Advanced search
Filters

Search Results

(401 - 450 of 6642)
Journal Articles

Cyber security using Arabic CAPTCHA scheme

By: Khan, Bilal; al-Ghathbar, Khalid; Khan, Muhammad Khurram…[et al.]. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 10 p.

Subjects: Data processing; Data protection; Security systems; Computer networks

Journal Articles

An enhanced mechanism for image steganography using sequential colour cycle algorithm

By: Por, Lip Yee; Beh, Delina; Ong, Sim Ying…[et al.]. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 10 p.

Subjects: Cryptography; Data encryption; Digital electronics

Journal Articles

Arabic expert system shell

By: Samawi, Venus W.; Mustafa, Akram; Ahmad, Abir. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 9 p.

Subjects: Computational linguistics; Expert systems

Journal Articles

Automated retrieval of semantic web services : a matching based on conceptual indexation

By: Fath Allah, Hadjila; Amin, Shaykh. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 6 p.

Subjects: Cloud computing; Web service

Journal Articles

Frequency of occurrence analysis attack and its countermeasure

By: Por, Lip Yee. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 9 p.

Subjects: Security systems; Computer networks

Journal Articles

Selection of distinctive SIFT feature based on its distribution on feature space and local classifier for face recognition

By: Liu, Tong; Kim, Sung-Hoon; Lim, Sung-Kil…[et al.]. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 8 p.

Journal Articles

Effect of resampling steepness on particle filtering performance in visual tracking

By: Islam, Zahidul; Oh, Chi-Min; Lee, Chil-Woo. The International Arab Journal of Information Technology. Vol. 10, no. 1 (Jan. 2013), 9 p.

Journal Articles

Hamiya haramiya : evaluating the P5 as custodians of international peace and security

By: Uthman, Ahmad. Communication and Development. No. 7 (Jan. 2013), pp.7-29, 23 p.

Journal Articles

Network security management using ontology-based mobile agents

By: Ali, Abd Allah Marich; Madkur, Muhammad Ashraf Ismail; Batarfi, Umar Abd Allah. Journal of King Abdulaziz University : Computing and Information Technology Sciences. Vol. 1, no. 2 (2012), pp.25-44, 20 p.

Journal Articles

Transformation matrix for 3D computer graphics based on FPGA

By: Ali, Fakhr al-Din Hamid. al-Rafidain Engineering Journal. Vol. 20, no. 5 (Oct. 2012), pp.1-15, 15 p.

Journal Articles

Communication et changement social : le processus de l’I.D .A. U.

By: Guenaou, Mustafa. Communication and Development. No. 6 (Oct. 2012), pp.9-38, 30 p.

Journal Articles

La volonté de changement chez les jeunesà travers la chanson : cas du rap Algérie

By: Boumedini, Balqasim. Communication and Development. No. 6 (Oct. 2012), pp.39-50, 12 p.

Subjects: Algeria; Case studies; Effect; Youth; Social aspects

Journal Articles

Espace public médiatique en Algérieà : a la recherche d’un modèle

By: Boudhane, Yamine. Communication and Development. No. 6 (Oct. 2012), pp.51-73, 23 p.

Journal Articles

Optimal palette create with the specified number of colors using octree quantization

By: Muhammad, Faysal Ghazi. Iraqi Journal of Science. Vol. 53, no. 3 (2012), pp.677-682, 6 p.

Subjects: Chemistry; Colors; Digital electronics; Light; Optics

Journal Articles

New approach for solving multi-objective problems

By: Ahmad, Ala al-Din Nuri; Ibrahim, Nadhir Abbas. Journal of Economics and Administrative Science. Vol. 18, no. 67 (2012), pp.1-10, 10 p.

Subjects: Neural networks; Software

Journal Articles

Design a security network system against internet worms

By: Abd al-Jabbar, Rana Diya. al-Khwarizmi Engineering Journal. Vol. 8, no. 3 (2012), pp.40-52, 13 p.

Subjects: Computers; Data protection; Security systems; Computer networks; Computer viruses

Journal Articles

Web ranking and rating server usng web service

By: Abd al-Latif, Firas Abd al-Hamid. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 2 (2012), 14 p.

Subjects: Internet searching

Journal Articles

Suggestion and upgrading extreme programming methodology in web-based project development

By: Ghani, Ali Yahya. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 2 (2012), 8 p.

