


default search action
Journal of Software, Volume 13
Volume 13, Number 1, January 2018
- Chin-Chen Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu:

High-Capacity Reversible Data Hiding Method for JPEG Images. 1-17 - Ahmad F. Subahi, Youseef Alotaibi:

A New Framework for Classifying Information Systems Modelling Languages. 18-42 - MdSaidul Hoque, Abeer Alsadoon, Angelika Maag, P. W. C. Prasad, Amr Elchouemi:

Comprehensive Search Engine Optimization Model for Commercial Websites: Surgeon's Website in Sydney. 43-56 - Ahmed Mokaddem, Amine Bel Haj, Mourad Elloumi:

Pro-malign: Multiple Sequence Alignment Algorithm using Approached Profile. 57-65 - Yun Zhang, Yang Chen:

Research on the Method for Estimating the Motion state of the Opponent's Agent in the Confrontation Environment. 66-71 - D. I. De Silva, S. R. Kodituwakku, A. J. Pinidiyaarachchi, N. Kodagoda:

Enhancements to an OO Metric: CB Measure. 72-81
Volume 13, Number 2, February 2018
- N. Satish Kumar, Shobha G.:

Detection of Moving Cast Shadow Using Pixel and Texture. 82-89 - Francisco Ortin, Donna O'Shea:

Towards an Easily Programmable IoT Framework Based on Microservices. 90-102 - Xianghui Zhao, Zhirong Li, Junkai Yi:

SIFT Feature-Based Second-Order Image Hash Retrieval Approach. 103-116 - KaixinLiu, Jianhui Chang, Huiwen Ren, Hong Zhu:

Disparity-Based Measurement on Participation Interest and Competition Recommendation Method. 117-125 - Reza Meimandi Parizi, Ahmad Shahi:

Component-Driven Development in Modern Virtual Assistants: A Mapping Study. 126-137 - Georgi Petrov Dimitrov, Galina S. Panayotova, Iva S. Kostadinova:

Aspect of the Designing and Developed Integrated Information Systems in Large Organizations. 138-145
Volume 13, Number 3, March 2018
- Adel Hassan, Mourad Chabane Oussalah:

Evolution Styles: Multi-View/Multi-Level Model for Software Architecture Evolution. 146-154 - Yuanxiang Jiang, Rui Yuan, Yuqiu Sun, Jin-Wen Tian:

Iterative Fractional Integral Denoising Based on Detection of Gaussian Noise. 155-167 - Anbo Qiu, Zhuowei Wang:

Optimization of Density Peak Clustering Algorithm Based on OpenMP. 168-179 - Ahmed Ghoneim:

A New Service Oriented Framework for Self-Adapting Smart Applications in Mobile Environment. 180-191 - Fengling Wang:

Research on Application of Improved K-means Algorithm in Network Intrusion Detection. 192-200 - Donghwoon Kwon, Ilnam Jeong, Geumchae Yoon, Bilal Abu Bakr, Ki Pyung Kim:

A Study on Probabilistic Schedule Estimation and Refinement of the Small and Medium-Sized Software Development Projects. 201-211
Volume 13, Number 4, April 2018
- Wei Feng, Yigang He:

Constructing, Analyzing and Synchronizing a Chaotic System with Equilibria of Rectangle Loop. 212-218 - Mohammad Shakeel Laghari:

EE Course Planning Software System. 219-231 - Rachida Hassani

, Younès El Bouzekri El Idrissi:
Normalization of Requirements Specification Document on Software Project Management. 232-241 - Abdullah R. Altaleb, Andrew M. Gravell:

Effort Estimation across Mobile App Platforms using Agile Processes: A Systematic Literature Review. 242-259 - Abeer Hamdy, Mohamed Elsayed:

Automatic Recommendation of Software Design Patterns: Text Retrieval Approach. 260-268
Volume 13, Number 5, May 2018
- Jehad Al Dallal

:
Predicting Object-Oriented Class Fault-Proneness: A Replication Study. 269-276 - Antoni Wiercioch, Stephanie Teufel, Bernd Teufel

:
The Authentication Dilemma. 277-286 - Deependra Poudel Sharma, Farzana Haque, Moshiur Bhuiyan, P. W. C. Prasad:

Service Optimization Using Goal-Oriented Modelling in Judicial Domain. 287-299 - Loredana M. Genovese, Filippo Geraci:

Web Crawling and Processing with Limited Resources for Business Intelligence and Analytics Applications. 300-316
Volume 13, Number 6, June 2018
- Mohit Garg, Richard Lai:

A Method for Selecting a Model to Estimate Software Reliability at the Design Phase of Component-Based Real-Time System Development. 317-334 - Jiexian Zeng, Xiang Fu, Lu Leng, Liqin Zhan:

Image Completion Based on Structure Reconstruction and Constraint. 335-349 - Xufang Zhao, Ximing Liang, Long Wen:

The Artificial Bee Colony Algorithm Improved with Simplex Method. 350-359 - ZhenJie Huang, Guoheng Huang, Lianglun Cheng:

Medical Image Segmentation of Blood Vessels Based on Clifford Algebra and Voronoi Diagram. 360-373
Volume 13, Number 7, July 2018
- Azmat Ullah, Richard Lai:

A Method of Extracting Organizational Components for Aligning Information Technology with Business. 374-385 - Yuqing Yan:

Knowledge Factors and Models of Requirements Change Management Process Based on Causality Analysis. 386-394 - Pei-Fen Wu

, Hui-Jiun Hu, Kuang-Yi Fan
:
Developing an APP with Taiwanese Image for Reminiscence Therapy of Dementia. 395-406 - Georgi Petrov Dimitrov, Galina S. Panayotova, Eugenia Kovatcheva, Daniela Borissova, Pavel Petrov:

One Approach for Identification of Brain Signals for Smart Devices Control. 407-413
Volume 13, Number 8, August 2018
- Hubertus Franke, Martina Hasseler, Denise Dick, Stephanie Krebs:

Requirements Engineering for a Matching Algorithm to Use in Hospital Networks. 414-420 - Chunlai Li, Wenhua Hai:

Image Encryption Scheme Based on Amplitude Modulation of Chaotic Signals. 421-436 - Yuzhen Liu, Long Zhang, Zhenyu Zhang:

A Survey of Test Based Automatic Program Repair. 437-452 - Nobuaki Nakazawa, Toshikazu Matsui, Yusaku Fujii:

Development of an Intuitive Interface for PC Mouse Operation Based on Both Arms Gesture. 453-459
Volume 13, Number 9, September 2018
- Saida Haidrar, Adil Anwar, Jean-Michel Bruel, Ounsa Roudiès:

A Domain-Specific Language to manage Requirements Traceability. 460-480 - Wenjiang Chen, Zhaoji Hu, Yan Yong, Hongbo Su:

3D Dynamic Visualization Simulation System of Pool Fire Triggered by Major Hazard Installation. 481-496 - Yousef Khdairat, Khair Eddin Sabri:

Generating Test Cases from Role-Based Access Control Policies using Cause-Effect Graph. 497-505 - Fengwei Guan, Lianglun Cheng:

Abnormal Quality Pattern Recognition of Industrial Process Based on Multi-Support Vector Machine. 506-519
Volume 13, Number 10, October 2018
- Naveed Ali, Richard Lai:

Requirements Engineering in Global Software Development: A Survey Study from the Perspectives of Stakeholders. 520-532 - Ahmad F. Subahi

:
Data Collection for Career Path Prediction Based on Analysing Body of Knowledge of Computer Science Degrees. 533-546 - Waleed Albattah

:
Predicting Costly Maintenance Packages Using Package Cohesion. 547-558 - Kazuyuki Matsumoto, Akira Fujisawa, Minoru Yoshida, Kenji Kita:

ASCII Art Classification based on Deep Neural Networks Using Image Feature of Characters. 559-572
Volume 13, Number 11, November 2018
- Mohamed A. G. Hazber

, Bing Li, Guandong Xu, Mohammed A. S. Mosleh, Xiwu Gu, Yuhua Li:
An Approach for Generation of SPARQL Query from SQL Algebra based Transformation Rules of RDB to Ontology. 573-599 - Nesrine Khalfallah, Sami Ouali

, Naoufel Kraïem:
Case Tool Support for Variability Managing in Database Schemas. 600-612 - Guoxiang Zhou, Ruirui Cao, Lei Shi, Yun Hu:

Research on an Efficient Software Framework for Developing. 613-620 - Suhan Pan, Zhiqiang Li, Juan Dai:

An Effective Method to Extract Web Content Information. 621-629
Volume 13, Number 12, December 2018
- Bassim Chabibi, Adil Anwar, Mahmoud Nassar:

Towards a Model Integration from SysML to MATLAB/Simulink. 630-645 - Qing-hui Ren, Sheng-lin Li, Han Qiao:

Method of Refactoring a Monolith into Micro-services. 646-653 - Bilal Al-Ahmad:

Using Code Coverage Metrics for Improving Software Defect Prediction. 654-674 - Lutfiah Al Turk:

Confidence Intervals for the Failure Intensity and Number of Remaining Errors Functions Based on Non-Homogeneous Poisson Process Model. 675-686

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














