default search action
The International Arab Journal of Information Technology, Volume 16
Volume 16, Number 1, January 2019
- Murugan Raman, Reeba Korah, Kavitha Tamilselvan:
An automatic localization of optic disc in low resolution retinal images by modified directional matched filter. 1-7 - Shefa A. Dawwd:
GLCM based parallel texture segmentation using a multicore processor. 8-16 - Kanakasabhapathi Pillai, Muthayyan Jeyakumar:
A real time extreme learning machine for software development effort estimation. 17-22 - Satya Verma, Saravanan Chandran:
Contactless palmprint verification system using 2-D gabor filter and principal component analysis. 23-29 - Rajendra Chikkala, Sreenivasa Edara, Prabhakara Bhima:
Human facial image age group classification based on third order four pixel pattern (TOFP) of wavelet image. 30-40 - Soong Chen, Tiagrajah Janahiraman, Azizah Suliman:
Enhancement of human visual perception-based image quality analyzer for assessment of contrast enhancement methods. 41-47 - Kamalraj Durai:
Shamir's key basedconfidentialityon cloud data storage. 48-53 - Muhammad Shafiq ur Rehman, Aamer Nadeem, Muddassar A. Sindhu:
Towards automated testing of multi-agent systems using prometheus design models. 54-65 - Mohamed Fathimal, Arockia Jansirani:
New fool proof examination system through color visual cryptography and signature authentication. 66-71 - Tarek Dandashy, Mayez Al-Mouhamed, Irfan Khan:
A reliable peer-to-peer protocol for multi-robot operating in mobile ad-hoc wireless networks. 72-79 - Belal Amro, Albert Levi, Yücel Saygin:
Flexible fair and collusion resistant pseudonym providing system. 80-87 - Karpura Dheepan:
Security enhancement and certificate revocation in MANET using position and energy based monitoring. 88-97 - Anshu Parashar, Jitender Kumar Chhabra:
Assessing impact of class change by mining class associations. 98-107 - Devi Velayutham:
The shuffle on trajectories of infinite arrays. 108-115 - Arup Kumar Pal, Kshiramani Naik, Rohit Agrawal:
A steganography scheme on JPEG compressed cover image with high embedding capacity. 116-124 - Shah Nawaz Khan, Imran Usman:
Amodel for english to urdu and hindi machine translation system using translation rules and artificial neural network. 125-131 - Tanvi Arora:
A novel approach for segmentation of human metaphase chromosome images using region based active contours. 132-137 - Mubashir Ali, Shehzad Khalid, Muhammad Saleemi:
Comprehensive stemmer for morphologically rich urdu language. 138-147 - Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A high capacity data hiding scheme using modified AMBTC compression technique. 148-155 - Noureddine Aloui, Souha Bousselmi, Adnene Cherif:
New algorithm for speech compression based on discrete hartley transform. 156-162
Volume 16, Number 2, March 2019
- Nazri Kama, Sufyan Basri, Saiful Adli Ismail, Roslina Ibrahim, Haslina Md Sarkan:
Using static and dynamic impact analysis for effort estimation. 163-170 - Senthilvel Nataraj, Umamaheswari Sankareswaran, Senthiil Varadharajan, Hemamalini Thulasiram:
Scheduling with setup time matrix for sequence dependent family. 171-177 - Aisha Adel, Nazlia Omar, Mohammed Albared, Adel Al-Shabi:
Feature selection method based on statistics of compound words for arabic text classification. 178-185 - Jiange Zhang, Yuanbo Guo, Yue Chen:
Collaborative detection of cybersecurity threats in bigdata. 186-193 - Jagpreet Sidhu, Sarbjeet Singh:
Using the improved PROMETHEE for selection of trustworthy cloud database servers. 194-202 - Luai A. Al Shalabi:
Rough set-based reduction of incomplete medical datasets by reducing the number of missing values. 203-210 - Nadeem Akhtar, Saima Khan:
Formal architecture and verification of a smart flood monitoring system-of-systems. 211-216 - Dhirendra Singh, Nilay Khare:
Parallel batch dynamic single source shortest path algorithm and its implementation on GPU based machine. 217-225 - Jau-Ji Shen, Chun-Hsiu Yeh, Jinn-Ke Jan:
A new approach of lossy image compression based on hybrid image resizing techniques. 226-235 - Dariusz Jacek Jakóbczak:
Information analysis and 2D point extrapolation using method of hurwitz-radon matrices. 236-241 - Muazzam Maqsood, Hafiz Adnan Habib, Tabassam Nawaz:
An efficientmis pronunciation detection system using discriminative acoustic phonetic features for arabic consonants. 242-250 - Shaheen Ayyub, Praveen Kaushik:
Secure searchable image encryption in cloud using hyper chaos. 251-259 - Xuefeng Liu, Jingjing Fan, Jianhua Mao, Fenxiao Ye:
A low-power self-service bus arrival reminding algorithm on smart phone. 260-264 - Kesari Verma, Priyanka Tripathi, Sangram Panigrahi:
Optimal threshold value determination for land change detection. 265-274 - Brijesh Bakariya, Ghanshyam Singh Thakur:
An efficient algorithm for extracting infrequent itemsets from weblog. 275-280 - Poonam Yadav:
Case retrieval algorithm using similarity measure and fractional brain storm optimization for health informaticians. 281-287 - Kola Periyasamy, Saranya Arirangan:
Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). 288-294 - Nadia B. M. Karmani, Hsan Soussou, Adel M. Alimi:
Tunisian arabic chat alphabet transliteration using probabilistic finite state transducers. 295-303 - Mohammad Farukh Hashmi, Avinash G. Keskar:
Fast and robust copy-move forgery detection using wavelet transforms and SURF. 304-311 - Mohammad Keley, Ahmad Khademzadeh, Mehdi Hosseinzadeh:
Efficient mapping algorithm on mesh-based NoCs in terms of cellular learning automata. 312-322
Volume 16, Number 3, May 2019
- Mahmoud Mohammaddoust, Ali Harounabadi, Mohammadali Naizari:
Evaluation of grid computing environment using TOPSIS. 323-331 - Muhammad Khan, DoHyeun Kim:
Identifier (ID) based enhanced service for device communication and control in future networks. 332-337 - Gibran Benitez-Garcia, Mariko Nakano-Miyatake, Jesus Olivares-Mercado, Héctor Pérez-Meana, Gabriel Sanchez-Perez:
A low complexity face recognition scheme based on down sampled local binary patterns. 338-347 - Mukesh Mann, Pradeep Tomar, Om Prakash Sangwan:
Automated software test optimization using test language processing. 348-356 - Deepak Gupta, Anil K. Ahlawat:
Taxonomy of GUM and usability prediction using GUM multistage fuzzy expert system. 357-363 - Syed Shah, Mohammad Amjad:
Preceding document clustering by graph mining based maximal frequent termsets preservation. 364-370 - Youcef Gheraibia, Peng-Yeng Yin, Yiannis Papadopoulos, Abdelouahab Moussaoui, Smaine Mazouzi:
PeSOA: penguins search optimisation algorithm for global optimisation problems. 371-379 - Emel Alkim, Yalçin Çebi:
Machine translation infrastructure for turkic languages (MT-Turk). 380-388 - Shree Devi Ganesan, Munir Rabbani:
Contrast enhancement using completely overlapped uniformly decrementing sub-block histogram equalization for less controlled illumination variation. 389-396 - Yousef Rastegari, Fereidoon Shams:
A dynamic architecture for runtime adaptation of service-based applications. 397-406 - Rafat Alshorman:
Toward proving the correctness of TCP protocol using CTL. 407-414 - Muhammad Waqar Aziz, Syed Abdul Baqi Shah:
Evolutionary testing for timing analysis of parallel embedded software. 415-423 - Malek Ben Salem, Emna Bouazizi, Claude Duvallet, Rafik Bouaziz:
(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS. 424-434 - Lili Yan, Yan Chang, Shibin Zhang:
An efficiency batch authentication scheme for smart grid using binary authentication tree. 435-441 - Kanokmon Rujirakul, Chakchai So-In:
Parallel optimized pearson correlation condition (PO-PCC) for robust cosmetic makeup facial recognition. 442-453 - Ruba Sultan, Hashem Tamimi, Yaqoub Ashhab:
Improving classification performance using genetic programming to evolve string kernels. 454-459 - Heithem Amich, Mohamed Ben Mohamed, Mounir Zrigui:
Multi-level improvement for a transcription generated by automatic speech recognition system for arabic. 460-466 - Mustafa Salam, Alia Abdul Hassan:
Offline isolated arabic handwriting character recognition system based on SVM. 467-472 - Hanaa Mohammed, Gamal Attiya, Sami M. El-Dolil:
New class-based dynamic scheduling strategy for self-management of packets at the internet routers. 473-481 - Meera Annamalai, Swamynathan Sankaranarayanan:
Cloud data center design using delay tolerant based priority queuing model. 482-491
Volume 16, Number 3A, Special Issue 2019
- Adnan Shaout, Dhanush Mysuru, Karthik Raghupathy:
Vehicle condition, driver behavior analysis and data logging through CAN sniffing. 493-498 - Souha El Katat, Ali Kalakech, Mariam Kalakech, Denis Hamad:
Financial development indicators: a comparative study between lebanon and middle east countries based on data mining techniques. 499-505 - Mariam Khader, Arafat Awajan, Ghazi Al-Naymat:
The impact of natural language preprocessing on big data sentiment analysis. 506-513 - Khadidja Belbachir, Redouane Tlemsani:
Temporal neural system applied to arabic online characters recognition. 514-524 - Samar Sindian, Abed Ellatif Samhat, Matthieu Crussière, Jean-François Hélard, Ayman Khalil:
Mesh HDR WPAN resource allocation optimization approaches. 525-532 - Musa Alyaman, Alaa Abd-Raheem, Farah AlDeiri:
Design of an automated extraoral photogrammetry 3D scanner. 533-539 - Kassem Ahmad, Omar Mohammad, Mirna Atieh, Hussein Ramadan:
Enhanced performance and faster response using new IoT litetechnique. 548-556 - Zeinab Abbas, Ali Saad, Mohammad Ayache, Chadi Fakih:
Applications of logistic regression and artificial neural network for ICSI prediction. 557-564 - Suhair AlHajHassan, Mohammed Odeh, Stewart Green, Asem Mansour:
An ontology-based i*goal-oriented referential integrity model in systems of systems context. 565-576 - Mohammad Sabri, Mohammed Odeh, Mohammed Saad:
Deriving object-based business process architecture using knowledge management enablers. 577-586 - Ahmad Drak, Alexander Asteroth:
Autonomous track and follow UAV for aerodynamic analysis of vehicles. 587-593 - Ali Haroun, Hussein Sharafeddin, Ali Al Ghouwayel:
Vertical shuffle scheduling-based decoder for joint MIMO detection and channel decoding. 594-599 - Oussama Zahwe, Hassan Harb, Hussein Nasrallah:
Design of acoplanar circulator based on thick and thin ferrite film. 600-608 - Zaylaa Amer, Ahmad Diab, Mohamad Khalil, Catherine Marque:
Automatic monodimensional EHG contractions' segmentation. 609-615
Volume 16, Number 4, July 2019
- Siva Shanmugam, Sriman Iyengar:
Improving energy efficiency and impairing environmental impacts oncloud centers by transforming virtual machine into self-adaptive resource container. 617-623 - Arun Kumar Yadav, Divakar Yadav:
Wavelet tree based dual indexing technique for geographical search. 624-632 - Pham Phuoc Hung, Md. Golam Rabiul Alam, Hai Nguyen, Tho Quan, Eui-Nam Huh:
A dynamic scheduling method for collaborated cloud with thick clients. 633-643 - Faiza Tila, Do Kim:
Modelling and analysis of a semantic sensor service provider ontology. 644-650 - Meriem Lahrouni, Eric Cariou, Abdelaziz El Fazziki:
A black-box and contract-based verification of model transformations. 651-660 - Saddaf Rubab, Mohd Fadzil Hassan, Ahmad Kamil Mahmood, Syed Nasir Mehmood Shah:
QoS based multi-constraints bin packing job scheduling heuristic for heterogeneous volunteer grid resources. 661-668 - Nageswara Reddy, Mohan Rao, Chittipothula Satyanarayana:
A novel face recognition system by the combination of multiple feature descriptors. 669-676 - Asuman Günay, Vasif V. Nabiyev:
A novel age classification method using morph-based models. 677-685 - Dalton Meitei Thounaojam, Khelchandra Thongam, Thokchom Jayshree, Sudipta Roy, Khumanthem Manglem Singh:
Colour histogram and modified multi-layer perceptron neural network based video shot boundary detection. 686-693 - Emad Elabd, Hatem Abdul-Kader, Waleed Ead:
Securely publishing social network data. 694-702 - Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar:
An efficient steganographic approach to hide information in digital audio using modulus operation. 703-711 - Anirban Goswami, Ritesh Mukherjee, Soumit Chowdhury, Nabin Ghoshal:
Digital signature protocol for visual authentication. 712-719 - Bassam Rajabi, Sai Peck Lee:
Change management framework to support UML diagrams changes. 720-730 - Dhanalakshmi Selvarajan, Abdul Samath Abdul Jabar, Irfan Ahmed:
Comparative analysis of PSO and ACO based feature selection techniques for medical data preservation. 731-736 - Mudassir Rafi, Susanta Mukhopadhyay:
Texture segmentation from non-textural background using enhanced MTC. 737-745 - Balakrishnan Senthilnayaki, K. Venkatalakshmi, Arputharaj Kannan:
Intrusion detection system using fuzzy rough set feature selection and modified KNN classifier. 746-753 - Yang Lu, Quanling Zhang, Jiguo Li:
A certificate-based AKA protocol secure against public key replacement attacks. 754-765 - Muhammad Sharif, Jamal Hussain Shah:
Automatic screening of retinal lesions for grading diabetic retinopathy. 766-774 - Mabrouka Hagui, Mohamed Ali Mahjoub, Faycel ElAyeb:
A new framework for elderly fall detection using coupled hidden markov models. 775-783 - Le Cheng, Yanhong Song, Yuetang Bian:
Cockroach swarm optimization using aneighborhood-based strategy. 784-790
Volume 16, Number 5, September 2019
- Yefeng Li, Jiajin Le, Mei Wang:
A mapreduce-based quick search approach on large files. 791-797 - Mamatha Elliriki, C. Chandra Sekhar Reddy, Krishna Anand:
An efficient line clipping algorithm in 2D space. 798-807 - Zeinab Fallahshojaei, Mehdi Sadeghzadeh:
Parameter tuning of neural network for financial time series forecasting. 808-815 - Ramalingaswamy Cheruku, Damodar Reddy Edla, Venkatanareshbabu Kuppili:
An optimized and efficient radial basis neural network using cluster validity index for diabetes classification. 816-826 - Mohammed Mekideche, Youcef Ferdi:
Edge detection optimization using fractional order calculus. 827-832 - Lija Mohan, Sudheep Elayidom:
Predicting the winner of delhi assembly election, 2015 from sentiment analysis on twitter data-a bigdata perspective. 833-842 - Ekin Ekinci, Sevinç Ilhan Omurca:
A new approach for a domain-independent turkish sentiment seed lexicon compilation. 843-853 - KeXin Yin, Wanlong Li, Ming Hu, Jianqi Zhu:
Simulating email worm propagation based on social network and user behavior. 854-861 - Farrukh Chughtai, Riaz ul Amin, Abdul Sattar Malik, Nausheen Saeed:
Performance analysis of microsoft network policy server and freeRADIUS authentication systems in 802.1x based secured wired ethernet using PEAP. 862-870 - Balamurugan Balasubramanian, Kamalraj Durai, Jegadeswari Sathyanarayanan, Sugumaran Muthukumarasamy:
Tree based fast similarity query search indexing onoutsourced cloud data streams. 871-878 - Mustafa Kaiiali, Auwal Iliyasu, Ahmad Samer Wazan, Adib Habbal, Yusuf Muhammad:
A cloud-based architecture for mitigating privacy issues in online social networks. 879-888 - Xiaorong Cheng, Tianqi Li:
A trusted virtual network construction method based on data sources dependence. 889-893 - Fu Zhang, Qiang Tong, Jingwei Cheng:
A novel and complete approach for storing RDF(S) in relational databases. 894-903 - Srinivasan Rajarajan, Ponnada Priyadarsini:
UTP: a novel PIN number based user authentication scheme. 904-913 - Ramzi Halimouche, Hocine Teffahi:
Detecting sentences types in the standard arabic language. 914-921 - Rishikesh Misal, Boominathan Perumal:
Data deduplication for efficient cloud storage and retrieval. 922-927 - Padmaveni Krishnan, D. John Aravindhar:
Self-adaptive PSO memetic algorithm for multi objective workflow scheduling in hybrid cloud. 928-935 - Venkatrama Phani Kumar Sistla, Venkata Krishna Kishore Kolli, Kamakshi Prasad Valurouthu:
A novel adaptive two-phase multimodal biometric recognition system. 936-946 - Minhaj Khan:
EncCD: a framework for efficient detection of code clones. 947-952 - Bilgin Metin, Haldun Köktas:
Sentiment analysis with term weighting and word vectors. 953-959
Volume 16, Number 6, November 2019
- Saihua Cai, Shangbo Hao, Ruizhi Sun, Gang Wu:
Mining recent maximal frequent itemsets over data streams with sliding window. 961-969 - Eman K. Elsayed, Doaa Fathy:
Evaluation of quran recitation via OWL ontology based system. 970-977 - Meijia Wang, Qingshan Li, Yishuai Lin, Yingjian Li, Bo-Yu Zhou:
A personalized metasearch engine based on multi-agent system. 978-987 - Xiaoxia Zhao, Wenjun Meng, Jinhu Su, Yuxuan Chen:
Parameter optimization of single sample virtually expanded method. 988-994 - Omar Al-Harbi:
Classifying sentiment of dialectal arabic reviews: a semi-supervised approach. 995-1002 - Xi Luo, Ying An:
A proactive caching scheme based on content concentration in content-centric networks. 1003-1012 - Djilali Dahmani, Sid Ahmed Rahal, Ghalem Belalem:
A new approach to improve association rules for big data in cloud environment. 1013-1020 - Venkatanareshbabu Kuppili, Mainak Biswas, Damodar Reddy Edla:
PLDL: a novel method for label distribution learning. 1021-1027 - Abrar Khan, Umar Shoaib, Muhammad Sarfraz:
A comprehensive study of modern and high speed TCP-variant in linux kernel: TCP CUBIC. 1028-1035 - Hayri Sever, Ahmet Senol, Ersin Elbasi:
Block size analysis for discrete wavelet watermarking and embedding a vector image as a watermark. 1036-1043 - Yange Sun, Zhihai Wang, Jidong Yuan, Wei Zhang:
Tracking recurring concepts from evolving data streams using ensemble method. 1044-1052 - Nenad Milic, Brankica Popovic, Sasa Mijalkovic, Darko Marinkovic:
The influence of data classification methods on predictive accuracy of kernel density estimation hotspot maps. 1053-1062 - Djamal Ziani:
Correlation dependencies between variables in feature selection on boolean symbolic objects. 1063-1073 - Abiodun Oguntimilehin, Olusola Adetunmbi, Innocent Osho:
Towards achieving optimal performance using stacked generalization algorithm: a case study of clinical diagnosis of malaria fever. 1074-1081 - Nor Azrini Jaafar, Nor Azman Ismail, Kamarul Azmi Jasmi, Yusman Azimi Yusoff:
Optimal dual cameras setup for motion recognition in salat activity. 1082-1089 - Ali Gezer, Gary Warner:
Exploitation of ICMP time exceeded packets for a large-scale router delay analysis. 1090-1097 - Meng Han, Jian Ding, Juan Li:
PatHT: an efficient methodof classification over evolving data streams. 1098-1105 - Ranjeeth Kumar Sundararajan, Umamakeswari Arumugam:
FBMT: fuzzy based merkle technique for detecting and mitigating malicious nodes in sensor networks. 1106-1113 - Mohamed Biniz, Mohamed Fakir:
An ontology alignment hybrid method based on decision rules. 1114-1120 - Akhtar Rasool, Gulfishan Firdose Ahmed, Raju Barskar, Nilay Khare:
Efficient multiple pattern matching algorithm based on BMH: MP-BMH. 1121-1130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.