The International Arab Journal of Information Technology (IAJIT)

Balanced Workload Clusters for Distributed Object Oriented Software

Abstract: When clustering objects to be allocated on a numbe r of nodes, most researches focus only on either the

An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection

1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa  College, India  

Thomas Brindha and Ramaswamy Shaji
#

On Demand Ciphering Engine Using Artificial Neural Network

Department of Computer Engineering, Mosul Universit y, Iraq
#

Ke Yan1, Hong Zhu1, and Kevin Lü2 1School of Computer Science and Technology, Huazhong University of Science and Technology, China 2College of Business, Arts and Social Sciences, Brunel University, UK
#

2008 Shadow Casting with Stencil Buffer for

Faculty of Computer Science and Information System, Universiti Teknologi Malaysia, Malaysia

Facile Programming Hanan Elazhary

programming  is  still  hard  for  many  people  especiall y  those  from  disciplines  that  are  not  computer-related.  Facile 

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

integrity  for  flexible  and  traditional  remote  syste ms.  SIMS  is  not  only  targeted  for  Linux,  but  it  can   also  be  used  for  different 

Decoder Up to 4 Errors 

The Veracious Counting Bloom Filter

works on dynamic sets rather than a static set via item insertions and deletions. CBF allows false positive, but not false
#

STF-DM: A Sparsely Tagged Fragmentation with Dynamic Marking an IP Traceback Approach

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are serious threats to the Internet. The

Image Processing in Differential Digital

Faculty of Electrical Engineering, Computer Science and Information Technology in University of

Service Process Modelling and Performance Analysis for Composite Context Provisioning in IoT

our life. Some devices are being used by us such as the smart phones while others are most of the time invisible to us such as