Volume 7, Number 1, February 2015

  Citation Count

Iris Recognition for Personal Identification Using Lamstar Neural Network
Shideh Homayon, University of California, USA

05

An Employing a Multistage Fuzzy Architecture for Usability of Open Source Software
Roba Al-Soub, Mutah University, Jordan

0

Analysis of Selection Indicators of Badminton Players by the Delphi Method and Analytic Hierarchy Process
Han-Chen Huang1, Chun-Ta Lin2 and Chia-Sen Hu3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Guang Hua Junior High School, Taiwan

02

Cross Platform App : A Comparative Study
Paulo R.M.de Andrade1, Adriano B.Albuquerque1, Otávio F. Frota2, Robson V Silveira2 and Fátima A. da Silva2, 1University of Fortaleza - UNIFOR Fortaleza - CE, Brazil and 2College Estacio FIC of Ceara Fortaleza - CE, Brazil

20

Performance Comparison of Hybrid Wavelet Transforms Formed Using Dct, Walsh, Haar and DKT in Watermarking
H.B.Kekre1, Tanuja Sarode2 and Shachi Natu1, 1NMIMS University, India and 2Mumbai University, India

01

Improving Initial Generations in PSO Algorithm for Transportation Network Design Problem
Navid Afkar and Abbas Babazadeh, University of Tehran, Iran

0

New Approach in Symmetric Block Cipher Security Using a New Cubical Technique
Ali M Alshahrani and Stuart Walker, University of Essex, United Kingdom

01

The Analysis of the Time Table Structure Within a Student Information System (Sis)
Issa S.I.Ottoum, Alzaytoonah University of Jordan, Jordan

0

A Rule Based Approach towards Detecting Human Temperament
Shomoye Abiodun R1 and ShomoyeAdekunle I2, 1Oduduwa University, Nigeria and 2Federal Polytechnic, Nigeria

01

An Iterative Morphological Decomposition Algorithm for Reduction of Skeleton Points
A.Sri Krishna1 and G.L.K.Vasista2, N.Neelima1, 1R.V.R& J.C College of Eng. India and 2AMRITA School of Eng., India

0

Analysis of Key Considerations of the Public When Choosing Recreational Activities
Han-Chen Huang1, Chun-Ta Lin2 and Chi-Han Chuang3, 1Chung Hua University, Taiwan, 2Yu Da University of Science and Technology, Taiwan and 3Da-Tung Elementary School, Taiwan

0

Efficient Data Protection for Enterprise Data Centers
Khaled Aldossari, EXPEC Computer Center, Saudi Arabia

01

Authoring System of Drill & Practice Elearning Modules for Hearing Impaired Students
Karim Q Hussein, Mustansiriyah University, Iraq

01

A Novel Methodology for Constructing Rule-Based Naïve Bayesian Classifiers
Abdallah Alashqur, Applied Science University, Jordan

03

Testability Measurement Model for Object Oriented Design (Tmmood)
Abdullah1, M.H.Khan2, Reena Srivastava3, 1BBD University, India, 2I.E.T, India and 3BBD University, India

10

Volume 7, Number 2, April 2015

  Citation Count

Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment
Po-Huei Liang and Jiann-Min Yang, National Cheng Chi University, Taiwan

07

An Extension of Protégé for an Automatic Fuzzy-Ontology Building Using Clustering and FCA
Aloui Amira and Grissa Touzi Amel, Université Tunis El Manar, Tunisia

03

Towards a System Dynamics Modeling Method Based on Dematel
Fadwa Chaker, Abdellah El Manouar and Mohammed Abdou Janati Idrissi, Mohammed V University, Morocco

0

Preprocessing for PPM: Compressing Utf-8 Encoded Natural Language Text
William J.Teahan1 and Khaled M.Alhawiti2, 1University of Wales, Bangor, UK and 2University of Tabuk, KSA

