The International Arab Journal of Information Technology (IAJIT)

Test Case PrioritizationforRegression Testing Using Immune Operator

Abstract:Regressiontesting is a time consuming, costly process of re-running existing test cases.Assoftware evolves, the

A Group based Fault Tolerant Scheduling

Abstract: Desktop  grid  is  an  exciting  discipline  for  high  thr oughput  applications  but  due  to  inherent  resource  v olatility, 
#

An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

Abstract:   Nowadays,  the  vital  parts  of  the  business  programs   are  the  data  warehouses  and  the  data  mining  techni ques. 

The Veracious Counting Bloom Filter

works on dynamic sets rather than a static set via item insertions and deletions. CBF allows false positive, but not false
#

An Improved Statistical Model of Appearance under Partial Occlusion

Abstract: The Appearance Models (AMs) are widely used in many applications related to face recognition, expression

An Empirical Study to Evaluate the Relationship of Object-Oriented Metrics and Change Proneness

Abstract: Software maintenance deals with changes or modifications which software goes through. Change prediction models

Edge Preserving Image Segmentation using Spatially Constrained EM Algorithm

Abstract: In this paper, a new method for edge preserving image segmentation based on the Gaussian Mixture Model (GMM)

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

Decision Based Detail Preserving Algorithm for the Removal of Equal and Unequal Probability Salt

Jebaseelan3, and Godwin Immanuel3 1Department of Electronics and Communication Engineering, Vidya Jyothi Institute of Technology, India 2Department of Electrical and Electronics Engineering, Vidya Jyothi Institute of Technology, India 3Department of Electrical and Electronics Engineering, Sathyabama University, India

On the Security of Two Ownership Transfer

1Electrical Engineering Department, Shahid Rajaee Teacher Training University, Iran 2Computer Engineering Department, Shahid Rajaee Teacher Training University, Iran

Missing Values Estimation for Skylines in

Malaysia 2Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Malaysia

An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

Abstract:   Nowadays,  the  vital  parts  of  the  business  programs   are  the  data  warehouses  and  the  data  mining  techni ques.