


default search action
The International Arab Journal of Information Technology, Volume 9
Volume 9, Number 1, January 2012
- Mala Chelliah, Siddhartha Sankaran, Shishir Prasad, Nagamaputhur Gopalan, Balasubramanian Sivaselvan:

Routing for wireless mesh networks with multiple constraints using fuzzy logic. 1-8 - Abdul Nasir Khan, Kalim Qureshi, Sumair Khan:

An intelligent approach of sniffer detection. 9-15 - Adwan Abdelfattah, Aiman Abu Samra:

Least recently plus five least frequently replacement policy (LR+5LF). 16-21 - Mohammed Awad:

Approximating i/o data using wavelet neural networks: control the position of mother wavelet. 22-29 - Najib Kofahi, Ahmed Abusalama:

A framework for distributed pattern matching based on multithreading. 30-38 - Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, Choong Seon Hong:

Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs. 39-48 - Nasrul Humaimi Mahmood, Camallil Omar, Tardi Tjahjadi:

Multiviews reconstruction for prosthetic design. 49-55 - Dhuha Albazaz:

Design a mini-operating system for mobile phone. 56-65 - Kuljit Kaur Chahal, Hardeep Singh:

An investigation of design level class cohesion metrics. 66-73 - Zulaikha Beevi, Mohamed Sathik:

A robust segmentation approach for noisy medical images using fuzzy clustering with spatial probability. 74-83 - Mohammad Abd-Alrahman Mahmoud Abushariah, Raja Noor Ainon, Roziati Zainuddin, Moustafa Elshafei, Othman Omran Khalifa:

Arabic speaker-independent continuous automatic speech recognition based on a phonetically rich and balanced speech corpus. 84-93 - Feras Hanandeh, Mutaz Khazaaleh, Hamidah Ibrahim, Rohaya Latip:

CFS: a new dynamic replication strategy for data grids. 94-99 - Nijad Al-Najdawi, Sara Tedmori, Eran A. Edirisinghe, Helmut E. Bez:

An automated real-time people tracking system based on KLT features detection. 100-107
Volume 9, Number 2, March 2012
- Ahmad T. Al-Taani, Mohammed M. Msallam, Sana A. Wedian:

A top-down chart parser for analyzing arabic sentences. 109-116 - Fadoua Bouafif Samoud, Samia Snoussi Maddouri, Noureddine Ellouze:

A hybrid method for three segmentation level of handwritten arabic script. 117-123 - Saeed Farzi:

The design of self-organizing evolved polynomial neural networks based on learnable evolution model 3. 124-132 - Raed Almomani, Ismail Ababneh:

Communication overhead in non-contiguous processor allocation policies for 3D mesh-connected multicomputers. 133-141 - Khaled Abd El Salam, Mahmoud Maree, Gamal AbdElAzeem:

Low latency handoff by integrating pre-registration with MIFA "PRE-MIFA". 142-147 - Shahaboddin Shamshirband:

A distributed approach for coordination between traffic lights based on game theory. 148-153 - Saurabh Mehta, Kyungsup Kwak:

WPAN MAC protocol: designing and analysis with different ACK policies. 154-162 - Khaled M. Alallayah, Alaa H. Alhamami, Waiel AbdElwahed, Mohamed Amin:

Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. 163-169 - Tinghuai Ma, Donghai Guan, Sungyoung Lee, Hao Cao:

An efficient distributed weather data sharing system based on agent. 170-178 - Ayad R. Abbas, Juan Liu:

Designing an intelligent recommender system using partial credit model and bayesian rough set. 179-187 - Rashid A. Saeed:

System design and implementation of TDMA-based WiFi network. 188-193 - Fatima Meskine, Safia Nait Bahloul:

Privacy preserving k-means clustering: a survey research. 194-200
Volume 9, Number 3, May 2012
- Jatinder Singh, Lakhwinder Kaur, Savita Gupta:

A cross-layer based intrusion detection technique for wireless networks. 201-207 - Barjesh Kochar, Rajender Singh Chhillar:

An effective data warehousing system for RFID using novel data cleaning, data transformation and loading techniques. 208-216 - Nadia Baha Touzene, Slimane Larabi:

Neural disparity map estimation from stereo image. 217-224 - Abbas Hasan Kattoush:

A novel radon-wavelet-based multi-carrier code division multiple access transceiver design and simulation under different channel conditions. 225-234 - Shadi A. Aljawarneh, Abdullah A. Alhaj:

Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems. 235-242 - Zakaria Laboudi, Salim Chikhi:

Comparison of genetic algorithm and quantum genetic algorithm. 243-249 - Zobia Rehman, Waqas Anwar:

A hybrid approach for urdu sentence boundary disambiguation. 250-255 - Hanan Elazhary:

Facile programming. 256-261 - Thulasimani Lakshmanan, Muthusamy Madheswaran:

A novel secure hash algorithm for public key digital signature schemes. 262-267 - Khaled Alghathbar:

Representing access control policies in use case. 268-275 - Shu-Fen Tu, Ching-Sheng Hsu:

A joint ownership protection scheme for digital images based on visual cryptography. 276-283 - Lo'ai Ali Tawalbeh, Yaser Jararweh, Abidalrahman Mohammad:

An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications. 284-290 - Rajaram Ayyasamy, Palaniswami Subramani:

An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks. 291-298
Volume 9, Number 4, July 2012
- Govindaswamy Kalpana, Muthusamy Punithavalli:

Reliable broadcasting using efficient forward node selection for mobile ad-hoc networks. 299-305 - Saeed Farzi:

Training of fuzzy neural networks via quantum-behaved particle swarm optimization and rival penalized competitive learning. 306-313 - Faisal Alzyoud, Tat Chee Wan:

The effect of using p-xcast routing protocol on many-to-many applications. 314-321 - Shanmugasundaram Hariharan:

Automatic plagiarism detection using similarity analysis. 322-326 - Alina Barbulescu, Elena Bautu:

A hybrid approach for modeling financial time series. 327-335 - Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:

Intrinsic authentication of multimedia objects using biometric data manipulation. 336-342 - Basem Alijla, Kathrein Kwaik:

Oiahcr: online isolated arabic handwritten character recognition using neural network. 343-351 - Majed Al Yahya, Rodina Binti Ahmad, Sai Peck Lee:

Impact of cmmi-based process maturity levels on effort, productivity and diseconomy of scale. 352-360 - Maizatul Akmar Ismail, Mashkuri Yaacob, Sameem Abdul Kareem, Fariza Nasaruddin, Noorhidawati Abdullah:

Support system for novice researchers (ssnr): usability evaluation of the first use. 361-367 - Mohamad Ababneh, Riyad Al-Shalabi, Ghassan Kanaan, Alaa Al-Nobani:

Building an effective rule-based light stemmer for arabic language to improve search effectiveness. 368-372 - Zibouda Aliouat, Makhlouf Aliouat:

Verification of cooperative transient fault diagnosis and recovery in critical embedded systems. 373-381 - Md. Hasanul Kabir, Taskeed Jabid, Oksam Chae:

Local directional pattern variance (ldpv): a robust feature descriptor for facial expression recognition. 382-391 - Lip Yee Por, Sim Ying Ong, Delina Beh Yin, Maizatul Akmar Ismail:

A grid enabled e-theses and dissertations repository system. 392-401
Volume 9, Number 5, September 2012
- Jyh-Horng Jeng, Shuo-Li Hsu, Yukon Chang:

Entropy improvement for fractal image coder. 403-410 - Mohammad Osiur Rahman, Aini Hussain, Noor Ezlin Ahmad Basri, Hassan Basri, Edgar Scavino:

Chromaticity based waste paper grade identification. 411-417 - Misbah Jadoon, Sajjad Ahmad Madani, Khizar Hayat, Stefan Mahlknecht:

Location and non-location based ad-hoc routing protocols under various mobility models: a comparative study. 418-427 - Sonia Mammeri, Rachid Beghdad:

On handling real-time communications in mac protocols. 428-435 - Masood Mansoori, Omar Zakaria, Abdullah Gani:

Improving exposure of intrusion deception system through implementation of hybrid honeypot. 436-444 - Rajkumar Ramaswamy, Vasuki Arumugam:

Lossless data hiding based on histogram modification. 445-451 - Jehad Alnihoud:

Content-based image retrieval system based on self organizing map, fuzzy color histogram and subtractive fuzzy clustering. 452-458 - Bachir Boucheham:

PLA data reduction for speeding up time series comparison. 459-464 - Zakaria Elberrichi, Karima Abidi:

Arabic text categorization: a comparative study of different representation modes. 465-470 - Sara Tedmori, Nijad Al-Najdawi:

Lossless image cryptography algorithm based on discrete cosine transform. 471-478 - Farag Ahmed, Andreas Nürnberger:

Literature review of interactive cross language information retrieval tools. 479-486 - Fahd Mohsen, Mohiy M. Hadhoud, Kamel Moustafa, Khalid Ameen:

A new image segmentation method based on particle swarm optimization. 487-493
Volume 9, Number 6, November 2012
- Yasir Abdelgadir Mohamed:

I2MANET Security Logical Specification Framework. 495-503 - Eiad Yafi, Ahmed Sultan Al-Hegami, Mohd. Afshar Alam, Ranjit Biswas:

YAMI: Incremental Mining of Interesting Association Patterns. 504-510 - Tien-Dung Nguyen, Eui-Nam Huh:

A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems. 511-519 - Mohammed Ouali, Holger Lange, Kheireddine Bouazza:

A Markov Random Field Model and Method to Image Matching. 520-528 - Guang Li, Yadong Wang:

A Privacy-Preserving Classification Method Based on Singular Value Decomposition. 529-534 - Sanjay Misra, Ferid Cafer:

Estimating Quality of JavaScript. 535-543 - Zouhaier Brahmia, Mohamed Mkaouar, Salem Chakhar, Rafik Bouaziz:

Efficient Management of Schema Versioning in Multi-Temporal Databases. 544-552 - Qiong Pu, Shuhua Wu:

Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks. 553-561 - Muhammad Sharif, Sajjad Mohsin, Muhammad Younas Javed, Muhammad Atif Ali:

Single Image Face Recognition Using Laplacian of Gaussian and Discrete Cosine Transforms. 562-570 - Ahmed Khorsi:

Effective Unsupervised Arabic Word Stemming: Towards an Unsupervised Radicals Extraction. 571-577 - Ala'a Al-zoubi, Mohammad Al-zoubi:

Automatic Mapping of MPEG-7 Descriptions to Relational Database. 578-587 - Leila Chergui, Maâmar Kef, Salim Chikhi:

Combining Neural Networks for Arabic Handwriting Recognition. 588-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














