


default search action
Journal of Computer Science, Volume 13
Volume 13, Number 1, 2017
- Susmit Bagchi

:
Computational Analysis of Network ODE Systems in Metric Spaces: An Approach. 1-10 - Lukman Ab. Rahim

, Ziyaulhaq Aliyu, Emy Elyanee Mustapha:
Evaluating the Usability of Model Transformations Testing Approach (MTTA). 11-21
Volume 13, Number 2, 2017
- Rafael Divino Ferreira Feitosa, Vinícius Araújo Santos, Leandro Luís Galdino de Oliveira, Díbio Leandro Borges, Lucas Calabrez Pereyra, Adriano Soares de Oliveira Bailão:

Statistical Pattern Recognition for Thresholding between Human Skin and Background in Color Images. 22-33 - Molamoganyi Gorata, Adamu Murtala Zungeru

, Mmoloki Mangwala, Joseph Monamati Chuma
:
Design and Implementation of Security in Healthcare Cloud Computing. 34-47
Volume 13, Number 3, 2017
- Sabeeka M. Al-Oun, Jehad Q. Odeh Alnihoud:

An Efficient Approach to Hide Compressed Voice Data in Arabic Text using Kashida and "La". 48-54 - Kale Sarika Prakash, Joe Prathap P. M

:
Tracking Pointer and Look Ahead Matching Strategy to Evaluate Iceberg Driven Query. 55-67
Volume 13, Number 4, 2017
- Heider Alvarenga de Jesus, Denilson Alves Pereira

:
Enriching an Authority File of Scientific Conferences with Information Extracted from the Web. 68-77 - Mohannad Moufeed Ayyash

:
Scrutiny of Relationship between E-Banking Information Quality Dimensions and Customer Satisfaction. 78-90
Volume 13, Number 5, 2017
- Diaa Eldin ElSaied, Habib Ullah Khan

:
Implementation of Health Information System-A Case Study of Magrabi Hospitals, KSA. 91-104 - Omar Dakkak

, Shahrudin Awang Nor, Suki Arif:
Scheduling Jobs through Gap Filling and Optimization Techniques in Computational Grid. 105-113 - Leau Yu Beng

, Ali Abdulrazzaq Khudher
, Selvakumar Manickam
, Samer Al-Salem:
An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness. 114-129 - Aya M. Mostafa, Ayman E. Khedr, A. Abdo:

Advising Approach to Enhance Students' Performance Level in Higher Education Environments. 130-139 - Belkacem Athamena

, Zina Houhamdi
:
An Exception Management Model in Multi-Agents Systems. 140-152
Volume 13, Number 6, 2017
- Husna Jamal Abdul Nasir, Ku Ruhana Ku-Mahamud

, Eiji Kamioka
:
Ant Colony Optimization Approaches in Wireless Sensor Network: Performance Evaluation. 153-164 - Manar AbuTalib:

Open Source Software in the UAE: Opportunities, Challenges and Recommendations (A Survey Research Study). 165-174 - Charinee Prompukdee, Jaratsri Rungrattanaubol, Chayanin Pratoomsoot

:
A Framework for Systematizing Personalized Thai Herbal Medicine: A Case Study Covering Gynecological Conditions. 175-183 - Atef A. Obeidat

:
Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters. 184-191 - Carlos Roberto Valêncio, André Francisco Morielo Caetano

, Angelo Cesar Colombini
, Mário Luiz Tronco
, Márcio Zamboti Fortes:
A Fast Access Big Data Approach for Configurable and Scalable Object Storage Enabling Mixed Fault-Tolerance. 192-198 - Smitha Rajagopal, Katiganere Siddaramappa Hareesha, Poornima Panduranga Kundapur

:
Optimising Pair Programming in a Scholastic Framework: A Design Pattern Perspective. 199-210
Volume 13, Number 7, 2017
- Paola A. Sánchez-Sánchez, José Rafael García-González

:
A New Methodology for Neural Network Training Ensures Error Reduction in Time Series Forecasting. 211-217 - Thato Solomon, Adamu Murtala Zungeru

, Rajalakshmi Selvaraj, Mmoloki Mangwala, Joseph Monamati Chuma
:
Network Traffic Model: A Case of BIUST Network. 218-227 - Ashraf Abazeed, Moaiad Ahmad Khder

:
A Classification and Prediction Model for Student's Performance in University Level. 228-233 - Shweta Malhotra

, Mohammad Najmud Doja, Bashir Alam
, Mansaf Alam
:
E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System. 234-246 - Chaipichit Cumpim, Rachu Punchalard:

High Density Salt and Pepper Noise Filter based on Shepard Interpolation Method. 247-256
Volume 13, Number 8, 2017
- Falilat Jimoh, Simon Parkinson

, Thomas Leo McCluskey
:
A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. 257-274 - Adamu M. Noma, Abdullah Muhammed

, Mohamad Afendee Mohamed, Z. Ahmad Zulkarnain:
A Review on Heuristics for Addition Chain Problem: Towards Efficient Public Key Cryptosystems. 275-289 - Mohammed I. Al-Saleh

, Rasha K. Al-Huthaifi
:
On Improving Antivirus Scanning Engines: Memory On-Access Scanner. 290-300 - Talal Talib Jameel:

Load Balancing For Cloud-Based Dynamic Data Processing. 301-306 - Anderson Silva Marcolino, Edson OliveiraJr, Itana M. S. Gimenes, Ellen F. Barbosa:

Variability Resolution and Product Configuration with SMarty: An Experimental Study on UML Class Diagrams. 307-319 - Ashwini Janagal Padmanabha, Sanjay Harogolige Adimurthy:

Framework for Enhancing the Performance of Data Intensive MPI based HPC applications on Cloud. 320-328 - Atef A. Obeidat

, Majd M. Al-Kofahi
, Mohammad Jazi Bawaneh, Essam Said Hanandeh:
A Novel Botnet Detection System for P2P Networks. 329-336 - Basma Hisham, Alaa Hamouda:

Arabic Static and Dynamic Gestures Recognition Using Leap Motion. 337-354 - Heri Kuswanto

, Yogi Sarumaha, Hayato Ohwada:
Comparison Between Selective Sampling and Random Undersampling for Classification of Customer Defection Using Support Vector Machine. 355-362 - Saufi Bukhari

, Ku Ruhana Ku-Mahamud
, Hiroaki Morino:
Fault Tolerance Grid Scheduling with Checkpoint Based on Ant Colony System. 363-370
Volume 13, Number 9, 2017
- Mahmoud Zaki Iskandarani

:
Correlating and Modeling of Extracted Features from PVT Images of Composites using Optical Flow Technique and Weight Elimination Algorithm Optimization [OFT-WEA]. 371-379 - Amina Kharbach, Mouad el Omari, Amar Mardani, Benaissa Bellach

, Mohammed Rahmoun:
Medical Images Registration based on Normalized Dissimilarity Index. 380-392 - Intan Sari Areni, Asyraful Insan Asry, Indrabayu:

A Hybrid Feature Extraction Method for Accuracy Improvement in "Aksara Lontara" Translation. 393-399 - Hajer Mohamed H. Ben Amer, Leelavathi Rajamanickam, Anas A. Abboud:

Liveness Detection from Real user, Printed Pictures and Pictures on Mobile Devices from Low Resolution Webcam. 400-407 - Tb. Ai Munandar

, Sumiati
:
The Classification of Cropping Patterns Based on Regional Climate Classification Using Decision Tree Approach. 408-415 - Manal Elobaid, Rafida M. Elobaid

:
An Exploratory Analysis to Assess Computer Literacy and E-learning Among Students: A Case of Eastern Province of Kingdom of Saudi Arabia. 416-421 - Lock Siew Han, Mohd Jan Nordin:

Integrated Multiple Linear Regression-One Rule Classification Model for the Prediction of Stock Price Trend. 422-429 - Iman Ahmed ElSayed, Zeinab Ezz, Eman Nasr:

Goal Modeling Techniques in Requirements Engineering: A Systematic Literature Review. 430-439 - Manal Zettam

:
A Randomized Population Constructive Heuristic for the Team Orienteering Problem. 440-451 - Sami Qawasmeh, Arwa Zabian:

DPSA: Deterministic Parallel Search Algorithm in Large Database. 452-459
Volume 13, Number 10, 2017
- Chakib Tadj, Moeiz Miraoui

, Somia Belaidouni:
Using MVCA to Improve Architecture Modularity of Smart Spaces. 460-469 - Edson OliveiraJr

, Ricardo Theis Geraldi
:
Defect Types and Software Inspection Techniques: a Systematic Mapping Study. 470-495 - B. Ravi Prasad

:
Real Time Density-Based Clustering (RTDBC) Algorithm for Big Data. 496-504 - Ahmad Abdel Jabbar Ahmad Mazhar

, Ayman Mahmoud Aref Abdalla
:
Trade-Off of Frame-Rate and Resolution in Online Game Streaming. 505-513 - Vivek Sharma

, Bashir Alam
, Mohammad Najmud Doja:
ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks. 514-523 - Atef Zaki Ghalwash, Aliaa Abdel-Halim Youssif, Ali Mohamed Nabil Allam:

Segmentation of Exudates via Color-based K-means Clustering and Statistical-based Thresholding. 524-536 - Naveen Hemrajani

, Sunil Kumar Jangir
:
A Comprehensive Review and Performance Evaluation of Detection Techniques of Black Hole Attack in MANET. 537-547 - Ja'afer Al-Saraireh

:
An Efficient Approach for Query Processing Over Encrypted Database. 548-557 - Bandar M. Alshammari

:
Enterprise Architecture Security Assessment Framework (EASAF). 558-571 - Emansa Hasri Putra, Risanuri Hidayat

, Widyawan, I Wayan Mustika:
A Routing Optimization Based on Cross-Layer Design for Wireless Multimedia Sensor Networks (WMSNs). 572-580
Volume 13, Number 11, 2017
- Che Samihah Che Dalim, Hoshang Kolivand

, Huda Kadhim, Mohd Shahrizal Sunar
, Mark Billinghurst
:
Factors Influencing the Acceptance of Augmented Reality in Education: A Review of the Literature. 581-589 - Avinanta Tarigan

, Dewi Agushinta R., Adang Suhendra, Fikri Budiman
:
Determination of SVM-RBF Kernel Space Parameter to Optimize Accuracy Value of Indonesian Batik Images Classification. 590-599 - Hery Harjono Muljo, Bens Pardamean

, Anzaludin S. Perbangsa
:
The Implementation of Online Learning for Early Detection of Cervical Cancer. 600-607 - Mahmoud A. Fakhreldin, Ahmed Farag Seddik

:
Cloud Based Low Cost Retinal Detachment Screening Method Using Data Mining Techniques. 608-616 - Anderson Silva Marcolino, Edson OliveiraJr

:
Comparing SMarty and PLUS for Variability Identification and Representation at Product-Line UML Class Level: A Controlled Quasi-Experiment. 617-632 - Abdallah Rhattoy, Mohammed Lahmer

, Idriss Chana
:
Impact of the Smart City Architecture, Speed and Traffic Density of Vehicles on the Performances of Vanets. 633-646 - Yonis Gulzar

, Ali Amer Alwan
, Norsaremah Salleh
, Imad Fakhri Al Shaikhli:
Processing Skyline Queries in Incomplete Database: Issues, Challenges and Future Trends. 647-658 - Lauro Cássio Martins de Paula

, Anderson da Silva Soares, Telma Woerle de Lima Soares, Anselmo E. de Oliveira, Clarimar José Coelho:
Modern Metaheuristic with Multi-Objective Formulation for the Variable Selection Problem. 659-666 - O. Imocha Singh, T. Romen Singh:

Image Binarization Using Block Boundary Pixels Mean. 667-673 - Shereen Ismail

, Eman Alkhader, Amal Ahmad
:
Prison Perimeter Surveillance System Using WSN. 674-679
Volume 13, Number 12, 2017
- Sanjay Kumar, Surjit Paul

, Dilip Kumar Shaw
:
Real-Time Multimodal Biometric User Authentication for Web Application Access in Wireless LAN. 680-693 - Rajni Jindal

, Alka Singhal:
Performance Analysis for the Ontology based Intelligent Information Retrieval using Non Monotonic Inference Logic using SPARQL. 694-701 - Karim Zkik

, Maha Tebaa, Tarik Tachihante, Ghizlane Orhanou:
A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds. 702-717 - Andrija Bernik

, Danijel Radosevic, Daniel Strmecki:
Research on Efficiency of Applying Gamified Design into University's e-Courses: 3D Modeling and Programming. 718-727 - Indah Mekar Sari, Dana Sulistiyo Kusumo, Mira Kania Sabariah:

Analysis of Interaction Design Patterns on Drawing Application for Early Preschool Children using Inductive Approach (Case Study: ABC Coloring Book for Toddlers and Tracer-hand Writing Pattern Drawing Application). 728-734 - Malik Qasaimeh, Raad S. Al-Qassas

:
Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements. 735-747 - Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi

:
Segmented Block Cipher Algorithm Based on ASCII-Codes Maneuver. 748-755 - Alaa Omer Najim

, Nor Asilah Wati Abdul Hamid, Zurina Mohd Hanapi
, Idawaty Ahmad:
Comparative Study of Packet Scheduling Algorithm in LTE Network. 756-766 - Sayed Chhattan Shah

:
A Mobile Ad hoc Cloud Computing and Networking Infrastructure for Automated Video Surveillance System. 767-780 - Deepa S. Kumar, M. Abdul Rahman:

Performance Evaluation of Apache Spark Vs MPI: A Practical Case Study on Twitter Sentiment Analysis. 781-794 - Naveed Ahmed

:
Multi-View RGB-D Video Analysis and Fusion for 360 Degrees Unified Motion Reconstruction. 795-804

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














