The International Arab Journal of Information Technology (IAJIT)

Smelling the Web Olfactory Display for Web

Saad Abid2, Zhiyong Li1, and Renfa Li1 1College of Information Science and Engineering, Hun an University, China 2Department of Computer Science and Informatics, Al- Mansour University College, Iraq   
#

Meng Han1,2, Zhihai Wang1, and Jidong Yuan1 1School of Computer and Information Technology, Beij ing Jiaotong University, China* 2School of Computer Science and Engineering, Beifang University of Nationalities, China

School of Computer Science and Technology, Xidian U niversity, China 

Ke Yan1, Hong Zhu1, and Kevin Lü2 1School of Computer Science and Technology, Huazhong University of Science and Technology, China 2College of Business, Arts and Social Sciences, Brunel University, UK
#

Jin-long Zhu1, Wenhui Li2, Huiying Li2, Qiong Wu2, and Liang Zhang2 1Department of Computer Science and Technology, ChangChun Normal University, China 2Department of Computer Science and Technology, Jilin University, China

TDMCS: An Efficient Method for Mining Closed

Meng Han, Jian Ding, and Juan Li School of Computer Science and Engineering, North Minzu University, China

Mapping XML to Inverted Indexed Circular

1School of Information Engineering, Anhui Xinhua University, China 2School of Science, Anhui Agricultural University, China 3Department of Computing and New Media Technologies, University of Wisconsin-Stevens Point, USA

Xia Zhai1, Weiwei Guo2, Yongqin Zhang3, Jinsheng Xiao4, and Xiaoguang Hu5 1Arts Department, Henan University of Economics and Law, China 2Department of Information and Communication Engineering, University of Electronic Science and
#

Image Steganography Based on Hamming Code

School of Electronics and Information Engineering, Fuqing Branch of Fujian Normal University, China

Bilateral Multi-Issue Negotiation Model for a Kind

1College of Computer Science and Electronic Engineering, Hunan University, China 2The Second Hospital, University of South China, China 3Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China

Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol

Department of Network Engineering, Information Engi neering University, China 2Department of Computer Science and Engineering, Sha nghai Jiaotong University, China 3Institute of China Electronic System Engineering Corporation, China

A Framework of Summarizing XML Documents with Schemas

Teaching and Research Section of Computer, Army Off icer Academy, China 2School of Science, Anhui Agricultural University, China

PatHT: An Efficient Method of Classification over Evolving Data Streams

Meng Han, Jian Ding, and Juan Li School of Computer Science and Engineering, North Minzu University, China
#