The International Arab Journal of Information Technology (IAJIT)

Preventing Collusion Attack in Android

day  activities.  Therefore,  the  security  of  smartpho nes  turns  to  a  great  concern.  Recently,  Android  as  the  most  popular 

Adapted Normalized Graph Cut Segmentation with

Singaravelu Prabhu1 and Dharmaraj Tensing2 1Department of Computer Science and Engineering, Kal aivani College of Technology, India 2 School of Civil Engineering, Karunya University, India

Event Extraction from Classical Arabic Texts

Abstract: Event  extraction  is  one  of  the  most  useful  and  chal lenging  Information  Extraction  (IE)  tasks  that  can be  used  in 

Optimum Threshold Parameter Estimation of

Mohammad Motiur Rahman1, Mithun Kumar Pk1, and Mohammad Shorif Uddin2 1Department of Computer Science and Engineering, Maw lana Bhashani Science and

Solving QBF with Heuristic Small W orld

Abstract: In this paper, we use gaifman graph to describe the topological structure of the Quantified Boolean Formulae


Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University 


Khalid Nahar1, Husni AlMuhtaseb1, Wasfi AlKhatib1, Moustafa Elshafei1, and Mansour Alghamdi2 1College of Computer Science and Engineering, King F ahd University of

Iris-Pupil Thickness BasedMethod for Determining Age Groupofa Person

Abstract:Soft biometric attributes such asgender,ethnicityand agecan be determinedfrom theirisimages.Pupil size plays