default search action
Journal of Software, Volume 13
Volume 13, Number 1, January 2018
- Chin-Chen Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu:
High-Capacity Reversible Data Hiding Method for JPEG Images. 1-17 - Ahmad F. Subahi, Youseef Alotaibi:
A New Framework for Classifying Information Systems Modelling Languages. 18-42 - MdSaidul Hoque, Abeer Alsadoon, Angelika Maag, P. W. C. Prasad, Amr Elchouemi:
Comprehensive Search Engine Optimization Model for Commercial Websites: Surgeon's Website in Sydney. 43-56 - Ahmed Mokaddem, Amine Bel Haj, Mourad Elloumi:
Pro-malign: Multiple Sequence Alignment Algorithm using Approached Profile. 57-65 - Yun Zhang, Yang Chen:
Research on the Method for Estimating the Motion state of the Opponent's Agent in the Confrontation Environment. 66-71 - D. I. De Silva, S. R. Kodituwakku, A. J. Pinidiyaarachchi, N. Kodagoda:
Enhancements to an OO Metric: CB Measure. 72-81
Volume 13, Number 2, February 2018
- N. Satish Kumar, Shobha G.:
Detection of Moving Cast Shadow Using Pixel and Texture. 82-89 - Francisco Ortin, Donna O'Shea:
Towards an Easily Programmable IoT Framework Based on Microservices. 90-102 - Xianghui Zhao, Zhirong Li, Junkai Yi:
SIFT Feature-Based Second-Order Image Hash Retrieval Approach. 103-116 - KaixinLiu, Jianhui Chang, Huiwen Ren, Hong Zhu:
Disparity-Based Measurement on Participation Interest and Competition Recommendation Method. 117-125 - Reza Meimandi Parizi, Ahmad Shahi:
Component-Driven Development in Modern Virtual Assistants: A Mapping Study. 126-137 - Georgi Petrov Dimitrov, Galina S. Panayotova, Iva S. Kostadinova:
Aspect of the Designing and Developed Integrated Information Systems in Large Organizations. 138-145
Volume 13, Number 3, March 2018
- Adel Hassan, Mourad Chabane Oussalah:
Evolution Styles: Multi-View/Multi-Level Model for Software Architecture Evolution. 146-154 - Yuanxiang Jiang, Rui Yuan, Yuqiu Sun, Jin-Wen Tian:
Iterative Fractional Integral Denoising Based on Detection of Gaussian Noise. 155-167 - Anbo Qiu, Zhuowei Wang:
Optimization of Density Peak Clustering Algorithm Based on OpenMP. 168-179 - Ahmed Ghoneim:
A New Service Oriented Framework for Self-Adapting Smart Applications in Mobile Environment. 180-191 - Fengling Wang:
Research on Application of Improved K-means Algorithm in Network Intrusion Detection. 192-200 - Donghwoon Kwon, Ilnam Jeong, Geumchae Yoon, Bilal Abu Bakr, Ki Pyung Kim:
A Study on Probabilistic Schedule Estimation and Refinement of the Small and Medium-Sized Software Development Projects. 201-211
Volume 13, Number 4, April 2018
- Wei Feng, Yigang He:
Constructing, Analyzing and Synchronizing a Chaotic System with Equilibria of Rectangle Loop. 212-218 - Mohammad Shakeel Laghari:
EE Course Planning Software System. 219-231 - Rachida Hassani, Younès El Bouzekri El Idrissi:
Normalization of Requirements Specification Document on Software Project Management. 232-241 - Abdullah R. Altaleb, Andrew M. Gravell:
Effort Estimation across Mobile App Platforms using Agile Processes: A Systematic Literature Review. 242-259 - Abeer Hamdy, Mohamed Elsayed:
Automatic Recommendation of Software Design Patterns: Text Retrieval Approach. 260-268
Volume 13, Number 5, May 2018
- Jehad Al Dallal:
Predicting Object-Oriented Class Fault-Proneness: A Replication Study. 269-276 - Antoni Wiercioch, Stephanie Teufel, Bernd Teufel:
The Authentication Dilemma. 277-286 - Deependra Poudel Sharma, Farzana Haque, Moshiur Bhuiyan, P. W. C. Prasad:
Service Optimization Using Goal-Oriented Modelling in Judicial Domain. 287-299 - Loredana M. Genovese, Filippo Geraci:
Web Crawling and Processing with Limited Resources for Business Intelligence and Analytics Applications. 300-316
Volume 13, Number 6, June 2018
- Mohit Garg, Richard Lai:
A Method for Selecting a Model to Estimate Software Reliability at the Design Phase of Component-Based Real-Time System Development. 317-334 - Jiexian Zeng, Xiang Fu, Lu Leng, Liqin Zhan:
Image Completion Based on Structure Reconstruction and Constraint. 335-349 - Xufang Zhao, Ximing Liang, Long Wen:
The Artificial Bee Colony Algorithm Improved with Simplex Method. 350-359 - ZhenJie Huang, Guoheng Huang, Lianglun Cheng:
Medical Image Segmentation of Blood Vessels Based on Clifford Algebra and Voronoi Diagram. 360-373
Volume 13, Number 7, July 2018
- Azmat Ullah, Richard Lai:
A Method of Extracting Organizational Components for Aligning Information Technology with Business. 374-385 - Yuqing Yan:
Knowledge Factors and Models of Requirements Change Management Process Based on Causality Analysis. 386-394 - Pei-Fen Wu, Hui-Jiun Hu, Kuang-Yi Fan:
Developing an APP with Taiwanese Image for Reminiscence Therapy of Dementia. 395-406 - Georgi Petrov Dimitrov, Galina S. Panayotova, Eugenia Kovatcheva, Daniela Borissova, Pavel Petrov:
One Approach for Identification of Brain Signals for Smart Devices Control. 407-413
Volume 13, Number 8, August 2018
- Hubertus Franke, Martina Hasseler, Denise Dick, Stephanie Krebs:
Requirements Engineering for a Matching Algorithm to Use in Hospital Networks. 414-420 - Chunlai Li, Wenhua Hai:
Image Encryption Scheme Based on Amplitude Modulation of Chaotic Signals. 421-436 - Yuzhen Liu, Long Zhang, Zhenyu Zhang:
A Survey of Test Based Automatic Program Repair. 437-452 - Nobuaki Nakazawa, Toshikazu Matsui, Yusaku Fujii:
Development of an Intuitive Interface for PC Mouse Operation Based on Both Arms Gesture. 453-459
Volume 13, Number 9, September 2018
- Saida Haidrar, Adil Anwar, Jean-Michel Bruel, Ounsa Roudiès:
A Domain-Specific Language to manage Requirements Traceability. 460-480 - Wenjiang Chen, Zhaoji Hu, Yan Yong, Hongbo Su:
3D Dynamic Visualization Simulation System of Pool Fire Triggered by Major Hazard Installation. 481-496 - Yousef Khdairat, Khair Eddin Sabri:
Generating Test Cases from Role-Based Access Control Policies using Cause-Effect Graph. 497-505 - Fengwei Guan, Lianglun Cheng:
Abnormal Quality Pattern Recognition of Industrial Process Based on Multi-Support Vector Machine. 506-519
Volume 13, Number 10, October 2018
- Naveed Ali, Richard Lai:
Requirements Engineering in Global Software Development: A Survey Study from the Perspectives of Stakeholders. 520-532 - Ahmad F. Subahi:
Data Collection for Career Path Prediction Based on Analysing Body of Knowledge of Computer Science Degrees. 533-546 - Waleed Albattah:
Predicting Costly Maintenance Packages Using Package Cohesion. 547-558 - Kazuyuki Matsumoto, Akira Fujisawa, Minoru Yoshida, Kenji Kita:
ASCII Art Classification based on Deep Neural Networks Using Image Feature of Characters. 559-572
Volume 13, Number 11, November 2018
- Mohamed A. G. Hazber, Bing Li, Guandong Xu, Mohammed A. S. Mosleh, Xiwu Gu, Yuhua Li:
An Approach for Generation of SPARQL Query from SQL Algebra based Transformation Rules of RDB to Ontology. 573-599 - Nesrine Khalfallah, Sami Ouali, Naoufel Kraïem:
Case Tool Support for Variability Managing in Database Schemas. 600-612 - Guoxiang Zhou, Ruirui Cao, Lei Shi, Yun Hu:
Research on an Efficient Software Framework for Developing. 613-620 - Suhan Pan, Zhiqiang Li, Juan Dai:
An Effective Method to Extract Web Content Information. 621-629
Volume 13, Number 12, December 2018
- Bassim Chabibi, Adil Anwar, Mahmoud Nassar:
Towards a Model Integration from SysML to MATLAB/Simulink. 630-645 - Qing-hui Ren, Sheng-lin Li, Han Qiao:
Method of Refactoring a Monolith into Micro-services. 646-653 - Bilal Al-Ahmad:
Using Code Coverage Metrics for Improving Software Defect Prediction. 654-674 - Lutfiah Al Turk:
Confidence Intervals for the Failure Intensity and Number of Remaining Errors Functions Based on Non-Homogeneous Poisson Process Model. 675-686
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.