Journal Contents: International Journal of Information Technology and Web Engineering (IJITWE)

Volume 19 (2024)
Issue 1
Article 23
Personalized Recommendation Method of E-Commerce Products Based on In-Depth User Interest Portraits (pages 1-15)
Jingyi Li (Chongqing City Vocational College, China), Shaowu Bao (Anhui Agricultural University, China)
Article 24
Application of QGA-BP Neural Network in Debt Risk Assessment of Government Platforms (pages 1-18)
Qingping Li (Huainan Normal University, China), Ming Liu (Huainan Normal University​, China), Yao Zhang (Southwestern University of Finance and Economics, China)
Article 36
Research on VRP Model Optimization of Cold Chain Logistics Under Low-Carbon Constraints (pages 1-14)
Ruixue Ma (Henan Geology Mineral College, China), Qiang Zhu (Hunan University, China)
Article 86
Quantitative Evaluation Method of Psychological Quality of College Teachers Based on Fuzzy Logic (pages 1-19)
Liangqun Yang (Neijiang Normal University, China), Jian Li (The 29th Research Institute of China Electronics Technology Group Corporation, China)
Article 86
Exploration of College Students' Learning Adaptability Under the Background of Wisdom Education (pages 1-12)
Henan Zhang (The National Police University for Criminal Justice, China), Xiangzhe Liu (North China Electric Power University, China)
Article 86
Supplier Evaluation in Supply Chain Environment Based on Radial Basis Function Neural Network (pages 1-18)
Shilin Liu (Beijing University of Posts and Telecommunications, China), Guangbin Yu (Beijing Zhongtianruiheng Technology Co. Ltd., China), Youngchul Kim (Hanseo University, South Korea)
Article 87
Emotional Behavior Analysis of Music Course Evaluation Based on Online Comment Mining (pages 1-20)
Nan Li (Anyang Vocational and Technical College, China)
Article 91
GA-BP Optimization Using Hybrid Machine Learning Algorithm for Thermopile Temperature Compensation (pages 1-14)
Ye Aifen (Zhejiang College of Security Technology, China), Lin Shuwan (Wenzhou University, China), Wang Huan (Wenzhou University, China)
Article 98
Manufacturing Process Optimization in the Process Industry (pages 1-20)
Shilin Liu (Beijing University of Posts and Telecommunications, China), Hanlie Cheng (COSL-EXPRO Testing Services Co., Ltd., China)
Volume 18 (2023)
Issue 1
Article 3
A Course Recommendation Algorithm for a Personalized Online Learning Platform for Students From the Perspective of Deep Learning (pages 1-17)
Zhengmeng Xu (Industrial and Commercial Bank of China, China), Hai Lin (Hebei Finance University, China), Meiping Wu (Guangzhou Health Science College, China)
Article 8
Classroom Design and Application of Art Design Education Based on Artificial Intelligence (pages 1-18)
Yawen Zhao (Jiaozuo Normal College, China), Licheng Gao (Jiaozuo Normal College, China)
Article 12
A Meta-Analysis of Facebook-Assisted Learning Outcomes in Different Countries or Regions (pages 1-18)
Liheng Yu (School of Engineering, University of Birmingham, UK), Wei Xu (Faculty of Humanities and Social Sciences, City University of Macau, Macau), Paisan Sukjairungwattana (Faculty of Liberal Arts, Mahidol University, Thailand), Zhonggen Yu (Department of English Studies, Faculty of Foreign Studies, Beijing Language and Culture University, Beijing, China)
Article 13
Analysis of Application and Creation Skills of Story-Based MV Micro Video and Big Multimedia Data in Music Communication (pages 1-17)
Xi Zhang (Hebei Normal University for Nationalities, China), Yue Cui (Hebei Normal University for Nationalities, China)
Article 18
The Rating of Basketball Players' Competitive Performance Based on RBF-EVA Method (pages 1-16)
Jian Jia (Shangqiu Engineering College, China), Hua Chen (Jiangsu Vocational College of Medicine, China)
Article 19
Echo State Network-Based Content Prediction for Mobile Edge Caching Networks (pages 1-16)
Zengyu Cai (Zhengzhou University of Light Industry, China), Xi Chen (Zhengzhou University of Light Industry, China), Jianwei Zhang (Zhengzhou University of Light Industry, China), Liang Zhu (Zhengzhou University of Light Industry, China), Xinhua Hu (Zhengzhou University of Light Industry, China)
Article 26
Application of Big Data Privacy Protection Based on Edge Computing in the Prediction of Martial Arts Training Movement Trajectory (pages 1-14)
Xing Li (Wuhan University of Technolog, China & Handan University, China), ZhiYing Cui (Handan University, China), FeiFei Zhang (Handan University, China), Li Li (Shaanxi Xueqian Normal University, China)
Article 36
Article 37
Matching Prediction of Teacher Demand and Training Based on SARIMA Model Based on Neural Network (pages 1-15)
Jianliu Zhu (Shang Hai Nanhu Polytechnic College, China)
Article 38
Evaluating the User Interface and Usability Approaches for E-Learning Systems (pages 1-25)
Jehad Saad Alqurni (Department of Educational Technologies, College of Education, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia)
Article 39
Deep Semantic-Level Cross-Domain Recommendation Model Based on DSV-CDRM (pages 1-20)
Xuewei Lai (College of Information and Media, Sanmenxia Polytechnic, China), Qingqing Jie (Laboratory Medicine Department, Sanmenxia Central Hospital, China)
Article 57
Predicting the Success of a Startup in Information Technology Through Machine Learning (pages 1-17)
Edilberto Vasquez (AI Group, Universidad Nacional Mayor de San Marcos, Peru), José Santisteban (AI Group, Universidad Nacional Mayor de San Marcos, Peru), David Mauricio (AI Group, Universidad Nacional Mayor de San Marcos, Peru)
Article 57
Data Collection and Analysis in Physical Education Practical Teaching Based on Internet of Things (pages 1-15)
Yang Xu (University of Sanya, China), Min Liu (Shaanxi Xueqian Normal University, China)
Article 65
Basketball Footwork and Application Supported by Deep Learning Unsupervised Transfer Method (pages 1-17)
Yu Feng (Dongguan City College, China), Hui Sun (Dongguan City College, China)
Article 71
Implementation of a Web Application and GIS Electronic Atlas for Teaching in Open Education (pages 1-23)
Saule Kairollovna Damekova (Shokan Ualikhanov Kokshetau University, Kazakhstan), Lyubov Nikolaevna Karassyova (Shokan Ualikhanov Kokshetau University, Kazakhstan), Nurlan Amirovich Medetov (Shokan Ualikhanov Kokshetau University, Kazakhstan), Zamzagul Manapovna Ozhibayeva (Shokan Ualikhanov Kokshetau University, Kazakhstan), Bozhidar Tsvetkov (Bulgarian Youth Forum, Bulgaria)
Article 75
Power System Relay Protection Based on Faster R-CNN Algorithm (pages 1-15)
Yong Liu (Chengdu Vocational and Technical College of Industry, China), Zhengbiao Jing (Chengdu Vocational and Technical College of Industry, China)
Article 77
Exploration on Portfolio Selection and Risk Prediction in Financial Markets Based on SVM Algorithm (pages 1-16)
Xinyu Han (Harbin University of Commerce, China), Dianqi Yao (The Hong Kong Polytechnic University, China)
Article 79
Influence of Agriculture M(i) Services on Rice Planting Costs on Chinese Family Farms (pages 1-19)
Zhang Cheng (School of Economics and Finance, Yangtze Normal University, Chongqing, China), Ni Hu (Southwest University of Science and Technology, Mianyang, China)
Article 82
The Economic Development Model and Strategy Selection of the Internet of Things Based on Big Data (pages 1-16)
Xuelin Chen (Xinyang Agriculture and Forestry University, China), Xia Zhao (Henan Polytechnic Institute, China), Na Ye (Shandong University of Engineering and Vocational Technology, China)
Article 88
Sports Work Strategy of College Counselors Based on MySQL Database Big Data Analysis (pages 1-14)
Xiao Zhang (Jiangxi Science and Technology Normal University, China), Ali Yu (Jiangxi Science and Technology Normal University, China), Xin Wang (Jiangxi Science and Technology Normal University, China), Xue Zhang (Henan University of Technology, China)
Article 95
A TBGAV-Based Image-Text Multimodal Sentiment Analysis Method for Tourism Reviews (pages 1-17)
Ke Zhang (College of Economics and Management, Neijiang Normal University, Neijiang, Sichuan, 641100, China & Faculty of Business, Economics and Accountancy, Universiti Malaysia Sabah, Kota Kinabalu, Sabah, 88400, Malaysia), Shunmin Wang (College of Economics and Management, Neijiang Normal University, Neijiang, Sichuan, 641100, China), Yuanyu Yu (College of Artificial Intelligence, Neijiang Normal University, Neijiang, Sichuan, 641100, China)
Article 97
Application of Long-Term Poverty Alleviation Mechanism in Chengde From the Perspective of Big Data Based on Computational Neural Model Fuzzy Algorithm (pages 1-16)
Yanjie Zhu (Chengde Medical University, China), Chunzheng Fu (Chengde Medical University, China)
Article 98
Assessing the Usability of E-Learning Software Among University Students: A Study on Student Satisfaction and Performance (pages 1-26)
Jehad Alqurni (Department of Educational Technologies, College of Education, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia)
Article 98
Application of Big Data in Entrepreneurship and Innovation Education for Higher Vocational Teaching (pages 1-16)
Long Chen (Hangzhou Polytechnic, China), Jiang He (Chengdu Normal University, China)
Volume 17 (2022)
Issue 1
Article 9
Research Trends on Business Process Management in Higher Education and Recommendations for Vietnam (pages 1-21)
Anh Hoang (Hanoi University of Industry, Vietnam), Kha Van Phan (The Vietnam National Institute of Educational Sciences, Vietnam), Vijender Kumar Solanki (CMR Institute of Technology, Hyderabad, India)
Article 15
Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart Systems (pages 1-15)
Jiguang Duan (Institute for Nationalities, Hebei Normal University, China), Yan Li (Shijiazhuang University, China), Liying Duan (Shijiazhuang University, China), Amit Sharma (Jaypee University of Information Technology, India)
Article 16
An Integrated Remote Control-Based Human-Robot Interface for Education Application (pages 1-18)
Xue-xi Duan (CangZhou Vocational Technology College, China), Yun-ling Wang (CangZhou Vocational Technology College, China), Wei-shan Dou (CangZhou Vocational Technology College, China), Rajeev Kumar (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India), Nitin Saluja (Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India)
Article 17
A Secure Data Transfer Approach With an Efficient Key Management Over Cloud (pages 1-21)
Lalit Mohan Gupta (Aligarh College of Engineering and Technology, Aligarh, India), Hitendra Garg (GLA University, Mathura, India), Abdus Samad (Aligarh Muslim University, Aligarh, India)
Article 22
Biometric Cloud Services for Web-Based Examinations: An Empirical Approach (pages 1-25)
Meennapa Rukhiran (Rajamangala University of Technology Tawan-OK, Thailand.), Sorapak Pukdesree (Rangsit University, Thailand), Paniti Netinant (Rangsit University, Thailand)
Article 28
Sentiment Analysis on Movie Reviews Dataset Using Support Vector Machines and Ensemble Learning (pages 1-23)
Razia Sulthana A. (Birla Institute of Technology and Science, Pilani, Dubai, UAE), Jaithunbi A. K. (R. M. D. Engineering College, India), Haritha Harikrishnan (University of Dubai, UAE), Vijayakumar Varadarajan (University of New South Wales, Australia)
Article 38
Winning the War on Terror: Using “Top-K” Algorithm and CNN to Assess the Risk of Terrorists (pages 1-15)
Yaojie Wang (Engineering University of PAP, China), Xiaolong Cui (Engineering University of PAP, China), Peiyong He (Engineering University of PAP, China)
Article 39
Extracting Entity Synonymous Relations via Context-Aware Permutation Invariance (pages 1-17)
Nan Yan (Anhui Polytechnic University, China), Subin Huang (Anhui Polytechnic University, China), Chao Kong (Anhui Polytechnic University, China)
Article 47
Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology (pages 1-14)
Sekar S. (Sengunthar Arts and Science College, India), Annamalai Solayappan (Sri Subramaniya Swamy Government Arts College, India), Srimathi J. (Vivekanandha Institute of Information and Management Studies, India), S. Raja (SRM Valliammai Engineering College, India), Durga S. (KLEF, K. L. University, India), Poongodi Manoharan (Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar), Mounir Hamdi (Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar), Godwin Brown Tunze (Mbeya University of Science and Technology, Tanzania)
Article 48
Smart Contracts Security Threats and Solutions (pages 1-30)
Senou Mahugnon Rosaire (Institute of Mathematics and Physics, University of Abomey-Calavi, Benin), Degila Jules (Institute of Mathematics and Physics, University of Abomey-Calavi, Benin)
Article 49
Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network (pages 1-14)
Tamil Selvi P. (Michael Job College of Arts and Science for Women, India), Kishore Balasubramaniam (Dr. Mahalingam College of Engineering and Technology, India), Vidhya S. (PKR Arts College for Women, India), Jayapandian N. (Christ University, India), Ramya K. (PA College of Engineering and Technology, India), Poongodi M. (Division of Informational and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar), Mounir Hamdi (Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar), Godwin Brown Tunze (Mbeya University of Science and Technology, Tanzania)
Article 50
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML (pages 1-11)
Dharmendra Kumar Singh Singh (Dr. C. V. Raman University, India), Nithya N. (Sona College of Technology, India), Rahunathan L. (Kongu Engineering College, India), Preyal Sanghavi (R. B. Institute of Management Studies Gujarat Technological University, India), Ravirajsinh Sajubha Vaghela (R. B. Institute of Management Studies Gujarat Technological University, India), Poongodi Manoharan (Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar), Mounir Hamdi (Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar), Godwin Brown Tunze (Mbeya University of Science and Technology, Tanzania)
Article 51
Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach (pages 1-20)
Romil Rawat (University of Extremadura, Spain), Sanjaya Kumar Sarangi (Utkal University, Bhubaneswar, India), Yagya Nath Rimal (Pokhara University, Nepal), P. William (Sanjivani College of Engineering, SPPU, Pune-India), Snehil Dahima (SIES College of Management Studies, India), Sonali Gupta (J.C. Bose University of Science and Technology, India), K. Sakthidasan Sankaran (Hindustan Institute of Technology and Science, India)
Article 52
Predicting Academic Performance of Immigrant Students Using XGBoost Regressor (pages 1-19)
Selvaprabu Jeganathan (B. S. Abdur Rahman Crescent Institute of Science and Technology, India), Arun Raj Lakshminarayanan (B. S. Abdur Rahman Crescent Institute of Science and Technology, India), Nandhakumar Ramachandran (VIT-AP University, India), Godwin Brown Tunze (Mbeya University of Science and Technology, Tanzania)
Article 53
Microclustering-Based Multi-Class Classification on Imbalanced Multi-Relational Datasets (pages 1-13)
Hemlata Pant (Babu Banarasi Das University, India), Reena Srivastava (Babu Banarasi Das University, India)
Article 53
MHDNNL: A Batch Task Optimization Scheduling Algorithm in Cloud Computing (pages 1-17)
Qirui Li (Guangdong University of Petrochemical Technology, China), Zhiping Peng (Jiangmen Polytechnic, China), Delong Cui (Guangdong University of Petrochemical Technology, China), Jianpeng Lin (South China University of Technology, China), Jieguang He (Guangdong University of Petrochemical Technology, China)
Article 54
Relationship Between Personality Patterns and Harmfulness: Analysis and Prediction Based on Sentence Embedding (pages 1-24)
Kazuyuki Matsumoto (Tokushima University, Japan), Ryota Kishima (Tokushima University, Japan), Seiji Tsuchiya (Doshisha University, Japan), Tomoki Hirobayashi (Yamada Denken Co., Ltd., Japan), Minoru Yoshida (Tokushima University, Japan), Kenji Kita (Tokushima University, Japan)
Article 59
A New Internet of Things (IoT) Framework for Public Sectors (pages 1-15)
Sara Jeza Alotaibi (Institute of Public Administration, Saudi Arabia)
Article 64
Binary Self-Adaptive Salp Swarm Optimization-Based Dynamic Load Balancing in Cloud Computing (pages 1-25)
Bivasa Ranjan Parida (Department of Computer Science and Engineering, Veer Surendra Sai University of Technology, Burla, Odisha, India), Amiya Kumar Rath (Department of Computer Science and Engineering, Veer Surendra Sai University of Technology, Burla, Odisha, India), Hitesh Mohapatra (Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India)
Article 65
Research on System Risks of “Internet + Supply Chain Finance” Based on SNA, Dynamic Evolutionary Game, and Bayesian Learning Principle Simulation (pages 1-16)
Ji Lu Liu (Zhejiang Wanli University, China), Ni Hu (Southwest University of Science and Technology, China), Cheng Zhang (Yangtze Normal University, China)
Article 68
On Cost-Aware Heterogeneous Cloudlet Deployment for Mobile Edge Computing (pages 1-23)
Hengzhou Ye (Guilin University of Technology, China), Fengyi Huang (Guilin University of Technology, China), Wei Hao (Guilin University of Technology, China)
Article 69
Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020 (pages 1-23)
Cheng Zhang (Yangtze Normal University, China), Ni Hu (Southwest University of Science and Technology, China), Qiang Yan (Hezhou University, China)
Article 69
Multi-Objective Optimization-Oriented Resource Allocation in the Fog Environment: A New Hybrid Approach (pages 1-25)
Sonti Harika (Koneru Lakshmaiah Education Foundation, India), B. Chaitanya Krishna (Koneru Lakshmaiah Education Foundation, India)
Article 70
Intelligent Anti-Jamming Decision Algorithm of Bivariate Frequency Hopping Pattern Based on DQN With PER and Pareto (pages 1-23)
Jiasheng Zhu (Hangzhou Dianzi University, China), Zhijin Zhao (School of Communication Engineering, Hangzhou Dianzi University, China), Shilian Zheng (Science and Technology on Communication Information Security Control Laboratory, China)
Article 71
Development of Mobile Learning English Web Application: Adoption of Technology in the Digital Teaching and Learning Framework (pages 1-25)
Meennapa Rukhiran (Rajamangala University of Technology Tawan-ok, Thailand), Arpaporn Phokajang (Rangsit University, Thailand), Paniti Netinant (Rangsit University, Thailand)
Article 71
A Semantic and Smart Framework for Handling Multilingual Linguistic Knowledge: A Framework and Case Implementation (pages 1-20)
Mariem Neji (MIRACL, Tunisia), Fatma Ghorbel (MIRACL, Tunisia), Bilel Gargouri (MIRACL, Tunisia), Nada Mimouni (ISID, CEDRIC, France), Elisabeth Métais (CNAM, France)
Article 71
SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches (pages 1-19)
Romil Rawat (Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), Bhagwati Garg (Union Bank of India, Gwalior, India), Kiran Pachlasiya (NRI Institute of Science and Technology, Bhopal, India), Vinod Mahor (IPS College of Technology and Management, Gwalior, India), Shrikant Telang (Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), Mukesh Chouhan (Government Polytechnic College, Sheopur, India), Surendra Kumar Shukla (Graphic Era University (Deemed), Deharadun, India), Rina Mishra (Shri Vaishnav Vidyapeeth Vishwavidyalayaharda, India)
Article 91
An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm (pages 1-10)
Mazin S. Mohammed (University of Mosul, Iraq), Raya Basil Alothman (University of Mosul, Iraq)
Issue 2
Issue 3
Issue 4
Volume 16 (2021)
Issue 1
Special Issue on Big Data Analysis in Intelligent Decision Support Systems
Guest Editorial Preface
Gou Jin (College of Computer Science and Technology, Huaqiao University, China)
Article 1
Programmable Implementation and Blockchain Security Scheme Based on Edge Computing Firework Model (pages 1-22)
Bao Yi Qin (College of Information Engineering, Nanjing XiaoZhuang University, China), Zheng Hao (College of Information Engineering, Nanjing XiaoZhuang University, China), Zhao Qiang (Department of Information Systems, Schulich School of Business, Canada)
Article 2
A New Pedestrian Feature Description Method Named Neighborhood Descriptor of Oriented Gradients (pages 23-55)
Qian Liu (School of Information Engineering, Ningxia University, Ningxia, China), Feng Yang (School of Mechanical Electronic and Information Engineering, China University of Mining and Technology, China), XiaoFen Tang (School of Information Engineering, Ningxia University, Ningxia, China)
Article 3
Spectral-Spatial Classification of Hyperspectral Image Based on Support Vector Machine (pages 56-74)
Weiwei Yang (School of Electronics and Information Engineering (School of Big Data Science), Taizhou University, China), Haifeng Song (School of Electronics and Information Engineering (School of Big Data Science), Taizhou University, China)
Article 4
Research and Application of a Multidimensional Association Rules Mining Method Based on OLAP (pages 75-94)
Hairong Wang (North Minzu University, China), Pan Huang (North Minzu University, China), Xu Chen (North Minzu University, China)
Issue 2
Article 1
WDPMA: An MA-Based Model for Web Documents Prioritization (pages 1-24)
Santosh Kumar (ABES Engineering College, Ghaziabad, India), Ravi Kumar (ABES Engineering College, Ghaziabad, India)
Article 2
An Integer Linear Programming-Based Method for the Extraction of Ontology Alignment (pages 25-44)
Naima El Ghandour (LITIO Laboratory, Department of Computer Science, Université Oran1, Algeria), Moussa Benaissa (LITIO Laboratory, Department of Computer Science, Université Oran1, Algeria), Yahia Lebbah (LITIO Laboratory, Department of Computer Science, Université Oran1, Algeria)
Article 3
Towards Efficient Big Data Storage With MapReduce Deduplication System (pages 45-57)
Vijesh Joe (VV College of Engineering, India), Jennifer S. Raj (Gnanamani College of Technology, India), Smys S. (RVS Technical Campus, India)
Article 4
A Detector and Evaluation Framework of Abnormal Bidding Behavior Based on Supplier Portrait (pages 58-74)
Xinqiang Ma (College of Computer Science and Technology, Guizhou University, China), Xuewei Li (State Grid Zhejiang Procurement Company, China), Baoquan Zhong (Institute of Cyber-Systems and Control, Zhejiang University, China), Yi Huang (College of Artificial Intelligence, Chongqing University of Arts and Sciences, China), Ye Gu (State Grid Zhejiang Procurement Company, China), Maonian Wu (School of Information Engineering, Huzhou University, China), Yong Liu (Institute of Cyber-Systems and Control, Zhejiang University, China), Mingyi Zhang (College of Computer Science and Technology, Guizhou University, China)
Issue 3
Article 1
FaD-CODS Fake News Detection on COVID-19 Using Description Logics and Semantic Reasoning (pages 1-20)
Kartik Goel (Bhagwan Parshuram Institute of Technology, India), Charu Gupta (Bhagwan Parshuram Institute of Technology, India), Ria Rawal (Bhagwan Parshuram Institute of Techology, India), Prateek Agrawal (Lovely Professional University, India), Vishu Madaan (Lovely Professional University, India)
Article 2
Analyzing Linguistic Features for Classifying Why-Type Non-Factoid Questions (pages 21-38)
Manvi Breja (National Institute of Technology, Kurukshetra, India), Sanjay Kumar Jain (National Institute of Technology, Kurukshetra, India)
Article 3
A Robust Lightweight Data Security Model for Cloud Data Access and Storage (pages 39-53)
Pajany M. (Pondicherry Engineering College, India), Zayaraz G. (Pondicherry Engineering College, India)
Article 4
An Adaptable Secure Scheme in Mobile Ad hoc Network to Protect the Communication Channel From Malicious Behaviours (pages 54-73)
Srilakshmi R. (Koneru Lakshmaiah Education Foundation, India), Jaya Bhaskar M. (Koneru Lakshmaiah Education Foundation, India)
Issue 4
Article 1
Deadline-Constrained Cost-Effective Load-Balanced Improved Genetic Algorithm for Workflow Scheduling (pages 1-34)
Sandeep Kumar Bothra (Manipal University Jaipur, Jaipur, India), Sunita Singhal (Manipal University Jaipur, Jaipur, India), Hemlata Goyal (Manipal University Jaipur, Jaipur, India)
Article 2
A Long Short-Term Memory Neural Network for Daily NO2 Concentration Forecasting (pages 35-51)
Bingchun Liu (Tianjin University of Technology, China), Xiaogang Yu (Tianjin University of Technology, China), Qingshan Wang (Tianjin Agricultural University, China), Shijie Zhao (Tianjin University of Technology, China), Lei Zhang (Tianjin University of Technology, China)
Article 3
An Improved Sentiment Analysis Approach to Detect Radical Content on Twitter (pages 52-73)
kamel Ahsene Djaballah (University of Science and Technology Houari Boumediene, Algiers, Algeria), Kamel Boukhalfa (University of Science and Technology Houari Boumediene, Algiers, Algeria), Omar Boussaid (ERIC Laboratory EA 3083, University of Lyon 2, Lyon, France), Yassine Ramdane (ERIC Laboratory EA 3083, University of Lyon 2, Lyon, France)
Article 4
Conventional and Evolutionary Order Reduction Techniques for Complex Systems (pages 74-98)
Abha Kumari (Gautam Buddha University, Greater Noida, India), C. B. Vishwakarma (Gautam Buddha University, Greater Noida, India)
Volume 15 (2020)
Issue 1
Article 1
ThespisTRX: Causally-Consistent Read Transactions (pages 1-16)
Carl Camilleri (Department of Computer Information Systems, University of Malta, Malta), Joseph G. Vella (Department of Computer Information Systems, University of Malta, Malta), Vitezslav Nezval (Department of Computer Information Systems, University of Malta, Malta)
Article 2
A Novel Method to Dynamically Fix Threshold for Node Neighbourhood Based Link Prediction Techniques (pages 17-34)
Anand Kumar Gupta (Jaypee Institute of Information Technology, India), Neetu Sardana (Jaypee Institute of Information Technology, India)
Article 3
An Effective Recommender System Based on Clustering Technique for TED Talks (pages 35-51)
Faiz Maazouzi (University of Souk Ahras, Souk Ahras, Algeria), Hafed Zarzour (University of Souk Ahras, Souk Ahras, Algeria), Yaser Jararweh (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan)
Article 4
Impact of Method Noise on SAR Image Despeckling (pages 52-63)
Prabhishek Singh (Amity University Uttar Pradesh, Noida, India), Raj Shree (PI (CSTUP), Babasaheb Bhimrao Ambedkar University, Central University, Lucknow, India)
Article 5
Generating Summaries Through Unigram and Bigram: Text Summarization (pages 64-74)
Nesreen Mohammad Alsharman (WISE, Amman, Jordan), Inna V. Pivkina (NMSU, USA)
Article 6
An Intelligent System for Predicting a User Access to a Web Based E-Learning System Using Web Mining (pages 75-94)
Sathiyamoorthi V. (Sona College of Technology, India)
Issue 2
Article 1
A Semantic Matching Strategy for Very Large Knowledge Bases Integration (pages 1-29)
Antonio M. Rinaldi (Università degli Studi di Napoli Federico II, Naples, Italy), Cristiano Russo (University of Paris-Est Creteil (UPEC), Créteil, France), Kurosh Madani (Université Paris-Est - LISSI EA 3956, Créteil, France)
Article 2
Dealing with Precise and Imprecise Temporal Data in Crisp Ontology (pages 30-49)
Fatma Ghorbel (University of Sfax, Sfax, Tunisia), Fayçal Hamdi (CEDRIC - Conservatoire National des Arts et Métiers, Paris, France), Elisabeth Métais (CEDRIC Laboratory, Paris, France)
Article 3
IoT-Based Smart Home Process Management Using a Workflow Approach (pages 50-76)
Mohammed Eldjilali Ouldkablia (University of Oran 1 Ahmed Ben Bella, Oran, Algeria), Bouabdellah Kechar (University of Oran 1 Ahmed Ben Bella, Oran, Algeria), Samia Bouzefrane (Conservatoire National des Arts et Métiers, Paris, France)
Article 4
Using Query Expansion Techniques and Content-Based Filtering for Personalizing Analysis in Big Data (pages 77-101)
Sadek Menaceur (Laboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, Algeria), Makhlouf Derdour (Computer Sciences Department University of Larbi Tebessi, Tebessa, Algeria), Abdelkrim Bouramoul (MISC Lab & Fundamental Computer Science and its Applications Department Constantine2 University, Tebessa, Algeria)
Article 5
eHealth Adoption on Patients' Pre-Consultation Waiting Time: A Comparative Assessment of Two District Hospitals in Abuja, Nigeria (pages 102-113)
Iniobong Ekong (Department of Health Planning, Research and Statistics, FCT Health and Human Services Secretariat, Abuja, Nigeria), Oluwaseun Esan (Department of Community Health, Faculty of Clinical Sciences, Obafemi Awolowo University, Ile-Ife, Nigeria), Emeka Chukwu (Department of Computer Information System, University of Malta, Msida, Malta), Mohammed Kawu (Department of Health Planning,Research and Statistics, FCT Health and Human Services Secretariat, Abuja, Nigeria)
