


default search action
The International Arab Journal of Information Technology, Volume 18
Volume 18, Number 1, January 2021
- Adnen Mahmoud, Mounir Zrigui:

Semantic similarity analysis for corpus development and paraphrase detection in arabic. 1-7 - Nadjla Bettayeb, Mhania Guerti:

Speech synthesis system for the holy quran recitation. 8-15 - Zobia Zafar, Muhammad Awais, Abdul Jaleel

, Fiaz Majeed:
A distributed framework of autonomous drones for planning and execution of relief operations during flood situations. 16-24 - Jamil Razmak

, Samir Al-janabi, Faten F. Kharbat, Charles H. Bélanger:
Lean database: an interdisciplinary perspective combining lean thinking and technology. 25-35 - Husamelddin A. M. Balla, Chen Guang Sheng, Weipeng Jing:

Reliability-aware: task scheduling in cloud computing using multi-agent reinforcement learning algorithm and neural fitted Q. 36-47 - Artem Obukhov

, Mikhail Krasnyanskiy, Denis Dedov:
Formulation of two-stage problem of structural-parametric synthesis of adaptive electronic document management system. 48-55 - Pradeep Suthanthiramani, Sannasy Muthurajkumar, Ganapathy Sannasi, Kannan Arputharaj

:
Secured data storage and retrieval using elliptic curve cryptography in cloud. 56-66 - Sara Chellali, Somaya Al-Máadeed, Ouassila Kenai, Maamar Ahfir, Walid Hidouci:

Middle eastern and north african english speech corpus (MENAESC): automatic identification of MENA english accents. 67-76 - Adnan Hnaif, Khalid Mohammad Jaber, Mohammad Ahmad Alia

, Mohammed Daghbosheh:
Parallel scalable approximate matching algorithm for network intrusion detection systems. 77-84 - Kristo Radion Purba, David Asirvatham

, Raja Kumar Murugesan
:
Instagram post popularity trend analysis and prediction using hashtag, image assessment, and user history features. 85-94 - Obaida M. Al-hazaimeh

, Mohammad F. Al-Jamal
, Mohammad Bawaneh, Nouh Alhindawi
, Bara'a Hamdoni:
A new image encryption scheme using dual chaotic map synchronization. 95-102 - Radhika Kulkarni

, Revathy Subramanion, Suhas Patil:
A novel approach to maximize g-mean in nonstationary data with recurrent imbalance shifts. 103-113 - Rajagopal Devarajan, Padmanabhan Rao:

An efficient intrusion detection system by using behaviour profiling and statistical approach model. 114-124 - Fatma Elgendy, Mahmoud Alshewimy

, Amany M. Sarhan
:
Pain detection/classification framework including face recognition based on the analysis of facial expressions for E-health systems. 125-132
Volume 18, Number 2, March 2021
- Neziha Jaouedi, Noureddine Boujnah

, Mohamed Salim Bouhlel:
A novel recurrent neural networks architecture for behavior analysis. 133-139 - Ali Benziane, Suryanti Awang, Mohammed Lebcir:

Development and implementation of a video watermarking method based on DCT transform. 140-147 - Sait Can Yücebas, Rabia Tintin:

Govdeturk: a novel turkish natural language processing tool for stemming, morphological labelling and verb negation. 148-157 - Hanene Boussi Rahmouni, Kamran Munir, Intidhar Essefi, Marco Casassa Mont, Tony Solomonides:

An ontology-based compliance audit framework for medical data sharing across europe. 158-169 - Mohammed Al-Janabi

, Mohd Arfian Ismail
:
Improved intrusion detection algorithm based on TLBO and GA algorithms. 170-179 - Balasubramanian Prabhu Kavin, Sannasi Ganapathy:

A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. 180-190 - Rongtai Cai, Peng Zhu:

Occlusion-aware visual tracker using spatial structural information and dominant features. 191-198 - Kannan Poongodi

, Dhananjay Kumar
:
Support vector machine with information gain based classification for credit card fraud detection system. 199-207 - Olakara Jamsheela, Gopalakrishna Kurup Raju

