Computer Science & Information Technology
S.No | Volume | Issue | Paper Title | Authors |
---|
International Journal of Computer Science & Information Technology (IJCSIT)
1 | 12 | 1 | Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Via Controlled Nano Switching | Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan | Full Text |
2 | 12 | 1 | Web Services as A Solution for Cloud Enterprise Resource Planning Interoperability | Djamal Ziani and Nada Alfaadhel, King Saud University, Saudi Arabia | Full Text |
3 | 12 | 1 | Study of an Application Development Environment Based on Unity Game Engine | Sagor Ahamed, Anomita Das, Shahnawaz Md Tanjib and Ms. Qamrun Nahar Eity, Ahsanullah University of Science and Technology, Bangladesh | Full Text |
4 | 12 | 2 | Lidar Point Cloud Classification Using Expectation Maximization Algorithm | Nguyen Thi Huu Phuong, Hanoi University of Mining and Geology, Vietnam | Full Text |
5 | 12 | 2 | Enactment Ranking of Supervised Algorithms Dependence of Data Splitting Algorithms: A Case Study of Real Datasets | Hina Tabassum and Muhammad Mutahir Iqbal, Bahauddin Zakariya University, Pakistan | Full Text |
6 | 12 | 2 | Application of Facebook's Prophet Algorithm for Successful Sales Forecasting Based on Real-world Data | Emir Žunić1,2, Kemal Korjenić1, Kerim Hodžić2,1 and Dženana Đonko2, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina and 2University of Sarajevo, Bosnia and Herzegovina | Full Text |
7 | 12 | 3 | A New Hybrid Diversity Combining Scheme for Mobile Radio Communication Systems over Nakagami Fading Chanel | Akinyinka Olukunle Akande, Onyebuchi Chikezie Nosiri, Nnaemeka Chiemezie Onuekwusi and Emmanuel Uchenna Ekwueme, Federal University of Technology Owerri, Nigeria | Full Text |
8 | 12 | 3 | Using Social Media as A Tool for Promoting Festival Tourism | Krittanai Ngernyuang and Pei-Ying Wu, Chung Hua University, Taiwan | Full Text |
9 | 12 | 3 | Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19 | Stella Chiemeke1 and Omokhagbo Mike Imafidor2,1University of Benin, Nigeria and 2Africa PPP Advisory Nigeria Limited, Nigeria | Full Text |
10 | 12 | 4 | Importance of Process Mining for Big Data Requirements Engineering | Sandhya Rani Kourla, Eesha Putti, and Mina Maleki, University of Detroit Mercy, USA | Full Text |
11 | 12 | 4 | XML Encryption and Signature for Securing Web ServicesFull | Iehab ALRassan, King Saud University, Saudi Arabia | Full Text |
12 | 12 | 4 | Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Implemented on Different Hadoop Platforms | Purvi Parmar, MaryEtta Morris, John R. Talburt and Huzaifa F. Syed, University of Arkansas, USA | Full Text |
13 | 12 | 4 | Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar | Nabila A. Khodeir, Electronic Research Institute, Egypt | Full Text |
14 | 12 | 4 | The Smart Parking Management System | Amira. A. Elsonbaty1 and Mahmoud Shams2, 1Higher institute of engineering and technology, Egypt, 2Kafrelsheikh University, Egypt | Full Text |
15 | 12 | 4 | Performance Evaluation of LTE Network using Maximum Flow Algorithm | Bir Bahadur Khatri1, Bulbul Ahammad1, Md. Mezbahul Islam2, Rahmina Rubaiat2 and Md. Imdadul Islam1, 1Jahangirnagar University, Bangladesh, 2MBSTU, Bangladesh | Full Text |
16 | 12 | 4 | A Novel Study of Lichen Planopilaris Among Different Iranian Ethnicities based on Computer-aided Programs | Maryamsadat Nejadghaderi1, Ashkan Tashk2, Parvin Mansouri1 and Zahra Safaei Naraghi1, 1Tehran University of Medica1 Sciences (TUMS), Iran, 2University of Southern Denmark (SDU), Denmark | Full Text |
17 | 12 | 4 | Railway Safety Protection with Android Mobile Application for 5G New Radio Network | Tony Tsang and Man Cheng Chong, Hong Kong College of Technology, Hong Kong | Full Text |
18 | 12 | 5 | Machine Learning in Early Genetic Detection of Multiple Sclerosis Disease: A Survey | Nehal M. Ali1, Mohamed Shaheen2, Mai S. Mabrouk3 and Mohamed A. AboRezka1, 1Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt, 2Arab Academy for Science Technology and Maritime Transport, Alexandria, Egypt, 3Misr University for Science and Technology, Cairo, Egypt | Full Text |
19 | 12 | 5 | Comparison of Rendering Processes on 3D Model | Filip Popovski1, Nikola Spasov1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1SS KlimentOhridski, Macedonia, 2International Slavic University Gavrilo RomanovicDerzavin, Macedonia | Full Text |
20 | 12 | 5 | IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy | Marlon Intal Tayag, Francisco Napalit and Arcely Napalit, School of Computing Holy Angel University, Philippines | Full Text |
21 | 12 | 6 | Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts | Janis Zuters and Viktorija Leonova, University of Latvia, Latvia | Full Text |
22 | 12 | 6 | A New Approach for Ranking Shadowed Fuzzy Numbers and its Application | Mohamed A. H. El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt | Full Text |
23 | 12 | 6 | Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship | Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk, Zhytomyr Polytechnic State University, Ukraine | Full Text |
24 | 12 | 6 | Determining Business Intelligence Usage Success | Javier N. Montero and Mary L. Lind, Defense Information Systems Agency, USA, Louisiana State University Shreveport, USA | Full Text |
International Journal of Computer Science and Engineering Survey (IJCSES)
25 | 11 | 2 | Brain Computer Interfaces Employing Machine Learning Methods : A Systematic Review | Sejal Vyas, Stevens Institute of Technology, USA | Full Text |
26 | 11 | 3 | Artificial Neural Networks for Medical Diagnosis: A Review of Recent Trends | Egba. Anwaitu Fraser1, Okonkwo Obikwelu R2, 1Federal College of Education (Technical), Nigeria, 2Nnamdi Azikiwe University, Nigeria | Full Text |
Computer Science & Engineering: An International Journal (CSEIJ)
27 | 10 | 5 | Crime Detection using Data Mining Techniques | Md. Sumon Rony, Sagor Chandra Bakchy and Hadisur Rahman, Varendra University, Bangladesh | Full Text |
28 | 10 | 4 | A Feasible Voice based Inhouse Navigation System for the Visually Impaired | Soham Roy, Kalinga Institute of Industrial Technology, India | Full Text |
Advanced Computing: An International Journal (ACIJ)
29 | 11 | 4 | Exploring the Link Between Leadership and Devops Practice and Principle Adoption | Krikor Maroukian1 and Stephen R. Gulliver2, 1Microsoft, Greece, 2University of Reading, Henley Business School, UK | Full Text |
International Journal of Computer Science, Engineering and Applications (IJCSEA)
30 | 10 | 6 | Change Back Feature for Consumer Accounts | Cheman Shaik, VISH Consulting Services Inc, USA | Full Text |
31 | 10 | 4 | Evaluation of (GPS/GLONASS) Patch Versus RF GPS (L1) Patchantenna Performance Parameter | Gholam Aghashirin1, Hoda S. Abdel-Aty-Zohdy1, Mohamed A. Zohdy1, Darrell Schmidt1 and Adam Timmons2,1Oakland University, USA, 2McMaster University, Canada | Full Text |
32 | 10 | 4 | Design and Implementation of an Intelligent Gas Cylinder Valve Regulating System using Solenoid | Ebenezer Narh Odonkor1, Willie K. Ofosu3, Patrick Appiah3 and Daniel Kubawe4, 1Takoradi Technical University, Ghana,2Penn State Wilkes, USA, 3Methodist Technical Institute, Ghana, 4Alang Junior High School, Ghana | Full Text |