Issue 3
Article 1
TBHM: A Secure Threshold-Based Encryption Combined With Homomorphic Properties for Communicating Health Records (pages 1-17)
Lalit Mohan Gupta (APJ Abdul Kalam Technical University, Lucknow, India), Abdus Samad (University Women's Polytechnic, Aligarh Muslim University, Aligarh, India), Hitendra Garg (GLA University, Mathura, India)
Article 2
Learning Models for Concept Extraction From Images With Drug Labels for a Unified Knowledge Base Utilizing NLP and IoT Tasks (pages 18-33)
Sukumar Rajendran (Vellore Institute of Technology, Vellore, India), Prabhu J. (Vellore Institute of Technology, Vellore, India)
Article 3
On Using Multiple Disabilities Profiles to Adapt Multimedia Documents: A Novel Graph-Based Method (pages 34-60)
Asma Saighi (ReLa(CS)2 Laboratory, University of Oum El Bouaghi, Oum El Bouaghi, Algeria), Zakaria Laboudi (ReLa(CS)2 Laboratory, University of Oum El Bouaghi, Oum El Bouaghi, Algeria), Philippe Roose (E2S UPPA, University of Pau, Pau, Pyrénées-Atlantiques, France), Sébastien Laborie (Université de Pau et des Pays de l'Adour, Pau, Pyrénées-Atlantiques, France), Nassira Ghoualmi-Zine (Networks and Systems Laboratory, Badji Mokhtar University-Annaba, Annaba, Algeria)
Article 4
Analysis of Crime Data Using Neighbourhood Rough Sets (pages 61-75)
Lydia J Gnanasigamani (Vellore Institute of Technology, Vellore, India), Seetha Hari (Vellore Institute of Technology, Vellore, India)
Article 5
FLCEER: Fuzzy Logic Cluster-Based Energy Efficient Routing Protocol for Underwater Acoustic Sensor Network (pages 76-101)
Sathishkumar Natesan (School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India), Rajakumar Krishnan (School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India)
Issue 4
Article 1
A Novel Algorithm for Distributed Data Stream Using Big Data Classification Model (pages 1-17)
Yongxiao Qiu (Hebei Finance University, China), Guanghui Du (Hebei Finance University, China), Song Chai (China Mobile Group Hebei Co. Ltd., Baoding, China)
Article 2
A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems (pages 18-36)
Muthukumaran V. (VIT University, India), Ezhilmaran D. (VIT University, India)
Article 3
Spectral Clustering and Cost-Sensitive Deep Neural Network-Based Undersampling Approach for P2P Lending Data (pages 37-52)
Pankaj Kumar Jadwal (JK Lakshmipat University, Jaipur, India), Sonal Jain (JK Lakshmipat university, Jaipur, India), Basant Agarwal (Indian Institute of Information Technology, Kota, India)
Article 4
Implementation of Web Log Mining Device Under Apriori Algorithm Improvement and Confidence Formula Optimization (pages 53-71)
Lihua Zhu (Changzhou College of Information Technology, China)
Article 5
Integrity of E-Health Record Ensured With Context-Based Merkle Tree Through Temporal Shadow in Blockchain (pages 72-87)
Charanya R. (Vellore Institute of Technology, India), Saravanaguru R. A. K. (Vellore Institute of Technology, India)
Volume 14 (2019)
Issue 1
Special Issue on Recent Advances in Cloud Computing, Machine Learning, and Security in Web-Based Applications
Guest Editorial Preface
Yaser Jararweh (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan), Sanjaya Kumar Panda (Department of CSE and IT, Veer Surendra Sai University of Technology, Burla, India), Brojo Kishore Mishra (Department of IT, C V Raman College of Engineering, Bhubaneswar, India), Sheng-Lung Peng (National Dong Hwa University, Hualian, Taiwan)
Article 1
Dynamic Backfilling Algorithm to Increase Resource Utilization in Cloud Computing (pages 1-26)
Suvendu Chandan Nayak (Veer Surendra Sai University of Technology, Burla and C. V. Raman College of Engineering, Bhubaneswar, India), Sasmita Parida (C V Raman College of Engineering, Bhubaneswar, India), Chitaranjan Tripathy (Veer Surendra Sai University of Technology, Burla, India), Prasant Kumar Pattnaik (School of Computer Engineering, KIIT University, Bhubaneswar, India)
Article 2
An Approach for Load Balancing in Cloud Computing Using JAYA Algorithm (pages 27-41)
Subhadarshini Mohanty (Department of Computer Science and Engineering, Siksha O Anusandhan University, Bhubaneswar, India), Prashanta Kumar Patra (Department of Computer Science and Engineering, College of Engineering and Technology, Bhubaneswar, India), Mitrabinda Ray (Department of Computer Science and Engineering, Siksha O Anusandhan University, Bhubaneswar, India), Subasish Mohapatra (Department of Computer Science and Engineering, College of Engineering and Technology, Bhubaneswar, India)
Article 3
A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis (pages 42-65)
Sardar Khaliq Uzaman (Comsats University Islamabad, Abbottabad Campus, Abbottabad, Pakistan), Atta ur Rehman Khan (Faculty of Computing and Information Technology, Sohar University, Sohar, Oman), Junaid Shuja (COMSATS Institute of Information Technology, Abbottabad, Pakistan), Tahir Maqsood (Computer Science Department, COMSATS Institute of Information Technology, Abbottabad, Pakistan), Faisal Rehman (COMSATS Institute of Information Technology, Abbottabad, Pakistan), Saad Mustafa (COMSATS Institute of Information Technology, Abbottabad, Pakistan)
Article 4
An SVM-Based Ensemble Approach for Intrusion Detection (pages 66-84)
Santosh Kumar Sahu (Advanced Information Security Lab, National Institute of Technology, Rourkela, India), Akanksha Katiyar (Gurukul Kangri Vishwavidyalaya, Dehradun, India), Kanchan Mala Kumari (Department of Computer Science, Central University of Haryana, Mahendragarh, India), Govind Kumar (School of Computer Science and Informatics, Central University of Haryana, Mahendragarh, India), Durga Prasad Mohapatra (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India)
Article 5
A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network (pages 85-111)
Pooja Chaudhary (National Institute of Technology, Kurukshetra, Kurukshetra, Haryana, India), B. B. Gupta (National Institute of Technology, Kurukshetra, Kurukshetra, Haryana, India), Shashank Gupta (Birla Institute of Technology and Science, Pilani, India)
Article 6
A Hybrid Pre-Post Constraint-Based Framework for Discovering Multi-Dimensional Association Rules Using Ontologies (pages 112-131)
Emad Alsukhni (Department of Computer Information Systems, Yarmouk University, Irbid, Jordan), Ahmed AlEroud (Department of Computer Information Systems, Yarmouk University, Irbid, Jordan), Ahmad A. Saifan (Department of Software Engineering, Yarmouk University, Irbid, Jordan)
Issue 2
Article 1
A Multicriteria Group Decision Support System: An Approach Based Agents and Web Services (pages 1-26)
Nesrine Hamdani (Computer Science Laboratory of Oran (LIO), Department of Computer Science, Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella, Oran, Algeria), Djamila Hamdadou (Computer Science Laboratory of Oran (LIO), Department of Computer Science, Faculty of Exact and Applied Sciences, University of Oran 1 Ahmed Ben Bella, Oran, Algeria)
Article 2
Scalable l-Diversity: An Extension to Scalable k-Anonymity for Privacy Preserving Big Data Publishing (pages 27-40)
Udai Pratap Rao (Computer Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India), Brijesh B. Mehta (Computer Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India), Nikhil Kumar (Computer Engineering Department, Sardar Vallabhbhai National Institute of Technology, Surat, India)
Article 3
A Novel Scalable Signature Based Subspace Clustering Approach for Big Data (pages 41-51)
T. Gayathri (Department of CSE, Shri Vishnu Engineering College for Women, Bhimavaram, India), D. Lalitha Bhaskari (Department of CS&SE, College of Engineering, AUCE(A), Andhra University, Visakhapatnam, India)
Article 4
An Adaptive Approach Towards Computation Offloading for Mobile Cloud Computing (pages 52-73)
Archana Kero (Shri Guru Ram Rai Institute of Technology and Sciences, Dehradun, India), Abhirup Khanna (University of Melbourne, Melbourne, Australia), Devendra Kumar (College of Engineering Roorkee, Roorkee, India), Amit Agarwal (School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India)
Article 5
An Attribute-Based Assured Deletion Scheme in Cloud Computing (pages 74-91)
Fangfang Shan (State Key Laboratory of Integrated Service Network, School of Cyber Engineering, Xidian University, Xi'an, China), Hui Li (State Key Laboratory of Integrated Service Network, School of Cyber Engineering, Xidian University, Xi'an, China), Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy, Beijing, China), Yunchuan Guo (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy, Beijing, China), Jinbo Xiong (College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China)
Article 6
An Improved Task Scheduling Mechanism Using Multi-Criteria Decision Making in Cloud Computing (pages 92-117)
Suvendu Chandan Nayak (Veer Surendra Sai University of Technology, Sambalpur, India), Chitaranjan Tripathy (Veer Surendra Sai University of Technology, Sambalpur, India)
Issue 3
Article 1
Enhanced Event Detection in Twitter Through Feature Analysis (pages 1-15)
Dharini Ramachandran. (Vellore Institute of Technology, Chennai, India), Parvathi R. (Vellore Institute of Technology, Chennai, India)
Article 2
Feature Optimization in Sentiment Analysis by Term Co-occurrence Fitness Evolution (TCFE) (pages 16-36)
Sudarshan S. Sonawane (Department of Computer Engineering, Shri Gulabrao Deokar College of Engineering, Jalgaon, India), Satish R. Kolhe (School of Computer Sciences, Kavayitri Bahinabai Chaudhari North Maharashtra University, Jalgaon, India)
Article 3
HBSD: A Hadoop Based Service Discovery Model for Enterprise Cloud Bus (pages 37-63)
Gitosree Khan (B. P. Poddar Institute of Management and Technology, Kolkata, India), Anirban Sarkar (National Institute of Technology, Durgapur, India), Sabnam Sengupta (B. P. Poddar Institute of Management and Technology, Kolkata, India)
Article 4
A Customized Quality Model for Software Quality Assurance in Agile Environment (pages 64-77)
Parita Jain (Amity Institute of Information Technology, Amity University, Noida, India), Arun Sharma (Department of Information Technology, Indira Gandhi Delhi Technical University for Women, Delhi, India), Laxmi Ahuja (Amity Institute of Information Technology, Amity University, Noida, India)
Article 5
Toward a More Robust Home Automated System: Introducing a Voice Activation Technique via Pubnub (pages 78-92)
Segun Aina (Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria), Samuel Dayo Okegbile (Obafemi Awolowo University, Ile-Ife, Nigeria), Adeniran Ishola Oluwaranti (Department of Computer Science and Engineering, Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria), Oghenerukome Brenda Okoro (Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria), Tayo Obasanya (Ekiti State University, Ado-Ekiti, Nigeria)
Issue 4
Article 1
GANDIVA: Temporal Pattern Tree for Similarity Profiled Association Mining (pages 1-18)
Vangipuram Radhakrishna (VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India), Puligadda Veereswara Kumar (Acharya Institute of Technology, Bangalore, India), Vinjamuri Janaki (Vaagdevi College of Engineering, Warangal, India)
Article 2
An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection (pages 19-49)
Gunupudi Rajesh Kumar (VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India), Narsimha Gugulothu (JNTUH, Hyderabad, India), Mangathayaru Nimmala (VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India)
Article 3
Query Optimization in Crowd-Sourcing Using Multi-Objective Ant Lion Optimizer (pages 50-63)
Deepak Kumar (Amity University Uttar Pradesh, Noida, India), Deepti Mehrotra (Amity University Uttar Pradesh, Noida, India), Rohit Bansal (Rohit Bansal, Rajiv Gandhi Institute of Petroleum Technology, Amethi, India)
Article 4
An Enhanced and Efficient Multi-View Clustering Trust Inference Approach by GA Model (pages 64-78)
Ravichandran M (Shadan College of Engineering and Technolgoy, Hyderabad, India), Subramanian K M (Shadan College of Engineering and Technolgoy, Hyderabad, India), Jothikumar R (Shadan College of Engineering and Technology, Hyderabad, India)
Article 5
Time-Based QoS Prediction and Rank Aggregation of Web Services (pages 79-100)
V. Mareeswari (School of Information Technology and Engineering, Vellore Institute of Technology (VIT), Vellore, India), E. Sathiyamoorthy (School of Information Technology and Engineering, Vellore Institute of Technology (VIT), Vellore, India)
Volume 13 (2018)
Issue 1
Article 1
MCWDF: Micro Chunk Based Web Delivery Framework (pages 1-19)
Shailesh Shivakumar (IGNOU, New Delhi, India), Venkata Suresh Pachigolla (IGNOU, New Delhi, India)
Article 2
Access to Device Reachability Data as a Component of Horizontal M2M Service Platform (pages 20-38)
Evelina Pencheva (Faculty of Telecommunications, Technical University of Sofia, Sofia, Bulgaria)
Article 3
Research and Implementation of a Modern Agricultural Greenhouse Cultivation System Based on Internet of Things (pages 39-49)
Shouying Lin (College of Mechanical and Electronic Engineering, Fujian Agriculture and Forestry University, Fuzhou, China), Shuyuan Li (College of Mechanical and Electronic Engineering, Fujian Agriculture and Forestry University, Fuzhou, China), Qijie Feng (College of Mechanical and Electronic Engineering, Fujian Agriculture and Forestry University, Fuzhou, China), Tengyue Zou (College of Mechanical and Electronic Engineering, Fujian Agriculture and Forestry University, Fuzhou, China)
Article 4
A Dynamic and Adaptable Service Composition Architecture in the Cloud Based on a Multi-Agent System (pages 50-68)
Abdelhak Merizig (LINFI Laboratory, University of Biskra, Biskra, Algeria), Okba Kazar (LINFI Laboratory, University of Biskra, Biskra, Algeria), Maite Lopez-Sanchez (Mathematics and Computer Science Department, University of Barcelona, Barcelona, Spain)
Article 5
Optimal Strategy in Queueing Systems in Emergency Department (pages 69-80)
Zeng Hui (College of Economics and Management, College of Science, Yanshan University, Qinhuangdao, China), Tian Ruiling (College of Science, Yanshan University, Qinhuangdao, China), Liu Yupeng (First Hospital of QINHUANGDAO, Qinhuangdao, China), Hou Yumei (College of Economics and Management, Yanshan University, Qinhuangdao, China)
Issue 2
Special Issue on Smart and Connecting Technologies Using Internet of Things
Guest Editorial Preface
Ramesh C. Poonia (Amity Institute of Information Technology, Amity University Rajasthan, Jaipur, India), Vijay Pal Dhaka (Manipal University Jaipur, Jaipur, India), C.P. Gupta (Associate Professor, Rajasthan Technical University, Kota, India), M.C. Govil (National Institute of Technology, Sikkim, India)
Article 1
Heuristic Based Coverage Aware Load Balanced Clustering in WSNs and Enablement of IoT (pages 1-10)
Surjit Singh (Department of Computer Engineering, National Institute of Technology, Kurukshetra, India), Rajeev Mohan Sharma (Department of Computer Engineering, National Institute of Technology, Kurukshetra, India)
Article 2
A MapReduce-Based User Identification Algorithm in Web Usage Mining (pages 11-23)
Mitali Srivastava (Department of Computer Science, Institute of Science, Banaras Hindu University, Varanasi, India), Rakhi Garg (Computer Science Section, Mahila Maha Vidyalaya, Banaras Hindu University, Varanasi, India), P.K. Mishra (Department of Computer Science, Institute of Science, Banaras Hindu University, Varanasi, India)
Article 3
A Novel Approach for Multi-Cloud Storage for Mobile Devices (pages 24-36)
Rajeev Kumar Bedi (Punjabi University, Patiala, India), Jaswinder Singh (Punjabi University, Patiala, India), Sunil Kumar Gupta (Beant College of Engineering and Technology, Gurdaspur, India)
Article 4
Big Data Handling Over Cloud for Internet of Things (pages 37-47)
Tarun Goyal (Government Engineering College Ajmer, Ajmer, India), Rakesh Rathi (Government Engineering College Ajmer, Ajmer, India), Vinesh Kumar Jain (Government Engineering College Ajmer, Ajmer, India), Emmanuel Shubhakar Pilli (Department of CSE, MNIT, Jaipur, India), Arka Prokash Mazumdar (MNIT, Jaipur, India)
Article 5
Security Against Network Layer Attacks for Hierarchal Mesh Environments (pages 48-55)
Geetanjali Rathee (Department of Computer Science and Engineering, Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 6
PowKMeans: A Hybrid Approach for Gray Sheep Users Detection and Their Recommendations (pages 56-69)
Honey Jindal (Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India), Shalini Agarwal (Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India), Neetu Sardana (Department of Computer Science and Engineering, Jaypee Institute of Information Technology, Noida, India)
Issue 3
Special Issue on Cloud Computing, Deep Learning, and Social Media: A Hybrid Research Paradigm
Guest Editorial Preface
M.K. Soni (Manav Rachna International University, Faridabad, India), S.S. Tyagi (Manav Rachna International University, Faridabad, India), Suresh Kumar (Manav Rachna International University, Faridabad, India), Supriya Panda (Manav Rachna International University, Faridabad, India), Charu Virmani (Manav Rachna International University, Faridabad, India), Walter Miller (University of Alberta, Alberta, Canada), Louis Thomas (University of Alberta, Alberta, Canada), Arun Kumar Sangaiah (School of Computing Science and Engineering, VIT University, Vellore, India), Ford Lumban Gaol (Bina Nusantara University, West Jakarta, India), Krishn K. Mishra (University of Missouri, Columbia, MO, USA)
Article 1
Skipnet-Octree Based Indexing Technique for Cloud Database Management System (pages 1-13)
Shweta Malhotra (Jamia Millia Islamia University, New Delhi, India), Mohammad Najmud Doja (Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia University, New Delhi, India), Bashir Alam (Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia University, New Delhi, India), Mansaf Alam (Big Data and Cloud Computing Laboratory, Department of Computer Science, Jamia Millia Islamia University, New Delhi, India)
Article 2
Energy Efficient Scheduling for Multiple Workflows in Cloud Environment (pages 14-34)
Ritu Garg (Department of Computer Engineering, National Institute of Technology, Kurukshetra, India), Neha Shukla (Department of Computer Engineering, National Institute of Technology, Kurukshetra, India)
Article 3
Analysis and Development of Load Balancing Algorithms in Cloud Computing (pages 35-53)
Deepa Bura (Manav Rachna International Institute of Research and Studies,Faridabad, India), Meeta Singh (Manav Rachna International Institute of Research and Studies,Faridabad, India), Poonam Nandal (Manav Rachna International Institute of Research and Studies,Faridabad, India)
Article 4
Resource Scheduling and Load Balancing Fusion Algorithm with Deep Learning Based on Cloud Computing (pages 54-72)
Xiaojing Hou (Luoyang Institute of Science and Technology, Luoyang, China), Guozeng Zhao (Luoyang Institute of Science and Technology, Luoyang, China)
Article 5
Research on O2O Platform and Promotion Algorithm of Sports Venues Based on Deep Learning Technique (pages 73-84)
Kaiyan Han (School of Physical Education, Jiujiang University, Jiujiang, China), Qin Wang (School of Physical Education, Jiujiang University, Jiujiang, China)
Article 6
A Deep Learning Solution for Multimedia Conference System Assisted by Cloud Computing (pages 85-98)
Wei Zhang (College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China & Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan, China), Huiling Shi (Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan, China), Xinming Lu (College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China), Longquan Zhou (College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China)
Article 7
Real-Time Streaming Data Analysis Using a Three-Way Classification Method for Sentimental Analysis (pages 99-111)
Srinidhi Hiriyannaiah (Department of Computer Science and Engineering, Ramaiah Institute of Technology, Bangalore, India), G.M. Siddesh (Department of ISE, Ramaiah Institute of Technology, Bangalore, India), K.G. Srinivasa (Department of Information Technology, Ch Brahm Prakash Government Engineering College, New Delhi, India)
Issue 4
Article 1
Mobile Apps Acceptability: A Meta-Analysis Model for Google Play (pages 1-13)
Usman Shehzaib (Department of Computer Science, COMSATS University Islamabad, Lahore Campus, Lahore, Pakistan), Javed Ferzund (Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal, Pakistan), Muhammad Asif (Department of Computer Science, University of Lahore, Pakpattan, Pakistan)
Article 2
Formal Specification of Adaptable Semantic Web Services Composition (pages 14-34)
Rihab Ben Lamine (MIRACL Laboratory, Sfax, Tunisia & Higher Institute of Computer Sciences and Communication technologies (ISITCOM), Sousse, Tunisia), Raoudha Ben Jemaa (MIRACL Laboratory, Sfax, Tunisia), Ikram Amous Ben Amor (MIRACL Laboratory, Sfax, Tunisia)
Article 3
Modular Ontologies Composition: Levenshtein-Distance-Based Concepts Structure Comparison (pages 35-60)
Hanen Abbes (MIRACL Laboratory, Higher Institute of Computer Science and Multimedia, Sfax University, Sfax, Tunisia), Faïez Gargouri (MIRACL Laboratory, Higher Institute of Computer Science and Multimedia, Sfax University, Sfax, Tunisia)
Article 4
Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks (pages 61-77)
Akashdeep Bhardwaj (University of Petroleum & Energy Studies, Dehradun, India), Sam Goundar (Victoria University of Wellington, New Zealand)
Article 5
Privacy-Preserving Orchestrated Web Service Composition with Untrusted Brokers (pages 78-103)
Imen Khabou (CES Laboratory, Sfax University, Sfax, Tunisia), Mohsen Rouached (Sultan Qaboos University, Muscat, Oman), Alexandre Viejo (Departament d'Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, Tarragona, Spain), David Sánchez (Departament d'Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, Tarragona, Spain)
Article 6
An Unsupervised Approach for Determining Link Specifications (pages 104-123)
Khayra Bencherif (University of Sidi Bel Abbes, Sidi Bel Abbes, Algeria), Mimoun Malki (Ecole Supérieure en Informatique de Sidi Bel-Abbes (ESI-SBA), LabRI-SBA Laboratoy, Algeria), Djamel Amar Bensaber (Ecole Supérieure en Informatique de Sidi Bel-Abbes, Algeria, Algeria)
Volume 12 (2017)
Issue 1
Article 1
Semantic Mediation in MedPeer: An Ontology-Based Heterogeneous Data Sources Integration System (pages 1-18)
Naïma Souâd Ougouti (Department of Computer Science, Université des Sciences et de la Technologie d'Oran Mohamed Boudiaf, USTO-MB, Oran, Algeria), Haféda Belbachir (Department of Computer Science, Université des Sciences et de la Technologie d'Oran Mohamed Boudiaf, USTO-MB, Oran, Algeria), Youssef Amghar (Department of Computer Science, INSA of Lyon, Lyon, France)
Article 2
A Novel Approach to Construct Semantic Mashup using Patterns (pages 19-36)
Khayra Bencherif (EEDIS Laboratory, Djilali Liabes University, Sidi Bel Abbes, Algeria), Djamel Amar Bensaber (High School of Computer Science of Sidi Bel Abbes, Sidi Bel Abbes, Algeria), Mimoun Malki (High School of Computer Science of Sidi Bel Abbes, Sidi Bel Abbes, Algeria)
Article 3
Semantic / Fuzzy Information Retrieval System (pages 37-56)
Mounira Chkiwa (Sfax University, Sfax, Tunisia), Anis Jedidi (Sfax University, Sfax, Tunisia), Faiez Gargouri (Sfax Unviersity, Sfax, Tunisia)
Issue 2
Article 1
A New Method for Building Probabilistic Ontology (Prob-Ont) (pages 1-25)
Emna Hlel (MIRACL Laboratory, Technology Center of Sfax, Sfax University, Sfax, Tunisia), Salma Jamoussi (MIRACL Laboratory, Technology Center of Sfax, Sfax University, Sfax, Tunisia), Abdelmajid Ben Hamadou (MIRACL Laboratory, Technology Center of Sfax, Sfax University, Sfax, Tunisia)
Article 2
Semantic Reconciliation of Electronic Health Records Using Semantic Web Technologies (pages 26-48)
Karim El Guemhioui (University of Quebec in Outaouais, Gatineau, Canada), Steven A. Demurjian (Department of Computer Science & Engineering, University of Connecticut, Storrs, CT, USA)
Article 3
Approaches and Principles for UX Web Experiences: A Case Study Approach (pages 49-65)
Fernando Almeida (Polytechnic Institute of Gaya, Porto, Portugal), José Augusto Monteiro (Higher Polytechnic Institute of Gaya, Porto, Portugal)
Issue 3
Special Issue on Greener Data Management for Ultra Large Scale Systems
Guest Editorial Preface
Zhigao Zheng (Central China Normal University, Wuhan, China), Jinming Wen (Centre national de la recherche scientifique, Paris, France), Shuai Liu (Inner Mongolia University, Hohhot, China)
Article 1
Image Recognition of Rapeseed Pests Based on Random Forest Classifier (pages 1-10)
Li Zhu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Minghu Wu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Xiangkui Wan (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Nan Zhao (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Wei Xiong (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China)
Article 2
Personalized Recommendation Mechanism Based on Collaborative Filtering in Cloud Computing Environment (pages 11-27)
Xinling Tang (School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou, China), Hongyan Xu (Department of Public Science Education Committee, Zhengzhou Shuqing Medical College, Henan Zhengzhou, China), Yonghong Tan (School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou, China), Yanjun Gong (School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou, China)
Article 3
Navigation Path Detection for Cotton Field Operator Robot Based on Horizontal Spline Segmentation (pages 28-41)
Dongchen Li (College of Engineering, Huazhong Agricultural University, Wuhan, China), Shengyong Xu (College of Engineering, Huazhong Agricultural University, Wuhan, China), Yuezhi Zheng (College of Engineering, Huazhong Agricultural University, Wuhan, China), Changgui Qi (College of Engineering, Huazhong Agricultural University, Wuhan, China), Pengjiao Yao (College of Engineering, Huazhong Agricultural University, Wuhan, China)
Article 4
Design of Vision Measurement Device for Seeding Robot based on Ant Colony Algorithm and Nonlinear Circuit System (pages 42-50)
Liu Xiaojie (Jiangsu University of Technology, Changzhou, China), Zhu Hongjin (Jiangsu University of Technology, Changzhou, China), Fan Honghui (Jiangsu University of Technology, Changzhou, China), Zhang Min (Jiangsu University of Technology, Changzhou, China)
Article 5
PID Control Algorithm Based on Genetic Algorithm and its Application in Electric Cylinder Control (pages 51-61)
Geng Zhang (College of Mechanical Engineering, Chongqing University, Chongqing, China & College of Information and Electrical Engineering, Chongqing Radio and TV University, Chongqing, China), Xiansheng Gong (College of Mechanical Engineering, Chongqing University, Chongqing, China & The State Key Laboratory of Mechanical Transmission, Chongqing University, Chongqing, China), Xirui Chen (College of Mechanical Engineering, Chongqing Technology and Business University, Chongqing, China)
Article 6
An Efficient Spatiotemporal Approach for Moving Object Detection in Dynamic Scenes (pages 62-73)
Min Liu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Yang Liu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Cong Liu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Juan Wang (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Minghu Wu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China)
Article 7
Research on the Information Construction of Accounting Audit Based on the Big Data of Computer (pages 74-82)
Dongmei Lin (Jilin Province Economic Management Cadre, Changchun, China)
Article 8
Design and Implementation of Wireless Voltage Monitoring System Based on Zigbee (pages 83-96)
Luo Xiaohui (Chongqing College of Electronic Engineering, Chongqing, China)
Issue 4
Special Issue on New Technologies in Big Data Era
Guest Editorial Preface
Zhigao Zheng (Central China Normal University, Wuhan, China)
Article 1
Real-Time Unspecified Major Sub-Events Detection in the Twitter Data Stream That Cause the Change in the Sentiment Score of the Targeted Event (pages 1-21)
Ritesh Srivastava (NSIT, Delhi University, New Delhi, India), M.P.S. Bhatia (NSIT, Delhi University, New Delhi, India)
Article 2
A Model Transformation Approach for Specifying Real-Time Systems and Its Verification Using RT-Maude (pages 22-41)
