ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Issues
/
Volume 12, Number 04, July 2015
Volume
12
..............................
July
2015
..............................
Number
04
..............................
Downloads
0
..............................
Views
1211
..............................
Share
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Zhengzhou Information Science and Technology Instit ute, China
#Digital video broadcasting common scrambling algor ithm
# distinguishing attack
# slide resynchronization attack
# hybrid cipher
An Artificial Neural Network Approach for
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
#Sentence boundary identification
# feed forwardneura l network
# back propagation learning algorithm
Mahmood Ashraf 4,5
# Human computer interaction
# 3D gestures
# accelerome ter
# 3D calculator
# DTW
# 2D trajectories
# wiimote
Balanced Workload Clusters for Distributed Object Oriented Software
Abstract: When clustering objects to be allocated on a numbe r of nodes, most researches focus only on either the
# Load balance
# distributed system
# software restruct uring
# cluster algorithms
Solving QBF with Heuristic Small W orld
Abstract: In this paper, we use gaifman graph to describe the topological structure of the Quantified Boolean Formulae
#QBF
# SW
# search algorithm
# optimization algorithm
Meng Han1,2, Zhihai Wang1, and Jidong Yuan1 1School of Computer and Information Technology, Beij ing Jiaotong University, China* 2School of Computer Science and Engineering, Beifang University of Nationalities, China
#High(dimensional dataset
# closed pattern
# contiguou s pattern
# multi(supports
# biological sequences
Pairwise Sequence Alignment using Bio-Database Compression by Improved Fine Tuned Enhanced Suffix Array
#
Efficient Multimodal Biometric Database Construction and Protection Schemes
multimodal biometric database. The last is dedicate d to a biometric authentication system operating on a set of connected
#Biometric databases
# multimodal authentication
# dig ital watermarking
# cross)section topology
Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols
Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID
#Low*cost RFID
# cryptography
# protocol
# vulnerabilit y
#Image capture
# image store
# image compression
# join t photographic experts group
# PSNR
# compression rat io
# CMOS image sensor
# VLSI implementation
An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection
1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa College, India
# Melanoma
# canny edge detector
# border detection
# se gmentation
# skin lesion
Two Layer Defending Mechanism against DDoS Attacks
# DDoS
# hop count
# IP2HC table
# clustering
# IP spoofi ng
# testbed
Speed up of Reindexing in Adaptive Particle Swarm Optimization
#
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint