Vol 8, No 5 (2016)

Table of Contents

Vol 8, No 5 (2016)

Articles

Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar
 Vol 8, No 5 (2016), Pagination: 1-17
ABSTRACT |  PDF Abstract Views: 335  |  PDF Views: 155
Automated Test Case Generation and Optimization: A Comparative Review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra
 Vol 8, No 5 (2016), Pagination: 19-32
ABSTRACT |  PDF Abstract Views: 430  |  PDF Views: 184
An overview of Extractive Based Automatic Text Summarization Systems
D. K. Kanitha, D. Muhammad Noorul Mubarak
 Vol 8, No 5 (2016), Pagination: 33-44
ABSTRACT |  PDF Abstract Views: 400  |  PDF Views: 482
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer, Akbar Nabiollahi
 Vol 8, No 5 (2016), Pagination: 45-59
ABSTRACT |  PDF Abstract Views: 361  |  PDF Views: 201
Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees
Samir Amri, Lahbib Zenkouar, Mohamed Outahajala
 Vol 8, No 5 (2016), Pagination: 61-71
ABSTRACT |  PDF Abstract Views: 405  |  PDF Views: 218
Modigen: Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart, Marko Boger
 Vol 8, No 5 (2016), Pagination: 73-91
ABSTRACT |  PDF Abstract Views: 348  |  PDF Views: 140
Design and Development of Business Rules Management System (BRMS) Using Atland Eclipse Sirius
Lynda Ait Oubelli, Mourad Oussalah
 Vol 8, No 5 (2016), Pagination: 93-105
ABSTRACT |  PDF Abstract Views: 410  |  PDF Views: 165
Clohui: An Efficient Algorithm for Mining Closed+ High Utility Itemsets from Transaction Databases
Shiming Guo, Hong Gao
 Vol 8, No 5 (2016), Pagination: 107-126
ABSTRACT |  PDF Abstract Views: 383  |  PDF Views: 169
A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein
 Vol 8, No 5 (2016), Pagination: 127-133
ABSTRACT |  PDF Abstract Views: 495  |  PDF Views: 188