Journal: Int. Arab J. Inf. Technol.

Volume 12, Issue 6A

621 -- 626Hamza Zidoum, Fatma Al-Rasbi, Muna Al-Awfi. Towards the construction of a comprehensive arabic lexical reference system
627 -- 634Loan T. T. Nguyen, Bay Vo, Tzung-Pei Hong. CARIM: an efficient algorithm for mining class-association rules with interestingness measures
635 -- 641Thomson Fredrick, Govindaraju Radhamani. The fuzzy logic based ECA rule processing for XML databases
642 -- 649Muthukumar Arunachalam, Kannan Subramanian. Finger knuckle print authentication using AES and K-means algorithm
650 -- 657Tameem Eissa, Gihwan Cho. Lightweight anti-censorship online network for anonymity and privacy in middle eastern countries
658 -- 665Marappagounder Shanker, Keppanagounder Thanushkodi. An effective approach to software cost estimation based on soft computing techniques
666 -- 671Teena Mittal, Rajendra Kumar Sharma. Multiclass SVM based spoken hindi numerals recognition
672 -- 679Shyam Lal, Rahul Kumar. An efficient method for contrast enhancement of real world hyper spectral images
680 -- 687Iyapparaja Meenakshisundaram, Sureshkumar Sreedharan. Intelligent risk analysis model for mining adaptable reusable component
688 -- 694Subbian Suganthi, Rethanaswamy Nadarajan. Adaptability metric for adaptation of the dynamic changes
695 -- 700Jaison Bennet, Chilambuchelvan Ganaprakasam, Nirmal Kumar. A hybrid approach for gene selection and classification using support vector machine
701 -- 707Hemalatha Gunasekaran, ThanushkodiKeppana Gowder. New bucket join algorithm for faster join query results
708 -- 713L. Jani Anbarasi, G. S. Anandha Mala. Verifiable multi secret sharing scheme for 3D models
714 -- 718Ravva Santosh, Challa Narasimham, Pallam Shetty. Short secret exponent attack on LSBS-RSA
719 -- 727Iman Kashefi, Maryam Kassiri, Mazleena Salleh. Preventing collusion attack in android
728 -- 734Kaliappan Jeyakumar, Thiagarajan Revathi, Sundararajan Karpagam. Intrusion detection using artificial neural networks with best set of features
735 -- 740ShanmughaSundaram Mythili, Subramani Sarala. A measurement of similarity to identify identical code clones
741 -- 747Amit Joshi, Vivekanand Mishra, Rajendra Patrikar. Real time implementation of integer DCT based video watermarking architecture
748 -- 754Raman Beena, Subramani Sarala. An efficient specific update search domain based glowworm swarm optimization for test case prioritization
755 -- 763Satyendr Singh, Tanveer J. Siddiqui. Utilizing corpus statistics for hindi word sense disambiguation
764 -- 771Thumma Kumar, Kamireddy Reddy. A technique for burning area identification UIHS transformation and image segmentation
772 -- 779Akila Thiyagarajan, UmaMaheswari Pandurangan. Comparative analysis of classifier Performance on MR brain images
780 -- 784Siva Sankar Kanahasabapathy, Jebarajan Thanganadar, Padmasuresh Lekshmikanthan. A novel approach to develop dynamic portable instructional operating system for minimal utilization
785 -- 790Ghulam Mujtaba, David J. Parish. A statistical framework for identification of tunnelled applications using machine learning
791 -- 796Sanjay K. Dwivedi, Pramod P. Sukhadeve. Translation rules for english to hindi machine translation system: homoeopathy domain
797 -- 805Krishna Priya Remamany, Thanga Raj Chelliah, Kesavadas Chandrasekaran, Kannan Subraman. Brain tumor segmentation in MRI images using integrated modified PSO-fuzzy approach

