Subjects -> LIBRARY AND INFORMATION SCIENCES (Total: 390 journals)
    - DIGITAL CURATION AND PRESERVATION (13 journals)
    - LIBRARY ADMINISTRATION (1 journals)
    - LIBRARY AND INFORMATION SCIENCES (376 journals)

LIBRARY AND INFORMATION SCIENCES (376 journals)                  1 2 | Last

Showing 1 - 200 of 379 Journals sorted alphabetically
027.7 Zeitschrift für Bibliothekskultur / Journal for Library Culture     Open Access   (Followers: 75)
Access     Full-text available via subscription   (Followers: 28)
Acervo : Revista do Arquivo Nacional     Open Access   (Followers: 2)
Against the Grain     Partially Free   (Followers: 271)
AIB Studi     Full-text available via subscription   (Followers: 13)
Alexandría : Revista de Ciencias de la Información     Open Access   (Followers: 16)
Alexandria : The Journal of National and International Library and Information Issues     Full-text available via subscription   (Followers: 67)
Alsic : Apprentissage des Langues et Systèmes d'Information et de Communication     Open Access   (Followers: 17)
American Archivist     Hybrid Journal   (Followers: 265)
American Libraries     Partially Free   (Followers: 305)
Anales de Documentacion     Open Access   (Followers: 15)
Annals of Library and Information Studies (ALIS)     Open Access   (Followers: 441)
Anuari de l'Observatori de Biblioteques, Llibres i Lectura     Open Access  
Anuario ThinkEPI     Open Access   (Followers: 1)
ANZTLA EJournal     Open Access   (Followers: 7)
Archeion Online     Open Access   (Followers: 3)
Archimag     Full-text available via subscription   (Followers: 1)
Archival Science     Hybrid Journal   (Followers: 70)
Archivalische Zeitschrift     Hybrid Journal   (Followers: 6)
Archivaria     Open Access   (Followers: 36)
Archives     Full-text available via subscription   (Followers: 5)
Archives and Manuscripts     Hybrid Journal   (Followers: 57)
Archives and Museum Informatics     Hybrid Journal   (Followers: 185)
Ariadne Magazine     Open Access   (Followers: 252)
Art Libraries Journal     Full-text available via subscription   (Followers: 2)
AtoZ : novas práticas em informação e conhecimento     Open Access   (Followers: 3)
Australasian Journal of Information Systems     Open Access   (Followers: 22)
Australasian Public Libraries and Information Services     Full-text available via subscription   (Followers: 34)
Australian Academic & Research Libraries     Full-text available via subscription   (Followers: 212)
Australian Library Journal     Full-text available via subscription   (Followers: 286)
B Sides     Open Access   (Followers: 16)
Baca : Jurnal Dokumentasi dan Informasi     Open Access  
Bangladesh Journal of Library and Information Science     Open Access   (Followers: 51)
Behavioral & Social Sciences Librarian     Hybrid Journal   (Followers: 249)
Berkala Ilmu Perpustakaan dan Informasi     Open Access   (Followers: 1)
BiblioCanto     Open Access   (Followers: 1)
Biblios     Open Access   (Followers: 16)
Biblioteca Escolar em Revista     Open Access  
Biblioteca Universitaria     Open Access   (Followers: 17)
Bibliotecas : Revista de la Escuela de Bibliotecología, Documentación e Información     Open Access   (Followers: 3)
Bibliotecas Universitárias : pesquisas, experiências e perspectivas     Open Access   (Followers: 1)
Bibliotecas. Anales de Investigacion     Open Access  
Biblioteka     Open Access   (Followers: 3)
Biblioteka i Edukacja     Open Access   (Followers: 4)
Bibliotheca Lituana     Open Access  
Bibliotheca Orientalis     Full-text available via subscription   (Followers: 14)
Bibliothecae.it     Open Access   (Followers: 1)
Bibliothek Forschung und Praxis     Hybrid Journal   (Followers: 216)
Bibliotheksdienst     Hybrid Journal   (Followers: 48)
BIBLIOTIKA : Jurnal Kajian Perpustakaan dan Informasi     Open Access  
BIBLOS - Revista do Departamento de Biblioteconomia e História     Open Access   (Followers: 7)
BiD : textos universitaris de biblioteconomia i documentació     Open Access   (Followers: 7)
Bilgi Dünyası     Open Access   (Followers: 6)
Biodiversity Information Science and Standards     Open Access   (Followers: 2)
Bioinformatics     Hybrid Journal   (Followers: 399)
Biuletyn EBIB     Open Access  
Boletín Cultural y Bibliográfico     Open Access   (Followers: 3)
Book History     Full-text available via subscription   (Followers: 177)
Bridgewater Review     Open Access   (Followers: 5)
BuB - Forum Bibliothek und Information     Free   (Followers: 34)
Bulletin des bibliotheques de France     Full-text available via subscription   (Followers: 11)
Bulletin du Centre de recherche français à Jérusalem     Open Access   (Followers: 7)
Bulletin of the Association for Information Science and Technology     Open Access   (Followers: 25)
Bulletin of the John Rylands Library     Hybrid Journal   (Followers: 20)
Cadernos de Informação Jurídica     Open Access  
Canadian Journal of Academic Librarianship     Open Access   (Followers: 14)
Canadian Journal of Information and Library Science     Full-text available via subscription   (Followers: 380)
Cataloging & Classification Quarterly     Hybrid Journal   (Followers: 315)
CERN IdeaSquare Journal of Experimental Innovation     Open Access   (Followers: 5)
Children and Libraries : The Journal of the Association for Library Service to Children     Full-text available via subscription   (Followers: 20)
CIC. Cuadernos de Informacion y Comunicacion     Open Access   (Followers: 7)
Ciência da Informação em Revista     Open Access   (Followers: 1)
Ciencias de la Información     Open Access   (Followers: 10)
Code4Lib Journal     Open Access   (Followers: 268)
Collaborative Librarianship     Open Access   (Followers: 53)
College & Research Libraries     Open Access   (Followers: 619)
College & Research Libraries News     Partially Free   (Followers: 471)
College & Undergraduate Libraries     Hybrid Journal   (Followers: 363)
Communicate : Journal of Library and Information Science     Full-text available via subscription   (Followers: 68)
Communication Booknotes Quarterly     Hybrid Journal   (Followers: 17)
Communications in Information Literacy     Open Access   (Followers: 365)
Community & Junior College Libraries     Hybrid Journal   (Followers: 57)
Computers in Libraries     Full-text available via subscription   (Followers: 74)
Cuadernos de Gestión de Información     Open Access  
Data Curation Profiles Directory     Open Access   (Followers: 4)
Desde la Biblioteca     Open Access  
DESIDOC Journal of Library & Information Technology     Open Access   (Followers: 96)
Documentación de las Ciencias de la Información     Open Access  
Documentation et bibliothèques     Full-text available via subscription   (Followers: 9)
e & i Elektrotechnik und Informationstechnik     Hybrid Journal   (Followers: 9)
e-Ciencias de la Información     Open Access   (Followers: 1)
Eastern Librarian     Open Access   (Followers: 13)
EDUCAUSE Review     Full-text available via subscription   (Followers: 238)
Edulib : Journal of Library and Information Science     Open Access   (Followers: 23)
Egyptian Informatics Journal     Open Access   (Followers: 5)
El Profesional de la Informacion     Full-text available via subscription   (Followers: 19)
eLucidate     Open Access   (Followers: 7)
Em Questão     Open Access   (Followers: 2)
Emerging Library & Information Perspectives     Open Access   (Followers: 23)
Encontros Bibli : revista eletrônica de biblioteconomia e ciência da informação     Open Access   (Followers: 3)
Ethics and Information Technology     Hybrid Journal   (Followers: 72)
European Journal of Information Systems     Hybrid Journal   (Followers: 173)
European Science Editing     Open Access  
Evidence Based Library and Information Practice     Open Access   (Followers: 563)
Folia Bibliologica     Open Access  
Forensic Science International: Digital Investigation     Full-text available via subscription   (Followers: 526)
Foundations and Trends® in Information Retrieval     Full-text available via subscription   (Followers: 116)
FreePint     Partially Free   (Followers: 15)
Georgia Library Quarterly     Open Access   (Followers: 22)
Ghana Library Journal     Full-text available via subscription   (Followers: 16)
GSI Journals Serie C : Advancements in Information Sciences and Technologies     Open Access  
Health Information Management Journal     Hybrid Journal   (Followers: 24)
Hipertext.net : Anuario Académico sobre Documentación Digital y Comunicación Interactiva     Open Access  
HLA News     Full-text available via subscription   (Followers: 3)
Human Factors in Information Technology     Full-text available via subscription   (Followers: 37)
i-com. Zeitschrift für interaktive und kooperative Medien     Hybrid Journal   (Followers: 7)
IASSIST Quarterly     Open Access   (Followers: 2)
Idaho Librarian     Free   (Followers: 8)
IFLA Journal     Hybrid Journal   (Followers: 323)
In Monte Artium     Full-text available via subscription   (Followers: 1)
In the Library with the Lead Pipe     Open Access   (Followers: 115)
InCID : Revista de Ciência da Informação e Documentação     Open Access  
InCite     Full-text available via subscription   (Followers: 18)
Informaatiotutkimus     Open Access   (Followers: 2)
Informação & Informação     Open Access   (Followers: 2)
Informação em Pauta     Open Access   (Followers: 1)
Informacijos mokslai     Open Access  
Información, Cultura y Sociedad     Open Access   (Followers: 2)
Informatio. Revista del Instituto de Información de la Facultad de Información y Comunicación     Open Access  
Information     Open Access   (Followers: 48)
Information & Culture : A Journal of History     Full-text available via subscription   (Followers: 31)
Information - Wissenschaft & Praxis     Hybrid Journal   (Followers: 41)
Information Manager (The)     Open Access   (Followers: 31)
Information Processing & Management     Hybrid Journal   (Followers: 725)
Information Retrieval     Hybrid Journal   (Followers: 812)
Information Sciences     Hybrid Journal   (Followers: 768)
Information Systems Frontiers     Hybrid Journal   (Followers: 30)
Information Systems Research     Full-text available via subscription   (Followers: 621)
Information Technologies & International Development     Open Access   (Followers: 689)
Information Technologist (The)     Full-text available via subscription   (Followers: 19)
Information Technology and Libraries     Open Access   (Followers: 908)
Information Today     Full-text available via subscription   (Followers: 40)
Informationspraxis     Open Access   (Followers: 17)
Informationswissenschaft : Theorie, Methode und Praxis     Open Access   (Followers: 4)
Informing Science : The International Journal of an Emerging Transdiscipline (InformingSciJ)     Open Access   (Followers: 10)
iNFOTEZY     Open Access  
Innovation : Journal of Appropriate Librarianship and Information Work in Southern Africa     Full-text available via subscription   (Followers: 4)
Insaniyat : Journal of Islam and Humanities     Open Access   (Followers: 1)
Insights : the UKSG journal     Open Access   (Followers: 118)
InterActions: UCLA Journal of Education and Information     Open Access   (Followers: 16)
Interdisciplinary Journal of e-Skills and Lifelong Learning     Open Access   (Followers: 4)
Interdisciplinary Journal of Information, Knowledge, and Management     Open Access   (Followers: 12)
International Association of School Librarianship Conference Proceedings     Open Access   (Followers: 2)
International Information & Library Review     Hybrid Journal   (Followers: 551)
International Journal of Bibliometrics in Business and Management     Hybrid Journal   (Followers: 2)
International Journal of Business Information Systems     Hybrid Journal   (Followers: 17)
International Journal of Cooperative Information Systems     Hybrid Journal   (Followers: 5)
International Journal of Digital Curation     Open Access   (Followers: 263)
International Journal of Digital Library Systems     Full-text available via subscription   (Followers: 75)
International Journal of Doctoral Studies     Open Access   (Followers: 3)
International Journal of Information and Decision Sciences     Hybrid Journal   (Followers: 10)
International Journal of Information Dissemination and Technology     Open Access   (Followers: 21)
International Journal of Information Management     Hybrid Journal   (Followers: 386)
International Journal of Information Privacy, Security and Integrity     Hybrid Journal   (Followers: 27)
International Journal of Information Retrieval Research     Full-text available via subscription   (Followers: 32)
International Journal of Information Science and Management     Open Access   (Followers: 7)
International Journal of Information Technology, Communications and Convergence     Hybrid Journal   (Followers: 16)
International Journal of Information, Diversity, & Inclusion     Open Access  
International Journal of Intellectual Property Management     Hybrid Journal   (Followers: 30)
International Journal of Intercultural Information Management     Hybrid Journal   (Followers: 12)
International Journal of Legal Information     Full-text available via subscription   (Followers: 351)
International Journal of Librarianship     Open Access   (Followers: 19)
International Journal of Library and Information Science     Open Access   (Followers: 461)
International Journal of Library Science     Full-text available via subscription   (Followers: 61)
International Journal of Library Science     Open Access   (Followers: 523)
International Journal of Multicriteria Decision Making     Hybrid Journal   (Followers: 8)
International Journal of Multimedia Information Retrieval     Partially Free   (Followers: 12)
International Journal of Organisational Design and Engineering     Hybrid Journal   (Followers: 5)
International Journal of Web Portals     Full-text available via subscription   (Followers: 18)
International Journal on Digital Libraries     Hybrid Journal   (Followers: 787)
InULA Notes : Indiana University Librarians Association     Open Access  
Investigación Bibliotecológica     Open Access   (Followers: 6)
IRIS - Revista de Informação, Memória e Tecnologia     Open Access  
Issues in Informing Science and Information Technology     Open Access   (Followers: 2)
Issues in Science and Technology Librarianship     Open Access   (Followers: 3)
it - Information Technology     Hybrid Journal   (Followers: 19)
JISTEM : Journal of Information Systems and Technology Management     Open Access   (Followers: 7)
JLIS.it     Open Access   (Followers: 7)
JMIR Medical Informatics     Open Access   (Followers: 9)
Journal of Academic Librarianship     Hybrid Journal   (Followers: 1199)
Journal of Access Services     Hybrid Journal   (Followers: 41)
Journal of Advancements in Library Sciences     Open Access   (Followers: 47)
Journal of Adventist Libraries and Archives     Open Access   (Followers: 3)
Journal of Altmetrics     Open Access   (Followers: 3)
Journal of Archival Organization     Hybrid Journal   (Followers: 28)
Journal of Balkan Libraries Union     Open Access   (Followers: 1)
Journal of Copyright in Education & Librarianship     Open Access   (Followers: 32)
Journal of Creative Library Practice     Open Access   (Followers: 101)
Journal of Data Mining and Digital Humanities     Open Access   (Followers: 41)
Journal of East Asian Libraries     Open Access   (Followers: 6)

        1 2 | Last

Similar Journals
Journal Cover
Egyptian Informatics Journal
Journal Prestige (SJR): 0.406
Citation Impact (citeScore): 3
Number of Followers: 5  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1110-8665
Published by Elsevier Homepage  [3203 journals]
  • A novel image encryption scheme based on 3D bit matrix and chaotic map
           with Markov properties

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s): Meng Ge, Ruisong YeAbstractBased on 3D cat map, reverse 3D cat map and an improved class of chaotic maps with Markov properties, an effective bit-level image encryption scheme is proposed. Firstly, we convert the plain-image into binary matrix, and use the sum of all bits in the binary matrix as a part of secret keys to resist chosen-plaintext attack and known-plaintext attack. Secondly, we design a mapping which maps a random bit position to another random bit position rather than using traditional sequential visiting the plain-image. Thirdly, a chaotic map with Markov properties is used in the diffuse process. This kind of chaotic map has good chaotic natures than the Logistic map, which keeps the uniformity and low autocorrelation. The results of simulation and security analysis show that the proposed image encryption scheme is able to resist various attacks and has excellent encryption performance.
       
  • An intelligent validation system for diagnostic and prognosis of
           ultrasound fetal growth analysis using Neuro-Fuzzy based on genetic
           algorithm

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s): Prabhpreet Kaur, Gurvinder Singh, Parminder KaurAcquisition of the standard plane is the prerequisite of biometric measurement and diagnosis during the ultrasound (US) examination. Based upon the analysis of existing algorithms for the automatic fetal development measurement, a new algorithm known as Neuro-Fuzzy based on genetic algorithm is developed. Firstly, the fetal ultrasound benchmark image is auto-pre-processed using Normal Shrink Homomorphic technique. Secondly, the features are extracted using Gray Level Co-occurrence Matrix (GLCM), Grey Level Run Length Matrix (GLRLM), Intensity Histogram (IH) and Rotation Invariant Moments (IM). Thirdly, Neuro-Fuzzy using Genetic approach is used to distinguish among the fetus growth as abnormal or normal. Experimental results using benchmark and live dataset demonstrate that the developed method achieves an accuracy of 97% as compared to the state-of- art methods in terms of parameters such as Sensitivity, Specificity, Recall, F-Measure &Precision Rate. The use of area under the receiver of characteristics(AUC) and confusion matrix as assessment indicators is also cross-validated using various classification methods by achieving best accuracy rate of Support Vector Machine (SVM) i.e. 98.7% as compare to other classification methods such as KNN, Ensemble methods, Linear Discriminant Analysis(LDA) and Decision Tree whereas ROC curve covers 0.9992 SVM.Graphical abstractGraphical abstract for this article
       
  • Hau-Kashyap approach for student’s level of expertise

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s): Andino Maseleno, Miftachul Huda, Kamarul Azmi Jasmi, Bushrah Basiron, Ismail Mustari, Abdul Ghaffar Don, Roslee bin AhmadAbstractThe recent reviews indicated learning expertise level could be enhanced with skills, creativity and preferences. This stage should be taken at the first stage combined highly with providing the framework in underlying the learning expertise. This paper attempts to propose the model of Hau-Kashyap used to describe in yielding the robust results to measure the learning expertise level. This approach was selected to give an insight with a more accurate by examining twelve items of questionnaire applied among the students at tertiary level to explore the representation of wide range of knowledge and skills. The results found that the stage level of belief that ranges combined from the level of expertise 1–12 was indicated that Hau-Kashyap approach can be determined to measure the learners’ expertise more fairly and easily. This method is supposed to contribute providing the purposeful rule in combining the learning expertise constructed into a single and more informative hint with related concern of the measurement.
       
