The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................
..............................
..............................

Enhancing Generic Pipeline Model for Code Clone Detection using Divide and Conquer Approach

code clone research focuses on the detection and an alysis of code clones in order to help software developers identify code

Using Textual Case-based Reasoning in Intelligent Fatawa QA System

which textual expertise is collected in a library o f past cases. One of the critical application domai ns is the Islamic Fatawa
#

Event Extraction from Classical Arabic Texts

Abstract: Event  extraction  is  one  of  the  most  useful  and  chal lenging  Information  Extraction  (IE)  tasks  that  can be  used  in 
#

A WK-Means Approach for Clustering

Kebangsaan Malaysia, Malaysia 
#

Kernel Logistic Regression Algorithm for Large Scale Data Classification

classification problems. However, it is often not f ound in large+scale data classification problems an d this is mainly because it
#

Optimum Threshold Parameter Estimation of

Mohammad Motiur Rahman1, Mithun Kumar Pk1, and Mohammad Shorif Uddin2 1Department of Computer Science and Engineering, Maw lana Bhashani Science and
#

A Vision Approach for Expiry Date Recognition using Stretched Gabor Features

Abstract: Product"expiry date represent important information for products consumption. They must contain clear
#

Automated Retinal Vessel Segmentation using

Soumia Belhadi and Nadjia Benblidia
#

AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print

Department of Electronics and Communication Enginee ring, Kalasalingam University,  
#

Lessons Learned: The Complexity of Accurate

Department of Computer Science, Mohammad Ali Jinnah  University, Pakistan 
#

Adaptive Semantic Indexing of Documents for Locating Relevant Information in P2P Networks

Abstract: Locating relevant information in Peer#to#Peer (P2P) system is a challenging problem. Conventional approaches use
#