The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................
..............................
..............................

Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT

Abstract: Content authentication requires that the image watermarks must highlight malicious attacks while tolerating

Explicitly Symplectic Algorithm for Long-time Simulation of Ultra-flexible Cloth

flexible cloth simulation with high computation stability. Our method can preserve the conserved quantity of a Hamiltonian,

Modified Binary Bat Algorithm for Feature Selection in Unsupervised Learning

Abstract: Feature selection is the process of selecting a subset of optimal features by removing redundant and irrelevant

A Physical Topology Discovery Method Based on AFTs of Down Constraint

topology discovery based on Address Forwarding Table (AFT) is a hot topic on current study. This paper defines three

Mining Consumer Knowledge from Shopping Experience: TV Shopping Industry

meanwhile, they are more and more accustomed to buy goods via TV shopping channel. Even in recession, it is thriving and

Using Data Mining for Predicting Cultivable Uncultivated Regions in the Middle East

large areas, while agricultural lands are described as small areas of arable land under perennial grass pastures or crops. In

Impulse Noise Reduction for Texture Images Using Real Word Spelling Correction Algorithm and

1Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran 2Department of Computer Science and Engineering, Shiraz University, Shiraz, Iran

An Empirical Study to Evaluate the Relationship of Object-Oriented Metrics and Change Proneness

Abstract: Software maintenance deals with changes or modifications which software goes through. Change prediction models

Machine Learning based Intelligent Framework for Data Preprocessing

Abstract: Data preprocessing having a pivotal role in data mining ensures reduction in cost by catering inconsistent,

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

Image Quality Assessment Employing RMS

Abstract: This paper presents a new approach for evaluating image quality. The method is based on the histogram similarity

An Effective Sample Preparation Method for Diabetes Prediction

Abstract: Diabetes is a chronic disorder caused by metabolic malfunction in carbohydrate metabolism and it has become a

Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless

Abstract: Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They

A Novel Handwriting Grading System Using Gurmukhi Characters

shall be helpful in organizing handwriting competitions and then deciding the winners on the basis of an automated process.