Vol 8, No 5 (2016)

Table of Contents

Vol 8, No 5 (2016)

Articles

Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar
 Vol 8, No 5 (2016), Pagination: 1-17
ABSTRACT |  PDF Abstract Views: 217  |  PDF Views: 116
Automated Test Case Generation and Optimization: A Comparative Review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra
 Vol 8, No 5 (2016), Pagination: 19-32
ABSTRACT |  PDF Abstract Views: 252  |  PDF Views: 142
An overview of Extractive Based Automatic Text Summarization Systems
D. K. Kanitha, D. Muhammad Noorul Mubarak
 Vol 8, No 5 (2016), Pagination: 33-44
ABSTRACT |  PDF Abstract Views: 264  |  PDF Views: 440
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer, Akbar Nabiollahi
 Vol 8, No 5 (2016), Pagination: 45-59
ABSTRACT |  PDF Abstract Views: 205  |  PDF Views: 115
Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees
Samir Amri, Lahbib Zenkouar, Mohamed Outahajala
 Vol 8, No 5 (2016), Pagination: 61-71
ABSTRACT |  PDF Abstract Views: 215  |  PDF Views: 128
Modigen: Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart, Marko Boger
 Vol 8, No 5 (2016), Pagination: 73-91
ABSTRACT |  PDF Abstract Views: 217  |  PDF Views: 98
Design and Development of Business Rules Management System (BRMS) Using Atland Eclipse Sirius
Lynda Ait Oubelli, Mourad Oussalah
 Vol 8, No 5 (2016), Pagination: 93-105
ABSTRACT |  PDF Abstract Views: 218  |  PDF Views: 113
Clohui: An Efficient Algorithm for Mining Closed+ High Utility Itemsets from Transaction Databases
Shiming Guo, Hong Gao
 Vol 8, No 5 (2016), Pagination: 107-126
ABSTRACT |  PDF Abstract Views: 206  |  PDF Views: 111
A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein
 Vol 8, No 5 (2016), Pagination: 127-133
ABSTRACT |  PDF Abstract Views: 357  |  PDF Views: 151