The International Arab Journal of Information Technology (IAJIT)

Lightweight Anti-Censorship Online Network for

Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea
#

Intelligent Risk Analysis Model for Mining Adaptable Reusable Component

School of Information Technology and Engineering, V IT University, India 2Vivekanandha College of Engineering for Women, Anna University, India
#

Verifiable Multi Secret Sharing Scheme for 3D

Abstract: An efficient, computationally secure, verifiable (t , n) multi secret sharing scheme, based on YCH is p roposed for
#

Using Textual Case-based Reasoning in Intelligent Fatawa QA System

which textual expertise is collected in a library o f past cases. One of the critical application domai ns is the Islamic Fatawa
#

Solving QBF with Heuristic Small W orld

Abstract: In this paper, we use gaifman graph to describe the topological structure of the Quantified Boolean Formulae

An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection

1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa  College, India  

Prediction of Part of Speech Tags for Punjabi using Support Vector Machines

Abstract:Part-Of-Speech (POS)tagging is a task of assigning the appropriatePOSor lexical category to each word in a

Thomas Brindha and Ramaswamy Shaji
#

Yang Ming1 and Yumin Wang2
#

Hybrid SVM/HMM Model for the Arab Phonemes

Multimedia Information System and Advanced Computin g Laboratory, Sfax University, Tunisia 
#

Hierarchical Based Group Key Transfer for Secure

1Department of Information Science and Technology, A nna University, India
#