callback( { "result":{ "query":":facetid:toc:\"db/journals/jsw/jsw13.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"211.44" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"55", "@dc":"55", "@oc":"55", "@id":"43459358", "text":":facetid:toc:db/journals/jsw/jsw13.bht" } }, "hits":{ "@total":"55", "@computed":"55", "@sent":"55", "@first":"0", "hit":[{ "@score":"1", "@id":"2446831", "info":{"authors":{"author":{"@pid":"231/6820","text":"Bilal Al-Ahmad"}},"title":"Using Code Coverage Metrics for Improving Software Defect Prediction.","venue":"J. Softw.","volume":"13","number":"12","pages":"654-674","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Al-Ahmad18","doi":"10.17706/JSW.13.12.654-674","ee":"https://doi.org/10.17706/jsw.13.12.654-674","url":"https://dblp.org/rec/journals/jsw/Al-Ahmad18"}, "url":"URL#2446831" }, { "@score":"1", "@id":"2446832", "info":{"authors":{"author":{"@pid":"151/4336","text":"Waleed Albattah"}},"title":"Predicting Costly Maintenance Packages Using Package Cohesion.","venue":"J. Softw.","volume":"13","number":"10","pages":"547-558","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Albattah18","doi":"10.17706/JSW.13.10.547-558","ee":"https://doi.org/10.17706/jsw.13.10.547-558","url":"https://dblp.org/rec/journals/jsw/Albattah18"}, "url":"URL#2446832" }, { "@score":"1", "@id":"2446833", "info":{"authors":{"author":[{"@pid":"07/4261","text":"Naveed Ali"},{"@pid":"l/RichardLai-1","text":"Richard Lai 0001"}]},"title":"Requirements Engineering in Global Software Development: A Survey Study from the Perspectives of Stakeholders.","venue":"J. Softw.","volume":"13","number":"10","pages":"520-532","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/AliL18","doi":"10.17706/JSW.13.10.520-532","ee":"https://doi.org/10.17706/jsw.13.10.520-532","url":"https://dblp.org/rec/journals/jsw/AliL18"}, "url":"URL#2446833" }, { "@score":"1", "@id":"2446834", "info":{"authors":{"author":[{"@pid":"220/2920","text":"Abdullah R. Altaleb"},{"@pid":"63/6929","text":"Andrew M. Gravell"}]},"title":"Effort Estimation across Mobile App Platforms using Agile Processes: A Systematic Literature Review.","venue":"J. Softw.","volume":"13","number":"4","pages":"242-259","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/AltalebG18","doi":"10.17706/JSW.13.4.242-259","ee":"https://doi.org/10.17706/jsw.13.4.242-259","url":"https://dblp.org/rec/journals/jsw/AltalebG18"}, "url":"URL#2446834" }, { "@score":"1", "@id":"2446835", "info":{"authors":{"author":[{"@pid":"183/1938","text":"Bassim Chabibi"},{"@pid":"97/3366","text":"Adil Anwar"},{"@pid":"98/4821","text":"Mahmoud Nassar"}]},"title":"Towards a Model Integration from SysML to MATLAB/Simulink.","venue":"J. Softw.","volume":"13","number":"12","pages":"630-645","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ChabibiAN18","doi":"10.17706/JSW.13.12.630-645","ee":"https://doi.org/10.17706/jsw.13.12.630-645","url":"https://dblp.org/rec/journals/jsw/ChabibiAN18"}, "url":"URL#2446835" }, { "@score":"1", "@id":"2446836", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"16/7678","text":"Ran Tang"},{"@pid":"61/295","text":"Chia-Chen Lin 0001"},{"@pid":"171/3786","text":"Wan-Li Lyu"}]},"title":"High-Capacity Reversible Data Hiding Method for JPEG Images.","venue":"J. Softw.","volume":"13","number":"1","pages":"1-17","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ChangTLL18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=190&id=2835","url":"https://dblp.org/rec/journals/jsw/ChangTLL18"}, "url":"URL#2446836" }, { "@score":"1", "@id":"2446837", "info":{"authors":{"author":[{"@pid":"227/6383","text":"Wenjiang Chen"},{"@pid":"227/6624","text":"Zhaoji Hu"},{"@pid":"39/7487","text":"Yan Yong"},{"@pid":"25/6345","text":"Hongbo Su"}]},"title":"3D Dynamic Visualization Simulation System of Pool Fire Triggered by Major Hazard