Table of contents for issues of International Journal of Computer Applications

Last update: Sat Apr 13 11:50:03 MDT 2024                Valid HTML 3.2!

Volume 22, Number 1, 2000
Volume 22, Number 2, 2000
Volume 22, Number 3, 2000
Volume 23, Number 1, 2001
Volume 23, Number 2, 2001
Volume 23, Number 3, 2001
Volume 24, Number 1, 2002
Volume 24, Number 2, 2002
Volume 24, Number 3, 2002
Volume 25, Number 1, 2003
Volume 25, Number 2, 2003
Volume 25, Number 3, 2003
Volume 25, Number 4, 2003
Volume 26, Number 1, 2004
Volume 26, Number 2, 2004
Volume 26, Number 3, 2004
Volume 26, Number 4, 2004
Volume 27, Number 1, 2005
Volume 27, Number 2, 2005
Volume 27, Number 3, 2005
Volume 27, Number 4, 2005
Volume 28, Number 1, 2006
Volume 28, Number 2, 2006
Volume 28, Number 3, 2006
Volume 28, Number 4, 2006
Volume 29, Number 1, 2007
Volume 29, Number 2, 2007
Volume 29, Number 3, 2007
Volume 29, Number 4, 2007
Volume 30, Number 1, 2008
Volume 30, Number 2, 2008
Volume 30, Number 3, 2008
Volume 30, Number 4, 2008
Volume 31, Number 1, 2009
Volume 31, Number 2, 2009
Volume 31, Number 3, 2009
Volume 31, Number 4, 2009
Volume 32, Number 1, 2010
Volume 32, Number 2, 2010
Volume 32, Number 3, 2010
Volume 32, Number 4, 2010
Volume 33, Number 1, 2011
Volume 33, Number 2, 2011
Volume 33, Number 3, 2011
Volume 33, Number 4, 2011
Volume 34, Number 1, 2012
Volume 34, Number 2, 2012
Volume 34, Number 3, 2012
Volume 34, Number 4, 2012
Volume 35, Number 1, 2013
Volume 35, Number 2, 2013
Volume 35, Number 3, 2013
Volume 35, Number 4, 2013
Volume 36, Number 1, 2014
Volume 36, Number 2, 2014
Volume 36, Number 3, 2014
Volume 36, Number 4, 2014
Volume 37, Number 1, 2015
Volume 37, Number 2, 2015
Volume 37, Number 3--4, 2015
Volume 38, Number 1, 2016
Volume 38, Number 2--3, 2016
Volume 38, Number 4, 2016
Volume 39, Number 1, 2017
Volume 39, Number 2, 2017
Volume 39, Number 3, 2017
Volume 39, Number 4, 2017
Volume 40, Number 1, 2018
Volume 40, Number 2, 2018
Volume 40, Number 3, 2018
Volume 40, Number 4, 2018
Volume 41, Number 1, 2018
Volume 41, Number 2, 2017
Volume 41, Number 3, 2017
Volume 41, Number 4, 2019
Volume 42, Number 1, 2017
Volume 42, Number 2, 2017
Volume 42, Number 3, 2019
Volume 42, Number 4, 2017
Volume 42, Number 5, 2018
Volume 42, Number 6, 2020
Volume 42, Number 7, 2018
Volume 42, Number 8, 2018
Volume 43, Number 1, 2018
Volume 43, Number 2, 2018
Volume 43, Number 3, 2018
Volume 43, Number 4, 2018
Volume 43, Number 5, 2018
Volume 43, Number 6, 2019
Volume 43, Number 7, 2019
Volume 43, Number 8, 2019
Volume 43, Number 9, 2019
Volume 43, Number 10, 2019
Volume 44, Number 1, 2022
Volume 44, Number 2, 2019
Volume 44, Number 3, 2020
Volume 44, Number 4, 2020
Volume 44, Number 5, 2020
Volume 44, Number 6, 2020
Volume 44, Number 7, 2020
Volume 44, Number 8, 2019
Volume 44, Number 9, 2022
Volume 44, Number 10, 2021
Volume 44, Number 11, 2022
Volume 44, Number 12, 2019
Volume 45, Number 1, 2019
Volume 45, Number 2, 2019
Volume 45, Number 3, 2022
Volume 45, Number 4, 2023
Volume 45, Number 5, 2023
Volume 45, Number 6, 2023
Volume 45, Number 7--8, 2023
Volume 45, Number 9, 2023
Volume 45, Number 10, 2023
Volume 45, Number 11, 2023
Volume 45, Number 12, 2023
Volume 46, Number 1, 2023
Volume 46, Number 2, 2023
Volume 46, Number 3, 2023
Volume 46, Number 4, 2023


International Journal of Computer Applications
Volume 22, Number 1, 2000

             G. S. Maharana and   
                    P. K. Meher   Parallel Algorithms and Systolic
                                  Architectures for $1$- and $2$-D
                                  Interpolation Using Discrete Hartley
                                  Transform  . . . . . . . . . . . . . . . 1--7
              F. S. Al-Anzi and   
                 K. M. Al-Zamel   Improved Parallel Cell Placement
                                  Algorithm Using Bounded Edge-Width
                                  Routing Model  . . . . . . . . . . . . . 8--12
                 Hojung Cha and   
                      Jaehak Oh   A Real-Time Resource Management System
                                  for Video Server . . . . . . . . . . . . 13--22
                M. Farimani and   
                 J. A. Robinson   Multipoint Activity Sharing Services for
                                  Fast Prototyping of Groupware
                                  Applications . . . . . . . . . . . . . . 23--28
                     Jie Wu and   
                      V. Rancov   Implementing Context-Driven Parallel
                                  Computations . . . . . . . . . . . . . . 29--37
                 F. Arcelli and   
                    M. De Santo   Distributed Agents for Problem Solving   38--45
                      Anonymous   Call for Papers --- IMSA 2000  . . . . . 48--49

International Journal of Computer Applications
Volume 22, Number 2, 2000

            E. B. Fernandez and   
                     Jie Wu and   
                   Haifeng Qian   A Combined Functional and
                                  Object-Oriented Approach to Software
                                  Design . . . . . . . . . . . . . . . . . 51--61
              S. Tanterdtid and   
            W. Benjapolakul and   
             W. Steanputtanagul   Optimizing a Single-Hop Virtual Path
                                  System Using a Genetic Algorithm . . . . 62--72
                Chen Zhenyu and   
                J. B. Mbede and   
                   Zhou Yan and   
                   Li Dehua and   
                     Hu Hanping   Application of a Genetic Algorithm in
                                  Triangulation of a $3$-D Object Surface  73--77
             L. S. K. Chong and   
                  S. C. Hui and   
                      C. K. Yeo   Faxportal: Distributed FAX
                                  Transportation for Internet FAX Services 78--88
                 Sang H. Oh and   
                     Won S. Lee   Parallel Evaluation of a Deductive Query
                                  with a Breadth-First Search Strategy . . 89--99
              A. S. Mohamed and   
                   A. Galal and   
                  I. Khalil and   
                    K. Sobh and   
                       M. Selim   Dispo: Distributed Multi-Threaded
                                  Execution of Prolog Programs . . . . . . 100--108
                 S. Valenti and   
            A. Cucchiarelli and   
                       M. Panti   A Communication Paradigm for Voluntary
                                  Collaboration  . . . . . . . . . . . . . 109--117

International Journal of Computer Applications
Volume 22, Number 3, 2000

             O. M. Al-Jarah and   
                T. A. Al-khdour   Slackness-Based Co-Scheduling Hardware
                                  and Software Pipelines with Multiple
                                  Latency Sequences  . . . . . . . . . . . 121--128
               M. Kobayashi and   
                        M. Ohta   Basic Study of Sound Localization for an
                                  Acoustic Visual aid System . . . . . . . 129--133
                    Hai Jin and   
                      Kai Hwang   Efficient LRU Algorithm for Cache
                                  Scheduling in a Disk Array System  . . . 134--139
                J. M. Huang and   
                     T. C. Yang   Multidimensional Fault Tolerance in
                                  Cube-Connected Cycles Architecture . . . 140--150
                  J. C. Lin and   
                          I. Ho   Generating Real-Time Software Test Cases
                                  by Time Petri Nets . . . . . . . . . . . 151--158
            M. P. Saltouros and   
         E. A. Verentziotis and   
              M. E. Markaki and   
            M. E. Theologou and   
                 I. S. Venieris   An Efficient Hybrid Genetic Algorithm
                                  for Finding (Near-) Optimal Steiner
                                  Trees: an Approach to Routing of
                                  Multipoint Connections . . . . . . . . . 159--165
                     B. Bhasker   Optimizing Queries in Distributed
                                  Database Systems on a Broadcast Local
                                  Area Network . . . . . . . . . . . . . . 166--173
            Shinfeng D. Lin and   
                Shih-Chieh Shie   Image Coding Using Adaptive Classified
                                  Side-Match Finite-State Vector
                                  Quantization . . . . . . . . . . . . . . 174--180
                      Anonymous   Call for Papers Special Issue on
                                  Computational Intelligence Techniques in
                                  Co-Operative Robots  . . . . . . . . . . 185--185


International Journal of Computer Applications
Volume 23, Number 1, 2001

              R. Logeswaran and   
                     C. Eswaran   Performance Survey of Several Lossless
                                  Compression Algorithms for Telemetry
                                  Applications . . . . . . . . . . . . . . 1--9
                   J. R. Hu and   
                      Y. W. Bai   Power Efficiency and Latency for a
                                  Semi-Batch Power Management Model in a
                                  Palmtop Multimedia Terminal  . . . . . . 10--16
                   Ming-Chi Lee   Dynamic Updates of Inheritance Hierarchy
                                  for Object-Oriented Database Schema  . . 17--24
                R. Goularte and   
               E. D. S. Moreira   Managing Access to a Video Server
                                  Through a Metadata Base  . . . . . . . . 25--29
             Han-Chieh Chao and   
              Jenn-Yuh Hong and   
               Jiann-Liang Chen   Channel Assignment Schemes for WDM-Based
                                  Personal Communications Networks . . . . 30--34
                  C. Bouras and   
                    V. Kapoulas   Basic Internet Services Environment for
                                  the Education Society  . . . . . . . . . 35--44
               A. I. Vakali and   
                    E. D. Terzi   A Java-Based Model for I/O Scheduling in
                                  Tertiary Storage Subsystems  . . . . . . 45--50
           Jiann-Liang Chen and   
             Jian-Hong Gong and   
                 Han-Chieh Chao   Resource Reservation for Cellular Data
                                  Services Using Fuzzy Matrices  . . . . . 51--59
                    Kai Jin and   
              Chai Kiat Yeo and   
             Siu Cheung Hui and   
                  Ing Yann Soon   A FAX Adapter for Internet FAX-to-FAX
                                  Communication  . . . . . . . . . . . . . 60--67
              Wei-Chou Chen and   
             Tzung-Pei Hong and   
                   Wen-Yang Lin   Three Maintenance Algorithms for
                                  Compressed Object-Oriented Data
                                  Warehousing  . . . . . . . . . . . . . . 68--75
              Simon X. Yang and   
                       Max Meng   Call for Papers  . . . . . . . . . . . . 77--77

International Journal of Computer Applications
Volume 23, Number 2, 2001

              M. Maierhofer and   
                  C. Bailey and   
                     R. Sotudeh   ``Affordable Scalability'': An Analysis
                                  of Modular Multimedia Server
                                  Architectures with Shared Local Memory   79--89
                 T. Chambel and   
                 N. Correia and   
            N. Guimarães   Hypervideo on the Web: Models and
                                  Techniques for Video Integration . . . . 90--98
                         J. Kim   Hybrid Filtering of Web Pages for a
                                  Recommendation Agent . . . . . . . . . . 99--105
                A. Marshall and   
                       S. Sezer   The Influence of Cumulative Switch Delay
                                  in Multiple Service Class Networks . . . 106--114
                    S. Kota and   
                   M. Goyal and   
                   R. Goyal and   
                        R. Jain   Multimedia Satellite Networks and TCP/IP
                                  Traffic Transport  . . . . . . . . . . . 115--128
              G. Falkemeier and   
              G. R. Joubert and   
                         O. Kao   Internet Supported Analysis and
                                  Presentation of MPEG Compressed
                                  Newsfeeds  . . . . . . . . . . . . . . . 129--136

International Journal of Computer Applications
Volume 23, Number 3, 2001

                   G. Babin and   
                     F. Lustman   Application of Formal Methods to
                                  Scenario-Based Requirements Engineering  141--151
               B. A. Malloy and   
             J. D. McGregor and   
                   S. R. Hughes   Exploiting Iostreams to Integrate a GUI
                                  Into a Command Driven Application  . . . 152--158
                P. H. Welch and   
            G. H. Hilderink and   
           A. W. P. Bakkers and   
                   G. S. Stiles   Safe and Verifiable Design of Concurrent
                                  Java Programs  . . . . . . . . . . . . . 159--165
             Kazunori Iwata and   
               Nobuhiro Ito and   
                Xiaoyong Du and   
                  Naohiro Ishii   Agent Model for Dynamically Changing
                                  Plan in $ \pi $-Calculus . . . . . . . . 166--172
               E. Althammer and   
                        W. Pree   Design and Implementation of an
                                  MVC-Based Architecture for E-Commerce
                                  Applications . . . . . . . . . . . . . . 173--185
              L. S. Oquendo and   
                      A. Attoui   Deterministic CORBA ORB (DORB) for
                                  Distributed Real-Time Applications . . . 186--190


International Journal of Computer Applications
Volume 24, Number 1, 2002

            A. E. Al-Ayyoub and   
                      A. Yazici   Data Dependence Analysis on Trapezoidal
                                  Regions  . . . . . . . . . . . . . . . . 1--7
                    Y. Park and   
                          L. Wu   Software Component Retrieval by
                                  Composition Using Semantic Properties    8--13
              R. Logeswaran and   
                     C. Eswaran   Radial Basis Neural Network for Lossless
                                  Data Compression . . . . . . . . . . . . 14--19
                   G. Succi and   
                 W. Pedrycz and   
                        R. Wong   Dynamic Composition of Components Using
                                  WebCODS  . . . . . . . . . . . . . . . . 20--27
                E. A. Lotfy and   
                  A. S. Mohamed   Applying Neural Networks in Case-Based
                                  Reasoning Adaptation for Cost Assessment
                                  of Steel Buildings . . . . . . . . . . . 28--38
                      Anonymous   Erratum  . . . . . . . . . . . . . . . . 39--39

International Journal of Computer Applications
Volume 24, Number 2, 2002

                I. D. D. Curcio   Mobile Video QoS Metrics . . . . . . . . 41--51
                 T. Okamoto and   
                    K. Seki and   
                  M. Kayama and   
                  A. I. Cristea   Rapsody: a Self/Collaborative-Learning
                                  Multimedia Based Teacher Training
                                  Distance Support Model . . . . . . . . . 52--57
           Andrew Tokmakoff and   
             Daan Velthausz and   
            Mark Van Setten and   
               Erik Oltmans and   
         Ernst-Jan Goedvolk and   
            René Bal and   
                  Paul Porskamp   Content Engineering for the
                                  Next-Generation Internet . . . . . . . . 58--69
               M. Villanova and   
               N. Belkhatir and   
                      H. Martin   A Process Environment Supporting Web
                                  Multimedia Information Systems . . . . . 70--76
                   O. Javed and   
                    S. Khan and   
                 Z. Rasheed and   
                        M. Shah   Visual Content-Based Segmentation of
                                  Talk and Game Shows  . . . . . . . . . . 77--82
                 C.-R. Shyu and   
           J. Harnsomburana and   
                   Y. Sethi and   
                   R. Singh and   
                     J. C. Reid   A Hybrid Query Approach for Radiology
                                  Education: Integrating Content-Based
                                  Medical Image Retrieval and Text-Based
                                  Information Retrieval  . . . . . . . . . 83--92
                 G. S. Shin and   
                  S. I. Jin and   
                  P. S. Mah and   
                      C. S. Oho   Greedy Request Scheduling to Reduce
                                  Initial Latency for VOD Systems  . . . . 93--99

International Journal of Computer Applications
Volume 24, Number 3, 2002

                    H. Wang and   
                  D. Mamora and   
                   L. N. Bhuyan   Ppctsi: a Software Package for Rapid
                                  Analysis of CT Scan Images . . . . . . . 103--111
              M. S. Loffler and   
             N. P. Costescu and   
              E. Zergeroglu and   
                   D. M. Dawson   Telerobotic Decontamination and
                                  Decommissioning with Qrobot, a PC-based
                                  Robot Control System . . . . . . . . . . 112--121
            E. Keramopoulos and   
              P. Pouyioutas and   
                      T. Ptohos   The Goql Graphical Query Language  . . . 122--128
                 J. Aguilar and   
                   M. Hernandez   A Fault-Tolerant Mechanism for
                                  Distributed/Parallel System Based on
                                  Task Replication Techniques  . . . . . . 129--135
         S. Muknahallipatna and   
                  A. Kadkol and   
                      J. Hamann   Monitoring Tool for Performance
                                  Measurements of Windows Nt-Based Lans    136--143
            G. A. Aderounmu and   
            E. R. Adagunodo and   
                   A. D. Akinde   Performance Comparison of Data-Link
                                  Control Protocol for Wireless
                                  Asynchronous Transfer Mode Network . . . 144--152
               Shundong Xia and   
                    Jinyuan You   A Coordination Model for Network
                                  Computing Environments . . . . . . . . . 153--159
                      Anonymous   Call for Papers for Special Issue on
                                  Cluster/Grid Computing . . . . . . . . . 161--162


International Journal of Computer Applications
Volume 25, Number 1, 2003

                    W. Chen and   
                      B. Wasson   Coordinating Collaborative Knowledge
                                  Building . . . . . . . . . . . . . . . . 1--10
                  N. Klever and   
                      M. Jeckle   Proposal for XML Schema V 1.1 as a Basis
                                  for \tt XMLrepository.Org  . . . . . . . 11--16
                      A. Harrer   Software Engineering Methods for RE-USE
                                  of Components and Design in Educational
                                  Systems  . . . . . . . . . . . . . . . . 17--23
                C. E. Palau and   
                   V. Manso and   
                 J. M. Raga and   
                  R. Romero and   
               J. C. Guerri and   
                      M. Esteve   An XML Approach for Assessment in
                                  Education  . . . . . . . . . . . . . . . 24--37
                   F. Ramos and   
                   A. Conde and   
                   L. Neves and   
                     A. Moreira   Management of E-Learning Environments:
                                  some Issues and Research Clues . . . . . 38--41
                  J. Kuljis and   
                     D. Y. Lees   Supporting Organizational E-Learning
                                  with a Distributed, Virtual,
                                  Collaborative Learning Environment . . . 42--49
              N. Manouselis and   
                     D. Sampson   Agent-Based E-Learning Course
                                  Recommendation: Matching Learner
                                  Characteristics with Content Attributes  50--64
                V. Devedzic and   
                      V. Pocajt   What Does Current Web-Based Education
                                  Lack?  . . . . . . . . . . . . . . . . . 65--71
                     P. Kommers   Experiential Learning Through
                                  Constructivist Learning Tools  . . . . . 72--83
                        J. Smid   Interactive Tutoring Model Using
                                  Information Cycling on the WWW . . . . . 84--90

International Journal of Computer Applications
Volume 25, Number 2, 2003

                 S. J. Choi and   
                     W. Scacchi   Formal Analysis of the Structural
                                  Correctness of Slc Descriptions  . . . . 91--97
                  J.-S. Lee and   
                 W.-K. Hong and   
                      S.-D. Kim   Adaptive Methods to Minimize
                                  Decompression Overhead for Compressed
                                  On-Chip Caches . . . . . . . . . . . . . 98--105
               Y.-M. Cheung and   
                          L. Xu   A New Information-Theoretic Based ICA
                                  Algorithm For Blind Signal Separation    106--110
                        H. Haga   Development of Hypermedia
                                  Computer-Mediated Learning System and
                                  its Evaluation . . . . . . . . . . . . . 111--118
                  H. A. Ali and   
            A. I. El-Dousky and   
                   A. A. A. Ali   Exploitation of Intelligent Agent For
                                  Building Expandable and Flexible
                                  Computerized Tutoring System . . . . . . 119--129
                  S. D. Lin and   
                 S. C. Shie and   
                     C. F. Chen   A DCT-Based Image Watermarking With
                                  Threshold Embedding  . . . . . . . . . . 130--135
                    X L. Li and   
              B. Veeravalli and   
                       C. C. Ko   Distributed Image Processing On a
                                  Network Of Workstations  . . . . . . . . 136--145
                S. Bataineh and   
                      A. Younis   An Optimal Manhattan Street
                                  Network-Routing Algorithm  . . . . . . . 146--153

International Journal of Computer Applications
Volume 25, Number 3, 2003

                   K. Henke and   
               H. D. Wuttke and   
                    S. Hellbach   Laboratory Via Internet --- New Ways In
                                  Education And Research . . . . . . . . . 157--163
                     M. Karweit   A Web-Based Laboratory For
                                  Distance-Learning Engineering Students   164--169
              L. Sheremetov and   
           R. Peredo Valderrama   Development of Reusable Learning
                                  Materials For WBE Using Intelligent
                                  Components And Agents  . . . . . . . . . 170--178
                 D. Dicheva and   
                   L. Aroyo and   
                     A. Cristea   Cooperative Courseware-Authoring Support 179--187
                   V. Uskov and   
                      M. Uskova   Reusable Learning And Information Atoms
                                  Approach To Web-Based Education  . . . . 188--197
                   J. Vargo and   
               J. C. Nesbit and   
                  K. Belfer and   
                 A. Archambault   Learning Object Evaluation:
                                  Computer-Mediated Collaboration And
                                  Inter-Rater Reliability  . . . . . . . . 198--205
                F. Tajariol and   
                 J.-M. Adam and   
                      M. Dubois   A Study on The Effect of Communication
                                  And Monitoring Tools In Web-Based
                                  Tutoring . . . . . . . . . . . . . . . . 206--211
            R. M. de Moraes and   
                  L. S. Machado   Hidden Markov Models For Learning
                                  Evaluation In Virtual-Reality Simulators 212--215

International Journal of Computer Applications
Volume 25, Number 4, 2003

                      C. Li and   
                          L. Li   A Hybrid Agent Platform Composed of
                                  Cooperating Intelligent Agents And
                                  Mobile Agents  . . . . . . . . . . . . . 217--224
               G. Sivaradje and   
                  P. Dananjayan   A Novel Dynamic Guard Channel Scheme For
                                  Channel Allocation In Cellular Mobile
                                  Networks . . . . . . . . . . . . . . . . 225--235
              A. Azadmanesh and   
                    L. Zhou and   
                        D. Peak   Egophobic Voting Algorithms  . . . . . . 236--246
                S. D. Bruda and   
                      S. G. Akl   Real-Time Computation: a Formal
                                  Definition And Its Applications  . . . . 247--257
               N. H. Salman and   
                      C.-Q. Liu   Image Segmentation And Edge Detection
                                  Based On Watershed Techniques  . . . . . 258--263
                S. Q. Zheng and   
                    M. Yang and   
                     F. Masetti   Constructing Schedulers For High-Speed,
                                  High-Capacity Switches/Routers . . . . . 264--271
            D. K. Lowenthal and   
                 R. Subramanian   Hyfi: Architecture-Independent
                                  Parallelism On Networks of
                                  Multiprocessors  . . . . . . . . . . . . 272--282


International Journal of Computer Applications
Volume 26, Number 1, 2004

                  C. I. Fan and   
                      C. L. Lei   Divisible Blind Signatures Based on Hash
                                  Chains . . . . . . . . . . . . . . . . . 1--9
                 C.-H. Yang and   
               L.-Y. Chuang and   
                 C.-H. Yang and   
                      C.-H. Luo   Internet Access for Disabled Persons
                                  Using Morse Code . . . . . . . . . . . . 10--16
                     A. P. Pons   An Object-Oriented Language for
                                  Real-Time Systems  . . . . . . . . . . . 1--7
            P. K. Panigrahi and   
                     A. Goswami   Algebra for Fuzzy Object Oriented
                                  Database Language  . . . . . . . . . . . 1--9
                   M. Azizi and   
                    X. Song and   
               E.-M. Aboulhamid   A Case Study On The Verification of
                                  Cache Coherence Protocols  . . . . . . . 1--10
                  C. M. Wee and   
                  M. S. Beg and   
                    B. Vaillant   Secure Setrequest and Getresponse for
                                  SNMP: APSSNMP  . . . . . . . . . . . . . 1--7
                  D. X. Liu and   
                      Y. C. Bai   Cross-Tree: a Data Structure for
                                  Analysis of Security Protocols . . . . . 1--7
                   T. Taibi and   
                   D. C. L. Ngo   Towards a Balanced Specification
                                  Language for Distributed Object
                                  Computing Patterns . . . . . . . . . . . 1--8
               G. Radhamani and   
                  M. U. Siddiqi   A WAP-Enabled Transaction Model for
                                  Mobile Multidatabases  . . . . . . . . . 1--6

International Journal of Computer Applications
Volume 26, Number 2, 2004

                  S. C. Hui and   
             M. K. H. Leung and   
                        F. Wang   Eleview: Remote Intelligent Elevator
                                  Monitoring System  . . . . . . . . . . . 1--8
                 G. K. Adam and   
                   V. G. Pappas   Geographical Image Processing Using
                                  GisTool  . . . . . . . . . . . . . . . . 1--6
                 C.-Y. Chen and   
                    J. Tang and   
                  D.-L. Lee and   
                       J.-F. Tu   Exploiting Instruct Recognized Scheme to
                                  Improve Processor Performance  . . . . . 1--9
                   C. W. Cheong   Web Server Workload Prediction: Fuzzy
                                  Markovian Approach . . . . . . . . . . . 1--6
                   S. H. Oh and   
                      W. S. Lee   Deductive Query Processing with an
                                  Object-Oriented Semantic Network in a
                                  Massively Parallel Environment . . . . . 1--11
               G. Montejano and   
                  D. Riesco and   
                        R. Uzal   Software Configuration Management in a
                                  Parallel Development Environment . . . . 1--10
                  G. Kaefer and   
                    J. Haid and   
                    K. Voit and   
                       R. Weiss   Architectural Software Power Estimation
                                  Support for Power Aware Remote
                                  Processing . . . . . . . . . . . . . . . 1--6
                 A. Salhieh and   
                  L. Schwiebert   Power-Aware Metrics for Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1--7

International Journal of Computer Applications
Volume 26, Number 3, 2004

                      B. Li and   
                     W. Yao and   
                         J. You   An Effort to Formal Model of Trust
                                  Management in Grids  . . . . . . . . . . 1--6
                 J. T. Hung and   
               T. G. Robertazzi   Scalable Scheduling for Clusters and
                                  Grids Using Cut Through Switching  . . . 1--10
                    B. Hong and   
                 V. K. Prasanna   Simulation of Adaptive Applications in
                                  Heterogeneous Computing Environments . . 1--8
                 K.-L. Park and   
                  H.-J. Lee and   
                 O.-Y. Kwon and   
                 S.-Y. Park and   
                 H.-W. Park and   
                      S.-D. Kim   Design and Implementation of a Dynamic
                                  Communication MPI Library for the Grid   1--8
                    F. Zara and   
                   F. Faure and   
                  J.-M. Vincent   Parallel Simulation of Large Dynamic
                                  System on a PC Cluster: Application to
                                  Cloth Simulation . . . . . . . . . . . . 1--8
                 C. H. Ding and   
                       R. Buyya   Guided Google: a Meta Search Engine and
                                  its Implementation Using the Google
                                  Distributed Web Services . . . . . . . . 1--7

International Journal of Computer Applications
Volume 26, Number 4, 2004

                  C. K. Yeo and   
                  S. C. Hui and   
                      B. S. Lee   Java-Based, WAP-Enabled Unified
                                  Messaging System . . . . . . . . . . . . 1--8
              D. Desrochers and   
                     Y. Jin and   
                      Z. Qu and   
                A. Saengdeejing   Algorithms to Generate Partially Damaged
                                  characters and Readability Study for OCR
                                  Readers in Semiconductor Manufacturing   1--6
                         A. Loo   Sensitivity Analysis of Database
                                  Operations: a Case Study of Parallel
                                  Partition/Sorting Algorithm  . . . . . . 1--8
                 C.-H. Lien and   
                      Y.-W. Bai   Energy Efficiency and Performance of a
                                  Controlled Model for Scalable Computing
                                  Systems  . . . . . . . . . . . . . . . . 1--9
              F. S. Al-Anzi and   
                  A. Allahverdi   A Hybrid Simulated Annealing Heuristic
                                  for Multimedia Object Requests
                                  Scheduling Problem . . . . . . . . . . . 1--6
                 H. Aljifri and   
                     A. P. Pons   Reducing Overhead of Secure E-Commerce
                                  Transactions . . . . . . . . . . . . . . 1--6
                 M. A. Radaideh   A Distributed and Parallel Model for
                                  High-Performance Indexing of Database
                                  Content  . . . . . . . . . . . . . . . . 1--6
        E. M. Garzón and   
               I. García   Solving Eigenproblems on Multicomputers:
                                  Two Different Approaches . . . . . . . . 1--10
                   M. Daoui and   
                   M. Lalam and   
                  B. Djamah and   
                      A. Bilami   Hardware Cache Coherence Protocol  . . . 1--13


International Journal of Computer Applications
Volume 27, Number 1, 2005

                      Anonymous   Editors' Note  . . . . . . . . . . . . . ??
               A. K. Sharma and   
                        A. Goel   Moment-to-Moment Node Transition
                                  Awareness Protocol (MOMENTAP)  . . . . . 1--9
                    B. Zhen and   
               M. Kobayashi and   
                     M. Shimizu   The Reading of Transmission-Only Active
                                  RFID Tags  . . . . . . . . . . . . . . . 10--19
                 D. Deville and   
                 Y. Hodique and   
                 I. Simplot-Ryl   Safe Collaboration in Extensible
                                  Operating Systems: A Study on Real-Time
                                  Extensions . . . . . . . . . . . . . . . 20--26
                  G. Thomas and   
                    F. Ogel and   
                 A. Galland and   
                 B. Folliot and   
                    I. Piumarta   Building a Flexible Java Runtime Upon a
                                  Flexible Compiler  . . . . . . . . . . . 27--34
        A. L. M. dos Santos and   
               M. E. Torrey and   
                  A. El Sheshai   Supporting National Public Key
                                  Infrastructures Using Smart Cards  . . . 35--40

International Journal of Computer Applications
Volume 27, Number 2, 2005

                M. A. Hamza and   
                 I. F. Awad and   
                  G. M. B. Awad   Enhancing Mobile Agent Communication
                                  Performance  . . . . . . . . . . . . . . 45--50
                   D. Grosu and   
              H. Gâlmeanu   MPEG-2 Motion Estimation Using a PC
                                  Cluster  . . . . . . . . . . . . . . . . 51--56
                  R. Santos and   
                  J. Santos and   
                      J. Orozco   Hard Real-Time Systems with Stochastic
                                  Execution Times: Deterministic and
                                  Probabilistic Guarantees . . . . . . . . 57--62
                   T. Horie and   
                K. Yamasaki and   
                   T. Tsuji and   
                  T. Hochin and   
                     K. Higuchi   A Distributed Object-Oriented
                                  Programming System with Dynamic
                                  Reconfiguration Capability . . . . . . . 63--71
           T. A. El-Ghazawi and   
                   J. Le Moigne   Performance of the Wavelet Decomposition
                                  on Massively Parallel Architectures  . . 72--81
                 P. A. Laplante   Criteria and an Objective Approach to
                                  Selecting Commercial Real-Time Operating
                                  Systems Based on Published Information   82--96
                  B. Veeravalli   Design and Performance Analysis of
                                  Heuristic Load-Balancing Strategies for
                                  Processing Divisible Loads on Ethernet
                                  Clusters . . . . . . . . . . . . . . . . 97--107
                    G. Dini and   
                G. Lettieri and   
                    L. Lopriore   Design Framework for a Distributed,
                                  Single-Address-Space System  . . . . . . 108--118

International Journal of Computer Applications
Volume 27, Number 3, 2005

                J. M. Liang and   
                J. Q. Liang and   
                      Q. L. Ren   A Framework for Generic Object
                                  Recognition with Bayesian Networks . . . 123--138
                     A. P. Pons   Enhancement of Web Object Speculative
                                  Retrieval  . . . . . . . . . . . . . . . 139--146
                     C. Popescu   A Secure Key Agreement Protocol Using
                                  Elliptic Curves  . . . . . . . . . . . . 147--152
                 J. O. Dada and   
                    H.-D. Kochs   XML-Based Open Electricity Market
                                  Information Exchange Network Using
                                  Object-Oriented Methods  . . . . . . . . 153--160
                    T. Sari and   
                     M. Sellami   Cursive Arabic Script Segmentation and
                                  Recognition System . . . . . . . . . . . 161--168
                 T.-P. Hong and   
                   T.-N. Chuang   Fuzzy Gupta Scheduling for Flow Shops
                                  with More than two Machines  . . . . . . 169--177
               R. A. Haraty and   
              H. M. El-Zabadani   Abjad Hawwaz: An Offline Arabic
                                  Handwriting Recognition System . . . . . 178--189
               S. Chalasani and   
                  R. V. Boppana   Software Architectures for E-Commerce
                                  Computing Systems with External Hosting  190--198
                 G. Edwards and   
                       R. Jayne   Location Tracking Using Differential
                                  Range Measurements . . . . . . . . . . . 199--205

International Journal of Computer Applications
Volume 27, Number 4, 2005

              A. C. M. Fong and   
                      S. C. Hui   A Web-Based System for B2B E-Commerce    209--217
                  M. Younis and   
                   S. Ponnusamy   Efficient and Predictable Approach for
                                  Supporting Spatial Partitioning of
                                  Real-Time Applications . . . . . . . . . 218--227
             R. A. Shatnawi and   
              L. H. Etzkorn and   
              W. E. Hughes, Jr.   Comparing Object-Oriented Languages
                                  Using Design Patterns  . . . . . . . . . 228--236
                    Z. Wang and   
                       J. Zhang   Routing with Virtual Transmission Range
                                  in Mobile AD HOC Networks  . . . . . . . 237--243
                 J. Al-Sadi and   
                    A. M. Awwad   A New Fault-Tolerant Routing Algorithm
                                  for OTIS-Cube Using Unsafety Vectors . . 244--251
                      D. Magoni   Network Topology Analysis and Internet
                                  Modelling with \em NEM . . . . . . . . . 252--259
                  M. M. El-Awad   A Vectorized Conjugate-Gradient Solver
                                  for Sparse Systems of Algebraic
                                  Equations  . . . . . . . . . . . . . . . 260--265
                   S.-Y. Wu and   
                  S.-J. Leu and   
                    R.-S. Chang   An Agent-Based Architecture for Resource
                                  Reservation in Mobile IP Networks  . . . 266--273
                   M. Al-Rousan   Webchair: a Web-Based Wireless
                                  Navigation Wheelchair System for People
                                  with Motor Disabilities  . . . . . . . . 274--284


International Journal of Computer Applications
Volume 28, Number 1, 2006

               C. Koutsikas and   
                    N. Malevris   A New Script Language Applicable To
                                  Symbolic Execution Systems . . . . . . . 1--11
                 J. Aguilar and   
                    E. L. Leiss   A Coherence-Replacement Protocol For Web
                                  Proxy Cache Systems  . . . . . . . . . . 12--18
                       W. Haque   Concurrent Deadlock Detection In
                                  Parallel Programs  . . . . . . . . . . . 19--25
                  W. J. Lin and   
                  B. Veeravalli   A Dynamic Object Allocation And
                                  Replication Algorithm For Distributed
                                  Systems With Centralized Control . . . . 26--34
                 T. Fergany and   
                   Sarhan Amany   Efficient Allocation of Distributed
                                  Object-Oriented Tasks To a Pre-Defined
                                  Scheduled System . . . . . . . . . . . . 35--42
                       S Juhasz   Modelling Asynchronous Message Passing
                                  In Small Cluster Environments  . . . . . 43--49
               D. K. Sharma and   
               R. K. Sharma and   
                       D. Ghosh   A Spatial Decision Support System For
                                  Land Management  . . . . . . . . . . . . 50--58
                     R. Beghdad   A Flows-Based QoS Routing Protocol For
                                  Multicast Communication Networks . . . . 59--64
                 Y. M. Asem and   
                        A. Kara   A Computationally Efficient Key-Hiding
                                  Based Group Re-Keying Scheme For Secure
                                  Multicasting . . . . . . . . . . . . . . 65--73
                M. Radaideh and   
                  S. Horani and   
                      M. Raseen   WBSGA: a Web-Based Tool For Course
                                  Timetabling And Scheduling . . . . . . . 74--83

International Journal of Computer Applications
Volume 28, Number 2, 2006

                  W. H. Hsu and   
                    J. Chen and   
                 S.-T. Sheu and   
                     C.-F. Chao   SBMT--Steiner Backup Multicast Tree  . . 87--98
                       G. Licea   Supporting Reusability in Fixed And
                                  Mobile Groupware Applications  . . . . . 99--111
              H. Arafat Ali and   
                 M. F. Ared and   
               A. I. El-Desouky   An IP Packet Forwarding Technique Based
                                  on a New Structure of Lookup Table . . . 112--121
                   X. Zhang and   
                 X. L. Xiao and   
                 J. W. Tian and   
                     J. Liu and   
                       G. Y. Xu   Application of Support Vector Machines
                                  in Classification of Magnetic Resonance
                                  Images . . . . . . . . . . . . . . . . . 122--128
                    A. Amin and   
                  N. Al-Darwish   Structural Description to Recognizing
                                  Hand-Printed Arabic Characters Using
                                  Decision Tree Learning Techniques  . . . 129--134
                  K. Y. Lam and   
                    E. Chan and   
                    D. Hung and   
                 K. Ramamritham   Processing of Location-Dependent
                                  Continuous Queries on Real-Time Spatial
                                  Data: the View From Retina . . . . . . . 135--143
               D. J. Russomanno   Prolog Query Interface: a
                                  Set-Of-Mappings Approach With Optional
                                  Segmentation . . . . . . . . . . . . . . 144--153
                     B. Fox and   
             L. S. Jennings and   
                   A. Y. Zomaya   On the Modelling and Computation of
                                  Nonlinear Multibody Cable Systems  . . . 154--161
                   K. Salah and   
                   K. El-Badawi   On Modelling and Analysis of Receive
                                  Livelock and CPU Utilization in
                                  High-Speed Networks  . . . . . . . . . . 162--169
           H. Hussein Karam and   
            F. F. M. Ghaleb and   
             Y. M. Abd El-Latif   Towards Fast and Smooth Subdivision
                                  Surface Reconstruction . . . . . . . . . 170--176

International Journal of Computer Applications
Volume 28, Number 3, 2006

                 V. Kannoth and   
                 B. Suk Lee and   
                       J. Buzas   Statistical Cost-Modelling of Financial
                                  Time Series Functions  . . . . . . . . . 181--188
               S. Faizullah and   
                      I. Marsic   Measuring and Pricing QoS  . . . . . . . 189--209
                   A. Singh and   
      A. L. Mora dos Santos and   
               O. Nordstrom and   
                          C. Lu   Stateless Model For The Prevention of
                                  Malicious Communication Channels . . . . 285--297
                     X. Zhu and   
                    J. Liao and   
                        J. Chen   Improved Protocol Conversion Methodology
                                  And Its Application  . . . . . . . . . . 210--221
               G. K. Winley and   
                   J. P.-O. Fan   Admissible Heuristic Functions For
                                  Flow-Shop Problems . . . . . . . . . . . 222--226
                Y. Kanamori and   
                  S.-M. Yoo and   
                  W. D. Pan and   
                  F. T. Sheldon   A Short Survey On Quantum Computers  . . 227--233
                  A. Bilami and   
                   M. Lalam and   
                   M. Daoui and   
                      B. Djamah   A Cell Selection Policy For An
                                  Input-Buffered Packet Switch . . . . . . 234--242
               M. H. Mickle and   
                      M. Mi and   
                 J. T. Cain and   
                       T. Minor   A Circuit Model For Passive RF
                                  Autonomous Devices With Protocol
                                  Considerations . . . . . . . . . . . . . 243--250
                     D. Roy and   
              A. Chatterjee and   
                N. Jasapara and   
                      N. Jadhav   A New Transport Layer Protocol Offering
                                  Variable Reliability In Bidirectional
                                  Communication: Application For Robotic
                                  Systems  . . . . . . . . . . . . . . . . 251--258
                   B.-F. Wu and   
                 Y.-L. Chen and   
                     C.-C. Chiu   Efficient Implementation of Several
                                  Multilevel Thresholding Algorithms Using
                                  a Combinatorial Scheme . . . . . . . . . 259--269
                 M. Crocker and   
                J. Baranski and   
                  G. Y. Lazarou   Fault-Tolerant Reconfigurable
                                  Ethernet-Based IP Network Proxy  . . . . 270--277
                 M. Youssef and   
                    A. Agrawala   Location-Clustering Techniques For WLAN
                                  Location Determination Systems . . . . . 278--284

International Journal of Computer Applications
Volume 28, Number 4, 2006

       D. Prakash Vidyarthi and   
          A. Kumar Tripathi and   
                B. Kumer Sarker   Cluster-Based Load Partitioning and
                                  Allocation In Distributed Computing
                                  Systems  . . . . . . . . . . . . . . . . 301--307
                     C. S. Wang   An Efficient Content-Based Retrieval
                                  System For $3$D Objects  . . . . . . . . 308--313
                      J. Ge and   
                          R. He   Buffer Efficiency In Wormhole Routers    314--320
                 A. Amoroso and   
                    G. Casciola   Fast Bivariate Function Rendering For
                                  Small Devices  . . . . . . . . . . . . . 321--328
               J.-C. Chuang and   
                    C.-C. Chang   Using a Simple and Fast Image
                                  Compression Algorithm To Hide Secret
                                  Information  . . . . . . . . . . . . . . 329--333
         M. V. N. K. Prasad and   
                   K. K. Shukla   Parallel Implementation of Domain
                                  Decomposition Based Image Compression
                                  Algorithm  . . . . . . . . . . . . . . . 334--341
               R. F. DeMara and   
                   Y. Tseng and   
                   K. Drake and   
                     A. Ejnioui   Capability Classes of Multiprocessor
                                  Synchronization Techniques . . . . . . . 342--349
                      H. Yu and   
                    L. Wang and   
                   J. Zhang and   
               J. Barksdale and   
                        X. Yuan   Developing a Secure Geospatial
                                  Visualization and Collaboration System
                                  Using Software Engineering Technology    350--358
                    C. Yuan and   
                    C. Tang and   
                     Y. Wen and   
                     J. Zuo and   
                    J. Peng and   
                          J. Hu   Convergency of Genetic Regression In
                                  Data Mining Based On Gene Expression
                                  Programming and Optimized Solution . . . 359--366
                    M. Yang and   
                    J. Wang and   
                S. Q. Zheng and   
                       Y. Jiang   Code Optimization of Polynomial
                                  Approximation Functions on Clustered
                                  Instruction-Level Parallelism Processors 367--378
            S. Sharafeddine and   
                       A. Riedl   Dimensioning Token Bucket Policers For
                                  Various Voiceover IP Applications Using
                                  Real-Scenario Measurements . . . . . . . 379--387
                   A. R. Al-Ali   Wireless Distributed Energy Billing
                                  System . . . . . . . . . . . . . . . . . 388--393


International Journal of Computer Applications
Volume 29, Number 1, 2007

                    Y. Park and   
                      B. S. Kim   Web Search Using Dynamic Keyword
                                  Suggestion . . . . . . . . . . . . . . . 1--9
                L. Kuzniarz and   
                      M. Staron   Two Techniques for UML Model
                                  Transformations  . . . . . . . . . . . . 10--17
                    S. Lian and   
                     Z. Liu and   
                     Z. Ren and   
                        Z. Wang   Multimedia Data Encryption in
                                  Block-Based Codecs . . . . . . . . . . . 18--24
                   H. M. Ammari   Discovery and Selection Protocols for
                                  Multi-Hop Wireless Internet Access . . . 25--32
                S. Ferretti and   
                M. Roccetti and   
                  C. E. Palazzi   An Optimistic Obsolescence-Based
                                  Approach to Event Synchronization for
                                  Massively Multiplayer Online Games . . . 33--43
                  R. Steele and   
                 W. Gardner and   
                   T. S. Dillon   XML Repository Searcher-Browser
                                  Supporting Fine-Grained Access Control   44--50
             E. El-Qawasmeh and   
                 M. Strauss and   
                    M. Mack and   
                   S. Berkovich   Increasing the Efficiency of
                                  Bit-Counting . . . . . . . . . . . . . . 51--58
                 B. Roussev and   
                          J. Wu   Transforming Use Case Models to Class
                                  Models and OCL-Specifications  . . . . . 59--69
                  D. Sarkar and   
               U. K. Sarkar and   
                        G. Peng   Bandwidth Requirement of Links in a
                                  Hierarchical Caching Network: a
                                  Graph-Based Formulation, An Algorithm
                                  and Its Performance Evaluation . . . . . 70--78
                  Y. W. Bai and   
                       Y. C. Wu   Web Delay Analysis and Reduction By
                                  Using Load Balancing of a DNS-Based Web
                                  Server Cluster . . . . . . . . . . . . . 79--88
                D. N. B. Ta and   
                        S. Zhou   Client Assignment Problem in Distributed
                                  Virtual Environments . . . . . . . . . . 89--95
             T. Klostermann and   
                  E. O. K. Zhan   Control Based Optimization of
                                  Collaborative Technical Customer Service 96--102

International Journal of Computer Applications
Volume 29, Number 2, 2007

                D. Williams and   
                    H. Lutfiyya   Fault-Tolerant Authentication Services   107--114
                 H. Rahaman and   
                  D. K. Das and   
             B. B. Bhattacharya   Testable Design of Digital Summation
                                  Threshold Logic Array for Synthesis of
                                  Symmetric Functions  . . . . . . . . . . 115--123
                      W.-P. Lee   Personalizing Internet Information
                                  Services: Passive Filtering and Active
                                  Retrieval  . . . . . . . . . . . . . . . 124--131
            H. M. Harmanani and   
                 A. M. K. Hajar   Concurrent BIST Synthesis and Test
                                  Scheduling Using Genetic Algorithms  . . 132--142
             S. A. Selouani and   
           D. O'Shaughnessy and   
                      J. Caelen   Incorporating Phonetic Knowledge Into an
                                  Evolutionary Subspace Approach for
                                  Robust Speech Recognition  . . . . . . . 143--154
                     J. Sum and   
                      J. Wu and   
                    C.-S. Leung   On Profit Density Based Greedy Algorithm
                                  for a Resource Allocation Problem in Web
                                  Services . . . . . . . . . . . . . . . . 155--163
                   Y. G. Li and   
                W. D. Zhang and   
                     G. L. Wang   Prune Support Vector Machines by an
                                  Iterative Process  . . . . . . . . . . . 164--169
           J. L. Kennington and   
              V. S. S. Nair and   
                     G. Spiride   A Decomposition Approach for Spare
                                  Capacity Assignment for Path Restorable
                                  Mesh Networks  . . . . . . . . . . . . . 170--179
               R. A. Namneh and   
                  W. D. Pan and   
                      S.-M. Yoo   Parallel Implementations of $1$-D Fast
                                  Fourier Transform Without Interprocessor
                                  Communication  . . . . . . . . . . . . . 180--186
                 A. V. Babu and   
                       L. Jacob   Service Differentiation Schemes in IEEE
                                  802.11 Wireless LANs with Variable Frame
                                  Size . . . . . . . . . . . . . . . . . . 187--195
                      C. Hu and   
                    J. Wang and   
                          J. Li   Language Support for Multi-Paradigm and
                                  Multi-Grain Parallelism on SMP-Cluster   196--203
                      M. Furini   MCDL: a Reduced But Extensible
                                  Multimedia Contents Description Language 204--210

International Journal of Computer Applications
Volume 29, Number 3, 2007

                   M. Zhang and   
                      S. Xu and   
                     J. Fulcher   Anser: Adaptive Neuron Artificial Neural
                                  Network System for Estimating Rainfall   215--222
                  L. Linsen and   
                  B. Hamann and   
                      K. I. Joy   Wavelets for Adaptively Refined $ \sqrt
                                  [3]{2}$-Subdivision Meshes . . . . . . . 223--231
                  A. Mittal and   
                   L.-F. Cheong   Detecting Establishment Shots Using
                                  Camera Motion  . . . . . . . . . . . . . 232--238
                     S.-N. Chen   A New Trace-Driven Shared-Memory
                                  Multiprocessors Machine Simulator  . . . 239--244
                 L. Chunlin and   
                      L. Layuan   A Multi-QoS Guaranteed Dynamic Grid
                                  Resource Scheduling Algorithm  . . . . . 245--252
                 F. W. Yang and   
                  H. J. Lin and   
                      S. H. Yen   An Improved Unsupervised Clustering
                                  Algorithm Based on Population Markov
                                  Chain  . . . . . . . . . . . . . . . . . 253--258
                  H. A. Ali and   
           A. I. El-Desouky and   
                    A. I. Saleh   A Novel Strategy for a Vertical Web Page
                                  Classifier Based on Continuous Learning
                                  Na\"\ive Bayes Algorithm . . . . . . . . 259--277
                      F. Li and   
                     X. Xin and   
                          Y. Hu   A Pairing-Based Signcryption Scheme
                                  Using Self-Certified Public Keys . . . . 278--282
                        Q. Duan   Resource Allocation for Quality of
                                  Service Provision in Buffered Crossbar
                                  Switches With Traffic Aggregation  . . . 283--290
                     Y. Tsujita   Remote MPI-I/O on a Parallel Virtual
                                  File System Using a Circular Buffer for
                                  High Throughput  . . . . . . . . . . . . 291--299
                J.-H. Huang and   
                      S. Mishra   Mykil: a Secure and Highly Available Key
                                  Management System For large Group
                                  Multicast  . . . . . . . . . . . . . . . 300--308
             S. B. Mohammad and   
               M. O. Khaoua and   
            L. M. Mackenzie and   
                     I. Ababneh   Processor Allocation and Job Scheduling
                                  on $3$D Mesh Interconnection Networks    309--317

International Journal of Computer Applications
Volume 29, Number 4, 2007

                  G. H. Liu and   
                       S. Zhang   Development of a New Virtual Reality
                                  System . . . . . . . . . . . . . . . . . 321--326
                S. D. Bruda and   
                      S. G. Akl   Size Matters: Logarithmic Space is Real
                                  Time . . . . . . . . . . . . . . . . . . 327--336
                  C.-Y. Lee and   
                    C. W. Chiou   Low-Complexity Bit-Parallel Multipliers
                                  for a Class of $ {\rm GF}(2^m) $ Based
                                  on Modified Booth's Algorithm  . . . . . 337--345
                   A. Kurkovsky   Hierarchy of Formal Descriptions for
                                  Architectural Analysis and Design of
                                  Complex CS . . . . . . . . . . . . . . . 346--352
           V. A. Chouliaras and   
               T. R. Jacobs and   
J. L. Núñez-Yanez and   
            K. Manolopoulos and   
                   K. Nakos and   
                      D. Reisis   Thread-Parallel MPEG-2 and MPEG-4
                                  Encoders for Shared-Memory
                                  System-On-Chip Multiprocessors . . . . . 353--361
                   Z. Zheng and   
                  T. K. Y. Chan   A Client--Server Based View-Dependent
                                  Multiresolution Mesh Hierarchy . . . . . 362--371
                 Y.-H. Wang and   
                 C.-H. Tsai and   
                  H.-Z. Lin and   
                     C.-A. Wang   Interference-Aware QoS Multipath Routing
                                  for \em Ad Hoc Wireless Networks . . . . 372--378
                    Q. Wang and   
                 J. Vincent and   
                        G. King   Prediction Based Link State Update . . . 379--393
                I. Sygkouna and   
              M. Anagnostou and   
                       E. Sykas   Searching for Information in a P2P
                                  System . . . . . . . . . . . . . . . . . 394--401
                 A. H. Kattoush   An $N$-Dimensional Recurrent Noisy Phase
                                  Unwrapping Algorithm . . . . . . . . . . 402--407
                      Y. Li and   
                         Z. Lan   Current Research and Practice in
                                  Proactive Fault Management . . . . . . . 408--413
                D. T. Ahmed and   
      N. M. M. K. Chowdhury and   
                    M. M. Akbar   Admission Control Algorithm for
                                  Multimedia Server: A Hybrid Approach . . 414--419


International Journal of Computer Applications
Volume 30, Number 1, 2008

                    L. Wang and   
                    S. Piao and   
                   Y. Jiang and   
                       L. Zhang   On a Web-Graph-Based Micronetwork
                                  Architecture for SoCs  . . . . . . . . . 1--8
                    Y. Jiao and   
                    Y. Yang and   
                    M. Yang and   
                       Y. Jiang   A Multi-Path Routing Scheme for
                                  Torus-Based NOCs . . . . . . . . . . . . 9--16
                 R. K. Jena and   
                   G. K. Sharma   Application Mapping of Mesh Based-NoC
                                  Using Multi-Objective Genetic Algorithm  17--22
                   L. Zhang and   
                   Y. Jiang and   
                E. E. Regentova   Fault Tolerance Routing for Wavelength
                                  Routed Optical Networks in ONoC  . . . . 23--35
                    Y. Dong and   
                     Y. Dou and   
                         M. Liu   A Design Space Exploration Algorithm In
                                  Compiling Window Operation onto
                                  Reconfigurable Hardware  . . . . . . . . 36--43
                      E. Lu and   
                    M. Yang and   
                    B. Yang and   
                    X. Feng and   
                    S. Q. Zheng   A Novel Design of Self-Routing Strictly
                                  Nonblocking Switching Networks . . . . . 44--50
             Hazem M. Bahig and   
                 Hatem M. Bahig   Merging on PRAM  . . . . . . . . . . . . 51--55
                    Y. Yang and   
                    X. Yang and   
                        C. Zhou   Lmcgrid: a Low Management Cost Grid
                                  Computation Model  . . . . . . . . . . . 56--61
                    M. Yang and   
                        L. Wang   Preface: Special Issue on
                                  High-Performance Computing Architectures 62--63