Volume 12, Issue 6

519 -- 523Telu Venkata Madhusudhanarao, Sanaboina Pallam Setty, Yarramalle Srinivas. Model based approach for content based image retrievals based on fusion and relevancy methodology
524 -- 531Seema Verma, Deepak Garg. Improvement in rebalanced CRT RSA
532 -- 539Romi Rahmat, Muhammad Fermi Pasha, Mohammad Syukur, Rahmat Budiarto. A gene-regulated nested neural network
540 -- 549Muhammad Attique, Yared Hailu Gudeta, Sololia Gudeta Ayele, Hyung-Ju Cho, Tae-Sun Chung. A safe exit approach for continuous monitoring of reverse k-nearest neighbors in road networks
550 -- 555Mehmet Kurt, Murat Ersen Berberler, Onur Ugurlu. A new algorithm for finding vertex-disjoint paths
556 -- 565Wen-Ping Li, Jing Yang 0001, Jianpei Zhang. A differential geometry perspective about multiple data streams preprocessing
566 -- 573Mohamed Achraf Ben Mohamed, Souheyl Mallat, Mohamed Amine Nahdi, Mounir Zrigui. Exploring the potential of schemes in building NLP tools for arabic language
574 -- 581Farshad Tajeripour, Mohammad Saberi, Shervan Fekri Ershad. Developing a novel approach for content based image retrieval using modified local binary patterns and morphological transform
582 -- 588Qaisar Abbas, Irene Fondón, Emre Celebi. A computerized system for detection of spiculated margins based on mammography
589 -- 596Kavitha Adhikesavan. An integrated approach for measuring semantic similarity between words and sentences using web search engine
597 -- 603Singaravelu Prabhu, Dharmaraj Tensing. Adapted normalized graph cut segmentation with boundary fuzzy classifier object indexing on road satellite images
604 -- 612Mohamed Ouda, Sameh A. Salem, Ihab Ali, El-Said Saad. Privacy-preserving data mining in homogeneous collaborative clustering
613 -- 619Saad Abid, Zhiyong Li, Renfa Li. Smelling the web olfactory display for web objects

Volume 12, Issue 5

415 -- 423Seyed H. Chavoshi, Bernard De Baets, Yi Qiang, Guy De Tré, Tijs Neutens, Nico Van de Weghe. A Qualitative Approach to the Identification, Visualisation and Interpretation of Repetitive Motion Patterns in Groups of Moving Point Objects
424 -- 430Mohideen Fatima Alias Niraimathi M, Seenivasagam. Comparison of Segmentation Algorithms by A Mathematical Model For Resolving Islands and Gulfs in Nuclei of Cervical Cell Images
431 -- 440Muthukumar Arunachalam, Kannan Subramanian. AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print
441 -- 447Soumia Belhadi, Nadjia Benblidia. Automated Retinal Vessel Segmentation Using Entropic Thresholding Based Spatial Correlation Histogram of Gray Level Images
448 -- 455Ahmed Zaafouri, Mounir Sayadi, Farhat Fnaiech. A Vision Approach for Expiry Date Recognition using Stretched Gabor Features
456 -- 464Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin. Optimum Threshold Parameter Estimation of Bidimensional Empirical Mode Decomposition Using Fisher Discriminant Analysis for Speckle Noise Reduction
465 -- 472Murtada Khalafallah Elbashir, Jianxin Wang. Kernel Logistic Regression Algorithm for Large-Scale Data Classification
473 -- 480Anupriya Elumalai, Sriman Narayana Iyengar. Adaptive Semantic Indexing Of Documents For Locating Relevant Information In P2P Networks
481 -- 488Abdul Shahid, Muhammad Tanvir Afzal, Muhammad Abdul Qadir. Lessons Learned: The Complexity of Accurate Identification of in-Text Citations
489 -- 493Fatemeh Boobord, Zalinda Othman, Azuraliza Abu Bakar. A WK-means Approach for Clustering
494 -- 502Razieh Baradaran, Behrouz Minaei-Bidgoli. Event Extraction from Classical Arabic Texts
503 -- 509Islam Elhalwany, Ammar Mohammed, Khaled T. Wassif, Hesham A. Hefny. Using Textual Case-based Reasoning in Intelligent Fatawa QA System
510 -- 517Al-Fahim Mubarak-Ali, Sharifah Mashita Syed-Mohamad, Shahida Sulaiman. Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer Approach

