Current Issue
April 2023, Volume 15, Number 2
Application Security Self-Efficacy of Software Developers: A Correlational Study
Wisdom Umeugo, Independent Researcher, Canada
Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition
Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey
Linear Feedback Shift Register Genetically Adjusted for Sequence Copying
Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico
The Development of Climate Agrometeorological Application for Farmers in Namibia
Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia
February 2023, Volume 15, Number 1
Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry
Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA
Prediction of Anemia using Machine Learning Algorithms
Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal
Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA
Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines
Kouassi Konan Jean-Claude, Bircham International University, Spain
Thongchai Jeeradist, Kasem Bundit University, Thailand
Behavioural Analytics in Cyber Security for Digital Forensics Application
Martin Luther Bwangah, Kabarak University, Kenya
December 2022, Volume 14, Number 6
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical Systems
Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli, Ramya Thatikonda, Adithya Padthe, University of the Cumberlands, USA
Electronic Letter of Guarantee for Banking System
Sherif Kamel Hussein1, Abdullah Alhayan2, 1October University for Modern Sciences and Arts, Egypt, & Arab East Colleges for Graduate Studies, KSA, 2Arab East Colleges for Graduate Studies, KSA
Testing-as-a-Service (TaaS) – Capabilities and Features for Real-Time Testing in Cloud
Pawankumar Sharma1, Prasad Chetti2 and Lotfollah Najjar3, 1University of the Cumberlands, USA, 2Northwest Missouri State University, USA, 3University of Nebraska, USA
Pegah Ahadian, Maryam Babaei and Kourosh Parand, Shahid Beheshti University, Iran
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning
Arshiya Khan and Chase Cotton, University of Delaware, USA
October 2022, Volume 14, Number 5
Natarajan Meghanathan, Jackson State University, USA
Edge Controller Placement for Next Generation Wireless Sensor Networks
Mohamed S. Abouzeid, Heba A. El-khobby, Mahmoud A. A. Ali and Mohamed E. Nasr, Tanta University, Egypt
Sherif Kamel Hussein1, 2, Sultanah AL-Sedairi2 and Nawal AL-Rahimi2, 1October University for Modern Sciences and Arts, Egypt 2Arab East Colleges for Graduate Studies, KSA
Dyslexic Reading Assistance with Language Processing Algorithms
Sharada Lakshmanan, Equifax, USA
Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria
August 2022, Volume 14, Number 4
Compact Preservation of Scrambled CD-Rom Data
Jacob Hauenstein, The University of Alabama in Huntsville, USA
Identify the Beehive Sound using Deep Learning
Shah Jafor Sadeek Quaderi1, Sadia Afrin Labonno2, Sadia Mostafa2 and Shamim Akhter3, 1University of Malaya, Malaysia, 2AISIP Lab, International University of Business Agriculture and Technology, Bangladesh, 3Stamford University Bangladesh, Bangladesh
Arghya Kusum Das, University of Alaska Fairbanks, USA
Arabic Dataset for Farmers’ Intent Identification Toward Developing a Chatbot
Abdelrahman Elsayed and Susan F. Ellakwa, Agricultural Research Center, Giza, Egypt
Impact of 4IR Technology and its Impact on the Current Deployment
Bandar Alsulaimani1 and Amanul Islam2, 1King Fahad University of Petroleum and Minerals (KFUPM), Saudi Arabia, 2University of Malaya, Malaysia
A Short Survey on Constructing an IoT based Intelligent Road System
F. O. Okorodudu, G. C. Omede, S. A. Otegbalor, Delta State University, Nigeria
Impact of Pandemic on E-Commerce in Asia
Bilal Ahmed Wani and Noor Azizah BT. Mohamad Ali, Kulliyyah of Information and Communication Technology International Islamic University of Malaysia, Malaysia
June 2022, Volume 14, Number 3
Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks Using the Mobile Unity
Reham.A.Shihata, EL Menoufia University, Egypt
The Digital Carbon Footprint: Threat to an Environmentally Sustainable Future
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, USA
Combining Machine Learning and Semantic Analysis for Efficient Misinformation Detection of Arabic Covid-19 Tweets
Abdulrahim Alhaizaey and Jawad Berri, King Saud University, Saudi Arabia
Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing
Jacob Bushur and Chao Chen, Purdue University Fort Wayne Fort Wayne, USA
Security in Wireless Sensor Networks: Comparative Study
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei and Aseel Abdullah Alfaidi, Jeddah University, Saudi Arabia
Big Data and Cloud Readiness
Hazirah Bee Yusof Ali and Lili Marziana Abdullah, Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Malaysia
The Professionalization of the Hacker Industry
Tyson Brooks, Syracuse University, USA
Visually Impaired People Monitoring in a Smart Home using Electronic White Cane
Mikaël A. Mousse, Institut Universitaire de Technologie, Université de Parakou, Benin
Covid-19 Sparked the E-Commerce Revolution; Some Benefited, While Others Left in Cold
Bilal Ahmed Wani and Dr. Noor Azizah BT. MohamadAli, International Islamic University of Malaysia, Malaysia
April 2022, Volume 14, Number 2
Smsecurity: Security System and SMS Notification Cum Face Recognition
Winston G. Domingo1, Arnold Dela Cruz2, Klaida Nicolas2, Jennifer A. Gamay MIT2, Erwin N. Lardizabal2 and Virdi C. Gonzales3, 1Quirino State University, Philippines, 2Cagayan Valley Computer and Information Technology, Philippines, 3Southern Isabela Medical Center, Philippines
Remote Work and Innovation During this Covid-19 Pandemic: An Employers’ Challenge
Bibhu Dash, University of the Cumberlands, USA
Failure Free Cloud Computing Architectures
Yolam Zimba1, Hastings Maboshe Libati2 and Derrick Ntalasha2, 1University of Lusaka, Zambia, 2Copperbelt University, Zambia
User Experience Evaluation of a Student Information System
Asaad Alzayed and Bareeq Alghannam, Public Authority for Applied Education and Trainin, Kuwait
February 2022, Volume 14, Number 1
Mobile Device Users’ Susceptibility to Phishing Attacks
F. Ley Sylvester, Tarrant County College, USA
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation
Tayeb Basta, Al Ghurair University, UAE
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog
Márcio Miguel Gomes1, Rodrigo da Rosa Righi1, Cristiano André da Costa1 and Dalvan Griebler2, 1University of Vale do Rio dos Sinos – Brazil, 2Pontifical Catholic University of Rio Grande do Sul, Brazil
Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route
Joe Dumas, University of Tennessee at Chattanooga, USA
Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma and Osman Kandara, Southern University and A&M College, USA
Encryption based Watermarking Technique for Security of Medical Image
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria
Feature Extraction Methods for IRIS Recognition System: A Survey
Tara Othman Qadir1, Nik Shahidah Afifi Md Taujuddin1 and Sundas Naqeeb Khan2, 1Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia, 2Universiti Tun Hussein Onn Malaysia, Malaysia
December 2021, Volume 13, Number 6
Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches
Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3,
1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France
Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks
Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models
Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
Amelie Anne Gutierrez, Holy Angel University, Philippines
Creating 3D Models with 3D Printing Process
Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia
October 2021, Volume 13, Number 5
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA
Information Retrieval based on Cluster Analysis Approach
Orabe Almanaseer, The University of Jordan, Jordan
Blockchain Technology in Agriculture: A Case Study of Blockchain Start-Up Companies
Chandra Sekhar Bhusal, Information Technology and Physical Sciences Federation University, Australia
Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks
Ali M. Allam, Helwan University, Egypt
Circuit Break Connect Monitoring to 5G Mobile Application
Ton Tsang and Cheung Yip Kan, Hong Kong College of Technology, Hong Kong
The BitcoinHeist: Classifications of Ransomware Crime Families
Micheline Al Harrack, Marymount University, USA
August 2021, Volume 13, Number 4
Online Learning During Covid-19 Pandemic, and Possibility of Adopting Computer-Based Test
Rabea Emdas1 and Ahmed Alruwaili2, 1Swinburne University of Technology, Australia, 2La Trobe University, Australia
Web Scraper Utilizes Google Street View Images to Power a University Tour
Peiyuan Sun1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA
Cloak-Reduce Load Balancing Strategy for Mapreduce
Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso
June 2021, Volume 13, Number 3
Fabric Defect Detection based on Improved Object as Point
Yuan He, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore
Product Sentiment Analysis for Amazon Reviews
Arwa S. M. AlQahtani, Princess Nourah bint Abdulrahman University, Saudi Arabia
April 2021, Volume 13, Number 2
Newly Proposed Technique for Autism Spectrum Disorder based Machine Learning
Sherif Kamel1,2 and Rehab Al-harbi2, 1October University for Modern Sciences and Arts, Egypt, 2Arab East Colleges for Graduate Studies, KSA
Big Data Analytics in Health Care: A Review Paper
Maria Mohammad Yousef, Al-albayt University, Jordan
Monitoring of the Last US Presidential Elections
Christoph Glauser1, Jacques Savoy2 and Loris Schmid1,2, 1IFAAR Institute, Switzerland, 2University of Neuchatel, Switzerland
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage
Waleed Al-Ghaith, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Saudi Arabia
Comparison Analysis of Facebook’s Prophet, Amazon’s DeepAR+ and CNN-QR Algorithms for Successful Real-World Sales Forecasting
Emir Žunić1, 2, Kemal Korjenić1, Sead Delalić1, 2 and Zlatko Šubara1, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina, 2University of Sarajevo, Bosnia and Herzegovina
February 2021, Volume 13, Number 1
Efficient Field of Vision Algorithms for Large 2D Grids
Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada
Highly Constrained University Class Scheduling using Ant Colony Optimization
Al-Mahmud, KUET, Bangladesh
Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh Network-on-Chip Systems
Walid Mokthar Salh and Azeddien M. Sllame, University of Tripoli Tripoli, Libya
Real Time Vigilance Detection using Frontal EEG
Siddarth Ganesh1 and Ram Gurumoorthy2, 1Amrita Vishwa Vidyapeetham, India, 2StimScience Inc., USA
Application of a Multilevel Technology Acceptance Management Model for Effective Technology Deployment
