The International Arab Journal of Information Technology, Volume 7 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
⚠
Please note that none of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries won't return any results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 7, Number 1, January 2010

Hilal Adnan Fadhil, Syed Alwee Aljunid, Badlished Ahmed:
Performance of OCDMA Systems Using Random Diagonal Code for Different Decoders Architecture Schemes. 1-5
Mohammed Awad:
Input Variable Selection Using Parallel Processing of RBF Neural Networks. 6-13
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, Kuldip Singh:
DDoS Incidents and their Impact: A Review. 14-20
Amer Draa, Souham Meshoul, Hichem Talbi, Mohamed Batouche:
A Quantum-Inspired Differential Evolution Algorithm for Solving the N-Queens Problem. 21-27
Abdelkader Dekdouk:
Ontology-Based Intelligent Mobile Search Oriented to Global e-Commerce. 28-33
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin:
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information. 34-38
Sohil Shah, Preethi Venkatesan, Deepa Sundar, Muniandi Kannan:
Low Latency, High Throughput, and Less Complex VLSI Architecture for 2D-DFT. 39-44
Muhammad Islam, Mohsin Ali, Ali Al-Mamun, Motaharul Islam:
Semiotics Explorations on Designing the Information Intensive Web Interfaces. 45-54
Jehad Alnihoud, Rami Mansi:
An Enhancement of Major Sorting Algorithms. 55-62
Bassam Haddad, Ahmad Awwad:
Representing Uncertainty in Medical Knowledge: An Interval Based Approach for Binary Fuzzy Relations. 63-69
Anis Boudabous, Ahmed Ben Atitallah, Lazhar Khriji, Patrice Kadionik, Nouri Masmoudi:
HW/SW Design-Based Implementation of Vector Median Rational Hybrid Filter. 70-74
Kiran Sree, Ramesh Babu:
Identification of Promoter Region in Genomic DNA Using Cellular Automata Based Text Clustering. 75-78
Hatem Abdul-Kader, Warda El Kholy:
Modelling of Updating Moving Object Database Using Timed Petri Net Model. 79-85
Faiza Bouchoul, Mohamed Mostefai:
Specification and Prototyping of Reactive Distributed Systems with Algebraic Term Nets. 86-95
Imen Werda, Haithem Chaouch, Amine Samet, Mohamed Ali Ben Ayed, Nouri Masmoudi:
Optimal DSP Based Integer Motion Estimation Implementation for H.264/AVC Baseline Encoder. 96-104
Volume 7, Number 2, April 2010

Mohammed Refai, Ahmad Abdel-Aziz Sharieh, Fahad Alshammari:
Leader Election Algorithm in 2D Torus Networks with the Presence of One Link Failure. 105-114
Adel Lahsasna, Raja Noor Ainon, Ying Wah Teh:
Credit Scoring Models Using Soft Computing Methods: A Survey. 115-123
Bashar Al-Khalifa:
A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs. 124-128
Majed Al Yahya, Rodina Binti Ahmad, Sai Peck Lee:
Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation. 129-137
Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, Kyung Sup Kwak:
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects. 138-145
Nasser Hamad:
Hiding Text Information in a Digital Image Based on Entropy Function. 146-151
Ashraf El-Sisi:
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database. 152-160
Rami Mansi:
Enhanced Quicksort Algorithm. 161-166
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bouchiha:
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach. 167-176
Lotfi Salhi, Talbi Mourad, Adnane Cherif:
Voice Disorders Identification Using Multilayer Neural Network. 177-185
Rami Mansi:
A New Algorithm for Sorting Small Integers. 186-191
Mohammed Al-Zoube, Baha Khasawneh:
A Data Mashup for Dynamic Composition of Adaptive Courses. 192-198
Mohamad Awad:
An Unsupervised Artificial Neural Network Method for Satellite Image Segmentation. 199-205
Anis Boudabous, Lazhar Khriji, Nouri Masmoudi:
Implementation of Vector Directional Distance Rational Hybrid Filter Using TMS320C6416. 206-212
Nawrès Khalifa, Said Ettaeib, Yosra Wahabi, Kamel Hamrouni:
Left Ventricle Tracking in Isotopic Ventriculography Using Statistical Deformable Models. 213-222
Volume 7, Number 3, July 2010

