The Challenges of Big Data Visual Analytics and Recent Platforms
Hoda A. Abdelhafez
1. Faculty of Computers & Informatics, Suez Canal University, Ismailia – Egypt
2. College of Computer & Information Sciences, Princess Nourah University, Riyadh, Saudi Arabia
Abeer A. Amer
Sadat Academy for management and Sciences, Alexandria, Egypt
A Content-Based Schema Matching Tool
Farid Bourennani
Dept. of Computer Science and Artificial Intelligence, Faculty of Computer Science and Engineering, Jeddah, Saudi Arabia.
Mike Bourque
Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, ON, Canada.
Hoda Abdelhafez, Maram Alamri, Riyof Alomari, Bayader Alzoman, Rfeef BinSheeha, Ayah Albawardi, Rehab Alzahrani
Information Technology Department, College of Computer & Information Sciences,Princess Nourah University, Riyadh, Saudi Arabia.
Speculation and Negation Detection for Arabic Biomedical Texts
Fatima T. Al-Khawaldeh
Department of Computer Science, University of York, York, United Kingdom.
Multimorbidity Prediction Using Data Mining Model
Najah Al-shanableh, Mofleh Al Diabat
Department of Computer Science, Al Albayt University, Al Mafraq- Jordan.
Customer Segmentation Based on GRFM: Case Study
Sahar Ghoreishi, Industrial Engineering Department K.N.Toosi University of Technology Tehran, Iran.
Keyvan Khandestani, Information Technology Department, Electronic Branch, Islamic Azad University, Tehran, Iran.
The Challenges of Big Data Visual Analytics and Recent Platforms
Hoda A. Abdelhafez
1. Faculty of Computers & Informatics, Suez Canal University, Ismailia – Egypt
2. College of Computer & Information Sciences, Princess Nourah University, Riyadh, Saudi Arabia
Abeer A. Amer
Sadat Academy for management and Sciences, Alexandria, Egypt
A Content-Based Schema Matching Tool
Farid Bourennani
Dept. of Computer Science and Artificial Intelligence, Faculty of Computer Science and Engineering, Jeddah, Saudi Arabia.
Mike Bourque
Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, ON, Canada.
Hoda Abdelhafez, Maram Alamri, Riyof Alomari, Bayader Alzoman, Rfeef BinSheeha, Ayah Albawardi, Rehab Alzahrani
Information Technology Department, College of Computer & Information Sciences,Princess Nourah University, Riyadh, Saudi Arabia.
Speculation and Negation Detection for Arabic Biomedical Texts
Fatima T. Al-Khawaldeh
Department of Computer Science, University of York, York, United Kingdom.
Multimorbidity Prediction Using Data Mining Model
Najah Al-shanableh, Mofleh Al Diabat
Department of Computer Science, Al Albayt University, Al Mafraq- Jordan.
Customer Segmentation Based on GRFM: Case Study
Sahar Ghoreishi, Industrial Engineering Department K.N.Toosi University of Technology Tehran, Iran.
Keyvan Khandestani, Information Technology Department, Electronic Branch, Islamic Azad University, Tehran, Iran.

Broadcast Distributed PSO for Large Scale Problems
Farid Bourennani
Department of Computer Science, Faculty of Computing and IT, University of Jeddah, Saudi Arabia.
Review of Literature on Software Quality
Farhan M Al Obisat, Zaid T. Alhalhouli, Tamador I. Alrawashdeh, Tamara E. Alshabatat
Computer and Information Technology Department, Tafila Technical University, TTU, Tafila, Jordan.
Performance Comparative Study of DSDV, E-DSDV, I-DSDV and O-DSDV MANET Routing Protocols
Mada’ Abdel Jawad, Saeed Salah, Raid Zaghal
Department of Computer Science, Al-Quds University, Jerusalem, Palestine.
Elderly People’s Life Saving Assistant (EPLSA) using IoT
Rufaida M. Shamroukh, Nawal A. Zabin, Muhammed A. Mesleh
Computer Engineering Department, Faculty of Engineering Technology, Al-Balqa Applied University, Amman, Jordan.
Mohammed Al Masarweh, Waleed Afndy
Management Information System Department, College of Business in Rabigh, King Abdulaziz University, Saudi Arabia.
Crack Detection on Concrete Surfaces Using V-shaped Features
Yoshihiro Sato, Yue Bao, Yutaro Koya
Graduate School of Engineering, Tokyo City University, Tokyo, Japan.

Image Retrieval Model Based on Color and Shape Features Utilizing 2D Wavelet Transform
Jehad Q. Odeh Alnihoud, Department of Computer Science, Al-al Bayt University, Mafraq, Jordan.
A Practical Approach for Detecting Logical Error in Object Oriented Environment
Ghassan Samara, Internet Technology Department Zarqa University, Jordan.
GL-Model, Representing Emergence Of Dangerous State In Multiprocessor Management System
Rabah AlShboul, Computer Science Department Al Albayt University Mafraq, Jordan
Vitaliy A. Romankevich, Department of Applied Mathematics Igor Sikorsky Kyiv Polytechnic Institute Kyiv, Ukraine.
Impact of Security Issues in Cloud Computing Towards Businesses
Bader Methqal AlFawwaz
Department of Computer Information Systems, Al al-Bayt University, Jordan.

Object Oriented Model Development for Education Institutes’ Internal Auditing Process
Sally Dafaallah Abualgasim, Department Computer Engineering, Faculty of Engineering and Technology, University of Gezira, Wed Medani, Sudan.
Hujla Siddig Abd-Allah Osman, Accounting and Banking Information Systems Department, Wad Medani Technological College, Sudan Technological University
Wed Medani, Sudan.
Development of an Efficient Image Segmentation Algorithm via Splitting and Merging Techniques
Mohammed Ashraf Zoghoul, Ashraf Abu-Ain, Jihad Nader Abdeljalil
Computer Engineering Department, Al-Balqa Applied University / FET, Amman,Jordan.
Khaled Batiha, Mohammed O. Alshroqee
Computer science department, Al al-Bayt University, Jordan.
The General Form of GoF Design Patterns
Siniša Vlajic, Vojislav Stanojevic, Dušan Savic, Miloš Milic, Ilija Antovic, Saša Lazarevic
Department of software engineering, Faculty of organisational sciences, University of Belgrade, Belgrade, Serbia.
1- New Automatic Search and Update Algorithms of Vietnamese Abbreviations
Nguyen Nho Tuy, Vietnam Posts and Telecommunications Group, (VNPT) Danang Branch, Danang City, Vietnam.
Phan Huy Khanh, University of Science and Technology, – The University of Danang, Danang City, Vietnam.
2- Speculation and Negation Annotation for Arabic Biomedical Texts: BioArabic Corpus
Fatima T. AL-Khawaldeh
Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.

Fingerprint Singular Point Detection via Quantization and Fingerprint Classification
Shing Chyi Chua, Eng Kiong Wong, Alan Wee Chiat Tan
Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia.
An Empirical Analysis of Multiple Level Association Rules Mining Method for Feature Extraction
Ruchika Yadav, Kanwal Garg
Department of Computer Science and Application, Kurukshetra University, Kurukshetra, India.
Data Quality Based Data Integration Approach
Mohamed Samir Abdel-Moneim, College of Computing and Information Technology, Arab Academy for Science Technology & Maritime Transport, Egypt.
Ali Hamed El-Bastawissy, Faculty of Computer Science, MSA University, Egypt.
Mohamed Hamed Kholief, College of Computing and Information Technology, Arab Academy for Science Technology & Maritime Transport, Egypt.
Analysis of Factors Influence Online Trust: A Unified Model
Sahar Ghoreishi, Shahriar Mohammadi
Industrial Engineering Department ,K.N.Toosi University of Technology, Tehran, Iran.
1- Free Scale and SOLR Architectures for Load Handling of Social Networking Sites
Nirmal Dhara, Shashank K
Department of Computer Science, Christ University, Bangalore, India.
Chandra J, Nachamai.M
Associate Professor, Department of Computer Science, Christ University, Bangalore, Karnataka, India.
Anitha S Pillai
Professor and Head, Department of MCA, Hindustan University, Chennai, Tamil Nadu, India.
Advances in Mobile Cloud Computing
Timur Mirzoev, Amy Coleman, Robin Wacha-Bessert, Georgia Southern University: Information Technology, Statesboro, GA USA.
Ben Lai, Douglas Olson, Clayton State University: Information Technology, Morrow, GA USA.
Fatima T. AL-Khawaldeh, Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.
3- Dynamic Image Display and Adjustment Method for Glassless 3D Viewing Systems
Isao Nishihara, Takayuki Nakata
Department of Information Systems Engineering, Faculty of Engineering, Toyama Prefectural University, Imizu city, Toyama, Japan.
1- Automatic Optic Disc Localization and Segmentation using Swarm Intelligence
Thresiamma Devasia, Dept. of Computer Science, Assumption College Changanacherry, Kerala , India.
Poulose Jacob, Dept. Computer Science, Cochin University of Science and Technology, Kerala, India.
Tessamma Thomas, Dept. of Electronics , Cochin University of Science And Technology, Kerala, India.
2- GIS as a Job Growth Area for IT Professionals
Timur Mirzoev, Anthony Moore, Brianna Pryzbysz
Information Technology Department, Georgia Southern University, Statesboro, GA USA.
Melissa Taylor, Information Technology Department, Columbus State University, Columbus, GA USA.
John Centeno, Information Technology Department, Armstrong State University, Savannah, GA USA.
3- The Effect of Combining Different Semantic Relations on Arabic Text Classification
Suhad A. Yousif, Islam Elkabani
Mathematics and Computer Science Department, Beirut Arab University, Lebanon.
Venus W. Samawi, Computer Information System Department, Amman Arab University, Jordan.
Rached Zantout, Electrical and Computer Engineering Department Rafik Hariri University Lebanon.
1- Answer Extraction for Why Arabic Questions Answering Systems: EWAQ
Fatima T. AL-Khawaldeh
Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.
2- Mobile Secure Transmission Method Based on Audio Steganography
Alaa Alhamami, Avan Sabah Hamdi
Amman Arab University, Amman, Jordan.
3- Evaluating E-Learning System Use by CBAM-Stages of Concern Methodology in Jordanian Universities
Nasim Matar
Department of Software Engineering, Applied Science University, Amman, Jordan.
1- Launching E-Government in Jordan, Jordanian Experience
Issa S. I. Ottoum
Department of Computer Information systems, Alzaytoonah University of Jordan, Amman, Jordan.
2 -A Virtual TV System Using Head-mounted Display with Stereo Camera
Ryo HARASHIMA, Systems Information Engineering Tokyo City University, Tokyo, Japan.
Yue BAO, Faculty of Knowledge Engineering Tokyo City University, Tokyo, Japan.
1- Evaluating E-portfolio System Use within Educational Context
Nasim Matar
Department of Software Engineering Applied Science University , Amman – Jordan.
2- Deploying an Efficient Safety System for VANET
Ghassan Samara, Department of Computer Science, Faculty of Science and Information Technology, Zarqa Private University, Zarqa, Jordan.
Mohammad Rasmi, Department of Software Engineering, Faculty of Science and Information Technology, Zarqa Private University, Zarqa, Jordan.
1- Mobile Sink Assisted Energy Efficient Routing Algorithm for Wireless Sensor Networks
Deepa V.Jose, Department of Computer Science Christ University Bangalore, India.
G. Sadashivappa, Department of Telecommunication EnginR.V.College of Engineering, Bangalore, India.
2- Secure Mobile Cloud Computing Based-On Fingerprint
Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi
Department of Computer Sciences and Informatics Amman Arab University, Amman, Jordan.
3- An Efficient Method to Recognize Human Faces From Video Sequences with Occlusion
Vijayalakshmi A., Dept. of Computer Science Christ University Bangalore, India.
Pethuru Raj, Cloud Architect IBM Global Cloud Center of Excellence (CoE), IBM India Bangalore.
Yasser Mohammad Al-Sharo
University of Ajloun National, Faculty of Information Technology , Ajloun, Jordan.