Installation.","venue":"J. Softw.","volume":"13","number":"9","pages":"481-496","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ChenHYS18","doi":"10.17706/JSW.13.9.481-496","ee":"https://doi.org/10.17706/jsw.13.9.481-496","url":"https://dblp.org/rec/journals/jsw/ChenHYS18"}, "url":"URL#2446837" }, { "@score":"1", "@id":"2446838", "info":{"authors":{"author":{"@pid":"161/6552","text":"Jehad Al Dallal"}},"title":"Predicting Object-Oriented Class Fault-Proneness: A Replication Study.","venue":"J. Softw.","volume":"13","number":"5","pages":"269-276","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Dallal18","doi":"10.17706/JSW.13.5.269-276","ee":"https://doi.org/10.17706/jsw.13.5.269-276","url":"https://dblp.org/rec/journals/jsw/Dallal18"}, "url":"URL#2446838" }, { "@score":"1", "@id":"2446839", "info":{"authors":{"author":[{"@pid":"149/0741","text":"Georgi Petrov Dimitrov"},{"@pid":"215/5715","text":"Galina S. Panayotova"},{"@pid":"217/0880","text":"Iva S. Kostadinova"}]},"title":"Aspect of the Designing and Developed Integrated Information Systems in Large Organizations.","venue":"J. Softw.","volume":"13","number":"2","pages":"138-145","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/DimitrovPK18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=191&id=2847","url":"https://dblp.org/rec/journals/jsw/DimitrovPK18"}, "url":"URL#2446839" }, { "@score":"1", "@id":"2446840", "info":{"authors":{"author":[{"@pid":"149/0741","text":"Georgi Petrov Dimitrov"},{"@pid":"215/5715","text":"Galina S. Panayotova"},{"@pid":"23/176","text":"Eugenia Kovatcheva"},{"@pid":"81/7247","text":"Daniela Borissova"},{"@pid":"224/0361","text":"Pavel Petrov"}]},"title":"One Approach for Identification of Brain Signals for Smart Devices Control.","venue":"J. Softw.","volume":"13","number":"7","pages":"407-413","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/DimitrovPKBP18","doi":"10.17706/JSW.13.7.407-413","ee":"https://doi.org/10.17706/jsw.13.7.407-413","url":"https://dblp.org/rec/journals/jsw/DimitrovPKBP18"}, "url":"URL#2446840" }, { "@score":"1", "@id":"2446841", "info":{"authors":{"author":[{"@pid":"17/1152-11","text":"Wei Feng 0011"},{"@pid":"85/5019","text":"Yigang He"}]},"title":"Constructing, Analyzing and Synchronizing a Chaotic System with Equilibria of Rectangle Loop.","venue":"J. Softw.","volume":"13","number":"4","pages":"212-218","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/FengH18","doi":"10.17706/JSW.13.4.212-218","ee":"https://doi.org/10.17706/jsw.13.4.212-218","url":"https://dblp.org/rec/journals/jsw/FengH18"}, "url":"URL#2446841" }, { "@score":"1", "@id":"2446842", "info":{"authors":{"author":[{"@pid":"17/3453","text":"Hubertus Franke"},{"@pid":"226/1277","text":"Martina Hasseler"},{"@pid":"226/1193","text":"Denise Dick"},{"@pid":"226/1125","text":"Stephanie Krebs"}]},"title":"Requirements Engineering for a Matching Algorithm to Use in Hospital Networks.","venue":"J. Softw.","volume":"13","number":"8","pages":"414-420","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/FrankeHDK18","doi":"10.17706/JSW.13.8.414-420","ee":"https://doi.org/10.17706/jsw.13.8.414-420","url":"https://dblp.org/rec/journals/jsw/FrankeHDK18"}, "url":"URL#2446842" }, { "@score":"1", "@id":"2446843", "info":{"authors":{"author":[{"@pid":"29/4549-1","text":"Mohit Garg 0001"},{"@pid":"l/RichardLai-1","text":"Richard Lai 0001"}]},"title":"A Method for Selecting a Model to Estimate Software Reliability at the Design Phase of Component-Based Real-Time System Development.","venue":"J. Softw.","volume":"13","number":"6","pages":"317-334","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/GargL18","doi":"10.17706/JSW.13.6.317-334","ee":"https://doi.org/10.17706/jsw.13.6.317-334","url":"https://dblp.org/rec/journals/jsw/GargL18"}, "url":"URL#2446843" }, { "@score":"1", "@id":"2446844", "info":{"authors":{"author":[{"@pid":"50/2714","text":"Loredana