| Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface |
| Alaa Ismail Elnashar, Minia University, Egypt and Taif University, Saudi Arabia |
| Volume : 8 volume number : 5 pdf |
| Automated Test Case Generation and Optimization : A Comparative Review |
| Rajesh Kumar Sahoo1, Deeptimanta Ojha1, Durga Prasad Mohapatra2 and Manas Ranjan Patra3, 1A.B.I.T, India, 2NIT - Rourkela, India and 3Berhampur University, India |
| Volume : 8 volume number : 5 pdf |
| An Overview of Extractive Based Automatic Text Summarization Systems |
| Kanitha.D.K and D. Muhammad Noorul Mubarak, University of Kerala, India |
| Volume : 8 volume number : 5 pdf |
| Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis |
| Farzaneh Sadat Jalayer and Akbar Nabiollahi, Islamic Azad University, Iran |
| Volume : 8 volume number : 5 pdf |
| Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees |
| Samir AMRI1, Lahbib ZENKOUAR1 and Mohamed OUTAHAJALA2, 1Mohammed V University in Rabat, Morocco and 2Royal Institute of Amazigh Culture (IRCAM), Morocco |
| Volume : 8 volume number : 5 pdf |
| MODIGEN : Model-Driven Generation of Graphical Editors in Eclipse |
| Markus Gerhart and Marko Boger, University of Applied Sciences - Konstanz, Germany |
| Volume : 8 volume number : 5 pdf |
| Design and Development of Business Rules Management System (BRMS) Using ATL and Eclipse Sirius |
| Lynda Ait Oubelli and Mourad Oussalah, University of Nantes, France |
| Volume : 8 volume number : 5 pdf |
| CLOHUI : An Efficient Algorithm for Mining Closed High Utility Itemsets from Transaction Databases |
| Shiming Guo and Hong Gao, Harbin Institute of Technology, China |
| Volume : 8 volume number : 5 pdf |
| A Comparison Between Parallel and Segmentation Methods Used for Image Encryption-Decryption |
| Bilal Zahran, Ziad Alqadi, Jihad Nader and Ashraf Abu Ein, Al-Balqa Applied University, Jordan |
| Volume : 8 volume number : 5 pdf |