  • Teaching-learning-based optimization algorithm to minimize cross entropy
           for Selecting multilevel threshold values

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s): Harmandeep Singh Gill, Baljit Singh Khehra, Arjan Singh, Lovepreet KaurAbstractImage thresholding is one of the most important approaches for image segmentation. Among multilevel thresholding techniques, cross entropy has been widely used by researchers to find multilevel threshold values. In multilevel cross entropy thresholding techniques, main target is to find an optimal combination of threshold values at different levels for minimizing the cross entropy. In this paper, Teaching-Learning-based Optimization (TLBO) algorithm is used to find an optimal combination of threshold values at different levels for minimizing the cross entropy. TLBO algorithm is inspired by passing on knowledge within a classroom environment where students first gain knowledge from a teacher and then through mutual interaction. This new proposed approach is called the TLBO-based minimum cross entropy thresholding (TLBO-based MCET) algorithm. The performance of the proposed algorithm is tested on a number of standard test images. For comparative analysis, the results of TLBO-based MCET algorithm are compared with the results of Firefly-based minimum cross entropy thresholding (FF-based MCET), Honey Bee Mating Optimization-based minimum cross entropy thresholding (HBMO-based MCET) and Quantum Particle Swarm Optimization-based minimum cross entropy thresholding (Quantam PSO-based MCET). Comparative analysis is done based on two most popular objective performance measures, Peak Signal to Noise Ratio (PSNR) and Uniformity. From experimental results, it is observed that the proposed method is an efficient and feasible method to search an optimal combination of threshold values at 2nd, 3rd, 4th and 5th levels.
       
  • Cloud based SDN and NFV architectures for IoT infrastructure

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s): Mamdouh Alenezi, Khaled Almustafa, Khalim Amjad MeerjaAbstractConnected devices which are commonly known as Internet of Things (IoT) are increasing at an alarming pace. Network infrastructure has to accommodate all these devices by providing adequate connectivity and delivering application based services. Service providers have to invest more in network infrastructure to meet the growing needs. To address this issue, a new concept of infrastructure sharing among service providers has emerged to reduce excessive investment costs related to infrastructure deployment. For this reason new architectures based on network virtualization are emerging to provide network sharing, handle Big data explosion from IoT devices, and simplify management tasks. Two complementary architectures, software defined networking (SDN) and network function virtualization (NFV) are emerging to comprehensively address several networking issues. In this work, we introduce the most embraced virtualization concepts proposed by SDN and NFV architectures. We quantitatively evaluate hardware and energy cost savings with these two SDN and NFV architectures compared to the existing state-of-the-art network 4G hardware technologies.
       
  • IFC: Editorial

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s):
       
  • Multi-agent based context aware information gathering for agriculture
           using Wireless Multimedia Sensor Networks

    • Abstract: Publication date: March 2019Source: Egyptian Informatics Journal, Volume 20, Issue 1Author(s): K.N. Bhanu, T. Bhaskara Reddy, M. HanumanthappaAbstractWireless multimedia sensor networks (WMSN) can be used in a wide range of applications such as monitoring agriculture, infrastructures, military operations, disaster management and so on. Energy conservation is a major concern in WMSN applications. This paper proposes a multi-agent based context-aware information gathering using WMSN for monitoring agriculture. Three kinds of contexts are considered in this paper such as detecting an emergency, temporal and computational contexts for detection of diseased plants, weeds, fire and interpret the soil fertility based on the soil parameters. This work considers contexts driven by a sensor node. Whenever the context is detected the information will be sent to the sink node. The proposed scheme works as follows: Every sensor senses the information and updates the node knowledge base. Based on the sensed information node interprets the context such as disease affected plants, soil fertility, fire, and growth of weeds. The sensor nodes begin to transmit the stored information to the cluster heads with the help of Path Finding Agent (PFA). Cluster heads aggregate the information received by the sensor nodes in the field before sending this information with the help of Querry Agent (QA) to the sink node. At the sink node all the information will be sent to the end-user, but in case of the fire detection, the immediate action will be taken by the sink node itself to turn on the sprinklers. Once the sensor finishes the assigned task (sensing, communicating) then automatically it goes into sleep mode. To detect plant disease and weeds, content-based image retrieval is used to compare with the healthy or useful plant images respectively. For performance analysis, the proposed scheme is simulated using NS2. Some of the performance parameters considered in this work are context detection time, delay, fusion time and energy consumption.
       
  • Using a two-level structural equation model to study the determinants of
           reproductive behaviour in Giza Governorate

    • Abstract: Publication date: Available online 28 February 2019Source: Egyptian Informatics JournalAuthor(s): Esmail Hassneen, Abdel-Hameed El-Abbasi, Mona Khalifa, Farouk ShoaebAbstractThe purpose of this paper was to measure the quality of concordance of one- and two-level structural equation models by testing the two following statistical hypotheses: first, the structure of the two-level model is more efficient than that of the one-level model; second, economic and social determinants and intermediate variables have a significant effect on current and future fertility in Giza Governorate. A two-tier bicameral model (women, geographical area) was built on 1500 families divided equally into three districts (urban, rural, and slum). The districts were divided into 294 convergent communities according to the standard of living. M−Plus 8.0 was used to estimate the numbers of four models. The first estimated structural relationships between the determinants of fertility within the layers; the second estimated relationships between the second and third strata; the third estimated structural equations at the second level; and the fourth included the constants and a random slope in the model. The results show that the estimated parameters of the models corresponded well to the model and the multi-level model, whose indicators are proposed within acceptable limits. The final proposed model and the significance of its coefficients were tested to ensure the quality of the compatibility of the final model. The results show that the overall quality of the proposed compatibility is very high and that the indicators are within the accepted limits. The compatibility quality index is 0.99, the correlation quality is corrected by 0.98, and the CI index of significance is 0.00. Therefore, we can say that the proposed multi-level structural model (based on the indicators of total compatibility quality) is more efficient than the one-level model, supporting the first hypothesis. The second hypothesis is that economic and social determinants and intermediate variables have a significant impact on current and future fertility.
       
  • Total opportunity cost matrix – Minimal total: A new approach to
           determine initial basic feasible solution of a transportation problem

    • Abstract: Publication date: Available online 26 January 2019Source: Egyptian Informatics JournalAuthor(s): Bilqis Amaliah, Chastine Fatichah, Erma SuryaniAbstractTransportation Problem (TP) deals with cost planning for delivering the product from the source to the destination and Initial Basic Feasible Solution (IBFS) is presented to find the way out in obtaining an optimal solution. IBFS is an important element to reach an optimal result. The previous methods related to it did not always provide the satisfied result all the time. Therefore a new method called Total Opportunity Cost Matrix – Minimal Total (TOCM-MT) to determine IBFS as a basic solution to solve TP was proposed. The objective is to achieve a total cost with similar or closer values to the optimal solution. TOCM for the initial matrix and a better mechanism are highly considered to obtain IBFS. Thirty-one numerical examples, in which twenty-five were selected from some journals and six were generated randomly, were used to evaluate the performance of it. The proposed method has been compared to Vogel’s Approximation Method (VAM), Juman and Hoque Method (JHM), and Total Differences Method 1 (TDM1). TOCM-MT was proven to have twenty-four numerical examples with similar values and seven numerical examples with closer values to the optimal solution. The experiment results indicated that TOCM-MT obtained better minimal cost than that of VAM, JHM, and TDM1.
       
  • Gender identification of egyptian dialect in twitter

    • Abstract: Publication date: Available online 24 January 2019Source: Egyptian Informatics JournalAuthor(s): Shereen Hussein, Mona Farouk, ElSayed HemayedAbstractDespite the widespread of social media among all age groups in Arabic countries, the research directed towards Author Profiling (AP) is still in its early stages. This paper provides an Egyptian Dialect Gender Annotated Dataset (EDGAD) obtained from Twitter as well as a proposed text classification solution for the Gender Identification (GI) problem. The dataset consists of 70,000 tweets per gender. In text classification, a Mixed Feature Vector (MFV) with different stylometric and Egyptian Arabic Dialect (EAD) language-specific features is proposed, in addition to N-Gram Feature Vector (NFV). Ensemble weighted average is applied to the Random Forest (RF) with MFV and Logistic Regression (LR) with NFV. The achieved gender identification accuracy is 87.6%.
       
  • Enhancing Greedy Web Proxy caching using Weighted Random Indexing based
           Data Mining Classifier

    • Abstract: Publication date: Available online 14 January 2019Source: Egyptian Informatics JournalAuthor(s): Julian Benadit Pernabas, Sagayraj Francis Fidele, Krishna Kumar VaithinathanAbstractWeb Proxy caching system is an intermediary between the Web users and servers that try to alleviate the loads on the origin servers by caching particular Web objects and behaves as the proxy for the server and services the requests that are made to the servers. In this paper, the performance of a Proxy system is measured by the number of hits at the Proxy. Higher number of hits at the Proxy server reflects the effectiveness of the Proxy system. The number of hits is determined by the replacement policies chosen by the Proxy systems. Traditional replacement policies that are based on time and size are reactive and do not consider the events that will possibly happen in the future. The performance of the web proxy caching system is improved by adapting Data Mining Classifier model based on Web User clustering and Weighted Random Indexing Methods. The outcome of the paper are proactive strategies that augment the traditional replacement policies such as GDS, GDSF, GD∗ which uses the Data Mining techniques.
       
