


default search action
The International Arab Journal of Information Technology, Volume 14
Volume 14, Number 1, January 2017
- Xia Zhai, Weiwei Guo, Yongqin Zhang, Jinsheng Xiao, Xiaoguang Hu:
Joint image denoising and demosaicking by low rank approximation and color difference model. 1-7 - Tamilb Vairavan, Kaliyaperumal Vani:
An efficient age estimation system with facial makeover images based on key points selection. 8-17 - Sibarama Panigrahi:
A novel hybrid chemical reaction optimization algorithm with adaptive differential evolution mutation strategies for higher order neural network training. 18-25 - Lakhdar Derdouri, Congduc Pham, Mohamed Benmohammed:
Analysis of hybrid router-assisted reliable multicast protocols in lossy networks. 26-34 - Shizhe Tan, Fengyuan Zhang, Quanming Huang:
A study on multi-screen sharing system using H.264/AVC encoder. 35-40 - Senthil Suganantham, Chitra Babu, Madhumitha Raju:
A quantitative evaluation of change impact reachability and complexity across versions of aspect oriented software. 41-52 - Anusuya Venkatesan, Latha Parthiban:
Medical image segmentation with fuzzy C-Means and kernelized fuzzy C-Means hybridized on PSO and QPSO. 53-59 - Poonkuzhali Sugumaran, Kishore Ravi, Thirumurugan Shanmugam:
A novel algorithm for enhancing search results by detecting dissimilar patterns based on correlation method. 60-69 - Fiaz Majeed, Muhammad Shoaib:
Logical schema-based mapping technique to reduce search space in the data warehouse for keyword-based search. 70-79 - Matin Abdullah, Al-Sakib Pathan, Imad Al-Shaikhli:
A web and software-based approach blending social networks for online qur'anic arabic learning. 80-90 - Revathy Subramanion, Parvathavarthini Balasubramanian, Shajunisha Noordeen:
Enforcement of rough fuzzy clustering based on correlation analysis. 91-98 - Fatma-Zohra Chelali, Amar Djeradi:
Audiovisual speaker identification based on lip and speech modalities. 99-110 - Ammad Usmani, Ali Daud:
Unified author ranking based on integrated publication and venue rank. 111-117 - Ch. Muhammad Shahzad Faisal, Ali Daud, AbuBakr Akram:
Expert ranking using reputation and answer quality of co-existing users. 118-126 - Mohammed Djedid, Abdallah Chouarfia:
A novel authentication mechanism protecting users' privacy in pervasive systems. 127-137 - Hachemi Bennaceur, Zakir Ahmed:
Frequency model based crossover operators for genetic algorithms applied to the quadratic assignment problem. 138-145
Volume 14, Number 2, March 2017
- Sudha Krishnan, Sudhakar Radhakrishnan:
Compression of medical images through DPCM coding of multi resolution and multidirectional subbands. 146-151 - Pandarinathan Radhakrishnan, Selvadurai Kanmani, Malaiyappan Nandhini:
Pair programming: a teaching and learning tool for defending student's mental energy. 152-158 - Osama Alfarraj, Ahed Abugabah:
Extending information system models to the health care context: an empirical study and experience from developing countries. 159-167 - Lotfi Abdi, Faten Ben Abdallah, Aref Meddeb:
Real-time watermarking algorithm of H.264/AVC video stream. 168-174 - Sherly Kuriakose, Raju Nedunchezhian:
Efficient adaptive frequent pattern mining techniques for market analysis in sequential and parallel systems. 175-185 - Hassiba Nemmour, Youcef Chibani:
Artificial immune algorithm for handwritten arabic word recognition. 186-194 - Mohamed Salah Benselim, Hassina Seridi-Bouchelaghem:
Towards a UML profile for context-awareness domain. 195-207 - Shomona Gracia Jacob, Geetha Raju:
Software defect prediction in large space systems through hybrid feature selection and classification. 208-214 - Areej Al-Zaidi, Rizwan Qureshi:
Global software development geographical distance communication challenges. 215-222 - Yun-Fei Jia, Renbiao Wu:
An approach for identifying failure-prone state of computer system. 223-229 - Basem Almadani, Shadi Abudalfa, Shuang-Hua Yang:
QoS adaptation for publish/subscribe middleware in real-time dynamic environments. 230-238 - Saad Bin Ahmed, Saeeda Naz, Salahuddin Swati, Muhammad Imran Razzak, Arif Iqbal Umar:
UCOM offline dataset-an urdu handwritten dataset generation. 239-245 - Soudeh Babaeizadeh, Rohanin Ahmad:
Enhanced constrained artificial bee colony algorithm for optimization problems. 246-253 - Steven Lawrence Fernandes, G. Josemin Bala:
A comparative study on various state of the art face recognition techniques under varying facial expressions. 254-259 - Ghazaleh Eslami, Abolfazl Toroghi Haghighat, Saeed Farokhi:
New replica server placement strategies using clustering algorithms and SOM neural network in CDNs. 260-266 - Abdulla F. Ally, Ning Zhang:
Effects of network structures and fermi function's parameter β in promoting information spreading on dynamic social networks. 267-273
Volume 14, Number 3, May 2017
- Sarumathi Sengottaian, Shanthi Natesan, Sharmila Mathivanan:
Weighted delta factor cluster ensemble algorithm for categorical data clustering in data mining. 275-284 - Kavitha Chinniyan, Sudha Gangadharan, Kiruthika Sabanaikam:
Semantic similarity based web document classification using support vector machine. 285-292 - Parneeta Sidhu, Mohinder Bhatia:
Online approach to handle concept drifting data streams using diversity. 293-299 - Balamurugan Rengeswaran, Natarajan Mathaiyan, Kandhasamy Premalatha:
Cuckoo search with mutation for biclustering of microarray gene expression data. 300-306 - Minh Nguyen Hieu, Hai Nam, Nikolay A. Moldovyan, Giang Tien:
New blind signature protocols based on a new hard problem. 307-313 - Radhakrishnan Ayyapazham, V. Kavitha:
Proficient decision making on virtual machine creation in IaaS cloud environment. 314-323 - Tajuddeen R. Gwadabe, Mohammad Shukri Salman:
A new leaky-LMS algorithm with analysis. 324-331 - Wahiba Karaa, Thabet Slimani:
A new approach for arabic named entity recognition. 332-338 - Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Improved identification protocol in the quantum random oracle model.. 339-345 - Manuel Flores, Gualberto Aguilar-Torres, Gina Gallegos-García, Miguel Licona:
Fingerprint verification methods using delaunay triangulations. 346-354 - Teng Lv, Ping Yan, Weimin He:
Mapping XML to inverted indexed circular linked lists. 355-361 - Yongfeng Cui, Shi Dong, Wei Liu:
Feature selection algorithm based on correlation between muti metric network traffic flow features. 362-371 - Zhenhua Huang, Jiawen Zhang, Zheng Liu, Bo Zhang, Dong Wang:
Skyline recommendation in distributed networks. 372-379 - Yacine Djebar, Mohamed Tahar Kimour, Nouredine Guersi:
A feature model metrics-based approach to develop a software product line. 380-392 - Suat Secgin, Gökhan Dalkiliç:
A decision support system using demographic issues: a case study in turkey. 393-401 - Omar M. Wahdan, Mohammad Faidzul Nasrudin, Khairuddin Omar:
Shearing invariant texture descriptor from a local binary pattern and its application in paper fingerprinting. 402-412
Volume 14, Number 4, July 2017
- Chang-Kyun Jeon, Neunghoe Kim, Hoh In:
A probabilistic approach to building defect prediction model for platform-based product lines. 413-422 - Zeki Oralhan, Burcu Oralhan, Yavuz Yigit:
Smart city application: internet of things (IoT) technologies based smart waste collection using data mining approach and ant colony optimization. 423-427 - Bhuvana Shanmugam, Radhakrishnan Rathinavel, Tamije Selvy Perumal, Subhakala Subbaiyan:
An efficient perceptual of CBIR system using MIL-SVM classification and SURF feature extraction. 428-435 - Roya Asadi, Mitra Asadi, Shokoofeh Asadi:
An unsupervised feed forward neural network method for efficient clustering. 436-441 - Saini Kumar, Challa Krishna, Kushwaha Singh:
A new way of accelerating web by compressing data with back reference-prefer geflochtener. 442-447 - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
A new (k, n) secret image sharing scheme (SISS). 448-456 - Sobia Mahalingam, Valarmathi Lakshapalam, Saranya Ekabaram:
Image compression based on iteration-free fractal and using fuzzy clustering on DCT coefficients. 457-463 - Hazem M. El-Bakry, Ibrahim M. El-Henawy, Hagar El-Hadad:
Muzzle classification using neural networks. 464-472 - Naresh Kumar Nagwani:
A bi-level text classification approach for sms spam filtering and identifying priority messages. 473-480 - Hikmat Ullah Khan, Ali Daud:
Using machine learning techniques for subjectivity analysis based on lexical and non-lexical features. 481-487 - Aissa Amrouche, Leila Falek, Hocine Teffahi:
Design and implementation of a diacritic arabic text-to-speech system. 488-494 - Md. Imdadul Islam, Md. Mezbahul Islam, Rahmina Rubaiat, Abu Sayed Md. Mostafizur Rahaman, M. Ruhul Amin:
Pattern recognition using the concept of disjoint matrix of MIMO system. 495-501 - Dhiaa Musleh, Khaldoun Halawani, Sabri A. Mahmoud:
Fuzzy modeling for handwritten arabic numeral recognition. 502-511 - Meisen Pan, Jian-jun Jiang, Fen Zhang, Qiusheng Rong:
Medical image registration and fusion using principal component analysis. 512-520 - Nidaa A. Abbass, Jahanshah Kabudian:
Speech scrambling based on independent component analysis and particle swarm optimization. 521-527 - Manipoonchelvi Pandivalavan, Muneeswaran Karuppiah:
Saliency detection for content aware computer vision applications. 528-533 - Quanchao Liu, Heyan Huang, Chong Feng:
Simultaneously identifying opinion targets and opinion-bearing words based on multi-features in chinese micro-blog texts. 534-542
Volume 14, Number 4A, Special Issue 2017
- Issam Jebreen, Ahmad Alqerem:
Empirical study of analysts' practices in packaged software implementation at small software enterprises. 543-551 - Djamal Bennouar:
An automatic grading system based on dynamic corpora. 552-564 - Rachid Ahdid, Said Safi, Bouzid Manaut:
Euclidean and geodesic distance between a facial feature points in two-dimensional face recognition system. 565-571 - Youssef Khmou, Said Safi:
Lorentzian model of spatially coherent noise field in narrowband direction finding. 572-577 - Farida Retima, Saber Benharzallah, Laïd Kahloul, Okba Kazar:
A comparative analysis of context-management approaches for the internet of things. 578-585 - Rawad Hammad, Mohammed Odeh, Zaheer Abbas Khan:
Elem: a novel e-learner experience model. 586-597 - Mariam M. Biltawi, Arafat Awajan, Sara Tedmori, Akram Al-Kouz:
Exploiting multilingual wikipedia to improve arabic named entity resources. 598-607 - Yassine Chajri, Belaid Bouikhalene, Abdelkrim Maarir:
Segmentation of text/graphic from handwritten mathematical documents using gabor filter. 608-613 - Ilhame Agnaou, Belaid Bouikhalene:
New approach for 3d object forms detection using a new algorithm of SUSAN descriptor. 614-623 - Ahmed Adart, Hicham Mouncif, Mohamed Naimi:
Vehicular ad-hoc network application for urban traffic management based on markov chains. 624-631 - Mohamed Er-rouidi, Houda Moudni, Hassan Faouzi, Hicham Mouncif, Abdelkrim Merbouha:
Enhancing energy efficiency of reactive routing protocol in mobile ad-hoc network with prediction on energy consumption. 632-638 - Mohamed Elleuch, Ansar Hani, Monji Kherallah:
Arabic handwritten script recognition system based on HOG and gabor features. 639-646 - Tareq Alhmiedat, Amer O. Abu Salem:
A hybrid range-free localization algorithm for zigbee wireless sensor networks. 647-653 - Aya Nuseir, Mahmoud Al-Ayyoub, Mohammed Al-Kabi, Ghassan G. Kanaan, Riyad Al-Shalabi:
Improved hierarchical classifiers for multi-way sentiment analysis. 654-661
Volume 14, Number 5, September 2017
- Qaisar Abbas, Tanzila Saba:
An improved statistical model of appearance under partial occlusion. 663-669 - Salim Khiat, Hafida Belbachir, Sidi Ahmed Rahal:
Rule schema multi-level for local patterns analysis: application in production field. 670-680 - Amine Benzenache, Hamid Seridi, Herman Akdag:
Features modelling in discrete and continuous hidden markov models for handwritten arabic words recognition. 681-690 - Muhammad Sohail Khan, DoHyeun Kim:
Service-oriented process modelling for device control in future networks. 691-697 - Hussain Dawood, Hassan Dawood, Ping Guo:
Generalization of impulse noise removal. 698-706 - Amandeep Kaur, Vishal Gupta:
A novel approach for sentiment analysis of punjabi text using SVM. 707-712 - Rachid Zaghdoudi, Hamid Seridi:
Combination of multiple classifiers for off-line handwritten arabic word recognition. 713-720 - Ahmed Jafar, Mohammed Fakhr, Mohamed Farouk:
Enhanced clustering-based topic identification of transcribed arabic broadcast news. 721-728 - Mahmood Ahmed, Muhammad Shoaib:
A metrics driven design approach for real time environment application. 729-737 - Mehmet Gül, Sadik Kara, Abdurrahman Isikdogan, Yusuf Yarar:
Diagnosis of leptomeningeal metastases disease in mri images by using image enhancement methods. 738-746 - Kola Periyasamy, Jayadharini Jaiganesh, Kanchan Ponnambalam, Jeevitha Rajasekar, Arputharaj Kannan:
Analysis and performance evaluation of cosine neighbourhood recommender system. 747-754 - Osama A. Mehdi, Hamidah Ibrahim, Lilly Suriani Affendey:
An approach for instance based schema matching with google similarity and regular expression. 755-763 - Sadagopan Padmakala, Ganapathy AnandhaMala:
Interactive video retrieval using semantic level features and relevant feedback. 764-773 - Hamidreza Hosseinzadeh, Farbod Razzazi:
An SNR unaware large margin automatic modulations classifier in variable SNR environments. 774-781 - Jasmina Vasovic, Miroslav Radojicic, Stojan Vasovic, Zoran Nesic:
Multi-criteria selection of the computer configuration for engineering design. 782-789 - Shadi Nashwan:
SAK-AKA: a secure anonymity key of authentication and key agreement protocol for LTE network. 790-801
Volume 14, Number 6, November 2017
- Mojeeb Al-Khiaty, Radwan E. Abdel-Aal, Mahmoud O. Elish:
Abductive network ensembles for improved prediction of future change-prone classes in object-oriented software. 803-811 - Jean De Dieu Nkapkop, Joseph Yves Effa, Monica Borda, Laurent Bitjoka, Alidou Mohamadou:
Chaotic encryption scheme based on a fast permutation and diffusion structure. 812-819 - Emna Hkiri, Souheyl Mallat, Mounir Zrigui, Mourad Mars:
Constructing a lexicon of arabic-english named entity using SMT and semantic linked data. 820-825 - Mohammed Awad:
Forecasting of chaotic time series using RBF neural networks optimized by genetic algorithms. 826-834 - Said Gadri, Abdelouahab Moussaoui:
Contextual text categorization: an improved stemming algorithm to increase the quality of categorization in arabic text. 835-841 - Aymen Abdullah Alsaffar, Pham Phuoc Hung, Eui-Nam Huh:
An architecture of thin client-edge computing collaboration for data distribution and resource allocation in cloud. 842-850 - Meng Han, Jian Ding, Juan Li:
TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model. 851-860 - Ines Chihi, Afef Abdelkrim, Mohamed Benrejeb:
Internal model control to characterize human handwriting motion. 861-869 - Mazen Abdullah Bahashwan, Syed A. R. Abu-Bakar, Usman Ullah Sheikh:
Efficient segmentation of arabic handwritten characters using structural features. 870-879 - Wenhui Li, Jinlong Zhu, Huiying Li, Qiong Wu, Liang Zhang:
A novel swarm intelligence algorithm for the evacuation routing optimization problem. 880-889 - Brindha Palanisamy, Senthilkumar Athappan:
The veracious counting bloom filter. 890-896 - Ganesan Periyanagounder, Sivakumar Selvarasu, Sundar Subbiah:
A MMDBM classifier with CPU and CUDA GPU computing in various sorting procedures. 897-906 - Samiullah Khan, Mohammad Abdul Qadir:
Inter-path OOS packets differentiation based congestion control for simultaneous multipath transmission. 907-913 - Egambaram Kodhai, Selvadurai Kanmani:
Method-level code clone detection for java through hybrid approach. 914-922 - Arumugam Sakthivel:
Enhancing cloud security based on group signature. 923-929

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.