


default search action
Journal of King Saud University - Computer and Information Sciences, Volume 32
Volume 32, Number 1, January 2020
- Amina El murabet

, Anouar Abtoy
, Abdellah Touhafi
, Abderrahim Tahiri:
Ambient Assisted living system's models and architectures: A survey of the state of the art. 1-10
- Kapil Juneja

:
An XML transformed method to improve effectiveness of graphical password authentication. 11-23 - Mishal Almazrooie, Azman Samsudin

, Adnan Abdul-Aziz Gutub
, Muhammad Syukri Salleh, Mohd. Adib Omar, Shahir Akram Hassan
:
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. 24-34 - Gagandeep Kaur, Vikas Saxena

, J. P. Gupta:
Detection of TCP targeted high bandwidth attacks using self-similarity. 35-49 - El-Habib Bensikaddour, Youcef Bentoutou, Nasreddine Taleb

:
Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher. 50-56 - Kashish Ara Shakil

, Farhana Javed Zareen, Mansaf Alam
, Suraiya Jabin
:
BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. 57-64 - Meisam Kamarei, Ahmad Patooghy

, Zohreh Shahsavari, Mohammad Javad Salehi:
Lifetime expansion in WSNs using mobile data collector: A learning automata approach. 65-72 - K. Munivara Prasad, A. Rama Mohan Reddy, K. Venugopal Rao:

BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. 73-87 - Yousef E. M. Hamouda, Mohammed M. Msallam

:
Variable sampling interval for energy-efficient heterogeneous precision agriculture using Wireless Sensor Networks. 88-98 - Gunikhan Sonowal

, K. S. Kuppusamy:
PhiDMA - A phishing detection model with multi-filter approach. 99-112 - Issa Atoum

:
A novel framework for measuring software quality-in-use based on semantic similarity and sentiment analysis of software reviews. 113-125 - Djulaga Hadzic

, Nermin Sarajlic:
Methodology for fuzzy duplicate record identification based on the semantic-syntactic information of similarity. 126-136 - Prabhishek Singh

, Raj Shree
:
A new homomorphic and method noise thresholding based despeckling of SAR image using anisotropic diffusion. 137-148
Volume 32, Number 2, February 2020
- Sambit Kumar Mishra

, Bibhudatta Sahoo
, Priti Paramita Parida:
Load balancing in cloud computing: A big picture. 149-158
- Bilal H. Abed-alguni

, Faisal Alkhateeb
:
Intelligent hybrid cuckoo search and β-hill climbing algorithm. 159-173 - Subrat Kumar Nayak

, Pravat Kumar Rout
, Alok Kumar Jagadev, Tripti Swarnkar
:
Elitism based Multi-Objective Differential Evolution for feature selection: A filter approach with an efficient redundancy measure. 174-187 - Youssef Hanyf

, Hassan Silkan
:
A queries-based structure for similarity searching in static and dynamic metric spaces. 188-196 - Susmita Mahato

, Dilip Kumar Yadav
, Danish Ali Khan
:
Personal characters to bits mapping using Dot Pattern Character Encoding Scheme (DPCES). 197-207 - Andi Sunyoto

, Agus Harjoko
, Retantyo Wardoyo
, Mochamad Hariadi
:
Wrist detection based on a minimum bounding box and geometric features. 208-215 - Susmita Mahato

, Danish Ali Khan
, Dilip Kumar Yadav
:
A modified approach to data hiding in Microsoft Word documents by change-tracking technique. 216-224 - Said Bahassine

, Abdellah Madani
, Mohammed Al-Sarem
, Mohamed Kissi
:
Feature selection using an improved Chi-square for Arabic text classification. 225-231 - Rasmita Dash

:
A two stage grading approach for feature selection and classification of microarray data using Pareto based feature ranking techniques: A case study. 232-247 - Muhanna A. Muhanna

, Rita N. Amro, Abdallah Qusef
:
Using a new set of heuristics in evaluating Arabic interfaces. 248-253 - Vikas Bhatnagar

, Ritanjali Majhi
, Sunil Sahadev
:
Predicting numbers of successful new products to launch using soft computing techniques: A case of firms from manufacturing sector industries. 254-265
Volume 32, Number 3, March 2020
- Mirsaeid Hosseini Shirvani

, Amir Masoud Rahmani
, Amir Sahafi
:
A survey study on virtual machine migration and server consolidation techniques in DVFS-enabled cloud datacenter: Taxonomy and challenges. 267-286
- Leena Mary Francis, N. Sreenath:

TEDLESS - Text detection using least-square SVM from natural scene. 287-299 - Md. Tarek Habib