Gilbert Busolo, Lawrence Nderu and Kennedy Ogada, Jomo Kenyatta University of Agriculture and Technology, Kenya
December 2020, Volume 12, Number 6
Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts
Janis Zuters and Viktorija Leonova, University of Latvia, Latvia
A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
Mohamed A. H. El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt
Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship
Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk, Zhytomyr Polytechnic State University, Ukraine
Determining Business Intelligence Usage Success
Javier N. Montero and Mary L. Lind, Defense Information Systems Agency, USA, Louisiana State University Shreveport, USA
October 2020, Volume 12, Number 5
Machine Learning in Early Genetic Detection of Multiple Sclerosis Disease: A Survey
Nehal M. Ali1, Mohamed Shaheen2, Mai S. Mabrouk3 and Mohamed A. AboRezka1, 1Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt, 2Arab Academy for Science Technology and Maritime Transport, Alexandria, Egypt, 3Misr University for Science and Technology, Cairo, Egypt
Comparison of Rendering Processes on 3D Model
Filip Popovski1, Nikola Spasov1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1SS KlimentOhridski, Macedonia, 2International Slavic University Gavrilo RomanovicDerzavin, Macedonia
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy
Marlon Intal Tayag, Francisco Napalit and Arcely Napalit, School of Computing Holy Angel University, Philippines
August 2020, Volume 12, Number 4
Importance of Process Mining for Big Data Requirements Engineering
Sandhya Rani Kourla, Eesha Putti, and Mina Maleki, University of Detroit Mercy, USA
XML Encryption and Signature for Securing Web Services
Iehab ALRassan, King Saud University, Saudi Arabia
Purvi Parmar, MaryEtta Morris, John R. Talburt and Huzaifa F. Syed, University of Arkansas, USA
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Nabila A. Khodeir, Electronic Research Institute, Egypt
The Smart Parking Management System
Amira. A. Elsonbaty1 and Mahmoud Shams2, 1Higher institute of engineering and technology, Egypt, 2Kafrelsheikh University, Egypt
Performance Evaluation of LTE Network using Maximum Flow Algorithm
Bir Bahadur Khatri1, Bulbul Ahammad1, Md. Mezbahul Islam2, Rahmina Rubaiat2 and Md. Imdadul Islam1, 1Jahangirnagar University, Bangladesh, 2MBSTU, Bangladesh
Maryamsadat Nejadghaderi1, Ashkan Tashk2, Parvin Mansouri1 and Zahra Safaei Naraghi1, 1Tehran University of Medical Sciences (TUMS), Iran, 2University of Southern Denmark (SDU), Denmark
Railway Safety Protection with Android Mobile Application for 5G New Radio Network
Tony Tsang and Man Cheng Chong, Hong Kong College of Technology, Hong Kong
June 2020, Volume 12, Number 3
Akinyinka Olukunle Akande, Onyebuchi Chikezie Nosiri, Nnaemeka Chiemezie Onuekwusi and Emmanuel Uchenna Ekwueme, Federal University of Technology Owerri, Nigeria
Using Social Media as A Tool for Promoting Festival Tourism
Krittanai Ngernyuang and Pei-Ying Wu, Chung Hua University, Taiwan
Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19
Stella Chiemeke1 and Omokhagbo Mike Imafidor2, 1University of Benin, Nigeria and 2Africa PPP Advisory Nigeria Limited, Nigeria
April 2020, Volume 12, Number 2
Lidar Point Cloud Classification Using Expectation Maximization Algorithm
Nguyen Thi Huu Phuong, Hanoi University of Mining and Geology, Vietnam
Hina Tabassum and Muhammad Mutahir Iqbal, Bahauddin Zakariya University, Pakistan
Emir Žunić1,2, Kemal Korjenić1, Kerim Hodžić2,1 and Dženana Đonko2, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina and 2University of Sarajevo, Bosnia and Herzegovina
February 2020, Volume 12, Number 1
Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan
Web Services as A Solution for Cloud Enterprise Resource Planning Interoperability
Djamal Ziani and Nada Alfaadhel, King Saud University, Saudi Arabia
Study of an Application Development Environment Based on Unity Game Engine
Sagor Ahamed, Anomita Das, Shahnawaz Md Tanjib and Ms. Qamrun Nahar Eity, Ahsanullah University of Science and Technology, Bangladesh
December 2019, Volume 11, Number 6
Authentication and Verification of Social Networking Accounts Using Blockchain Technology
1Samer Shorman and 2Mohammad Allaymoun, 1Applied Science University, Kingdom of Bahrain and 2AMA International University, Kingdom of Bahrain
Cluster Based Association Rule Mining for Courses Recommendation System
Wael Ahmad AlZoubi, Balqa Applied University, Jordan
Recognizing and Tracking Outdoor Objects by Using Artoolkit Markers
Blagoj Nenovski and Igor Nedelkovski, University “St. Kliment Ohridski”, North Macedonia
Self-learning AI Framework for Skin Lesion Image Segmentation and Classification
Anandhanarayanan Kamalakannan1, Shiva Shankar Ganesan2 and Govindaraj Rajamanickam1, 1CSIR Madras Complex, India and 2University of Bridgeport, USA
October 2019, Volume 11, Number 5
Lightweight Headgear Brain Waves for Fatigue Detection in Smartphone
Yung Gi Wu, Jwu Jenq Chen and Rui Hsin Wang, Chang Jung Christian University, Taiwan
Election System Based on Blockchain Technology
Noor Mohammedali and Ali Al-Sherbaz, Northampton University, UK
Image Generation with Gans-based Techniques: A Survey
Shirin Nasr Esfahani and Shahram Latifi, UNLV, USA
Estimating the Crest Lines on Polygonal Mesh Models by an Automatic Threshold
Zhihong Mao, Ruichao Wang, Fan Liu and Yulin Zhou, Wuyi University, China
Matbase auto Function Non-relational Constraints Enforcement Algorithms
Christian Mancas, Ovidius University, Romania
Query Optimization for Big Data Analytics
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert, Pace University, USA
Detection of Fake Accounts in Instagram Using Machine Learning
Ananya Dey1, Hamsashree Reddy2, Manjistha Dey3 and Niharika Sinha4, 1National Institute of Technology, Tiruchirappalli, India, 2PES University, India, 3RV College of Engineering, India and 4Manipal Institute of Technology, India
An Improve Object-oriented Approach for Multi-objective Flexible Job-shop Scheduling Problem (FJSP)
Bamaiyi Sule and Ibrahim Lawal, Abubakar Tafawa Balewa University, Nigeria
August 2019, Volume 11, Number 4
Coloured Algebras and Biological Response in Quantum Biological Computing Architectures
1L-F Pau and 2P. Borza 1CBS, Solbjergplads 1, DK 2000 Copenhagen, Denmark. 2Faculty of Electrical Engineering and Computers, Department Electronics & Computers, Street Politehnicii no.1-3, Brasov, 500024, Romania
Beshair Khalid Alsiddiq and Nor Shahida Mohd Jamail Collage of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia
An Effect of Using A Storage Medium in Dijkstra Algorithm Performance for Ideal Implicit Path Cost
Ibtusam Alashoury1 and Mabroukah Amarif2 , 1Department of Computer Sciences, Faculty of Sciences, Sebha University, Sebha, Libya, 2Department of Computer Sciences, Faculty of Information Technology, Sebha University, Sebha, Libya
Big Data in Cloud Computing Review and Opportunities
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert Seidenberg School of CSIS, Pace University, White Plains, New York
Remote Monitoring L.V. Switchboard Power Status with 5G New Radio Network Application
Tony Tsang and Lam Sai Chung, Centre of International Education, Hong Kong College of Technology,Hong Kong.
Applying Important-Performance Analysis to Home Stay Service Performance
Han-Chen Huang, Department of Tourism and M.I.C.E., Chung Hua University, 30012 Hsinchu, Taiwan.
Emmanuel A. Ubom1 , Aloysius C. Akpanobong2 and Ubong Ukommi1, 1Department of Electrical and Electronic Engineering, Akwa Ibom State University, Ikot Akpaden, Mkpat Enin, Nigeria. 2Department of Computer Science, Akwa Ibom State University, Nigeria.
Exploring Factors Influencing the Adoption of Online Shopping with Saudi E-Shops, Female Perspective
Noura Mohammed Aldaej, Department of Information Systems, Al-Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia
June 2019, Volume 11, Number 3
Peter Karlsudd, Linnaeus University, Sweden
Design and Implementation of A Raspberry-pi Based Home Security and Fire Safety System
Sajid M. Sheikh1, Modise K. Neiso2 and Fatma Ellouze3, 1,2University of Botswana, Gaborone, Botswana and 3Univeristy of Sfax, Tunisia
Cheikh Ould El Mabrouk and Karim Konaté, University Cheikh Anta DIOP, Senegal
Comparative Analysis of FCFS, SJN & RR Job Scheduling Algorithms
Luhutyit Peter Damuut1 and Pam Bulus Dung2, 1Kaduna State University, Nigeria and 2FCE Pankshin, Nigeria
Performance Evaluation of Parallel Bubble Sort Algorithm on Supercomputer IMAN1
Reem Saadeh and Mohammad Qatawneh, The University of Jordan, Jordan
Ravipati Rama Devi and Munther Abualkibash, Eastern Michigan University, USA
Marlon Intal Tayag1 and Maria Emmalyn Asuncion De Vigal Capuno2, 1Holy Angel University, Philippines and 2Future University, Sudan
A Survey on Security Challenges of Virtualization Technology in Cloud Computing
Nadiah M. Almutairy1 and Khalil H. A. Al-Shqeerat2, 1College of Sciences and Arts in Rass, Saudi Arabia and 2Qassim University, Saudi Arabia
April 2019, Volume 11, Number 2
Towards an Approach for Integrating Business Continuity Management Into Enterprise Architecture
Hanane Anir, Mounia Fredj and Meryem Kassou, Mohammed V University, Morocco
A Survey of Clustering Algorithms in Association Rules Mining
Wael Ahmad AlZoubi, Balqa Applied University, Jordan
Compromising Systems: Implementing Hacking Phases
Marlon intal tayag1 and Maria emmalyn asuncion de vigal capuno2, 1Holy Angel University, Philippines and 2Future University, Sudan
Analytical Study to Review of Arabic Language Learning Using Internet Websites
1Samer Shorman and 2Mohammad Al-Shoqran, 1Applied Science University, Kingdom of Bahrain 2Ahlia University, Kingdom of Bahrain
Ensemble Learning Model for Screening Autism in Children
Mofleh Al Diabat and Najah Al-Shanableh, Al Albayt University, Al Mafraq- Jordan
A Novel Prototype Model for Swarm Mobile Robot Navigation Based Fuzzy Logic Controller
Sherif Kamel Hussein and Mashael Amer Al-Mutairi, Arab East Colleges for Graduate Studies, KSA
Web Crawler for Social Network User Data Prediction Using Soft Computing Methods
José L. V. Sobrinho, Gélson da Cruz Júnior and Cássio Dener Noronha Vinhal, Federal University of Goiás, Brazil
Reduction of Monitoring Registers on Software Defined Networks
Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia
Data-Driven Model for Non-Functional Requirements in Mobile Application Development
Salisu Garba, Babangida Isyaku and Mujahid Abdullahi, Sule Lamido University, Nigeria
February 2019, Volume 11, Number 1
Agile Distributed Software Development in Nine Central European Teams: Challenges, Benefits and Recommendations
Manuel Stadler, Raoul Vallon, Martin Pazderka and Thomas Grechenig, Research Group for Industrial Software, Vienna University of Technology, Austria
Speech Recognition by Improving the Performance of Algorithms Used in Discrimination
Ahmar -Haeder Talib Mahde, AL Iraqia University College of Engineering, Iraq
Developing an Integrated Framework to Utilize Big Data for Higher Education Institutions in Saudi Arabia
Noura A.Alsheikh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia
Fahed Yoseph1 and Mohammad AlMalaily2, 1School of Business and Economics, Åbo Akademi University and 2Faculty of Engineering, Mansoura University
Wi-Fi Microcontroller Based Smart Menu
Sherif Kamel Hussein, University for Modern Sciences and Arts, Giza, Egypt
Minimizing Distortion in Steganog-Raphy Based on Image Feature
Dong Wu, Lingnan Normal University, China
Detection and Handling of Different Types of Concept Drift in News Recommendation Systems
Nayer Wanas1, Ahmed Farouk1, Dina Said1, Nabila Khodeir1 and Magda Fayek2, 1Informatics Department, Electronics Research Institute, Giza, Egypt and 2Computer Engineering Department, Cairo University, Giza, Egypt
Monitoring Student Attendance Using A Smart System at Taif University
Saleh Alghamdi, Taif University, Saudi Arabia
December 2018, Volume 10, Number 6
Architectural Aspect-Aware Design for IoT Applications: Conceptual Proposal
Anas M. R. AlSobeh and Aws A. Magableh, Yarmouk University, Jordan
December 2018, Volume 10, Number 6
Developing a Framework for Online Practice Examination and Automated Score Generation
S. M. Saniul Islam Sani, Rezaul Karim and Mohammad Shamsul Arefin, Chittagong University of Engineering & Technology, Bangladesh
December 2018, Volume 10, Number 6
An Intelligent Self-Adaptable Application to Support Children Education and Learning
Kahkashan Tabassum, Princess Nourah Bint Abdulrahman University, KSA
December 2018, Volume 10, Number 6
Martha Angelica Garcia-Villa, Ricardo Francisco Martinez-Gonzalez, Juan Francisco Mejia-Perez, Miguel Valerio-Canales and Yesenia Isabel Moreno-Pavan, Tecnologico Nacional de México/IT Veracruz, Mexico
December 2018, Volume 10, Number 6
Text Mining Customer Reviews for Aspect-Based Restaurant Rating
Jovelyn C. Cuizon, Jesserine Lopez and Danica Rose Jones, University of San Jose-Recoletos, Philippines
December 2018, Volume 10, Number 6
Deepa V B and Ushadevi M B, JawaharaLal Nehru National College of Engineering Shimogga, Karnataka, India
December 2018, Volume 10, Number 6
Remotely View User Activities and Impose Rules and Penalties in a Local Area Network Environment
Marisa Buctuanon, Roldan Debalucos and John Glenn Villalon, University of San Jose – Recoletos, Cebu City, Philippines
December 2018, Volume 10, Number 6
Mofleh Al-diabat, Al Albayt University, Jordan
December 2018, Volume 10, Number 6
Analytical Method for Modeling PBX Systems for Small Enterprise
Lawan A. Mohammed and Kashif Munir, University of Hafr A-Batin, Saudi Arabia
October 2018, Volume 10, Number 5
Dual Edge-Triggered D-Type Flip-Flop with Low Power ConsumptionRemote Control for Smart Classroom with Bluetooth Networks
Chien-Cheng Yu1,2 and Ching-Chith Tsai1, 1National Chung-Hsing University, Taiwan and 2Hsiuping University of Science and Technology, Taiwan
October 2018, Volume 10, Number 5
Online Legal Service : The Present and Future
Md.Aminur Islam, Jannatul Ferdaus, Md. Abbas Ali khan and Md. Tarek Habib, Daffodil International University, Bangladesh
October 2018, Volume 10, Number 5
Simulation of Software Defined Networks with Open Network Operating System and Mininet
Antonio Cortes, University of Panama, Panama
October 2018, Volume 10, Number 5
Improved Computing Performance for Listing Combinatorial Algorithms Using Multi-Processing MPI and Thread Library
Nguyen Dinh Lau, University of Danang, Vietnam
October 2018, Volume 10, Number 5
Open Source Technology : An Emerging and Vital Paradigm in Institutions of Learning in Kenya
Cosmas Kabii Muthamia1, Gregory Wanyembi2 and Nahason Matoke3, 1Maseno University, Kenya, 2University of Kabianga, Kenya and 3Masinde Muliro University of Science and Technology, Kenya
October 2018, Volume 10, Number 5
Models of IT-Project Management
Julia Doronina and Ekaterina Doronina, Sevastopol State University, Russian Federation
October 2018, Volume 10, Number 5
Computer Vision Based Fall Detection Methods Using the Kinect Camera : A Survey
Salma Kammoun Jarray, King Abdelaziz University, Saudi Arabia
August 2018, Volume 10, Number 4
Application Development to Convert Heterogeneous Information into PQDIF (Power Quality Data Interchange Format)
Claudiu Popirlan1, Gabriel Stoian1, Leonardo Geo Manescu1, Denisa Rusinaru1, Marian Ciontu1, Gabriel Cosmin Buzatu1, Miron Alba2 and Adrian Cojoaca2, 1University of Craiova, Romania and 2Oltenia Distribution SA, Romania
Evolutionary Centrality and Maximal Cliques in Mobile Social Networks
Heba Elgazzar1 and Adel Elmaghraby2, 1Morehead State University, USA and 2University of Louisville, USA
Group Based Resource Management and Pricing Model in Cloud Computing
Shelia Rahman, Afroza Sultana, Afsana Islam and Md Whaiduzzaman, Jahangirnagar University, Bangladesh
Search for Answers in Domain Specific Supported by Intelligent Agents
Fernando Zacarias, Rosalba Cuapa, Guillermo De Ita and Miguel Bracamontes, Universidad Autonoma de Puebla, Mexico
Epidemic Outbreak Prediction Using Artificial Intelligence
Nimai Chand Das Adhikari, Arpana Alka, Vamshi Kumar Kurva, Suhas S, Hitesh Nayak, Kumar Rishav, Ashish Kumar Nayak, Sankalp Kumar Nayak, Vaisakh Shaj and Karthikeyan, Analytic Labs Research Group, India
Remote Control for Smart Classroom with Bluetooth Networks
Tony Tsang and Leung Ming Kit, Hong Kong College of Technology, Hong Kong
A Learning Analytics Approach for Student Performance Assessment
Mohamed H Haggag, Mahmood Abdel Latif and Deena Mostafa Helal, Helwan University, Egypt
The Study of Purchase Intention for Men’s Facial Care Products with K-Nearest Neighbour
Jui-Chan Huang1, Pei-Yu Shao2 and Tzu-Jung Wu3, 1Yango College, China, 2National Kaohsiung Normal University, Taiwan and 3National Sun Yat-Sen University, Taiwan
June 2018, Volume 10, Number 3
An Algorithm for Automatically Detecting Dyslexia on the Fly
Suraj Shrestha and Pietro Murano, OsloMet – Oslo Metropolitan University, Norway
Integration of Importance – Performance Analysis and Fuzzy Dematel
Chin-Yi Chen1, Tung-Shen Wu2*, Mei-Lan Li3 and Ching-Tang Wang4, 1Taipei University of Maritime Technology, Taiwan, 2Hsiuping University of Science and Technology, Taiwan, 3China University of Technology, Taiwan and 4National Taiwan University of Sport, Taiwan
Data Mining Model Performance of Sales Predictive Algorithms Based on Rapidminer Workflows
Alessandro Massaro, Vincenzo Maritati and Angelo Galiano, Dyrecta Lab, Italy
Curvelet Based Speech Recognition System in Noisy Environment : A Statistical Approach
Nidamanuru Srinivasa Rao1, Chinta Anuradhav2 and SV Naga Sreenivasu1, 1Acharya Nagarjuna University, India and 2VR Siddhartha Engineering College, India
A New Context-Sensitive Decision Making System for Mobile Cloud Offloading
Mustafa Tanriverdi and M. Ali Akcayol, Gazi University, Turkey
Detection of Algorithmically Generated Malicious Domain Using Frequency Analysis
Enoch Agyepong1, William J. Buchanan2 and Kevin Jones1, 1Airbus Group Innovations, UK and 2Edinburgh Napier University, UK
Gene-Gene Interaction Analysis in Alzheimer
Rishi Yadav and Ravi Bhushan Mishra, IIT BHU (Varanasi), India
April 2018, Volume 10, Number 2
The Effect of Segregation in Nonrepeated Prisoner’s Dilemma
Thomas Nordli, University College of Southeast Norway, Norway
Future and Challenges of Internet of Things
Falguni Jindal, Rishabh Jamar and Prathamesh Churi, SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, India
Clustering Algorithm for a Healthcare Dataset Using Silhouette Score Value
Godwin Ogbuabor1 and Ugwoke, F. N2, 1University of Lincoln, United Kingdom and 2Michael Okpara University of Agriculture Umudike, Nigeria
A Modified Binary PSO Based Feature Selection for Automatic Lesion Detection in Mammograms
Sheba K.U1, Gladston Raj S2 and Ramachandran D3, 1BPC College, India, 2Government College – Nedumangad, India and3Regional Cancer Center – Thiruvananthapuram, India
PWM Based Android Controlled Wheel Chair
Tarun Debnath, AFM Zainul Abadin and Md. Anwar Hossain, Pabna University of Science and Technology, Bangladesh
Convolutional Neural Network Based Feature Extraction for IRIS Recognition
Maram.G Alaslani1 and Lamiaa A. Elrefaei1,2, 1King Abdulaziz University, Saudi Arabia and 2Benha University, Egypt
A Metrics Ecosystem for Designing Quality E-Commerce Systems
Antonia Stefani, Hellenic Open University, Greece
A Comparison of Cache Replacement Algorithms for Video Services
Areej M. Osman and Niemah I. Osman, Sudan University of Science and Technology, Sudan
February 2018, Volume 10, Number 1
Multi-Core Processors : Concepts and Implementations
Najem N. Sirhan and Sami I. Serhan, University of New Mexico, USA and University of Jordan, Jordan
An Algorithm for Predictive Data Mining Approach in Medical Diagnosis
Shakuntala Jatav and Vivek Sharmam, TIT College – Bhopal, India
The Socialized Infrastructure of the Internet on the Computing Level
Bing Li, Xi’An Technological University, China
A Semantic Retrieval System for Extracting Relationships from Biological Corpus
Hassan Mahmoud, Saif Salah Kareem and Tarek El-Shishtawy, Benha University, Egypt
Detection of Malaria Parasite in Giemsa Blood Sample Using Image Processing
Kishor Roy, Shayla Sharmin, Rahma Bintey Mufiz Mukta and Anik Sen, CUET, Bangladesh
On the Classification of NP Complete Problems and Their Duality Feature
WenhongTian, WenxiaGuo and Majun He, University of Electronic Science and Technology of China, China and Chongqing Institute of Green and Intelligent Technology, China
Comparing the Cultural Dimensions and Learner’s Perceived Effectiveness of Online Learning Systems (OLS) among American and Malaysian Learners
Seng C. Keng, Nova Southeastern University, USA
Discovering Users Topic of Interest from Tweet
Muhammad Kamal Hossen, Md. Ali Faiad, Md. Shahnur Azad Chowdhury and Md. Sajjatul Islam, CUET, Bangladesh, IIUC, Bangladesh and CIU, Bangladesh
December 2017, Volume 9, Number 6
A Framework for Automated Progress Monitoring Based on HOG Feature Recognition and High-Resolution Remote Sensing Image
Xu Ruhang, North China Electric Power University, China
A Comparison of Congestion Control Variants of TCP in Reactive Routing Protocols MANET
Mahmoud Abu-Zant and Mohammad Hamarsheh, Arab American University, Palestine
Breaking Mignotte’s Sequence Based Secret Sharing Scheme Using SMT Solver
K.Vishnu Priyanka, M.Gowthami, O.Susmitha, G.Prathyusha and Naresh Babu Muppalaneni, Sree Vidyanikethan Engineering College (Autonomous), India
Method for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
Luis Alfredo Crisanto Baez, Ricardo Francisco Martinez Gonzalez, Yesenia Isabel Moreno Pavan and Marcos Alonso Mendez Gamboa, TecNM – Instituto Tecnologico de Veracruz, Mexico
An Enhanced Electronic Transcript System (E-ETS)
Ejiofor C. I1 and Laud Charles Ochei2, 1University of Port-Harcourt, Nigeria and 2Robert Gordon University, United Kingdom
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Rakesh1, K. Lalitha1, M. Ismail1 and H. Parveen Sultana2, 1Sree Vidyanikethan Engineering College (Autonomous), India and 2VIT University, India
Multi-Path Route Determination Method for Network Load Balancing in FAP Based WSNs Using Fuzzy Logic
Won-Jin Chung and Tea-Ho Cho, Sungkyunkwan University, Republic of Korea
Energy Location-Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor Networks
Ablah AlAmri and Manal Abdullah, King Abdulaziz University, Saudi Arabia
On the Implementation of Goldberg’s Maximum Flow Algorithm in Extended Mixed Network
Nguyen Dinh Lau1, Tran Quoc Chien1, Phan Phu Cuong2 and Le Hong Dung3, 1University of Danang, Vietnam, 2Vinaphone of Danang, Vietnam and 3College of Transport II, Vietnam
October 2017, Volume 9, Number 5
WSN Lifetime Extension Using GA Optimised Fuzzy Logic
Sang-Hyeok Lim and Tae-Ho Cho, Sungkyunkwan University, Republic of Korea
Multilevel Analysis of Student’s Feedback Using Moodle Logs in Virtual Cloud Environment
Ashok Verma1, Sumangla Rathore1, Santosh Vishwakarma2 and Shubham Goswami1, 1Sir Padampat Singhania University, India and 2Gyan Ganga Institute of Technology & Sciences, India
Enas Rawashdeh1, Mohammad Qatawneh1 and Hussein A. Al Ofeishat2, 1The University of Jordan, Jordan and 2 Al-Balqa Applied University, Jordan
Shubhankar Gupta1 and Nitin2, 1Jaypee Institute of Information Technology, India and 2University of Cincinnati, USA
Facility Location in Logistic Network Design Using Soft Computing Opimization Models
Shaju Varughese1 and Gladston Raj S2, 1Bharathiar University, India and 2Govt. College – Nedumangadu, India
A Customisable and Responsive Design Online Booking System
Betzabet García-Mendoza and Carlos R. Jaimez-Gonzalez, Universidad Autonoma Metropolitana, Mexico
Using Cuckoo Algorithm for Estimating Two GLSD Parameters and Comparing it with Other Algorithms
Jane Jaleel Stephan, Haitham Sabah Hasan and Alaa Hamza Omran, University of Information Technology & Communications, Iraq
Raspberry PI and Arduino UNO Working Together as a Basic Meteorological Station
Jose Rafael Cortes Leon and Ricardo Francisco Martínez-Gonzalez, Anilu Miranda Medina and Luis Alberto Peralta-Pelaez, Instituto Tecnologico de Veracruz (TecNM), Mexico
Usability Testing of Fitness Mobile Application : Case Study Aded Surat App
Ryan Alturki and Valerie Gay, University of Technology Sydney, Australia
Syntax and Semantics for Cinnamon Programming
Kostadin Kratchanov, Yasar University, Turkey
A Systematic Mapping Study on Current Research Topics in Smart Contracts
Maher Alharby1,2 and Aad van Moorsel1, 1Newcastle University, UK and 2Taibah University, KSA
Summarization of Software Artifacts : A Review
Som Gupta1 and S.K Gupta2, 1AKTU-Lucknow, India and 2BIET-Jhansi, India
August 2017, Volume 9, Number 4
Eco-Strategy : New ICT Management Model Built on the Basis of the CSR Strategy an Green IT
Rachid Hba and Abdellah El Manouar, Mohammed V University In Rabat, Morocco
Bag of Visual Words for Word Spotting in Handwritten Documents Based on Curvature Features
Thontadari C and Prabhakar C.J, Kuvempu University, India
ANN Based Features Selection Approach Using Hybrid GA-PSO for Sirna Design
Ranjan Sarmah1, Mahendra K. Modi2, Shahin Ara Begum1, 1Assam University Silchar, India and 2Assam Agricultural University, India
Complete End-to-End Low Cost Solution to a 3D Scanning System with Integrated Turntable
Saed Khawaldeh ,Tajwar Abrar Aleef , Usama Pervaiz, Vu Hoang Minh and Yeman Brhane Hagos, University of Burgundy (France), University of Cassino (Italy) and University of Girona (Spain)
Changeability Evaluation Model for Object Oriented Software
Nidhi Goyal and Reena Srivastava, Babu Banarasi Das University, India
Environmental Monitoring and Controlling System for Mushroom Farm with Online Interface
Arjuna Marzuki and Soh Yan Ying, Universiti Sains Malaysia, Malaysia
Residual Quotient and Annihilator of Intuitionistic Fuzzy Sets of Ring and Module
P.K.Sharma1 and Gagandeep Kaur2, 1D.A.V. College, India and 2I.K.Gujral Punjab Technical University, India
June 2017, Volume 9, Number 3
April 2017, Volume 9, Number 2
Data Warehouse and Big Data Integration
Sonia Ordonez Salinas and Alba Consuelo Nieto Lemus, Distrial F.J.C University, Colombia
Tourism Demand Forecasting Model Using Neural Network
Han-Chen Huang and Cheng-I Hou, Chung Hua University, Taiwan
Decision Making in Integrated Pest Management and Bayesian Network
Niranjan Singh and Neha Gupta, ManavRachna International University, India
Using Adaptive Automata in Grammar Based Text Compression to Identify Frequent Substrings
Newton Kiyotaka Miura and Joao Jose Neto, Escola Politecnica da Universidade de Sao Paulo, Brazil
Image Encryption Techniques Using Fractal Function : A Review
Shafali Agarwal, JSS Academy of Technical Education, India
A Note on Godel’s Theorem
J. Ulisses Ferreira, Federal University of Bahia, Brazil
Applying Transformation Characteristics to Solve the Multi Objective Linear Fractional Programming Problems
Wen Pei, Chung Hua University, Taiwan
Greedy Cluster Based Routing for Wireless Sensor Networks
Parthasarathi1 and Karthikeyani Vajravel2, 1KSR College of Arts and Science, India and 2Thiruvalluvar Govt Arts
college, India
A Meliorated Kashida Based Approach for Arabic Text Steganography
Ala’a M. Alhusban and Jehad Q. Odeh Alnihoud, Al al-Bayt University, Jordan
Enforcing Set and SSL Protocols in E-Payment
Nancy Awadallah, Sadat Academy for Management Sciences, Egypt
Evolutionary Computing Techniques for Software Effort Estimation
Sumeet Kaur Sehra1, Yadwinder Singh Brar1 and Navdeep Kaur2, 1I.K.G. Punjab Technical University, India and 2Sri Guru Granth Sahib World University, India
Gender and Authorship Categorisation of Arabic Text from Twitter Using PPM
Mohammed Altamimi1 and William J. Teahan2, 1University of Hail, Saudi Arabia and 2University of Bangor, UK
Implementation of Interactive Augmented Reality in 3D Assembly Design Presentation
Andrijana Bocevska and Zoran Kotevski, “St. Kliment Ohridski” University, Republic of Macedonia
A Survey of Different Approaches for Overcoming the Processor – Memory Bottleneck
Danijela Efnusheva, Ana Cholakoska and Aristotel Tentov, Faculty of Electrical Engineering and Information Technologies, Macedonia
Efficient Cloud Gaming Scheme Using Scene Objects Adaptation
Ahmad A. Mazhar, Saudi Electronic University, KSA
February 2017, Volume 9, Number 1
Grammar Based Pre-Processing for PPM
William J. Teahan1 and Nojood O. Aljehane2, 1University of Bangor Bangor, UK and 2University of Tabuk, Saudi Arabia
Fault Tolerant Leader Election in Distributed Systems
Marius Rafailescu, Politehnica University of Bucharest, Romania
Towards a New Framework Linking Knowledge Management Systems and Organizational Agility : An Empirical Study
Mohamed Amine Marhraoui and Abdellah El Manouar, Mohammed V University in Rabat, Morocco
Fuzzy Logic Based Approach for Automation of Emotion Detection in Misophonia
Nilima Salankar1, Neelu Ahuja1, Sandeep Chaurasia2 and Ninni Singh1, 1University of Petroleum and Energy Studies, India and 2Manipal University, India
Design and Optimization a Circular Shape Network Antenna Micro Strip for Some Application
Louati Siwar, Fethi Mejri and Aguili Taoufik, University Tunis El Manar, Tunisia
PPO – An Approach to Personalized Web Acceleration
Shailesh K S and P. V. Suresh, Indira Gandhi National Open University, India
Han-Chen Huang1, Cheng-I Hou1 and Yu-Hsuan Tseng2, 1Chung Hua University, Taiwan and 2GuangWu Junior High School, Taiwan
University Buses Routing and Tracking System
Ahmed Ahmed1, Elshaimaa Nada2 and Wafaa Al-Mutiri3, 1,2Zagazig University, Egypt and 1,2,3Taibahu University, Saudi Arabia
Automated Information Retrieval Model Using FP Growth Based Fuzzy Particle Swarm Optimization
Raja Varma Pamba1, Elizabeth Sherly2 and Kiran Mohan3, 1Mahatma Gandhi University, India, 2Indian Institute of Information Technology and Management – Kerala, India and 3Payszone LLC LTD, UAE
December 2016, Volume 8, Number 6
An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences
Sahand Vahidnia, OmerOzgurTanriöver and I. N. Askerzade, Ankara University, Turkey
Standardization of Clinical Documents Through HL7 – FHIR for Colombia
Lopez Juan D1, Moreno Luis. G2, Anzola Diego2, Lopez Francisco J3, Salinas Martha4, Vilardy Aldo5, García Stella6 and Lagos Arturo6, 1Lv Consultores, Colombia, 2Lumon, Colombia, 3Lv Consultores, Colombia, 4Uniminuto, Colombia, 5Innova Ip,
Colombia and 6ECCI University, Colombia
A Method for Prioritizing Qualitative Scenarios In Evaluating Enterprise Architecture Using Non-Dominated Sorting Genetic Algorithm II
MarziehEskandari and AkbarNabiollahi, Islamic Azad University, Iran
Environmentally Corrected RSSI Based Real Time Location Detection System
Hakan Koyuncu and Baki Koyuncu, Final International University, Cyprus
Reducing Competitive Cache Misses in Modern Processor Architectures
Samir AMRI1, Lahbib ZENKOUAR1 and Mohamed OUTAHAJALA2, 1Mohammed V University in Rabat, Morocco and 2Royal Institute of Amazigh Culture (IRCAM), Morocco
Comparative Analysis of Minutiae Based Fingerprint Matching Algorithms
Silas KivutiNjeru and Robert Oboko, University of Nairobi, Kenya
The Effect of Physical Based Features for Recognition of Recaptured Images
S. A . A. H. Samaraweera and B. Mayurathan, University of Jaffna, Sri Lanka
October 2016, Volume 8, Number 5
Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar, Minia University, Egypt and Taif University, Saudi Arabia
Automated Test Case Generation and Optimization : A Comparative Review
Rajesh Kumar Sahoo1, Deeptimanta Ojha1, Durga Prasad Mohapatra2 and Manas Ranjan Patra3, 1A.B.I.T, India,2NIT – Rourkela, India and 3Berhampur University, India
An Overview of Extractive Based Automatic Text Summarization Systems
Kanitha.D.K and D. Muhammad Noorul Mubarak, University of Kerala, India
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer and Akbar Nabiollahi, Islamic Azad University, Iran
Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees
Samir AMRI1, Lahbib ZENKOUAR1 and Mohamed OUTAHAJALA2, 1Mohammed V University in Rabat, Morocco and 2Royal Institute of Amazigh Culture (IRCAM), Morocco
MODIGEN : Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart and Marko Boger, University of Applied Sciences – Konstanz, Germany
Design and Development of Business Rules Management System (BRMS) Using ATL and Eclipse Sirius
Lynda Ait Oubelli and Mourad Oussalah, University of Nantes, France
CLOHUI : An Efficient Algorithm for Mining Closed High Utility Itemsets from Transaction Databases
