The International Arab Journal of Information Technology (IAJIT)

Brain Tumor Segmentation in MRI Images Using Integrated Modified PSO Fuzzy Approach

Abstract: An image segmentation technique based on maximum fu zzy entropy is applied for Magnetic Resonance (MR) brain
#

Optimum Threshold Parameter Estimation of

Mohammad Motiur Rahman1, Mithun Kumar Pk1, and Mohammad Shorif Uddin2 1Department of Computer Science and Engineering, Maw lana Bhashani Science and
#

A Vision Approach for Expiry Date Recognition using Stretched Gabor Features

Abstract: Product"expiry date represent important information for products consumption. They must contain clear
#

Automated Retinal Vessel Segmentation using

Soumia Belhadi and Nadjia Benblidia
#

Khaled Omer1 and Daya Lobiyal2 1Faculty of Engineering, School of Computer and Syst ems Sciences, University of Aden, Yemen 2Faculty of Computer and System Science, Nehru Unive rsity, India

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this 

Person-Independent Facial Expression Recognition Based on Compound Local Binary Pattern (CLBP)

            2Samsung Bangladesh R & D Center Ltd, Bangladesh                                                                                3Department of Computer Science and Engineering, Ahs anullah University of Science and Technology, 

Rule Schema Multi-Level for Local Patterns Analysis: Application in Production Field

Abstract: Recently, Multi-Database Mining (MDBM) for association rules has been recognized as an important and timely

Fingerprint Verification Methods Using

Instituto Politécnico Nacional, Sección de Estudios de Posgrado e Investigación, Unidad Culhuacán,

Identification of an Efficient Filtering- Segmentation Technique for Automated Counting

Abstract: The counting of fish fingerlings is an important process in determining the accurate consumption of feeds for a

Progressive Visual Cryptography with Friendly and Size Invariant Shares

like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this