The International Arab Journal of Information Technology, Volume 9 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
⚠
Please note that none of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries won't return any results.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 9, Number 1, January 2012

Mala Chelliah, Siddhartha Sankaran, Shishir Prasad, Nagamaputhur Gopalan, Balasubramanian Sivaselvan:
Routing for wireless mesh networks with multiple constraints using fuzzy logic. 1-8
Abdul Nasir Khan, Kalim Qureshi, Sumair Khan:
An intelligent approach of sniffer detection. 9-15
Adwan Abdelfattah, Aiman Abu Samra:
Least recently plus five least frequently replacement policy (LR+5LF). 16-21
Mohammed Awad:
Approximating i/o data using wavelet neural networks: control the position of mother wavelet. 22-29
Najib Kofahi, Ahmed Abusalama:
A framework for distributed pattern matching based on multithreading. 30-38
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, Choong Seon Hong:
Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs. 39-48
Nasrul Humaimi Mahmood, Camallil Omar, Tardi Tjahjadi:
Multiviews reconstruction for prosthetic design. 49-55
Dhuha Albazaz:
Design a mini-operating system for mobile phone. 56-65
Kuljit Kaur Chahal, Hardeep Singh:
An investigation of design level class cohesion metrics. 66-73
Zulaikha Beevi, Mohamed Sathik:
A robust segmentation approach for noisy medical images using fuzzy clustering with spatial probability. 74-83
Mohammad Abd-Alrahman Mahmoud Abushariah, Raja Noor Ainon, Roziati Zainuddin, Moustafa Elshafei, Othman Omran Khalifa:
Arabic speaker-independent continuous automatic speech recognition based on a phonetically rich and balanced speech corpus. 84-93
Feras Hanandeh, Mutaz Khazaaleh, Hamidah Ibrahim, Rohaya Latip:
CFS: a new dynamic replication strategy for data grids. 94-99
Nijad Al-Najdawi, Sara Tedmori, Eran A. Edirisinghe, Helmut E. Bez:
An automated real-time people tracking system based on KLT features detection. 100-107
Volume 9, Number 2, March 2012

Ahmad T. Al-Taani, Mohammed M. Msallam, Sana A. Wedian:
A top-down chart parser for analyzing arabic sentences. 109-116
Fadoua Bouafif Samoud, Samia Snoussi Maddouri, Noureddine Ellouze:
A hybrid method for three segmentation level of handwritten arabic script. 117-123
Saeed Farzi:
The design of self-organizing evolved polynomial neural networks based on learnable evolution model 3. 124-132
Raed Almomani, Ismail Ababneh:
Communication overhead in non-contiguous processor allocation policies for 3D mesh-connected multicomputers. 133-141
Khaled Abd El Salam, Mahmoud Maree, Gamal AbdElAzeem:
Low latency handoff by integrating pre-registration with MIFA "PRE-MIFA". 142-147
Shahaboddin Shamshirband:
A distributed approach for coordination between traffic lights based on game theory. 148-153
Saurabh Mehta, Kyungsup Kwak:
WPAN MAC protocol: designing and analysis with different ACK policies. 154-162
Khaled M. Alallayah, Alaa H. Alhamami, Waiel AbdElwahed, Mohamed Amin:
Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. 163-169
Tinghuai Ma, Donghai Guan, Sungyoung Lee, Hao Cao:
An efficient distributed weather data sharing system based on agent. 170-178
Ayad R. Abbas, Juan Liu:
Designing an intelligent recommender system using partial credit model and bayesian rough set. 179-187
Rashid A. Saeed:
System design and implementation of TDMA-based WiFi network. 188-193
Fatima Meskine, Safia Nait Bahloul:
Privacy preserving k-means clustering: a survey research. 194-200
Volume 9, Number 3, May 2012

Jatinder Singh, Lakhwinder Kaur, Savita Gupta:
A cross-layer based intrusion detection technique for wireless networks. 201-207
Barjesh Kochar, Rajender Singh Chhillar:
An effective data warehousing system for RFID using novel data cleaning, data transformation and loading techniques. 208-216
Nadia Baha Touzene, Slimane Larabi:
Neural disparity map estimation from stereo image. 217-224
Abbas Hasan Kattoush:
A novel radon-wavelet-based multi-carrier code division multiple access transceiver design and simulation under different channel conditions. 225-234
Shadi A. Aljawarneh, Abdullah A. Alhaj:
Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems. 235-242
Zakaria Laboudi, Salim Chikhi:
Comparison of genetic algorithm and quantum genetic algorithm. 243-249
Zobia Rehman, Waqas Anwar:
A hybrid approach for urdu sentence boundary disambiguation. 250-255
Hanan Elazhary:
Facile programming. 256-261
Thulasimani Lakshmanan, Muthusamy Madheswaran:
A novel secure hash algorithm for public key digital signature schemes. 262-267
Khaled Alghathbar:
Representing access control policies in use case. 268-275
Shu-Fen Tu, Ching-Sheng Hsu:
A joint ownership protection scheme for digital images based on visual cryptography. 276-283
Lo'ai Ali Tawalbeh, Yaser Jararweh, Abidalrahman Mohammad:
An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications. 284-290
Rajaram Ayyasamy, Palaniswami Subramani:
An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks. 291-298
Volume 9, Number 4, July 2012

