Journal: Int. Arab J. Inf. Technol.

Volume 19, Issue 6

843 -- 853Mohamed Lazhar Bellagha, Mounir Zrigui. Speaker naming in arabic TV programs
854 -- 860Ameer Badr, Alia Abdul Hassan. VoxCeleb1: speaker age-group classification using probabilistic neural network
861 -- 872Ahmad Al-Jarrah, Mohammad Al-Jarrah, Amer Albsharat. Dictionary based arabic text compression and encryption utilizing two-dimensional random binary shuffling operations
873 -- 883Lei Liu, Zheng Pei, Peng Chen, Zhisheng Gao, Zhihao Gan, Kang-feng. An improved quantile-point-based evolutionary segmentation representation method of financial time series
884 -- 890Sunil Kumar Jha, Filip Josheski, Xiaorui Zhang, Zulfiqar Ahmad. Neuroevolution of augmenting topologies for artificial evolution: a case study of kinesis of creature in the various mediums
891 -- 896Marriam Nawaz, Momina Masood, Ali Javed, Tahira Nazir. Faceswap based deepfakes detection
897 -- 903Umadevi Ramamoorthy, Aruna Loganathan. Analysis of video steganography in military applications on cloud
904 -- 914Emran Al-Buraihy, Wang Dan, Rafiullah Khan, Mohib Ullah. An Ml-based classification scheme for analyzing the social network reviews of yemeni people
915 -- 924Bancha Luaphol, Jantima Polpinij, Manasawee Kaenampornpan. Text mining approaches for dependent bug report assembly and severity prediction
925 -- 931Guruviah Karpagarajesh. Implementation of multimode fiber in eight channels mimo multiplexing system by eliminating dispersion with optical grating methodologies
932 -- 941Malini Alagarsamy, Ameena Sahubar Sathik. Context aware mobile application pre-launching model using KNN classifier
942 -- 948Saida Laaroussi, Si Lhoussain Aouragh, Abdellah Yousfi, Mohammed Nejja, Hicham Gueddah, Said Ouatik El Alaoui. New language models for spelling correction
949 -- 955Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa. Improved superpixels generation algorithm for qualified graph-based technique
956 -- 964Natarajan Sowri Raja Pillai, Ranganathan Rani Hemamalini. Hybrid user acceptance test procedure to improve the software quality
965 -- 974K. Lakshmi Narayanan, R. Santhana Krishnan, Y. Harold Robinson. A hybrid deep learning based assist system for detection and classification of breast cancer from mammogram images

Volume 19, Issue 5

705 -- 712Sameeah Noreen Hameed, Muhammad Adnan Ashraf, Yanan Qiao. Multi-Lingual Language Variety Identification using Conventional Deep Learning and Transfer Learning Approaches
713 -- 720Praveen Pappula. A Novel Binary Search Tree Method to Find an Item Using Scaling
721 -- 727Nikhila Thribhuvan, Sudheep Elayidom. Transfer Learning for Feature Dimensionality Reduction
728 -- 735Farhad Navabifar, Mehran Emadi. A Fusion Approach Based on HOG and Adaboost Algorithm for Face Detection under Low-Resolution Images
736 -- 746Ako Muhammad Abdullah, Emre Ozen, Husnu Bayramoglu. Enhanced-AODV Routing Protocol to Improve Route Stability of MANETs
747 -- 758Aditya Bakshi, Sunanda Gupta. Face Anti-Spoofing System using Motion and Similarity Feature Elimination under Spoof Attacks
759 -- 764Haider Dheyaa Kamil Al-janabi, Hussam Dheaa Kamel Al-janabi, Bashar Qas Elias. Secure of Transmission Systems in the Visible Range of Light with the Power Line Communication Interface
765 -- 773Kiran Sree Pokkuluri, S. S. S. N. Usha Devi Nedunuri. Crop Disease Prediction with Convolution Neural Network (CNN) Augmented With Cellular Automata
774 -- 784Metin Bilgin, Nisanur Bulut. Compatibility Themed Solution of the Vehicle Routing Problem on the Heterogeneous Fleet
785 -- 792GokulaKrishnan Elumalai, Malathi Ganesan. Deep Learning Based Hand Wrist Segmentation using Mask R-CNN
793 -- 801Hikmet Canli, Sinan Toklu. AVL Based Settlement Algorithm and Reservation System for Smart Parking Systems in IoT-based Smart Cities
802 -- 811Ganesan Thangavel, Pothuraju Rajarajeswari. A Novel Genetic Algorithm with db4 Lifting for Optimal Sensor Node Placements
812 -- 821Iyad F. Jafar, Khalid A. Darabkh, Fahed Jubair. Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images
822 -- 830Azidine Guezzaz, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba. A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security
831 -- 841Soha A. Nossier, Mohamed R. M. Rizk, Saleh el Shehaby, Nancy Diaa Moussa. Environmental Noise Adaptable Hearing Aid using Deep Learning

Volume 19, Issue 4

575 -- 581Sakthidasan Sankaran. Pattern Matching based Vehicle Density Estimation Technique for Traffic Monitoring Systems
582 -- 588Yetunde Akinwumi, Joshua Ojo Ayeni, Samson A. Arekete, Mba O. Odim, Adewale Opeoluwa Ogunde, Bosede Oyenike Oguntunde. XAPP: An Implementation of SAX-Based Method for Mapping XML Document to and from a Relational Database
589 -- 596Sony P., Sureshkumar Nagarajan. Semantic Interoperability Model in Healthcare Internet of Things Using Healthcare Sign Description Framework
597 -- 608Fanqi Meng, Xixi Xiao, Jingdong Wang 0002. Rating the Crisis of Online Public Opinion Using a Multi-Level Index System
609 -- 616Pratikkumar A. Barot, Harikrishna B. Jethva. MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data
617 -- 628Mohammed Alghobiri, Khalid Mohiuddin, Mohammed Abdul Khaleel, Mohammad Islam, Samreen Shahwar, Osman Nasr. A Novel Approach of Clustering Documents: Minimizing Computational Complexities in Accessing Database Systems
629 -- 638Haitham Issa, Qinmu Peng, Sali Issa, Xinge You, Ruijiao Peng, Jing Wang. Person-Independent Emotion and Gender Prediction (EGP) System Using EEG Signals
639 -- 651Zoltan Kazi, Ljubica Kazi. Software Project Duration Estimation Based on COSMIC Method Applied to Data Flow Diagram
652 -- 659Behnam Shamshirsaz, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti. An Improved Process Supervision and Control Method for Malware Detection
660 -- 666Sana Fakhfakh, Yousra Ben Jemaa. Deep Learning Shape Trajectories for Isolated Word Sign Language Recognition
667 -- 673Aravinda Chikmagalur Ventakaramu, Suresha Devaraj, Prakash Hebbakavadi Nanjundaiah, Kyasambally Rajasekhar Udayakumar Reddy. Off-Line Signature Confirmation based on Cluster Representations of Geometrical and Statistical Features through Vector Distance, Neural Network and Support Vector Machine Classifiers
674 -- 680Chandrasekaran Sridharan, Sudhaman Parthasarathy. A Simplified Alternate Approach to Estimate Software Size of Startups
681 -- 688Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib, Saqib Hakak. Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings
689 -- 694Noor Mahmood. Solving Capacitated Vehicle Routing Problem Using Meerkat Clan Algorithm
695 -- 703Pei Ma, Feng Yu 0017, Changlong Zhou, Minghua Jiang. Smoke Detection Algorithm based on Negative Sample Mining

Volume 19, Issue 3A

413 -- 421Adrian Bosire, Damian Maingi. Driving signature analysis for auto-theft recovery
422 -- 431Maroua Grid, Leila Belaiche, Laïd Kahloul, Saber Benharzallah. An efficient parallel version of dynamic multi-objective evolutionary algorithm
432 -- 441Siham Amrouch, Sihem Mostefai. A schema-free instance matching algorithm based on virtual document similarity
442 -- 455Omaimah Al Hosni, Andrew Starkey. Assesing the stability and selection performance of feature selection methods under different data complexity
456 -- 462Adnan Shaout, Shanmukha Pattela. Automotive embedded systems-model based approach review
463 -- 469Eman Hamdy, Osama Badawy, Mohamed Saad Zaghloul. Densely convolutional networks for breast cancer classification with multi-modal image fusion
470 -- 477Shekhar Karanwal. DWT and LBP map based feature descriptors for face recognition in harsh light variations
478 -- 490Isaac Kofi Nti, Owusu Narko-Boateng, Adebayo Felix Adekoya, Arjun Remadevi Somanathan. Stacknet based decision fusion classifier for network intrusion detection
491 -- 500Zina Houhamdi, Belkacem Athamena, Ghaleb A. El Refae. Retention contracts under partial information electoral competition case study
501 -- 513Ola M. Surakhi, Antonio Mora García, Mohammed Jamoos, Mohammad Y. Alkhanafseh. The intrusion detection system by deep learning methods: issues and challenges
514 -- 522Ahmad Shatnawi, Abderraouf Drine, Mohammad Al-Zinati, Qutaibah Althebyan. Analyzing the effect of driving speed on the performance of roundabouts
523 -- 529Muhammad Qasim Memon, Yu Lu 0003, Shengquan Yu, Aasma Memon, Abdul Rehman Memon. The critical feature selection approach using ensemble meta-based models to predict academic performances
530 -- 535Zohaib Ahmed, Muhammad Qasim Memon, Aasma Memon, Parveen Munshi, Muhammad Jaffar Memon. Echo state network optimization using hybrid-structure based gravitational search algorithm with square quadratic programming for time series prediction
536 -- 543Afrah Mahmoud Mousa, Thorsten Auth, Anas Samara, Suhail Odeh. Random walk generation and classification within an online learning platform
544 -- 565Thafer Y. Assaraira, Nouh Alhindawi, Saad Bani-Mohammad, Zaid A. Al-Anber, Zeid A. Albashaireh. The jordanian universities experience in integrating online learning and its quality assurance
566 -- 573Jamila Hamdan Al-Aamri, Nour Eldin Elshaiekh Osman. The role of artificial intelligence abilities in library services

Volume 19, Issue 3

289 -- 297Chian Techapanupreeda, Ekarat Rattagan, Werasak Kurutach. A transaction security accountability protocol for electronic health systems
298 -- 306Imran Mujaddid Rabbani, Muhammad Aslam 0001, Ana María Martínez Enríquez. SAFRank: multi-agent based approach for internet services selection
307 -- 313Damjan Fujs, Simon Vrhovec, Damjan Vavpotic. Towards personalized user training for secure use of information systems
314 -- 322Mohammad Abdallah, Mustafa Alrifaee. A heuristic tool for measuring software quality using program language standards
323 -- 329Shamik Tiwari, Anurag Jain, Kusum Yadav, Rabie Ramadan 0001. Machine learning-based model for prediction of power consumption in smart grid
330 -- 335Fahd Saleh Alotaibi, Vishal Gupta. Sentiment analysis system using hybrid word embeddings with convolutional recurrent neural network
336 -- 341Ashokraj Murugesan, Ananthi Govindasamay. Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks
342 -- 352Onur Can Sert, Sibel Tariyan Özyer, Deniz Bestepe, Tansel Özyer. Temptracker: a service oriented temporal natural language processing based tool for document data characterization and social network analysis
353 -- 362Mirza Sami, Ishrat Naiyer, Ehsanul Khan, Jia Uddin. Improved semantic inpainting architecture augmented with a facial landmark detector
363 -- 369Hamid Reza Ghaffari. Choosing decision tree-based boundary patterns in the intrusion detection systems with large data sets
370 -- 380J. Daphney Joann, Vayanaperumal Rajamani. Half-duplex and full-duplex performance comparison for different fading channel using HMR protocol in MIMO technology
381 -- 387Mourad Talbi, Med Salim Bouhlel. A novel technique of noise cancellation based on stationary bionic wavelet transform and WATV: application for ECG denoising
388 -- 395Xiaogang Zhang, Lili Sun. Research on the similarity between nodes with hypernymy/hyponymy relations based on IC and taxonomical structure
396 -- 402Shivani Jaswal, Manisha Malhotra. AFTM-agent based fault tolerance manager in cloud environment
403 -- 411Akansha Tyagi, Sandhya Bansal 0001. Hybrid FiST_CNN approach for feature extraction for vision-based indian sign language recognition

Volume 19, Issue 2

143 -- 149Saravjeet Singh, Jaiteg Singh. Map matching algorithm: empirical review based on indian openstreetmap road network data
150 -- 159Anup Bhat, Harish Venkatarama, Geetha Maiya. Compact tree structures for mining high utility itemsets
160 -- 172Hamza Aldabbas, Dheeb Albashish, Khalaf Khatatneh, Rashid Amin. An architecture of IoT-aware healthcare smart system by leveraging machine learning
173 -- 185Meisen Pan, Qi Xiong. An improved iris localization method
186 -- 194Dhaya Ramakrishnan, Kanthavel Radhakrishnan. Applying deep convolutional neural network (DCNN) algorithm in the cloud autonomous vehicles traffic model
195 -- 202Murugan Singaravelan, Bhuvaneswari Mariappan. Reinforcement energy efficient ant colony optimization of mobile ad hoc multipath routing performance enhancement
203 -- 213Nasim Matar, Tirad AlMalahmeh, Bilal Sowan, Saheer Al-Jaghoub, Wasef Mater. A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic
214 -- 223Mohammad Al-Mashhadani, Mohamed Shujaa. IoT security using AES encryption technology based ESP32 platform
224 -- 229M. Suresh Chinnathampy, Aruna Thangavelu, Muthukumaran Narayanaperumal. Performance analysis of efficient spectrum utilization in cognitive radio networks by dynamic spectrum access and artificial neuron network algorithms
230 -- 236Fen He, Kimia Rezaei Kalantrai, Ali Ebrahimnejad, Homayun Motameni. An effective fault-tolerance technique in web services: an approach based on hybrid optimization algorithm of PSO and cuckoo search
237 -- 248Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Musa Osman, Ping Yang, Saeed H. Alsamhi. An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique
249 -- 260Weijun Zhu, Huanmei Wu. CTL model checking based on binary classification of machine learning
261 -- 271Shobana Manoharan, Poonkuzhali Sugumaran, Kishore Kumar. Multichannel based IoT malware detection system using system calls and opcode sequences
272 -- 280Ömer Kasim. An efficient ensemble architecture for privacy and security of electronic medical records
281 -- 287Yogesh Kumar, Shashi Kant Verma, Sandeep Sharma. Multi-pose facial expression recognition using hybrid deep learning model with improved variant of gravitational search algorithm

Volume 19, Issue 1

1 -- 10Yinglei Song, Jia Song, Junfeng Qu. Optimal image based information hiding with one-dimensional chaotic systems and dynamic programming
11 -- 22Kalyana Saravanan Annathurai, Tamilarasi Angamuthu. Sorensen-dice similarity indexing based weighted iterative clustering for big data analytics
23 -- 28Praphula Kumar Jain, Mani Shankar Bajpai, Rajendra Pamula. A modified DBSCAN algorithm for anomaly detection in time-series data with seasonality
29 -- 37Shelly Garg, Jindal Balkrishan. Skin lesion segmentation in dermoscopy imagery
38 -- 44Valliyammai Chinnaiah, Cinu C. Kiliroor. Heterogeneous feature analysis on twitter data set for identification of spam messages
45 -- 54Shahzad Hassan, Maria Ahmad. Energy heterogeneity analysis of heterogeneous clustering protocols
55 -- 62Yaqoob Al-Slais, Wael M. El-Medany. User-centric adaptive password policies to combat password fatigue
63 -- 71Ali Gezer. The delay measurement and analysis of unreachable hosts of internet
72 -- 80P. Sirish Kumar, V. B. S. Srilatha Indira Dutt, Ganesh Laveti. GPS receiver position augmentation using correntropy kalman filter in low latitude terrain
81 -- 89Mohammad Karimi, Zahra Khandaghi, Mahsa Shahipour. Designing an intelligent system to detect stress levels during driving
90 -- 96Yange Sun, Han Shao, Bencai Zhang. Ensemble based on accuracy and diversity weighting for evolving data streams
97 -- 109Shiza Nawaz, Anam Zai, Salma Imtiaz, Humaira Ashraf. Systematic literature review: causes of rework in GSD
110 -- 120Nesma Youssef, Hatem Abdul-Kader, Amira Abdelwahab. Mining frequent sequential rules with an efficient parallel algorithm
121 -- 131Suriya Prakash Jambunathan, Suguna Ramadass, Palanivel Rajan Selva kumaran. Analyzing the behavior of multiple dimensionality reduction algorithms to obtain better accuracy using benchmark KDD CUP dataset
132 -- 142Khalid Majrashi. Voice versus keyboard and mouse for text creation on arabic user interfaces