default search action
The International Arab Journal of Information Technology, Volume 19
Volume 19, Number 1, January 2022
- Yinglei Song, Jia Song, Junfeng Qu:
Optimal image based information hiding with one-dimensional chaotic systems and dynamic programming. 1-10 - Kalyana Saravanan Annathurai, Tamilarasi Angamuthu:
Sorensen-dice similarity indexing based weighted iterative clustering for big data analytics. 11-22 - Praphula Kumar Jain, Mani Shankar Bajpai, Rajendra Pamula:
A modified DBSCAN algorithm for anomaly detection in time-series data with seasonality. 23-28 - Shelly Garg, Jindal Balkrishan:
Skin lesion segmentation in dermoscopy imagery. 29-37 - Valliyammai Chinnaiah, Cinu C. Kiliroor:
Heterogeneous feature analysis on twitter data set for identification of spam messages. 38-44 - Shahzad Hassan, Maria Ahmad:
Energy heterogeneity analysis of heterogeneous clustering protocols. 45-54 - Yaqoob Al-Slais, Wael M. El-Medany:
User-centric adaptive password policies to combat password fatigue. 55-62 - Ali Gezer:
The delay measurement and analysis of unreachable hosts of internet. 63-71 - P. Sirish Kumar, V. B. S. Srilatha Indira Dutt, Ganesh Laveti:
GPS receiver position augmentation using correntropy kalman filter in low latitude terrain. 72-80 - Mohammad Karimi, Zahra Khandaghi, Mahsa Shahipour:
Designing an intelligent system to detect stress levels during driving. 81-89 - Yange Sun, Han Shao, Bencai Zhang:
Ensemble based on accuracy and diversity weighting for evolving data streams. 90-96 - Shiza Nawaz, Anam Zai, Salma Imtiaz, Humaira Ashraf:
Systematic literature review: causes of rework in GSD. 97-109 - Nesma Youssef, Hatem Abdul-Kader, Amira Abdelwahab:
Mining frequent sequential rules with an efficient parallel algorithm. 110-120 - Suriya Prakash Jambunathan, Suguna Ramadass, Palanivel Rajan Selva kumaran:
Analyzing the behavior of multiple dimensionality reduction algorithms to obtain better accuracy using benchmark KDD CUP dataset. 121-131 - Khalid Majrashi:
Voice versus keyboard and mouse for text creation on arabic user interfaces. 132-142
Volume 19, Number 2, March 2022
- Saravjeet Singh, Jaiteg Singh:
Map matching algorithm: empirical review based on indian openstreetmap road network data. 143-149 - Anup Bhat, Harish Venkatarama, Geetha Maiya:
Compact tree structures for mining high utility itemsets. 150-159 - Hamza Aldabbas, Dheeb Albashish, Khalaf Khatatneh, Rashid Amin:
An architecture of IoT-aware healthcare smart system by leveraging machine learning. 160-172 - Meisen Pan, Qi Xiong:
An improved iris localization method. 173-185 - Dhaya Ramakrishnan, Kanthavel Radhakrishnan:
Applying deep convolutional neural network (DCNN) algorithm in the cloud autonomous vehicles traffic model. 186-194 - Murugan Singaravelan, Bhuvaneswari Mariappan:
Reinforcement energy efficient ant colony optimization of mobile ad hoc multipath routing performance enhancement. 195-202 - Nasim Matar, Tirad AlMalahmeh, Bilal Sowan, Saheer Al-Jaghoub, Wasef Mater:
A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic. 203-213 - Mohammad Al-Mashhadani, Mohamed Shujaa:
IoT security using AES encryption technology based ESP32 platform. 214-223 - M. Suresh Chinnathampy, Aruna Thangavelu, Muthukumaran Narayanaperumal:
Performance analysis of efficient spectrum utilization in cognitive radio networks by dynamic spectrum access and artificial neuron network algorithms. 224-229 - Fen He, Kimia Rezaei Kalantrai, Ali Ebrahimnejad, Homayun Motameni:
An effective fault-tolerance technique in web services: an approach based on hybrid optimization algorithm of PSO and cuckoo search. 230-236 - Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Musa Osman, Ping Yang, Saeed H. Alsamhi:
An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique. 237-248 - Weijun Zhu, Huanmei Wu:
CTL model checking based on binary classification of machine learning. 249-260 - Shobana Manoharan, Poonkuzhali Sugumaran, Kishore Kumar:
