


default search action
Journal of King Saud University - Computer and Information Sciences, Volume 33
Volume 33, Number 1, January 2021
- Pawan Kumar Ojha, Abid Ismail
, K. S. Kuppusamy:
Perusal of readability with focus on web content understandability. 1-10
- Dewi Rahmawati
, Riyanarto Sarno:
Anomaly detection using control flow pattern and fuzzy regression in port container handling. 11-20 - Rabei Raad Ali
, Kamaruddin Malik Mohamad:
RX_myKarve carving framework for reassembling complex fragmentations of JPEG images. 21-32 - Shailendra Aswale
, Vijay Ram Ghorpade
:
Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks. 33-44 - Shahzeb Khan, Jawwad Ahmed Shamsi:
Health Quest: A generalized clinical decision support system with multi-label classification. 45-53 - Bhagyalakshmi Vishwanath, Ramchandra Vittal Pujeri, Geetha Dundesh Devanagavi:
GB-SVNN: Genetic BAT assisted support vector neural network for arrhythmia classification using ECG signals. 54-67 - Zouaoui Samia, Rezeg Khaled:
Islamic inheritance calculation system based on Arabic ontology (AraFamOnto). 68-76 - Musheer Ahmad
, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. 77-85 - Renu Mary Daniel
, Elijah Blessing Rajsingh
, Salaja Silas:
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. 86-98 - Khawlah Altuwairqi
, Salma Kammoun Jarraya
, Arwa Allinjawi, Mohamed Hammami
:
A new emotion-based affective model to detect student's engagement. 99-109 - Revathi Balasundaram
, Gnanou Florence Sudha:
Retrieval performance analysis of multibiometric database using optimized multidimensional spectral hashing based indexing. 110-117 - Sariga Arjunan, Pothula Sujatha:
Corrigendum to "A survey on unequal clustering protocols in Wireless Sensor Networks" [J. King Saud Univ. - Comput. Inf. Sci. 31 (2019) 304-317]. J. King Saud Univ. Comput. Inf. Sci. 33(1): 118 (2021)
Volume 33, Number 2, February 2021
- Uthayakumar J., Vengattaraman Thirumal
, Dhavachelvan Ponnurangam:
A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. 119-140
- Saliha Mezzoudj, Ali Behloul, Rachid Seghir
, Yassmina Saadna
:
A parallel content-based image retrieval system using spark and tachyon frameworks. 141-149 - Meenakshi Pawar, Sanjay N. Talbar
:
Local entropy maximization based image fusion for contrast enhancement of mammogram. 150-160 - Md. Khaliluzzaman
:
Analytical justification of vanishing point problem in the case of stairways recognition. 161-182 - Dheeraj Malhotra
, Om Prakash Rishi
:
An intelligent approach to design of E-Commerce metasearch and ranking system using next-generation big data analytics. 183-194 - Rasmita Dash
:
An Adaptive Harmony Search Approach for Gene Selection and Classification of High Dimensional Medical Data. 195-207 - Ismaila Adeniyi Kamil
, Sunday Oyinlola Ogundoyin
:
EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. 208-217 - Hamza Alami
, Noureddine Ennahnahi
, Khalid Alaoui Zidani, Saïd El Alaoui Ouatik
:
An arabic question classification method based on new taxonomy and continuous distributed representation of words. 218-224 - Gayathri Nemani Bhagya, Thumbur Gowri, Krishna Rao Ravva Rama Venkata, Punugu Vasudeva Reddy:
Efficient and secure pairing-free certificateless directed signature scheme. 225-234 - Fatma Elghannam:
Text representation and classification based on bi-gram alphabet. 235-242
Volume 33, Number 3, March 2021
- Anuja Bhargava
, Atul Bansal
:
Fruits and vegetables quality evaluation using computer vision: A review. 243-257
