


default search action
The International Arab Journal of Information Technology, Volume 16
Volume 16, Number 1, January 2019
- Murugan Raman, Reeba Korah

, Kavitha Tamilselvan
:
An automatic localization of optic disc in low resolution retinal images by modified directional matched filter. 1-7 - Shefa A. Dawwd:

GLCM based parallel texture segmentation using a multicore processor. 8-16 - Kanakasabhapathi Pillai, Muthayyan Jeyakumar:

A real time extreme learning machine for software development effort estimation. 17-22 - Satya Verma, Saravanan Chandran:

Contactless palmprint verification system using 2-D gabor filter and principal component analysis. 23-29 - Rajendra Chikkala, Sreenivasa Edara, Prabhakara Bhima:

Human facial image age group classification based on third order four pixel pattern (TOFP) of wavelet image. 30-40 - Soong Chen, Tiagrajah Janahiraman, Azizah Suliman:

Enhancement of human visual perception-based image quality analyzer for assessment of contrast enhancement methods. 41-47 - Kamalraj Durai:

Shamir's key basedconfidentialityon cloud data storage. 48-53 - Muhammad Shafiq ur Rehman, Aamer Nadeem, Muddassar A. Sindhu:

Towards automated testing of multi-agent systems using prometheus design models. 54-65 - Mohamed Fathimal, Arockia Jansirani:

New fool proof examination system through color visual cryptography and signature authentication. 66-71 - Tarek Dandashy, Mayez Al-Mouhamed, Irfan Khan:

A reliable peer-to-peer protocol for multi-robot operating in mobile ad-hoc wireless networks. 72-79 - Belal Amro, Albert Levi, Yücel Saygin:

Flexible fair and collusion resistant pseudonym providing system. 80-87 - Karpura Dheepan:

Security enhancement and certificate revocation in MANET using position and energy based monitoring. 88-97 - Anshu Parashar, Jitender Kumar Chhabra:

Assessing impact of class change by mining class associations. 98-107 - Devi Velayutham:

The shuffle on trajectories of infinite arrays. 108-115 - Arup Kumar Pal, Kshiramani Naik, Rohit Agrawal:

A steganography scheme on JPEG compressed cover image with high embedding capacity. 116-124 - Shah Nawaz Khan, Imran Usman:

Amodel for english to urdu and hindi machine translation system using translation rules and artificial neural network. 125-131 - Tanvi Arora:

A novel approach for segmentation of human metaphase chromosome images using region based active contours. 132-137 - Mubashir Ali, Shehzad Khalid, Muhammad Saleemi:

Comprehensive stemmer for morphologically rich urdu language. 138-147 - Aruna Malik, Geeta Sikka, Harsh Kumar Verma:

A high capacity data hiding scheme using modified AMBTC compression technique. 148-155 - Noureddine Aloui, Souha Bousselmi, Adnene Cherif:

New algorithm for speech compression based on discrete hartley transform. 156-162
Volume 16, Number 2, March 2019
- Nazri Kama, Sufyan Basri, Saiful Adli Ismail, Roslina Ibrahim, Haslina Md Sarkan:

Using static and dynamic impact analysis for effort estimation. 163-170 - Senthilvel Nataraj, Umamaheswari Sankareswaran, Senthiil Varadharajan, Hemamalini Thulasiram:

Scheduling with setup time matrix for sequence dependent family. 171-177 - Aisha Adel, Nazlia Omar, Mohammed Albared, Adel Al-Shabi:

Feature selection method based on statistics of compound words for arabic text classification. 178-185 - Jiange Zhang, Yuanbo Guo, Yue Chen:

Collaborative detection of cybersecurity threats in bigdata. 186-193 - Jagpreet Sidhu, Sarbjeet Singh:

Using the improved PROMETHEE for selection of trustworthy cloud database servers. 194-202 - Luai A. Al Shalabi:

Rough set-based reduction of incomplete medical datasets by reducing the number of missing values. 203-210 - Nadeem Akhtar, Saima Khan:

Formal architecture and verification of a smart flood monitoring system-of-systems. 211-216 - Dhirendra Singh, Nilay Khare:

Parallel batch dynamic single source shortest path algorithm and its implementation on GPU based machine. 217-225 - Jau-Ji Shen, Chun-Hsiu Yeh, Jinn-Ke Jan:

A new approach of lossy image compression based on hybrid image resizing techniques. 226-235 - Dariusz Jacek Jakóbczak:

Information analysis and 2D point extrapolation using method of hurwitz-radon matrices. 236-241 - Muazzam Maqsood, Hafiz Adnan Habib, Tabassam Nawaz:

An efficientmis pronunciation detection system using discriminative acoustic phonetic features for arabic consonants. 242-250 - Shaheen Ayyub, Praveen Kaushik:

Secure searchable image encryption in cloud using hyper chaos. 251-259 - Xuefeng Liu, Jingjing Fan, Jianhua Mao, Fenxiao Ye:

A low-power self-service bus arrival reminding algorithm on smart phone. 260-264 - Kesari Verma, Priyanka Tripathi, Sangram Panigrahi:

Optimal threshold value determination for land change detection. 265-274 - Brijesh Bakariya, Ghanshyam Singh Thakur:

An efficient algorithm for extracting infrequent itemsets from weblog. 275-280 - Poonam Yadav:

Case retrieval algorithm using similarity measure and fractional brain storm optimization for health informaticians. 281-287 - Kola Periyasamy, Saranya Arirangan:

Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). 288-294 - Nadia B. M. Karmani, Hsan Soussou, Adel M. Alimi:

Tunisian arabic chat alphabet transliteration using probabilistic finite state transducers. 295-303 - Mohammad Farukh Hashmi, Avinash G. Keskar:

Fast and robust copy-move forgery detection using wavelet transforms and SURF. 304-311 - Mohammad Keley, Ahmad Khademzadeh, Mehdi Hosseinzadeh:

Efficient mapping algorithm on mesh-based NoCs in terms of cellular learning automata. 312-322
Volume 16, Number 3, May 2019
- Mahmoud Mohammaddoust, Ali Harounabadi, Mohammadali Naizari:

Evaluation of grid computing environment using TOPSIS. 323-331 - Muhammad Khan, DoHyeun Kim:

Identifier (ID) based enhanced service for device communication and control in future networks. 332-337 - Gibran Benitez-Garcia, Mariko Nakano-Miyatake, Jesus Olivares-Mercado, Héctor Pérez-Meana, Gabriel Sanchez-Perez:

A low complexity face recognition scheme based on down sampled local binary patterns. 338-347 - Mukesh Mann, Pradeep Tomar, Om Prakash Sangwan:

Automated software test optimization using test language processing. 348-356 - Deepak Gupta, Anil K. Ahlawat:

Taxonomy of GUM and usability prediction using GUM multistage fuzzy expert system. 357-363 - Syed Shah, Mohammad Amjad:

Preceding document clustering by graph mining based maximal frequent termsets preservation. 364-370 - Youcef Gheraibia, Peng-Yeng Yin, Yiannis Papadopoulos, Abdelouahab Moussaoui, Smaine Mazouzi:

PeSOA: penguins search optimisation algorithm for global optimisation problems. 371-379 - Emel Alkim, Yalçin Çebi:

Machine translation infrastructure for turkic languages (MT-Turk). 380-388 - Shree Devi Ganesan, Munir Rabbani:

Contrast enhancement using completely overlapped uniformly decrementing sub-block histogram equalization for less controlled illumination variation. 389-396 - Yousef Rastegari, Fereidoon Shams:

A dynamic architecture for runtime adaptation of service-based applications. 397-406 - Rafat Alshorman:

Toward proving the correctness of TCP protocol using CTL. 407-414 - Muhammad Waqar Aziz, Syed Abdul Baqi Shah:

Evolutionary testing for timing analysis of parallel embedded software. 415-423 - Malek Ben Salem, Emna Bouazizi, Claude Duvallet, Rafik Bouaziz:

(m, k)-firm constraints and derived data management for the QoS enhancement in distributed real-time DBMS. 424-434 - Lili Yan, Yan Chang, Shibin Zhang:

An efficiency batch authentication scheme for smart grid using binary authentication tree. 435-441 - Kanokmon Rujirakul, Chakchai So-In:

Parallel optimized pearson correlation condition (PO-PCC) for robust cosmetic makeup facial recognition. 442-453 - Ruba Sultan, Hashem Tamimi, Yaqoub Ashhab:

Improving classification performance using genetic programming to evolve string kernels. 454-459 - Heithem Amich, Mohamed Ben Mohamed, Mounir Zrigui:

Multi-level improvement for a transcription generated by automatic speech recognition system for arabic. 460-466 - Mustafa Salam, Alia Abdul Hassan:

Offline isolated arabic handwriting character recognition system based on SVM. 467-472 - Hanaa Mohammed, Gamal Attiya, Sami M. El-Dolil:

New class-based dynamic scheduling strategy for self-management of packets at the internet routers. 473-481 - Meera Annamalai, Swamynathan Sankaranarayanan:

Cloud data center design using delay tolerant based priority queuing model. 482-491
Volume 16, Number 3A, Special Issue 2019
- Adnan Shaout, Dhanush Mysuru, Karthik Raghupathy:

Vehicle condition, driver behavior analysis and data logging through CAN sniffing. 493-498 - Souha El Katat, Ali Kalakech, Mariam Kalakech, Denis Hamad:

Financial development indicators: a comparative study between lebanon and middle east countries based on data mining techniques. 499-505 - Mariam Khader, Arafat Awajan, Ghazi Al-Naymat:

The impact of natural language preprocessing on big data sentiment analysis. 506-513 - Khadidja Belbachir, Redouane Tlemsani:

Temporal neural system applied to arabic online characters recognition. 514-524 - Samar Sindian, Abed Ellatif Samhat, Matthieu Crussière, Jean-François Hélard, Ayman Khalil:

Mesh HDR WPAN resource allocation optimization approaches. 525-532 - Musa Alyaman, Alaa Abd-Raheem, Farah AlDeiri:

Design of an automated extraoral photogrammetry 3D scanner. 533-539 - Kassem Ahmad, Omar Mohammad, Mirna Atieh, Hussein Ramadan:

Enhanced performance and faster response using new IoT litetechnique. 548-556 - Zeinab Abbas, Ali Saad, Mohammad Ayache, Chadi Fakih:

Applications of logistic regression and artificial neural network for ICSI prediction. 557-564 - Suhair AlHajHassan, Mohammed Odeh, Stewart Green, Asem Mansour:

An ontology-based i*goal-oriented referential integrity model in systems of systems context. 565-576 - Mohammad Sabri, Mohammed Odeh, Mohammed Saad:

Deriving object-based business process architecture using knowledge management enablers. 577-586 - Ahmad Drak, Alexander Asteroth:

Autonomous track and follow UAV for aerodynamic analysis of vehicles. 587-593 - Ali Haroun, Hussein Sharafeddin, Ali Al Ghouwayel:

Vertical shuffle scheduling-based decoder for joint MIMO detection and channel decoding. 594-599 - Oussama Zahwe, Hassan Harb, Hussein Nasrallah:

Design of acoplanar circulator based on thick and thin ferrite film. 600-608 - Zaylaa Amer, Ahmad Diab, Mohamad Khalil, Catherine Marque:

Automatic monodimensional EHG contractions' segmentation. 609-615
Volume 16, Number 4, July 2019
- Siva Shanmugam, Sriman Iyengar:

Improving energy efficiency and impairing environmental impacts oncloud centers by transforming virtual machine into self-adaptive resource container. 617-623 - Arun Kumar Yadav, Divakar Yadav:

Wavelet tree based dual indexing technique for geographical search. 624-632 - Pham Phuoc Hung, Md. Golam Rabiul Alam, Hai Nguyen, Tho Quan, Eui-Nam Huh:

A dynamic scheduling method for collaborated cloud with thick clients. 633-643 - Faiza Tila, Do Kim:

Modelling and analysis of a semantic sensor service provider ontology. 644-650 - Meriem Lahrouni, Eric Cariou, Abdelaziz El Fazziki:

A black-box and contract-based verification of model transformations. 651-660 - Saddaf Rubab, Mohd Fadzil Hassan, Ahmad Kamil Mahmood, Syed Nasir Mehmood Shah:

QoS based multi-constraints bin packing job scheduling heuristic for heterogeneous volunteer grid resources. 661-668 - Nageswara Reddy, Mohan Rao, Chittipothula Satyanarayana:

A novel face recognition system by the combination of multiple feature descriptors. 669-676 - Asuman Günay, Vasif V. Nabiyev:

A novel age classification method using morph-based models. 677-685 - Dalton Meitei Thounaojam, Khelchandra Thongam, Thokchom Jayshree, Sudipta Roy, Khumanthem Manglem Singh:

Colour histogram and modified multi-layer perceptron neural network based video shot boundary detection. 686-693 - Emad Elabd, Hatem Abdul-Kader, Waleed Ead:

Securely publishing social network data. 694-702 - Krishna Bhowal, Debasree Chanda Sarkar, Sushanta Biswas, Partha Pratim Sarkar:

An efficient steganographic approach to hide information in digital audio using modulus operation. 703-711 - Anirban Goswami, Ritesh Mukherjee, Soumit Chowdhury, Nabin Ghoshal:

Digital signature protocol for visual authentication. 712-719 - Bassam Rajabi, Sai Peck Lee:

Change management framework to support UML diagrams changes. 720-730 - Dhanalakshmi Selvarajan, Abdul Samath Abdul Jabar, Irfan Ahmed:

Comparative analysis of PSO and ACO based feature selection techniques for medical data preservation. 731-736 - Mudassir Rafi, Susanta Mukhopadhyay:

Texture segmentation from non-textural background using enhanced MTC. 737-745 - Balakrishnan Senthilnayaki, K. Venkatalakshmi, Arputharaj Kannan:

Intrusion detection system using fuzzy rough set feature selection and modified KNN classifier. 746-753 - Yang Lu, Quanling Zhang, Jiguo Li:

A certificate-based AKA protocol secure against public key replacement attacks. 754-765 - Muhammad Sharif, Jamal Hussain Shah:

Automatic screening of retinal lesions for grading diabetic retinopathy. 766-774 - Mabrouka Hagui, Mohamed Ali Mahjoub, Faycel ElAyeb:

A new framework for elderly fall detection using coupled hidden markov models. 775-783 - Le Cheng, Yanhong Song, Yuetang Bian:

Cockroach swarm optimization using aneighborhood-based strategy. 784-790
Volume 16, Number 5, September 2019
- Yefeng Li, Jiajin Le, Mei Wang:

A mapreduce-based quick search approach on large files. 791-797 - Mamatha Elliriki, C. Chandra Sekhar Reddy, Krishna Anand:

An efficient line clipping algorithm in 2D space. 798-807 - Zeinab Fallahshojaei, Mehdi Sadeghzadeh:

Parameter tuning of neural network for financial time series forecasting. 808-815 - Ramalingaswamy Cheruku, Damodar Reddy Edla, Venkatanareshbabu Kuppili:

An optimized and efficient radial basis neural network using cluster validity index for diabetes classification. 816-826 - Mohammed Mekideche, Youcef Ferdi:

Edge detection optimization using fractional order calculus. 827-832 - Lija Mohan, Sudheep Elayidom:

Predicting the winner of delhi assembly election, 2015 from sentiment analysis on twitter data-a bigdata perspective. 833-842 - Ekin Ekinci, Sevinç Ilhan Omurca:

A new approach for a domain-independent turkish sentiment seed lexicon compilation. 843-853 - KeXin Yin, Wanlong Li, Ming Hu, Jianqi Zhu:

Simulating email worm propagation based on social network and user behavior. 854-861 - Farrukh Chughtai, Riaz ul Amin, Abdul Sattar Malik, Nausheen Saeed:

Performance analysis of microsoft network policy server and freeRADIUS authentication systems in 802.1x based secured wired ethernet using PEAP. 862-870 - Balamurugan Balasubramanian, Kamalraj Durai, Jegadeswari Sathyanarayanan, Sugumaran Muthukumarasamy:

Tree based fast similarity query search indexing onoutsourced cloud data streams. 871-878 - Mustafa Kaiiali, Auwal Iliyasu, Ahmad Samer Wazan, Adib Habbal, Yusuf Muhammad:

A cloud-based architecture for mitigating privacy issues in online social networks. 879-888 - Xiaorong Cheng, Tianqi Li:

A trusted virtual network construction method based on data sources dependence. 889-893 - Fu Zhang, Qiang Tong, Jingwei Cheng:

A novel and complete approach for storing RDF(S) in relational databases. 894-903 - Srinivasan Rajarajan, Ponnada Priyadarsini:

UTP: a novel PIN number based user authentication scheme. 904-913 - Ramzi Halimouche, Hocine Teffahi:

Detecting sentences types in the standard arabic language. 914-921 - Rishikesh Misal, Boominathan Perumal:

Data deduplication for efficient cloud storage and retrieval. 922-927 - Padmaveni Krishnan, D. John Aravindhar:

Self-adaptive PSO memetic algorithm for multi objective workflow scheduling in hybrid cloud. 928-935 - Venkatrama Phani Kumar Sistla, Venkata Krishna Kishore Kolli, Kamakshi Prasad Valurouthu:

A novel adaptive two-phase multimodal biometric recognition system. 936-946 - Minhaj Khan:

EncCD: a framework for efficient detection of code clones. 947-952 - Bilgin Metin, Haldun Köktas:

Sentiment analysis with term weighting and word vectors. 953-959
Volume 16, Number 6, November 2019
- Saihua Cai, Shangbo Hao

, Ruizhi Sun, Gang Wu:
Mining recent maximal frequent itemsets over data streams with sliding window. 961-969 - Eman K. Elsayed, Doaa Fathy:

Evaluation of quran recitation via OWL ontology based system. 970-977 - Meijia Wang, Qingshan Li, Yishuai Lin, Yingjian Li, Bo-Yu Zhou:

A personalized metasearch engine based on multi-agent system. 978-987 - Xiaoxia Zhao, Wenjun Meng, Jinhu Su, Yuxuan Chen:

Parameter optimization of single sample virtually expanded method. 988-994 - Omar Al-Harbi:

Classifying sentiment of dialectal arabic reviews: a semi-supervised approach. 995-1002 - Xi Luo, Ying An:

A proactive caching scheme based on content concentration in content-centric networks. 1003-1012 - Djilali Dahmani, Sid Ahmed Rahal, Ghalem Belalem:

A new approach to improve association rules for big data in cloud environment. 1013-1020 - Venkatanareshbabu Kuppili, Mainak Biswas, Damodar Reddy Edla:

PLDL: a novel method for label distribution learning. 1021-1027 - Abrar Khan, Umar Shoaib, Muhammad Sarfraz:

A comprehensive study of modern and high speed TCP-variant in linux kernel: TCP CUBIC. 1028-1035 - Hayri Sever, Ahmet Senol, Ersin Elbasi:

Block size analysis for discrete wavelet watermarking and embedding a vector image as a watermark. 1036-1043 - Yange Sun, Zhihai Wang, Jidong Yuan, Wei Zhang:

Tracking recurring concepts from evolving data streams using ensemble method. 1044-1052 - Nenad Milic, Brankica Popovic, Sasa Mijalkovic, Darko Marinkovic:

The influence of data classification methods on predictive accuracy of kernel density estimation hotspot maps. 1053-1062 - Djamal Ziani:

Correlation dependencies between variables in feature selection on boolean symbolic objects. 1063-1073 - Abiodun Oguntimilehin, Olusola Adetunmbi, Innocent Osho:

Towards achieving optimal performance using stacked generalization algorithm: a case study of clinical diagnosis of malaria fever. 1074-1081 - Nor Azrini Jaafar, Nor Azman Ismail, Kamarul Azmi Jasmi, Yusman Azimi Yusoff:

Optimal dual cameras setup for motion recognition in salat activity. 1082-1089 - Ali Gezer, Gary Warner:

Exploitation of ICMP time exceeded packets for a large-scale router delay analysis. 1090-1097 - Meng Han, Jian Ding, Juan Li:

PatHT: an efficient methodof classification over evolving data streams. 1098-1105 - Ranjeeth Kumar Sundararajan, Umamakeswari Arumugam:

FBMT: fuzzy based merkle technique for detecting and mitigating malicious nodes in sensor networks. 1106-1113 - Mohamed Biniz, Mohamed Fakir:

An ontology alignment hybrid method based on decision rules. 1114-1120 - Akhtar Rasool, Gulfishan Firdose Ahmed, Raju Barskar, Nilay Khare:

Efficient multiple pattern matching algorithm based on BMH: MP-BMH. 1121-1130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














