Journal: JCS

Volume 13, Issue 9

371 -- 379Mahmoud Z. Iskandarani. Correlating and Modeling of Extracted Features from PVT Images of Composites using Optical Flow Technique and Weight Elimination Algorithm Optimization [OFT-WEA]
380 -- 392Amina Kharbach, Mouad el Omari, Amar Mardani, Benaissa Bellach, Mohammed Rahmoun. Medical Images Registration based on Normalized Dissimilarity Index
393 -- 399Intan Sari Areni, Asyraful Insan Asry, Indrabayu. A Hybrid Feature Extraction Method for Accuracy Improvement in "Aksara Lontara" Translation
400 -- 407Hajer Mohamed H. Ben Amer, Leelavathi Rajamanickam, Anas A. Abboud. Liveness Detection from Real user, Printed Pictures and Pictures on Mobile Devices from Low Resolution Webcam
408 -- 415Tb. Ai Munandar, Sumiati. The Classification of Cropping Patterns Based on Regional Climate Classification Using Decision Tree Approach
416 -- 421Manal Elobaid, Rafida M. Elobaid. An Exploratory Analysis to Assess Computer Literacy and E-learning Among Students: A Case of Eastern Province of Kingdom of Saudi Arabia
422 -- 429Lock Siew Han, Md. Jan Nordin. Integrated Multiple Linear Regression-One Rule Classification Model for the Prediction of Stock Price Trend
430 -- 439Iman Ahmed ElSayed, Zeinab Ezz, Eman Nasr. Goal Modeling Techniques in Requirements Engineering: A Systematic Literature Review
440 -- 451Manal Zettam. A Randomized Population Constructive Heuristic for the Team Orienteering Problem
452 -- 459Sami Qawasmeh, Arwa Zabian. DPSA: Deterministic Parallel Search Algorithm in Large Database

Volume 13, Issue 8

257 -- 274Falilat Jimoh, Simon Parkinson, Thomas Leo McCluskey. A Hybrid Approach to Process Planning: The Urban Traffic Controller Example
275 -- 289Adamu M. Noma, Abdullah Muhammed, Mohamad Afendee Mohamed, Z. Ahmad Zulkarnain. A Review on Heuristics for Addition Chain Problem: Towards Efficient Public Key Cryptosystems
290 -- 300Mohammed I. Al-Saleh, Rasha K. Al-Huthaifi. On Improving Antivirus Scanning Engines: Memory On-Access Scanner
301 -- 306Talal Talib Jameel. Load Balancing For Cloud-Based Dynamic Data Processing
307 -- 319Anderson Silva Marcolino, Edson A. Oliveira Jr., Itana M. S. Gimenes, Ellen F. Barbosa. Variability Resolution and Product Configuration with SMarty: An Experimental Study on UML Class Diagrams
320 -- 328Ashwini Janagal Padmanabha, Sanjay Harogolige Adimurthy. Framework for Enhancing the Performance of Data Intensive MPI based HPC applications on Cloud
329 -- 336Atef A. Obeidat, Majd Al-kofahi, Mohammad Jazi Bawaneh, Essam Said Hanandeh. A Novel Botnet Detection System for P2P Networks
337 -- 354Basma Hisham, Alaa Hamouda. Arabic Static and Dynamic Gestures Recognition Using Leap Motion
355 -- 362Heri Kuswanto, Yogi Sarumaha, Hayato Ohwada. Comparison Between Selective Sampling and Random Undersampling for Classification of Customer Defection Using Support Vector Machine
363 -- 370Saufi Bukhari, Ku Ruhana Ku-Mahamud, Hiroaki Morino. Fault Tolerance Grid Scheduling with Checkpoint Based on Ant Colony System

Volume 13, Issue 7

211 -- 217Paola A. Sánchez-Sánchez, José Rafael García-González. A New Methodology for Neural Network Training Ensures Error Reduction in Time Series Forecasting
218 -- 227Thato Solomon, Adamu Murtala Zungeru, Rajalakshmi Selvaraj, Mmoloki Mangwala, Joseph Chuma. Network Traffic Model: A Case of BIUST Network
228 -- 233Ashraf Abazeed, Moaiad Khder. A Classification and Prediction Model for Student's Performance in University Level
234 -- 246Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam. E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System
247 -- 256Chaipichit Cumpim, Rachu Punchalard. High Density Salt and Pepper Noise Filter based on Shepard Interpolation Method

Volume 13, Issue 6

153 -- 164Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud, Eiji Kamioka. Ant Colony Optimization Approaches in Wireless Sensor Network: Performance Evaluation
165 -- 174Manar Abu Talib. Open Source Software in the UAE: Opportunities, Challenges and Recommendations (A Survey Research Study)
175 -- 183Charinee Prompukdee, Jaratsri Rungrattanaubol, Chayanin Pratoomsoot. A Framework for Systematizing Personalized Thai Herbal Medicine: A Case Study Covering Gynecological Conditions
184 -- 191Atef A. Obeidat. Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters
192 -- 198Carlos Roberto Valêncio, André Francisco Morielo Caetano, Angelo Cesar Colombini, Mário Luiz Tronco, Márcio Zamboti Fortes. A Fast Access Big Data Approach for Configurable and Scalable Object Storage Enabling Mixed Fault-Tolerance
199 -- 210Smitha Rajagopal, Katiganere Siddaramappa Hareesha, Poornima Panduranga Kundapur. Optimising Pair Programming in a Scholastic Framework: A Design Pattern Perspective

Volume 13, Issue 5

91 -- 104Diaa Eldin ElSaied, Habib Ullah Khan. Implementation of Health Information System-A Case Study of Magrabi Hospitals, KSA
105 -- 113Omar Dakkak, Shahrudin Awang Nor, Suki Arif. Scheduling Jobs through Gap Filling and Optimization Techniques in Computational Grid
114 -- 129Leau Yu Beng, Ali Abdulrazzaq Khudher, Selvakumar Manickam, Samer Al-Salem. An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness
130 -- 139Aya M. Mostafa, Ayman E. Khedr, A. Abdo. Advising Approach to Enhance Students' Performance Level in Higher Education Environments
140 -- 152Belkacem Athamena, Zina Houhamdi. An Exception Management Model in Multi-Agents Systems

Volume 13, Issue 4

68 -- 77Heider Alvarenga de Jesus, Denilson Alves Pereira. Enriching an Authority File of Scientific Conferences with Information Extracted from the Web
78 -- 90Mohannad Moufeed Ayyash. Scrutiny of Relationship between E-Banking Information Quality Dimensions and Customer Satisfaction

Volume 13, Issue 3

48 -- 54Sabeeka M. Al-Oun, Jehad Q. Odeh Alnihoud. An Efficient Approach to Hide Compressed Voice Data in Arabic Text using Kashida and "La"
55 -- 67Kale Sarika Prakash, P. M. Joe Prathap. Tracking Pointer and Look Ahead Matching Strategy to Evaluate Iceberg Driven Query

Volume 13, Issue 2

22 -- 33Rafael Divino Ferreira Feitosa, Vinícius Araújo Santos, Leandro Luís Galdino de Oliveira, Díbio Leandro Borges, Lucas Calabrez Pereyra, Adriano Soares de Oliveira Bailão. Statistical Pattern Recognition for Thresholding between Human Skin and Background in Color Images
34 -- 47Molamoganyi Gorata, Adamu Murtala Zungeru, Mmoloki Mangwala, Joseph Chuma. Design and Implementation of Security in Healthcare Cloud Computing

Volume 13, Issue 12

680 -- 693Sanjay Kumar, Surjit Paul, Dilip Kumar Shaw. Real-Time Multimodal Biometric User Authentication for Web Application Access in Wireless LAN
694 -- 701Rajni Jindal, Alka Singhal. Performance Analysis for the Ontology based Intelligent Information Retrieval using Non Monotonic Inference Logic using SPARQL
702 -- 717Karim Zkik, Maha Tebaa, Tarik Tachihante, Ghizlane Orhanou. A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds
718 -- 727Andrija Bernik, Danijel Radosevic, Daniel Strmecki. Research on Efficiency of Applying Gamified Design into University's e-Courses: 3D Modeling and Programming
728 -- 734Indah Mekar Sari, Dana Sulistiyo Kusumo, Mira Kania Sabariah. Analysis of Interaction Design Patterns on Drawing Application for Early Preschool Children using Inductive Approach (Case Study: ABC Coloring Book for Toddlers and Tracer-hand Writing Pattern Drawing Application)
735 -- 747Malik Qasaimeh, Raad S. Al-Qassas. Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements
748 -- 755Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi. Segmented Block Cipher Algorithm Based on ASCII-Codes Maneuver
756 -- 766Alaa Omer Najim, Nor Asilah Wati Abdul Hamid, Zurina Mohd Hanapi, Idawaty Ahmad. Comparative Study of Packet Scheduling Algorithm in LTE Network
767 -- 780Sayed Chhattan Shah. A Mobile Ad hoc Cloud Computing and Networking Infrastructure for Automated Video Surveillance System
781 -- 794Deepa S. Kumar, M. Abdul Rahman. Performance Evaluation of Apache Spark Vs MPI: A Practical Case Study on Twitter Sentiment Analysis
795 -- 804Naveed Ahmed. Multi-View RGB-D Video Analysis and Fusion for 360 Degrees Unified Motion Reconstruction

