The International Arab Journal of Information Technology (IAJIT)

Adaptability Metric for Adaptation of the Dynamic Changes

Department of Computer Technology and Applications, Coimbatore Institute of Technology, India 2Department of Applied Mathematics and Computational Sciences, PSG College of Technology,
#

Intelligent Risk Analysis Model for Mining Adaptable Reusable Component

School of Information Technology and Engineering, V IT University, India 2Vivekanandha College of Engineering for Women, Anna University, India
#

Adapted Normalized Graph Cut Segmentation with

Singaravelu Prabhu1 and Dharmaraj Tensing2 1Department of Computer Science and Engineering, Kal aivani College of Technology, India 2 School of Civil Engineering, Karunya University, India
#

An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection

1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa  College, India  

220

TMP Rajkumar1 and Mrityunjaya Latte2 1Research Scholar, Anjuman Engineering College, Indi a 2Principal, JSS Academy of Technical Education, India 

Esther Perumal1 and Shanmugalakshmi Ramachandran2 1Department of Electronics and Communication Enginee ring, Kathir College, India 2Department of CSE, Government College of Technology , India 

Syed Sabir Mohammed1 and Shanmugasundaram Hariharan2 1Faculty in Computer Science and Engineering, Sathya bama University, India 
#

Umarani Srikanth1, Uma Maheswari2, Shanthi Palaniswami3, and Arul Siromoney3 1Computer Science and Engineering Department, S.A. E ngineering College, India 2Department of Information Science and Technology, Anna University, India 3Department of Computer Science and Engineering, Ann a University, India 
#

Securing RSA Algorithm against Timing Attack

Department of Information Technology, Alpha College  of Engineering and Technology, India 
#

Govindasamy Vaiyapuri1 and Thambidurai Perumal2 1Department of Computer Science and Engineering, Pon dicherry Engineering College, India 2Computer Science and Engineering, Perunthalaivar Kamarajar Institute of  
#

Sanjay Singh1 and Trimbak Sontakke2 1Department of Computer Engineering, Siddhant Colleg e of Engineering, India  2Siddhant College of Engineering, India 

VLSI-Oriented Lossy Image Compression Approach using DA-Based 2D-Discrete

Devangkumar Shah1 and Chandresh Vithlani2 1Electronics and Communication Department, RK Univer sity, India 2Electronics and Communication Department, Governmen t Engineering College, India

Constraint-Based Sequential Pattern Mining: A Pattern Growth Algorithm Incorporating

Bhawna Mallick1, Deepak Garg1, and Preetam Singh Grover2 1Department of Computer Science and Engineering, Tha par University, India 2Institute of Technology Grater Noida University, India

Method-level Code Clone Detection for Java

1Department of Computer Science and Engineering, Sri MankulaVinayagar Engineering College, India 2Department of Information Technology, Pondicherry Engineering College, India

A MMDBM Classifier with CPU and CUDA GPU

1Department of Mathematics, Anna University, India 2Department of Mathematics, Indian Institute of Technology, India

Medical Image Segmentation With Fuzzy C-Means

Anusuya Venkatesan1 and Latha Parthiban2 1Department of Information Technology, Saveet ha School of Engineering, India 2Department of Computer Science, Pondicherry University, India

Pseudorandom Noise Sequence of Digital Watermarking Algorithm based on Discrete

1Department of Electronics and Communication Engineering, St.Martin’s Engineering College, India 2Department of Computer and Science Engineering, Bannari Amman Institute of Technology, India 3Department of Electronics and Communication Engineering, Sri Shakthi Instituteof Engineering and

Using 3D Convolutional Neural Network in Surveillance Videos for Recognizing Human

1Department of Computer Science and Engineering, Adithya Institute of Technology, India 2Department of Information Technology, Woldia University, Ethiopia

Performance Analysis of Security Requirements

Salini Prabhakaran1 and Kanmani Selvadurai2 1Department of Computer Science and Engineering, Pondicherry Engineering College, India 2Department of Information Technology, Pondicherry Engineering College, India