default search action
The International Arab Journal of Information Technology, Volume 9
Volume 9, Number 1, January 2012
- Mala Chelliah, Siddhartha Sankaran, Shishir Prasad, Nagamaputhur Gopalan, Balasubramanian Sivaselvan:
Routing for wireless mesh networks with multiple constraints using fuzzy logic. 1-8 - Abdul Nasir Khan, Kalim Qureshi, Sumair Khan:
An intelligent approach of sniffer detection. 9-15 - Adwan Abdelfattah, Aiman Abu Samra:
Least recently plus five least frequently replacement policy (LR+5LF). 16-21 - Mohammed Awad:
Approximating i/o data using wavelet neural networks: control the position of mother wavelet. 22-29 - Najib Kofahi, Ahmed Abusalama:
A framework for distributed pattern matching based on multithreading. 30-38 - Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, Choong Seon Hong:
Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs. 39-48 - Nasrul Humaimi Mahmood, Camallil Omar, Tardi Tjahjadi:
Multiviews reconstruction for prosthetic design. 49-55 - Dhuha Albazaz:
Design a mini-operating system for mobile phone. 56-65 - Kuljit Kaur Chahal, Hardeep Singh:
An investigation of design level class cohesion metrics. 66-73 - Zulaikha Beevi, Mohamed Sathik:
A robust segmentation approach for noisy medical images using fuzzy clustering with spatial probability. 74-83 - Mohammad Abd-Alrahman Mahmoud Abushariah, Raja Noor Ainon, Roziati Zainuddin, Moustafa Elshafei, Othman Omran Khalifa:
Arabic speaker-independent continuous automatic speech recognition based on a phonetically rich and balanced speech corpus. 84-93 - Feras Hanandeh, Mutaz Khazaaleh, Hamidah Ibrahim, Rohaya Latip:
CFS: a new dynamic replication strategy for data grids. 94-99 - Nijad Al-Najdawi, Sara Tedmori, Eran A. Edirisinghe, Helmut E. Bez:
An automated real-time people tracking system based on KLT features detection. 100-107
Volume 9, Number 2, March 2012
- Ahmad T. Al-Taani, Mohammed M. Msallam, Sana A. Wedian:
A top-down chart parser for analyzing arabic sentences. 109-116 - Fadoua Bouafif Samoud, Samia Snoussi Maddouri, Noureddine Ellouze:
A hybrid method for three segmentation level of handwritten arabic script. 117-123 - Saeed Farzi:
The design of self-organizing evolved polynomial neural networks based on learnable evolution model 3. 124-132 - Raed Almomani, Ismail Ababneh:
Communication overhead in non-contiguous processor allocation policies for 3D mesh-connected multicomputers. 133-141 - Khaled Abd El Salam, Mahmoud Maree, Gamal AbdElAzeem:
Low latency handoff by integrating pre-registration with MIFA "PRE-MIFA". 142-147 - Shahaboddin Shamshirband:
A distributed approach for coordination between traffic lights based on game theory. 148-153 - Saurabh Mehta, Kyungsup Kwak:
WPAN MAC protocol: designing and analysis with different ACK policies. 154-162 - Khaled M. Alallayah, Alaa H. Alhamami, Waiel AbdElwahed, Mohamed Amin:
Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. 163-169 - Tinghuai Ma, Donghai Guan, Sungyoung Lee, Hao Cao:
An efficient distributed weather data sharing system based on agent. 170-178 - Ayad R. Abbas, Juan Liu:
Designing an intelligent recommender system using partial credit model and bayesian rough set. 179-187 - Rashid A. Saeed:
System design and implementation of TDMA-based WiFi network. 188-193 - Fatima Meskine, Safia Nait Bahloul:
Privacy preserving k-means clustering: a survey research. 194-200
Volume 9, Number 3, May 2012
- Jatinder Singh, Lakhwinder Kaur, Savita Gupta:
A cross-layer based intrusion detection technique for wireless networks. 201-207 - Barjesh Kochar, Rajender Singh Chhillar:
An effective data warehousing system for RFID using novel data cleaning, data transformation and loading techniques. 208-216 - Nadia Baha Touzene, Slimane Larabi:
Neural disparity map estimation from stereo image. 217-224 - Abbas Hasan Kattoush:
A novel radon-wavelet-based multi-carrier code division multiple access transceiver design and simulation under different channel conditions. 225-234 - Shadi A. Aljawarneh, Abdullah A. Alhaj:
Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems. 235-242 - Zakaria Laboudi, Salim Chikhi:
Comparison of genetic algorithm and quantum genetic algorithm. 243-249 - Zobia Rehman, Waqas Anwar:
A hybrid approach for urdu sentence boundary disambiguation. 250-255 - Hanan Elazhary:
Facile programming. 256-261 - Thulasimani Lakshmanan, Muthusamy Madheswaran:
A novel secure hash algorithm for public key digital signature schemes. 262-267 - Khaled Alghathbar:
Representing access control policies in use case. 268-275 - Shu-Fen Tu, Ching-Sheng Hsu:
A joint ownership protection scheme for digital images based on visual cryptography. 276-283 - Lo'ai Ali Tawalbeh, Yaser Jararweh, Abidalrahman Mohammad:
An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications. 284-290 - Rajaram Ayyasamy, Palaniswami Subramani:
An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks. 291-298
Volume 9, Number 4, July 2012
- Govindaswamy Kalpana, Muthusamy Punithavalli:
Reliable broadcasting using efficient forward node selection for mobile ad-hoc networks. 299-305 - Saeed Farzi:
Training of fuzzy neural networks via quantum-behaved particle swarm optimization and rival penalized competitive learning. 306-313 - Faisal Alzyoud, Tat Chee Wan:
The effect of using p-xcast routing protocol on many-to-many applications. 314-321 - Shanmugasundaram Hariharan:
Automatic plagiarism detection using similarity analysis. 322-326 - Alina Barbulescu, Elena Bautu:
A hybrid approach for modeling financial time series. 327-335 - Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:
Intrinsic authentication of multimedia objects using biometric data manipulation. 336-342 - Basem Alijla, Kathrein Kwaik:
Oiahcr: online isolated arabic handwritten character recognition using neural network. 343-351 - Majed Al Yahya, Rodina Binti Ahmad, Sai Peck Lee:
Impact of cmmi-based process maturity levels on effort, productivity and diseconomy of scale. 352-360 - Maizatul Akmar Ismail, Mashkuri Yaacob, Sameem Abdul Kareem, Fariza Nasaruddin, Noorhidawati Abdullah:
Support system for novice researchers (ssnr): usability evaluation of the first use. 361-367 - Mohamad Ababneh, Riyad Al-Shalabi, Ghassan Kanaan, Alaa Al-Nobani:
Building an effective rule-based light stemmer for arabic language to improve search effectiveness. 368-372 - Zibouda Aliouat, Makhlouf Aliouat:
Verification of cooperative transient fault diagnosis and recovery in critical embedded systems. 373-381 - Md. Hasanul Kabir, Taskeed Jabid, Oksam Chae:
Local directional pattern variance (ldpv): a robust feature descriptor for facial expression recognition. 382-391 - Lip Yee Por, Sim Ying Ong, Delina Beh Yin, Maizatul Akmar Ismail:
A grid enabled e-theses and dissertations repository system. 392-401
Volume 9, Number 5, September 2012
- Jyh-Horng Jeng, Shuo-Li Hsu, Yukon Chang:
Entropy improvement for fractal image coder. 403-410 - Mohammad Osiur Rahman, Aini Hussain, Noor Ezlin Ahmad Basri, Hassan Basri, Edgar Scavino:
Chromaticity based waste paper grade identification. 411-417 - Misbah Jadoon, Sajjad Ahmad Madani, Khizar Hayat, Stefan Mahlknecht:
Location and non-location based ad-hoc routing protocols under various mobility models: a comparative study. 418-427 - Sonia Mammeri, Rachid Beghdad:
On handling real-time communications in mac protocols. 428-435 - Masood Mansoori, Omar Zakaria, Abdullah Gani:
Improving exposure of intrusion deception system through implementation of hybrid honeypot. 436-444 - Rajkumar Ramaswamy, Vasuki Arumugam:
Lossless data hiding based on histogram modification. 445-451 - Jehad Alnihoud:
Content-based image retrieval system based on self organizing map, fuzzy color histogram and subtractive fuzzy clustering. 452-458 - Bachir Boucheham:
PLA data reduction for speeding up time series comparison. 459-464 - Zakaria Elberrichi, Karima Abidi:
Arabic text categorization: a comparative study of different representation modes. 465-470 - Sara Tedmori, Nijad Al-Najdawi:
Lossless image cryptography algorithm based on discrete cosine transform. 471-478 - Farag Ahmed, Andreas Nürnberger:
Literature review of interactive cross language information retrieval tools. 479-486 - Fahd Mohsen, Mohiy M. Hadhoud, Kamel Moustafa, Khalid Ameen:
A new image segmentation method based on particle swarm optimization. 487-493
Volume 9, Number 6, November 2012
- Yasir Abdelgadir Mohamed:
I2MANET Security Logical Specification Framework. 495-503 - Eiad Yafi, Ahmed Sultan Al-Hegami, Mohd. Afshar Alam, Ranjit Biswas:
YAMI: Incremental Mining of Interesting Association Patterns. 504-510 - Tien-Dung Nguyen, Eui-Nam Huh:
A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems. 511-519 - Mohammed Ouali, Holger Lange, Kheireddine Bouazza:
A Markov Random Field Model and Method to Image Matching. 520-528 - Guang Li, Yadong Wang:
A Privacy-Preserving Classification Method Based on Singular Value Decomposition. 529-534 - Sanjay Misra, Ferid Cafer:
Estimating Quality of JavaScript. 535-543 - Zouhaier Brahmia, Mohamed Mkaouar, Salem Chakhar, Rafik Bouaziz:
Efficient Management of Schema Versioning in Multi-Temporal Databases. 544-552 - Qiong Pu, Shuhua Wu:
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks. 553-561 - Muhammad Sharif, Sajjad Mohsin, Muhammad Younas Javed, Muhammad Atif Ali:
Single Image Face Recognition Using Laplacian of Gaussian and Discrete Cosine Transforms. 562-570 - Ahmed Khorsi:
Effective Unsupervised Arabic Word Stemming: Towards an Unsupervised Radicals Extraction. 571-577 - Ala'a Al-zoubi, Mohammad Al-zoubi:
Automatic Mapping of MPEG-7 Descriptions to Relational Database. 578-587 - Leila Chergui, Maâmar Kef, Salim Chikhi:
Combining Neural Networks for Arabic Handwriting Recognition. 588-595
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.