


default search action
The International Arab Journal of Information Technology, Volume 8
Volume 8, Number 1, January 2011
- Moussa Benaissa, Yahia Lebbah:

A constraint programming based approach to detect ontology inconsistencies. 1-8 - Ahasanun Nessa, Qinghai Yang, Kyung Sup Kwak:

Performance analysis of dual-hop cooperative MIMO transmission with relay selection in rayleigh fading channel. 9-15 - Anwar Saif, Mohamed Othman:

Network load and packet loss optimization during handoff using multi-scan approach. 16-22 - Hatem Abdul-Kader:

E-learning systems in virtual environment. 23-29 - Mehri Saeid, Abdul Azim Abdul Ghani, Mohd Hasan Selamat:

Rank-order weighting of web application attributes. 30-38 - Sanam Shahla Rizvi, Tae-Sun Chung:

AMI: an advanced eEndurance management technique for flash memory storage systems. 39-47 - Lotfi Messikh, Mouldi Bedda, Noureddine Doghmane:

Binary phoneme classification using fixed and adaptive segment-based neural network approach. 48-51 - Moshaddique Al Ameen, Kyung Sup Kwak:

Social Issues in wireless sensor networks with healthcare perspective. 52-58 - Hatem Abdul-Kader, Mohamed Sherif:

Novel robust multilevel 3D visualization technique for web based GIS. 59-65 - Ibrahim Akman, Hakan Bayindir, Serkan Ozleme, Zehra Akin, Sanjay Misra:

A lossless text compression technique using syllable based morphology. 66-74 - Dilek Basci, Sanjay Misra:

Entropy as a measure of quality of XML schema document. 75-83 - Ihab Sbeity, Mohamed Dbouk, Brigitte Plateau:

Stochastic bounds for microprocessor systems availability. 84-90 - Abderrahim Boudlal, Mohamed Ould Abdallahi Ould Bebah, Abdelhak Lakhouaja, Azzeddine Mazroui, Abdelouafi Meziane:

A Markovian approach for arabic root extraction. 91-98 - Mahamat Issa Hassan, Azween B. Abdullah:

A new grid resource discovery framework. 99-107 - Aitha Nagaraju, Ramachandram Srinadas:

A strategy to reduce the control packet load of AODV using weighted rough set model for MANET. 108-116
Volume 8, Number 2, April 2011
- Arockia Jansirani, Rengansivagurunathan Rajesh, Ramasamy Balasubramanian, Perumal Eswaran:

Hi-tech authentication for pslette images using digital signature and data hiding. 117-123 - Izzat Alsmadi, Mohammed Al-Kabi:

GUI structural metrics. 124-129 - Rukhsana Shahnaz, Anila Usman:

Blocked-based sparse matrix-vector multiplication on distributed memory parallel computers. 130-136 - Nidhal El-Abbadi, Ahmed Nidhal Khdhair, Adel Al-Nasrawi:

Build electronic arabic lexicon. 137-140 - Yadollah Hezarjaribi, Mohd Hamidon, Roslina Mohd Sidek, Keshmiri Hossein, Raja Abdullah, Alireza Bahadorimehr:

Evaluation for diaphragm's deflection for touch mode MEMS pressure sensors. 141-146 - Hayam Mousa, Kamel Moustafa, Waiel Abdel-Wahed, Mohiy M. Hadhoud:

Data hiding based on contrast mapping using DNA medium. 147-154 - Haissam Ziade, Rafic A. Ayoubi, Raoul Velazco, Tareck Idriss:

A new fault injection approach to study the impact of bitflips in the configuration of SRAM-based FPGAs. 155-162 - Ali Ghobadi Tapeh, Maseud Rahgozar:

An ontology-based semantic extraction approach for B2C ecommerce. 163-170 - Mohammad Salameh, Rached Zantout, Nashat Mansour:

Improving the accuracy of English-Arabic statistical sentence alignment. 171-177 - Fernando Valles-Barajas:

A survey of high-level programming languages in control systems. 178-187 - Arafat Awajan:

Multilayer model for Arabic text compression. 188-196 - Muhammad Ghulam:

Extended average magnitude difference function (EAMDF) based pitch detection. 197-203 - Mohd Nasir, Azah Anir Norman, Shukor Sanim Bin Mohd Fauzi, Masliyana Azmi:

An RFID-based validation system for halal food. 204-211 - Haya Sammaneh, Jamal N. Al-Karaki, Sameer M. Bataineh:

End-to-end support for short-lived TCP flows in heterogeneous wired-cum-wireless networks: an analytical study. 212-220 - Allam Mousa:

Speech segmentation in synthesized speech morphing using pitch shifting. 221-226
Volume 8, Number 3, July 2011
- Maâmar Kef, Leila Chergui, Mohamed Benmohammed:

Self-organization and topology's control for mobile ad-hoc networks. 227-234 - Qutaiba Ali:

A flexible design of network devices using reconfigurable content addressable memory. 235-243 - Batri Krishnan, Murugesh Veerasamy, Gopalan Nagammapudur:

Effect of weight assignment in data fusion based information retrieval. 244-250 - Rehab M. Duwairi, Rania Al-Zubaidi:

A hierarchical K-NN classifier for textual data. 251-259 - Abdelmalek Kouadri, Mimoun Zelmat, Alhussein Albarbar:

Prediction of boiler output variables through the PLS linear regression technique. 260-264 - Eyas El-Qawasmeh, Maytham Safar, Talal Kanan:

Investigation of golay code (24, 12, 8) structure in improving search techniques. 265-271 - Rajender Nath, Satinder Bal:

A novel mobile crawler system based on filtering off non-modified pages for reducing load on the network. 272-279 - Omar Nouali, Nadia Nouali-Taboudjemat, Bernard Toursel:

Cognitive filtering of textual information agents based implementation. 280-288 - Quan T. Nguyen, Saïd Bettayeb:

On the genus of pancake network. 289-292 - Majid Ziaratban, Karim Faez:

Detection and compensation of undesirable discontinuities within the farsi/arabic subwords. 293-301 - Shahzad Ali, Sajjad Ahmad Madani:

Distributed efficient multi hop clustering protocol for mobile sensor networks. 302-309 - Hazleen Aris, Siti Salwah Salim:

State of component models usage: justifying the need for a component model selection framework. 310-317 - Mohammed Alharthi, Siti Salwah Salim:

Zest based visualization for requirements negotiation. 318-325 - Ali Al-Haj, Ahmad A. Mohammad, Lama Bata:

DWT-based audio watermarking. 326-333 - Malak Abdullah, Emad Abuelrub, Basel A. Mahafzah:

The chained-cubic tree interconnection network. 334-343
Volume 8, Number 4, October 2011
- Vanniappan Balamurugan, Senthamarai Kannan:

Detection of traffic signal by adaptive approach and shape constraints. 345-349 - Abdelhamid El-Jihad, Abdellah Yousfi, Si Lhoussain Aouragh:

Morpho-syntactic tagging system based on the patterns words for arabic texts. 350-354 - Ashraf El-Sisi:

Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter. 355-363 - Md Sah Bin Hj Salam, Dzulkifli Mohamad, Sheikh Hussain Shaikh Salleh:

Malay isolated speech recognition using neural network: a work in finding number of hidden nodes and learning parameters. 364-371 - Aiman Turani, Faiz M. Al-Shrouf:

Intelligent e-learning framework for practicing educational testing services. 372-375 - Jehad Al-Sadi, Ahmad Awwad:

A new otis-arrangment interconnection network. 376-382 - Zahraa F. Muhsen, Maher Dababneh, Ayman Jameel Al-Nsour:

Wavelet and optimal requantization methodology for lossy fingerprint compression. 383-387 - Eman AlQuraishi, May Al-Roomi, Sobeeh Almukhaizim:

Analysis of the soft error susceptibility and failure rate in logic circuits. 388-396 - Brahmadesam Krishna, Baskaran Kaliaperumal:

Efficient genetic-wrapper algorithm based data mining for feature subset selection in a power quality pattern recognition applicationction in a power quality pattern recognition application. 397-405 - Redouane Tlemsani, Abdelkader Benyettou:

On line isolated characters recognition using dynamic bayesian networks. 406-413 - Shahzad Ali, Sajjad Ahmad Madani:

Distributed grid based robust clustering protocol for mobile sensor networks. 414-421 - Sardar Muhammad Bilal, Sajjad Ahmad Madani, Imran Ali Khan:

Enhanced junction selection mechanism for routing protocol in VANETs. 422-429 - Shuhua Wu, Yuefei Zhu:

Improved two-factor authenticated key exchange protocol. 430-439 - Mohammad Nauman, Sohail Khan:

Design and implementation of a fine-grained resource usage model for the android platform. 440-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














