The International Arab Journal of Information Technology (IAJIT)

A Vision Approach for Expiry Date Recognition using Stretched Gabor Features

Abstract: Product"expiry date represent important information for products consumption. They must contain clear

afak Saraydemir1, Necmi Tapınar2, Osman Eroğul3 and Hülya Kayserili4 1Department of Electronics Engineering, Turkish Mili tary Academy, Turkey 2Department of Electrical and Electronics Engineering, Erciyes University, Turkey 3Department of Biomedical Engineering Centre, Gülhan e Military Medicine Academy, Turkey 4Department of Medical Genetics, Đstanbul University Medicine Faculty, Turkey

AnAdaptiveWeighted Fuzzy Mean Filter Based on Cloud Model

Abstract:This research proposes anAdaptive Weighted Fuzzy Mean Filter(AWFMF)basedonCloud Model (CM)to remove

Miroljub Grozdanovic1, Dobrivoje Marjanovic2, and Goran Janackovic3 1Engineering Academy of Serbia, Serbia 2Ei R and D Institute Nis, Serbia 3Faculty of Occupational Safety, University of Nis, Serbia

Investigation Arabic Speech Recognition Using CMU Sphinx System

Abstract: In  this  paper,  Arabic  was  investigated  from  the  spe ech  recognition  problem  point  of  view.    We  propose  a  novel 

VLSI-Oriented Lossy Image Compression Approach using DA-Based 2D-Discrete

Devangkumar Shah1 and Chandresh Vithlani2 1Electronics and Communication Department, RK Univer sity, India 2Electronics and Communication Department, Governmen t Engineering College, India

Jean De Dieu Nkapkop1,2, Joseph Effa1, Monica Borda2, Laurent Bitjoka3, and Alidou Mohamadou4

Medical Image Segmentation With Fuzzy C-Means

Anusuya Venkatesan1 and Latha Parthiban2 1Department of Information Technology, Saveet ha School of Engineering, India 2Department of Computer Science, Pondicherry University, India

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

Selective Image Encryption using Singular Value Decomposition and Arnold Transform

volume of digital images. Generally selective cryptosystem encrypts the significant part of the data set while the insignificant