Govindaswamy Kalpana, Muthusamy Punithavalli:
Reliable broadcasting using efficient forward node selection for mobile ad-hoc networks. 299-305
Saeed Farzi:
Training of fuzzy neural networks via quantum-behaved particle swarm optimization and rival penalized competitive learning. 306-313
Faisal Alzyoud, Tat Chee Wan:
The effect of using p-xcast routing protocol on many-to-many applications. 314-321
Shanmugasundaram Hariharan:
Automatic plagiarism detection using similarity analysis. 322-326
Alina Barbulescu, Elena Bautu:
A hybrid approach for modeling financial time series. 327-335
Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Abdullah, Mohammad Yazid Bin Idris:
Intrinsic authentication of multimedia objects using biometric data manipulation. 336-342
Basem Alijla, Kathrein Kwaik:
Oiahcr: online isolated arabic handwritten character recognition using neural network. 343-351
Majed Al Yahya, Rodina Binti Ahmad, Sai Peck Lee:
Impact of cmmi-based process maturity levels on effort, productivity and diseconomy of scale. 352-360
Maizatul Akmar Ismail, Mashkuri Yaacob, Sameem Abdul Kareem, Fariza Nasaruddin, Noorhidawati Abdullah:
Support system for novice researchers (ssnr): usability evaluation of the first use. 361-367
Mohamad Ababneh, Riyad Al-Shalabi, Ghassan Kanaan, Alaa Al-Nobani:
Building an effective rule-based light stemmer for arabic language to improve search effectiveness. 368-372
Zibouda Aliouat, Makhlouf Aliouat:
Verification of cooperative transient fault diagnosis and recovery in critical embedded systems. 373-381
Md. Hasanul Kabir, Taskeed Jabid, Oksam Chae:
Local directional pattern variance (ldpv): a robust feature descriptor for facial expression recognition. 382-391
Lip Yee Por, Sim Ying Ong, Delina Beh Yin, Maizatul Akmar Ismail:
A grid enabled e-theses and dissertations repository system. 392-401
Volume 9, Number 5, September 2012

Jyh-Horng Jeng, Shuo-Li Hsu, Yukon Chang:
Entropy improvement for fractal image coder. 403-410
Mohammad Osiur Rahman, Aini Hussain, Noor Ezlin Ahmad Basri, Hassan Basri, Edgar Scavino:
Chromaticity based waste paper grade identification. 411-417
Misbah Jadoon, Sajjad Ahmad Madani, Khizar Hayat, Stefan Mahlknecht:
Location and non-location based ad-hoc routing protocols under various mobility models: a comparative study. 418-427
Sonia Mammeri, Rachid Beghdad:
On handling real-time communications in mac protocols. 428-435
Masood Mansoori, Omar Zakaria, Abdullah Gani:
Improving exposure of intrusion deception system through implementation of hybrid honeypot. 436-444
Rajkumar Ramaswamy, Vasuki Arumugam:
Lossless data hiding based on histogram modification. 445-451
Jehad Alnihoud:
Content-based image retrieval system based on self organizing map, fuzzy color histogram and subtractive fuzzy clustering. 452-458
Bachir Boucheham:
PLA data reduction for speeding up time series comparison. 459-464
Zakaria Elberrichi, Karima Abidi:
Arabic text categorization: a comparative study of different representation modes. 465-470
Sara Tedmori, Nijad Al-Najdawi:
Lossless image cryptography algorithm based on discrete cosine transform. 471-478
Farag Ahmed, Andreas Nürnberger:
Literature review of interactive cross language information retrieval tools. 479-486
Fahd Mohsen, Mohiy M. Hadhoud, Kamel Moustafa, Khalid Ameen:
A new image segmentation method based on particle swarm optimization. 487-493
Volume 9, Number 6, November 2012

Yasir Abdelgadir Mohamed:
I2MANET Security Logical Specification Framework. 495-503
Eiad Yafi, Ahmed Sultan Al-Hegami, Mohd. Afshar Alam, Ranjit Biswas:
YAMI: Incremental Mining of Interesting Association Patterns. 504-510
Tien-Dung Nguyen, Eui-Nam Huh:
A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems. 511-519
Mohammed Ouali, Holger Lange, Kheireddine Bouazza:
A Markov Random Field Model and Method to Image Matching. 520-528
Guang Li, Yadong Wang:
A Privacy-Preserving Classification Method Based on Singular Value Decomposition. 529-534
Sanjay Misra, Ferid Cafer:
Estimating Quality of JavaScript. 535-543
Zouhaier Brahmia, Mohamed Mkaouar, Salem Chakhar, Rafik Bouaziz:
Efficient Management of Schema Versioning in Multi-Temporal Databases. 544-552
Qiong Pu, Shuhua Wu:
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks. 553-561
Muhammad Sharif, Sajjad Mohsin, Muhammad Younas Javed, Muhammad Atif Ali:
Single Image Face Recognition Using Laplacian of Gaussian and Discrete Cosine Transforms. 562-570
Ahmed Khorsi:
Effective Unsupervised Arabic Word Stemming: Towards an Unsupervised Radicals Extraction. 571-577
Ala'a Al-zoubi, Mohammad Al-zoubi:
Automatic Mapping of MPEG-7 Descriptions to Relational Database. 578-587
Leila Chergui, Maâmar Kef, Salim Chikhi:
Combining Neural Networks for Arabic Handwriting Recognition. 588-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:








