default search action
Journal of Computers, Volume 13
Volume 13, Number 1, January 2018
- Moshiur Bhuiyan, Farzana Haque, Luba Shabnam:
Integration of Organisational Models and UML Use Case. 1-17 - Hayet Mekami, Sidahmed Benabderrahmane, Abdennacer Bounoua, Abdelmalik Taleb-Ahmed:
Local Patterns and Big Time Series Data for Facial Poses Classification. 18-34 - Ippei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii:
Development of Objective Index to Determine Autism by Eyeball Movements. 35-43 - Jian-min Liu, Min-hua Yang:
Deep Learning-Based Classification of Remote Sensing Image. 44-48 - Ryusuke Miyamoto, Risako Aoki:
Classification Accuracy of Personal Identification Based on Joint Motions Using 2D Information. 49-57 - Rong Chen, Hutian Feng:
Service Robots Adaptive Mutual-coupled Immune Network Planning Algorithm Research Based on the Distance-weighted. 58-68 - Qi Zhang, Ning He, Yue Chi:
Circular Traffic Sign Detection in Natural Scenes. 69-76 - Seyed Reza Nabavi, Seyed Morteza Mousavi:
A Review of Distributed Dynamic Key Management Schemes in Wireless Sensor Networks. 77-89 - Yoshio Kakizaki, Shiomi Nishibiro, Ryôichi Sasaki:
A Mixed Content Awareness Tool for Safe Browsing. 90-99 - Mutlaq B. Alotaibi:
Predicting Switching Behaviour of e-Service Users toward m-Services: An Empirical Investigation. 100-115 - Praseetha V. M., Ankit Bansal, S. Vadivel:
Mobile-Cloudlet Face Recognition: Two Different Approaches. 116-129 - Wafa Ghonaim, Shereen A. Taie:
A New Image Segmentation Algorithm Based on Particle Swarm Optimization and Rough Set. 130-138
Volume 13, Number 2, February 2018
- Nihal Yagmur Aydin, Tunga Güngör:
A Rule-Based Approach for Converting Wikipedia Content into Semantic Relations. 139-145 - Ruben Nuredini, Bekim Fetaji, Ivan Chorbev:
Bio-inspired Obstacle Avoidance: From Animals to Intelligent Agents. 146-153 - Martin Fittner, Christian Brandstatter:
How Human Inspired Learning Enhances the Behavior of Autonomous Agents. 154-160 - Ruben Nuredini:
Reactive Vision-Based Navigation Controller for Autonomous Mobile Agents. 161-167 - Diego Uribe, Enrique Cuan:
Multi-agent Approach to the Two-Second Driving Rule. 168-175 - Feng-Jian Wang, Yen-Hao Chiu, Chia-Ching Wang, Kuo-Chan Huang:
A Referral-Based QoS Prediction Approach for Service- Based Systems. 176-186 - Christian Brandstatter, Martin Fittner:
Enabling Smart Navigation by Incorporating Human Inspired Evaluation of Route Sections. 187-193 - Goutham Reddy Alavalapati, Eun-Jun Yoon, Young-Ju Kim, Kee-Young Yoo:
Design of a Secure Mutually Authenticated Key-Agreement Protocol for Multi-server Architecture. 194-203 - Mehdi Taassori, Sener Uysal:
Effective Routing Algorithm and Topology on Power Consumption in Networks on Chip. 204-211 - Usman Zafar, Moshiur Bhuiyan, P. W. C. Prasad, Farzana Haque:
Integration of Use Case Models and BPMN Using Goal- Oriented Requirements Engineering. 212-221 - Thanh Tu Vo, Thai-Ngoc Luong:
VRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network. 222-235 - Mortaza Abbaszadeh, Saeed Saeedvand:
Weak Consistency Model in Distributed Systems Using Hierarchical Colored Petri Net. 236-243
