploited components of voronoi diagrams. 997-1003 - Muhammad Shoaib, Ali Daud, Malik Khiyal:

Role of references in similarity estimation of publications. 1004-1011 - Bassam Hammo, Martha W. Evens, Hani Abu-Salem:

Effects of the college major on assessments of arabic text summaries. 1012-1019 - Samira Chouraqui, Boumediene Selma:

Unmanned vehicle trajectory tracking by neural networks. 1020-1023 - Khaoula Jayech, Mohamed Ali Mahjoub, Najoua Essoukri Ben Amara:

Arabic handwritten word recognition based on dynamic bayesian network. 1024-1031 - Asmaa Ourdighi, Abdelkader Benyettou:

An efficient spiking neural network approach based on spike response model for breast cancer diagnostic. 1032-1038 - Amany Shatnawi, Raed Shatnawi:

Generating a language-independent graphical user interfaces from UML models. 1039-1044 - Lavanya Gunasekaran, Srinivasan Subramaniam:

FAGA: hybridization of fractional order ABC and GA for optimization. 1045-1053 - Vetrivel Karuvandan, Senthamarai Chellamuthu, Shantharajah S. Periyasamy:

Cryptanalysis of AES-128 and AES-256 block ciphers using lorenz information measure. 1054-1060 - Jaganathan Palanichamy, Rajinikannan Marimuthu:

A novel image alignment and a fast efficient localized euclidean distance minutia matching algorithm for fingerprint recognition system. 1061-1067 - Ahmad Tayyar, Shadi Al Shehabi, Majida Albakoor:

ER7ST-algorithm for extracting facial expressions. 1068-1074 - Nijad Al-Najdawi, Asma Abu-Roman, Sara Tedmori, M. Noor Al-Najdawi:

An adaptive approach for real-time road traffic congestion detection using adaptive background extraction. 1075-1083 - Krishnamoorthi Murugasamy, Natarajan Mathaiyan:

Performance analysis of data clustering algorithms using various effectiveness measures. 1084-1091 - Muthukumarasamy Govindarajan:

Recognition of handwritten numerals using RBF-SVM hybrid model. 1092-1098 - Abdelkrim Amirat, Ahcene Menasria:

Visual decomposition of UML 2.0 interactions. 1099-1106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