M. Genovese"},{"@pid":"22/6909","text":"Filippo Geraci"}]},"title":"Web Crawling and Processing with Limited Resources for Business Intelligence and Analytics Applications.","venue":"J. Softw.","volume":"13","number":"5","pages":"300-316","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/GenoveseG18","doi":"10.17706/JSW.13.5.300-316","ee":"https://doi.org/10.17706/jsw.13.5.300-316","url":"https://dblp.org/rec/journals/jsw/GenoveseG18"}, "url":"URL#2446844" }, { "@score":"1", "@id":"2446845", "info":{"authors":{"author":{"@pid":"g/AhmedGhoneim","text":"Ahmed Ghoneim"}},"title":"A New Service Oriented Framework for Self-Adapting Smart Applications in Mobile Environment.","venue":"J. Softw.","volume":"13","number":"3","pages":"180-191","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Ghoneim18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=192&id=2852","url":"https://dblp.org/rec/journals/jsw/Ghoneim18"}, "url":"URL#2446845" }, { "@score":"1", "@id":"2446846", "info":{"authors":{"author":[{"@pid":"227/6638","text":"Fengwei Guan"},{"@pid":"58/1879","text":"Lianglun Cheng"}]},"title":"Abnormal Quality Pattern Recognition of Industrial Process Based on Multi-Support Vector Machine.","venue":"J. Softw.","volume":"13","number":"9","pages":"506-519","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/GuanC18","doi":"10.17706/JSW.13.9.506-519","ee":"https://doi.org/10.17706/jsw.13.9.506-519","url":"https://dblp.org/rec/journals/jsw/GuanC18"}, "url":"URL#2446846" }, { "@score":"1", "@id":"2446847", "info":{"authors":{"author":[{"@pid":"192/8736","text":"Saida Haidrar"},{"@pid":"97/3366","text":"Adil Anwar"},{"@pid":"51/3120","text":"Jean-Michel Bruel"},{"@pid":"58/358","text":"Ounsa Roudiès"}]},"title":"A Domain-Specific Language to manage Requirements Traceability.","venue":"J. Softw.","volume":"13","number":"9","pages":"460-480","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HaidrarABR18","doi":"10.17706/JSW.13.9.460-480","ee":"https://doi.org/10.17706/jsw.13.9.460-480","url":"https://dblp.org/rec/journals/jsw/HaidrarABR18"}, "url":"URL#2446847" }, { "@score":"1", "@id":"2446848", "info":{"authors":{"author":[{"@pid":"08/4965","text":"Abeer Hamdy"},{"@pid":"224/8735-4","text":"Mohamed Elsayed 0004"}]},"title":"Automatic Recommendation of Software Design Patterns: Text Retrieval Approach.","venue":"J. Softw.","volume":"13","number":"4","pages":"260-268","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HamdyE18","doi":"10.17706/JSW.13.4.260-268","ee":"https://doi.org/10.17706/jsw.13.4.260-268","url":"https://dblp.org/rec/journals/jsw/HamdyE18"}, "url":"URL#2446848" }, { "@score":"1", "@id":"2446849", "info":{"authors":{"author":[{"@pid":"174/2471","text":"Adel Hassan"},{"@pid":"o/MouradChabaneOussalah","text":"Mourad Chabane Oussalah"}]},"title":"Evolution Styles: Multi-View/Multi-Level Model for Software Architecture Evolution.","venue":"J. Softw.","volume":"13","number":"3","pages":"146-154","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HassanO18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=192&id=2849","url":"https://dblp.org/rec/journals/jsw/HassanO18"}, "url":"URL#2446849" }, { "@score":"1", "@id":"2446850", "info":{"authors":{"author":[{"@pid":"199/7700","text":"Rachida Hassani"},{"@pid":"180/1385","text":"Younès El Bouzekri El Idrissi"}]},"title":"Normalization of Requirements Specification Document on Software Project Management.","venue":"J. Softw.","volume":"13","number":"4","pages":"232-241","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HassaniI18","doi":"10.17706/JSW.13.4.232-241","ee":"https://doi.org/10.17706/jsw.13.4.232-241","url":"https://dblp.org/rec/journals/jsw/HassaniI18"}, "url":"URL#2446850" }, { "@score":"1", "@id":"2446851", "info":{"authors":{"author":[{"@pid":"177/5377","text":"Mohamed A. G. Hazber"},{"@pid":"13/2692","text":"Bing Li"},{"@pid":"59/2340","text":"Guandong Xu"},{"@pid":"191/7402","text":"Mohammed A. S. Mosleh"},{"@pid":"85/8279","text":"Xiwu Gu"},{"@pid":"79/5796-3","text":"Yuhua Li 0003"}]},"title":"An Approach for Generation of SPARQL Query from SQL Algebra based Transformation Rules of RDB to Ontology.","venue":"J. Softw.","volume":"13","number":"11","pages":"573-599","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HazberLXMGL18","doi":"10.17706/JSW.13.11.573-599","ee":"https://doi.org/10.17706/jsw.13.11.573-599","url":"https://dblp.org/rec/journals/jsw/HazberLXMGL18"}, "url":"URL#2446851" }, { "@score":"1", "@id":"2446852", "info":{"authors":{"author":[{"@pid":"213/5244","text":"MdSaidul Hoque"},{"@pid":"160/8936","text":"Abeer Alsadoon"},{"@pid":"213/5305","text":"Angelika Maag"},{"@pid":"71/126","text":"P. W. C. Prasad"},{"@pid":"72/8815","text":"Amr Elchouemi"}]},"title":"Comprehensive Search Engine Optimization Model for Commercial Websites: Surgeon's Website in Sydney.","venue":"J. Softw.","volume":"13","number":"1","pages":"43-56","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HoqueAMPE18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=190&id=2837","url":"https://dblp.org/rec/journals/jsw/HoqueAMPE18"}, "url":"URL#2446852" }, { "@score":"1", "@id":"2446853", "info":{"authors":{"author":[{"@pid":"222/4227","text":"ZhenJie Huang"},{"@pid":"140/0792","text":"Guoheng Huang"},{"@pid":"58/1879","text":"Lianglun Cheng"}]},"title":"Medical Image Segmentation of Blood Vessels Based on Clifford Algebra and Voronoi Diagram.","venue":"J. Softw.","volume":"13","number":"6","pages":"360-373","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/HuangHC18","doi":"10.17706/JSW.13.6.360-373","ee":"https://doi.org/10.17706/jsw.13.6.360-373","url":"https://dblp.org/rec/journals/jsw/HuangHC18"}, "url":"URL#2446853" }, { "@score":"1", "@id":"2446854", "info":{"authors":{"author":[{"@pid":"217/0808","text":"Yuanxiang Jiang"},{"@pid":"166/3334","text":"Rui Yuan"},{"@pid":"17/6414","text":"Yuqiu Sun"},{"@pid":"20/5402","text":"Jin-Wen Tian"}]},"title":"Iterative Fractional Integral Denoising Based on Detection of Gaussian Noise.","venue":"J. Softw.","volume":"13","number":"3","pages":"155-167","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/JiangYST18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=192&id=2850","url":"https://dblp.org/rec/journals/jsw/JiangYST18"}, "url":"URL#2446854" }, { "@score":"1", "@id":"2446855", "info":{"authors":{"author":[{"@pid":"217/0730","text":"KaixinLiu"},{"@pid":"217/0760","text":"Jianhui Chang"},{"@pid":"217/0704","text":"Huiwen Ren"},{"@pid":"55/521","text":"Hong Zhu"}]},"title":"Disparity-Based Measurement on Participation Interest and Competition Recommendation Method.","venue":"J. Softw.","volume":"13","number":"2","pages":"117-125","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/KaixinLiuCRZ18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=191&id=2845","url":"https://dblp.org/rec/journals/jsw/KaixinLiuCRZ18"}, "url":"URL#2446855" }, { "@score":"1", "@id":"2446856", "info":{"authors":{"author":[{"@pid":"231/6352","text":"Nesrine Khalfallah"},{"@pid":"131/3521","text":"Sami Ouali"},{"@pid":"11/918","text":"Naoufel Kraïem"}]},"title":"Case Tool Support for Variability Managing in Database Schemas.","venue":"J. Softw.","volume":"13","number":"11","pages":"600-612","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/KhalfallahOK18","doi":"10.17706/JSW.13.11.600-612","ee":"https://doi.org/10.17706/jsw.13.11.600-612","url":"https://dblp.org/rec/journals/jsw/KhalfallahOK18"}, "url":"URL#2446856" }, { "@score":"1", "@id":"2446857", "info":{"authors":{"author":[{"@pid":"227/6494","text":"Yousef Khdairat"},{"@pid":"94/2918","text":"Khair Eddin Sabri"}]},"title":"Generating Test Cases from Role-Based Access Control Policies using Cause-Effect Graph.","venue":"J. Softw.","volume":"13","number":"9","pages":"497-505","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/KhdairatS18","doi":"10.17706/JSW.13.9.497-505","ee":"https://doi.org/10.17706/jsw.13.9.497-505","url":"https://dblp.org/rec/journals/jsw/KhdairatS18"}, "url":"URL#2446857" }, { "@score":"1", "@id":"2446858", "info":{"authors":{"author":[{"@pid":"217/0742","text":"N. Satish Kumar"},{"@pid":"217/0794","text":"Shobha G."