default search action
The International Arab Journal of Information Technology, Volume 3
Volume 3, Number 1, January 2006
- Nadia Nouali, Habiba Drias, Anne Doucet:
A Mobility-Aware Two-Phase Commit Protocol. 1-8 - Hichem Talbi, Amer Draa, Mohamed Batouche:
A Novel Quantum-Inspired Evaluation Algorithm for Multi-Source Affine Image Registration. 9-15 - Essam Al-Daoud:
Incremental Learning of Auto-Association Multilayer Perceptrons Network. 16-19 - Toufik Taibi, Abdelouahab Abid, Wei Jiann Lim, Yeong Fei Chiam, Chong Ting Ng:
Design and Implementaion of A Two-Phase Commit Protocol Simulator. 20-27 - Mohamed Abdel Fattah, Fuji Ren, Shingo Kuroiwa:
Speaker Recognition for Wire/Wireless Communication Systems. 28-34 - Naim M. Ajlouni, Asim El-Sheikh, Abdullah Abdali Rashed:
A New Approach in Key Generation and Expansion in Rijndael Algorithm. 35-41 - Sameh Masmoudi Touj, Najoua Essoukri Ben Amara, Hamid Amiri:
Incremental Genetic Algorithm. 42-47 - Tahar Bouhadada, Mohamed Tayeb Laskri:
A Virtual Cooperative Learning Environment Using Human Companion. 48-54 - Sahar A. Al-Talib, Borhanuddin Mohd Ali, Sabira Khatun:
Integrating Multicasting and Hash Algorithm to support Host Mobility. 55-61 - Najib A. Kofahi, Saeed Al Zahrani, Syed Manzoor Hussain:
MOSIX Evaluation on a Linux Cluster. 62-68 - Nassir Salman:
Image Segmentation and Edge Detection Based on Chan-Vese Algorithm. 69-74 - Zuhoor A. Al-Khanjari, Narayana Swamy Kutti, Muna Hatem:
An Extended E-Learning Architecture: Integrating Software Tools Within The E-Learning Portal. 75-81 - Zuhoor A. Al-Khanjari:
Partial Automation of Sensitivity Analysis by Mutant Schemata Approach. 82-93
Volume 3, Number 2, 2006
- Awad M. Awadelkarim, Norbik Bashah Idris:
An XML-based Security Management Model for Multilevel Security Databases. 95-103 - Nassir Salman:
Image Segmentation Based on Watershed and Edge Detection Techniques. 104-110 - P. Dhavachelvan, G. V. Uma:
Evolution of Agent-Oriented Distributed Model for Software Testing: Layered Approach. 111-117 - Kamel Hamrouni, Nawrès Khalifa:
Two Methods for Analysis of Dynamic Scintigraphic Images of the Heart. 118-125 - Djamel Djenouri, Abdelouahid Derhab, Nadjib Badache:
Ad Hoc Networks Routing Protocols and Mobility. 126-133 - Nadia Nouali, Habiba Drias, Anne Doucet:
Protocols for Committing Mobile Transactions. 134-143 - Kemalatha Krishnasamy, Sai Peck Lee, Ananda Kumar Palaniappan:
Alternative Learning Approaches for Electronic Learning Environments in Smart Schools: Survey Results. 144-151 - Ruzayn Quaddoura:
Operator Decomposition of Graphs. 152-164 - Shanmugam Arumugam, Shanthi Govindaswamy:
Performance of the Modified Round Robin Scheduling Algorithm for Input-Queued Switches under Self-Similar Traffic. 165-171 - Zuwairie Ibrahim, Yusei Tsuboi, Osamu Ono, Marzuki Khalid:
Unconstraint Assignment Problem: A Molecular Computing Approach. 172-177 - Ahmad Dalal'ah:
A Dynamic Sliding Load Balancing Strategy in Distributed Syatems. 178-182
Volume 3, Number 3, July 2006
- Hassina Seridi-Bouchelaghem, Toufik Sari, Mokhtar Sellami:
Adaptive Instructional Planning Using Neural Networks in Intelligent Learning Systems. 183-192 - Ruzayn Quaddoura:
Linear Time Recognition of Bipartite Star123-Free Graphs. 193-202 - Mee-Chin Wee, Abu Bakar Zaitun:
Obstacles Towards the Use of ICT Tools in Teaching and Learning of Information Systems in Malaysian Universities. 203-209 - Alauddin Alomary, Mohammad Jamil:
An Approach to Strengthen Expert System Shell with Knowledge Illustration Established on Peak of the Fuzzy Logic. 210-218 - Moutaz Saleh, Subramaniam Shamala:
Hierarchical AED Scheduling Algorithm for Real-Time Networks. 219-225 - Shanmugam Arumugam, Shanthi Govindaswamy, Praveen Kumar Boya:
A Novel Transistor Level Implementation of a High Speed Packet Switch. 226-230 - Selvaraj Prabha, Arputharaj Kannan, Palanisamy Anandha Kumar:
An Optimizing Query Processor with an Efficient Caching Mechanism for Distributed Databases. 231-236 - Hilal M. Yousif Al-Bayatti, Abdul Munim Rahma, Haithem Alani:
Cuneiform Symbols Recognition Using Intensity Curves. 237-241 - Jihad Mohamad Jaam, Mohamed Larbi Rebaiaia, Ahmad Hasnah:
A Fingerprint Minutiae Recognition System Based on Genetic Algorithms. 242-248 - Youcef Aklouf, Habiba Drias:
Designing a Generic Marketplace Architecture Using Multi-Agent Based Technology. 249-255 - Hicham Mouncif, Azedine Boulmakoul, Mohamed Chala:
Integrating GIS-Technology for Modelling Origin-Destination Trip in Multimodal Transportation Networks. 256-264 - Haidar M. Harmanani, Walid Keirouz, Saeed Raheel:
A Rule-Based Extensible Stemmer for Information Retrieval with Application to Arabic. 265-272
Volume 3, Number 4, October 2006
- Alauddin Alomary, Mohammad Jamil:
The Evaluation and Comparative Study with a New Clustered Based Machine Learning Algorithm. Int. Arab J. Inf. Technol. 3(4): 273-282 (2006) - Essam Natsheh, Sabira Khatun, Adznan B. Jantan:
Adaptive Fuzzy Route Lifetime for Wireless Ad-hoc Networks. Int. Arab J. Inf. Technol. 3(4): 283-290 (2006) - Tarek El-Basuny, Makoto Amamiya:
Multi-Agent-Based Adaptive AV Interface. Int. Arab J. Inf. Technol. 3(4): 291-298 (2006) - Mowafak Hasan, Hasan Al-Shalabi:
Modified Cryptanalysis of RC5. Int. Arab J. Inf. Technol. 3(4): 299-302 (2006) - Mohammed E. El-Telbany, Mahmoud Warda, Mahmoud El-Borahy:
Mining the Classification Rules for Egyptian Rice Diseases. Int. Arab J. Inf. Technol. 3(4): 303-307 (2006) - Ramzi A. Haraty, Wissam Chehab:
Regression Test Selection for Trusted Database Applications. Int. Arab J. Inf. Technol. 3(4): 308-314 (2006) - Adnan Shaout, Brady W. King, Luke A. Reisner:
Real-Time Game Design of Pac-Man Using Fuzzy Logic. Int. Arab J. Inf. Technol. 3(4): 315-325 (2006) - Vicky Laurens, Abdulmotaleb El-Saddik, Amiya Nayak:
Requirements for Client Puzzles to Defeat the Denial of Service and the Distributed Denial of Service Attacks. Int. Arab J. Inf. Technol. 3(4): 326-333 (2006) - Sahadeo Padhye:
On DRSA Public Key Cryptosystem. Int. Arab J. Inf. Technol. 3(4): 334-336 (2006) - Khalid A. Eldrandaly, Neil Eldin:
A Knowledge-Based Decision Support System for Scraper Selection and Cost Estimation. Int. Arab J. Inf. Technol. 3(4): 337-341 (2006) - Adnan Abdul-Aziz Gutub:
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers. Int. Arab J. Inf. Technol. 3(4): 342-349 (2006)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.