- Abderrahim Nabi
, Zoubir Ahmed-Foitih, Mohammed El-Amine Cheriet:
Improved triangular-based star pattern recognition algorithm for low-cost star trackers. 258-267 - Priyanka Ahlawat
, Mayank Dave
:
An attack resistant key predistribution scheme for wireless sensor networks. 268-280 - Samir Gourdache, Azeddine Bilami
, Kamel Barka:
A framework for spectrum harvesting in heterogeneous wireless networks integration. 281-290 - Sunny Behal
, Krishan Kumar
, Monika Sachdeva
:
D-FAC: A novel ϕ-Divergence based distributed DDoS defense system. 291-303 - Dwi Sunaryono
, Joko Siswantoro
, Radityo Anggoro
:
An android based course attendance system using face recognition. 304-312 - Prabhishek Singh
, Raj Shree
, Manoj Diwakar
:
A new SAR image despeckling using correlation based fusion and method noise thresholding. 313-328 - Hanung Adi Nugroho
, Zulfanahri, Eka Legya Frannita
, Igi Ardiyanto
, Lina Choridah
:
Computer aided diagnosis for thyroid cancer system based on internal and external characteristics. 329-339 - M. S. Safna Asiq
, W. R. Sam Emmanuel
:
Polyscale gradients residual demosaicking. 340-350 - Sarah Saad Eldin, Ammar Mohammed
, Hesham A. Hefny
, Ahmed Sharaf Eldin Ahmed
:
An Enhanced Opinion Retrieval Approach on Arabic Text for Customer Requirements Expansion. 351-363 - Sunita, Deepak Garg
:
Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue. 364-373
Volume 33, Number 4, May 2021
- Juhar Ahmed Abdella
, Nazar M. Zaki
, Khaled Shuaib, Fahad Shahbaz Khan:
Airline ticket price and demand prediction: A survey. 375-391
- I. Michael Revina, W. R. Sam Emmanuel:
Face expression recognition using LDN and Dominant Gradient Local Ternary Pattern descriptors. 392-398 - Ayodeji Olalekan Salau
, Thomas Kokumo Yesufu
, Babatunde Sunday Ogundare:
Vehicle plate number localization using a modified GrabCut algorithm. 399-407 - Sridhar Raj S
, Malaiyappan Nandhini:
Ensemble human movement sequence prediction model with Apriori based Probability Tree Classifier (APTC) and Bagged J48 on Machine learning. 408-416 - Khalid Hussain
, N. Z. Jhanjhi
, Hafiz Mati-ur-Rahman
, Jawad Hussain, Muhammad Hasan Islam:
Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes. 417-425 - Sreeja Cherillath Sukumaran, Mohammed Misbahuddin
:
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing. 426-435 - Muhammad Aamir, Syed Mustafa Ali Zaidi:
Clustering based semi-supervised machine learning for DDoS attack classification. 436-446 - Sandeep Kumar Raghuwanshi
, Rajesh Kumar Pateriya:
Accelerated Singular Value Decomposition (ASVD) using momentum based Gradient Descent Optimization. 447-452 - Parimal Kumar Giri, Sagar S. De
, Satchidananda Dehuri:
Adaptive neighbourhood for locally and globally tuned biogeography based optimization algorithm. 453-467 - Mazhar Ali Dootio
, Asim Imdad Wagan
:
Development of Sindhi text corpus. 468-475 - Moukrim Chouaib
, Abderrahim Tragha, El Habib Benlahmer
, Tarik Almalki:
An innovative approach to autocorrecting grammatical errors in Arabic texts. 476-488 - Amuthan Arjunan
, Kaviarasan Ramu
:
Weighted Distance Hyperbolic Prediction-Based Detection Scheme for Non Line Of Sight nodes in VANETs. 489-496
Volume 33, Number 5, June 2021
- Imane Guellil, Houda Saadane, Faiçal Azouaou, Billel Gueni, Damien Nouvel:
Arabic natural language processing: An overview. 497-507 - Jaspreet Singh
, Gurvinder Singh, Rajinder Singh, Prithvipal Singh:
Morphological evaluation and sentiment analysis of Punjabi text using deep learning classification. 508-517