}]},"title":"Detection of Moving Cast Shadow Using Pixel and Texture.","venue":"J. Softw.","volume":"13","number":"2","pages":"82-89","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/KumarG18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=191&id=2842","url":"https://dblp.org/rec/journals/jsw/KumarG18"}, "url":"URL#2446858" }, { "@score":"1", "@id":"2446859", "info":{"authors":{"author":[{"@pid":"134/6333","text":"Donghwoon Kwon"},{"@pid":"217/0748","text":"Ilnam Jeong"},{"@pid":"205/4732","text":"Geumchae Yoon"},{"@pid":"92/9795","text":"Bilal Abu Bakr"},{"@pid":"217/0683","text":"Ki Pyung Kim"}]},"title":"A Study on Probabilistic Schedule Estimation and Refinement of the Small and Medium-Sized Software Development Projects.","venue":"J. Softw.","volume":"13","number":"3","pages":"201-211","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/KwonJYBK18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=192&id=2854","url":"https://dblp.org/rec/journals/jsw/KwonJYBK18"}, "url":"URL#2446859" }, { "@score":"1", "@id":"2446860", "info":{"authors":{"author":{"@pid":"19/4500","text":"Mohammad Shakeel Laghari"}},"title":"EE Course Planning Software System.","venue":"J. Softw.","volume":"13","number":"4","pages":"219-231","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Laghari18","doi":"10.17706/JSW.13.4.219-231","ee":"https://doi.org/10.17706/jsw.13.4.219-231","url":"https://dblp.org/rec/journals/jsw/Laghari18"}, "url":"URL#2446860" }, { "@score":"1", "@id":"2446861", "info":{"authors":{"author":[{"@pid":"137/4755","text":"Chunlai Li"},{"@pid":"47/6459","text":"Wenhua Hai"}]},"title":"Image Encryption Scheme Based on Amplitude Modulation of Chaotic Signals.","venue":"J. Softw.","volume":"13","number":"8","pages":"421-436","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/LiH18","doi":"10.17706/JSW.13.8.421-436","ee":"https://doi.org/10.17706/jsw.13.8.421-436","url":"https://dblp.org/rec/journals/jsw/LiH18"}, "url":"URL#2446861" }, { "@score":"1", "@id":"2446862", "info":{"authors":{"author":[{"@pid":"26/1508","text":"Yuzhen Liu"},{"@pid":"48/2807","text":"Long Zhang"},{"@pid":"01/1844-4","text":"Zhenyu Zhang 0004"}]},"title":"A Survey of Test Based Automatic Program Repair.","venue":"J. Softw.","volume":"13","number":"8","pages":"437-452","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/LiuZZ18","doi":"10.17706/JSW.13.8.437-452","ee":"https://doi.org/10.17706/jsw.13.8.437-452","url":"https://dblp.org/rec/journals/jsw/LiuZZ18"}, "url":"URL#2446862" }, { "@score":"1", "@id":"2446863", "info":{"authors":{"author":[{"@pid":"55/1199","text":"Kazuyuki Matsumoto"},{"@pid":"143/2905","text":"Akira Fujisawa"},{"@pid":"57/1461","text":"Minoru Yoshida"},{"@pid":"59/4254","text":"Kenji Kita"}]},"title":"ASCII Art Classification based on Deep Neural Networks Using Image Feature of Characters.","venue":"J. Softw.","volume":"13","number":"10","pages":"559-572","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/MatsumotoFYK18","doi":"10.17706/JSW.13.10.559-572","ee":"https://doi.org/10.17706/jsw.13.10.559-572","url":"https://dblp.org/rec/journals/jsw/MatsumotoFYK18"}, "url":"URL#2446863" }, { "@score":"1", "@id":"2446864", "info":{"authors":{"author":[{"@pid":"90/2797","text":"Ahmed Mokaddem"},{"@pid":"213/5268","text":"Amine Bel Haj"},{"@pid":"40/1589","text":"Mourad Elloumi"}]},"title":"Pro-malign: Multiple Sequence Alignment Algorithm using Approached