The International Arab Journal of Information Technology (IAJIT)

Preventing Collusion Attack in Android

day  activities.  Therefore,  the  security  of  smartpho nes  turns  to  a  great  concern.  Recently,  Android  as  the  most  popular 

Privacy-Preserving Data Mining in Homogeneous

Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt


TMP Rajkumar1 and Mrityunjaya Latte2 1Research Scholar, Anjuman Engineering College, Indi a 2Principal, JSS Academy of Technical Education, India 

An Anti-Spam Filter Based on One-Class IB Method in Small Training Sets

Abstract:We present an approach to email filtering based on one-class Information Bottleneck (IB) method in small training

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

A New Method for Curvilinear Text line Extraction and Straightening of Arabic Handwritten Text

analysis. This paper presents a new method for curvilinear text line extraction and straightening in Arabic handwritten

Supervised Fuzzy C-Means Techniques to Solve the Capacitated Vehicle Routing Problem

Mohamed Shalaby1,2, Ayman Mohammed1, and Sally Kassem1,2 1Smart Engineering Systems Research Center, Nile University, Egypt 2Faculty of computers and Artificial Intelligence, Cairo University, Egypt