- Rizki Nurfauzi
, Hanung Adi Nugroho
, Igi Ardiyanto, Eka Legya Frannita
:
Autocorrection of lung boundary on 3D CT lung cancer images. 518-527 - K. P. Baby Resma, Madhu S. Nair
:
Multilevel thresholding for image segmentation using Krill Herd Optimization algorithm. 528-541 - Fahima Tabassum, Md. Imdadul Islam, M. Ruhul Amin:
Comparison of filter banks of DWT in recovery of image using one dimensional signal vector. 542-551 - Sanjeev Narayan Bal, Manas Ranjan Nayak
, Subir Kumar Sarkar:
On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. 552-561 - Ali Shakiba
:
A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad. 562-571 - Sudhansu Bala Das, Sugyan Kumar Mishra, Anup Kumar Sahu:
Alarm Coloring and Grouping algorithm for root cause analysis. 572-579 - Mohamed Ibrahim Beer Mohamed, Mohd Fadzil Hassan
, Sohail Safdar, Muhammad Qaiser Saleem
:
Adaptive security architectural model for protecting identity federation in service oriented computing. 580-592 - Imad El Ghoubach
, Rachid Ben Abbou, Fatiha Mrabti:
A secure and efficient remote data auditing scheme for cloud storage. 593-599 - Santosh Kumar
, Awadhesh Kumar Singh:
A localized algorithm for clustering in cognitive radio networks. 600-607 - Shamanth Nagaraju
, Lucy J. Gudino, Nikhil Tripathi, V. Sreejith, C. K. Ramesha:
Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach. 608-618
Volume 33, Number 6, July 2021
- I. Michael Revina, W. R. Sam Emmanuel
:
A Survey on Human Face Expression Recognition Techniques. 619-628
- Manal Abd Al-Jabbar Ahmad Mizher, Riza Sulaiman, Ayman Mahmoud Aref Abdalla
, Manar Abduljabbar Ahmad Mizher:
A simple flexible cryptosystem for meshed 3D objects and images. 629-646 - Babita Majhi, C. M. Anish
, Ritanjali Majhi
:
On development of novel hybrid and robust adaptive models for net asset value prediction. 647-657 - Nur Aqilah Paskhal Rostam, Nurul Hashimah Ahamed Hassain Malim
:
Text categorisation in Quran and Hadith: Overcoming the interrelation challenges using machine learning and term weighting. 658-667 - Varsha Harpale
, Vinayak K. Bairagi
:
An adaptive method for feature selection and extraction for classification of epileptic EEG signal in significant states. 668-676 - Aziz Qaroush, Ibrahim Abu Farha
, Wasel Ghanem
, Mahdi Washaha, Eman Maali:
An efficient single document Arabic text summarization using a combination of statistical and semantic features. 677-692 - Sajidha Syed Azimuddin
, Siddha Prabhu Chodnekar, Kalyani Desikan
:
Initial seed selection for K-modes clustering - A distance and density based approach. 693-701 - Feras Al-Hawari
, Hala Barham:
A machine learning based help desk system for IT service management. 702-718 - Deepti Mehrotra
, Rashi Srivastava, Renuka Nagpal
, Deepshikha Nagpal:
Multiclass classification of mobile applications as per energy consumption. 719-727 - Nur Aini Rakhmawati
, Jauhar Fatawi, Ahmad Choirun Najib, Azmi Adi Firmansyah:
Linked open data for halal food products. 728-739 - Shailendra Pratap Singh
, Vibhav Prakash Singh
, Ashok Kumar Mehta
:
Differential evolution using homeostasis adaption based mutation operator and its application for software cost estimation. 740-752 - Faiza Beirade, Hamid Azzoune, Djamel Eddine Zegour:
Semantic query for Quranic ontology. 753-760
Volume 33, Number 7, September 2021
- Isaac Odun-Ayo, Rowland Goddy-Worlu, Jamaiah Yahaya, Victor Geteloma
:
A systematic mapping study of cloud policy languages and programming models. 761-768