Profile.","venue":"J. Softw.","volume":"13","number":"1","pages":"57-65","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/MokaddemHE18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=190&id=2838","url":"https://dblp.org/rec/journals/jsw/MokaddemHE18"}, "url":"URL#2446864" }, { "@score":"1", "@id":"2446865", "info":{"authors":{"author":[{"@pid":"07/3853","text":"Nobuaki Nakazawa"},{"@pid":"82/2118","text":"Toshikazu Matsui"},{"@pid":"02/2302","text":"Yusaku Fujii"}]},"title":"Development of an Intuitive Interface for PC Mouse Operation Based on Both Arms Gesture.","venue":"J. Softw.","volume":"13","number":"8","pages":"453-459","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/NakazawaMF18","doi":"10.17706/JSW.13.8.453-459","ee":"https://doi.org/10.17706/jsw.13.8.453-459","url":"https://dblp.org/rec/journals/jsw/NakazawaMF18"}, "url":"URL#2446865" }, { "@score":"1", "@id":"2446866", "info":{"authors":{"author":[{"@pid":"s/FranciscoOrtin","text":"Francisco Ortin"},{"@pid":"167/7890","text":"Donna O'Shea"}]},"title":"Towards an Easily Programmable IoT Framework Based on Microservices.","venue":"J. Softw.","volume":"13","number":"2","pages":"90-102","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/OrtinO18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=191&id=2843","url":"https://dblp.org/rec/journals/jsw/OrtinO18"}, "url":"URL#2446866" }, { "@score":"1", "@id":"2446867", "info":{"authors":{"author":[{"@pid":"231/6401","text":"Suhan Pan"},{"@pid":"14/5778-1","text":"Zhiqiang Li 0001"},{"@pid":"74/1606","text":"Juan Dai"}]},"title":"An Effective Method to Extract Web Content Information.","venue":"J. Softw.","volume":"13","number":"11","pages":"621-629","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/PanLD18","doi":"10.17706/JSW.13.11.621-629","ee":"https://doi.org/10.17706/jsw.13.11.621-629","url":"https://dblp.org/rec/journals/jsw/PanLD18"}, "url":"URL#2446867" }, { "@score":"1", "@id":"2446868", "info":{"authors":{"author":[{"@pid":"13/4425","text":"Reza Meimandi Parizi"},{"@pid":"171/3027","text":"Ahmad Shahi"}]},"title":"Component-Driven Development in Modern Virtual Assistants: A Mapping Study.","venue":"J. Softw.","volume":"13","number":"2","pages":"126-137","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/PariziS18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=191&id=2846","url":"https://dblp.org/rec/journals/jsw/PariziS18"}, "url":"URL#2446868" }, { "@score":"1", "@id":"2446869", "info":{"authors":{"author":[{"@pid":"217/0676","text":"Anbo Qiu"},{"@pid":"77/7826","text":"Zhuowei Wang 0001"}]},"title":"Optimization of Density Peak Clustering Algorithm Based on OpenMP.","venue":"J. Softw.","volume":"13","number":"3","pages":"168-179","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/QiuW18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=192&id=2851","url":"https://dblp.org/rec/journals/jsw/QiuW18"}, "url":"URL#2446869" }, { "@score":"1", "@id":"2446870", "info":{"authors":{"author":[{"@pid":"231/6958","text":"Qing-hui Ren"},{"@pid":"231/6999","text":"Sheng-lin Li"},{"@pid":"30/10222","text":"Han Qiao"}]},"title":"Method of Refactoring a Monolith into Micro-services.","venue":"J. Softw.","volume":"13","number":"12","pages":"646-653","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/RenLQ18","doi":"10.17706/JSW.13.12.646-653","ee":"https://doi.org/10.17706/jsw.13.12.646-653","url":"https://dblp.org/rec/journals/jsw/RenLQ18"}, "url":"URL#2446870" }, { "@score":"1", "@id":"2446871", "info":{"authors":{"author":[{"@pid":"222/4703","text":"Deependra Poudel Sharma"},{"@pid":"151/4328","text":"Farzana Haque"},{"@pid":"50/6595","text":"Moshiur Bhuiyan"},{"@pid":"71/126","text":"P. W. C. Prasad"}]},"title":"Service Optimization Using Goal-Oriented Modelling in Judicial Domain.","venue":"J. Softw.","volume":"13","number":"5","pages":"287-299","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/SharmaHBP18","doi":"10.17706/JSW.13.5.287-299","ee":"https://doi.org/10.17706/jsw.13.5.287-299","url":"https://dblp.org/rec/journals/jsw/SharmaHBP18"}, "url":"URL#2446871" }, { "@score":"1", "@id":"2446872", "info":{"authors":{"author":[{"@pid":"165/7541","text":"D. I. De Silva"},{"@pid":"97/8168","text":"S. R. Kodituwakku"},{"@pid":"49/3420","text":"A. J. Pinidiyaarachchi"},{"@pid":"204/4387","text":"N. Kodagoda"}]},"title":"Enhancements to an OO Metric: CB Measure.","venue":"J. Softw.","volume":"13","number":"1","pages":"72-81","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/SilvaKPK18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=190&id=2840","url":"https://dblp.org/rec/journals/jsw/SilvaKPK18"}, "url":"URL#2446872" }, { "@score":"1", "@id":"2446873", "info":{"authors":{"author":{"@pid":"188/4087","text":"Ahmad F. Subahi"}},"title":"Data Collection for Career Path Prediction Based on Analysing Body of Knowledge of Computer Science Degrees.","venue":"J. Softw.","volume":"13","number":"10","pages":"533-546","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Subahi18","doi":"10.17706/JSW.13.10.533-546","ee":"https://doi.org/10.17706/jsw.13.10.533-546","url":"https://dblp.org/rec/journals/jsw/Subahi18"}, "url":"URL#2446873" }, { "@score":"1", "@id":"2446874", "info":{"authors":{"author":[{"@pid":"188/4087","text":"Ahmad F. Subahi"},{"@pid":"54/11057","text":"Youseef Alotaibi"}]},"title":"A New Framework for Classifying Information Systems Modelling Languages.","venue":"J. Softw.","volume":"13","number":"1","pages":"18-42","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/SubahiA18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=190&id=2836","url":"https://dblp.org/rec/journals/jsw/SubahiA18"}, "url":"URL#2446874" }, { "@score":"1", "@id":"2446875", "info":{"authors":{"author":{"@pid":"94/9496","text":"Lutfiah Al Turk"}},"title":"Confidence Intervals for the Failure Intensity and Number of Remaining Errors Functions Based on Non-Homogeneous Poisson Process Model.","venue":"J. Softw.","volume":"13","number":"12","pages":"675-686","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Turk18","doi":"10.17706/JSW.13.12.675-686","ee":"https://doi.org/10.17706/jsw.13.12.675-686","url":"https://dblp.org/rec/journals/jsw/Turk18"}, "url":"URL#2446875" }, { "@score":"1", "@id":"2446876", "info":{"authors":{"author":[{"@pid":"28/10951","text":"Azmat Ullah"},{"@pid":"l/RichardLai-1","text":"Richard Lai 0001"}]},"title":"A Method of Extracting Organizational Components for Aligning Information Technology with Business.","venue":"J. Softw.","volume":"13","number":"7","pages":"374-385","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/UllahL18","doi":"10.17706/JSW.13.7.374-385","ee":"https://doi.org/10.17706/jsw.13.7.374-385","url":"https://dblp.org/rec/journals/jsw/UllahL18"}, "url":"URL#2446876" }, { "@score":"1", "@id":"2446877", "info":{"authors":{"author":{"@pid":"217/0751","text":"Fengling Wang"}},"title":"Research on Application of Improved K-means Algorithm in Network Intrusion Detection.","venue":"J. Softw.","volume":"13","number":"3","pages":"192-200","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Wang18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=192&id=2853","url":"https://dblp.org/rec/journals/jsw/Wang18"}, "url":"URL#2446877" }, { "@score":"1", "@id":"2446878", "info":{"authors":{"author":[{"@pid":"222/4371","text":"Antoni Wiercioch"},{"@pid":"t/StephanieTeufel","text":"Stephanie Teufel"},{"@pid":"11/6847","text":"Bernd Teufel"}]},"title":"The Authentication Dilemma.","venue":"J. Softw.","volume":"13","number":"5","pages":"277-286","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/WierciochTT18","doi":"10.17706/JSW.13.5.277-286","ee":"https://doi.org/10.17706/jsw.13.5.277-286","url":"https://dblp.org/rec/journals/jsw/WierciochTT18"}, "url":"URL#2446878" }, { "@score":"1", "@id":"2446879", "info":{"authors":{"author":[{"@pid":"02/8722","text":"Pei-Fen