2- Securing VoIP in SIP Mobile Network
Zaid Salah Munef, Master’s Degree in Computer Science Amman Arab University, Amman, Jordan.
Alaa Hussein Al-Hamami, Dean of Computer Sciences & Informatics College Amman Arab University, Amman, Jordan.
3- Role of Component Certification in CBSE Activities for Building High Quality Software
Lina khalid Ahmed
Department of Software Engineeing Zarqa University Amman ,Jordan.

1- An Intelligent Automated Irrigation System for the Jordan Valley Area
Samah A. Massadeh
Department of Computer Engineering, FET, BAU, Amman, Jordan.
2- Computer Simulation of Streamflows with GAR(1)-Monthly and GAR(1)-Fragments Models
Nguyen Van Hung, Computer Science Division, Danang Vocational Training College, Danang City, VietNam.
Huynh Ngoc Phien, Asian Institute of Technology, BangKok, Thailand.
Tran Quoc Chien, Danang University, Danang City, VietNam.
1- QoE-Based Scheduling Algorithm in WiMAX Network using Manhattan Grid Mobility Model
Tarik ANOUARI, Computer, Networks, Mobility and Modeling laboratory, Department of Mathematics and Computer, FST, Hassan 1st University, Morocco.
Abdelkrim HAQIQ, e-NGN Research group, Africa and Middle East.
Aktham Mohammad Mahmoud
Syrian Virtual University, Damascus, Syrian Arab Republic.
1- Discrete Wavelet Transform Based Algorithm for Recognition of QRS Complexes
Rachid HADDADI, Elhassane ABDELMOUNIM, Mustapha EL HANINE, Univ. Hassan I, ASTI Laboratory, 26000 Settat, Morocco
Abdelaziz BELAGUID, University Mohammed V-Souissi, Laboratory of Physiology, Rabat, Morocco.
Abdellah ZAALOUL, Computer, Networks, Mobility and Modeling laboratory FST, Hassan 1st University, Settat, Morocco.
Abdelkrim HAQIQ, e-NGN research group, Africa and Middle East.
1- Probabilistic PCA Mixture under Variance Preservation
Mohamed Nour I. Ismail, College of Science, King Faisal University, Saudi Arabia.
Mohamed El-Hafiz Mustafa Muse, College of Computer Science and IT, Sudan University of Science and Technology, Sudan.
2- Adaptive Activation Function for Isolated Digit Recognition Based on Speaker Dependent System
Ummu Salmah, M.H, Department of Information Technology, Kolej Universiti Islam Sultan Azlan Shah, Malaysia.
Siti Mariyam, S., Department of Computer Graphics and Multimedia, Universiti Teknologi Malaysia, Malaysia.
Saira Banu, O.K., Computing Department, Universiti Pendidikan Sultan Idris, Malaysia.
Nor Azah, Center of Language for Foundational Studies (CELFOS), Kolej Universiti Islam Sultan Azlan Shah, Malaysia.
1- Text Summarization as Feature Selection for Arabic Text Classification
Eman Al-Thwaib
Computer Information Systems Department, University of Jordan, Amman, Jordan.
2- A Local Time Calculating Courseware for Geography Students: Does it assist Teachers?
Nor Hasbiah Ubaidullah, Jamilah Hamid, Aslina Saad, Sairabanu Omar Khan
Computing Department, Universiti Pendidikan Sultan Idris, 35000 Tg. Malim, Perak, Malaysia.
3- Intelligent Emergency Message Broadcasting in VANET Using PSO
Ghassan Samara, Department of Computer Science, Zarqa University, Zarqa, Jordan.
Tareq Alhmiedat, Department of Information Technology, Tabuk University, Tabuk, Saudi Arabia.
Adeoye Temitope Onaolamipo
School of Computer Science, Mathematics & Information Technology, Houdegbe North America University, Republic of Benin.
2- Enhanced Wireless Transmitted Message Security By Encryption Complex Transformation
Oleg Viktorov , Middle East University, College of Information Technology, Computer Information System Department, Amman, Jordan.
Ahmed Shihab, Middle East University, College of Information Technology, Computer Science Department, Amman, Jordan.
1- Mobile Application Threats and Security
Timur Mirzoev, Michael Brannon, Shamimara Lasker, Mark Miller
Information Technology Department, Georgia Southern University, Statesboro, GA USA.
2- Current Practices in Monitoring Software Development Process in Malaysia
Megat Azrin Ahmad, Nor Hasbiah Ubaidullah, Modi Lakulu
Computing Department, Faculty of Art, Computing & Creative Industry, Sultan Idris Education University, Malaysia.
Majdi Salameh, IT Department, King Abdul Azziz University.
2- Data Hiding in Digital Images using Cryptography and Steganography Techniques (CryptSteg)
Rashiq R. Marie, Computer Science Department, Faculty of Science and Information Technology, Zarka University, Zarka, Jordan.
1- An O(n) Time Algorithm For Maximum Induced Matching In Bipartite Star123-free Graphs
Ruzayn Quaddoura, Department of Computer Science, Faculty of Science and Information Technology, Zarqa University, Zarqa-Jordan.
Dynamic Solutions for Leader Failure in 3D Torus Networks
Mohammed Refai, Al Zarqa University, College of Science and Information Technology.
1- Toward An Adaptive P300 Based Brain Computer
Mohammed J. Alhaddad, Information Technology Department, King Abdulaziz University, Jeddah, Saudi Arabia.
Mahmoud Kamel, Information System Department, King Abdulaziz University, Jeddah, Saudi Arabia.
Noura Al-Otaibi, Computer Department, King Abdulaziz University, Jeddah, Saudi Arabia.
2- Software Agents Interaction Algorithms in Virtual Learning Environment
Zahi A.M. Abu Sarhan
Faculty of Information Technology: Software Engineering Department , Applied Science Private University, Amman, Jordan.
1- A New Edge Detector in CT Scan Images Using Gradient of Weibull Distribution
Wafaa Kamel Al-Jibory, Department of Mathematics and Computer Science, Faculty of Science, Beirut Arab University, Beirut –Lebanon.
Ali El-Zaart, Department of Mathematics and Computer Science, Faculty of Science, Beirut Arab University, Beirut –Lebanon.
2- Cost Information Exchange With Other Supply Chain Firms, The Case Of Egypt
Mohamed Elgibale, R. Safwat
Faculty of Commerce, Beni Suef University – Egypt.

A Preliminary Evaluation Study for M-learning Services and Implications for Future Design
Mohammad Alnabhan, Ahmad Haboush
Department of Computer Science, Jerash University, Jerash, Jordan.
Ja’afer M. AL-Saraireh, Management Information Systems Department, Applied Science University, Amman, Jordan.
Nasim Matar, Internet Technologies department, Zarqa University, Zarqa, Jordan.
Dynamic Safety Message Power Control in VANET Using PSO
Ghassan Samara, Department of Computer Science, Zarqa University, Zarqa, Jordan.
Tareq Alhmiedat, Department of IT, Tabuk University, Tabuk , KSA.
Amer O. Abu Salem, Department of Computer Science, Zarqa University, Zarqa, Jordan.
Multi Module System in Development of Information Location Based School Application
Nuryuliani, Department of Information Technology, Gunadarma University, Depok, Indonesia.
Miftah Andriansyah, Department of Information Technology, Sekolah Tinggi Teknik Multimedia Cendekia Abditama, Tangerang, Indonesia.
Sutresna Wati, Department of Computer Science, Gunadarma University, Depok, Indonesia.
Software Application to Monitor and Control Distributed System Based On Mobile / Networks
Afif J. Almghawish, Akram Abdel Qader, Mohammad AbuMahfouz
Computer Science department, Al-Zaytoonah University of Jordan, Amman, Jordan.
1- Software Support For Programming Language Tutorials
Vladimir M. Bondarev, Computer Software Department, University Of Radi Electronics, Ukraine.
Afif J. Almghawish, Alexandre F. Ossyka, Issa S. Outoom Computer Science Department, Al-Zaytoonah University Of Jordan, Jordan.
2- Aspect Oriented Programming in Early Stages of a Software Development Project
Luis Marco Cáceres Alvarez, Marjane Delgado
Escuela Universitaria de Ingeniería Industrial, Informática y, de Sistemas, University of Tarapacá, Arica, Chile.
Mauricio Arriagada-Benítez, Department of Computer Science, School of Engineering, Pontificia Universidad Católica de Chile, Santiago, Chile.
Ramon Alvarez, Information Technology, Georgia Southern University, Statesboro, GA USA.
Timur Mirzoev, Information Technology, Georgia Southern University, Statesboro, GA USA.
Cache Discovery Policies of MANET
Amer O. Abu Salem, Ghassan Samara Department of CS, Zarqa University, Jordan.
Tareq Alhmiedat, Department of IT, Tabuk University, KSA.
Rajwinder Kaur, Kanwalvir Singh Dhindsa
Department of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, India.
Khalil Al-Hindi, Eman Al-Thwaib
Computer Information Systems Department, University of Jordan, Jordan.
3- A Novel Approach To Enhance a University Information System
Afif Jadalla ALmghawish, Alexandre F. Ossyka
Dept. of Computer Science, AL-Zaytoonah University of Jordan, Jordan.
Issa S. Ottoum, Dept. of Computer Networking, AL-Zaytoonah University of Jordan, Jordan.
1- Mobile Ad Hoc Networks Routing Using Ant Colony Optimization
Aws Kanan, Taisir Eldos, Mohammed Al-Kahtani
Department Of Computer Engineering, College of Computer Engineering and Sciences, Salman in Abdulaziz University, Saudi Arabia.
2- The Effect of Weight Factors Characters on Password Selection
Ghadeer Ali Shaheen, Ahmad Al Jaber, Alaa Al Hamami
Department of Computer Science,Amman Arab University, Jordan.
3- Apple IOS Devices for Network Administrators
Timur Mirzoev, Georgia Southern University, Statesboro, USA.
Gerard Gingo; Mike Stawchansky; Tracy White
Southern Polytechnic State University, Marietta, USA.
1- Image Inpainting by Kriging Interpolation Technique
Firas A. Jassim
Management Information Systems Department, Irbid National University, Jordan.
2- An Efficient Incremental Clustering Algorithm
Nidhi Gupta, USICT, GGSIPU, India.
R.L.Ujjwal, USICT, GGSIPU, India.
3- Adapting the Ant Colony Optimization Algorithm to the Printed Circuit Board Drilling Problem
Taisir Eldos, Aws Kanan, Abdullah Aljumah
Department Of Computer Engineering, College of Computer Engineering and Sciences, Salman in Abdulaziz University, Saudi Arabia.
Mehdi Naseriparsa, Amir-masoud Bidgoli, Touraj Varaee
Islamic Azad University, Tehran North Branch, Department Of Computer Engineering, Iran.
Saeed A. Al-Ghamdi, Hassan M. H. Mustafa
Faculty of Engineering, Al-Baha University, Al-Baha, Kingdom of Saudi Arabia.
Abdel Aziz M. Al-Bassiouni, Telecommunication & Technology Company, Cairo, Egypt.
Ayoub Al-Hamadi, Institute for Information and Communication Technology, Otto- von-Guericke-University Magdeburg, Germany.
Abubakar S. Magaji, Faculty of Science, Kaduna State University, Nigeria.
Victor Onomza Waziri, Audu Isah, Adeboye K.R.Federal University of Technology Minna-Nigeria.
1- A Negative Selection Algorithm Based on Email Classification Techniques
Victor Onomza Waziri, Ismaila Idris, Department of Cyber Security Science, School of Information and Communication Technology, Federal University of Technology, Nigeria.
Mohammed Bashir Abdullahi, Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Nigeria.
Hahimi Danladi, Audu Isah, Department of Mathematics/ Statistics, School of Natural and Applied Sciences,Federal University of Technology, Nigeria.
O. Osunade
Department of Computer Science, University of Ibadan, Nigeria.
3- Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era
Timur Mirzoev, David Hillhouse
Georgia Southern University, Statesboro, GA USA.
Bruce Benson, Armstrong Atlantic University, Savannah, GA USA.
Mickey Lewis, Southern Polytechnic State University, Marietta, GA USA.
1- An Optimized PID Control Strategy For Active Suspensions Applied To A Half Car Model
Mohammed H. AbuShaban, Mahir B. Sabra, Iyad M. Abuhadrous
Electrical Engineering Department, Islamic University of Gaza, Palestine.
Hanum Putri Permatasari, Silvia Harlena, Reza Chandra
Department of Information System, Gunadarma University, Indonesia.
Donny Erlangga, Department of Informatics Management, Gunadarma University, Indonesia.
3- Cloud Computing in Higher Education in Jordan
Samah A. Massadeh, Muhammad A. Mesleh
Department of computer engineering, Faculty of Engineering Technology, Jordan.
4- Mobile Application for Diabetes Risk Diagnosis and Information Based on Android
Remi Senjaya, Anindito Yoga Pratama
Department of Informatics Engineering, Faculty of Technology Industry, Gunadarma University, Indonesia.
Dewi Agushinta R., Department of Information System, Faculty of Computer Science & Information Technology, Gunadarma University, Indonesia.
5- Analysis on Backlinks and PageRank of Automotive Company Websites Using Crawler Tool
Dina Agusten, ST., MMSI ,Department of Informatics Engineering, Gunadarma University, Indonesia.
Winarti, SKom., MMSI, Department of Information System, Gunadarma University, Indonesia.
1- Real-Time System: Fire and Smoking Control System (Case Study)
Muhammed Ali Suliman Mesleh, Mohammed Ashraf Zoghoul
Computer Engineering Department, Al-Balqa Applied University Amman,Jordan.
2- Framework Environment for Understanding Object Oriented Techniques
Hamed J. Al-Fawareh
Faculty of Science and Information Technology Zarqa University Zarqa, Jordan.
3- Kriging Interpolation Filter to Reduce High Density Salt and Pepper Noise
Firas Ajil Jassim
Management Information System Department, Irbid National University, Jordan.
4- S-Scrum: a Secure Methodology for Agile Development of Web Services
Davoud Mougouei, Nor Fazlida Mohd Sani, Mohammad Moein Almasi
Department of Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Malaysia.
5- Exploring the Educational Benefits of Blogs to Help Non-Malay pupils in Malay Language Learning
Nor Hasbiah Ubaidullah, Norhayati Mahadi, Lee Hooi Ching
Computing Department, Sultan Idris Education University, Malaysia.

1- An Analytical Comparison of Rough Set Theory-based Grid Resource Matching Algorithms
Mehdi Bayat, Morteza Analoui
Computer Engineering Department Iran University of Science and Technology, Iran.
Milad Aghamohammadi, Morteza Analoui
Department of Computer Engineering, Iran University of Science and Technology, Iran.
3- A New Approach For Flexible Matching of Grid Resources
Mehdi Bayat, Morteza Analoui
Computer Engineering Department Iran University of Science and Technology, Iran.
Muhannad Akram Ahmad
Department of Accounting Information System, Irbid National University, Jordan.
1- Color Image Enhancement Using Steady State Genetic Algorithm
Reyadh Naoum, Ala’a Al-Sabbah
College of Information Technology Middle East University, Jordan.
Abdullah Mamoun Hattab, Abdulameer Khalaf Hussein
Department of Computer science Middle East University, Jordan.
Hadi Malekpour, Reza Berangi
Computer Engineering Iran University of Science and Technology, Iran.
4- Text-Independent Speaker Identification Using Hidden Markov Model
Sayed Jaafer Abdallah, Izzeldin Mohamed Osman, Mohamed Elhafiz Mustafa
College of Computer Science and Information Technology, Sudan University of Science and Technology, Sudan.
1- Framework Model for Strategic Plan Using Dynamic Workflow
Reyadh Shaker Naoum, Abdulameer Khalf Hussain
Department of Information System Faculty of Information Technology, Middle East University, Jordan.
Ziad Mohammad Abu-Hamour, Department of Information Technology, Free-Zones Company, Jordan.
2- Robust Digital Image Watermarking Technique Based on Histogram Analysis
Hamza A. Ali, Computer Engineering Department, College of Engineering, University of Basrah, Iraq.
Sama’a A. K. khamis, Electrical Engineering Department, College of Engineering, University of Basrah, Iraq.
3- Evaluation of Workflow Strategic Plans
Ziad Mohammad Abu-Hamour, Abdulameer Khalf Hussain
Department of Information Technology, Faculty of Information Technology, Middle East University, Jordan.
4- Multi-Level Support Vector Machine
Milad Aghamohammadi, Morteza Analoui
Department of Computer Engineering, Iran University of Science and Technology, Iran.
5- Evaluation and Comparison of Security Issues on Cloud Computing Environment
Priyanka Arora, Arun Singh, IIMT Engineering College, Meerut UP, India.
Himanshu Tyagi, Raj Kumar Goel, Institute of Technology for Women, Ghaziabad, UP, India.
Rufai M.M, Adigun J. O, N. A. Yekini
Department of Computer Technology, Yaba College of Technology.
2- A Generator of MVC-based Web Applications
Strahinja Lazetic, Instituto Superior Tecnico, Universidade Tecnica de Lisboa, Lisbon, Portugal.
Dusan Savic, Sinisa Vlajic, Sasa Lazarevic
The Faculty of Organizational Sciences, Belgrade University, Belgrade, Serbia.
3- Electronic Payment Fraud Detection Techniques
Adnan M. Al-Khatib
CIS Dept. – Faculty of Information Technology, Jerash University, Jarash – Jordan.
4- Ethical Communication in IT Project From an Islamic Perspective
Mohamed Nizam, Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Alia Ahmed Aldossary, Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Jamaludin Ibrahim
Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Anmar Abuhamdah, Department of Computer Science, Jearsh private university, Amman, Jordan.
Anas Quteishat, Department of Computer Engineering, Al- Balqa’ Applied University, Amman, Jordan.
Bassam M. El-Zaghmouri, Department of Computer Information Systems, Jearsh private university, Amman, Jordan.
Rawnaq Kittaneh, Department of Computer Science, University Kabangsaan Malaysia, Bangi, Malaysia.
Ashkan Parsi, Department of Computer, Engineering and IT, Shahrood University of Technology, Shahrood, Iran.
Mehrdad Salehi, Computer Aided Medical Procedures, Technische Universität München, Munich, Germany.
Ali Doostmohammadi, Department of Computer, Engineering and IT, Shahrood University of Technology, Shahrood, Iran.
1- Performance Comparison of Face Recognition using Transform Domain Techniques
Jossy P. George, Department of Computer Science, Christ University, Bangalore, India.
Saleem S Tevaramani, K B Raja
Electronics and Communication Engineering Department
University Visvesvaraya College of Engineering, Bangalore, India.
2- Leader Election Algorithm in 3D Torus Networks with the Presence of One Link Failure
Mohammed Refai, Department of SE, Faculty of Science and Information Technology, Zarqa University, Jordan.
Ibrahim AL-Oqily, Department of CS, Faculty of Prince Al-Hussein Bin Abdullah II, for Information Technology Hashemite University, Jordan.
Abed Alhamori, Faculty of Information Technology Albalqa University, Jordan.
3- A Three Stages Segmentation Model for a Higher Accurate off-line Arabic Handwriting Recognition
Said Elaiwat, School of Computer Science & Software Engineering (CSSE), The University of Western Australia (UWA), Australia 35Stirling Highway CRAWLEY WA 6009 University.
Marwan AL-abed Abu-zanona, Department of Computer Science , Imam Muhammad Ibn Saud Islamic, Al-Ehsa Branch, Al-Ehsa – Saudi Arabia.
Farah Hanna AL-Zawaideh, Department of Computer Information System, Irbid National University, Irbid, Jordan.
4 -Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification
Reyadh Shaker Naoum, Zainab Namh Al-Sultani
Department of Computer Science, Faculty of Information Technology, Middle East University, Amman, Jordan.
5- Performance Evaluation for VOIP over IP and MPLS
Reyadh Shaker Naoum, Mohanand Maswady
Computer Information System Department, Faculty of Information Technology, Middle East University, Amman, Jordan.
6- Data set property based ‘K’ in VDBSCAN Clustering Algorithm
Abu Wahid Md. Masud Parvez
Software Quality Architect of Software quality department , Tech Prolusion Labs, San Francisco, USA.
1- A Novel Approach for Energy Optimization of Wireless Sensors Network by Adaptive Clustering
Rufaida Muhammad Shamroukh, Aryaf Abdullah Aladwan
Computer Engineering dept., Faculty of Engineering Technology, Al-Balqa’ Applied University, Amman , Jordan.
Ana’am Abdullah Aladwan, Information Systems & Technology dept., University of Banking and Financial Sciences, Amman , Jordan.
Aryaf Abdullah Aladwan, Rufaida Muhammad Shamroukh
Computer Engineering dept., Faculty of Engineering Technology, Al-Balqa’ Applied University, Amman , Jordan.
Ana’am Abdullah Aladwan, Information Systems & Technology dept., University of Banking and Financial Sciences, Amman , Jordan.
3- Multiple Classifiers to verify the Online Signature
Department of Information Technology, Computer Science & Information Technology Collage, King Abdulaziz University, Saudi Arabia.
Surjeet Kumar Yadav, Research Scholar, Shri Venkateshwara University, J.P. Nagar, India.
Saurabh Pa, Head, Dept. Of MCA, VBS Purvanchal University, Jaunpur, India.
5- An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students
Husein Osman Abdullahi, Abdirizaq said, Jamaludin Bin Ibrahim
Department Of Information System, Faculty of Information Communication Technology, IIUM, Jalan Gombak, 53100, Kuala Lumpur, Malaysia.
6- Arabic Text Summerization Model Using Clustering Techniques
Ahmad Haboush, Maryam Al-Zoubi, Ahmad Momani, Motassem Tarazi
Computer Science Department, Jerash University, Jerash, Jordan.
1- A Review on Speech Recognition Challenges and Approaches
Vimala.C, V.Radha
Department of Computer Science Avinashilingam Institute for Home Science and Higher Education and Women Coimbatore, India.
2- A New Method for Generating CIM Using Business and Requirement Models
Hamid Reza Sharifi, Mehran Mohsenzadeh
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Iran.
3- The Use of Social Networking in Education: Challenges and Opportunities
Ashraf Jalal Yousef Zaidieh
ICT, collage of information and communication technology, IIUM, Malaysia.
4- Conversion Database of the Shapes Into XML Data for Shape Matching
Noreddine GHERABI, Mohamed BAHAJ
Hassan 1st University, FSTS, Department of Mathematics and Computer Science, Labo LITEN.
5- Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications
Bassam M. El-Zaghmouri, Department of Computer Information Systems, Jerash University, Jordan.
Marwan A. Abu-Zanona, Department of Computer Science, Imam Muhammad Ibn Saud Islamic University- Al-Ehsa Branch, Saudi Arabia.
6- Link Quality Based Traffic Queue Management at 5.8 GHz
Anwar Hassan Ibrahim, Kuala Lumpur Infrastructure University College, School of Engineering and Technology Infrastructure, Malaysia.
Mahamod Ismail, Kasmiran Jumari, Mandeep Singh
University Kebangsaan Malaysia, Faculty of Engineering and Build Environment, Malaysia.
Golooba Moses , Azizah Hassan, Mahmoud M. Musleh, Khansa Monther, Karama M.A. Nofal, Abd. Rahman Ahlan
Department of Information Systems, International Islamic University Malaysia.

1- A Hybrid Method for Enhancement of Plant Leaf Recognition
N.Valliammal, S.N.Geethalakshmi
2- Effect of Pressure Variation on the Fingerprint Minutiae Based Feature Vector Matching
R. N. Verma, D.S.Chauhan
3- Cooperative Machine Learning Method
Adnan M. Al-Khatib
4- Cyclic model application for evaluation of a Dynamic Web Environment
Sonal Chawla, Ritika Bansal
5- Study of Effect of Rate on Performance of Cross Layer Based Inrusion Detection for WLAN
Ravneet Kaur
1- An Intra-Class Channel-Aware Scheduling in IEEE 802.16e
Elnaz Limouchi, Mohammadali Pourmina, Afshin Salajeghe, Ashkan Zehni
2- Detect CNP Fraudulent Transactions
Adnan M. Al-Khatib
3- Improving Business Type Classification from Twitter Posts Based on Topic Model
Chanattha Thongsuk, Choochart Haruechaiyasak, Somkid Saelee
4- Policy Based Fast Handoff Mechanism for MANET
Ankur Gupta, A. K. Vatsa
5- Solving the Puzzle Problem using a Multiagent Approach
Kamel Khoualdi, Marwan El-Haj Mahmoud
Rekha Chakravarthi, C.Gomathy
L. Senthilvadivu, K. Duraiswamy
8- A Hybrid Approach for Classification of DICOM Image
J. Umamaheswari, G. Radhamani
1- Quantum Attack Resistant Cloud
PSV Vachaspati, P.S.Avadhani
2- Implementing a Web Browser with Phishing Detection Techniques
Aanchal Jain, Vineet Richariya
3- Storage Area Network Implementation on an Educational Institute Network
Safarini Osama
4- A Survey of Remote Internet Voting Vulnerabilities
Okediran O. O., Omidiora E. O., Olabiyisi S. O., Ganiyu R. A.
5- Approaches to Wireless Sensor Network: Security Protocols
Harmandeep Singh, Garima Malik
6- Implementing a Web Browser with Web Defacement Detection Techniques
Tushar Kanti, Vineet Richariya, Vivek Richariya
7- Quality Requirements Optimization with Architectural Styles
Marwan AL-Abed Abu-Zanona, Yosef Hasan Jbara, Farah Hanna AL-Zawaideh
8- An Improved Algorithm for Mining Association Rules in Large Databases
Farah Hanna AL-Zawaidah, Yosef Hasan Jbara, Marwan AL-Abed Abu-Zanona
1- FA Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm
S.K.Muttoo, Sushil Kumar
2- A Study on the Readiness of Cloud Computing for Captious Computations
GhantaSrinivasaRao, ShaikNazeer, U.UshaRani, Gogineni Vijay Krishna
3- Do Indonesian Province Website Rich and Popular?
Widya Silfianti, Ruddy J. Suhatril
4- A Fast Approach for Breaking RSA Cryptosystem
Alaa H Al-Hamami, Bilal S O Al-Kubaysee
5- Interoperability of Digital Signatures in Public Administration
Nicușor Vatră
6- Congestive Loss in Wireless Ad hoc Network, Network Performance Analysis
Haniza N., Zulkiflee M., Abdul S.Shibghatullah, Shahrin S.
7- Web-based Timetable Information System for Public Transport
Andrey Makarovskiy
8- Image Deblurring Using Back Propagation Neural Network
P.Subashini, M.Krishnaveni, Vijay Singh
1- Prototype System for Monitoring and Computing Greenhouse gases
R. JaichandranA. Anthony Irudhayarj
2- Offline Arabic Text Recognition – An Overview
Atallah Mahmoud AL-Shatnawi, Farah Hanna AL-Zawaideh, Safwan AL-Salaimeh, Khairuddin Omar
3- Improving Semantic Schema Integration
Zahra Sheikhnajdy, Mehran Mohsenzadeh, Mashalah Abbasi Dezfuli
4- Hybrid Technique For Secure Sum Protocol
Priyanka Jangde, Gajendra Singh Chandel, Durgesh Kumar Mishra
Neetu Sharma, Amit Sharma, Vijay Singh Rathore, D.K Mishra
6- GUI Design Using DLD for All Web Browser Interactions
Thippeswamy.K, Manjaiah.D.H
7- Practical Approach for Master Data Management
Chandra Sekhar Bhagi
Zahid Ansari, M.F. Azeem, Waseem Ahmed, A.Vinaya Babu
9- Hierarchical and Bayesian Scattered Data Taxonomy in Mobile Ad-hoc Networks
Sunar Arif Hussain, K.E.Sreenivasa Murthy
10- FPGA Based Design and Implementation of Efficient Video Filter
Rajesh Mehra, Virendra Arya, Rajpati Yadav
1- A Novel Approach for Security Development for Multimedia System
B.Prabhavathi, AVR&SVR College of Engg.& Tech., Dept .of CSE, Nandyal, Kurnool(Dt.), A.P.
P.D.Chidhambara Rao, SKTRM College of Engg. & Technology, Dept .of CSE, Kondair, A.P.
P.Raja Sekhar, SVPCET, Dept .of CSE, R.V.S.Nagar, Puttur, Chittur(Dt.), A.P.
Ishrath Jahan, College for Charted Accounts, Dept. of CSE , Vijayawada, A.P.
G.Murali Mohan, SVPCET, Dept .of CSE, R.V.S.Nagar, Puttur, Chittur(Dt.), A.P.
2- Classification of Uncertain data using Fuzzy Neural Networks
G.V.SURESH, Shabbeer Shaik, O.Srinivasa Reddy, B. Munibhadrayya
3- Dynamic Time Warping Algorithm with Distributed Systems
Zied TRIFA, Mohamed LABIDI, Maher KHEMAKHEM
Department of Computer Science, University of Sfax, MIRACL Lab, Sfax, Tunsia.
4- A Contemporary Polyalphabetic Cipher using Comprehensive Vigenere Table
Ravindra Babu Kallam, Vivekananda Institute of Technology and Science SET, Karimnagar, A.P, India.
S.Udaya Kumar, Principal MVSR Engineering College, Hyderabad, Andhra Pradesh, India.
A.Vinaya babu, Admissions, JNTUH, Hyderabad,A.P, India.
Shravan kumar, Aizza college of Engineering and Technology,Mancherial,A.P, India
5- Hexagonal Based Search Pattern for Motion Estimation in H.264/AVC
Sourabh Rungta, Computer Science Department, RCET, Bhilai, India.
Kshitij Verma, ICT Department, ABV-IIITM, Gwalior, India.
Neeta Tripathi, Electronics Deptt., SSITM, Bhilai,India.
Anupam Shukla, ICT Deptt, ABV-IIITM, Gwalior,India.
6- Overview of Artificial Intelligence
Munisha Kaushal, Rakshpal Singh Dehal, Amrit kaur
Department of Electronics and Communication Engg., University college of Engineering, Punjabi University, Patiala, India.
Zumita Kaushal, Department of Computer Science & Engg., Ambala college of Engineering, Kurukeshtra University, Ambala, India.
Abdelali EL BOUCHTI, Said EL KAFHALI, Abdelkrim HAQIQ
Computer, Networks, Mobility and modelling laboratory, e-NGN research group, Africa and Middle East, FST, Hassan 1st University, Settat, Morocco.
8- Remote Home Management: An alternative for working at home while away
B. I. Ahmad, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
F. Yakubu, Iya Abubakar Computer Center, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
M. A. Bagiwa, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
U. I. Abdullahi, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
9- Secured Crypto-Stegano Communication Through Unicode
A. Joseph Raphael, Ibra College of Technology, Sultanate of Oman
V. Sundaram, Department of Computer Applications, Karpagam College of Engineering, Coimbatore, India.
10- Simulation of an Agent Based System Behavior in a Dynamic and Unpredicted Environment
Eva Cipi, Computer Science Department, University of Vlora, Vlora, Albania.
Betim Cico, Informatics Engineering Department, Polytechnic Tirana University, Tirana, Albania.
1- Robust Sign Language Recognition System Using ToF Depth Cameras
Morteza Zahedi, Ali Reza Manashty
Department of Computer Engineering and IT, Shahrood University of Technology, Iran.
2- A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems
Ghossoon. M. W. Al-Saadoon, College of Administrative Science, Applied Science University, Kingdom of Bahrain.
Hilal M.Y. Al-Bayatti, College of Arts and Science, Applied Science University, Kingdom of Bahrain.
3- A Cloud-based Approach for Context Information Provisioning
Elarbi Badidi, Faculty of Information Technology, United Arab Emirates University, United Arab Emirates.
Larbi Esmahi, School for Computing & Information Systems, Athabasca University, Canada.
4- Citadel E-Learning: A New Dimension to Learning System
Awodele O., Kuyoro S. O., Adejumobi A. K., Awe O., Makanju O
Department of Computer Science and Mathematics, Babcock University, Nigeria.
5- A Hybrid Classifier using Boosting, Clustering, and Naïve Bayesian Classifier
A. J. M. Abu Afza, Dewan Md. Farid, and Chowdhury Mofizur Rahman
Department of Computer Science and Engineering, United International University, Dhaka-1209, Bangladesh.
6- A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Technique
Alaa H. AL-Hamami, Computer Sciences Dept., Amman Arab University, Amman, Jordan.
Mohammad A. AL-Hamami, Computer Sciences Dept., Delmon University, Manama, Bahrain.
Soukaena H. Hashem, Computer Sciences Dept., University of Technology, Baghdad, Iraq.
7- Artificial Neural Network Model for Forecasting Foreign Exchange Rate
Adewole Adetunji Philip, Akinwale Adio Taofiki, Akintomide Ayo Bidemi
Department of Computer Science, University of Agriculture, Abeokuta, Nigeria.
8- Internet Banking Security Management through Trust Management
Ioannis Koskosas, Department of Informatics and Telecommunications Engineering, University of Western Macedonia, KOZANI, Greece.
Maria-Mirela Koskosa, Department of Architecture and Visual Arts, University of East London, London, UK.
9- Precluding Emerging Threats from Cyberspace: An Autonomic Administrative Approach
Vivian Ogochukwu Nwaocha, Inyiama H.C.
Department of Computer Science, University of Nigeria, Nsukka, Nigeria.
10- Robust Sign Language Recognition System Using ToF Depth Cameras
Morteza Zahedi, Ali Reza Manashty
Department of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran.
11- Using MI Method for Feature Weighting to Improve Text Classification Performance
Morteza Zahedi, Aboulfazl Sarkardei
Department of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran.
12- A Multi-Phase Feature Selection Approach for the Detection of SPAM
Ahmed Khalid, Izzeldin M. Osman
Department of computer science, Sudan University of Science and Technology, Khartoum, Sudan.
1- Finding Shortest Path for Developed Cognitive Map Using Medial Axis
Hazim A. Farhan, Hussein H. Owaied, Suhaib I. Al-Ghazi
Computer Science Dept., Middle East University, Amman, Jordan.
2- Validation Measures in CMMI
Mahmoud Khraiwesh
Faculty of Science and Information Technology, Zarqa University, Zarqa – Jordan.
3- Using Short Message Service (SMS) to Support Business Continuity
Maher Abdel-qader, Ahmad AL-Jaber, Alaa AL-Hamami
Department of Computer Science, Amman Arab University for Graduate Studies, Amman, Jordan.
4- SLDs for Visualizing Multicolor Elevation Contour Lines in Geo-Spatial Web Applications
Kodge B. G., Department of Computer Science, Swami Vivekanand Mahavidhyalaya, Bidar Road, Udgir, Dist. Latur (MS), India.
Hiremath P. S., Department of Computer Science, Gulbarga University, Gulbarga, Karnataka State, India.
5- Optimal Cell Towers Distribution by using Spatial Mining and Geographic Information System
Alaa H. AL-Hamami, Amman Arab University for Graduate Studies, Amman, Jordan.
Soukaena H. Hashem, University of technology, Iraq.
6- Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
H. A. Esmaili, Department of Computer, Engineering, Sharif University of Technology, Tehran, Iran.
M. R. Khalili Shoja, Department of Electrical Engineering, Amirkabir University, of Technology, Tehran, Iran.
Hossein gharaee, Department of Electrical Engineering, Tarbiat Modares, University, Tehran, Iran.
1- A Framework Based Approach for the Development of Web Based Applications
Rachit Mohan Garg, Yamini Sood, Balaji Kottana, Pallavi Totlani
2- Hybrid Model for Solving Multi-Objective Problems Using Evolutionary Algorithm and Tabu Search
Rjab Hajlaoui, Mariem Gzara, Abdelaziz Dammak
3- Comparative Study on DFD to UML Diagrams Transformations
Atif A. A. Jilani, Muhammad Usman, Aamer Nadeem, Zafar I. Malik, Zahid Halim