Computer Science & Information Technology

S.No Volume Issue Paper Title Authors

International Journal of Computer Science & Information Technology (IJCSIT)

1 12 1 Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Via Controlled Nano Switching Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan Full Text
2 12 1 Web Services as A Solution for Cloud Enterprise Resource Planning Interoperability Djamal Ziani and Nada Alfaadhel, King Saud University, Saudi Arabia Full Text
3 12 1 Study of an Application Development Environment Based on Unity Game Engine Sagor Ahamed, Anomita Das, Shahnawaz Md Tanjib and Ms. Qamrun Nahar Eity, Ahsanullah University of Science and Technology, Bangladesh Full Text
4 12 2 Lidar Point Cloud Classification Using Expectation Maximization Algorithm Nguyen Thi Huu Phuong, Hanoi University of Mining and Geology, Vietnam Full Text
5 12 2 Enactment Ranking of Supervised Algorithms Dependence of Data Splitting Algorithms: A Case Study of Real Datasets Hina Tabassum and Muhammad Mutahir Iqbal, Bahauddin Zakariya University, Pakistan Full Text
6 12 2 Application of Facebook's Prophet Algorithm for Successful Sales Forecasting Based on Real-world Data Emir Žunić1,2, Kemal Korjenić1, Kerim Hodžić2,1 and Dženana Đonko2, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina and 2University of Sarajevo, Bosnia and Herzegovina Full Text
7 12 3 A New Hybrid Diversity Combining Scheme for Mobile Radio Communication Systems over Nakagami Fading Chanel Akinyinka Olukunle Akande, Onyebuchi Chikezie Nosiri, Nnaemeka Chiemezie Onuekwusi and Emmanuel Uchenna Ekwueme, Federal University of Technology Owerri, Nigeria Full Text
8 12 3 Using Social Media as A Tool for Promoting Festival Tourism Krittanai Ngernyuang and Pei-Ying Wu, Chung Hua University, Taiwan Full Text
9 12 3 Web-based Learning In Periods of Crisis: Reflections on the Impact of Covid-19 Stella Chiemeke1 and Omokhagbo Mike Imafidor2,1University of Benin, Nigeria and 2Africa PPP Advisory Nigeria Limited, Nigeria Full Text
10 12 4 Importance of Process Mining for Big Data Requirements Engineering Sandhya Rani Kourla, Eesha Putti, and Mina Maleki, University of Detroit Mercy, USA Full Text
11 12 4 XML Encryption and Signature for Securing Web ServicesFull Iehab ALRassan, King Saud University, Saudi Arabia Full Text
12 12 4 Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Implemented on Different Hadoop Platforms Purvi Parmar, MaryEtta Morris, John R. Talburt and Huzaifa F. Syed, University of Arkansas, USA Full Text
13 12 4 Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar Nabila A. Khodeir, Electronic Research Institute, Egypt Full Text
14 12 4 The Smart Parking Management System Amira. A. Elsonbaty1 and Mahmoud Shams2, 1Higher institute of engineering and technology, Egypt, 2Kafrelsheikh University, Egypt Full Text
15 12 4 Performance Evaluation of LTE Network using Maximum Flow Algorithm Bir Bahadur Khatri1, Bulbul Ahammad1, Md. Mezbahul Islam2, Rahmina Rubaiat2 and Md. Imdadul Islam1, 1Jahangirnagar University, Bangladesh, 2MBSTU, Bangladesh Full Text
16 12 4 A Novel Study of Lichen Planopilaris Among Different Iranian Ethnicities based on Computer-aided Programs Maryamsadat Nejadghaderi1, Ashkan Tashk2, Parvin Mansouri1 and Zahra Safaei Naraghi1, 1Tehran University of Medica1 Sciences (TUMS), Iran, 2University of Southern Denmark (SDU), Denmark Full Text
17 12 4 Railway Safety Protection with Android Mobile Application for 5G New Radio Network Tony Tsang and Man Cheng Chong, Hong Kong College of Technology, Hong Kong Full Text
18 12 5 Machine Learning in Early Genetic Detection of Multiple Sclerosis Disease: A Survey Nehal M. Ali1, Mohamed Shaheen2, Mai S. Mabrouk3 and Mohamed A. AboRezka1, 1Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt, 2Arab Academy for Science Technology and Maritime Transport, Alexandria, Egypt, 3Misr University for Science and Technology, Cairo, Egypt Full Text
19 12 5 Comparison of Rendering Processes on 3D Model Filip Popovski1, Nikola Spasov1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1SS KlimentOhridski, Macedonia, 2International Slavic University Gavrilo RomanovicDerzavin, Macedonia Full Text
20 12 5 IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy Marlon Intal Tayag, Francisco Napalit and Arcely Napalit, School of Computing Holy Angel University, Philippines Full Text
21 12 6 Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts Janis Zuters and Viktorija Leonova, University of Latvia, Latvia Full Text
22 12 6 A New Approach for Ranking Shadowed Fuzzy Numbers and its Application Mohamed A. H. El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt Full Text
23 12 6 Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk, Zhytomyr Polytechnic State University, Ukraine Full Text
24 12 6 Determining Business Intelligence Usage Success Javier N. Montero and Mary L. Lind, Defense Information Systems Agency, USA, Louisiana State University Shreveport, USA Full Text

International Journal of Computer Science and Engineering Survey (IJCSES)

25 11 2 Brain Computer Interfaces Employing Machine Learning Methods : A Systematic Review Sejal Vyas, Stevens Institute of Technology, USA Full Text
26 11 3 Artificial Neural Networks for Medical Diagnosis: A Review of Recent Trends Egba. Anwaitu Fraser1, Okonkwo Obikwelu R2, 1Federal College of Education (Technical), Nigeria, 2Nnamdi Azikiwe University, Nigeria Full Text

Computer Science & Engineering: An International Journal (CSEIJ)

27 10 5 Crime Detection using Data Mining Techniques Md. Sumon Rony, Sagor Chandra Bakchy and Hadisur Rahman, Varendra University, Bangladesh Full Text
28 10 4 A Feasible Voice based Inhouse Navigation System for the Visually Impaired Soham Roy, Kalinga Institute of Industrial Technology, India Full Text

Advanced Computing: An International Journal (ACIJ)

29 11 4 Exploring the Link Between Leadership and Devops Practice and Principle Adoption Krikor Maroukian1 and Stephen R. Gulliver2, 1Microsoft, Greece, 2University of Reading, Henley Business School, UK Full Text

International Journal of Computer Science, Engineering and Applications (IJCSEA)

30 10 6 Change Back Feature for Consumer Accounts Cheman Shaik, VISH Consulting Services Inc, USA Full Text
31 10 4 Evaluation of (GPS/GLONASS) Patch Versus RF GPS (L1) Patchantenna Performance Parameter Gholam Aghashirin1, Hoda S. Abdel-Aty-Zohdy1, Mohamed A. Zohdy1, Darrell Schmidt1 and Adam Timmons2,1Oakland University, USA, 2McMaster University, Canada Full Text
32 10 4 Design and Implementation of an Intelligent Gas Cylinder Valve Regulating System using Solenoid Ebenezer Narh Odonkor1, Willie K. Ofosu3, Patrick Appiah3 and Daniel Kubawe4, 1Takoradi Technical University, Ghana,2Penn State Wilkes, USA, 3Methodist Technical Institute, Ghana, 4Alang Junior High School, Ghana Full Text
33 10 3 Using GSM SMS Controller Alarm Configurator to Develop Cost Effective Intelligent Fire Safety System in A Developing Country Ebenezer Narh Odonkor1, Willie K. Ofosu2 and Kingsley Nunoo1, 1Takoradi Technical University, Ghana, 2Penn State Wilkes-Barre, USA Full Text
34 10 1 Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks Cheman Shaik, VISH Consulting Services Inc, USA Full Text

International Journal on Computational Science & Applications (IJCSA)

35 10 5 Covid-19 Chest X-ray Images: Lung Segmentation and Diagnosis using Neural Networks Alan Zhang, Chinese International School, China Full Text
36 10 4 Opti2I and ε-precis Methods Selection Algorithm Nombre Claude Issa1, Brou Konan Marcellin2, Kimou Kouadio Prosper3, 1Polytechnic Doctoral School, 2National Polytechnic Institute Houphouet Boigny – Yamoussoukro, 3Research Laboratory of Computer Science and Technology Full Text

International Journal on Information Theory (IJIT)

37 9 4 A Realist Model of Communication Applications for Informational Technology and Artificial Cognitive Systems Monica R. Kimmel, Collibri NGO, Gothenburg, Sweden Full Text
38 9 2 Skew Constacyclic Codes Over the Ring Sarra Manseri, Central China Normal University, China Full Text

Advanced Computational Intelligence: An International Journal (ACII)

39 7 4 FTMCP: Fuzzy based Test Metrics for Cosmetology Paradigm Shahzad Ashraf1, Sehrish Saleem2 and Syed Afnan3, 1Hohai University Changzhou Jiangsu, China, 2Muhammad Nawaz Sharif University of Engineering & Technology, Pakistan, 3Hilal Foods Private Limited, Pakistan Full Text

International Journal on Natural Language Computing (IJNLC)

40 9 6 Automatic Arabic Named Entity Extraction and Classification for Information Retrieval Omar ASBAYOU, Lumière Lyon 2 University, France Full Text
41 9 6 Dutch Named Entity Recognition and De-Identification Methods for the Human Resource Domain Chaïm van Toledo, Friso van Dijk, and Marco Spruit, Utrecht University, Netherlands Full Text
42 9 5 XAI Language Tutor - A XAI-based Language Learning Chatbot using Ontology and Transfer Learning Techniques Nuobei SHI, Qin Zeng and Raymond Lee, Beijing Normal University-Hong Kong Baptist University United International College, China Full Text
43 9 5 Covhindia: Deep Learning Framework for Sentiment Polarity Detection of Covid-19 Tweets in Hindi Purva Singh, VIT University, India Full Text
44 9 4 Stockgram : Deep Learning Model for Digitizing Financial Communications via Natural Language Generation Purva Singh, VIT University, India Full Text
45 9 4 An Affective Aware Pseudo Association Method to Connect Disjoint Users Across Multiple Datasets – an enhanced validation method for Text-based Emotion Aware Recommender John Kalung Leung, Igor Griva and William G. Kennedy, George Mason University, USA Full Text
46 9 4 A Semantic Question Answering through Heterogeneous Data Source in the Domain of Smart Factory Orçun Oruç, Technische Universität Dresden, Germany Full Text
47 9 3 Driving Product Sales Performance by Analysing Product Prelaunch in A Linguistics Approach Winnie Ng and Vincent Cho, The Hong Kong Polytechnic University, Hong Kong Full Text
48 9 3 The Ability of Word Embeddings to Capture Word Similarities Martina Toshevska, Frosina Stojanovska and Jovan Kalajdjieski, Ss. Cyril and Methodius University, Macedonia Full Text
49 9 3 Vector Space Modeling based Evaluation of Automatically Generated Text Summaries Alaidine Ben Ayed1 Ismaïl Biskri1, 2 and Jean-Guy Meunier1, 1Université du Québec à Montréal (UQAM), Canada,2Université du Québec à TroisRivières (UQTR), Canada Full Text
50 9 2 Rita Shelke1 and Devendrasingh Thakore2, 1Research Scholar, Pune, India 2Bharati Vidyapeeth College of Engineering, Pune, India Rita Shelke1 and Devendrasingh Thakore2, 1Research Scholar, Pune, India 2Bharati Vidyapeeth College of Engineering, Pune, India Full Text
51 9 2 Developing a Simplified Morphological Analyzer for Arabic Pronominal System Mohammad Mahyoob, Taibah University, KSA Full Text
52 9 2 A Sentiment Lexicon-based Analysis for Food and Beverage Industry Reviews. The Greek Language Paradigm Anastasios Liapakis, Theodore Tsiligiridis and Constantine Yialouris, University of Athens, Greece Full Text
53 9 1 On the Relevance of Query Expansion Using Parallel Corpora and Word Embeddings to Boost Text Document Retrieval Precision Alaidine Ben Ayed1 and Ismaïl Biskri2, 1Université du Québec à Montréal (UQAM), Canada and 2Université du Québec à Trois Rivières (UQTR), Canada Full Text
54 9 1 Finding out Noisy Patterns for Relation Extraction of Bangla Sentences Rukaiya Habib and Md. Musfique Anwar, Jahangirnagar University, Bangladesh Full Text
55 9 1 Predicting Election Outcome from Social Media Data Badhan Chandra Das and Md Musfique Anwar, Jahangirnagar University, Bangladesh Full Text

International Journal of Managing Information Technology (IJMIT)

56 12 4 Mediating and Moderating Factors Affecting Readiness to IoT Applications: The Banking Sector Context RashaAbd El-Aziz, Sarah El-Gamal and Miran Ismail, Arab Academy for Science, Egypt Full Text
57 12 3 Developing Enterprise Cyber Situational Awareness Christopher L. Gorham, Capitol Technology University, USA Full Text
58 12 3 Assess the Effect of Service Quality on Customer Satisfaction in Facebook Social Commerce in Egypt Rehab ELBadrawy, Sara ElKheshin and Nermine ELEssawy, Arab Academy for Science, Technology and Maritime Transport, Egypt Full Text
59 12 3 Analyzing the Opportunities of Digital Marketing in Bangladesh to Provide an Efficient Interrelation between Business Organization and Consumer Farjana Akter, Zayed- Us- Salehin, Abul Kalam Azad and Sultana Jahan Soheli, Noakhali Science and Technology University, Bangladesh Full Text
60 12 2 An Analysis of Consumer Interest Level Data for Online Health Information in the Early Stages of the Covid-19 Pandemic David C. Wyld, Southeastern Louisiana University, USA Full Text
61 12 2 Fashion-driven Textiles as A Crystal of A New Stream for Stakeholder Capitalism – Amazon’s Endeavor Chihiro Watanabe1, 2, Waleed Akhtar1, Yuji Tou3, Pekka Neittaanmäki1, 1University of Jyväskylä, Finland, 2International Institute for Applied Systems Analysis (IIASA), Austria, 3Tokyo Institute of Technology, Japan Full Text
62 12 2 The Demand Side of Open Government Data: A Case Study of Kingdom of Bahrain Abdulkarim Katbi1, Jaflah AlAmmari2, Ali AlSoufi3, 1King Hamad University Hospital, Kingdom of Bahrain, 2University of Bahrain, Kingdom of Bahrain and 3British University of Bahrain, Kingdom of Bahrain Full Text
63 12 2 The Fourth 4th Industrial Revolution’s Effect on the Enterprise Cyber Strategy Christopher L. Gorham, Capitol Technology University, USA Full Text
64 12 1 Assessing the Adoption of E-government Using Tam Model: Case of Egypt Sara ELKheshin1 and Noha Saleeb2 1Arab Academy for Science, Egypt and 2Middlesex University, UK Full Text

International Journal of Managing Value and Supply Chains (IJMVSC)

65 11 4 Procurement Performance Practices and Waste Management in Textile Manufacturing Firms in Nairobi City County Enock Gideon Musau, Kisii University, Kenya Full Text
66 11 3 Justification of, and Benefits Realization Beyond IT Investments: Analysis from Literature Godfred Yaw Koi-Akrofi, University of Professional Studies, Ghana Full Text
67 11 3 Supply Chain Management and Organizational Performance among Kenyan Textile Firms: A Moderated Mediation Model of Government Support and Environmental Uncertainty Enock Gideon Musau, Kisii University, Kenya Full Text
68 11 2 Electronic Material Management Practice on Supply Chain Performance of Sugar Processing Firms in Kenya Evans Biraori Oteki1, Prof. Maurice Sakwa2, 1Murang’a University of Technology, Kenya, 2Jomo Kenyatta University of Agriculture & Technology, Kenya Full Text
69 11 2 Complementary Assets and Value Creation Beyond Information Technology Investments Godfred Yaw Koi-Akrofi, University of Professional Studies, Accra, Ghana Full Text
70 11 1 The Value of Loyalty: Understanding Brand Loyalty from A Consumer Point of View Russell McKenzie1 Aristides R. Baraya1, David C. Wyld1, Carolina Garzón Medina2, and Adriana Marcela Gordillo González2, 1Southeastern Louisiana University, USA and 2Universidad Santo Tomas, Colombia Full Text

International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)

71 11 3 Accounting Information Systems and Knowledge Management Mohammed Khaled Aljarallah, King Saud University, Saudi Arabia Full Text
72 11 1 An Analysis of Consumer Preferences for Mobile Voice Calling in Different Contextual Usages: A Case of Thailand Monarat Jirakasem, Waseda University, Japan Full Text

International Journal of Chaos, Control, Modelling and Simulation (IJCCMS)

73 9 4 Socio-Organo Complexity, Project Schedule Performance and Underdamped Transient Motion Dimitris N. Antoniadis, DANTON PROGM, UK & London Metropolitan College, UK Full Text
74 9 4 State Observer Designs for Quarter-car Passive Suspension Tasya Y. Christnantasari, Institut Teknologi Sepuluh Nopember, Indonesia Full Text

Health Informatics - An International Journal (HIIJ)

75 9 4 Organizational Factors in Determining Data Quality Produced from Health Management Information Systems in Low- And Middle-income Countries: A Systematic Review Thein Hlaing1 and Thant Zin2, 1District Public Health Department (Ministry of Health and Sports), Myanmar,2STI Myanmar University, Myanmar Full Text
76 9 4 The Correlation between HPV Vaccination Rate and Income Inequality Zhifei Xie, Garrison Forest School, USA Full Text
77 9 4 Influenza Awareness in the Workplace Tyler D. Asher and Ian R. McAndrew, Capitol Technology University, USA Full Text
78 9 3 The Role of State-Wide Stay-at-Home Policies on Confirmed Covid-19 Cases in the United States: A Deterministic Sir Model David Chen1, Seungmin Lee2and Jason Sang3, 1University of Western Ontario, Canada, 2University of Toronto, Canada, 3University of Waterloo, Canada Full Text
79 9 1 Mhealth Applications Developed by the Ministry of Health for Public Users in KSA: A Persuasive Systems Design Evaluation Asmaa Shati, IMSIU University, KSA and KKU University, KSA Full Text
80 9 1 EEG Signal Classification using LDA and MLP Classifier Romain Atangana1,2,3, Daniel Tchiotsop1, GodpromesseKenne1, Laurent Chane1 Djoufack Nkengfack1,2, 1Unité de Recherche d’Automatique et d’InformatiqueAppliquée (UR-AIA), University of Dschang, Cameroon, 2Unité de Recherche de Matière Condensée-d’Électronique et de Traitement du Signal (UR-MACETS), University of Dschang, Cameroon and 3University of Ngaoundere, Cameroon Full Text

International Journal on Cybernetics & Informatics (IJCI)

81 9 3 An Analytical Analysis of Path Loss Models for Mobile Cellular Wireless Communications Md. Shariful Islam1*, Md. AshekRaihan Mahmud1, Md. Jashim Uddin1 and PallabKanti Podder2, 1Islamic University, Bangladesh, 2Pabna University of Science and Technology, Bangladesh Full Text

International Journal on Integrating Technology in Education (IJITE)

82 9 4 An Exploration of the Relationship between Modern Foreign Language (MFL) Teachers and Computer Assisted Language Learning (Call) Louise Hanna, David Barr, Helen Hou and Shauna McGill, Ulster University, UK Full Text
83 9 4 Children using Facebook: Personality Traits, Self-concept and School Performance Mitsoula Ioanna, Karatrantou Anthi, Panagiotopoulou Penny and Panagiotakopoulos Christos, University Campus, Greece Full Text
84 9 4 Challenges of Distance, Blended, and Online Learning: A Literature based Approach Godfred Yaw Koi-Akrofi, Emmanuel Owusu-Oware and Hannah Tanye, University of Professional Studies, Ghana Full Text
85 9 3 E-supporting Performance Styles based on Learning Analytics for Development of Teaching Practices in Teaching Science Jielan Elsayed, Laila Maawad, Zeinab khalifa, Ain shams University, Egypt Full Text
86 9 1 Questioning the Significance of Technologizing Algerian Schools and Universities: Did it Fail or Succeed? Dallel Sarnou, Abdelhamid Ibn Badis University, Algeria Full Text
87 9 1 Power Stability Analysis of A Transmission System with A Unified Power Flow Controller using Transformative Intrinsic Algorithm Sindhu. K, Sona College of Technology, Salem, India Full Text

International Journal of Computer Networks & Communications (IJCNC)

88 12 6 Mobility Speed Effect and Neural Network Optimization for Deep MIMO Beamforming in mmWave Networks Mustafa S. Aljumaily and Husheng Li, University of Tennessee, USA Full Text
89 12 6 Wireless Networks Performance Monitoring Based on Passive-active Quality of Service Measurements Yazeed A. Al-Sbou, Applied Science University, Bahrain Full Text
90 12 6 Towards Fog-Assisted Virtual Reality MMOG with Ultra-Low Latency YOSHIHARA Tsuyoshi and FUJITA Satoshi, Hiroshima University, Japan Full Text
91 12 6 Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks Yasir Mohammed1, Maha Abdelhaq2 and Raed Alsaqour3, 1Iraqi Ministry of Electricity, Iraq, 2Princess Nourah bint Abdulrahman University, Saudi Arabia, 3Saudi Electronic University, Saudi Arabia Full Text
92 12 6 Peer to Peer Approach based Replica and Locality Awareness to Manage and Disseminate Data in Vehicular Ad Hoc Networks Abdelkader Guezzi1, Abderrahmane Lakas2, Ahmed Korichi1, Sarra Cherbal3, 1Kasdi Merbah University, Algeria, 2UAE University, UAE, 3University of Ferhat Abbas Setif, Algeria Full Text
93 12 6 Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks Amir J. Majid, Ajman University, UAE Full Text
94 12 6 Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures Mousa Al-Akhras1,2,Mohammed Alawairdhi1, Ali Alkoudari1 and Samer Atawneh1, 1Saudi Electronic University, Saudi Arabia, 2The University of Jordan, Jordan Full Text
95 12 6 Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms Tran Hoang Hai1, Le Huy Hoang11 and Eui-nam Huh2, 1Hanoi University of Science and Technology, Vietnam, 2Kyung Hee University, Korea Full Text
96 12 5 An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks Khaled Day1, Faiza Al-Salti2, Abderezak Touzene1 and Nasser Alzeidi1, 1Sultan Qaboos University, Oman, 2Muscat College, Oman Full Text
97 12 5 Jamming Detection based on Doppler Shift Estimation in Vehicular Communications Systems Javad Afshar Jahanshahi, Universidad Catolica Los Angeles de Chimbote, Peru Full Text
98 12 5 A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity Saad Al-Ahmadi and Yasser Alharbi, King Saud University, Saudi Arabia Full Text
99 12 5 A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node Dang Thanh Chuong1, Nguyen Hong Quoc1, Doan Van Thang2 and Pham Trung Duc1,1Hue University, Vietnam, 2Industrial University of HCM City, Vietnam Full Text
100 12 5 Mean Object Size Considering Average Waiting Latency in M/BP/1 System Y. –J. Lee, Korea National University of Education, South Korea Full Text
101 12 5 A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based on OLSR Protocol Youssef Lmoumen1, Yassine Ruichek1 and Raja Touahni2,1University Bourgogne FrancheComté, France, 2University IbnTofail, Morocco Full Text
102 12 5 Client Performance Predictions for Private Blockchain Networks YLászló Viktor Jánoky, János Levendovszky and Péter Ekler, Budapest University of Technology and Economics, Hungary Full Text
103 12 4 Determination of Minimum Number of UAVs for Local Area Networks of Drones Sandaruvan Rajasinghege and Rohan de Silva, CQ University, Australia Full Text
104 12 4 Performance Analysis of Routing Protocols with Roadside Unit Infrastructure in a Vehicular Ad Hoc Network Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi, Sidi Mohamed Ben Abdelah University, Morocco Full Text
105 12 4 Multi-criteria Handover Decision for Heterogeneous Networks: Carrier Aggregation Deployment Scenario Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and Fazirulhisyam Hashim, Universiti Putra Malaysia, Malaysia Full Text
106 12 4 Hybrid Model in the Block Cipher Applications for High-speed Communications Networks Minh Nguyen Hieu1, Bac Do Thi2, Canh Hoang Ngoc3, Manh Cong Tran4, Phan Duong Phuc5 and Khoa Nguyen Tuan6, 1Institute of Cryptographic Science and Technology, Vietnam, 2Thai Nguyen University of Information and Communication Technology, Vietnam, 3Thuongmai University, Vietnam, 4Le Quy Don Technical University, Vietnam, 5Academy of Cryptography Techniques, Vietnam, 6Research Laboratories of Saigon High-Tech Park, Vietnam Full Text
107 12 4 Robotic Inner Signal Propagation and Random Access over Hybrid Access Scheme Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru Shimamoto, Waseda University, Japan Full Text
108 12 4 An Experimental Study of IoT Networks Under Internal Routing Attack Mohammad Alreshoodi, Qassim University, Saudi Arabia Full Text
109 12 4 Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web Applications Mohammad Shojaeshafiei, Letha Etzkorn and Michael Anderson, The University of Alabama in Huntsville, USA Full Text
110 12 3 Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs Radha Raman Chandan and P.K.Mishra, Banaras Hindu University, India Full Text
111 12 3 6RLR-ABC: 6LOWPAN Routing Protocol with Local Repair using Bio Inspired Artificial Bee Colony Nurul Halimatul Asmak Ismail1, Samer A. B. Awwad2 and Rosilah Hassan3, 1Princess Nourah Bint Abdulrahman University, Kingdom of Saudi Arabia, 2Independent Researcher, Kingdom of Saudi Arabia, 3Universiti Kebangsaan Malaysia, Malaysia Full Text
112 12 3 Swarm Optimization based Gravitational Search Approach for Channel Assignment in MCMR Wireless Mesh Network Nandini Balusu1, Suresh Pabboju2 and Narsimha G3, 1Telangana University, India, 2Chaitanya Bharathi Institute of Technology, India and 3JNTUH College of Engineering, India Full Text
113 12 3 Energy-efficient Multi-hop Routing with Unequal Clustering Approach for Wireless Sensor Networks Younes El Assari, Samia Al Fallah, Jihane El Aasri, Mounir Arioua and Ahmed El Oualkadi, Abdelmalek Essaadi University, Morocco Full Text
114 12 3 Flooding Attack Detection and Mitigation in SDN with Modified Adaptive Threshold Algorithm Nan Haymarn Oo1, Aris Cahyadi Risdianto2, Teck Chaw Ling3 and Aung Htein Maw4, 1University of Computer Studies, Yangon, Myanmar, 2Gwangju Institute of Science and Technology, Korea, 3University of Malaya, Malaysia 4University of Information Technology, Myanmar Full Text
115 12 3 Signaling Protocols for Local Area Networks of Drones Prabhu Jyot Singh and Rohan de Silva, School of Engineering and Technology CQ University Sydney, Australia Full Text
116 12 3 Localization Schemes for Underwater Wireless Sensor Networks: Survey Faiza Al-Salti1, N. Alzeidi2 and Khaled Day2, 1Muscat College, Oman and 2Sultan Qaboos University, Oman Full Text
117 12 2 Performance Evaluation of Modbus TCP in Normal Operation and Under A Distributed Denial of Service Attack Eric Gamess1, Brody Smith1 and Guillermo Francia III2, 1Jacksonville State University, USA and 2University of West Florida, USA Full Text
118 12 2 An Adaptive Diffserv Approach to Support QoS in Network Mobility NEMO Environment Loay F. Hussein1,2, Aisha-Hassan AbdallaHashim2, Mohamed Hadi Habaebi2 and Wan Haslina Hassan3, 1Jouf University, Saudi Arabia, 2International Islamic University Malaysia, Malaysia and 3Universiti Teknologi Malaysia, Malaysia Full Text
119 12 2 Mobile Crowd Sensing RPL-based Routing Protocol for Smart City Yahya Al Sawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi, Sultan Qaboos University, Oman Full Text
120 12 2 Virtual Cache & Virtual Wan Accelerator Function Placement for Cost-effective Content Delivery Services Shin-ichi Kuribayashi, Seikei University, Japan Full Text
121 12 2 Auto Resource Management to Enhance Reliability and Energy Consumption in Heterogeneous Cloud Computing Moataz H. Khalil1,2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1,2 ,Mahmoud Gabr3 and Adel S. Elmaghraby1,2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt Full Text
122 12 2 CLBNSRM - Confidence Level Based Unblend Neighbor Selection &Blend Node Report Based Optimized Route Formation in MANET S. J. Patil1, L.S. Admuthe2 and M. R. Patil3, 1VTU, India, 2DKTE’S Textile & Engineering Institute, India and 3J.A.G.M. Institute of Technology, Indiat Full Text
123 12 2 Energy Performance of a Combined Horizontal and Vertical Compression Approach in Cluster-based WSNS Jihane El Aasri, Samia Al Fallah, Mounir Arioua and Ahmed El Oualkadi, Tangier Abdelmalek Essaadi University, Morocco Full Text
124 12 1 Least Square Channel Estimation for Image Transmission with OFDM Over Fading Channel Usha S.M1 and Mahesh H.B2, 1JSS Academy of Technical Education, India and 2PES University, India Full Text
125 12 1 A Modified Interference Approximation Scheme for Improving Preamble Based Channel Estimation Performance in FBMC System Radwa A. Roshdy1, Mohamed A. Aboul-Dahab2 and Mohamed M. Fouad3, 1Higher Technological Institute, Egypt, 2Arab Academy for Science Technology and Martine transport, Egypt and 3Zagazig University, Egypt Full Text
126 12 1 Evaluation Methodology of MIMO Networks Performance over Rayleigh Fading Eleftherios Stergiou, Constantinos Angelis and Spiridoula V. Margariti, University of Ioannina, Greece Full Text
127 12 1 LTE Scheduler Algorithms for VANET Traffic in Smart City Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar, Tunisia Full Text
128 12 1 Lorawan Scalability Analysis – Co Spreading Factor Interference Aiju Thomas and N V Eldhose, M G University, India Full Text
129 12 1 Load Balancing Algorithm for Efficient VM Allocation in Heterogeneous Cloud Badshaha P Mulla1, C. Rama Krishna1 and Raj Kumar Tickoo1, 1NITTTR, India and 1National Informatics Centre, Punjab State Unit, India Full Text
130 12 1 An Efficient and Secure Malicious Node Detection Model for Wireless Sensor Networks Asmaa M.Morsi1, Tamer M. Barakat2 and Ahmed Ali Nashaat2, 1Al-Madina Higher Institute for Engineering and Technology, Egypt and 2Fayoum University, Egypt Full Text

International Journal of Wireless & Mobile Networks (IJWMN)

131 12 6 Performance Analysis of Spatially Correlated Cylindrical Antenna Array for 3D Massive MIMO Patrick Danuor1 and Emmanuel Ampoma Affum2, 1Ho Technical University, Ghana, 2Kwame Nkrumah University of Science and Technology, Ghana Full Text
132 12 4 Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing Protocols for Wireless Sensor Networks Faïza Tabbana, Military Academy, Tunisia Full Text
133 12 4 Energy Efficient Animal Sound Recognition Scheme in Wireless Acoustic Sensors Networks Saad Al-Ahmadi and Badour AlMulhem, King Saud University, Saudi Arabia Full Text
134 12 4 A Node Deployment Model with Variable Transmission Distance for Wireless Sensor Networks Fan Tiegang and Chen Junmin, Hebei University, China Full Text
135 12 3 Enhancing Routing Protocol for Wireless Sensor Network to Advance Network Lifetime Mohammad Abdus Salam1, Kosta Varnavas2 and Bhargava Maddireddy1, 1Southern University, USA and 2NASA Marshall Space Flight Center, USA Full Text
136 12 3 Performance Evaluation and Enhancement of VLAN via Wireless Networks using OPNET Modeler Tareq Al-Khraishi and Muhannad Quwaider, Jordan University of Science and Technology, Jordan Full Text
137 12 3 Explainable AI for Autonomous Network Functions in Wireless and Mobile Networks Premnath K Narayanan1 and David K Harrison2, 1LM Ericsson Ltd., SA OSS PDU OSS S&T Research & PCT, Ireland and 2Glasgow Caledonian University, United Kingdom Full Text
138 12 3 Atmospheric Propagation Impairment Effects for Wireless Communications Sharmin Tajria Ananya1, Md. Shariful Islam1*, Md.Ashek Raihan Mahmud1, Pallab Kanti Podder2 and Md Jashim Uddin1, 1Islamic University, Bangladesh and 2Pabna University of Science and Technology, Bangladesh Full Text
139 12 3 An Intelligent Channel Estimation Method for Future Mobile Generation Khaled H. Almotairi, Umm Al-Qura University, Saudi Arabia Full Text
140 12 3 Occupant Activity Detection in Smart Buildings: A Review Yudith Cardinale1,2, Eduardo Blanco1, 1Universidad Simón Bolívar, Venezuela and 2Universidad Católica San Pablo, Peru Full Text
141 12 2 Security Enhancements over AODV Using Multi-hop Acknowledgment Aditya Saravanan, Arjun Pant and A. Jeyasekar, SRM Institute of Science and Technology, India Full Text
142 12 1 Privacy Preserving Participatory Sensor Network on Named Data Networking Infrastructure M. Kaosar and X. Yi, RMIT University, Australia Full Text
143 12 1 An Enhanced Hybrid Routing and Clustering Technique for Wireless Sensor Network Hasan Al-Refai, Philadelphia University, Jordan Full Text
144 12 1 IoT-based Activity Recognition with Machine Learning from Smartwatch Nassim Mozaffaric, Javad Rezazadeha,c, Reza Farahbakhshb, John Ayoadea, aKent Institute Australia, Australia, bInstitut Mines-Te´le´com, Te´le´com SudParis and cIslamic Azad University, Iran Full Text

International Journal of Next-Generation Networks (IJNGN)

145 12 3 Mobile Primary User in Cognitive Radio State of the Arts and Recent Advances Amine hamdouchi1, Badr Benmammar2, Aouatef EI Biari1 and Abdellatif Medouri1, 1National School of Applied Sciences, Morocco, 2University of Tlemcen, Algeria Full Text

International Journal of Distributed and Parallel systems (IJDPS)

146 11 5 Distributed E-learning System using an Hybrid P2P-based Content Addressable Network Architecture Telesphore Tiendrebeogo1 and Kabre Laciné2, 1Nazi Boni University, Burkina Faso, 2Zerbo University, Burkina Faso Full Text
147 11 5 Consensus based Data Aggregation for Energy Conservation in Wireless Sensor Network Tamal Banerjee, Priyansh Sharma, Shrijana Pradhan, Sikkim Manipal Institute of Technology, India Full Text

International Journal of Grid Computing & Applications (IJGCA)

148 11 4 Face Expression Recognition using Convolution Neural Network (CNN) Models Nahla Nour1, Mohammed Elhebir2 and Serestina Viriri3, 1Sudan University of Science and Technology, Sudan, 2University of Gezira, Sudan, 3University of KwaZulu-Natal, South Africa Full Text

International Journal of Advanced Smart Sensor Network Systems (IJASSN)

149 10 3 Development of Som Neural Network based Energy Efficient Clustering Hierarchical Protocol for Wireless Sensor Network Md. Tofael Ahmed1, Bipasa Sharmin Setu1, Maqsudur Rahman2 and A. Z. M. Touhidul Islam3, 1Comilla University, Bangladesh, 2Port City International University, Bangladesh, 3University of Rajshahi, Bangladesh Full Text

International Journal on AdHoc Networking Systems (IJANS)

150 10 3 Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things. Asma Lahbib1, Khalifa Toumi2, Anis Laouiti1 and Steven Martin3, 1SAMOVAR, Université Paris-Saclay, France,2IRT SystemX, France, 2LRI, Université Paris-Sud, France Full Text
151 10 3 Two Level Data Fusion Model for Data Minimization and Event Detection in Periodic Wireless Sensor Network. Neetu Verma and Dinesh Singh, DCRUST, India Full Text

The International Journal of Ambient Systems and Applications (IJASA)

152 8 2 Study of Attenuation and Bending Losses in Signal Transmission over Step Index Multimode Pmma Fibers A. Z. M. Touhidul Islam and Md. Firoz Ahmed, University of Rajshahi, Bangladesh Full Text
153 8 2 Video Transmission in V-blast Encoded MIMO MC-CDMA Wireless System: Performance Study Md. Juwel Sheikh, Md. Firoz Ahmed and A. Z. M. Touhidul Islam, University of Rajshahi, Bangladesh Full Text
154 8 2 On Detection and Tracking of the Vehicles from the Real Time Video Stream using Background Subtraction Process with Blob Tracker Algorithm Maqsudur Rahman1, Md. Tofael Ahmed2 and A. Z. M. Touhidul Islam3, 1Port City International University, Bangladesh,2Comilla University, Bangladesh, 3University of Rajshahi, Bangladesh Full Text

International Journal of Software Engineering & Applications (IJSEA)

155 11 6 Stated Preference Data & Alogit Mina Hassanvand, University of Calgary, Canada Full Text
156 11 6 Learning-based Orchestrator for Intelligent Software-defined Networking Controllers Imene Elloumi Zitouna, University of Tunis El Manar, Tunisia Full Text
157 11 6 A Data Extraction Algorithm from Open Source Software Project Repositories for Building Duration Estimation Models: Case Study of Github Donatien K. Moulla1,2, Alain Abran3 and Kolyang4, 1Faculty of Mines and Petroleum Industries, University of Maroua, Cameroon, 2LaRI Lab, University of Maroua, Cameroon, 3École de Technologie Supérieure, Canada, 4The Higher Teachers’ Training College, University of Maroua, Cameroon Full Text
158 11 5 Secure Descartes: A Security Extension to Descartes Specification Language Venkata N Inukollu1 and Joseph E Urban2, 1Purdue University, USA, 2Arizona State University, USA Full Text
159 11 5 Iterative and Incremental Development Analysis Study of Vocational Career Information Systems Isyaku Maigari Ibrahim, Ogwueleka Francisca Nonyelum and Isah Rambo Saidu, Nigerian Defense Academy, Nigeria Full Text
160 11 5 MASRML - A Domain-specific Modeling Language for Multi-agent Systems Requirements Gilleanes Thorwald Araujo Guedes1, Iderli Pereira de Souza Filho1, Lukas Filipe Gaedicke1, Giovane D’Ávila Mendonça1, Rosa Maria Vicari2 and Carlos Brusius2, 1Pampa Federal University, Brazil, 2Federal University of Rio Grande do Su1, Brazil Full Text
161 11 4 An Ad-hoc Social Network Generation Approach Maurice Tchoupé Tchendji1,2, Martin Xavier Tchembé2 and Armelle Linda Maténé Kakeu2, 1LIRIMA - FUCHSIA team, 2University of Dschang, Cameroon Full Text
162 11 4 How do Agile Software Startups deal with uncertainties by Covid-19 pandemic? Rafael da Camara1,2, Marcelo Marinho1, Suzana Sampaio1 and Saulo Cadete2,1Federal Rural University of Pernambuco, Brazil, 2Di2win, Brazil Full Text
163 11 3 Programmer Productivity Enhancement Through Controlled Natural Language Input Howard Dittmer and Xiaoping Jia, DePaul University, USA Full Text
164 11 3 Towards Auditability Requirements Specification using an Agent-based Approac Denis J. S. de Albuquerque1, Vanessa Tavares Nunes1, Claudia Cappelli2 and Célia Ghedini Ralha1, 1University of Brasilia, Brazil and 2Federal University of Rio de Janeiro, Brazil Full Text
165 11 3 How (UN) Happiness Impacts on Software Engineers in Agile Teams? Luís Felipe Amorim, Marcelo Marinho and Suzana Sampaio, Federal Rural University of Pernambuco (UFRPE), Brazil Full Text
166 11 3 The Proposed Implementation of RFID based Attendance System Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia Full Text
167 11 3 Ensemble Regression Models for Software Development Effort Estimation: A Comparative Study Halcyon D. P. Carvalho, Marília N. C. A. Lima, Wylliams B. Santos and Roberta A. de A.Fagunde, University of Pernambuco, Brazil Full Text
168 11 3 Factors that Affect the Requirements Adherence to Business in Agile Projects: An Industrial Cross-case Analysis Helena Bastos1, Alexandre Vasconcelos1, Wylliams Santos2 and Juliana Dantas3, 1Universidade Federal de Pernambuco,Brazil, 2Universidade de Pernambuco, Brazil and 3Instituto Federal de Educação Ciência e Tecnologia da Paraíba, Brazil Full Text
169 11 3 IT Project Showstopper Framework: The View of Practitioners Godfred Yaw Koi-Akrofi, University of Professional Studies, Accra Full Text
170 11 2 Essential Activities for Secure Software Development Mamdouh Alenezi and Sadiq Almuairfi, Prince Sultan University, Saudi Arabia Full Text
171 11 1 Proposing Automated Regression Suite Using Open Source Tools for A Health Care Solution Anjali Rawat and Shahid Ali, AGI Institute, New Zealand Full Text
172 11 1 Quality Assessment Model of the Adaptive Guidance Hamid Khemissa1 and Mourad Oussalah2, 1USTHB: University of Science and Technology Houari Boumediene, Algeria and 2Nantes University, France Full Text
173 11 1 An Application of Physics Experiments of High School by using Augmented Reality Hussain Mohammed Abu-Dalbouh, Samah Mohammed AlSulaim, Shaden Abdulaziz AlDera, Shahd Ebrahim Alqaan, Leen Muteb Alharbi and Maha Abdullah AlKeraida, Qassim University, Kingdom of Saudi Arabia Full Text
174 11 1 On the Relationship between Software Complexity and Security Mamdouh Alenezi and Mohammad Zarour, Prince Sultan University, Saudi Arabia Full Text
175 11 1 Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets John Gichuki Ndia1, Geoffrey Muchiri Muketha1 and Kelvin Kabeti Omieno2, 1Murang’a University of Technology, Kenya and 2Kaimosi Friends University College, Kenya Full Text

International Journal of Network Security & Its Applications (IJNSA)

176 12 6 Hybrid Chaotic Method for Medical Images Ciphering Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt Full Text
177 12 6 The Brazilian Law on Personal Data Protection Jonatas S. de Souza1,2, Jair M. Abe1, Luiz A. de Lima1,2 and Nilson A. de Souza2,3, 1Paulista University, São Paulo, Brazil,2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation, PREVCOM, Brazil Full Text
178 12 5 Secured AODV to Protect WSN Against Malicious Intrusion Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia Full Text
179 12 4 Enhanced Authentication for Web-Based Security using Keystroke Dynamics Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka, Malaysia Full Text
180 12 4 A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt Full Text
181 12 4 Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA,2Federal Polytechnic Nekede, Nigeria Full Text
182 12 3 Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada Full Text
183 12 3 Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1,1Dyrecta Lab, IT Research Laboratory, Italy, 1Spacertron srl, Italy Full Text
184 12 3 An Empirical Analysis of Email Forensics Tools Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA Full Text
185 12 3 PDMLP: Phishing Detection using Multilayer Perceptron Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia Full Text
186 12 2 Security Consideration in Peer-to-peer Networks with A Case Study Application Nick Rahimi, Southern Illinois University, USA Full Text
187 12 2 Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain Ozgur Oksuz, Adiyaman University, Turkey Full Text
188 12 2 A Survey on Malware Detection and Analysis Tools Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA Full Text
189 12 2 An Enhanced User Authentication Framework in Cloud Computing SHasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan Full Text
190 12 1 A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA Full Text
191 12 1 Self-organization and Autonomous Network Survey Houneida SAKLY, Campus University of Mannouba, Tunisia Full Text

International Journal of Security, Privacy and Trust Management (IJSPTM)

192 9 4 Political Risks and Blockchain: Definitions and Possible Case Examples Remy Zgraggen, University Oldenburg, Switzerland Full Text
193 9 3 Emulating Trusted Platform Module 2.0 on Raspberry Pi 2 Jen-Liang Cheng, Kuang-Chi Chen, Hong-Wei Zhang, Wei-Yu Chen and Dai-Ye Wu, Tzu-Chi University, Taiwan Full Text
194 9 2 Voice Biometric Identity Authentication Model for IoT Devices Salahaldeen Duraibi1, Frederick T. Sheldon2 and Wasim Alhamdani3, 1University of Idaho Moscow, USA & Jazan University, KSA, 2University of Idaho, USA and 3University of the Cumberlands, USA Full Text

International Journal of Database Management Systems (IJDMS)

195 12 1 Operational Intelligence Performance Inferencing Across Business Processes Rajeev Kaula, Missouri State University, USA Full Text
196 12 2 A Novel Remote Access Control for the Real-time Streaming Data of IP Cameras Kuen-Liang Sue and Ting-Yuan Wu, National Central University Taoyuan, Taiwan Full Text
197 12 2 Storing Data in A Document-oriented Database and Implemented from A Structured Nesting Logical Model Y. Hiyane, A. Benmakhlouf and A. Marzouk, University Hassan 1st, Morocco Full Text
198 12 2 Acceptance of E-procurement in Organisations: Using Structural Equation Modeling (SEM) Muhammed S. Maddi1, Paul Davis2 and John Geraghty3, 4Dublin City University, Ireland & College of economic and Management Bani Walid City University, Libya and 2Dublin City University Business School, Ireland 3Dublin City University Mechanical and Manufacturing Engineering School, Ireland Full Text
199 12 3 Design, Implementation, and Assessment of Innovative Data Warehousing; Extract, Transformation, and Load(ETL);and Online Analytical Processing(OLAP) on BI Ramesh Venkatakrishnan, Colorado Technical University, USA Full Text
200 12 3 HISTSFC: Optimization for ND Massive Spatial Points Querying Haicheng Liu1, Peter van Oosterom1, Martijn Meijers1, Xuefeng Guan2, Edward Verbree1, Mike Horhammer3,1Delft University of Technology, the Netherlands, 2Wuhan University, China and 3Oracle Inc, USA Full Text
201 12 3 A Context-aware Strategy for Mobile Services in M-commerce Kuen-Liang Sue, National Central University Taoyuan, Taiwan Full Text
202 12 3 Sarcasm Detection Beyond using Lexical Features ADEWUYI Joseph Oluwaseyi and OLADEJI Ifeoluwa David, University of Ibadan, Nigeria Full Text
203 12 5 Big Data Storage System Based on a Distributed Hash Tables System Telesphore Tiendrebeogo and Mamadou Diarra, Nazi Boni University, Burkina Faso Full Text

International Journal of Data Mining & Knowledge Management Process (IJDKP)

204 10 1 A Web Repository System for Data Mining in Drug Discovery Jiali Tang, Jack Wang and Ahmad Reza Hadaegh, California State University San Marcos, USA Full Text
205 10 2 Application of Spatiotemporal Association Rules on Solar Data to Support Space Weather Forecasting Carlos Roberto Silveira Junior1, José Roberto Cecatto2, Marilde Terezinha Prado Santos1 and Marcela Xavier Ribeiro1,1Federal University of São Carlos, Brazil and 2National Institute of Space Research, Brazil Full Text
206 10 3 Data Science Curriculum: Current Scenario Duaa Bukhari, Taibah University, Saudi Arabia Full Text
207 12 4 Efficacy of Non-negative Matrix Factorization for Feature Selection in Cancer Data Parth Patel1, Kalpdrum Passi1 and Chakresh Kumar Jain2, 1Laurentian University, Canada, 2Jaypee Institute of Information Technology, India Full Text

The International Journal of Multimedia & Its Applications (IJMA)

208 12 4 Improving PSNR and Processing Speed for HEVC Using Hybrid PSO for Intra Frame Prediction Swati Vinod Sakhare and Upena D. Dalal, The Sardar Vallabhbhai National Institute of Technology, India Full Text
209 12 4 Performance Analysis of Different Acoustic Features based on LSTM for Bangla Speech Recognition Nahyan Al Mahmud, Ahsanullah University of Science and Technology, Bangladesh Full Text
210 12 5 Qualitative Analysis of PLP in LSTM for Bangla Speech Recognition Nahyan Al Mahmud1 and Shahfida Amjad Munni2, 1Ahsanullah University of Science and Technology, Bangladesh,2Cygnus Innovation Limited, Bangladesh Full Text
211 12 6 Development of a Mobile Learning Application of Malay Vocabulary for Lower Secondary School Level Nor Zuhaidah Mohamed Zain, Maizatul Hayati Mohamad Yatim, Ummu Husna Azizan and Hasrina Baharum, Universiti Pendidikan Sultan Idris, Malaysia Full Text

International Journal of Computer Graphics & Animation (IJCGA)

212 10 1 Human Photogrammetry: Foundational Techniques for Creative Practitioners Trendt Boe and Chris Carter, Queensland University of Technology, Australia Full Text
213 10 3 Media Students’ Capability to Interact with Augmented Reality and 3D Animations in Virtual Broadcast News Studios Tariq Alrimawi and Wasan Haddad, University of Petra, Jordan Full Text

International Journal of Game Theory and Technology (IJGTT)

214 6 1 With a transaction fee market and without a block size limit in Bitcoin network; there exists a Nash equilibrium points of the mining game Moustapha BA, Université Paris Nanterre (Paris X), France Full Text

International Journal of Web & Semantic Technology (IJWesT)

215 11 3 Identification of Technology-relevant Entities Based on Trend Curves and Semantic Similarities Sukhwan Jung, Rachana Reddy Kandadi, Rituparna Datta, Ryan Benton, and Aviv Segev, University of South Alabama, USA Full Text

International Journal on Web Service Computing (IJWSC)

216 11 1 Toward a Formalization of BPEL 2.0 : An Algebra Approach L. Boumlik1, M. Mejri1 and H. Boucheneb2, 1Laval University, Canada and 2Polytechnique Montreal University, Canada Full Text
217 11 2 A Comparative Study between Graph-QL& Restful Services in API Management of Stateless Architectures Sayan Guha and Shreyasi Majumder, Cognizant Technology Solutions, India Full Text

International Journal on Cloud Computing: Services and Architecture (IJCCSA)

218 10 2 SLA-driven Load Scheduling in Multi-tier Cloud Computing: Financial Impact Considerations Husam Suleiman and Otman Basir, University of Waterloo, Canada Full Text
219 10 3 MCCVA: A New Approach Using SVM and Kmeans for Load Balancing on Cloud Hieu Le Ngoc1,3, Trang Nguyen Thi Huyen2, Xuan Phi Nguyen3 and Cong Hung Tran3, 1Ho Chi Minh City Open University, Vietnam,2Sai Gon University, Vietnam, 3Post and Telecommunication Institute of Technology, Ho Chi Minh City Open University, Vietnam Full Text
220 10 3 Load Balancing Algorithm on Cloud Computing for Optimize Respone Time Nguyen Xuan Phi, Le Ngoc Hieu and Tran Cong Hung, Posts and Telecoms Institute of Technology, Vietnam Full Text
221 10 5 Success-Driving Business Model Characteristics of IaaS Providers – Towards a Quantitative Evaluation Sebastian Floerecke, Florian Felix Röck and Franz Lehner, University of Passau, Germany Full Text

International Journal of Artificial Intelligence & Applications (IJAIA)

222 11 5 A New Generalization of Edge Overlap to Weighted Networks Ali Choumane, Lebanese University, Lebanon Full Text
223 11 1 Construction of Amharic-arabic Parallel Text Corpus for Neural Machine Translation Ibrahim Gashaw and H L Shashirekha, Mangalore University, India Full Text
224 11 1 Novel Machine Learning Algorithms for Centrality and Cliques Detection in Youtube Social Networks Craigory Coppola and Heba Elgazzar, Morehead State University, USA Full Text
225 11 1 Novel Hybrid ANT Colony Algorithm for the Multi-depot Periodic Open Capacitated Arc Routing Problem Bilal Kanso, Lebanese University, Lebanon Full Text
226 11 1 Hybrid ANT Colony Algorithm for the Multi-depot Periodic Open Capacitated Arc Routing Problem Bilal Kanso, Lebanese University, Lebanon Full Text
227 11 1 Using Semi-supervised Classifier to Forecast Extreme CPU Utilization Nitin Khosla1 and Dharmendra Sharma2, 1ICTCAPM, Australia and 2University of Canberra, Australia Full Text
228 11 1 A Hybrid Algorithm Based on Invasive Weed Optimization Algorithm and Grey Wolf Optimization Algorithm Wisam Abdulelah Qasim and Ban Ahmed Mitras, College of Computer Science & Mathematics, Mosul, Iraq Full Text
229 11 1 An Ontological Analysis and Natural Language Processing of Figures of Speech Christiana Panayiotou, Technological University of Cyprus, Cyprus Full Text
230 11 1 Capsule Network Performance with Autonomous Navigation Thomas Molnar and Eugenio Culurciello, Purdue University, USA Full Text
231 11 2 A Modified Maximum Relevance Minimum Redundancy Feature Selection Method Based on Tabu Search For Parkinson’s Disease Mining Waheeda Almayyan, PAAET, Kuwait Full Text
232 11 2 Data Mining Applied in Food Trade Network Alessandro Massaro, Giovanni Dipierro, Annamaria Saponaro and Angelo Galiano, Dyrecta Lab,IT Research Laboratory, Italy Full Text
233 11 2 Automated Discovery of Logical Fallacies in Legal Argumentation Callistus Ireneous Nakpih1 and Simone Santini2, 1St. John Bosco’s College of Education, Ghana and 2Universidad Autonoma De Madrid, Spain Full Text
234 11 2 A BI-objective Model for SVM With an Interactive Procedure to Identify the Best Compromise Solution Mohammed Zakaria Moustafa1, Mohammed Rizk Mohammed1, Hatem Awad Khater2 and Hager Ali Yahia1,1ALEXANDRIA University, Egypt, and 2Horus University, Egypt Full Text
235 11 3 Application of Target Detection Algorithm based on Deep Learning in Farmland Pest Recognition Shi Wenxiu and Li Nianqiang, University of Jinan, China Full Text
236 11 3 Graphical Model and Clustering-Regression based Methods for Causal Interactions: Breast Cancer Case Study Suhilah Alkhalifah and Adel Aloraini, Qassim University, Saudi Arabia Full Text
237 11 4 CPU Hardware Classification and Performance Prediction using Neural Networks and Statistical Learning Courtney Foots1, Palash Pal2, Rituparna Datta1 and Aviv Segev1, 1University of South Alabama, USA,2Burdwan University, India Full Text
238 11 4 A Deep Learning Approach for Denoising Air-Coupled Ultrasonic Responds Data Mikel David Jedrusiak and Frank Weichert, Technical University of Dortmund, Germany Full Text
239 11 4 Detection of Dense, Overlapping, Geometric Objects Adele Peskin, Boris Wilthan and Michael Majurski, NIST, USA Full Text
240 11 4 Categorizing 2019-n-CoV Twitter Hashtag Data by Clustering Koffka Khan1 and Emilie Ramsahai2, 1The University of the West Indies, Trinidad, 2UWI School of Business & Applied Studies Ltd (UWI-ROYTEC), Trinidad and Tobago Full Text
241 11 4 Log Message Anomaly Detection with Oversampling Amir Farzad and T. Aaron Gulliver, University of Victoria, Canada Full Text
242 11 4 Insight about Detection, Prediction and Weather Impact of Coronavirus (Covid-19) using Neural Network A K M Bahalul Haque, Tahmid Hasan Pranto, Abdulla All Noman and Atik Mahmood, North South University, Bangladesh Full Text
243 11 4 Scaling the HTM Spatial Pooler Damir Dobric1, Andreas Pech2, Bogdan Ghita1 and Thomas Wennekers1, 1University of Plymouth, UK,2Frankfurt University of Applied Sciences, Germany Full Text
244 11 4 Analysis of Roadway Fatal Accidents using Ensemble-based Meta-Classifiers Waheeda Almayyan, Collage of Business Studies, PAAET, Kuwait Full Text
245 11 6 Problem Decomposition and Information Minimization for the Global, Concurrent, On-line Validation of Neutron Noise Signals and Neutron Detector Operation Tatiana Tambouratzis, University of Piraeus, Greece Full Text
246 11 6 PIntelligent Portfolio Management via NLP Analysis of Financial 10-k Statements Purva Singh, VIT University, India Full Text
247 11 6 Object Sorting using Faster R-CNN Pengchang Chen and Vinayak Elangovan, Division of Science and Engineering, Penn State Abington, USA Full Text
248 11 6 Using Contextual Graphs as a Decision-making Tool in the Process of Hiring Candidates Hassane Tahir1 and Patrick Brézillon2, 1Links Consultants, Paris, France, 2LIP6 - Sorbonne University - CNRS, Paris, France Full Text
249 11 6 Automatic Transfer Rate Adjustment for Transfer Reinforcement Learning Hitoshi Kono1, Yuto Sakamoto1, Yonghoon Ji2 and Hiromitsu Fujii3, 1Tokyo Polytechnic University, Japan,2Japan Advanced Institute of Science and Technology, Japan, 3Chiba Institute of Technology, Japan Full Text
250 11 6 Answer Set Programming to Model Plan Agent Scenarios Fernando Zacarias Flores, Rosalba Cuapa Canto and José María Ángeles López, Autonomous University of Puebla, México Full Text

International Journal of Fuzzy Logic Systems (IJFLS)

251 10 1 Interval Type-2 Intuitionistic Fuzzy Logic System for Time Series and Identification Problems - A Comparative Study Imo Eyoh1, Jeremiah Eyoh2 and Roy Kalawsky2, 1University of Uyo, Nigeria and 2Loughborough University, UK Full Text
252 10 1 A Simulation Based Study of A Greenhouse System with Intelligent Fuzzy Logic Niaz Mostakim1, Shuaib Mahmud2 and *Khalid Hossain Jewel3, 1Atish Dipankar University of Science and Technology, Bangladesh, 2Jatiya Kabi Kazi Nazrul Islam University, Bangladesh and 3Islamic University, Bangladesh Full Text
253 10 2 Application of Fuzzy Rule based System for Highway Research Board Classification of Soils Sujatha A1, L Govindaraju2 and N Shivakumar1, 1RV College of Engineering, India and 2University Visveswaraya College of Engineering, India Full Text
254 10 2 Breast Cancer Diagnosis Based on Genetic-fuzzy Logic and ANFIS Using WBCD Amany Mostafa Lotayef, Khaled H. Ibrahim and Rania Ahmed Abul Seoud, Fayoum University, Egypt Full Text
255 10 4 Annual Precipitation in Southern of Madagascar: Modeling using High Order Fuzzy Time Series Harimino Andriamalala Rajaonarisoa, Irrish Parker Ramahazosoa, Hery Zojaona Tantely Stefana Zafimarina Reziky, Adolphe Andriamanga Ratiarison, University of Antananarivo, Madagascar Full Text

International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

256 9 3 A Utilization of Convolutional Matrix Methods on Sliced Hippocampal Neuron Region Images for Cell Segmentation Neeraj Rattehalli and Ishan Jain, USA Full Text
257 9 4 SVM &Ga-clustering Based Feature Selection Approach for Breast Cancer Detection Rashmi Priya1 and Syed Wajahat Abbas Rizvi2, 1GD Goenka University, India,2Amity University, India Full Text

Machine Learning and Applications: An International Journal (MLAIJ)

258 7 2 Quantum Criticism: an Analysis of Political News Reporting Ashwini Badgujar, Sheng Chen, Pezanne Khambatta, Tuethu Tran, Andrew Wang, Kai Yu, Paul Intrevado and David Guy Brizan, University of San Francisco, USA Full Text
259 7 4 A Newly Proposed Technique for Summarizing the Abstractive Newspapers’ Articles based on Deep Learning Sherif Kamel Hussein1,2, and Joza Nejer AL-Otaibi2, 1October University for Modern Sciences and Arts, Egypt, 2Arab East Colleges for Graduate Studies, KSA Full Text
260 7 4 A Deep Learning Model to Predict Congressional Roll Call Votes from Legislative Texts Jonathan Wayne Korn and Mark A. Newman, Harrisburg University, USA Full Text

Signal & Image Processing : An International Journal (SIPIJ)

261 11 6 Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Techniques Chiman Kwan and Jude Larkin, Applied Research, LLC, USA Full Text
262 11 6 Off-Line Arabic Handwritten Words Segmentation using Morphological Operators Nisreen AbdAllah1 and Serestina Viriri2, 1Sudan University of Science and Technology, Sudan and 2University of KwaZulu-Natal, South Africa Full Text
263 11 6 Neighbour Local Variability for Multi-Focus Images Fusion Ias Sri Wahyuni1 and Rachid Sabre2 Full Text
264 11 6 Facial Age Estimation using Transfer Learning and Bayesian Optimization based on Gender Information Marwa Ahmed1 and Serestina Viriri2, 1Sudan University of Science and Technology, Sudan, 2University of KwaZulu-Nata, South Africa Full Text
265 11 6 A Novel Graph Representation for Skeleton-based Action Recognition Tingwei Li, Ruiwen Zhang and Qing Li, Tsinghua University, China Full Text
266 11 5 Eye Gaze Estimation Invisible and IR Spectrum for Driver Monitoring System Susmitha Mohan and Manoj Phirke, HCL Technologies, India Full Text
267 11 5 Batch Normalized Convolution Neural Network for Liver Segmentation Fatima Abdalbagi1, Serestina Viriri2 and Mohammed Tajalsir Mohammed1, 1Sudan University of Science and Technology, Sudan, 2University of KwaZulu-Natal, South Africa Full Text
268 11 5 Comparison of Denoising Algorithms for Demosacing Low Lighting Images Using CFA 2.0 Chiman Kwan and Jude Larkin, Applied Research, LLC, USA Full Text
269 11 5 Face Verification Across Age Progression using Enhanced Convolution Neural Network Areeg Mohammed Osman1 and Serestina Viriri2, 1Sudan University of Science and Technology, Sudan, 2University of Kwa Zulu-Natal, South Africa Full Text
270 11 5 Bata-Unet: Deep Learning Model for Liver Segmentation Fatima Abdalbagi1, Serestina Viriri2 and Mohammed Tajalsir Mohammed1, 1Sudan University of Science and Technology, Sudan, 2University of KwaZulu-Natal, South Africa Full Text
271 11 4 Melanoma Cell Detection in Lymph Nodes Histopathological Images using Deep Learning Salah Alheejawi, Richard Berendt, Naresh Jha and Mrinal Mandal, University of Alberta, Canada Full Text
272 11 4 Gender Discrimination based on the Thermal Signature of the Face and the External Ear Georgia Koukiou and Vassilis Anastassopoulos, University of Patras, Greece Full Text
273 11 4 Demosaicing of Real Low Lighting Images using CFA 3.0 Chiman Kwan, Jude Larkin and Bence Budavari, Applied Research, LLC, USA Full Text
274 11 3 Demosaicing Mastcam Images using A New Color Filter Array Chiman Kwan and Jude Larkin, Applied Research, USA Full Text
275 11 3 Estimation of Separation and Location of Wave Emitting Sources : A Comparison Study between Parametric and Non-parametric Methods Mujahid F. AL-Azzo and Azzah T.Qaba, Ninevah University, Iraq Full Text
276 11 2 Strange Behaviors and Root Cause in the Compression of Previously Compressed Videos Chiman Kwan and Jude Larkin, Applied Research, LLC, USA Full Text
277 11 2 Secure OMP Based Pattern Recognition that Supports Image Compression Takayuki Nakachi1 and Hitoshi Kiya2 ,1 Nippon Telegraph and Telephone Corporation, Japan and 2 Tokyo Metropolitan University, Japan Full Text
278 11 1 Applying R-spatiogram in Object Tracking for Occlusion Handling Niloufar Salehi Dastjerdi and M. Omair Ahmad, Concordia University, Canada Full Text
279 11 1 Wavelet Decomposition and Alpha Stable Fusion Rachid Sabre1 and Ias Wahyuni2 , 1 University of Burgundy/Agrosup Dijon, France and 2 Universitas Gunadarma, Indonesia Full Text
280 11 1 Enhanced System for Computer-aided Detection of MRI Brain Tumors Umar Alqasmi, Ammar Alzuhair and Abduallah Bama'bad, King Abul-Aziz University, KSA Full Text
281 11 1 Suitable Mother Wavelet Selection for EEG Signals Analysis: Frequency Bands Decomposition and Discriminative Feature Selection Romain Atangana1,2,3 , Daniel Tchiotsop1 , GodpromesseKenne1 , Laurent Chanel Djoufack Nkengfack1,2 , 1 Unité de Recherche d’Automatique et d’InformatiqueAppliquée (UR-AIA), University of Dschang, Cameroon, 2 Unité de Recherche de Matière Condensée-d’Électronique et de Traitement du Signal (UR-MACETS), University of Dschang, Cameroon and 3 University of Ngaoundere, Cameroon Full Text
282 11 1 Advanced Single Image Resolution Upsurging Using A Generative Adversarial Network Md. Moshiur Rahman1 , Samrat Kumar Dey2 and Kabid Hassan Shibly2 , 1 Bangladesh Open University, Bangladesh and 2 Dhaka International University, Bangladesh Full Text

International Journal Of VLSI Design & Communication Systems (VLSICS)

283 11 6 Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs of Regular Three-dimensional Networks, Part II: Formalistic Architecture Realization Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan Full Text
284 11 6 Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs of Regular Three-dimensional Networks, Part III: Layout Congestion-free Effectuation Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan Full Text
285 11 5 Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs of Regular Three-dimensional Networks, Part I: Basics Anas N. Al-Rabadi, The University of Jordan, Jordan & Isra University, Jordan Full Text

International Journal on Soft Computing (IJSC)

286 11 4 An Inventory Management System for Deteriorating Items with Ramp Type and Quadratic Demand: A Structural Comparative Study Biswaranjan Mandal, Acharya Jagadish Chandra Bose College, India Full Text

Reach Us