33 | 10 | 3 | Using GSM SMS Controller Alarm Configurator to Develop Cost Effective Intelligent Fire Safety System in A Developing Country | Ebenezer Narh Odonkor1, Willie K. Ofosu2 and Kingsley Nunoo1, 1Takoradi Technical University, Ghana, 2Penn State Wilkes-Barre, USA | Full Text |
34 | 10 | 1 | Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks | Cheman Shaik, VISH Consulting Services Inc, USA | Full Text |
International Journal on Computational Science & Applications (IJCSA)
35 | 10 | 5 | Covid-19 Chest X-ray Images: Lung Segmentation and Diagnosis using Neural Networks | Alan Zhang, Chinese International School, China | Full Text |
36 | 10 | 4 | Opti2I and ε-precis Methods Selection Algorithm | Nombre Claude Issa1, Brou Konan Marcellin2, Kimou Kouadio Prosper3, 1Polytechnic Doctoral School, 2National Polytechnic Institute Houphouet Boigny – Yamoussoukro, 3Research Laboratory of Computer Science and Technology | Full Text |
International Journal on Information Theory (IJIT)
37 | 9 | 4 | A Realist Model of Communication Applications for Informational Technology and Artificial Cognitive Systems | Monica R. Kimmel, Collibri NGO, Gothenburg, Sweden | Full Text |
38 | 9 | 2 | Skew Constacyclic Codes Over the Ring | Sarra Manseri, Central China Normal University, China | Full Text |
Advanced Computational Intelligence: An International Journal (ACII)
39 | 7 | 4 | FTMCP: Fuzzy based Test Metrics for Cosmetology Paradigm | Shahzad Ashraf1, Sehrish Saleem2 and Syed Afnan3, 1Hohai University Changzhou Jiangsu, China, 2Muhammad Nawaz Sharif University of Engineering & Technology, Pakistan, 3Hilal Foods Private Limited, Pakistan | Full Text |
International Journal on Natural Language Computing (IJNLC)
International Journal of Managing Information Technology (IJMIT)
56 | 12 | 4 | Mediating and Moderating Factors Affecting Readiness to IoT Applications: The Banking Sector Context | RashaAbd El-Aziz, Sarah El-Gamal and Miran Ismail, Arab Academy for Science, Egypt | Full Text |
57 | 12 | 3 | Developing Enterprise Cyber Situational Awareness | Christopher L. Gorham, Capitol Technology University, USA | Full Text |
58 | 12 | 3 | Assess the Effect of Service Quality on Customer Satisfaction in Facebook Social Commerce in Egypt | Rehab ELBadrawy, Sara ElKheshin and Nermine ELEssawy, Arab Academy for Science, Technology and Maritime Transport, Egypt | Full Text |
59 | 12 | 3 | Analyzing the Opportunities of Digital Marketing in Bangladesh to Provide an Efficient Interrelation between Business Organization and Consumer | Farjana Akter, Zayed- Us- Salehin, Abul Kalam Azad and Sultana Jahan Soheli, Noakhali Science and Technology University, Bangladesh | Full Text |
60 | 12 | 2 | An Analysis of Consumer Interest Level Data for Online Health Information in the Early Stages of the Covid-19 Pandemic | David C. Wyld, Southeastern Louisiana University, USA | Full Text |
61 | 12 | 2 | Fashion-driven Textiles as A Crystal of A New Stream for Stakeholder Capitalism – Amazon’s Endeavor | Chihiro Watanabe1, 2, Waleed Akhtar1, Yuji Tou3, Pekka Neittaanmäki1, 1University of Jyväskylä, Finland, 2International Institute for Applied Systems Analysis (IIASA), Austria, 3Tokyo Institute of Technology, Japan | Full Text |
62 | 12 | 2 | The Demand Side of Open Government Data: A Case Study of Kingdom of Bahrain | Abdulkarim Katbi1, Jaflah AlAmmari2, Ali AlSoufi3, 1King Hamad University Hospital, Kingdom of Bahrain, 2University of Bahrain, Kingdom of Bahrain and 3British University of Bahrain, Kingdom of Bahrain | Full Text |
63 | 12 | 2 | The Fourth 4th Industrial Revolution’s Effect on the Enterprise Cyber Strategy | Christopher L. Gorham, Capitol Technology University, USA | Full Text |
64 | 12 | 1 | Assessing the Adoption of E-government Using Tam Model: Case of Egypt | Sara ELKheshin1 and Noha Saleeb2 1Arab Academy for Science, Egypt and 2Middlesex University, UK | Full Text |
International Journal of Managing Value and Supply Chains (IJMVSC)
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
71 | 11 | 3 | Accounting Information Systems and Knowledge Management | Mohammed Khaled Aljarallah, King Saud University, Saudi Arabia | Full Text |
72 | 11 | 1 | An Analysis of Consumer Preferences for Mobile Voice Calling in Different Contextual Usages: A Case of Thailand | Monarat Jirakasem, Waseda University, Japan | Full Text |
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS)
73 | 9 | 4 | Socio-Organo Complexity, Project Schedule Performance and Underdamped Transient Motion | Dimitris N. Antoniadis, DANTON PROGM, UK & London Metropolitan College, UK | Full Text |
74 | 9 | 4 | State Observer Designs for Quarter-car Passive Suspension | Tasya Y. Christnantasari, Institut Teknologi Sepuluh Nopember, Indonesia | Full Text |
Health Informatics - An International Journal (HIIJ)
75 | 9 | 4 | Organizational Factors in Determining Data Quality Produced from Health Management Information Systems in Low- And Middle-income Countries: A Systematic Review | Thein Hlaing1 and Thant Zin2, 1District Public Health Department (Ministry of Health and Sports), Myanmar,2STI Myanmar University, Myanmar | Full Text |
76 | 9 | 4 | The Correlation between HPV Vaccination Rate and Income Inequality | Zhifei Xie, Garrison Forest School, USA | Full Text |
77 | 9 | 4 | Influenza Awareness in the Workplace | Tyler D. Asher and Ian R. McAndrew, Capitol Technology University, USA | Full Text |
78 | 9 | 3 | The Role of State-Wide Stay-at-Home Policies on Confirmed Covid-19 Cases in the United States: A Deterministic Sir Model | David Chen1, Seungmin Lee2and Jason Sang3, 1University of Western Ontario, Canada, 2University of Toronto, Canada, 3University of Waterloo, Canada | Full Text |
79 | 9 | 1 | Mhealth Applications Developed by the Ministry of Health for Public Users in KSA: A Persuasive Systems Design Evaluation | Asmaa Shati, IMSIU University, KSA and KKU University, KSA | Full Text |
80 | 9 | 1 | EEG Signal Classification using LDA and MLP Classifier | Romain Atangana1,2,3, Daniel Tchiotsop1, GodpromesseKenne1, Laurent Chane1 Djoufack Nkengfack1,2, 1Unité de Recherche d’Automatique et d’InformatiqueAppliquée (UR-AIA), University of Dschang, Cameroon, 2Unité de Recherche de Matière Condensée-d’Électronique et de Traitement du Signal (UR-MACETS), University of Dschang, Cameroon and 3University of Ngaoundere, Cameroon | Full Text |
International Journal on Cybernetics & Informatics (IJCI)
81 | 9 | 3 | An Analytical Analysis of Path Loss Models for Mobile Cellular Wireless Communications | Md. Shariful Islam1*, Md. AshekRaihan Mahmud1, Md. Jashim Uddin1 and PallabKanti Podder2, 1Islamic University, Bangladesh, 2Pabna University of Science and Technology, Bangladesh | Full Text |
International Journal on Integrating Technology in Education (IJITE)
International Journal of Computer Networks & Communications (IJCNC)
88 | 12 | 6 | Mobility Speed Effect and Neural Network Optimization for Deep MIMO Beamforming in mmWave Networks | Mustafa S. Aljumaily and Husheng Li, University of Tennessee, USA | Full Text |
89 | 12 | 6 | Wireless Networks Performance Monitoring Based on Passive-active Quality of Service Measurements | Yazeed A. Al-Sbou, Applied Science University, Bahrain | Full Text |
90 | 12 | 6 | Towards Fog-Assisted Virtual Reality MMOG with Ultra-Low Latency | YOSHIHARA Tsuyoshi and FUJITA Satoshi, Hiroshima University, Japan | Full Text |
