Journal: Int. Arab J. Inf. Technol.

Volume 14, Issue 6

803 -- 811Mojeeb Al-Khiaty, Radwan Abdel-Aal, Mahmoud O. Elish. Abductive network ensembles for improved prediction of future change-prone classes in object-oriented software
812 -- 819Jean De Dieu Nkapkop, Joseph Yves Effa, Monica Borda, Laurent Bitjoka, Alidou Mohamadou. Chaotic encryption scheme based on a fast permutation and diffusion structure
820 -- 825Emna Hkiri, Souheyl Mallat, Mounir Zrigui, Mourad Mars. Constructing a lexicon of arabic-english named entity using SMT and semantic linked data
826 -- 834Mohammed Awad. Forecasting of chaotic time series using RBF neural networks optimized by genetic algorithms
835 -- 841Said Gadri, Abdelouahab Moussaoui. Contextual text categorization: an improved stemming algorithm to increase the quality of categorization in arabic text
842 -- 850Aymen Abdullah Alsaffar, Pham Phuoc Hung, Eui-nam Huh. An architecture of thin client-edge computing collaboration for data distribution and resource allocation in cloud
851 -- 860Meng Han, Jian Ding, Juan Li. TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model
861 -- 869Ines Chihi, Afef Abdelkrim, Mohamed Benrejeb. Internal model control to characterize human handwriting motion
870 -- 879Mazen Abdullah Bahashwan, Syed A. R. Abu-Bakar, Usman Ullah Sheikh. Efficient segmentation of arabic handwritten characters using structural features
880 -- 889Wenhui Li, Jinlong Zhu, Huiying Li, Qiong Wu, Liang Zhang. A novel swarm intelligence algorithm for the evacuation routing optimization problem
890 -- 896Brindha Palanisamy, Senthilkumar Athappan. The veracious counting bloom filter
897 -- 906Ganesan Periyanagounder, Sivakumar Selvarasu, Sundar Subbiah. A MMDBM classifier with CPU and CUDA GPU computing in various sorting procedures
907 -- 913Samiullah Khan, Mohammad Abdul Qadir. Inter-path OOS packets differentiation based congestion control for simultaneous multipath transmission
914 -- 922Egambaram Kodhai, Selvadurai Kanmani. Method-level code clone detection for java through hybrid approach
923 -- 929Arumugam Sakthivel. Enhancing cloud security based on group signature

Volume 14, Issue 5

663 -- 669Qaisar Abbas, Tanzila Saba. An improved statistical model of appearance under partial occlusion
670 -- 680Salim Khiat, Hafida Belbachir, Rahal Sid Ahmed. Rule schema multi-level for local patterns analysis: application in production field
681 -- 690Amine Benzenache, Hamid Seridi, Herman Akdag. Features modelling in discrete and continuous hidden markov models for handwritten arabic words recognition
691 -- 697Muhammad Sohail Khan, Dohyeun Kim. Service-oriented process modelling for device control in future networks
698 -- 706Hussain Dawood, Hassan Dawood, Ping Guo. Generalization of impulse noise removal
707 -- 712Amandeep Kaur, Vishal Gupta. A novel approach for sentiment analysis of punjabi text using SVM
713 -- 720Rachid Zaghdoudi, Hamid Seridi. Combination of multiple classifiers for off-line handwritten arabic word recognition
721 -- 728Ahmed Jafar, Mohammed Fakhr, Mohamed Farouk. Enhanced clustering-based topic identification of transcribed arabic broadcast news
729 -- 737Mahmood Ahmed, Muhammad Shoaib. A metrics driven design approach for real time environment application
738 -- 746Mehmet Gül, Sadik Kara, Abdurrahman Isikdogan, Yusuf Yarar. Diagnosis of leptomeningeal metastases disease in mri images by using image enhancement methods
747 -- 754Kola Periyasamy, Jayadharini Jaiganesh, Kanchan Ponnambalam, Jeevitha Rajasekar, Arputharaj Kannan. Analysis and performance evaluation of cosine neighbourhood recommender system
755 -- 763Osama A. Mehdi, Hamidah Ibrahim, Lilly Suriani Affendey. An approach for instance based schema matching with google similarity and regular expression
764 -- 773Sadagopan Padmakala, Ganapathy AnandhaMala. Interactive video retrieval using semantic level features and relevant feedback
774 -- 781Hamidreza Hosseinzadeh, Farbod Razzazi. An SNR unaware large margin automatic modulations classifier in variable SNR environments
782 -- 789Jasmina Vasovic, Miroslav Radojicic, Stojan Vasovic, Zoran Nesic. Multi-criteria selection of the computer configuration for engineering design
790 -- 801Shadi Nashwan. SAK-AKA: a secure anonymity key of authentication and key agreement protocol for LTE network

