Cache Discovery Policies of MANET

Author(s): Amer O. Abu Salem | Tareq Alhmiedat | Ghassan Samara
Volume: 3
Issue: 8
Year: 2013





Design and Analysis of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System

Author(s): Rajwinder Kaur | Kanwalvir Singh Dhindsa
Volume: 3
Issue: 7
Year: 2013





A Comparative Study of Machine Learning Techniques in Classifying Full-Text Arabic Documents versus Summarized Documents

Author(s): Khalil Al-Hindi | Eman Al-Thwaib
Volume: 3
Issue: 7
Year: 2013





Apple IOS Devices for Network Administrators

Author(s): Timur Mirzoev | Gerard Gingo | Mike Stawchansky | Tracy White
Volume: 3
Issue: 6
Year: 2013





Adapting the Ant Colony Optimization Algorithm to the Printed Circuit Board Drilling Problem

Author(s): Taisir Eldos | Aws Kanan | Abdullah Aljumah
Volume: 3
Issue: 5
Year: 2013





Image Inpainting by Kriging Interpolation Technique

Author(s): Firas A. Jassim
Volume: 3
Issue: 5
Year: 2013





Improving Performance of a Group of Classification Algorithms Using Resampling and Feature Selection

Author(s): Mehdi Naseriparsa | Amir-masoud Bidgoli | Touraj Varaee
Volume: 3
Issue: 4
Year: 2013





A Conceptual Nigeria Stock Exchange Prediction: Implementation Using Support Vector Machines-SMO Model

Author(s): Abubakar S. Magaji | Victor Onomza Waziri | Audu Isah | Adeboye K.R.
Volume: 3
Issue: 4
Year: 2013





Simulation of Improved Academic Achievement for a Mathematical Topic Using Neural Networks Modeling

Author(s): Saeed A. Al-Ghamdi | Abdel Aziz M. Al-Bassiouni | Hassan M. H. Mustafa | Ayoub Al-Hamadi
Volume: 3
Issue: 4
Year: 2013





Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era

Author(s): Timur Mirzoev | David Hillhouse | Bruce Benson | Mickey Lewis
Volume: 3
Issue: 3
Year: 2013





A Symmetric Variable–Key Stream (SVKS) Data Encryption Standard (DES) Model for Long Distance Communication

Author(s): O. Osunade
Volume: 3
Issue: 3
Year: 2013





A Negative Selection Algorithm Based on Email Classification Techniques

Author(s): Victor. Onomza Waziri | Ismaila Idris | Mohammed Bashir Abdullahi | Hahimi Danladi | Audu Isah
Volume: 3
Issue: 3
Year: 2013





Analysis on Backlinks and PageRank of Automotive Company Websites Using Crawler Tool

Author(s): Dina Agusten, ST., MMSI | Winarti, SKom., MMSI
Volume: 3
Issue: 2
Year: 2013





Cloud Computing in Higher Education in Jordan

Author(s): Samah A. Massadeh | Muhammad A. Mesleh
Volume: 3
Issue: 2
Year: 2013





Effect of Social Media on Website Popularity: Differences between Public and Private Universities in Indonesia

Author(s): Hanum Putri Permatasari | Donny Erlangga | Silvia Harlena | Reza Chandra
Volume: 3
Issue: 2
Year: 2013





Mobile Application for Diabetes Risk Diagnosis and Information Based on Android

Author(s): Remi Senjaya | Anindito Yoga Pratama | Dewi Agushinta R.
Volume: 3
Issue: 2
Year: 2013





An Optimized PID Control Strategy For Active Suspensions Applied To A Half Car Model

Author(s): Mohammed H. AbuShaban | Mahir B. Sabra | Iyad M. Abuhadrous
Volume: 3
Issue: 2
Year: 2013





Kriging Interpolation Filter to Reduce High Density Salt and Pepper Noise

Author(s): Firas Ajil Jassim
Volume: 3
Issue: 1
Year: 2013





Real-Time System: Fire and Smoking Control System (Case Study)

Author(s): Muhammed Ali Suliman Mesleh | Mohammed Ashraf Zoghoul
Volume: 3
Issue: 1
Year: 2013





Exploring the Educational Benefits of Blogs to Help Non-Malay Pupils in Malay Language Learning

Author(s): Nor Hasbiah Ubaidullah | Norhayati Mahadi | Lee Hooi Ching
Volume: 3
Issue: 1
Year: 2013





S-Scrum: a Secure Methodology for Agile Development of Web Services

Author(s): Davoud Mougouei | Nor Fazlida Mohd Sani | Mohammad Moein Almasi
Volume: 3
Issue: 1
Year: 2013





Framework Environment for Understanding Object Oriented Techniques

Author(s): Hamed J. Al-Fawareh
Volume: 3
Issue: 1
Year: 2013





A Comparison of Support Vector Machine and Multi-Level Support Vector Machine on Intrusion Detection

Author(s): Milad Aghamohammadi | Morteza Analoui
Volume: 2
Issue: 7
Year: 2012





Study of Effectiveness of Using ERP Systems in Cost Optimization of Just-In-Time Manufacturing Cases

