The International Arab Journal of Information Technology, Volume 11 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
⚠
Please note that only 1% of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries will most likely return poor results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 11, Number 1, January 2014

Aisha Azeem, Muhammad Sharif, Mudassar Raza, Marryam Murtaza:
A survey: face recognition techniques under partial occlusion. 1-10
Karim Kalti, Mohamed Ali Mahjoub:
Image segmentation by gaussian mixture models and modified FCM algorithm. 11-18
Rytis Maskeliunas:
The evaluation of spoken dialog management models for multimodal HCIs. 19-24
Chao Zuo, Qian Chen, Xiubao Sui, Jianle Ren:
Brightness preserving image contrast enhancement using spatially weighted histogram equalization. 25-32
Bhawna Mallick, Deepak Garg, P. S. Grover:
Constraint-based sequential pattern mining: a pattern growth algorithm incorporating compactness, length and monetary. 33-42
Habib Mahi, Hadria Isabaten, Chahira Serief:
Zernike moments and svm for shape classification in very high resolution satellite images. 43-51
Kanokwan Kanyamee, Chanboon Sathitwiriyawong:
High-availability decentralized cryptographic multi-agent key recovery. 52-58
Devangkumar Shah, Chandresh Vithlani:
VLSI-oriented lossy image compression approach using DA-based 2D-discrete wavelet. 59-68
Sofien Gannouni, Mutaz Beraka, Hassan Mathkour:
A critical comparison for data sharing approaches. 69-77

Yaser A. Al-Lahham
, Mohammad A. Hassan
:
Scalable self-organizing structured P2P information retrieval model based on equivalence classes. 78-86

Faisal Ahmed, Md. Hasanul Kabir, Shayla Bhuyan, Hossain Bari, Emam Hossain:
Automated weed classification with local pattern-based texture descriptors. 87-94
Shyam Lal, Mahesh Chandra:
Efficient algorithm for contrast enhancement of natural images. 95-102
Nattha Phiwma, Parinya Sanguansat:
An improved feature extraction and combination of multiple classifiers for query-by-humming. 103-110
Volume 11, Number 2, March 2014

Dongfu Xie:
Simplified algorithm and hardware implementation for the (24, 12, 8) extended golay soft decoder up to 4 errors. 111-115
Faten F. Kharbat, Mohammed Odeh, Larry Bull:
A new hybrid architecture for the discovery and compaction of knowledge: breast cancer datasets case study. 116-123
Sanjay T. Singh, Trimbak R. Sontakke:
An effective mechanism to neutralize the semantic gap in content based image retrieval (CBIR). 124-133
Saed Alqaraleh, Omar Ramadan:
Elimination of repeated occurrences in multimedia search engines. 134-139
Shubair Abdulla, Sureswaran Ramadass, Altyeb Altaher Altyeb, Amer Al-Nassiri:
Employing machine learning algorithms to detect unknown scanning and email worms. 140-148
Marryam Murtaza, Muhammad Sharif, Mudassar Raza, Jamal Hussain Shah:
Face recognition using adaptive margin fisher's criterion and linear discriminant analysis (AMFC-LDA). 149-158
Sivasubramaniam Nandhini, Senniappan Palaniammal:
Enhanced core stateless fair queuing with multiple queue priority scheduler. 159-167
Murugappan Ilango, Vasudev Mohan:
PCFA: mining of projected clusters in high dimensional data using modified FCM algorithm. 168-177
Saeed Amirgholipour Kasmani, Aboosalh Mohammad Sharifi:
A pre-filtering method to improve watermark detection rate in DCT based watermarking. 178-185
Kalli Srinivasa Nageswara Prasad, S. Ramakrishna:
An efficient traffic forecasting system based on spatial data and decision trees. 186-194
Faisal Ahmed, Hossain Bari, Emam Hossain:
Person-independent facial expression recognition based on compound local binary pattern (CLBP). 195-203
Majid Masoumi, Shervin Amiri:
Content protection in video data based on robust digital watermarking resistant to intentional and unintentional attacks. 204-212
Baraa T. Sharef, Nazlia Omar, Zeyad T. Sharef:
An automated arabic text categorization based on the frequency ratio accumulation. 213-221
Volume 11, Number 3, May 2014

