


default search action
The International Arab Journal of Information Technology, Volume 19
Volume 19, Number 1, January 2022
- Yinglei Song, Jia Song, Junfeng Qu

:
Optimal image based information hiding with one-dimensional chaotic systems and dynamic programming. 1-10 - Kalyana Saravanan Annathurai, Tamilarasi Angamuthu

:
Sorensen-dice similarity indexing based weighted iterative clustering for big data analytics. 11-22 - Praphula Kumar Jain, Mani Shankar Bajpai, Rajendra Pamula

:
A modified DBSCAN algorithm for anomaly detection in time-series data with seasonality. 23-28 - Shelly Garg

, Jindal Balkrishan:
Skin lesion segmentation in dermoscopy imagery. 29-37 - Valliyammai Chinnaiah

, Cinu C. Kiliroor:
Heterogeneous feature analysis on twitter data set for identification of spam messages. 38-44 - Shahzad Hassan

, Maria Ahmad:
Energy heterogeneity analysis of heterogeneous clustering protocols. 45-54 - Yaqoob Al-Slais

, Wael M. El-Medany:
User-centric adaptive password policies to combat password fatigue. 55-62 - Ali Gezer:

The delay measurement and analysis of unreachable hosts of internet. 63-71 - P. Sirish Kumar

, V. B. S. Srilatha Indira Dutt, Ganesh Laveti
:
GPS receiver position augmentation using correntropy kalman filter in low latitude terrain. 72-80 - Mohammad Karimi

, Zahra Khandaghi, Mahsa Shahipour:
Designing an intelligent system to detect stress levels during driving. 81-89 - Yange Sun, Han Shao, Bencai Zhang:

Ensemble based on accuracy and diversity weighting for evolving data streams. 90-96 - Shiza Nawaz, Anam Zai, Salma Imtiaz

, Humaira Ashraf:
Systematic literature review: causes of rework in GSD. 97-109 - Nesma Youssef, Hatem Abdul-Kader, Amira Abdelwahab:

Mining frequent sequential rules with an efficient parallel algorithm. 110-120 - Suriya Prakash Jambunathan, Suguna Ramadass, Palanivel Rajan Selva kumaran:

Analyzing the behavior of multiple dimensionality reduction algorithms to obtain better accuracy using benchmark KDD CUP dataset. 121-131 - Khalid Majrashi:

Voice versus keyboard and mouse for text creation on arabic user interfaces. 132-142
Volume 19, Number 2, March 2022
- Saravjeet Singh, Jaiteg Singh

:
Map matching algorithm: empirical review based on indian openstreetmap road network data. 143-149 - Anup Bhat

, Harish Venkatarama
, Geetha Maiya:
Compact tree structures for mining high utility itemsets. 150-159 - Hamza Aldabbas, Dheeb Albashish, Khalaf Khatatneh

, Rashid Amin:
An architecture of IoT-aware healthcare smart system by leveraging machine learning. 160-172 - Meisen Pan, Qi Xiong:

An improved iris localization method. 173-185 - Dhaya Ramakrishnan, Kanthavel Radhakrishnan:

Applying deep convolutional neural network (DCNN) algorithm in the cloud autonomous vehicles traffic model. 186-194 - Murugan Singaravelan, Bhuvaneswari Mariappan

:
Reinforcement energy efficient ant colony optimization of mobile ad hoc multipath routing performance enhancement. 195-202 - Nasim Matar

, Tirad AlMalahmeh, Bilal Sowan
, Saheer Al-Jaghoub, Wasef Mater:
A multi-group structural equation modeling for assessing behavioral intention of using mobile cloud computing-the case of jordanian universities during the covid19 pandemic. 203-213 - Mohammad Al-Mashhadani, Mohamed Shujaa:

IoT security using AES encryption technology based ESP32 platform. 214-223 - M. Suresh Chinnathampy

, Aruna Thangavelu, Muthukumaran Narayanaperumal:
Performance analysis of efficient spectrum utilization in cognitive radio networks by dynamic spectrum access and artificial neuron network algorithms. 224-229 - Fen He, Kimia Rezaei Kalantrai, Ali Ebrahimnejad, Homayun Motameni:

An effective fault-tolerance technique in web services: an approach based on hybrid optimization algorithm of PSO and cuckoo search. 230-236 - Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Musa Osman

, Ping Yang, Saeed H. Alsamhi
:
An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique. 237-248 - Weijun Zhu, Huanmei Wu:

CTL model checking based on binary classification of machine learning. 249-260 - Shobana Manoharan, Poonkuzhali Sugumaran

, Kishore Kumar
:
Multichannel based IoT malware detection system using system calls and opcode sequences. 261-271 - Ömer Kasim:

An efficient ensemble architecture for privacy and security of electronic medical records. 272-280 - Yogesh Kumar

, Shashi Kant Verma, Sandeep Sharma
:
Multi-pose facial expression recognition using hybrid deep learning model with improved variant of gravitational search algorithm. 281-287
Volume 19, Number 3, May 2022
- Chian Techapanupreeda, Ekarat Rattagan, Werasak Kurutach:

A transaction security accountability protocol for electronic health systems. 289-297 - Imran Mujaddid Rabbani, Muhammad Aslam, Ana María Martínez Enríquez:

SAFRank: multi-agent based approach for internet services selection. 298-306 - Damjan Fujs, Simon Vrhovec

, Damjan Vavpotic:
Towards personalized user training for secure use of information systems. 307-313 - Mohammad Abdallah

, Mustafa Alrifaee
:
A heuristic tool for measuring software quality using program language standards. 314-322 - Shamik Tiwari, Anurag Jain, Kusum Yadav

, Rabie Ramadan:
Machine learning-based model for prediction of power consumption in smart grid. 323-329 - Fahd Saleh Alotaibi, Vishal Gupta:

Sentiment analysis system using hybrid word embeddings with convolutional recurrent neural network. 330-335 - Ashokraj Murugesan, Ananthi Govindasamay

:
Secrecy capacity analysis of reconfigurable intelligent surface based vehicular networks. 336-341 - Onur Can Sert, Sibel Tariyan Özyer, Deniz Bestepe, Tansel Özyer:

Temptracker: a service oriented temporal natural language processing based tool for document data characterization and social network analysis. 342-352 - Mirza Sami, Ishrat Naiyer

, Ehsanul Khan, Jia Uddin:
Improved semantic inpainting architecture augmented with a facial landmark detector. 353-362 - Hamidreza Ghaffari

:
Choosing decision tree-based boundary patterns in the intrusion detection systems with large data sets. 363-369 - J. Daphney Joann, Vayanaperumal Rajamani:

Half-duplex and full-duplex performance comparison for different fading channel using HMR protocol in MIMO technology. 370-380 - Mourad Talbi, Med Salim Bouhlel:

A novel technique of noise cancellation based on stationary bionic wavelet transform and WATV: application for ECG denoising. 381-387 - Xiaogang Zhang, Lili Sun:

Research on the similarity between nodes with hypernymy/hyponymy relations based on IC and taxonomical structure. 388-395 - Shivani Jaswal

, Manisha Malhotra:
AFTM-agent based fault tolerance manager in cloud environment. 396-402 - Akansha Tyagi

, Sandhya Bansal:
Hybrid FiST_CNN approach for feature extraction for vision-based indian sign language recognition. 403-411
Volume 19, Number 3A, Special Issue 2022
- Adrian Bosire, Damian Maingi:

Driving signature analysis for auto-theft recovery. 413-421 - Maroua Grid

, Leyla Belaiche
, Laid Kahloul, Saber Benharzallah
:
An efficient parallel version of dynamic multi-objective evolutionary algorithm. 422-431 - Siham Amrouch, Sihem Mostefai:

A schema-free instance matching algorithm based on virtual document similarity. 432-441 - Omaimah Al Hosni, Andrew J. Starkey:

Assesing the stability and selection performance of feature selection methods under different data complexity. 442-455 - Adnan Shaout

, Shanmukha Pattela:
Automotive embedded systems-model based approach review. 456-462 - Eman Hamdy, Osama Badawy

, Mohamed Saad Zaghloul:
Densely convolutional networks for breast cancer classification with multi-modal image fusion. 463-469 - Shekhar Karanwal

:
DWT and LBP map based feature descriptors for face recognition in harsh light variations. 470-477 - Isaac Kofi Nti

, Owusu Narko-Boateng, Adebayo Felix Adekoya, Arjun Remadevi Somanathan
:
Stacknet based decision fusion classifier for network intrusion detection. 478-490 - Zina Houhamdi, Belkacem Athamena

, Ghaleb A. El Refae
:
Retention contracts under partial information electoral competition case study. 491-500 - Ola M. Surakhi

, Antonio Mora García, Mohammed Jamoos, Mohammad Y. Alkhanafseh
:
The intrusion detection system by deep learning methods: issues and challenges. 501-513 - Ahmad Shatnawi

, Abderraouf Drine, Mohammad Al-Zinati, Qutaibah Althebyan:
Analyzing the effect of driving speed on the performance of roundabouts. 514-522 - Muhammad Qasim Memon, Yu Lu

, Shengquan Yu, Aasma Memon, Abdul Rehman Memon:
The critical feature selection approach using ensemble meta-based models to predict academic performances. 523-529 - Zohaib Ahmed

, Muhammad Qasim Memon, Aasma Memon, Parveen Munshi, Muhammad Jaffar Memon:
Echo state network optimization using hybrid-structure based gravitational search algorithm with square quadratic programming for time series prediction. 530-535 - Afrah Mahmoud Mousa, Thorsten Auth, Anas Samara, Suhail M. Odeh:

Random walk generation and classification within an online learning platform. 536-543 - Thafer Y. Assaraira, Nouh Alhindawi

, Saad Bani-Mohammad, Zaid A. Al-Anber, Zeid A. Albashaireh:
The jordanian universities experience in integrating online learning and its quality assurance. 544-565 - Jamila Hamdan Al-Aamri, Nour Eldin Elshaiekh Osman:

The role of artificial intelligence abilities in library services. 566-573
Volume 19, Number 4, July 2022
- Sakthidasan Sankaran:

Pattern Matching based Vehicle Density Estimation Technique for Traffic Monitoring Systems. 575-581 - Yetunde Akinwumi, Joshua Ojo Ayeni, Samson A. Arekete, Mba O. Odim, Adewale Opeoluwa Ogunde, Bosede Oyenike Oguntunde:

XAPP: An Implementation of SAX-Based Method for Mapping XML Document to and from a Relational Database. 582-588 - Sony P.

, Sureshkumar Nagarajan:
Semantic Interoperability Model in Healthcare Internet of Things Using Healthcare Sign Description Framework. 589-596 - Fanqi Meng, Xixi Xiao, Jingdong Wang:

Rating the Crisis of Online Public Opinion Using a Multi-Level Index System. 597-608 - Pratikkumar A. Barot, Harikrishna B. Jethva

:
MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data. 609-616 - Mohammed Alghobiri, Khalid Mohiuddin

, Mohammed Abdul Khaleel
, Mohammad Islam
, Samreen Shahwar, Osman Nasr
:
A Novel Approach of Clustering Documents: Minimizing Computational Complexities in Accessing Database Systems. 617-628 - Haitham Issa, Qinmu Peng, Sali Issa, Xinge You, Ruijiao Peng, Jing Wang:

Person-Independent Emotion and Gender Prediction (EGP) System Using EEG Signals. 629-638 - Zoltan Kazi, Ljubica Kazi

:
Software Project Duration Estimation Based on COSMIC Method Applied to Data Flow Diagram. 639-651 - Behnam Shamshirsaz, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti:

An Improved Process Supervision and Control Method for Malware Detection. 652-659 - Sana Fakhfakh, Yousra Ben Jemaa

:
Deep Learning Shape Trajectories for Isolated Word Sign Language Recognition. 660-666 - Aravinda Chikmagalur Ventakaramu, Suresha Devaraj

, Prakash Hebbakavadi Nanjundaiah, Kyasambally Rajasekhar Udayakumar Reddy:
Off-Line Signature Confirmation based on Cluster Representations of Geometrical and Statistical Features through Vector Distance, Neural Network and Support Vector Machine Classifiers. 667-673 - Chandrasekaran Sridharan, Sudhaman Parthasarathy:

A Simplified Alternate Approach to Estimate Software Size of Startups. 674-680 - Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib, Saqib Hakak:

Arabic Quran Verses Authentication Using Deep Learning and Word Embeddings. 681-688 - Noor Mahmood:

Solving Capacitated Vehicle Routing Problem Using Meerkat Clan Algorithm. 689-694 - Pei Ma, Feng Yu, Changlong Zhou, Minghua Jiang:

Smoke Detection Algorithm based on Negative Sample Mining. 695-703
Volume 19, Number 5, September 2022
- Sameeah Noreen Hameed, Muhammad Adnan Ashraf

, Yanan Qiao:
Multi-Lingual Language Variety Identification using Conventional Deep Learning and Transfer Learning Approaches. 705-712 - Praveen Pappula:

A Novel Binary Search Tree Method to Find an Item Using Scaling. 713-720 - Nikhila Thribhuvan

, Sudheep Elayidom
:
Transfer Learning for Feature Dimensionality Reduction. 721-727 - Ako Muhammad Abdullah, Emre Ozen, Husnu Bayramoglu

:
Enhanced-AODV Routing Protocol to Improve Route Stability of MANETs. 736-746 - Aditya Bakshi, Sunanda Gupta:

Face Anti-Spoofing System using Motion and Similarity Feature Elimination under Spoof Attacks. 747-758 - Haider Dheyaa Kamil Al-janabi, Hussam Dheaa Kamel Al-Janabi

, Bashar Qas Elias:
Secure of Transmission Systems in the Visible Range of Light with the Power Line Communication Interface. 759-764 - Kiran Sree Pokkuluri

, S. S. S. N. Usha Devi Nedunuri:
Crop Disease Prediction with Convolution Neural Network (CNN) Augmented With Cellular Automata. 765-773 - Metin Bilgin, Nisanur Bulut:

Compatibility Themed Solution of the Vehicle Routing Problem on the Heterogeneous Fleet. 774-784 - GokulaKrishnan Elumalai

, Malathi Ganesan:
Deep Learning Based Hand Wrist Segmentation using Mask R-CNN. 785-792 - Hikmet Canli

, Sinan Toklu:
AVL Based Settlement Algorithm and Reservation System for Smart Parking Systems in IoT-based Smart Cities. 793-801 - Ganesan Thangavel, Pothuraju Rajarajeswari:

A Novel Genetic Algorithm with db4 Lifting for Optimal Sensor Node Placements. 802-811 - Iyad F. Jafar, Khalid A. Darabkh, Fahed Jubair:

Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images. 812-821 - Azidine Guezzaz

, Mourade Azrour
, Said Benkirane, Mouaad Mohy-Eddine
, Hanaa Attou, Maryam Douiba
:
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security. 822-830 - Soha A. Nossier

, Mohamed R. M. Rizk, Saleh el Shehaby, Nancy Diaa Moussa
:
Environmental Noise Adaptable Hearing Aid using Deep Learning. 831-841
Volume 19, Number 6, November 2022
- Mohamed Lazhar Bellagha

, Mounir Zrigui:
Speaker naming in arabic TV programs. 843-853 - Ameer Badr

, Alia Abdul Hassan:
VoxCeleb1: speaker age-group classification using probabilistic neural network. 854-860 - Ahmad Al-Jarrah, Mohammad Al-Jarrah, Amer Albsharat:

Dictionary based arabic text compression and encryption utilizing two-dimensional random binary shuffling operations. 861-872 - Lei Liu, Zheng Pei, Peng Chen

, Zhisheng Gao, Zhihao Gan, Kang Feng:
An improved quantile-point-based evolutionary segmentation representation method of financial time series. 873-883 - Sunil Kumar Jha

, Filip Josheski, Xiaorui Zhang, Zulfiqar Ahmad:
Neuroevolution of augmenting topologies for artificial evolution: a case study of kinesis of creature in the various mediums. 884-890 - Marriam Nawaz

, Momina Masood
, Ali Javed, Tahira Nazir:
Faceswap based deepfakes detection. 891-896 - Umadevi Ramamoorthy, Aruna Loganathan:

Analysis of video steganography in military applications on cloud. 897-903 - Emran Al-Buraihy, Wang Dan, Rafiullah Khan

, Mohib Ullah
:
An Ml-based classification scheme for analyzing the social network reviews of yemeni people. 904-914 - Bancha Luaphol, Jantima Polpinij, Manasawee Kaenampornpan

:
Text mining approaches for dependent bug report assembly and severity prediction. 915-924 - Guruviah Karpagarajesh:

Implementation of multimode fiber in eight channels mimo multiplexing system by eliminating dispersion with optical grating methodologies. 925-931 - Malini Alagarsamy, Ameena Sahubar Sathik:

Context aware mobile application pre-launching model using KNN classifier. 932-941 - Saida Laaroussi, Si Lhoussain Aouragh, Abdellah Yousfi, Mohammed Nejja, Hicham Gueddah, Said Ouatik El Alaoui

:
New language models for spelling correction. 942-948 - Asma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa

:
Improved superpixels generation algorithm for qualified graph-based technique. 949-955 - Natarajan Sowri Raja Pillai, Ranganathan Rani Hemamalini:

Hybrid user acceptance test procedure to improve the software quality. 956-964 - K. Lakshmi Narayanan, R. Santhana Krishnan, Y. Harold Robinson:

A hybrid deep learning based assist system for detection and classification of breast cancer from mammogram images. 965-974

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














