default search action
The International Arab Journal of Information Technology, Volume 17
Volume 17, Number 1, January 2020
- Razika Souadek, Naceur-Eddine Boukezzoula:
New image watermarking algorithm based on DWT and pixel movement function PMF. 1-7 - Lei Zheng, Jiawei Zou, Baoyu Liu, Yong Hu, Yong Deng:
A novel evidence distance in power set space. 8-15 - Shubair Abdulla:
A neuro-fuzzy system to detect IPv6 router alert option DoS packets. 16-25 - Ishrat-Un-Nisa Uqaili, Syed Ahsan:
Machine learning based prediction of complex bugs in source code. 26-37 - Jasleen Kaur, Jatinderkumar R. Saini:
Designing punjabi poetry classifiers using machine learning and different textual features. 38-44 - Nora Mohammed:
Extracting word synonyms from text using neural approaches. 45-51 - Mona A. Mohamed, Sahar Mohamed Ghanem, Magdy H. Nagi:
Privacy-preserving for distributed data streams: towards l-diversity. 52-64 - Nermeen Alami, Nabil Arman, Faisal Khamayseh:
Generating sequence diagrams from arabic user requirements using mada+tokan tool. 65-72 - Gobalakrishnan Natesan, Arun Chokkalingam:
An improved grey wolf optimization algorithm based task scheduling in cloud computing environment. 73-81 - Wen Zhou, Jinyuan Jia:
Training convolutional neural network for sketch recognition on large-scale dataset. 82-89 - Uferah Shafi, Munam Ali Shah, Abdul Wahid, Kamran Abbasi, Qaisar Javaid, Muhammad Nabeel Asghar, Muhammad Haider:
A novel amended dynamic round robin scheduling algorithm for timeshared systems. 90-98 - Ning Fu, Lijun Shan, Chenglie Du, Zhiqiang Liu, Han Peng:
Modelling and verification of ARINC 653 hierarchical preemptive scheduling. 99-106 - Huijie Lian, Qingxian Wang, Guangbo Wang:
Large universe ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. 107-117 - Sanaa Ghouzali, Souad Larabi Marie-Sainte:
Face identification based bio-inspired algorithms. 118-127 - Mohammad Ahmad Alia, Khaled Suwais:
Improved steganography scheme based on fractal set. 128-136 - Tukhtaev Sokhib, Taeg Keun Whangbo:
A combined method of skin-and depth-based hand gesture recognition. 137-145
Volume 17, Number 2, March 2020
- Ahmed Thahab:
A novel secure video steganography technique using temporal lifted wavelet transform and human vision properties. 147-153 - Vijay Kumar Sharma, Devesh Kumar Srivastava, Pratistha Mathur:
A daubechies DWT based image steganography using smoothing operation. 154-161 - Huifen Huang, Zhihong Wu, Jing Ge, Lu Wang:
Toward building video multicast tree with congestion avoidance capability in software-defined networks. 162-169 - Lei Deng, Yong Gao:
Gammachirp filter banks applied in roust speaker recognition based on GMM-UBM classifier. 170-177 - Ebrahim Al-wajih, Moataz A. Ahmed:
A new application for gabor filters in face-based gender classification. 178-187 - Zeynep Hilal Kilimci, Sevinç Ilhan Omurca:
Enhancement of the heuristic optimization based on extended space forests using classifier ensembles. 188-195 - Huixian Li, Jin Gao, Lingyun Wang, Liaojun Pang:
MPKC-based threshold proxy signcryption scheme. 196-206 - Raju Bhukya, Sumit Deshmuk:
Referential DNA data compression using hadoop map reduce framework. 207-214 - Mohammed Tabash, Mohamed Abd Allah Makhlouf, Bella Tawfik:
Intrusion detection model using naive bayes and deep learning technique. 215-224 - Anju Shukla, Shishir Kumar, Harikesh Singh:
Fault tolerance based load balancing approach for web resources in cloud environment. 225-232 - Hala Mulki, Hatem Haddad, Mourad Gridach, Ismail Babaoglu:
Empirical evaluation of leveraging named entities for arabic sentiment analysis. 233-240 - Yangyang Li, Bo Liu:
A new vector representation of short texts for classification. 241-249 - Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah, Harish Sekar:
A hybrid approach for providing improved link connectivity in SDN. 250-256 - Ruzayn Quaddoura:
On 2-colorability problem for hypergraphs with P_8-free incidence graphs. 257-263 - Asha Narayana, Adapa Venkata Narasimhadhan:
Enhanced median flow tracker for videos with illumination variation based on photometric correction. 264-271 - Adeel Shiraz Hashmi, Tanvir Ahmad:
FAAD: a self-optimizing algorithm for anomaly detection. 272-280
Volume 17, Number 3, May 2020
- Aafaq Zahid, Nurfadhlina Mohd Sharef, Aida Mustapha:
Normalization-based neighborhood model for cold start problem in recommendation system. 281-290 - Qing Yang, Haiyang Wang, Mengyang Bian, Yuming Lin, Jingwei Zhang:
Incorporating reverse search for friend recommendation with random walk. 291-298 - Riaz Ahmad, Saeeda Naz, Muhammad Zeshan Afzal, Sheikh Faisal Rashid, Marcus Liwicki:
A deep learning based arabic script recognition system: benchmark on KHAT. 299-305 - Dhiah el Diehn I. Abou-Tair, Simon Büchsenstein, Alá F. Khalifeh:
A fog computing-based framework for privacy preserving IoT environments. 306-315 - Ahmed Maghawry, Yasser M. K. Omar, Amr Badr:
Self-organizing map vs initial centroid selection optimization to enhance k-means with genetic algorithm to cluster transcribed broadcast news documents. 316-324 - Phuoc Thi Hong Doan, Ngamnij Arch-int, Somjit Arch-int:
A semantic framework for extracting taxonomic relations from text corpus. 325-337 - Nagarajan Balasubramanaian, Suguna Jayapal, Satheeshkumar Janakiraman:
A contrivance to encapsulate virtual scaffold with comments and notes. 338-346 - Haval Sadeq:
Using total probability in image template matching. 347-357 - Loiy Alsbatin, Gürcü Öz, Ali Hakan Ulusoy:
A novel physical machine overload detection algorithm combined with quiescing for dynamic virtual machine consolidation in cloud data centers. 358-366 - Meshrif Alruily:
Issues of dialectal saudi twitter corpus. 367-374 - Rashedul Islam, Md. Rafiqul Islam, Kamrul Hasan Talukder:
An enhanced MSER pruning algorithm for detection and localization of bangla texts from scene images. 375-385 - Safdar Hussain Shaheen, Muhammad Yousaf, Mudassar Jalil:
A smart card oriented secure electronic voting machine built on NTRU. 386-393 - Khalid M. O. Nahar, Ra'ed M. Al-Khatib, Moy'awiah Al-Shannaq, Mohammad Daradkeh, Rami Malkawi:
Direct text classifier for thematic arabic discourse documents. 394-403 - Asjad Amin, Muhammad Ali Qureshi:
A novel image retrieval technique using automatic and interactive segmentation. 404-410 - Anjana Gosain, Ganga Sharma:
A new metric for class cohesion for object oriented software. 411-421 - Raju Bhukya, Achyuth Ashok:
Gene expression prediction using deep neural networks. 422-431
Volume 17, Number 4, July 2020
- Xiaogang Zhang, Shouqian Sun, Kejun Zhang:
A New Hypred Improved Method for Measuring Concept Semantic Similarity in WordNet. 433-439 - Raed Alazaidah, Farzana Ahmad, Mohamad Mohsin:
Multi Label Ranking Based on Positive Pairwise Correlations Among Labels. 440-449 - Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu:
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration. 450-460 - Shakirullah Shah, Jamil Ahmad, Najeeb Ur Rehman:
Design and Implementation of Inter-operable and Secure Agent Migration Protocol. 461-470 - Jinlin Ma, Ziping Ma:
3D Radon Transform for Shape Retrieval Using Bag-of-Visual-Features. 471-479 - Mohamed Amine Belkadi, Abdelhamid Daamouche:
Swarm Intelligence Approach to QRS Detection. 480-487 - Mustafa Al-Fayoumi, Jaber Alwidian, Mohammad Abusaif:
Intelligent Association Classification Technique for Phishing Website Detection. 488-496 - Sunil Patel, Ramji M. Makwana:
Connectionist Temporal Classification Model for Dynamic Hand Gesture Recognition using RGB and Optical flow Data. 497-506 - Sidra Sajid, Ali Javed, Aun Irtaza:
An Effective Framework for Speech and Music Segregation. 507-514 - Göksu Tüysüzoglu, Derya Birant:
Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning. 515-528 - Mohammad Ebrahim Khademi, Mohammad Fakhredanesh, Seyed Mojtaba Hoseini:
Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space. 529-538 - Jun Hong, Tao Wen, Quan Guo:
Query Authentication of Outsourced Spatial Database. 539-547 - Naziha Khlif, Ahmed Ghorbel, Walid Aydi, Nouri Masmoudi:
Generation of Chaotic Signal for Scrambling Matrix Content. 548-553 - Muthukumar Arunachalamand, Kavipriya Amuthan:
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault. 554-561 - Muhammad Babar, Akmal Saeed Khattak, Fahim Arif, Muhammad Usman Tariq:
An Improved Framework for Modelling Data Warehouse Systems Using UML Profile. 562-571 - Mohammad Javad Parseh, Mohammad Rahmanimanesh, Parviz Keshavarzi:
Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods. 572-578
Volume 17, Number 4A, Special Issue 2020
- Gullelala Jadoon, Muhammad Shafi, Sadaqat Jan:
Model transformations carried by the traceability framework for enterprises in software industry. 579-587 - Ala'eddin Masadeh, Haythem Bany Salameh, Ahmad I. Abu-El-Haija:
Design and simulation of spectrum access and power management protocol for dynamic access networks. 588-597 - Mohammed Mahmod Shuaib, Zarita Zainuddin:
Incorporating intelligence for overtaking moving threatening obstacles. 598-606 - Mohammad Abuthawabeh, Khaled W. Mahmoud:
Enhanced android malware detection and family classification, using conversation-level network traffic features. 607-614 - Nada Mirza:
Robotic path planning and fuzzy neural networks. 615-620 - Qutaibah Althebyan:
Mitigating insider threats on the edge: a knowledgebase approach. 621-628 - Mariam Khader, Ghazi Al-Naymat:
Discovery of arbitrary-shapes clusters using DENCLUE algorithm. 629-634 - Ahmad Al-Qerem, Ghazi Al-Naymat, Mays Alhasan, Mutaz M. Al-Debei:
Default prediction model: the significant role of data engineering in the quality of outcomes. 635-644 - Zina Houhamdi, Belkacem Athamena:
Identity identification and management in the internet of things. 645-654 - Mohammad M. Shurman, Rami M. Khrais, Abdulrahman A. Yateem:
DoS and DDoS attack detection using deep learning and IDS. 655-661 - Huthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi:
On detection and prevention of zero-day attack using cuckoo sandbox in software-defined networks. 662-670 - Mohammed Ajam, Hussein Kanaan, Lina El Khansa, Mohammad Ayache:
Identification of ischemic stroke by marker controlled watershed segmentation and fearture extraction. 671-676 - Adnan Shaout, Brennan Crispin:
Streaming video classification using machine learning. 677-682
Volume 17, Number 5, September 2020
- Anju Shukla, Shishir Kumar, Harikesh Singh:
ANN based execution time prediction model and assessment of input parameters through ISM. 683-691 - Leyi Xiao, Honglin Ouyang, Chaodong Fan:
Otsu?s thresholding method based on plane intercept histogram and geometric analysis. 692-701 - Manal M. Khayyat, Lamiaa A. Elrefaei:
A deep learning based prediction of arabic manuscripts handwriting style. 702-712 - Mukhriddin Mukhiddinov, Rag-Gyo Jeong, Jinsoo Cho:
Saliency cuts: salient region extraction based on local adaptive thresholding for image information recognition of the visually impaired. 713-720 - Kamal Bashir, Tianrui Li, Mahama Yahaya:
A novel feature selection method based on maximum likelihood logistic regression for imbalanced learning in software defect prediction. 721-730 - Chengcheng Li, Fengming Liu, Pu Li:
Text similarity computation model for identifying rumor based on bayesian network in microblog. 731-741 - Fawaz S. Al-Anzi, Dia AbuZeina:
Enhanced latent semantic indexing using cosine similarity measures for medical application. 742-749 - Hassan Najadat, Ibrahim Al-Daher, Khaled Alkhatib:
Performance evaluation of industrial firms using DEA and DECORATE ensemble method. 750-757 - Abdul Hafeez Khan, Syed Ali Abbas, Aqeel-ur Rehman:
Ontology-based transformation and verification of uml class model. 758-768 - Shiwei Che, Wu Yang, Wei Wang:
Improved streaming quotient filter: a duplicate detection approach for data streams. 769-777 - Ahmed Nasser, Hayri Sever:
A concept-based sentiment analysis approach for arabic. 778-788 - Hichem Rahab, Abdelhafid Zitouni, Mahieddine Djoudi:
An enhanced corpus for arabic newspapers comments. 789-798 - Ahmet Cevahir Cinar, Mustafa Servet Kiran:
The performance of penalty methods on tree-seed algorithm for numerical constrained optimization problems. 799-807 - Faouzi Jaïdi, Faten Ayachi, Adel Bouhoula:
Advanced analysis of the integrity of access control policies: the specific case of databases. 808-815 - Lei Shi, Junping Du, Feifei Kou:
A sparse topic model for bursty topic discovery in social networks. 816-824 - Merouane Chettat, Djamel Gaceb, Soumia Belhadi:
A fast high precision skew angle estimation of digitized documents. 825-831
Volume 17, Number 6, November 2020
- Ahmad Esmaeilkhah, Changiz Ghobadi, Javad Nourinia, Maryam Majidzadeh:
Unified inter-letter steganographic algorithm, a text-based data hiding method. 833-838 - Doaa H. Elsayed, Eman S. Nasr, Alaa El-Din M. El Ghazali, Mervat Gheith:
A self-healing model for QoS-aware web service composition. 839-846 - Shengbing Ren, Xiang Zhang:
Synthesizing conjunctive and disjunctive linear invariants by K-means++ and SVM. 847-856 - Mohamed Dahmani, Mhania Guerti:
Recurrence quantification analysis of glottal signal as non linear tool for pathological voice assessment and classification. 857-866 - Ra'Ed Bani-Abdelrahman, Rafat Alshorman, Walter Hussak, Amitabh Trehan:
Specification of synchronous network flooding in temporal logic. 867-874 - Imran Ashraf, Soojung Hur, Yongwan Park:
An investigative analysis on finding patterns in co-author and co-institution networks for LIDAR research. 875-884 - Allam Mohan, Malaiyappan Nandhini:
Wrapper based feature selection using integrative teaching learning based optimization algorithm. 885-894 - Dinesh Elangovan, Ramesh Muthiya:
Design and implementation of crypt analysis of cloud data intrusion management system. 895-905 - Pongsathon Janyoi, Pusadee Seresangtakul:
F0 modeling for isarn speech synthesis using deep neural networks and syllable-level feature representation. 906-915 - Niyati Kumari Behera, Mahalakshmi Guruvayur Suryanarayanan:
Enriching domain concepts with qualitative attributes: a text mining based approach. 916-925 - Reza Mehmood, Arvind Selwal:
Polynomial based fuzzy vault technique for template security in fingerprint biometrics. 926-934 - Jihene Younes, Hadhemi Achour, Emna Souissi, Ahmed Ferchichi:
A deep learning approach for the romanized tunisian dialect identification. 935-946 - Arnisha Khondaker, Arman Khandaker, Jia Uddin:
Computer vision-based early fire detection using enhanced chromatic segmentation and optical flow analysis technique. 947-953 - Kush Shrivastava, Shishir Kumar:
A sentiment analysis system for the hindi language by integrating gated recurrent unit with genetic algorithm. 954-964 - Thakkalapally Preethi, Bharat Amberker:
Traceable signatures using lattices. 965-975 - Karima Kies, Nacéra Benamrane:
A dynamic particle swarm optimisation and fuzzy clustering means algorithm for segmentation of multimodal brain magnetic resonance image data. 976-983
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.