Volume 13, Number 3, March 2018
- Emad Aboelela, Raghied Atta, Khalid S. Aloufi:
Design and Implementation of a Wireless Sensor Network Based Scalable Monitoring System (WiSe-SMS). 244-261 - Yaser M. Khamayseh, Wail Mardini, Nadhir Ben Halima:
Evolutionary Algorithm for Scheduling in Wireless Sensor Networks. 262-270 - Yoshitaka Itoh, Masaharu Adachi:
A Quantitative Method for Evaluating Reconstructed One-Dimensional Bifurcation Diagrams. 271-278 - Georgios Velianitis, Kareem Adel, Sabrina Kotrba, Bindosh Paul Manavalan:
Comparison of VoIP and TETRA Regarding Security in a Safety Critical Environment. 279-286 - Ar Kar Kyaw, Hong Phat Truong, Justin Joseph:
Low-Cost Computing Using Raspberry Pi 2 Model B. 287-299 - Adel Binajjaj, Tarek R. Sheltami, Farouq Aliyu, Mohammed Kaosar:
Design and Implementation of a Wearable Gas Sensor Network for Oil and Gas Industry Workers. 300-308 - Behrouz Fathi Vajargah, Mohadeseh Kanafchian, Vassil Alexandrov:
Image Encryption Based on Permutation and Substitution Using Clifford Chaotic System and Logistic Map. 309-326 - Hana Anber, Akram Salah, A. A. Abd El-Aziz:
Analysis of Major Events in Egypt Based on Twitter. 327-336 - Kushal Pokhrel, Nitul Dutta, Mrinal Kanti Ghose, Hemali Vithalani, Hiren Kumar Deva Sarma, Zdzislaw Pólkowski:
Binding Lifetime Based Signaling Cost Analysis of Multilayer MIPv6. 337-350 - Swarup Kumar Mohalik, Mahesh Babu Jayaraman, Ramamurthy Badrinath, Aneta Vulgarakis Feljan:
HIPR: An Architecture for Iterative Plan Repair in Hierarchical Multi-agent Systems. 351-359 - Amalina F. A. Fadzlah:
A New Evaluation Method for Measuring the Effectiveness of Mobile Applications: A Mathematical Modelling Approach. 360-370
Volume 13, Number 4, April 2018
- Earle Jennings:
Simultaneous Multi-processor Cores for Efficient Embedded Applications. 371-382 - Mitat Uysal, Aysun Güran, Mustafa Zahid Gürbüz, Celal Barkan Güran:
The Effect of Neighborhood Functions on Migrating Birds Optimization for Continuous Domain. 383-392 - Manuel Jasch, Thomas Weber, Matthias Rätsch:
Fast and Robust RGB-D Scene Labeling for Autonomous Driving. 393-400 - Weimei Zhao, Jiakai Wang:
Research on Electric Micro-Meteorological Disaster Monitoring and Early Warning Technology. 401-406 - Phi Giang Pham, Mao Lin Huang:
Quantitative Approach on Parallel Coordinates and Scatter Plots for Multidimensional-Data Visual Analytics. 407-416 - Bahadir Akbal:
Hybrid GSA-ANN Methods to Forecast Sheath Current of High Voltage Underground Cable Lines. 417-425 - Andrej Zentner, Robert Kudelic:
Multithreading in .Net and Java: A Reality Check. 426-441 - Yongbae Kim, Jongweon Kim:
Improvement of SURF against Geometrical Distortions. 442-449 - Mehmet Beskirli, Ismail Koc, Halife Kodaz:
Individual Parameter Selection Strategy for Artificial Algae Algorithm (AAA). 450-460 - Seyfeddine Zouana, Djamel Eddine Zegour:
Red Green Black Trees: Extension to Red Black Trees. 461-470 - Nuray At, Hakan Senel, Raed S. M. Daraghma:
Multi-hop Efficent Protocol for ZigBee, Bluetooth Low- Energy and ANT Sensor nodes. 471-479 - Recep Özdag:
Optimization of Target Q-Coverage Problem for QoS Requirement in Wireless Sensor Networks. 480-489
Volume 13, Number 5, May 2018
- Xuechao Li, Po-Chou Shih, Xueqian Li, Cheryl D. Seals:
A Case Study of Novice Programmers on Parallel Programming Models. 490-502 - Ahyoung Kim, Junwoo Lee, Mucheol Kim:
Usage-Centric Mobile Business Performance Metrics: Framework and Case Study. 503-510 - Svetlana Kolesnikova, Danil Melnik, Roman Kulikov, Yuriy A. Gatchin:
Hypervisor Security Analyses Based on Ishikawa Methodology. 511-518 - Duo Wang, Guojin He, Weili Jiao:
Research on Remote Sensing Image Fusion Based on Compressive Sensing Algorithm. 519-526 - Phuc Tran Huu Le, Nguyen Tam Nguyen Truong, Minsu Kim, Wonshoup So, Jae Hak Jung:
Applying Theta* in Modern Game. 527-536 - Burak Yilmaz, Akif Durdu, Güzin Özmen:
Brain Image Segmentation Using Multistable Cellular Neural Networks. 537-544 - Ki-Su Kim, Hyo-Jeong Shin, Hyong-Shik Kim:
A Bit Vector Based Binary Code Comparison Method for Static Malware Analysis. 545-554 - Eduardo André Neves, Samuel Xavier de Souza:
Exploring Multi-core Design Space: Heracles vs. Rocket Chip Generator. 555-563 - Moteasem Abu-Dawas:
Psycho-Diagnostic Subsystem of Computer Personalized Learning Systems. 564-570 - Nadia Abd-Alsabour:
On the Role of Dimensionality Reduction. 571-579 - Chahinez Mérièm Bentaouza, Mohamed Benyettou:
Support Vector Machine Applied to Compress Medical Image. 580-587
Volume 13, Number 6, June 2018
- Akimi Oyanagi, Ren Ohmura:
Conditions for Inducing Sense of Body Ownership to Bird Avatar in Virtual Environment. 5 - Jian Di, Xinyue Gou:
Bisecting K-means Algorithm Based on K-valued Selfdetermining and Clustering Center Optimization. 588-595 - Filip Schramka, Stefan Arisona, Michael Joos, Alexander Erath:
Development of a Virtual Reality Cycling Simulator. 603-615 - Syed Muhammad Usman, Ali Hassan:
Efficient Prediction and Classification of Epileptic Seizures Using EEG Data Based on Univariate Linear Features. 616-621 - Aimad Eddine Debbi:
Data-Flow Programming Paradigm for High Level Synthesis Improvement. 622-637 - Eman K. Elsayed, Enas E. El-Sharawy:
Detecting Design Level Anti-patterns; Structure and Semantics in UML Class Diagrams. 638-654 - Vivaksha J. Jariwala:
Privacy Preserving Secure Data Aggregation for Wireless Sensor Networks. 655-677 - Ali Senol, Hacer Karacan, M. Ali Akcayol:
Genetic Algorithm and Fuzzy Logic Based Flexible Querying in Databases. 678-691 - Tehreem Hussain, Kiran Atta, Narmeen Zakaria Bawany, Tehreem Qamar:
Passwords and User Behavior. 692-704 - Shahram Behzad, Reza Fotohi, Jaber Hosseini Balov, Mohammad Javad Rabipour:
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks. 705-720 - Zita Nadia, Yannes Martinus Pasaribu, Imam Damar Djati:
Expectations and Ideal VRUI from User's Perspective, Case Studies: VR Interface in ITB Electric Car's (Molina) Virtual Exhibition. 721-732
Volume 13, Number 7, July 2018
- Sujata Basnet, Ashab Abid, Moshiur Bhuiyan, P. W. C. Prasad:
A Conceptual Framework for Smart Homecare. 733-749 - Kokila Harshan Ramanayaka, Xianqiao Chen, Bing Shi:
Identifying Dimensions and Their Measuring Items for Library Website Usability Acceptance Model: Instrument Development and Validation. 750-760 - Raad Bin Tareaf, Philipp Berger, Patrick Hennig, Sebastian Koall, Jan Kohstall, Christoph Meinel:
Information Propagation Speed and Patterns in Social Networks: A Case Study Analysis of German Tweets. 761-770 - Sravanthi Vallaboju, P. W. C. Prasad, Abeer Alsadoon, Manoranjan Paul, Amr Elchouemi:
Bioinformatics Image Based Decision Support System for Bone Cancer Detection. 771-783 - Dongyang Chen, Ling Shen, Jianjun He:
A Soft Sensing Method for Temperature of Large-Scale Aging Furnace Forgings Based on Grey System Theory. 784-793 - Mostafa Akhavansaffar, Ali Nakhaei, Mostafa Mokhtari Ardakan:
A Security Architecture for Use in Mobile Medical and Electronic Health. 794-804 - Xiaofang Zhang, Xiaoli Lin, Rana Aamir Raza Ashfaq:
Impact of Different Random Initializations on Generalization Performance of Extreme Learning Machine. 805-822 - Mona Mona Mona Najafi Sarpiri, Taghi Javdani Gandomani, Mahsa Teymourzadeh, Akram Motamedi:
A Hybrid Method for Spammer Detection in Social Networks by Analyzing Graph and User Behavior. 823-829 - Parisa Nasirinejad, Ali Reza Honarvar:
Collecting User Preferences from User Activities on E-Commerce Web-Site Focusing on Sending Targeted Advertisements. 830-838 - Sikandar Ali, Hongqi Li, Siffat Ullah Khan, Zhongguo Yang:
Practices in Software Outsourcing Partnership: Systematic Literature Review Protocol with Analysis. 839-861 - Shahram Zandiyan, Abbas Mirzaei Somarin:
A Reliable Based Multicast Approach Using by Fuzzy Logic System for Improvement QoS in Mobile Ad-hoc Networks. 862-875 - Mostafa Akhavansaffar, Ali Nakhaei, Mostafa Mokhtari Ardakan:
A Multimodal Biometric Authentication System Using Ear and Face. 876-888
Volume 13, Number 8, August 2018
- Humphrey Emesowum, Athanasios Paraskelidis, Mo Adda:
Fault Tolerance and Graceful Performance Degradation in Cloud Data Center. 889-896 - Wenjie Li, Xiaoming Yu:
Community Discovery Algorithm Based on Ant Colony and Signal Transfer. 897-904 - Isis Bonet, Widerman Montoya, Andrea Mesa Múnera, Juan Fernando Alzate:
Recursive Clustering Using Different Features Sets for Metagenomic Data. 905-912 - Rashed K. Salem, Samah Abd Elrahman, Mohammed Hassan:
A Cloud-Based Data Integration Framework for E-Government Service. 913-923 - Ye Du, Kaiming Li, Xiong Xiao:
A Novel Small-World Immune Algorithm and It's Application to Robot Path Planning. 924-935 - Ala Abdulhakim Alariki, Sayed Mahmoud, Mohammad Reza Yousufi, Mohammad Tareq Aziz, Christine Murray:
A Review Study of Heartbeat Biometric Authentication. 936-947 - Rabiaa Elkamel, Asma Messaoudi, Adnane Cherif:
Advanced Centralized Clustering: A Novel Protocol for Energy Efficient in Wireless Sensor Network. 948-954 - Mohamed Salim El Bazzi, Driss Mammass, Abdelatif Ennaji, Taher Zaki:
Toward a Complex System for Context Discovery to Index Arabic Documents. 955-962 - Elvis Popovic, Nikola Ivkovic:
Distributed Simulations of Physical Phenomena Based on Windows Machines. 963-970 - Sihem Chabchoub, Yemna Sayeb, Henda Ben Ghézala:
Using Hypergraphs Models for CIS Modelling. 971-978 - Leticia Dávila-Nicanor:
Risk Scenarios on Web Applications. 979-987 - Julius Schöning, Gunther Heidemann, Ulf Krumnack:
Structure from Neuronal Networks (SfN²). 988-999
Volume 13, Number 9, September 2018
- Fadi Imad, Sharifah Mumtazah Syed Ahmad, Shaiful J. Hashim, Khairulmizam Samsudin, Marwan Ali:
Real-Time Pen Input System for Writing Utilizing Stereo Vision. - Yang Syu, Yong-Yi Fanjiang:
Applying Computational Intelligence Techniques to QoS Time Series Forecasting in Services Computing. 1010-1026 - Sheqi Zhang, Xiangmei Dou:
Research on Clustering and Classification for the Green Edition of Southern Weekend. 1027-1036 - Takuya Ibaraki, Yoshifumi Manabe:
Privacy-Preserving Group Matching Protocol. 1037-1041 - Liang Liang, Guangxin Zhu, Yuqian Li, Junjun Hu:
Design and Implementation of A Cross-Database Query Tool on Multi-Source Databases. 1042-1052 - Saad M. Darwish, Hosam A. Selim, Mohamed M. El-Sherbiny:
Distortion Free Database Watermarking System Based on Intelligent Mechanism for Content Integrity and Ownership Control. 1053-1066 - Sagnik Majumder, Christoph von der Malsburg, Aashish Richhariya, Surekha Bhanot:
Handwritten Digit Recognition by Elastic Matching. 1067-1074 - Mohammad Soltani, Amid Khatibi Bardsiri:
Designing A Novel Hybrid Algorithm for QR-Code Images Encryption and Steganography. 1075-1088 - Luciana Abednego, Cecilia E. Nugraheni, Irvan Rinaldy:
Forex Trading Robot with Technical and Fundamental Analysis. 1089-1097 - Safaa Achour, Mohammed Benattou:
A Model Based Testing Approach for Java Bytecode Programs. 1098-1114 - Hamidreza Iranmanesh, Ahmad Afshar:
Soft Switching Model Predictive Control with An Increase in the Security of Calculations and Information. 1115-1126 - Dhanya Raghu, Apoorva K. H, Anjana Anil Kumar, S. Natarajan:
Dynamic Models for Entity Trajectory Prediction Using Deep Learning. 1127-1135
Volume 13, Number 10, October 2018
- Peter Miele, Mohammed Alquwaisuwaisuwais uwaisem, Dae-Kyoo Kim:
Comparative Assessment of Static Analysis Tools for Software Vulnerability. 1136-1144 - Qiaoqiao Li, Guoyue Chen, Xingguo Zhang, Kazuki Saruta, Yuki Terata:
Image Inpainting Based on Sparse Representation with Histogram Dictionary. 1145-1155 - Toshiya Kawato, Shinichi Motomura, Masayuki Higashino, Takao Kawamura:
Auto-construction for Distributed Storage System Reusing Used Personal Computers. 1156-1163 - Xin Jin:
Research on Optimization of Intelligent Warehousing Business of State Grid Based on Genetic Algorithm. 1164-1170 - Francisco Pérez-Arribas, Leonardo Fernández-Jambrina:
Computer-Aided Design of Developable Surfaces: Designing with Developable Surfaces. 1171-1176 - Elham Yari:
Investigating the Relationship between Electronic Commerce, Innovation and Technology with Customer Satisfaction. 1177-1184 - Can Gao, Yumei Song, Jiajie Shen, Yuanyuan Li:
Solving Location Problem of Distribution Center Based on Hybrid Particle Swarm Algorithm. 1185-1191 - Masayuki Higashino, Toshiya Kawato, Takao Kawamura:
A Design with Mobile Agent Architecture for Refactoring A Monolithic Service into Microservices. 1192-1201 - Jalil Boudjadar:
Compositional Schedulability Analysis of Multicore Modular Avionic Architectures. 1202-1215 - Eman K. Elsayed, Wafaa Ghonaim, Eman Zeaar:
Semantic Crime Investigation System. 1216-1226 - Shiyu Sara Huang, Chou in Luk, Liping Zhou, Yu Sun:
An Intelligent Mobile System to Predict Blood Sugar Level for Gestational Diabetes Patients Using Machine Learning. 1227-1234
Volume 13, Number 11, November 2018
- Ting-Sheng Weng:
The Influences of Producing A Story on Lifetime Expenditures by Integrating Knowledge and Software on Students. 1235-1245 - Jian Xu, Chunyu Wang, Jiulun Fan:
Reverse Sparse Representation for Single Image Super-Resolution. 1246-1264 - Nadia Abd-Alsabour:
Parallel Evolutionary Algorithms and High Dimensional Optimization Problems. 1265-1271 - Yanqun Wang, Guoliang Li, Zhenqi Fan, Xianqiang Gao:
Study on Monitoring Methods of Nitrogen Nutrition in Cotton Leaves Based on Android Platform. 1272-1278 - Xiang Fu, Yi Jiang, Yong Huang, Guimei Zhang, Ying Chen:
Line Matching Method Based on Related Points and Geometric Constraints. 1279-1289 - Rania Salah El-Sayed:
Linear Discriminant Analysis for An Efficient Diagnosis of Heart Disease via Attribute Filtering Based on Genetic Algorithm. 1290-1299 - Xuejun Liu, Bixian Yuan, Yunqi Zhang, Yuchen Wei, Zefang Zhang, Hao Lu, Bo Dai:
A Quick Detection Method of Corner Point of Hazardous Chemicals Stacking Based on Angle Coefficient. 1300-1308 - Afaf Abdelkader Abdelhafiz:
Tuples: A New Scheduling Algorithm. 1309-1315 - Chen-Lin Lee:
Exploring the Introduction of Cloud Computing into Medical Information Systems. 1316-1322 - Yi Wen, Dazhi Pan:
Dynamic Adaptive Multi-cuckoo Search Algorithm. 1323-1334
Volume 13, Number 12, December 2018
- Sakie Horiuchi, Takuji Tachibana:
Dynamic Replacement of Virtual Service Resources Based on Tree Topology for Mobile Users in Virtual Networks. 1335-1348 - Ming Ye, Zhisai Shi, Guangyuan Liu:
An Improved CNN Structure Model for Image Classification Recognition. 1349-1356 - Hong Zhu, Huiwen Ren, Jianhui Chang, Yueming Hu:
Optimizing Overlap Reductions of Feature Regions for Image Registration. 1357-1365 - Jasman Pardede, Benhard Sitohang, Saiful Akbar, Masayu Leylia Khodra:
SVM Relevance Feedback in HSV Quantization for CBIR. 1366-1384 - Xianwei Rong, Heting Nie, Weihan Wang, Cunyi Lin, Xiaoyan Yu:
SPIHT-Based Image Compression Using Optimization of LIS and LIP Encoding. 1385-1394 - Farrukh Jabeen, Mushtaq Ali, Amanullah Baloch, Faqir Gul:
A Survey of Multi-panel Image Segmentation Methods. 1395-1402 - Ran Gao, Qi Liu:
Facial Keypoints Detection with Deep Learning. 1403-1410 - Raouia Bouabdallah, Soufiene Lajmi, Khaled Ghédira:
OCCI Extension for Autonomic Negotiation in the Cloud Federation. 1411-1431 - Zhenqi Fan, Yujing Tian, Yanqun Wang:
Construction of the Morphological Structure Model of Overground Part of Naturally-Colored Cotton in Alaer Reclamation Area in Xinjiang. 1432-1441 - Guoying Liu, Feng Gao:
Oracle-Bone Inscription Recognition Based on Deep Convolutional Neural Network. 1442-1450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.