Volume 13, Issue 11

581 -- 589Che Samihah Che Dalim, Hoshang Kolivand, Huda Kadhim, Mohd Shahrizal Sunar, Mark Billinghurst. Factors Influencing the Acceptance of Augmented Reality in Education: A Review of the Literature
590 -- 599Avinanta Tarigan, Dewi Agushinta R., Adang Suhendra, Fikri Budiman. Determination of SVM-RBF Kernel Space Parameter to Optimize Accuracy Value of Indonesian Batik Images Classification
600 -- 607Hery Harjono Muljo, Bens Pardamean, Anzaludin S. Perbangsa. The Implementation of Online Learning for Early Detection of Cervical Cancer
608 -- 616Mahmoud A. Fakhreldin, Ahmed Farag Seddik. Cloud Based Low Cost Retinal Detachment Screening Method Using Data Mining Techniques
617 -- 632Anderson Silva Marcolino, Edson A. Oliveira Jr.. Comparing SMarty and PLUS for Variability Identification and Representation at Product-Line UML Class Level: A Controlled Quasi-Experiment
633 -- 646Abdallah Rhattoy, Mohammed Lahmer, Idriss Chana. Impact of the Smart City Architecture, Speed and Traffic Density of Vehicles on the Performances of Vanets
647 -- 658Yonis Gulzar, Ali Amer Alwan, Norsaremah Salleh, Imad Fakhri Al Shaikhli. Processing Skyline Queries in Incomplete Database: Issues, Challenges and Future Trends
659 -- 666Lauro Cássio Martins de Paula, Anderson da Silva Soares, Telma Woerle de Lima Soares, Anselmo E. de Oliveira, Clarimar José Coelho. Modern Metaheuristic with Multi-Objective Formulation for the Variable Selection Problem
667 -- 673O. Imocha Singh, T. Romen Singh. Image Binarization Using Block Boundary Pixels Mean
674 -- 679Shereen S. Ismail, Eman Alkhader, Amal Ahmad. Prison Perimeter Surveillance System Using WSN

Volume 13, Issue 10

460 -- 469Chakib Tadj, Moeiz Miraoui, Somia Belaidouni. Using MVCA to Improve Architecture Modularity of Smart Spaces
470 -- 495Edson Oliveira Jr., Ricardo Theis Geraldi. Defect Types and Software Inspection Techniques: a Systematic Mapping Study
496 -- 504B. Ravi Prasad. Real Time Density-Based Clustering (RTDBC) Algorithm for Big Data
505 -- 513Ahmad Abdel Jabbar Ahmad Mazhar, Ayman Mahmoud Aref Abdalla. Trade-Off of Frame-Rate and Resolution in Online Game Streaming
514 -- 523Vivek Sharma, Bashir Alam, Mohammad Najmud Doja. ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks
524 -- 536Atef Zaki Ghalwash, Aliaa Abdel-Halim Youssif, Ali Mohamed Nabil Allam. Segmentation of Exudates via Color-based K-means Clustering and Statistical-based Thresholding
537 -- 547Naveen Hemrajani, Sunil Kumar Jangir. A Comprehensive Review and Performance Evaluation of Detection Techniques of Black Hole Attack in MANET
548 -- 557Ja'afer Al-Saraireh. An Efficient Approach for Query Processing Over Encrypted Database
558 -- 571Bandar Alshammari. Enterprise Architecture Security Assessment Framework (EASAF)
572 -- 580Emansa Hasri Putra, Risanuri Hidayat, widyawan, I. Wayan Mustika. A Routing Optimization Based on Cross-Layer Design for Wireless Multimedia Sensor Networks (WMSNs)

Volume 13, Issue 1

1 -- 10Susmit Bagchi. Computational Analysis of Network ODE Systems in Metric Spaces: An Approach
11 -- 21Lukman Ab. Rahim, Ziyaulhaq Aliyu, Emy Elyanee Mustapha. Evaluating the Usability of Model Transformations Testing Approach (MTTA)