Multichannel based IoT malware detection system using system calls and opcode sequences. 261-271 - Ömer Kasim:
An efficient ensemble architecture for privacy and security of electronic medical records. 272-280 - Yogesh Kumar, Shashi Kant Verma, Sandeep Sharma:
Multi-pose facial expression recognition using hybrid deep learning model with improved variant of gravitational search algorithm. 281-287
Volume 19, Number 3, May 2022
- Chian Techapanupreeda, Ekarat Rattagan, Werasak Kurutach:
A transaction security accountability protocol for electronic health systems. 289-297 - Imran Mujaddid Rabbani, Muhammad Aslam, Ana María Martínez Enríquez:
SAFRank: multi-agent based approach for internet services selection. 298-306 - Damjan Fujs, Simon Vrhovec, Damjan Vavpotic:
Towards personalized user training for secure use of information systems. 307-313 - Mohammad Abdallah, Mustafa Alrifaee:
A heuristic tool for measuring software quality using program language standards. 314-322 - Shamik Tiwari, Anurag Jain, Kusum Yadav, Rabie Ramadan:
Machine learning-based model for prediction of power consumption in smart grid. 323-329 - Fahd Saleh Alotaibi, Vishal Gupta:
Sentiment analysis system using hybrid word embeddings with convolutional recurrent neural network. 330-335 - Ashokraj Murugesan, Ananthi Govindasamay:
Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks. 336-341 - Onur Can Sert, Sibel Tariyan Özyer, Deniz Bestepe, Tansel Özyer:
Temptracker: a service oriented temporal natural language processing based tool for document data characterization and social network analysis. 342-352 - Mirza Sami, Ishrat Naiyer, Ehsanul Khan, Jia Uddin:
Improved semantic inpainting architecture augmented with a facial landmark detector. 353-362 - Hamidreza Ghaffari:
Choosing decision tree-based boundary patterns in the intrusion detection systems with large data sets. 363-369 - J. Daphney Joann, Vayanaperumal Rajamani:
Half-duplex and full-duplex performance comparison for different fading channel using HMR protocol in MIMO technology. 370-380 - Mourad Talbi, Med Salim Bouhlel:
A novel technique of noise cancellation based on stationary bionic wavelet transform and WATV: application for ECG denoising. 381-387 - Xiaogang Zhang, Lili Sun:
Research on the similarity between nodes with hypernymy/hyponymy relations based on IC and taxonomical structure. 388-395 - Shivani Jaswal, Manisha Malhotra:
AFTM-agent based fault tolerance manager in cloud environment. 396-402 - Akansha Tyagi, Sandhya Bansal:
Hybrid FiST_CNN approach for feature extraction for vision-based indian sign language recognition. 403-411
Volume 19, Number 3A, Special Issue 2022
- Adrian Bosire, Damian Maingi:
Driving signature analysis for auto-theft recovery. 413-421 - Maroua Grid, Leyla Belaiche, Laïd Kahloul, Saber Benharzallah:
An efficient parallel version of dynamic multi-objective evolutionary algorithm. 422-431 - Siham Amrouch, Sihem Mostefai:
A schema-free instance matching algorithm based on virtual document similarity. 432-441 - Omaimah Al Hosni, Andrew J. Starkey:
Assesing the stability and selection performance of feature selection methods under different data complexity. 442-455 - Adnan Shaout, Shanmukha Pattela:
Automotive embedded systems-model based approach review. 456-462 - Eman Hamdy, Osama Badawy, Mohamed Saad Zaghloul:
Densely convolutional networks for breast cancer classification with multi-modal image fusion. 463-469 - Shekhar Karanwal:
DWT and LBP map based feature descriptors for face recognition in harsh light variations. 470-477 - Isaac Kofi Nti, Owusu Narko-Boateng, Adebayo Felix Adekoya, Arjun Remadevi Somanathan:
Stacknet based decision fusion classifier for network intrusion detection. 478-490 - Zina Houhamdi, Belkacem Athamena, Ghaleb A. El Refae:
Retention contracts under partial information electoral competition case study. 491-500 - Ola M. Surakhi, Antonio Mora García, Mohammed Jamoos, Mohammad Y. Alkhanafseh:
The intrusion detection system by deep learning methods: issues and challenges. 501-513 - Ahmad Shatnawi, Abderraouf Drine, Mohammad Al-Zinati, Qutaibah Althebyan:
Analyzing the effect of driving speed on the performance of roundabouts. 514-522 - Muhammad Qasim Memon, Yu Lu, Shengquan Yu, Aasma Memon, Abdul Rehman Memon:
The critical feature selection approach using ensemble meta-based models to predict academic performances. 523-529 - Zohaib Ahmed, Muhammad Qasim Memon, Aasma Memon, Parveen Munshi, Muhammad Jaffar Memon:
Echo state network optimization using hybrid-structure based gravitational search algorithm with square quadratic programming for time series prediction. 530-535 - Afrah Mahmoud Mousa, Thorsten Auth, Anas Samara, Suhail M. Odeh:
Random walk generation and classification within an online learning platform. 536-543 - Thafer Y. Assaraira, Nouh Alhindawi, Saad Bani-Mohammad, Zaid A. Al-Anber, Zeid A. Albashaireh:
The jordanian universities experience in integrating online learning and its quality assurance. 544-565 - Jamila Hamdan Al-Aamri, Nour Eldin Elshaiekh Osman:
The role of artificial intelligence abilities in library services. 566-573
Volume 19, Number 4, July 2022
- Sakthidasan Sankaran:
Pattern Matching based Vehicle Density Estimation Technique for Traffic Monitoring Systems. 575-581 - Yetunde Akinwumi, Joshua Ojo Ayeni, Samson A. Arekete, Mba O. Odim, Adewale Opeoluwa Ogunde, Bosede Oyenike Oguntunde:
XAPP: An Implementation of SAX-Based Method for Mapping XML Document to and from a Relational Database. 582-588 - Sony P., Sureshkumar Nagarajan:
Semantic Interoperability Model in Healthcare Internet of Things Using Healthcare Sign Description Framework. 589-596 - Fanqi Meng, Xixi Xiao, Jingdong Wang:
Rating the Crisis of Online Public Opinion Using a Multi-Level Index System. 597-608 - Pratikkumar A. Barot, Harikrishna B. Jethva:
MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data. 609-616 - Mohammed Alghobiri, Khalid Mohiuddin, Mohammed Abdul Khaleel, Mohammad Islam, Samreen Shahwar, Osman Nasr:
A Novel Approach of Clustering Documents: Minimizing Computational Complexities in Accessing Database Systems. 617-628 - Haitham Issa, Qinmu Peng, Sali Issa, Xinge You, Ruijiao Peng, Jing Wang:
Person-Independent Emotion and Gender Prediction (EGP) System Using EEG Signals. 629-638 - Zoltan Kazi, Ljubica Kazi:
Software Project Duration Estimation Based on COSMIC Method Applied to Data Flow Diagram. 639-651 - Behnam Shamshirsaz, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti:
An Improved Process Supervision and Control Method for Malware Detection. 652-659 - Sana Fakhfakh, Yousra Ben Jemaa:
Deep Learning Shape Trajectories for Isolated Word Sign Language Recognition. 660-666 - Aravinda Chikmagalur Ventakaramu, Suresha Devaraj, Prakash Hebbakavadi Nanjundaiah, Kyasambally Rajasekhar Udayakumar Reddy:
Off-Line Signature Confirmation based on Cluster Representations of Geometrical and Statistical Features through Vector Distance, Neural Network and Support Vector Machine Classifiers. 667-673 - Chandrasekaran Sridharan, Sudhaman Parthasarathy:
A Simplified Alternate Approach to Estimate Software Size of Startups. 674-680 - Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib, Saqib Hakak:
Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings. 681-688 - Noor Mahmood:
Solving Capacitated Vehicle Routing Problem Using Meerkat Clan Algorithm. 689-694 - Pei Ma, Feng Yu, Changlong Zhou, Minghua Jiang:
Smoke Detection Algorithm based on Negative Sample Mining. 695-703
Volume 19, Number 5, September 2022
- Sameeah Noreen Hameed, Muhammad Adnan Ashraf, Yanan Qiao:
Multi-Lingual Language Variety Identification using Conventional Deep Learning and Transfer Learning Approaches. 705-712 - Praveen Pappula:
A Novel Binary Search Tree Method to Find an Item Using Scaling. 713-720 - Nikhila Thribhuvan, Sudheep Elayidom:
Transfer Learning for Feature Dimensionality Reduction. 721-727 - Ako Muhammad Abdullah, Emre Ozen, Husnu Bayramoglu:
Enhanced-AODV Routing Protocol to Improve Route Stability of MANETs. 736-746 - Aditya Bakshi, Sunanda Gupta:
Face Anti-Spoofing System using Motion and Similarity Feature Elimination under Spoof Attacks. 747-758 - Haider Dheyaa Kamil Al-janabi, Hussam Dheaa Kamel Al-Janabi, Bashar Qas Elias:
Secure of Transmission Systems in the Visible Range of Light with the Power Line Communication Interface. 759-764 - Kiran Sree Pokkuluri, S. S. S. N. Usha Devi Nedunuri:
Crop Disease Prediction with Convolution Neural Network (CNN) Augmented With Cellular Automata. 765-773 - Metin Bilgin, Nisanur Bulut:
Compatibility Themed Solution of the Vehicle Routing Problem on the Heterogeneous Fleet. 774-784 - GokulaKrishnan Elumalai, Malathi Ganesan:
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN. 785-792 - Hikmet Canli, Sinan Toklu:
AVL Based Settlement Algorithm and Reservation System for Smart Parking Systems in IoT-based Smart Cities. 793-801 - Ganesan Thangavel, Pothuraju Rajarajeswari:
A Novel Genetic Algorithm with db4 Lifting for Optimal Sensor Node Placements. 802-811 - Iyad F. Jafar, Khalid A. Darabkh, Fahed Jubair:
Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images. 812-821 - Azidine Guezzaz, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba:
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security. 822-830 - Soha A. Nossier, Mohamed R. M. Rizk, Saleh el Shehaby, Nancy Diaa Moussa:
Environmental Noise Adaptable Hearing Aid using Deep Learning. 831-841
Volume 19, Number 6, November 2022
- Mohamed Lazhar Bellagha, Mounir Zrigui:
Speaker naming in arabic TV programs. 843-853 - Ameer Badr, Alia Abdul Hassan:
VoxCeleb1: speaker age-group classification using probabilistic neural network. 854-860 - Ahmad Al-Jarrah, Mohammad Al-Jarrah, Amer Albsharat:
Dictionary based arabic text compression and encryption utilizing two-dimensional random binary shuffling operations. 861-872 - Lei Liu, Zheng Pei, Peng Chen, Zhisheng Gao, Zhihao Gan, Kang Feng:
An improved quantile-point-based evolutionary segmentation representation method of financial time series. 873-883 - Sunil Kumar Jha, Filip Josheski, Xiaorui Zhang, Zulfiqar Ahmad:
Neuroevolution of augmenting topologies for artificial evolution: a case study of kinesis of creature in the various mediums. 884-890 - Marriam Nawaz, Momina Masood, Ali Javed, Tahira Nazir:
Faceswap based deepfakes detection. 891-896 - Umadevi Ramamoorthy, Aruna Loganathan:
Analysis of video steganography in military applications on cloud. 897-903 - Emran Al-Buraihy, Wang Dan, Rafiullah Khan, Mohib Ullah:
An Ml-based classification scheme for analyzing the social network reviews of yemeni people. 904-914 - Bancha Luaphol, Jantima Polpinij, Manasawee Kaenampornpan:
Text mining approaches for dependent bug report assembly and severity prediction. 915-924 - Guruviah Karpagarajesh:
Implementation of multimode fiber in eight channels mimo multiplexing system by eliminating dispersion with optical grating methodologies. 925-931 - Malini Alagarsamy, Ameena Sahubar Sathik:
Context aware mobile application pre-launching model using KNN classifier. 932-941 - Saida Laaroussi, Si Lhoussain Aouragh, Abdellah Yousfi, Mohammed Nejja, Hicham Gueddah, Said Ouatik El Alaoui:
New language models for spelling correction. 942-948 - Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa:
Improved superpixels generation algorithm for qualified graph-based technique. 949-955 - Natarajan Sowri Raja Pillai, Ranganathan Rani Hemamalini:
Hybrid user acceptance test procedure to improve the software quality. 956-964 - K. Lakshmi Narayanan, R. Santhana Krishnan, Y. Harold Robinson:
A hybrid deep learning based assist system for detection and classification of breast cancer from mammogram images. 965-974
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.