Shiming Guo and Hong Gao, Harbin Institute of Technology, China
A Comparison Between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader and Ashraf Abu Ein, Al-Balqa Applied University, Jordan
August 2016, Volume 8, Number 4
June 2016, Volume 8, Number 3
Green IT in Banking Systems Impacted by Prudential Rules – Erlang Models for Forecasting Computer Performance
Florin-Catalin ENACHE and Adriana-Nicoleta TALPEANU, The Bucharest University of Economic Studies, Romania
A Survey of Service Oriented Architecture Systems Maintenance Approaches
Hamza Naji and Mohammad Mikki, Islamic University, Palestine
Analysing the Migration Period Parameter in Parallel Multi-Swarm Particle Swarm Optimization
Saban Gulcu1 and Halife Kodaz2, 1Necmettin Erbakan University, Turkey and 2Selcuk University, Turkey
An Illumination Invariant Face Recognition Using 2D Discrete Cosine Transform and Clahe
A.Thamizharasi1 and Jayasudha J.S2, 1ManonmaniamSundaranar University, India and 2SCT College of Engineering, India
ICT-Mechanisms of Intelligent Transportation System in Taipei City as a Smart City
Nurwahyu Alamsyah1,2 Tzu-Chuan Chou2 and Tony Dwi Susanto1, 1Institute of Technology Sepuluh Nopember (ITS) Surabaya, Indonesia and 2National Taiwan University of Science and Technology, Taiwan
Stock Trend Prediction Using News Sentiment Analysis
Kalyani Joshi, Bharathi H. N and Jyothi Rao, KJSCE, India
A.N. Al-Rabadi1, M.S. Mousa2, R.F. Al-Rabadi3, S. Alnawasreh2, B. Altrabsheh4 and M.A. Madanat2, 1The University of Jordan, Jordan, 2Mu’tah University, Jordan, 3German Association for International Cooperation (GIZ), Jordan and 4Philadelphia University, Jordan
Learning Repository Adaptability in an Agent-Based University Environment
Vanco Cabukovski1, Roman Golubovski1 and Riste Temjanovski2, 1Ss Cyril and Methodius University, Macedonia and 2Goce Delcev University, Macedonia
Doris Caliz1, Loïc Martínez1, Xavier Alaman2, Carlos Teran3 and Richart Caliz3, 1Madrid Polytechnic University, Spain,2Autonomous University, Spain and 3National Polytechnic University, Ecuador
Fuzzy Logic in Narrow Sense with Hedges
Van-Hung Le, Hanoi University of Mining and Geology, Vietnam
Staffs Motivational in Knowledge Transfer Behaviour
Saide1, Nurul Aini2, Saikou Sanneh3 and Nurjamaliah4, 1State Islamic University of Sultan Syarif Kasim Riau (UIN Suska Riau University), Indonesia, 2Diponegoro University, Indonesia, 3National Taiwan Normal University, Taiwan and 4Riau University, Indonesia
Adaptive Configuration Meta-Model of a Guidance Process
Hamid Khemissa1 and Mourad Oussalah2, 1USTHB University, Algeria and 2Nantes University, Algeria
April 2016, Volume 8, Number 2
The Perspectives of Democratic Decision Making in the Information Society
Olaf Winkel, Berlin School of Economics and Law, Germany
The Importance of Neutral Class in Sentiment Analysis of Arabic Tweets Hamed AL-Rubaiee, Renxi Qiu and Dayou Li, University of Bedfordshire, United Kingdom
Examine Website Quality on M-Banking Services Adoption in Bangladesh
Mohammad Abdullah Mahfuz, Liza Khanam and Wang Hu, Wuhan University of Technology, P.R.China
Eco-Strategy: Towards a New Generation Managerial Model Based on Green IT and CSRF
Rachid Hba, Abderrazak Bakkas, Abdellah El Manouar, Mohammed Abdou Janati Idrissi, Mohammed V University In Rabat, Morocco
Physical Features Based Speech Emotion Recognition Using Predictive Classification
Mohammad Ahsan and Madhu Kumari, NIT Hamirpur, India
5Pen Technology: A New Dawn in Homogeneous and Heterogeneous Computing
Osagie Scale Uwadia Maxwell 1, K.O. Obahiagbon1, Osagie Joy Amenze2 and John-Otumu M.A2, 1Benson Idahosa University, Nigeria and 2Ambrose Alli University, Nigeria
Ahmed Sherif Zekri1,2, 1Beirut Arab University, Lebanon, 2Alexandria University, Egypt
Text Classification for Arabic Words Using Rep-Tree
Hamza Naji and Wesam Ashour, Islamic University, Palestine
Towards a Reliable Election Algorithm for Vanets Networks
OuafaMahma and Ahmed Korichi, KasdiMerbah University, Algeria
Survey on Characteristics of Autonomous System
Taranjeet Singh and Avadhesh Kumar, Galgotias University, India
December 2015, Volume 7, Number 6
A Preprocessing Model for Hand-Written Arabic Texts Based on Voronoi Diagrams Atallah M.Al-Shatnawi, Al al-Bayt University, Jordan |
An Entropic Optimization Technique in Heterogeneous Grid Computing Using Bionic Algorithms Saad M.Darwish, Adel A.El-zoghabi and Moustafa F.Ashry, Institute of Graduate Studies and Research, Egypt |
New Symmetric Encryption System Based on Evolutionary Algorithm A.Mouloudi, Ibn Tofail University, Morocco |
UML Modeling and System Architecture for Agent Based Information Retrieval D.Muhammad Noorul Mubarak and Philomina Simon, University of Kerala, India |
The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB Mohamed Y.Adam1, Mozamel M.Saeed2 and Al Samani A.Ahmed3, 1King Saud University, KSA, 2Prince Sattam Bin Abdul-Aziz University, KSA and 3Al Neelain University College of Computer Science & Information Technology, Sudan |
Two-Layer Secure Prevention Mechanism for Reducing E-Commerce Security Risks Sen-Tarng Lai, Shih Chien University, Taiwan |
Congestion Aware Spray and Wait Protocol: A Congestion Control Mechanism for the Vehicular Delay Tolerant Network Chuka Oham and Milena Radenkovic, University of Nottingham, United Kingdom |
Automated Management of Pothole Related Disasters Using Image Processing and Geotagging Manisha Mandal, Madhura Katageri, Mansi Gandhi, Navin Koregaonkar and Sharmila Sengupta, Vivekanand Education Society’s Institute of Technology, India |
A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks Zhang Huijuan and Liu Kai, Tongji University, China |
Comparative Analysis of Single-Core and Multi-Core Systems Ogundairo Johnson1 and Omosehinmi Dinyo2, 1National Open University of Nigeria (NOUN), Nigeria and 2Federal University of Technology, Nigeria |
Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan Mohamad M. Al-Laham, Al-Balqa Applied University, Jordan |
A Software Tool for Experimental Study Leap Motion Georgi Krastev and Magdalena Andreeva, Ruse University, Bulgaria |
Service Oriented Quality Requirement Framework for Cloud Computing Madhushi Rathnaayke and Janaka I Wijayanayake, University of Kelaniya, Sri Lanka |
A Database System Security Framework Habiba Muhammad Sani1 and Muhammad Mika’ilu Yabo2, 1Usmanu Danfodiyo University, Nigeria and 2Shehu Shagari College of Education, Nigeria |
October 2015, Volume 7, Number 5
Hadoop Mapreduce Performance Enhancement Using In-Node Combiners Woo-Hyun Lee, Hee-Gook Jun and Hyoung-Joo Kim, Seoul National University, South Korea |
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One Mohammad Ehab Ragab1 and Kin Hong Wong2, 1The Electronics Research Institute, Egypt and 2Computer Science and Engineering Department, Shatin, Hong Kong |
Integrated Project Management Measures in CMMI Mahmoud Khraiwesh, Zarqa University, Jordan |
Formal Verification of Distributed Checkpointing Using Event-B Girish Chandra1, Raghuraj Suryavanshi2 and Divakar Yadav1, 1Institute of Engineering & Technology, India and 2Pranveer Singh Institute of Technology, India |
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classification Nezha Hamdi1, Khalid Auhmani2, Moha M’rabet Hassani1, 1Cadi Ayyad University, Morocco and 2National School of Applied Sciences, Morocco |
Formal Specification and Verification of Total Order Broadcast through Destination Agreement Using Event-B Arun Kumar Singh and Divakar Yadav, Institution of Engineering and Technology, India |
Automatic Extraction of Spatio-Temporal Information from Arabic Text Documents Abdelkoui Feriel1 and Kholladi Mohamed Khireddine2, 1MENTOURI 2 University, Algeria and 2El oued University, Algeria |
Encryption-Decryption RGB Color Image Using Matrix Multiplication Mohamad M.AL-Laham, Zarqa University, Jordan |
A New Approach to Parts of Speech Tagging in Malayalam D.Muhammad Noorul Mubarak, Sareesh Madhu and S A Shanavas, University of Kerala, India |
Predictive and Statistical Analyses for Academic Advisory Support Mohammed AL-Sarem, Taibah University, Kingdom of Saudi Arabia |
An Overview on the Use of Data Mining and Linguistics Techniques for Building Microblog-Based Early Detection Systems in the Healthcare Sector Haider M. Habeeb1 and Nabeel Al-A’araji2, 1University of Babylon, Iraq and 2Ministry of Higher Education and Scientific Research, Iraq |
Clustering of Deep WebPages: A Comparative Study Muhunthaadithya C, Rohit J.V, Sadhana Kesavan1 and E.Sivasankar, National Institute of Technology Trichy, India |
August 2015, Volume 7, Number 4
Applying an Arabic Conversational Agent in the Jordanian E-Government Mohammad Hijjawi and Hesham Abusaimeh, Applied Science University, Jordan |
Collaborative Bibliographic System for Review/Survey Articles Mutaz Beraka, Abdullah Al-Dhelaan and Mznah Al-Rodhaan, King Saud University, Saudi Arabia |
Unique Fundamentals of Software Measurement and Software Metrics in Software Engineering K.P.Srinivasan, C.B.M.College, India |
Sensitivity Analysis of Information Retrieval Metrics Marina Marjanovic-Jakovljevic, Singidunum University, Serbia |
Consideration of Human Computer Interaction in Robotic Field Tarek Toumi and Abdelmadjid Zidani, University of Batna, Algeria |
Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System Ammu M Kumar and Philomina Simon, University of Kerala, India |
On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images Solomon O.Akinola and Adebanke A.Olatidoye, University of Ibadan, Nigeria |
Symmetrical Weighted Subspace Holistic Approach for Expression Recognition G.P.Hegde1, M.Seetha2 and Nagaratna Hegde3, 1Shree Dharmasthala Manjunatheshwara Institute of Technology, India and2G.Narayanamma Institute of Technology and Science, India and 3Vasavi College of Engineering, India |
Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital Waleed Al-Ghaith, Shaqra University, Saudi Arabia |
Map-Reduce Implementations: Survey and Performance Comparison Zeba Khanam and Shafali Agarwal, JSS Academy of Technical Education, India |
A Hybrid Copy-Move Forgery Detection Technique Using Regional Similarity Indices Rani Susan Oommen1 and Jayamohan M2, 1Sree Buddha College of Engineering for Women, India and 2College of Applied Science, India |
An Effective and Efficient Feature Selection Method for Lung Cancer Detection R.Kishore, K.L.N College of Engineering, India |
June 2015, Volume 7, Number 3
Arabic Language Challenges in Text Based Conversational Agents Compared to The English Language Mohammad Hijjawi and Yousef Elsheikh, Applied Science University, Jordan |
Fuzzy Image Segmentation Using Validity Indexes Correlation Daniel Fernando Tello Gamarra, Universidade Federal de Santa Maria (UFSM), Brazil |
Instructor Perspectives of Mobile Learning Platform: An Empirical Study Muasaad Alrasheedi, Luiz Fernando Capretz and Arif Raza, Western University, Canada |
A Study on Weed Discrimination Through Wavelet Transform, Texture Feature Extraction and Classification D.Ashok Kumar1 and P.Prema2, 1Government Arts College, India and 2Agricultural College and Research Institute, India |
Corrosion Control Approach Using Data Mining StephenDapiap, Gregory Wajiga, Michael Egwurube, Musa Kadzai, Nathaniel Oye and ThankGodAnazodo, Federal University of Technology Yola, Nigeria |
A Clustering Technique for Email Content Mining Deepa Patil and Yashwant Dongre, Vishwakarma Institute of Information Technology, India |
Comparison of Wavelet Network and Logistic Regression in Predicting Enterprise Financial Distress Ming-Chang Lee1 and Li-Er Su2, 1National Kaohsiung University of Applied Sciences, Taiwan and 2Shih Chien University, Taiwan |
Increasing the Transistor Count by Constructing A Two-Layer Crystal Square on A Single Chip Haissam El-Aawar, Lebanese International University – LIU, Lebanon |
Comparison of Different Transmitters Using 1550nm and 10000nm in FSO Communication Systems Poonam Singal, Saloni Rai, Rahul Punia and Dhrove Kashyap, Deenbandhu Chhotu Ram University of Science & Technology, India |
Multi-Parameter Based Performance Evaluation of Classification Algorithms Saurabh Kr.Srivastava and Sandeep Kr.Singh, JIIT University, India |
April 2015, Volume 7, Number 2
Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment Po-Huei Liang and Jiann-Min Yang, National Cheng Chi University, Taiwan |
An Extension of Protégé for an Automatic Fuzzy-Ontology Building Using Clustering and FCA Aloui Amira and Grissa Touzi Amel, Université Tunis El Manar, Tunisia |
Towards a System Dynamics Modeling Method Based on Dematel Fadwa Chaker, Abdellah El Manouar and Mohammed Abdou Janati Idrissi, Mohammed V University, Morocco |
Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text
William J.Teahan1 and Khaled M.Alhawiti2, 1University of Wales, Bangor, UK and 2University of Tabuk, KSA |
Thermal Control in 3D Liquid Cooled Processors Via Hotspot Separation And Thermoelectric Cooling
Yue Hu, Shaoming Chen, Lu Peng, Edward Song and Jin-Woo Choi, Louisiana State University, USA |
SFAMSS:A Secure Framework for ATM Machines Via Secret Sharing
Zeinab Ghafari, Taha Arian and Morteza Analoui, University of Science and Technology, Iran |
Performance Measurements of Feature Tracking and Histogram Based Traffic Congestion Algorithms
Ozgur Altun and Kenan Aksoy, Proline Bilisim Sistemleri, Turkey |
Research on Decision Making Regarding High-Business-Strategy Café Menu Selection
Cheng-I Hou1, Han-Chen Huang2, Yao-Hsu Tsai2 and Chih-Yao Lo1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan |
Prefix-Based Labeling Annotation for Effective Xml Fragmentation
Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon and Samini Subramaniam, Multimedia University, Malaysia |
PROP – Patronage of PHP Web Applications
Sireesha C, Jyostna G, Raghu Varan P and P R L Eswari, Centre for Development of Advanced Computing, India |
Quantum Clustering-Based Feature Subset Selection for Mammographic Image Classification
N.Hamdi, K.Auhmani and M.M.Hassani, Cadi Ayyad University, Morocco |
Taxonomy of Optimization Approaches of Resource Brokers in Data Grids
Rafah M.Almuttairi, University of Babylon, Iraq |
A Survivability Model for Saudi ICT Startups
Sara Almakenzi, Arif Bramantoro and Waleed Rashideh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia |
Emotion Interaction with Virtual Reality Using Hybrid Emotion Classification Technique toward Brain Signals
Faris A.Abuhashish1, Jamal Zraqou2, Wesam Alkhodour2, Mohd S.Sunar1 and Hoshang Kolivand1, 1Universiti Teknologi Malaysia, Malaysia and 2Isra University, Jordan |
Prediction for Short-Term Traffic Flow Based on Optimized Wavelet Neural Network Model
Tao Li and Liu Sheng, Shanghai University of Engineering Science, China |
February 2015, Volume 7, Number 1
Iris Recognition for Personal Identification Using Lamstar Neural Network Shideh Homayon, University of California, USA |
An Employing a Multistage Fuzzy Architecture for Usability of Open Source Software Roba Al-Soub, Mutah University, Jordan |
Analysis of Selection Indicators of Badminton Players by the Delphi Method and Analytic Hierarchy Process Han-Chen Huang1, Chun-Ta Lin2, Chia-Sen Hu3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Guang Hua Junior High School, Taiwan |
Cross Platform App : A Comparative Study Paulo R.M.de Andrade1, Adriano B.Albuquerque1, Otávio F. Frota2, Robson V Silveira2 and Fátima A. da Silva2, 1University of Fortaleza – UNIFOR Fortaleza – CE, Brazil and 2College Estacio FIC of Ceara Fortaleza – CE, Brazil |
Performance Comparison Of Hybrid Wavelet Transforms Formed Using Dct, Walsh, Haar and DKT in Watermarking H.B.Kekre1, Tanuja Sarode2 and Shachi Natu1, 1NMIMS University, India and 2Mumbai University, India |
Improving Initial Generations in PSO Algorithm for Transportation Network Design Problem Navid Afkar and Abbas Babazadeh, University of Tehran, Iran |
New Approach in Symmetric Block Cipher Security Using a New Cubical Technique Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom |
The Analysis of the Time Table Structure Within a Student Information System (Sis) Issa S.I.Ottoum, Alzaytoonah University of Jordan, Jordan |
A Rule Based Approach towards Detecting Human Temperament Shomoye Abiodun R1 and ShomoyeAdekunle I2, 1Oduduwa University, Nigeria and 2Federal Polytechnic, Nigeria |
An Iterative Morphological Decomposition Algorithm for Reduction Of Skeleton Points A.Sri Krishna1 and G.L.K.Vasista2, N.Neelima1, 1R.V.R& J.C College of Eng. India and 2AMRITA School of Eng., India |
Analysis of Key Considerations of the Public When Choosing Recreational Activities Han-Chen Huang1, Chun-Ta Lin2, Chi-Han Chuang3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Da-Tung Elementary School, Taiwan |
Efficient Data Protection for Enterprise Data Centers Khaled Aldossari, EXPEC Computer Center, Saudi Arabia |
Authoring System of Drill & Practice Elearning Modules for Hearing Impaired Students Karim Q Hussein, Mustansiriyah University, Iraq |
A Novel Methodology for Constructing Rule-Based Naïve Bayesian Classifiers Abdallah Alashqur, Applied Science University, Jordan |
Testability Measurement Model for Object Oriented Design (Tmmood) Abdullah1, M.H.Khan2, Reena Srivastava3, 1BBD University, India, 2I.E.T, India and 3BBD University, India |
December 2014, Volume 6, Number 6
Performance and Power Comparisons between NVIDIA and ATI GPUS YingZhang1 ,Lu Peng1, Bin Li1Jih-Kwon Peir2 and Jianmin Chen2,1Louisiana State University, USA,2University of Florida, USA |
ITCM: A Real Time Internet Traffic Classifier Monitor Silas Santiago LopesPereira1, Jose Everardo Bessa Maia2 and Jorge Luiz de Castro e Silva2,1Federal Institute of Ceará, Brazil and 2State University of Ceara, Brazil |
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard Ghada F.Elkabbany, Heba K.Aslan and Mohamed N.Rasslan, Electronics Research Institute, Egypt |
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard Analysis of Lithography Based Approaches in Development of Semiconductors Jatin Chopra, BITS Pilani Dubai, United Arab Emirates |
Requirement Analysis, Architectural Design and Formal Verification of a Multi-Agent Based University Information Management SystemNadeemAkhtar1, Aisha Shafique Ghori1 and Nadeem Salamat2, 1The Islamia University of Bahawalpur, Pakistan and2Karakoram International University, Pakistan |
Arabic Text Categorization Algorithm Using Vector Evaluation MethodAshraf Odeh1, Aymen Abu-Errub2, Qusai Shambour and3Nidal Turab, 1Isra University, Jordan, 2University of Jordan, Jordan and 3Al-Ahliyya Amman University, Jordan |
A Comparative Study of Clustering and Biclustering of Microarray DataHaifa Ben Saber1,2 and Mourad Elloumi1,3,1Tunis University, Tunisia,2Time Université – Tunis University, Tunisia and 3University of Tunis-El Manar, Tunisia |
Implementation of a Stream Cipher Based on Bernoulli’s MapRicardo Francisco Martinez-Gonzalez1 and Jose Alejandro Diaz-Mendez2, 1Veracruz Institute of Technology, Mexico and 2National Institute of Astophysics Optics and Electronics, Mexico |
Generating 3D Model in Virtual Reality and Analyzing Its PerformanceFilip Popovski, Igor Nedelkovski and Svetlana Mijakovska, St.Kliment OhridskiUniversity – Bitola, Macedonia |
Towards an Intelligent Tutoring System to Down SyndromAmal F.A Mahmoud, Mohamed A.F.Belal and Yehia M.K. Helmy, Helwan University, Egypt |
A Comparative Study of Dimension Reduction Methods Combined with Wavelet Transform Applied to the Classification of Mammographic ImagesN.Hamdi,K.Auhmani and M.M.Hassani, Universite Cadi Ayyad, Maroc |
Multi-Objective Predictive Control : A Solution Using MetaheuristicsHalim Merabti1,2 and Khaled Belarbi3,1Welding and NDT Research Centre (CSC), Algeria, 2University of Constantine, Algeria and 3Campus Université de Constantine, Alegria |
Experimental Analysis of Matching Technique of Steganography for Greyscale and Colour ImageKhurrum Rahim Rashid1, AqsaRashid2, Nadeem Salamat3 and Saad Missen2, 1NUSES FAST, Pakistan, 2Islamia University Bahawalpur,Pakistan and 3Karakoram International University Gilgit, Pakistan |
October 2014, Volume 6, Number 5August 2014, Volume 6, Number 4
June 2014, Volume 6, Number 3State of The Art of Learning Styles-Based Adaptive Educational Hypermedia Systems (Ls-Baehss)
Ahmed Al-Azawei and Atta Badii, School of Systems Engineering, UKMassive Parallelism With Gpus for Centrality Ranking in Complex Networks
Frederico L. Cabral, Carla Osthoff, Rafael Nardes and Daniel Ramos, Laboratório Nacional de Computação Científica, BrazilPerformance Analysis of Wind Turbine as a Distributed Generation Unit In Distribution System
Ramadoni Syahputra1,2, Imam Robandi1 and Mochamad Ashari1, 1Institut Teknologi Sepuluh Nopember, Indonesia and 2Universitas Muhammadiyah Yogyakarta, IndonesiaSCloud Computing Security through Symmetric Cipher Model
Subramanian Anbazhagan1 and K.Somasundaram2, 1Karpagam University, India and 2Jaya Engineering College, IndiaEnhancing the Matrix Transpose Operation Using Intel Avx Instruction Set Extension
Ahmed Sherif Zekri1,2, 1Alexandria University, Egypt and 2Beirut Arab University, LebanonReview of Monitoring Tools for E-Learning Platforms
Ali Alowayr and Atta Badii, Reading University, UKIntelligent Fatigue Detection and Automatic Vehicle Control System
Monali Gulhane and P.S.Mohod, RTMN University, IndiaSShort Term Load Forecasting System Based on Support Vector Kernel Methods
Lal Hussain, M. Sajjad Nadeem and Syed Ahsen Ali Shah, University of Azad Jammu and Kashmir, PakistanApril 2014, Volume 6, Number 2Performance Variations in Profiling Mysql Server on the Xen Platform: Is It Xen or Mysql?
Ashish Tapdiya and Yuan Xue, Vanderbilt University, United StatesDesign of a Virtual Ecological Pond for Motion-Sensing Game-Based Learning
Wernhuar Tarng1, Nien-Yin Lu1, Yi-Syuan Shih1 and Hsin-Hun Liou2, 1National Hsinchu University of Education, Taiwan and 2National Central University, TaiwanCloud Web-Based Operating System (Cloud Web Os)
Hesham Abusaimeh, Applied Science University, JordanAn Adaptive Framework for Enhancing Recommendation Using Hybrid Techniques
Radhya Sahal, SaharSelim and Abeer ElKorany, Cairo University, EgyptEstimation of Optimized Energy and Latency Constraint for Task Allocation in 3d Network on Chip
Vaibhav Jha1, Mohit Jha2 and G K Sharma1, 1ABV- Indian Institute of Information Technology and Management, India and 2Jabalpur Engineering College, IndiaCase-Based Reasoning for Explaining Probabilistic Machine Learning
Tomas Olsson1,2, Daniel Gillblad2, Peter Funk1, and Ning Xiong1, 1Mälardalens University, Sweden and 2SICS Swedish ICT, SwedenBusiness Bankruptcy Prediction Based on Survival Analysis Approach
Ming-Chang Lee, National Kaohsiung University of Applied Science, TaiwanRecognition and Ranking Critical Success Factors of Business Intelligence in Hospitals – Case Study: Hasheminejad Hospital
Marjan Naderinejad, Mohammad Jafar Tarokh and Alireza Poorebrahimi, Islamic Azad University, IranDesign and Implementation of a Personal Super Computer
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi ArabiaOutput Privacy Protection With Pattern-Based Heuristic Algorithm
P.Cynthia Selvi1 and A.R.Mohammed Shanavas2, 1KNGA College(W), India and 2Jamal Mohamed College, IndiaChange Management and Version Control of Scientific Applications
Bojana Koteska and Anastas Mishev, Ss. Cyril and Methodius University, MacedoniaAdvanced Authentication Scheme Using a Predefined Keystroke Structure
Abdulameer K. Hussain and Mohammad M. Alnabhan, Jerash University, JordanThe Impact of Knowledge-Based Trust (Kbt) on The Adoption and Acceptability of Cashless Economy in Nigeria
Galadima, Talatu O.1, Akinyemi, Ibidapo O.2, and Asani, Emmanuel O.3, 1Federal Polytechnic, Nigeria, 2Covenant University, Nigeria and 3Landmark University, NigeriaA Methodology for the Study of Fiber-Optic Cables
Muzammil H Mohammed and Mohd Aasif Ansari, College of Computers and Information Technology, Saudi ArabiaSharing of Cluster Resources among Multiple Workflow Applications
Uma Boregowda1 and Venugopal Chakravarthy2, 1Malnad College of Engineering, India and 2Sri Jayachamarajendra College of Engineering, IndiaReview of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic Management
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi ArabiaFebruary 2014, Volume 6, Number 1Cardinal Direction Relations in Qualitative Spatial Reasoning
Chaman L. Sabharwal and Jennifer L. Leopold, Missouri University of Science and Technology, USAInformation Security Approach in Open Distributed Multi-Agent Virtual Learning Environment
Zahi A.M. Abu Sarhan1 and As’ad Mahmoud As’ad Alnaser2, 1Applied Science Private University, Jordan and 2Al-Balqa’ Applied University, JordanInformation Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method
Ming-Chang Lee, National Kaohsiung University of Applied Science, TaiwanEvaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf
Maicon A. Sartin11 and Alexandre C. R. da Silva2, 1UNEMAT, Brazil and 2Ilha Solteira, BrazilClustering Effects on Wireless Mobile Ad-Hoc Networks Performances
Gideon Naah and Edwin Boadu Okoampa, University of Electronic Science and Technology of China, ChinaWhat Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling
Yousef Elsheikh and Mohammad Azzeh, Applied Science University, JordanA Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
Hung-Teng Chang, Yu Da University of Science and Technology, TaiwanShape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim, Universiti Teknologi Malaysia, MalaysiaA Study on the Dynamic Effect of Sports Promotion Strategy and Effectiveness of NationalHealth Care in Taiwan
Tian-Syung Lan and Pin-Chang Chen, Yu Da University of Science and Technology, TaiwanFulfillment Request Management (The approach)
Stylianos Gkoutzioupas, Univercity of the Aegean, GreeceProcessing Obtained Email Data By Using Naïve Bayes Learning Algorithm
Valery V. Pelenko and Aleksandr V. Baranenko, St. Petersburg Research University of Information Technologies, RussiaA Linear Algorithm for the Grundy Number of A Tree
Ali Mansouri and Mohamed Salim Bouhlel, Department of Electronic Technologies of Information and Telecommunications Sfax, TunisiaResearch on Dynamic Effects of Employability of Vocational College Students in Taiwan
Pin-Chang Chen, Yu Da University of Science and Technology, TaiwanDecember 2013, Volume 5, Number 6The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and SecuritySalwa Al-Samirrai, Zahra Fadhil Mohsen and Aysh Alhroob, Isra University, JordanMolecular Solutions for the Set-Partition Problem on Dna-Based ComputingSientang Tsai and Wei-Yeh Chen, Southern Taiwan University of Science and Technology, TaiwanBrazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding WindowsR. F. Prates1, G. Cámara-Chávez1, William R. Schwartz2 and D. Menotti1, 1University Federal of Ouro Preto, Brazil and 2University Federal of Minas Gerais, BrazilDistributed Cloud Computing Environment Enhanced With Capabilities for Wide-Area Migration and Replication Of Virtual MachinesYoung-Chul Shim, Hongik University, KoreaStudy On Decision-Making for Cafe Management AlternativesCheng-I Hou, Chung Hua University, TaiwanMulti-Topic Multi-Document SummarizerFatma El-Ghannam1 and Tarek El-Shishtawy2, 1Electronics Research Institute, Egypt and 2Benha University, EgyptAn Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project CaseLamia Ben Hiba and Mohammed Abdou Janati Idrissi, Mohammed V Souissi University, MoroccoGesture Recognition Based Mouse EventsRachit Puri, Samsung Research India, IndiaA Prediction Model for Taiwan Tourism Industry Stock IndexHan-Chen Huang and Fang-Wei Chang, Yu Da University of Science and Technology, Taiwan
October 2013, Volume 5, Number 5
Performance Analysis of Round Trip Time in Narrowband RF Networks For Remote Wireless Communications
El miloud Ar reyouchi1, Kamal Ghoumid2, Koutaiba Ameziane1 and Otman El Mrabet1, 1Abdelmalek Essaadi university, Morroco and 2Informatics and Telecommunications, ENSAO, MoroccoAutomatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images
Sérgio Bortolin Júnior and Daniel Welfer, Universidade Federal do Pampa, BrazilProject Monitoring and Control Measures In CMMI
Mahmoud Khraiwesh, Zarqa University, JordanA Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Approaches
Ramachandra Rao Kurada1, K Karteeka Pavan2 and AV Dattareya Rao1, 1Acharya Nagarjuna University, India and 2RVR & JC College of Engineering, IndiaDiagnosis of Some Diseases in Medicine via computerized Experts System
R.A. Soltan, M. Z. Rashad and B.El-Desouky, Mansoura University, EgyptImproving the Effectiveness of Information Retrieval System Using Adaptive Genetic Algorithm
Wafa Maitah1, Mamoun Al-Rababaa1 and Ghasan Kannan2, 1Al al-Bayt University, Jordan and 2Amman Arab University, JordanThe Comparison of the Text Classification Methods to be Used for the Analysis of Motion Data in DLP Architect
Murat Topaloglu, Trakya University, TurkeyA Privacy – Learning Objects Identity System for Smartphones Based on a Virtual Learning Environment Database
LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of Science and Technology, ChinaSystems Variability Modeling: A Textual Model Mixing Class and Feature Concepts
Ola Younis1, Said Ghoul1, and Mohammad H. Alomari2, 1Philadelphia University, Jordan and 2Applied Science University, JordanCompact, “Fuzzy” Information
S.Balaji Vivek, Easwari Engineering College, IndiaThe Principles of Humanism for MANETs
Md. Amir Khusru Akhtar1 and G. Sahoo2, 1Cambridge Institute of Technology, India and 2Birla Institute of Technology, IndiaThe Application Wavelet Transform Algorithm in Testing ADC Effective Number of Bits[ Pdf ]
Emad A. Awada, Applied Science University, JordanIntroducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor Networks Using Fuzzy Logic
Mostafa Vakili Fard1, Sayyed Majid Mazinani2 and Sayyed Ahmad Hoseini3, 1Science and Research IAU, Iran, 2Imam Reza University, Iran and 3Payam Noor University, IranData Mining Model for the Data Retrieval from Central Server Configuration
Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan, International Institute of Information Technology – Bangalore, India
August 2013, Volume 5, Number 4
A Review of Temporal Aspects of Hand Gesture Analysis Applied to Discourse Analysis and Natural Conversation
Renata C. B. Madeo, Priscilla K. Wagner and Sarajane M. Peres, Universidade de Sao Paulo, Brazil
A Tabu Search Algorithm With Efficient Diversification Strategy for High School Timetabling Problem
Salman Hooshmand1, Mehdi Behshameh2 and OmidHamidi1, 1Hamedan University of Technology, Iran and 2Islamic Azad University, Iran
Analysis of Elementary Cellular Automata Boundary Conditions
K. Salman, Middle Tennessee State University, USA
