ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

The International Arab Journal of Information Technology >>

Vol.13, No.4

Publisher: Zarqa Private University

Publishing Date: 2016-07-01

  1. An Innovative Two-Stage Fuzzy kNN-DST Classifier for Unknown Intrusion Detection

    Authors: Xueyan Jing; Yingtao Bi; Hai Deng

  2. Arabic/Farsi Handwritten Digit Recognition using Histogram of Oriented Gradient and Chain Code Histogram

    Authors: Seyyed Khorashadizadeh; Ali Latif

  3. Task Scheduling Using Probabilistic Ant Colony Heuristics

    Authors: Umarani Srikanth; Uma Maheswari; Shanthi Palaniswami; Arul Siromoney

  4. Threshold-based Steganography: A Novel Technique for Improved Payload and SNR

    Authors: Zakir Khan; Mohsin Shah; Muhammad Naeem; Toqeer Mahmood; Shah Khan; Noor Ul Amin; Danish Shahzad

  5. Control and Management of Coal Mines with Control Information Systems

    Authors: Miroljub Grozdanovic; Dobrivoje Marjanovic; Goran Janackovic

  6. Selectivity Estimation of Range Queries in Data Streams using Micro-Clustering

    Authors: Sudhanshu Gupta; Deepak Garg

  7. Efficient Parallel Compression and Decompression for Large XML Files

    Authors: Mohammad Ali; Minhaj Ahmad Khan

  8. Illicit Material Detection using Dual-Energy X-Ray Images

    Authors: Reza Hassanpour

  9. Parameters Affecting the Judgment Task While Summarizing Documents

    Authors: Syed Sabir Mohammed; Shanmugasundaram Hariharan

  10. A Novel Fast Otsu Digital Image Segmentation Method

    Authors: Duaa AlSaeed; Ahmed Bouridane; Ali El-Zaart

  11. Hyperspectral Image Compression Based on DWT and TD with ALS Method

    Authors: Kala Rajan; Vasuki Murugesan

  12. Biometric Cryptosystems based Fuzzy Commitment Scheme: A Security Evaluation

    Authors: Maryam Lafkih; Mounia Mikram; Sanaa Ghouzali; Mohamed El Haziti; Driss Aboutajdine

  13. HMM/GMM Classification for Articulation Disorder Correction among Algerian Children

    Authors: Abed Ahcène; Guerti Mhania

  14. An Approach to Automatic Reconstruction of Apictorial Hand Torn Paper Document

    Authors: Rayappan Lotus; Justin Varghese; Subash Saudia

  15. On Demand Ciphering Engine Using Artificial Neural Network

    Authors: Qutaiba Ali; Shefa Dawwd

  16. Securing RSA Algorithm against Timing Attack

    Authors: Amuthan Arjunan; Praveena Narayanan; Kaviarasan Ramu