Sciweavers

IAJIT
2010
179views more  IAJIT 2010»
13 years 10 months ago
Enhanced Quicksort Algorithm
: Sorting is considered as one of the important issues of computer science. Although there is a huge number of sorting algorithms, sorting problem has attracted a great deal of res...
Rami Mansi
IAJIT
2010
157views more  IAJIT 2010»
13 years 10 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
IAJIT
2010
154views more  IAJIT 2010»
13 years 10 months ago
Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation
: The software capability maturity model has become a popular model for enhancing software development processes with the goal of developing high-quality software within budget and...
Majed Al Yahya, Rodina Ahmad, Sai Lee
IAJIT
2010
85views more  IAJIT 2010»
13 years 10 months ago
Hiding Text Information in a Digital Image Based on Entropy Function
: The paper is concerned with hiding information into a digital image, specifically, an English text is used to be hidden into a digital grey-scale image. The purpose of this resea...
Nasser Hamad
IAJIT
2010
84views more  IAJIT 2010»
13 years 10 months ago
A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs
: A test procedure for testing mainly the boundary scan cells, and testing partially the test access port controller in programmable logic devices, and field programmable gate arra...
Bashar Al-Khalifa
IAJIT
2010
81views more  IAJIT 2010»
13 years 10 months ago
Credit Scoring Models Using Soft Computing Methods: A Survey
: During the last fifteen years, soft computing methods have been successfully applied in building powerful and flexible credit scoring models and have been suggested to be a possi...
Adel Lahsasna, Raja Noor Ainon, Teh Ying Wah
IAJIT
2010
191views more  IAJIT 2010»
13 years 10 months ago
Identification of Promoter Region in Genomic DNA Using Cellular Automata Based Text Clustering
: Identifying the promoter regions play a vital role in understanding human genes. This paper presents a new cellular automata based text clustering algorithm for identifying these...
Kiran Sree, Ramesh Babu
IAJIT
2010
150views more  IAJIT 2010»
13 years 10 months ago
Optimal DSP Based Integer Motion Estimation Implementation for H.264/AVC Baseline Encoder
: The coding gain of the H.264/AVC video encoder mainly comes from the new incorporated prediction tools. However, their enormous computation and ultrahigh memory bandwidth are the...
Imen Werda, Haithem Chaouch, Amine Samet, Mohamed ...
IAJIT
2010
166views more  IAJIT 2010»
13 years 10 months ago
Specification and Prototyping of Reactive Distributed Systems with Algebraic Term Nets
: The specification of the dynamic behaviour of reactive distributed systems must exhibit the structures of control and has to imply explicitly the relevant aspects of the distribu...
Faiza Bouchoul, Mohamed Mostefai
IAJIT
2010
193views more  IAJIT 2010»
13 years 10 months ago
Performance of OCDMA Systems Using Random Diagonal Code for Different Decoders Architecture Schemes
: In this paper, new code families are constructed for spectral-amplitude coding optical code division multiple access, called random diagonal code for spectral amplitude coding op...
Hilal Adnan Fadhil, Syed Alwee Aljunid, Badlished ...