


default search action
Journal of King Saud University - Computer and Information Sciences, Volume 33
Volume 33, Number 1, January 2021
- Pawan Kumar Ojha, Abid Ismail

, K. S. Kuppusamy:
Perusal of readability with focus on web content understandability. 1-10
- Dewi Rahmawati

, Riyanarto Sarno:
Anomaly detection using control flow pattern and fuzzy regression in port container handling. 11-20 - Rabei Raad Ali

, Kamaruddin Malik Mohamad:
RX_myKarve carving framework for reassembling complex fragmentations of JPEG images. 21-32 - Shailendra Aswale

, Vijay Ram Ghorpade
:
Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks. 33-44 - Shahzeb Khan, Jawwad Ahmed Shamsi:

Health Quest: A generalized clinical decision support system with multi-label classification. 45-53 - Bhagyalakshmi Vishwanath, Ramchandra Vittal Pujeri, Geetha Dundesh Devanagavi:

GB-SVNN: Genetic BAT assisted support vector neural network for arrhythmia classification using ECG signals. 54-67 - Zouaoui Samia, Rezeg Khaled:

Islamic inheritance calculation system based on Arabic ontology (AraFamOnto). 68-76 - Musheer Ahmad

, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. 77-85 - Renu Mary Daniel

, Elijah Blessing Rajsingh
, Salaja Silas
:
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. 86-98 - Khawlah Altuwairqi

, Salma Kammoun Jarraya
, Arwa Allinjawi, Mohamed Hammami
:
A new emotion-based affective model to detect student's engagement. 99-109 - Revathi Balasundaram

, Gnanou Florence Sudha:
Retrieval performance analysis of multibiometric database using optimized multidimensional spectral hashing based indexing. 110-117 - Sariga Arjunan, Pothula Sujatha:

Corrigendum to "A survey on unequal clustering protocols in Wireless Sensor Networks" [J. King Saud Univ. - Comput. Inf. Sci. 31 (2019) 304-317]. J. King Saud Univ. Comput. Inf. Sci. 33(1): 118 (2021)
Volume 33, Number 2, February 2021
- Uthayakumar J., Vengattaraman Thirumal

, Dhavachelvan Ponnurangam:
A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. 119-140
- Saliha Mezzoudj

, Ali Behloul, Rachid Seghir
, Yassmina Saadna
:
A parallel content-based image retrieval system using spark and tachyon frameworks. 141-149 - Meenakshi Pawar, Sanjay N. Talbar

:
Local entropy maximization based image fusion for contrast enhancement of mammogram. 150-160 - Md. Khaliluzzaman

:
Analytical justification of vanishing point problem in the case of stairways recognition. 161-182 - Dheeraj Malhotra

, Om Prakash Rishi
:
An intelligent approach to design of E-Commerce metasearch and ranking system using next-generation big data analytics. 183-194 - Rasmita Dash

:
An Adaptive Harmony Search Approach for Gene Selection and Classification of High Dimensional Medical Data. 195-207 - Ismaila Adeniyi Kamil

, Sunday Oyinlola Ogundoyin
:
EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. 208-217 - Hamza Alami

, Noureddine Ennahnahi
, Khalid Alaoui Zidani, Saïd El Alaoui Ouatik
:
An arabic question classification method based on new taxonomy and continuous distributed representation of words. 218-224 - Gayathri Nemani Bhagya, Thumbur Gowri, Krishna Rao Ravva Rama Venkata, Punugu Vasudeva Reddy:

Efficient and secure pairing-free certificateless directed signature scheme. 225-234 - Fatma Elghannam:

Text representation and classification based on bi-gram alphabet. 235-242
Volume 33, Number 3, March 2021
- Anuja Bhargava

, Atul Bansal
:
Fruits and vegetables quality evaluation using computer vision: A review. 243-257
- Abderrahim Nabi

, Zoubir Ahmed-Foitih, Mohammed El-Amine Cheriet:
Improved triangular-based star pattern recognition algorithm for low-cost star trackers. 258-267 - Priyanka Ahlawat

, Mayank Dave
:
An attack resistant key predistribution scheme for wireless sensor networks. 268-280 - Samir Gourdache, Azeddine Bilami

, Kamel Barka:
A framework for spectrum harvesting in heterogeneous wireless networks integration. 281-290 - Sunny Behal

, Krishan Kumar
, Monika Sachdeva
:
D-FAC: A novel ϕ-Divergence based distributed DDoS defense system. 291-303 - Dwi Sunaryono

, Joko Siswantoro
, Radityo Anggoro
:
An android based course attendance system using face recognition. 304-312 - Prabhishek Singh

, Raj Shree
, Manoj Diwakar
:
A new SAR image despeckling using correlation based fusion and method noise thresholding. 313-328 - Hanung Adi Nugroho

, Zulfanahri, Eka Legya Frannita
, Igi Ardiyanto
, Lina Choridah
:
Computer aided diagnosis for thyroid cancer system based on internal and external characteristics. 329-339 - M. S. Safna Asiq

, W. R. Sam Emmanuel
:
Polyscale gradients residual demosaicking. 340-350 - Sarah Saad Eldin, Ammar Mohammed

, Hesham A. Hefny
, Ahmed Sharaf Eldin Ahmed
:
An Enhanced Opinion Retrieval Approach on Arabic Text for Customer Requirements Expansion. 351-363 - Sunita, Deepak Garg

:
Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue. 364-373
Volume 33, Number 4, May 2021
- Juhar Ahmed Abdella

, Nazar M. Zaki
, Khaled Shuaib, Fahad Shahbaz Khan:
Airline ticket price and demand prediction: A survey. 375-391
- I. Michael Revina, W. R. Sam Emmanuel:

Face expression recognition using LDN and Dominant Gradient Local Ternary Pattern descriptors. 392-398 - Ayodeji Olalekan Salau

, Thomas Kokumo Yesufu
, Babatunde Sunday Ogundare:
Vehicle plate number localization using a modified GrabCut algorithm. 399-407 - Sridhar Raj S

, Malaiyappan Nandhini
:
Ensemble human movement sequence prediction model with Apriori based Probability Tree Classifier (APTC) and Bagged J48 on Machine learning. 408-416 - Khalid Hussain

, N. Z. Jhanjhi
, Hafiz Mati-ur-Rahman
, Jawad Hussain, Muhammad Hasan Islam:
Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes. 417-425 - Sreeja Cherillath Sukumaran, Mohammed Misbahuddin

:
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing. 426-435 - Muhammad Aamir, Syed Mustafa Ali Zaidi:

Clustering based semi-supervised machine learning for DDoS attack classification. 436-446 - Sandeep Kumar Raghuwanshi

, Rajesh Kumar Pateriya
:
Accelerated Singular Value Decomposition (ASVD) using momentum based Gradient Descent Optimization. 447-452 - Parimal Kumar Giri, Sagar S. De

, Satchidananda Dehuri:
Adaptive neighbourhood for locally and globally tuned biogeography based optimization algorithm. 453-467 - Mazhar Ali Dootio

, Asim Imdad Wagan
:
Development of Sindhi text corpus. 468-475 - Moukrim Chouaib

, Abderrahim Tragha, El Habib Benlahmer
, Tarik Almalki:
An innovative approach to autocorrecting grammatical errors in Arabic texts. 476-488 - Amuthan Arjunan

, Kaviarasan Ramu
:
Weighted Distance Hyperbolic Prediction-Based Detection Scheme for Non Line Of Sight nodes in VANETs. 489-496
Volume 33, Number 5, June 2021
- Imane Guellil, Houda Saadane, Faiçal Azouaou, Billel Gueni, Damien Nouvel:

Arabic natural language processing: An overview. 497-507 - Jaspreet Singh

, Gurvinder Singh, Rajinder Singh, Prithvipal Singh:
Morphological evaluation and sentiment analysis of Punjabi text using deep learning classification. 508-517
- Rizki Nurfauzi

, Hanung Adi Nugroho
, Igi Ardiyanto, Eka Legya Frannita
:
Autocorrection of lung boundary on 3D CT lung cancer images. 518-527 - K. P. Baby Resma, Madhu S. Nair

:
Multilevel thresholding for image segmentation using Krill Herd Optimization algorithm. 528-541 - Fahima Tabassum, Md. Imdadul Islam, M. Ruhul Amin:

Comparison of filter banks of DWT in recovery of image using one dimensional signal vector. 542-551 - Sanjeev Narayan Bal, Manas Ranjan Nayak

, Subir Kumar Sarkar:
On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. 552-561 - Ali Shakiba

:
A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad. 562-571 - Sudhansu Bala Das, Sugyan Kumar Mishra, Anup Kumar Sahu:

Alarm Coloring and Grouping algorithm for root cause analysis. 572-579 - Mohamed Ibrahim Beer Mohamed, Mohd Fadzil Hassan

, Sohail Safdar, Muhammad Qaiser Saleem
:
Adaptive security architectural model for protecting identity federation in service oriented computing. 580-592 - Imad El Ghoubach

, Rachid Ben Abbou
, Fatiha Mrabti:
A secure and efficient remote data auditing scheme for cloud storage. 593-599 - Santosh Kumar

, Awadhesh Kumar Singh:
A localized algorithm for clustering in cognitive radio networks. 600-607 - Shamanth Nagaraju

, Lucy J. Gudino, Nikhil Tripathi, V. Sreejith, C. K. Ramesha:
Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach. 608-618
Volume 33, Number 6, July 2021
- I. Michael Revina, W. R. Sam Emmanuel

:
A Survey on Human Face Expression Recognition Techniques. 619-628
- Manal Abd Al-Jabbar Ahmad Mizher, Riza Sulaiman, Ayman Mahmoud Aref Abdalla

, Manar Abduljabbar Ahmad Mizher:
A simple flexible cryptosystem for meshed 3D objects and images. 629-646 - Babita Majhi, C. M. Anish

, Ritanjali Majhi
:
On development of novel hybrid and robust adaptive models for net asset value prediction. 647-657 - Nur Aqilah Paskhal Rostam, Nurul Hashimah Ahamed Hassain Malim

:
Text categorisation in Quran and Hadith: Overcoming the interrelation challenges using machine learning and term weighting. 658-667 - Varsha Harpale

, Vinayak K. Bairagi
:
An adaptive method for feature selection and extraction for classification of epileptic EEG signal in significant states. 668-676 - Aziz Qaroush, Ibrahim Abu Farha

, Wasel Ghanem
, Mahdi Washaha, Eman Maali:
An efficient single document Arabic text summarization using a combination of statistical and semantic features. 677-692 - Sajidha Syed Azimuddin

, Siddha Prabhu Chodnekar, Kalyani Desikan
:
Initial seed selection for K-modes clustering - A distance and density based approach. 693-701 - Feras Al-Hawari

, Hala Barham:
A machine learning based help desk system for IT service management. 702-718 - Deepti Mehrotra

, Rashi Srivastava, Renuka Nagpal
, Deepshikha Nagpal:
Multiclass classification of mobile applications as per energy consumption. 719-727 - Nur Aini Rakhmawati

, Jauhar Fatawi, Ahmad Choirun Najib, Azmi Adi Firmansyah:
Linked open data for halal food products. 728-739 - Shailendra Pratap Singh

, Vibhav Prakash Singh
, Ashok Kumar Mehta
:
Differential evolution using homeostasis adaption based mutation operator and its application for software cost estimation. 740-752 - Faiza Beirade, Hamid Azzoune, Djamel Eddine Zegour:

Semantic query for Quranic ontology. 753-760
Volume 33, Number 7, September 2021
- Isaac Odun-Ayo, Rowland Goddy-Worlu, Jamaiah Yahaya, Victor Geteloma

:
A systematic mapping study of cloud policy languages and programming models. 761-768
- Arpita Jadhav Bhatt

, Chetna Gupta, Sangeeta Mittal
:
iABC-AL: Active learning-based privacy leaks threat detection for iOS applications. 769-786 - Masurah Mohamad, Ali Selamat

, Imam Much Ibnu Subroto
, Ondrej Krejcar
:
Improving the classification performance on imbalanced data sets via new hybrid parameterisation model. 787-797 - Manik Sharma

, G. Singh, R. Singh:
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm. 798-809 - Lo'ai Ali Tawalbeh

, Gökay Saldamli:
Reconsidering big data security and privacy in cloud and mobile cloud systems. 810-819 - Sagenela Vijaya Kumar

, C. Nagaraju
:
Support vector neural network based fuzzy hybrid filter for impulse noise identification and removal from gray-scale image. 820-835 - Fella Berrimi, Khier Benmahammed, Riadh Hedli

:
Denoising of degraded face images sequence in PCA domain for recognition. 836-843 - Ranjeet Kumar Singh, Binod Kumar, Dilip Kumar Shaw

, Danish Ali Khan
:
Level by level image compression-encryption algorithm based on quantum chaos map. 844-851 - Kiran Kumar Eepuri

, P. V. V. Kishore
, Dande Anil Kumar, Maddala Teja Kiran Kumar
:
Early estimation model for 3D-discrete indian sign language recognition using graph matching. 852-864 - Ali A. Hamzah

, Sherif M. Khattab
, Hanaa Bayomi:
A linguistic steganography framework using Arabic calligraphy. 865-877 - Ahmad Shaik

, V. Thanikaiselvan
:
Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification. 878-889 - Ibtissam Touahri

, Azzeddine Mazroui:
Studying the effect of characteristic vector alteration on Arabic sentiment classification. 890-898 - Hichem Rahab

, Abdelhafid Zitouni, Mahieddine Djoudi:
SANA: Sentiment analysis on newspapers comments in Algeria. 899-907 - Akshat Gaurav

, Awadhesh Kumar Singh:
Light weight approach for secure backbone construction for MANETs. 908-919
Volume 33, Number 8, October 2021
- Saniya Zahoor, Roohie Naaz Mir:

Resource management in pervasive Internet of Things: A survey. 921-935
- A. Amuthan

, Arulmurugan A.
:
Semi-Markov inspired hybrid trust prediction scheme for prolonging lifetime through reliable cluster head selection in WSNs. 936-946 - Gaurav Kumar Nigam

, Chetna Dabas
:
ESO-LEACH: PSO based energy efficient clustering in LEACH. 947-954 - Imad-Eddine Benkoudad, Abdelmalek Azizi

, Mouhammed El Amrani:
Rhythms of Arabic words and Fibonacci words. 955-962 - Safia Meteb Awad Al-Nofaie, Adnan Gutub

, Manal Al Ghamdi:
Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. 963-974 - Ganesh Singadkar, Abhishek Mahajan

, Meenakshi Thakur, Sanjay N. Talbar
:
Automatic lung segmentation for the inclusion of juxtapleural nodules and pulmonary vessels using curvature based border correction. 975-987 - K. S. Mithra, W. R. Sam Emmanuel:

Gaussian model based hybrid technique for infection level identification in TB diagnosis. 988-998 - Wafa Boukellouz, Abdelouahab Moussaoui

:
Magnetic resonance-driven pseudo CT image using patch-based multi-modal feature extraction and ensemble learning with stacked generalisation. 999-1007 - Anusha Achuthan, Mandava Rajeswari:

Segmentation of hippocampus guided by assembled and weighted coherent point drift registration. 1008-1017 - J. Ramsingh, V. Bhuvaneswari:

An efficient Map Reduce-Based Hybrid NBC-TFIDF algorithm to mine the public sentiment on diabetes mellitus - A big data approach. 1018-1029 - Rawinan Praditsangthong

, Bhattarasiri Slakkham, Pattarasinee Bhattarakosol
:
A fear detection method based on palpebral fissure. 1030-1039
Volume 33, Number 9, November 2021
- Rajendrani Mukherjee, K. Sridhar Patnaik

:
A survey on different approaches for software test case prioritization. 1041-1054
- Aya Hegazi, Ahmed Taha

, Mazen Mohamed Selim:
An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. 1055-1063 - Sandipan Maiti

, R. B. V. Subramanyam:
Mining co-location patterns from distributed spatial data. 1064-1073 - Abdenour Hacine-Gharbi

, Philippe Ravier:
On the optimal number estimation of selected features using joint histogram based mutual information for speech emotion recognition. 1074-1083 - K. S. Mithra, W. R. Sam Emmanuel:

GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images. 1084-1095 - D. Ane Delphin, Mahabaleswara Ram Bhatt, D. Thiripurasundari

:
Holoentropy measures for image stitching of scenes acquired under CAMERA unknown or arbitrary positions. 1096-1107 - Adnan Abdul-Aziz Gutub

, Khaled Aydh Alaseri:
Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. 1108-1120 - Mourad Brour, Abderrahim Benabbou:

ATLASLang NMT: Arabic text language into Arabic sign language neural machine translation. 1121-1131 - R. Raj Priyadarshini

, N. Sivakumar
:
Cluster head selection based on Minimum Connected Dominating Set and Bi-Partite inspired methodology for energy conservation in WSNs. 1132-1144 - Maha Faisal

, Aisha Bourahma, Feda AlShahwan:
Towards a reference model for sensor-supported learning systems. 1145-1157
Volume 33, Number 10, December 2021
- Priti Kumari, Parmeet Kaur

:
A survey of fault tolerance in cloud computing. 1159-1176
- Fatima-Zahra Benjelloun, Ahmed Oussous

, Amine Bennani, Samir Belfkih, Ayoub Ait Lahcen
:
Improving outliers detection in data streams using LiCS and voting. 1177-1185 - Dipika Sarkar

, Swagata Choudhury, Abhishek Majumder
:
Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network. 1186-1201 - Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi

:
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. 1202-1210 - Punugu Vasudeva Reddy, A. Ramesh Babu, N. B. Gayathri

:
Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings. 1211-1218 - Shihab Hamad Khaleefah

, Salama A. Mostafa
, Aida Mustapha
, Mohammad Faidzul Nasrudin:
The ideal effect of Gabor filters and Uniform Local Binary Pattern combinations on deformed scanned paper images. 1219-1230 - Rameez Raja Chowdhary, Manju K. Chattopadhyay

, Raj Kamal
:
Comparative study of orchestrated, centralised and decentralised approaches for orchestrator based task allocation and collision avoidance using network controlled robots. 1231-1241 - Belgacem Brahimi, Mohamed Touahria, Abdelkamel Tari:

Improving sentiment analysis in Arabic: A combined approach. 1242-1250 - A. Joy Christy, A. Umamakeswari

, L. Priyatharsini, A. Neyaa:
RFM ranking - An effective approach to customer segmentation. 1251-1257 - Dawid Grzelak, Krzysztof Podlaski

, Grzegorz Wiatrowski:
Analyze the effectiveness of an algorithm for identifying Polish characters in handwriting based on neural machine learning technologies. 1258-1264 - Madhu Khurana

, Vikas Saxena:
Green cover change detection using a modified adaptive ensemble of extreme learning machines for North-Western India. 1265-1273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