:
Parallelization of Frequent Itemset Mining Methods with FP-tree: An Experiment with PrePost+ Algorithm. 208-213 - Vijay Gollamandala, Lavanya Kampa

:
An additive sparse logistic regularization method for cancer classification in microarray data. 214-220 - Arun Singh:

Machine learning in openflow network: comparative analysis of DDoS detection techniques. 221-226 - Mahmoud Gad, Esam A. A. Hagras, Hasan Soliman, Noha A. Hikal:

A new parallel fuzzy multi modular chaotic logistic map for image encryption. 227-236 - Anas Ibrahim

, Alexander G. Chefranov
, Rushdi Hamamreh:
Ciphertext-only attack on RSA using lattice basis reduction. 237-247 - Ibrahim Assi, Rami Tailakh, Abdel Salam Sayyad:

Survey on software changes: reasons and remedies. 248-260
Volume 18, Number 3, May 2021
- Maryam Houtinezhad, Hamid Reza Ghaffary:

Improvement of imperialist competitive algorithm based on the cosine similarity criterion of neighboring objects. 261-269 - Mounira Hmayda, Ridha Ejbali, Mourad Zaied:

Automatic topics segmentation for news video by clustering of histogram of orientation gradients faces. 270-278 - Yasin Kaya

:
Detection of bundle branch block using higher order statistics and temporal features. 279-285 - Rida Zainab, Muhammad Majid

:
Emotion recognition based on EEG signals in response to bilingual music tracks. 286-296 - Meenakshi Garg, Manisha Malhotra, Harpal Singh:

A novel machine-learning framework-based on LBP and GLCM approaches for CBIR system. 297-305 - Guruviah Karpagarajesh, Helen Anita:

Maximizing the area spanned by the optical SNR of the 5G using digital modulators and filters. 306-311 - Senthil Prabakaran

, Ramalakshmi Ramar
:
Software defined network: load balancing algorithm design and analysis. 312-318 - Jyoti Aggarwal

, Manoj Kumar:
Software metrics for reusability of component based software system: a review. 319-325 - Aya Hossam

, Tarek M. Salem, Anar Abdel-Hady, Sherine M. Abd El-Kader:
MCA-MAC: modified cooperative access MAC protocol in wireless sensor networks. 326-335 - Khalid Mansour, Khaled W. Mahmoud

:
A new approach for textual password hardening using keystroke latency times. 336-346 - Harinee Shanmuganathan

, Anand Mahendran
:
Encryption based on cellular automata for wireless devices in IoT environment. 347-355 - Metin Bilgin:

A new approach to automatically find and fix erroneous labels in dependency parsing treebanks. 356-364 - Bilal Ahmed

, Li Wang:
Discretization based framework to improve the recommendation quality. 365-371 - Dmitriy N. Moldovyan, Nashwan Ahmed Al-Majmar, Alexander A. Moldovyan:

Algebraic supports and new forms of the hidden discrete logarithm problem for post-quantum public-key cryptoschemes. 372-379
Volume 18, Number 3A, Special Issue 2021
- Dana Halabi

, Arafat Awajan, Ebaa Fayyoumi
:
Syntactic annotation in the i3rab dependency treebank. 381-392 - Zina Houhamdi

, Belkacem Athamena
:
Multi-agents collaboration in open system. 393-404 - Shaymaa Hamandi, Abdul Monem S. Rahma, Rehab F. Hassan:

Multi-spectral hybrid invariant moment fusion technique for face identification. 405-413 - Nor Azrini Jaafar, Nor Azman Ismail, Yusman Azimi Yusoff:

Usability study of enhanced salat learning approach using motion recognition system. 414-421 - Shweta Sharma

, Rama Krishna Challa
, Rakesh Kumar
:
An ensemble-based supervised machine learning framework for android ransomware detection. 422-429 - Jennifer Batamuliza

, Damien Hanyurwimfura
:
An anonymous identity-based with bilateral protocol for smart grid. 430-437 - Marwa Meissa, Saber Benharzallah

