


default search action
The International Arab Journal of Information Technology, Volume 14
Volume 14, Number 1, January 2017
- Xia Zhai, Weiwei Guo, Yongqin Zhang, Jinsheng Xiao, Xiaoguang Hu:

Joint image denoising and demosaicking by low rank approximation and color difference model. 1-7 - Tamilb Vairavan, Kaliyaperumal Vani:

An efficient age estimation system with facial makeover images based on key points selection. 8-17 - Sibarama Panigrahi:

A novel hybrid chemical reaction optimization algorithm with adaptive differential evolution mutation strategies for higher order neural network training. 18-25 - Lakhdar Derdouri, Congduc Pham, Mohamed Benmohammed:

Analysis of hybrid router-assisted reliable multicast protocols in lossy networks. 26-34 - Shizhe Tan, Fengyuan Zhang, Quanming Huang:

A study on multi-screen sharing system using H.264/AVC encoder. 35-40 - Senthil Suganantham, Chitra Babu, Madhumitha Raju:

A quantitative evaluation of change impact reachability and complexity across versions of aspect oriented software. 41-52 - Anusuya Venkatesan, Latha Parthiban:

Medical image segmentation with fuzzy C-Means and kernelized fuzzy C-Means hybridized on PSO and QPSO. 53-59 - Poonkuzhali Sugumaran, Kishore Ravi, Thirumurugan Shanmugam:

A novel algorithm for enhancing search results by detecting dissimilar patterns based on correlation method. 60-69 - Fiaz Majeed, Muhammad Shoaib:

Logical schema-based mapping technique to reduce search space in the data warehouse for keyword-based search. 70-79 - Matin Abdullah, Al-Sakib Pathan, Imad Al-Shaikhli:

A web and software-based approach blending social networks for online qur'anic arabic learning. 80-90 - Revathy Subramanion, Parvathavarthini Balasubramanian, Shajunisha Noordeen:

Enforcement of rough fuzzy clustering based on correlation analysis. 91-98 - Fatma-Zohra Chelali, Amar Djeradi:

Audiovisual speaker identification based on lip and speech modalities. 99-110 - Ammad Usmani, Ali Daud:

Unified author ranking based on integrated publication and venue rank. 111-117 - Ch. Muhammad Shahzad Faisal, Ali Daud, AbuBakr Akram:

Expert ranking using reputation and answer quality of co-existing users. 118-126 - Mohammed Djedid, Abdallah Chouarfia:

A novel authentication mechanism protecting users' privacy in pervasive systems. 127-137 - Hachemi Bennaceur, Zakir Ahmed:

Frequency model based crossover operators for genetic algorithms applied to the quadratic assignment problem. 138-145
Volume 14, Number 2, March 2017
- Sudha Krishnan, Sudhakar Radhakrishnan:

Compression of medical images through DPCM coding of multi resolution and multidirectional subbands. 146-151 - Pandarinathan Radhakrishnan, Selvadurai Kanmani, Malaiyappan Nandhini:

Pair programming: a teaching and learning tool for defending student's mental energy. 152-158 - Osama Alfarraj, Ahed Abugabah:

Extending information system models to the health care context: an empirical study and experience from developing countries. 159-167 - Lotfi Abdi, Faten Ben Abdallah, Aref Meddeb:

Real-time watermarking algorithm of H.264/AVC video stream. 168-174 - Sherly Kuriakose, Raju Nedunchezhian:

Efficient adaptive frequent pattern mining techniques for market analysis in sequential and parallel systems. 175-185 - Hassiba Nemmour, Youcef Chibani:

Artificial immune algorithm for handwritten arabic word recognition. 186-194 - Mohamed Salah Benselim, Hassina Seridi-Bouchelaghem:

Towards a UML profile for context-awareness domain. 195-207 - Shomona Gracia Jacob, Geetha Raju:

Software defect prediction in large space systems through hybrid feature selection and classification. 208-214 - Areej Al-Zaidi, Rizwan Qureshi:

Global software development geographical distance communication challenges. 215-222 - Yun-Fei Jia, Renbiao Wu:

An approach for identifying failure-prone state of computer system. 223-229 - Basem Almadani, Shadi Abudalfa, Shuang-Hua Yang:

QoS adaptation for publish/subscribe middleware in real-time dynamic environments. 230-238 - Saad Bin Ahmed, Saeeda Naz, Salahuddin Swati, Muhammad Imran Razzak, Arif Iqbal Umar:

UCOM offline dataset-an urdu handwritten dataset generation. 239-245 - Soudeh Babaeizadeh, Rohanin Ahmad:

Enhanced constrained artificial bee colony algorithm for optimization problems. 246-253 - Steven Lawrence Fernandes, G. Josemin Bala:

A comparative study on various state of the art face recognition techniques under varying facial expressions. 254-259 - Ghazaleh Eslami, Abolfazl Toroghi Haghighat, Saeed Farokhi:

New replica server placement strategies using clustering algorithms and SOM neural network in CDNs. 260-266 - Abdulla F. Ally, Ning Zhang:

Effects of network structures and fermi function's parameter β in promoting information spreading on dynamic social networks. 267-273
Volume 14, Number 3, May 2017
- Sarumathi Sengottaian, Shanthi Natesan, Sharmila Mathivanan:

Weighted delta factor cluster ensemble algorithm for categorical data clustering in data mining. 275-284 - Kavitha Chinniyan, Sudha Gangadharan, Kiruthika Sabanaikam:

Semantic similarity based web document classification using support vector machine. 285-292 - Parneeta Sidhu, Mohinder Bhatia:

Online approach to handle concept drifting data streams using diversity. 293-299 - Balamurugan Rengeswaran, Natarajan Mathaiyan, Kandhasamy Premalatha:

Cuckoo search with mutation for biclustering of microarray gene expression data. 300-306 - Minh Nguyen Hieu, Hai Nam, Nikolay A. Moldovyan, Giang Tien:

New blind signature protocols based on a new hard problem. 307-313 - Radhakrishnan Ayyapazham, V. Kavitha:

Proficient decision making on virtual machine creation in IaaS cloud environment. 314-323 - Tajuddeen R. Gwadabe, Mohammad Shukri Salman:

A new leaky-LMS algorithm with analysis. 324-331 - Wahiba Karaa, Thabet Slimani:

A new approach for arabic named entity recognition. 332-338 - Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:

Improved identification protocol in the quantum random oracle model.. 339-345 - Manuel Flores, Gualberto Aguilar-Torres, Gina Gallegos-García, Miguel Licona:

Fingerprint verification methods using delaunay triangulations. 346-354 - Teng Lv, Ping Yan, Weimin He:

Mapping XML to inverted indexed circular linked lists. 355-361 - Yongfeng Cui, Shi Dong, Wei Liu:

Feature selection algorithm based on correlation between muti metric network traffic flow features. 362-371 - Zhenhua Huang, Jiawen Zhang, Zheng Liu, Bo Zhang, Dong Wang:

Skyline recommendation in distributed networks. 372-379 - Yacine Djebar, Mohamed Tahar Kimour, Nouredine Guersi:

A feature model metrics-based approach to develop a software product line. 380-392 - Suat Secgin, Gökhan Dalkiliç:

A decision support system using demographic issues: a case study in turkey. 393-401 - Omar M. Wahdan, Mohammad Faidzul Nasrudin, Khairuddin Omar:

Shearing invariant texture descriptor from a local binary pattern and its application in paper fingerprinting. 402-412
Volume 14, Number 4, July 2017
- Chang-Kyun Jeon, Neunghoe Kim, Hoh In:

A probabilistic approach to building defect prediction model for platform-based product lines. 413-422 - Zeki Oralhan, Burcu Oralhan, Yavuz Yigit:

Smart city application: internet of things (IoT) technologies based smart waste collection using data mining approach and ant colony optimization. 423-427 - Bhuvana Shanmugam, Radhakrishnan Rathinavel, Tamije Selvy Perumal, Subhakala Subbaiyan:

An efficient perceptual of CBIR system using MIL-SVM classification and SURF feature extraction. 428-435 - Roya Asadi, Mitra Asadi, Shokoofeh Asadi:

An unsupervised feed forward neural network method for efficient clustering. 436-441 - Saini Kumar, Challa Krishna, Kushwaha Singh:

A new way of accelerating web by compressing data with back reference-prefer geflochtener. 442-447 - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:

A new (k, n) secret image sharing scheme (SISS). 448-456 - Sobia Mahalingam, Valarmathi Lakshapalam, Saranya Ekabaram:

Image compression based on iteration-free fractal and using fuzzy clustering on DCT coefficients. 457-463 - Hazem M. El-Bakry, Ibrahim M. El-Henawy, Hagar El-Hadad:

Muzzle classification using neural networks. 464-472 - Naresh Kumar Nagwani:

A bi-level text classification approach for sms spam filtering and identifying priority messages. 473-480 - Hikmat Ullah Khan, Ali Daud:

Using machine learning techniques for subjectivity analysis based on lexical and non-lexical features. 481-487 - Aissa Amrouche, Leila Falek, Hocine Teffahi:

Design and implementation of a diacritic arabic text-to-speech system. 488-494 - Md. Imdadul Islam, Md. Mezbahul Islam, Rahmina Rubaiat, Abu Sayed Md. Mostafizur Rahaman, M. Ruhul Amin:

Pattern recognition using the concept of disjoint matrix of MIMO system. 495-501 - Dhiaa Musleh, Khaldoun Halawani, Sabri A. Mahmoud:

Fuzzy modeling for handwritten arabic numeral recognition. 502-511 - Meisen Pan, Jian-jun Jiang, Fen Zhang, Qiusheng Rong:

Medical image registration and fusion using principal component analysis. 512-520 - Nidaa A. Abbass, Jahanshah Kabudian:

Speech scrambling based on independent component analysis and particle swarm optimization. 521-527 - Manipoonchelvi Pandivalavan, Muneeswaran Karuppiah:

Saliency detection for content aware computer vision applications. 528-533 - Quanchao Liu, Heyan Huang, Chong Feng:

Simultaneously identifying opinion targets and opinion-bearing words based on multi-features in chinese micro-blog texts. 534-542
Volume 14, Number 4A, Special Issue 2017
- Issam Jebreen, Ahmad Alqerem:

Empirical study of analysts' practices in packaged software implementation at small software enterprises. 543-551 - Djamal Bennouar:

An automatic grading system based on dynamic corpora. 552-564 - Rachid Ahdid, Said Safi, Bouzid Manaut:

Euclidean and geodesic distance between a facial feature points in two-dimensional face recognition system. 565-571 - Youssef Khmou, Said Safi:

Lorentzian model of spatially coherent noise field in narrowband direction finding. 572-577 - Farida Retima, Saber Benharzallah, Laid Kahloul, Okba Kazar:

A comparative analysis of context-management approaches for the internet of things. 578-585 - Rawad Hammad, Mohammed Odeh, Zaheer Abbas Khan:

Elem: a novel e-learner experience model. 586-597 - Mariam M. Biltawi, Arafat Awajan, Sara Tedmori, Akram Al-Kouz:

Exploiting multilingual wikipedia to improve arabic named entity resources. 598-607 - Yassine Chajri, Belaid Bouikhalene, Abdelkrim Maarir:

Segmentation of text/graphic from handwritten mathematical documents using gabor filter. 608-613 - Ilhame Agnaou, Belaid Bouikhalene:

New approach for 3d object forms detection using a new algorithm of SUSAN descriptor. 614-623 - Ahmed Adart, Hicham Mouncif, Mohamed Naimi:

Vehicular ad-hoc network application for urban traffic management based on markov chains. 624-631 - Mohamed Er-rouidi, Houda Moudni, Hassan Faouzi, Hicham Mouncif, Abdelkrim Merbouha:

Enhancing energy efficiency of reactive routing protocol in mobile ad-hoc network with prediction on energy consumption. 632-638 - Mohamed Elleuch, Ansar Hani, Monji Kherallah:

Arabic handwritten script recognition system based on HOG and gabor features. 639-646 - Tareq Alhmiedat, Amer O. Abu Salem:

A hybrid range-free localization algorithm for zigbee wireless sensor networks. 647-653 - Aya Nuseir, Mahmoud Al-Ayyoub, Mohammed Al-Kabi, Ghassan G. Kanaan, Riyad Al-Shalabi:

Improved hierarchical classifiers for multi-way sentiment analysis. 654-661
Volume 14, Number 5, September 2017
- Qaisar Abbas, Tanzila Saba:

An improved statistical model of appearance under partial occlusion. 663-669 - Salim Khiat, Hafida Belbachir, Sidi Ahmed Rahal:

Rule schema multi-level for local patterns analysis: application in production field. 670-680 - Amine Benzenache, Hamid Seridi, Herman Akdag:

Features modelling in discrete and continuous hidden markov models for handwritten arabic words recognition. 681-690 - Muhammad Sohail Khan, DoHyeun Kim:

Service-oriented process modelling for device control in future networks. 691-697 - Hussain Dawood, Hassan Dawood, Ping Guo:

Generalization of impulse noise removal. 698-706 - Amandeep Kaur, Vishal Gupta:

A novel approach for sentiment analysis of punjabi text using SVM. 707-712 - Rachid Zaghdoudi, Hamid Seridi:

Combination of multiple classifiers for off-line handwritten arabic word recognition. 713-720 - Ahmed Jafar, Mohammed Fakhr, Mohamed Farouk:

Enhanced clustering-based topic identification of transcribed arabic broadcast news. 721-728 - Mahmood Ahmed, Muhammad Shoaib:

A metrics driven design approach for real time environment application. 729-737 - Mehmet Gül, Sadik Kara, Abdurrahman Isikdogan, Yusuf Yarar:

Diagnosis of leptomeningeal metastases disease in mri images by using image enhancement methods. 738-746 - Kola Periyasamy, Jayadharini Jaiganesh, Kanchan Ponnambalam, Jeevitha Rajasekar, Arputharaj Kannan:

Analysis and performance evaluation of cosine neighbourhood recommender system. 747-754 - Osama A. Mehdi, Hamidah Ibrahim, Lilly Suriani Affendey:

An approach for instance based schema matching with google similarity and regular expression. 755-763 - Sadagopan Padmakala, Ganapathy AnandhaMala:

Interactive video retrieval using semantic level features and relevant feedback. 764-773 - Hamidreza Hosseinzadeh, Farbod Razzazi:

An SNR unaware large margin automatic modulations classifier in variable SNR environments. 774-781 - Jasmina Vasovic, Miroslav Radojicic, Stojan Vasovic, Zoran Nesic:

Multi-criteria selection of the computer configuration for engineering design. 782-789 - Shadi Nashwan:

SAK-AKA: a secure anonymity key of authentication and key agreement protocol for LTE network. 790-801
Volume 14, Number 6, November 2017
- Mojeeb Al-Khiaty, Radwan E. Abdel-Aal, Mahmoud O. Elish:

Abductive network ensembles for improved prediction of future change-prone classes in object-oriented software. 803-811 - Jean De Dieu Nkapkop, Joseph Yves Effa, Monica Borda, Laurent Bitjoka, Alidou Mohamadou:

Chaotic encryption scheme based on a fast permutation and diffusion structure. 812-819 - Emna Hkiri, Souheyl Mallat, Mounir Zrigui, Mourad Mars:

Constructing a lexicon of arabic-english named entity using SMT and semantic linked data. 820-825 - Mohammed Awad:

Forecasting of chaotic time series using RBF neural networks optimized by genetic algorithms. 826-834 - Said Gadri, Abdelouahab Moussaoui:

Contextual text categorization: an improved stemming algorithm to increase the quality of categorization in arabic text. 835-841 - Aymen Abdullah Alsaffar, Pham Phuoc Hung, Eui-Nam Huh:

An architecture of thin client-edge computing collaboration for data distribution and resource allocation in cloud. 842-850 - Meng Han, Jian Ding, Juan Li:

TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model. 851-860 - Ines Chihi, Afef Abdelkrim, Mohamed Benrejeb:

Internal model control to characterize human handwriting motion. 861-869 - Mazen Abdullah Bahashwan, Syed A. R. Abu-Bakar, Usman Ullah Sheikh:

Efficient segmentation of arabic handwritten characters using structural features. 870-879 - Wenhui Li, Jinlong Zhu, Huiying Li, Qiong Wu, Liang Zhang:

A novel swarm intelligence algorithm for the evacuation routing optimization problem. 880-889 - Brindha Palanisamy, Senthilkumar Athappan:

The veracious counting bloom filter. 890-896 - Ganesan Periyanagounder, Sivakumar Selvarasu, Sundar Subbiah:

A MMDBM classifier with CPU and CUDA GPU computing in various sorting procedures. 897-906 - Samiullah Khan, Mohammad Abdul Qadir:

Inter-path OOS packets differentiation based congestion control for simultaneous multipath transmission. 907-913 - Egambaram Kodhai, Selvadurai Kanmani:

Method-level code clone detection for java through hybrid approach. 914-922 - Arumugam Sakthivel:

Enhancing cloud security based on group signature. 923-929

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














