The International Arab Journal of Information Technology (IAJIT)

An Efficient Approach for Mining Frequent Item

1Division of Data Science, Ton Duc Thang University, Vietnam 2Faculty of Information Technology, Ton Duc Thang University, Vietnam 3Faculty of Technology, Pacific Ocean University, Vietnam 4Department of Computer Science and Information Engineering,

Ke Yan1, Hong Zhu1, and Kevin Lü2 1School of Computer Science and Technology, Huazhong University of Science and Technology, China 2College of Business, Arts and Social Sciences, Brunel University, UK

Image Segmentation Based on Watershed and Edge Detection Techniques Nassir Salman

perform image segmentation and edge detection tasks. We obtained an initial segmentation based on K-means clustering

Faculty of Science and Information Technology, Zarq a Private University, Jordan

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

integrity  for  flexible  and  traditional  remote  syste ms.  SIMS  is  not  only  targeted  for  Linux,  but  it  can   also  be  used  for  different 

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Abstract: In  this paper,  we propose  to design  a  cross-layer b ased  intrusion detection  technique for  wireless networks.  In  this 

Person-Independent Facial Expression Recognition Based on Compound Local Binary Pattern (CLBP)

            2Samsung Bangladesh R & D Center Ltd, Bangladesh                                                                                3Department of Computer Science and Engineering, Ahs anullah University of Science and Technology, 

Mapping XML to Inverted Indexed Circular

1School of Information Engineering, Anhui Xinhua University, China 2School of Science, Anhui Agricultural University, China 3Department of Computing and New Media Technologies, University of Wisconsin-Stevens Point, USA