  • Security and privacy issues in e-health cloud-based system: A
           comprehensive content analysis

    • Abstract: Publication date: Available online 21 December 2018Source: Egyptian Informatics JournalAuthor(s): Nureni Ayofe Azeez, Charles Van der VyverAbstractThe recent advancement in Information and Communication Technology (ICT) has undoubtedly improved services in all sectors in the world. Specifically, Information Technology (IT) has led to a very vital innovation in health sector called electronic health (e-Health). In order to optimize full and excellent benefits of this innovation, its implementation in a cloud-based environment is important. However, with noticeable and numerous benefits inherent from e-Health in a cloud computing, its full utilization is still being hampered by challenges of security and privacy. In this paper, we focused on extensive review of current and existing literatures of various approaches and mechanisms being used to handle security and privacy related matters in e-Health. Strengths and weaknesses of some of these approaches were enunciated. The literature review was carried out after selecting over One Hundred and Ten (1 1 0) original articles and figured out several models adopted in their solutions. After comparing models used, we arrived at the reviewed articles. Reviewed articles were narrowed down to the current number because of similarity observed in the models adopted by some researchers. Also, we give an acceptable and standard definition of e-Health. Effort was made to classify cloud-based models. Security and privacy requirements as recommended by Health Insurance Portability and Accountability Act (HIPAA) were also discussed and provided. Remarks and recommendations were made regarding the review process and future directions on security and privacy of e-Health in cloud computing was also provided. Finally, authors propose a secured and dependable architecture for electronic health that could guarantee efficiency, reliability and regulated access framework to health information. The architecture, though is currently under implementation, will guarantee absolute security and privacy between healthcare providers and the patients.
       
  • An efficient automated answer scoring system for Punjabi language

    • Abstract: Publication date: Available online 29 November 2018Source: Egyptian Informatics JournalAuthor(s): Tarandeep Singh Walia, Gurpreet Singh Josan, Amarpal SinghAbstractAutomated Scoring is a developing technology. The accuracy and reliability of these systems have been proven to be much higher. Besides being a time-and money-saver, there are a number of studies which are being conducted to provide variety in feedback, not only on grammatical issues, but also on semantic related issues. This will reduce not only the paper load of the teachers, but as well as teachers’ assessment related issues. In this paper, we remove those dummy note bins, thereby having 183 dimensions in total. We augmented the input by concatenating it with the first-order difference of the semitone filtered spectrogram. We observed a significant increase of the transcription performance with this addition. Compared to feedforward neural networks, recurrent neural network (RNN) are capable of learning temporal dependency of sequential data, which is the property found in music answer scoring.Also, the Long Short-Term Memory (LSTM) unit has a memory block updated only when an input or forget gate is open, and the gradients can propagate through memory cells without being multiplied each time step. Throughout backward and forward layers together, the networks can access to both history and future of the given time frame. Comparative analyses show that the proposed technique outperforms existing techniques.
       
  • IFC: Editorial

    • Abstract: Publication date: November 2018Source: Egyptian Informatics Journal, Volume 19, Issue 3Author(s):
       
  • Defense Against Protocol Level Attack in Tor Network using Deficit Round
           Robin Queuing Process

    • Abstract: Publication date: November 2018Source: Egyptian Informatics Journal, Volume 19, Issue 3Author(s): K. Sangeetha, K. RavikumarAbstractAmong different types of network, Tor network is mostly referred as an onion-routing network which enables the anonymous communication and supports TCP applications over the network. The onion-routing is utilized by the Tor network for transmitting the information of users via virtual circuits which are created by several successive relays. The performance and security of the anonymous communication in Tor network have been improved by using Novel Traffic Dividing and Scheduling (NTDS) mechanism. Normally, this mechanism was used for preventing the basic versions of sniper attacks in the Tor network. On the other hand, protocol-level attacks were not possible to prevent since some malicious entry router may duplicate, alter, insert or delete the TCP stream cells from the sender. This may cause cell recognition errors at the exit router and these cell recognition errors were recognized at the destination which helps to identify the sender. Hence, in this article, a defense mechanism called Mid-DRRQ is proposed for protocol-level attacks against Tor network. In Mid-DRRQ mechanism, the protocol-level attacks are prevented by using indistinguishability obfuscation model which generates the fake traffic within the middle relay. This fake traffic is allowed on outgoing connections without any cover traffic. Moreover, the outgoing connections of middle relays are controlled by using Deficit Round Robin queuing process. Finally, the simulation results show that the proposed mechanism effectively prevents the protocol-level attacks against Tor network.
       
  • A contemporary feature selection and classification framework for
           imbalanced biomedical datasets

    • Abstract: Publication date: November 2018Source: Egyptian Informatics Journal, Volume 19, Issue 3Author(s): Thulasi Bikku, Sambasiva Rao Nandam, Ananda Rao AkepoguAbstractDue to the availability of a large number of biomedical documents in the PubMed and Medline repositories, it is difficult to analyze, predict and interpret the document’s information using the traditional document clustering and classification models. Traditional document clustering and classification models were failed to analyze the document sets based on the user’s keyword and MESH terms. Due to the large number of feature sets, conventional models, such as SVM, Neural Networks, Multi-nominal naïve bayes have been used as feature classification, where additional text filtering measures are typically used as feature selection process. Also, as the size of the document’s increases, it becomes difficult to find the outliers using the document’s features and MESH terms. Biomedical document clustering and classification is one of the essential machine learning models for the knowledge extraction process of the real-time user recommended systems. In this paper, we developed a novel biomedical document feature clustering and classification model as a user recommended system for large document sets using the Hadoop framework. In this model, a novel gene feature clustering with ensemble document classification was implemented on biomedical repositories (PubMed and Medline) using the MapReduce framework. Experimental results show that the proposed model has a high computational cluster quality rate and true positive classification rate compared to traditional document clustering and classification models.
       
  • Feature selection and classification systems for chronic disease
           prediction: A review

    • Abstract: Publication date: November 2018Source: Egyptian Informatics Journal, Volume 19, Issue 3Author(s): Divya Jain, Vijendra SinghAbstractChronic Disease Prediction plays a pivotal role in healthcare informatics. It is crucial to diagnose the disease at an early stage. This paper presents a survey on the utilization of feature selection and classification techniques for the diagnosis and prediction of chronic diseases. Adequate selection of features plays a significant role for enhancing accuracy of classification systems. Dimensionality reduction helps in improving overall performance of machine learning algorithm. The application of classification algorithms on disease datasets yields promising results by developing adaptive, automated and intelligent diagnostic systems for chronic diseases. Parallel classification systems can be used to expedite the process and to enhance the computational efficiency of results. This work presents a comprehensive overview of various feature selection methods and their inherent pros and cons. We then analyze adaptive classification systems and parallel classification systems for chronic disease prediction.
       
  • A comparative study of similarity evaluation methods among trajectories of
           moving objects

    • Abstract: Publication date: November 2018Source: Egyptian Informatics Journal, Volume 19, Issue 3Author(s): Nehal Magdy, Tamer Abdelkader, Khaled El-BahnasyAbstractEvaluating similarity between moving objects’ trajectories has gained much attention in many application domains. There exist similarity measures in the literature that propose evaluating similarity between trajectories in the form of time stamped values. Their main drawback is that the similarity evaluation is affected by the different sampling rates as it is defined over sequences of time stamped values. One of these measures is the Time Warp Edit distance measure that was our base of measuring similarity in our TWEDistance operator. Therefore, in this paper, a comparative study is made between four different approaches: TWEDistance operator, regression, interpolation and curve barcoding. Similarity evaluation is made over trajectories of different sampling rates. Results show that interpolation achieves the highest accuracy compared to the other approaches with an average accuracy up to 90%. Experimental evaluation was made over synthetic and real datasets.
       
  • Hybrid meta-heuristic optimization based energy efficient protocol for
           wireless sensor networks

    • Abstract: Publication date: November 2018Source: Egyptian Informatics Journal, Volume 19, Issue 3Author(s): Supreet Kaur, Rajiv MahajanAbstractEnergy efficiency has recently turned out to be primary issue in wireless sensor networks. Sensor networks are battery powered, therefore become dead after a certain period of time. Thus, improving the data dissipation in energy efficient way becomes more challenging problem in order to improve the lifetime for sensor devices. The clustering and tree based data aggregation for sensor networks can enhance the network lifetime of wireless sensor networks. Hybrid Ant colony optimization (ACO) and particle swarm optimization (PSO) based energy efficient clustering and tree based routing protocol is proposed. Initially, clusters are formed on the basis of remaining energy, then, hybrid ACOPSO based data aggregation will come in action to improve the inter-cluster data aggregation further. Extensive analysis demonstrates that proposed protocol considerably enhances network lifetime over other techniques.
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.226.245.48
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-