ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: threshold
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
A New (k, n) Secret Image Sharing Scheme (SISS)
Amitava Nag,Sushanta Biswas,Debasree Sarkar,Partha Sarkar
#complete graph
#spanning tree
#Prüfer sequence
#(k
# n) threshold secret image sharing
An Unsupervised Feed Forward Neural Network Method for Efficient Clustering
Roya Asadi,Mitra Asadi,Shokoofeh Asadi
#Artificial neural network
#feed forward neural network
#unsupervised learning
#clustering
#real weight
Brain Tumor Segmentation in MRI Images Using Integrated Modified PSO Fuzzy Approach
Abstract: An image segmentation technique based on maximum fu zzy entropy is applied for Magnetic Resonance (MR) brain
#
Developing a Novel Approach for Content Based
#
Optimum Threshold Parameter Estimation of
MohammadMotiur Rahman1, MithunKumar Pk1, and MohammadShorif Uddin2 1Department of Computer Science and Engineering, Maw lana Bhashani Science and
#
A Vision Approach for Expiry Date Recognition using Stretched Gabor Features
Abstract: Product"expiry date represent important information for products consumption. They must contain clear
#
Automated Retinal Vessel Segmentation using
Soumia Belhadi and Nadjia Benblidia
#
An Artificial Neural Network Approach for
Department of Computer Science, COMSATS Institute o f Information Technology, Pakistan
#Sentence boundary identification
# feed forwardneura l network
# back propagation learning algorithm
A Novel Fast Otsu Digital Image Segmentation
1
#
Khaled Omer1 and Daya Lobiyal2 1Faculty of Engineering, School of Computer and Syst ems Sciences, University of Aden, Yemen 2Faculty of Computer and System Science, Nehru Unive rsity, India
#Markov chain
# location update
# home agent
# quorum
# grid location service
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Abstract: In this paper, we propose to design a cross-layer b ased intrusion detection technique for wireless networks. In this
# Intrusion detection
# wireless networks
# RSS
# cross layer
# RTS-CTS handshake
# TT
Person-Independent Facial Expression Recognition Based on Compound Local Binary Pattern (CLBP)
2Samsung Bangladesh R & D Center Ltd, Bangladesh 3Department of Computer Science and Engineering, Ahs anullah University of Science and Technology,
# Facial expression recognition
# feature descriptor
# LBP
# SVM
# texture encoding
Diagnosis of Leptomeningeal Metastases Disease in MRI Images by Using Image Enhancement
#Cerebrospinal Fluid (CSF) examination
# Computed Tomography (CT)
# Image Enhancement methods
# Leptomeningeal Metastases
# Magnetic Resonance Imaging (MRI)
Rule Schema Multi-Level for Local Patterns Analysis: Application in Production Field
Abstract: Recently, Multi-Database Mining (MDBM) for association rules has been recognized as an important and timely
#Schema
# association rules
# exceptional rules
# global rules
# ontology
Fingerprint Verification Methods Using
Instituto Politécnico Nacional, Sección de Estudios de Posgrado e Investigación, Unidad Culhuacán,
#Angle of orientation
# delaunay triangulation
# EER
# fingerprint
# geometric thresholds
Detection of Neovascularization in Proliferative Diabetic Retinopathy Fundus Images
Abstract: Neovascularization is a serious visual consequence disease arising from Proliferative Diabetic Retinopathy (PDR).
#Diabetic retinopathy
# neovascularization
# fuzzy C-means clustering
# compactness classifier
# feature extraction
# neural network
Identification of an Efficient Filtering- Segmentation Technique for Automated Counting
Abstract: The counting of fish fingerlings is an important process in determining the accurate consumption of feeds for a
#Digital image processing
# filtering
# segmentation
# image normalization
# threshold
Progressive Visual Cryptography with Friendly and Size Invariant Shares
like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human
#Visual cryptography
# progressive visual cryptography
# secret sharing
# unexpanded share
# meaningful (Friendly) share
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Abstract: In this paper, we propose to design a cross-layer b ased intrusion detection technique for wireless networks. In this
# Intrusion detection
# wireless networks
# RSS
# cross layer
# RTS-CTS handshake
# TT
Enhanced Graph Based Approach for Multi Document Summarization
# Page rank
# lexical rank
# damping
# threshold
# summar ization
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint