Current Issue

 

April 2023, Volume 15, Number 2

Application Security Self-Efficacy of Software Developers: A Correlational Study

Wisdom Umeugo, Independent Researcher, Canada
Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition

Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey

Linear Feedback Shift Register Genetically Adjusted for Sequence Copying

Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico

The Development of Climate Agrometeorological Application for Farmers in Namibia

Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia

February 2023, Volume 15, Number 1

Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry

Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA

Prediction of Anemia using Machine Learning Algorithms

Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal

Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms

Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA

Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines

Kouassi Konan Jean-Claude, Bircham International University, Spain

Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality

Thongchai Jeeradist, Kasem Bundit University, Thailand

Behavioural Analytics in Cyber Security for Digital Forensics Application

Martin Luther Bwangah, Kabarak University, Kenya

December 2022, Volume 14, Number 6

Effective Malware Detection Approach based on Deep Learning in Cyber-Physical Systems

Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli, Ramya Thatikonda, Adithya Padthe, University of the Cumberlands, USA

Electronic Letter of Guarantee for Banking System

Sherif Kamel Hussein1, Abdullah Alhayan21October University for Modern Sciences and Arts, Egypt, & Arab East Colleges for Graduate Studies, KSA, 2Arab East Colleges for Graduate Studies, KSA

Testing-as-a-Service (TaaS) – Capabilities and Features for Real-Time Testing in Cloud

Pawankumar Sharma1, Prasad Chetti2 and Lotfollah Najjar31University of the Cumberlands, USA, 2Northwest Missouri State University, USA, 3University of Nebraska, USA

Using Singular Value Decomposition in a Convolutional Neural Network to Improve Brain Tumor Segmentation Accuracy

Pegah Ahadian, Maryam Babaei and Kourosh Parand, Shahid Beheshti University, Iran

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning

Arshiya Khan and Chase Cotton, University of Delaware, USA

October 2022, Volume 14, Number 5

Quantifying the Theory Vs. Programming Disparity using Spectral Bipartivity Analysis and Principal Component Analysis

Natarajan Meghanathan, Jackson State University, USA

Edge Controller Placement for Next Generation Wireless Sensor Networks

Mohamed S. Abouzeid, Heba A. El-khobby, Mahmoud A. A. Ali and Mohamed E. Nasr, Tanta University, Egypt

Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Studying and Analyzing the Social Media Data

Sherif Kamel Hussein1, 2, Sultanah AL-Sedairi2 and Nawal AL-Rahimi21October University for Modern Sciences and Arts, Egypt 2Arab East Colleges for Graduate Studies, KSA

Dyslexic Reading Assistance with Language Processing Algorithms

Sharada Lakshmanan, Equifax, USA

Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems

Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria

August 2022, Volume 14, Number 4

Compact Preservation of Scrambled CD-Rom Data

Jacob Hauenstein, The University of Alabama in Huntsville, USA

Identify the Beehive Sound using Deep Learning

Shah Jafor Sadeek Quaderi1, Sadia Afrin Labonno2, Sadia Mostafa2 and Shamim Akhter3, 1University of Malaya, Malaysia, 2AISIP Lab, International University of Business Agriculture and Technology, Bangladesh, 3Stamford University Bangladesh, Bangladesh

SwarMED: A High-Throughput Interoperability Architecture Over Ethereum and Swarm for Big Biomedical Data

Arghya Kusum Das, University of Alaska Fairbanks, USA

Arabic Dataset for Farmers’ Intent Identification Toward Developing a Chatbot

Abdelrahman Elsayed and Susan F. Ellakwa, Agricultural Research Center, Giza, Egypt

Impact of 4IR Technology and its Impact on the Current Deployment

Bandar Alsulaimani1 and Amanul Islam2, 1King Fahad University of Petroleum and Minerals (KFUPM), Saudi Arabia, 2University of Malaya, Malaysia

A Short Survey on Constructing an IoT based Intelligent Road System

F. O. Okorodudu, G. C. Omede, S. A. Otegbalor, Delta State University, Nigeria

Impact of Pandemic on E-Commerce in Asia

Bilal Ahmed Wani and Noor Azizah BT. Mohamad Ali, Kulliyyah of Information and Communication Technology International Islamic University of Malaysia, Malaysia

 

June 2022, Volume 14, Number 3

Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks Using the Mobile Unity
Reham.A.Shihata, EL Menoufia University, Egypt

The Digital Carbon Footprint: Threat to an Environmentally Sustainable Future
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, USA

Combining Machine Learning and Semantic Analysis for Efficient Misinformation Detection of Arabic Covid-19 Tweets
Abdulrahim Alhaizaey and Jawad Berri, King Saud University, Saudi Arabia

Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing
Jacob Bushur and Chao Chen, Purdue University Fort Wayne Fort Wayne, USA

Security in Wireless Sensor Networks: Comparative Study
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei and Aseel Abdullah Alfaidi, Jeddah University, Saudi Arabia

Big Data and Cloud Readiness
Hazirah Bee Yusof Ali and Lili Marziana Abdullah, Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Malaysia

The Professionalization of the Hacker Industry
Tyson Brooks, Syracuse University, USA

Visually Impaired People Monitoring in a Smart Home using Electronic White Cane
Mikaël A. Mousse, Institut Universitaire de Technologie, Université de Parakou, Benin

Covid-19 Sparked the E-Commerce Revolution; Some Benefited, While Others Left in Cold
Bilal Ahmed Wani and Dr. Noor Azizah BT. MohamadAli, International Islamic University of Malaysia, Malaysia

April 2022, Volume 14, Number 2

Smsecurity: Security System and SMS Notification Cum Face Recognition
Winston G. Domingo1, Arnold Dela Cruz2, Klaida Nicolas2, Jennifer A. Gamay MIT2, Erwin N. Lardizabal2 and Virdi C. Gonzales3, 1Quirino State University, Philippines, 2Cagayan Valley Computer and Information Technology, Philippines,  3Southern Isabela Medical Center, Philippines

Remote Work and Innovation During this Covid-19 Pandemic: An Employers’ Challenge
Bibhu Dash, University of the Cumberlands, USA

Failure Free Cloud Computing Architectures
Yolam Zimba1, Hastings Maboshe Libati2 and Derrick Ntalasha2, 1University of Lusaka, Zambia, 2Copperbelt University, Zambia

User Experience Evaluation of a Student Information System
Asaad Alzayed and Bareeq Alghannam, Public Authority for Applied Education and Trainin, Kuwait

 

February 2022, Volume 14, Number 1

Mobile Device Users’ Susceptibility to Phishing Attacks
F. Ley Sylvester, Tarrant County College, USA

Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation
Tayeb Basta, Al Ghurair University, UAE

Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog
Márcio Miguel Gomes1, Rodrigo da Rosa Righi1, Cristiano André da Costa1 and Dalvan Griebler2, 1University of Vale do Rio dos Sinos – Brazil, 2Pontifical Catholic University of Rio Grande do Sul, Brazil

Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route
Joe Dumas, University of Tennessee at Chattanooga, USA

Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma and Osman Kandara, Southern University and A&M College, USA

Encryption based Watermarking Technique for Security of Medical Image
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria

Feature Extraction Methods for IRIS Recognition System: A Survey
Tara Othman Qadir1, Nik Shahidah Afifi Md Taujuddin1 and Sundas Naqeeb Khan2, 1Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia, 2Universiti Tun Hussein Onn Malaysia, Malaysia

 

December 2021, Volume 13, Number 6

Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches
Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3,
1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France

Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks
Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran

Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models
Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia

SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
Amelie Anne Gutierrez, Holy Angel University, Philippines

Creating 3D Models with 3D Printing Process
Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia

October 2021, Volume 13, Number 5

Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA

Information Retrieval based on Cluster Analysis Approach
Orabe Almanaseer, The University of Jordan, Jordan

Blockchain Technology in Agriculture: A Case Study of Blockchain Start-Up Companies
Chandra Sekhar Bhusal, Information Technology and Physical Sciences Federation University, Australia

Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks
Ali M. Allam, Helwan University, Egypt

Circuit Break Connect Monitoring to 5G Mobile Application
Ton Tsang and Cheung Yip Kan, Hong Kong College of Technology, Hong Kong

The BitcoinHeist: Classifications of Ransomware Crime Families
Micheline Al Harrack, Marymount University, USA

August 2021, Volume 13, Number 4

Online Learning During Covid-19 Pandemic, and Possibility of Adopting Computer-Based Test
Rabea Emdas1 and Ahmed Alruwaili2, 1Swinburne University of Technology, Australia, 2La Trobe University, Australia

Web Scraper Utilizes Google Street View Images to Power a University Tour
Peiyuan Sun1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA

Cloak-Reduce Load Balancing Strategy for Mapreduce
Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso

June 2021, Volume 13, Number 3

Fabric Defect Detection based on Improved Object as Point
Yuan He, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore

Product Sentiment Analysis for Amazon Reviews
Arwa S. M. AlQahtani, Princess Nourah bint Abdulrahman University, Saudi Arabia

April 2021, Volume 13, Number 2

Newly Proposed Technique for Autism Spectrum Disorder based Machine Learning
Sherif Kamel1,2 and Rehab Al-harbi2, 1October University for Modern Sciences and Arts, Egypt, 2Arab East Colleges for Graduate Studies, KSA

Big Data Analytics in Health Care: A Review Paper
Maria Mohammad Yousef, Al-albayt University, Jordan

Monitoring of the Last US Presidential Elections
Christoph Glauser1, Jacques Savoy2 and Loris Schmid1,2, 1IFAAR Institute, Switzerland, 2University of Neuchatel, Switzerland

Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage
Waleed Al-Ghaith, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Saudi Arabia

Comparison Analysis of Facebook’s Prophet, Amazon’s DeepAR+ and CNN-QR Algorithms for Successful Real-World Sales Forecasting
Emir Žunić1, 2, Kemal Korjenić1, Sead Delalić1, 2 and Zlatko Šubara1, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina, 2University of Sarajevo, Bosnia and Herzegovina

February 2021, Volume 13, Number 1

Efficient Field of Vision Algorithms for Large 2D Grids
Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada

Highly Constrained University Class Scheduling using Ant Colony Optimization
Al-Mahmud, KUET, Bangladesh

Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh Network-on-Chip Systems
Walid Mokthar Salh and Azeddien M. Sllame, University of Tripoli Tripoli, Libya

Real Time Vigilance Detection using Frontal EEG
Siddarth Ganesh1 and Ram Gurumoorthy2, 1Amrita Vishwa Vidyapeetham, India, 2StimScience Inc., USA

Application of a Multilevel Technology Acceptance Management Model for Effective Technology Deployment
Gilbert Busolo, Lawrence Nderu and Kennedy Ogada, Jomo Kenyatta University of Agriculture and Technology, Kenya

December 2020, Volume 12, Number 6

Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts
Janis Zuters and Viktorija Leonova, University of Latvia, Latvia

A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
Mohamed A. H. El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt

Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship
Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk, Zhytomyr Polytechnic State University, Ukraine

Determining Business Intelligence Usage Success
Javier N. Montero and Mary L. Lind, Defense Information Systems Agency, USA, Louisiana State University Shreveport, USA

October 2020, Volume 12, Number 5

Machine Learning in Early Genetic Detection of Multiple Sclerosis Disease: A Survey

Nehal M. Ali1, Mohamed Shaheen2, Mai S. Mabrouk3 and Mohamed A. AboRezka1, 1Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt, 2Arab Academy for Science Technology and Maritime Transport, Alexandria, Egypt, 3Misr University for Science and Technology, Cairo, Egypt

Comparison of Rendering Processes on 3D Model

Filip Popovski1, Nikola Spasov1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1SS KlimentOhridski, Macedonia, 2International Slavic University Gavrilo RomanovicDerzavin, Macedonia

IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

Marlon Intal Tayag, Francisco Napalit and Arcely Napalit, School of Computing Holy Angel University, Philippines

August 2020, Volume 12, Number 4

Importance of Process Mining for Big Data Requirements Engineering

Sandhya Rani Kourla, Eesha Putti, and Mina Maleki, University of Detroit Mercy, USA

XML Encryption and Signature for Securing Web Services

Iehab ALRassan, King Saud University, Saudi Arabia

Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Implemented on Different Hadoop Platforms

Purvi Parmar, MaryEtta Morris, John R. Talburt and Huzaifa F. Syed, University of Arkansas, USA

Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar

Nabila A. Khodeir, Electronic Research Institute, Egypt

The Smart Parking Management System

Amira. A. Elsonbaty1 and Mahmoud Shams21Higher institute of engineering and technology, Egypt, 2Kafrelsheikh University, Egypt

Performance Evaluation of LTE Network using Maximum Flow Algorithm

Bir Bahadur Khatri1, Bulbul Ahammad1, Md. Mezbahul Islam2, Rahmina Rubaiat2 and Md. Imdadul Islam11Jahangirnagar University, Bangladesh, 2MBSTU, Bangladesh

A Novel Study of Lichen Planopilaris Among Different Iranian Ethnicities based on Computer-aided Programs

Maryamsadat Nejadghaderi1, Ashkan Tashk2, Parvin Mansouri1 and Zahra Safaei Naraghi11Tehran University of Medical Sciences (TUMS), Iran, 2University of Southern Denmark (SDU), Denmark

Railway Safety Protection with Android Mobile Application for 5G New Radio Network

Tony Tsang and Man Cheng Chong, Hong Kong College of Technology, Hong Kong

June 2020, Volume 12, Number 3

A New Hybrid Diversity Combining Scheme for Mobile Radio Communication Systems over Nakagami Fading Chanel

Akinyinka Olukunle Akande, Onyebuchi Chikezie Nosiri, Nnaemeka Chiemezie Onuekwusi and Emmanuel Uchenna Ekwueme, Federal University of Technology Owerri, Nigeria

Using Social Media as A Tool for Promoting Festival Tourism

Krittanai Ngernyuang and Pei-Ying Wu, Chung Hua University, Taiwan

Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19

Stella Chiemeke1 and Omokhagbo Mike Imafidor21University of Benin, Nigeria and 2Africa PPP Advisory Nigeria Limited, Nigeria

April 2020, Volume 12, Number 2

Lidar Point Cloud Classification Using Expectation Maximization Algorithm

Nguyen Thi Huu Phuong, Hanoi University of Mining and Geology, Vietnam

Enactment Ranking of Supervised Algorithms Dependence of Data Splitting Algorithms: A Case Study of Real Datasets

Hina Tabassum and Muhammad Mutahir Iqbal, Bahauddin Zakariya University, Pakistan

Application of Facebook’s Prophet Algorithm for Successful Sales Forecasting Based on Real-world Data

Emir Žunić1,2, Kemal Korjenić1, Kerim Hodžić2,1 and Dženana Đonko2, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina and 2University of Sarajevo, Bosnia and Herzegovina

February 2020, Volume 12, Number 1

Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Via Controlled Nano Switching

Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan

Web Services as A Solution for Cloud Enterprise Resource Planning Interoperability

Djamal Ziani and Nada Alfaadhel, King Saud University, Saudi Arabia

Study of an Application Development Environment Based on Unity Game Engine

Sagor Ahamed, Anomita Das, Shahnawaz Md Tanjib and Ms. Qamrun Nahar Eity, Ahsanullah University of Science and Technology, Bangladesh

December 2019, Volume 11, Number 6

Authentication and Verification of Social Networking Accounts Using Blockchain Technology

1Samer Shorman and 2Mohammad Allaymoun, 1Applied Science University, Kingdom of Bahrain and 2AMA International University, Kingdom of Bahrain

Cluster Based Association Rule Mining for Courses Recommendation System

Wael Ahmad AlZoubi, Balqa Applied University, Jordan

Recognizing and Tracking Outdoor Objects by Using Artoolkit Markers

Blagoj Nenovski and Igor Nedelkovski, University “St. Kliment Ohridski”, North Macedonia

Self-learning AI Framework for Skin Lesion Image Segmentation and Classification

Anandhanarayanan Kamalakannan1, Shiva Shankar Ganesan2 and Govindaraj Rajamanickam1, 1CSIR Madras Complex, India and 2University of Bridgeport, USA

October 2019, Volume 11, Number 5

Lightweight Headgear Brain Waves for Fatigue Detection in Smartphone

Yung Gi Wu, Jwu Jenq Chen and Rui Hsin Wang, Chang Jung Christian University, Taiwan

Election System Based on Blockchain Technology

Noor Mohammedali and Ali Al-Sherbaz, Northampton University, UK

Image Generation with Gans-based Techniques: A Survey

Shirin Nasr Esfahani and Shahram Latifi, UNLV, USA

Estimating the Crest Lines on Polygonal Mesh Models by an Automatic Threshold

Zhihong Mao, Ruichao Wang, Fan Liu and Yulin Zhou, Wuyi University, China

Matbase auto Function Non-relational Constraints Enforcement Algorithms

Christian Mancas, Ovidius University, Romania

Query Optimization for Big Data Analytics

Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert, Pace University, USA

Detection of Fake Accounts in Instagram Using Machine Learning

Ananya Dey1, Hamsashree Reddy2, Manjistha Dey3 and Niharika Sinha41National Institute of Technology, Tiruchirappalli, India, 2PES University, India, 3RV College of Engineering, India and 4Manipal Institute of Technology, India

An Improve Object-oriented Approach for Multi-objective Flexible Job-shop Scheduling Problem (FJSP)

Bamaiyi Sule and Ibrahim Lawal, Abubakar Tafawa Balewa University, Nigeria

August 2019, Volume 11, Number 4

Coloured Algebras and Biological Response in Quantum Biological Computing Architectures

1L-F Pau  and  2P. Borza  1CBS,  Solbjergplads  1, DK 2000 Copenhagen, Denmark. 2Faculty of Electrical Engineering and Computers, Department Electronics & Computers, Street Politehnicii no.1-3, Brasov, 500024, Romania

A Comparative Study E-Commerce Development Method: Adapting an Agile Approach in Mobile Occasion E – Commerce System

Beshair Khalid Alsiddiq and Nor Shahida Mohd Jamail Collage of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia

An Effect of Using A Storage Medium in Dijkstra Algorithm Performance for Ideal Implicit Path Cost

Ibtusam Alashoury1 and Mabroukah Amarif2 ,  1Department of Computer Sciences, Faculty of Sciences, Sebha University, Sebha, Libya, 2Department of Computer Sciences, Faculty of Information Technology, Sebha University, Sebha, Libya

Big Data in Cloud Computing Review and Opportunities

Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert Seidenberg School of CSIS, Pace University, White Plains, New York

Remote Monitoring L.V. Switchboard Power Status with 5G New Radio Network Application

Tony Tsang and Lam Sai Chung, Centre of International Education, Hong Kong College of Technology,Hong Kong.

Applying Important-Performance Analysis to Home Stay Service Performance

Han-Chen Huang, Department of Tourism and M.I.C.E., Chung Hua University, 30012 Hsinchu, Taiwan.

Spectrum Occupancy in Rural Nigeria: A Case for A Lightly Licensed Spectrum Band for Rural Broadband Enhancement

Emmanuel A. Ubom1 , Aloysius C. Akpanobong2  and Ubong Ukommi1, 1Department of Electrical and Electronic Engineering, Akwa Ibom State University, Ikot  Akpaden, Mkpat Enin, Nigeria. 2Department of Computer Science, Akwa Ibom State University, Nigeria.

Exploring Factors Influencing the Adoption of Online Shopping with Saudi E-Shops, Female Perspective

Noura Mohammed Aldaej, Department of Information Systems, Al-Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

June 2019, Volume 11, Number 3

Swedish Student-Teachers in Digital Activities: Digital Competence Through Development-Oriented Thesis Projects

Peter Karlsudd, Linnaeus University, Sweden

Design and Implementation of A Raspberry-pi Based Home Security and Fire Safety System

Sajid M. Sheikh1, Modise K. Neiso2 and Fatma Ellouze3, 1,2University of Botswana, Gaborone, Botswana and 3Univeristy of Sfax, Tunisia

An Approach to Extracting Distributed Data From the Integrated Environment of Web Technologies Based on Set Theory

Cheikh Ould El Mabrouk and Karim Konaté, University Cheikh Anta DIOP, Senegal

Comparative Analysis of FCFS, SJN & RR Job Scheduling Algorithms

Luhutyit Peter Damuut1 and Pam Bulus Dung2, 1Kaduna State University, Nigeria and 2FCE Pankshin, Nigeria

Performance Evaluation of Parallel Bubble Sort Algorithm on Supercomputer IMAN1

Reem Saadeh and Mohammad Qatawneh, The University of Jordan, Jordan

Intrusion Detection System Classification Using Different Machine Learning Algorithms on KDD-99 and NSL-KDDDatasets – A Review Paper

Ravipati Rama Devi and Munther Abualkibash, Eastern Michigan University, USA

Smart Motorcycle Helmet: Real-Time Crash Detection With Emergency Notification, Tracker and Anti-Theft System Using Internet-of-Things Cloud Based Technology

Marlon Intal Tayag1 and Maria Emmalyn Asuncion De Vigal Capuno2, 1Holy Angel University, Philippines and 2Future University, Sudan

A Survey on Security Challenges of Virtualization Technology in Cloud Computing

Nadiah M. Almutairy1 and Khalil H. A. Al-Shqeerat2, 1College of Sciences and Arts in Rass, Saudi Arabia and 2Qassim University, Saudi Arabia

April 2019, Volume 11, Number 2

Towards an Approach for Integrating Business Continuity Management Into Enterprise Architecture
Hanane Anir, Mounia Fredj and Meryem Kassou, Mohammed V University, Morocco

A Survey of Clustering Algorithms in Association Rules Mining
Wael Ahmad AlZoubi, Balqa Applied University, Jordan

Compromising Systems: Implementing Hacking Phases

Marlon intal tayag1 and Maria emmalyn asuncion de vigal capuno2, 1Holy Angel University, Philippines and 2Future University, Sudan

Analytical Study to Review of Arabic Language Learning Using Internet Websites

1Samer Shorman and 2Mohammad Al-Shoqran, 1Applied Science University, Kingdom of Bahrain 2Ahlia University, Kingdom of Bahrain

Ensemble Learning Model for Screening Autism in Children
Mofleh Al Diabat and Najah Al-Shanableh, Al Albayt University, Al Mafraq- Jordan

A Novel Prototype Model for Swarm Mobile Robot Navigation Based Fuzzy Logic Controller
Sherif Kamel Hussein and Mashael Amer Al-Mutairi, Arab East Colleges for Graduate Studies, KSA

Web Crawler for Social Network User Data Prediction Using Soft Computing Methods
José L. V. Sobrinho, Gélson da Cruz Júnior and Cássio Dener Noronha Vinhal, Federal University of Goiás, Brazil

Reduction of Monitoring Registers on Software Defined Networks
Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia

Data-Driven Model for Non-Functional Requirements in Mobile Application Development
Salisu Garba, Babangida Isyaku and Mujahid Abdullahi, Sule Lamido University, Nigeria

February 2019, Volume 11, Number 1

Agile Distributed Software Development in Nine Central European Teams: Challenges, Benefits and Recommendations
Manuel Stadler, Raoul Vallon, Martin Pazderka and Thomas Grechenig, Research Group for Industrial Software, Vienna University of Technology, Austria

Speech Recognition by Improving the Performance of Algorithms Used in Discrimination
Ahmar -Haeder Talib Mahde, AL Iraqia University College of Engineering, Iraq

Developing an Integrated Framework to Utilize Big Data for Higher Education Institutions in Saudi Arabia
Noura A.Alsheikh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

New Market Segmentation Methods Using Enhanced (RFM), CLV, Modified Regression and Clustering Methods

Fahed Yoseph1 and Mohammad AlMalaily2, 1School of Business and Economics, Åbo Akademi University and 2Faculty of Engineering, Mansoura University

Wi-Fi Microcontroller Based Smart Menu
Sherif Kamel Hussein, University for Modern Sciences and Arts, Giza, Egypt

Minimizing Distortion in Steganog-Raphy Based on Image Feature
Dong Wu, Lingnan Normal University, China

Detection and Handling of Different Types of Concept Drift in News Recommendation Systems

Nayer Wanas1, Ahmed Farouk1, Dina Said1, Nabila Khodeir1 and Magda Fayek2, 1Informatics Department, Electronics Research Institute, Giza, Egypt and 2Computer Engineering Department, Cairo University, Giza, Egypt

Monitoring Student Attendance Using A Smart System at Taif University
Saleh Alghamdi, Taif University, Saudi Arabia

 

December 2018, Volume 10, Number 6

Architectural Aspect-Aware Design for IoT Applications: Conceptual Proposal

Anas M. R. AlSobeh and Aws A. Magableh, Yarmouk University, Jordan

December 2018, Volume 10, Number 6

Developing a Framework for Online Practice Examination and Automated Score Generation

S. M. Saniul Islam Sani, Rezaul Karim and Mohammad Shamsul Arefin, Chittagong University of Engineering & Technology, Bangladesh

December 2018, Volume 10, Number 6

An Intelligent Self-Adaptable Application to Support Children Education and Learning

Kahkashan Tabassum, Princess Nourah Bint Abdulrahman University, KSA

December 2018, Volume 10, Number 6

Steganographic Substitution of the Least Significant Bit Determined Through Analysis of the Cover Image and the Encrypted Message

Martha Angelica Garcia-Villa, Ricardo Francisco Martinez-Gonzalez, Juan Francisco Mejia-Perez, Miguel Valerio-Canales and Yesenia Isabel Moreno-Pavan, Tecnologico Nacional de México/IT Veracruz, Mexico

December 2018, Volume 10, Number 6

Text Mining Customer Reviews for Aspect-Based Restaurant Rating

Jovelyn C. Cuizon, Jesserine Lopez and Danica Rose Jones, University of San Jose-Recoletos, Philippines

December 2018, Volume 10, Number 6

Efficient Adaptation of Fuzzy Controller for Smooth Sending Rate to Avoid Congestion in Multicast Networks

Deepa V B and Ushadevi M B, JawaharaLal Nehru National College of Engineering Shimogga, Karnataka, India

December 2018, Volume 10, Number 6

Remotely View User Activities and Impose Rules and Penalties in a Local Area Network Environment

Marisa Buctuanon, Roldan Debalucos and John Glenn Villalon, University of San Jose – Recoletos, Cebu City, Philippines

December 2018, Volume 10, Number 6

Investigating the Determinants of College Students Information Security Behavior Using a Validated Multiple Regression Models

Mofleh Al-diabat, Al Albayt University, Jordan

December 2018, Volume 10, Number 6

Analytical Method for Modeling PBX Systems for Small Enterprise

Lawan A. Mohammed and Kashif Munir, University of Hafr A-Batin, Saudi Arabia

October 2018, Volume 10, Number 5

Dual Edge-Triggered D-Type Flip-Flop with Low Power ConsumptionRemote Control for Smart Classroom with Bluetooth Networks

Chien-Cheng Yu1,2 and Ching-Chith Tsai11National Chung-Hsing University, Taiwan and 2Hsiuping University of Science and Technology, Taiwan

 

October 2018, Volume 10, Number 5

Online Legal Service : The Present and Future

Md.Aminur Islam, Jannatul Ferdaus, Md. Abbas Ali khan and Md. Tarek Habib, Daffodil International University, Bangladesh

October 2018, Volume 10, Number 5

Simulation of Software Defined Networks with Open Network Operating System and Mininet

Antonio Cortes, University of Panama, Panama

October 2018, Volume 10, Number 5

Improved Computing Performance for Listing Combinatorial Algorithms Using Multi-Processing MPI and Thread Library

Nguyen Dinh Lau, University of Danang, Vietnam

October 2018, Volume 10, Number 5

Open Source Technology : An Emerging and Vital Paradigm in Institutions of Learning in Kenya

Cosmas Kabii Muthamia1, Gregory Wanyembi2 and Nahason Matoke31Maseno University, Kenya, 2University of Kabianga, Kenya and 3Masinde Muliro University of Science and Technology, Kenya

October 2018, Volume 10, Number 5

Models of IT-Project Management

Julia Doronina and Ekaterina Doronina, Sevastopol State University, Russian Federation

October 2018, Volume 10, Number 5

Computer Vision Based Fall Detection Methods Using the Kinect Camera : A Survey

Salma Kammoun Jarray, King Abdelaziz University, Saudi Arabia

 

August 2018, Volume 10, Number 4

Application Development to Convert Heterogeneous Information into PQDIF (Power Quality Data Interchange Format)

Claudiu Popirlan1, Gabriel Stoian1, Leonardo Geo Manescu1, Denisa Rusinaru1, Marian Ciontu1, Gabriel Cosmin Buzatu1, Miron Alba2 and Adrian Cojoaca2, 1University of Craiova, Romania and 2Oltenia Distribution SA, Romania

Evolutionary Centrality and Maximal Cliques in Mobile Social Networks

Heba Elgazzar1 and Adel Elmaghraby2, 1Morehead State University, USA and 2University of Louisville, USA

Group Based Resource Management and Pricing Model in Cloud Computing
Shelia Rahman, Afroza Sultana, Afsana Islam and Md Whaiduzzaman, Jahangirnagar University, Bangladesh

Search for Answers in Domain Specific Supported by Intelligent Agents
Fernando Zacarias, Rosalba Cuapa, Guillermo De Ita and Miguel Bracamontes, Universidad Autonoma de Puebla, Mexico

Epidemic Outbreak Prediction Using Artificial Intelligence
Nimai Chand Das Adhikari, Arpana Alka, Vamshi Kumar Kurva, Suhas S, Hitesh Nayak, Kumar Rishav, Ashish Kumar Nayak, Sankalp Kumar Nayak, Vaisakh Shaj and Karthikeyan, Analytic Labs Research Group, India

Remote Control for Smart Classroom with Bluetooth Networks
Tony Tsang and Leung Ming Kit, Hong Kong College of Technology, Hong Kong

A Learning Analytics Approach for Student Performance Assessment
Mohamed H Haggag, Mahmood Abdel Latif and Deena Mostafa Helal, Helwan University, Egypt

The Study of Purchase Intention for Men’s Facial Care Products with K-Nearest Neighbour

Jui-Chan Huang1, Pei-Yu Shao2 and Tzu-Jung Wu3, 1Yango College, China, 2National Kaohsiung Normal University, Taiwan and 3National Sun Yat-Sen University, Taiwan

June 2018, Volume 10, Number 3

An Algorithm for Automatically Detecting Dyslexia on the Fly
Suraj Shrestha and Pietro Murano, OsloMet – Oslo Metropolitan University, Norway

Integration of Importance – Performance Analysis and Fuzzy Dematel

Chin-Yi Chen1, Tung-Shen Wu2*, Mei-Lan Li3 and Ching-Tang Wang4, 1Taipei University of Maritime Technology, Taiwan, 2Hsiuping University of Science and Technology, Taiwan, 3China University of Technology, Taiwan and 4National Taiwan University of Sport, Taiwan

Data Mining Model Performance of Sales Predictive Algorithms Based on Rapidminer Workflows
Alessandro Massaro, Vincenzo Maritati and Angelo Galiano, Dyrecta Lab, Italy

Curvelet Based Speech Recognition System in Noisy Environment : A Statistical Approach

Nidamanuru Srinivasa Rao1, Chinta Anuradhav2 and SV Naga Sreenivasu1, 1Acharya Nagarjuna University, India and 2VR Siddhartha Engineering College, India

A New Context-Sensitive Decision Making System for Mobile Cloud Offloading
Mustafa Tanriverdi and M. Ali Akcayol, Gazi University, Turkey

Detection of Algorithmically Generated Malicious Domain Using Frequency Analysis

Enoch Agyepong1, William J. Buchanan2 and Kevin Jones1, 1Airbus Group Innovations, UK and 2Edinburgh Napier University, UK

Gene-Gene Interaction Analysis in Alzheimer
Rishi Yadav and Ravi Bhushan Mishra, IIT BHU (Varanasi), India

April 2018, Volume 10, Number 2

The Effect of Segregation in Nonrepeated Prisoner’s Dilemma
Thomas Nordli, University College of Southeast Norway, Norway

Future and Challenges of Internet of Things
Falguni Jindal, Rishabh Jamar and Prathamesh Churi, SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, India

Clustering Algorithm for a Healthcare Dataset Using Silhouette Score Value
Godwin Ogbuabor1 and Ugwoke, F. N21University of Lincoln, United Kingdom and 2Michael Okpara University of Agriculture Umudike, Nigeria

A Modified Binary PSO Based Feature Selection for Automatic Lesion Detection in Mammograms
Sheba K.U1, Gladston Raj S2 and Ramachandran D31BPC College, India, 2Government College – Nedumangad, India and3Regional Cancer Center – Thiruvananthapuram, India

PWM Based Android Controlled Wheel Chair
Tarun Debnath, AFM Zainul Abadin and Md. Anwar Hossain, Pabna University of Science and Technology, Bangladesh

Convolutional Neural Network Based Feature Extraction for IRIS Recognition
Maram.G Alaslani1 and Lamiaa A. Elrefaei1,21King Abdulaziz University, Saudi Arabia and 2Benha University, Egypt

A Metrics Ecosystem for Designing Quality E-Commerce Systems
Antonia Stefani, Hellenic Open University, Greece

A Comparison of Cache Replacement Algorithms for Video Services
Areej M. Osman and Niemah I. Osman, Sudan University of Science and Technology, Sudan

February 2018, Volume 10, Number 1

Multi-Core Processors : Concepts and Implementations
Najem N. Sirhan and Sami I. Serhan, University of New Mexico, USA and University of Jordan, Jordan

An Algorithm for Predictive Data Mining Approach in Medical Diagnosis
Shakuntala Jatav and Vivek Sharmam, TIT College – Bhopal, India

The Socialized Infrastructure of the Internet on the Computing Level
Bing Li, Xi’An Technological University, China

A Semantic Retrieval System for Extracting Relationships from Biological Corpus
Hassan Mahmoud, Saif Salah Kareem and Tarek El-Shishtawy, Benha University, Egypt

Detection of Malaria Parasite in Giemsa Blood Sample Using Image Processing
Kishor Roy, Shayla Sharmin, Rahma Bintey Mufiz Mukta and Anik Sen, CUET, Bangladesh

On the Classification of NP Complete Problems and Their Duality Feature
WenhongTian, WenxiaGuo and Majun He, University of Electronic Science and Technology of China, China and Chongqing Institute of Green and Intelligent Technology, China

Comparing the Cultural Dimensions and Learner’s Perceived Effectiveness of Online Learning Systems (OLS) among American and Malaysian Learners
Seng C. Keng, Nova Southeastern University, USA

Discovering Users Topic of Interest from Tweet
Muhammad Kamal Hossen, Md. Ali Faiad, Md. Shahnur Azad Chowdhury and Md. Sajjatul Islam, CUET, Bangladesh, IIUC, Bangladesh and CIU, Bangladesh

December 2017, Volume 9, Number 6

A Framework for Automated Progress Monitoring Based on HOG Feature Recognition and High-Resolution Remote Sensing Image
Xu Ruhang, North China Electric Power University, China

A Comparison of Congestion Control Variants of TCP in Reactive Routing Protocols MANET
Mahmoud Abu-Zant and Mohammad Hamarsheh, Arab American University, Palestine

Breaking Mignotte’s Sequence Based Secret Sharing Scheme Using SMT Solver
K.Vishnu Priyanka, M.Gowthami, O.Susmitha, G.Prathyusha and Naresh Babu Muppalaneni, Sree Vidyanikethan Engineering College (Autonomous), India

Method for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
Luis Alfredo Crisanto Baez, Ricardo Francisco Martinez Gonzalez, Yesenia Isabel Moreno Pavan and Marcos Alonso Mendez Gamboa, TecNM – Instituto Tecnologico de Veracruz, Mexico

An Enhanced Electronic Transcript System (E-ETS)

Ejiofor C. I1 and Laud Charles Ochei2, 1University of Port-Harcourt, Nigeria and 2Robert Gordon University, United Kingdom

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing

Rakesh1, K. Lalitha1, M. Ismail1 and H. Parveen Sultana2, 1Sree Vidyanikethan Engineering College (Autonomous), India and 2VIT University, India

Multi-Path Route Determination Method for Network Load Balancing in FAP Based WSNs Using Fuzzy Logic
Won-Jin Chung and Tea-Ho Cho, Sungkyunkwan University, Republic of Korea

Energy Location-Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor Networks
Ablah AlAmri and Manal Abdullah, King Abdulaziz University, Saudi Arabia

On the Implementation of Goldberg’s Maximum Flow Algorithm in Extended Mixed Network

Nguyen Dinh Lau1, Tran Quoc Chien1, Phan Phu Cuong2 and Le Hong Dung3, 1University of Danang, Vietnam, 2Vinaphone of Danang, Vietnam and 3College of Transport II, Vietnam

October 2017, Volume 9, Number 5

WSN Lifetime Extension Using GA Optimised Fuzzy Logic
Sang-Hyeok Lim and Tae-Ho Cho, Sungkyunkwan University, Republic of Korea

Multilevel Analysis of Student’s Feedback Using Moodle Logs in Virtual Cloud Environment

Ashok Verma1, Sumangla Rathore1, Santosh Vishwakarma2 and Shubham Goswami1, 1Sir Padampat Singhania University, India and 2Gyan Ganga Institute of Technology & Sciences, India

A New Parallel Matrix Multiplication Algorithm on Hex-Cell Network (PMMHC) Using IMAN1 Super Computer

Enas Rawashdeh1, Mohammad Qatawneh1 and Hussein A. Al Ofeishat2, 1The University of Jordan, Jordan and 2 Al-Balqa Applied University, Jordan

Development of Security Detection Model for the Security of Social Blogs and Chatting from Hostile Users

Shubhankar Gupta1 and Nitin2, 1Jaypee Institute of Information Technology, India and 2University of Cincinnati, USA

Facility Location in Logistic Network Design Using Soft Computing Opimization Models

Shaju Varughese1 and Gladston Raj S2, 1Bharathiar University, India and 2Govt. College – Nedumangadu, India

A Customisable and Responsive Design Online Booking System

Betzabet García-Mendoza and Carlos R. Jaimez-Gonzalez, Universidad Autonoma Metropolitana, Mexico

Using Cuckoo Algorithm for Estimating Two GLSD Parameters and Comparing it with Other Algorithms

Jane Jaleel Stephan, Haitham Sabah Hasan and Alaa Hamza Omran, University of Information Technology & Communications, Iraq

Raspberry PI and Arduino UNO Working Together as a Basic Meteorological Station

Jose Rafael Cortes Leon and Ricardo Francisco Martínez-Gonzalez, Anilu Miranda Medina and Luis Alberto Peralta-Pelaez, Instituto Tecnologico de Veracruz (TecNM), Mexico

Usability Testing of Fitness Mobile Application : Case Study Aded Surat App

Ryan Alturki and Valerie Gay, University of Technology Sydney, Australia

Syntax and Semantics for Cinnamon Programming

Kostadin Kratchanov, Yasar University, Turkey

A Systematic Mapping Study on Current Research Topics in Smart Contracts

Maher Alharby1,2 and Aad van Moorsel1, 1Newcastle University, UK and 2Taibah University, KSA

Summarization of Software Artifacts : A Review

Som Gupta1 and S.K Gupta2, 1AKTU-Lucknow, India and 2BIET-Jhansi, India

August 2017, Volume 9, Number 4

Eco-Strategy : New ICT Management Model Built on the Basis of the CSR Strategy an Green IT
Rachid Hba and Abdellah El Manouar, Mohammed V University In Rabat, Morocco

Bag of Visual Words for Word Spotting in Handwritten Documents Based on Curvature Features
Thontadari C and Prabhakar C.J, Kuvempu University, India

ANN Based Features Selection Approach Using Hybrid GA-PSO for Sirna Design

Ranjan Sarmah1, Mahendra K. Modi2, Shahin Ara Begum1, 1Assam University Silchar, India and 2Assam Agricultural University, India

Complete End-to-End Low Cost Solution to a 3D Scanning System with Integrated Turntable
Saed Khawaldeh ,Tajwar Abrar Aleef , Usama Pervaiz, Vu Hoang Minh and Yeman Brhane Hagos, University of Burgundy (France), University of Cassino (Italy) and University of Girona (Spain)

Changeability Evaluation Model for Object Oriented Software
Nidhi Goyal and Reena Srivastava, Babu Banarasi Das University, India

Environmental Monitoring and Controlling System for Mushroom Farm with Online Interface
Arjuna Marzuki and Soh Yan Ying, Universiti Sains Malaysia, Malaysia

Residual Quotient and Annihilator of Intuitionistic Fuzzy Sets of Ring and Module

P.K.Sharma1 and Gagandeep Kaur21D.A.V. College, India and 2I.K.Gujral Punjab Technical University, India

 

 

June 2017, Volume 9, Number 3

A Comparative Evaluation of the GPU vs The CPU for Parallelization of Evolutionary Algorithms Through Multiple Independent
Runs

Anna Syberfeldt and Tom Ekblom, University of Skövde, Sweden
A Heuristic Based Approach for Usability Evaluation of Academic Portals
Hmood Al-Dossari, King Saud University, Saudi Arabia
Cyber Infrastructure as a Service to Empower Multidisciplinary, Data-Driven Scientific Research
Xiangrong Ma, Zhao Fu, Yingtao Jiang, Mei Yang and Haroon Stephen, University of Nevada, USA
A Wireless Network Infrastructure Architecture for Rural Communities
Okoro Osahon and Edim Azom Emmanuel, University of Calabar, Nigeria
Prevention Method of False Report Generation in Cluser Heads for Dynamic En-Route Filtering of Wireless Sensor Networks
Jung-Sub Ahn and Tae-Ho Cho, Sungkyunkwan University, Republic of Korea
A Study on Cofee Product Categories Sold in Landscape Coffee Shops
Han-Chen Huang and Cheng-IHou, Chung Hua University, Taiwan
A Meta Data Vault Approach for Evolutionary Integration of Big Data Sets : Case Study Using the NCBI Database for Genetic
Variation

Zaineb Naamane and Vladan Jovanovic, Georgia Southern University, USA
An Exploration of the Factors Affecting User’s Satisfaction with Mobile Payments
Lisa Y. Chen and Wan-Ning Wu, I-Shou University, Taiwan
Graphical Representation in Tutoring Systems
Nabila Khodeir, Electronics Research Institute, Egypt
A Process Quality Improvement Mechanism for Reducing the Risk of CI Environment
Sen-Tarng Lai, Shih Chien University, Taiwan
Modification the Security of Flip Protocol by Changing the Base Point Selection
Nabamita Deb and Moumita Roy, Gauhati University, India
Squashed JPEG Image Compression via Sparse Matrix
Shaista Qadir, King Khalid University, Saudi Arabia
An Integrated System Framework for Predicting Students’ Academic Performance in Higher Educational Institutions
Olugbenga Adejo and Thomas Connolly, University of the West of Scotland, United Kingdom
On Feature Selection Algorithms and Feature Selection Stability Measures : A Comparative Analysis
Mohana Chelvan P1 and Perumal K21Hindustan College of Arts and Science, India and 2Madurai Kamaraj University, India
The Use of Cloud E-Learning Platform to Enhance Efficiency of Hospital in Job Education
Yao-Hsu Tsai, Kuo-Chung Lin, Kai-Ling Chen, Chung Hua University, Taiwan

 

April 2017, Volume 9, Number 2

Data Warehouse and Big Data Integration
Sonia Ordonez Salinas and Alba Consuelo Nieto Lemus, Distrial F.J.C University, Colombia

Tourism Demand Forecasting Model Using Neural Network
Han-Chen Huang and Cheng-I Hou, Chung Hua University, Taiwan

Decision Making in Integrated Pest Management and Bayesian Network
Niranjan Singh and Neha Gupta, ManavRachna International University, India

Using Adaptive Automata in Grammar Based Text Compression to Identify Frequent Substrings
Newton Kiyotaka Miura and Joao Jose Neto, Escola Politecnica da Universidade de Sao Paulo, Brazil

Image Encryption Techniques Using Fractal Function : A Review
Shafali Agarwal, JSS Academy of Technical Education, India

A Note on Godel’s Theorem
J. Ulisses Ferreira, Federal University of Bahia, Brazil

Applying Transformation Characteristics to Solve the Multi Objective Linear Fractional Programming Problems
Wen Pei, Chung Hua University, Taiwan

Greedy Cluster Based Routing for Wireless Sensor Networks

Parthasarathi1 and Karthikeyani Vajravel2, 1KSR College of Arts and Science, India and 2Thiruvalluvar Govt Arts
college, India

A Meliorated Kashida Based Approach for Arabic Text Steganography
Ala’a M. Alhusban and Jehad Q. Odeh Alnihoud, Al al-Bayt University, Jordan

Enforcing Set and SSL Protocols in E-Payment
Nancy Awadallah, Sadat Academy for Management Sciences, Egypt

Evolutionary Computing Techniques for Software Effort Estimation

Sumeet Kaur Sehra1, Yadwinder Singh Brar1 and Navdeep Kaur2, 1I.K.G. Punjab Technical University, India and 2Sri Guru Granth Sahib World University, India

Gender and Authorship Categorisation of Arabic Text from Twitter Using PPM

Mohammed Altamimi1 and William J. Teahan2, 1University of Hail, Saudi Arabia and 2University of Bangor, UK

Implementation of Interactive Augmented Reality in 3D Assembly Design Presentation
Andrijana Bocevska and Zoran Kotevski, “St. Kliment Ohridski” University, Republic of Macedonia

A Survey of Different Approaches for Overcoming the Processor – Memory Bottleneck
Danijela Efnusheva, Ana Cholakoska and Aristotel Tentov, Faculty of Electrical Engineering and Information Technologies, Macedonia

Efficient Cloud Gaming Scheme Using Scene Objects Adaptation
Ahmad A. Mazhar, Saudi Electronic University, KSA

February 2017, Volume 9, Number 1

Grammar Based Pre-Processing for PPM 
William J. Teahan1 and Nojood O. Aljehane2, 1University of Bangor Bangor, UK and 2University of Tabuk, Saudi Arabia

Fault Tolerant Leader Election in Distributed Systems
Marius Rafailescu, Politehnica University of Bucharest, Romania

Towards a New Framework Linking Knowledge Management Systems and Organizational Agility : An Empirical Study
Mohamed Amine Marhraoui and Abdellah El Manouar, Mohammed V University in Rabat, Morocco

Fuzzy Logic Based Approach for Automation of Emotion Detection in Misophonia

Nilima Salankar1, Neelu Ahuja1, Sandeep Chaurasia2 and Ninni Singh1, 1University of Petroleum and Energy Studies, India and 2Manipal University, India

Design and Optimization a Circular Shape Network Antenna Micro Strip for Some Application
Louati Siwar, Fethi Mejri and Aguili Taoufik, University Tunis El Manar, Tunisia

PPO – An Approach to Personalized Web Acceleration
Shailesh K S and P. V. Suresh, Indira Gandhi National Open University, India

Research on Decision Making Regarding in Dating Events for Unmarried Female Junior High School Teachers

Han-Chen Huang1, Cheng-I Hou1 and Yu-Hsuan Tseng2, 1Chung Hua University, Taiwan and 2GuangWu Junior High School, Taiwan

University Buses Routing and Tracking System

Ahmed Ahmed1, Elshaimaa Nada2 and Wafaa Al-Mutiri3, 1,2Zagazig University, Egypt and 1,2,3Taibahu University, Saudi Arabia

Automated Information Retrieval Model Using FP Growth Based Fuzzy Particle Swarm Optimization

Raja Varma Pamba1, Elizabeth Sherly2 and Kiran Mohan3, 1Mahatma Gandhi University, India, 2Indian Institute of Information Technology and Management – Kerala, India and 3Payszone LLC LTD, UAE


December 2016, Volume 8, Number 6

An Evaluation Study of General Software Project Risk Basedon Software Practitioners Experiences
Sahand Vahidnia, OmerOzgurTanriöver and I. N. Askerzade, Ankara University, Turkey

Standardization of Clinical Documents Through HL7 – FHIR for Colombia
Lopez Juan D1, Moreno Luis. G2, Anzola Diego2, Lopez Francisco J3, Salinas Martha4, Vilardy Aldo5, García Stella6 and Lagos Arturo6, 1Lv Consultores, Colombia, 2Lumon, Colombia, 3Lv Consultores, Colombia, 4Uniminuto, Colombia, 5Innova Ip,
Colombia and 6ECCI University, Colombia

A Method for Prioritizing Qualitative Scenarios In Evaluating Enterprise Architecture Using Non-Dominated Sorting Genetic Algorithm II
MarziehEskandari and AkbarNabiollahi, Islamic Azad University, Iran

Environmentally Corrected RSSI Based Real Time Location Detection System
Hakan Koyuncu and Baki Koyuncu, Final International University, Cyprus

Reducing Competitive Cache Misses in Modern Processor Architectures

Samir AMRI1, Lahbib ZENKOUAR1 and Mohamed OUTAHAJALA2, 1Mohammed V University in Rabat, Morocco and 2Royal Institute of Amazigh Culture (IRCAM), Morocco

Comparative Analysis of Minutiae Based Fingerprint Matching Algorithms
Silas KivutiNjeru and Robert Oboko, University of Nairobi, Kenya

The Effect of Physical Based Features for Recognition of Recaptured Images
S. A . A. H. Samaraweera and B. Mayurathan, University of Jaffna, Sri Lanka

October 2016, Volume 8, Number 5

Parallel Generation of Image Layers Constructed by Edge Detection Using Message Passing Interface
Alaa Ismail Elnashar, Minia University, Egypt and Taif University, Saudi Arabia

Automated Test Case Generation and Optimization : A Comparative Review

Rajesh Kumar Sahoo1, Deeptimanta Ojha1, Durga Prasad Mohapatra2 and Manas Ranjan Patra3, 1A.B.I.T, India,2NIT – Rourkela, India and 3Berhampur University, India

An Overview of Extractive Based Automatic Text Summarization Systems
Kanitha.D.K and D. Muhammad Noorul Mubarak, University of Kerala, India

Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
Farzaneh Sadat Jalayer and Akbar Nabiollahi, Islamic Azad University, Iran

Amazigh Part-of-Speech Tagging Using Markov Models and Decision Trees

Samir AMRI1, Lahbib ZENKOUAR1 and Mohamed OUTAHAJALA2, 1Mohammed V University in Rabat, Morocco and 2Royal Institute of Amazigh Culture (IRCAM), Morocco

MODIGEN : Model-Driven Generation of Graphical Editors in Eclipse
Markus Gerhart and Marko Boger, University of Applied Sciences – Konstanz, Germany

Design and Development of Business Rules Management System (BRMS) Using ATL and Eclipse Sirius
Lynda Ait Oubelli and Mourad Oussalah, University of Nantes, France

CLOHUI : An Efficient Algorithm for Mining Closed High Utility Itemsets from Transaction Databases
Shiming Guo and Hong Gao, Harbin Institute of Technology, China

A Comparison Between Parallel and Segmentation Methods Used for Image Encryption-Decryption
Bilal Zahran, Ziad Alqadi, Jihad Nader and Ashraf Abu Ein, Al-Balqa Applied University, Jordan

August 2016, Volume 8, Number 4

Risk Management Framework for Cloud Computing : A Critical Review
Rana Alosaimi and Mohammad Alnuem, King Saud University, Saudi Arabia
Text Plagiarism Checker Using Friendship Graphs
Soumajit Adhya1 and S. K. Setua2, 1J. D. Birla Institute, India and 2University of Calcutta, India
The Vices of Social Media on Students Success at the Adamawa State Polytechnic, Yola – Nigeria
Oye, N. D and Ibrahim Inuwa, MAUTECH, Nigeria
Statistical Approach to Determine Most Efficient Value for Time Quantum in Round Robin Scheduling
Shreyank N Gowda, Indian Institute of Science, India
A Replicated Assessment of the Critical Success Factors for the Adoption of Mobile Government Services : The Case of Jordan
Yousef Elsheikh and Mohammad Hijjawi, Applied Science University, Jordan
Adaptive Watermarking Technique for Speech Signal Authentication
Methaq Talib Gaata and Refah Aamer Jaafar, University of Mustansiriyah, Iraq
Discoverability a New Learnability Principle for Childrens Application Software
Bethuel Kipchirchir Okelo1 and Samuel Mungai Mbuguah2, 1Masinde Muliro University of Science and Technology, Kenya and
2Kibabii University, Kenya

June 2016, Volume 8, Number 3

Green IT in Banking Systems Impacted by Prudential Rules – Erlang Models for Forecasting Computer Performance
Florin-Catalin ENACHE and Adriana-Nicoleta TALPEANU, The Bucharest University of Economic Studies, Romania

A Survey of Service Oriented Architecture Systems Maintenance Approaches
Hamza Naji and Mohammad Mikki, Islamic University, Palestine

Analysing the Migration Period Parameter in Parallel Multi-Swarm Particle Swarm Optimization

Saban Gulcu1 and Halife Kodaz2, 1Necmettin Erbakan University, Turkey and 2Selcuk University, Turkey

An Illumination Invariant Face Recognition Using 2D Discrete Cosine Transform and Clahe

A.Thamizharasi1 and Jayasudha J.S2, 1ManonmaniamSundaranar University, India and 2SCT College of Engineering, India

ICT-Mechanisms of Intelligent Transportation System in Taipei City as a Smart City

Nurwahyu Alamsyah1,2 Tzu-Chuan Chou2 and Tony Dwi Susanto1, 1Institute of Technology Sepuluh Nopember (ITS) Surabaya, Indonesia and 2National Taiwan University of Science and Technology, Taiwan

Stock Trend Prediction Using News Sentiment Analysis
Kalyani Joshi, Bharathi H. N and Jyothi Rao, KJSCE, India

Parallel Bijective Processing of Regular Nano Systolic Grids via Carbon Field Emission Controlled – Switching

A.N. Al-Rabadi1, M.S. Mousa2, R.F. Al-Rabadi3, S. Alnawasreh2, B. Altrabsheh4 and M.A. Madanat2, 1The University of Jordan, Jordan, 2Mu’tah University, Jordan, 3German Association for International Cooperation (GIZ), Jordan and 4Philadelphia University, Jordan

Learning Repository Adaptability in an Agent-Based University Environment

Vanco Cabukovski1, Roman Golubovski1 and Riste Temjanovski2, 1Ss Cyril and Methodius University, Macedonia and 2Goce Delcev University, Macedonia

Usability Testing Process with People with Down Syndrome Interacting with Mobile Applications : A Literature Review

Doris Caliz1, Loïc Martínez1, Xavier Alaman2, Carlos Teran3 and Richart Caliz3, 1Madrid Polytechnic University, Spain,2Autonomous University, Spain and 3National Polytechnic University, Ecuador

Fuzzy Logic in Narrow Sense with Hedges
Van-Hung Le, Hanoi University of Mining and Geology, Vietnam

Staffs Motivational in Knowledge Transfer Behaviour

Saide1, Nurul Aini2, Saikou Sanneh3 and Nurjamaliah4, 1State Islamic University of Sultan Syarif Kasim Riau (UIN Suska Riau University), Indonesia, 2Diponegoro University, Indonesia, 3National Taiwan Normal University, Taiwan and 4Riau University, Indonesia

Adaptive Configuration Meta-Model of a Guidance Process

Hamid Khemissa1 and Mourad Oussalah2, 1USTHB University, Algeria and 2Nantes University, Algeria

April 2016, Volume 8, Number 2

The Perspectives of Democratic Decision Making in the Information Society
Olaf Winkel, Berlin School of Economics and Law, Germany

The Importance of Neutral Class in Sentiment Analysis of Arabic Tweets Hamed AL-Rubaiee, Renxi Qiu and Dayou Li, University of Bedfordshire, United Kingdom

Examine Website Quality on M-Banking Services Adoption in Bangladesh
Mohammad Abdullah Mahfuz, Liza Khanam and Wang Hu, Wuhan University of Technology, P.R.China

Eco-Strategy: Towards a New Generation Managerial Model Based on Green IT and CSRF
Rachid Hba, Abderrazak Bakkas, Abdellah El Manouar, Mohammed Abdou Janati Idrissi, Mohammed V University In Rabat, Morocco

Physical Features Based Speech Emotion Recognition Using Predictive Classification
Mohammad Ahsan and Madhu Kumari, NIT Hamirpur, India

5Pen Technology: A New Dawn in Homogeneous and Heterogeneous Computing

Osagie Scale Uwadia Maxwell 1, K.O. Obahiagbon1, Osagie Joy Amenze2 and John-Otumu M.A2, 1Benson Idahosa University, Nigeria and 2Ambrose Alli University, Nigeria

Multi-Threaded Computation of the Sobel Image Gradient on Intel Multi-Core Processors Using OpenMP Library

Ahmed Sherif Zekri1,2, 1Beirut Arab University, Lebanon, 2Alexandria University, Egypt

Text Classification for Arabic Words Using Rep-Tree
Hamza Naji and Wesam Ashour, Islamic University, Palestine

Towards a Reliable Election Algorithm for Vanets Networks
OuafaMahma and Ahmed Korichi, KasdiMerbah University, Algeria

Survey on Characteristics of Autonomous System
Taranjeet Singh and Avadhesh Kumar, Galgotias University, India

December 2015, Volume 7, Number 6

A Preprocessing Model for Hand-Written Arabic Texts Based on Voronoi Diagrams
Atallah M.Al-Shatnawi, Al al-Bayt University, Jordan
An Entropic Optimization Technique in Heterogeneous Grid Computing Using Bionic Algorithms
Saad M.Darwish, Adel A.El-zoghabi and Moustafa F.Ashry, Institute of Graduate Studies and Research, Egypt
New Symmetric Encryption System Based on Evolutionary Algorithm
A.Mouloudi, Ibn Tofail University, Morocco
UML Modeling and System Architecture for Agent Based Information Retrieval
D.Muhammad Noorul Mubarak and Philomina Simon, University of Kerala, India
The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB
Mohamed Y.Adam1, Mozamel M.Saeed2 and Al Samani A.Ahmed3, 1King Saud University, KSA, 2Prince Sattam Bin Abdul-Aziz University, KSA and 3Al Neelain University College of Computer Science & Information Technology, Sudan
Two-Layer Secure Prevention Mechanism for Reducing E-Commerce Security Risks
Sen-Tarng Lai, Shih Chien University, Taiwan
Congestion Aware Spray and Wait Protocol: A Congestion Control Mechanism for the Vehicular Delay Tolerant Network
Chuka Oham and Milena Radenkovic, University of Nottingham, United Kingdom
Automated Management of Pothole Related Disasters Using Image Processing and Geotagging
Manisha Mandal, Madhura Katageri, Mansi Gandhi, Navin Koregaonkar and Sharmila Sengupta, Vivekanand Education Society’s Institute of Technology, India
A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks
Zhang Huijuan and Liu Kai, Tongji University, China
Comparative Analysis of Single-Core and Multi-Core Systems 
Ogundairo Johnson1 and Omosehinmi Dinyo2, 1National Open University of Nigeria (NOUN), Nigeria and 2Federal University of Technology, Nigeria
Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan
Mohamad M. Al-Laham, Al-Balqa Applied University, Jordan
A Software Tool for Experimental Study Leap Motion
Georgi Krastev and Magdalena Andreeva, Ruse University, Bulgaria
Service Oriented Quality Requirement Framework for Cloud Computing
Madhushi Rathnaayke and Janaka I Wijayanayake, University of Kelaniya, Sri Lanka
A Database System Security Framework 
Habiba Muhammad Sani1 and Muhammad Mika’ilu Yabo2, 1Usmanu Danfodiyo University, Nigeria and 2Shehu Shagari College of Education, Nigeria

October 2015, Volume 7, Number 5

Hadoop Mapreduce Performance Enhancement Using In-Node Combiners
Woo-Hyun Lee, Hee-Gook Jun and Hyoung-Joo Kim, Seoul National University, South Korea
Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Mohammad Ehab Ragab1 and Kin Hong Wong2, 1The Electronics Research Institute, Egypt and 2Computer Science and Engineering Department, Shatin, Hong Kong
Integrated Project Management Measures in CMMI
Mahmoud Khraiwesh, Zarqa University, Jordan
Formal Verification of Distributed Checkpointing Using Event-B
Girish Chandra1, Raghuraj Suryavanshi2 and Divakar Yadav1, 1Institute of Engineering & Technology, India and 2Pranveer Singh Institute of Technology, India
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classification
Nezha Hamdi1, Khalid Auhmani2, Moha M’rabet Hassani1, 1Cadi Ayyad University, Morocco and 2National School of Applied Sciences, Morocco
Formal Specification and Verification of Total Order Broadcast through Destination Agreement Using Event-B
Arun Kumar Singh and Divakar Yadav, Institution of Engineering and Technology, India
Automatic Extraction of Spatio-Temporal Information from Arabic Text Documents
Abdelkoui Feriel1 and Kholladi Mohamed Khireddine2, 1MENTOURI 2 University, Algeria and 2El oued University, Algeria
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Mohamad M.AL-Laham, Zarqa University, Jordan
A New Approach to Parts of Speech Tagging in Malayalam
D.Muhammad Noorul Mubarak, Sareesh Madhu and S A Shanavas, University of Kerala, India
Predictive and Statistical Analyses for Academic Advisory Support
Mohammed AL-Sarem, Taibah University, Kingdom of Saudi Arabia
An Overview on the Use of Data Mining and Linguistics Techniques for Building Microblog-Based Early Detection Systems in the Healthcare Sector
Haider M. Habeeb1 and Nabeel Al-A’araji2, 1University of Babylon, Iraq and 2Ministry of Higher Education and Scientific Research, Iraq
Clustering of Deep WebPages: A Comparative Study
Muhunthaadithya C, Rohit J.V, Sadhana Kesavan1 and E.Sivasankar, National Institute of Technology Trichy, India

August 2015, Volume 7, Number 4

Applying an Arabic Conversational Agent in the Jordanian E-Government
Mohammad Hijjawi and Hesham Abusaimeh, Applied Science University, Jordan
Collaborative Bibliographic System for Review/Survey Articles
Mutaz Beraka, Abdullah Al-Dhelaan and Mznah Al-Rodhaan, King Saud University, Saudi Arabia
Unique Fundamentals of Software Measurement and Software Metrics in Software Engineering
K.P.Srinivasan, C.B.M.College, India
Sensitivity Analysis of Information Retrieval Metrics
Marina Marjanovic-Jakovljevic, Singidunum University, Serbia
Consideration of Human Computer Interaction in Robotic Field
Tarek Toumi and Abdelmadjid Zidani, University of Batna, Algeria
Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System
Ammu M Kumar and Philomina Simon, University of Kerala, India
On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images
Solomon O.Akinola and Adebanke A.Olatidoye, University of Ibadan, Nigeria
Symmetrical Weighted Subspace Holistic Approach for Expression Recognition
G.P.Hegde1, M.Seetha2 and Nagaratna Hegde3, 1Shree Dharmasthala Manjunatheshwara Institute of Technology, India and2G.Narayanamma Institute of Technology and Science, India and 3Vasavi College of Engineering, India
Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital
Waleed Al-Ghaith, Shaqra University, Saudi Arabia
Map-Reduce Implementations: Survey and Performance Comparison
Zeba Khanam and Shafali Agarwal, JSS Academy of Technical Education, India
A Hybrid Copy-Move Forgery Detection Technique Using Regional Similarity Indices
Rani Susan Oommen1 and Jayamohan M2, 1Sree Buddha College of Engineering for Women, India and 2College of Applied Science, India
An Effective and Efficient Feature Selection Method for Lung Cancer Detection
R.Kishore, K.L.N College of Engineering, India

June 2015, Volume 7, Number 3

Arabic Language Challenges in Text Based Conversational Agents Compared to The English Language
Mohammad Hijjawi and Yousef Elsheikh, Applied Science University, Jordan
Fuzzy Image Segmentation Using Validity Indexes Correlation
Daniel Fernando Tello Gamarra, Universidade Federal de Santa Maria (UFSM), Brazil
Instructor Perspectives of Mobile Learning Platform: An Empirical Study
Muasaad Alrasheedi, Luiz Fernando Capretz and Arif Raza, Western University, Canada
A Study on Weed Discrimination Through Wavelet Transform, Texture Feature Extraction and Classification
D.Ashok Kumar1 and P.Prema2, 1Government Arts College, India and 2Agricultural College and Research Institute, India
Corrosion Control Approach Using Data Mining
StephenDapiap, Gregory Wajiga, Michael Egwurube, Musa Kadzai, Nathaniel Oye and ThankGodAnazodo, Federal University of Technology Yola, Nigeria
A Clustering Technique for Email Content Mining
Deepa Patil and Yashwant Dongre, Vishwakarma Institute of Information Technology, India
Comparison of Wavelet Network and Logistic Regression in Predicting Enterprise Financial Distress
Ming-Chang Lee1 and Li-Er Su2, 1National Kaohsiung University of Applied Sciences, Taiwan and 2Shih Chien University, Taiwan
Increasing the Transistor Count by Constructing A Two-Layer Crystal Square on A Single Chip
Haissam El-Aawar, Lebanese International University – LIU, Lebanon
Comparison of Different Transmitters Using 1550nm and 10000nm in FSO Communication Systems
Poonam Singal, Saloni Rai, Rahul Punia and Dhrove Kashyap, Deenbandhu Chhotu Ram University of Science & Technology, India
Multi-Parameter Based Performance Evaluation of Classification Algorithms
Saurabh Kr.Srivastava and Sandeep Kr.Singh, JIIT University, India

April 2015, Volume 7, Number 2

Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment

Po-Huei Liang and Jiann-Min Yang, National Cheng Chi University, Taiwan

An Extension of Protégé for an Automatic Fuzzy-Ontology Building Using Clustering and FCA

Aloui Amira and Grissa Touzi Amel, Université Tunis El Manar, Tunisia

Towards a System Dynamics Modeling Method Based on Dematel

Fadwa Chaker, Abdellah El Manouar and Mohammed Abdou Janati Idrissi, Mohammed V University, Morocco

Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text

William J.Teahan1 and Khaled M.Alhawiti2, 1University of Wales, Bangor, UK and 2University of Tabuk, KSA

Thermal Control in 3D Liquid Cooled Processors Via Hotspot Separation And Thermoelectric Cooling

Yue Hu, Shaoming Chen, Lu Peng, Edward Song and Jin-Woo Choi, Louisiana State University, USA

SFAMSS:A Secure Framework for ATM Machines Via Secret Sharing

Zeinab Ghafari, Taha Arian and Morteza Analoui, University of Science and Technology, Iran

Performance Measurements of Feature Tracking and Histogram Based Traffic Congestion Algorithms

Ozgur Altun and Kenan Aksoy, Proline Bilisim Sistemleri, Turkey

Research on Decision Making Regarding High-Business-Strategy Café Menu Selection

Cheng-I Hou1, Han-Chen Huang2, Yao-Hsu Tsai2 and Chih-Yao Lo1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan

Prefix-Based Labeling Annotation for Effective Xml Fragmentation

Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon and Samini Subramaniam, Multimedia University, Malaysia

PROP – Patronage of PHP Web Applications

Sireesha C, Jyostna G, Raghu Varan P and P R L Eswari, Centre for Development of Advanced Computing, India

Quantum Clustering-Based Feature Subset Selection for Mammographic Image Classification

N.Hamdi, K.Auhmani and M.M.Hassani, Cadi Ayyad University, Morocco

Taxonomy of Optimization Approaches of Resource Brokers in Data Grids

Rafah M.Almuttairi, University of Babylon, Iraq

A Survivability Model for Saudi ICT Startups

Sara Almakenzi, Arif Bramantoro and Waleed Rashideh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

Emotion Interaction with Virtual Reality Using Hybrid Emotion Classification Technique toward Brain Signals

Faris A.Abuhashish1, Jamal Zraqou2, Wesam Alkhodour2, Mohd S.Sunar1 and Hoshang Kolivand1, 1Universiti Teknologi Malaysia, Malaysia and 2Isra University, Jordan

Prediction for Short-Term Traffic Flow Based on Optimized Wavelet Neural Network Model

Tao Li and Liu Sheng, Shanghai University of Engineering Science, China

February 2015, Volume 7, Number 1

Iris Recognition for Personal Identification Using Lamstar Neural Network
Shideh Homayon, University of California, USA
An Employing a Multistage Fuzzy Architecture for Usability of Open Source Software
Roba Al-Soub, Mutah University, Jordan
Analysis of Selection Indicators of Badminton Players by the Delphi Method and Analytic Hierarchy Process
Han-Chen Huang1, Chun-Ta Lin2, Chia-Sen Hu31Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Guang Hua Junior High School, Taiwan
Cross Platform App : A Comparative Study
Paulo R.M.de Andrade1, Adriano B.Albuquerque1, Otávio F. Frota2, Robson V Silveira2 and Fátima A. da Silva21University of Fortaleza – UNIFOR Fortaleza – CE, Brazil and 2College Estacio FIC of Ceara Fortaleza – CE, Brazil
Performance Comparison Of Hybrid Wavelet Transforms Formed Using Dct, Walsh, Haar and DKT in Watermarking
H.B.Kekre1, Tanuja Sarode2 and Shachi Natu11NMIMS University, India and 2Mumbai University, India
Improving Initial Generations in PSO Algorithm for Transportation Network Design Problem
Navid Afkar and Abbas Babazadeh, University of Tehran, Iran
New Approach in Symmetric Block Cipher Security Using a New Cubical Technique
Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom
The Analysis of the Time Table Structure Within a Student Information System (Sis) 
Issa S.I.Ottoum, Alzaytoonah University of Jordan, Jordan
A Rule Based Approach towards Detecting Human Temperament
Shomoye Abiodun R1 and ShomoyeAdekunle I2, 1Oduduwa University, Nigeria and 2Federal Polytechnic, Nigeria
An Iterative Morphological Decomposition Algorithm for Reduction Of Skeleton Points
A.Sri Krishna1 and G.L.K.Vasista2, N.Neelima11R.V.R& J.C College of Eng. India and 2AMRITA School of Eng., India
Analysis of Key Considerations of the Public When Choosing Recreational Activities
Han-Chen Huang1, Chun-Ta Lin2, Chi-Han Chuang31Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Da-Tung Elementary School, Taiwan
Efficient Data Protection for Enterprise Data Centers
Khaled Aldossari, EXPEC Computer Center, Saudi Arabia
Authoring System of Drill & Practice Elearning Modules for Hearing Impaired Students
Karim Q Hussein, Mustansiriyah University, Iraq
A Novel Methodology for Constructing Rule-Based Naïve Bayesian Classifiers
Abdallah Alashqur, Applied Science University, Jordan
Testability Measurement Model for Object Oriented Design (Tmmood) 
Abdullah1, M.H.Khan2, Reena Srivastava31BBD University, India, 2I.E.T, India and 3BBD University, India

December 2014, Volume 6, Number 6

Performance and Power Comparisons between NVIDIA and ATI GPUS YingZhang1 ,Lu Peng1, Bin Li1Jih-Kwon Peir2 and Jianmin Chen2,1Louisiana State University, USA,2University of Florida, USA
ITCM: A Real Time Internet Traffic Classifier Monitor Silas Santiago LopesPereira1, Jose Everardo Bessa Maia2 and Jorge Luiz de Castro e Silva2,1Federal Institute of Ceará, Brazil and 2State University of Ceara, Brazil
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard Ghada F.Elkabbany, Heba K.Aslan and Mohamed N.Rasslan, Electronics Research Institute, Egypt
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard Analysis of Lithography Based Approaches in Development of Semiconductors Jatin Chopra, BITS Pilani Dubai, United Arab Emirates
Requirement Analysis, Architectural Design and Formal Verification of a Multi-Agent Based University Information Management SystemNadeemAkhtar1, Aisha Shafique Ghori1 and Nadeem Salamat2, 1The Islamia University of Bahawalpur, Pakistan and2Karakoram International University, Pakistan
Arabic Text Categorization Algorithm Using Vector Evaluation MethodAshraf Odeh1, Aymen Abu-Errub2, Qusai Shambour and3Nidal Turab, 1Isra University, Jordan,
2University of Jordan, Jordan and 3Al-Ahliyya Amman University, Jordan
A Comparative Study of Clustering and Biclustering of Microarray DataHaifa Ben Saber1,2 and Mourad Elloumi1,3,1Tunis University, Tunisia,2Time Université – Tunis University, Tunisia and 3University of Tunis-El Manar, Tunisia
Implementation of a Stream Cipher Based on Bernoulli’s MapRicardo Francisco Martinez-Gonzalez1 and Jose Alejandro Diaz-Mendez2, 1Veracruz Institute of Technology, Mexico and 2National Institute of Astophysics Optics and Electronics, Mexico
Generating 3D Model in Virtual Reality and Analyzing Its PerformanceFilip Popovski, Igor Nedelkovski and Svetlana Mijakovska, St.Kliment OhridskiUniversity – Bitola, Macedonia
Towards an Intelligent Tutoring System to Down SyndromAmal F.A Mahmoud, Mohamed A.F.Belal and Yehia M.K. Helmy, Helwan University, Egypt
A Comparative Study of Dimension Reduction Methods Combined with Wavelet Transform Applied to the Classification of Mammographic ImagesN.Hamdi,K.Auhmani and M.M.Hassani, Universite Cadi Ayyad, Maroc
Multi-Objective Predictive Control : A Solution Using MetaheuristicsHalim Merabti1,2 and Khaled Belarbi3,1Welding and NDT Research Centre (CSC), Algeria, 2University of Constantine, Algeria and 3Campus Université de Constantine, Alegria
Experimental Analysis of Matching Technique of Steganography for Greyscale and Colour ImageKhurrum Rahim Rashid1, AqsaRashid2, Nadeem Salamat3 and Saad Missen2, 1NUSES FAST, Pakistan, 2Islamia University Bahawalpur,Pakistan and 3Karakoram International University Gilgit, Pakistan

October 2014, Volume 6, Number 5August 2014, Volume 6, Number 4

June 2014, Volume 6, Number 3State of The Art of Learning Styles-Based Adaptive Educational Hypermedia Systems (Ls-Baehss)
Ahmed Al-Azawei and Atta Badii, School of Systems Engineering, UKMassive Parallelism With Gpus for Centrality Ranking in Complex Networks
Frederico L. Cabral, Carla Osthoff, Rafael Nardes and Daniel Ramos, Laboratório Nacional de Computação Científica, BrazilPerformance Analysis of Wind Turbine as a Distributed Generation Unit In Distribution System
Ramadoni Syahputra1,2, Imam Robandi1 and Mochamad Ashari1, 1Institut Teknologi Sepuluh Nopember, Indonesia and 2Universitas Muhammadiyah Yogyakarta, IndonesiaSCloud Computing Security through Symmetric Cipher Model
Subramanian Anbazhagan1 and K.Somasundaram2, 1Karpagam University, India and 2Jaya Engineering College, IndiaEnhancing the Matrix Transpose Operation Using Intel Avx Instruction Set Extension
Ahmed Sherif Zekri1,2, 1Alexandria University, Egypt and 2Beirut Arab University, LebanonReview of Monitoring Tools for E-Learning Platforms
Ali Alowayr and Atta Badii, Reading University, UKIntelligent Fatigue Detection and Automatic Vehicle Control System
Monali Gulhane and P.S.Mohod, RTMN University, IndiaSShort Term Load Forecasting System Based on Support Vector Kernel Methods
Lal Hussain, M. Sajjad Nadeem and Syed Ahsen Ali Shah, University of Azad Jammu and Kashmir, PakistanApril 2014, Volume 6, Number 2Performance Variations in Profiling Mysql Server on the Xen Platform: Is It Xen or Mysql?
Ashish Tapdiya and Yuan Xue, Vanderbilt University, United StatesDesign of a Virtual Ecological Pond for Motion-Sensing Game-Based Learning
Wernhuar Tarng1, Nien-Yin Lu1, Yi-Syuan Shih1 and Hsin-Hun Liou2, 1National Hsinchu University of Education, Taiwan and 2National Central University, TaiwanCloud Web-Based Operating System (Cloud Web Os)
Hesham Abusaimeh, Applied Science University, JordanAn Adaptive Framework for Enhancing Recommendation Using Hybrid Techniques
Radhya Sahal, SaharSelim and Abeer ElKorany, Cairo University, EgyptEstimation of Optimized Energy and Latency Constraint for Task Allocation in 3d Network on Chip
Vaibhav Jha1, Mohit Jha2 and G K Sharma1, 1ABV- Indian Institute of Information Technology and Management, India and 2Jabalpur Engineering College, IndiaCase-Based Reasoning for Explaining Probabilistic Machine Learning
Tomas Olsson1,2, Daniel Gillblad2, Peter Funk1, and Ning Xiong1, 1Mälardalens University, Sweden and 2SICS Swedish ICT, SwedenBusiness Bankruptcy Prediction Based on Survival Analysis Approach
Ming-Chang Lee, National Kaohsiung University of Applied Science, TaiwanRecognition and Ranking Critical Success Factors of Business Intelligence in Hospitals – Case Study: Hasheminejad Hospital
Marjan Naderinejad, Mohammad Jafar Tarokh and Alireza Poorebrahimi, Islamic Azad University, IranDesign and Implementation of a Personal Super Computer
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi ArabiaOutput Privacy Protection With Pattern-Based Heuristic Algorithm
P.Cynthia Selvi1 and A.R.Mohammed Shanavas2, 1KNGA College(W), India and 2Jamal Mohamed College, IndiaChange Management and Version Control of Scientific Applications
Bojana Koteska and Anastas Mishev, Ss. Cyril and Methodius University, MacedoniaAdvanced Authentication Scheme Using a Predefined Keystroke Structure
Abdulameer K. Hussain and Mohammad M. Alnabhan, Jerash University, JordanThe Impact of Knowledge-Based Trust (Kbt) on The Adoption and Acceptability of Cashless Economy in Nigeria
Galadima, Talatu O.1, Akinyemi, Ibidapo O.2, and Asani, Emmanuel O.3, 1Federal Polytechnic, Nigeria, 2Covenant University, Nigeria and 3Landmark University, NigeriaA Methodology for the Study of Fiber-Optic Cables
Muzammil H Mohammed and Mohd Aasif Ansari, College of Computers and Information Technology, Saudi ArabiaSharing of Cluster Resources among Multiple Workflow Applications
Uma Boregowda1 and Venugopal Chakravarthy2, 1Malnad College of Engineering, India and 2Sri Jayachamarajendra College of Engineering, IndiaReview of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic Management
Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi ArabiaFebruary 2014, Volume 6, Number 1Cardinal Direction Relations in Qualitative Spatial Reasoning
Chaman L. Sabharwal and Jennifer L. Leopold, Missouri University of Science and Technology, USAInformation Security Approach in Open Distributed Multi-Agent Virtual Learning Environment
Zahi A.M. Abu Sarhan1 and As’ad Mahmoud As’ad Alnaser2, 1Applied Science Private University, Jordan and 2Al-Balqa’ Applied University, JordanInformation Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method
Ming-Chang Lee, National Kaohsiung University of Applied Science, TaiwanEvaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf
Maicon A. Sartin11 and Alexandre C. R. da Silva2, 1UNEMAT, Brazil and 2Ilha Solteira, BrazilClustering Effects on Wireless Mobile Ad-Hoc Networks Performances
Gideon Naah and Edwin Boadu Okoampa, University of Electronic Science and Technology of China, ChinaWhat Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling
Yousef Elsheikh and Mohammad Azzeh, Applied Science University, JordanA Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
Hung-Teng Chang, Yu Da University of Science and Technology, TaiwanShape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa and Naomie Salim, Universiti Teknologi Malaysia, MalaysiaA Study on the Dynamic Effect of Sports Promotion Strategy and Effectiveness of NationalHealth Care in Taiwan
Tian-Syung Lan and Pin-Chang Chen, Yu Da University of Science and Technology, TaiwanFulfillment Request Management (The approach)
Stylianos Gkoutzioupas, Univercity of the Aegean, GreeceProcessing Obtained Email Data By Using Naïve Bayes Learning Algorithm
Valery V. Pelenko and Aleksandr V. Baranenko, St. Petersburg Research University of Information Technologies, RussiaA Linear Algorithm for the Grundy Number of A Tree
Ali Mansouri and Mohamed Salim Bouhlel, Department of Electronic Technologies of Information and Telecommunications Sfax, TunisiaResearch on Dynamic Effects of Employability of Vocational College Students in Taiwan
Pin-Chang Chen, Yu Da University of Science and Technology, TaiwanDecember 2013, Volume 5, Number 6The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and SecuritySalwa Al-Samirrai, Zahra Fadhil Mohsen and Aysh Alhroob, Isra University, JordanMolecular Solutions for the Set-Partition Problem on Dna-Based ComputingSientang Tsai and Wei-Yeh Chen, Southern Taiwan University of Science and Technology, TaiwanBrazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding WindowsR. F. Prates1, G. Cámara-Chávez1, William R. Schwartz2 and D. Menotti1, 1University Federal of Ouro Preto, Brazil and 2University Federal of Minas Gerais, BrazilDistributed Cloud Computing Environment Enhanced With Capabilities for Wide-Area Migration and Replication Of Virtual MachinesYoung-Chul Shim, Hongik University, KoreaStudy On Decision-Making for Cafe Management AlternativesCheng-I Hou, Chung Hua University, TaiwanMulti-Topic Multi-Document SummarizerFatma El-Ghannam1 and Tarek El-Shishtawy2, 1Electronics Research Institute, Egypt and 2Benha University, EgyptAn Sna-Bi Based System for Evaluating Virtual Teams: A Software Development Project CaseLamia Ben Hiba and Mohammed Abdou Janati Idrissi, Mohammed V Souissi University, MoroccoGesture Recognition Based Mouse EventsRachit Puri, Samsung Research India, IndiaA Prediction Model for Taiwan Tourism Industry Stock IndexHan-Chen Huang and Fang-Wei Chang, Yu Da University of Science and Technology, Taiwan

October 2013, Volume 5, Number 5

Performance Analysis of Round Trip Time in Narrowband RF Networks For Remote Wireless Communications
El miloud Ar reyouchi1, Kamal Ghoumid2, Koutaiba Ameziane1 and Otman El Mrabet1, 1Abdelmalek Essaadi university, Morroco and 2Informatics and Telecommunications, ENSAO, MoroccoAutomatic Detection of Microaneurysms and Hemorrhages in Color Eye Fundus Images
Sérgio Bortolin Júnior and Daniel Welfer, Universidade Federal do Pampa, BrazilProject Monitoring and Control Measures In CMMI
Mahmoud Khraiwesh, Zarqa University, JordanA Preliminary Survey on Optimized Multiobjective Metaheuristic Methods for Data Clustering Using Evolutionary Approaches
Ramachandra Rao Kurada1, K Karteeka Pavan2 and AV Dattareya Rao1, 1Acharya Nagarjuna University, India and 2RVR & JC College of Engineering, IndiaDiagnosis of Some Diseases in Medicine via computerized Experts System
R.A. Soltan, M. Z. Rashad and B.El-Desouky, Mansoura University, EgyptImproving the Effectiveness of Information Retrieval System Using Adaptive Genetic Algorithm
Wafa Maitah1, Mamoun Al-Rababaa1 and Ghasan Kannan2, 1Al al-Bayt University, Jordan and 2Amman Arab University, JordanThe Comparison of the Text Classification Methods to be Used for the Analysis of Motion Data in DLP Architect
Murat Topaloglu, Trakya University, TurkeyA Privacy – Learning Objects Identity System for Smartphones Based on a Virtual Learning Environment Database
LeThanhHieu, JinHai, DeQingZou and WangDaiBin, HuaZhong University of Science and Technology, ChinaSystems Variability Modeling: A Textual Model Mixing Class and Feature Concepts
Ola Younis1, Said Ghoul1, and Mohammad H. Alomari2, 1Philadelphia University, Jordan and 2Applied Science University, JordanCompact, “Fuzzy” Information
S.Balaji Vivek, Easwari Engineering College, IndiaThe Principles of Humanism for MANETs
Md. Amir Khusru Akhtar1 and G. Sahoo2, 1Cambridge Institute of Technology, India and 2Birla Institute of Technology, IndiaThe Application Wavelet Transform Algorithm in Testing ADC Effective Number of Bits[ Pdf ]
Emad A. Awada, Applied Science University, JordanIntroducing a Novel Fault Tolerant Routing Protocol in Wireless Sensor Networks Using Fuzzy Logic
Mostafa Vakili Fard1, Sayyed Majid Mazinani2 and Sayyed Ahmad Hoseini3, 1Science and Research IAU, Iran, 2Imam Reza University, Iran and 3Payam Noor University, IranData Mining Model for the Data Retrieval from Central Server Configuration
Srivatsan Sridharan, Kausal Malladi and Yamini Muralitharan, International Institute of Information Technology – Bangalore, India

August 2013, Volume 5, Number 4

A Review of Temporal Aspects of Hand Gesture Analysis Applied to Discourse Analysis and Natural Conversation
Renata C. B. Madeo, Priscilla K. Wagner and Sarajane M. Peres, Universidade de Sao Paulo, Brazil

A Tabu Search Algorithm With Efficient Diversification Strategy for High School Timetabling Problem
Salman Hooshmand1, Mehdi Behshameh2 and OmidHamidi1, 1Hamedan University of Technology, Iran and 2Islamic Azad University, Iran

Analysis of Elementary Cellular Automata Boundary Conditions
K. Salman, Middle Tennessee State University, USA

Design and Implementation of Repair-aware Test Flow for Multi-Memory
Gang Wang and Huajun Chen, Loongson Technology Corporation Limited, China

Vedivision – A Fast Bcd Division Algorithm Facilitated by Vedic Mathematics
Diganta Sengupta1 Mahamuda Sultana2 and Atal Chaudhuri3, 1Future Institute of Engineering and Management, India, 2Swami Vivekananda Institute of Science and Technology, India and 3Jadavpur University, India

Integrations of ICT in Education Sector for the Advancement of the Developing Country: Some Challenges and Recommendations-Bangladesh Perspective
Mst. Shahnaj Parvin, International Islamic University, Bangladesh

Comparative Study of Backpropagation Algorithms in Neural Network Based Identification of Power System
Sheela Tiwari1, Ram Naresh2 and Rameshwar Jha3, 1Dr. B R Ambedkar National Institute of Technology, India, 2National Institute of Technology, India and 3IET Bhaddal Technical Campus, India

Matching Structure and the Evolution of Cooperation in the Prisoner’s Dilemma
Noureddine Bouhmala and Jon Reiersen, Vestfold University College, Norway

Survey of the Euro Currency Fluctuation by Using Data Mining
M. Baan, E. Saadati and M. Nasiri, Iran University of Science and Technology, Iran

GPS Tracking System Coupled With Image Processing in Traffic Signals to Enhance Life Security
Manoj Prabhakar K and Manoj Kumar S, Anna University, India

Following Car Algorithm With Multi Agent Randomized System
Mounir Gouiouez, Noureddine Rais and Mostafa Azzouzi Idrissi, University Sidi Mohammed Ben Abdellah, MoroccoPeriocular Recognition Using Reduced Features
Ambika D R, Radhika K R and D Sehsachalam, BMS College of Engineering, IndiaDesign and Development of Secure Navigation System for Visually Impaired People
Prashant Bhardwaj and Jaspal Singh, Centre for Development of Advanced Computing, MohaliA Novel Perceptual Image Encryption Scheme Using Geometric Objects Based Kernel
Prabhudev Jagadeesh1, P. Nagabhushan1 and R. Pradeep Kumar2, 1University of Mysore, India and 2Amphisoft Technologies Private Limited, India

June 2013, Volume 5, Number 3

Fuzzy Rule Base System for Software Classification
Adnan Shaout and Juan C. Garcia, The University of Michigan – Dearborn, United StatesContext-Based Barrier Notification Service Toward Outdoor Support for the Elderly
Keisuke Umezu1, Takahiro Kawamura2 and Akihiko Ohsuga2, 1NEC Corporation, Japan and 2University of Electro-Communications, JapanHyper-Mspace; Multidimensional Evolutionary-Agents Modeling and Analysis
Mohamed Dbouk1, Ihab Sbeity1, Hamid Mcheick2 and Haytham Douaihy3, 1Lebanese University, Beirut-Lebanon, 2Universite du Quebec a Chicoutimi, Canada and 3Lebanese University-DSST, Beirut-LebanonA Novel Hybrid Method for the Segmentation of the Coronary Artery Tree in 2d Angiograms
Daniel S.D. Lara1, Alexandre W.C. Faria2, Arnaldo de A. Araujo1 and D. Menotti3, 1Univ. Fed. de Minas Gerais, Brazil, 2UFMG, Brazil and 3Universidade Federal de Ouro Preto, BrazilModified Heuristic Time Deviation Technique for Job Sequencing and Computation of Minimum Total Elapsed Time
N.Nagamalleswara Rao1, O. Naga Raju2 and I. Ramesh Babu2, 1R.V.R & J. C. College of Engineering, India and 2Nagarjuna University, IndiaSecurity Threats on Cloud Computing Vulnerabilities
Te-Shun Chou, East Carolina University, U.S.AHandover Management Scheme in LTE Femtocell Networks
Tijane Fatima Zohra Badri1,2, Saadane Rachid1, Mohammed Wahbi1 and MbarkiSamir2, 1SIR2C2S/LASI-EHTP Casablanca, Morocco and 2Ibn Tofail University Kenitra, MoroccoSaasquality – A Method for Quality Evaluation of Software as a Service (Saas)
Nemesio Freitas Duarte Filho1, Clarindo Isaias Pereira da Silva e Padua1, Paulo Henrique de Souza Bermejo2, Andre Luiz Zambalde2, Urlan Salgado de Barros3, 1Federal University of Minas Gerais, Brazil, 2Federal University of Lavras, Brazil and 3Federal University of Parana, BrazilAn Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy and Heba A. Elnemr, Electronics Research Institute, EgyptTowards A Good ABS Design for More Reliable Vehicles on the Roads
Afifa Ghenai, Mohamed Youcef Badaoui and Mohamed Benmohammed, University of Constantine, AlgeriaDesigning of an efficient algorithm for identifying Abbreviation definitions in biomedical Text
Shashank Singh1, Gaurav Sharma2 Abdul Nazeer K A3 and Shalini Singh2, 1IBM India Private limited, India, 2School of Biochemical Engineering IIT (BHU), India and 3NIT, IndiaLabeled Generalized Stochastic Petri Net Based Approach for Web Services Composition
Sofiane Chemaa, Mouna Bouarioua and Allaoua chaoui, University of Constantine, AlgeriaBounded Ant Colony Algorithm Fortask Allocation on Anetwork of Homogeneous Processorsusing a Primary Site (Bts-Aco)
Buthayna Al-Sharaa and Tamara Al-Qublan, AL Balqa Applied University, JordanBiomedical Image Transmission Based on Modified Feistal Algorithm
Jinu Elizabeth John, Saintgits College of Engineering, IndiaIntelligent Access Control Policies for Social Network Site
Saung Hnin Pwint Oo, University of Technology (Yatanarpon Cyber City), Myanmar

A Guide to Deal With Uncertainties in Software Project Management Marcelo Marinho1,2 ,Suzana Sampaio2, Telma Lima1and Hermano de Moura1,1Federal University of Pernambuco (UFPE), Brazil 2Federal Rural University of Pernambuco (UFRPE), BrazilIntelligent Algorithms for Cell Tracking and Image SegmentationAshraf A. Aly1 ,Safaai Bin Deris2and Nazar Zaki31Alkhawarizmi College, UAE,2Universiti Teknologi Malaysia, Malaysia3and UAE University, UAEVariability Modeling for Customizable Saas ApplicationsAshraf A. Shahin, Institute of Statistical Studies & Research, Cairo University, EgyptSystematic Review on Project ActualitySuzana Cândido de Barros Sampaio1,2  ,Marcelo Marinho1,2 ,Hermano Moura1, 1Federal University of Pernambuco (UFPE), Brazil and 2Federal Rural University of Pernambuco (UFRPE), BrazilEfficiency Lossless Data Techniques for Arabic Text CompressionEnas Abu Jrai, Al-Balqa Applied University, JordanManaging Collaboration Within Networks and Relationships in the Serious Game of Agribusiness Management Using Sandpile ModelSaifulBukhori, Jember University, IndonesiaFLBRA: Fuzzy Logic Based Routing Algorithm for Indoor Wireless Sensor NetworksLucas Leão, David Bianchini and Omar Branquinho, Pontifical Catholic University of Campinas, BrazilA Robust Blind and Secure Watermarking Scheme Using Positive Semi Definite MatricesNoui Oussama and Noui Lemnouar, UHL University, AlgeriaEducational Data Mining Using JMPSadiq Hussain and G.C.Hazarika, Dibrugarh University, IndiaState of the Art of Agile Governance: A Systematic ReviewAlexandre J.H.de O.Luna1,2 ,Philippe Kruchten2, Marcello L.G. do E.Pedrosa1, Humberto R.de A. Neto1 and Hermano P.de Moura1, 1Federal University of Pernambuco (UFPE), Brazil and 2The University of 1British Columbia, CanadaEmployee Performance Appraisal System Using Fuzzy Logic Adnan Shaout1 and Mohamed Khalid Yousif2, 1The University of Michigan, USA and 2Sudan University of Science and Technology, SudanResearch on the Effect of Applying Multimedia to the Instruction of Rational Emotion Behavior Therapy For Middle School Students’ Emotional ControlChen-Feng Wu, Pin-Chang Chen and Yu-Tzu Chen, Yu Da University of Science and Technology, TaiwanSoftware Architectural Patterns for Service CompositionGhadeer Ghazal1, Amjad. Hudaib1 and Waffa Maitah2, 1The University of Jordan, Jordan and 2Al al-Bayt University, JordanOne-Dimensional Vector Based Pattern MatchingY.M.Fouda, Mansoura University, EgyptDependable Online Appointment Booking System for Nhis Outpatient in Nigerian Teaching HospitalsAdebayo Peter Idowu1, Olajide Olusegun Adeosun2 and Kehinde Oladipo Williams3, 1Obafemi Awolowo University, Nigeria, 2Ladoke Akintola University of Technology, Nigeria and 3McPherson University, NigeriaCo-Emulation of Scan-Chain Based Designs Utilizing SCE-MI InfrastructureBill Jason Tomas1, Yingtao Jiang2 and Mei Yang2, 1Cadence Design System, USA and 2University of Nevada, USAAn Improved Particle Filter Tracking System Based on Colour and Moving Edge InformationChao-Ju Chen1, Wernhuar Tarng1 and Kuo-Hua Lo2, 1National Hsinchu University of Education, Taiwan and 2Industrial Technology Research Institute, TaiwanReal Time Optimized Traffic Management AlgorithmPartha Sarathi Chakraborty, Prajeeth Nair, Pranshu Raj Sinha and Ishan Kumar Behera, SRM University, IndiaA Generic Model for Disease Outbreak Notification SystemsFarag Azzedin, Jaweed Yazdani, Salahadin Adam and Mustafa Ghaleb, King Fahd University of Petroleum and Minerals, Saudi ArabiaSquare Grid Points Coveraged by Connected Sources With Coverage Radius of One on a Two-Dimensional GridPattama Longani, Chiang Mai University, Thailand Structural and Hardware Complexities of Microprocessor Design According to Moore’s LawHaissam El-Aawar, Lebanese International University – LIU, LebanonRemote Real – Time Process and Production Monitoring Mechanism of Lighting Parts for Outdoor Recreation Cheng-I Hou1, Han-Chen Huang2, Tian-Syung Lan1 and Wei-Min Teng1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan Language Independent Document Retrieval Using Unicode Standard Vidhya M and Aji S, University of Kerala, IndiaA Study of The Effects of Electronic Textbook-Aided Remedial Teaching on Students’ Learning Outcomes at the Optics Unit Chen-Feng Wu, Pin-Chang Chen and Shu-Fen Tzeng, Yu Da University of Science and Technology, Taiwan

Advertisement

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: