Journal: JCS

Volume 11, Issue 9

936 -- 942Karam Dhafer Mayoof, Rosilah Hassan, Amjed Sid Ahmed, Ahmed Marwan. Performance Evaluation of Handover in WiMax with TCP and UDP as Underlying Protocol
943 -- 956Buchanagandi Enock Nyamajeje, Huiqun Yu. Reducing Network Bandwidth Cost on End User Resources Consumption in Cloud Environment
957 -- 970Samaneh Mazaheri, Rahmita Wirza, Puteri Suhaiza Sulaiman, Mohd Zamrin Dimon, Fatimah Khalid, Rohollah Moosavi Tayebi. Segmentation Methods of Echocardiography Images for Left Ventricle Boundary Detection
971 -- 975Ammar Ali Neamah. New Collisions to Improve Pollard’s Rho Method of Solving the Discrete Logarithm Problem on Elliptic Curves
976 -- 987Andréia Alves dos Santos Schwaab, Silvia Modesto Nassar, Paulo José de Freitas Filho. Automatic Methods for Generation of Type-1 and Interval Type-2 Fuzzy Membership Functions

Volume 11, Issue 8

880 -- 891Inderdeep Kaur Aulakh, Renu Vig. Secondary User Sensing Time Optimization in Sensing-Transmission Scheduling for Dynamic Spectrum Access in Cognitive Radio
892 -- 901Taisir Eldos, Waleed Nazih, Aws Kanan. Maximally Distant Codes Allocation Using Chemical Reaction Optimization and Ant Colony Optimization Algorithms
902 -- 914Shafique Ahmad Chaudhry. On the Need of Source Address for Route-Error Delivery in 6LoWPAN
915 -- 927Andreas Zendler, Dieter Klaudt. Instructional Methods to Computer Science Education as Investigated by Computer Science Teachers
928 -- 935Pallab Dutta, Mahesh Kumar, B. Sridharan, Vipin Tyagi. Efficacy of Numeric Keypad for Computer Illiterates in Rural ICT

Volume 11, Issue 7

839 -- 844Cheong Hee Park. Prototype-Based Sample Selection for Active Hashing
845 -- 854Olalekan Bello, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid. Utility-based Scheduling Frameworks for Efficient Quality-of-Service Differentiation in a Mixture of Real-time and Non-real-time Traffics
855 -- 862Parminder Singh Bawa, Selvakumar Manickam. Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques
863 -- 871J. Chandra, M. Nachamai, Anitha S. Pillai. Correlation Based ADALINE Neural Network for Commodity Trading
872 -- 879Mohammad Ehab Ragab. Extended Kalman Filter versus Newton-Lowe’s Method for Robot Pose Estimation

Volume 11, Issue 6

784 -- 793Mohammed Nazeh Abdul Wahid, Azizol Abdullah. Detecting an Anomaly Behavior through Enhancing the Mechanism of Packet Filtering
794 -- 803Douglas Hiura Longo, Beatriz Wilges, Patricia Vilain, Renato Cislaghi. Fixture Setup through Object Notation for Implicit Test Fixtures
804 -- 812Saleh Atiewi, Salman Yussof, Mohd Ezanee. A Comparative Analysis of Task Scheduling Algorithms of Virtual Machines in Cloud Environment
813 -- 820Jayasri kotti, SeethaRamaiah Panchumarthy. A GQM Based Approach towards the Development of Metrics for Software Safety
821 -- 838Abdullah Soliman Alshraa, Venus Wazeer Samawi. Load Balancing Technique Based on Broadcasting and Residual Energy Using Adaptive Clustering Hierarchy Protocol (LBEACH)

Volume 11, Issue 5

707 -- 722Ali Ahmad Milad, Zul Azri Bin Muhamad Noh, Abdul Samad Shibghatullah, Mustafa Almahdi Algaet, Aouache Mustapha. Design a New Bidirectional Transmission Protocol to Improve the Performance of MAC Layer Based on Very High Speed WLANs
723 -- 729Mohamad Afendee Mohamed, Abdullah Muhammed, Mustafa Man. A Secure Chat Application Based on Pure Peer-to-Peer Architecture
730 -- 737Filipe Hiluy Lima, Henrique Mariano Costa do Amaral, Denílson Moreira Santos. Corporate Network Analysis with IPTV Traffic Insertion
738 -- 749Hussam Saad Adeen, Ayman Atia, Ahmad Amin, Andrew Victor, Abdelrahman Essam, Ehab Gharib, Mohamed Hussien. RemoAct: Portable Projected Interface with Hand Gesture Interaction
750 -- 763Hazalina Hashim, Shahrul Azman Mohd. Noah. Development of Domain Ontology for a Semantic Online Forum
764 -- 771Abdullatif Abolohom, Nazlia Omar. A Hybrid Approach to Pronominal Anaphora Resolution in Arabic
772 -- 783Ahsan Abdullah, Sohayp Abo Alshamat, Ahmad Bakhashwain, Muhammad Ahtisham Aslam. Automatic Text Removal and Replacement in Scanned Meteorological Thematic Maps

Volume 11, Issue 4

598 -- 611Sérgio Bimbi Junior, Vitor Chaves de Oliveira, Gunnar Bedicks Junior. Software Defined Radio Implementation of a QPSK Modulator/Demodulator in an Extensive Hardware Platform Based on FPGAs Xilinx ZYNQ
612 -- 620Chansiri Singhtaun, Suriya Natsupakpong. Applications of Parallel Computing for Facility Location-Transportation Problems for Disaster Response
621 -- 626Kelton de Souza Santiago, Anderson da Silva Soares, Telma Woerle de Lima, Clarimar José Coelho, Paulo Henrique Ribeiro Gabriel. Genetic Algorithm for Variable and Samples Selection in Multivariate Calibration Problems
627 -- 638Mohammed M. Abu Shquier, Khaled M. Alhawiti. Novel Prefix Tri-Literal Word Analyser: Rule-Based Approach
639 -- 644Ahmed Al-Saffar, Nazlia Omar. Integrating a Lexicon Based Approach and K Nearest Neighbour for Malay Sentiment Analysis
645 -- 661Abu Bakar Marini, Surya Ismail, Sufian Bin Idris, Zarina Shukur. seMeja API Design Based on CRUD+N Concept
662 -- 674Marcos V. O. de Assis, Mario Lemes Proença Jr.. Scorpius: sFlow Network Anomaly Simulator
675 -- 691Anmar Abuhamdah. Adaptive Acceptance Criterion (AAC) Algorithm for Optimization Problems
692 -- 698Jitendra Nath Singh, Sanjay K. Dwivedi. Performance Evaluation of Search Engines Using Enhanced Vector Space Model
699 -- 706Inácio Yano, Vitor Chaves de Oliveira, Mauricio Becker, Andreiwid Sheffer Corrêa. Applying a Hybrid Polling Approach by Software Implementation to Extend the Lifetime of a Wireless Sensor Network

Volume 11, Issue 3

453 -- 465Athraa Jasim Mohammed, Yuhanis Yusof, Husniza Husni. Document Clustering Based on Firefly Algorithm
466 -- 473Radhwan M. Abduallah, Zuriati Zukarnain, Farzaneh Masoumiyan, Azizol Abdullah. Mobility and Handover Technique in Heterogeneous Wireless Networks
474 -- 478Simanta Kumar Nayak, Bikram Kesari Ratha, Payodhar Padhi, Santosh K. Nanda, Aparajeya Panda. Investigation of Quantitative Plant Activity Relationship (QPAR) for Diabetics II Using Genetic Algorithm
479 -- 483Mani Arora, Derick Engles, Sandeep Sharma. MDS Algorithm for Encryption
484 -- 489Basel Alshaikhdeeb, Kamsuriah Ahmad. Integrating Correlation Clustering and Agglomerative Hierarchical Clustering for Holistic Schema Matching
490 -- 497Gothai Ekambaram, Balasubramanie Palanisamy. A Modified Key Partitioning for BigData Using MapReduce in Hadoop
498 -- 509Suhad A. Yousif, Venus Samawi, Islam Elkabani, Rached Zantout. Enhancement of Arabic Text Classification Using Semantic Relations of Arabic WordNet
510 -- 516Abbas M. Ali, Shareef Maulod Shareef. Spatial Representation to Support Visual Impaired People
517 -- 525Muhammad Asif Khan, Varun Jeoti. On the Enlargement of Robust Region of Chaotic Tent Map for the Use in Key Based Substitution-Box (S-Box)
526 -- 533Gayathri A., P. Narayanasamy. Security in MANET's by Using Detective Signature Techniques
534 -- 539T. R. Vedhavathy, M. S. K. Manikandan. A Novel Unique Node Based Clustering and Location-Key Pair Based Security for Wireless Networks
540 -- 551Fadi Herzallah, Muriati Mukhtar. Organization Information Ecology and E-Commerce Adoption: Effect on Organizational SMEs Performance
552 -- 566Maurizio Palesi, Davide Patti, Giuseppe Ascia, Daniela Panno, Vincenzo Catania. Coupling Routing Algorithm and Data Encoding for Low Power Networks on Chip
567 -- 572Dennise Adrianto, Violitta Yesmaya, Alvin Chandra. Increasing Learning Frequency through Education Based Game
573 -- 589Ibrahim Mohamed, Mohammad Syuhaimi Ab-Rahman. Analytical Analysis of In-Band Crosstalk, Out-of-Band Crosstalk and GVD-Based Power Penalties in DWDM and TDM/DWDM-PONS
590 -- 597Hala Albaroodi, Selvakumar Manickam, Mohammad Anbar. A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift)