Subjects: Engineering; Economic and social development; Software engineering

Journal Articles

Image retrieval based on coefficient correlation index

By: Abd al-Latif, Alaa Abd al-Hamid. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 2 (2012), 8 p.

Subjects: Data processing

Journal Articles

Application of immune complement algorithm to NSL-KDD intrusion detection dataset

By: al-Dabbagh, Najla B.; Khalil, Mafaz M.. al- Rafidain Journal of Computer Sciences and Mathematics. Vol. 9, no. 2 (2012), pp.109-123, 15 p.

Subjects: Anatomy; Immunology

Journal Articles

Clustering and detecting network intrusion based on fuzzy algorithms

By: Kashmula, Manar Y.; Khalil, Bayda I.. al- Rafidain Journal of Computer Sciences and Mathematics. Vol. 9, no. 2 (2012), pp.125-138, 14 p.

Subjects: Computers; Data protection; Security systems; Computer networks

Journal Articles

Extraction and recognition of color feature in true color images using neural network based on colored histogram technique

By: al-Jawadi, Urjuwan M. A.. al- Rafidain Journal of Computer Sciences and Mathematics. Vol. 9, no. 2 (2012), pp.167-181, 15 p.

Subjects: Digital electronics; Neural networks

Journal Articles

Reward effect in reinforcement learning systems

By: Bashir, Lubna Zaghlul; Walid, Zaynah. Iraqi Journal of Computer, Communications and Control Engineering. Vol. 12, no. 1 (2012), pp.69-95, 27 p.

Journal Articles

Computing nodes and links appearances on geodesics in networks topologies using graph theory

By: Yusuf, Sadiq Amin; Suud, Layth Jasim. Iraqi Journal of Computer, Communications and Control Engineering. Vol. 12, no. 1 (2012), pp.96-103, 8 p.

Journal Articles

Intrusion detection using a mixed features fuzzy clustering algorithm

By: Hamid, Sarab Majid; Sulayman, Sumayyah Sad. Iraqi Journal of Science. Vol. 53, no. 2 (2012), pp.427-434, 8 p.

Subjects: Computers; Data protection; Security systems; Computer networks; Fuzzy sets

Journal Articles

A method of impulse noise detection by using Laplacian Gaussian filter adapted with Genetic Algorithm

By: al-Anzi, Maysa Husam. Iraqi Journal of Science. Vol. 53, no. 2 (2012), pp.419-426, 8 p.

Subjects: Algorithms; Digital electronics; Silence; Sound; Noise

Journal Articles

A novel approach to RGB channel based image steganography technique

By: Swain, Gandharba; Lenka, Saroj Kumar. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.181-186, 6 p.

Subjects: Cryptography; Data processing

Journal Articles

An effective method for data compression based on adaptive character wordlength

By: al-Hayik, Wiam. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.197-202, 6 p.

Subjects: Algorithms; Database management

Journal Articles

An information retrieval model from world wide web based on formal concept analysis

By: Hidri, Minyar Sassi; Touzi, Amel Grissa. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.187-196, 10 p.

Subjects: Information retrieval; Internet; Internet searching

Journal Articles

Developing a three-tier web data management application for higher education admission environment

By: al-Mukhtar, Mumtaz; Hadi, Sarmad. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.175-180, 6 p.

Subjects: Database management; Administration; Data processing; Universities and colleges

Journal Articles

Medical documents classification based on the domain ontology MeSH

By: al-Berrichi, Zakariyya; Amel, Belaggoun; al-Taibi, Malika. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.210-215, 6 p.

Subjects: Data processing

Journal Articles

Opportunities for utilizing mobile learning services in the Palestinian higher education

By: al-Zaza, Naji Shukri. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.216-222, 7 p.

Subjects: Palestine; Higher education

Journal Articles

Self organizing maps based life enhancement framework for wireless sensor networks

By: Abd al-Mannan. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.223-228, 6 p.

Subjects: Neural networks

Journal Articles

The impact of e-learning in workplace : focus on organizations and healthcare environments

By: David, Oye; Salih, Mazleena; Iahad, Noorminshah. International Arab Journal of E-Technology. Vol. 2, no. 4 (Jun. 2012), pp.203-209, 7 p.

Subjects: Administration; Information technology; Intellectual capital; Employees; Knowledge management

Journal Articles

The impact of US public diplomacy in the Gulf : an investigationof radio Sawa

By: Galander, Mahmud M.. Tafakkur. Vol. 12, no. 1 (2012), pp.1-21, 21 p.