Author(s): Muhannad Akram Ahmad
Volume: 2
Issue: 7
Year: 2012





A New Approach for Flexible Matching of Grid Resources

Author(s): Mehdi Bayat | Morteza Analoui
Volume: 2
Issue: 7
Year: 2012





An Analytical Comparison of Rough Set Theorybased Grid Resource Matching Algorithms

Author(s): Mehdi Bayat | Morteza Analoui
Volume: 2
Issue: 7
Year: 2012





Arabic Content Classification System Using statistical Bayes classifier With Words Detection and Correction

Author(s): Abdullah Mamoun Hattab | Abdulameer Khalaf Hussein
Volume: 2
Issue: 6
Year: 2012





Cournot and Bertrand Game Models for a Simple Spectrum Sharing Framework in Cognitive Radio Networks

Author(s): Hadi Malekpour | Reza Berangi
Volume: 2
Issue: 6
Year: 2012





Color Image Enhancement Using Steady State Genetic Algorithm

Author(s): Reyadh Naoum | Ala'a Al-Sabbah
Volume: 2
Issue: 6
Year: 2012





Framework Model for Strategic Plan Using Dynamic Workflow

Author(s): Reyadh Shaker Naoum | Abdulameer Khalf Hussain | Ziad Mohammad Abu-Hamour
Volume: 2
Issue: 5
Year: 2012





Evaluation and Comparison of Security Issues on Cloud Computing Environment

Author(s): Priyanka Arora | Arun Singh | Himanshu Tyagi
Volume: 2
Issue: 5
Year: 2012





Robust Digital Image Watermarking Technique Based on Histogram Analysis

Author(s): Hamza A. Ali | Sama’a A. K. khamis
Volume: 2
Issue: 5
Year: 2012





Multi-Level Support Vector Machine

Author(s): Milad Aghamohammadi | Morteza Analoui
Volume: 2
Issue: 5
Year: 2012





Electronic Payment Fraud Detection Techniques

Author(s): Adnan M. Al-Khatib
Volume: 2
Issue: 4
Year: 2012





A Biometric Model for Examination Screening and Attendance Monitoring in Yaba College of Technology

Author(s): Rufai M.M | Adigun J. O, N. A. Yekini
Volume: 2
Issue: 4
Year: 2012





A Generator of MVC-based Web Applications

Author(s): Strahinja Lazetic | Dusan Savic | Sinisa Vlajic | Sasa Lazarevic
Volume: 2
Issue: 4
Year: 2012





Hybridization Between Iterative Simulated Annealing and Modified Great Deluge for Medical Clustering Problems

Author(s): Anmar Abuhamdah | Bassam M. El-Zaghmouri | Anas Quteishat | Rawnaq Kittaneh
Volume: 2
Issue: 4
Year: 2012





Swap Training: A Genetic Algorithm Based Feature Selection Method Applied on Face Recognition System

Author(s): Ashkan Parsi | Mehrdad Salehi | Ali Doostmohammadi
Volume: 2
Issue: 4
Year: 2012





Leader Election Algorithm in 3D Torus Networks with the Presence of One Link Failure

Author(s): Mohammed Refai | Ibrahim AL-Oqily | Abed Alhamori
Volume: 2
Issue: 3
Year: 2012





Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification

Author(s): Reyadh Shaker Naoum | Zainab Namh Al-Sultani
Volume: 2
Issue: 3
Year: 2012





Performance Evaluation for VOIP over IP and MPLS

Author(s): Reyadh Shaker Naoum | Mohanand Maswady
Volume: 2
Issue: 3
Year: 2012





Performance Comparison of Face Recognition using Transform Domain Techniques

Author(s): Jossy P. George | Saleem S Tevaramani | K B Raja
Volume: 2
Issue: 3
Year: 2012





A Three Stages Segmentation Model for a Higher Accurate off-line Arabic Handwriting Recognition
Author(s): Said Elaiwat | Marwan AL-abed Abu-zanona | Farah Hanna AL-Zawaideh
Volume: 2
Issue: 3
Year: 2012




A Novel Approach for Energy Optimization of Wireless Sensors Network by Adaptive Clustering

Author(s): Rufaida Muhammad Shamroukh | Aryaf Abdullah Aladwan | Ana’am Abdullah Aladwan
Volume: 2
Issue: 2
Year: 2012





A Novel Study of Biometric Speaker Identification Using Neural Networks and Multi-Level Wavelet Decomposition

Author(s): Aryaf Abdullah Aladwan | Rufaida Muhammad Shamroukh | Ana’am Abdullah Aladwan
Volume: 2
Issue: 2
Year: 2012





An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students

Author(s): Husein Osman Abdullahi | Abdirizaq said
Volume: 2
Issue: 2
Year: 2012





Arabic Text Summerization Model Using Clustering Techniques

Author(s): Ahmad Haboush | Ahmad Momani | Maryam Al-Zoubi | Motassem Tarazi
Volume: 2
Issue: 2
Year: 2012