International Journal of Computer Applications
Volume 30, Number 2, 2008

                J. A. Zhang and   
                S. F. Jones and   
                    A. S. Helal   Mobile Network Adaptation in the Ubidata
                                  Mobile File System . . . . . . . . . . . 65--72
                 K. Papazis and   
          N. K. Chilamkurti and   
                         B. Soh   A New Adaptive Layered Multicast
                                  Protocol . . . . . . . . . . . . . . . . 73--79
                R. P. Gupta and   
           S. C. Srivastava and   
                    R. K. Varma   Remote Terminal Units for Distribution
                                  Automation: Development and
                                  Commissioning Experience . . . . . . . . 80--91
                      M. Li and   
                 C.-S. Liao and   
                    J.-K. Hwang   Rapid Calculation of Time Deviation and
                                  Modified Allan Deviation for
                                  Characterizing Telecommunications Clock
                                  Stability  . . . . . . . . . . . . . . . 92--96
                  J.-Z. Sun and   
                  J. Riekki and   
                   M. Jurmu and   
                     J. Sauvola   Java-Based HTTP Input Channel for
                                  Heterogeneous Wireless Networks  . . . . 97--104
                M. Selvaraj and   
              G. Y. Lazarou and   
                          R. Hu   Simultaneous and Proportional Bandwidth,
                                  Delay, and Loss Differentiation  . . . . 105--116
                 S. P. Zhou and   
                 S.-P. Ting and   
                 Z. Q. Shen and   
                      L. B. Luo   Twilight City --- a Virtual Environment
                                  for MOUT . . . . . . . . . . . . . . . . 117--123
                  A. A. Raj and   
                    M. Suganthi   Hardware Implementation of an Efficient
                                  Internet Protocol Routing Filter Design  124--128
                      F. Li and   
                     X. Xin and   
                          Y. Hu   Efficient Certificate-Based Signcryption
                                  Scheme from Bilinear Pairings  . . . . . 129--133
                 V. S. Vyas and   
                     P. P. Rege   Real Coded Genetic Algorithm for Optimal
                                  Parameters Selection in Circular Mellin
                                  Feature Extractors . . . . . . . . . . . 134--141
                    C. Hota and   
                     S. Jha and   
                   G. Raghurama   Adaptive Bandwidth Management and QoS
                                  Provisioning in IPVPNs . . . . . . . . . 142--150
                R. Benlamri and   
                  H. Barada and   
                 A. Al-Raqabani   Analysis of Coordinated Load Sharing for
                                  Large Distributed Systems  . . . . . . . 151--162

International Journal of Computer Applications
Volume 30, Number 3, 2008

                M. A. Otair and   
                  W. A. Salameh   Efficient Training of Neural Networks
                                  Using Optical Backpropagation with
                                  Momentum Factor  . . . . . . . . . . . . 167--172
                M. Ishihara and   
                  M. Tanaka and   
                    K. Kuriyama   A Cubic Systolic Array and its
                                  Properties . . . . . . . . . . . . . . . 173--182
                    J. Peng and   
                 C.-J. Tang and   
                      C. Li and   
                       J.-J. Hu   A New Evolutionary Algorithm Based on
                                  Chromosome Hierarchy Network . . . . . . 183--191
                J.-Y. Zheng and   
                        X. Wang   Streaming Route Panorama for Seamless
                                  City Guidance  . . . . . . . . . . . . . 192--200
                  W. J. Liu and   
                    J. Gong and   
                        W. Ding   Using Heavy-Tailed Feature to Estimate
                                  Flow Length Distributions  . . . . . . . 201--206
                   Y. C. Eu and   
                  S. Khatun and   
                  B. M. Ali and   
                      M. Othman   Multicast, Hierarchical and Fast
                                  Handover in Mobile IPv6 Wireless
                                  Network: a Test-Bed Experience . . . . . 207--212
                     W. Liu and   
                     L. Gao and   
                    Y. Ding and   
                      J. Xu and   
                          Y. Ji   PC-based CAN-Bus Experimental Platform
                                  for Autonomous Underwater Vehicles . . . 213--219
         S. K. Abd-El-Hafiz and   
               D. M. Shawky and   
                A. L. El-Sedeek   Recovery of Object-Oriented Design
                                  Patterns Using Static and Dynamic  . . . 220--233
                Z. Trabelsi and   
                      K. Shuaib   A Novel Man-in-the-Middle Intrusion
                                  Detection Scheme for Switched Lans . . . 234--243
            O. M. Al-Jarrah and   
                  B. H. Sababha   Parma: a Power Aware Reliable
                                  Multicasting Algorithm for Mobile Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 244--250
                T. Brothers and   
               N. Mandagere and   
         S. Muknahallipatna and   
               J. C. Hamann and   
                     H. Johnson   Microsoft Exchange Implementation on a
                                  Distributed Storage Area Network . . . . 251--264
                        H. Sato   Construction of Object Migration
                                  Behaviour Models from Temporal
                                  Constraints  . . . . . . . . . . . . . . 265--275

International Journal of Computer Applications
Volume 30, Number 4, 2008

                     J. Sum and   
                      J. Wu and   
                C. S. Leung and   
                    K. I. J. Ho   Analysis on a Simulated Model for
                                  Gnutella Topology: Connectedness and
                                  Extension  . . . . . . . . . . . . . . . 279--288
               B. Thiongane and   
                   D. L. Truong   Shared Path Protection for Bandwidth
                                  Guaranteed Connections in Multi-Domain
                                  Networks . . . . . . . . . . . . . . . . 289--297
                M. Z. Zhang and   
                  H. T. Ngo and   
           A. R. Livingston and   
                    V. K. Asari   A High Performance Architecture for
                                  Implementation of $2$-D Convolution with
                                  Quadrant Symmetric Kernels . . . . . . . 298--308
                       Z. D. Wu   Modelling for a Federated Peer-to-Peer
                                  MMOG Architecture  . . . . . . . . . . . 309--318
                    H. Y. Chien   Efficient and Practical Approach to
                                  Authenticating Public Terminals  . . . . 319--324
                  G. Garani and   
                     G. K. Adam   Qualitative Modelling at the Design of
                                  Concrete Manufacturing Machinery . . . . 325--330
                     X. Zou and   
                         L. Bai   A New Class of Key Management Scheme for
                                  Access Control in Dynamic Hierarchies    331--337
        S. M. Mansoor Roomi and   
              V. Abhaikumar and   
                  S. Baskar and   
                   N. S. Balaji   A No-Reference Edge Preserving Genetic
                                  Weight Adaptation Filter for Impulse
                                  Noise Removal  . . . . . . . . . . . . . 338--344
                      F. Li and   
                      C. Xu and   
                        S. Zhou   Improvement of a proactive Threshold
                                  Signcryption Scheme  . . . . . . . . . . 345--347
                N. Parimala and   
                 S. R. N. Reddy   Processor Selection for Embedded System
                                  Design . . . . . . . . . . . . . . . . . 348--353


International Journal of Computer Applications
Volume 31, Number 1, 2009

                      N. Werghi   Robust $3$D Object Registration Based On
                                  Pairwise Matching of Geometric
                                  Distributions  . . . . . . . . . . . . . 1--8
                G. O. Abada and   
                  E. A. Onibere   The Effect of Rehearsed Computer Use on
                                  Icon Recognition . . . . . . . . . . . . 9--15
            Chin-Chen Chang and   
              Ching-Lin Kuo and   
                 Chang-Chu Chen   Three Improved Codebook Searching
                                  Algorithms for Image Compression Using
                                  Vector Quantizer . . . . . . . . . . . . 16--22
              A. Al-Naamany and   
                  H. Bourdoucen   Design and Simulation of a Fuzzy Logic
                                  Bandwidth Controller for Users
                                  Classification and Priorities
                                  Allocations  . . . . . . . . . . . . . . 23--29
                  N. Mittal and   
                 T. R. Belagodu   On Maximum Key Pool Size for a Key
                                  Pre-Distribution Scheme in Wireless
                                  Sensor Networks  . . . . . . . . . . . . 30--35
                   L. Jiang and   
                    D. Wang and   
                     Z. Cai and   
                   S. Jiang and   
                         X. Yan   Scaling Up the Accuracy of
                                  $K$-Nearest-Neighbour Classifiers: a
                                  Naive-Bayes Hybrid . . . . . . . . . . . 36--43
               M. Khemakhem and   
                    A. Belghith   A P2P Grid Architecture for Distributed
                                  Arabic OCR Based on the DTW Algorithm    44--49
           S. Krishnamurthy and   
                  N. Mittal and   
          R. Chandrasekaran and   
                  S. Venkatesan   Neighbour Discovery in Multi-Receiver
                                  Cognitive Radio Networks*  . . . . . . . 50--57
              M. R. M. Rizk and   
             M. I. Dessouky and   
             S. A. El-Dolil and   
                  M. Abd-Elnaby   Fairness and Throughput
                                  Enhancement-Based Random Access Using
                                  Fuzzy Controlled Backoff Interval  . . . 58--64

International Journal of Computer Applications
Volume 31, Number 2, 2009

               A. I. Al-Shoshan   Audio Signal Discrimination Using
                                  Evolutionary Spectrum  . . . . . . . . . 69--73
             A. Al-Badarneh and   
                       M. Tawil   Linear R-Tree Revisited  . . . . . . . . 74--83
                K. I.-J. Ho and   
                      J. Wu and   
                         J. Sum   On Unbounded Zero--One Knapsack With
                                  Discrete-Sized Objects . . . . . . . . . 84--89
                J. Monterde and   
                       H. Ugail   A Comparative Study Between Biharmonic
                                  Bézier Surfaces and Biharmonic Extremal
                                  Surfaces . . . . . . . . . . . . . . . . 90--96
           S. S. Beauchemin and   
             H. O. Hamshari and   
                    M. A. Bauer   Passive Atmospheric Diffusion With
                                  Gaussian Fragmentation . . . . . . . . . 97--108
                 M. Crocker and   
              G. Y. Lazarou and   
                    J. Baca and   
                      J. Picone   A Bandwidth Determination Method for
                                  IPv6-Based Networks  . . . . . . . . . . 109--118
               C. Pradabpet and   
               S. Yoshizawa and   
                Y. Miyanaga and   
                      K. Dejhan   New PAPR Reduction in OFDM Systems By
                                  Hybrid Algorithm of PTS and APPR Methods 119--127
                 M. Darehmiraki   A Parallel Algorithm for Solving Sat
                                  Problem Based on DNA Computing . . . . . 128--131
                      H. Xu and   
                    L. Xing and   
                    R. Robidoux   Drbd: Dynamic Reliability Block Diagrams
                                  for System Reliability Modelling . . . . 132--141

International Journal of Computer Applications
Volume 31, Number 3, 2009

                  F. Fasano and   
                     R. Oliveto   Supporting Project Management with
                                  Fine-Grained Artefact Managementin Adams 145--152
              S. Di Martino and   
                     C. Gravino   Estimating Web Application Development
                                  Effort Using COSMIC-FFP Method . . . . . 153--158
                I. D. Coman and   
                    A. Sillitti   Automated Segmentation of Development
                                  Sessions Into Task-Related Subsections   159--166
                  E. Aranha and   
                       P. Borba   Estimating Manual Test Execution Effort
                                  and Capacity Based On Execution Points   167--172
                V. Deufemia and   
                 C. Gravino and   
                        M. Risi   Automatically Generated Case
                                  Workbenches: A Preliminary Case Study    173--182
             M. Benerecetti and   
                   N. Cuomo and   
                       A. Peron   An Environment for the Specification And
                                  Verification of Time-Dependent Security
                                  Protocols  . . . . . . . . . . . . . . . 183--192
              C. Hardebolle and   
                   F. Boulanger   Multi-Formalism Modelling and Model
                                  Execution  . . . . . . . . . . . . . . . 193--203
               C. Vecchiola and   
                  A. Grosso and   
               A. Passadore and   
                  A. Boccalatte   Agentservice: a Framework for
                                  Distributed Multiagent System
                                  Development  . . . . . . . . . . . . . . 204--210
                A. De Lucia and   
                    F. Ferrucci   Preface: Special Issue On Software
                                  Engineering  . . . . . . . . . . . . . . 211--212

International Journal of Computer Applications
Volume 31, Number 4, 2009

                     M. Jou and   
                J.-K. Shiau and   
                    H.-W. Zhang   Application of Web Technologies in
                                  Automation Technology Education  . . . . 215--221
                   R. Gupta and   
                     A. Trivedi   A Comparative Study of Different
                                  Rayleigh Fading Channel Simulators . . . 222--229
               P. M. Khilar and   
                   S. Mahapatra   Time-Constrained Fault Tolerant
                                  X-By-Wire Systems  . . . . . . . . . . . 230--238
                 T. Marwala and   
                 M. Lagazio and   
                      T. Tettey   An Integrated Human--Computer System for
                                  Controlling Interstate Disputes  . . . . 239--246
                     C. Liu and   
                      E. Ye and   
               D. J. Richardson   Software Library Usage Pattern
                                  Extraction Using a software Model
                                  Checker  . . . . . . . . . . . . . . . . 247--259
               P. M. Khilar and   
                   S. Mahapatra   A Novel Hierarchical Clustering Approach
                                  for Diagnosing Large Scale Wireless
                                  Adhoc Systems  . . . . . . . . . . . . . 260--267
                A. Satheesh and   
             S. Krishnaveni and   
                 S. Ponkarthick   Self-Configurable Environment for the
                                  Intel Ixp2400 Network Processor  . . . . 268--273
                   S. Kumar and   
                   R. B. Mishra   Towards a framework for Classification
                                  and Recommendation of Semantic Web
                                  Service Composition Approaches . . . . . 274--281
                 E. M. Saad and   
             M. H. Awadalla and   
                  R. R. Darwish   Adaptive and Energy-Efficient Clustering
                                  Architecture for Dynamic Sensor Networks 282--289
                   H. Xiong and   
                      F. Li and   
                         Z. Qin   Provably Secure Identity Based Threshold
                                  Signature Without Random Oracles . . . . 290--295


International Journal of Computer Applications
Volume 32, Number 1, 2010

                 N. Alzeidi and   
               M. O. Khaoua and   
                    A. Khonsari   Performance Modelling of Torus
                                  Interconnection Networks with Deep
                                  Buffers  . . . . . . . . . . . . . . . . 1--8
                         L. Bai   A Reliable $ (K, N) $ Image Secret
                                  Sharing Scheme with Low Information
                                  Overhead . . . . . . . . . . . . . . . . 9--14
              A. H. Al-Badi and   
                 K. Ellithy and   
                    S. Al-Alawi   Prediction of Voltages on Mitigated
                                  Pipelines Paralleling Electric
                                  Transmission Lines Using ANN . . . . . . 15--22
             A. S. Nargunam and   
                M. P. Sebastian   Self-Organized QoS Aware Multicast
                                  Routing Scheme for Ad Hoc Networks . . . 23--31
               I. A. Ismail and   
            S. F. El-Zoghdy and   
                     A. A. Abdo   A Novel Technique for Datahiding . . . . 32--37
             A. S. Nargunam and   
                M. P. Sebastian   Cluster-Based MANET Multicast Routing
                                  Scheme . . . . . . . . . . . . . . . . . 38--46
                  G. T. Jay and   
                R. K. Smith and   
                 M. Hudnall and   
                       B. Bonds   Semi-Structured Information: An
                                  Architecture Improving Search Results
                                  Using Domain Guidance1 . . . . . . . . . 47--55
              A. Sudarsanam and   
                  T. Hauser and   
                    A. Dasu and   
                       S. Young   A Power Efficient Linear Equation Solver
                                  on A Multi-FPGA accelerator  . . . . . . 56--72
            S. Bhattacharya and   
                        A. Basu   Design of a Word to Sentence Generator
                                  for Augmentative . . . . . . . . . . . . 73--83
                  S. Merniz and   
                 M. Benmohammed   Modelling and Verification of Pipelined
                                  Micro-Architectures: Functional Approach 84--92
               A. Sajjanhar and   
                      G. Lu and   
                D. S. Zhang and   
                        W. Zhou   Connectivity-Based Shape Descriptors . . 93--98
                   J. Kumar and   
                      A. Bansal   Application of Neural Network for
                                  Estimating Properties of
                                  Diesel--Biodiesel blends . . . . . . . . 99--103
                 H. Nemmour and   
                     Y. Chibani   Handwritten Digit Recognition Based on a
                                  Neural--SVM Combination  . . . . . . . . 104--109
                   D. Adami and   
               C. Callegari and   
                S. Giordano and   
                      M. Pagano   Mtens: a New Simulator for the Design of
                                  MPLS Networks with Traffic Engineering
                                  Support  . . . . . . . . . . . . . . . . 110--118
                     T. Pan and   
                        K. Fang   An Effective Information Support System
                                  for Medical Management: Indicator Based
                                  Intelligence System  . . . . . . . . . . 119--124

International Journal of Computer Applications
Volume 32, Number 2, 2010

                    J. Shen and   
                    D. Yoon and   
                    D. Zhao and   
                        Y. Song   Denoising of Two-Dimensional Geometric
                                  Discontinuities  . . . . . . . . . . . . 129--140
                     S. Dey and   
                     D. Samanta   An Efficient and Accurate Pupil
                                  Detection Method for Iris Biometric
                                  Processing . . . . . . . . . . . . . . . 141--148
                   B. F. Wu and   
                  C.-T. Lin and   
                     C.-J. Chen   Real-Time Lane and Vehicle Detection
                                  Based on a Single Camera Model . . . . . 149--159
                  A. Nyamapfene   A Hypermap Approach to Multiple Sequence
                                  Processing . . . . . . . . . . . . . . . 160--166
         S. Muknahallipatna and   
                   J. Miles and   
               J. C. Hamann and   
                  H. L. Johnson   Large Fabric Storage Area Networks:
                                  Fabric Simulator Development and
                                  Preliminary Performance Analysis . . . . 167--180
                   M. Sarma and   
                        R. Mall   State-Based Approach to System Testing   181--187
                 J. Ngubiri and   
                   M. van Vliet   Characteristics of Fairness Metrics and
                                  their Effect on Perceived Scheduler
                                  Effectiveness  . . . . . . . . . . . . . 188--196
                 S. Agrawal and   
                R. S. Yadav and   
                       R. Vijay   A Speed Fine Tuning Technique for System
                                  Energy Minimization of Weakly Hard
                                  Real-Time System . . . . . . . . . . . . 197--205
      P. Hiranvanichchakorn and   
               S. Lertvorratham   Using Regression Analysis for Improving
                                  Multipath Ad Hoc Network Performance . . 206--214
                   H. Sneed and   
                       S. Huang   Value-Driven Software Maintenance  . . . 215--221
                   A. Sleit and   
              S. Al-Adaileh and   
                N. Al-Omari and   
                      H. Hurani   Extending the Cluster Map Algorithm
                                  using Automated Cluster Identifier . . . 222--225
                    D. Song and   
                W. Ru-Chuan and   
                   F. Xiong and   
                     Y. Le-Chan   Gene Expression Programming for
                                  Attribution Reduction in Rough Set . . . 226--231
                  S. K. Jha and   
                 P. K. Jana and   
                   R. Yadav and   
                   B. Sinha and   
                  S. Srivastava   Improved Algorithms for Balanced Ring
                                  Formation for Fault Tolerance in a $2$D
                                  Mesh . . . . . . . . . . . . . . . . . . 232--237
                    J. Chen and   
                 T. S. Chen and   
                  C. N. Lin and   
                    C. Y. Cheng   A Bitrate Controlled Data Hiding Scheme
                                  for Jpeg2000 . . . . . . . . . . . . . . 238--241
                    R. Sammouda   Data-Dependent Weight Initialization in
                                  the Hopfield Neural Network Classifier:
                                  Application to Natural Colour Images . . 242--249

International Journal of Computer Applications
Volume 32, Number 3, 2010

                D. S. Saini and   
                      N. Sharma   OVSF Code Assignment Schemes at the
                                  Forward Link of WCDMA Systems  . . . . . 253--260
               L. Xiangdong and   
                 Z. Yuelong and   
                C. Songqiao and   
                      Y. Xiaoli   A Multiversion Optimistic Concurrency
                                  Control Protocol in Mobile Broadcast
                                  Environments . . . . . . . . . . . . . . 261--266
                 C. Y. Chou and   
                  C. J. Lin and   
                   J. L. Lu and   
                     T. W. Chan   Supporting Variable Dyad Learning
                                  Activities in an Instructional Game
                                  System . . . . . . . . . . . . . . . . . 267--274
                    K. L. Hsieh   Value Expansion Expert System (CVE-ES)
                                  in Taiwanese Leisure Farming . . . . . . 275--281
                 L. Chunlin and   
                      L. Layuan   Multiple Granularity Control Scheme for
                                  System Utility Optimization in Grid
                                  Environments . . . . . . . . . . . . . . 282--289
            S. Bhattacharya and   
                 D. Samanta and   
                        A. Basu   Model-Based Design of Scanning Input
                                  Communication Aids: State of the Art and
                                  Research Issues  . . . . . . . . . . . . 290--296
                S. Sharafeddine   On Network Planning for Video Services
                                  Over IP Networks . . . . . . . . . . . . 297--308
                    H. Yuan and   
                      Y. Ye and   
                        J. Deng   Iterative Sib Algorithm Based On
                                  Simulated Annealing  . . . . . . . . . . 309--317
            I. S. Moskowitz and   
                   F. Ahmed and   
                 P. A. Lafferty   Information Theoretic Effects of JPEG
                                  Compression on Image Steganography . . . 318--327
                   L. Jiang and   
                     Z. Cai and   
                        D. Wang   Improving Naive Bayes for Classification 328--332
                  J. L. Kuo and   
                     K. L. Chao   Data-Dependency Decomposition of Colour
                                  Space Transformation for Microprocessor
                                  By Using Parallel Sa-C Programming . . . 333--340
                         C. Jin   Adaptive Digital Watermark System Using
                                  Soft Computation . . . . . . . . . . . . 341--346
                   R. Leela and   
                  S. Selvakumar   Dynamic Multi Constraint Multi Path QOS
                                  Routing Algorithm (DMCMPRA)  . . . . . . 347--354
             H. Al-Bahadili and   
                    A. Rababa'a   A Bit-Level Text Compression Scheme
                                  Based on the HCDC Algorithm  . . . . . . 355--361
                  A. Sarkar and   
               S. Choudhury and   
                   N. Chaki and   
                S. Bhattacharya   Quality Evaluation of Conceptual Level
                                  Object-Oriented Multidimensional Data
                                  Model  . . . . . . . . . . . . . . . . . 362--371
                    F. Wang and   
                      H. Li and   
                          R. Li   Non-Parametric Generalized Cross Entropy
                                  Estimator for BSS Algorithm  . . . . . . 372--380
               I. A. Ismail and   
                    M. Amin and   
                        H. Diab   An Efficient Adaptive Ergodic Matrix and
                                  Chaotic System for Image Encryption  . . 381--388

International Journal of Computer Applications
Volume 32, Number 4, 2010

                     Tick H. Oh   JPEG2000 and JPEG: Image Quality
                                  Comparison of Compressed Medical
                                  Modalities . . . . . . . . . . . . . . . 393--398
                Tianjie Cao and   
                Dongdai Lin and   
                        Rui Xue   Universal Designated-Verifier Partially
                                  Blind Signatures for E-Commerce  . . . . 399--403
             Tissa Chandesa and   
                Michael Hartley   Automated Sketcher Using Edge Detection
                                  Techniques . . . . . . . . . . . . . . . 404--411
                   Chi-Chou Kao   Performance-Driven Methods for Fine
                                  Granularity Scalable Video Coding  . . . 412--419
                     Yung-Gi Wu   Image Enlargement by Lagrange
                                  Interpolation  . . . . . . . . . . . . . 420--427
         Padmanabhan Sankar and   
      Chinnagounder Chellamuthu   Study and Simulation of Video Streaming  428--434
         Kostas Pentikousis and   
               Hussein Badr and   
                   Asha Andrade   A Comparative Study of Aggregate TCP
                                  Retransmission Rates . . . . . . . . . . 435--441
        Balachandra Muniyal and   
          Prema K. Venkat Reddy   An Efficient Method to Merge
                                  Hierarchical Public Key Infrastructures  442--446
        Perumal Ganeshkumar and   
          Kuppusamy Thyagarajah   Balancing Throughput and Fairness for
                                  Concurrent Flows Based on Per Flow
                                  Scheduling in Ad Hoc Networks  . . . . . 447--454
      Shashikant U. Ghumbre and   
                Ashok A. Ghatol   An Intelligent System for Hepatitis B
                                  Disease Diagnosis  . . . . . . . . . . . 455--460
            Hassan Y. Ahmed and   
              Ibrahima Faye and   
         Naufal bin M. Saad and   
                Syed A. Aljunid   OCDM a System: New Detection Scheme and
                                  Encoder--Decoder Structure Based on
                                  Fibre Bragg Gratings (FBGs) for VCC Code 461--468
                     Jia Yu and   
                   Rong Hao and   
                 Fanyu Kong and   
             Xiangguo Cheng and   
                Huawei Zhao and   
                   Chen Yangkui   Identity-Based Forward Secure Threshold
                                  Signature Scheme Based on Mediated RSA   469--475
                     Jia Yu and   
                   Rong Hao and   
                 Fanyu Kong and   
             Xiangguo Cheng and   
                Huawei Zhao and   
                   Yangkui Chen   Cryptanalysis of a Type of Forward
                                  Secure Signatures and Multi-Signatures   476--481
                Weiyi Zhang and   
                   Jun Kong and   
             Kendall Nygard and   
                        Ming Li   Adaptive Design of Pervasive Computing
                                  System Under QoS Constraints1  . . . . . 482--492


International Journal of Computer Applications
Volume 33, Number 1, 2011

      Patrik Österberg and   
                 Tingting Zhang   Multicast-Favourable Max-Min Fairness
                                  --- The Definition and How to Comply . . 1--8
               Chi-Chou Kao and   
               Chia-Nan Yeh and   
                    Yen-Tai Lai   Low-Energy Cluster Head Selection for
                                  Clustering Communication Protocols in
                                  Wireless Sensor Network  . . . . . . . . 9--14
                Anchare V. Babu   On Selection of Optimal Physical Layer
                                  Parameters for Wireless Sensor Networks
                                  Over Rayleigh Fading Channels  . . . . . 15--21
              Ritesh Parikh and   
          Santanu Chattopadhyay   Power-Aware Multi-Level AND-XOR Network
                                  Synthesis  . . . . . . . . . . . . . . . 22--28
            Ioannis Legakis and   
      Michalis A. Savelonas and   
          Dimitris Maroulis and   
          Dimitris K. Iakovidis   Computer-Based Nodule Malignancy Risk
                                  Assessment in Thyroid Ultrasound Images  29--35
            Ghanshyam Singh and   
          Rajendra P. Yadav and   
                  Vijay Janyani   Design of Symmetric and Asymmetric $ 2
                                  \times 2 $ all Optical Ti:LiNbO$_3$
                                  Machzehnder Interferometric Switches . . 36--40
                   Omaima Nomir   Iris Biometrics: Human Identification
                                  Using Force Field  . . . . . . . . . . . 41--48
           Michael VanHilst and   
              Shihong Huang and   
                   Hugh Lindsay   Process Analysis of a Waterfall Project
                                  Using Repository Data  . . . . . . . . . 49--56
                 Li Chunlin and   
                      Li Layuan   Device Resource Allocation in
                                  Context-Aware Mobile Grid  . . . . . . . 57--63
                Li-Feng Liu and   
                 Yan-Yun Qu and   
                 Cui-Hua Li and   
                       Yuan Xie   Multi-Class Spectral Clustering Based on
                                  Particle Swarm Optimization  . . . . . . 64--69
Chantana Phongpensri (Chantrapornchai) and   
           Saran Keinprapai and   
          Opas Wongtaveesap and   
        Kanok Hournkumnuard and   
                Sergei Gorlatch   Parallel Algorithm and Visualization of
                                  High Gradient Magnetic Separation of
                                  Nanoparticles  . . . . . . . . . . . . . 70--82
                  Ismail Shahin   Speaker Identification in Each of the
                                  Neutral and Shouted Talking Environments
                                  Based on Gender-Dependent Approach Using
                                  SPHMMS . . . . . . . . . . . . . . . . . 83--91
       Mohammad K. Ayoubloo and   
       Hazi Md. Azamathulla and   
            Zulfequar Ahmad and   
        Aminuddin Ab. Ghani and   
             Javad Mahjoobi and   
                    Amin Rasekh   Prediction of Scour Depth in Downstream
                                  of Ski-Jump Spillways Using Soft
                                  Computing Techniques . . . . . . . . . . 92--97

International Journal of Computer Applications
Volume 33, Number 2, 2011

                Yaodong Cui and   
                Tianlong Gu and   
                         Wei Hu   Recursive Algorithms for the Optimum
                                  Cutting of Equal Rectangles  . . . . . . 103--107
            Sandanam Domnic and   
  Karuppanagounder Somasundaram   Fast and Low Bit-Rate AMBTC Image
                                  Compression Scheme . . . . . . . . . . . 108--115
                    Ing-Jr Ding   Improvement of Map-VFS Adaptation
                                  Performance by Fuzzy Control . . . . . . 116--123
                 Bindu Goel and   
                   Yogesh Singh   An Empirical Analysis of Metrics to
                                  Predict the Software Defect Fix-Effort   124--131
                     Zuowen Tan   Comments on a Threshold Authenticated
                                  Encryption Scheme  . . . . . . . . . . . 132--136
            Michael E. Sone and   
                  Ndeh N. Ningo   A Simple FPGA-Based Wireless
                                  Transmitter/Receiver Convolutional
                                  Cryptosystem . . . . . . . . . . . . . . 137--143
           Zouheir Trabelsi and   
                  Khaled Shuaib   Implementation of an Effective and
                                  Secure Biometrics-Based Student
                                  Attendance System  . . . . . . . . . . . 144--153
                    Lu Hong and   
                  Feng Hong and   
               Zhongwen Guo and   
                       Ying Guo   HCR: a Hybrid MAC Protocol for
                                  Underwater Sensor Networks Using Channel
                                  Reservation  . . . . . . . . . . . . . . 154--159
          Yaser M. A. Hamid and   
                Daya K. Lobiyal   COMPOW-Based PCM Protocol for Multi-Hop
                                  Manet  . . . . . . . . . . . . . . . . . 160--166
            Takao Shimomura and   
                Kenji Ikeda and   
                Muneo Takahashi   Functional Web Component Generation for
                                  Visual Web Application Programming . . . 167--174

International Journal of Computer Applications
Volume 33, Number 3, 2011

                 Carlos Almeida   Timely and Dependable QoS Adaptation in
                                  Quasi-Synchronous Systems  . . . . . . . 179--188
               Anuja Meetoo and   
                  Kavi K. Khedo   Saisense: a Novel Scalable, Adaptive and
                                  Intelligent Context-Aware Architecture   189--201
             Masaru Fujieda and   
          Takahiro Murakami and   
               Yoshihisa Ishida   An Approach to Multi-Pitch Estimation
                                  Using a Support Vector Machine . . . . . 202--210
          Dakshina R. Kisku and   
             Hunny Mehrotra and   
             Phalguni Gupta and   
                 Jamuna K. Sing   Robust Multi-Camera View Face
                                  Recognition  . . . . . . . . . . . . . . 211--219
                 Kun-Ching Wang   Voice Activity Detector for Noise
                                  Spectrum Estimation Using a Dynamic
                                  Band-Splitting Entropy Estimate  . . . . 220--228
  Maria Kalavathy Gnanamani and   
          Seethalakshmi Pandian   Designing Dynamic Composite Media
                                  Service and Monitoring Its Run-Time
                                  Performance  . . . . . . . . . . . . . . 229--237
              Hui-Min Huang and   
                  Jia-Lin Chang   Novel Handoff Method for the Integrated
                                  $3$G and Nemo Network  . . . . . . . . . 238--244
             Ashutosh Gupta and   
                Suneeta Agarwal   A Novel Approach for Compressing DNA
                                  Sequences Using Semi-Statistical
                                  Compressor . . . . . . . . . . . . . . . 245--251
                 Li Chunlin and   
                      Li Layuan   A Market-Based Resource Allocation
                                  Policy in Ad Hoc Grid  . . . . . . . . . 252--257
                 Chaoqun Li and   
                     Hongwei Li   Learning Random Model Trees for
                                  Regression . . . . . . . . . . . . . . . 258--265

International Journal of Computer Applications
Volume 33, Number 4, 2011

               Tarek Guesmi and   
             Salem Hasnaoui and   
               Houria Rezig and   
                  Ouajdi Korbaa   Design and Implementation of a Global
                                  Scheduling Strategy for Data
                                  Distribution Over CAN-Based Networks . . 271--283
         Smriti H. Bhandari and   
             Sunil M. Deshpande   Analysis of Engineered Surfaces for
                                  Product Quality Monitoring . . . . . . . 284--292
                 Wei-Po Lee and   
                 Li-Jen Liu and   
                  Jeng-An Chiou   A Component-Based Framework for Rapidly
                                  Developing Online Board Games  . . . . . 293--302
                    Jyhjong Lin   Enhancing Customer Relationships with
                                  Customer Knowledge Management and P2P
                                  (Peer-To-Peer) Technology  . . . . . . . 303--315
             Arun Manoharan and   
                Ammasi Krishnan   Power Analysis of Multiple Hashing Bloom
                                  Filter Architecture for Network
                                  Applications . . . . . . . . . . . . . . 316--322
              Ritsuya Ikeda and   
             Kensuke Narita and   
              Shin-ya Nishizaki   Cooperation of Model Checking and
                                  Network Simulation for Cost Analyses of
                                  Distributed Systems  . . . . . . . . . . 323--329
                   Rong Hao and   
                     Jia Yu and   
                   Zhiling Song   A Note On a Threshold Verifiable
                                  Multi-Secret Sharing Scheme  . . . . . . 330--334
     Mohamed Abd-ElRahman Abdou   A Fuzzy Wavelet-Based Approach to a
                                  Novel Image Denoising Engine . . . . . . 335--340
                 Chaoqun Li and   
                     Hongwei Li   Correlation Weighted Heterogeneous
                                  Euclidean-Overlap Metric . . . . . . . . 341--346
          Natheer Khasawneh and   
        Maisa M. Al-Khudair and   
               Mohammad Fraiwan   On Using Classification Techniques for
                                  Corpus Reduction in Arabic
                                  Text-To-Speech Systems . . . . . . . . . 347--354
               Phichhang Ou and   
                  Hengshan Wang   Forecasting Volatility Switching ARCH by
                                  treed Gaussian process with Jumps to the
                                  Limiting Linear Model  . . . . . . . . . 355--361


International Journal of Computer Applications
Volume 34, Number 1, 2012

           Lalit K. Awasthi and   
                Manoj Misra and   
                Ramesh C. Joshi   An Efficient Coordinated Checkpointing
                                  Approach for Distributed Computing
                                  Systems with Reliable Channels . . . . . 1--10
              Kuo-Ming Hung and   
             Yen-Liang Chen and   
               Ching-Tang Hsieh   Image Inpainting Based On Geometric
                                  Similarity . . . . . . . . . . . . . . . 11--18
            Zdravko Karakehayov   Zeta: Zero Energy Transmissions Algebra
                                  for Wireless Sensor Networks . . . . . . 19--24
          Blanca T. Abraham and   
                Jose L. Aguilar   Middleware for Improving Performance in
                                  a Component-Based Software Architecture  25--28
        Subba Reddy Basappa and   
                    Udaya Kumar   Simulation of Surface and Volume Stress
                                  for High Voltage Transmission Insulators 29--35
   Sethuraman Santhoshbaboo and   
        Balakrishnan Narasimhan   A QoS Backbone Based Minimum Delay
                                  Routing Protocol for Mobile \em Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 36--41
            Nikos Papadakis and   
             Pavlos Kefalas and   
          Antonis Delidakis and   
               Kostas Papadakis   An Approach of a Logic Resolver in a
                                  Distributed Peer-To-Peer System  . . . . 42--47
               Yanlong Wang and   
                 Jinhua Liu and   
                 Ting Zhang and   
                      Jin Zhang   $3$-D Porous Media Reconstruction using
                                  a $2$-D Micro-CT Image and MPS . . . . . 48--54
                   Hu Xiong and   
                   Zhi Guan and   
                     Zhong Chen   On the Security of a Pairing-Based
                                  Signcryption Scheme using Self-Certified
                                  Public Keys  . . . . . . . . . . . . . . 55--57
              Layale Bassil and   
                    Iyad Ouaiss   Optimizing Functional Unit Binding
                                  During High-Level Synthesis  . . . . . . 58--65

International Journal of Computer Applications
Volume 34, Number 2, 2012

   Thenkarai N. Janakiraman and   
             John Janet L. Rani   Double Star Embedded Clustering
                                  Algorithm for Wireless \em Ad Hoc
                                  Networks Using Ranking . . . . . . . . . 71--80
                   Omaima Nomir   Human Identification: a new X-Ray Dental
                                  Radiographs Segmentation Algorithm using
                                  Graphcut . . . . . . . . . . . . . . . . 81--89
      Kalavathy Sundarrajan and   
              Ramalingam Suresh   An Efficient Neighbourhood Pixel
                                  Filtering Algorithm for Wavelet-Based
                                  Image Denoising  . . . . . . . . . . . . 90--97
                   Rong Hao and   
                     Jia Yu and   
                    Jing Li and   
                   Zhiling Song   Forward Secure Threshold Signature
                                  Scheme in the Standard Model . . . . . . 98--104
               Amany Sarhan and   
              Rasha Mahmoud and   
                 Mohamed Faheem   Spatio-Temporal Error Concealment
                                  Algorithms for Encoded Video Streams for
                                  Real-Time Applications . . . . . . . . . 105--118
                Takao Shimomura   Automated Server-Side Regression Testing
                                  for Web Applications . . . . . . . . . . 119--126
       Jemi Florinabel Deva and   
     Ebenezer Juliet Selwyn and   
           Sadasivam Velayuthum   Fast Orientation-Driven Multi-Structure
                                  Morphological Inpainting . . . . . . . . 127--134
         Gurusamy Jeyakumar and   
Chinthamani Nathan S. Velayutham   Differential Evolution and Dynamic
                                  Differential Evolution Variants --- An
                                  Empirical Comparative Performance
                                  Analysis . . . . . . . . . . . . . . . . 135--144

International Journal of Computer Applications
Volume 34, Number 3, 2012

            John B. Oladosu and   
       Justice O. Emuoyibofarhe   A Yoruba--English Language Translator
                                  for Doctor--Patient Mobile Chat
                                  Application  . . . . . . . . . . . . . . 149--156
             Raj K. Samanta and   
       Partha Bhattacharjee and   
                  Goutam Sanyal   Analysis of Cellular Wireless Networks
                                  with Non-Classical Traffic and Channel
                                  Reservation  . . . . . . . . . . . . . . 157--165
  Joseph Michael M. Mathana and   
       Parthasarathy Rangarajan   Reconfigurable Architecture For High
                                  Performance Turbo Decoder  . . . . . . . 166--173
    Supachote Lertvorratham and   
         Pipat Hiranvanichakorn   Integrating Secure Multipath Mobile Ad
                                  Hoc Network With Self-Authentication
                                  Strategy . . . . . . . . . . . . . . . . 174--184
                Seonho Choi and   
              Hyeonsang Eom and   
                    Edward Jung   Securing Wireless Sensor Networks
                                  Against Broadcast Service Attacks  . . . 185--191
                Takao Shimomura   Command Tag-Based Automatic Diagnosis
                                  For Computer System Troubles . . . . . . 192--199
               Bo-Jhih Chen and   
             Shen-Chuan Tai and   
                     Yung-Gi Wu   A Gaussian Rate-Distortion Method For
                                  Detecting Zero-Quantized Blocks  . . . . 200--212

International Journal of Computer Applications
Volume 34, Number 4, 2012

                   Qing Liu and   
                 Lu-Ping Xu and   
                   Yi-De Ma and   
                  Yong Wang and   
                      Qiang Xie   Bilateral Filtering for Image Processing
                                  Based on Pulse Coupled Neural Networks   217--222
               Hailiang Shi and   
                   Xiangjun Xin   Fusion of Panchromatic and Multispectral
                                  Image Based On PCA and NSCT  . . . . . . 223--228
                  Tianyi Li and   
               Minghui Wang and   
                   Zujian Huang   An Improved Wavelet-Based Approach for
                                  Estimating the Variance of Noise in
                                  Images . . . . . . . . . . . . . . . . . 229--234
                 Li Chunlin and   
                  Chen Gang and   
                      Li Layuan   Sensor Data Integration With The Grid:
                                  Model and Algorithm  . . . . . . . . . . 235--240
           Ashish K. Sharma and   
            Jitendra Sharma and   
                 Ilesh C. Mehta   A Novel Fuzzy Integrated Technical
                                  Requirements Prioritization Software
                                  System for Quality Function Deployment   241--248
Kelsey A. Ramirez-Gutierrez and   
     Mariko Nakano-Miyatake and   
          Hector M. Perez-Meana   Improvement of Radon Transform-Based
                                  Perceptual Hashing using Image
                                  Normalization  . . . . . . . . . . . . . 249--259
   Monickaraj Vigilson Prem and   
   Sankaranarayanan Swamynathan   Code and Itinerary Security for Mobile
                                  Agents . . . . . . . . . . . . . . . . . 260--266


International Journal of Computer Applications
Volume 35, Number 1, 2013

             Xiangguo Cheng and   
                 Lifeng Guo and   
                     Jia Yu and   
                  Huiran Ma and   
                      Yuexiu Wu   A New Identity-Based Group Signature
                                  Scheme . . . . . . . . . . . . . . . . . 1--5
          Sikamony S. Kumar and   
               Rama S. Moni and   
              Jayapathy Rajeesh   Automatic Segmentation of Liver Tumour
                                  using a Possibilistic Alternative Fuzzy
                                  C-Means Clustering . . . . . . . . . . . 6--12
    Sriraman A. Padmanabhan and   
      Soundarrajan Chandramathi   A Wavelet-Based Video Compression using
                                  Adaptive Rood Search with
                                  Spatio-Temporal Correlation and LSK  . . 13--21
          Gouri S. Maharana and   
            Pramod K. Meher and   
              Basant K. Mohanty   Efficient Systolic Architecture for VLSI
                                  Realization of $2$-D Hartley-Like
                                  Transform  . . . . . . . . . . . . . . . 22--28
                    Yuet M. Lam   Solution Space Reduction in Task
                                  Scheduling for Heterogeneous Computing
                                  Systems  . . . . . . . . . . . . . . . . 29--35
             Ahmed Louchene and   
                  Ammar Dahmani   Watermarking Method Resilient to RST and
                                  Compression Based on DWT, LPM and Phase
                                  Correlation  . . . . . . . . . . . . . . 36--43
                   Hu Xiong and   
                 Yanan Chen and   
                 Zhong Chen and   
                       Fagen Li   Simple Three-Party Password-Based Key
                                  Exchange Protocol with Provable Security 44--50
               Liang Zhiwei and   
                Chen Yanyan and   
                    Zhu Songhao   Resource Service Access Mechanism for
                                  Service Robots . . . . . . . . . . . . . 51--57

International Journal of Computer Applications
Volume 35, Number 2, 2013

                  Goutam Sarker   An Optimal Backpropagation Network for
                                  Face Identification and Localization . . 63--69
                Takao Shimomura   Semantic Program Visualization with
                                  Attachable Display Classes . . . . . . . 70--78
               Fella Charif and   
           Noureddine Djedi and   
          Abderrazak Benchabane   On Parallel Implementation of Horn and
                                  Schunck Motion Estimation Method . . . . 79--85
           Hiroyoshi Jutori and   
            Kanemitsu Ootsu and   
             Takashi Yokota and   
                  Takanobu Baba   Dynamic Selection of Speculative Paths
                                  in Two-Path Limited Speculation Method   86--95

International Journal of Computer Applications
Volume 35, Number 3, 2013

              Rohilah Sahak and   
             Wahidah Mansor and   
               Khuan Y. Lee and   
               Azlee Zabidi and   
             Ahmad I. M. Yassin   Optimization of Principal Component
                                  Analysis and Support Vector Machine for
                                  the Recognition of Infant Cry with
                                  Asphyxia . . . . . . . . . . . . . . . . 99--107
                      Da Li and   
                      Yibin Hou   Multiprocessor Systems Auto-Design for
                                  Multiple Use-Case Applications on FPGA   108--113
                    Li Ding and   
                 Dana Steil and   
              Brandon Dixon and   
          Nicholas A. Kraft and   
             David B. Brown and   
                  Allen Parrish   First: Framework to Integrate
                                  Relationship Search Tools  . . . . . . . 114--124
          Shanker Keshavdas and   
           Geert-Jan M. Kruijff   Functional Mapping for Human--Robot
                                  Collaborative Exploration  . . . . . . . 125--135
                Yuanwei Wei and   
                   Yali Xue and   
                Jiongyu Yin and   
                      Weidou Ni   Prediction of Municipal Solid Waste
                                  Generation in China by Multiple Linear
                                  Regression Method  . . . . . . . . . . . 136--140

International Journal of Computer Applications
Volume 35, Number 4, 2013

             Soumalya Ghosh and   
                Debasis Samanta   Analysis on User Errors in Virtual
                                  Keyboards  . . . . . . . . . . . . . . . 145--151
            Basilis Mamalis and   
          Grammati Pantziou and   
     Georgios Dimitropoulos and   
             Dimitris Kremmydas   Highly Scalable Parallelization of
                                  Standard Simplex Method on a
                                  Myrinet-Connected Cluster Platform . . . 152--161
            Chia-Ying Chang and   
                 Shen-Chuan Tai   Image Enhancement Algorithm Based on
                                  Zone System and Dual-Exposure Techniques 162--172
               Guoming Chen and   
                 Qiang Chen and   
                 Dong Zhang and   
                     Yiqun Chen   A Watermarking Scheme Based on
                                  Compressive Sensing and Bregman
                                  Iteration  . . . . . . . . . . . . . . . 173--180
               Nida S. Khan and   
              Asma S. Larik and   
          Quratulain Rajput and   
                  Sajjad Haider   A Bayesian Approach for Suspicious
                                  Financial Activity Reporting . . . . . . 181--187


International Journal of Computer Applications
Volume 36, Number 1, 2014

                  Kundu Anirban   Efficient Bandwidth Utilization for
                                  Downloading Web Pages  . . . . . . . . . 1--6
        Daniel V. de Macedo and   
Maria Andréia F. Rodrigues and   
João J. V. P. Furtado and   
       Elizabeth S. Furtado and   
               Daniel A. Chagas   Using and Evaluating Augmented Reality
                                  for Mobile Data Visualization in Real
                                  Estate Classified Ads  . . . . . . . . . 7--14
                Yuet M. Lam and   
                      Wayne Luk   A Many-Core Based Parallel Tabu Search   15--22
             Shen-Chuan Tai and   
            Chia-Ying Chang and   
               Bo-Jhih Chen and   
                 Yu-Yi Liao and   
                     Yung-Gi Wu   Early Termination for Residual Quadtree
                                  Decision-Making in HEVC  . . . . . . . . 23--33
            Mamdouh Alenezi and   
                  Kenneth Magel   Empirical Evaluation of a New Coupling
                                  Metric: Combining Structural and
                                  Semantic Coupling  . . . . . . . . . . . 34--44

International Journal of Computer Applications
Volume 36, Number 2, 2014

        Kamaraj Arunachalam and   
      Marichamy Perumalsamy and   
        C. Kalyana Sundaram and   
               J. Senthil Kumar   Design and Implementation of a
                                  Reversible Logic Based $8$-Bit
                                  Arithmetic and Logic Unit  . . . . . . . 49--55
     Coimbatore K. Shyamala and   
   Tattamangalam R. Padmanabhan   A Trust--Reputation Model Offering Data
                                  Retrievability and Correctness in
                                  Distributed Storages . . . . . . . . . . 56--63
           Guermoui Mawloud and   
                   Melaab Djame   Modified Local Binary Pattern for Human
                                  Face Recognition Based on Sparse
                                  Representation . . . . . . . . . . . . . 64--71
                     Kun Ma and   
                 Fusen Dong and   
                        Bo Yang   Incremental Object Matching Approach of
                                  Schema-Free Data with Mapreduce  . . . . 72--77
               Parul Pandey and   
            Maheshwari Tripathi   The Wheel Quorum Protocol: An Efficient
                                  Approach for Reading Replicated Data . . 78--83

International Journal of Computer Applications
Volume 36, Number 3, 2014

           Seyedeh B. Ayati and   
     Kaddour Bouazza-Marouf and   
                 David Kerr and   
                Michael O'Toole   Haematoma Detection Using EIT in a Sheep
                                  Model  . . . . . . . . . . . . . . . . . 87--92
         Abubaker Wahaballa and   
             Osman Wahballa and   
                   Fagen Li and   
           Mohammed Ramadan and   
                   Zhiguang Qin   Multiple-Layered Securities Using
                                  Steganography and Cryptography . . . . . 93--100
       Abba Suganda Girsang and   
              Chun-Wei Tsai and   
                  Chu-Sing Yang   Multi-Objective Particle Swarm
                                  Optimization for Repairing Inconsistent
                                  Comparison Matrices  . . . . . . . . . . 101--109
                 Walid Emar and   
            Sofyan Hayajneh and   
                 Musbah J. Aqel   A Computer Based Sliding Mode Controller
                                  Topology for Nonlinear Voltage
                                  Regulating Chopper . . . . . . . . . . . 110--114
       Ganasigamony W. Jiji and   
      Peter Raj J. D. Savariraj   Retrieval in Dermatology using
                                  Intelligent Techniques . . . . . . . . . 115--124

International Journal of Computer Applications
Volume 36, Number 4, 2014

                  Shang Gao and   
                 Hualong Yu and   
                   Ling Qiu and   
                     Cungen Cao   The Wading Across Stream Algorithm . . . 127--132
  Chakrapani Venkataramanan and   
       Selvaraj M. Girirajkumar   Markov Fuzzy Based MAC Protocol for Life
                                  Time Maximization of Wireless Sensor
                                  Network  . . . . . . . . . . . . . . . . 133--139
            Sai P. Kadiyala and   
                Debasis Samanta   Clock-Gating Approach to Low Power
                                  Domino Circuit Synthesis . . . . . . . . 140--147
             Junqiang Zhang and   
               Chonglong Wu and   
                  Junqi Liu and   
                      Haihua Hu   The Research of Three-Dimensional
                                  Integrated Framework of Landslide
                                  Disaster Monitoring Data . . . . . . . . 148--154
             Samia Belkacem and   
                 Zohir Dibi and   
                Ahmed Bouridane   DCT Coefficients Modelling for Image
                                  Watermarking . . . . . . . . . . . . . . 155--163


International Journal of Computer Applications
Volume 37, Number 1, 2015

             John O'Farrell and   
               Sanjeev Baskiyar   Enhanced real-time performance using a
                                  secondary bus for cache write-backs  . . 1--9
                    G. Ravi and   
                  K. R. Kashwan   Performance analysis of an energy aware
                                  zone routing protocol using span . . . . 10--16
           Jeevan M. Meruga and   
             Carly Fountain and   
                 Jon Kellar and   
             Grant Crawford and   
             Aravind Baride and   
             P. Stanley May and   
              William Cross and   
                   Randy Hoover   Multi-layered covert QR codes for
                                  increased capacity and security  . . . . 17--27
         Abubaker Wahaballa and   
                   Zhen Qin and   
                   Hu Xiong and   
               Zhiguang Qin and   
               Mohammed Ramadan   A taxonomy of secure electronic English
                                  auction protocols  . . . . . . . . . . . 28--36
              Zih-Siou Chen and   
                 Shen-Chuan Tai   Corrected center-surround retinex:
                                  application to tone reproduction for
                                  high dynamic range images  . . . . . . . 37--51

International Journal of Computer Applications
Volume 37, Number 2, 2015

      \vZeljka Mihajlovi\'c and   
         Sini\vsa Popovi\'c and   
           Kre\vsimir \'Cosi\'c   Interactive scenario control in virtual
                                  environments . . . . . . . . . . . . . . 53--59
                 Yung-Gi Wu and   
                 Sheng-Lun Tsai   Fall event detection by gyroscopic and
                                  accelerometer sensors in smart phone . . 60--66
                  Kai Chain and   
              Wen-Chung Kuo and   
                  Kuei-Hu Chang   Enhancement key agreement scheme based
                                  on chaotic maps  . . . . . . . . . . . . 67--72
  Parag Kumar Guha Thakurta and   
                     Sujoy Sett   Joint routing in mobile networks: a
                                  weighted optimization approach . . . . . 73--81

International Journal of Computer Applications
Volume 37, Number 3--4, 2015

             Shen-Chuan Tai and   
             Ting-Chou Tsai and   
                 Jui-Chiang Wen   Single image dehazing based on vector
                                  quantization . . . . . . . . . . . . . . 83--93
                    Zhi Liu and   
                  Sanya Liu and   
                    Lin Liu and   
                  Meng Wang and   
                Jianwen Sun and   
                      Xian Peng   A discriminative random sampling
                                  strategy with individual-author feature
                                  selection for writeprint recognition of
                                  Chinese texts  . . . . . . . . . . . . . 94--101
         Alagumani Selvaraj and   
         Subashini Sundararajan   Survey on public auditability to ensure
                                  data integrity in cloud storage  . . . . 102--110
                   Yin Yang and   
                   Wenyi Li and   
              Manning Zhang and   
               Xiaomei Ding and   
                       Jing Dai   Disk failure prediction model for
                                  storage systems based on disk SMART
                                  technology . . . . . . . . . . . . . . . 111--119
                    Zhu Zhu and   
               Julang Jiang and   
                  Xiaoguo Zhang   Edge-preserving regularized filter with
                                  visual perception outlier measurement    120--126
              Romany F. Mansour   Using adaptive mutation to accelerate
                                  the convergence of immune algorithms for
                                  prediction of $3$D molecular structure   127--133
                 Amira Yahi and   
            Kamel Messaoudi and   
                Salah Toumi and   
              El-bay Bourennane   Real-time hardware implementation of a
                                  speed FSBMA used in H.264/AVC  . . . . . 134--142
               Beulah David and   
                Dorai Rangasamy   Spatial-contextual texture and edge
                                  analysis approach for unsupervised
                                  change detection of faces in counterfeit
                                  images . . . . . . . . . . . . . . . . . 143--159
               Chi-Chou Kao and   
                Yen-Tai Lai and   
                Chao-Feng Tseng   Improved edge-directed super resolution  160--167
                G. Wiselin Jiji   Analysis of functionality of left
                                  ventricle  . . . . . . . . . . . . . . . 168--180
                Chunhua Jin and   
               Chunxiang Xu and   
                   Fagen Li and   
                  Xiaojun Zhang   A novel certificateless deniable
                                  authentication protocol  . . . . . . . . 181--192


International Journal of Computer Applications
Volume 38, Number 1, 2016

              Ju-Yuan Hsiao and   
              Shu-Ju Chuang and   
                   Po-Yueh Chen   A hybrid face recognition system based
                                  on multiple facial features  . . . . . . 1--8
          Ibrahim El-Henawy and   
                   Kareem Ahmed   Accelerating convergence of
                                  backpropagation for multilayer
                                  perceptron neural networks: a case study
                                  on character bit-mapped pixel image to
                                  ASCII conversion . . . . . . . . . . . . 9--18
                     Kun Ma and   
                    Bo Yang and   
                  Ajith Abraham   Asynchronous data translation framework
                                  for converting relational tables to
                                  document stores  . . . . . . . . . . . . 19--28
                Hema Banati and   
                    Nidhi Arora   Detecting communities in complex
                                  networks --- a discrete hybrid
                                  evolutionary approach  . . . . . . . . . 29--40
               Issam Dagher and   
                    Rima Antoun   Different PCA scenarios for email
                                  filtering  . . . . . . . . . . . . . . . 41--54
            V. Ramachandran and   
                       C. Sekar   $ (1, N) $-arithmetic graphs . . . . . . 55--59

International Journal of Computer Applications
Volume 38, Number 2--3, 2016

              B. Pakkiraiah and   
               G. Durga Sukumar   A new modified MPPT controller for
                                  improved performance of an asynchronous
                                  motor drive under variable irradiance
                                  and variable temperature . . . . . . . . 61--74
             Manish Kashyap and   
             Mahua Bhattacharya   Detectors and descriptors for
                                  registration of illumination varying,
                                  globally distorted images  . . . . . . . 75--81
                 Mili Ghosh and   
       Debarka Mukhopadhyay and   
               Paramartha Dutta   A study on 2 dimensional 2 Dot 1
                                  Electron quantum dot cellular automata
                                  based reversible 2:1 MUX design: an
                                  energy analytical approach . . . . . . . 82--95
            Dipankar Santra and   
             Krishna Sarker and   
          Anirban Mukherjee and   
                 Arindam Mondal   Hybrid PSO-ACO technique to solve
                                  multi-constraint economic load dispatch
                                  problems for 6-generator system  . . . . 96--115
           Nanda Dulal Jana and   
                       Jaya Sil   Interleaving of particle swarm
                                  optimization and differential evolution
                                  algorithm for global optimization  . . . 116--133
            Sujit Kumar Das and   
           Bibhas Chandra Dhara   Arithmetic coding based secret image
                                  sharing with inverted pattern LSB
                                  substitution for share hiding to achieve
                                  better quality stego images  . . . . . . 134--143
              Parul Agarwal and   
                   Shikha Mehta   Enhanced flower pollination algorithm on
                                  data clustering  . . . . . . . . . . . . 144--155
                Utpal Nandi and   
           Jyotsna Kumar Mandal   Efficiency of adaptive fractal image
                                  compression with archetype
                                  classification and its modifications . . 156--163
                 Pankaj Pal and   
   Siddhartha Bhattacharyya and   
                    Ashish Mani   Pure color object extraction from a
                                  noisy state using quantum version
                                  parallel self organizing neural network  164--186

International Journal of Computer Applications
Volume 38, Number 4, 2016

  Ahmed Abdulateef Mohammed and   
                 Atul Sajjanhar   Experimental comparison of approaches
                                  for feature extraction of facial
                                  attributes . . . . . . . . . . . . . . . 187--198
            Ashutosh Sharma and   
             Manish Kumar Goyal   Bayesian network for monthly rainfall
                                  forecast: a comparison of K2 and MCMC
                                  algorithm  . . . . . . . . . . . . . . . 199--206
       Zeeshan Ali Siddiqui and   
                    Kirti Tyagi   A critical review on effort estimation
                                  techniques for
                                  service-oriented-architecture-based
                                  applications . . . . . . . . . . . . . . 207--216


International Journal of Computer Applications
Volume 39, Number 1, 2017

                   Xu Huang and   
       Raul Fernandez Rojas and   
             Allan C. Madoc and   
                    Dua'a Ahmad   Evidentiary assessment for protecting
                                  WSNs from internal attacks in real-time  1--8
              Arran Stewart and   
      Rachel Cardell-Oliver and   
                   Rowan Davies   A fine-grained framework for quantifying
                                  secure management of state in
                                  object-oriented programs . . . . . . . . 9--16
                        A. Mani   Probabilities, dependence and rough
                                  membership functions . . . . . . . . . . 17--35
                  Saswati Ghosh   Design and testing of rectifying antenna
                                  for RF energy scavenging in GSM 900 band 36--44
      K. K. Soundra Pandian and   
                      K. C. Ray   An algorithm and architecture for
                                  non-recursive pseudorandom sequence
                                  generation using sequence folding
                                  technique  . . . . . . . . . . . . . . . 45--56
                      Anonymous   Corrigendum  . . . . . . . . . . . . . . 57--57

International Journal of Computer Applications
Volume 39, Number 2, 2017

         Srilekha Mukherjee and   
                  Goutam Sanyal   Enhanced Position Power First Mapping
                                  (PPFM) based image steganography . . . . 59--68
             Vishank Bhatia and   
             V. Kalaichelvi and   
                 R. Karthikeyan   Comparison of GA tuned fuzzy logic and
                                  NARMA-L2 controllers for motion control
                                  in $5$-DOF robot . . . . . . . . . . . . 69--78
               Nikki Robins and   
    Patricia A. H. Williams and   
            Krishnun Sansurooah   An investigation into remnant data on
                                  USB storage devices sold in Australia
                                  creating alarming concerns . . . . . . . 79--90
               Kareem Ahmed and   
              Ibrahim El-Henawy   Increasing robustness of Data Encryption
                                  Standard by integrating DNA cryptography 91--105
            Masood Mansoori and   
                  Ian Welch and   
     Kim-Kwang Raymond Choo and   
              Roy A. Maxion and   
          Seyed Ebrahim Hashemi   Real-world IP and network tracking
                                  measurement study of malicious websites
                                  with HAZOP . . . . . . . . . . . . . . . 106--121

International Journal of Computer Applications
Volume 39, Number 3, 2017

               E. A. Zanaty and   
                S. F. El-Zoghdy   A novel approach for color image
                                  segmentation based on region growing . . 123--139
 S. Sivanaga Malleswara Rao and   
             K. Venkata Rao and   
       K. Hemachandra Reddy and   
      Ch. V. S. Parameswara Rao   Prediction and optimization of process
                                  parameters in wire cut electric
                                  discharge machining for high-speed steel
                                  (HSS)  . . . . . . . . . . . . . . . . . 140--147
                  Ismat Beg and   
                 Tabasam Rashid   A fuzzy similarity measure based on
                                  equivalence relation with application in
                                  cluster analysis . . . . . . . . . . . . 148--154
            Qasim Ali Arain and   
                 Hina Memon and   
                Imran Memon and   
      Muhammad Hammad Memon and   
          Riaz Ahmed Shaikh and   
               Farman Ali Mangi   Intelligent travel information platform
                                  based on location base services to
                                  predict user travel behavior from
                                  user-generated GPS traces  . . . . . . . 155--168
           Kalyani Krishnan and   
            Reshmy Krishnan and   
            Ayyakannu Muthumari   A semantic-based ontology mapping ---
                                  information retrieval for mobile
                                  learning resources . . . . . . . . . . . 169--178

International Journal of Computer Applications
Volume 39, Number 4, 2017

                   K. Sehil and   
                     M. Darwish   Critical analysis of power conversion
                                  topologies for stand-alone PV systems
                                  with super-capacitor . . . . . . . . . . 179--188
                   Chi-Chou Kao   Improved feature extraction and
                                  classification methods for
                                  electroencephalographic signal based
                                  brain--computer interfaces . . . . . . . 189--197
            Matthew Russell and   
                  Jeremy Straub   Characterization of command software for
                                  an autonomous attitude determination and
                                  control system for spacecraft  . . . . . 198--209
                   Xia Chen and   
                   Chang Lu and   
                 Qiaoyu Tan and   
                     Guoxian Yu   Semi-supervised classification based on
                                  clustering adjusted similarity . . . . . 210--219
                      Yi Lu and   
                  Cuicui Bi and   
                   Nijia Ye and   
                          Hu Bo   Auto-establishing simulation parallel
                                  manipulators with linear legs and
                                  auto-solving their workspaces by
                                  utilizing CAD variation geometry . . . . 220--233
                      Anonymous   Editorial Board  . . . . . . . . . . . . (ei)


International Journal of Computer Applications
Volume 40, Number 1, 2018

             Thekra Aldouri and   
                     Mhand Hifi   A hybrid reactive search for solving the
                                  max-min knapsack problem with
                                  multi-scenarios  . . . . . . . . . . . . 1--13
          Amid Khatibi Bardsiri   A new combinatorial framework for
                                  software services development effort
                                  estimation . . . . . . . . . . . . . . . 14--24
             Jeng Feng Chin and   
             Joshua Prakash and   
         Shahrul Kamaruddin and   
          Melissa Chea Ling Tan   Automating computer simulation and
                                  statistical analysis in production
                                  planning and control research  . . . . . 25--41
              Ali Belhocine and   
             Wan Zaidi Wan Omar   A numerical parametric study of
                                  mechanical behavior of dry contacts
                                  slipping on the disc-pads interface  . . 42--60

International Journal of Computer Applications
Volume 40, Number 2, 2018

       Al-Sakib Khan Pathan and   
            Zubair Md Fadlullah   Foreword from the Editors-in-Chief . . . 61--62
                Rumpa Hazra and   
                Shouvik Dey and   
               Jayashree Singha   Modeling, analysis and verification of
                                  real-time resource access control
                                  protocols: a formal approach . . . . . . 63--72
                Rahul Desai and   
                    B. P. Patil   Adaptive routing based on predictive
                                  reinforcement learning . . . . . . . . . 73--81
                 Guodong Li and   
                   Qian Liu and   
                       Shuo Bai   A novel model to improve network
                                  performance  . . . . . . . . . . . . . . 82--87
              R. R. Bhavani and   
                G. Wiselin Jiji   Image registration for varicose ulcer
                                  classification using KNN classifier  . . 88--97
               Laxman Singh and   
           Zainul Abdin Jaffery   Computerized detection of breast cancer
                                  in digital mammograms  . . . . . . . . . 98--109
                  Abhinav Dayal   Improving adaptive frameless rendering   110--120

International Journal of Computer Applications
Volume 40, Number 3, 2018

                      Anonymous   Preface  . . . . . . . . . . . . . . . . 1--1
               Ruihong Zhou and   
               Qiaoming Liu and   
                 Xuming Han and   
                     Limin Wang   Density Peak Clustering algorithm using
                                  knowledge learning-based fruit fly
                                  optimization . . . . . . . . . . . . . . 1--10
                 Limin Wang and   
                Mingyang Li and   
                 Xuming Han and   
                   Kaiyue Zheng   An improved density-based spatial
                                  clustering of application with noise . . 1--7
                   Cao Yong and   
                 Mu Yongmin and   
                      Shen Meie   Data change analysis based on function
                                  call path  . . . . . . . . . . . . . . . 1--10
                    Feng Li and   
                 Yawen Wang and   
                   Yunzhan Gong   Test input generation of bitwise
                                  operation based on four-valued logic . . 1--8
                Honglei Zhu and   
                  Dahai Jin and   
                   Yunzhan Gong   False positive elimination in suspected
                                  code fault automatic confirmation  . . . 1--9
                 Limin Wang and   
               Kaiyue Zheng and   
                   Xing Tao and   
                     Xuming Han   Affinity propagation clustering
                                  algorithm based on large-scale data-set  1--6
                 Limin Wang and   
                Nianbo Wang and   
                 Xuming Han and   
                   Yizhang Wang   Semi-supervised hierarchical
                                  optimization-based affinity propagation
                                  algorithm and its applications . . . . . 1--10
                   Hao Chen and   
               Dongmei Zhao and   
                    Kan Liu and   
                     Wen Wu and   
                        Li Wang   Improving reliability of cloud computing
                                  services for next generation mobile
                                  communication networks . . . . . . . . . 1--7

International Journal of Computer Applications
Volume 40, Number 4, 2018

           Al-Sakib Khan Pathan   Technological advancements and
                                  innovations are often detrimental for
                                  concerned technology companies . . . . . 189--191
                   Yue Shen and   
               Fida Hussain and   
                    Hui Liu and   
                   Destaw Addis   Power quality disturbances
                                  classification based on curvelet
                                  transform  . . . . . . . . . . . . . . . 192--201
            Harish Radhappa and   
                    Lei Pan and   
             James Xi Zheng and   
                      Sheng Wen   Practical overview of security issues in
                                  wireless sensor network applications . . 202--213
      Somayeh Saraf Esmaili and   
            Keivan Maghooli and   
            Ali Motie Nasrabadi   A new model for face detection in
                                  cluttered backgrounds using saliency map
                                  and C$_2$ texture features . . . . . . . 214--222
                Ebtsam Adel and   
          Shaker El-Sappagh and   
             Sherif Barakat and   
                Mohammed Elmogy   Distributed electronic health record
                                  based on semantic interoperability using
                                  fuzzy ontology: a survey . . . . . . . . 223--241


International Journal of Computer Applications
Volume 41, Number 1, 2018

              Sandeep Joshi and   
                Monika Jain and   
                   Rahul Saxena   Recent trends in communication and
                                  computational intelligence . . . . . . . 1--1
               Hargeet Kaur and   
                     Atul Kumar   Analyzing the efficiency of partially
                                  entangled states in Vaidman's-type games
                                  and its applications in Quantum Secret
                                  Sharing  . . . . . . . . . . . . . . . . 2--13
               Suman Bhakar and   
         Devershi Pallavi Bhatt   Optimizing latency time of the AR system
                                  through glyph detection  . . . . . . . . 14--30
        Bhoopendra Pachauri and   
                 Ajay Kumar and   
                    Joydip Dhar   Reliability analysis of open source
                                  software systems considering the effect
                                  of previously released version . . . . . 31--38
             Sophiya Sheikh and   
             Aitha Nagaraju and   
                Mohammad Shahid   A Parallelized Dynamic Task Scheduling
                                  for Batch of Task in a computational
                                  grid . . . . . . . . . . . . . . . . . . 39--53
               Anjali Ahuja and   
               Anamika Jain and   
                     Madhu Jain   Finite population multi-server retrial
                                  queueing system with an optional service
                                  and balking  . . . . . . . . . . . . . . 54--61
             Partho Mallick and   
              Priyanka Seth and   
                   Anupam Ghosh   Entropy-based fuzzy hybrid framework for
                                  gene prediction network --- an
                                  application to identify and rank the
                                  biomarkers for human lung adenocarcinoma 62--77
             Inderdeep Kaur and   
             Parminder Kaur and   
                  Hardeep Singh   An empirical evaluation of an advanced
                                  version control tool in conflict
                                  detection and resolution . . . . . . . . 78--87

International Journal of Computer Applications
Volume 41, Number 2, 2017

               Bingyang Wei and   
          Harry S. Delugach and   
                        Yi Wang   From state diagrams to sequence
                                  diagrams: a requirements acquisition
                                  approach . . . . . . . . . . . . . . . . 89--111
              R. R. Darwish and   
                 Abdullah Elewi   A green proactive orchestration
                                  architecture for cloud resources . . . . 112--128
              Fahd Alqasemi and   
           Amira Abdelwahab and   
               Hatem Abdelkader   Constructing automatic domain-specific
                                  sentiment lexicon using KNN search via
                                  terms discrimination vectors . . . . . . 129--139
         Zhiqiang (John) Wu and   
           Sampson Gholston and   
                  Letha Etzkorn   An approach to finding good anchor nodes
                                  in ontologies  . . . . . . . . . . . . . 140--148
                Felix Obite and   
           Geoffrey Ijeomah and   
           Joseph Stephen Bassi   Carbon nanotube field effect
                                  transistors: toward future nanoscale
                                  electronics  . . . . . . . . . . . . . . 149--164

International Journal of Computer Applications
Volume 41, Number 3, 2017

    Frederic Nzanywayingoma and   
                      Yang Yang   Efficient resource management techniques
                                  in cloud computing environment: a review
                                  and discussion . . . . . . . . . . . . . 165--182
          K. V. Rama Satish and   
                    N. P. Kavya   A framework for big data pre-processing
                                  and search optimization using HMGA-ACO:
                                  a hierarchical optimization approach . . 183--194
        Ranjit Kumar Behera and   
      K. Hemant Kumar Reddy and   
             Diptendu Sinha Roy   Modeling and assessing reliability of
                                  service-oriented internet of things  . . 195--206
               Ziaur Rahman and   
                  Yi-Fei Pu and   
             Muhammad Aamir and   
                   Farhan Ullah   A framework for fast automatic image
                                  cropping based on deep saliency map
                                  detection and Gaussian filter  . . . . . 207--217
           Partha Chowdhuri and   
                Pabitra Pal and   
                 Biswapati Jana   Improved data hiding capacity through
                                  repeated embedding using modified
                                  weighted matrix for color image  . . . . 218--232
              Sharmin Jahan and   
         Mozammel Chowdhury and   
                  Rafiqul Islam   Robust user authentication model for
                                  securing electronic healthcare system
                                  using fingerprint biometrics . . . . . . 233--242

International Journal of Computer Applications
Volume 41, Number 4, 2019

             G. Ranganathan and   
               Hui-Ming Wee and   
                   Pavel Lafata   Editorial on IoT in Social, Mobility,
                                  Analytics & Cloud [ISMAC] . . . . . . . . 243--244
        Hima Bindu Valiveti and   
         Trinatha Rao Polipalli   Performance analysis of SLTC-D2D
                                  handover mechanism in software-defined
                                  networks . . . . . . . . . . . . . . . . 245--254
          Anil Kumar Budati and   
         Trinatha Rao Polipalli   Performance analysis of HFDI computing
                                  algorithm in intelligent networks  . . . 255--261
                      Yan Zhang   Classified scheduling algorithm of big
                                  data under cloud computing . . . . . . . 262--267
                     Hongtao Li   Estimation of stadium construction
                                  schedule based on big data analysis  . . 268--275
                    Mingyuan Hu   Logistics vehicle tracking method based
                                  on intelligent vision  . . . . . . . . . 276--282
                Fengqiong Zhang   Research on reliability analysis of
                                  computer network based on intelligent
                                  cloud computing method . . . . . . . . . 283--288
                        Jia Zhu   Research on data mining of electric
                                  power system based on Hadoop cloud
                                  computing platform . . . . . . . . . . . 289--295
           K. Koteswara Rao and   
               G. S. V. P. Raju   Reducing interactive fault proneness in
                                  software application using genetic
                                  algorithm based optimal directed random
                                  testing  . . . . . . . . . . . . . . . . 296--305
                     Shiqi Yang   Analysis for the reliability of computer
                                  network by using intelligent cloud
                                  computing method . . . . . . . . . . . . 306--311
               Geeta Sharma and   
                  Sheetal Kalra   Advanced multi-factor user
                                  authentication scheme for E-governance
                                  applications in smart cities . . . . . . 312--327


International Journal of Computer Applications
Volume 42, Number 1, 2017

                S. Ramasamy and   
                     K. Nirmala   Disease prediction in data mining using
                                  association rule mining and keyword
                                  based clustering algorithms  . . . . . . 1--8
              D. Jayaprabha and   
                     K. Nirmala   Efficiency stress prediction in BPO
                                  industries using hybrid $k$-means and
                                  artificial bee colony algorithm  . . . . 9--16
            M. P. A. Buhari and   
                 S. K. Mohideen   A combination of fuzzy positioned dental
                                  X-ray analysis model to presume the
                                  peculiar images  . . . . . . . . . . . . 17--22
          A. Krishnamoorthy and   
                 V. Vijayarajan   Energy aware routing technique based on
                                  Markov model in wireless sensor network  23--29
                      Zhang Hao   Design of WSN traffic forecasting system
                                  with delayed self-sensing  . . . . . . . 30--35
                     Min Hu and   
                        Wei Cai   Evacuation simulation and layout
                                  optimization of cruise ship based on
                                  cellular automata  . . . . . . . . . . . 36--44
                 ShuRen Liu and   
              ChangNing Cai and   
                  QiWei Zhu and   
                   N. Arunkumar   A study of software pools for
                                  seismogeology-related software based on
                                  the Docker technique . . . . . . . . . . 45--51
                    Wang Ya and   
              Zhou Meng-Ran and   
                    Niu Lei and   
                       Zhao Jia   Trust analysis of WSN nodes based on
                                  fuzzy theory . . . . . . . . . . . . . . 52--56
                       Wang Lin   Quantitative analysis of
                                  spatial--temporal variation and relation
                                  of LST and relevant ecological elements  57--66
             Huang Changhai and   
                Hu Shenping and   
                Kong Fancun and   
                  Xuan Shaoyong   Vulnerability analysis of inland
                                  waterways network base on complex
                                  network theory . . . . . . . . . . . . . 67--75
                Liao Wenguo and   
                 Liao Guangping   Incremental semantic web retrieval model
                                  based on web service . . . . . . . . . . 76--83
           Zhang Yong-xiong and   
            Wang Liang-ming and   
                      Yi Lu-xia   A network attack discovery algorithm
                                  based on unbalanced sampling vehicle
                                  evolution strategy for intrusion
                                  detection  . . . . . . . . . . . . . . . 84--92
             Liangchen Chen and   
                    Shu Gao and   
                    Xiufeng Cao   Research on real-time outlier detection
                                  over big data streams  . . . . . . . . . 93--101
                         Tao Ye   Internet of Things financial data
                                  capture technology based on improved
                                  particle swarm optimization FLFNN  . . . 102--107
                Mohit Kumar and   
                   S. C. Sharma   Dynamic load balancing algorithm to
                                  minimize the makespan time and utilize
                                  the resources effectively in cloud
                                  environment  . . . . . . . . . . . . . . 108--117

International Journal of Computer Applications
Volume 42, Number 2, 2017

                  Limiao Li and   
              Zhihong Zhang and   
               Zhixiong Liu and   
                     Hui Ye and   
                        Keke He   Social big data oriented trust situation
                                  risk model based on individual behavior  119--126
          Alexander Agathos and   
               Philip Azariadis   3D reconstruction of skeletal mesh
                                  models and human foot biomodel
                                  generation using semantic
                                  parametric-based deformation . . . . . . 127--140
                        Dan Ren   Research and analysis on precise
                                  matching method for multi-feature of
                                  fuzzy digital image  . . . . . . . . . . 141--149
                        Yan Hou   Chaos sequence data classification
                                  mining research under network
                                  visualization analysis . . . . . . . . . 150--156
                  Hongben Huang   Research on feature classification
                                  method of network text data based on
                                  association rules  . . . . . . . . . . . 157--163
              A. Suruliandi and   
              J. C. Kavitha and   
                   D. Nagarajan   An empirical evaluation of recent
                                  texture features for the classification
                                  of natural images  . . . . . . . . . . . 164--173
                  Xiangfei Meng   Complex network anomaly recognition
                                  integrating multi-source and large data  174--178
                       Taibo He   Optimization of the large data spatial
                                  information decision support service
                                  system dependent on the solution of the
                                  information entropy equation . . . . . . 179--186
                     Yukun Dong   Detecting all potential null
                                  dereferences based on points-to property
                                  sound analysis . . . . . . . . . . . . . 187--195
      Sunday Oyinlola Ogundoyin   An autonomous lightweight conditional
                                  privacy-preserving authentication scheme
                                  with provable security for vehicular
                                  ad-hoc networks  . . . . . . . . . . . . 196--211

International Journal of Computer Applications
Volume 42, Number 3, 2019

          Mohammad Shojafar and   
                  Mehdi Sookhak   Internet of Everything, Networks,
                                  Applications, and Computing Systems
                                  (IoENACS)  . . . . . . . . . . . . . . . 213--215
                     Weihua Yao   Application of computer digital
                                  simulation technology in action
                                  structure image research on martial art  216--221
           P. Parthasarathy and   
                S. Vivekanandan   A typical IoT architecture-based regular
                                  monitoring of arthritis disease using
                                  time wrapping algorithm  . . . . . . . . 222--232
               Sanju Mishra and   
                    Sarika Jain   Ontologies as a semantic model in IoT    233--243
              Samaher Al Janabi   Smart system to create an optimal higher
                                  education environment using IDA and IOTs 244--259
                   Song Tao and   
                 Zhuang Lei and   
                   Jing Chenkai   Multi-frame moving video detection
                                  algorithm for IOT based on Gauss Monte
                                  Carlo particle filter  . . . . . . . . . 260--265
      Ambarish G. Mohapatra and   
             Bright Keswani and   
              Shivani Nanda and   
               Abhishek Ray and   
              Ashish Khanna and   
               Deepak Gupta and   
                 Poonam Keswani   Precision local positioning mechanism in
                                  underground mining using IoT-enabled
                                  WiFi platform  . . . . . . . . . . . . . 266--277
               Zhu Qianqian and   
                 Wang Dongliang   A SVM recommendation IoT model based on
                                  similarity evaluation and collaborative
                                  filtering of multi-angle knowledge units 278--281
           Van Luong Nguyen and   
                       Ying Xia   IoT based user trajectory retrieval and
                                  discovery algorithm based on
                                  spatial--temporal correlation analysis   282--289
    Mahammad Shareef Mekala and   
                 P. Viswanathan   A survey: energy-efficient sensor and VM
                                  selection approaches in green computing
                                  for X-IoT applications . . . . . . . . . 290--305
                 G. Kalyani and   
               Shilpa Chaudhari   An efficient approach for enhancing
                                  security in Internet of Things using the
                                  optimum authentication key . . . . . . . 306--314
      Sunday Oyinlola Ogundoyin   A lightweight privacy-preserving data
                                  aggregation scheme with provable
                                  security for Internet-of-Things  . . . . 315--327

International Journal of Computer Applications
Volume 42, Number 4, 2017

               Armin Anvari and   
                    Lei Pan and   
                       Xi Zheng   Generating security questions for better
                                  protection of user privacy . . . . . . . 329--350
                 Xiaofei Xu and   
                 Zeyu Zhang and   
                Yanbin Chen and   
                          Li Li   HMM-based predictive model for enhancing
                                  data quality in WSN  . . . . . . . . . . 351--359
              Mahesh Goyani and   
                 Narendra Patel   Template matching and machine
                                  learning-based robust facial expression
                                  recognition system using multi-level
                                  Haar wavelet . . . . . . . . . . . . . . 360--371
Akalanka Karunarathne Mudiyanselage and   
                        Lei Pan   Security test MOODLE: a penetration
                                  testing case study . . . . . . . . . . . 372--382
              R. Nandakumar and   
                     K. Nirmala   Anonymity-based intra--inter and
                                  multiple layer service dependent
                                  security-aware packet scheduling
                                  algorithm (AIIMLSDSPS) . . . . . . . . . 383--391
               Cheng-Yu Fei and   
                   Zhong Su and   
                        Qing Li   A method of heading estimation for
                                  pedestrian navigation based on
                                  information compression MDL criteria . . 392--398
            Biswajit Biswas and   
               Biplab Kanti Sen   Medical image fusion using type-2 fuzzy
                                  and near-fuzzy set approach  . . . . . . 399--414
               Zhou Tao-Yun and   
              Lian Bao-wang and   
                       Zhang Yi   High precision nodes localization
                                  algorithm based on optimal
                                  dual-frequency comparison ranging  . . . 415--421
              Wenzhun Huang and   
                  Peng Wang and   
                  Lintao Lv and   
                Liping Wang and   
            Harry Haoxiang Wang   An inventive high-performance computing
                                  electronic information system for
                                  professional postgraduate training . . . 422--428

International Journal of Computer Applications
Volume 42, Number 5, 2018

                Chunhua Jin and   
               Guanhua Chen and   
                Changhui Yu and   
                  Jianyang Zhao   Deniable authenticated encryption for
                                  e-mail applications  . . . . . . . . . . 429--438
              Wanglong Chen and   
                 Lifeng Zhu and   
                  Xiaorui Zhang   Modeling deformable objects using local
                                  rigid body simulation  . . . . . . . . . 439--448
        Khadidja Bentlemsan and   
            Djamal Bennouar and   
            Dalila Tamzalit and   
           Khaled Walid Hidouci   A hybrid re-composition based on
                                  components and web services  . . . . . . 449--462
     Mohammed Elsaid Moussa and   
      Ensaf Hussein Mohamed and   
          Mohamed Hassan Haggag   A generic lexicon-based framework for
                                  sentiment analysis . . . . . . . . . . . 463--473
               Sheeraz Arif and   
          Tehseen Ul-Hassan and   
               Fida Hussain and   
                  Jing Wang and   
                     Zesong Fei   Video representation by dense
                                  trajectories motion map applied to human
                                  activity recognition . . . . . . . . . . 474--484
            Ahmad Al-Jarrah and   
                Enrico Pontelli   The collaborative virtual affinity group
                                  model: principles, design,
                                  implementation, and evaluation . . . . . 485--513
              Zohra Bouzidi and   
       Labib Sadek Terrissa and   
        Noureddine Zerhouni and   
                    Soheyb Ayad   An efficient cloud prognostic approach
                                  for aircraft engines fleet trending  . . 514--529
                      Anonymous   RETRACTED ARTICLE: Retraction  . . . . . 530--530

International Journal of Computer Applications
Volume 42, Number 6, 2020

           Al-Sakib Khan Pathan   Access to information vs blocking of
                                  information during COVID-19 pandemic: a
                                  governance dilemma in the era of
                                  crowdsourcing based on ICT . . . . . . . 531--532
             Zhongliang Liu and   
                 Lili Huang and   
                 Xiaoliang Zong   Clustering analysis method and
                                  implementation in the MapReduce model
                                  for solving data-intensive problems  . . 533--543
                    Tong Yi and   
                      Chun Fang   A complexity metric for object-oriented
                                  software . . . . . . . . . . . . . . . . 544--549
                    Jian Ma and   
              Runtong Zhang and   
                Xiaomin Zhu and   
                      Runqi Cao   Process ontology technology in modeling
                                  clinical pathway information system  . . 550--557
                 Xuming Han and   
               Qiaoming Liu and   
                 Limin Wang and   
                  Huimin Lu and   
                Liyuan Zhou and   
                    Junhua Wang   An improved fruit fly optimization
                                  algorithm based on knowledge memory  . . 558--568
                 Hong Liang and   
                   Yuan Gao and   
                 Yunlei Sun and   
                       Xiao Sun   CEP: calories estimation from food
                                  photos . . . . . . . . . . . . . . . . . 569--577
                Aiping Zhou and   
                    Hongbing Li   A QoS guarantee approach for multimedia
                                  software system  . . . . . . . . . . . . 578--588
  Manmeet Mahinderjit Singh and   
               Ke Wan Ching and   
           Asrulnizam Abd Manaf   A novel out-of-band biometrics
                                  authentication scheme for wearable
                                  devices  . . . . . . . . . . . . . . . . 589--601
                   Hui Yang and   
                  Peter A. Bath   Predicting loneliness in older age using
                                  two measures of loneliness . . . . . . . 602--615
                Yi-Ju Tseng and   
                   Yu-Lien Shih   Developing epidemic forecasting models
                                  to assist disease surveillance for
                                  influenza with electronic health records 616--621
                   S. Sapna and   
                      A. Renuka   Computer-aided system for Leukocyte
                                  nucleus segmentation and Leukocyte
                                  classification based on nucleus
                                  characteristics  . . . . . . . . . . . . 622--633

International Journal of Computer Applications
Volume 42, Number 7, 2018

                M. Anbarasi and   
             M. A. Saleem Durai   Prediction of protein folding kinetics
                                  states using hybrid brainstorm
                                  optimization . . . . . . . . . . . . . . 635--643
                  Hu Xinxin and   
                 Liang Fengshou   Keyword search method of distributed
                                  file in large data environment . . . . . 644--648
              Wei Xiaoqiong and   
                   Yin E. Zhang   Image segmentation algorithm based on
                                  dynamic particle swarm optimization and
                                  $K$-means clustering . . . . . . . . . . 649--654
                  Jia Ru-Da and   
              Chen Yong-Gao and   
                   Zhang Yin E.   Fusion algorithm of infrared and visible
                                  images based on frame difference
                                  detection technology and area feature    655--660
             Manal Abdullah and   
              Muna AlMasawa and   
              Ibtihal Makki and   
               Maha Alsolmi and   
                  Samar Mahrous   Emotions extraction from Arabic tweets   661--675
             Rubina Parveen and   
           Subhash Kulkarni and   
                    V. D. Mytri   Automated extraction and discrimination
                                  of open land areas from IRS-1C LISS III
                                  imagery  . . . . . . . . . . . . . . . . 676--685
                  Anil Garg and   
                     O. P. Sahu   A hybrid approach for speech enhancement
                                  using Bionic wavelet transform and
                                  Butterworth filter . . . . . . . . . . . 686--696
             Rafik Menassel and   
                Idriss Gaba and   
                    Khalil Titi   Introducing BAT inspired algorithm to
                                  improve fractal image compression  . . . 697--704
              Miloud Khaldi and   
            Mohammed Rebbah and   
           Boudjelal Meftah and   
                     Omar Smail   Fault tolerance for a scientific
                                  workflow system in a Cloud computing
                                  environment  . . . . . . . . . . . . . . 705--714
               Honey Jindal and   
              Neetu Sardana and   
                   Raghav Mehta   Efficient web navigation prediction
                                  using hybrid models based on multiple
                                  evidence combinations  . . . . . . . . . 715--728

International Journal of Computer Applications
Volume 42, Number 8, 2018

              Gerard Deepak and   
              B. N. Shwetha and   
               C. N. Pushpa and   
                J. Thriveni and   
                K. R. Venugopal   A hybridized semantic trust-based
                                  framework for personalized web page
                                  recommendation . . . . . . . . . . . . . 729--739
                 Xuexin Gao and   
                 Yongmin Mu and   
                      Meie Shen   The research of endless loop detection
                                  method based on the basic path . . . . . 740--747
            Abejide Ade-Ibijola   Synthesis of regular expression problems
                                  and solutions  . . . . . . . . . . . . . 748--764
               E. A. Zanaty and   
                   Ashraf Afifi   Generalized Hermite kernel function for
                                  support vector machine classifications   765--773
                Wenjun Wang and   
                   Wei-Ming Lin   System performance enhancement with
                                  thread suspension for simultaneous
                                  multi-threading processors . . . . . . . 774--786
            Ghazi Al-Naymat and   
      Mouhammd Al-Kasassbeh and   
                     Zyad Sober   Pairs trading strategy: a recommendation
                                  system . . . . . . . . . . . . . . . . . 787--797
         Mozammel Chowdhury and   
                 Junbin Gao and   
                  Rafiqul Islam   Extracting depth information from stereo
                                  images using a fast correlation matching
                                  algorithm  . . . . . . . . . . . . . . . 798--803


International Journal of Computer Applications
Volume 43, Number 1, 2018

               Hasan Jafari and   
               Mousa Nazari and   
       Shahaboddin Shamshirband   Optimization of energy consumption in
                                  wireless sensor networks using
                                  density-based clustering algorithm . . . 1--10
             Wolali Ametepe and   
               Changda Wang and   
       Selasi Kwame Ocansey and   
                 Xiaowei Li and   
                   Fida Hussain   Data provenance collection and security
                                  in a distributed environment: a survey   11--25
             Khuram Shahzad and   
               Zeng Jianqiu and   
          Muhammad Azam Zia and   
              Aliya Shaheen and   
                   Taiba Sardar   Essential factors for adopting hospital
                                  information system: a case study from
                                  Pakistan . . . . . . . . . . . . . . . . 26--37
           Partha Chowdhuri and   
             Biswapati Jana and   
                   Debasis Giri   Secured steganographic scheme for highly
                                  compressed color image using weighted
                                  matrix through DCT . . . . . . . . . . . 38--49
       Afnan Salem Babrahem and   
       Muhammad Mostafa Monowar   Preserving confidentiality and privacy
                                  of the patient's EHR using the OrBAC and
                                  AES in cloud environment*  . . . . . . . 50--61
   Shahaboddin Shamshirband and   
              Hossein Soleimani   LAAPS: an efficient file-based search in
                                  unstructured peer-to-peer networks using
                                  reinforcement algorithm  . . . . . . . . 62--69
           Amira Hadj Fredj and   
                   Jihene Malek   A fast and robust OSRAD filter for
                                  telemedicine applications  . . . . . . . 70--79
   C. B. David Joel Kishore and   
              T. Bhaskara Reddy   An efficient approach for land record
                                  classification and information retrieval
                                  in data warehouse  . . . . . . . . . . . 80--89

International Journal of Computer Applications
Volume 43, Number 2, 2018

               K. C. Okafor and   
              G. C. Ononiwu and   
                Sam Goundar and   
             V. C. Chijindu and   
                    C. C. Udeze   Towards complex dynamic fog network
                                  orchestration using embedded neural
                                  switch . . . . . . . . . . . . . . . . . 91--108
               Sanju Mishra and   
               Rafid Sagban and   
                 Ali Yakoob and   
                  Niketa Gandhi   Swarm intelligence in anomaly detection
                                  systems: an overview . . . . . . . . . . 109--118
        N. Venkatesvara Rao and   
      D. Venkatavara Prasad and   
                   M. Sugumaran   Real-time video object detection and
                                  classification using hybrid texture
                                  feature extraction . . . . . . . . . . . 119--126
       Syed Muhammad Mohsin and   
             Imran Ali Khan and   
  Syed Muhammad Abrar Akber and   
   Shahaboddin Shamshirband and   
        Anthony T. Chronopoulos   Exploring the RFID mutual authentication
                                  domain . . . . . . . . . . . . . . . . . 127--141
                   Fan Rong and   
                 Zhang Juan and   
                  Zhao ShuoFeng   Surgical navigation technology based on
                                  computer vision and VR towards IoT . . . 142--146
                 Duan Dagao and   
                       Gao Yang   Preprocessing technology of consuming
                                  big data based on user interest with
                                  Internet of Location Mining  . . . . . . 147--152
                      Wang Ying   Positioning algorithm based on linear
                                  embedding optimization in internet of
                                  sensor network . . . . . . . . . . . . . 153--158
                 Siyang Liu and   
                    Cheng Zhang   Personalized file data query matching
                                  method based on SOA  . . . . . . . . . . 159--164
                       Yang Fan   Key web search algorithm based on
                                  service ontology . . . . . . . . . . . . 165--170
                       Zhang Di   Online traffic flow assignment method
                                  based on structure matching selection of
                                  multilevel road network  . . . . . . . . 171--175
                Mao Dianhui and   
                     Song Zihao   A prediction model of micro-blog
                                  affective hotspots based on SVM
                                  collaborative filtering recommendation
                                  model  . . . . . . . . . . . . . . . . . 176--180
                          Ze Wu   Local-global iterative linear embedding
                                  optimization-based positioning algorithm
                                  in sensor network  . . . . . . . . . . . 181--185
                      Xu Li and   
                       Lan Ling   Internet of target perception event
                                  driven based on machine vision using a
                                  fast extraction algorithm  . . . . . . . 186--192
                  Li Hongli and   
                     Ma Yaofeng   Internet of moving target detection
                                  method based on nonparametric background
                                  model  . . . . . . . . . . . . . . . . . 193--198

International Journal of Computer Applications
Volume 43, Number 3, 2018

              Sankhanil Dey and   
                   Ranjan Ghosh   A smart review and two new techniques
                                  using 4-bit Boolean functions for
                                  cryptanalysis of 4-bit crypto S-boxes    199--217
              Ankita Jiyani and   
             Mehul Mahrishi and   
               Yogesh Meena and   
                 Girdhari Singh   NAM: a nearest acquaintance modeling
                                  approach for VM allocation using R-Tree  218--225
              Mansoor Fateh and   
                 Mohsen Rezvani   An email-based high capacity text
                                  steganography using repeating characters 226--232
              Yassir Samadi and   
             Mostapha Zbakh and   
                 Claude Tadonki   DT-MG: many-to-one matching game for
                                  tasks scheduling towards resources
                                  optimization in cloud computing  . . . . 233--245
           B. S. Premananda and   
              Nupur K. Neti and   
               K. P. Ashwin and   
                 Shreya V. Basu   An energy-efficient, coalition game
                                  theory based hierarchical routing
                                  protocol for WSNs  . . . . . . . . . . . 246--256
              Amin Mansouri and   
               Babak Majidi and   
                Abdolah Shamisa   Metaheuristic neural networks for
                                  anomaly recognition in industrial sensor
                                  networks with packet latency and jitter
                                  for smart infrastructures  . . . . . . . 257--266
              Shabina Sayed and   
                  Rakesh Poonia   Probability-weighted ensemble classifier
                                  using holoentropy-enabled decision tree
                                  for data stream classification . . . . . 267--281
              Ju-Yuan Hsiao and   
               Ai-Chieh Pan and   
                   Po-Yueh Chen   An adaptive reversible data hiding
                                  scheme using dual stego-image  . . . . . 282--291
                 S. Adhirai and   
             Paramjit Singh and   
      Rajendra Prasad Mahapatra   Circular interpolation and
                                  chronological-whale optimization based
                                  privacy preservation in cloud  . . . . . 292--304

International Journal of Computer Applications
Volume 43, Number 4, 2018

                   Kou Xiaoming   Analysis on the Internet public opinions
                                  in the era of We media based on fast
                                  dual-cycle level set . . . . . . . . . . 305--309
                       Fan Yang   Model of network video retrieval of
                                  dynamic Bayesian network optimization
                                  for the mobile terminal  . . . . . . . . 310--314
                 Wang Tiancheng   Online student achievement prediction
                                  model based on Data Envelopment Analysis
                                  (DEA) for multidimensional educational
                                  internet of data mining  . . . . . . . . 315--319
                  Zhang Duo and   
                   Guo Rui-Fang   An adaptive Bayesian tracking algorithm
                                  for Internet of motion parameters based
                                  on explicit formulation and integral
                                  contour model  . . . . . . . . . . . . . 320--325
     K. Venkata Vara Prasad and   
                P. Trinatha Rao   Performance of blind detection frame
                                  work using energy detection approach for
                                  local sensing in intelligent networks    326--332
                M. Mehfooza and   
                V. Pattabiraman   SP-DDPT: a simple prescriptive-based
                                  domain data preprocessing technique to
                                  support multilabel-multicriteria
                                  learning with expert information . . . . 333--339
                      Xiao Bayi   Real-time visual transmission mechanism
                                  of graphics diversity based on mobile 3D
                                  graphics matching algorithm  . . . . . . 340--345
                   Junjun Huang   Smart plant project scheduling
                                  optimization based on hidden Markov
                                  algorithm  . . . . . . . . . . . . . . . 346--351
              Li Cheng-Bing and   
                     Mao Xi-hao   Array sensors online pattern recognition
                                  based on FCM and ANFIS . . . . . . . . . 352--359
                      Lu Yuting   A $3$-D geographic location routing
                                  protocol based on forward region
                                  adaptive . . . . . . . . . . . . . . . . 360--366
                   V. Navya and   
                P. Deepalakshmi   Threshold-based energy-efficient routing
                                  for transmission of critical
                                  physiological parameters in a wireless
                                  body area network under emergency
                                  scenarios  . . . . . . . . . . . . . . . 367--376
                     Dong Yindi   Multi-classification analysis of large
                                  data based on knowledge element in
                                  micro-blog short text  . . . . . . . . . 377--382
                         Li Pei   Community discovery method based on
                                  complex network of data fusion based on
                                  the super network perspective  . . . . . 383--390
                        Li Chen   Neighborhood optimization of intelligent
                                  wireless mobile network based on big
                                  data technology  . . . . . . . . . . . . 391--400

International Journal of Computer Applications
Volume 43, Number 5, 2018

           Dhiren P. Bhagat and   
             Himanshukumar Soni   Target tracking in a wireless sensor
                                  network using a multi-step KF-PSO model  401--412
              Archana Patel and   
                    Sarika Jain   Present and future of semantic web
                                  technologies: a research statement . . . 413--422
                J. V. Anand and   
                   P. Sivanesan   Certain investigations of underwater
                                  wireless sensors synchronization and
                                  funneling effect . . . . . . . . . . . . 423--430
           Selvaraj Kesavan and   
          E. Saravana Kumar and   
             Abhishek Kumar and   
                  K. Vengatesan   An investigation on adaptive HTTP media
                                  streaming Quality-of-Experience (QoE)
                                  and agility using cloud media services   431--444
        V. T. Venkateswarlu and   
        P. V. Naganjaneyulu and   
                      D. N. Rao   Delay sensitive data routing
                                  optimization using rendezvous agents in
                                  wireless sensor networks with mobile
                                  sink . . . . . . . . . . . . . . . . . . 445--452
                   Zhi Yuan and   
               Weiqing Wang and   
                        Shan He   Application of sustainable computing
                                  based advanced intelligent power
                                  electronic technology for smart grid
                                  systems  . . . . . . . . . . . . . . . . 453--461
                 M. Dharani and   
                G. Sreenivasulu   Land use and land cover change detection
                                  by using principal component analysis
                                  and morphological operations in remote
                                  sensing applications . . . . . . . . . . 462--471
          Rajeev Kumar Bedi and   
            Jaswinder Singh and   
              Sunil Kumar Gupta   An efficient and secure privacy
                                  preserving multi-cloud storage framework
                                  for mobile devices . . . . . . . . . . . 472--482
                Sonia Mehla and   
                    Sarika Jain   Development and evaluation of knowledge
                                  treasure for emergency situation
                                  awareness  . . . . . . . . . . . . . . . 483--493
G. S. S. S. S. V. Krishna Mohan and   
      Yarravarapu Srinivasa Rao   An efficient design of fractional order
                                  differentiator using hybrid Shuffled
                                  frog leaping algorithm for handling
                                  noisy electrocardiograms . . . . . . . . 494--500

International Journal of Computer Applications
Volume 43, Number 6, 2019

             Amanpreet Kaur and   
        Jagroop Singh Sidhu and   
          Jaskarn Singh Bhullar   Adaptive deblocking technique based on
                                  separate modes for removing compression
                                  effects in JPEG coded images . . . . . . 501--513
             Anil B. Gavade and   
            Vijay S. Rajpurohit   Systematic analysis of satellite
                                  image-based land cover classification
                                  techniques: literature review and
                                  challenges . . . . . . . . . . . . . . . 514--523
                 Divya Jain and   
                 Vijendra Singh   A two-phase hybrid approach using
                                  feature selection and Adaptive SVM for
                                  chronic disease classification . . . . . 524--536
               Naveen Kumar and   
       Ashutosh Kumar Singh and   
            Shashank Srivastava   Feature selection for interest flooding
                                  attack in named data networking  . . . . 537--546
                Poulami Das and   
         Sudip Kumar Naskar and   
           Sankar Narayan Patra   Fast Converging Cuckoo Search Algorithm
                                  to design symmetric FIR filters  . . . . 547--565
                 Oscar Karnalim   Source code plagiarism detection with
                                  low-level structural representation and
                                  information retrieval  . . . . . . . . . 566--576
                 Xuming Han and   
                   Li Zheng and   
                 Limin Wang and   
                 Hong Zheng and   
                       Xin Wang   Fireworks algorithm based on dynamic
                                  search and tournament selection  . . . . 577--588
       Rakcinpha Hatibaruah and   
           Vijay Kumar Nath and   
               Deepika Hazarika   An effective texture descriptor for
                                  retrieval of biomedical and face images
                                  based on co-occurrence of similar
                                  center-symmetric local binary edges  . . 589--600

International Journal of Computer Applications
Volume 43, Number 7, 2019

               K. Maheswari and   
                M. Ramakrishnan   Kernelized Spectral Clustering based
                                  Conditional MapReduce function with big
                                  data . . . . . . . . . . . . . . . . . . 601--611
                   K. C. Okafor   Dynamic reliability modeling of
                                  cyber-physical edge computing network    612--622
          Ravi Kumar Poluru and   
                Lokesh Kumar R.   An Improved Fruit Fly Optimization
                                  (IFFOA) based Cluster Head Selection
                                  Algorithm for Internet of Things . . . . 623--631
               S. Maheswari and   
                  Justus Selwyn   State behavior analysis in validating
                                  the web service framework  . . . . . . . 632--642
     Muddada Murali Krishna and   
                G. Lavanya Devi   Method of optimizing the dimensional
                                  features in sentiment analysis . . . . . 643--652
     Susant Kumar Panigrahi and   
             Supratim Gupta and   
              S. Vamsee Krishna   Quantitative evaluation of different
                                  thresholding methods using automatic
                                  reference image creation via PCA . . . . 653--662
            SatyaJaswanth Badri   A novel Map-Scan-Reduce based density
                                  peaks clustering and privacy protection
                                  approach for large datasets  . . . . . . 663--673
     D. Ferlin Deva Shahila and   
          S. H. Krishnaveni and   
              Valantina Stephen   Soft computing-based non-linear
                                  discriminate classifier for multimedia
                                  image quality enhancement  . . . . . . . 674--683
                    Chunhua Guo   The application of fractional wavelet
                                  transform in image enhancement . . . . . 684--690
      Somula Ramasubbareddy and   
                    R. Sasikala   RTTSMCE: a response time aware task
                                  scheduling in multi-cloudlet environment 691--696
            Tahar Mekhaznia and   
                  Akram Bennour   New approach for attack of
                                  permutation-based image encryption
                                  schemes  . . . . . . . . . . . . . . . . 697--705
                   Yuesheng Lou   Detection of trace elements in
                                  metallurgical products under complex
                                  background based on visual saliency  . . 706--714
                 Desheng Wu and   
                     Yuhui Guan   Artificial intelligence retrieval
                                  algorithm for text data from multiple
                                  data sources . . . . . . . . . . . . . . 715--719
                   Lei Wang and   
               Shanlin Yang and   
                 Aizhu Zhou and   
             Rongjing Huang and   
                 Shuai Ding and   
                   Hao Wang and   
                    Juncheng Hu   An intelligent gastric cancer screening
                                  method based on convolutional neural
                                  network and support vector machine . . . 720--725

International Journal of Computer Applications
Volume 43, Number 8, 2019

           M. M. Hafizur Rahman   HMMN: a cost-effective derivative of
                                  midimew-connected mesh network . . . . . 727--732
              Krishna Kumar and   
        Md. Tanwir Uddin Haider   Blended computation of machine learning
                                  with the recurrent neural network for
                                  intra-day stock market movement
                                  prediction using a multi-level
                                  classifier . . . . . . . . . . . . . . . 733--749
           Dalila Iabbassen and   
               Samira Moussaoui   Cooperative and hybrid energy efficient
                                  schemE for wireless sensor networks  . . 750--763
             Urvashi Sharma and   
             Meenakshi Sood and   
                Emjee Puthooran   A novel resolution independent gradient
                                  edge predictor for lossless compression
                                  of medical image sequences . . . . . . . 764--774
         Bodrunnessa Badhon and   
     Mir Md. Jahangir Kabir and   
                Shuxiang Xu and   
                   Monika Kabir   A survey on association rule mining
                                  based on evolutionary algorithms . . . . 775--785
     Mohammed Elsaid Moussa and   
      Ensaf Hussein Mohamed and   
          Mohamed Hassan Haggag   Opinion mining: a hybrid framework based
                                  on lexicon and machine learning
                                  approaches . . . . . . . . . . . . . . . 786--794
                 Neha Gupta and   
                Arun Sharma and   
          Manoj Kumar Pachariya   A novel approach for mutant
                                  diversity-based fault localization:
                                  DAM-FL . . . . . . . . . . . . . . . . . 795--804
             Raja Muthalagu and   
                    Subeen Jain   A novel modified KASUMI block cipher for
                                  global system for mobile communications  805--811
              Renae Aurisch and   
            Mohiuddin Ahmed and   
                     Abu Barkat   An outlook at Agile methodologies for
                                  the independent games developer  . . . . 812--818
               Conrado Ruiz Jr.   Multi-feature 3D model retrieval using
                                  view-based techniques  . . . . . . . . . 819--829
                 K. Pankaja and   
                        V. Suma   A hybrid approach combining CUR matrix
                                  decomposition and weighted kernel sparse
                                  representation for plant leaf
                                  recognition  . . . . . . . . . . . . . . 830--840
                  A. Nishad and   
                Sajimon Abraham   SemTraClus: an algorithm for clustering
                                  and prioritizing semantic regions of
                                  spatio-temporal trajectories . . . . . . 841--850

International Journal of Computer Applications
Volume 43, Number 9, 2019

            Purbanka Pahari and   
               Piyali Basak and   
                  Anasua Sarkar   Ensemble based biomarker identification
                                  on pancreatic ductal adenocarcinoma gene
                                  expressions  . . . . . . . . . . . . . . 851--857
               K. S. Gautam and   
        Senthil Kumar Thangavel   Video analytics-based facial emotion
                                  recognition system for smart buildings   858--867
                       Wei Wang   An algorithm for rationality estimation
                                  of movement trend based on big data
                                  analysis . . . . . . . . . . . . . . . . 868--873
      P. V. Venkateswaramma and   
          I. Ravi Prakash Reddy   Node pattern state and trust-rate base
                                  route selection for reliable data
                                  transmission in mobile ad hoc networks   874--880
                  Shaofu He and   
                Xiaochang Zheng   Accurate identification technique of
                                  access path information for hierarchical
                                  geographic traffic network under big
                                  data construction  . . . . . . . . . . . 881--888
                   Min Zeng and   
                 Fenjuan Li and   
                   Huiping Feng   Prediction model of key customer loss in
                                  e-commerce combined with Cemo real time
                                  streaming data framework . . . . . . . . 889--896
               Guixian Tian and   
                      Jian Wang   Recommendation algorithm for mobile
                                  E-commerce based on cone depth learning  897--902
                      Ya-Wen Li   Multiple collaborative filtering
                                  recommendation algorithms for electronic
                                  commerce information . . . . . . . . . . 903--909
                  Chun-yu Zhang   The optimization of bibliographic
                                  information resource integration of
                                  digital library  . . . . . . . . . . . . 910--915
               Fei-fei Wang and   
                    Hai-feng Hu   Multi-path data fusion method based on
                                  routing algorithm for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 916--923
    Sachinkumar Veerashetty and   
               Nagaraj B. Patil   Manhattan distance-based histogram of
                                  oriented gradients for content-based
                                  medical image retrieval  . . . . . . . . 924--930
               Sujay Angadi and   
             Venkata Siva Reddy   Multimodal sentiment analysis using
                                  reliefF feature selection and random
                                  forest classifier  . . . . . . . . . . . 931--939
    Sachinkumar Veerashetty and   
               Nagaraj B. Patil   Design of rotation, illumination, and
                                  scale invariant Gabor texture descriptor
                                  for image texture analysis and retrieval 940--948
            Hyunkyoung Choi and   
            Yong-Hyeon Shin and   
                  Hyokyung Bahn   Improving storage performance of
                                  high-performance computing systems by
                                  using the non-volatile buffer cache  . . 949--953
       Rajkumar Rajasekaran and   
                Jolly Masih and   
                     K. Govinda   An analysis of mobile pass-codes in case
                                  of criminal investigations through
                                  social network data  . . . . . . . . . . 954--959
           Jannatul Ferdush and   
         Greetashree Mondol and   
       Amrita Pritom Prapti and   
              Mahbuba Begum and   
Mohammad Nowsin Amin Sheikh and   
                 Syed Md. Galib   An enhanced image encryption technique
                                  combining genetic algorithm and particle
                                  swarm optimization with chaotic function 960--967
                 H. Haritha and   
        Senthil Kumar Thangavel   A modified deep learning architecture
                                  for vehicle detection in traffic
                                  monitoring system  . . . . . . . . . . . 968--977

International Journal of Computer Applications
Volume 43, Number 10, 2019

Gamage Kokila Kasuni Perera and   
        Champi Thusangi Wannige   A hybrid algorithm for identifying
                                  partially conserved regions in multiple
                                  sequence alignment . . . . . . . . . . . 979--986
          Raza Abbas Haidri and   
Chittaranjan Padmanabh Katti and   
            Prem Chandra Saxena   Capacity based deadline aware dynamic
                                  load balancing (CPDALB) model in cloud
                                  computing environment  . . . . . . . . . 987--1001
          Sunil Kumar Patel and   
         Chandran Saravanan and   
             Vikash Kumar Patel   Cloud-based Reversible Dynamic Secure
                                  Steganography Model for embedding
                                  pathological report in medical images    1002--1010
               Monika Kabir and   
     Mir Md. Jahangir Kabir and   
                Shuxiang Xu and   
             Bodrunnessa Badhon   An empirical research on sentiment
                                  analysis using machine learning
                                  approaches . . . . . . . . . . . . . . . 1011--1019
        Md. Alamgir Hossain and   
           Jannatul Ferdush and   
                  Marjia Khatun   A study and implementation of
                                  large-scale log-determinant computation
                                  to cloud . . . . . . . . . . . . . . . . 1020--1028
             Rubina Parveen and   
               Subhash Kulkarni   Urban land use dynamics and change
                                  implication by using low-resolution LISS
                                  III imagery  . . . . . . . . . . . . . . 1029--1034
        B. P. Santosh Kumar and   
           K. Venkata Ramanaiah   Region of interest-based adaptive
                                  segmentation for image compression using
                                  hybrid Jaya--Lion mathematical approach  1035--1046
            Vijay M. Sardar and   
           S. D. Shirbahadurkar   Timbre features for speaker
                                  identification of whispering speech:
                                  selection of optimal audio descriptors   1047--1053
            Malige Gangappa and   
               C. Kiran Mai and   
                    P. Sammulal   Classification of land cover images
                                  using modified water wave
                                  Optimization-based hybrid classifier . . 1054--1064
             Anamika Sharma and   
             Siddhartha Chauhan   Target coverage computation protocols in
                                  wireless sensor networks: a
                                  comprehensive review . . . . . . . . . . 1065--1087
           Haval I. Hussein and   
             Wafaa M. Abduallah   An efficient ElGamal cryptosystem scheme 1088--1094
      Dharminder Dharminder and   
                   Pratik Gupta   Security analysis and application of
                                  Chebyshev Chaotic map in the
                                  authentication protocols . . . . . . . . 1095--1103


International Journal of Computer Applications
Volume 44, Number 1, 2022

           Al-Sakib Khan Pathan   COVID-19 pandemic, information and
                                  communications technology (ICT), and the
                                  \em Digital Divide . . . . . . . . . . . 1--2
             Manel Elleuchi and   
           Manel Boujeleben and   
                   Mohamed Abid   Energy-efficient routing model for water
                                  pipeline monitoring based on wireless
                                  sensor networks  . . . . . . . . . . . . 3--11
               Wael A. Awad and   
               Noha E. El-Attar   Adaptive SLA mechanism based on fuzzy
                                  system for dynamic cloud environment . . 12--22
            Shreya Banerjee and   
                 Anirban Sarkar   Domain-specific requirements analysis
                                  framework: ontology-driven approach  . . 23--47
          Birane Abdelkader and   
                  Hamami Latifa   An efficient level set method based on
                                  global statistical information for image
                                  segmentation . . . . . . . . . . . . . . 48--56
               Ashish Kumar and   
                  N. S. Raghava   Chaos-based steganography technique to
                                  secure information and integrity
                                  preservation of smart grid readings
                                  using wavelet  . . . . . . . . . . . . . 57--63
               Rishabh Dudheria   Assessing password practices of mobile
                                  apps . . . . . . . . . . . . . . . . . . 64--82
              Priti Maratha and   
                    Kapil Gupta   A comprehensive and systematized review
                                  of energy-efficient routing protocols in
                                  wireless sensor networks . . . . . . . . 83--100

International Journal of Computer Applications
Volume 44, Number 2, 2019

           Myung-Joong Jeon and   
              Hyun-Kyu Park and   
          Batselem Jagvaral and   
             Hyung-Sik Yoon and   
               Yun-Geun Kim and   
                Young-Tack Park   Relationship between UAVs and Ambient
                                  objects with threat situational
                                  awareness through grid map-based
                                  ontology reasoning . . . . . . . . . . . 101--116
       Abdallah Almutawakel and   
                 Okba Kazar and   
                Mouadh Bali and   
           Houcine Belouaar and   
             Abdelbasset Barkat   Smart and fuzzy approach based on CSP
                                  for cloud resources allocation . . . . . 117--129
       Padipat Sitkrongwong and   
           Saranya Maneeroj and   
                Atsuhiro Takasu   Multi-criteria rating conversion without
                                  relation loss for recommender systems    130--138
           Amin Rezaeipanah and   
               Musa Mojarad and   
                   Ahad Fakhari   Providing a new approach to increase
                                  fault tolerance in cloud computing using
                                  fuzzy logic  . . . . . . . . . . . . . . 139--147
                      Pooja and   
                  R. K. Chauhan   Triple phase hybrid cryptography
                                  technique in a wireless sensor network   148--153
              Ouahiba Djama and   
               Zizette Boufaida   Instantiation of the multi-viewpoints
                                  ontology from a resource . . . . . . . . 154--165
      Brahmaleen Kaur Sidhu and   
            Kawaljeet Singh and   
                  Neeraj Sharma   A machine learning approach to software
                                  model refactoring  . . . . . . . . . . . 166--177
            Samira Chebbout and   
          Hayet Farida Merouani   A hybrid codebook model for object
                                  categorization using two-way clustering
                                  based codebook generation method . . . . 178--186
                    Zhu Zhu and   
                  Xiaoguo Zhang   A random-valued impulse noise removal
                                  algorithm via just noticeable difference
                                  threshold detector and weighted
                                  variation method . . . . . . . . . . . . 187--200

International Journal of Computer Applications
Volume 44, Number 3, 2020

                     Wei Li and   
             William W. Guo and   
                     Michael Li   The impact factors on the competence of
                                  big data processing  . . . . . . . . . . 201--218
            Shubhra Dwivedi and   
               Manu Vardhan and   
                Sarsij Tripathi   Defense against distributed DoS attack
                                  detection by using intelligent
                                  evolutionary algorithm . . . . . . . . . 219--229
          Sarveshwar Bharti and   
                  Hardeep Singh   Proactively managing clones inside an
                                  IDE: a systematic literature review  . . 230--249
                Sikha Bagui and   
               Xingang Fang and   
              Subhash Bagui and   
               Jeremy Wyatt and   
           Patrick Houghton and   
                 Joe Nguyen and   
             John Schneider and   
                  Tyler Guthrie   An improved step counting algorithm
                                  using classification and double
                                  autocorrelation  . . . . . . . . . . . . 250--259
              Ehsan Shirzad and   
                Hamid Saadatfar   Job failure prediction in Hadoop based
                                  on log file analysis . . . . . . . . . . 260--269
               Jagsir Singh and   
                Jaswinder Singh   Assessment of supervised machine
                                  learning algorithms using dynamic API
                                  calls for malware detection  . . . . . . 270--277
          Subrata Chowdhury and   
            P. Mayilvahanan and   
               Ramya Govindaraj   Optimal feature extraction and
                                  classification-oriented medical
                                  insurance prediction model: machine
                                  learning integrated with the internet of
                                  things . . . . . . . . . . . . . . . . . 278--290
                 D. Mustafi and   
                 A. Mustafi and   
                       G. Sahoo   A novel approach to text clustering
                                  using genetic algorithm based on the
                                  nearest neighbour heuristic  . . . . . . 291--303

International Journal of Computer Applications
Volume 44, Number 4, 2020

             Amina Guendouz and   
                Djamal Bennouar   AMPL: aspect multiple product lines  . . 305--315
              Yogita Yogita and   
                  Vipin Pal and   
                     Anju Yadav   DDC protocol to protract network
                                  lifetime of wireless sensor networks . . 316--323
                  R. R. Darwish   A congestion-aware decision-driven
                                  architecture for information-centric
                                  Internet-of-Things applications  . . . . 324--337
                    Nan Sun and   
                Guanjun Lin and   
                Junyang Qiu and   
                     Paul Rimba   Near real-time Twitter spam detection
                                  with machine learning techniques . . . . 338--348
            Maryam Jallouli and   
                Sonia Lajmi and   
                    Ikram Amous   When contextual information meets
                                  recommender systems: extended SVD++
                                  models . . . . . . . . . . . . . . . . . 349--356
           Sigit Adinugroho and   
         Randy C. Wihandika and   
               Putra P. Adikara   Newsgroup topic extraction using
                                  term-cluster weighting and Pillar
                                  $K$-Means clustering . . . . . . . . . . 357--364
             Mohammad Ahsan and   
                   T. P. Sharma   Spams classification and their
                                  diffusibility prediction on Twitter
                                  through sentiment and topic models . . . 365--375
              Thiago Rateke and   
            Aldo von Wangenheim   Passive vision road obstacle detection:
                                  a literature mapping . . . . . . . . . . 376--395
              Sanchay Gupta and   
          Siddharth Chandra and   
               N. Maheswari and   
                    M. Sivagami   A model for screening eye diseases using
                                  optical coherence tomography images  . . 396--400

International Journal of Computer Applications
Volume 44, Number 5, 2020

                Baoshan Sun and   
                Mengying Ge and   
                  Peng Zhao and   
                    Chunqing Li   Systematic framework for short text
                                  classification based on improved TWE and
                                  supervised MCFS topic merging strategy   401--413
                Ibrahim Gad and   
            Doreswamy Hosahalli   A comparative study of prediction and
                                  classification models on NCDC weather
                                  data . . . . . . . . . . . . . . . . . . 414--425
               Shinq-Jen Wu and   
                  Van-hung Pham   Speeding up multi-SVMs through modified
                                  working set selection  . . . . . . . . . 426--432
                 R. Prasath and   
                     T. Kumanan   Enhanced artificial bee colony approach
                                  for the enhancement and classification
                                  of underwater images . . . . . . . . . . 433--443
             Rebiha Souadih and   
               Fouzi Semchedine   Energy-efficient coverage and
                                  connectivity of wireless sensor network
                                  in the framework of hybrid sensor and
                                  vehicular network  . . . . . . . . . . . 444--454
        Md. Alamgir Hossain and   
          Md. Abdullah Al Hasan   Improving cloud data security through
                                  hybrid verification technique based on
                                  biometrics and encryption system . . . . 455--464
           Samia Noureddine and   
          Baarir Zineeddine and   
                Abida Toumi and   
                 Abir Betka and   
      A\"\icha-Nabila Benharkat   A new predictive medical approach based
                                  on data mining and Symbiotic Organisms
                                  Search algorithm . . . . . . . . . . . . 465--479
                 A. K. Fabi and   
                 Sabu M. Thampi   A psychology-inspired trust model for
                                  emergency message transmission on the
                                  Internet of Vehicles (IoV) . . . . . . . 480--490
               Adesh Kumari and   
                Vinod Kumar and   
                M. Yahya Abbasi   EAAF: ECC-based anonymous authentication
                                  framework for cloud-medical system . . . 491--500

International Journal of Computer Applications
Volume 44, Number 6, 2020

       Anandakumar Haldorai and   
            Muhammad Sharif and   
                Sri Devi Ravana   Artificial intelligence for sustainable
                                  internet research  . . . . . . . . . . . 501--502
                Mohd. Sadiq and   
                Shadab Khan and   
        Chaudhary Wali Mohammad   Selection of software requirements using
                                  TOPSIS under fuzzy environment . . . . . 503--512
          Majdi Abdellatief and   
        Abu Bakar Md Sultan and   
     Abdul Azim Abdul Ghani and   
             Abubaker Wahaballa   Assessing the changeability of
                                  component-based system design: a
                                  controlled experiment  . . . . . . . . . 513--520
             Devender Kumar and   
     Sai Kishore Pachigolla and   
       Shubham Singh Manhas and   
                    Karan Rawat   Cryptanalysis and improvement of mutual
                                  authentication protocol for real-time
                                  data access in industrial wireless
                                  sensor networks  . . . . . . . . . . . . 521--534
         Saeed Hosseinabadi and   
    Manoochehr Kelarestaghi and   
                 Farshad Eshghi   ISSE: a new iterative sentence scoring
                                  and extraction scheme for automatic text
                                  summarization  . . . . . . . . . . . . . 535--540
             Deepika Saxena and   
           Ashutosh Kumar Singh   Auto-adaptive learning-based workload
                                  forecasting in dynamic cloud environment 541--551
             Raviraja Holla and   
            Nikhil C. Mhala and   
                  Alwyn R. Pais   GPGPU-based randomized visual secret
                                  sharing (GRVSS) for grayscale and colour
                                  images . . . . . . . . . . . . . . . . . 552--560
             Vilas K. Patil and   
                  P. P. Nagrale   Effective analysis of noise levels due
                                  to vehicular traffic in urban area using
                                  deep learning with OALO model  . . . . . 561--570
                Sophal Chan and   
         Kwankamon Dittakan and   
               Subhieh El Salhi   Osteoarthritis detection by applying
                                  quadtree analysis to human joint knee
                                  X-ray imagery  . . . . . . . . . . . . . 571--578
              Dmitrii Dikii and   
             Aleksey Tikhomirov   Detection of DoS attacks exploiting
                                  SUBSCRIBE messages of the MQTT protocol  579--585
               Souad Amghar and   
              Safae Cherdal and   
                  Salma Mouline   Storing, preprocessing and analyzing
                                  tweets: finding the suitable noSQL
                                  system . . . . . . . . . . . . . . . . . 586--595
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: traffic prediction and
                                  transmission scheduling of artificial
                                  intelligence-driven cognitive wireless
                                  networks . . . . . . . . . . . . . . . . 596--596
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: research on digital image
                                  wavelet transform filtering optimization
                                  processing method based on DSP Internet
                                  of Things  . . . . . . . . . . . . . . . 597--597
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: a wireless network remote
                                  monitoring method driven by artificial
                                  intelligence . . . . . . . . . . . . . . 598--598
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: collaborative correlation
                                  space big data clustering algorithm for
                                  abnormal flow monitoring . . . . . . . . 599--599
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: track recognition algorithm
                                  based on neural network for rail transit 600--600
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: based on deep learning in
                                  traffic remote sensing image processing
                                  to recognize target vehicle  . . . . . . 601--601
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: development of
                                  computer-based agricultural remote
                                  intelligent information monitoring
                                  system . . . . . . . . . . . . . . . . . 602--602
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: the role of computer
                                  security management in preventing
                                  financial technology risks . . . . . . . 603--603
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  retraction: key technologies of massive
                                  concurrent data processing in smart city
                                  based on cloud computing . . . . . . . . 604--604
                      Anonymous   RETRACTED ARTICLE: Statement of
                                  Retraction: Key technologies of cloud
                                  computing-based IoT data mining  . . . . 605--605

International Journal of Computer Applications
Volume 44, Number 7, 2020

                      Kun Shang   Semantic service composition model based
                                  on cloud computing . . . . . . . . . . . 597--603
   Hoda Ahmed Galal Elsayed and   
            Soumaya Chaffar and   
    Samir Brahim Belhaouari and   
                Hafsa Raissouli   A two-level deep learning approach for
                                  emotion recognition in Arabic news
                                  headlines  . . . . . . . . . . . . . . . 604--613
                Abeer Hamdy and   
                   Gloria Ezzat   Deep mining of open source software bug
                                  repositories . . . . . . . . . . . . . . 614--622
           Dyala R. Ibrahim and   
             Rosni Abdullah and   
                     Je Sen Teh   An enhanced color visual cryptography
                                  scheme based on the binary dragonfly
                                  algorithm  . . . . . . . . . . . . . . . 623--632
                Falah Al-akashi   SAMA: a real-time Web search
                                  architecture . . . . . . . . . . . . . . 633--640
               Sandeep Kaur and   
             Kuljit Kaur Chahal   Prediction of Chikungunya disease using
                                  PSO-based adaptive neuro-fuzzy inference
                                  system model . . . . . . . . . . . . . . 641--649
                  Zhongxian Bai   Variable incremental adaptive learning
                                  model based on knowledge graph and its
                                  application in online learning system    650--658
                Geeta Singh and   
                    Neelu Khare   A survey of intrusion detection from the
                                  perspective of intrusion datasets and
                                  machine learning techniques  . . . . . . 659--669
             Yeganeh Madadi and   
                Vahid Seydi and   
                Reshad Hosseini   Multi-source domain adaptation-based
                                  low-rank representation and correlation
                                  alignment  . . . . . . . . . . . . . . . 670--677
               Huazheng Zhu and   
                Jinglong Du and   
                  LuLu Wang and   
                  Baoru Han and   
                   Yuanyuan Jia   A vision-based fall detection framework
                                  for the elderly in a room environment
                                  using motion features and DAG-SVM  . . . 678--686
                Arkan Mulla and   
                   H. T. Jadhav   Optimal scheduling of vehicle-to-grid
                                  power exchange using particle swarm
                                  optimization technique . . . . . . . . . 687--704

International Journal of Computer Applications
Volume 44, Number 8, 2019

                  Jie Zhang and   
                       Haibo Pu   Fast data acquisition algorithm for
                                  remote monitoring system of smart home   705--712
                         Jia Yu   Missing data filling algorithm in OA
                                  (office automation) cooperative office
                                  system . . . . . . . . . . . . . . . . . 713--720
                    Xiuzhen Dai   Multilevel CLOS data stream exchange
                                  algorithm based on smoothed round-robin
                                  fair scheduling  . . . . . . . . . . . . 721--728
                 D. Suganya and   
    K. Thirunadana Sikamani and   
                    J. Sasikala   Copy--move forgery detection of medical
                                  images using golden ball optimization    729--737
               Shiliang Yan and   
                 Xiaofeng Zhang   PCNet: partial convolution attention
                                  mechanism for image inpainting . . . . . 738--745
           Vivek Srivastava and   
            Ravi Shankar Pandey   Load balancing for software-defined
                                  network: a review  . . . . . . . . . . . 746--759
       Moustafa Sadek Kahil and   
        Abdelkrim Bouramoul and   
               Makhlouf Derdour   GreedyBigVis --- A greedy approach for
                                  preparing large datasets to
                                  multidimensional visualization . . . . . 760--769
            Ally S. Nyamawe and   
            Khadidja Bakhti and   
               Sulis Sandiwarno   Identifying rename refactoring
                                  opportunities based on feature requests  770--778
              Noran AboDoma and   
               Eman Shaaban and   
                  Ahmad Mostafa   Adaptive time-bound access control for
                                  internet of things in fog computing
                                  architecture . . . . . . . . . . . . . . 779--790
Shymalagowri Selvaganapathy and   
                Sudha Sadasivam   Anti-malware engines under adversarial
                                  attacks  . . . . . . . . . . . . . . . . 791--804

International Journal of Computer Applications
Volume 44, Number 9, 2022

           Al-Sakib Khan Pathan   On the scale of Cyberspace and
                                  Cybersecurity  . . . . . . . . . . . . . 805--806
                Xiaochang Zheng   Feature selection algorithm of network
                                  attack big data under the interference
                                  of fading noise  . . . . . . . . . . . . 807--813
             Omar Al-Debagy and   
          Péter Martinek   Dependencies-based microservices
                                  decomposition method . . . . . . . . . . 814--821
              Mahdi Mallaki and   
               Babak Majidi and   
       Amirhossein Peyvandi and   
                   Ali Movaghar   Off-chain management and state-tracking
                                  of smart programs on blockchain for
                                  secure and efficient decentralized
                                  computation  . . . . . . . . . . . . . . 822--829
                Manvi Breja and   
              Sanjay Kumar Jain   A survey on non-factoid question
                                  answering systems  . . . . . . . . . . . 830--837
             Kumar Abhishek and   
           Vaibhav Pratihar and   
    Shishir Kumar Shandilya and   
               Sanju Tiwari and   
         Vinay Kumar Ranjan and   
              Sudhakar Tripathi   An intelligent approach for mining
                                  knowledge graphs of online news  . . . . 838--846
         Subhadra Perumalla and   
         Santanu Chatterjee and   
               A. P. Siva Kumar   Block chain-based access control
                                  protocol in Internet of Drones . . . . . 847--862
            Radhia Bouziane and   
       Labib Sadek Terrissa and   
                Soheyb Ayad and   
Jean-François Brethé   Towards an architecture for cloud
                                  robotic services . . . . . . . . . . . . 863--874
     Daniel Mesafint Belete and   
           Manjaiah D. Huchaiah   Grid search in hyperparameter
                                  optimization of machine learning models
                                  for prediction of HIV/AIDS test results  875--886
                 Rintu Nath and   
                    A. Nagaraju   Genetic algorithm based on-arrival task
                                  scheduling on distributed computing
                                  platform . . . . . . . . . . . . . . . . 887--896
        Mohamed Younes Kaci and   
            Malika Bessedik and   
                  Amina Lammari   A novel variable neighborhood search for
                                  the offloading and resource allocation
                                  in Mobile-Edge Computing . . . . . . . . 897--905

International Journal of Computer Applications
Volume 44, Number 10, 2021

               Bhavya Joshi and   
      Akhilesh Kumar Sharma and   
       Narendra Singh Yadav and   
                  Shamik Tiwari   DNN based approach to classify Covid'19
                                  using convolutional neural network and
                                  transfer learning  . . . . . . . . . . . 907--919
           Albenzio Cirillo and   
                Vito Dalena and   
              Antonio Mauro and   
         Francesco Mogavero and   
              Diego Pennino and   
          Maurizio Pizzonia and   
           Andrea Vitaletti and   
                 Marco Zecchini   Empowering citizens by a
                                  blockchain-based Robinson list . . . . . 920--928
        Yani-Athmane Bennai and   
              Samira Yessad and   
   Louiza Bouallouche-Medjkoune   A flexible and adaptive medium access
                                  control protocol for improving quality
                                  of service in vehicular ad-hoc networks  929--938
            Lakhdar Kanouni and   
               Fouzi Semchedine   A new paradigm for multi-path routing
                                  protocol for data delivery in wireless
                                  sensor networks  . . . . . . . . . . . . 939--952
               S. Sangeetha and   
         G. Sudha Sadasivam and   
                 Ayush Srikanth   Differentially private model release for
                                  healthcare applications  . . . . . . . . 953--958
            Md Mobin Akhtar and   
              Danish Ahamad and   
  Abdallah Saleh Ali Shatat and   
  Alameen Eltoum M. Abdalrahman   Enhanced heuristic algorithm-based
                                  energy-aware resource optimization for
                                  cooperative IoT  . . . . . . . . . . . . 959--970
            Karim Benhocine and   
               Adel Hansali and   
    Leila Zemmouchi-Ghomari and   
        Abdessamed Reda Ghomari   Towards an automatic SPARQL query
                                  generation from ontology competency
                                  questions  . . . . . . . . . . . . . . . 971--980
                Nivea Kesav and   
                M. G. Jibukumar   Multi-Channel CNN based image
                                  classification using SKIP connection and
                                  MSVM . . . . . . . . . . . . . . . . . . 981--990
        M. Dhilsath Fathima and   
           S. Justin Samuel and   
          R. Natchadalingam and   
               V. Vijeya Kaveri   Majority voting ensembled feature
                                  selection and customized deep neural
                                  network for the enhanced clinical
                                  decision support system  . . . . . . . . 991--1001
                      Anonymous   Statement of Retraction: Real-time image
                                  recognition algorithm and system design
                                  of Android mobile devices  . . . . . . . 1002--1002
                      Anonymous   Statement of Retraction: An Intelligent
                                  model to reduce the energy consumption
                                  of sensor network nodes  . . . . . . . . 1003--1003

International Journal of Computer Applications
Volume 44, Number 11, 2022

              Ranjit Biswas and   
                Sudipta Roy and   
                 Abhijit Biswas   MRI and CT image indexing and retrieval
                                  using steerable pyramid transform and
                                  local neighborhood difference pattern    1005--1014
         V. Lakshmi Chetana and   
                    Hari Seetha   CF-AMVRGO: Collaborative Filtering based
                                  Adaptive Moment Variance Reduction
                                  Gradient Optimizer for Movie
                                  Recommendations  . . . . . . . . . . . . 1015--1023
            Rukhsar Sultana and   
               Jyoti Grover and   
             Jitesh Meghwal and   
             Meenakshi Tripathi   Exploiting machine learning and deep
                                  learning models for misbehavior
                                  detection in VANET . . . . . . . . . . . 1024--1038
              Nilam Pradhan and   
            Bharat S. Chaudhari   Traffic-aware autonomous scheduling for
                                  6TiSCH networks  . . . . . . . . . . . . 1039--1046
                  D. Prabhu and   
             S. Vijay Bhanu and   
                      S. Suthir   Design of Multiple Share Creation with
                                  Optimal Signcryption based Secure
                                  Biometric Authentication System for
                                  Cloud Environment  . . . . . . . . . . . 1047--1055
               Naveen Kumar and   
               Hare Krishna and   
             Shashi Shubham and   
          Prabhu Padarbind Rout   Automated categorization of student's
                                  query  . . . . . . . . . . . . . . . . . 1056--1064
              Ilhem Souissi and   
          Nadia Ben Azzouna and   
                Rihab Abidi and   
             Tahar Berradia and   
                Lamjed Ben Said   SP-TRUST: a trust management model for
                                  speed trust in vehicular networks  . . . 1065--1073
            Minh Duc Nguyen and   
       Cuong H. Nguyen-Dinh and   
                  Le Anh Phuong   BOCA: A novel semantic blockchain-based
                                  authentication system of educational
                                  certificates . . . . . . . . . . . . . . 1074--1082
                Yandong Han and   
                Lijuan Feng and   
                       Jian Gao   A new end-to-end framework based on
                                  non-local network structure and spatial
                                  attention mechanism for image rain
                                  removal  . . . . . . . . . . . . . . . . 1083--1091
               Navjeet Kaur and   
                Ashok Kumar and   
                   Rajesh Kumar   PROMO: PROactive MObility-support model
                                  for task scheduling in fog computing . . 1092--1101

International Journal of Computer Applications
Volume 44, Number 12, 2019

           A. Nageswara Rao and   
                 P. Vijayapriya   A robust neural network model for
                                  monitoring online voltage stability  . . 1103--1112
                  M. Suriya and   
                V. Chandran and   
                 M. G. Sumithra   Enhanced deep convolutional neural
                                  network for malarial parasite
                                  classification . . . . . . . . . . . . . 1113--1122
          P. R. Joe Dhanith and   
                  B. Surendiran   An ontology learning based approach for
                                  focused web crawling using combined
                                  normalized pointwise mutual information
                                  and Resnik algorithm . . . . . . . . . . 1123--1129
      Shashidhar Virupaksha and   
                 D. Venkatesulu   Subspace-based aggregation for enhancing
                                  utility, information measures, and
                                  cluster identification in privacy
                                  preserved data mining on
                                  high-dimensional continuous data . . . . 1130--1139
                     Ambika and   
        Rajkumar L. Biradar and   
           Vishwanath Burkpalli   Encryption-based steganography of images
                                  by multiobjective whale optimal pixel
                                  selection  . . . . . . . . . . . . . . . 1140--1149
          K. Krishna Jyothi and   
               Shilpa Chaudhari   A secure cluster-based authentication
                                  and key management protocol for
                                  machine-type communication in the LTE
                                  network  . . . . . . . . . . . . . . . . 1150--1160
                 S. Shanthi and   
                    N. Rajkumar   Non-small-cell lung cancer prediction
                                  using radiomic features and machine
                                  learning methods . . . . . . . . . . . . 1161--1169
      A. Christy Jeba Malar and   
              M. Deva Priya and   
               J. Sengathir and   
               N. Kiruthiga and   
                  R. Anitha and   
                   T. Sangeetha   An intelligent multi-floor indoor
                                  positioning system for cloud-based
                                  environment  . . . . . . . . . . . . . . 1170--1177
          M. R. Pavan Kumar and   
               Prabhu Jayagopal   A preprocessing method combined with an
                                  ensemble framework for the multiclass
                                  imbalanced data classification . . . . . 1178--1185
            M. Kalpana Devi and   
                K. Umamaheswari   Intelligent process of spectrum handoff
                                  for dynamic spectrum access in cognitive
                                  radio network using swarm intelligence   1186--1192
Kalli Srinivasa Nageswara Prasad and   
    Annaluri Sreenivasa Rao and   
          Attili Venkata Ramana   Ensemble framework for concept-drift
                                  detection in multidimensional streaming
                                  data . . . . . . . . . . . . . . . . . . 1193--1200


International Journal of Computer Applications
Volume 45, Number 1, 2019

           Mohammed Debakla and   
             Mohammed Salem and   
    Rochdi Bachir Bouiadjra and   
                Mohammed Rebbah   CMA-ES based fuzzy clustering approach
                                  for MRI images segmentation  . . . . . . 1--7
          Vilas H. Gaidhane and   
                 Nand Kumar and   
           Ravi Kant Mittal and   
               J. Rajevenceltha   An efficient approach for cement
                                  strength prediction  . . . . . . . . . . 8--18
            Jagtap D. Chaya and   
                   Rani N. Usha   Predictive analysis by ensemble
                                  classifier with machine learning models  19--26
                 K. Gaffour and   
             M. K. Benhaoua and   
            A. H. Benyamina and   
                    H. E. Zahaf   A new congestion-aware routing algorithm
                                  in network-on-chip: 2D and 3D comparison 27--35
          Alok Kumar Shukla and   
       Sanjeev Kumar Pippal and   
           Sansar Singh Chauhan   An empirical evaluation of
                                  teaching--learning-based optimization,
                                  genetic algorithm and particle swarm
                                  optimization . . . . . . . . . . . . . . 36--50
               Sunita Jalal and   
     Dharmendra Kumar Yadav and   
              Chetan Singh Negi   Web service discovery with incorporation
                                  of web services clustering . . . . . . . 51--62
      S. Vaithyasubramanian and   
                 D. Lalitha and   
           C. K. Kirubhashankar   Enhancing website security against bots,
                                  spam and web attacks using $l$ CAPTCHA   63--69
                        Ge Yang   Network node grouping algorithm and
                                  evaluation model based on clustering and
                                  Bayesian classifier  . . . . . . . . . . 70--76
                   Dahai Yu and   
                       Juan Zhu   Retracted Article: Research on digital
                                  image wavelet transform filtering
                                  optimization processing method based on
                                  DSP Internet of Things . . . . . . . . . 77--87
                   Yong Liu and   
               Jiabao Jiang and   
                    Yun Liu and   
                 Yong Zhang and   
                       Qilin Wu   Network resource optimization
                                  configuration in edge computing
                                  environment  . . . . . . . . . . . . . . 88--95
                       Bin Geng   Retracted Article: Traffic prediction
                                  and transmission scheduling of
                                  artificial intelligence-driven cognitive
                                  wireless networks  . . . . . . . . . . . 96--104
                Jiewen Zhao and   
                   Jiaojie Yuan   Retracted Article: An Intelligent model
                                  to reduce the energy consumption of
                                  sensor network nodes . . . . . . . . . . 105--113

International Journal of Computer Applications
Volume 45, Number 2, 2019

                   Lei Zhao and   
                       Huang Yu   Retracted Article: A wireless network
                                  remote monitoring method driven by
                                  artificial intelligence  . . . . . . . . 115--123
                 Amit Singh and   
                 Aitha Nagaraju   Heuristic-based opportunistic network
                                  coding at potential relays in multi-hop
                                  wireless networks  . . . . . . . . . . . 124--135
                    Ting Fu and   
                  Hong Chen and   
                     Fei Wu and   
                 YunDong Su and   
                      Li Zhuang   Retracted Article: Collaborative
                                  correlation space big data clustering
                                  algorithm for abnormal flow monitoring   136--143
               Pengcheng Li and   
                   HuiQin Cheng   Retracted Article: Track recognition
                                  algorithm based on neural network for
                                  rail transit . . . . . . . . . . . . . . 144--150
            Hongxiang Zhang and   
                Shaojie Shi and   
                 Yongkai Wu and   
                      Tong Feng   Retracted Article: Development of
                                  computer-based agricultural remote
                                  intelligent information monitoring
                                  system . . . . . . . . . . . . . . . . . 151--160
                        Juan Li   Retracted Article: Real-time image
                                  recognition algorithm and system design
                                  of Android mobile devices  . . . . . . . 161--169
                      Jingfu Li   IOT security analysis of BDT-SVM
                                  multi-classification algorithm . . . . . 170--179
                   Dan Wang and   
                   Kai Zhao and   
                        Yi Wang   Retracted Article: Based on deep
                                  learning in traffic remote sensing image
                                  processing to recognize target vehicle   180--186
                Caixia Chen and   
                 Sheng Zhou and   
                 Qingqing Chang   Retracted Article: The role of computer
                                  security management in preventing
                                  financial technology risks . . . . . . . 187--195
              Rongqing Zhuo and   
                  Zhongxian Bai   Retracted Article: Key technologies of
                                  cloud computing-based IoT data mining    196--203
               Yongqiang He and   
                   Xuyang Zhang   Retracted Article: Key technologies of
                                  massive concurrent data processing in
                                  smart city based on cloud computing  . . 204--211
           Ajay Kumar Dubey and   
                   Vimal Mishra   Crowd review and attribute-based credit
                                  computation for an access control
                                  mechanism in cloud data centers  . . . . 212--219

International Journal of Computer Applications
Volume 45, Number 3, 2022

          Aafaq Mohi ud din and   
                 Shaima Qureshi   A review of challenges and solutions in
                                  the design and implementation of deep
                                  graph neural networks  . . . . . . . . . 221--230
              Touseef Iqbal and   
                 Shaima Qureshi   Reconstruction probability-based anomaly
                                  detection using variational
                                  auto-encoders  . . . . . . . . . . . . . 231--237
                  Ritu Garg and   
                    R. K. Singh   SBCDetector: a hybrid approach to detect
                                  second-order similarity or change  . . . 238--247
         Aarthi Paramasivam and   
                S. Jaya Nirmala   Exploring question generation in medical
                                  intelligent system using entailment  . . 248--253
               Amina Kchaou and   
           Sonda Ammar Bouhamed   Two image quality assessment methods
                                  based on evidential modeling and
                                  uncertainty: application to automatic
                                  iris identification systems  . . . . . . 254--268
               Febina Ikbal and   
           Rajamma Gopikakumari   Block SMRT and knapsack
                                  optimization-based sequency selector for
                                  robust, imperceptible, and
                                  payload-efficient color image
                                  watermarking for binary watermark  . . . 269--283

International Journal of Computer Applications
Volume 45, Number 4, 2023

           Al-Sakib Khan Pathan   Why do some IT freelancers in certain
                                  countries prefer digital payment with
                                  cryptocurrency despite it being illegal? 285--287
                  Lucy Sumi and   
                    Shouvik Dey   YOLOv5-based weapon detection systems
                                  with data augmentation . . . . . . . . . 288--296
        Tertsegha J. Anande and   
              Sami Al-Saadi and   
                 Mark S. Leeson   Generative adversarial networks for
                                  network traffic feature generation . . . 297--305
     Ali Akram Abdul-Kareem and   
 Waleed Ameen Mahmoud Al-Jawher   Image Encryption Algorithm Based on
                                  Arnold Transform and Chaos Theory in the
                                  Multi-wavelet Domain . . . . . . . . . . 306--322
              Rafik Djemili and   
              Merouane Zamouche   An efficient deep learning-based
                                  approach for human activity recognition
                                  using smartphone inertial sensors  . . . 323--336
       Mani Deep Karumanchi and   
               J. I. Sheeba and   
           S. Pradeep Devaneyan   An efficient integrity based multi-user
                                  blockchain framework for heterogeneous
                                  supply chain management applications . . 337--351

International Journal of Computer Applications
Volume 45, Number 5, 2023

             B. N. Madhukar and   
             S. H. Bharathi and   
              Ashwin M. Polnaya   Multi-scale convolution based breast
                                  cancer image segmentation with attention
                                  mechanism in conjunction with war search
                                  optimization . . . . . . . . . . . . . . 353--366
                Nadia Ahmed and   
       Sadik Kamel Gharghan and   
           Ammar Hussein Mutlag   IoT-based child tracking using RFID and
                                  GPS  . . . . . . . . . . . . . . . . . . 367--378
                     J. Liu and   
                 H. J. Shao and   
                    X. Deng and   
                    Y. T. Jiang   Exploiting similarity-induced
                                  redundancies in correlation topology for
                                  channel pruning in deep convolutional
                                  neural networks  . . . . . . . . . . . . 379--390
      Mohamed Raouf Kanfoud and   
            Abdelkrim Bouramoul   Tackling the multilingual and
                                  heterogeneous documents with the
                                  pre-trained language identifiers . . . . 391--402
           Youcef Benkhedda and   
                 Faical Azouaou   Optimizing user profile matching: a
                                  text-based approach  . . . . . . . . . . 403--412
          Smail Ait El Asri and   
              Ismail Negabi and   
              Samir El Adib and   
              Naoufal Raissouni   Enhancing building extraction from
                                  remote sensing images through UNet and
                                  transfer learning  . . . . . . . . . . . 413--419

International Journal of Computer Applications
Volume 45, Number 6, 2023

                   Jing Cai and   
               Jiawei Jiang and   
                Yibing Wang and   
              Jianwei Zheng and   
                     Honghui Xu   Image inpainting via Smooth Tucker
                                  decomposition and Low-rank Hankel
                                  constraint . . . . . . . . . . . . . . . 421--432
           Bidyapati Thiyam and   
                    Shouvik Dey   Statistical methods for feature
                                  selection: unlocking the key to improved
                                  accuracy . . . . . . . . . . . . . . . . 433--443
          Abderezak Touzene and   
               Manar Al Moqbali   User satisfaction-based genetic
                                  algorithm for load shifting in smart
                                  grid . . . . . . . . . . . . . . . . . . 444--451
                      Fang Duan   Multi-scale residual aggregation feature
                                  network based on multi-time division for
                                  motion behavior recognition  . . . . . . 452--459
                 Tanu Gupta and   
                      Ela Kumar   Fusion of Bi-GRU and temporal CNN for
                                  biomedical question classification . . . 460--470
            Manabendra Nath and   
               Pinaki Mitra and   
                   Deepak Kumar   A novel residual learning-based deep
                                  learning model integrated with attention
                                  mechanism and SVM for identifying tea
                                  plant diseases . . . . . . . . . . . . . 471--484

International Journal of Computer Applications
Volume 45, Number 7--8, 2023

             Fjolla Berisha and   
            Eliot Bytyçi   Addressing cold start in recommender
                                  systems with neural networks: a
                                  literature survey  . . . . . . . . . . . 485--496
   Chigurupati Ravi Swaroop and   
                        K. Raja   CGSA optimized LSTM auto encoder for
                                  outlier detection  . . . . . . . . . . . 497--507
    Vianney Kengne Tchendji and   
        Joëlle Kabdjou and   
         Yannick Florian Yankam   Traffic predictive-based flow splitting
                                  rerouting scheme for link failures in
                                  software-defined networks  . . . . . . . 508--515
Shinzeer C. K. Avinash Bhagat and   
          Ajay Shriram Kushwaha   Secure medical data storage in
                                  DPOS-hyper ledger fabric block chain
                                  using PM-ECC and L2-DWT  . . . . . . . . 516--522
              Shobha Chawla and   
                     Neha Gupta   A cloud based enhanced CPABE framework
                                  for efficient user and attribute-level
                                  revocation . . . . . . . . . . . . . . . 523--533
                Farid Feyzi and   
              Arman Daneshdoost   Studying the effectiveness of deep
                                  active learning in software defect
                                  prediction . . . . . . . . . . . . . . . 534--552

International Journal of Computer Applications
Volume 45, Number 9, 2023

             Samar Bouazizi and   
            Emna Benmohamed and   
                     Hela Ltifi   PSO-K2PC: Bayesian structure learning
                                  using optimized K2 algorithm for
                                  parents-children detection . . . . . . . 553--563
              Justice Odoom and   
             Xiaofang Huang and   
                Zuhong Zhou and   
               Samuel Danso and   
  Benedicta Nana Esi Nyarko and   
                Jinan Zheng and   
                   Yanjie Xiang   Blockchain-assisted sharing of
                                  electronic health records: a feasible
                                  privacy-centric constant-size ring
                                  signature framework  . . . . . . . . . . 564--578
           Sylvia W. Azumah and   
              Nelly Elsayed and   
                Zag ElSayed and   
                     Murat Ozer   Cyberbullying in text content detection:
                                  an analytical review . . . . . . . . . . 579--586
               Subhajit Das and   
              Sourav Mandal and   
                   Rohini Basak   Spam email detection using a novel
                                  multilayer classification-based decision
                                  technique  . . . . . . . . . . . . . . . 587--599
          Vishruth B. Gowda and   
        M. T. Gopalakrishna and   
                   J. Megha and   
              Shilpa Mohankumar   Background initialization in video data
                                  using singular value decomposition and
                                  robust principal component analysis  . . 600--609

International Journal of Computer Applications
Volume 45, Number 10, 2023

              Koppula Geeta and   
             V. Kamakshi Prasad   Multi-objective cloud load-balancing
                                  with hybrid optimization . . . . . . . . 611--625
                  Taha Etem and   
                    Turgay Kaya   Fast image encryption algorithm with
                                  random structures  . . . . . . . . . . . 626--637
               Amal Shaheen and   
             Mustafa Hammad and   
              Wael Elmedany and   
             Riadh Ksantini and   
                   Saeed Sharif   Machine failure prediction using joint
                                  reserve intelligence with feature
                                  selection technique  . . . . . . . . . . 638--646
            N. J. Subashini and   
                   K. Venkatesh   Multimodal deep learning for chronic
                                  kidney disease prediction: leveraging
                                  feature selection algorithms and
                                  ensemble models  . . . . . . . . . . . . 647--659
                Xinyu Zhang and   
                  Hang Dong and   
                 Liang Gong and   
                  Xin Cheng and   
                Zhenghui Ge and   
                  Liangchao Guo   Multiple paddy disease recognition
                                  methods based on deformable transformer
                                  attention mechanism in complex scenarios 660--672

International Journal of Computer Applications
Volume 45, Number 11, 2023

          Sridevi Malipatil and   
            T. Hanumantha Reddy   Discovery of interesting frequent item
                                  sets in an uncertain database using ant
                                  colony optimization  . . . . . . . . . . 673--679
                Megha Gupta and   
                Laxmi Ahuja and   
                    Ashish Seth   Security enhancement in a cloud
                                  environment using a hybrid chaotic
                                  algorithm with multifactor verification
                                  for user authentication  . . . . . . . . 680--696
                 D. Rambabu and   
                   A. Govardhan   Task scheduling and data replication in
                                  cloud with improved correlation strategy 697--708
        Santosh Kumar Majhi and   
              Abhipsa Panda and   
    Suresh Kumar Srichandan and   
                 Usha Desai and   
            Biswaranjan Acharya   Malware image classification:
                                  comparative analysis of a fine-tuned CNN
                                  and pre-trained models . . . . . . . . . 709--721
             Amina Bouhadja and   
            Abdelkrim Bouramoul   Beyond cocaine and heroin use: a
                                  stacking ensemble-based framework for
                                  predicting the likelihood of subsequent
                                  substance use disorder using
                                  demographics and personality traits  . . 722--733

International Journal of Computer Applications
Volume 45, Number 12, 2023

   Chigurupati Ravi Swaroop and   
                        K. Raja   AT-densenet with salp swarm optimization
                                  for outlier prediction . . . . . . . . . 735--747
               Neelam Rawat and   
               Vikas Somani and   
              Arun Kr. Tripathi   Prioritizing software regression testing
                                  using reinforcement learning and hidden
                                  Markov model . . . . . . . . . . . . . . 748--754
    Wathiq Laftah Al-Yaseen and   
              Ali Kadhum Idrees   MuDeLA: multi-level deep learning
                                  approach for intrusion detection systems 755--763
            Muhammad Sam'an and   
          Muhammad Munsarif and   
                     Safuan and   
               Yahya Nur Ifriza   Feature selection in P2P lending based
                                  on hybrid genetic algorithm with machine
                                  learning . . . . . . . . . . . . . . . . 764--775
               Vishal Kumar and   
                 Sumit Kushwaha   Hybrid metaheuristic model based
                                  performance-aware optimization for map
                                  reduce scheduling  . . . . . . . . . . . 776--788


International Journal of Computer Applications
Volume 46, Number 1, 2023

             Laila Bouhouch and   
             Mostapha Zbakh and   
                 Claude Tadonki   DFMCloudsim: an extension of Cloudsim
                                  for modeling and simulation of data
                                  fragments migration over distributed
                                  data centers . . . . . . . . . . . . . . 1--20
                 S. Regilan and   
                     L. K. Hema   Optimizing environmental monitoring in
                                  IoT: integrating DBSCAN with genetic
                                  algorithms for enhanced clustering . . . 21--31
            Sembati Yassine and   
                 Naja Najib and   
                Jamali Abdellah   Routing approaches in named data
                                  network: a survey and emerging research
                                  challenges . . . . . . . . . . . . . . . 32--45
       Amrithkala M. Shetty and   
    Mohammed Fadhel Aljunid and   
                 D. H. Manjaiah   Unleashing the power of 2D CNN with
                                  attention and pre-trained embeddings for
                                  enhanced online review analysis  . . . . 46--57
                 Yuanhan Du and   
                  Ling Wang and   
                       Yebo Tao   Server node video processing based on
                                  feature depth analysis algorithm . . . . 58--65

International Journal of Computer Applications
Volume 46, Number 2, 2023

              Ahmed Aljabri and   
               Farah Jemili and   
                  Ouajdi Korbaa   Convolutional neural network for
                                  intrusion detection using blockchain
                                  technology . . . . . . . . . . . . . . . 67--77
  K. Sakkaravarthy Iyyappan and   
             S. R. Balasundaram   A novel multi document summarization
                                  with document-elements augmentation for
                                  learning materials using concept based
                                  ILP and clustering methods . . . . . . . 78--89
              Shakti Kinger and   
              Vrushali Kulkarni   Demystifying the black box: an overview
                                  of explainability methods in machine
                                  learning . . . . . . . . . . . . . . . . 90--100
             S. Renu Deepti and   
                  P. C. Karthik   Survey on age-related macular
                                  degeneration detection in OCT image  . . 101--112
            Fatemeh Arvaneh and   
          Faraneh Zarafshan and   
                   Abbas Karimi   Using fog computing (FC) and
                                  optimization techniques for tasks
                                  migration and resource allocation in the
                                  internet of things (IoT) . . . . . . . . 113--121
                   Yang Cao and   
                Junhai Zhai and   
                  Wei Zhang and   
               Xuesong Zhou and   
                     Feng Zhang   MTTF: a multimodal transformer for
                                  temperature forecasting  . . . . . . . . 122--135

International Journal of Computer Applications
Volume 46, Number 3, 2023

                 Akhil Nair and   
                Varad Patil and   
                 Rohan Nair and   
              Adithi Shetty and   
                   Mimi Cherian   A review on recent driver safety systems
                                  and its emerging solutions . . . . . . . 137--151
            Hartik Suhagiya and   
             Hrithik Mistry and   
              Aryan Trivedi and   
      Ramchandra Mangrulkar and   
                 Pallavi Chavan   TokenLink: a secure loyalty point
                                  exchange system powered by smart
                                  contracts  . . . . . . . . . . . . . . . 152--166
              Neethu Subash and   
                      B. Nithya   Dynamic adaptation of contention window
                                  boundaries using deep Q networks in UAV
                                  swarms . . . . . . . . . . . . . . . . . 167--174
Mohammad Mehdi Pourhashem Kallehbasti and   
            Jamshid Pirgazi and   
        Ali Ghanbari Sorkhi and   
                    Ali Kermani   An efficient weighted partial MaxSAT
                                  encoding for scheduling in overloaded
                                  real-time systems  . . . . . . . . . . . 175--183
      Ch. Jnana Ramakrishna and   
    D. Bharath Kalyan Reddy and   
              P. P. Amritha and   
              K. V. Lakshmy and   
                 Vasily Sachnev   A secure authenticated image encryption
                                  scheme based on elliptic curve
                                  cryptography . . . . . . . . . . . . . . 184--193

International Journal of Computer Applications
Volume 46, Number 4, 2023

                    Yang Xu and   
                     Yongjie Ma   Evolutionary neural architecture search
                                  based on group whitening residual
                                  ConvNet and large kernel subspace
                                  attention module . . . . . . . . . . . . 195--207
          Peraphon Sophatsathit   A biological-like synthesis framework
                                  for software engineering environments    208--217
             Abhishek Goyal and   
                Rakesh Garg and   
             Komal Kumar Bhatia   An improved task scheduling algorithm
                                  for conflict resolution in cloud
                                  environment  . . . . . . . . . . . . . . 218--226
 Mirsaeid Hosseini Shirvani and   
             Amir Akbarifar and   
            Amir Salar Nazokkar   Reliability non-functional requirement
                                  evaluation in mission-critical systems
                                  with an architectural strategy for
                                  future systems . . . . . . . . . . . . . 227--251
               Eirene Barua and   
                     Mala Dutta   Privacy-preserving association rule
                                  mining: a survey of techniques for
                                  sensitive rule identification and
                                  enhanced data protection . . . . . . . . 252--265
          Bankapalli Swathi and   
           M. Sunil Prakash and   
              B. T. Krishna and   
               M. Satyanarayana   A novel hybrid heuristic-based network
                                  parameter optimization for spectral and
                                  energy efficiency in dynamic spectrum
                                  access on wireless mesh network system   266--279