Subjects: Diplomacy; Mass media; Radio Sawa (United states)

Statistical Reports

Communications and information. Selected communications and information indicators, 2010-2011.

Jordan in Figures. Jordan.; Department of Statistics No. 14 (May. 2012), pp.26-26, 1 p.

Subjects: Conventional Armed Forces in Europe Treaty, 1990; Jordan; Statistics; Communication

Statistical Reports

Information society.

Palestine in Figures. Palestinian Central Bureau of Statistics (Ramallah, Palestine) Vol. (May. 2012), pp.38-41, 4 p.

Subjects: Palestine; Statistics; Information community

Journal Articles

Rôle des médias sociaux dans les révolutions au Maghreb

By: Draatani, Bentenbi Chaib. Communication and Development. No. 5 (May. 2012), pp.25-40, 16 p.

Journal Articles

The effect of window size changing on satellite image segmentation using 2D fast otsu method

By: Naji, Taghrid Abd al-Hamid. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 1 (2012), 10 p.

Subjects: Digital electronics; Mathematical models; Remote Sensing

Journal Articles

A new method for iris segmentation and feature extraction in spatial domain

By: Taha, Dujan B.; Ibrahim, Shamil Q.. al- Rafidain Journal of Computer Sciences and Mathematics. Vol. 9, no. 1 (2012), pp.35-46, 12 p.

Journal Articles

Steganalysis using KL transform and radial basis neural network

By: Hassun, Sawfan O.; Khalifah, Farhad M.. al- Rafidain Journal of Computer Sciences and Mathematics. Vol. 9, no. 1 (2012), pp.47-58, 12 p.

Subjects: Cryptography; Data encryption; Neural networks

Journal Articles

Brain tumor detection using snake algorithm and fuzzy C-mean

By: Ramu, Ramadan M.. al- Rafidain Journal of Computer Sciences and Mathematics. Vol. 9, no. 1 (2012), pp.85-100, 16 p.

Subjects: Brain; Mathematical models; Tumors

Journal Articles

Enhancement of stream cipher by using in length variant register

By: Taha, Namar Abd al-Malik. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 1 (2012), 11 p.

Subjects: Algorithms; Cryptography; Data encryption

Journal Articles

Image encryption technique using lagrange interpolation

By: Akif, Umar Ziyad. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 1 (2012), 16 p.

Subjects: Computers; Cryptography; Data encryption; Digital electronics; Security systems

Journal Articles

Comparison of wavelet transform filters using image compression

By: Abbas, Hind Khudayr. Ibn al-Haitham Journal for Pure and Applied Science. Vol. 25, no. 1 (2012), 12 p.

Subjects: Data processing; Mathematics

Journal Articles

Fatwa in the new millennium : how the new media affects Muslim students’ attention to and participation in the Islamic matter

By: al-Awad, Sayf al-Din Hasan. Sudanese Public Opinion Studies Magazine. No. 2 (Mar. 2012), pp.5-25, 21 p.

Subjects: Islamic Fatawa; Social networking Web sites; Internet; Islam; Religious aspects

Journal Articles

The impacts of social networking sites on university students

Sudanese Public Opinion Studies Magazine. No. 2 (Mar. 2012), pp.26-58, 33 p.

Subjects: Social networking Web sites; Sudan; Websites; Attitudes; University students

Journal Articles

On using the symmetric group in a cryptosystem

By: Uthman, Jamal Ahmad. Iraqi Journal of Science. Vol. 53, no. 1 (2012), pp.186-193, 8 p.

Subjects: Data encryption; Symbolism; Writing; Cryptography

Journal Articles

Overhead evaluation in real-time network intrusion detection fyttem using snort

By: Yasir, Suhad Abbas. Journal of the University of Thi-Qar. Vol. 7, no. 2 (Mar. 2012), pp.52-63, 12 p.

Subjects: Computers; Data protection; Security systems; Computer networks

Journal Articles

Attacking public key encryption algorithm tiling genetic bated tinting attack

By: al-Salami, Miqdam Abd al-Jabbar Turki. Journal of the University of Thi-Qar. Vol. 7, no. 2 (Mar. 2012), pp.74-82, 9 p.

Subjects: Algorithms; Data encryption; Symbolism; Writing; Cryptography

Advanced Search

Search Controls

Article Limiters

Phrase