, Anup Majumder
, A. Z. M. Jakaria, Morium Akter, Mohammad Shorif Uddin
, Farruk Ahmed:
Machine vision based papaya disease recognition. 300-309 - Ganesh Chandra

, Sanjay K. Dwivedi:
Query expansion based on term selection for Hindi - English cross lingual IR. 310-319 - Souad Larabi Marie-Sainte

, Nada Alalyani
:
Firefly Algorithm based Feature Selection for Arabic Text Classification. 320-328 - B. Jaya Lakshmi, M. Shashi, K. B. Madhuri:

A rough set based subspace clustering technique for high dimensional data. 329-334 - Ah. E. Hegazy, Mohamed Abd Allah Makhlouf

, Ghada Samy El-Tawel:
Improved salp swarm algorithm for feature selection. 335-344 - Smruti Rekha Das, Debahuti Mishra

, Minakhi Rout
:
A hybridized ELM-Jaya forecasting model for currency exchange prediction. 345-366 - Rosziati Ibrahim

, Maryam Ahmed, Richi Nayak
, Sapiee Jamel
:
Reducing redundancy of test cases generation using code smell detection and refactoring. 367-374 - Sagar Arun More, Pramod Jagan Deore

:
Gait-based human recognition using partial wavelet coherence and phase features. 375-383
Volume 32, Number 4, May 2020
- Faiza Belala, Ramdane Maamri

:
Formal modeling and analysis of complex software. 385-386 - Chafia Bouanaka

, Esma Maatougui, Faiza Belala, Nadia Zeghib:
A formal quantitative analysis of elastic cloud systems based on PSMaude. 387-397 - Soumiya Ain El Hayat, Fouad Toufik, Mohamed Bahaj

:
UML/OCL based design and the transition towards temporal object relational database with bitemporal data. 398-407 - Mohammed Nassim Lacheheub, Nabil Hameurlain, Ramdane Maamri

:
Resources consumption analysis of business process services in cloud computing using Petri Net. 408-418 - Wasiur Rhmann

, Babita Pandey
, Gufran Ahmad Ansari
, Devendra Kumar Pandey
:
Software fault prediction based on change metrics using hybrid algorithms: An empirical study. 419-424 - Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia:

Comparison of scalar point multiplication algorithms in a low resource device. 425-432 - Samir Benbelkacem, Nadia Zenati-Henda, Djamel Aouam

, Yousra Izountar, Samir Otmane:
MVC-3DC: Software architecture model for designing collaborative augmented reality and virtual reality systems. 433-446 - Neziha Jaouedi, Noureddine Boujnah

, Med Salim Bouhlel
:
A new hybrid deep learning model for human action recognition. 447-453 - Mouhoub Belazzoug, Mohamed Touahria, Farid Nouioua, Mohammed Brahimi:

An improved sine cosine algorithm to select features for text categorization. 454-464 - Zakarya Elaggoune

, Ramdane Maamri
, Imane Boussebough
:
A fuzzy agent approach for smart data extraction in big data environments. 465-478 - Rashmi Rekha Sahoo, Mitrabinda Ray

:
PSO based test case generation for critical path using improved combined fitness function. 479-490 - Abdia Hamdani, Abdelkrim Abdelli

:
Towards modelling and analyzing timed workflow systems with complex synchronizations. 491-504 - Soufiane Boulehouache, Selma Ouareth, Ramdane Maamri

:
A self-switching multi-strategic pedagogical agent. 505-513 - Nishtha Jatana, Bharti Suri

:
Particle Swarm and Genetic Algorithm applied to mutation testing for test data generation: A comparative evaluation. 514-521 - Ahmed Louazani, Larbi Sekhri:

Time Petri Nets based model for CL-MAC protocol with packet loss. 522-528 - Lakhdar Derdouri, Congduc Pham:

A delay analysis of active reliable multicast protocols on unreliable wireless mesh network backhaul. 529-541
Volume 32, Number 5, June 2020
- Haya Al-Tuwaijri, Sanaa Ghouzali

:
Android data storage security: A review. 543-552
- Sabenabanu Abdulkadhar

, Gurusamy Murugesan
, Jeyakumar Natarajan:
Classifying protein-protein interaction articles from biomedical literature using many relevant features and context-free grammar. 553-560 - Mohamed El Mohadab, Belaid Bouikhalene, Said Safi:

Automatic CV processing for scientific research using data mining algorithm. 561-567 - Sharmila Subudhi

, Suvasini Panigrahi:
Use of optimized Fuzzy C-Means clustering and supervised classifiers for automobile insurance fraud detection. 568-575 - Abdelhay Zoizou

, Arsalane Zarghili
, Ilham Chaker
:
A new hybrid method for Arabic multi-font text segmentation, and a reference corpus construction. 576-582 - Suwanto Raharjo