01

Thermal Control in 3D Liquid Cooled Processors Via Hotspot Separation And Thermoelectric Cooling
Yue Hu, Shaoming Chen, Lu Peng, Edward Song and Jin-Woo Choi, Louisiana State University, USA

01

SFAMSS:A Secure Framework for ATM Machines Via Secret Sharing
Zeinab Ghafari, Taha Arian and Morteza Analoui, University of Science and Technology, Iran

0

Performance Measurements of Feature Tracking and Histogram Based Traffic Congestion Algorithms
Ozgur Altun and Kenan Aksoy, Proline Bilisim Sistemleri, Turkey

0

Research on Decision Making Regarding High-Business-Strategy Café Menu Selection
Cheng-I Hou1, Han-Chen Huang2, Yao-Hsu Tsai2 and Chih-Yao Lo1, 1Yu Da University of Science and Technology, Taiwan and 2Chung Hua University, Taiwan

01

Prefix-Based Labeling Annotation for Effective Xml Fragmentation
Kok-Leong Koong, Su-Cheng Haw, Lay-Ki Soon and Samini Subramaniam, Multimedia University, Malaysia

0

PROP - Patronage of PHP Web Applications
Sireesha C, Jyostna G, Raghu Varan P and P R L Eswari, Centre for Development of Advanced Computing, India

0

Quantum Clustering-Based Feature Subset Selection for Mammographic Image Classification
N.Hamdi, K.Auhmani and M.M.Hassani, Cadi Ayyad University, Morocco

0

Taxonomy of Optimization Approaches of Resource Brokers in Data Grids
Rafah M.Almuttairi, University of Babylon, Iraq

0

A Survivability Model for Saudi ICT Startups
Sara Almakenzi, Arif Bramantoro and Waleed Rashideh, Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

01

Emotion Interaction with Virtual Reality Using Hybrid Emotion Classification Technique toward Brain Signals
Faris A.Abuhashish1, Jamal Zraqou2, Wesam Alkhodour2, Mohd S.Sunar1 and Hoshang Kolivand1, 1Universiti Teknologi Malaysia, Malaysia and 2Isra University, Jordan

0

Prediction for Short-Term Traffic Flow Based on Optimized Wavelet Neural Network Model
Tao Li and Liu Sheng, Shanghai University of Engineering Science, China

01

Volume 7, Number 3, June 2015

  Citation Count

Arabic Language Challenges in Text Based Conversational Agents Compared to The English Language
Mohammad Hijjawi and Yousef Elsheikh, Applied Science University, Jordan

03

Fuzzy Image Segmentation Using Validity Indexes Correlation
Daniel Fernando Tello Gamarra, Universidade Federal de Santa Maria (UFSM), Brazil

01

Instructor Perspectives of Mobile Learning Platform: An Empirical Study
Muasaad Alrasheedi, Luiz Fernando Capretz and Arif Raza, Western University, Canada

05

A Study on Weed Discrimination Through Wavelet Transform, Texture Feature Extraction and Classification
D.Ashok Kumar1 and P.Prema2, 1Government Arts College, India and 2Agricultural College and Research Institute, India

-

Corrosion Control Approach Using Data Mining
StephenDapiap, Gregory Wajiga, Michael Egwurube, Musa Kadzai, Nathaniel Oye and ThankGodAnazodo, Federal University of Technology Yola, Nigeria

-

A Clustering Technique for Email Content Mining
Deepa Patil and Yashwant Dongre, Vishwakarma Institute of Information Technology, India

01

Comparison of Wavelet Network and Logistic Regression in Predicting Enterprise Financial Distress
Ming-Chang Lee1 and Li-Er Su2, 1National Kaohsiung University of Applied Sciences, Taiwan and 2Shih Chien University, Taiwan

0

Increasing the Transistor Count by Constructing A Two-Layer Crystal Square on A Single Chip
Haissam El-Aawar, Lebanese International University - LIU, Lebanon

01

Comparison of Different Transmitters Using 1550nm and 10000nm in FSO Communication Systems
Poonam Singal, Saloni Rai, Rahul Punia and Dhrove Kashyap, Deenbandhu Chhotu Ram University of Science & Technology, India

-

Multi-Parameter Based Performance Evaluation of Classification Algorithms
Saurabh Kr.Srivastava and Sandeep Kr.Singh, JIIT University, India

01

Volume 7, Number 4, August 2015

  Citation Count

Applying an Arabic Conversational Agent in the Jordanian E-Government
Mohammad Hijjawi and Hesham Abusaimeh, Applied Science University, Jordan

-

Collaborative Bibliographic System for Review/Survey Articles
Mutaz Beraka, Abdullah Al-Dhelaan and Mznah Al-Rodhaan, King Saud University, Saudi Arabia

0

Unique Fundamentals of Software Measurement and Software Metrics in Software Engineering
K.P.Srinivasan, C.B.M.College, India

01

Sensitivity Analysis of Information Retrieval Metrics
Marina Marjanovic-Jakovljevic, Singidunum University, Serbia

0

Consideration of Human Computer Interaction in Robotic Field
Tarek Toumi and Abdelmadjid Zidani, University of Batna, Algeria

0

Review of Lane Detection and Tracking Algorithms in Advanced Driver Assistance System
Ammu M Kumar and Philomina Simon, University of Kerala, India

05

On the Image Quality and Encoding Times of LSB, MSB and Combined LSB-MSB Steganography Algorithms Using Digital Images
Solomon O.Akinola and Adebanke A.Olatidoye, University of Ibadan, Nigeria

0

Symmetrical Weighted Subspace Holistic Approach for Expression Recognition
G.P.Hegde1, M.Seetha2 and Nagaratna Hegde3, 1Shree Dharmasthala Manjunatheshwara Institute of Technology, India and 2G.Narayanamma Institute of Technology and Science, India and 3Vasavi College of Engineering, India

0

Applying the Technology Acceptance Model to Understand Social Networking Sites (SNS) Usage: Impact of Perceived Social Capital
Waleed Al-Ghaith, Shaqra University, Saudi Arabia

04

Map-Reduce Implementations: Survey and Performance Comparison
Zeba Khanam and Shafali Agarwal, JSS Academy of Technical Education, India

03

A Hybrid Copy-Move Forgery Detection Technique Using Regional Similarity Indices
Rani Susan Oommen1 and Jayamohan M2, 1Sree Buddha College of Engineering for Women, India and 2College of Applied Science, India

03

An Effective and Efficient Feature Selection Method for Lung Cancer Detection
R.Kishore, K.L.N College of Engineering, India

01

Volume 7, Number 5, October 2015

  Citation Count

Hadoop Mapreduce Performance Enhancement Using In-Node Combiners
Woo-Hyun Lee, Hee-Gook Jun and Hyoung-Joo Kim, Seoul National University, South Korea

0

Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One
Mohammad Ehab Ragab1 and Kin Hong Wong2, 1The Electronics Research Institute, Egypt and 2Computer Science and Engineering Department, Shatin, Hong Kong

0

Integrated Project Management Measures in CMMI
Mahmoud Khraiwesh, Zarqa University, Jordan

-

Formal Verification of Distributed Checkpointing Using Event-B
Girish Chandra1, Raghuraj Suryavanshi2 and Divakar Yadav1, 1Institute of Engineering & Technology, India and 2Pranveer Singh Institute of Technology, India

0

Validation Study of Dimensionality Reduction Impact on Breast Cancer Classification
Nezha Hamdi1, Khalid Auhmani2 and Moha M'rabet Hassani1, 1Cadi Ayyad University, Morocco and 2National School of Applied Sciences, Morocco

0

Formal Specification and Verification of Total Order Broadcast through Destination Agreement Using Event-B
Arun Kumar Singh and Divakar Yadav, Institution of Engineering and Technology, India

0

Automatic Extraction of Spatio-Temporal Information from Arabic Text Documents
Abdelkoui Feriel1 and Kholladi Mohamed Khireddine2, 1MENTOURI 2 University, Algeria and 2El oued University, Algeria

0

Encryption-Decryption RGB Color Image Using Matrix Multiplication
Mohamad M.AL-Laham, Zarqa University, Jordan

01

A New Approach to Parts of Speech Tagging in Malayalam
D.Muhammad Noorul Mubarak, Sareesh Madhu and S A Shanavas, University of Kerala, India

0

Predictive and Statistical Analyses for Academic Advisory Support
Mohammed AL-Sarem, Taibah University, Kingdom of Saudi Arabia

0

An Overview on the Use of Data Mining and Linguistics Techniques for Building Microblog-Based Early Detection Systems in the Healthcare Sector
Haider M. Habeeb1 and Nabeel Al-A'araji2, 1University of Babylon, Iraq and 2Ministry of Higher Education and Scientific Research, Iraq

0

Clustering of Deep WebPages: A Comparative Study
Muhunthaadithya C, Rohit J.V, Sadhana Kesavan1 and E.Sivasankar, National Institute of Technology Trichy, India

-

Volume 7, Number 6, December 2015

  Citation Count

A Preprocessing Model for Hand-Written Arabic Texts Based on Voronoi Diagrams
Atallah M.Al-Shatnawi, Al al-Bayt University, Jordan

0

An Entropic Optimization Technique in Heterogeneous Grid Computing Using Bionic Algorithms
Saad M.Darwish, Adel A.El-zoghabi and Moustafa F.Ashry, Institute of Graduate Studies and Research, Egypt

0

New Symmetric Encryption System Based on Evolutionary Algorithm
A.Mouloudi, Ibn Tofail University, Morocco

-

UML Modeling and System Architecture for Agent Based Information Retrieval
D.Muhammad Noorul Mubarak and Philomina Simon, University of Kerala, India

0

The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB
Mohamed Y.Adam1, Mozamel M.Saeed2 and Al Samani A.Ahmed3, 1King Saud University, KSA, 2Prince Sattam Bin Abdul-Aziz University, KSA and 3Al Neelain University College of Computer Science & Information Technology, Sudan

0

Two-Layer Secure Prevention Mechanism for Reducing E-Commerce Security Risks
Sen-Tarng Lai, Shih Chien University, Taiwan

0

Congestion Aware Spray and Wait Protocol: A Congestion Control Mechanism for the Vehicular Delay Tolerant Network
Chuka Oham and Milena Radenkovic, University of Nottingham, United Kingdom

02

Automated Management of Pothole Related Disasters Using Image Processing and Geotagging
Manisha Mandal, Madhura Katageri, Mansi Gandhi, Navin Koregaonkar and Sharmila Sengupta, Vivekanand Education Society's Institute of Technology, India

01

A Routing Mechanism Based on Social Networks and Betweenness Centrality in Delay-Tolerant Networks
Zhang Huijuan and Liu Kai, Tongji University, China

01

Comparative Analysis of Single-Core and Multi-Core Systems
Ogundairo Johnson1 and Omosehinmi Dinyo2, 1National Open University of Nigeria (NOUN), Nigeria and 2Federal University of Technology, Nigeria

0

Reducing Security Concerns when Using Cloud Computing in Online Exams Case Study: General Associate Degree Examination (Shamel) in Jordan
Mohamad M. Al-Laham, Al-Balqa Applied University, Jordan

0

A Software Tool for Experimental Study Leap Motion
Georgi Krastev and Magdalena Andreeva, Ruse University, Bulgaria

-

Service Oriented Quality Requirement Framework for Cloud Computing
Madhushi Rathnaayke and Janaka I Wijayanayake, University of Kelaniya, Sri Lanka

0

A Database System Security Framework
Habiba Muhammad Sani1 and Muhammad Mika'ilu Yabo2, 1Usmanu Danfodiyo University, Nigeria and 2Shehu Shagari College of Education, Nigeria

0