Wu"},{"@pid":"23/7178","text":"Hui-Jiun Hu"},{"@pid":"202/0421","text":"Kuang-Yi Fan"}]},"title":"Developing an APP with Taiwanese Image for Reminiscence Therapy of Dementia.","venue":"J. Softw.","volume":"13","number":"7","pages":"395-406","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/WuHF18","doi":"10.17706/JSW.13.7.395-406","ee":"https://doi.org/10.17706/jsw.13.7.395-406","url":"https://dblp.org/rec/journals/jsw/WuHF18"}, "url":"URL#2446879" }, { "@score":"1", "@id":"2446880", "info":{"authors":{"author":{"@pid":"208/5301","text":"Yuqing Yan"}},"title":"Knowledge Factors and Models of Requirements Change Management Process Based on Causality Analysis.","venue":"J. Softw.","volume":"13","number":"7","pages":"386-394","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/Yan18","doi":"10.17706/JSW.13.7.386-394","ee":"https://doi.org/10.17706/jsw.13.7.386-394","url":"https://dblp.org/rec/journals/jsw/Yan18"}, "url":"URL#2446880" }, { "@score":"1", "@id":"2446881", "info":{"authors":{"author":[{"@pid":"22/1681","text":"Jiexian Zeng 0001"},{"@pid":"97/374-4","text":"Xiang Fu 0004"},{"@pid":"97/9765","text":"Lu Leng"},{"@pid":"222/4420","text":"Liqin Zhan"}]},"title":"Image Completion Based on Structure Reconstruction and Constraint.","venue":"J. Softw.","volume":"13","number":"6","pages":"335-349","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ZengFLZ18","doi":"10.17706/JSW.13.6.335-349","ee":"https://doi.org/10.17706/jsw.13.6.335-349","url":"https://dblp.org/rec/journals/jsw/ZengFLZ18"}, "url":"URL#2446881" }, { "@score":"1", "@id":"2446882", "info":{"authors":{"author":[{"@pid":"02/6428","text":"Yun Zhang"},{"@pid":"48/4792","text":"Yang Chen"}]},"title":"Research on the Method for Estimating the Motion state of the Opponent's Agent in the Confrontation Environment.","venue":"J. Softw.","volume":"13","number":"1","pages":"66-71","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ZhangC18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=190&id=2839","url":"https://dblp.org/rec/journals/jsw/ZhangC18"}, "url":"URL#2446882" }, { "@score":"1", "@id":"2446883", "info":{"authors":{"author":[{"@pid":"39/9234","text":"Xufang Zhao"},{"@pid":"86/2314","text":"Ximing Liang"},{"@pid":"08/2939","text":"Long Wen"}]},"title":"The Artificial Bee Colony Algorithm Improved with Simplex Method.","venue":"J. Softw.","volume":"13","number":"6","pages":"350-359","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ZhaoLW18","doi":"10.17706/JSW.13.6.350-359","ee":"https://doi.org/10.17706/jsw.13.6.350-359","url":"https://dblp.org/rec/journals/jsw/ZhaoLW18"}, "url":"URL#2446883" }, { "@score":"1", "@id":"2446884", "info":{"authors":{"author":[{"@pid":"57/2556","text":"Xianghui Zhao"},{"@pid":"32/2586","text":"Zhirong Li"},{"@pid":"78/5122","text":"Junkai Yi"}]},"title":"SIFT Feature-Based Second-Order Image Hash Retrieval Approach.","venue":"J. Softw.","volume":"13","number":"2","pages":"103-116","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ZhaoLY18","ee":"http://www.jsoftware.us/index.php?m=content&c=index&a=show&catid=191&id=2844","url":"https://dblp.org/rec/journals/jsw/ZhaoLY18"}, "url":"URL#2446884" }, { "@score":"1", "@id":"2446885", "info":{"authors":{"author":[{"@pid":"183/8128","text":"Guoxiang Zhou"},{"@pid":"231/6834","text":"Ruirui Cao"},{"@pid":"29/563-11","text":"Lei Shi 0011"},{"@pid":"62/4257","text":"Yun Hu"}]},"title":"Research on an Efficient Software Framework for Developing.","venue":"J. Softw.","volume":"13","number":"11","pages":"613-620","year":"2018","type":"Journal Articles","access":"closed","key":"journals/jsw/ZhouCSH18","doi":"10.17706/JSW.13.11.613-620","ee":"https://doi.org/10.17706/jsw.13.11.613-620","url":"https://dblp.org/rec/journals/jsw/ZhouCSH18"}, "url":"URL#2446885" } ] } } } )