The International Arab Journal of Information Technology (IAJIT)

Test Case PrioritizationforRegression Testing Using Immune Operator

Abstract:Regressiontesting is a time consuming, costly process of re-running existing test cases.Assoftware evolves, the

A Group based Fault Tolerant Scheduling

Abstract: Desktop  grid  is  an  exciting  discipline  for  high  thr oughput  applications  but  due  to  inherent  resource  v olatility, 
#

An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques

Abstract:   Nowadays,  the  vital  parts  of  the  business  programs   are  the  data  warehouses  and  the  data  mining  techni ques. 

The Veracious Counting Bloom Filter

works on dynamic sets rather than a static set via item insertions and deletions. CBF allows false positive, but not false
#

An Improved Statistical Model of Appearance under Partial Occlusion

Abstract: The Appearance Models (AMs) are widely used in many applications related to face recognition, expression

An Empirical Study to Evaluate the Relationship of Object-Oriented Metrics and Change Proneness

Abstract: Software maintenance deals with changes or modifications which software goes through. Change prediction models

Edge Preserving Image Segmentation using Spatially Constrained EM Algorithm

Abstract: In this paper, a new method for edge preserving image segmentation based on the Gaussian Mixture Model (GMM)

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The