Chaobang Gao, Jiliu Zhou, Weihua Zhang:
Edge detection based on the newton interpolation's fractional differentiation. 223-228
Leonardo Reis, Luis Aguiar, Darío Baptista, Fernando Morgado Dias:
A software tool for automatic generation of neural hardware. 229-235
Yuhanis Yusof, Zuriani Mustaffa:
LSSVM parameters tuning with enhanced artificial bee colony. 236-242
Khalid M. Hosny:
Fast computation of accurate pseudo zernike moments for binary and gray-level images. 243-249
Haneen Talal Jasim, Kais Ismail Ibraheem, Abdul Ghafoor Jasim Salim:
A hybrid algorithm to forecast enrolment based on genetic algorithms and fuzzy time series. 250-257
Fazal-e-Malik, Baharum Baharudin:
Effective image retrieval based on an experimental combination of texture features and comparison of different histogram quantizations in the DCT domain. 258-267
Kun Gao, Qin Wang, Lifeng Xi:
Reduct algorithm based execution times prediction in knowledge discovery cloud computing environment. 268-275
Addepalli V. N. Krishna:
Time stamp based ECC encryption and decryption. 276-280
Khairullah Khan, Baharum Baharudin, Aurangzeb Khan:
Identifying product features from customer reviews using hybrid patterns. 281-286
Phichhang Ou, Hengshan Wang:
Volatility modelling and prediction by hybrid support vector regression with chaotic genetic algorithms. 287-292
Fayçal Ykhlef, Messaoud Bensebti:
Comparative performance study of several features for voiced/ non-voiced classification. 293-299
Sotiris B. Kotsiantis:
Integrating global and local application of naive bayes classifier. 300-307
Hui Hui Wang, Dzulkifli Mohamad, Nor Azman Ismail:
An efficient parameters selection for object recognition based colour features in traffic image retrieval. 308-314
Volume 11, Number 4, July 2014

Han-Yu Lin:
Toward secure strong designated verifier signature scheme from identity-based system. 315-321
Arumugam Sakthivel, Raju Nedunchezhian:
Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. 322-328
Bacha Rehman, Zahid Halim, Mushtaq Ahmad:
ASCII based GUI system for arabic scripted languages: a case of urdu. 329-337
Sarra Senhadji, Salim Khiat, Hafida Belbachir:
Association rule mining and load balancing strategy in grid systems. 338-344
Fatiha Barigou, Bouziane Beldjilali, Baghdad Atmani:
Using cellular automata for improving knn based spam filtering. 345-353
Mehdi Sadeghi, Keivan Maghooli, Mohammad Shahram Moein:
Using artificial immunity network for face verification. 354-361
Muhammad Tahir, Tahir Mustafa Madani, Sheikh Ziauddin, Muhammad Arshad Awan, Waqar Hussain Rana:
Wiimote squash: comparing DTW and WFM techniques for 3D gesture recognition. 362-369
Abdel Karim Al Tamimi, Manar Jaradat, Nuha Al-Jarrah, Sahar Ghanem:
AARI: automatic arabic readability index. 370-378
ShiNing Li, Zhenhai Zhang, Jiaqi Duan:
An ensemble multi-label feature selection algorithm based on information entropy. 379-386
Chouaib Moujahdi, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul, Mohammed Rziza:
Inter-communication classification for multi-view face recognition. 387-395
Marwan Akeel, Ravi Mishra:
ANN and rule based method for english to arabic machine translation. 396-405
Bassam Rajabi, Sai Peck Lee:
Consistent integration between object oriented and coloured petri nets models. 406-415
Aymen Chaabouni, Houcine Boubaker, Monji Kherallah, Haikal El Abed, Adel M. Alimi:
Static and dynamic features for writer identification based on multi-fractals. 416-424
Volume 11, Number 5, September 2014