, Laid Kahloul, Okba Kazar
:
A personalized recommendation for web API discovery in social web of things. 438-445 - Marwah Alian

, Arafat Awajan:
Generating sense inventories for ambiguous arabic words. 446-451 - Mohamed A. Wahby Shalaby

, Ayman R. Mohammed
, Sally S. Kassem
:
Supervised fuzzy c-means techniques to solve the capacitated vehicle routing problem. 452-463 - Idir Aoudia

, Saber Benharzallah
, Laid Kahloul, Okba Kazar
:
A multi-population genetic algorithm for adaptive QoS-aware service composition in fog-IoT healthcare environment. 464-475 - Alá F. Khalifeh

, Khaled Aldahdouh, Sahel Alouneh:
LoRaWAN energy optimization with security consideration. 476-483 - Mohammad Farukh Hashmi, B. Kiran Kumar Ashish

, Satyarth Katiyar, Avinash G. Keskar:
Computer vision in contactless biometric systems. 484-492
Volume 18, Number 4, July 2021
- Xueming Ding, Dongfei Ji:

Specific patches decorrelation channel feature on pedestrian detection. 493-503 - Muhammad Abbas, Fiza Murtaza, Muhammad Obaid Ullah, Muhammad Haroon Yousaf:

Space-time templates based features for patient activity recognition. 504-512 - Hamidreza Marzooni, Homayun Motameni, Ali Ebrahimnejad

:
Architecture style selection using statistics of quality attributes to reduce production costs. 513-522 - Sunghyun Cho, Hyunsung Kim:

Privacy preserving authenticated key agreement based on bilinear pairing for uHealthcare. 523-530 - Murugan Sivaram:

IOT-pattern-as-a-service model for delay sensitive IOT integrated applications. 531-540 - Chien-Hua Tsai

, Pin-Chang Su:
A robust secure self-certified concurrent signature scheme from bilinear pairings. 541-553 - Saed Alqaraleh:

Novel turkish sentiment analysis system using ConvNet. 554-561 - Samar Shilbayeh, Abdullah Abonamah:

Predicting student enrollments and attrition patterns in higher educational institutions using machine learning. 562-567 - Mourad Talbi, Nawel Mensia, Hatem Ezzaouia

:
Modeling of a PV panel employing matlab/simulink and application of maximum power point tracking technique based on ANN. 568-577 - Pradeep Sivakumar

, Jerritta Selvaraj
, Krishnakumar Ramaraj, Arun Sahayadhas
:
Analysis of alpha and theta band to detect driver drowsiness using electroencephalogram (EEG) signals. 578-584 - Partha Ghosh

, Deep Sadhu, Soumya Sen
:
A real-time business analysis framework using virtual data warehouse. 585-595 - Amal Alzu'bi, Hassan Najadat

, Walaa Eyadat, Alia Al-Mohtaseb, Hussam Haddad:
A new approach for detecting eosinophils in the gastrointestinal tract and diagnosing eosinophilic colitis. 596-603 - Wujian Yang, Wenyong Weng, Guanlin Chen, Zihang Jiang:

Elitist strategy of genetic algorithms for writing tang poetry. 604-610 - Ahmed Barnawi, Marwan Alharbi:

Performance evaluation and simulation of the traversal algorithms for robotic agents in advanced search and find (ASAF) system. 611-623
Volume 18, Number 5, September 2021
- Raju Bhukya:

Encoding gene expression using deep autoencoders for expression inference. 625-633 - Shi-Hua Liu, Hao Zhang, Xianghua Liu:

A study on two-stage mixed attribute data clustering based on density peaks. 634-643 - Arikrishnaperumal Ramaswamy Aravind, Rekha Chakravarthi

:
Adaptive optimization for optimal mobile sink placement in wireless sensor networks. 644-650 - Sameerchand Pudaruth, Sunjiv Soyjaudah, Rajendra Gunputh:

Classification of legislations using deep learning. 651-662 - Ergün Yücesoy:

Two-level classification in determining the age and gender group of a speaker. 663-670 - Naseeruddin Naseeruddin

, Venkanagouda Patil:
Experimental modeling of the residual energy of a rechargeable battery-powered node in wireless networks. 671-677 - Sarmad Mahar, Sahar Zafar, Kamran Nishat:

Headnote prediction using machine learning. 678-685 - Marriam Nawaz

, Tahira Nazir
, Momina Masood
:
Glaucoma detection using tetragonal local octa patterns and SVM from retinal images. 686-693 - Sreekanth Ramakrishnan

, Latha Sevalaiappan, Suganthe Ravi Chandran
:
Traffic-aware clustering scheme for MANET using modified elephant herding optimization algorithm. 694-703 - Haitham Issa, Sali Issa, Wahab Ali Shah:

A novel method for gender and age detection based on EEG brain signals. 704-710 - Qingzhu Wang, Xiaoyun Cui:

Joint optimization offloading strategy of execution time and energy consumption of mobile edge computing. 711-718 - Malini Alagarsamy

, Ajitha Sundarji, Aparna Arunachalapandi, Keerthanaa Kalyanasundaram:
Cost-awareant colony optimization based model for load balancing in cloud computing. 719-729 - Sawsan Alshattnawi, Mohammad Al-Marie

:
Spider monkey optimization algorithm for load balancing in cloud computing environments. 730-738 - Ersin Elbasi:

Measure of singular value decomposition (M-SVD) based quality assessment for medical images with degradation. 739-746
Volume 18, Number 6, November 2021
- Renwei Tu, Zhongjie Zhu, Yongqiang Bai, Ming Gao, Zhifeng Ge:

Key parts of transmission line detection using improved YOLO v3. 747-754 - Farah Akif, Aqdas Naveed Malik, Ijaz Mansoor Qureshi, Ayesha Abbasi:

Transmit and receive antenna selection based resource allocation for self-backhaul 5G massive MIMO hetnets. 755-766 - Abdullah Sevin

, Cüneyt Bayilmis:
A QoS-based medium access control protocol for WBANs and its performance evaluation. 767-772 - Adil Bashir, Ajaz Hussain Mir:

Lightweight secure MQTT for mobility enabled e-health internet of things. 773-781 - Kiran Sree Pokkuluri

, Devi Nedunuri Usha:
A secure cellular automata integrated deep learning mechanism for health informatics. 782-788 - Pratyush Sharma, Souradeep Banerjee, Devyanshi Tiwari, Jagdish Chandra Patni

:
Machine learning model for credit card fraud detection- a comparative analysis. 789-796 - Yuen Chark See, Eugene Liew, Norliza Mohd. Noor:

Gabor and maximum response filters with random forest classifier for face recognition in the wild. 797-806 - Arti Jain

, Anuja Arora, Divakar Yadav
, Jorge Morato, Amanpreet Kaur:
Text summarization technique for punjabi language using neural networks. 807-818 - May Y. Al-Nashashibi

, Wa'el Hadi, Nuha El-Khalili, Ghassan Issa
, Abed Alkarim AlBanna:
A new two-step ensemble learning model for lmproving stress prediction of automobile drivers. 819-829 - Mahnaz Toloueiashtian, Mehdi Golsorkhtabaramiri, Seyed Yaser Bozorgi Rad:

Solving point coverage problem in wireless sensor networks using whale optimization algorithm. 830-838 - Saeedeh Zebhi, Seyed Mohammad T. Almodarresi, Vahid Abootalebi:

Human activity recognition based on transfer learning with spatio-temporal representations. 839-845 - Dimple Tiwari, Bharti Nagpal:

Enhanced long short-term memory (ELSTM) model for sentiment analysis. 846-855 - Hui Liu, Chengli Sun, Jiliang Tu:

Application of intuitionistic fuzzy evaluation method in aircraft cockpit display ergonomics. 856-863 - Zhongyu Zhou, Dechang Pi:

Data streams oriented outlier detection method: a fast minimal infrequent pattern mining. 864-870

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














