default search action
The International Arab Journal of Information Technology, Volume 15
Volume 15, Number 1, January 2018
- Anuradha Yarlagadda, Murthy V. Jonnalagedda, Krishna Munaga:
Clustering based on correlation fractal dimension over an evolving data stream. 1-9 - Ehsan Arianyan, Hassan Taheri, Saeed Sharifian, Mohsen Tarighi:
New six-phase on-line resource management process for energy and sla efficient consolidation in cloud data centers. 10-20 - Muhammad Hassan, Muhammad Shoaib:
Opinion within opinion: segmentation approach for urdu sentiment analysis. 21-28 - Süleyman Eken, Abdülkadir Karabas, Hayrunnisa Sari, Ahmet Sayar:
A framework for recognition and animation of chess moves printed on a chess book. 29-36 - Pulung Andono, Catur Supriyanto:
Bag-of-visual-words model for fingerprint classification. 37-43 - Anjali Goel, Rajesh Prasad, Suneeta Agarwal, Amit Sangal:
Efficient parameterized matching using burrows-wheeler transform. 44-49 - Jovana Bozic, Djordje Babic:
Financial time series forecasting using hybrid wavelet-neural model. 50-57 - Mohamed Hassine, Lotfi Boussaid, Hassani Massaoud:
Tunisian dialect recognition based on hybrid techniques. 58-65 - Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi:
Missing values estimation for skylines in incomplete database. 66-75 - Omar A. Alzubi, Jafar Ahmad Abed Alzubi, Sara Tedmori, Hasan Rashaideh, Omar Almomani:
Consensus-based combining method for classifier ensembles. 76-86 - Nasour Bagheri, Seyed Farhad Aghili, Masoumeh Safkhani:
On the security of two ownership transfer protocols and their improvements. 87-93 - Praynlin Edinson, Latha Muthuraj:
Performance analysis of FCM based ANFIS and ELMAN neural network in software effort estimation. 94-102 - Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj:
UDP based IP traceback for flooding DDoS attack. 103-111 - Guruvayur Mahalakshmi, Vani Vijayan, Betina Antony:
Named entity recognition for automated test case generation. 112-120 - Abdul Kadar Muhammad Masum, Loo-See Beh, Md. Abul Kalam Azad, Kazi Hoque:
Intelligent human resource information system (i-HRIS): a holistic decision support framework for HR excellence. 121-130 - Houcine Boubaker, Aymen Chaabouni, Haikal El Abed, Adel M. Alimi:
GLoBD: geometric and learned logic algorithm for straight or curved handwriting baseline detection. 131-140 - Muhammad Sohail Khan, DoHyeun Kim:
Service process modelling and performance analysis for composite context provisioning in IoT. 141-147 - Kishorebabu Vasanth, Karuppaiyan Kumar, Nagarajan Govindan, Ravi Natarajan, Godwin Immanual:
Decision based detail preserving algorithm for the removal of equal and unequal probability salt and pepper noise in images and videos. 148-156 - Kavitha JeyaKumar, Manjula Dhanabalachandran, Kasthuri JeyaKumar:
Effective and efficient utility mining technique for incremental dataset. 157-166 - Suma Shivaraju, Gopalan Pudur:
Splay thread cooperation on ray tracing as a load balancing technique in speculative parallelism and GPGPU. 167-176
Volume 15, Number 2, March 2018
- Fidan Kaya Gülagiz, Süleyman Eken, Adnan Kavak, Ahmet Sayar:
Idle time estimation for bandwidth-efficient synchronization in replicated distributed file system. 177-185 - Kresimir Nenadic, Tomislav Galba, Irena Galic:
Image processing in differential digital holography (DDH). 186-193 - Sujatha Paramasivam, Radhakrishnan Murugesanadar:
An optimized model for visual speech recognition using HMM. 194-201 - Naveen Dahiya, Vishal Bhatnagar, Manjeet Singh:
A fuzzy based matrix methodology for evaluation and ranking of data warehouse conceptual models metrics. 202-212 - Rajarajan Srinivasan:
DragPIN: A secured PIN entry scheme to avert attacks. 213-223 - Shah Nazir, Sara Shahzad, Saeed Mahfooz, Muhammad Nazir:
Fuzzy logic based decision support system for component security evaluation. 224-231 - Sameer Qazi, Muhammad Bilal Kadri:
Revisiting constraint based geo location: improving accuracy through removal of outliers. 232-239 - Thinakaran Kandasamy, Rajasekar Rajendran:
Hybrid algorithm with variants for feed forward neural network. 240-245 - Kavitha Karthiekheyan, Irfan Ahmed, Jalaja Jayalakshmi:
Pair programming for software engineering education: an empirical study. 246-255 - Kazim Yildiz, A. Yilmaz Çamurcu, Buket Dogan:
Comparison of dimension reduction techniques on high dimensional datasets. 256-262 - Avisek Gupta, Kamal Sarkar:
Recognition of spoken bengali numerals using MLP, SVM, RF based models with PCA based feature summarization. 263-269 - Hassan Mohamed, Abdel-Azim Negm, Mohamed Zahran, Oliver Saavedra:
Assessment of ensemble classifiers using the bagging technique for improved land cover classification of multispectral satellite images. 270-277 - Md. Sazzad Hossain, Mohammad Abu Yousuf:
Real time facial expression recognition for nonverbal communication. 278-288 - Praneet Saurabh, Bhupendra Verma:
Immunity inspired cooperative agent based security system. 289-295 - Maragatha Valli, Kanmani Selvadurai:
Incorporating unsupervised machine learning technique on genetic algorithm for test case optimization. 296-302 - Sasikumar Kandasamy, Sivanandam Natarajan, Ayyasamy Sellappan:
A signaling system for quality of service (QoS)-aware content distribution in peer-to-peer overlay networks. 303-312 - Muthulakshmi Angamuthu, Akshaya Mani, Anitha Ramalingam:
Cipher text policy attribute based broadcast encryption for multi-privileged groups. 313-320 - Young-Chang Hou, Zen-Yu Quan, Chih-Fong Tsai:
Progressive visual cryptography with friendly and size invariant shares. 321-330 - Tran Khanh Dang, Phuong Huynh Van Quoc, Hai Truong:
A hybrid template protection approach using secure sketch and ANN for strong biometric key generation with revocability guarantee. 331-340 - Ayoub Kadim, Azzeddine Lazrek:
Parallel HMM-based approach for arabic part of speech tagging. 341-351
Volume 15, Number 3, May 2018
- Gomathi Ramalingam, Sharmila Dhandapani:
A hybrid batcs algorithm to generate optimal query plan. 353-359 - Abdul Khader Jilani Saudagar, Habeeb Vulla Mohammed:
Arabic character extraction and recognition using traversing approach. 360-368 - El-Sayed M. El-Alfy, Zubair A. Baig, Radwan E. Abdel-Aal:
A novel approach for face recognition using fused GMDH-based networks. 369-377 - Orasa Patsadu, Bunthit Watanapa, Piyapat Dajpratham, Chakarida Nukoolkit:
Fall motion detection with fall severity level estimation by mining kinect 3D data stream. 378-388 - Mahmoud Elmezain, Ayoub Al-Hamadi:
Vision-based human activity recognition using. 389-395 - Jun Hu, Li Zou, Ru Xu:
Bilateral multi-issue negotiation model for a kind of complex environment. 396-404 - Ahmad Karamollahi, Abdolah Chalechale, Mahmood Ahmadi:
Energy consumption improvement and cost saving by cloud broker in cloud datacenters. 405-411 - Pradeep Sahoo, Rajagopalan Parthasarthy:
An efficient web search engine for noisy free information retrieval. 412-418 - Hamdi Hassen, Aisha Zaidan, Maher Khemakhem:
Complementary approaches built as web service for arabic handwriting OCR systems via amazon elastic mapreduce (EMR) model. 419-428 - Adeel-ur-Rehman, Naveed Riaz:
Advanced architecture for java universal message passing (AA-JUMP). 429-434 - Salini Prabhakaran, Kanmani Selvadurai:
Performance analysis of security requirements engineering framework by measuring the vulnerabilities. 435-444 - Poongothai Marimuthu, Rajeswari Arumugam, Jabar Ali:
Hybrid metaheuristic algorithm for real time task assignment problem in heterogeneous multiprocessors. 445-453 - Sid-Ahmed-Djallal Midouni, Youssef Amghar, Azeddine Chikh:
A multimedia web service matchmaker. 454-461 - Elhachemi Guerrout, Ramdane Mahiou, Samy Ait-Aoudia:
Hidden markov random fields and particle swarm combination for brain image segmentation. 462-468 - Nallasamy Viswanathan, Kuppusamy Paramasivam, Kanagasabapathi Somasundaram:
Vertical links minimized 3D NoC topology and router-arbiter design. 469-478 - Kannan Paulraj, Nithya Natesan:
Effective technology based sports training system using human pose model. 479-484 - Deepak Ganeshiya, Dilip Kumar Sharma:
Hierarchicalrank: webpage rank improvement using HTML taglevel similarity. 485-492 - Ming Xu:
A new chaos-based image encryption algorithm. 493-498 - Ahlem Melouah, Soumia Layachi:
Overview of automatic seed selection methods for biomedical images segmentation. 499-504 - Hatem Abdul-Kader, Rashed K. Salem, Safaa Saleh:
Intelligent replication for distributed active real-time databases systems. 505-513
Volume 15, Number 3A, 2018
- Adnan Shaout, Brennan Crispin:
Using the MQTT protocol in real time for synchronizing IoT device state. 515-521 - Farida Retima, Saber Benharzallah, Laïd Kahloul, Okba Kazar:
A quality-aware context information selection based fuzzy logic in IoT environment. 522-531 - Ramzi Zouari, Houcine Boubaker, Monji Kherallah:
RNN-LSTM based beta-elliptic model for online handwriting script identification. 532-539 - Chérifa Ben Khelil, Chiraz Ben Othmane Zribi, Denys Duchier, Yannick Parmentier:
Building a syntactic-semantic interface for asemi-automatically generated TAG for arabic. 540-549 - Firas AlBalas, Majd Al-Soud, Omar Almomani, Ammar Almomani:
Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. 550-558 - Yaser A. Al-Lahham, Khawlah Matarneh, Mohammad Hasan:
Conditional arabic light stemmer: condlight. 559-564 - Ibtissem Hadj Ali, Mohamed Ali Mahjoub:
Dynamic random forest for the recognition of arabic handwritten mathematical symbols with a novel set of features. 565-575 - Duaa Abdelrazaq, Saleh M. Abu-Soud, Arafat Awajan:
A machine learning system for distinguishing nominal and verbal arabic sentences. 576-584 - Mustafa Al-Fayoumi, Salam Hamdan, Malek Al-Zewairi:
A new model of multi-key generation for RFID access control system. 585-591 - Ghassan Samara, Mohammad Aljaidi:
Aware-routing protocol using best first search algorithm in wireless sensor. 592-598 - Thabit Sabbah, Mosab Ayyash, Mahmood Ashraf:
Hybrid support vector machine based feature selection method for text classification. 599-609 - Imane Lahbari, Said Ouatik El Alaoui, Khalid Alaoui Zidani:
Toward a new arabic question answering system. 610-619 - Mahmoud Al-Ayyoub, Nour Alhuda Damer, Ismail Hmeidi:
Using deep learning for automatically determining correct application of basic quranic recitation rules. 620-625 - Issam Jebreen, Ahmad Alqerem:
Critical proficiencies for requirements analysts: reflect a real-world needs. 626-632
Volume 15, Number 4, July 2018
- Revathi Sujendran, Malathi Arunachalam:
Design and development of suginer filter for intrusion detection using real time network data. 633-638 - Priyanka Singh:
A robust blind watermarking scheme for ownership assertion of multi-band satellite images. 639-643 - Sulochana Subramaniam, Vidhya Rangasamy, Vijayasekaran Duraisamy, Mohanraj Karuppanan:
Application of framelet transform and singular value decomposition to image enhancement. 644-649 - Khairul Anwar Bin Kamarul Hatta, Kuokkwee Wee, Wooi Ping Cheah, Yit Yin Wee:
Bayesian information criterion in LTE downlink scheduling algorithm. 650-660 - Belal Abu Ata, Asma Al-Omari:
A rule-based algorithm for the detection of arud meter in classical arabic poetry. 661-667 - Feng Wang, Lei Shi, Weiguo Fan, Cong Wang:
Application of computational geometry in coal mine roadway 3D localization. 668-674 - Huan Doan, Dinh Nguyen:
A method for finding the appropriate number of clusters. 675-682 - Abdenour Mekhmoukh, Karim Mokrani:
Mr brain image segmentation using an improved kernel fuzzy local information c-means based wavelet, particle swarm optimization (PSO) initialization and outlier rejection with level set methods. 683-692 - Sathyashrisharmilha Pushparaj, Sakthivel Arumugam:
Using 3D convolutional neural network in surveillance videos for recognizing human actions. 693-700 - Khalid Nahar:
Off-line arabic hand-writingrecognition using artificial neural networkwith genetics algorithm. 701-707 - Lilibeth Coronel, Wilfredo Badoy, Consorcio Namoco:
Identification of an efficient filtering-segmentation technique for automated counting of fish fingerlings. 708-714 - Fouad Aouinti, M'barek Nasri, Mimoun Moussaoui, Bouchta Bouali:
An improved richardson-lucy algorithm based on genetic approach for satellite image restoration. 715-720 - Hasmukh Patel, Devesh Jinwala:
STF-DM: a sparsely tagged fragmentation with dynamic marking an IP traceback approach. 721-728 - Selvam Sheba, Ramadoss Balakrishnan, S. R. Balasundaram:
Social event detection - a systematic approach using ontology and linked open data with significance to semantic links. 729-738 - Kshiramani Naik, Arup Kumar Pal, Rohit Agrawal:
Selective image encryption using singular value decomposition and arnold transform. 739-747 - I Jasmine Selvakumari Jeya, J. Suganthi:
Using visible and invisible watermarking algorithms for indexing medical images. 748-755 - Imen Trabelsi, Dorra Ben Ayed, Noureddine Ellouze:
Evaluation of influence of arousal-valence primitives on speech emotion recognition. 756-762 - Rajeev Kumar, Satish Chand, Samayveer Singh:
A reversible data hiding scheme using pixel location. 763-768 - Ramesh Muthiya, Gomathy Balasubramanian, Sundararajan Paramasivam:
Pseudorandom noise sequence of digital watermarking algorithm based on discrete wavelet transform using medical image. 769-776 - Asima Latif, Shah Khusro, Nasir Ahmad, Irfan Ullah:
A hybrid technique for annotating book tables. 777-783
Volume 15, Number 5, September 2018
- Izzat Alsmadi, Mohammad Zarour:
Google n-gram viewer does not include arabic corpus! towards n-gram viewer for arabic corpus. 785-794 - Mohammed Abd-Elnaby, Mohamad Elhadad, El-Sayed El-Rabaie:
Capacity enhancement based on dynamically adapted PF scheduling algorithm for LTE downlink system. 795-801 - Shajeena Johnson:
Temporal tracking on videos with direction detection. 802-808 - Mohamed Y. Benzian, Nacéra Benamrane:
Medical image segmentation based on fuzzy controlled level set and local statistical constraints. 809-816 - Vamsee Muppavarapu, Archanaa Rajendran, Shriram K. Vasudevan:
Phishing detection using RDF and random forests. 817-824 - Nada Habeeb, Saad Hasson, Phil D. Picton:
Multi-sensor fusion based on DWT, fuzzy histogram equalization for video sequence. 825-830 - Bharat Singh, Om Prakash Vyas:
Maximum spanning tree based redundancy elimination for feature selection of high dimensional data. 831-841 - Amouda Venkatesan, Buvaneswari Shanmugham:
Auto-poietic algorithm for multiple sequence alignment. 842-849 - Behzad Nobariyan, Nasrin Amini, Sabalan Daneshvar, Ataollah Abbasi:
A novel architectureof medical image fusion based on YCbCr-DWT transform. 850-856 - Aman Jatain, Deepti Gaur:
Reverse engineering of object oriented system using hierarchical clustering. 857-865 - Purwanto, Chikkannan Eswaran:
Enhanced hybrid prediction models for time series prediction. 866-874 - Shuliang Sun:
Image steganography based on hamming code and edge detection. 875-880 - Ayman Al-Dmour, Ibrahim El Rube, Laiali Almazaydeh:
A new method for curvilinear text line extraction and straightening of arabic handwritten text. 881-888 - Namiq Abdullah:
Transfer-based arabic to english noun sentence translation using shallow segmentation. 889-893 - Shinu John, M. A. Maluk Mohamed:
A network performance aware QoS based workflow scheduling for grid services. 894-903 - Saravana Veligandan, Naganathan Rengasari:
Hyperspectral image segmentation based on enhanced estimation of centroid with fast k-means. 904-911 - Pradeep Singh, Shrish Verma:
Multi-classifier model for software fault prediction. 912-919 - Mohammed Akour, Ahmad A. Saifan, Osama Ratha'an:
Traceability between code and design documentation in database management system: a case study. 920-926 - Meena Ramasamy, Ramapackiam Shantha Selva Kumari:
Edge preserving image segmentation using spatially constrained EM algorithm. 927-933 - Sofien Gannouni, Ameur Touir, Hassan Mathkour:
Paradigma: a distributed framework for parallel programming. 934-943
Volume 15, Number 6, November 2018
- Munish Kumar, Manish Kumar Jindal, Rajendra Kumar Sharma:
A novel handwriting grading system using gurmukhi characters. 945-950 - Amal Rochd, Maria Zrikem, Thierry Millan, Christian Percebois, Claude Baron:
Synchrostate: A SPEM-based solution for synchronizing activities and products through state transitions. 951-961 - Anitha Periasamy, Periasamy Pappampalayam:
Security mechanism against sybil attacks for high-throughput multicast routing in wireless mesh networks. 962-967 - Shima Afzali, Oktay Yildiz:
An effective sample preparation method for diabetes prediction. 968-973 - Mohammed Al-Kabi, Izzat Alsmadi, Rawan T. Khasawneh, Heider Wahsheh:
Evaluating social context in arabic opinion mining. 974-982 - Md. Al-Amin Bhuiyan, Abdul Raouf Khan:
Image quality assessment employing RMS contrast and histogram similarity. 983-989 - Adwan Yasin, Abdelmunem Abuhasan:
Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). 990-999 - Suma Gandhimathi, Kavitha Pillai:
Detection of neovascularization in proliferative diabetic retinopathy fundus images. 1000-1009 - Sohail Sarwar, Zia Ul-Qayyum, Abdul Kaleem:
Machine learning based intelligent framework for data preprocessing. 1010-1015 - Ruchika Malhotra, Megha Khanna:
An empirical study to evaluate the relationship of object-oriented metrics and change proneness. 1016-1023 - Shervan Fekri Ershad, Seyed Mostafa Fakhrahmad, Farshad Tajeripour:
Impulse noise reduction for texture images using real word spelling correction algorithm and local binary patterns. 1024-1030 - Ahsan Abdullah, Ahmad Bakhashwain, Abdullah Basuhail, Muhammad Ahtisham Aslam:
Using data mining for predicting cultivable uncultivated regions in the middle east. 1031-1042 - Chih-Hao Wen, Shu-Hsien Liao, Shufang Huang:
Mining consumer knowledge from shopping experience: TV shopping industry. 1043-1051 - Bin Zhang, Xingchun Diao, Yi Liu, Yun Yu, Donghong Qin:
A physical topology discovery method based on AFTs of down constraint. 1052-1059 - Rajalaxmi Ramasamy, Sylvia Rani:
Modified binary bat algorithm for feature selection in unsupervised learning. 1060-1067 - Xiaohui Tan, Mingquan Zhou, Yachun Fan, Xuesong Wang, Zhongke Wu:
Explicitly symplectic algorithm for long-time simulation of ultra-flexible cloth. 1068-1075 - Jayashree Pillai, Theagarajan Padma:
Semi fragile watermarking for content based image authentication and recovery in the DWT-DCT domains. 1076-1081 - Malika Ait Aider, Kamal Hammouche, Djamel Gaceb:
Recognition of handwritten characters based on wavelet transform and SVM classifier. 1082-1087 - Sujan Kumar Saha, Mukta Majumder:
Development of a hindi named entity recognition system without using manually annotated training corpus. 1088-1098 - Khalil M. El Hindi:
Combining instance weighting and fine tuning for training naïve bayesian classifiers with scanttrainingdata. 1099-1106
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.