91 | 12 | 6 | Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks | Yasir Mohammed1, Maha Abdelhaq2 and Raed Alsaqour3, 1Iraqi Ministry of Electricity, Iraq, 2Princess Nourah bint Abdulrahman University, Saudi Arabia, 3Saudi Electronic University, Saudi Arabia | Full Text |
92 | 12 | 6 | Peer to Peer Approach based Replica and Locality Awareness to Manage and Disseminate Data in Vehicular Ad Hoc Networks | Abdelkader Guezzi1, Abderrahmane Lakas2, Ahmed Korichi1, Sarra Cherbal3, 1Kasdi Merbah University, Algeria, 2UAE University, UAE, 3University of Ferhat Abbas Setif, Algeria | Full Text |
93 | 12 | 6 | Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks | Amir J. Majid, Ajman University, UAE | Full Text |
94 | 12 | 6 | Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures | Mousa Al-Akhras1,2,Mohammed Alawairdhi1, Ali Alkoudari1 and Samer Atawneh1, 1Saudi Electronic University, Saudi Arabia, 2The University of Jordan, Jordan | Full Text |
95 | 12 | 6 | Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms | Tran Hoang Hai1, Le Huy Hoang11 and Eui-nam Huh2, 1Hanoi University of Science and Technology, Vietnam, 2Kyung Hee University, Korea | Full Text |
96 | 12 | 5 | An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks | Khaled Day1, Faiza Al-Salti2, Abderezak Touzene1 and Nasser Alzeidi1, 1Sultan Qaboos University, Oman, 2Muscat College, Oman | Full Text |
97 | 12 | 5 | Jamming Detection based on Doppler Shift Estimation in Vehicular Communications Systems | Javad Afshar Jahanshahi, Universidad Catolica Los Angeles de Chimbote, Peru | Full Text |
98 | 12 | 5 | A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity | Saad Al-Ahmadi and Yasser Alharbi, King Saud University, Saudi Arabia | Full Text |
99 | 12 | 5 | A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node | Dang Thanh Chuong1, Nguyen Hong Quoc1, Doan Van Thang2 and Pham Trung Duc1,1Hue University, Vietnam, 2Industrial University of HCM City, Vietnam | Full Text |
100 | 12 | 5 | Mean Object Size Considering Average Waiting Latency in M/BP/1 System | Y. –J. Lee, Korea National University of Education, South Korea | Full Text |
101 | 12 | 5 | A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based on OLSR Protocol | Youssef Lmoumen1, Yassine Ruichek1 and Raja Touahni2,1University Bourgogne FrancheComté, France, 2University IbnTofail, Morocco | Full Text |
102 | 12 | 5 | Client Performance Predictions for Private Blockchain Networks | YLászló Viktor Jánoky, János Levendovszky and Péter Ekler, Budapest University of Technology and Economics, Hungary | Full Text |
103 | 12 | 4 | Determination of Minimum Number of UAVs for Local Area Networks of Drones | Sandaruvan Rajasinghege and Rohan de Silva, CQ University, Australia | Full Text |
104 | 12 | 4 | Performance Analysis of Routing Protocols with Roadside Unit Infrastructure in a Vehicular Ad Hoc Network | Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi, Sidi Mohamed Ben Abdelah University, Morocco | Full Text |
105 | 12 | 4 | Multi-criteria Handover Decision for Heterogeneous Networks: Carrier Aggregation Deployment Scenario | Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and Fazirulhisyam Hashim, Universiti Putra Malaysia, Malaysia | Full Text |
106 | 12 | 4 | Hybrid Model in the Block Cipher Applications for High-speed Communications Networks | Minh Nguyen Hieu1, Bac Do Thi2, Canh Hoang Ngoc3, Manh Cong Tran4, Phan Duong Phuc5 and Khoa Nguyen Tuan6, 1Institute of Cryptographic Science and Technology, Vietnam, 2Thai Nguyen University of Information and Communication Technology, Vietnam, 3Thuongmai University, Vietnam, 4Le Quy Don Technical University, Vietnam, 5Academy of Cryptography Techniques, Vietnam, 6Research Laboratories of Saigon High-Tech Park, Vietnam | Full Text |
107 | 12 | 4 | Robotic Inner Signal Propagation and Random Access over Hybrid Access Scheme | Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru Shimamoto, Waseda University, Japan | Full Text |
108 | 12 | 4 | An Experimental Study of IoT Networks Under Internal Routing Attack | Mohammad Alreshoodi, Qassim University, Saudi Arabia | Full Text |
109 | 12 | 4 | Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web Applications | Mohammad Shojaeshafiei, Letha Etzkorn and Michael Anderson, The University of Alabama in Huntsville, USA | Full Text |
110 | 12 | 3 | Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs | Radha Raman Chandan and P.K.Mishra, Banaras Hindu University, India | Full Text |
111 | 12 | 3 | 6RLR-ABC: 6LOWPAN Routing Protocol with Local Repair using Bio Inspired Artificial Bee Colony | Nurul Halimatul Asmak Ismail1, Samer A. B. Awwad2 and Rosilah Hassan3, 1Princess Nourah Bint Abdulrahman University, Kingdom of Saudi Arabia, 2Independent Researcher, Kingdom of Saudi Arabia, 3Universiti Kebangsaan Malaysia, Malaysia | Full Text |
112 | 12 | 3 | Swarm Optimization based Gravitational Search Approach for Channel Assignment in MCMR Wireless Mesh Network | Nandini Balusu1, Suresh Pabboju2 and Narsimha G3, 1Telangana University, India, 2Chaitanya Bharathi Institute of Technology, India and 3JNTUH College of Engineering, India | Full Text |
113 | 12 | 3 | Energy-efficient Multi-hop Routing with Unequal Clustering Approach for Wireless Sensor Networks | Younes El Assari, Samia Al Fallah, Jihane El Aasri, Mounir Arioua and Ahmed El Oualkadi, Abdelmalek Essaadi University, Morocco | Full Text |
114 | 12 | 3 | Flooding Attack Detection and Mitigation in SDN with Modified Adaptive Threshold Algorithm | Nan Haymarn Oo1, Aris Cahyadi Risdianto2, Teck Chaw Ling3 and Aung Htein Maw4, 1University of Computer Studies, Yangon, Myanmar, 2Gwangju Institute of Science and Technology, Korea, 3University of Malaya, Malaysia 4University of Information Technology, Myanmar | Full Text |
115 | 12 | 3 | Signaling Protocols for Local Area Networks of Drones | Prabhu Jyot Singh and Rohan de Silva, School of Engineering and Technology CQ University Sydney, Australia | Full Text |
116 | 12 | 3 | Localization Schemes for Underwater Wireless Sensor Networks: Survey | Faiza Al-Salti1, N. Alzeidi2 and Khaled Day2, 1Muscat College, Oman and 2Sultan Qaboos University, Oman | Full Text |
117 | 12 | 2 | Performance Evaluation of Modbus TCP in Normal Operation and Under A Distributed Denial of Service Attack | Eric Gamess1, Brody Smith1 and Guillermo Francia III2, 1Jacksonville State University, USA and 2University of West Florida, USA | Full Text |
118 | 12 | 2 | An Adaptive Diffserv Approach to Support QoS in Network Mobility NEMO Environment | Loay F. Hussein1,2, Aisha-Hassan AbdallaHashim2, Mohamed Hadi Habaebi2 and Wan Haslina Hassan3, 1Jouf University, Saudi Arabia, 2International Islamic University Malaysia, Malaysia and 3Universiti Teknologi Malaysia, Malaysia | Full Text |
119 | 12 | 2 | Mobile Crowd Sensing RPL-based Routing Protocol for Smart City | Yahya Al Sawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi, Sultan Qaboos University, Oman | Full Text |
120 | 12 | 2 | Virtual Cache & Virtual Wan Accelerator Function Placement for Cost-effective Content Delivery Services | Shin-ichi Kuribayashi, Seikei University, Japan | Full Text |
121 | 12 | 2 | Auto Resource Management to Enhance Reliability and Energy Consumption in Heterogeneous Cloud Computing | Moataz H. Khalil1,2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1,2 ,Mahmoud Gabr3 and Adel S. Elmaghraby1,2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt | Full Text |
122 | 12 | 2 | CLBNSRM - Confidence Level Based Unblend Neighbor Selection &Blend Node Report Based Optimized Route Formation in MANET | S. J. Patil1, L.S. Admuthe2 and M. R. Patil3, 1VTU, India, 2DKTE’S Textile & Engineering Institute, India and 3J.A.G.M. Institute of Technology, Indiat | Full Text |
123 | 12 | 2 | Energy Performance of a Combined Horizontal and Vertical Compression Approach in Cluster-based WSNS | Jihane El Aasri, Samia Al Fallah, Mounir Arioua and Ahmed El Oualkadi, Tangier Abdelmalek Essaadi University, Morocco | Full Text |
124 | 12 | 1 | Least Square Channel Estimation for Image Transmission with OFDM Over Fading Channel | Usha S.M1 and Mahesh H.B2, 1JSS Academy of Technical Education, India and 2PES University, India | Full Text |
125 | 12 | 1 | A Modified Interference Approximation Scheme for Improving Preamble Based Channel Estimation Performance in FBMC System | Radwa A. Roshdy1, Mohamed A. Aboul-Dahab2 and Mohamed M. Fouad3, 1Higher Technological Institute, Egypt, 2Arab Academy for Science Technology and Martine transport, Egypt and 3Zagazig University, Egypt | Full Text |
126 | 12 | 1 | Evaluation Methodology of MIMO Networks Performance over Rayleigh Fading | Eleftherios Stergiou, Constantinos Angelis and Spiridoula V. Margariti, University of Ioannina, Greece | Full Text |
127 | 12 | 1 | LTE Scheduler Algorithms for VANET Traffic in Smart City | Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar, Tunisia | Full Text |
128 | 12 | 1 | Lorawan Scalability Analysis – Co Spreading Factor Interference | Aiju Thomas and N V Eldhose, M G University, India | Full Text |
129 | 12 | 1 | Load Balancing Algorithm for Efficient VM Allocation in Heterogeneous Cloud | Badshaha P Mulla1, C. Rama Krishna1 and Raj Kumar Tickoo1, 1NITTTR, India and 1National Informatics Centre, Punjab State Unit, India | Full Text |
130 | 12 | 1 | An Efficient and Secure Malicious Node Detection Model for Wireless Sensor Networks | Asmaa M.Morsi1, Tamer M. Barakat2 and Ahmed Ali Nashaat2, 1Al-Madina Higher Institute for Engineering and Technology, Egypt and 2Fayoum University, Egypt | Full Text |
International Journal of Wireless & Mobile Networks (IJWMN)
131 | 12 | 6 | Performance Analysis of Spatially Correlated Cylindrical Antenna Array for 3D Massive MIMO | Patrick Danuor1 and Emmanuel Ampoma Affum2, 1Ho Technical University, Ghana, 2Kwame Nkrumah University of Science and Technology, Ghana | Full Text |
132 | 12 | 4 | Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing Protocols for Wireless Sensor Networks | Faïza Tabbana, Military Academy, Tunisia | Full Text |
133 | 12 | 4 | Energy Efficient Animal Sound Recognition Scheme in Wireless Acoustic Sensors Networks | Saad Al-Ahmadi and Badour AlMulhem, King Saud University, Saudi Arabia | Full Text |
134 | 12 | 4 | A Node Deployment Model with Variable Transmission Distance for Wireless Sensor Networks | Fan Tiegang and Chen Junmin, Hebei University, China | Full Text |
135 | 12 | 3 | Enhancing Routing Protocol for Wireless Sensor Network to Advance Network Lifetime | Mohammad Abdus Salam1, Kosta Varnavas2 and Bhargava Maddireddy1, 1Southern University, USA and 2NASA Marshall Space Flight Center, USA | Full Text |
136 | 12 | 3 | Performance Evaluation and Enhancement of VLAN via Wireless Networks using OPNET Modeler | Tareq Al-Khraishi and Muhannad Quwaider, Jordan University of Science and Technology, Jordan | Full Text |
137 | 12 | 3 | Explainable AI for Autonomous Network Functions in Wireless and Mobile Networks | Premnath K Narayanan1 and David K Harrison2, 1LM Ericsson Ltd., SA OSS PDU OSS S&T Research & PCT, Ireland and 2Glasgow Caledonian University, United Kingdom | Full Text |
138 | 12 | 3 | Atmospheric Propagation Impairment Effects for Wireless Communications | Sharmin Tajria Ananya1, Md. Shariful Islam1*, Md.Ashek Raihan Mahmud1, Pallab Kanti Podder2 and Md Jashim Uddin1, 1Islamic University, Bangladesh and 2Pabna University of Science and Technology, Bangladesh | Full Text |
139 | 12 | 3 | An Intelligent Channel Estimation Method for Future Mobile Generation | Khaled H. Almotairi, Umm Al-Qura University, Saudi Arabia | Full Text |
140 | 12 | 3 | Occupant Activity Detection in Smart Buildings: A Review | Yudith Cardinale1,2, Eduardo Blanco1, 1Universidad Simón Bolívar, Venezuela and 2Universidad Católica San Pablo, Peru | Full Text |
141 | 12 | 2 | Security Enhancements over AODV Using Multi-hop Acknowledgment | Aditya Saravanan, Arjun Pant and A. Jeyasekar, SRM Institute of Science and Technology, India | Full Text |
142 | 12 | 1 | Privacy Preserving Participatory Sensor Network on Named Data Networking Infrastructure | M. Kaosar and X. Yi, RMIT University, Australia | Full Text |
143 | 12 | 1 | An Enhanced Hybrid Routing and Clustering Technique for Wireless Sensor Network | Hasan Al-Refai, Philadelphia University, Jordan | Full Text |
144 | 12 | 1 | IoT-based Activity Recognition with Machine Learning from Smartwatch | Nassim Mozaffaric, Javad Rezazadeha,c, Reza Farahbakhshb, John Ayoadea, aKent Institute Australia, Australia, bInstitut Mines-Te´le´com, Te´le´com SudParis and cIslamic Azad University, Iran | Full Text |
International Journal of Next-Generation Networks (IJNGN)
145 | 12 | 3 | Mobile Primary User in Cognitive Radio State of the Arts and Recent Advances | Amine hamdouchi1, Badr Benmammar2, Aouatef EI Biari1 and Abdellatif Medouri1, 1National School of Applied Sciences, Morocco, 2University of Tlemcen, Algeria | Full Text |
International Journal of Distributed and Parallel systems (IJDPS)
146 | 11 | 5 | Distributed E-learning System using an Hybrid P2P-based Content Addressable Network Architecture | Telesphore Tiendrebeogo1 and Kabre Laciné2, 1Nazi Boni University, Burkina Faso, 2Zerbo University, Burkina Faso | Full Text |
147 | 11 | 5 | Consensus based Data Aggregation for Energy Conservation in Wireless Sensor Network | Tamal Banerjee, Priyansh Sharma, Shrijana Pradhan, Sikkim Manipal Institute of Technology, India | Full Text |
International Journal of Grid Computing & Applications (IJGCA)
148 | 11 | 4 | Face Expression Recognition using Convolution Neural Network (CNN) Models | Nahla Nour1, Mohammed Elhebir2 and Serestina Viriri3, 1Sudan University of Science and Technology, Sudan, 2University of Gezira, Sudan, 3University of KwaZulu-Natal, South Africa | Full Text |
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
149 | 10 | 3 | Development of Som Neural Network based Energy Efficient Clustering Hierarchical Protocol for Wireless Sensor Network | Md. Tofael Ahmed1, Bipasa Sharmin Setu1, Maqsudur Rahman2 and A. Z. M. Touhidul Islam3, 1Comilla University, Bangladesh, 2Port City International University, Bangladesh, 3University of Rajshahi, Bangladesh | Full Text |
International Journal on AdHoc Networking Systems (IJANS)
150 | 10 | 3 | Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things. | Asma Lahbib1, Khalifa Toumi2, Anis Laouiti1 and Steven Martin3, 1SAMOVAR, Université Paris-Saclay, France,2IRT SystemX, France, 2LRI, Université Paris-Sud, France | Full Text |
151 | 10 | 3 | Two Level Data Fusion Model for Data Minimization and Event Detection in Periodic Wireless Sensor Network. | Neetu Verma and Dinesh Singh, DCRUST, India | Full Text |
The International Journal of Ambient Systems and Applications (IJASA)
152 | 8 | 2 | Study of Attenuation and Bending Losses in Signal Transmission over Step Index Multimode Pmma Fibers | A. Z. M. Touhidul Islam and Md. Firoz Ahmed, University of Rajshahi, Bangladesh | Full Text |
153 | 8 | 2 | Video Transmission in V-blast Encoded MIMO MC-CDMA Wireless System: Performance Study | Md. Juwel Sheikh, Md. Firoz Ahmed and A. Z. M. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
154 | 8 | 2 | On Detection and Tracking of the Vehicles from the Real Time Video Stream using Background Subtraction Process with Blob Tracker Algorithm | Maqsudur Rahman1, Md. Tofael Ahmed2 and A. Z. M. Touhidul Islam3, 1Port City International University, Bangladesh,2Comilla University, Bangladesh, 3University of Rajshahi, Bangladesh | Full Text |
International Journal of Software Engineering & Applications (IJSEA)
155 | 11 | 6 | Stated Preference Data & Alogit | Mina Hassanvand, University of Calgary, Canada | Full Text |
156 | 11 | 6 | Learning-based Orchestrator for Intelligent Software-defined Networking Controllers | Imene Elloumi Zitouna, University of Tunis El Manar, Tunisia | Full Text |
157 | 11 | 6 | A Data Extraction Algorithm from Open Source Software Project Repositories for Building Duration Estimation Models: Case Study of Github | Donatien K. Moulla1,2, Alain Abran3 and Kolyang4, 1Faculty of Mines and Petroleum Industries, University of Maroua, Cameroon, 2LaRI Lab, University of Maroua, Cameroon, 3École de Technologie Supérieure, Canada, 4The Higher Teachers’ Training College, University of Maroua, Cameroon | Full Text |
158 | 11 | 5 | Secure Descartes: A Security Extension to Descartes Specification Language | Venkata N Inukollu1 and Joseph E Urban2, 1Purdue University, USA, 2Arizona State University, USA | Full Text |
159 | 11 | 5 | Iterative and Incremental Development Analysis Study of Vocational Career Information Systems | Isyaku Maigari Ibrahim, Ogwueleka Francisca Nonyelum and Isah Rambo Saidu, Nigerian Defense Academy, Nigeria | Full Text |
160 | 11 | 5 | MASRML - A Domain-specific Modeling Language for Multi-agent Systems Requirements | Gilleanes Thorwald Araujo Guedes1, Iderli Pereira de Souza Filho1, Lukas Filipe Gaedicke1, Giovane D’Ávila Mendonça1, Rosa Maria Vicari2 and Carlos Brusius2, 1Pampa Federal University, Brazil, 2Federal University of Rio Grande do Su1, Brazil | Full Text |
161 | 11 | 4 | An Ad-hoc Social Network Generation Approach | Maurice Tchoupé Tchendji1,2, Martin Xavier Tchembé2 and Armelle Linda Maténé Kakeu2, 1LIRIMA - FUCHSIA team, 2University of Dschang, Cameroon | Full Text |
162 | 11 | 4 | How do Agile Software Startups deal with uncertainties by Covid-19 pandemic? | Rafael da Camara1,2, Marcelo Marinho1, Suzana Sampaio1 and Saulo Cadete2,1Federal Rural University of Pernambuco, Brazil, 2Di2win, Brazil | Full Text |
163 | 11 | 3 | Programmer Productivity Enhancement Through Controlled Natural Language Input | Howard Dittmer and Xiaoping Jia, DePaul University, USA | Full Text |
164 | 11 | 3 | Towards Auditability Requirements Specification using an Agent-based Approac | Denis J. S. de Albuquerque1, Vanessa Tavares Nunes1, Claudia Cappelli2 and Célia Ghedini Ralha1, 1University of Brasilia, Brazil and 2Federal University of Rio de Janeiro, Brazil | Full Text |
165 | 11 | 3 | How (UN) Happiness Impacts on Software Engineers in Agile Teams? | Luís Felipe Amorim, Marcelo Marinho and Suzana Sampaio, Federal Rural University of Pernambuco (UFRPE), Brazil | Full Text |
166 | 11 | 3 | The Proposed Implementation of RFID based Attendance System | Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia | Full Text |
167 | 11 | 3 | Ensemble Regression Models for Software Development Effort Estimation: A Comparative Study | Halcyon D. P. Carvalho, Marília N. C. A. Lima, Wylliams B. Santos and Roberta A. de A.Fagunde, University of Pernambuco, Brazil | Full Text |
168 | 11 | 3 | Factors that Affect the Requirements Adherence to Business in Agile Projects: An Industrial Cross-case Analysis | Helena Bastos1, Alexandre Vasconcelos1, Wylliams Santos2 and Juliana Dantas3, 1Universidade Federal de Pernambuco,Brazil, 2Universidade de Pernambuco, Brazil and 3Instituto Federal de Educação Ciência e Tecnologia da Paraíba, Brazil | Full Text |
169 | 11 | 3 | IT Project Showstopper Framework: The View of Practitioners | Godfred Yaw Koi-Akrofi, University of Professional Studies, Accra | Full Text |
170 | 11 | 2 | Essential Activities for Secure Software Development | Mamdouh Alenezi and Sadiq Almuairfi, Prince Sultan University, Saudi Arabia | Full Text |
171 | 11 | 1 | Proposing Automated Regression Suite Using Open Source Tools for A Health Care Solution | Anjali Rawat and Shahid Ali, AGI Institute, New Zealand | Full Text |
172 | 11 | 1 | Quality Assessment Model of the Adaptive Guidance | Hamid Khemissa1 and Mourad Oussalah2, 1USTHB: University of Science and Technology Houari Boumediene, Algeria and 2Nantes University, France | Full Text |
173 | 11 | 1 | An Application of Physics Experiments of High School by using Augmented Reality | Hussain Mohammed Abu-Dalbouh, Samah Mohammed AlSulaim, Shaden Abdulaziz AlDera, Shahd Ebrahim Alqaan, Leen Muteb Alharbi and Maha Abdullah AlKeraida, Qassim University, Kingdom of Saudi Arabia | Full Text |
174 | 11 | 1 | On the Relationship between Software Complexity and Security | Mamdouh Alenezi and Mohammad Zarour, Prince Sultan University, Saudi Arabia | Full Text |
175 | 11 | 1 | Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets | John Gichuki Ndia1, Geoffrey Muchiri Muketha1 and Kelvin Kabeti Omieno2, 1Murang’a University of Technology, Kenya and 2Kaimosi Friends University College, Kenya | Full Text |
International Journal of Network Security & Its Applications (IJNSA)
176 | 12 | 6 | Hybrid Chaotic Method for Medical Images Ciphering | Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt | Full Text |
177 | 12 | 6 | The Brazilian Law on Personal Data Protection | Jonatas S. de Souza1,2, Jair M. Abe1, Luiz A. de Lima1,2 and Nilson A. de Souza2,3, 1Paulista University, São Paulo, Brazil,2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation, PREVCOM, Brazil | Full Text |
178 | 12 | 5 | Secured AODV to Protect WSN Against Malicious Intrusion | Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia | Full Text |
179 | 12 | 4 | Enhanced Authentication for Web-Based Security using Keystroke Dynamics | Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka, Malaysia | Full Text |
180 | 12 | 4 | A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems | Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt | Full Text |
181 | 12 | 4 | Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags | Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA,2Federal Polytechnic Nekede, Nigeria | Full Text |
182 | 12 | 3 | Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis | Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada | Full Text |
183 | 12 | 3 | Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity | Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1,1Dyrecta Lab, IT Research Laboratory, Italy, 1Spacertron srl, Italy | Full Text |
184 | 12 | 3 | An Empirical Analysis of Email Forensics Tools | Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA | Full Text |
185 | 12 | 3 | PDMLP: Phishing Detection using Multilayer Perceptron | Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia | Full Text |
186 | 12 | 2 | Security Consideration in Peer-to-peer Networks with A Case Study Application | Nick Rahimi, Southern Illinois University, USA | Full Text |
187 | 12 | 2 | Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain | Ozgur Oksuz, Adiyaman University, Turkey | Full Text |
188 | 12 | 2 | A Survey on Malware Detection and Analysis Tools | Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA | Full Text |
189 | 12 | 2 | An Enhanced User Authentication Framework in Cloud Computing | SHasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan | Full Text |
190 | 12 | 1 | A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity | Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA | Full Text |
191 | 12 | 1 | Self-organization and Autonomous Network Survey | Houneida SAKLY, Campus University of Mannouba, Tunisia | Full Text |
International Journal of Security, Privacy and Trust Management (IJSPTM)
192 | 9 | 4 | Political Risks and Blockchain: Definitions and Possible Case Examples | Remy Zgraggen, University Oldenburg, Switzerland | Full Text |
193 | 9 | 3 | Emulating Trusted Platform Module 2.0 on Raspberry Pi 2 | Jen-Liang Cheng, Kuang-Chi Chen, Hong-Wei Zhang, Wei-Yu Chen and Dai-Ye Wu, Tzu-Chi University, Taiwan | Full Text |
194 | 9 | 2 | Voice Biometric Identity Authentication Model for IoT Devices | Salahaldeen Duraibi1, Frederick T. Sheldon2 and Wasim Alhamdani3, 1University of Idaho Moscow, USA & Jazan University, KSA, 2University of Idaho, USA and 3University of the Cumberlands, USA | Full Text |
International Journal of Database Management Systems (IJDMS)
195 | 12 | 1 | Operational Intelligence Performance Inferencing Across Business Processes | Rajeev Kaula, Missouri State University, USA | Full Text |
196 | 12 | 2 | A Novel Remote Access Control for the Real-time Streaming Data of IP Cameras | Kuen-Liang Sue and Ting-Yuan Wu, National Central University Taoyuan, Taiwan | Full Text |
197 | 12 | 2 | Storing Data in A Document-oriented Database and Implemented from A Structured Nesting Logical Model | Y. Hiyane, A. Benmakhlouf and A. Marzouk, University Hassan 1st, Morocco | Full Text |
198 | 12 | 2 | Acceptance of E-procurement in Organisations: Using Structural Equation Modeling (SEM) | Muhammed S. Maddi1, Paul Davis2 and John Geraghty3, 4Dublin City University, Ireland & College of economic and Management Bani Walid City University, Libya and 2Dublin City University Business School, Ireland 3Dublin City University Mechanical and Manufacturing Engineering School, Ireland | Full Text |
199 | 12 | 3 | Design, Implementation, and Assessment of Innovative Data Warehousing; Extract, Transformation, and Load(ETL);and Online Analytical Processing(OLAP) on BI | Ramesh Venkatakrishnan, Colorado Technical University, USA | Full Text |
200 | 12 | 3 | HISTSFC: Optimization for ND Massive Spatial Points Querying | Haicheng Liu1, Peter van Oosterom1, Martijn Meijers1, Xuefeng Guan2, Edward Verbree1, Mike Horhammer3,1Delft University of Technology, the Netherlands, 2Wuhan University, China and 3Oracle Inc, USA | Full Text |
201 | 12 | 3 | A Context-aware Strategy for Mobile Services in M-commerce | Kuen-Liang Sue, National Central University Taoyuan, Taiwan | Full Text |
202 | 12 | 3 | Sarcasm Detection Beyond using Lexical Features | ADEWUYI Joseph Oluwaseyi and OLADEJI Ifeoluwa David, University of Ibadan, Nigeria | Full Text |
203 | 12 | 5 | Big Data Storage System Based on a Distributed Hash Tables System | Telesphore Tiendrebeogo and Mamadou Diarra, Nazi Boni University, Burkina Faso | Full Text |
International Journal of Data Mining & Knowledge Management Process (IJDKP)
204 | 10 | 1 | A Web Repository System for Data Mining in Drug Discovery | Jiali Tang, Jack Wang and Ahmad Reza Hadaegh, California State University San Marcos, USA | Full Text |
205 | 10 | 2 | Application of Spatiotemporal Association Rules on Solar Data to Support Space Weather Forecasting | Carlos Roberto Silveira Junior1, José Roberto Cecatto2, Marilde Terezinha Prado Santos1 and Marcela Xavier Ribeiro1,1Federal University of São Carlos, Brazil and 2National Institute of Space Research, Brazil | Full Text |
206 | 10 | 3 | Data Science Curriculum: Current Scenario | Duaa Bukhari, Taibah University, Saudi Arabia | Full Text |
207 | 12 | 4 | Efficacy of Non-negative Matrix Factorization for Feature Selection in Cancer Data | Parth Patel1, Kalpdrum Passi1 and Chakresh Kumar Jain2, 1Laurentian University, Canada, 2Jaypee Institute of Information Technology, India | Full Text |
The International Journal of Multimedia & Its Applications (IJMA)
208 | 12 | 4 | Improving PSNR and Processing Speed for HEVC Using Hybrid PSO for Intra Frame Prediction | Swati Vinod Sakhare and Upena D. Dalal, The Sardar Vallabhbhai National Institute of Technology, India | Full Text |
209 | 12 | 4 | Performance Analysis of Different Acoustic Features based on LSTM for Bangla Speech Recognition | Nahyan Al Mahmud, Ahsanullah University of Science and Technology, Bangladesh | Full Text |
210 | 12 | 5 | Qualitative Analysis of PLP in LSTM for Bangla Speech Recognition | Nahyan Al Mahmud1 and Shahfida Amjad Munni2, 1Ahsanullah University of Science and Technology, Bangladesh,2Cygnus Innovation Limited, Bangladesh | Full Text |
211 | 12 | 6 | Development of a Mobile Learning Application of Malay Vocabulary for Lower Secondary School Level | Nor Zuhaidah Mohamed Zain, Maizatul Hayati Mohamad Yatim, Ummu Husna Azizan and Hasrina Baharum, Universiti Pendidikan Sultan Idris, Malaysia | Full Text |
International Journal of Computer Graphics & Animation (IJCGA)
212 | 10 | 1 | Human Photogrammetry: Foundational Techniques for Creative Practitioners | Trendt Boe and Chris Carter, Queensland University of Technology, Australia | Full Text |
213 | 10 | 3 | Media Students’ Capability to Interact with Augmented Reality and 3D Animations in Virtual Broadcast News Studios | Tariq Alrimawi and Wasan Haddad, University of Petra, Jordan | Full Text |
International Journal of Game Theory and Technology (IJGTT)
214 | 6 | 1 | With a transaction fee market and without a block size limit in Bitcoin network; there exists a Nash equilibrium points of the mining game | Moustapha BA, Université Paris Nanterre (Paris X), France | Full Text |
International Journal of Web & Semantic Technology (IJWesT)
215 | 11 | 3 | Identification of Technology-relevant Entities Based on Trend Curves and Semantic Similarities | Sukhwan Jung, Rachana Reddy Kandadi, Rituparna Datta, Ryan Benton, and Aviv Segev, University of South Alabama, USA | Full Text |
International Journal on Web Service Computing (IJWSC)
216 | 11 | 1 | Toward a Formalization of BPEL 2.0 : An Algebra Approach | L. Boumlik1, M. Mejri1 and H. Boucheneb2, 1Laval University, Canada and 2Polytechnique Montreal University, Canada | Full Text |
217 | 11 | 2 | A Comparative Study between Graph-QL& Restful Services in API Management of Stateless Architectures | Sayan Guha and Shreyasi Majumder, Cognizant Technology Solutions, India | Full Text |
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
218 | 10 | 2 | SLA-driven Load Scheduling in Multi-tier Cloud Computing: Financial Impact Considerations | Husam Suleiman and Otman Basir, University of Waterloo, Canada | Full Text |
219 | 10 | 3 | MCCVA: A New Approach Using SVM and Kmeans for Load Balancing on Cloud | Hieu Le Ngoc1,3, Trang Nguyen Thi Huyen2, Xuan Phi Nguyen3 and Cong Hung Tran3, 1Ho Chi Minh City Open University, Vietnam,2Sai Gon University, Vietnam, 3Post and Telecommunication Institute of Technology, Ho Chi Minh City Open University, Vietnam | Full Text |
220 | 10 | 3 | Load Balancing Algorithm on Cloud Computing for Optimize Respone Time | Nguyen Xuan Phi, Le Ngoc Hieu and Tran Cong Hung, Posts and Telecoms Institute of Technology, Vietnam | Full Text |
221 | 10 | 5 | Success-Driving Business Model Characteristics of IaaS Providers – Towards a Quantitative Evaluation | Sebastian Floerecke, Florian Felix Röck and Franz Lehner, University of Passau, Germany | Full Text |
International Journal of Artificial Intelligence & Applications (IJAIA)
222 | 11 | 5 | A New Generalization of Edge Overlap to Weighted Networks | Ali Choumane, Lebanese University, Lebanon | Full Text |
223 | 11 | 1 | Construction of Amharic-arabic Parallel Text Corpus for Neural Machine Translation | Ibrahim Gashaw and H L Shashirekha, Mangalore University, India | Full Text |
224 | 11 | 1 | Novel Machine Learning Algorithms for Centrality and Cliques Detection in Youtube Social Networks | Craigory Coppola and Heba Elgazzar, Morehead State University, USA | Full Text |
225 | 11 | 1 | Novel Hybrid ANT Colony Algorithm for the Multi-depot Periodic Open Capacitated Arc Routing Problem | Bilal Kanso, Lebanese University, Lebanon | Full Text |
226 | 11 | 1 | Hybrid ANT Colony Algorithm for the Multi-depot Periodic Open Capacitated Arc Routing Problem | Bilal Kanso, Lebanese University, Lebanon | Full Text |
227 | 11 | 1 | Using Semi-supervised Classifier to Forecast Extreme CPU Utilization | Nitin Khosla1 and Dharmendra Sharma2, 1ICTCAPM, Australia and 2University of Canberra, Australia | Full Text |
228 | 11 | 1 | A Hybrid Algorithm Based on Invasive Weed Optimization Algorithm and Grey Wolf Optimization Algorithm | Wisam Abdulelah Qasim and Ban Ahmed Mitras, College of Computer Science & Mathematics, Mosul, Iraq | Full Text |
229 | 11 | 1 | An Ontological Analysis and Natural Language Processing of Figures of Speech | Christiana Panayiotou, Technological University of Cyprus, Cyprus | Full Text |
230 | 11 | 1 | Capsule Network Performance with Autonomous Navigation | Thomas Molnar and Eugenio Culurciello, Purdue University, USA | Full Text |
231 | 11 | 2 | A Modified Maximum Relevance Minimum Redundancy Feature Selection Method Based on Tabu Search For Parkinson’s Disease Mining | Waheeda Almayyan, PAAET, Kuwait | Full Text |
232 | 11 | 2 | Data Mining Applied in Food Trade Network | Alessandro Massaro, Giovanni Dipierro, Annamaria Saponaro and Angelo Galiano, Dyrecta Lab,IT Research Laboratory, Italy | Full Text |
233 | 11 | 2 | Automated Discovery of Logical Fallacies in Legal Argumentation | Callistus Ireneous Nakpih1 and Simone Santini2, 1St. John Bosco’s College of Education, Ghana and 2Universidad Autonoma De Madrid, Spain | Full Text |
234 | 11 | 2 | A BI-objective Model for SVM With an Interactive Procedure to Identify the Best Compromise Solution | Mohammed Zakaria Moustafa1, Mohammed Rizk Mohammed1, Hatem Awad Khater2 and Hager Ali Yahia1,1ALEXANDRIA University, Egypt, and 2Horus University, Egypt | Full Text |
235 | 11 | 3 | Application of Target Detection Algorithm based on Deep Learning in Farmland Pest Recognition | Shi Wenxiu and Li Nianqiang, University of Jinan, China | Full Text |
236 | 11 | 3 | Graphical Model and Clustering-Regression based Methods for Causal Interactions: Breast Cancer Case Study | Suhilah Alkhalifah and Adel Aloraini, Qassim University, Saudi Arabia | Full Text |
237 | 11 | 4 | CPU Hardware Classification and Performance Prediction using Neural Networks and Statistical Learning | Courtney Foots1, Palash Pal2, Rituparna Datta1 and Aviv Segev1, 1University of South Alabama, USA,2Burdwan University, India | Full Text |
238 | 11 | 4 | A Deep Learning Approach for Denoising Air-Coupled Ultrasonic Responds Data | Mikel David Jedrusiak and Frank Weichert, Technical University of Dortmund, Germany | Full Text |
239 | 11 | 4 | Detection of Dense, Overlapping, Geometric Objects | Adele Peskin, Boris Wilthan and Michael Majurski, NIST, USA | Full Text |
240 | 11 | 4 | Categorizing 2019-n-CoV Twitter Hashtag Data by Clustering | Koffka Khan1 and Emilie Ramsahai2, 1The University of the West Indies, Trinidad, 2UWI School of Business & Applied Studies Ltd (UWI-ROYTEC), Trinidad and Tobago | Full Text |
241 | 11 | 4 | Log Message Anomaly Detection with Oversampling | Amir Farzad and T. Aaron Gulliver, University of Victoria, Canada | Full Text |
242 | 11 | 4 | Insight about Detection, Prediction and Weather Impact of Coronavirus (Covid-19) using Neural Network | A K M Bahalul Haque, Tahmid Hasan Pranto, Abdulla All Noman and Atik Mahmood, North South University, Bangladesh | Full Text |
243 | 11 | 4 | Scaling the HTM Spatial Pooler | Damir Dobric1, Andreas Pech2, Bogdan Ghita1 and Thomas Wennekers1, 1University of Plymouth, UK,2Frankfurt University of Applied Sciences, Germany | Full Text |
244 | 11 | 4 | Analysis of Roadway Fatal Accidents using Ensemble-based Meta-Classifiers | Waheeda Almayyan, Collage of Business Studies, PAAET, Kuwait | Full Text |
245 | 11 | 6 | Problem Decomposition and Information Minimization for the Global, Concurrent, On-line Validation of Neutron Noise Signals and Neutron Detector Operation | Tatiana Tambouratzis, University of Piraeus, Greece | Full Text |
246 | 11 | 6 | PIntelligent Portfolio Management via NLP Analysis of Financial 10-k Statements | Purva Singh, VIT University, India | Full Text |
247 | 11 | 6 | Object Sorting using Faster R-CNN | Pengchang Chen and Vinayak Elangovan, Division of Science and Engineering, Penn State Abington, USA | Full Text |
248 | 11 | 6 | Using Contextual Graphs as a Decision-making Tool in the Process of Hiring Candidates | Hassane Tahir1 and Patrick Brézillon2, 1Links Consultants, Paris, France, 2LIP6 - Sorbonne University - CNRS, Paris, France | Full Text |
249 | 11 | 6 | Automatic Transfer Rate Adjustment for Transfer Reinforcement Learning | Hitoshi Kono1, Yuto Sakamoto1, Yonghoon Ji2 and Hiromitsu Fujii3, 1Tokyo Polytechnic University, Japan,2Japan Advanced Institute of Science and Technology, Japan, 3Chiba Institute of Technology, Japan | Full Text |
250 | 11 | 6 | Answer Set Programming to Model Plan Agent Scenarios | Fernando Zacarias Flores, Rosalba Cuapa Canto and José María Ángeles López, Autonomous University of Puebla, México | Full Text |
International Journal of Fuzzy Logic Systems (IJFLS)
251 | 10 | 1 | Interval Type-2 Intuitionistic Fuzzy Logic System for Time Series and Identification Problems - A Comparative Study | Imo Eyoh1, Jeremiah Eyoh2 and Roy Kalawsky2, 1University of Uyo, Nigeria and 2Loughborough University, UK | Full Text |
252 | 10 | 1 | A Simulation Based Study of A Greenhouse System with Intelligent Fuzzy Logic | Niaz Mostakim1, Shuaib Mahmud2 and *Khalid Hossain Jewel3, 1Atish Dipankar University of Science and Technology, Bangladesh, 2Jatiya Kabi Kazi Nazrul Islam University, Bangladesh and 3Islamic University, Bangladesh | Full Text |
253 | 10 | 2 | Application of Fuzzy Rule based System for Highway Research Board Classification of Soils | Sujatha A1, L Govindaraju2 and N Shivakumar1, 1RV College of Engineering, India and 2University Visveswaraya College of Engineering, India | Full Text |
254 | 10 | 2 | Breast Cancer Diagnosis Based on Genetic-fuzzy Logic and ANFIS Using WBCD | Amany Mostafa Lotayef, Khaled H. Ibrahim and Rania Ahmed Abul Seoud, Fayoum University, Egypt | Full Text |
255 | 10 | 4 | Annual Precipitation in Southern of Madagascar: Modeling using High Order Fuzzy Time Series | Harimino Andriamalala Rajaonarisoa, Irrish Parker Ramahazosoa, Hery Zojaona Tantely Stefana Zafimarina Reziky, Adolphe Andriamanga Ratiarison, University of Antananarivo, Madagascar | Full Text |
International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)
256 | 9 | 3 | A Utilization of Convolutional Matrix Methods on Sliced Hippocampal Neuron Region Images for Cell Segmentation | Neeraj Rattehalli and Ishan Jain, USA | Full Text |
257 | 9 | 4 | SVM &Ga-clustering Based Feature Selection Approach for Breast Cancer Detection | Rashmi Priya1 and Syed Wajahat Abbas Rizvi2, 1GD Goenka University, India,2Amity University, India | Full Text |
Machine Learning and Applications: An International Journal (MLAIJ)
258 | 7 | 2 | Quantum Criticism: an Analysis of Political News Reporting | Ashwini Badgujar, Sheng Chen, Pezanne Khambatta, Tuethu Tran, Andrew Wang, Kai Yu, Paul Intrevado and David Guy Brizan, University of San Francisco, USA | Full Text |
259 | 7 | 4 | A Newly Proposed Technique for Summarizing the Abstractive Newspapers’ Articles based on Deep Learning | Sherif Kamel Hussein1,2, and Joza Nejer AL-Otaibi2, 1October University for Modern Sciences and Arts, Egypt, 2Arab East Colleges for Graduate Studies, KSA | Full Text |
260 | 7 | 4 | A Deep Learning Model to Predict Congressional Roll Call Votes from Legislative Texts | Jonathan Wayne Korn and Mark A. Newman, Harrisburg University, USA | Full Text |
Signal & Image Processing : An International Journal (SIPIJ)
261 | 11 | 6 | Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Techniques | Chiman Kwan and Jude Larkin, Applied Research, LLC, USA | Full Text |
262 | 11 | 6 | Off-Line Arabic Handwritten Words Segmentation using Morphological Operators | Nisreen AbdAllah1 and Serestina Viriri2, 1Sudan University of Science and Technology, Sudan and 2University of KwaZulu-Natal, South Africa | Full Text |
263 | 11 | 6 | Neighbour Local Variability for Multi-Focus Images Fusion | Ias Sri Wahyuni1 and Rachid Sabre2 | Full Text |
264 | 11 | 6 | Facial Age Estimation using Transfer Learning and Bayesian Optimization based on Gender Information | Marwa Ahmed1 and Serestina Viriri2, 1Sudan University of Science and Technology, Sudan, 2University of KwaZulu-Nata, South Africa | Full Text |
265 | 11 | 6 | A Novel Graph Representation for Skeleton-based Action Recognition | Tingwei Li, Ruiwen Zhang and Qing Li, Tsinghua University, China | Full Text |
266 | 11 | 5 | Eye Gaze Estimation Invisible and IR Spectrum for Driver Monitoring System | Susmitha Mohan and Manoj Phirke, HCL Technologies, India | Full Text |
267 | 11 | 5 | Batch Normalized Convolution Neural Network for Liver Segmentation | Fatima Abdalbagi1, Serestina Viriri2 and Mohammed Tajalsir Mohammed1, 1Sudan University of Science and Technology, Sudan, 2University of KwaZulu-Natal, South Africa | Full Text |
268 | 11 | 5 | Comparison of Denoising Algorithms for Demosacing Low Lighting Images Using CFA 2.0 | Chiman Kwan and Jude Larkin, Applied Research, LLC, USA | Full Text |
269 | 11 | 5 | Face Verification Across Age Progression using Enhanced Convolution Neural Network | Areeg Mohammed Osman1 and Serestina Viriri2, 1Sudan University of Science and Technology, Sudan, 2University of Kwa Zulu-Natal, South Africa | Full Text |
270 | 11 | 5 | Bata-Unet: Deep Learning Model for Liver Segmentation | Fatima Abdalbagi1, Serestina Viriri2 and Mohammed Tajalsir Mohammed1, 1Sudan University of Science and Technology, Sudan, 2University of KwaZulu-Natal, South Africa | Full Text |
271 | 11 | 4 | Melanoma Cell Detection in Lymph Nodes Histopathological Images using Deep Learning | Salah Alheejawi, Richard Berendt, Naresh Jha and Mrinal Mandal, University of Alberta, Canada | Full Text |
272 | 11 | 4 | Gender Discrimination based on the Thermal Signature of the Face and the External Ear | Georgia Koukiou and Vassilis Anastassopoulos, University of Patras, Greece | Full Text |
273 | 11 | 4 | Demosaicing of Real Low Lighting Images using CFA 3.0 | Chiman Kwan, Jude Larkin and Bence Budavari, Applied Research, LLC, USA | Full Text |
274 | 11 | 3 | Demosaicing Mastcam Images using A New Color Filter Array | Chiman Kwan and Jude Larkin, Applied Research, USA | Full Text |
275 | 11 | 3 | Estimation of Separation and Location of Wave Emitting Sources : A Comparison Study between Parametric and Non-parametric Methods | Mujahid F. AL-Azzo and Azzah T.Qaba, Ninevah University, Iraq | Full Text |
276 | 11 | 2 | Strange Behaviors and Root Cause in the Compression of Previously Compressed Videos | Chiman Kwan and Jude Larkin, Applied Research, LLC, USA | Full Text |
277 | 11 | 2 | Secure OMP Based Pattern Recognition that Supports Image Compression | Takayuki Nakachi1 and Hitoshi Kiya2 ,1 Nippon Telegraph and Telephone Corporation, Japan and 2 Tokyo Metropolitan University, Japan | Full Text |
278 | 11 | 1 | Applying R-spatiogram in Object Tracking for Occlusion Handling | Niloufar Salehi Dastjerdi and M. Omair Ahmad, Concordia University, Canada | Full Text |
279 | 11 | 1 | Wavelet Decomposition and Alpha Stable Fusion | Rachid Sabre1 and Ias Wahyuni2 , 1 University of Burgundy/Agrosup Dijon, France and 2 Universitas Gunadarma, Indonesia | Full Text |
280 | 11 | 1 | Enhanced System for Computer-aided Detection of MRI Brain Tumors | Umar Alqasmi, Ammar Alzuhair and Abduallah Bama'bad, King Abul-Aziz University, KSA | Full Text |
281 | 11 | 1 | Suitable Mother Wavelet Selection for EEG Signals Analysis: Frequency Bands Decomposition and Discriminative Feature Selection | Romain Atangana1,2,3 , Daniel Tchiotsop1 , GodpromesseKenne1 , Laurent Chanel Djoufack Nkengfack1,2 , 1 Unité de Recherche d’Automatique et d’InformatiqueAppliquée (UR-AIA), University of Dschang, Cameroon, 2 Unité de Recherche de Matière Condensée-d’Électronique et de Traitement du Signal (UR-MACETS), University of Dschang, Cameroon and 3 University of Ngaoundere, Cameroon | Full Text |
282 | 11 | 1 | Advanced Single Image Resolution Upsurging Using A Generative Adversarial Network | Md. Moshiur Rahman1 , Samrat Kumar Dey2 and Kabid Hassan Shibly2 , 1 Bangladesh Open University, Bangladesh and 2 Dhaka International University, Bangladesh | Full Text |
International Journal Of VLSI Design & Communication Systems (VLSICS)
283 | 11 | 6 | Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs of Regular Three-dimensional Networks, Part II: Formalistic Architecture Realization | Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan | Full Text |
284 | 11 | 6 | Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs of Regular Three-dimensional Networks, Part III: Layout Congestion-free Effectuation | Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan | Full Text |
285 | 11 | 5 | Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs of Regular Three-dimensional Networks, Part I: Basics | Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan | Full Text |
International Journal on Soft Computing (IJSC)
286 | 11 | 4 | An Inventory Management System for Deteriorating Items with Ramp Type and Quadratic Demand: A Structural Comparative Study | Biswaranjan Mandal, Acharya Jagadish Chandra Bose College, India | Full Text |