default search action
The International Arab Journal of Information Technology, Volume 18
Volume 18, Number 1, January 2021
- Adnen Mahmoud, Mounir Zrigui:
Semantic similarity analysis for corpus development and paraphrase detection in arabic. 1-7 - Nadjla Bettayeb, Mhania Guerti:
Speech synthesis system for the holy quran recitation. 8-15 - Zobia Zafar, Muhammad Awais, Abdul Jaleel, Fiaz Majeed:
A distributed framework of autonomous drones for planning and execution of relief operations during flood situations. 16-24 - Jamil Razmak, Samir Al-janabi, Faten F. Kharbat, Charles H. Bélanger:
Lean database: an interdisciplinary perspective combining lean thinking and technology. 25-35 - Husamelddin A. M. Balla, Chen Guang Sheng, Weipeng Jing:
Reliability-aware: task scheduling in cloud computing using multi-agent reinforcement learning algorithm and neural fitted Q. 36-47 - Artem Obukhov, Mikhail Krasnyanskiy, Denis Dedov:
Formulation of two-stage problem of structural-parametric synthesis of adaptive electronic document management system. 48-55 - Pradeep Suthanthiramani, Sannasy Muthurajkumar, Ganapathy Sannasi, Kannan Arputharaj:
Secured data storage and retrieval using elliptic curve cryptography in cloud. 56-66 - Sara Chellali, Somaya Al-Máadeed, Ouassila Kenai, Maamar Ahfir, Walid Hidouci:
Middle eastern and north african english speech corpus (MENAESC): automatic identification of MENA english accents. 67-76 - Adnan Hnaif, Khalid Mohammad Jaber, Mohammad Ahmad Alia, Mohammed Daghbosheh:
Parallel scalable approximate matching algorithm for network intrusion detection systems. 77-84 - Kristo Radion Purba, David Asirvatham, Raja Kumar Murugesan:
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features. 85-94 - Obaida M. Al-hazaimeh, Mohammad F. Al-Jamal, Mohammad Bawaneh, Nouh Alhindawi, Bara'a Hamdoni:
A new image encryption scheme using dual chaotic map synchronization. 95-102 - Radhika Kulkarni, Revathy Subramanion, Suhas Patil:
A novel approach to maximize g-mean in nonstationary data with recurrent imbalance shifts. 103-113 - Rajagopal Devarajan, Padmanabhan Rao:
An efficient intrusion detection system by using behaviour profiling and statistical approach model. 114-124 - Fatma Elgendy, Mahmoud Alshewimy, Amany M. Sarhan:
Pain detection/classification framework including face recognition based on the analysis of facial expressions for E-health systems. 125-132
Volume 18, Number 2, March 2021
- Neziha Jaouedi, Noureddine Boujnah, Mohamed Salim Bouhlel:
A novel recurrent neural networks architecture for behavior analysis. 133-139 - Ali Benziane, Suryanti Awang, Mohammed Lebcir:
Development and implementation of a video watermarking method based on DCT transform. 140-147 - Sait Can Yücebas, Rabia Tintin:
Govdeturk: a novel turkish natural language processing tool for stemming, morphological labelling and verb negation. 148-157 - Hanene Boussi Rahmouni, Kamran Munir, Intidhar Essefi, Marco Casassa Mont, Tony Solomonides:
An ontology-based compliance audit framework for medical data sharing across europe. 158-169 - Mohammed Al-Janabi, Mohd Arfian Ismail:
Improved intrusion detection algorithm based on TLBO and GA algorithms. 170-179 - Balasubramanian Prabhu Kavin, Sannasi Ganapathy:
A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. 180-190 - Rongtai Cai, Peng Zhu:
Occlusion-aware visual tracker using spatial structural information and dominant features. 191-198 - Kannan Poongodi, Dhananjay Kumar:
Support vector machine with information gain based classification for credit card fraud detection system. 199-207 - Olakara Jamsheela, Gopalakrishna Kurup Raju:
Parallelization of Frequent Itemset Mining Methods with FP-tree: An Experiment with PrePost+ Algorithm. 208-213 - Vijay Gollamandala, Lavanya Kampa:
An additive sparse logistic regularization method for cancer classification in microarray data. 214-220 - Arun Singh:
Machine learning in openflow network: comparative analysis of DDoS detection techniques. 221-226 - Mahmoud Gad, Esam A. A. Hagras, Hasan Soliman, Noha A. Hikal:
A new parallel fuzzy multi modular chaotic logistic map for image encryption. 227-236 - Anas Ibrahim, Alexander G. Chefranov, Rushdi Hamamreh:
Ciphertext-only attack on RSA using lattice basis reduction. 237-247 - Ibrahim Assi, Rami Tailakh, Abdel Salam Sayyad:
Survey on software changes: reasons and remedies. 248-260
Volume 18, Number 3, May 2021
- Maryam Houtinezhad, Hamid Reza Ghaffary:
Improvement of imperialist competitive algorithm based on the cosine similarity criterion of neighboring objects. 261-269 - Mounira Hmayda, Ridha Ejbali, Mourad Zaied:
Automatic topics segmentation for news video by clustering of histogram of orientation gradients faces. 270-278 - Yasin Kaya:
Detection of bundle branch block using higher order statistics and temporal features. 279-285 - Rida Zainab, Muhammad Majid:
Emotion recognition based on EEG signals in response to bilingual music tracks. 286-296 - Meenakshi Garg, Manisha Malhotra, Harpal Singh:
A novel machine-learning framework-based on LBP and GLCM approaches for CBIR system. 297-305 - Guruviah Karpagarajesh, Helen Anita:
Maximizing the area spanned by the optical SNR of the 5G using digital modulators and filters. 306-311 - Senthil Prabakaran, Ramalakshmi Ramar:
Software defined network: load balancing algorithm design and analysis. 312-318 - Jyoti Aggarwal, Manoj Kumar:
Software metrics for reusability of component based software system: a review. 319-325 - Aya Hossam, Tarek M. Salem, Anar Abdel-Hady, Sherine M. Abd El-Kader:
MCA-MAC: modified cooperative access MAC protocol in wireless sensor networks. 326-335 - Khalid Mansour, Khaled Mahmoud:
A new approach for textual password hardening using keystroke latency times. 336-346 - Harinee Shanmuganathan, Anand Mahendran:
Encryption based on cellular automata for wireless devices in IoT environment. 347-355 - Metin Bilgin:
A new approach to automatically find and fix erroneous labels in dependency parsing treebanks. 356-364 - Bilal Ahmed, Li Wang:
Discretization based framework to improve the recommendation quality. 365-371 - Dmitriy N. Moldovyan, Nashwan Ahmed Al-Majmar, Alexander A. Moldovyan:
Algebraic supports and new forms of the hidden discrete logarithm problem for post-quantum public-key cryptoschemes. 372-379
Volume 18, Number 3A, Special Issue 2021
- Dana Halabi, Arafat Awajan, Ebaa Fayyoumi:
Syntactic annotation in the i3rab dependency treebank. 381-392 - Zina Houhamdi, Belkacem Athamena:
Multi-agents collaboration in open system. 393-404 - Shaymaa Hamandi, Abdul Monem S. Rahma, Rehab F. Hassan:
Multi-spectral hybrid invariant moment fusion technique for face identification. 405-413 - Nor Azrini Jaafar, Nor Azman Ismail, Yusman Azimi Yusoff:
Usability study of enhanced salat learning approach using motion recognition system. 414-421 - Shweta Sharma, Rama Krishna Challa, Rakesh Kumar:
An ensemble-based supervised machine learning framework for android ransomware detection. 422-429 - Jennifer Batamuliza, Damien Hanyurwimfura:
An anonymous identity-based with bilateral protocol for smart grid. 430-437 - Marwa Meissa, Saber Benharzallah, Laïd Kahloul, Okba Kazar:
A personalized recommendation for web API discovery in social web of things. 438-445 - Marwah Alian, Arafat Awajan:
Generating sense inventories for ambiguous arabic words. 446-451 - Mohamed A. Wahby Shalaby, Ayman R. Mohammed, Sally S. Kassem:
Supervised fuzzy c-means techniques to solve the capacitated vehicle routing problem. 452-463 - Idir Aoudia, Saber Benharzallah, Laïd Kahloul, Okba Kazar:
A multi-population genetic algorithm for adaptive QoS-aware service composition in fog-IoT healthcare environment. 464-475 - Alá F. Khalifeh, Khaled Aldahdouh, Sahel Alouneh:
LoRaWAN energy optimization with security consideration. 476-483 - Mohammad Farukh Hashmi, B. Kiran Kumar Ashish, Satyarth Katiyar, Avinash G. Keskar:
Computer vision in contactless biometric systems. 484-492
Volume 18, Number 4, July 2021
- Xueming Ding, Dongfei Ji:
Specific patches decorrelation channel feature on pedestrian detection. 493-503 - Muhammad Abbas, Fiza Murtaza, Muhammad Obaid Ullah, Muhammad Haroon Yousaf:
Space-time templates based features for patient activity recognition. 504-512 - Hamidreza Marzooni, Homayun Motameni, Ali Ebrahimnejad:
Architecture style selection using statistics of quality attributes to reduce production costs. 513-522 - Sunghyun Cho, Hyunsung Kim:
Privacy preserving authenticated key agreement based on bilinear pairing for uHealthcare. 523-530 - Murugan Sivaram:
IOT-pattern-as-a-service model for delay sensitive IOT integrated applications. 531-540 - Chien-Hua Tsai, Pin-Chang Su:
A robust secure self-certified concurrent signature scheme from bilinear pairings. 541-553 - Saed Alqaraleh:
Novel turkish sentiment analysis system using ConvNet. 554-561 - Samar Shilbayeh, Abdullah Abonamah:
Predicting student enrollments and attrition patterns in higher educational institutions using machine learning. 562-567 - Mourad Talbi, Nawel Mensia, Hatem Ezzaouia:
Modeling of a PV panel employing matlab/simulink and application of maximum power point tracking technique based on ANN. 568-577 - Pradeep Sivakumar, Jerritta Selvaraj, Krishnakumar Ramaraj, Arun Sahayadhas:
Analysis of alpha and theta band to detect driver drowsiness using electroencephalogram (EEG) signals. 578-584 - Partha Ghosh, Deep Sadhu, Soumya Sen:
A real-time business analysis framework using virtual data warehouse. 585-595 - Amal Alzu'bi, Hassan Najadat, Walaa Eyadat, Alia Al-Mohtaseb, Hussam Haddad:
A new approach for detecting eosinophils in the gastrointestinal tract and diagnosing eosinophilic colitis. 596-603 - Wujian Yang, Wenyong Weng, Guanlin Chen, Zihang Jiang:
Elitist strategy of genetic algorithms for writing tang poetry. 604-610 - Ahmed Barnawi, Marwan Alharbi:
Performance evaluation and simulation of the traversal algorithms for robotic agents in advanced search and find (ASAF) system. 611-623
Volume 18, Number 5, September 2021
- Raju Bhukya:
Encoding gene expression using deep autoencoders for expression inference. 625-633 - Shi-Hua Liu, Hao Zhang, Xianghua Liu:
A study on two-stage mixed attribute data clustering based on density peaks. 634-643 - Arikrishnaperumal Ramaswamy Aravind, Rekha Chakravarthi:
Adaptive optimization for optimal mobile sink placement in wireless sensor networks. 644-650 - Sameerchand Pudaruth, Sunjiv Soyjaudah, Rajendra Gunputh:
Classification of legislations using deep learning. 651-662 - Ergün Yücesoy:
Two-level classification in determining the age and gender group of a speaker. 663-670 - Naseeruddin Naseeruddin, Venkanagouda Patil:
Experimental modeling of the residual energy of a rechargeable battery-powered node in wireless networks. 671-677 - Sarmad Mahar, Sahar Zafar, Kamran Nishat:
Headnote prediction using machine learning. 678-685 - Marriam Nawaz, Tahira Nazir, Momina Masood:
Glaucoma detection using tetragonal local octa patterns and SVM from retinal images. 686-693 - Sreekanth Ramakrishnan, Latha Sevalaiappan, Suganthe Ravi Chandran:
Traffic-aware clustering scheme for MANET using modified elephant herding optimization algorithm. 694-703 - Haitham Issa, Sali Issa, Wahab Ali Shah:
A novel method for gender and age detection based on EEG brain signals. 704-710 - Qingzhu Wang, Xiaoyun Cui:
Joint optimization offloading strategy of execution time and energy consumption of mobile edge computing. 711-718 - Malini Alagarsamy, Ajitha Sundarji, Aparna Arunachalapandi, Keerthanaa Kalyanasundaram:
Cost-awareant colony optimization based model for load balancing in cloud computing. 719-729 - Sawsan Alshattnawi, Mohammad Al-Marie:
Spider monkey optimization algorithm for load balancing in cloud computing environments. 730-738 - Ersin Elbasi:
Measure of singular value decomposition (M-SVD) based quality assessment for medical images with degradation. 739-746
Volume 18, Number 6, November 2021
- Renwei Tu, Zhongjie Zhu, Yongqiang Bai, Ming Gao, Zhifeng Ge:
Key parts of transmission line detection using improved YOLO v3. 747-754 - Farah Akif, Aqdas Naveed Malik, Ijaz Mansoor Qureshi, Ayesha Abbasi:
Transmit and receive antenna selection based resource allocation for self-backhaul 5G massive MIMO hetnets. 755-766 - Abdullah Sevin, Cüneyt Bayilmis:
A QoS-based medium access control protocol for WBANs and its performance evaluation. 767-772 - Adil Bashir, Ajaz Hussain Mir:
Lightweight secure MQTT for mobility enabled e-health internet of things. 773-781 - Kiran Sree Pokkuluri, Devi Nedunuri Usha:
A secure cellular automata integrated deep learning mechanism for health informatics. 782-788 - Pratyush Sharma, Souradeep Banerjee, Devyanshi Tiwari, Jagdish Chandra Patni:
Machine learning model for credit card fraud detection- a comparative analysis. 789-796 - Yuen Chark See, Eugene Liew, Norliza Mohd. Noor:
Gabor and maximum response filters with random forest classifier for face recognition in the wild. 797-806 - Arti Jain, Anuja Arora, Divakar Yadav, Jorge Morato, Amanpreet Kaur:
Text summarization technique for punjabi language using neural networks. 807-818 - May Y. Al-Nashashibi, Wa'el Hadi, Nuha El-Khalili, Ghassan Issa, Abed Alkarim AlBanna:
A new two-step ensemble learning model for lmproving stress prediction of automobile drivers. 819-829 - Mahnaz Toloueiashtian, Mehdi Golsorkhtabaramiri, Seyed Yaser Bozorgi Rad:
Solving point coverage problem in wireless sensor networks using whale optimization algorithm. 830-838 - Saeedeh Zebhi, Seyed Mohammad T. Almodarresi, Vahid Abootalebi:
Human activity recognition based on transfer learning with spatio-temporal representations. 839-845 - Dimple Tiwari, Bharti Nagpal:
Enhanced long short-term memory (ELSTM) model for sentiment analysis. 846-855 - Hui Liu, Chengli Sun, Jiliang Tu:
Application of intuitionistic fuzzy evaluation method in aircraft cockpit display ergonomics. 856-863 - Zhongyu Zhou, Dechang Pi:
Data streams oriented outlier detection method: a fast minimal infrequent pattern mining. 864-870
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.