Archived Papers for Journal
The International Arab Journal of Information Technology >>
Vol.15, No.2
Publisher: Zarqa Private University
Publishing Date: 2018-03-01
- Idle Time Estimation for Bandwidth-Efficient Synchronization in Replicated Distributed File SystemAuthors: Fidan Kaya Gülağız; Süleyman Eken; Adnan Kavak; Ahmet Sayar
- Image Processing in Differential Digital Holography (DDH)Authors: Kresimir Nenadic Tomislav Galba; Irena Galic
- An Optimized Model for Visual Speech Recognition Using HMMAuthors: Sujatha Paramasivam; Radhakrishnan Murugesanadar
- A Fuzzy Based Matrix Methodology for Evaluation and Ranking of Data Warehouse Conceptual Models MetricsAuthors: Naveen Dahiya; Vishal Bhatnagar; Manjeet Singh
- DragPIN: A Secured PIN Entry Scheme to Avert AttacksAuthors: Rajarajan Srinivasan
- Fuzzy Logic based Decision Support System for Component Security EvaluationAuthors: Shah Nazir; Sara Shahzad; Saeed Mahfooz; Muhammad Nazir
- Revisiting Constraint Based Geo Location: Improving Accuracy through Removal of OutliersAuthors: Sameer Qazi; Muhammad Kadri
- Hybrid Algorithm with Variants for Feed Forward Neural NetworkAuthors: Thinakaran Kandasamy; Rajasekar Rajendran
- Pair Programming for Software Engineering Education: An Empirical StudyAuthors: Kavitha Karthiekheyan; Irfan Ahmed; Jalaja Jayalakshmi
- Comparison of Dimension Reduction Techniques on High Dimensional DatasetsAuthors: Kazim Yildiz; Yilmaz Camurcu; Buket Dogan
- Recognition of Spoken Bengali Numerals Using MLP, SVM, RF Based Models with PCA Based Feature SummarizationAuthors: Avisek Gupta; Kamal Sarkar
- Assessment of Ensemble Classifiers Using the Bagging Technique for Improved Land Cover Classification of multispectral Satellite ImagesAuthors: Hassan Mohamed; Abdelazim Negm; Mohamed Zahran; Oliver Saavedra
- Real Time Facial Expression Recognition for Nonverbal CommunicationAuthors: Sazzad Hossain; Mohammad Abu Yousuf
- Immunity inspired Cooperative Agent based Security SystemAuthors: Praneet Saurabh; Bhupendra Verma
- Incorporating Unsupervised Machine Learning Technique on Genetic Algorithm for Test Case OptimizationAuthors: Maragathavalli Palanivel; Kanmani Selvadurai
- A Signaling System for Quality of Service (QoS)- Aware Content Distribution in Peer-to-Peer Overlay NetworksAuthors: Sasikumar Kandasamy; Sivanandam Natarajan; Ayyasamy Sellappan
- Cipher Text Policy Attribute Based Broadcast Encryption for Multi-Privileged GroupsAuthors: Muthulakshmi Angamuthu; Akshaya Mani; Anitha Ramalingam
- Progressive Visual Cryptography with Friendly and Size Invariant SharesAuthors: Young-Chang Hou; Zen-Yu Quan; Chih-Fong Tsai
- A Hybrid Template Protection Approach using Secure Sketch and ANN for Strong Biometric Key Generation with Revocability GuaranteeAuthors: Tran-Khanh Dang; Van-Quoc-Phuong Huynh; Hai Truong
- Parallel HMM-Based Approach for Arabic Part of Speech TaggingAuthors: Ayoub Kadim; Azzeddine Lazrek