I2MANET Security Logical Specification Framework
Department Of Computer Sciences and Information Technology, University Technology PETRONAS, MALAYSIA
Received July 18, 2009; accepted August 10, 2010
YAMI: Incremental Mining of Interesting Association Patterns
1Department of Computer Science, Jamia Hamdard University, India
2Faculty of Computers and Information Technology, Sana’a University, Yemen
3Department of Computer Engineering, Jadavpur University, India
Keywords: Knowledge Discovery in Databases (KDD), data mining, incremental association rules, domain knowledge, interestingness, and Shocking Rules (SHR).
Received February 4, 2010; accepted August 10, 2010
A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems
Department of Computer Engineering, Kyung Hee University, Korea
Keywords: M2M, u-healthcare, WSN, Authentication.
Received March 24, 2010; accepted October 24, 2010
A Markov Random Field Model and Method to Image Matching
1Département d’Informatique, Faculté des Sciences, Université d’Oran, Algérie
2R and D Group, General Dynamics Canada, Canada
Keywords: Disparity, MRF, image matching, stereo constraints, resemblance, epipolar geometry, uniqueness, and continuity.
Received May 10, 2010; accepted January 3, 2011
A Privacy-Preserving Classification Method Based on Singular Value Decomposition
Department of Computer Science and Engineering, Harbin Institute of Technology, China
Keywords: Privacy preservation, data mining, singular value decomposition, and sample selection.
Received June 3, 2010; accepted January 3, 2011
Estimating Quality of JavaScript
1Department of Computer Engineering, Atilim University, Turkey
2Servus Bilgisayar, Turkey
Keywords: Software engineering, software quality, software metrics, and java script.
Received July 21, 2010; accepted January 3, 2011
Efficient Management of Schema Versioning in Multi-Temporal Databases
1Faculty of Economic Sciences and Management, University of Sfax, Tunisia
2Faculty of Science, Mathematics, Physics and Natural, University of Tunis-El Manar, Tunisia
3 LAMSADE Laboratory, University of Paris Dauphine, France
Keywords: Schema evolution, schema versioning, temporal databases, multi-temporal databases, application time, and database conversion.
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks
1School of Electronics and Information Engineering,Tongji University, China
2Science Institute, Information Engineering Univeristy, China
3Department of Network Engineering, Information Science and Technology Institute, China
Keywords: Voice over internet protocol, session initial protocol, elliptic curve, and authentication.
Received August 30, 2010; accepted October 24, 2010
Single Image Face Recognition Using Laplacian of Gaussian and Discrete Cosine Transforms
1Department of Computer Sciences, COMSATS Institute of Information Technology, Pakistan
2Department of Computer Engineering, National University of Science and Technology, Pakistan
Keywords: Single image, face, recognition, DCT, LOG, and mid frequency values.
Received August 31, 2010; accepted October 24, 2010
Effective Unsupervised Arabic Word Stemming: Towards an Unsupervised Radicals Extraction
Department of Computer Science, College of Computer and Information Science, Al-Imam Mohammed Ibn Saud Islamic University, Kingdom of Saudi Arabia
Keywords: Computational morphology, machine learning, natural language processing, classical arabic, and semitic languages.
Received September 7, 2010; accepted October 24, 2010
Automatic Mapping of MPEG-7 Descriptions to Relational Database
1Department of Computer Information Systems, Irbid National University, Jordan
2Department of Computer Graphics, Princess Sumaya University for Technology, Jordan
Keywords: Mpeg-7, multimedia database, mapping XML to RDB schema.
Received October 24, 2010; accepted January 3, 2011
Combining Neural Networks for Arabic Handwriting Recognition
1Department of Computer Sciences, University Larbi Ben Mhidi, Algeria
2Department of Computer Sciences, University Hadj Lakhdar, Algeria
3Department of Computer Sciences, University Mentouri, Algeria
Keywords: Multiple classifier system, Arabic recognition, neural networks, tchebichef moments, hu moments, and Zernike moments.
Received December 20, 2010; accepted March 1, 2011