Volume 14, Issue 4A

543 -- 551Issam Jebreen, Ahmad Alqerem. Empirical study of analysts' practices in packaged software implementation at small software enterprises
552 -- 564Djamal Bennouar. An automatic grading system based on dynamic corpora
565 -- 571Rachid Ahdid, Said Safi, Bouzid Manaut. Euclidean and geodesic distance between a facial feature points in two-dimensional face recognition system
572 -- 577Youssef Khmou, Said Safi. Lorentzian model of spatially coherent noise field in narrowband direction finding
578 -- 585Farida Retima, Laïd Kahloul, Benharzallah Saber, Okba Kazar. A comparative analysis of context-management approaches for the internet of things
586 -- 597Rawad Hammad, Mohammed Odeh, Zaheer Abbas Khan. Elem: a novel e-learner experience model
598 -- 607Mariam Biltawi, Arafat Awajan, Sara Tedmori, Akram Al-Kouz. Exploiting multilingual wikipedia to improve arabic named entity resources
608 -- 613Yassine Chajri, Belaid Bouikhalene, Abdelkrim Maarir. Segmentation of text/graphic from handwritten mathematical documents using gabor filter
614 -- 623Ilhame Agnaou, Belaid Bouikhalene. New approach for 3d object forms detection using a new algorithm of SUSAN descriptor
624 -- 631Ahmed Adart, Hicham Mouncif, Mohamed Naimi. Vehicular ad-hoc network application for urban traffic management based on markov chains
632 -- 638Mohamed Er-rouidi, Houda Moudni, Hassan Faouzi, Hicham Mouncif, Abdelkrim Merbouha. Enhancing energy efficiency of reactive routing protocol in mobile ad-hoc network with prediction on energy consumption
639 -- 646Mohamed Elleuch, Ansar Hani, Monji Kherallah. Arabic handwritten script recognition system based on HOG and gabor features
647 -- 653Tareq Alhmiedat, Amer O. Abu Salem. A hybrid range-free localization algorithm for zigbee wireless sensor networks
654 -- 661Aya Nuseir, Mahmoud Al-Ayyoub, Mohammed Al-Kabi, Ghassan G. Kanaan, Riyad Al-Shalabi. Improved hierarchical classifiers for multi-way sentiment analysis

Volume 14, Issue 4

413 -- 422Chang-Kyun Jeon, Neunghoe Kim, Hoh In. A probabilistic approach to building defect prediction model for platform-based product lines
423 -- 427Zeki Oralhan, Burcu Oralhan, Yavuz Yigit. Smart city application: internet of things (IoT) technologies based smart waste collection using data mining approach and ant colony optimization
428 -- 435Bhuvana Shanmugam, Radhakrishnan Rathinavel, Tamije Selvy Perumal, Subhakala Subbaiyan. An efficient perceptual of CBIR system using MIL-SVM classification and SURF feature extraction
436 -- 441Roya Asadi, Mitra Asadi, Shokoofeh Asadi. An unsupervised feed forward neural network method for efficient clustering
442 -- 447Saini Kumar, Challa Krishna, Kushwaha Singh. A new way of accelerating web by compressing data with back reference-prefer geflochtener
448 -- 456Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar. A new (k, n) secret image sharing scheme (SISS)
457 -- 463Sobia Mahalingam, Valarmathi Lakshapalam, Saranya Ekabaram. Image compression based on iteration-free fractal and using fuzzy clustering on DCT coefficients
464 -- 472Hazem M. El-Bakry, Ibrahim M. El-Henawy, Hagar El-Hadad. Muzzle classification using neural networks
473 -- 480Naresh Kumar Nagwani. A bi-level text classification approach for sms spam filtering and identifying priority messages
481 -- 487Hikmat Ullah Khan, Ali Daud. Using machine learning techniques for subjectivity analysis based on lexical and non-lexical features
488 -- 494Aissa Amrouche, Leila Falek, Hocine Teffahi. Design and implementation of a diacritic arabic text-to-speech system
495 -- 501Md. Imdadul Islam, Md. Mezbahul Islam, Rahmina Rubaiat, Abu Sayed Md. Mostafizur Rahaman, M. Ruhul Amin. Pattern recognition using the concept of disjoint matrix of MIMO system
502 -- 511Dhiaa Musleh, Khaldoun Halawani, Sabri A. Mahmoud. Fuzzy modeling for handwritten arabic numeral recognition
512 -- 520Meisen Pan, Jian-jun Jiang, Fen Zhang, Qiusheng Rong. Medical image registration and fusion using principal component analysis
521 -- 527Nidaa A. Abbass, Jahanshah Kabudian. Speech scrambling based on independent component analysis and particle swarm optimization
528 -- 533Manipoonchelvi Pandivalavan, Muneeswaran Karuppiah. Saliency detection for content aware computer vision applications
534 -- 542Quanchao Liu, Heyan Huang, Chong Feng. Simultaneously identifying opinion targets and opinion-bearing words based on multi-features in chinese micro-blog texts

Volume 14, Issue 3

275 -- 284Sarumathi Sengottaian, Shanthi Natesan, Sharmila Mathivanan. Weighted delta factor cluster ensemble algorithm for categorical data clustering in data mining
285 -- 292Kavitha Chinniyan, Sudha Gangadharan, Kiruthika Sabanaikam. Semantic similarity based web document classification using support vector machine
293 -- 299Parneeta Sidhu, Mohinder Bhatia. Online approach to handle concept drifting data streams using diversity
300 -- 306Balamurugan Rengeswaran, Natarajan Mathaiyan, Kandhasamy Premalatha. Cuckoo search with mutation for biclustering of microarray gene expression data
307 -- 313Minh Hieu, Hai Nam, Nikolay A. Moldovyan, Giang Tien. New blind signature protocols based on a new hard problem
314 -- 323Radhakrishnan Ayyapazham, Kavitha Velautham. Proficient decision making on virtual machine creation in IaaS cloud environment
324 -- 331Tajuddeen R. Gwadabe, Mohammad Shukri Salman. A new leaky-LMS algorithm with analysis
332 -- 338Wahiba Karaa, Thabet Slimani. A new approach for arabic named entity recognition
339 -- 345Wen Gao 0001, Yupu Hu, Baocang Wang, Jia Xie. Improved identification protocol in the quantum random oracle model.
346 -- 354Manuel Flores, Gualberto Torres, Gina Garcia, Miguel Licona. Fingerprint verification methods using delaunay triangulations
355 -- 361Teng Lv, Ping Yan, Weimin He. Mapping XML to inverted indexed circular linked lists
362 -- 371Yongfeng Cui, Shi Dong, Wei Liu. Feature selection algorithm based on correlation between muti metric network traffic flow features
372 -- 379Zhenhua Huang, Jiawen Zhang, Zheng Liu, Bo Zhang, Dong Wang. Skyline recommendation in distributed networks
380 -- 392Yacine Djebar, Mohamed Tahar Kimour, Nouredine Guersi. A feature model metrics-based approach to develop a software product line
393 -- 401Suat Secgin, Gökhan Dalkiliç. A decision support system using demographic issues: a case study in turkey
402 -- 412Omar M. Wahdan, Mohammad Faidzul Nasrudin, Khairuddin Omar. Shearing invariant texture descriptor from a local binary pattern and its application in paper fingerprinting

Volume 14, Issue 2

146 -- 151Sudha Krishnan, Sudhakar Radhakrishnan. Compression of medical images through DPCM coding of multi resolution and multidirectional subbands
152 -- 158Pandarinathan Radhakrishnan, Selvadurai Kanmani, Malaiyappan Nandhini. Pair programming: a teaching and learning tool for defending student's mental energy
159 -- 167Osama Alfarraj, Ahed Abugabah. Extending information system models to the health care context: an empirical study and experience from developing countries
168 -- 174Lotfi Abdi, Faten Ben Abdallah, Aref Meddeb. Real-time watermarking algorithm of H.264/AVC video stream
175 -- 185Sherly Kuriakose, Raju Nedunchezhian. Efficient adaptive frequent pattern mining techniques for market analysis in sequential and parallel systems
186 -- 194Hassiba Nemmour, Youcef Chibani. Artificial immune algorithm for handwritten arabic word recognition
195 -- 207Mohamed Salah Benselim, Hassina Seridi-Bouchelaghem. Towards a UML profile for context-awareness domain
208 -- 214Shomona Jacob, Geetha Raju. Software defect prediction in large space systems through hybrid feature selection and classification
215 -- 222Areej Al-Zaidi, Rizwan Qureshi. Global software development geographical distance communication challenges
223 -- 229Yun-Fei Jia, Renbiao Wu. An approach for identifying failure-prone state of computer system
230 -- 238Basem Almadani, Shadi Abudalfa, Shuang-Hua Yang. QoS adaptation for publish/subscribe middleware in real-time dynamic environments
239 -- 245Saad Bin Ahmed, Saeeda Naz, Salahuddin Swati, Muhammad Imran Razzak, Arif Iqbal Umar. UCOM offline dataset-an urdu handwritten dataset generation
246 -- 253Soudeh Babaeizadeh, Rohanin Ahmad. Enhanced constrained artificial bee colony algorithm for optimization problems
254 -- 259Steven Fernandes, Josemin Bala. A comparative study on various state of the art face recognition techniques under varying facial expressions
260 -- 266Ghazaleh Eslami, Abolfazl Haghighat, Saeed Farokhi. New replica server placement strategies using clustering algorithms and SOM neural network in CDNs
267 -- 273Abdulla Ally, Ning Zhang. Effects of network structures and fermi function's parameter β in promoting information spreading on dynamic social networks

Volume 14, Issue 1

1 -- 7Xia Zhai, Weiwei Guo, Yongqin Zhang, Jinsheng Xiao, Xiaoguang Hu. Joint image denoising and demosaicking by low rank approximation and color difference model
8 -- 17Tamilb Vairavan, Kaliyaperumal Vani. An efficient age estimation system with facial makeover images based on key points selection
18 -- 25Sibarama Panigrahi. A novel hybrid chemical reaction optimization algorithm with adaptive differential evolution mutation strategies for higher order neural network training
26 -- 34Lakhdar Derdouri, CongDuc Pham, Mohamed Benmohammed. Analysis of hybrid router-assisted reliable multicast protocols in lossy networks
35 -- 40Shizhe Tan, Fengyuan Zhang, Quanming Huang. A study on multi-screen sharing system using H.264/AVC encoder
41 -- 52Senthil Suganantham, Chitra Babu, Madhumitha Raju. A quantitative evaluation of change impact reachability and complexity across versions of aspect oriented software
53 -- 59Anusuya Venkatesan, Latha Parthiban. Medical image segmentation with fuzzy C-Means and kernelized fuzzy C-Means hybridized on PSO and QPSO
60 -- 69Poonkuzhali Sugumaran, Kishore Ravi, Thirumurugan Shanmugam. A novel algorithm for enhancing search results by detecting dissimilar patterns based on correlation method
70 -- 79Fiaz Majeed, Muhammad Shoaib. Logical schema-based mapping technique to reduce search space in the data warehouse for keyword-based search
80 -- 90Matin Abdullah, Al-Sakib Pathan, Imad Al Shaikhli. A web and software-based approach blending social networks for online qur'anic arabic learning
91 -- 98Revathy Subramanion, Parvathavarthini Balasubramanian, Shajunisha Noordeen. Enforcement of rough fuzzy clustering based on correlation analysis
99 -- 110Fatma-Zohra Chelali, Amar Djeradi. Audiovisual speaker identification based on lip and speech modalities
111 -- 117Ammad Usmani, Ali Daud. Unified author ranking based on integrated publication and venue rank
118 -- 126Ch. Muhammad Shahzad Faisal, Ali Daud, AbuBakr Akram. Expert ranking using reputation and answer quality of co-existing users
127 -- 137Mohammed Djedid, Abdallah Chouarfia. A novel authentication mechanism protecting users' privacy in pervasive systems
138 -- 145Hachemi Bennaceur, Zakir Ahmed. Frequency model based crossover operators for genetic algorithms applied to the quadratic assignment problem