default search action
Journal of King Saud University - Computer and Information Sciences, Volume 32
Volume 32, Number 1, January 2020
- Amina El murabet, Anouar Abtoy, Abdellah Touhafi, Abderrahim Tahiri:
Ambient Assisted living system's models and architectures: A survey of the state of the art. 1-10
- Kapil Juneja:
An XML transformed method to improve effectiveness of graphical password authentication. 11-23 - Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd. Adib Omar, Shahir Akram Hassan:
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. 24-34 - Gagandeep Kaur, Vikas Saxena, J. P. Gupta:
Detection of TCP targeted high bandwidth attacks using self-similarity. 35-49 - El-Habib Bensikaddour, Youcef Bentoutou, Nasreddine Taleb:
Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. 50-56 - Kashish Ara Shakil, Farhana Javed Zareen, Mansaf Alam, Suraiya Jabin:
BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. 57-64 - Meisam Kamarei, Ahmad Patooghy, Zohreh Shahsavari, Mohammad Javad Salehi:
Lifetime expansion in WSNs using mobile data collector: A learning automata approach. 65-72 - K. Munivara Prasad, A. Rama Mohan Reddy, K. Venugopal Rao:
BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. 73-87 - Yousef E. M. Hamouda, Mohammed M. Msallam:
Variable sampling interval for energy-efficient heterogeneous precision agriculture using Wireless Sensor Networks. 88-98 - Gunikhan Sonowal, K. S. Kuppusamy:
PhiDMA - A phishing detection model with multi-filter approach. 99-112 - Issa Atoum:
A novel framework for measuring software quality-in-use based on semantic similarity and sentiment analysis of software reviews. 113-125 - Djulaga Hadzic, Nermin Sarajlic:
Methodology for fuzzy duplicate record identification based on the semantic-syntactic information of similarity. 126-136 - Prabhishek Singh, Raj Shree:
A new homomorphic and method noise thresholding based despeckling of SAR image using anisotropic diffusion. 137-148
Volume 32, Number 2, February 2020
- Sambit Kumar Mishra, Bibhudatta Sahoo, Priti Paramita Parida:
Load balancing in cloud computing: A big picture. 149-158
- Bilal H. Abed-alguni, Faisal Alkhateeb:
Intelligent hybrid cuckoo search and β-hill climbing algorithm. 159-173 - Subrat Kumar Nayak, Pravat Kumar Rout, Alok Kumar Jagadev, Tripti Swarnkar:
Elitism based Multi-Objective Differential Evolution for feature selection: A filter approach with an efficient redundancy measure. 174-187 - Youssef Hanyf, Hassan Silkan:
A queries-based structure for similarity searching in static and dynamic metric spaces. 188-196 - Susmita Mahato, Dilip Kumar Yadav, Danish Ali Khan:
Personal characters to bits mapping using Dot Pattern Character Encoding Scheme (DPCES). 197-207 - Andi Sunyoto, Agus Harjoko, Retantyo Wardoyo, Mochamad Hariadi:
Wrist detection based on a minimum bounding box and geometric features. 208-215 - Susmita Mahato, Danish Ali Khan, Dilip Kumar Yadav:
A modified approach to data hiding in Microsoft Word documents by change-tracking technique. 216-224 - Said Bahassine, Abdellah Madani, Mohammed Al-Sarem, Mohamed Kissi:
Feature selection using an improved Chi-square for Arabic text classification. 225-231 - Rasmita Dash:
A two stage grading approach for feature selection and classification of microarray data using Pareto based feature ranking techniques: A case study. 232-247 - Muhanna A. Muhanna, Rita N. Amro, Abdallah Qusef:
Using a new set of heuristics in evaluating Arabic interfaces. 248-253 - Vikas Bhatnagar, Ritanjali Majhi, Sunil Sahadev:
Predicting numbers of successful new products to launch using soft computing techniques: A case of firms from manufacturing sector industries. 254-265
Volume 32, Number 3, March 2020
- Mirsaeid Hosseini Shirvani, Amir Masoud Rahmani, Amir Sahafi:
A survey study on virtual machine migration and server consolidation techniques in DVFS-enabled cloud datacenter: Taxonomy and challenges. 267-286
- Leena Mary Francis, N. Sreenath:
TEDLESS - Text detection using least-square SVM from natural scene. 287-299 - Md. Tarek Habib, Anup Majumder, A. Z. M. Jakaria, Morium Akter, Mohammad Shorif Uddin, Farruk Ahmed:
Machine vision based papaya disease recognition. 300-309 - Ganesh Chandra, Sanjay K. Dwivedi:
Query expansion based on term selection for Hindi - English cross lingual IR. 310-319 - Souad Larabi Marie-Sainte, Nada Alalyani:
Firefly Algorithm based Feature Selection for Arabic Text Classification. 320-328 - B. Jaya Lakshmi, M. Shashi, K. B. Madhuri:
A rough set based subspace clustering technique for high dimensional data. 329-334 - Ah. E. Hegazy, Mohamed Abd Allah Makhlouf, Ghada Samy El-Tawel:
Improved salp swarm algorithm for feature selection. 335-344 - Smruti Rekha Das, Debahuti Mishra, Minakhi Rout:
A hybridized ELM-Jaya forecasting model for currency exchange prediction. 345-366 - Rosziati Ibrahim, Maryam Ahmed, Richi Nayak, Sapiee Jamel:
Reducing redundancy of test cases generation using code smell detection and refactoring. 367-374 - Sagar Arun More, Pramod Jagan Deore:
Gait-based human recognition using partial wavelet coherence and phase features. 375-383
Volume 32, Number 4, May 2020
- Faiza Belala, Ramdane Maamri:
Formal modeling and analysis of complex software. 385-386 - Chafia Bouanaka, Esma Maatougui, Faiza Belala, Nadia Zeghib:
A formal quantitative analysis of elastic cloud systems based on PSMaude. 387-397 - Soumiya Ain El Hayat, Fouad Toufik, Mohamed Bahaj:
UML/OCL based design and the transition towards temporal object relational database with bitemporal data. 398-407 - Mohammed Nassim Lacheheub, Nabil Hameurlain, Ramdane Maamri:
Resources consumption analysis of business process services in cloud computing using Petri Net. 408-418 - Wasiur Rhmann, Babita Pandey, Gufran Ahmad Ansari, Devendra Kumar Pandey:
Software fault prediction based on change metrics using hybrid algorithms: An empirical study. 419-424 - Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia:
Comparison of scalar point multiplication algorithms in a low resource device. 425-432 - Samir Benbelkacem, Nadia Zenati-Henda, Djamel Aouam, Yousra Izountar, Samir Otmane:
MVC-3DC: Software architecture model for designing collaborative augmented reality and virtual reality systems. 433-446 - Neziha Jaouedi, Noureddine Boujnah, Med Salim Bouhlel:
A new hybrid deep learning model for human action recognition. 447-453 - Mouhoub Belazzoug, Mohamed Touahria, Farid Nouioua, Mohammed Brahimi:
An improved sine cosine algorithm to select features for text categorization. 454-464 - Zakarya Elaggoune, Ramdane Maamri, Imane Boussebough:
A fuzzy agent approach for smart data extraction in big data environments. 465-478 - Rashmi Rekha Sahoo, Mitrabinda Ray:
PSO based test case generation for critical path using improved combined fitness function. 479-490 - Abdia Hamdani, Abdelkrim Abdelli:
Towards modelling and analyzing timed workflow systems with complex synchronizations. 491-504 - Soufiane Boulehouache, Selma Ouareth, Ramdane Maamri:
A self-switching multi-strategic pedagogical agent. 505-513 - Nishtha Jatana, Bharti Suri:
Particle Swarm and Genetic Algorithm applied to mutation testing for test data generation: A comparative evaluation. 514-521 - Ahmed Louazani, Larbi Sekhri:
Time Petri Nets based model for CL-MAC protocol with packet loss. 522-528 - Lakhdar Derdouri, Congduc Pham:
A delay analysis of active reliable multicast protocols on unreliable wireless mesh network backhaul. 529-541
Volume 32, Number 5, June 2020
- Haya Al-Tuwaijri, Sanaa Ghouzali:
Android data storage security: A review. 543-552
- Sabenabanu Abdulkadhar, Gurusamy Murugesan, Jeyakumar Natarajan:
Classifying protein-protein interaction articles from biomedical literature using many relevant features and context-free grammar. 553-560 - Mohamed El Mohadab, Belaid Bouikhalene, Said Safi:
Automatic CV processing for scientific research using data mining algorithm. 561-567 - Sharmila Subudhi, Suvasini Panigrahi:
Use of optimized Fuzzy C-Means clustering and supervised classifiers for automobile insurance fraud detection. 568-575 - Abdelhay Zoizou, Arsalane Zarghili, Ilham Chaker:
A new hybrid method for Arabic multi-font text segmentation, and a reference corpus construction. 576-582 - Suwanto Raharjo, Retantyo Wardoyo, Agfianto Eko Putra:
Detecting proper nouns in indonesian-language translation of the quran using a guided method. 583-591 - S. Singaravelan, R. Arun, D. Arunshunmugam, S. Jerina Catherine Joy, D. Murugan:
Inner interruption discovery and defense system by using data mining. 592-598 - Waleed Alomoush, Khairuddin Omar, Ayat Alrosan, Yazan M. Alomari, Dheeb Albashish, Ammar Almomani:
Firefly photinus search algorithm. 599-607 - N. Sasikala, P. V. V. Kishore:
Train bogie part recognition with multi-object multi-template matching adaptive algorithm. 608-617 - Kapil Juneja:
MPMFFT based DCA-DBT integrated probabilistic model for face expression classification. 618-633
Volume 32, Number 6, July 2020
- Marco Antônio Calijorne Soares, Fernando Silva Parreiras:
A literature review on question answering techniques, paradigms and systems. 635-646
- J. Uthayakumar, T. Vengattaraman, P. Dhavachelvan:
Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: An application of bankruptcy prediction and credit risk analysis. 647-657 - Ahmed Taha, Aya S. Hammad, Mazen Mohamed Selim:
A high capacity algorithm for information hiding in Arabic text. 658-665 - Raza Abbas Haidri, Chittaranjan Padmanabha Katti, Prem Chandra Saxena:
Cost effective deadline aware scheduling strategy for workflow applications on virtual machines in cloud computing. 666-683 - Golnoush Abaei, Ali Selamat, Jehad Al Dallal:
A fuzzy logic expert system to predict module fault proneness using unlabeled data. 684-699 - Nimisha Patel, Hiren Patel:
Energy efficient strategy for placement of virtual machines selected from underloaded servers in compute Cloud. 700-708 - Anmar Abuhamdah:
Adaptive elitist-ant system for medical clustering problem. 709-717 - Suparna Biswas, Jaya Sil:
An efficient face recognition method using contourlet and curvelet transform. 718-729 - Oluwafolake Ojo, Ayodeji Oludola Oluwatope, Suraju Olusegun Ajadi:
Formal verification of a peer-to-peer streaming protocol. 730-740 - Sasmita Acharya, Chita Ranjan Tripathy:
A reliable fault-tolerant ANFIS model based data aggregation scheme for Wireless Sensor Networks. 741-753
Volume 32, Number 7, September 2020
- Mahmoud Khattab, Akram M. Zeki, Ali Amer Alwan, Ahmed S. Badawy:
Regularization-based multi-frame super-resolution: A systematic review. 755-762
- O. Deepa, J. Suguna:
An optimized QoS-based clustering with multipath routing protocol for Wireless Sensor Networks. 763-774 - Igi Ardiyanto, Sunu Wibirama, Fajri Nurwanto:
Sliding variance and data range for lightweight sports activity recognition with fusion of modalities. 775-783 - Sunil Kumar B. S., A. S. Manjunath, S. Christopher:
High efficient video coding using weighted entropy with optimized quantization matrix. 784-793 - Kashif Hussain, Mohd. Najib Mohd. Salleh, Shi Cheng, Yuhui Shi, Rashid Naseem:
Artificial bee colony algorithm: A component-wise analysis using diversity measurement. 794-808 - Bhavana Srivastava, Md. Tanwir Uddin Haider:
Personalized assessment model for alphabets learning with learning objects in e-learning environment for dyslexia. 809-817 - Wahid Chergui, Samir Zidat, Farhi Marir:
An approach to the acquisition of tacit knowledge based on an ontological model. 818-828 - P. K. Haleema, N. Ch. S. N. Iyengar:
JADETraderPal - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments. 829-849 - Amine Benhfid, El Bachir Ameur, Youssef Taouil:
Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh. 850-859 - Bela Shrimali, Hiren Patel:
Multi-objective optimization oriented policy for performance and energy efficient resource allocation in Cloud environment. 860-869 - Noha A. Hikal, Marwa Metwally Eid:
A new approach for palmprint image encryption based on hybrid chaotic maps. 870-882
Volume 32, Number 8, October 2020
- Nada A. Rasheed, Md. Jan Nordin:
Classification and reconstruction algorithms for the archaeological fragments. 883-894 - Abhilasha Singh, Malay Kishore Dutta:
A robust zero-watermarking scheme for tele-ophthalmological applications. 895-908 - Samir M. Koriem, Mohamed A. Bayoumi:
Detecting and measuring holes in Wireless Sensor Network. 909-916 - Arun Agarwal, Saurabh N. Mehta:
PC-CC: An advancement in forward error correction using polar and convolutional codes for MIMO-OFDM system. 917-927 - Nadia Guerroui, Hamid Seridi:
Solving computational square jigsaw puzzles with a novel pairwise compatibility measure. 928-939 - Mrutyunjaya Panda:
Elephant search optimization combined with deep neural network for microarray data analysis. 940-948 - Subhadra Mishra, Debahuti Mishra, Gour Hari Santra:
Adaptive boosting of weak regressors for forecasting of crop production considering climatic variability: An empirical assessment. 949-964 - Mohd Wazih Ahmad, M. N. Doja, Tanvir Ahmad:
Enumerative feature subset based ranking system for learning to rank in presence of implicit user feedback. 965-976 - Brahim Belgroun, Lotfi Admane:
A traces based system helping to assess knowledge level in e-learning system. 977-986
Volume 32, Number 9, November 2020
- Trilok Nath Pandey, Alok Kumar Jagadev, Satchidananda Dehuri, Sung-Bae Cho:
A novel committee machine and reviews of neural network and statistical models for currency exchange rate prediction: An experimental analysis. 987-999
- Rajashree Dash:
Performance analysis of an evolutionary recurrent Legendre Polynomial Neural Network in application to FOREX prediction. 1000-1011 - Ayesha Atta, Sagheer Abbas, Muhammad Adnan Khan, Gulzar Ahmed, Umer Farooq:
An adaptive approach: Smart traffic congestion control system. 1012-1019 - Mohit Ranjan Panda, Pradipta Kumar Das, Saroj Pradhan:
Hybridization of IWO and IPSO for mobile robots navigation in a dynamic environment. 1020-1033 - Randa Benkhelifa, Fatima Zohra Laallam:
Exploring demographic information in online social networks for improving content classification. 1034-1044 - Sanjay Agrawal, Rutuparna Panda, Leena Samantaray, Ajith Abraham:
A novel automated absolute intensity difference based technique for optimal MR brain image thresholding. 1045-1054 - Sara Rekkal, Bakhta Amrane, Lakhdar Loukil:
A similarity network for web services operations substitution. 1055-1062 - Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui:
Efficient k-means based clustering scheme for mobile networks cell sites management. 1063-1070 - Rachida Boucebsi, Faiza Belala:
A Bigraphical Reactive Systems with Sharing for modeling Wireless Mesh Networks. 1071-1080 - Vinod Kumar, Rajendra Kumar, Santosh K. Pandey:
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. 1081-1094
Volume 32, Number 10, December 2020
- S. B. Vinay Kumar, P. V. Rao, H. A. Sharath, B. M. Sachin, U. S. Ravi, B. V. Monica:
Review on VLSI design using optimization and self-adaptive particle swarm optimization. 1095-1107
- Yasser Mesmoudi, Mohammed Lamnaour, Yasser El Khamlichi, Abderrahim Tahiri, Abdellah Touhafi, An Braeken:
A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT). 1108-1116 - Nithya Balasubramanian, Thivyavignesh Ramasamy Gurumurthy, Danthala Bharat:
Receiver based contention management: A cross layer approach to enhance performance of wireless networks. 1117-1126 - Thandar Thein, Myint Myat Myo, Sazia Parvin, Amjad Gawanmeh:
Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers. 1127-1139 - Shankar Thawkar, Ranjana Ingolikar:
Classification of masses in digital mammograms using Biogeography-based optimization technique. 1140-1148 - Mücahid Barstugan, Rahime Ceylan:
The effect of dictionary learning on weight update of AdaBoost and ECG classification. 1149-1157 - Jyotismita Chaki, Ranjan Parekh, Samar Bhattacharya:
Plant leaf classification using multiple descriptors: A hierarchical approach. 1158-1172 - Emad Mohamed Mashhour, Enas M. F. El Houby, Khaled Tawfik Wassif, Akram Ibrahim Salah:
A Novel Classifier based on Firefly Algorithm. 1173-1181 - Angulakshmi Maruthamuthu, Lakshmi Priya Gnanapandithan G.:
Brain tumour segmentation from MRI using superpixels based spectral clustering. 1182-1193 - Lazim Abdullah, Razamin Ramli, Huda Omar Bakodah, Mahmod Othman:
Developing a causal relationship among factors of e-commerce: A decision making approach. 1194-1201
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.