, Retantyo Wardoyo
, Agfianto Eko Putra
:
Detecting proper nouns in indonesian-language translation of the quran using a guided method. 583-591 - S. Singaravelan, R. Arun, D. Arunshunmugam, S. Jerina Catherine Joy, D. Murugan:

Inner interruption discovery and defense system by using data mining. 592-598 - Waleed Alomoush

, Khairuddin Omar
, Ayat Alrosan
, Yazan M. Alomari
, Dheeb Albashish, Ammar Almomani
:
Firefly photinus search algorithm. 599-607 - N. Sasikala, P. V. V. Kishore

:
Train bogie part recognition with multi-object multi-template matching adaptive algorithm. 608-617 - Kapil Juneja

:
MPMFFT based DCA-DBT integrated probabilistic model for face expression classification. 618-633
Volume 32, Number 6, July 2020
- Marco Antônio Calijorne Soares, Fernando Silva Parreiras:

A literature review on question answering techniques, paradigms and systems. 635-646
- J. Uthayakumar

, T. Vengattaraman
, P. Dhavachelvan:
Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: An application of bankruptcy prediction and credit risk analysis. 647-657 - Ahmed Taha

, Aya S. Hammad, Mazen Mohamed Selim:
A high capacity algorithm for information hiding in Arabic text. 658-665 - Raza Abbas Haidri, Chittaranjan Padmanabha Katti, Prem Chandra Saxena:

Cost effective deadline aware scheduling strategy for workflow applications on virtual machines in cloud computing. 666-683 - Golnoush Abaei

, Ali Selamat
, Jehad Al Dallal
:
A fuzzy logic expert system to predict module fault proneness using unlabeled data. 684-699 - Nimisha Patel

, Hiren Patel
:
Energy efficient strategy for placement of virtual machines selected from underloaded servers in compute Cloud. 700-708 - Anmar Abuhamdah

:
Adaptive elitist-ant system for medical clustering problem. 709-717 - Suparna Biswas

, Jaya Sil:
An efficient face recognition method using contourlet and curvelet transform. 718-729 - Oluwafolake Ojo

, Ayodeji Oludola Oluwatope
, Suraju Olusegun Ajadi:
Formal verification of a peer-to-peer streaming protocol. 730-740 - Sasmita Acharya, Chita Ranjan Tripathy:

A reliable fault-tolerant ANFIS model based data aggregation scheme for Wireless Sensor Networks. 741-753
Volume 32, Number 7, September 2020
- Mahmoud M. Khattab

, Akram M. Zeki
, Ali Amer Alwan
, Ahmed S. Badawy
:
Regularization-based multi-frame super-resolution: A systematic review. 755-762
- O. Deepa, J. Suguna:

An optimized QoS-based clustering with multipath routing protocol for Wireless Sensor Networks. 763-774 - Igi Ardiyanto

, Sunu Wibirama
, Fajri Nurwanto:
Sliding variance and data range for lightweight sports activity recognition with fusion of modalities. 775-783 - Sunil Kumar B. S., A. S. Manjunath, S. Christopher:

High efficient video coding using weighted entropy with optimized quantization matrix. 784-793 - Kashif Hussain, Mohd. Najib Mohd. Salleh

, Shi Cheng, Yuhui Shi, Rashid Naseem:
Artificial bee colony algorithm: A component-wise analysis using diversity measurement. 794-808 - Bhavana Srivastava, Md. Tanwir Uddin Haider:

Personalized assessment model for alphabets learning with learning objects in e-learning environment for dyslexia. 809-817 - Wahid Chergui

, Samir Zidat, Farhi Marir:
An approach to the acquisition of tacit knowledge based on an ontological model. 818-828 - P. K. Haleema, N. Ch. S. N. Iyengar

:
JADETraderPal - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments. 829-849 - Amine Benhfid

, El Bachir Ameur
, Youssef Taouil:
Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh. 850-859 - Bela Shrimali

, Hiren Patel
:
Multi-objective optimization oriented policy for performance and energy efficient resource allocation in Cloud environment. 860-869 - Noha A. Hikal

, Marwa Metwally Eid
:
A new approach for palmprint image encryption based on hybrid chaotic maps. 870-882
Volume 32, Number 8, October 2020
- Nada A. Rasheed

, Md. Jan Nordin:
Classification and reconstruction algorithms for the archaeological fragments. 883-894 - Abhilasha Singh

, Malay Kishore Dutta
:
A robust zero-watermarking scheme for tele-ophthalmological applications. 895-908 - Samir M. Koriem, Mohamed A. Bayoumi:

Detecting and measuring holes in Wireless Sensor Network. 909-916 - Arun Agarwal, Saurabh N. Mehta:

PC-CC: An advancement in forward error correction using polar and convolutional codes for MIMO-OFDM system. 917-927 - Nadia Guerroui

, Hamid Seridi:
Solving computational square jigsaw puzzles with a novel pairwise compatibility measure. 928-939 - Mrutyunjaya Panda:

Elephant search optimization combined with deep neural network for microarray data analysis. 940-948 - Subhadra Mishra, Debahuti Mishra

, Gour Hari Santra:
Adaptive boosting of weak regressors for forecasting of crop production considering climatic variability: An empirical assessment. 949-964 - Mohd Wazih Ahmad

, M. N. Doja, Tanvir Ahmad
:
Enumerative feature subset based ranking system for learning to rank in presence of implicit user feedback. 965-976 - Brahim Belgroun, Lotfi Admane:

A traces based system helping to assess knowledge level in e-learning system. 977-986
Volume 32, Number 9, November 2020
- Trilok Nath Pandey

, Alok Kumar Jagadev, Satchidananda Dehuri
, Sung-Bae Cho
:
A novel committee machine and reviews of neural network and statistical models for currency exchange rate prediction: An experimental analysis. 987-999
- Rajashree Dash

:
Performance analysis of an evolutionary recurrent Legendre Polynomial Neural Network in application to FOREX prediction. 1000-1011 - Ayesha Atta, Sagheer Abbas

, Muhammad Adnan Khan
, Gulzar Ahmed
, Umer Farooq
:
An adaptive approach: Smart traffic congestion control system. 1012-1019 - Mohit Ranjan Panda, Pradipta Kumar Das

, Saroj Kumar Pradhan
:
Hybridization of IWO and IPSO for mobile robots navigation in a dynamic environment. 1020-1033 - Randa Benkhelifa

, Fatima Zohra Laallam:
Exploring demographic information in online social networks for improving content classification. 1034-1044 - Sanjay Agrawal

, Rutuparna Panda
, Leena Samantaray
, Ajith Abraham:
A novel automated absolute intensity difference based technique for optimal MR brain image thresholding. 1045-1054 - Sara Rekkal

, Bakhta Amrane, Lakhdar Loukil:
A similarity network for web services operations substitution. 1055-1062 - Jocelyn Edinio Zacko Gbadouissa

, Ado Adamou Abba Ari
, Abdelhak Mourad Guéroui:
Efficient k-means based clustering scheme for mobile networks cell sites management. 1063-1070 - Rachida Boucebsi, Faiza Belala

:
A Bigraphical Reactive Systems with Sharing for modeling Wireless Mesh Networks. 1071-1080 - Vinod Kumar

, Rajendra Kumar
, Santosh K. Pandey:
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. 1081-1094
Volume 32, Number 10, December 2020
- S. B. Vinay Kumar

, P. V. Rao, H. A. Sharath
, B. M. Sachin, U. S. Ravi, B. V. Monica:
Review on VLSI design using optimization and self-adaptive particle swarm optimization. 1095-1107
- Yasser Mesmoudi

, Mohammed Lamnaour, Yasser El Khamlichi
, Abderrahim Tahiri, Abdellah Touhafi
, An Braeken
:
A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT). 1108-1116 - Nithya Balasubramanian, Thivyavignesh Ramasamy Gurumurthy

, Danthala Bharat:
Receiver based contention management: A cross layer approach to enhance performance of wireless networks. 1117-1126 - Thandar Thein, Myint Myat Myo, Sazia Parvin

, Amjad Gawanmeh
:
Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers. 1127-1139 - Shankar Thawkar

, Ranjana Ingolikar:
Classification of masses in digital mammograms using Biogeography-based optimization technique. 1140-1148 - Mücahid Barstugan, Rahime Ceylan:

The effect of dictionary learning on weight update of AdaBoost and ECG classification. 1149-1157 - Jyotismita Chaki

, Ranjan Parekh, Samar Bhattacharya:
Plant leaf classification using multiple descriptors: A hierarchical approach. 1158-1172 - Emad Mohamed Mashhour, Enas M. F. El Houby

, Khaled Tawfik Wassif
, Akram Ibrahim Salah:
A Novel Classifier based on Firefly Algorithm. 1173-1181 - Angulakshmi Maruthamuthu, Lakshmi Priya Gnanapandithan G.

:
Brain tumour segmentation from MRI using superpixels based spectral clustering. 1182-1193 - Lazim Abdullah, Razamin Ramli, Huda Omar Bakodah, Mahmod Othman

:
Developing a causal relationship among factors of e-commerce: A decision making approach. 1194-1201

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














