The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................
..............................
..............................

Effective and Efficient Utility Mining Technique for

1Department of Computer Science and Engineering, Anna University, India 2Department of Electronics and Communication Engineering, Sri Ramaswami Memorial University, India

Decision Based Detail Preserving Algorithm for the Removal of Equal and Unequal Probability Salt

Jebaseelan3, and Godwin Immanuel3 1Department of Electronics and Communication Engineering, Vidya Jyothi Institute of Technology, India 2Department of Electrical and Electronics Engineering, Vidya Jyothi Institute of Technology, India 3Department of Electrical and Electronics Engineering, Sathyabama University, India

Service Process Modelling and Performance Analysis for Composite Context Provisioning in IoT

our life. Some devices are being used by us such as the smart phones while others are most of the time invisible to us such as

GLoBD: Geometric and Learned Logic Algorithm

Houcine Boubaker1, Aymen Chaabouni1, Haikal El-Abed2, and Adel Alimi1 1Research Groups in Intelligent Machines Laboratory, University of Sfax, Tunisia 2German International Cooperation, German University College Riyadh, Saudi Arabia

Intelligent Human Resource Information System (i- HRIS): A Holistic Decision Support Framework for

1Department of Administrative Studies and Politics, University of Malaya, Malaysia 2Department of Applied Statistics, University of Malaya, Malaysia 3Department of Educational Management, Planning and Policy, University of Malaya, Malaysia

Named Entity Recognition for Automated Test Case Generation

Abstract: Testing is the process of evaluating a software or hardware against its requirement specification. It helps to verify

UDP based IP Traceback for Flooding DDoS Attack

Abstract: Distributed denial of service attack has become a challenging threat in today’s Internet. The adversaries often use

On the Security of Two Ownership Transfer

1Electrical Engineering Department, Shahid Rajaee Teacher Training University, Iran 2Computer Engineering Department, Shahid Rajaee Teacher Training University, Iran

Missing Values Estimation for Skylines in

Malaysia 2Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Malaysia

Efficient Parameterized Matching Using Burrows-

India 4Department of Computer Science and Engineering, Sunder Deep Engineering College, India

A Framework for Recognition and Animation of Chess Moves Printed on a Chess Book

Abstract: The work presented in this paper proposes a set of techniques to animate chess moves which are printed on a chess

Opinion within Opinion: Segmentation Approach

Department of Computer Science and Engineering, University of Engineering and Technology, Pakistan

Clustering Based on Correlation Fractal Dimension

Abstract: Online clustering, in an evolving high dimensional data is an amazing challenge for data mining applications.