Vol 8, No 5 (2016)

Table of Contents

Vol 8, No 5 (2016)

Articles

Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar
 Vol 8, No 5 (2016), Pagination: 1-17
ABSTRACT |  PDF Abstract Views: 307  |  PDF Views: 144
Automated Test Case Generation and Optimization: A Comparative Review
Rajesh Kumar Sahoo, Deeptimanta Ojha, Durga Prasad Mohapatra, Manas Ranjan Patra
 Vol 8, No 5 (2016), Pagination: 19-32
ABSTRACT |  PDF Abstract Views: 402  |  PDF Views: 173
An overview of Extractive Based Automatic Text Summarization Systems
D. K. Kanitha, D. Muhammad Noorul Mubarak
 Vol 8, No 5 (2016), Pagination: 33-44
ABSTRACT |  PDF Abstract Views: 375  |  PDF Views: 470
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer, Akbar Nabiollahi
 Vol 8, No 5 (2016), Pagination: 45-59
ABSTRACT |  PDF Abstract Views: 332  |  PDF Views: 172
Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees
Samir Amri, Lahbib Zenkouar, Mohamed Outahajala
 Vol 8, No 5 (2016), Pagination: 61-71
ABSTRACT |  PDF Abstract Views: 379  |  PDF Views: 183
Modigen: Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart, Marko Boger
 Vol 8, No 5 (2016), Pagination: 73-91
ABSTRACT |  PDF Abstract Views: 308  |  PDF Views: 128
Design and Development of Business Rules Management System (BRMS) Using Atland Eclipse Sirius
Lynda Ait Oubelli, Mourad Oussalah
 Vol 8, No 5 (2016), Pagination: 93-105
ABSTRACT |  PDF Abstract Views: 381  |  PDF Views: 155
Clohui: An Efficient Algorithm for Mining Closed+ High Utility Itemsets from Transaction Databases
Shiming Guo, Hong Gao
 Vol 8, No 5 (2016), Pagination: 107-126
ABSTRACT |  PDF Abstract Views: 355  |  PDF Views: 158
A Comparison between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein
 Vol 8, No 5 (2016), Pagination: 127-133
ABSTRACT |  PDF Abstract Views: 461  |  PDF Views: 177