Journal: Int. Arab J. Inf. Technol.

Volume 11, Issue 6

521 -- 525Mohammad Anagreh, Azman Samsudin, Mohd. Adib Omar. Parallel method for computing elliptic curve scalar multiplication based on MOF
526 -- 531Ramzi A. Haraty, Bassam Zantout. Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-Based Approach
532 -- 539Abd El-Aziz Abd El-Aziz, Arputharaj Kannan. XML access control: mapping XACML policies to relational database tables
540 -- 549Khalid Al-Tahat. An innovative instructional method for teaching object-oriented modelling
550 -- 559Ellips Masehian, Hossein Akbaripour, Nasrin Mohabbati-Kalejahi. Solving the n-queens problem using a tuned hybrid imperialist competitive algorithm
560 -- 572Mohammad Ababneh, Salama Hassan, Sulieman Bani-Ahmad. On static scheduling of tasks in real time multiprocessor systems: an improved GA-based approach
573 -- 581Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin. Optimum threshold parameter estimation of wavelet coefficients using fisher discriminant analysis for speckle noise reduction
582 -- 589Almas Abbasi, Woo Chaw Seng, Imran Shafiq Ahmad. Multi block based image watermarking in wavelet domain using genetic programming
590 -- 598Atta-ur-Rahman, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, Muhammad Tahir Naseem. A real time adaptive resource allocation scheme for OFDM systems using GRBF-neural networks and fuzzy rule base system
599 -- 606Hossein Abbasimehr, Mostafa Setak, Mohammad Jafar Tarokh. A comparative assessment of the performance of ensemble learning in customer churn prediction
607 -- 615Dhuha Basheer, Seddeeq Albana. Developing an appliance real time control in heterogeneous operating systems
616 -- 622Mohiadeen Abdul Kadhar. A deadlock-free dynamic reconfiguration protocol for distributed routing on interconnection networks
623 -- 627Weiwei Han. A provably secure public key encryption scheme based on isogeny star

Volume 11, Issue 5

425 -- 428Chien-Lung Hsu, Han-Yu Lin. Universal forgery attack on a strong designated verifier signature scheme
429 -- 436Rattan Rana, Deepak Garg. Anticipatory bound selection procedure (ABSP) for vertex K-center problem 0
437 -- 446Geeta Nagpal, Moin Uddin, Arvinder Kaur. Grey relational effort analysis technique using regression methods for software estimation
447 -- 451Valliammal Narayan, Geethalakshmi Subbarayan. An optimal feature subset selection using GA for leaf classification
452 -- 458Tsui-Ping Chang. Mining frequent user query patterns from XML query streams
459 -- 467Muhammad Naeem, Sohail Asghar. An information theoretic scoring function in belief network
468 -- 475Hizmawati Madzin, Roziati Zainuddin, Nursabirin Mohamed. Analysis of visual features in local descriptor for multi-modality medical image
476 -- 486Slami Saadi, Abderrezak Guessoum, Maamar Bettayeb, M. K. Abdelhafidi. Blind restoration of radiological images using hybrid swarm optimized model implemented on FPGA
487 -- 492Nima Sahba, Keivan Maghooli, Vahid Tavakoli. An optimized method for B-mode echocardiographic video compression based on motion estimation and wavelet
493 -- 499Hocheol Jeon. A reference comments crawler for assisting research paper writing
500 -- 506Qais Qassim, Ahmed Patel, Abdullah Mohd Zin. Strategy to reduce false alarms in intrusion detection and prevention systems
507 -- 513Zaini Arifah Othman, Nor Aniza Abdullah, Zaidi Razak, Mohd. Yakub Zulkifli Bin Mohd. Yusoff. Speech to text engine for jawi language
514 -- 520Ramzi A. Haraty, Abdul Nasser El-Kassar, Suzan Fanous. Hardening the elgamal cryptosystem in the setting of the second group of units

Volume 11, Issue 4

315 -- 321Han-Yu Lin. Toward secure strong designated verifier signature scheme from identity-based system
322 -- 328Arumugam Sakthivel, Raju Nedunchezhian. Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing
329 -- 337Bacha Rehman, Zahid Halim, Mushtaq Ahmad. ASCII based GUI system for arabic scripted languages: a case of urdu
338 -- 344Sarra Senhadji, Salim Khiat, Hafida Belbachir. Association rule mining and load balancing strategy in grid systems
345 -- 353Fatiha Barigou, Bouziane Beldjilali, Baghdad Atmani. Using cellular automata for improving knn based spam filtering
354 -- 361Mehdi Sadeghi, Keivan Maghooli, Mohammad Shahram Moein. Using artificial immunity network for face verification
362 -- 369Muhammad Tahir, Tahir Mustafa Madani, Sheikh Ziauddin, Muhammad Arshad Awan, Waqar Hussain Rana. Wiimote squash: comparing DTW and WFM techniques for 3D gesture recognition
370 -- 378Abdel Karim Al Tamimi, Manar Jaradat, Nuha Al-Jarrah, Sahar Ghanem. AARI: automatic arabic readability index
379 -- 386ShiNing Li, Zhenhai Zhang, Jiaqi Duan. An ensemble multi-label feature selection algorithm based on information entropy
387 -- 395Chouaib Moujahdi, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul, Mohammed Rziza. Inter-communication classification for multi-view face recognition
396 -- 405Marwan Akeel, Ravi Mishra. ANN and rule based method for english to arabic machine translation
406 -- 415Bassam Rajabi, Sai Peck Lee. Consistent integration between object oriented and coloured petri nets models
416 -- 424Aymen Chaabouni, Houcine Boubaker, Monji Kherallah, Haikal El Abed, Adel M. Alimi. Static and dynamic features for writer identification based on multi-fractals

