Vol 8, No 5 (2016)

Table of Contents

Vol 8, No 5 (2016)

Articles

Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar
 Vol 8, No 5 (2016), Pagination: 1-17
ABSTRACT |  PDF Abstract Views: 436  |  PDF Views: 194
Automated Test Case Generation and Optimization: A Comparative Review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra
 Vol 8, No 5 (2016), Pagination: 19-32
ABSTRACT |  PDF Abstract Views: 525  |  PDF Views: 223
An overview of Extractive Based Automatic Text Summarization Systems
D. K. Kanitha, D. Muhammad Noorul Mubarak
 Vol 8, No 5 (2016), Pagination: 33-44
ABSTRACT |  PDF Abstract Views: 487  |  PDF Views: 523
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer, Akbar Nabiollahi
 Vol 8, No 5 (2016), Pagination: 45-59
ABSTRACT |  PDF Abstract Views: 462  |  PDF Views: 246
Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees
Samir Amri, Lahbib Zenkouar, Mohamed Outahajala
 Vol 8, No 5 (2016), Pagination: 61-71
ABSTRACT |  PDF Abstract Views: 493  |  PDF Views: 259
Modigen: Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart, Marko Boger
 Vol 8, No 5 (2016), Pagination: 73-91
ABSTRACT |  PDF Abstract Views: 441  |  PDF Views: 182
Design and Development of Business Rules Management System (BRMS) Using Atland Eclipse Sirius
Lynda Ait Oubelli, Mourad Oussalah
 Vol 8, No 5 (2016), Pagination: 93-105
ABSTRACT |  PDF Abstract Views: 502  |  PDF Views: 201
Clohui: An Efficient Algorithm for Mining Closed+ High Utility Itemsets from Transaction Databases
Shiming Guo, Hong Gao
 Vol 8, No 5 (2016), Pagination: 107-126
ABSTRACT |  PDF Abstract Views: 480  |  PDF Views: 216
A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein
 Vol 8, No 5 (2016), Pagination: 127-133
ABSTRACT |  PDF Abstract Views: 602  |  PDF Views: 235