The International Arab Journal of Information Technology (IAJIT)

Lightweight Anti-Censorship Online Network for

Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea

Intelligent Risk Analysis Model for Mining Adaptable Reusable Component

School of Information Technology and Engineering, V IT University, India 2Vivekanandha College of Engineering for Women, Anna University, India

Verifiable Multi Secret Sharing Scheme for 3D

Abstract: An efficient, computationally secure, verifiable (t , n) multi secret sharing scheme, based on YCH is p roposed for

Using Textual Case-based Reasoning in Intelligent Fatawa QA System

which textual expertise is collected in a library o f past cases. One of the critical application domai ns is the Islamic Fatawa

Solving QBF with Heuristic Small W orld

Abstract: In this paper, we use gaifman graph to describe the topological structure of the Quantified Boolean Formulae

An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection

1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa  College, India  

Prediction of Part of Speech Tags for Punjabi using Support Vector Machines

Abstract:Part-Of-Speech (POS)tagging is a task of assigning the appropriatePOSor lexical category to each word in a

Thomas Brindha and Ramaswamy Shaji

Yang Ming1 and Yumin Wang2

Hybrid SVM/HMM Model for the Arab Phonemes

Multimedia Information System and Advanced Computin g Laboratory, Sfax University, Tunisia 

Hierarchical Based Group Key Transfer for Secure

1Department of Information Science and Technology, A nna University, India