Volume 11, Issue 3

223 -- 228Chaobang Gao, Jiliu Zhou, Wei-hua Zhang. Edge detection based on the newton interpolation's fractional differentiation
229 -- 235Leonardo Reis, Luis Aguiar, Darío Baptista, Fernando Morgado Dias. A software tool for automatic generation of neural hardware
236 -- 242Yuhanis Yusof, Zuriani Mustaffa. LSSVM parameters tuning with enhanced artificial bee colony
243 -- 249Khalid M. Hosny. Fast computation of accurate pseudo zernike moments for binary and gray-level images
250 -- 257Haneen Talal Jasim, Kais Ismail Ibraheem, Abdul Ghafoor Jasim Salim. A hybrid algorithm to forecast enrolment based on genetic algorithms and fuzzy time series
258 -- 267Fazal-e-Malik, Baharum Baharudin. Effective image retrieval based on an experimental combination of texture features and comparison of different histogram quantizations in the DCT domain
268 -- 275Kun Gao, Qin Wang, Lifeng Xi. Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment
276 -- 280Addepalli V. N. Krishna. Time stamp based ECC encryption and decryption
281 -- 286Khairullah Khan, Baharum Baharudin, Aurangzeb Khan. Identifying product features from customer reviews using hybrid patterns
287 -- 292Phichhang Ou, Hengshan Wang. Volatility modelling and prediction by hybrid support vector regression with chaotic genetic algorithms
293 -- 299Ykhlef Fayçal, Messaoud Bensebti. Comparative performance study of several features for voiced/ non-voiced classification
300 -- 307Sotiris B. Kotsiantis. Integrating global and local application of naive bayes classifier
308 -- 314Hui Hui Wang, Dzulkifli Mohamad, Nor Azman Ismail. An efficient parameters selection for object recognition based colour features in traffic image retrieval

Volume 11, Issue 2

111 -- 115Dongfu Xie. Simplified algorithm and hardware implementation for the (24, 12, 8) extended golay soft decoder up to 4 errors
116 -- 123Faten Kharbat, Mohammed Odeh, Larry Bull. A new hybrid architecture for the discovery and compaction of knowledge: breast cancer datasets case study
124 -- 133Sanjay T. Singh, Trimbak R. Sontakke. An effective mechanism to neutralize the semantic gap in content based image retrieval (CBIR)
134 -- 139Saed Alqaraleh, Omar Ramadan. Elimination of repeated occurrences in multimedia search engines
140 -- 148Shubair Abdulla, Sureswaran Ramadass, Altyeb Altaher Altyeb, Amer Al-Nassiri. Employing machine learning algorithms to detect unknown scanning and email worms
149 -- 158Marryam Murtaza, Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah. Face recognition using adaptive margin fisher's criterion and linear discriminant analysis (AMFC-LDA)
159 -- 167Sivasubramaniam Nandhini, Senniappan Palaniammal. Enhanced core stateless fair queuing with multiple queue priority scheduler
168 -- 177Murugappan Ilango, Vasudev Mohan. PCFA: mining of projected clusters in high dimensional data using modified FCM algorithm
178 -- 185Saeed Amirgholipour Kasmani, Aboosalh Mohammad Sharifi. A pre-filtering method to improve watermark detection rate in DCT based watermarking
186 -- 194Kalli Srinivasa Nageswara Prasad, S. Ramakrishna. An efficient traffic forecasting system based on spatial data and decision trees
195 -- 203Faisal Ahmed 0002, Hossain Bari, Emam Hossain. Person-independent facial expression recognition based on compound local binary pattern (CLBP)
204 -- 212Majid Masoumi, Shervin Amiri. Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks
213 -- 221Baraa T. Sharef, Nazlia Omar, Zeyad T. Sharef. An automated arabic text categorization based on the frequency ratio accumulation

Volume 11, Issue 1

1 -- 10Aisha Azeem, Muhammad Sharif, Mudassar Raza, Marryam Murtaza. A survey: face recognition techniques under partial occlusion
11 -- 18Karim Kalti, Mohamed-Ali Mahjoub. Image segmentation by gaussian mixture models and modified FCM algorithm
19 -- 24Rytis Maskeliunas. The evaluation of spoken dialog management models for multimodal HCIs
25 -- 32Chao Zuo, Qian Chen, Xiubao Sui, Jianle Ren. Brightness preserving image contrast enhancement using spatially weighted histogram equalization
33 -- 42Bhawna Mallick, Deepak Garg 0002, P. S. Grover. Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary
43 -- 51Habib Mahi, Hadria Isabaten, Chahira Serief. Zernike moments and svm for shape classification in very high resolution satellite images
52 -- 58Kanokwan Kanyamee, Chanboon Sathitwiriyawong. High-availability decentralized cryptographic multi-agent key recovery
59 -- 68Devangkumar Shah, Chandresh Vithlani. VLSI-oriented lossy image compression approach using DA-based 2D-discrete wavelet
69 -- 77Sofien Gannouni, Mutaz Beraka, Hassan Mathkour. A critical comparison for data sharing approaches
78 -- 86Yaser A. Al-Lahham, Mohammad Hassan. Scalable self-organizing structured P2P information retrieval model based on equivalence classes
87 -- 94Faisal Ahmed 0002, Md. Hasanul Kabir, Shayla Bhuyan, Hossain Bari, Emam Hossain. Automated weed classification with local pattern-based texture descriptors
95 -- 102Shyam Lal, Mahesh Chandra. Efficient algorithm for contrast enhancement of natural images
103 -- 110Nattha Phiwma, Parinya Sanguansat. An improved feature extraction and combination of multiple classifiers for query-by-humming