


default search action
The International Arab Journal of Information Technology, Volume 3
Volume 3, Number 1, January 2006
- Nadia Nouali, Habiba Drias, Anne Doucet:

A Mobility-Aware Two-Phase Commit Protocol. 1-8 - Hichem Talbi, Amer Draa, Mohamed Batouche:

A Novel Quantum-Inspired Evaluation Algorithm for Multi-Source Affine Image Registration. 9-15 - Essam Al-Daoud:

Incremental Learning of Auto-Association Multilayer Perceptrons Network. 16-19 - Toufik Taibi, Abdelouahab Abid, Wei Jiann Lim, Yeong Fei Chiam, Chong Ting Ng:

Design and Implementaion of A Two-Phase Commit Protocol Simulator. 20-27 - Mohamed Abdel Fattah, Fuji Ren, Shingo Kuroiwa:

Speaker Recognition for Wire/Wireless Communication Systems. 28-34 - Naim M. Ajlouni, Asim El-Sheikh, Abdullah Abdali Rashed:

A New Approach in Key Generation and Expansion in Rijndael Algorithm. 35-41 - Sameh Masmoudi Touj, Najoua Essoukri Ben Amara, Hamid Amiri:

Incremental Genetic Algorithm. 42-47 - Tahar Bouhadada, Mohamed Tayeb Laskri:

A Virtual Cooperative Learning Environment Using Human Companion. 48-54 - Sahar A. Al-Talib, Borhanuddin Mohd Ali, Sabira Khatun:

Integrating Multicasting and Hash Algorithm to support Host Mobility. 55-61 - Najib A. Kofahi, Saeed Al Zahrani, Syed Manzoor Hussain:

MOSIX Evaluation on a Linux Cluster. 62-68 - Nassir Salman:

Image Segmentation and Edge Detection Based on Chan-Vese Algorithm. 69-74 - Zuhoor A. Al-Khanjari, Narayana Swamy Kutti, Muna Hatem:

An Extended E-Learning Architecture: Integrating Software Tools Within The E-Learning Portal. 75-81 - Zuhoor A. Al-Khanjari:

Partial Automation of Sensitivity Analysis by Mutant Schemata Approach. 82-93
Volume 3, Number 2, 2006
- Awad M. Awadelkarim, Norbik Bashah Idris:

An XML-based Security Management Model for Multilevel Security Databases. 95-103 - Nassir Salman:

Image Segmentation Based on Watershed and Edge Detection Techniques. 104-110 - P. Dhavachelvan, G. V. Uma:

Evolution of Agent-Oriented Distributed Model for Software Testing: Layered Approach. 111-117 - Kamel Hamrouni, Nawrès Khalifa:

Two Methods for Analysis of Dynamic Scintigraphic Images of the Heart. 118-125 - Djamel Djenouri, Abdelouahid Derhab, Nadjib Badache:

Ad Hoc Networks Routing Protocols and Mobility. 126-133 - Nadia Nouali, Habiba Drias, Anne Doucet:

Protocols for Committing Mobile Transactions. 134-143 - Kemalatha Krishnasamy, Sai Peck Lee, Ananda Kumar Palaniappan:

Alternative Learning Approaches for Electronic Learning Environments in Smart Schools: Survey Results. 144-151 - Ruzayn Quaddoura:

Operator Decomposition of Graphs. 152-164 - Shanmugam Arumugam, Shanthi Govindaswamy:

Performance of the Modified Round Robin Scheduling Algorithm for Input-Queued Switches under Self-Similar Traffic. 165-171 - Zuwairie Ibrahim, Yusei Tsuboi, Osamu Ono, Marzuki Khalid:

Unconstraint Assignment Problem: A Molecular Computing Approach. 172-177 - Ahmad Dalal'ah:

A Dynamic Sliding Load Balancing Strategy in Distributed Syatems. 178-182
Volume 3, Number 3, July 2006
- Hassina Seridi-Bouchelaghem, Toufik Sari, Mokhtar Sellami:

Adaptive Instructional Planning Using Neural Networks in Intelligent Learning Systems. 183-192 - Ruzayn Quaddoura:

Linear Time Recognition of Bipartite Star123-Free Graphs. 193-202 - Mee-Chin Wee, Abu Bakar Zaitun:

Obstacles Towards the Use of ICT Tools in Teaching and Learning of Information Systems in Malaysian Universities. 203-209 - Alauddin Alomary, Mohammad Jamil:

An Approach to Strengthen Expert System Shell with Knowledge Illustration Established on Peak of the Fuzzy Logic. 210-218 - Moutaz Saleh, Subramaniam Shamala:

Hierarchical AED Scheduling Algorithm for Real-Time Networks. 219-225 - Shanmugam Arumugam, Shanthi Govindaswamy, Praveen Kumar Boya:

A Novel Transistor Level Implementation of a High Speed Packet Switch. 226-230 - Selvaraj Prabha, Arputharaj Kannan, Palanisamy Anandha Kumar:

An Optimizing Query Processor with an Efficient Caching Mechanism for Distributed Databases. 231-236 - Hilal M. Yousif Al-Bayatti, Abdul Munim Rahma, Haithem Alani:

Cuneiform Symbols Recognition Using Intensity Curves. 237-241 - Jihad Mohamad Jaam, Mohamed Larbi Rebaiaia, Ahmad Hasnah:

A Fingerprint Minutiae Recognition System Based on Genetic Algorithms. 242-248 - Youcef Aklouf, Habiba Drias:

Designing a Generic Marketplace Architecture Using Multi-Agent Based Technology. 249-255 - Hicham Mouncif, Azedine Boulmakoul, Mohamed Chala:

Integrating GIS-Technology for Modelling Origin-Destination Trip in Multimodal Transportation Networks. 256-264 - Haidar M. Harmanani, Walid Keirouz, Saeed Raheel:

A Rule-Based Extensible Stemmer for Information Retrieval with Application to Arabic. 265-272
Volume 3, Number 4, October 2006
- Alauddin Alomary, Mohammad Jamil:

The Evaluation and Comparative Study with a New Clustered Based Machine Learning Algorithm. Int. Arab J. Inf. Technol. 3(4): 273-282 (2006) - Essam Natsheh, Sabira Khatun, Adznan B. Jantan:

Adaptive Fuzzy Route Lifetime for Wireless Ad-hoc Networks. Int. Arab J. Inf. Technol. 3(4): 283-290 (2006) - Tarek El-Basuny, Makoto Amamiya:

Multi-Agent-Based Adaptive AV Interface. Int. Arab J. Inf. Technol. 3(4): 291-298 (2006) - Mowafak Hasan, Hasan Al-Shalabi:

Modified Cryptanalysis of RC5. Int. Arab J. Inf. Technol. 3(4): 299-302 (2006) - Mohammed E. El-Telbany, Mahmoud Warda, Mahmoud El-Borahy:

Mining the Classification Rules for Egyptian Rice Diseases. Int. Arab J. Inf. Technol. 3(4): 303-307 (2006) - Ramzi A. Haraty, Wissam Chehab:

Regression Test Selection for Trusted Database Applications. Int. Arab J. Inf. Technol. 3(4): 308-314 (2006) - Adnan Shaout, Brady W. King, Luke A. Reisner:

Real-Time Game Design of Pac-Man Using Fuzzy Logic. Int. Arab J. Inf. Technol. 3(4): 315-325 (2006) - Vicky Laurens, Abdulmotaleb El-Saddik, Amiya Nayak:

Requirements for Client Puzzles to Defeat the Denial of Service and the Distributed Denial of Service Attacks. Int. Arab J. Inf. Technol. 3(4): 326-333 (2006) - Sahadeo Padhye:

On DRSA Public Key Cryptosystem. Int. Arab J. Inf. Technol. 3(4): 334-336 (2006) - Khalid A. Eldrandaly, Neil Eldin:

A Knowledge-Based Decision Support System for Scraper Selection and Cost Estimation. Int. Arab J. Inf. Technol. 3(4): 337-341 (2006) - Adnan Abdul-Aziz Gutub:

Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers. Int. Arab J. Inf. Technol. 3(4): 342-349 (2006)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