Abdelhamid Abdesselam, Hui Hui Wang, Narayanan Kulathuramaiyer:
Spiral Bit-string Representation of Color for Image Retrieval. 223-230
Kamel Faraoun:
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. 231-240
Animesh Adhikari, Pralhad Ramachandrarao, Bhanu Prasad, Jhimli Adhikari:
Mining Multiple Large Data Sources. 241-249
Hichem Chaker, Sidi Mohammed Meriah, Fethi Tarik Bendimerad:
Synthesis of Multibeam Antennas Arrays with a Modified Particle Swarm Optimization Algorithm. 250-255
Rawya Rizk:
Uplink Downlink Limited Round Robin Scheduling Algorithms. 256-263
Elmustapha Ait Lmaati, Ahmed El Oirrak, Mohammed Najib Kaddioui, Abdellah Ait Ouahman, Mohammed Sadgal:
3D Model Retrieval Based on 3D Discrete Cosine Transform. 264-270
Elnumeri A. Zanaty, Sultan Alaljahdali:
Improving Fuzzy Algorithms for Automatic Magnetic Resonance Image Segmentation. 271-279
Basil Al-Kasasbeh, Rafa Al-Qutaish, Mohammad Muhairat:
Innovative Algorithms for the Header Processing Transition from IPv4 to IPv6 and Vice Versa. 280-288
Lubna Badri:
Development of Neural Networks for Noise Reduction. 289-294
Latifa Baba-hamed:
Mediation Queries Adaptation After the Removal of a Data Source. 295-301
Dilip Kumar, Ram Patel, Trilok Chand Aseri:
Prolonging Network Lifetime and Data Accumulation in Heterogeneous Sensor Networks. 302-309
Jalal Atoum, Mamoun Al Rababaa:
Multiple Warehouses Scheduling Using Steady State. Genetic Algorithms. 310-316
Md. Saiful Islam, Muhammad Mahbubur Rahman, Zerina Begum, Mohd. Zulfiquar Hafiz:
Realization of a Novel Fault Tolerant Reversible Full Adder Circuit in Nanotechnology. 317-323
Alaa Al-Hamami, Hisham Al-Rashdan:
Improving the Effectiveness of the Color Coherence Vector. 324-332
Pooria Varahram, Somayeh Mohammady, Mohd Hamidon, Roslina Mohd Sidek, Sabira Khatun:
Complex Gain Predistortion in WCDMA Power Amplifiers with Memory Effects. 333-341
Volume 7, Number 4, October 2010

Mohd Ismail:
Measurement of V2oIP over wide area network between countries using soft phone and USB phone. 343-348
Abdelmalek Amine, Zakaria Elberrichi, Michel Simonet:
Evaluation of text clustering methods using wordnet. 349-357
Ali Al-Ataby, Fawzi M. Al-Naima:
A modified high capacity image steganography technique based on wavelet transform. 358-364
Khaled M. Alallayah, Mohamed Amin, Waiel F. Abd El-Wahed, Alaa H. Alhamami:
Attack and construction of simulator for some cipher systems using neuro-Identifier. 365-372
Mujahid Al-Azzo, Lubna Badri:
Multilayer neural network-burg combination for acoustical detection of buried objects. 373-379
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh, Mohammad Saleh:
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF. 380-387
Lamia Bouafif, Kaïs Ouni, Noureddine Ellouze:
Implementation of a speech coding strategy for auditory implants. 388-394
Sanam Shahla Rizvi, Tae-Sun Chung:
JAM: justifiable allocation of memory with efficient mounting and fast crash recovery for NAND flash memory file systems. 395-402
Md. Hasanul Kabir, Mohammad Abdullah-Al-Wadud, Oksam Chae:
Brightness preserving image contrast enhancement using weighted mixture of global and local transformation functions. 403-410
Muhammad Matondang, Habibollah Haron:
Hybrid computing algorithm in representing solid model. 411-418
Abbas Hasan Kattoush:
A novel radon-wavelet based OFDM system design and performance under different channel conditions. 419-427
Sawsan Abu-Taleb, Hossam Mustafa:
Improving web services security models. 428-434
Shafiullah Khan, Kok-Keong Loo, Zia Ud Din:
Framework for intrusion detection in IEEE 802.11 wireless mesh networks. 435-440
Shaker K. Ali, Beiji Zou, Abbas Ali:
An algorithm for diagnosis of the three kinds of constitutional jaundice. 441-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:








