Back Issues

By | August 9, 2018

Broadcast Distributed PSO for Large Scale Problems
Farid Bourennani
Department of Computer Science, Faculty of Computing and IT, University of Jeddah, Saudi Arabia.

Review of Literature on Software Quality

Farhan M Al Obisat, Zaid T. Alhalhouli, Tamador I. Alrawashdeh, Tamara E. Alshabatat
Computer and Information Technology Department, Tafila Technical University, TTU, Tafila, Jordan.

Performance Comparative Study of DSDV, E-DSDV, I-DSDV and O-DSDV MANET Routing Protocols

Mada’ Abdel Jawad, Saeed Salah, Raid Zaghal
Department of Computer Science, Al-Quds University, Jerusalem, Palestine.

Elderly People’s Life Saving Assistant (EPLSA) using IoT

Rufaida M. Shamroukh, Nawal A. Zabin, Muhammed A. Mesleh
Computer Engineering Department, Faculty of Engineering Technology, Al-Balqa Applied University, Amman, Jordan.

The Impacts Factors of Using The Smartphone at Work Environments in Developing Countries: The Case of Saudi Arabia

Mohammed Al Masarweh, Waleed Afndy
Management Information System Department, College of Business in Rabigh, King Abdulaziz University, Saudi Arabia.

Crack Detection on Concrete Surfaces Using V-shaped Features

Yoshihiro Sato, Yue Bao, Yutaro Koya
Graduate School of Engineering, Tokyo City University, Tokyo, Japan.

Image Retrieval Model Based on Color and Shape Features Utilizing 2D Wavelet Transform

Jehad Q. Odeh Alnihoud, Department of Computer Science, Al-al Bayt University, Mafraq, Jordan.

A Practical Approach for Detecting Logical Error in Object Oriented Environment

Ghassan Samara, Internet Technology Department Zarqa University, Jordan.

GL-Model, Representing Emergence Of Dangerous State In Multiprocessor Management System

Rabah AlShboul, Computer Science Department Al Albayt University Mafraq, Jordan
Vitaliy A. Romankevich, Department of Applied Mathematics Igor Sikorsky Kyiv Polytechnic Institute Kyiv, Ukraine.

Impact of Security Issues in Cloud Computing Towards Businesses

Bader Methqal AlFawwaz
Department of Computer Information Systems, Al al-Bayt University, Jordan.

Object Oriented Model Development for Education Institutes’ Internal Auditing Process

Sally Dafaallah Abualgasim, Department Computer Engineering, Faculty of Engineering and Technology, University of Gezira, Wed Medani, Sudan.
Hujla Siddig Abd-Allah Osman, Accounting and Banking Information Systems Department, Wad Medani Technological College, Sudan Technological University
Wed Medani, Sudan.

Development of an Efficient Image Segmentation Algorithm via Splitting and Merging Techniques

Mohammed Ashraf Zoghoul, Ashraf Abu-Ain, Jihad Nader Abdeljalil
Computer Engineering Department, Al-Balqa Applied University / FET, Amman,Jordan.

Enhancing the Performance of Intrusion Detection System by Minimizing the False Alarm Detection Using Fuzzy Logic

Khaled Batiha, Mohammed O. Alshroqee
Computer science department, Al al-Bayt University, Jordan.

The General Form of GoF Design Patterns

Siniša Vlajic, Vojislav Stanojevic, Dušan Savic, Miloš Milic, Ilija Antovic, Saša Lazarevic
Department of software engineering, Faculty of organisational sciences, University of Belgrade, Belgrade, Serbia.

1- New Automatic Search and Update Algorithms of Vietnamese Abbreviations

Nguyen Nho Tuy, Vietnam Posts and Telecommunications Group, (VNPT) Danang Branch, Danang City, Vietnam.
Phan Huy Khanh, University of Science and Technology, – The University of Danang, Danang City, Vietnam.

2- Speculation and Negation Annotation for Arabic Biomedical Texts: BioArabic Corpus

Fatima T. AL-Khawaldeh
Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.

Fingerprint Singular Point Detection via Quantization and Fingerprint Classification

Shing Chyi Chua, Eng Kiong Wong, Alan Wee Chiat Tan
Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia.

An Empirical Analysis of Multiple Level Association Rules Mining Method for Feature Extraction

Ruchika Yadav, Kanwal Garg
Department of Computer Science and Application, Kurukshetra University, Kurukshetra, India.

Data Quality Based Data Integration Approach

Mohamed Samir Abdel-Moneim, College of Computing and Information Technology, Arab Academy for Science Technology & Maritime Transport, Egypt.
Ali Hamed El-Bastawissy, Faculty of Computer Science, MSA University, Egypt.
Mohamed Hamed Kholief, College of Computing and Information Technology, Arab Academy for Science Technology & Maritime Transport, Egypt.

Analysis of Factors Influence Online Trust: A Unified Model

Sahar Ghoreishi, Shahriar Mohammadi
Industrial Engineering Department ,K.N.Toosi University of Technology, Tehran, Iran.

1- Free Scale and SOLR Architectures for Load Handling of Social Networking Sites

Nirmal Dhara, Shashank K
Department of Computer Science, Christ University, Bangalore, India.

2- An Integrated Approach to Predictive Analytics for Stock Indexes and Commodity Trading Using Computational Intelligence

Chandra J, Nachamai.M
Associate Professor, Department of Computer Science, Christ University, Bangalore, Karnataka, India.
Anitha S Pillai
Professor and Head, Department of MCA, Hindustan University, Chennai, Tamil Nadu, India.

Advances in Mobile Cloud Computing

Timur Mirzoev, Amy Coleman, Robin Wacha-Bessert, Georgia Southern University: Information Technology, Statesboro, GA USA.
Ben Lai, Douglas Olson, Clayton State University: Information Technology, Morrow, GA USA.

2- A Study of the Effect of Resolving Negation and Sentiment Analysis in Recognizing Text Entailment for Arabic

Fatima T. AL-Khawaldeh, Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.

3- Dynamic Image Display and Adjustment Method for Glassless 3D Viewing Systems

Isao Nishihara, Takayuki Nakata
Department of Information Systems Engineering, Faculty of Engineering, Toyama Prefectural University, Imizu city, Toyama, Japan.

 

 

 

 

1- Automatic Optic Disc Localization and Segmentation using Swarm Intelligence

Thresiamma Devasia, Dept. of Computer Science, Assumption College Changanacherry, Kerala , India.
Poulose Jacob, Dept. Computer Science, Cochin University of Science and Technology, Kerala, India.
Tessamma Thomas, Dept. of Electronics , Cochin University of Science And Technology, Kerala, India.


2- GIS as a Job Growth Area for IT Professionals

Timur Mirzoev, Anthony Moore, Brianna Pryzbysz
Information Technology Department, Georgia Southern University, Statesboro, GA USA.
Melissa Taylor, Information Technology Department, Columbus State University, Columbus, GA USA.
John Centeno, Information Technology Department, Armstrong State University, Savannah, GA USA.

 

3- The Effect of Combining Different Semantic Relations on Arabic Text Classification

Suhad A. Yousif, Islam Elkabani
Mathematics and Computer Science Department, Beirut Arab University, Lebanon.
Venus W. Samawi, Computer Information System Department, Amman Arab University, Jordan.
Rached Zantout, Electrical and Computer Engineering Department Rafik Hariri University Lebanon.

1- Answer Extraction for Why Arabic Questions Answering Systems: EWAQ

Fatima T. AL-Khawaldeh
Department of Computer Science, Al-Albayt University, Al-Mafraq, Jordan.

 

2- Mobile Secure Transmission Method Based on Audio Steganography

Alaa Alhamami, Avan Sabah Hamdi
Amman Arab University, Amman, Jordan.

 

3- Evaluating E-Learning System Use by CBAM-Stages of Concern Methodology in Jordanian Universities

Nasim Matar
Department of Software Engineering, Applied Science University, Amman, Jordan.

1- Launching E-Government in Jordan, Jordanian Experience

Issa S. I. Ottoum
Department of Computer Information systems, Alzaytoonah University of Jordan, Amman, Jordan.

2 -A Virtual TV System Using Head-mounted Display with Stereo Camera

Ryo HARASHIMA, Systems Information Engineering Tokyo City University, Tokyo, Japan.
Yue BAO, Faculty of Knowledge Engineering Tokyo City University, Tokyo, Japan.

1- Evaluating E-portfolio System Use within Educational Context
Nasim Matar
Department of Software Engineering Applied Science University , Amman – Jordan.


2- Deploying an Efficient Safety System for VANET
Ghassan Samara, Department of Computer Science, Faculty of Science and Information Technology, Zarqa Private University, Zarqa, Jordan.
Mohammad Rasmi, Department of Software Engineering, Faculty of Science and Information Technology, Zarqa Private University, Zarqa, Jordan.

1- Mobile Sink Assisted Energy Efficient Routing Algorithm for Wireless Sensor Networks

Deepa V.Jose, Department of Computer Science Christ University Bangalore, India.
G. Sadashivappa, Department of Telecommunication EnginR.V.College of Engineering, Bangalore, India.

 

2- Secure Mobile Cloud Computing Based-On Fingerprint

Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi
Department of Computer Sciences and Informatics Amman Arab University, Amman, Jordan.

 

3- An Efficient Method to Recognize Human Faces From Video Sequences with Occlusion

Vijayalakshmi A., Dept. of Computer Science Christ University Bangalore, India.
Pethuru Raj, Cloud Architect IBM Global Cloud Center of Excellence (CoE), IBM India Bangalore.

1- Comparative Study of Neural Network Based Speech Recognition: Wavelet Transformation vs. Principal Component Analysis

Yasser Mohammad Al-Sharo
University of Ajloun National, Faculty of Information Technology , Ajloun, Jordan.

 

2- Securing VoIP in SIP Mobile Network

Zaid Salah Munef, Master’s Degree in Computer Science Amman Arab University, Amman, Jordan.
Alaa Hussein Al-Hamami, Dean of Computer Sciences & Informatics College Amman Arab University, Amman, Jordan.

 

3- Role of Component Certification in CBSE Activities for Building High Quality Software

Lina khalid Ahmed
Department of Software Engineeing Zarqa University Amman ,Jordan.

 

 

1- An Intelligent Automated Irrigation System for the Jordan Valley Area

Samah A. Massadeh
Department of Computer Engineering, FET, BAU, Amman, Jordan.

2- Computer Simulation of Streamflows with GAR(1)-Monthly and GAR(1)-Fragments Models

Nguyen Van Hung, Computer Science Division, Danang Vocational Training College, Danang City, VietNam.
Huynh Ngoc Phien, Asian Institute of Technology, BangKok, Thailand.
Tran Quoc Chien, Danang University, Danang City, VietNam.

1- QoE-Based Scheduling Algorithm in WiMAX Network using Manhattan Grid Mobility Model

Tarik ANOUARI, Computer, Networks, Mobility and Modeling laboratory, Department of Mathematics and Computer, FST, Hassan 1st University, Morocco.
Abdelkrim HAQIQ, e-NGN Research group, Africa and Middle East.

2- Moving Virtual University from Traditional Web to Cloud Computing Case Study on Syrian Virtual University

Aktham Mohammad Mahmoud
Syrian Virtual University, Damascus, Syrian Arab Republic.

1- Discrete Wavelet Transform Based Algorithm for Recognition of QRS Complexes

Rachid HADDADI, Elhassane ABDELMOUNIM, Mustapha EL HANINE, Univ. Hassan I, ASTI Laboratory, 26000 Settat, Morocco
Abdelaziz BELAGUID, University Mohammed V-Souissi, Laboratory of Physiology, Rabat, Morocco.

 

2- Analysis of Performance Parameters in Wireless Networks by using Game Theory for the non Cooperative Slotted Aloha Enhanced by ZigZag Decoding Mechanism

Abdellah ZAALOUL, Computer, Networks, Mobility and Modeling laboratory FST, Hassan 1st University, Settat, Morocco.
Abdelkrim HAQIQ, e-NGN research group, Africa and Middle East.

1- Probabilistic PCA Mixture under Variance Preservation

Mohamed Nour I. Ismail, College of Science, King Faisal University, Saudi Arabia.
Mohamed El-Hafiz Mustafa Muse, College of Computer Science and IT, Sudan University of Science and Technology, Sudan.

 

2- Adaptive Activation Function for Isolated Digit Recognition Based on Speaker Dependent System

Ummu Salmah, M.H, Department of Information Technology, Kolej Universiti Islam Sultan Azlan Shah, Malaysia.
Siti Mariyam, S., Department of Computer Graphics and Multimedia, Universiti Teknologi Malaysia, Malaysia.
Saira Banu, O.K., Computing Department, Universiti Pendidikan Sultan Idris, Malaysia.
Nor Azah, Center of Language for Foundational Studies (CELFOS), Kolej Universiti Islam Sultan Azlan Shah, Malaysia.

 1- Text Summarization as Feature Selection for Arabic Text Classification

Eman Al-Thwaib
Computer Information Systems Department, University of Jordan, Amman, Jordan.

 

2- A Local Time Calculating Courseware for Geography Students: Does it assist Teachers?

Nor Hasbiah Ubaidullah, Jamilah Hamid, Aslina Saad, Sairabanu Omar Khan
Computing Department, Universiti Pendidikan Sultan Idris, 35000 Tg. Malim, Perak, Malaysia.

 

3- Intelligent Emergency Message Broadcasting in VANET Using PSO

Ghassan Samara, Department of Computer Science, Zarqa University, Zarqa, Jordan.
Tareq Alhmiedat, Department of Information Technology, Tabuk University, Tabuk, Saudi Arabia.

1- Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring System With Fees Management

Adeoye Temitope Onaolamipo
School of Computer Science, Mathematics & Information Technology, Houdegbe North America University, Republic of Benin.

 

2- Enhanced Wireless Transmitted Message Security By Encryption Complex Transformation

Oleg Viktorov , Middle East University, College of Information Technology, Computer Information System Department, Amman, Jordan.
Ahmed Shihab, Middle East University, College of Information Technology, Computer Science Department, Amman, Jordan.

1- Mobile Application Threats and Security

Timur Mirzoev, Michael Brannon, Shamimara Lasker, Mark Miller
Information Technology Department, Georgia Southern University, Statesboro, GA USA.

2- Current Practices in Monitoring Software Development Process in Malaysia

Megat Azrin Ahmad, Nor Hasbiah Ubaidullah, Modi Lakulu
Computing Department, Faculty of Art, Computing & Creative Industry, Sultan Idris Education University, Malaysia.

1- Arabic Digits Recognition Using Statistical Analysis for End Conjunction Points and Fuzzy Logic for Pattern Recognition Techniques

Majdi Salameh, IT Department, King Abdul Azziz University.

2- Data Hiding in Digital Images using Cryptography and Steganography Techniques (CryptSteg)

Rashiq R. Marie, Computer Science Department, Faculty of Science and Information Technology, Zarka University, Zarka, Jordan.

1- An O(n) Time Algorithm For Maximum Induced Matching In Bipartite Star123-free Graphs

Ruzayn Quaddoura, Department of Computer Science, Faculty of Science and Information Technology, Zarqa University, Zarqa-Jordan.

Dynamic Solutions for Leader Failure in 3D Torus Networks

Mohammed Refai, Al Zarqa University, College of Science and Information Technology.

1- Toward An Adaptive P300 Based Brain Computer

Mohammed J. Alhaddad, Information Technology Department, King Abdulaziz University, Jeddah, Saudi Arabia.
Mahmoud Kamel, Information System Department, King Abdulaziz University, Jeddah, Saudi Arabia.
Noura Al-Otaibi, Computer Department, King Abdulaziz University, Jeddah, Saudi Arabia.

2- Software Agents Interaction Algorithms in Virtual Learning Environment

Zahi A.M. Abu Sarhan
Faculty of Information Technology: Software Engineering Department , Applied Science Private University, Amman, Jordan.

1- A New Edge Detector in CT Scan Images Using Gradient of Weibull Distribution

Wafaa Kamel Al-Jibory, Department of Mathematics and Computer Science, Faculty of Science, Beirut Arab University, Beirut –Lebanon.
Ali El-Zaart, Department of Mathematics and Computer Science, Faculty of Science, Beirut Arab University, Beirut –Lebanon.

2- Cost Information Exchange With Other Supply Chain Firms, The Case Of Egypt

Mohamed Elgibale, R. Safwat
Faculty of Commerce, Beni Suef University – Egypt.

A Preliminary Evaluation Study for M-learning Services and Implications for Future Design

Mohammad Alnabhan, Ahmad Haboush
Department of Computer Science, Jerash University, Jerash, Jordan.
Ja’afer M. AL-Saraireh, Management Information Systems Department, Applied Science University, Amman, Jordan.
Nasim Matar, Internet Technologies department, Zarqa University, Zarqa, Jordan.

Dynamic Safety Message Power Control in VANET Using PSO

Ghassan Samara, Department of Computer Science, Zarqa University, Zarqa, Jordan.
Tareq Alhmiedat, Department of IT, Tabuk University, Tabuk , KSA.
Amer O. Abu Salem,  Department of Computer Science, Zarqa University, Zarqa, Jordan.

 

Multi Module System in Development of Information Location Based School Application

Nuryuliani, Department of Information Technology, Gunadarma University, Depok, Indonesia.
Miftah Andriansyah, Department of Information Technology, Sekolah Tinggi Teknik Multimedia Cendekia Abditama, Tangerang, Indonesia.
Sutresna Wati, Department of Computer Science, Gunadarma University, Depok, Indonesia.

 

Software Application to Monitor and Control Distributed System Based On Mobile / Networks

Afif J. Almghawish, Akram Abdel Qader, Mohammad AbuMahfouz
Computer Science department, Al-Zaytoonah University of Jordan, Amman, Jordan.

1- Software Support For Programming Language Tutorials

Vladimir M. Bondarev, Computer Software Department, University Of Radi Electronics, Ukraine.
Afif J. Almghawish, Alexandre F. Ossyka, Issa S. Outoom Computer Science Department, Al-Zaytoonah University Of Jordan, Jordan.

2- Aspect Oriented Programming in Early Stages of a Software Development Project

Luis Marco Cáceres Alvarez, Marjane Delgado
Escuela Universitaria de Ingeniería Industrial, Informática y, de Sistemas, University of Tarapacá, Arica, Chile.
Mauricio Arriagada-Benítez, Department of Computer Science, School of Engineering, Pontificia Universidad Católica de Chile, Santiago, Chile.

3- Leveraging VMware vCloud Director Virtual Applications (vApps) for Operational Expense (OpEx) Efficiency

Ramon Alvarez, Information Technology, Georgia Southern University, Statesboro, GA USA.
Timur Mirzoev, Information Technology, Georgia Southern University, Statesboro, GA USA.

Cache Discovery Policies of MANET

Amer O. Abu Salem, Ghassan Samara Department of CS, Zarqa University, Jordan.
Tareq Alhmiedat, Department of IT, Tabuk University, KSA.

1- Design and Analysis of Adaptive Neuro Fuzzy Logic Controlled Wireless Intelligent Telemetry System

Rajwinder Kaur, Kanwalvir Singh Dhindsa
Department of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, India.

2- A Comparative Study of Machine Learning Techniques in Classifying Full-Text Arabic Documents versus Summarized Documents

Khalil Al-Hindi, Eman Al-Thwaib
Computer Information Systems Department, University of Jordan, Jordan.

3- A Novel Approach To Enhance a University Information System

Afif Jadalla ALmghawish, Alexandre F. Ossyka
Dept. of Computer Science, AL-Zaytoonah University of Jordan, Jordan.
Issa S. Ottoum, Dept. of Computer Networking, AL-Zaytoonah University of Jordan, Jordan.

1- Mobile Ad Hoc Networks Routing Using Ant Colony Optimization

Aws Kanan, Taisir Eldos, Mohammed Al-Kahtani
Department Of Computer Engineering, College of Computer Engineering and Sciences, Salman in Abdulaziz University, Saudi Arabia.

2- The Effect of Weight Factors Characters on Password Selection

Ghadeer Ali Shaheen, Ahmad Al Jaber, Alaa Al Hamami
Department of Computer Science,Amman Arab University, Jordan.

3- Apple IOS Devices for Network Administrators

Timur Mirzoev, Georgia Southern University, Statesboro, USA.
Gerard Gingo; Mike Stawchansky; Tracy White
Southern Polytechnic State University, Marietta, USA.

1- Image Inpainting by Kriging Interpolation Technique

Firas A. Jassim
Management Information Systems Department, Irbid National University, Jordan.

2- An Efficient Incremental Clustering Algorithm

Nidhi Gupta, USICT, GGSIPU, India.
R.L.Ujjwal, USICT, GGSIPU, India.

3- Adapting the Ant Colony Optimization Algorithm to the Printed Circuit Board Drilling Problem

Taisir Eldos, Aws Kanan, Abdullah Aljumah
Department Of Computer Engineering, College of Computer Engineering and Sciences, Salman in Abdulaziz University, Saudi Arabia.

1- Improving Performance of a Group of Classification Algorithms Using Resampling and Feature Selection

Mehdi Naseriparsa, Amir-masoud Bidgoli, Touraj Varaee
Islamic Azad University, Tehran North Branch, Department Of Computer Engineering, Iran.

2- Simulation of Improved Academic Achievement for a Mathematical Topic Using Neural Networks Modeling

Saeed A. Al-Ghamdi, Hassan M. H. Mustafa
Faculty of Engineering, Al-Baha University, Al-Baha, Kingdom of Saudi Arabia.
Abdel Aziz M. Al-Bassiouni, Telecommunication & Technology Company, Cairo, Egypt.
Ayoub Al-Hamadi, Institute for Information and Communication Technology, Otto- von-Guericke-University Magdeburg, Germany.

3- A Conceptual Nigeria Stock Exchange Prediction: Implementation Using Support Vector Machines-SMO Model

Abubakar S. Magaji, Faculty of Science, Kaduna State University, Nigeria.
Victor Onomza Waziri, Audu Isah, Adeboye K.R.Federal University of Technology Minna-Nigeria.

1- A Negative Selection Algorithm Based on Email Classification Techniques

Victor Onomza Waziri, Ismaila Idris, Department of Cyber Security Science, School of Information and Communication Technology, Federal University of Technology, Nigeria.
Mohammed Bashir Abdullahi, Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Nigeria.
Hahimi Danladi, Audu Isah, Department of Mathematics/ Statistics, School of Natural and Applied Sciences,Federal University of Technology, Nigeria.

2- A Symmetric Variable–Key Stream (SVKS) Data Encryption Standard (DES) Model for Long Distance Communication

O. Osunade
Department of Computer Science, University of Ibadan, Nigeria.

3- Datacenter Changes vs. Employment Rates for Datacenter Managers In the Cloud Computing Era

Timur Mirzoev, David Hillhouse
Georgia Southern University, Statesboro, GA USA.
Bruce Benson, Armstrong Atlantic University, Savannah, GA USA.
Mickey Lewis, Southern Polytechnic State University, Marietta, GA USA.

1- An Optimized PID Control Strategy For Active Suspensions Applied To A Half Car Model

Mohammed H. AbuShaban, Mahir B. Sabra, Iyad M. Abuhadrous
Electrical Engineering Department, Islamic University of Gaza, Palestine.

2- Effect of Social Media on Website Popularity: Differences between Public and Private Universities in Indonesia

Hanum Putri Permatasari, Silvia Harlena, Reza Chandra
Department of Information System, Gunadarma University, Indonesia.
Donny Erlangga, Department of Informatics Management, Gunadarma University, Indonesia.

3- Cloud Computing in Higher Education in Jordan

Samah A. Massadeh, Muhammad A. Mesleh
Department of computer engineering, Faculty of Engineering Technology, Jordan.

4- Mobile Application for Diabetes Risk Diagnosis and Information Based on Android

Remi Senjaya, Anindito Yoga Pratama
Department of Informatics Engineering, Faculty of Technology Industry, Gunadarma University, Indonesia.
Dewi Agushinta R., Department of Information System, Faculty of Computer Science & Information Technology, Gunadarma University, Indonesia.

5- Analysis on Backlinks and PageRank of Automotive Company Websites Using Crawler Tool

Dina Agusten, ST., MMSI ,Department of Informatics Engineering, Gunadarma University, Indonesia.
Winarti, SKom., MMSI, Department of Information System, Gunadarma University, Indonesia.

1- Real-Time System: Fire and Smoking Control System (Case Study)

Muhammed Ali Suliman Mesleh, Mohammed Ashraf Zoghoul
Computer Engineering Department, Al-Balqa Applied University Amman,Jordan.

2- Framework Environment for Understanding Object Oriented Techniques

Hamed J. Al-Fawareh
Faculty of Science and Information Technology Zarqa University Zarqa, Jordan.

3- Kriging Interpolation Filter to Reduce High Density Salt and Pepper Noise

Firas Ajil Jassim
Management Information System Department, Irbid National University, Jordan.

4- S-Scrum: a Secure Methodology for Agile Development of Web Services

Davoud Mougouei, Nor Fazlida Mohd Sani, Mohammad Moein Almasi
Department of Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Malaysia.

5- Exploring the Educational Benefits of Blogs to Help Non-Malay pupils in Malay Language Learning

Nor Hasbiah Ubaidullah, Norhayati Mahadi, Lee Hooi Ching
Computing Department, Sultan Idris Education University, Malaysia.

1- An Analytical Comparison of Rough Set Theory-based Grid Resource Matching Algorithms

Mehdi Bayat, Morteza Analoui
Computer Engineering Department Iran University of Science and Technology, Iran.

2- A Comparison of Support Vector Machine and Multi-Level Support Vector Machine on Intrusion Detection

Milad Aghamohammadi, Morteza Analoui
Department of Computer Engineering, Iran University of Science and Technology, Iran.

3- A New Approach For Flexible Matching of Grid Resources

Mehdi Bayat, Morteza Analoui
Computer Engineering Department Iran University of Science and Technology, Iran.

4- Study of Effectiveness of Using ERP Systems in Cost Optimization of Just-In-Time Manufacturing Cases

Muhannad Akram Ahmad
Department of Accounting Information System, Irbid National University, Jordan.

1- Color Image Enhancement Using Steady State Genetic Algorithm

Reyadh Naoum, Ala’a Al-Sabbah
College of Information Technology Middle East University, Jordan.

2- Arabic Content Classification System Using statistical Bayes classifier With Words Detection and Correction

Abdullah Mamoun Hattab, Abdulameer Khalaf Hussein
Department of Computer science Middle East University, Jordan.

3- Cournot and Bertrand Game Models for A Simple Spectrum Sharing Framework in Cognitive Radio Networks

Hadi Malekpour, Reza Berangi
Computer Engineering Iran University of Science and Technology, Iran.

4- Text-Independent Speaker Identification Using Hidden Markov Model

Sayed Jaafer Abdallah, Izzeldin Mohamed Osman, Mohamed Elhafiz Mustafa
College of Computer Science and Information Technology, Sudan University of Science and Technology, Sudan.

1- Framework Model for Strategic Plan Using Dynamic Workflow

Reyadh Shaker Naoum, Abdulameer Khalf Hussain
Department of Information System Faculty of Information Technology, Middle East University, Jordan.
Ziad Mohammad Abu-Hamour, Department of Information Technology, Free-Zones Company, Jordan.

2- Robust Digital Image Watermarking Technique Based on Histogram Analysis

Hamza A. Ali, Computer Engineering Department, College of Engineering, University of Basrah, Iraq.
Sama’a A. K. khamis, Electrical Engineering Department, College of Engineering, University of Basrah, Iraq.

3- Evaluation of Workflow Strategic Plans

Ziad Mohammad Abu-Hamour, Abdulameer Khalf Hussain
Department of Information Technology, Faculty of Information Technology, Middle East University, Jordan.

4- Multi-Level Support Vector Machine

Milad Aghamohammadi, Morteza Analoui
Department of Computer Engineering, Iran University of Science and Technology, Iran.

5- Evaluation and Comparison of Security Issues on Cloud Computing Environment

Priyanka Arora, Arun Singh, IIMT Engineering College, Meerut UP, India.
Himanshu Tyagi, Raj Kumar Goel, Institute of Technology for Women, Ghaziabad, UP, India.

1- A Biometric Model for Examination Screening and Attendance Monitoring in Yaba College of Technology

Rufai M.M, Adigun J. O, N. A. Yekini
Department of Computer Technology, Yaba College of Technology.

2- A Generator of MVC-based Web Applications

Strahinja Lazetic, Instituto Superior Tecnico, Universidade Tecnica de Lisboa, Lisbon, Portugal.
Dusan Savic, Sinisa Vlajic, Sasa Lazarevic
The Faculty of Organizational Sciences, Belgrade University, Belgrade, Serbia.

3- Electronic Payment Fraud Detection Techniques

Adnan M. Al-Khatib
CIS Dept. – Faculty of Information Technology, Jerash University, Jarash – Jordan.

4- Ethical Communication in IT Project From an Islamic Perspective

Mohamed Nizam, Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Alia Ahmed Aldossary, Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.
Jamaludin Ibrahim
Kulliyyah of Information & Communication Technology (KICT), International Islamic University, Malaysia (IIUM), Kuala Lumpur, Malaysia.

5- Hybridization Between Iterative Simulated Annealing and Modified Great Deluge for Medical Clustering Problems

Anmar Abuhamdah, Department of Computer Science, Jearsh private university, Amman, Jordan.
Anas Quteishat, Department of Computer Engineering, Al- Balqa’ Applied University, Amman, Jordan.
Bassam M. El-Zaghmouri, Department of Computer Information Systems, Jearsh private university, Amman, Jordan.
Rawnaq Kittaneh, Department of Computer Science, University Kabangsaan Malaysia, Bangi, Malaysia.

6- Swap Training: A Genetic Algorithm Based Feature Selection Method Applied on Face Recognition System

Ashkan Parsi, Department of Computer, Engineering and IT, Shahrood University of Technology, Shahrood, Iran.
Mehrdad Salehi, Computer Aided Medical Procedures, Technische Universität München, Munich, Germany.
Ali Doostmohammadi, Department of Computer, Engineering and IT, Shahrood University of Technology, Shahrood, Iran.

1- Performance Comparison of Face Recognition using Transform Domain Techniques

Jossy P. George, Department of Computer Science, Christ University, Bangalore, India.
Saleem S Tevaramani, K B Raja
Electronics and Communication Engineering Department
University Visvesvaraya College of Engineering, Bangalore, India.

2- Leader Election Algorithm in 3D Torus Networks with the Presence of One Link Failure

Mohammed Refai, Department of SE, Faculty of Science and Information Technology, Zarqa University, Jordan.
Ibrahim AL-Oqily, Department of CS, Faculty of Prince Al-Hussein Bin Abdullah II, for Information Technology Hashemite University, Jordan.
Abed Alhamori, Faculty of Information Technology Albalqa University, Jordan.

3- A Three Stages Segmentation Model for a Higher Accurate off-line Arabic Handwriting Recognition

Said Elaiwat, School of Computer Science & Software Engineering (CSSE), The University of Western Australia (UWA), Australia 35Stirling Highway CRAWLEY WA 6009 University.
Marwan AL-abed Abu-zanona, Department of Computer Science , Imam Muhammad Ibn Saud Islamic, Al-Ehsa Branch, Al-Ehsa – Saudi Arabia.
Farah Hanna AL-Zawaideh, Department of Computer Information System, Irbid National University, Irbid, Jordan.

4 -Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification

Reyadh Shaker Naoum, Zainab Namh Al-Sultani
Department of Computer Science, Faculty of Information Technology, Middle East University, Amman, Jordan.

5- Performance Evaluation for VOIP over IP and MPLS

Reyadh Shaker Naoum, Mohanand Maswady
Computer Information System Department, Faculty of Information Technology, Middle East University, Amman, Jordan.

6- Data set property based ‘K’ in VDBSCAN Clustering Algorithm

Abu Wahid Md. Masud Parvez
Software Quality Architect of Software quality department , Tech Prolusion Labs, San Francisco, USA.

1- A Novel Approach for Energy Optimization of Wireless Sensors Network by Adaptive Clustering

Rufaida Muhammad Shamroukh, Aryaf Abdullah Aladwan
Computer Engineering dept., Faculty of Engineering Technology, Al-Balqa’ Applied University, Amman , Jordan.
Ana’am Abdullah Aladwan, Information Systems & Technology dept., University of Banking and Financial Sciences, Amman , Jordan.

2- A Novel Study of Biometric Speaker Identification Using Neural Networks and Multi-Level Wavelet Decomposition

Aryaf Abdullah Aladwan, Rufaida Muhammad Shamroukh
Computer Engineering dept., Faculty of Engineering Technology, Al-Balqa’ Applied University, Amman , Jordan.
Ana’am Abdullah Aladwan, Information Systems & Technology dept., University of Banking and Financial Sciences, Amman , Jordan.

3- Multiple Classifiers to verify the Online Signature

Mohammed J. Alhaddad
Department of Information Technology, Computer Science & Information Technology Collage, King Abdulaziz University, Saudi Arabia.

4- Data Mining: A Prediction for Performance Improvement of Engineering Students using Classification

Surjeet Kumar Yadav, Research Scholar, Shri Venkateshwara University, J.P. Nagar, India.
Saurabh Pa, Head, Dept. Of MCA, VBS Purvanchal University, Jaunpur, India.

5- An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students

Husein Osman Abdullahi, Abdirizaq said, Jamaludin Bin Ibrahim
Department Of Information System, Faculty of Information Communication Technology, IIUM, Jalan Gombak, 53100, Kuala Lumpur, Malaysia.

6- Arabic Text Summerization Model Using Clustering Techniques

Ahmad Haboush, Maryam Al-Zoubi, Ahmad Momani, Motassem Tarazi
Computer Science Department, Jerash University, Jerash, Jordan.

1- A Review on Speech Recognition Challenges and Approaches

Vimala.C, V.Radha
Department of Computer Science Avinashilingam Institute for Home Science and Higher Education and Women Coimbatore, India.

2- A New Method for Generating CIM Using Business and Requirement Models

Hamid Reza Sharifi, Mehran Mohsenzadeh
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Iran.

3- The Use of Social Networking in Education: Challenges and Opportunities

Ashraf Jalal Yousef Zaidieh
ICT, collage of information and communication technology, IIUM, Malaysia.

4- Conversion Database of the Shapes Into XML Data for Shape Matching

Noreddine GHERABI, Mohamed BAHAJ
Hassan 1st University, FSTS, Department of Mathematics and Computer Science, Labo LITEN.

5- Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications

Bassam M. El-Zaghmouri, Department of Computer Information Systems, Jerash University, Jordan.
Marwan A. Abu-Zanona, Department of Computer Science, Imam Muhammad Ibn Saud Islamic University- Al-Ehsa Branch, Saudi Arabia.

6- Link Quality Based Traffic Queue Management at 5.8 GHz

Anwar Hassan Ibrahim, Kuala Lumpur Infrastructure University College, School of Engineering and Technology Infrastructure, Malaysia.
Mahamod Ismail, Kasmiran Jumari, Mandeep Singh
University Kebangsaan Malaysia, Faculty of Engineering and Build Environment, Malaysia.

7- Towards Successful Improvement of Students’ Residential Management Processes using the Enterprise Architecture Maturity Model

Golooba Moses , Azizah Hassan, Mahmoud M. Musleh, Khansa Monther, Karama M.A. Nofal, Abd. Rahman Ahlan
Department of Information Systems, International Islamic University Malaysia.

1- Quantum Attack Resistant Cloud 

PSV Vachaspati, P.S.Avadhani 

2- Implementing a Web Browser with Phishing Detection Techniques 

Aanchal Jain, Vineet Richariya

3- Storage Area Network Implementation on an Educational Institute Network 

Safarini Osama

4- A Survey of Remote Internet Voting Vulnerabilities 

Okediran O. O., Omidiora E. O., Olabiyisi S. O., Ganiyu R. A.

5- Approaches to Wireless Sensor Network: Security Protocols 

Harmandeep Singh,  Garima Malik

6- Implementing a Web Browser with Web Defacement Detection Techniques 

Tushar Kanti, Vineet Richariya, Vivek Richariya

7- Quality Requirements Optimization with Architectural Styles 

Marwan AL-Abed Abu-Zanona, Yosef Hasan Jbara, Farah Hanna AL-Zawaideh

8- An Improved Algorithm for Mining Association Rules in Large Databases 

Farah Hanna AL-Zawaidah, Yosef Hasan Jbara, Marwan AL-Abed Abu-Zanona

1- Prototype System for Monitoring and Computing Greenhouse gases 

R. JaichandranA. Anthony Irudhayarj

2- Offline Arabic Text Recognition – An Overview 

Atallah Mahmoud AL-Shatnawi, Farah Hanna AL-Zawaideh, Safwan AL-Salaimeh, Khairuddin Omar

3- Improving Semantic Schema Integration 

Zahra Sheikhnajdy, Mehran Mohsenzadeh, Mashalah Abbasi Dezfuli

4- Hybrid Technique For Secure Sum Protocol 

Priyanka Jangde, Gajendra Singh Chandel, Durgesh Kumar Mishra

5- Extending the Real Rime Congestion Control Mechanism for Multicast Applications over 3G Wireless Networks 

Neetu Sharma, Amit Sharma, Vijay Singh Rathore, D.K Mishra

6- GUI Design Using DLD for All Web Browser Interactions 

Thippeswamy.K, Manjaiah.D.H

7- Practical Approach for Master Data Management 

Chandra Sekhar Bhagi

8- Quantitative Evaluation of Performance and Validity Indices for Clustering the Web Navigational Sessions   

Zahid Ansari, M.F. Azeem, Waseem Ahmed, A.Vinaya Babu

9- Hierarchical and Bayesian Scattered Data Taxonomy in Mobile Ad-hoc Networks 

Sunar Arif Hussain, K.E.Sreenivasa Murthy

10- FPGA Based Design and Implementation of Efficient Video Filter 

Rajesh Mehra, Virendra Arya, Rajpati Yadav

1- A Novel Approach for Security Development for Multimedia System

B.Prabhavathi, AVR&SVR College of Engg.& Tech., Dept .of CSE, Nandyal, Kurnool(Dt.), A.P.
P.D.Chidhambara Rao, SKTRM College of Engg. & Technology, Dept .of CSE, Kondair, A.P.
P.Raja Sekhar, SVPCET, Dept .of CSE, R.V.S.Nagar, Puttur, Chittur(Dt.), A.P.
Ishrath Jahan, College for Charted Accounts, Dept. of CSE , Vijayawada, A.P.
G.Murali Mohan, SVPCET, Dept .of CSE, R.V.S.Nagar, Puttur, Chittur(Dt.), A.P.

2- Classification of Uncertain data using Fuzzy Neural Networks

G.V.SURESH, Shabbeer Shaik, O.Srinivasa Reddy, B. Munibhadrayya

3- Dynamic Time Warping Algorithm with Distributed Systems

Zied TRIFA, Mohamed LABIDI, Maher KHEMAKHEM
Department of Computer Science, University of Sfax, MIRACL Lab, Sfax, Tunsia.

4- A Contemporary Polyalphabetic Cipher using Comprehensive Vigenere Table

Ravindra Babu Kallam, Vivekananda Institute of Technology and Science SET, Karimnagar, A.P, India.
S.Udaya Kumar, Principal MVSR Engineering College, Hyderabad, Andhra Pradesh, India.
A.Vinaya babu, Admissions, JNTUH, Hyderabad,A.P, India.
Shravan kumar, Aizza college of Engineering and Technology,Mancherial,A.P, India

5- Hexagonal Based Search Pattern for Motion Estimation in H.264/AVC

Sourabh Rungta, Computer Science Department, RCET, Bhilai, India.
Kshitij Verma, ICT Department, ABV-IIITM, Gwalior, India.
Neeta Tripathi, Electronics Deptt., SSITM, Bhilai,India.
Anupam Shukla, ICT Deptt, ABV-IIITM, Gwalior,India.

6- Overview of Artificial Intelligence

Munisha Kaushal, Rakshpal Singh Dehal, Amrit kaur
Department of Electronics and Communication Engg., University college of Engineering, Punjabi University, Patiala, India.
Zumita Kaushal, Department of Computer Science & Engg., Ambala college of Engineering, Kurukeshtra University, Ambala, India.

7- Performance Modelling and Analysis of Connection Admission Control in OFDMA based WiMAX System with MMPP Queuing

Abdelali EL BOUCHTI, Said EL KAFHALI, Abdelkrim HAQIQ
Computer, Networks, Mobility and modelling laboratory, e-NGN research group, Africa and Middle East, FST, Hassan 1st University, Settat, Morocco.

8- Remote Home Management: An alternative for working at home while away

B. I. Ahmad, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
F. Yakubu, Iya Abubakar Computer Center, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
M. A. Bagiwa, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.
U. I. Abdullahi, Department of Mathematics, Ahmadu Bello University, Zaria. Kaduna, Nigeria.

9- Secured Crypto-Stegano Communication Through Unicode

A. Joseph Raphael, Ibra College of Technology, Sultanate of Oman
V. Sundaram, Department of Computer Applications, Karpagam College of Engineering, Coimbatore, India.

10- Simulation of an Agent Based System Behavior in a Dynamic and Unpredicted Environment

Eva Cipi, Computer Science Department, University of Vlora, Vlora, Albania.
Betim Cico, Informatics Engineering Department, Polytechnic Tirana University, Tirana, Albania.

1- Robust Sign Language Recognition System Using ToF Depth Cameras

Morteza Zahedi, Ali Reza Manashty
Department of Computer Engineering and IT, Shahrood University of Technology, Iran.

2- A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems

Ghossoon. M. W. Al-Saadoon, College of Administrative Science, Applied Science University, Kingdom of Bahrain.
Hilal M.Y. Al-Bayatti, College of Arts and Science, Applied Science University, Kingdom of Bahrain.

3- A Cloud-based Approach for Context Information Provisioning

Elarbi Badidi, Faculty of Information Technology, United Arab Emirates University,  United Arab Emirates.
Larbi Esmahi, School for Computing & Information Systems, Athabasca University, Canada.

4- Citadel E-Learning: A New Dimension to Learning System

Awodele O., Kuyoro S. O., Adejumobi A. K., Awe O., Makanju O
Department of Computer Science and Mathematics, Babcock University, Nigeria.

5- A Hybrid Classifier using Boosting, Clustering, and Naïve Bayesian Classifier

A. J. M. Abu Afza, Dewan Md. Farid, and Chowdhury Mofizur Rahman
Department of Computer Science and Engineering, United International University, Dhaka-1209, Bangladesh.

6- A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Technique

Alaa H. AL-Hamami, Computer Sciences Dept., Amman Arab University, Amman, Jordan.
Mohammad A. AL-Hamami, Computer Sciences Dept., Delmon University, Manama, Bahrain.
Soukaena H. Hashem, Computer Sciences Dept., University of Technology, Baghdad, Iraq.

7- Artificial Neural Network Model for Forecasting Foreign Exchange Rate

Adewole Adetunji Philip, Akinwale Adio Taofiki, Akintomide Ayo Bidemi
Department of Computer Science, University of Agriculture, Abeokuta, Nigeria.

8- Internet Banking Security Management through Trust Management

Ioannis Koskosas, Department of Informatics and Telecommunications Engineering, University of Western Macedonia, KOZANI, Greece.
Maria-Mirela Koskosa, Department of Architecture and Visual Arts, University of East London, London, UK.

9- Precluding Emerging Threats from Cyberspace: An Autonomic Administrative Approach

Vivian Ogochukwu Nwaocha, Inyiama H.C.
Department of Computer Science, University of Nigeria, Nsukka, Nigeria.

10- Robust Sign Language Recognition System Using ToF Depth Cameras

Morteza Zahedi, Ali Reza Manashty
Department of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran.

11- Using MI Method for Feature Weighting to Improve Text Classification Performance

Morteza Zahedi, Aboulfazl Sarkardei
Department of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran.

12- A Multi-Phase Feature Selection Approach for the Detection of SPAM

Ahmed Khalid, Izzeldin M. Osman
Department of computer science, Sudan University of Science and Technology, Khartoum, Sudan.

1- Finding Shortest Path for Developed Cognitive Map Using Medial Axis

Hazim A. Farhan, Hussein H. Owaied, Suhaib I. Al-Ghazi
Computer Science Dept., Middle East University, Amman, Jordan.

2- Validation Measures in CMMI

Mahmoud Khraiwesh
Faculty of Science and Information Technology, Zarqa University, Zarqa – Jordan.

3- Using Short Message Service (SMS) to Support Business Continuity

Maher Abdel-qader, Ahmad AL-Jaber, Alaa AL-Hamami
Department of Computer Science, Amman Arab University for Graduate Studies, Amman, Jordan.

4- SLDs for Visualizing Multicolor Elevation Contour Lines in Geo-Spatial Web Applications

Kodge B. G., Department of Computer Science, Swami Vivekanand Mahavidhyalaya, Bidar Road, Udgir, Dist. Latur (MS), India.
Hiremath P. S., Department of Computer Science, Gulbarga University, Gulbarga, Karnataka State, India.

5- Optimal Cell Towers Distribution by using Spatial Mining and Geographic Information System

Alaa H. AL-Hamami, Amman Arab University for Graduate Studies, Amman, Jordan.
Soukaena H. Hashem, University of technology,  Iraq.

6- Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

H. A. Esmaili, Department of Computer, Engineering, Sharif University of Technology, Tehran, Iran.
M. R. Khalili Shoja, Department of Electrical Engineering, Amirkabir University, of Technology, Tehran, Iran.
Hossein gharaee, Department of Electrical Engineering, Tarbiat Modares, University, Tehran, Iran.

1- A Framework Based Approach for the Development of Web Based Applications

Rachit Mohan Garg, Yamini Sood, Balaji Kottana, Pallavi Totlani

2- Hybrid Model for Solving Multi-Objective Problems Using Evolutionary Algorithm and Tabu Search

Rjab Hajlaoui, Mariem Gzara, Abdelaziz Dammak

3- Comparative Study on DFD to UML Diagrams Transformations

Atif A. A. Jilani, Muhammad Usman, Aamer Nadeem, Zafar I. Malik, Zahid Halim