default search action
Journal of Computer Science, Volume 13
Volume 13, Number 1, 2017
- Susmit Bagchi:
Computational Analysis of Network ODE Systems in Metric Spaces: An Approach. 1-10 - Lukman Ab. Rahim, Ziyaulhaq Aliyu, Emy Elyanee Mustapha:
Evaluating the Usability of Model Transformations Testing Approach (MTTA). 11-21
Volume 13, Number 2, 2017
- Rafael Divino Ferreira Feitosa, Vinícius Araújo Santos, Leandro Luís Galdino de Oliveira, Díbio Leandro Borges, Lucas Calabrez Pereyra, Adriano Soares de Oliveira Bailão:
Statistical Pattern Recognition for Thresholding between Human Skin and Background in Color Images. 22-33 - Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala, Joseph Monamati Chuma:
Design and Implementation of Security in Healthcare Cloud Computing. 34-47
Volume 13, Number 3, 2017
- Sabeeka M. Al-Oun, Jehad Q. Odeh Alnihoud:
An Efficient Approach to Hide Compressed Voice Data in Arabic Text using Kashida and "La". 48-54 - Kale Sarika Prakash, Joe Prathap P. M:
Tracking Pointer and Look Ahead Matching Strategy to Evaluate Iceberg Driven Query. 55-67
Volume 13, Number 4, 2017
- Heider Alvarenga de Jesus, Denilson Alves Pereira:
Enriching an Authority File of Scientific Conferences with Information Extracted from the Web. 68-77 - Mohannad Moufeed Ayyash:
Scrutiny of Relationship between E-Banking Information Quality Dimensions and Customer Satisfaction. 78-90
Volume 13, Number 5, 2017
- Diaa Eldin ElSaied, Habib Ullah Khan:
Implementation of Health Information System-A Case Study of Magrabi Hospitals, KSA. 91-104 - Omar Dakkak, Shahrudin Awang Nor, Suki Arif:
Scheduling Jobs through Gap Filling and Optimization Techniques in Computational Grid. 105-113 - Leau Yu Beng, Ali Abdulrazzaq Khudher, Selvakumar Manickam, Samer Al-Salem:
An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness. 114-129 - Aya M. Mostafa, Ayman E. Khedr, A. Abdo:
Advising Approach to Enhance Students' Performance Level in Higher Education Environments. 130-139 - Belkacem Athamena, Zina Houhamdi:
An Exception Management Model in Multi-Agents Systems. 140-152
Volume 13, Number 6, 2017
- Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka:
Ant Colony Optimization Approaches in Wireless Sensor Network: Performance Evaluation. 153-164 - Manar AbuTalib:
Open Source Software in the UAE: Opportunities, Challenges and Recommendations (A Survey Research Study). 165-174 - Charinee Prompukdee, Jaratsri Rungrattanaubol, Chayanin Pratoomsoot:
A Framework for Systematizing Personalized Thai Herbal Medicine: A Case Study Covering Gynecological Conditions. 175-183 - Atef A. Obeidat:
Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters. 184-191 - Carlos Roberto Valêncio, André Francisco Morielo Caetano, Angelo Cesar Colombini, Mário Luiz Tronco, Márcio Zamboti Fortes:
A Fast Access Big Data Approach for Configurable and Scalable Object Storage Enabling Mixed Fault-Tolerance. 192-198 - Smitha Rajagopal, Katiganere Siddaramappa Hareesha, Poornima Panduranga Kundapur:
Optimising Pair Programming in a Scholastic Framework: A Design Pattern Perspective. 199-210
Volume 13, Number 7, 2017
- Paola A. Sánchez-Sánchez, José Rafael García-González:
A New Methodology for Neural Network Training Ensures Error Reduction in Time Series Forecasting. 211-217 - Thato Solomon, Adamu Murtala Zungeru, Rajalakshmi Selvaraj, Mmoloki Mangwala, Joseph Monamati Chuma:
Network Traffic Model: A Case of BIUST Network. 218-227 - Ashraf Abazeed, Moaiad Khder:
A Classification and Prediction Model for Student's Performance in University Level. 228-233 - Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System. 234-246 - Chaipichit Cumpim, Rachu Punchalard:
High Density Salt and Pepper Noise Filter based on Shepard Interpolation Method. 247-256
Volume 13, Number 8, 2017
- Falilat Jimoh, Simon Parkinson, Thomas Leo McCluskey:
A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. 257-274 - Adamu M. Noma, Abdullah Muhammed, Mohamad Afendee Mohamed, Z. Ahmad Zulkarnain:
A Review on Heuristics for Addition Chain Problem: Towards Efficient Public Key Cryptosystems. 275-289 - Mohammed I. Al-Saleh, Rasha K. Al-Huthaifi:
On Improving Antivirus Scanning Engines: Memory On-Access Scanner. 290-300 - Talal Talib Jameel:
Load Balancing For Cloud-Based Dynamic Data Processing. 301-306 - Anderson Silva Marcolino, Edson OliveiraJr, Itana M. S. Gimenes, Ellen F. Barbosa:
Variability Resolution and Product Configuration with SMarty: An Experimental Study on UML Class Diagrams. 307-319 - Ashwini Janagal Padmanabha, Sanjay Harogolige Adimurthy:
Framework for Enhancing the Performance of Data Intensive MPI based HPC applications on Cloud. 320-328 - Atef A. Obeidat, Majd M. Al-Kofahi, Mohammad Jazi Bawaneh, Essam Said Hanandeh:
A Novel Botnet Detection System for P2P Networks. 329-336 - Basma Hisham, Alaa Hamouda:
Arabic Static and Dynamic Gestures Recognition Using Leap Motion. 337-354 - Heri Kuswanto, Yogi Sarumaha, Hayato Ohwada:
Comparison Between Selective Sampling and Random Undersampling for Classification of Customer Defection Using Support Vector Machine. 355-362 - Saufi Bukhari, Ku Ruhana Ku-Mahamud, Hiroaki Morino:
Fault Tolerance Grid Scheduling with Checkpoint Based on Ant Colony System. 363-370
Volume 13, Number 9, 2017
- Mahmoud Zaki Iskandarani:
Correlating and Modeling of Extracted Features from PVT Images of Composites using Optical Flow Technique and Weight Elimination Algorithm Optimization [OFT-WEA]. 371-379 - Amina Kharbach, Mouad el Omari, Amar Mardani, Benaissa Bellach, Mohammed Rahmoun:
Medical Images Registration based on Normalized Dissimilarity Index. 380-392 - Intan Sari Areni, Asyraful Insan Asry, Indrabayu:
A Hybrid Feature Extraction Method for Accuracy Improvement in "Aksara Lontara" Translation. 393-399 - Hajer Mohamed H. Ben Amer, Leelavathi Rajamanickam, Anas A. Abboud:
Liveness Detection from Real user, Printed Pictures and Pictures on Mobile Devices from Low Resolution Webcam. 400-407 - Tb. Ai Munandar, Sumiati:
The Classification of Cropping Patterns Based on Regional Climate Classification Using Decision Tree Approach. 408-415 - Manal Elobaid, Rafida M. Elobaid:
An Exploratory Analysis to Assess Computer Literacy and E-learning Among Students: A Case of Eastern Province of Kingdom of Saudi Arabia. 416-421 - Lock Siew Han, Mohd Jan Nordin:
Integrated Multiple Linear Regression-One Rule Classification Model for the Prediction of Stock Price Trend. 422-429 - Iman Ahmed ElSayed, Zeinab Ezz, Eman Nasr:
Goal Modeling Techniques in Requirements Engineering: A Systematic Literature Review. 430-439 - Manal Zettam:
A Randomized Population Constructive Heuristic for the Team Orienteering Problem. 440-451 - Sami Qawasmeh, Arwa Zabian:
DPSA: Deterministic Parallel Search Algorithm in Large Database. 452-459
Volume 13, Number 10, 2017
- Chakib Tadj, Moeiz Miraoui, Somia Belaidouni:
Using MVCA to Improve Architecture Modularity of Smart Spaces. 460-469 - Edson OliveiraJr, Ricardo Theis Geraldi:
Defect Types and Software Inspection Techniques: a Systematic Mapping Study. 470-495 - B. Ravi Prasad:
Real Time Density-Based Clustering (RTDBC) Algorithm for Big Data. 496-504 - Ahmad Abdel Jabbar Ahmad Mazhar, Ayman Mahmoud Aref Abdalla:
Trade-Off of Frame-Rate and Resolution in Online Game Streaming. 505-513 - Vivek Sharma, Bashir Alam, Mohammad Najmud Doja:
ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks. 514-523 - Atef Zaki Ghalwash, Aliaa Abdel-Halim Youssif, Ali Mohamed Nabil Allam:
Segmentation of Exudates via Color-based K-means Clustering and Statistical-based Thresholding. 524-536 - Naveen Hemrajani, Sunil Kumar Jangir:
A Comprehensive Review and Performance Evaluation of Detection Techniques of Black Hole Attack in MANET. 537-547 - Ja'afer Al-Saraireh:
An Efficient Approach for Query Processing Over Encrypted Database. 548-557 - Bandar Alshammari:
Enterprise Architecture Security Assessment Framework (EASAF). 558-571 - Emansa Hasri Putra, Risanuri Hidayat, Widyawan, I Wayan Mustika:
A Routing Optimization Based on Cross-Layer Design for Wireless Multimedia Sensor Networks (WMSNs). 572-580
Volume 13, Number 11, 2017
- Che Samihah Che Dalim, Hoshang Kolivand, Huda Kadhim, Mohd Shahrizal Sunar, Mark Billinghurst:
Factors Influencing the Acceptance of Augmented Reality in Education: A Review of the Literature. 581-589 - Avinanta Tarigan, Dewi Agushinta R., Adang Suhendra, Fikri Budiman:
Determination of SVM-RBF Kernel Space Parameter to Optimize Accuracy Value of Indonesian Batik Images Classification. 590-599 - Hery Harjono Muljo, Bens Pardamean, Anzaludin S. Perbangsa:
The Implementation of Online Learning for Early Detection of Cervical Cancer. 600-607 - Mahmoud A. Fakhreldin, Ahmed Farag Seddik:
Cloud Based Low Cost Retinal Detachment Screening Method Using Data Mining Techniques. 608-616 - Anderson Silva Marcolino, Edson OliveiraJr:
Comparing SMarty and PLUS for Variability Identification and Representation at Product-Line UML Class Level: A Controlled Quasi-Experiment. 617-632 - Abdallah Rhattoy, Mohammed Lahmer, Idriss Chana:
Impact of the Smart City Architecture, Speed and Traffic Density of Vehicles on the Performances of Vanets. 633-646 - Yonis Gulzar, Ali Amer Alwan, Norsaremah Salleh, Imad Fakhri Al Shaikhli:
Processing Skyline Queries in Incomplete Database: Issues, Challenges and Future Trends. 647-658 - Lauro Cássio Martins de Paula, Anderson da Silva Soares, Telma Woerle de Lima Soares, Anselmo E. de Oliveira, Clarimar José Coelho:
Modern Metaheuristic with Multi-Objective Formulation for the Variable Selection Problem. 659-666 - O. Imocha Singh, T. Romen Singh:
Image Binarization Using Block Boundary Pixels Mean. 667-673 - Shereen Ismail, Eman Alkhader, Amal Ahmad:
Prison Perimeter Surveillance System Using WSN. 674-679
Volume 13, Number 12, 2017
- Sanjay Kumar, Surjit Paul, Dilip Kumar Shaw:
Real-Time Multimodal Biometric User Authentication for Web Application Access in Wireless LAN. 680-693 - Rajni Jindal, Alka Singhal:
Performance Analysis for the Ontology based Intelligent Information Retrieval using Non Monotonic Inference Logic using SPARQL. 694-701 - Karim Zkik, Maha Tebaa, Tarik Tachihante, Ghizlane Orhanou:
A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds. 702-717 - Andrija Bernik, Danijel Radosevic, Daniel Strmecki:
Research on Efficiency of Applying Gamified Design into University's e-Courses: 3D Modeling and Programming. 718-727 - Indah Mekar Sari, Dana Sulistiyo Kusumo, Mira Kania Sabariah:
Analysis of Interaction Design Patterns on Drawing Application for Early Preschool Children using Inductive Approach (Case Study: ABC Coloring Book for Toddlers and Tracer-hand Writing Pattern Drawing Application). 728-734 - Malik Qasaimeh, Raad S. Al-Qassas:
Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements. 735-747 - Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi:
Segmented Block Cipher Algorithm Based on ASCII-Codes Maneuver. 748-755 - Alaa Omer Najim, Nor Asilah Wati Abdul Hamid, Zurina Mohd Hanapi, Idawaty Ahmad:
Comparative Study of Packet Scheduling Algorithm in LTE Network. 756-766 - Sayed Chhattan Shah:
A Mobile Ad hoc Cloud Computing and Networking Infrastructure for Automated Video Surveillance System. 767-780 - Deepa S. Kumar, M. Abdul Rahman:
Performance Evaluation of Apache Spark Vs MPI: A Practical Case Study on Twitter Sentiment Analysis. 781-794 - Naveed Ahmed:
Multi-View RGB-D Video Analysis and Fusion for 360 Degrees Unified Motion Reconstruction. 795-804
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.