Sciweavers

Share
IAJIT
2010
155views more  IAJIT 2010»
9 years 1 months ago
Evaluation of text clustering methods using wordnet
: The increasing number of digitized texts presently available notably on the Web has developed an acute need in text mining techniques. Clustering systems are used more and more o...
Abdelmalek Amine, Zakaria Elberrichi, Michel Simon...
IAJIT
2010
147views more  IAJIT 2010»
9 years 1 months ago
A novel radon-wavelet based OFDM system design and performance under different channel conditions
: Finite Radon Transform mapper has the ability to increase orthogonality of sub-carriers, it is non sensitive to channel parameters variations, and has a small constellation energ...
Abbas Hasan Kattoush
IAJIT
2010
152views more  IAJIT 2010»
9 years 1 months ago
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects
: Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way t...
Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, ...
IAJIT
2010
102views more  IAJIT 2010»
9 years 2 months ago
Multilayer neural network-burg combination for acoustical detection of buried objects
: A Burg technique is employed to model the long wavelength localization and imaging problem. A Burg method is used as a high resolution and stable technique. The idea of in-line h...
Mujahid Al-Azzo, Lubna Badri
IAJIT
2010
174views more  IAJIT 2010»
9 years 2 months ago
Brightness preserving image contrast enhancement using weighted mixture of global and local transformation functions
: Transformation functions utilizing the global information content of an input image have been long serving contrast enhancement by stretching the dynamic range of intensity level...
Md. Hasanul Kabir, Mohammad Abdullah-Al-Wadud, Oks...
IAJIT
2010
190views more  IAJIT 2010»
9 years 2 months ago
Framework for intrusion detection in IEEE 802.11 wireless mesh networks
: Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been pr...
Shafiullah Khan, Kok-Keong Loo, Zia Ud Din
IAJIT
2010
123views more  IAJIT 2010»
9 years 2 months ago
Implementation of a speech coding strategy for auditory implants
: In this paper we present the conception and the implementation of a speech processing interface for cochlea prosthesis. This module is based on a numerical speech processing algo...
Lamia Bouafif, Kais Ouni, Noureddine Ellouze
IAJIT
2010
133views more  IAJIT 2010»
9 years 2 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa
IAJIT
2010
129views more  IAJIT 2010»
9 years 2 months ago
An algorithm for diagnosis of the three kinds of constitutional jaundice
: In this paper we have made an algorithm to diagnose the Constitutional Jaundice (Dubin-Johnson, Gilbert and Rotor syndrome) the algorithm is decomposed into two parts: 1) using W...
Shaker Ali, Zou Beiji, Abbas Ali
IAJIT
2010
196views more  IAJIT 2010»
9 years 2 months ago
A modified high capacity image steganography technique based on wavelet transform
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...
Ali Al-Ataby, Fawzi Al-Naima
books