Volume 12, Issue 4

317 -- 324Kiruthika Subramanian, Preetha Gunasekaran, Mercy Selvaraj. Two layer defending mechanism against DDOS attacks
325 -- 332Jaseema Yasmin, Mohamed Sathik. An improved iterative segmentation algorithm using canny edge detector for skin lesion border detection
333 -- 339Muthukumaran Narayanaperumal, Ravi Ramraj. VLSI implementations of compressive image acquisition using block based compression algorithm
340 -- 345Yousof Farzaneh, Mahdi Azizi, Masoud Hadian Dehkordi, Abdolrasoul Mirghadri. Vulnerability analysis of two ultra lightweight RFID authentication protocols
346 -- 351Asma Kebbeb, Messaoud Mostefai, Fateh Benmerzoug, Youssef Chahir. Efficient multimodal biometric database construction and protection schemes
352 -- 359Arumugam Kunthavai, Somasundaram Vasantharathna, Swaminathan Thirumurugan. Pairwise sequence alignment using bio-database compression by improved fine tuned enhanced suffix array
360 -- 369Meng Han, Zhihai Wang, Jidong Yuan. Mining closed and multi-supports-based sequential pattern in high-dimensional dataset
370 -- 378Tao Li, Nanfeng Xiao. Solving QBF with heuristic small world optimization search algorithm
379 -- 388Hebat-Allah M. Ragab, Amany M. Sarhan, Al sayed A. H. Sallam, Reda A. Ammar. Balanced workload clusters for distributed object oriented software
389 -- 394Tahir Mustafa Madani, Muhammad Tahir, Sheikh Ziauddin, Syed Raza, Mirza Ahmed. An accelerometer-based approach to evaluate 3D unistroke gestures
395 -- 400Shazia Raj, Zobia Rehman, Sonia Rauf, Rehana Siddique, Waqas Anwar. An artificial neural network approach for sentence boundary disambiguation in urdu language text
401 -- 409Niraimathi Ponnusamy, Bhoopathy Krishnaswamy. Speed up of reindexing in adaptive particle swarm optimization
410 -- 414Kai Zhang, Jie Guan. Distinguishing attack on common scrambling algorithm

Volume 12, Issue 3

211 -- 219Rangan Kodandaram, Shashank Mallikarjun, Manikantan Krishnamuthan, Ramachandran Sivan. Face recognition using truncated transform domain feature extraction
220 -- 228T. M. Rajkumar, Mrityunjaya V. Latte. An efficient ROI Encoding Based on LSK and fractal image compression
229 -- 236Manoharan Subramanian, Sathappan Sathappan. An efficient content based image retrieval using advanced filter approaches
237 -- 245Khalid M. O Nahar, Husni Al-Muhtaseb, Wasfi G. Al-Khatib, Moustafa Elshafei, Mansour M. Alghamdi. Arabic phonemes transcription using data driven approach
246 -- 252Tzong-Chen Wu, Tzuoh-Yi Lin, Tzong-Sun Wu, Han-Yu Lin. Efficient english auction scheme without a secure channel
253 -- 260Preecha Somwang, Woraphon Lilakiatsakun. Anomaly traffic detection based on PCA and SFAM
261 -- 269Seif Mili, Djamel Meslati. Multi dimensional taxonomy of bio-inspired systems based on model driven architecture
270 -- 277Ehsan Ullah Munir, Samia Ijaz, Ali Nawaz Khan, Waqas Anwar, Wasif Nasir. Novel approaches for scheduling task graphs in heterogeneous distributed computing environment
278 -- 285Somayeh Abdi, Sayyed Hashemi. A hierarchical approach to improve job scheduling and data replication in data grid
286 -- 295Muhammad Khan, Muhammad Akram, Naveed Riaz. A comparative analysis of software protection schemes
296 -- 303Walaa Hassan Elashmawi, Jun Hu, Renfa Li. Stability coalition formation with cost sharing in multi-agent systems based on volume discount
304 -- 310Md. Zia Uddin, Deok-Hwan Kim, Tae-Seong Kim. A human activity recognition system using hmms with gda on enhanced independent component features
311 -- 316Emad Elabd, Eissa Alshari, Hatem Abdelkader. Semantic boolean arabic information retrieval

