Vol 8, No 5 (2016)

Table of Contents

Vol 8, No 5 (2016)

Articles

Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar
 Vol 8, No 5 (2016), Pagination: 1-17
ABSTRACT |  PDF Abstract Views: 440  |  PDF Views: 199
Automated Test Case Generation and Optimization: A Comparative Review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra
 Vol 8, No 5 (2016), Pagination: 19-32
ABSTRACT |  PDF Abstract Views: 527  |  PDF Views: 225
An overview of Extractive Based Automatic Text Summarization Systems
D. K. Kanitha, D. Muhammad Noorul Mubarak
 Vol 8, No 5 (2016), Pagination: 33-44
ABSTRACT |  PDF Abstract Views: 490  |  PDF Views: 525
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer, Akbar Nabiollahi
 Vol 8, No 5 (2016), Pagination: 45-59
ABSTRACT |  PDF Abstract Views: 468  |  PDF Views: 252
Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees
Samir Amri, Lahbib Zenkouar, Mohamed Outahajala
 Vol 8, No 5 (2016), Pagination: 61-71
ABSTRACT |  PDF Abstract Views: 494  |  PDF Views: 262
Modigen: Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart, Marko Boger
 Vol 8, No 5 (2016), Pagination: 73-91
ABSTRACT |  PDF Abstract Views: 445  |  PDF Views: 184
Design and Development of Business Rules Management System (BRMS) Using Atland Eclipse Sirius
Lynda Ait Oubelli, Mourad Oussalah
 Vol 8, No 5 (2016), Pagination: 93-105
ABSTRACT |  PDF Abstract Views: 506  |  PDF Views: 203
Clohui: An Efficient Algorithm for Mining Closed+ High Utility Itemsets from Transaction Databases
Shiming Guo, Hong Gao
 Vol 8, No 5 (2016), Pagination: 107-126
ABSTRACT |  PDF Abstract Views: 484  |  PDF Views: 219
A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein
 Vol 8, No 5 (2016), Pagination: 127-133
ABSTRACT |  PDF Abstract Views: 603  |  PDF Views: 237