Journal: Int. Arab J. Inf. Technol.

Volume 12, Issue 6A

621 -- 626Hamza Zidoum, Fatma Al-Rasbi, Muna Al-Awfi. Towards the construction of a comprehensive arabic lexical reference system
627 -- 634Loan T. T. Nguyen, Bay Vo, Tzung-Pei Hong. CARIM: an efficient algorithm for mining class-association rules with interestingness measures
635 -- 641Thomson Fredrick, Govindaraju Radhamani. The fuzzy logic based ECA rule processing for XML databases
642 -- 649Muthukumar Arunachalam, Kannan Subramanian. Finger knuckle print authentication using AES and K-means algorithm
650 -- 657Tameem Eissa, Gihwan Cho. Lightweight anti-censorship online network for anonymity and privacy in middle eastern countries
658 -- 665Marappagounder Shanker, Keppanagounder Thanushkodi. An effective approach to software cost estimation based on soft computing techniques
666 -- 671Teena Mittal, Rajendra Kumar Sharma. Multiclass SVM based spoken hindi numerals recognition
672 -- 679Shyam Lal, Rahul Kumar. An efficient method for contrast enhancement of real world hyper spectral images
680 -- 687Iyapparaja Meenakshisundaram, Sureshkumar Sreedharan. Intelligent risk analysis model for mining adaptable reusable component
688 -- 694Subbian Suganthi, Rethanaswamy Nadarajan. Adaptability metric for adaptation of the dynamic changes
695 -- 700Jaison Bennet, Chilambuchelvan Ganaprakasam, Nirmal Kumar. A hybrid approach for gene selection and classification using support vector machine
701 -- 707Hemalatha Gunasekaran, ThanushkodiKeppana Gowder. New bucket join algorithm for faster join query results
708 -- 713L. Jani Anbarasi, G. S. Anandha Mala. Verifiable multi secret sharing scheme for 3D models
714 -- 718Ravva Santosh, Challa Narasimham, Pallam Shetty. Short secret exponent attack on LSBS-RSA
719 -- 727Iman Kashefi, Maryam Kassiri, Mazleena Salleh. Preventing collusion attack in android
728 -- 734Kaliappan Jeyakumar, Thiagarajan Revathi, Sundararajan Karpagam. Intrusion detection using artificial neural networks with best set of features
735 -- 740ShanmughaSundaram Mythili, Subramani Sarala. A measurement of similarity to identify identical code clones
741 -- 747Amit Joshi, Vivekanand Mishra, Rajendra Patrikar. Real time implementation of integer DCT based video watermarking architecture
748 -- 754Raman Beena, Subramani Sarala. An efficient specific update search domain based glowworm swarm optimization for test case prioritization
755 -- 763Satyendr Singh, Tanveer J. Siddiqui. Utilizing corpus statistics for hindi word sense disambiguation
764 -- 771Thumma Kumar, Kamireddy Reddy. A technique for burning area identification UIHS transformation and image segmentation
772 -- 779Akila Thiyagarajan, UmaMaheswari Pandurangan. Comparative analysis of classifier Performance on MR brain images
780 -- 784Siva Sankar Kanahasabapathy, Jebarajan Thanganadar, Padmasuresh Lekshmikanthan. A novel approach to develop dynamic portable instructional operating system for minimal utilization
785 -- 790Ghulam Mujtaba, David J. Parish. A statistical framework for identification of tunnelled applications using machine learning
791 -- 796Sanjay K. Dwivedi, Pramod P. Sukhadeve. Translation rules for english to hindi machine translation system: homoeopathy domain
797 -- 805Krishna Priya Remamany, Thanga Raj Chelliah, Kesavadas Chandrasekaran, Kannan Subraman. Brain tumor segmentation in MRI images using integrated modified PSO-fuzzy approach