Chien-Lung Hsu, Han-Yu Lin:
Universal forgery attack on a strong designated verifier signature scheme. 425-428
Rattan Rana, Deepak Garg:
Anticipatory bound selection procedure (ABSP) for vertex K-center problem 0. 429-436
Geeta Nagpal, Moin Uddin, Arvinder Kaur:
Grey relational effort analysis technique using regression methods for software estimation. 437-446
Valliammal Narayan, Geethalakshmi Subbarayan:
An optimal feature subset selection using GA for leaf classification. 447-451
Tsui-Ping Chang:
Mining frequent user query patterns from XML query streams. 452-458
Muhammad Naeem, Sohail Asghar:
An information theoretic scoring function in belief network. 459-467
Hizmawati Madzin, Roziati Zainuddin, Nursabirin Mohamed:
Analysis of visual features in local descriptor for multi-modality medical image. 468-475
Slami Saadi, Abderrezak Guessoum, Maamar Bettayeb, M. K. Abdelhafidi:
Blind restoration of radiological images using hybrid swarm optimized model implemented on FPGA. 476-486
Nima Sahba, Keivan Maghooli, Vahid Tavakoli:
An optimized method for B-mode echocardiographic video compression based on motion estimation and wavelet. 487-492
Hocheol Jeon:
A reference comments crawler for assisting research paper writing. 493-499
Qais Qassim, Ahmed Patel, Abdullah Mohd Zin:
Strategy to reduce false alarms in intrusion detection and prevention systems. 500-506
Zaini Arifah Othman, Nor Aniza Abdullah, Zaidi Razak, Mohd. Yakub Zulkifli Bin Mohd. Yusoff:
Speech to text engine for jawi language. 507-513
Ramzi A. Haraty, Abdul Nasser El-Kassar, Suzan Fanous:
Hardening the elgamal cryptosystem in the setting of the second group of units. 514-520
Volume 11, Number 6, November 2014

Ramzi A. Haraty, Bassam Zantout:
Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-Based Approach. 526-531
Abd El-Aziz Abd El-Aziz, Arputharaj Kannan:
XML access control: mapping XACML policies to relational database tables. 532-539
Mohammad Anagreh, Azman Samsudin, Mohd. Adib Omar:
Parallel method for computing elliptic curve scalar multiplication based on MOF. 521-525
Khalid Suliman Al-Tahat:
An innovative instructional method for teaching object-oriented modelling. 540-549
Ellips Masehian, Hossein Akbaripour, Nasrin Mohabbati-Kalejahi:
Solving the n-queens problem using a tuned hybrid imperialist competitive algorithm. 550-559
Mohammad Ababneh, Salama Hassan, Sulieman Bani-Ahmad:
On static scheduling of tasks in real time multiprocessor systems: an improved GA-based approach. 560-572
Mohammad Motiur Rahman, Mithun Kumar PK, Mohammad Shorif Uddin:
Optimum threshold parameter estimation of wavelet coefficients using fisher discriminant analysis for speckle noise reduction. 573-581
Almas Abbasi, Woo Chaw Seng, Imran Shafiq Ahmad:
Multi block based image watermarking in wavelet domain using genetic programming. 582-589
Atta-ur-Rahman, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, Muhammad Tahir Naseem:
A real time adaptive resource allocation scheme for OFDM systems using GRBF-neural networks and fuzzy rule base system. 590-598
Hossein Abbasimehr, Mostafa Setak, Mohammad Jafar Tarokh:
A comparative assessment of the performance of ensemble learning in customer churn prediction. 599-606
Dhuha Basheer Abdullah, Seddeeq Albana:
Developing an appliance real time control in heterogeneous operating systems. 607-615
Mohiadeen Abdul Kadhar:
A deadlock-free dynamic reconfiguration protocol for distributed routing on interconnection networks. 616-622
Weiwei Han:
A provably secure public key encryption scheme based on isogeny star. 623-627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