Design and Implementation of Repair-aware Test Flow for Multi-Memory
Gang Wang and Huajun Chen, Loongson Technology Corporation Limited, China
Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic Mathematics
Diganta Sengupta1 Mahamuda Sultana2 and Atal Chaudhuri3, 1Future Institute of Engineering and Management, India, 2Swami Vivekananda Institute of Science and Technology, India and 3Jadavpur University, India
Integrations of ICT in Education Sector for the Advancement of the Developing Country: Some Challenges and Recommendations-Bangladesh Perspective
Mst. Shahnaj Parvin, International Islamic University, Bangladesh
Comparative Study of Backpropagation Algorithms in Neural Network Based Identification of Power System
Sheela Tiwari1, Ram Naresh2 and Rameshwar Jha3, 1Dr. B R Ambedkar National Institute of Technology, India, 2National Institute of Technology, India and 3IET Bhaddal Technical Campus, India
Matching Structure and the Evolution of Cooperation in the Prisoner’s Dilemma
Noureddine Bouhmala and Jon Reiersen, Vestfold University College, Norway
Survey of the Euro Currency Fluctuation by Using Data Mining
M. Baan, E. Saadati and M. Nasiri, Iran University of Science and Technology, Iran
GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security
Manoj Prabhakar K and Manoj Kumar S, Anna University, India
Following Car Algorithm With Multi Agent Randomized System
Mounir Gouiouez, Noureddine Rais and Mostafa Azzouzi Idrissi, University Sidi Mohammed Ben Abdellah, MoroccoPeriocular Recognition Using Reduced Features
Ambika D R, Radhika K R and D Sehsachalam, BMS College of Engineering, IndiaDesign and Development of Secure Navigation System for Visually Impaired People
Prashant Bhardwaj and Jaspal Singh, Centre for Development of Advanced Computing, MohaliA Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel
Prabhudev Jagadeesh1, P. Nagabhushan1 and R. Pradeep Kumar2, 1University of Mysore, India and 2Amphisoft Technologies Private Limited, India
June 2013, Volume 5, Number 3
Fuzzy Rule Base System for Software Classification
Adnan Shaout and Juan C. Garcia, The University of Michigan – Dearborn, United StatesContext-Based Barrier Notification Service Toward Outdoor Support for the Elderly
Keisuke Umezu1, Takahiro Kawamura2 and Akihiko Ohsuga2, 1NEC Corporation, Japan and 2University of Electro-Communications, JapanHyper-Mspace; Multidimensional Evolutionary-Agents Modeling and Analysis
Mohamed Dbouk1, Ihab Sbeity1, Hamid Mcheick2 and Haytham Douaihy3, 1Lebanese University, Beirut-Lebanon, 2Universite du Quebec a Chicoutimi, Canada and 3Lebanese University-DSST, Beirut-LebanonA Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in 2d Angiograms
Daniel S.D. Lara1, Alexandre W.C. Faria2, Arnaldo de A. Araujo1 and D. Menotti3, 1Univ. Fed. de Minas Gerais, Brazil, 2UFMG, Brazil and 3Universidade Federal de Ouro Preto, BrazilModified Heuristic Time Deviation Technique for Job Sequencing and Computation of Minimum Total Elapsed Time
N.Nagamalleswara Rao1, O. Naga Raju2 and I. Ramesh Babu2, 1R.V.R & J. C. College of Engineering, India and 2Nagarjuna University, IndiaSecurity Threats on Cloud Computing Vulnerabilities
Te-Shun Chou, East Carolina University, U.S.AHandover Management Scheme in LTE Femtocell Networks
Tijane Fatima Zohra Badri1,2, Saadane Rachid1, Mohammed Wahbi1 and MbarkiSamir2, 1SIR2C2S/LASI-EHTP Casablanca, Morocco and 2Ibn Tofail University Kenitra, MoroccoSaasquality – A Method for Quality Evaluation of Software as a Service (Saas)
Nemesio Freitas Duarte Filho1, Clarindo Isaias Pereira da Silva e Padua1, Paulo Henrique de Souza Bermejo2, Andre Luiz Zambalde2, Urlan Salgado de Barros3, 1Federal University of Minas Gerais, Brazil, 2Federal University of Lavras, Brazil and 3Federal University of Parana, BrazilAn Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, EgyptTowards A Good ABS Design for More Reliable Vehicles on the Roads
Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed, University of Constantine, AlgeriaDesigning of an efficient algorithm for identifying Abbreviation definitions in biomedical Text
Shashank Singh1, Gaurav Sharma2 Abdul Nazeer K A3 and Shalini Singh2, 1IBM India Private limited, India, 2School of Biochemical Engineering IIT (BHU), India and 3NIT, IndiaLabeled Generalized Stochastic Petri Net Based Approach for Web Services Composition
Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine, AlgeriaBounded Ant Colony Algorithm Fortask Allocation on Anetwork of Homogeneous Processorsusing a Primary Site (Bts-Aco)
Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, JordanBiomedical Image Transmission Based on Modified Feistal Algorithm
Jinu Elizabeth John, Saintgits College of Engineering, IndiaIntelligent Access Control Policies for Social Network Site
Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City), Myanmar
A Guide to Deal With Uncertainties in Software Project Management Marcelo Marinho1,2 ,Suzana Sampaio2, Telma Lima1and Hermano de Moura1,1Federal University of Pernambuco (UFPE), Brazil 2Federal Rural University of Pernambuco (UFRPE), BrazilIntelligent Algorithms for Cell Tracking and Image SegmentationAshraf A. Aly1 ,Safaai Bin Deris2and Nazar Zaki31Alkhawarizmi College, UAE,2Universiti Teknologi Malaysia, Malaysia3and UAE University, UAEVariability Modeling for Customizable Saas ApplicationsAshraf A. Shahin, Institute of Statistical Studies & Research, Cairo University, EgyptSystematic Review on Project ActualitySuzana Cândido de Barros Sampaio1,2 ,Marcelo Marinho1,2 ,Hermano Moura1, 1Federal University of Pernambuco (UFPE), Brazil and 2Federal Rural University of Pernambuco (UFRPE), BrazilEfficiency Lossless Data Techniques for Arabic Text CompressionEnas Abu Jrai, Al-Balqa Applied University, JordanManaging Collaboration Within Networks and Relationships in the Serious Game of Agribusiness Management Using Sandpile ModelSaifulBukhori, Jember University, IndonesiaFLBRA: Fuzzy Logic Based Routing Algorithm for Indoor Wireless Sensor NetworksLucas Leão, David Bianchini and Omar Branquinho, Pontifical Catholic University of Campinas, BrazilA Robust Blind and Secure Watermarking Scheme Using Positive Semi Definite MatricesNoui Oussama and Noui Lemnouar, UHL University, AlgeriaEducational Data Mining Using JMPSadiq Hussain and G.C.Hazarika, Dibrugarh University, IndiaState of the Art of Agile Governance: A Systematic ReviewAlexandre J.H.de O.Luna1,2 ,Philippe Kruchten2, Marcello L.G. do E.Pedrosa1, Humberto R.de A. Neto1 and Hermano P.de Moura1, 1Federal University of Pernambuco (UFPE), Brazil and 2The University of 1British Columbia, CanadaEmployee Performance Appraisal System Using Fuzzy Logic Adnan Shaout1 and Mohamed Khalid Yousif2, 1The University of Michigan, USA and 2Sudan University of Science and Technology, SudanResearch on the Effect of Applying Multimedia to the Instruction of Rational Emotion Behavior Therapy For Middle School Students’ Emotional ControlChen-Feng Wu, Pin-Chang Chen and Yu-Tzu Chen, Yu Da University of Science and Technology, TaiwanSoftware Architectural Patterns for Service CompositionGhadeer Ghazal1, Amjad. Hudaib1 and Waffa Maitah2, 1The University of Jordan, Jordan and 2Al al-Bayt University, JordanOne-Dimensional Vector Based Pattern MatchingY.M.Fouda, Mansoura University, EgyptDependable Online Appointment Booking System for Nhis Outpatient in Nigerian Teaching HospitalsAdebayo Peter Idowu1, Olajide Olusegun Adeosun2 and Kehinde Oladipo Williams3, 1Obafemi Awolowo University, Nigeria, 2Ladoke Akintola University of Technology, Nigeria and 3McPherson University, NigeriaCo-Emulation of Scan-Chain Based Designs Utilizing SCE-MI InfrastructureBill Jason Tomas1, Yingtao Jiang2 and Mei Yang2, 1Cadence Design System, USA and 2University of Nevada, USAAn Improved Particle Filter Tracking System Based on Colour and Moving Edge InformationChao-Ju Chen1, Wernhuar Tarng1 and Kuo-Hua Lo2, 1National Hsinchu University of Education, Taiwan and 2Industrial Technology Research Institute, TaiwanReal Time Optimized Traffic Management AlgorithmPartha Sarathi Chakraborty, Prajeeth Nair, Pranshu Raj Sinha and Ishan Kumar Behera, SRM University, IndiaA Generic Model for Disease Outbreak Notification SystemsFarag Azzedin, Jaweed Yazdani, Salahadin Adam and Mustafa Ghaleb, King Fahd University of Petroleum and Minerals, Saudi ArabiaSquare Grid Points Coveraged by Connected Sources With Coverage Radius of One on a Two-Dimensional GridPattama Longani, Chiang Mai University, Thailand Structural and Hardware Complexities of Microprocessor Design According to Moore’s LawHaissam El-Aawar, Lebanese International University – LIU, LebanonRemote Real – Time Process and Production Monitoring Mechanism of Lighting Parts for Outdoor Recreation Cheng-I Hou1, Han-Chen Huang2, Tian-Syung Lan1 and Wei-Min Teng1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan Language Independent Document Retrieval Using Unicode Standard Vidhya M and Aji S, University of Kerala, IndiaA Study of The Effects of Electronic Textbook-Aided Remedial Teaching on Students’ Learning Outcomes at the Optics Unit Chen-Feng Wu, Pin-Chang Chen and Shu-Fen Tzeng, Yu Da University of Science and Technology, Taiwan