2011 Index
The International Arab Journal for Information Technology Vol. 8
Detection of Traffic Signal By Adaptive Approach and Shape Constraints
1Einstein College of Engineering, Tirunelveli, India
2Department of Statistics, Manonmaniam Sundaranar University, India
Keywords: ROI, adaptive threshold, morphological opening, image statistics, and contour.
Received June 6, 2008; accepted August 3, 2009
Morpho-Syntactic Tagging System Based on the Patterns Words for Arabic Texts
1Institute for Studies and Research on arabization, Rabat, Morocco
2University Mohamad V Suissi, Rabat, Morocco
3University Mohamad I-Oujda, Morocco
Keywords: Hidden markov model, morpho-syntactic tagging, Arabic text, and pattern.
Received September 22, 2008; accepted May 17, 2009
Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Base
Design and Implementation Biometric Access Control System Using Fingerprint for Restricted Area Based on Gabor Filter
Computer Science Department, Faculty of Computers and Information, Menofyia University, Egypt
Keywords: Biometric, fingerprint, enhancement, gabor filter, minutiae extraction, verification, and identification system.
Received November 6, 2008; accepted May 17, 2009
Malay Isolated Speech Recognition Using Neural Network: A Work in Finding Number of Hidden Nodes and
Malay Isolated Speech Recognition Using Neural Network: A Work in Finding Number of Hidden Nodes and Learning Parameters
1Faculty of Computer Science and Information System, Universiti Teknologi Malaysia, Malaysia
2Faculty of Biomedical Engineering and Health Science, Universiti Teknologi Malaysia, Malaysia
Keywords: Speech recognition, neural network, learning parameters, and trial and error method.
Received January 12, 2009; accepted August 3, 2009
Intelligent e-Learning Framework for Practicing Educational Testing Services
Faculty of Information Technology, Applied Science University, Jordan
Keywords: Intelligent e-learning, web service e-learning and mobile e-learning.
Received February 12, 2009; accepted May 17, 2009
A New OTIS-Arrangment Interconnection Network
1Faculty of Computer Studies, Arab Open University, Jordan
2Computer Science Department, University of Petra, Jordan
Keywords: Parallel and distributed systems, interconnection networks, arrangement network, OTIS-Networks, topological properties, and routing algorithm.
Received February 28, 2009; accepted November 5, 2009
Wavelet and Optimal Requantization Methodology for Lossy Fingerprint Compression
1Faculty of Science and Information Technology, Isra Private University, Jordan
2University of Surrey London, UK
Keywords: Software engineering education, reflective learning and teaching, vector quantization, wavelet, 9/7 filter, general VQ, fingerprint, and optimal VQ.
Received March 26, 2009; accepted November 5, 2009
Analysis of the Soft Error Susceptibility and Failure Rate in Logic Circuits
Computer Engineering Department, Kuwait University, Kuwait
Keywords: Single-event transient, soft errors, soft error susceptibility, soft error failure rate, and soft error sensitization probability.
Received March 30, 2009; accepted December 31, 2009
Efficient Genetic-Wrapper Algorithm Based Data Mining for Feature Subset Selection in a Power Qualit
Efficient Genetic-Wrapper Algorithm Based Data Mining for Feature Subset Selection in a Power Quality Pattern Recognition Application
1Department of CSE, Saranathan College of Engineering, India
2Department of CSE, Government College of Technology, India
Keywords: Data mining, feature selection, genetic algorithm, power quality, and disturbance recognition.
Received June 2, 2009; accepted August 3, 2009
On Line Isolated Characters Recognition Using Dynamic Bayesian Networks
1Departement of Transmission, National Institute of Telecommunications, Algeria
2Departement of Computer Sciences, University of Sciences and Technologies of Oran, Algeria
Keywords: On line isolated character recognition, pattern recognition, and dynamic bayesian network.
Received June 12, 2009; accepted November 5, 2009
Distributed Grid based Robust Clustering Protocol for Mobile Sensor Networks
Department of Computer Science, COMSATS Institute of Information Technology, Abbottabad, Pakistan
Keywords: Wireless sensor networks, mobility, clustering, routing protocols, and ad hoc networks.
Received June 16, 2009; accepted November 5, 2009
Enhanced Junction Selection Mechanism for Routing Protocol in VANETs
Department of Computer Science, COMSATS Institute of Information Technology, Pakistan
Keywords: Greedy forwarding, vehicular ad hoc network, and position based routing.
Received August 13, 2009; accepted November 5, 2009
Improved Two-Factor Authenticated Key Exchange Protocol
Zhengzhou Information Science and Technology Institute, China
Keywords: Two-factor, password, smart card, and authenticated key exchange.
Received December 10, 2009; accepted May 20, 2010
Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform
1Department of Computer Science, University of Peshawar, Pakistan
2School of Electrical Engineering and Computer Science, NUST, Pakistan
Keywords: Security, mobile platforms, android, policy framework, and constraints.
Received February 1, 2010; accepted March 9, 2010