The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................
..............................
..............................

Progressive Visual Cryptography with Friendly and Size Invariant Shares

like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human

Muthulakshmi Angamuthu1, Akshaya Mani2, and Anitha Ramalingam3 1Department of Mathematics, PSG College of Technology, India 2Department of Computer Science, Georgetown University, USA 3Department of Applied Mathematics and Computational Sciences, PSG College of Technology, India

A Signaling System for Quality of Service (QoS)-

Sasikumar Kandasamy1, Sivanandam Natarajan2, and Ayyasamy Sellappan3 1Department of Computer Science and Engineering, Tamilnadu College of Engineering, India 2Department of Computer Science and Engineering, Karpagam College of Engineering, India 3Department of Information Technology, Tamilnadu College of Engineering, India

Immunity inspired Cooperative Agent based

Department of Computer Science and Engineering, Technocrats Institute of Technology, India

Assessment of Ensemble Classifiers Using the Bagging

Hassan Mohamed1, Abdelazim Negm1, Mohamed Zahran2, and Oliver Saavedra3 1Department of Environmental Engineering, Egypt-Japan University of Science and Technology, Egypt 2Department of Geomatics Engineering, Benha University, Egypt 3Department of Civil Engineering, Tokyo Institute of Technology, Japan

Comparison of Dimension Reduction Techniques

Abstract: High dimensional data becomes very common with the rapid growth of data that has been stored in databases or

Hybrid Algorithm with Variants for Feed Forward

Abstract: Levenberg-Marquardt back-propagation algorithm, as a Feed forward Neural Network (FNN) training method, has

Revisiting Constraint Based Geo Location: Improving Accuracy through Removal of Outliers

Abstract: IP based GeoLocation has become increasingly important for network administrators for a number of reasons. The

Fuzzy Logic based Decision Support System for

Abstract: Software components are imperative parts of a system which play a fundamental role in the overall function of a

An Optimized Model for Visual Speech Recognition Using HMM

acoustic signals. It is useful in situations in which conventional audio processing is ineffective like very noisy environments or

Image Processing in Differential Digital

Faculty of Electrical Engineering, Computer Science and Information Technology in University of