Messaoud Bendiaf (Department of Computer Science University of Biskra, Biskra, Algeria), Mustapha Bourahla (Department of Computer Science University of M'sila, M'sila, Algeria), Malika Boudia (Department of Computer Science University of Biskra, Biskra, Algeria), Seidali Rehab (MISC Laboratory, University of Constantine 2 - Abdelhamid Mehri, Constantine, Algeria)
Article 3
Study on Secure Dynamic Covering Algorithm for E-Logistics Information in a Cloud Computing Platform (pages 42-55)
Yan He (School of Railway Operation and Management, Hunan Railway Professional Technology College, Zhuzhou, China)
Article 4
The Big Data Processing of HF Sky-Wave Radar Sea Echo for Detection of Sea Moving Targets (pages 56-71)
Qianzhao Lei (School of Physics and Optoelectronic Engineering, Xidian University, Xi'an, China & School of Mathematics & Physics, Weinan Normal University, Weinan, China), Zhensen Wu (School of Physics and Optoelectronic Engineering, Xidian University, Xi'an, China), Lixin Guo (School of Physics and Optoelectronic Engineering, Xidian University, Xi'an, China), Junmei Fan (Chinese Research Institute of Radiowave Propagation, National Key Laboratory of Electromagnetic Environment, Qingdao, China), Senlin Geng (School of Mathematics & Physics, Weinan Normal University, Weinan, China)
Article 5
HDAC High-Dimensional Data Aggregation Control Algorithm for Big Data in Wireless Sensor Networks (pages 72-86)
Zeyu Sun (School of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, China), Xiaohui Ji (School of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, China)
Volume 11 (2016)
Issue 1
Article 1
An Approach Based on Service Components for Adapting Web-Oriented Applications (pages 1-21)
Soumia Bendekkoum (Software Technologies and Information Systems Department, LIRE Laboratory, Constantine 2 University, Constantine, Algeria), Mahmoud Boufaida (LIRE Laboratory, Constantine 2 University, Constantine, Algeria), Lionel Seinturier (UMR CRIStAL, Lille 1 University, Lille, France)
Article 2
A Similarity Measure across Ontologies for Web Services Discovery (pages 22-43)
Aissa Fellah (EEDIS Laboratory, DjillaliLiabes University of Sidi Bel Abbes, Sidi Bel Abbes, Algeria), Mimoun Malki (LabRI-SBA Laboratory, Ecole Supérieure en Informatique de Sidi Bel-Abbes, Sidi Bel Abbes, Algeria), Atilla Elci (Department of Electrical-Electronics Engineering, Aksaray University, Merkez, Turkey)
Article 3
Access Control and Information Flow Control for Web Services Security (pages 44-76)
Saadia Kedjar (Department of Computer Science, Faculty of Exact Sciences, University of Bejaia, Bejaia, Algeria), Abdelkamel Tari (Faculty of Exact Sciences, University of Bejaia, Bejaia, Algeria), Peter Bertok (School of Computer Science and IT, RMIT University, Melbourne, Australia)
Issue 2
Article 1
A Novel Cache Replacement Policy for Web Proxy Caching System Using Web Usage Mining (pages 1-13)
V. Sathiyamoorthi (Sona College of Technology, Salem, India)
Article 2
Alignment Evolution under Ontology Change (pages 14-38)
Ahmed Zahaf (EEDIS Laboratory, University of Djillali Liabba, ZItoune, Algeria & Dr Tahar Moulay University of Saida, Saida, Algeria), Mimoun Malki (LabRI-SBA Laboratory, Ecole Supérieure en Informatique de Sidi Bel-Abbes, Sidi Bel-Abbes, Algeria)
Article 3
Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform (pages 39-50)
Ali Reza Honarvar (Computer Science and Engineering and Information Technology Department, Shiraz University, Shiraz, Iran), Ashkan Sami (Computer Science and Engineering and Information Technology Department, Shiraz University, Shiraz, Iran)
Article 4
Disambiguating the Twitter Stream Entities and Enhancing the Search Operation Using DBpedia Ontology: Named Entity Disambiguation for Twitter Streams (pages 51-62)
N. Senthil Kumar (SITE, VIT University, Vellore, India), Dinakaran Muruganantham (SITE, VIT University, Vellore, India)
Issue 3
Special Issue on Advance Computing Techniques and Systems
Guest Editorial Preface
Ibrahim Al-oqily (Prince Hussein Bin Abdullah II for Information Technology, The Hashemite University, Zarqa, Jordan)
Article 1
Image Mosaicing Using Binary Edge Detection Algorithm in a Cloud-Computing Environment (pages 1-14)
Abdullah Alamareen (Jordan University of Science and Technology, Irbid, Jordan), Omar Al-Jarrah (Jordan University of Science and Technology, Irbid, Jordan), Inad A. Aljarrah (Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan)
Article 2
Using Enhanced Lexicon-Based Approaches for the Determination of Aspect Categories and Their Polarities in Arabic Reviews (pages 15-31)
Mohammad Al Smadi (Jordan University of Science and Technology, Irbid, Jordan), Islam Obaidat (Jordan University of Science and Technology, Irbid, Jordan), Mahmoud Al-Ayyoub (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Rami Mohawesh (Jordan University of Science and Technology, Irbid, Jordan), Yaser Jararweh (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan)
Article 3
Polarity Classification of Arabic Sentiments (pages 32-49)
Mohammed N. Al-Kabi (Information Technology Faculty, Zarqa University, Zarqa, Jordan), Heider A. Wahsheh (College of Computer Science, King Khaled University, Abha, Saudi Arabia), Izzat M. Alsmadi (University of New Haven, West Haven, CT, USA)
Article 4
Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework (pages 50-64)
Nabeel Khan (University of Salford, Manchester, UK), Adil Al-Yasiri (University of Salford, Manchester, UK)
Article 5
Privacy Preserving Framework to Support Mobile Government Services (pages 65-78)
Muder Almiani (Al-Hussein Bin Talal University, Ma'an, Jordan), Abdul Razaque (Cleveland State University, Cleveland, OH, USA), Ayman Al Dmour (Al-Hussein Bin Talal University, Ma'an, Jordan)
Issue 4
Article 1
Enhancing Interface Understandability as a Means for Better Discovery of Web Services (pages 1-23)
Usama Mahmoud Maabed (Institute of Graduate Studies and Research, Alexandria University, Alexandria, Egypt), Ahmed El-Fatatry (Institute of Graduate Studies and Research, Alexandria University, Alexandria, Egypt), Adel El-Zoghabi (Institute of Graduate Studies and Research, Alexandria University, Alexandria, Egypt)
Article 2
A Constraint Programming Approach for Web Log Mining (pages 24-42)
Amina Kemmar (LITIO, University of Oran 1, Ahmed Ben Bella, Oran, Algeria), Yahia Lebbah (LITIO, University of Oran 1, Ahmed Ben Bella, Oran, Algeria), Samir Loudni (GREYC (CNRS UMR 6072), University of Caen, Caen, France)
Article 3
Provenance in Web Feed Mash-Up Systems (pages 43-62)
Watsawee Sansrimahachai (School of Science and Technology, University of the Thai Chamber of Commerce, Bangkok, Thailand)
Volume 10 (2015)
Issue 1
Special Issue from the International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Guest Editorial Preface
Mohamed Sellami (ISEP, Issy-les-Moulineaux, France), Anderson Santana de Oliveira (SAP Labs France, Mougins Cedex, France)
Article 1
Checking Opacity of Vulnerable Critical Systems On-The-Fly (pages 1-30)
Amina Bourouis (OASIS Research Lab/ENIT, University of Tunis El Manar, Tunisia), Kais Klai (LIPN, CNRS UMR 7030 University of Paris 13, Sorbonne Paris City, France), Yamen El Touati (OASIS Research Lab/ENIT, University of Manouba, Tunisia), Nejib Ben Hadj-Alouane (OASIS Research Lab/ENIT, University of Tunis El Manar, Tunisia)
Article 2
C-SCRIP: Collaborative Security Pattern Integration Process (pages 31-46)
Rahma Bouaziz (Department of Computer Science, Taibah University, Al-Madina Al-Munawarah, Saudi Arabia & ReDCAD, University of Sfax, Sfax, Tunisia), Fatma Krichen (ReDCAD, University of Sfax, Sfax, Tunisia), Bernard Coulette (IRIT, University of Toulouse, Toulouse, France)
Article 3
A Complete Security Framework for Wireless Sensor Networks: Theory and Practice (pages 47-74)
Christophe Guyeux (University of Franche-Comté (FEMTO-ST), Belfort Cedex, France), Abdallah Makhoul (University of Franche-Comté (FEMTO-ST), Belfort Cedex, France), Ibrahim Atoui (Faculty of Sciences, Lebanese University, Hadath, Lebanon), Samar Tawbi (Faculty of Sciences, Lebanese University, Hadath, Lebanon), Jacques M. Bahi (University of Franche-Comté (FEMTO-ST), Belfort Cedex, France)
Issue 2
Article 1
Development and Testing of New E-Learning Hypermedia System (pages 1-15)
Lamia Mahnane (LRS Laboratory, University of Badji Moktar, Annaba, Algeria), Mohamed Hafidi (LRS Laboratory, University of Badji Moktar, Annaba, Algeria)
Article 2
HOD2MLC: Hybrid Ontology Design and Development Model with Lifecycle (pages 16-42)
Rishi Kanth Saripalle (School of Information Technology, Illinois State University, Normal, IL, USA), Steven A. Demurjian (Department of Computer Science and Engineering, University of Connecticut, Storrs, CT, USA), Michael Blechner (Department of Pathology, University of Connecticut Health Center, Farmington, CT, USA), Thomas Agresta (Department of Family Medicine, University of Connecticut Health Center, Farmington, CT, USA)
Article 3
An Agent-Mediated Platform for Business Processes (pages 43-61)
Hoa Khanh Dam (School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia), Aditya Ghose (School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia), Mohammad Qasim (School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia)
Issue 3
Special Issue on Advanced Algorithms for Efficient, Reliable and Secure Information Systems
Guest Editorial Preface
Fatos Xhafa (Universitat Politècnica de Catalunya, Barcelona, Spain), Xu An Wang (Engineering University of CAPF, Xi'an, China)
Article 1
Research on Fault Diagnosis Method Using Improved Multi-Class Classification Algorithm and Relevance Vector Machine (pages 1-16)
Kun Wu (Department of Equipment Management, Mechanical Engineering College, Hebei, China), Jianshe Kang (Department of Equipment Management, Mechanical Engineering College, Hebei, China), Kuo Chi (Department of Equipment Management, Mechanical Engineering College, Hebei, China)
Article 2
Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart (pages 17-32)
Qingyu Chen (Xi'an Microelectronics Technology Institute, Xi'an, Shaanxi, China), Longsheng Wu (Xi'an Microelectronics Technology Institute, Xi'an, Shaanxi, China), Li Li (Xi'an Microelectronics Technology Institute, Xi'an, Shaanxi, China), Xuhan Ma (Xi'an Microelectronics Technology Institute, Xi'an, Shaanxi, China), Xu An Wang (Engineering University of CAPF, Xi'an, Shaanxi, China)
Article 3
A Study on Components and Features in Face Detection (pages 33-45)
Yang Hua-Chun (School of Life Science and Technology, Xidian University, Xi'an, China & Department of Information Engineering, Engineering University of Armed Police Shanxi, Xi'an, China), Xu An Wang (Department of Information Engineering, Engineering University of Armed Police Shanxi, Xi'an, China)
Article 4
A High-Capacity Covering Code for Voice-Over-IP Steganography (pages 46-63)
Hui Tian (National Huaqiao University, Xiamen, China), Jie Qin (National Huaqiao University, Xiamen, China), Yongfeng Huang (Tsinghua University, Beijing, China), Xu An Wang (Engineering University of CAPF, Xian, China), Jin Liu (National Huaqiao University, Xiamen, China), Yonghong Chen (National Huaqiao University, Xiamen, China), Tian Wang (National Huaqiao University, Xiamen, China), Yiqiao Cai (National Huaqiao University, Xiamen, China)
Article 5
An Improved Multilinear Map and its Applications (pages 64-81)
Chunsheng Gu (School of Computer Engineering, Jiangsu University of Technology, Changzhou, China &State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 6
An Additively Homomorphic Encryption over Large Message Space (pages 82-102)
Hu Chen (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Yupu Hu (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Zhizhu Lian (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Huiwen Jia (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China), Xu An Wang (State Key Laboratory of Integrated Service Networks, Xidian University, Shanxi, Xi'an, China)
Issue 4
Article 1
An Approach to Data Annotation for Internet of Things (pages 1-19)
Ivaylo Atanasov (Technical University of Sofia, Sofia, Bulgaria), Anastas Nikolov (Technical University of Sofia, Sofia, Bulgaria), Evelina Pencheva (Faculty of Telecommunications, Technical University of Sofia, Sofia, Bulgaria), Rozalina Dimova (Technical University of Varna, Varna, Bulgaria), Martin Ivanov (Technical University of Varna, Varna, Bulgaria)
Article 2
A Decentralized Framework for Semantic Web Services Discovery Using Mobile Agent (pages 20-43)
Nadia Ben Seghir (LINFI Laboratory, University of Biskra, Biskra, Algeria), Okba Kazar (LINFI Laboratory, University of Biskra, Biskra, Algeria), Khaled Rezeg (LINFI Laboratory, University of Biskra, Biskra, Algeria)
Article 3
TemporalClassifier: Classification of Implicit Query on Temporal Profiles (pages 44-66)
Rahul Pradhan (GLA University, Mathura, India), Dilip Kumar Sharma (GLA University, Mathura, India)
Volume 9 (2014)
Issue 1
Special Issue on the Role of Information and Communications Technology in Developing Renewable Energy Processes and Systems
Guest Editorial Preface
Hussein Al-Bahadili (University of Petra, Amman, Jordan)
Article 1
Requirements and Design a Small Wind Rotor for a Small House in Guildford (pages 1-11)
Triada Vlasakoudi (Faculty of Engineering, University of Surrey, Guildford, UK), Mohammed Sanduk (Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, UK)
Article 2
Design of an Embedded Solar Tracking System Based on GPS and Astronomical Equations (pages 12-30)
Fawzi M. Al-Naima (Al-Nahrain University, Baghdad, Iraq), Ramzy S. Ali (Basrah University, Basrah, Iraq), Ahmed J. Abid (Foundation of Technical Education, Baghdad, Iraq)
Article 3
A Novel Approach to Build a Generic Model of Photovoltaic Solar System Using Sound Biometric Techniques (pages 31-44)
Khalid T. Al-Sarayreh (Department of Software Engineering, Hashemite University, Zarqa, Jordan), Kenza Meridji (Department of Software Engineering, Petra University, Amman, Jordan), Ebaa Fayyoumi (Department Computer Science and Applications, Hashemite University, Zarqa, Jordan), Sahar Idwan (Department Computer Science and Applications, Hashemite University, Zarqa, Jordan)
Article 4
Demand-Driven Algorithm for Sharing and Distribution of Photovoltaic Power in a Small Local Area Grid (pages 45-58)
Mohammad Abu-Arqoub (Faculty of Information Technology, University of Petra, Amman, Jordan), Ghassan F. Issa (Faculty of Information Technology, University of Petra, Amman, Jordan), Ahmad F. Shubita (Faculty of Information Technology, University of Petra, Amman, Jordan), Abed Alkarim Banna (Faculty of Information Technology, University of Petra, Amman, Jordan)
Article 5
A Layered Communication Architecture for Power Routing in the Smart Grid (pages 59-69)
F. Bouhafs (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), M. Merabti (School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, UK)
Article 6
Energy-Aware Manufacturing Using Information Technology Tools: A Knowledge Based System Approach (pages 70-77)
Mohammed A. Omar (Masdar Institute of Science and Technology, Masdar City, UAE), Ahmad Mayyas (Lawrence Berkley National Laboratory, Berkley, CA, USA), Qilun Zhou (Department of Automotive Engineering, Clemson University, Greenville, SC, USA)
Issue 2
Article 1
Requirement Estimation and Design of Tag software in Web Application (pages 1-19)
Karan Gupta (Department of Computer Science, University of Delhi, New Delhi, Delhi, India), Anita Goel (Department of Computer Science, Dyal Singh College, University of Delhi, New Delhi, Delhi, India)
Article 2
Schema Change Operations for Full Support of Schema Versioning in the τXSchema Framework (pages 20-46)
Zouhaier Brahmia (University of Sfax, Sfax, Tunisia), Fabio Grandi (University of Bologna, Bologna, Italy), Barbara Oliboni (University of Verona, Verona, Italy), Rafik Bouaziz (University of Sfax, Sfax, Tunisia)
Article 3
An Efficient and Accurate Discovery of Frequent Patterns Using Improved WARM to Handle Large Web Log Data (pages 47-64)
Sahaaya Arul Mary (Jayaram College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India), M. Malarvizhi (J.J. College of Engineering and Technology, Tamil Nadu, India)
Article 4
Enhanced Utility in Search Log Publishing of Infrequent Items (pages 65-77)
S. Belinsha (Department of Computer Science and Engineering,VSB Engineering College, Karur, Tamil Nadu, India), A.P.V. Raghavendra (Department of Computer Science and Engineering,VSB Engineering College, Karur, Tamil Nadu, India)
Article 5
Ranking Web Services using Web Service Popularity Score (pages 78-89)
Selwa Elfirdoussi (1LISI Laboratory, Computer Science Department, Faculty of Sciences, Cadi Ayyad University, Marrakech, Morocco), Zahi Jarir (1LISI Laboratory, Computer Science Department, Faculty of Sciences, Cadi Ayyad University, Marrakech, Morocco), Mohamed Quafafou (CNRS, LSIS UMR 7296, Aix-Marseille Université, Marseille, France)
Issue 3
Article 1
A New Approach of Web Systems Modularity Increase Using Combination of Event-Driven Software Architecture and Relationship Mechanism Based on Message Passing: Case Study (pages 1-14)
Esmail Amini (Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran), Isa Maleki (Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran)
Article 2
From User's Goal to Semantic Web Services Discovery: Approach Based on Traceability (pages 15-39)
Houda el Bouhissi (EEDIS Laboratory, Djillali Liabes University of Sidi-Bel-Abbes, Algeria), Mimoun Malki (EEDIS Laboratory, Djillali Liabes University of Sidi-Bel-Abbes, Algeria & High School of Computer Science of Sidi Bel-Abbes (ESI-Sidi Bel-Abbes), Algeria), Mohamed Amine Sidi Ali Cherif (EEDIS Laboratory, Djillali Liabes University of Sidi-Bel-Abbes, Algeria)
Article 3
Cases for the Web in Your Pocket (WiPo): Surviving Offline with Online Data (pages 40-54)
Stuart Dillon (Waikato Management School, Hamilton, New Zealand), Karyn Rastrick (Waikato Management School, Hamilton, New Zealand), Florian Stahl (European Research Center for Information Systems, University of Münster, Münster, Germany), Gottfried Vossen (Waikato Management School, Hamilton, New Zealand)
Article 4
Towards Improving the Lexicon-Based Approach for Arabic Sentiment Analysis (pages 55-71)
Nawaf A. Abdulla (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Nizar A. Ahmed (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Mohammed A. Shehab (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Mahmoud Al-Ayyoub (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Mohammed N. Al-Kabi (Faculty of Sciences and IT, Zarqa University, Zarqa, Jordan), Saleh Al-rifai (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan)
Issue 4
Special Issue on Computing Solutions to Tackle Real-Time and Critical Problems: 2013, Amman, Jordan
Guest Editorial Preface
Mousa Al-Akhras (Saudi Electronic University, Riyadh, Saudi Arabia)
Article 1
Diagnosis and Classification of Chronic Renal Failure Utilising Intelligent Data Mining Classifiers (pages 1-12)
Abeer Y. Al-Hyari (The University of Jordan, Amman, Jordan), Ahmad M. Al-Taee (The University of Jordan, Amman, Jordan), Majid A. Al-Taee (The University of Liverpool, Liverpool, UK)
Article 2
GPU Scaling: From Personal Supercomputing to the Cloud (pages 13-23)
Yaser Jararweh (Jordan University of Science and Technology, Irbid, Jordan), Moath Jarrah (Jordan University of Science and Technology, Irbid, Jordan), Abdelkader Bousselham (Qatar Environment and Energy Research Institute, Doha, Qatar)
Article 3
Efficient Low-Power Compact Hardware Units for Real-Time Image Processing (pages 24-39)
Khaldoon M. Mhaidat (Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan), Mohammad I. Alali (Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan), Inad A. Aljarrah (Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan)
Article 4
Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting (pages 40-53)
Emad E. Abdallah (Faculty of Prince Al-Hussein bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Ibrahim Al-Oqily (Faculty of Prince Al-Hussein bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Alaa E. Abdallah (Faculty of Prince Al-Hussein bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Ahmed F. Otoom (Faculty of Prince Al-Hussein bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Ayoub Alsarhan (Faculty of Prince Al-Hussein bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan)
Article 5
Cluster-Based Online Routing Protocols for Ad Hoc Network (pages 54-66)
Alaa E. Abdallah (Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Mohammad Bsoul (Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Emad E. Abdallah (Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), Ibrahim Al–Oqily (Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, Hashemite University, Zarqa, Jordan), George Kao (Averna Technologies Inc., Montreal, Canada)
Volume 8 (2013)
Issue 1
Article 1
A Graphical Based Approach to the Conceptual Modeling, Validation and Generation of XML Schema Definitions (pages 1-22)
Mark B. Dixon (Department of Arts, Environment & Technology, Leeds Metropolitan University, Leeds, UK)
Article 2
ACNB: Associative Classification Mining Based on Naïve Bayesian Method (pages 23-35)
Fadi Odeh (Department of Computer Science, Al-Balqa Applied University, Salt, Jordan), Nijad Al-Najdawi (Department of Computer Science, Al-Balqa Applied University, Salt, Jordan)
Article 3
Performance Evaluation of a Modern Web Architecture (pages 36-50)
Johan Andre Lundar (School of Information Systems, Computing and Mathematics, Brunel University, Uxbridge, UK), Tor-Morten Grønli (Norwegian School of Information Technology, Oslo, Norway), Gheorghita Ghinea (School of Information Systems, Computing and Mathematics, Brunel University, Uxbridge, UK & Norwegian School of Information Technology, Oslo, Norway)
Article 4
Specification of Transactional Requirements for Web Services using Recoverability (pages 51-65)
Kanchana Rajaram (SSN College of Engineering, Anna University, Chennai, Tamil Nadu, India), Chitra Babu (SSN College of Engineering, Anna University, Chennai, Tamil Nadu, India), Arun Adiththan (City University of New York (CUNY), New York, USA)
Issue 2
Article 1
An E-learning System Based on Secure Data Storage Services in Cloud Computing (pages 1-17)
R. Gopinath (Department of Computer Science and Engineering, K.S.Rangasamy College of Technology, Tiruchengode, Tamil Nadu, India), B.G. Geetha (Department of Computer Science and Engineering, K.S.Rangasamy College of Technology, Tiruchengode, Tamil Nadu, India)
Article 2
Novel Approaches for Integrating MART1 Clustering Based Pre-Fetching Technique with Web Caching (pages 18-32)
Sathiyamoorthi (CSE, Sona College of Technology, Salem, Tamil Nadu, India), Murali Bhaskaran (Paavai College of Engineering, Nammakal, Tamil Nadu, India)
Article 3
Understanding the Deployment of Competitive Intelligence Through Moments of Translation (pages 33-45)
Tiko Iyamu (Department of Informatics, Namibia University of Science and Technology, Windhoek, Namibia), Relebohile Moloi (Department of Informatics, Tshwane University of Technology, Pretoria, South Africa)
Article 4
A Hybrid Approach for Web Change Detection (pages 46-69)
Sakher Khalil Alqaaidi (Middle East University for Graduate Studies, Amman, Jordan)
Issue 3
Article 1
Third Party Multimedia Streaming Control with Guaranteed Quality of Service in Evolved Packet System (pages 1-21)
Evelina Pencheva (Faculty of Telecommunications, Technical University of Sofia, Sofia, Bulgaria)
Article 2
Combining Expert Systems and Multiple Intelligences in an Adaptive and Intelligent Tutoring System (pages 22-33)
Hafidi Mohamed (Laboratoire de Recherche en Informatique (LRI), University of Badji Moktar, Annaba, Algeria), Bensebaa Taher (Laboratoire de Recherche en Informatique (LRI), University of Badji Moktar, Annaba, Algeria)
Article 3
Estimation of a Priori Decision Threshold for Collocations Extraction: An Empirical Study (pages 34-49)
Fethi Fkih (MARS Research Unit, Faculty of sciences of Monastir, University of Monastir, Monastir, Tunisia), Mohamed Nazih Omri (MARS Research Unit, Faculty of sciences of Monastir, University of Monastir, Monastir, Tunisia)
Article 4
An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks (pages 50-63)
Eyad Taqieddin (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Moad Mowafi (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Fahed Awad (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Omar Banimelhem (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Hani Maher (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan)
Issue 4
Special Issue on Semantic and Web Technologies
Guest Editorial Preface
Mimoun Malki (Djillali Liabes University of Sidi Bel-Abbes, Sidi Bel-Abbes, Algeria), Salima Benbernou (Paris Descartes University, Paris, France)
Article 1
Enabling Semantic Mediation in DaaS Composition: Service-Based and Context-Driven Approach (pages 1-19)
Idir Amine Amarouche (University of Sciences and Technology Houari Boumediene, Bab-Ezzouar, Algeria), Djamal Benslimane (Claude Bernard Lyon 1 University, Lyon, France), Zaia Alimazighi (University of Sciences and Technology Houari Boumediene, Bab-Ezzouar, Algeria)
Article 2
Semantic Cloud: Building Dynamic Mashup in Cloud Environment (pages 20-35)
Abdelhamid Malki (Djillali Liabes University of Sidi Bel Abbes, Sidi Bel Abbes, Algeria), Sidi Mohammed Benslimane (Djillali Liabes University of Sidi Bel Abbes, Sidi Bel Abbes, Algeria)
Article 3
Applying CBR Over an AI Planner for Dynamic Web Service Composition (pages 36-47)
Fouad Henni (LIO Laboratory Oran, University of Mostaganem, Algeria), Baghdad Atmani (LIO Laboratory Oran, University of Oran, Algeria)
Article 4
Geo-Multi-Agent System Based Webmapping Approach Using Multiple Representation and Generalisation Driven by Domain Ontology (pages 48-64)
Khalissa Derbal Amieur (Computer Science Department, University of Sciences and Technology Houari Boumediene, Bab Ezzouar, Algeria), Kamel Boukhalfa (Computer Science Department, University of Sciences and Technology Houari Boumediene, Bab Ezzouar, Algeria), Zaia Alimazighi (Computer Science Department, University of Sciences and Technology Houari Boumediene, Bab Ezzouar, Algeria)
Article 5
A Query Approximating Approach Over RDF Graphs (pages 65-87)
Ala Djeddai (LabGED Laboratory, Badji Mokhtar-Annaba University, Annaba, Algeria), Hassina Seridi-Bouchelaghem (LabGED Laboratory, Badji Mokhtar-Annaba University, Annaba, Algeria), Med Tarek Khadir (LabGED Laboratory, Badji Mokhtar-Annaba University, Annaba, Algeria)
Volume 7 (2012)
Issue 1
Article 1
Architecture of an Event Processing Application for Monitoring Cardiac Patient Wait Times (pages 1-16)
Aladdin Baarah (University of Ottawa, Canada), Alain Mouttham (University of Ottawa, Canada), Liam Peyton (University of Ottawa, Canada)
Article 2
Mobile Acquisition and Monitoring System for Improved Diabetes Management Using Emergent Wireless and Web Technologies (pages 17-30)
Majid A. Al-Taee (Kingston University London, UK), Suhail N. Abood (University of Jordan, Jordan)
Article 3
Web Navigation Tool for Visually Impaired People (pages 31-45)
Sharief F. Babiker (University of Khartoum, Sudan), Alaeldin A. Ahmed (University of Khartoum, Sudan), Mustafa A. A. Yasin (University of Khartoum, Sudan)
Article 4
Modeling of Complex Human-Process Interaction as Framework for Assistance and Supervisory Control of Technical Processes (pages 46-66)
Dirk Söffker (University of Duisburg-Essen, Germany), Xingguang Fu (University of Duisburg-Essen, Germany), Andreas Hasselberg (German Aerospace Center (DLR), Germany), Marcel Langer (University of Duisburg-Essen, Germany)
Article 5
A Generic Model for Universal Data Storage and Conversion and Its Web Based Prototypical Implementation (pages 67-82)
Andreas Unterweger (Salzburg University of Applied Sciences, Austria), Bernadette Himmelbauer (Salzburg University of Applied Sciences, Austria), Simon Kranzer (Salzburg University of Applied Sciences, Austria), Peter Ott (Salzburg University of Applied Sciences, Austria), Robert Merz (Salzburg University of Applied Sciences, Austria), Gerhard Jöchtl (Salzburg University of Applied Sciences, Austria)
Issue 2
Article 1
New Fields in Classifying Algorithms for Content Awareness (pages 1-15)
Radu-Dinel Miruta (Politehnica University of Bucharest, Romania), Cosmin Stanuica (Politehnica University of Bucharest, Romania), Eugen Borcoci (Politehnica University of Bucharest, Romania)
Article 2
Analyzing the Effect of Node Density on the Performance of the LAR-1P Algorithm (pages 16-29)
Hussein Al-Bahadili (Petra University, Jordan), Ali Maqousi (Petra University, Jordan), Reyadh S. Naoum (Middle East University, Jordan)
Article 3
Using Permutations to Enhance the Gain of RUQB Technique (pages 30-45)
Abdulla M. Abu-ayyash (Central Bank of Jordan, Jordan), Naim Ajlouni (Al-Balqa University, Jordan)
Article 4
Autonomic Healing for Service Specific Overlay Networks (pages 46-59)
Ibrahim Al-Oqily (Hashemite University, Jordan), Bassam Subaih (Al-Balqa’a Applied University, Jordan), Saad Bani-Mohammad (Al al-Bayt University, Jordan), Jawdat Jamil Alshaer (Al- Balqa’ Applied University, Jordan), Mohammed Refai (Zarqa Private University, Jordan)
Article 5
New Entropy Based Distance for Training Set Selection in Debt Portfolio Valuation (pages 60-69)
Tomasz Kajdanowicz (Wroclaw University of Technology, Poland), Slawomir Plamowski (Wroclaw University of Technology, Poland), Przemyslaw Kazienko (Wroclaw University of Technology, Poland)
Issue 3
Article 1
Pen Testing for Web Applications (pages 1-13)
Ahmad Al-Ahmad (Yarmouk University, Jordan), Belal Abu Ata (Yarmouk University, Jordan), Abdullah Wahbeh (Dakota State University, USA)
Article 2
Modeling Service Data Objects (SDOs) to the Entity-Relationship (ER) Model (pages 14-36)
Sikha Bagui (University of West Florida, USA), Richard Sweetman (University of West Florida, USA)
Article 3
A Novel Approach to Design a Scalable Air Quality Monitoring System (pages 37-54)
Ivaylo Atanasov (Technical University of Sofia, Bulgaria), Ventsislav Trifonov (Technical University of Sofia, Bulgaria), Kamelia Nikolova (Technical University of Sofia, Bulgaria), Evelina Pencheva (Technical University of Sofia, Bulgaria)
Article 4
Comparative Analysis of Ontology Ranking Algorithms (pages 55-66)
Vandana Dhingra (Apeejay Stya University, India), Komal Bhatia (YMCA University of Science and Technology, India)
Issue 4
Article 1
Predictive Modeling of User Interaction Patterns for 3D Mesh Streaming (pages 1-19)
V. Vani (Dr.N.G.P. Institute of Technology, Coimbatore, India), R. Pradeep Kumar (Adithya Institute of Technology, Coimbatore, India), Mohan S. (Dr.N.G.P. Institute of Technology, Coimbatore, India)
Article 2
Semantic Clustering of Web Documents: An Ontology based Approach Using Swarm Intelligence (pages 20-33)
J. Avanija (Sree Vidyanikethan Engineering College, India), K. Ramar (Einstein College of Engineering, Tirunelveli, Tamilnadu, India)
Article 3
Exploring the Factors that Affect Intention to use Mobile Phones in Jordanian Academic Library (pages 34-49)
Mohammed-Issa Riad Mousa Jaradat (Faculty of Prince Hussein Bin Abdullah for Information Technology, Department of Information Systems, Al al-Bayt University, Mafraq, Jordan)
Article 4
Identifying Overlying Group of People through Clustering (pages 50-60)
P. Manimaran (Department of Computer Science and Engineering, K.S. Rangasamy College of Technology, Namakkal-Dt., Tamilnadu, India), K. Duraiswamy (Department of Computer Science and Engineering, K.S. Rangasamy College of Technology, Namakkal-Dt., Tamilnadu, India)
Volume 6 (2011)
Issue 1
Article 1
Improved Algorithm for Error Correction (pages 1-12)
Wael Toghuj (Isra University, Jordan), Ghazi I. Alkhatib (The Hashemite University, Jordan)
Article 2
Probabilistic Models for Social Media Mining (pages 13-24)
Flora S. Tsai (Nanyang Technological University, Singapore)
Article 3
A Novel Architecture for Deep Web Crawler (pages 25-48)
Dilip Kumar Sharma (Shobhit University, India), A. K. Sharma (YMCA University of Science and Technology, India)
Article 4
PECA: Power Efficient Clustering Algorithm for Wireless Sensor Networks (pages 49-58)
Maytham Safar (Kuwait University, Kuwait), Hasan Al-Hamadi (Kuwait National Petroleum Company, Kuwait), Dariush Ebrahimi (Kuwait University, Kuwait)
Issue 2
Article 1
How Culture May Influence Ontology Co-Design: A Qualitative Study (pages 1-17)
Linda Anticoli (Università di Udine, Italy), Elio Toppano (Università di Udine, Italy)
Article 2
The Medical Semantic Web: Opportunities and Issues (pages 18-28)
Mohammad Ali H. Eljinini (Isra University, Jordan)
Article 3
Using Watermarking Techniques to prove Rightful Ownership of Web Images (pages 29-39)
Abdallah Al-Tahan Al-Nu’aimi (Isra University, Jordan)
Article 4
WSMO and WSMX Support to the Semantic Web Services Technology (pages 40-56)
Mariam Abed Mostafa Abed (German University in Cairo, Egypt)
Article 5
Towards a Flexible and Adaptable Modeling of Business Processes (pages 57-67)
Khadhir Bekki (Ibn Khaldoune University, Algeria), Hafida Belachir (Boudiaf University, Algeria)
Article 6
An Experimental Study for the Effect of Stop Words Elimination for Arabic Text Classification Algorithms (pages 68-75)
Bassam Al-Shargabi (Isra University, Jordan), Fekry Olayah (Isra University, Jordan), Waseem AL Romimah (University of Science and Technology, Yemen)
Issue 3
Article 1
Searching and Generating Authoring Information: A Hybrid Approach (pages 1-14)
Faisal Alkhateeb (Yarmouk University, Jordan), Amal Alzubi (Yarmouk University, Jordan), Iyad Abu Doush (Yarmouk University, Jordan), Shadi Aljawarneh (Isra University, Jordan), Eslam Al Maghayreh (Yarmouk University, Jordan)
Article 2
A Generic QoS Model for Web: Services Design (pages 15-38)
Wan Nurhayati Wan Ab. Rahman (Universiti Putra Malaysia, Malaysia), Farid Meziane (University of Salford, UK)
Article 3
Development of a Novel Compressed Index-Query Web Search Engine Model (pages 39-56)
Hussein Al-Bahadili (Petra University, Jordan), Saif Al-Saab (University of Banking & Financial Sciences, Jordan)
Article 4
Quality-of-Service Based Web Service Composition and Execution Framework (pages 57-74)
Bassam Al Shargabi (Al-Isra University, Jordan), Osama Al-haj Hassan (Al-Isra University, Jordan), Alia Sabri (Applied Science University, Jordan), Asim El Sheikh (Arab Academy for Banking and Financial Sciences, Jordan)
Issue 4
Article 1
Productivity Evaluation of Self-Adaptive Software Model Driven Architecture (pages 1-19)
Basel Magableh (Trinity College Dublin, Ireland), Stephen Barrett (Trinity College Dublin, Ireland)
Article 2
A Unified Approach to Uncertainty-Aware Ubiquitous Localisation of Mobile Users (pages 20-34)
Petr Aksenov (Hasselt University, Belgium), Kris Luyten (Hasselt University, Belgium), Karin Coninx (Hasselt University, Belgium)
Article 3
Design and Operation of a Cell Phone-Based Community Hazard Information Sharing System (pages 35-50)
Mayayuki Shinohara (Kanagawa Institute of Technology, Japan), Akira Hattori (Kanagawa Institute of Technology, Japan), Shigenori Ioroi (Kanagawa Institute of Technology, Japan), Hiroshi Tanaka (Kanagawa Institute of Technology, Japan), Haruo Hayami (Kanagawa Institute of Technology, Japan), Hidekazu Fujioka (Morinosato 4-chrome Association in Atsugi City, Japan), Yuichi Harada (Morinosato 4-chrome Association in Atsugi City, Japan)
Article 4
Convergence Aspects of Autonomic Cooperative Networks (pages 51-62)
Michal Wódczak (Telcordia Technologies, Poland)
Article 5
Relay Selection in Distributed Transmission Based on the Golden Code Using ML and Sphere Decoding in Wireless Networks (pages 63-75)
L. Ge (Loughborough University, UK), G. J. Chen (Loughborough University, UK), J. A. Chambers (Loughborough University, UK)
Volume 5 (2010)
Issue 1
Article 1
Deep Web Information Retrieval Process: A Technical Survey (pages 1-22)
Dilip Kumar Sharma (G.L.A. Institute of Technology and Management, Mathura, U. P., India), A. K. Sharma (YMCA University of Science and Technology, Faridabad, Haryana, India)
Article 2
Experiences in Developing a Micro-payment System for Peer-to-Peer Networks (pages 23-42)
Kaylash Chaudhary (The University of the South Pacific, Fiji), Xiaoling Dai (The University of the South Pacific, Fiji), John Grundy (University of Auckland, New Zealand)
Article 3
Virtual Telemedicine Using Natural Language Processing (pages 43-55)
Imran Sarwar Bajwa (The Islamia University of Bahawalpur, Pakistan)
Article 4
Geographic Information Retrieval and Text Mining on Chinese Tourism Web Pages (pages 56-75)
Ming-Cheng Tsou (National Kaohsiung Marine University, Taiwan)
Issue 2
Article 1
Ripple Effect in Web Applications (pages 1-15)
Nashat Mansour (Lebanese American University in Beirut, Lebanon), Nabil Baba (Lebanese American University, Lebanon)
Article 2
A Pattern Language for Knowledge Discovery in a Semantic Web context (pages 16-31)
Mehdi Adda (University of Quebec at Rimouski, Canada)
Article 3
Information Acquisition and Recall in Location-Aware and Search Engine Retrieval Systems (pages 32-52)
Sorin Adam Matei (Purdue University, USA), Lance Madsen (Innervision Advanced Medical Imaging, USA), Robert Bruno (Purdue University, USA)
Article 4
Open Access to Control on Quality of Service in Convergent Networks (pages 53-74)
Evelina Pencheva (Technical University of Sofia, Bulgaria), Ivaylo Atanasov (Technical University of Sofia, Bulgaria)
Issue 3
Article 1
Finer Garbage Collection in Lindacap (pages 1-26)
Nur Izura Udzir (Universiti Putra Malaysia, Malaysia), Hamidah Ibrahim (Universiti Putra Malaysia, Malaysia), Sileshi Demesie (Bahir Dar University, Ethiopia)
Article 2
Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows (pages 27-48)
Iok-Fai Leong (University of Macau, China), Yain-Whar Si (University of Macau, China), Robert P. Biuk-Aghai (University of Macau, China)
Article 3
Improving Software Agent Communication with Structural Ontology Alignment Methods (pages 49-64)
Jairo F. de Souza (DCC/ICE/UFJF, Brazil), Rubens N. Melo (DI/PUC, Brazil), Jonice Oliveira (DCC/IM/UFRJ, Brazil), Jano de Souza (DCC/COPPE/UFRJ, Brazil), Sean Wolfgand M. Siqueira (DIA/UNIRIO, Brazil)
Article 4
A Model for Ranking and Selecting Integrity Tests in a Distributed Database (pages 65-84)
Ali Amer Alwan (Universiti Putra Malaysia, Malaysia), Hamidah Ibrahim (Universiti Putra Malaysia, Malaysia), Nur Izura Udzir (Universiti Putra Malaysia, Malaysia)
Article 5
SPACots: A Software Tool for Selecting COTS Components (pages 85-98)
Asmaa Alsumait (Kuwait University, Kuwait), Sami J. Habib (Kuwait University, Kuwait)
Issue 4
Article 1
Quality of Service for Multimedia and Real-Time Services (pages 1-22)
F. W. Albalas (Jadara University, Jordan), B. A. Abu-Alhaija (Middle East University, Jordan), A. Awajan (Al-Balqa’ Applied University, Jordan), A. Awajan (Princess Sumaya University for Technology, Jordan), Khalid Al-Begain (University of Glamorgan, UK)
Article 2
Collaborative Service Clouds (pages 23-39)
Liliana Ardissono (Università di Torino, Italy), Gianni Bosio (Università di Torino, Italy), Anna Goy (Università di Torino, Italy), Giovanna Petrone (Università di Torino, Italy), Marino Segnan (Università di Torino, Italy), Fabrizio Torretta (Università di Torino, Italy)
Article 3
The Role of Physical Affordances in Multifunctional Mobile Device Design (pages 40-57)
Sorin Adam Matei (Purdue University, USA), Anthony Faiola (Indiana University, USA), David J. Wheatley (Motorola Applied Research, USA), Tim Altom (Indiana University, USA)
Volume 4 (2009)
Issue 1
Article 1
A Concept for Mobile Ad-Hoc Messaging Networks (AMNet) (pages 1-13)
Stefan Stieglitz (University of Potsdam, Germany), Christoph Fuchß (Virtimo Webbased Applications, Germany), Sascha Stöckel (Brandenburg University of Applied Sciences, Germany), Christoph Lattemann (University of Potsdam, Germany)
Article 2
Viticulture Zoning by an Experimental WSN (pages 14-30)
P. Mariño (University of Vigo, Spain), F.P. Fontán (University of Vigo, Spain), M.A. Domínguez (University of Vigo, Spain), S. Otero (University of Vigo, Spain)
Article 3
A Linked Neighboring Leaves N-Tree to Support Distance Range Search (pages 31-50)
Faïza Najjar (National School of Comp. Science, Tunisia), Hassenet Slimani (Faculty of Sciences, Tunisia)
Article 4
A Location-Aware Access Control Model for Mobile Workflow Systems (pages 50-66)
Michael Decker (University of Karlsruhe, Germany)
Article 5
Context-Aware Recommender Systems in Mobile Scenarios (pages 67-85)
Wolfgang Woerndl (Technische Universitaet Muenchen, Germany), Michele Brocco (Technische Universitaet Muenchen, Germany), Robert Eigner (Technische Universitaet Muenchen, Germany)
Issue 2
Article 1
Fault-Tolerant Text Data Compression Algorithms (pages 1-19)
L. Robert (Government Arts College, India), R. Nadarajan (PSG College of Technology, India)
Article 2
Adaptability and Adaptivity in The Generation of Web Applications (pages 20-44)
Raoudha Ben Djemaa (MIRACL, Tunisie), Ikram Amous (MIRACL, Tunisie), Abdelmajid Ben Hamadou (MIRACL, Tunisie)
Article 3
Generating Join Queries for Large Databases and Web Services (pages 45-60)
Sikha Bagui (The University of West Florida, USA), Adam Loggins (Zilliant Inc., USA)
Article 4
Multi-Agent Based Dynamic E-Learning Environment (pages 61-77)
Saleh AlZahrani (De Montfort University, UK), Aladdin Ayesh (De Montfort University, UK), Hussein Zedan (De Montfort University, UK)
Article 5
Analysis of Quality of Service Routing Algorithms (pages 78-89)
E.George Dharma Prakash Raj (Bharathidasan University, India), Sinthu JanitaPrakash (Cauvery College for Women, India), S.V.Kasmir Raja (SRM University, India)
Issue 3
Article 1
SWAMI: A Multiagent, Active Representation of a User's Browsing Interests (pages 1-24)
Mark Kilfoil (University of New Brunswick, Canada), Ali Ghorbani (University of New Brunswick, Canada)
Article 2
Analyzing the Long Range Dependence and Object Popularity in Evaluating the Performance of Web Caching (pages 25-37)
G.P. Sajeev (Government Engineering College - Kozhikode, India), M.P. Sebastian (National Institute of Technology - Calicut, India)
Article 3
Increased Popularity Through Compliance with Usability Guidelines in E-Learning Web Sites (pages 38-57)
Greg Scowen (ETH Zurich, Switzerland), Holger Regenbrecht (University of Otago, New Zealand)
Article 4
Design of an Integrated Web Services Brokering System (pages 58-77)
Frederick Petry (Naval Research Laboratory - Stennis Space Center, USA), Roy Ladner (Naval Meteorology and Oceanography Command - Stennis Space Center, USA), Kalyan Moy Gupta (Knexus Research, USA), Philip Moore (Knexus Research, USA), David W. Aha (Naval Research Laboratory, US)
Issue 4
Article 1
Whose Questionnaire is It, Anyway? (pages 1-21)
Andrew Saxon (Birmingham City University, United Kingdom), Shane Walker (Birmingham City University, United Kingdom), David Prytherch (Birmingham City University, United Kingdom)
Article 2
A Conceptual Tool for Usability Problem Identification in Website Development (pages 22-35)
Mikael B. Skov (Aalborg University, Denmark), Jan Stage (Aalborg University, Denmark)
Article 3
Social Research Methods Used in Moving the Traditional Usability Approach Towards a User-Centered Design Approach (pages 36-53)
Horia D. Pitariu (Babes-Bolyai University, Romania), Daniela M. Andrei (Babes-Bolyai University, Romania), Adriana M. Guran (Babes-Bolyai University, Romania)
Article 4
Integrating Accessibility Evaluation into Web Engineering Processes (pages 54-77)
Christopher Power (University of York, United Kingdom), André Pimenta Freire (University of York, United Kingdom), Helen Petrie (University of York, United Kingdom)
Article 5
Usability Methodologies for Real-Life Voice User Interfaces (pages 78-94)
Georgios Kouroupetroglou (University of Athens, Greece), Dimitris Spiliotopoulos (University of Athens, Greece)
Volume 3 (2008)
Issue 1
Article 1
A Semantic Web-based Approach for Context-Aware User Query formulation and Information Retrieval (pages 1-23)
Hahn H. Hoang (Vienna University of Technology, Austria), Tho M. Nguyen (Vienna University of Technology, Austria), A M. Tjoa (Vienna University of Technology, Austria)
Article 2
The Impact of Ontology on the Performance of Information Retrieval: A Case of Wordnet (pages 24-37)
Maria Indrawan (Monash University, Australia), Seng W. Loke (La Trobe University, Australia)
Article 3
Localized User Interface for Improving Cell phone Users' Device Competency (pages 38-52)
Lucia D. Krisnawati (Duta Wacana Christian University, Indonesia), Restyandito (Duta Wacana Christian University, Indonesia)
Article 4
Voice Driven Emotion Recognizer Mobile Phone: Proposal and Evaluations (pages 53-69)
Aishah A. Razak (Multimedia University, Malaysia), Mohamad I.Z. Abidin (Multimedia University, Malaysia), Ryoichi. Komiya (Multimedia University, Malaysia)
Article 5
Image Mining: A Case for Clustering Shoe prints (pages 70-84)
Wei Sun (Monash University, Australia), David Taniar (Monash University, Australia), Torab Torabi (La Trobe University, Australia)
Issue 2
Article 1
A Graphical User Interface (GUI) Testing Methodology (pages 1-18)
Zafar Singhera (ZAF Consulting, USA), Ellis Horowitz (Univserity of Southern California, USA), Abad Shah (R & D Center of Computer Science, Pakistan)
Article 2
Class Level Test Case Generation in Object Oriented Software Testing (pages 18-26)
N. Gupta (Birla Institute of Technology, India), D. Saini (King Saud University, College of Science, Saudi Arabia), H. Saini (Higher Institute of Electronics, Libya)
Article 3
A Methodology for Integrating Patterns in Quality-Centric Web Applications (pages 27-44)
Pankaj Kamthan (Concordia University, Canada)
Article 4
A Framework for a Scenario Driven Decision Support Systems Generator (pages 45-62)
M.Daud Ahmed (Manukau Institute of Technology, New Zealand), David Sundaram (University of Auckland, New Zealand)
Issue 3
Article 1
An Approach Based on Market Economy for Consistency Management in Data Grids with OptorSim Simulator (pages 1-16)
Ghalem Belalem (University of Oran, Algeria), Belabbes Yagoubi (University of Oran, Algeria), Samah Bouamama (University of Oran, Algeria)
Article 2
A Framework for the Active Credibility Engineering of Web Applications (pages 17-27)
Pankaj Kamthan (Concordia University, Canada)
Article 3
The Theory and Implementation of InputValidator: A Semi-Automated Value-Level Bypass Testing Tool (pages 28-45)
J. Miller (University of Alberta, Canada), L. Zhang (University of Alberta, Canada), E. Ofuonye (University of Alberta, Canada), M. Smith (University of Calgary, Canada)
Article 4
Performance Analysis of a Web Server (pages 50-65)
Jijun Lu (University of Connecticut, USA), Swapna S. Gokhale (University of Connecticut, USA)
Article 5
Interoperability in Web-Based Geospatial Applications (pages 66-88)
Iftikhar U. Sikder (Cleveland State University, USA), Aryya Gangopadhyay (University of Maryland - Baltimore County, USA), Nikhil V. Shampur (Cleveland State University, USA)
Issue 4
Article 1
Experiences with Software Architecture Analysis of Usability (pages 1-29)
Eelke Folmer (University of Nevada - Reno, USA), Jan Bosch (Intuit Inc. - Mountain View, USA)
Article 2
A New Framework for Intelligent Semantic Web Services Based on GAIVAs (pages 30-58)
Andrés Iglesias (University of Cantabria, Spain)
Article 3
A Framework Towards Semantic Web Service Composition Based on Multi-Agent System (pages 59-81)
Sandeep Kumar (Institute of Technology - Banaras Hindu University, India), R. B. Mishra (Institute of Technology - Banaras Hindu University, India)
Volume 2 (2007)
Issue 1
Article 1
Hierarchical Scheduling in Heterogeneous Grid Systems (pages 1-16)
Khaldoon Al-Zoubi (Carleton University, Canada)
Article 2
Object Grouping and Replication on a Distributed Web Server System (pages 17-33)
Amjad Mahmood (University of Bahrain, Bahrain), Taher S.K. Homeed (University of Bahrain, Bahrain)
Article 3
On a Modified Backoff Algorithm for MAC Protocol in MANETs (pages 34-46)
Saher S. Manaseer (University of Glasgow, UK), Mohamed Ould-Khaoua (University of Glasgow, UK), Lewis M. Mackenzie (University of Glasgow, UK)
Article 4
FSR Evaluation Using the Suboptimal Operational Values (pages 47-56)
Osama H.S. Khader (The Islamic University of Gaza, Palestine)
Article 5
Engineering Conceptual Data Models from Domain Ontologies: A Critical Evaluation (pages 57-70)
Haya El-Ghalayini (University of the West of England (UWE), UK), Mohammed Odeh (University of the West of England (UWE), UK), Richard McClatchey (University of the West of England (UWE), UK)
Issue 2
Article 1
Studying and Analysis of a Vertical Web Page Classifier Based on Continuous Learning Naïve Bayes (CLNB) Algorithm (pages 1-44)
H. A. Ali (Mansoura University, Egypt), Ali I.El Desouky (Mansoura University, Egypt), Ahmed I. Saleh (Mansoura University, Egypt)
Article 2
A Multi-Agent Temporal Constraint Satisfaction System Based on Allen's Interval Algebra and Probabilities (pages 45-64)
Elhadi Shakshuki (Acadia University, Canada), André Trudel (Acadia University, Canada), Yiqing Xu (Acadia University, Canada)
Article 3
A Survey of Web Service Discovery Systems (pages 65-80)
Duy Ngan Le (Nanyang Technological University, Singapore), Angela Eck Soong Goh (Ho Chi Minh City University of Technology, Vietnam)
Article 4
Impact of Internet Usage in Saudi Arabia: A Social Perspective (pages 81-115)
Sadiq M Sait (King Fahd University of Petroleum & Minerals, Saudi Arabia), Khalid M Al-Tawil (National Information Center, Saudi Arabia)
Issue 3
Article 1
Modeling Defects In E-Projects (pages 1-16)
John D. Ferguson (Unversity of Strathclyde, UK), James Miller (University of Alberta, Canada)
Article 2
Secure Online DNS Dynamic Updates: Architecture and Implementation (pages 17-36)
Xunhua Wang (James Madison University, USA), David Rine (George Mason University, USA)
Article 3
Web Site Performance Analysis Success Assessment of Information Driven Web Site on User Traces (pages 37-52)
Carsten Stolz (University of Eichstaett-Ingolstadt, Germany), Michael Barth (Ludwig-Maximilian-University, Germany)
Article 4
Building a Semantic-Rich Service-Oriented Manufacturing Environment (pages 53-64)
Zhonghua Yang (Nanyang Technological University, Singapore), Jing Bing Zhang (Singapore Institute of Manufacturing Technology, Singapore), Rober Gay (Nanyang Technological University, Singapore), Liquin Zhuang (Singapore Institute of Manufacturing Technology, Singapore), Hui Mien Lee (Nanyang Technological University, Singapore)
Article 5
Tool Support for Model-driven Development of Web Applications (pages 65-78)
Jaime Gomez (University of Alicante, Spain), Alejandro Bia (Universidad Miguel Hernandez, Spain), Antonio Parraga (University of Alicante, Spain)
Issue 4
Article 1
A Multiagent Approach for Configuring and Explaining Workflow of Semantic Web Services (pages 1-20)
Vasco Furtado (University of Fortaleza, Brazil), Leonardo Ayres (University of Fortaleza, Brazil), Gustavo Fernandes (University of Fortaleza, Brazil)
Article 2
Employing Graph Network Analysis for Web Service Composition (pages 21-40)
John Gekas (University of Essex, UK), Maria Fasli (University of Essex, UK)
Article 3
Context-Aware Service Provisioning in Next-Generation Networks: An Agent Approach (pages 41-62)
Vedran Podobnik (University of Zagreb, Croatia), Krunoslav Trzec (Ericsson Nikola Tesla, Croatia), Gordan Jezic (University of Zagreb, Croatia)
Article 4
A Mobile Intelligent Agent-Based Architecture for E-Business (pages 63-80)
Zhiyong Weng (University of Ottawa, Canada), Thomas Tran (University of Ottawa, Canada)
Volume 1 (2006)
Issue 1
Article 1
Modeling Variant User Interfaces for Web-Based Software Product Lines (pages 1-34)
Suet Chun Lee (BUSINEX, Inc., USA)
Article 2
A Subspace Clustering Framework for Research Group Collaboration (pages 35-58)
Nitin Agarwal (University of Arkansas at Little Rock, USA), Ehtesham Haque (Arizona State University, USA), Huan Liu (Arizona State University, USA), Lance Parsons (Arizona State University, USA)
Article 3
Engineering Wireless Mobile Applications (pages 59-75)
Qusay H. Mahmoud (University of Guelph, Canada), Zakaria Maamar (Zayed University, UAE)
Article 4
Experience Report: A Component-Based Data Management and Knowledge Discovery Framework for Aviation Studies (pages 76-90)
M. Brian Blake (Georgetown University, USA & Center for Advanced Aviation System Development, The MITRE Corporation, USA), Lisa Singh (Georgetown University, USA), Andrew B. Williams (Spelman College, USA), Wendell Norman (Center for Advanced Aviation System Development, The MITRE Corporation, USA), Amy L. Silva (Georgetown University, USA)
Issue 2
Article 1
Agile Development of Secure Web-Based Applications (pages 1-24)
A. F. Tappenden (University of Alberta, Canada), T. Huynh (University of Alberta, Canada), J. Miller (University of Alberta, Canada), A. Geras (University of Calgary, Canada), M. Smith (University of Calgary, Canada)
Article 2
E-Portfolio to Promote the Virtual Learning Group Communities on the Grid (pages 25-42)
Guy Gouarderes (Laboratoire LIUPPA - Universite de Pau et des Pays de l’Adour, France), Emilie Conte (Laboratoire LIUPPA - Universite de Pau et des Pays de l’Adour, France)
Article 3
High Performance Scheduling Mechanism for Mobile Computing Based on Self-Ranking Algorithm (pages 43-59)
Hesham A. Ali (Mansoura University, Egypt), Tamer Ahmed Farrag (Mansoura University, Egypt)
Article 4
Incremental Learning for Interactive E-Mail Filtering (pages 60-78)
Ding-Yi Chen (University of Queensland, Australia), Xue Li (University of Queensland, Australia), Zhao Yang Dong (University of Queensland, Australia), Xia Chen (University of Queensland, Australia)
Issue 3
Article 1
Integration of Libre Software Applications to Create a Collaborative Work Platform for Researchers at GET (pages 1-16)
Olivier Berger (GET/INT, France), Christian Bac (GET/INT, France), Benoît Hame (GET/INT, France)
Article 2
FLOSSmole: A Collaborative Repository for FLOSS Research Data and Analyses (pages 17-26)
James Howison (Syracuse University, USA), Megan Conklin (Elon University, USA), Kevin Crowston (Syracuse University, USA)
Article 3
Applying Social Network Analysis Techniques to Community-Driven Libre Software Projects (pages 27-48)
Luis López-Fernández (Universidad Rey Juan Carlos, Spain), Gregorio Robles (Universidad Rey Juan Carlos, Spain), Jesus M.. Gonzalez-Barahona (Universidad Rey Juan Carlos, Spain), Israel Herraiz (Universidad Rey Juan Carlos, Spain)
Article 4
Multimodal Modeling, Analysis, and Validation of Open Source Software Development Processes (pages 49-63)
Walt Scacchi (University of California, Irvine, USA), Chris Jensen (University of California, Irvine, USA), John Noll (Santa Clara University, USA), Margaret Elliott (University of California, Irvine, USA)
Article 5
An Empirical Study on the Migration to OpenOffice.org in a Public Administration (pages 64-80)
B. Rossi (Free University of Bolzano-Bozen, Italy), M. Scotto (Free University of Bolzano-Bozen, Italy), A. Sillitti (Free University of Bolzano-Bozen, Italy), G. Succi (Free University of Bolzano-Bozen, Italy)
Article 6
Open Source in Web-Based Applications: A Case Study on Single Sign-On (pages 81-94)
Claudio Agostino Ardagna (Università degli Studi di Milano, Italy), Fulvio Frati (Università degli Studi di Milano, Italy), Gabriele Gianini (Università degli Studi di Milano, Italy)
Issue 4
Article 1
eDAR Algorithm for Continuous KNN Queries Based on Pine (pages 1-21)
Maytham Safar (Kuwait University, Kuwait), Dariush Ebrahimi (Kuwait University, Kuwait)
Article 2
Text Summarization Based on Conceptual Data Classification (pages 22-36)
Jihad M. ALJa’am (University of Qatar, Qatar), Ali M. Jaoua (University of Qatar, Qatar), Ahmad M. Hasnah (University of Qatar, Qatar), F. Hassan (University of Qatar, Qatar), H. Mohamed (University of Qatar, Qatar), T. Mosaid (University of Qatar, Qatar), H. Saleh (University of Qatar, Qatar), F. Abdullah (University of Qatar, Qatar), H. Cherif (University of Qatar, Qatar)
Article 3
A Prediction-Based Flexible Channel Assignment in Wireless Networks Using Road Topology Information (pages 37-48)
G. Sivaradje (Pondicherry Engineering College, India), R. Nakkeeran (Pondicherry Engineering College, India), P. Dananjayan (Pondicherry Engineering College, India)
Article 4
A Deterministic Approach to XML Query Processing with Efficient Support for Pure and Negated Containments (pages 49-67)
Dunren Che (Southern Illinois University at Carbondale, USA)
Article 5
Web Data Warehousing Convergence: From Schematic to Systematic (pages 68-80)
D. Xuan Le (La Trobe University, Australia), J. Wenny Rahayu (La Trobe University, Australia), David Taniar (Monash University, Australia)