


default search action
The International Arab Journal of Information Technology, Volume 17
Volume 17, Number 1, January 2020
- Razika Souadek, Naceur-Eddine Boukezzoula:

New image watermarking algorithm based on DWT and pixel movement function PMF. 1-7 - Lei Zheng, Jiawei Zou, Baoyu Liu, Yong Hu, Yong Deng:

A novel evidence distance in power set space. 8-15 - Shubair Abdulla:

A neuro-fuzzy system to detect IPv6 router alert option DoS packets. 16-25 - Ishrat-Un-Nisa Uqaili

, Syed Ahsan:
Machine learning based prediction of complex bugs in source code. 26-37 - Jasleen Kaur, Jatinderkumar R. Saini

:
Designing punjabi poetry classifiers using machine learning and different textual features. 38-44 - Nora Mohammed:

Extracting word synonyms from text using neural approaches. 45-51 - Mona A. Mohamed, Sahar Mohamed Ghanem, Magdy H. Nagi:

Privacy-preserving for distributed data streams: towards l-diversity. 52-64 - Nermeen Alami, Nabil Arman

, Faisal Khamayseh:
Generating sequence diagrams from arabic user requirements using mada+tokan tool. 65-72 - Gobalakrishnan Natesan, Arun Chokkalingam

:
An improved grey wolf optimization algorithm based task scheduling in cloud computing environment. 73-81 - Wen Zhou, Jinyuan Jia:

Training convolutional neural network for sketch recognition on large-scale dataset. 82-89 - Uferah Shafi

, Munam Ali Shah
, Abdul Wahid
, Kamran Abbasi, Qaisar Javaid, Muhammad Nabeel Asghar
, Muhammad Haider:
A novel amended dynamic round robin scheduling algorithm for timeshared systems. 90-98 - Ning Fu, Lijun Shan, Chenglie Du, Zhiqiang Liu, Han Peng:

Modelling and verification of ARINC 653 hierarchical preemptive scheduling. 99-106 - Huijie Lian, Qingxian Wang, Guangbo Wang:

Large universe ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage. 107-117 - Sanaa Ghouzali, Souad Larabi Marie-Sainte

:
Face identification based bio-inspired algorithms. 118-127 - Mohammad Ahmad Alia

, Khaled Suwais
:
Improved steganography scheme based on fractal set. 128-136 - Tukhtaev Sokhib, Taeg Keun Whangbo:

A combined method of skin-and depth-based hand gesture recognition. 137-145
Volume 17, Number 2, March 2020
- Ahmed Thahab:

A novel secure video steganography technique using temporal lifted wavelet transform and human vision properties. 147-153 - Vijay Kumar Sharma

, Devesh Kumar Srivastava
, Pratistha Mathur:
A daubechies DWT based image steganography using smoothing operation. 154-161 - Huifen Huang, Zhihong Wu, Jing Ge, Lu Wang:

Toward building video multicast tree with congestion avoidance capability in software-defined networks. 162-169 - Lei Deng, Yong Gao:

Gammachirp filter banks applied in roust speaker recognition based on GMM-UBM classifier. 170-177 - Ebrahim Al-wajih

, Moataz A. Ahmed
:
A new application for gabor filters in face-based gender classification. 178-187 - Zeynep Hilal Kilimci, Sevinç Ilhan Omurca

:
Enhancement of the heuristic optimization based on extended space forests using classifier ensembles. 188-195 - Huixian Li, Jin Gao, Lingyun Wang, Liaojun Pang:

MPKC-based threshold proxy signcryption scheme. 196-206 - Raju Bhukya, Sumit Deshmuk:

Referential DNA data compression using hadoop map reduce framework. 207-214 - Mohammed Tabash, Mohamed Abd Allah Makhlouf

, Bella Tawfik
:
Intrusion detection model using naive bayes and deep learning technique. 215-224 - Anju Shukla, Shishir Kumar, Harikesh Singh

:
Fault tolerance based load balancing approach for web resources in cloud environment. 225-232 - Hala Mulki

, Hatem Haddad
, Mourad Gridach, Ismail Babaoglu:
Empirical evaluation of leveraging named entities for arabic sentiment analysis. 233-240 - Yangyang Li, Bo Liu:

A new vector representation of short texts for classification. 241-249 - Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah

, Harish Sekar:
A hybrid approach for providing improved link connectivity in SDN. 250-256 - Ruzayn Quaddoura

:
On 2-colorability problem for hypergraphs with P_8-free incidence graphs. 257-263 - Asha Narayana, Adapa Venkata Narasimhadhan:

Enhanced median flow tracker for videos with illumination variation based on photometric correction. 264-271 - Adeel Shiraz Hashmi, Tanvir Ahmad:

FAAD: a self-optimizing algorithm for anomaly detection. 272-280
Volume 17, Number 3, May 2020
- Aafaq Zahid, Nurfadhlina Mohd Sharef, Aida Mustapha

:
Normalization-based neighborhood model for cold start problem in recommendation system. 281-290 - Qing Yang, Haiyang Wang, Mengyang Bian, Yuming Lin, Jingwei Zhang:

Incorporating reverse search for friend recommendation with random walk. 291-298 - Riaz Ahmad, Saeeda Naz, Muhammad Zeshan Afzal

, Sheikh Faisal Rashid, Marcus Liwicki:
A deep learning based arabic script recognition system: benchmark on KHAT. 299-305 - Dhiah el Diehn I. Abou-Tair

, Simon Büchsenstein, Alá F. Khalifeh
:
A fog computing-based framework for privacy preserving IoT environments. 306-315 - Ahmed Maghawry, Yasser M. K. Omar, Amr Badr:

Self-organizing map vs initial centroid selection optimization to enhance k-means with genetic algorithm to cluster transcribed broadcast news documents. 316-324 - Phuoc Thi Hong Doan, Ngamnij Arch-int, Somjit Arch-int:

A semantic framework for extracting taxonomic relations from text corpus. 325-337 - Nagarajan Balasubramanaian, Suguna Jayapal, Satheeshkumar Janakiraman:

A contrivance to encapsulate virtual scaffold with comments and notes. 338-346 - Haval Sadeq:

Using total probability in image template matching. 347-357 - Loiy Alsbatin

, Gürcü Öz, Ali Hakan Ulusoy
:
A novel physical machine overload detection algorithm combined with quiescing for dynamic virtual machine consolidation in cloud data centers. 358-366 - Meshrif Alruily:

Issues of dialectal saudi twitter corpus. 367-374 - Rashedul Islam, Md. Rafiqul Islam, Kamrul Hasan Talukder

:
An enhanced MSER pruning algorithm for detection and localization of bangla texts from scene images. 375-385 - Safdar Hussain Shaheen, Muhammad Yousaf

, Mudassar Jalil
:
A smart card oriented secure electronic voting machine built on NTRU. 386-393 - Khalid M. O. Nahar

, Ra'ed M. Al-Khatib
, Moy'awiah Al-Shannaq, Mohammad Daradkeh, Rami Malkawi
:
Direct text classifier for thematic arabic discourse documents. 394-403 - Asjad Amin, Muhammad Ali Qureshi

:
A novel image retrieval technique using automatic and interactive segmentation. 404-410 - Anjana Gosain, Ganga Sharma

:
A new metric for class cohesion for object oriented software. 411-421 - Raju Bhukya, Achyuth Ashok:

Gene expression prediction using deep neural networks. 422-431
Volume 17, Number 4, July 2020
- Xiaogang Zhang, Shouqian Sun, Kejun Zhang:

A New Hypred Improved Method for Measuring Concept Semantic Similarity in WordNet. 433-439 - Raed Alazaidah, Farzana Kabir Ahmad

, Mohamad Mohsin
:
Multi Label Ranking Based on Positive Pairwise Correlations Among Labels. 440-449 - Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu:

Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration. 450-460 - Shakirullah Shah, Jamil Ahmad, Najeeb Ur Rehman:

Design and Implementation of Inter-operable and Secure Agent Migration Protocol. 461-470 - Jinlin Ma, Ziping Ma:

3D Radon Transform for Shape Retrieval Using Bag-of-Visual-Features. 471-479 - Mohamed Amine Belkadi, Abdelhamid Daamouche

:
Swarm Intelligence Approach to QRS Detection. 480-487 - Mustafa Al-Fayoumi

, Jaber Alwidian, Mohammad Abusaif:
Intelligent Association Classification Technique for Phishing Website Detection. 488-496 - Sunil Patel, Ramji M. Makwana:

Connectionist Temporal Classification Model for Dynamic Hand Gesture Recognition using RGB and Optical flow Data. 497-506 - Sidra Sajid, Ali Javed, Aun Irtaza:

An Effective Framework for Speech and Music Segregation. 507-514 - Göksu Tüysüzoglu, Derya Birant

:
Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning. 515-528 - Mohammad Ebrahim Khademi, Mohammad Fakhredanesh, Seyed Mojtaba Hoseini:

Conceptual Persian Text Summarizer: A New Model in Continuous Vector Space. 529-538 - Jun Hong, Tao Wen, Quan Guo:

Query Authentication of Outsourced Spatial Database. 539-547 - Naziha Khlif, Ahmed Ghorbel, Walid Aydi

, Nouri Masmoudi:
Generation of Chaotic Signal for Scrambling Matrix Content. 548-553 - Muthukumar Arunachalamand

, Kavipriya Amuthan:
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault. 554-561 - Muhammad Babar, Akmal Saeed Khattak, Fahim Arif, Muhammad Usman Tariq

:
An Improved Framework for Modelling Data Warehouse Systems Using UML Profile. 562-571 - Mohammad Javad Parseh

, Mohammad Rahmanimanesh, Parviz Keshavarzi:
Persian Handwritten Digit Recognition Using Combination of Convolutional Neural Network and Support Vector Machine Methods. 572-578
Volume 17, Number 4A, Special Issue 2020
- Gullelala Jadoon

, Muhammad Shafi
, Sadaqat Jan:
Model transformations carried by the traceability framework for enterprises in software industry. 579-587 - Ala'eddin Masadeh

, Haythem Bany Salameh, Ahmad I. Abu-El-Haija:
Design and simulation of spectrum access and power management protocol for dynamic access networks. 588-597 - Mohammed Mahmod Shuaib, Zarita Zainuddin:

Incorporating intelligence for overtaking moving threatening obstacles. 598-606 - Mohammad Abuthawabeh, Khaled W. Mahmoud:

Enhanced android malware detection and family classification, using conversation-level network traffic features. 607-614 - Nada Mirza:

Robotic path planning and fuzzy neural networks. 615-620 - Qutaibah Althebyan

:
Mitigating insider threats on the edge: a knowledgebase approach. 621-628 - Mariam Khader, Ghazi Al-Naymat

:
Discovery of arbitrary-shapes clusters using DENCLUE algorithm. 629-634 - Ahmad Al-Qerem, Ghazi Al-Naymat

, Mays Alhasan, Mutaz M. Al-Debei:
Default prediction model: the significant role of data engineering in the quality of outcomes. 635-644 - Zina Houhamdi

, Belkacem Athamena
:
Identity identification and management in the internet of things. 645-654 - Mohammad M. Shurman, Rami M. Khrais, Abdulrahman A. Yateem:

DoS and DDoS attack detection using deep learning and IDS. 655-661 - Huthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi:

On detection and prevention of zero-day attack using cuckoo sandbox in software-defined networks. 662-670 - Mohammed Ajam, Hussein Kanaan, Lina El Khansa, Mohammad Ayache:

Identification of ischemic stroke by marker controlled watershed segmentation and fearture extraction. 671-676 - Adnan Shaout

, Brennan Crispin:
Streaming video classification using machine learning. 677-682
Volume 17, Number 5, September 2020
- Anju Shukla, Shishir Kumar, Harikesh Singh:

ANN based execution time prediction model and assessment of input parameters through ISM. 683-691 - Leyi Xiao, Honglin Ouyang, Chaodong Fan:

Otsu?s thresholding method based on plane intercept histogram and geometric analysis. 692-701 - Manal M. Khayyat

, Lamiaa A. Elrefaei
:
A deep learning based prediction of arabic manuscripts handwriting style. 702-712 - Mukhriddin Mukhiddinov

, Rag-Gyo Jeong, Jinsoo Cho:
Saliency cuts: salient region extraction based on local adaptive thresholding for image information recognition of the visually impaired. 713-720 - Kamal Bashir

, Tianrui Li
, Mahama Yahaya:
A novel feature selection method based on maximum likelihood logistic regression for imbalanced learning in software defect prediction. 721-730 - Chengcheng Li, Fengming Liu, Pu Li:

Text similarity computation model for identifying rumor based on bayesian network in microblog. 731-741 - Fawaz S. Al-Anzi

, Dia AbuZeina:
Enhanced latent semantic indexing using cosine similarity measures for medical application. 742-749 - Hassan Najadat

, Ibrahim Al-Daher, Khaled Alkhatib:
Performance evaluation of industrial firms using DEA and DECORATE ensemble method. 750-757 - Abdul Hafeez Khan, Syed Ali Abbas, Aqeel-ur Rehman:

Ontology-based transformation and verification of uml class model. 758-768 - Shiwei Che, Wu Yang, Wei Wang:

Improved streaming quotient filter: a duplicate detection approach for data streams. 769-777 - Ahmed Nasser

, Hayri Sever:
A concept-based sentiment analysis approach for arabic. 778-788 - Hichem Rahab

, Abdelhafid Zitouni, Mahieddine Djoudi:
An enhanced corpus for arabic newspapers comments. 789-798 - Ahmet Cevahir Cinar

, Mustafa Servet Kiran:
The performance of penalty methods on tree-seed algorithm for numerical constrained optimization problems. 799-807 - Faouzi Jaïdi

, Faten Ayachi, Adel Bouhoula
:
Advanced analysis of the integrity of access control policies: the specific case of databases. 808-815 - Lei Shi

, Junping Du, Feifei Kou:
A sparse topic model for bursty topic discovery in social networks. 816-824 - Merouane Chettat, Djamel Gaceb, Soumia Belhadi:

A fast high precision skew angle estimation of digitized documents. 825-831
Volume 17, Number 6, November 2020
- Ahmad Esmaeilkhah, Changiz Ghobadi

, Javad Nourinia
, Maryam Majidzadeh:
Unified inter-letter steganographic algorithm, a text-based data hiding method. 833-838 - Doaa H. Elsayed, Eman S. Nasr, Alaa El-Din M. El Ghazali, Mervat Gheith:

A self-healing model for QoS-aware web service composition. 839-846 - Shengbing Ren, Xiang Zhang:

Synthesizing conjunctive and disjunctive linear invariants by K-means++ and SVM. 847-856 - Mohamed Dahmani, Mhania Guerti:

Recurrence quantification analysis of glottal signal as non linear tool for pathological voice assessment and classification. 857-866 - Ra'Ed Bani-Abdelrahman

, Rafat Alshorman
, Walter Hussak, Amitabh Trehan
:
Specification of synchronous network flooding in temporal logic. 867-874 - Imran Ashraf, Soojung Hur, Yongwan Park:

An investigative analysis on finding patterns in co-author and co-institution networks for LIDAR research. 875-884 - Allam Mohan

, Malaiyappan Nandhini
:
Wrapper based feature selection using integrative teaching learning based optimization algorithm. 885-894 - Dinesh Elangovan

, Ramesh Muthiya:
Design and implementation of crypt analysis of cloud data intrusion management system. 895-905 - Pongsathon Janyoi, Pusadee Seresangtakul

:
F0 modeling for isarn speech synthesis using deep neural networks and syllable-level feature representation. 906-915 - Niyati Kumari Behera, Mahalakshmi Guruvayur Suryanarayanan:

Enriching domain concepts with qualitative attributes: a text mining based approach. 916-925 - Reza Mehmood, Arvind Selwal

:
Polynomial based fuzzy vault technique for template security in fingerprint biometrics. 926-934 - Jihene Younes

, Hadhemi Achour
, Emna Souissi, Ahmed Ferchichi:
A deep learning approach for the romanized tunisian dialect identification. 935-946 - Arnisha Khondaker, Arman Khandaker, Jia Uddin

:
Computer vision-based early fire detection using enhanced chromatic segmentation and optical flow analysis technique. 947-953 - Kush Shrivastava, Shishir Kumar:

A sentiment analysis system for the hindi language by integrating gated recurrent unit with genetic algorithm. 954-964 - Thakkalapally Preethi, Bharat Amberker:

Traceable signatures using lattices. 965-975 - Karima Kies, Nacéra Benamrane:

A dynamic particle swarm optimisation and fuzzy clustering means algorithm for segmentation of multimodal brain magnetic resonance image data. 976-983

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