Volume 11, Issue 2

274 -- 282Alaa M. Elsayad, Mahmoud Fakhr. Diagnosis of Cardiovascular Diseases with Bayesian Classifiers
283 -- 290R. Velayutham, D. Manimegalai. CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
291 -- 296M. RajaRam, J. Vijaya. A Defense Mechanism for Differential Power Analysis Attack in AES
297 -- 303L. G. Gagarina, D. N. Kavtaradze, A. A. Mordovin, E. M. Portnov, V. V. Slyusar, Kyaw Zaw Ye. Modeling of a Dynamic Interaction of Motor Transport and Natural Systems in Order to Minimize the Risks of Project and Management Decisions
304 -- 314K. S. Selvanayaki, R. M. Somasundaram. Hybrid Approach for Detection and Recognition of Vehicles
315 -- 324K. Thamizhchelvy, G. Geetha. An Efficient Image Generation Algorithm Using Fractals and Chaos Theory
325 -- 329Ahmad Alqurneh, Aida Mustapha. The Impact of Oath Writing Style on Stylometric Features and Machine Learning Classifiers
330 -- 336Nor Amalina Mohd Sabri, Abd. Samad Hasan Basari, Burairah Hussin, Khyrina Airin Fariza Abu Samah. The Utilisation of Dijkstra’s Algorithm to Assist Evacuation Route in Higher and Close Building
337 -- 343S. Sumalatha, G. Sreenivasulu, G. Uday Kiran Bhargava. Multicast Node Communication Using Virtual Queue with Process Scheduling
344 -- 350M. Sayee Kumar, T. Purusothaman. Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication
351 -- 360Nur Azman Abu, Ferda Ernawan, Fadzilah Salim. Smooth Formant Peak Via Discrete Tchebichef Transform
361 -- 371M. Uma Devi, G. Meera Gandhi. Wordnet and Ontology Based Query Expansion for Semantic Information Retrieval in Sports Domain
372 -- 382J. Vellingiri, S. Kaliraj, S. Satheeshkumar, T. Parthiban. A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining
383 -- 390Thabit Sultan Mohammed, Laith Al-Jobouri. t-Error Correction/All Unidirectional Error Detection Codes
391 -- 399S. Gopalakrishnan, P. Ganeshkumar. Secure and Efficient Transmission in Mobile Ad hoc Network to Identify the Fake ID’s Using Fake ID Detection Protocol
400 -- 405Joseph Gladwin Sekar, Salivahanan Sankarappan. Enhanced Channel Estimation and Performance Analysis Using H-Infinity Filter for MIMO-Orthogonal Frequency Division Multiplexing Systems
406 -- 415Mohd Fadzli Marhusin, Muhammad Firdaus Zul Kafli, Rossilawati Sulaiman, Shaharudin Ismail, Zul Hilmi Abdullah. A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool
416 -- 425G. Nantha Kumar, A. Arokiasamy. An Efficient Combined Call Admission Control and Scheduling Algorithm to Improve Quality of Service for Multimedia Services Over Next Generation Wireless Networks
426 -- 437Vitor Chaves de Oliveira, Gunnar Bedicks Junior, Cristiano Akamine. Methodology to Asses Internet Protocol Connection Availability: A Prerequisite For Feasible Video Stream Through Content Delivery Networks
438 -- 442D. Ayyamuthukumar, S. Karthik. Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks
443 -- 452J. Jeyachidra, M. Punithavalli. A Novel Distinguishability Based Weighted Feature Selection Algorithms for Improved Classification of Gene Microarray Dataset

Volume 11, Issue 12

1075 -- 1081Inali Wisniewski Soares, Luciane Telinski Wiedermann Agner, Paulo Cézar Stadzisz, Jean Marcelo Simão. Application of Platform Models in Model Driven Engineering of Embedded Software
1082 -- 1089Muhammad Arif Saifudin, Bib Paruhum Silalahi, Imas Sukaesih Sitanggang. Star Catalog Generation for Satellite Attitude Navigation Using Density Based Clustering
1090 -- 1098Ahmad Yahya Dawod, Md. Jan Nordin, Junaidi Abdullah. Static Hand Gestures: Fingertips Detection Based on Segmented Images
1099 -- 1107Idawaty Ahmad, Mohamed Othman, Z. Ahmad Zulkarnain. Enhanced Preemptive Global Utility Accrual Real Time Scheduling Algorithms in Multicore Environment
1108 -- 1117Daniel Strmecki, Andrija Bernik, Danijel Radosevic. Gamification in E-Learning: Introducing Gamified Design Elements into E-Learning Systems
1118 -- 1131Edward David Moreno, Leila C. M. Buarque, Florêncio Natan, Gustavo Quirino, Ricardo Salgueiro. Impact of Asymmetric Encryption Algorithms in a VANET

Volume 11, Issue 11

1025 -- 1031Siew Mooi Lim, Md Nasir Sulaiman, Norwati Mustapha, Abu Bakar Md Sultan. Parameter Settings for New Generational Genetic Algorithms for Solving Global Optimization Problems
1032 -- 1040Manar Abu Talib. Encouraging High School Student Interest in Computing Studies in GCC: UAE Case Study
1041 -- 1053Mohsen Kakavand, Norwati Mustapha, Aida Mustapha, Mohd Taufik Abdullah, Hamed Riahi. Issues and Challenges in Anomaly Intrusion Detection for HTTP Web Services
1054 -- 1059Arif Muntasa. The Human Facial Expression Classification Using the Center Kernel Subspace based the Ridge Regression
1060 -- 1074Er. Sumit Kaur, R. K. Bansal. Chronological Advancement in Image Processing from Lime Stone Mofits to Superpixel Classification

Volume 11, Issue 10

988 -- 994Alexander A. Galushkin. Education in the Field of National Information Security in the Russian Federation and Abroad
995 -- 999Seitim Aiganym. The Conceptual Principals of Bitcoin Crypto Currency
1000 -- 1004Thiripurasundari Sivakrishnakumar. A Comprehensive Study on Mobility Issues in AODV
1005 -- 1016Achmad Rizal, Risanuri Hidayat, Hanung Adi Nugroho. Signal Domain in Respiratory Sound Analysis: Methods, Application and Future Development
1017 -- 1024Hui Hui Wang, Yin-Chai Wang, Soo-See Chai. Towards Semantic User Query: A Review