Volume 12, Issue 2

110 -- 117Sathishkumar Arthanari, Boopathy Bagank, Mohamedmoideen Mastan. Chaotic image encryption using modular addition and combinatorial techniques
118 -- 128Esther Perumal, Shanmugalakshmi Ramachandran. A multimodal biometric system based on palmprint and finger knuckle print recognition methods
129 -- 137Medhat Tawfeek, Ashraf El-Sisi, Arabi Keshk, Fawzy Torkey. Cloud task scheduling based on ant colony optimization
138 -- 145Seyed Sadatrasoul, Mohammad Gholamian, Kamran Shahanaghi. Combination of feature selection and optimized fuzzy apriori rules: the case of credit scoring
146 -- 154Sajjad Khan, Waqas Anwar, Xuan Wang, Usama Ijaz Bajwa. Template based affix stemmer for a morphologically rich language
155 -- 161Usha Subramaniam, Kuppuswami Subbaraya. A biometric based secure session key agreement using modified elliptic curve cryptography
162 -- 167Mohammad Javidi, Roghiyeh Hosseinpour Fard. Chaos genetic algorithm instead genetic algorithm
168 -- 174Afnan Alsolamy, M. Rizwan Jameel Qureshi. The proposal of a qualification based approach to teach software engineering course
175 -- 181Xingsi Xue, Yuping Wang, Weichen Hao. Optimizing ontology alignments by using NSGA-II
182 -- 188Sajid Ali Khan, Muhammad Nazir, Naveed Riaz Ansari, Muhammad Khan. Optimized features selection using hybrid PSO-GA for multi-view gender classification
189 -- 194Nazlia Omar, Roiss Alhutaish. Arabic text classification using k-nearest neighbour algorithm
195 -- 203Tao Peng 0003, Lu Liu, WanLi Zuo. Topical web crawling for domain-specific resource discovery enhanced by selectively using link-context
204 -- 210Safak Saraydemir, Necmi Taspinar, Osman Erogul, Hülya Kayserili. Effects of training set dimension on recognition of dysmorphic faces with statistical classifiers

Volume 12, Issue 1

1 -- 8Shanmugam Selvamuthukumaran, Shanmugasundaram Hariharan, Thirunavukarasu Ramkumar. Investigation on iris recognition system adopting cryptographic techniques
9 -- 16Ahmed Abu Hammad, Alaa El-Halees. An approach for detecting spam in arabic opinion reviews
17 -- 23Preethi Harris, Nedunchezhian Raju. A greedy approach for coverage-based test suite reduction
24 -- 31Souad Amira-Biad, Toufik Bouden, Mokhtar Nibouche, Ersin Elbasi. A bi-dimensional empirical mode decomposition based watermarking scheme
32 -- 41Ibrar Hussain, Aasia Khanum, Abdul Qudus Abbasi, Muhammad Younus Javed. A novel approach for software architecture recovery using particle swarm optimization
42 -- 52Selvaraj Damodharan, Dhanasekaran Raghavan. Combining tissue segmentation and neural network for brain tumor detection
53 -- 59Sanam Noor, Shariq Bashir. Evaluating bias in retrieval systems for recall oriented documents retrieval
60 -- 68Faisal Shahzad, Sohail Asghar, Khalid Usmani. A fuzzy based scheme for sanitizing sensitive sequential patterns
69 -- 76Seyyed Amir Asghari, Hassan Taheri. An effective soft error detection mechanism using redundant instructions
77 -- 85Sana Nouzri, Abdelaziz El Fazziki. A mapping from bpmn model to JADEX model
86 -- 93Noureddine Aloui, Chafik Barnoussi, Adnane Cherif. New algorithm for QMF banks design and its application in speech compression using DWT
94 -- 103Shiva Vafadar, Ahmad Barfourosh. Towards intelligence engineering in agent-based systems
104 -- 109Tauseef Gulrez, Abdullah Al-Odienat. A new perspective on principal component analysis using inverse covariance