Archived Papers for Journal
The International Arab Journal of Information Technology >>
Vol.12, No.5
Publisher: Zarqa Private University
Publishing Date: 2015-09-01
- A Qualitative Approach to the Identification, Visualisation and Interpretation of Repetitive Motion Patterns in Groups of Moving Point ObjectsAuthors: Seyed Chavoshi; Bernard De Baets; Yi Qiang; Guy De Tré; Tijs Neutens; Nico Van de Weghe
- Comparison of Segmentation Algorithms by a Mathematical Model for Resolving Islands and Gulfs in Nuclei of Cervical Cell ImagesAuthors: Mohideenfatima Niraimathi; Seenivasagam Vellaichamy
- AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle PrintAuthors: Muthukumar Arunachalam; Kannan Subramanian
- Automated Retinal Vessel Segmentation using Entropic Thresholding Based Spatial Correlation Histogram of Gray Level ImagesAuthors: Soumia Belhadi; Nadjia Benblidia
- A Vision Approach for Expiry Date Recognition using Stretched Gabor FeaturesAuthors: Ahmed Zaafouri; Mounir Sayadi; Farhat Fnaiech
- Optimum Threshold Parameter Estimation of Bidimensional Empirical Mode Decomposition Using Fisher Discriminant Analysis for Speckle Noise ReductionAuthors: Mohammad-Motiur Rahman; Mithun-Kumar Pk; Mohammad-Shorif Uddin
- Kernel Logistic Regression Algorithm for LargeScale Data ClassificationAuthors: Murtada Elbashir; Jianxin Wang
- Adaptive Semantic Indexing of Documents for Locating Relevant Information in P2P NetworksAuthors: Anupriya Elumalai; Sriman Narayana
- Lessons Learned: The Complexity of Accurate Identification of in-Text CitationsAuthors: Abdul Shahid; Muhammad Tanvir Afzal; Muhammad Abdul Qadir
- A WK-Means Approach for ClusteringAuthors: Fatemeh Boobord; Zalinda Othman; Azuraliza Abu Bakar
- Event Extraction from Classical Arabic TextsAuthors: Razieh Baradaran; Behrouz Minaei-Bidgoli
- Using Textual Case-based Reasoning in Intelligent Fatawa QA SystemAuthors: Islam Elhalwany; Ammar Mohammed; Khaled Wassif; Hesham Hefny
- Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer ApproachAuthors: Al-Fahim Mubarak-Ali; Sharifah Syed-Mohamad; Shahida Sulaiman