Volume 11, Issue 1

1 -- 6Rony Baskoro Lukito, Cahya Lukito, Deddy Arifin. Implementation Techniques of Search Engine Optimization in Marketing Strategies Through the Internet
7 -- 17K. Ratna Babu, K. V. N. Sunitha. Enhancing Digital Images Through Cuckoo Search Algorithm in Combination with Morphological Operation
18 -- 29Yenny Sylvia, Djunaidy Santoso. Transformation Box-Cox for Stabilisation of Diversity in Group Random Design
30 -- 52S. Vanaja, K. Rameshkumar. Performance Analysis of Classification Algorithms on Medical Diagnoses-a Survey
53 -- 56Shanthini Pandiaraj, K. R. Shankar Kumar. Speaker Identification Using Discrete Wavelet Transform
57 -- 63A. Rajamani, V. Krishnaveni. An Efficient Denoising Algorithm for Impulse Noise Removal
64 -- 70Naya Nagy, Marius Nagy, Selim G. Akl. Carving Secret Messages out of Public Information
71 -- 74A. Lekha, C. V. Srikrishna, Viji Vinod. Fuzzy Association Rule Mining
75 -- 81Es-Said Chanigui, Abdelmalek Azizi. A Modified Secure Scheme of Quantum Key Distribution Without Public Announcement Bases
82 -- 88S. Thayammal, D. Selvathi. Edge Preserved Image Compression using Extended Shearlet transform
89 -- 97Mohsen Kakavand, Norwati Mustapha, Aida Mustapha, Mohd Taufik Abdullah, Hamed Riahi. A Survey of Anomaly Detection Using Data Mining Methods for Hypertext Transfer Protocol Web Services
98 -- 108Manar Abu Talib, Muhammed AbuOdeh, Adhraa Almansoori, Arwa AlNauimi. Enhancing Social Science Research in the UAE: An Open Source Software Solution University of Sharjah (UOS) Case Study
109 -- 119Abdulkareem Al-Alwani. Improving Email Response in an Email Management System Using Natural Language Processing Based Probabilistic Methods
120 -- 126P. Jaganathan, T. Karthikeyan. Highly Efficient Architecture for Scalable Focused Crawling Using Incremental Parallel Web Crawler
127 -- 136Amy Chiang, Simon X. Liao. Image Analysis with Legendre Moment Descriptors
137 -- 144B. Booba, T. V. Gopal. Efficient Scheduling of Packets in Wireless Sensor Networks Using Priority Based Scheduling Approach
145 -- 152Manar Abu Talib, Ashraf Elnagar. A New Computer Science Student Recruitment Strategy University Of Sharjah (UOS) Case Study
153 -- 165C. Malathy, M. A. K. Sadiq, K. Annapurani. An Innovative Approach for Person Identification by Detection and Extraction of Optic Disc from Retina and Concha from Ear
166 -- 177I. Joe Louis Paul, S. Radha, J. Raja. Performance Analysis of Joint Degree Distribution (JDD) in Luby Transform Codes
178 -- 187Bareq Shaalan, Ravie Chandren Muniyandi. Implementing Mitogen Activated Protein Kinases Cascade on Membrane Computing Using P-Lingua
188 -- 194J. S. Kanchana, S. Sujatha. Recommendation Engine Formation Using Depth First Search and Genetic Approach
195 -- 203Saleheh Heidari, Muhamad Taufik Abdullah, Lili Nurliana Abdullah. A Novel Four-Directional Thresholding Approach for Lung Computed-Tomography Images by Using Similarity-Based Segmentation Technique
204 -- 217Mohd Kamir Yusof, Md. Yazid Mohd.-Saman, Wan Nor Shuhadah Wan Nik. Comparative of Mediator Approach for Database Integration
218 -- 223P. Kavitha Rani, E. Kannan. Straight Line Routing on Next Hop Graph in Wireless Sensor Networks
224 -- 229R. Vijayalakshmi, V. Vasudevan. Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid
230 -- 240Anas A. Abboud, Rahmita Wirza O. K. Rahmat, Suhaini B. Kadiman, Mohd Zamrin Dimon, Lili Nurliyana Abdullah, M. Iqbal Saripan, Hasan H. Khaleel. Automatic Detection of the End-Diastolic and End-Systolic from 4D Echocardiographic Images
241 -- 253Naragain Phumchusri, Yanipa Chinsuwan. Decision Support System for Open Vehicle Routing With Transhipments and Stopovers
254 -- 261P. Deivendran, E. R. Naganathan. Scalability Services in Cloud Computing Using Eyeos
262 -- 269E. Dhiravidachelvi, V. Rajamani. A Novel Approach for Diagnosing Diabetic Retinopathy in Fundus Images
270 -- 273Djunaidy Santoso. The Benefits of Bezier, B-Spline Algorithm in the Industry World