- Arpita Jadhav Bhatt
, Chetna Gupta, Sangeeta Mittal
:
iABC-AL: Active learning-based privacy leaks threat detection for iOS applications. 769-786 - Masurah Mohamad, Ali Selamat
, Imam Much Ibnu Subroto
, Ondrej Krejcar
:
Improving the classification performance on imbalanced data sets via new hybrid parameterisation model. 787-797 - Manik Sharma
, G. Singh, R. Singh:
Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm. 798-809 - Lo'ai Ali Tawalbeh
, Gökay Saldamli:
Reconsidering big data security and privacy in cloud and mobile cloud systems. 810-819 - Sagenela Vijaya Kumar
, C. Nagaraju
:
Support vector neural network based fuzzy hybrid filter for impulse noise identification and removal from gray-scale image. 820-835 - Fella Berrimi, Khier Benmahammed, Riadh Hedli
:
Denoising of degraded face images sequence in PCA domain for recognition. 836-843 - Ranjeet Kumar Singh, Binod Kumar, Dilip Kumar Shaw
, Danish Ali Khan
:
Level by level image compression-encryption algorithm based on quantum chaos map. 844-851 - Kiran Kumar Eepuri
, P. V. V. Kishore
, Dande Anil Kumar, Maddala Teja Kiran Kumar
:
Early estimation model for 3D-discrete indian sign language recognition using graph matching. 852-864 - Ali A. Hamzah, Sherif M. Khattab
, Hanaa Bayomi:
A linguistic steganography framework using Arabic calligraphy. 865-877 - Ahmad Shaik
, V. Thanikaiselvan
:
Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification. 878-889 - Ibtissam Touahri
, Azzeddine Mazroui:
Studying the effect of characteristic vector alteration on Arabic sentiment classification. 890-898 - Hichem Rahab
, Abdelhafid Zitouni, Mahieddine Djoudi:
SANA: Sentiment analysis on newspapers comments in Algeria. 899-907 - Akshat Gaurav
, Awadhesh Kumar Singh:
Light weight approach for secure backbone construction for MANETs. 908-919
Volume 33, Number 8, October 2021
- Saniya Zahoor, Roohie Naaz Mir:
Resource management in pervasive Internet of Things: A survey. 921-935
- A. Amuthan
, Arulmurugan A.
:
Semi-Markov inspired hybrid trust prediction scheme for prolonging lifetime through reliable cluster head selection in WSNs. 936-946 - Gaurav Kumar Nigam
, Chetna Dabas
:
ESO-LEACH: PSO based energy efficient clustering in LEACH. 947-954 - Imad-Eddine Benkoudad, Abdelmalek Azizi
, Mouhammed El Amrani:
Rhythms of Arabic words and Fibonacci words. 955-962 - Safia Meteb Awad Al-Nofaie, Adnan Gutub
, Manal Al Ghamdi:
Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. 963-974 - Ganesh Singadkar, Abhishek Mahajan
, Meenakshi Thakur, Sanjay N. Talbar
:
Automatic lung segmentation for the inclusion of juxtapleural nodules and pulmonary vessels using curvature based border correction. 975-987 - K. S. Mithra, W. R. Sam Emmanuel:
Gaussian model based hybrid technique for infection level identification in TB diagnosis. 988-998 - Wafa Boukellouz, Abdelouahab Moussaoui:
Magnetic resonance-driven pseudo CT image using patch-based multi-modal feature extraction and ensemble learning with stacked generalisation. 999-1007 - Anusha Achuthan, Mandava Rajeswari:
Segmentation of hippocampus guided by assembled and weighted coherent point drift registration. 1008-1017 - J. Ramsingh, V. Bhuvaneswari:
An efficient Map Reduce-Based Hybrid NBC-TFIDF algorithm to mine the public sentiment on diabetes mellitus - A big data approach. 1018-1029 - Rawinan Praditsangthong, Bhattarasiri Slakkham, Pattarasinee Bhattarakosol
:
A fear detection method based on palpebral fissure. 1030-1039
Volume 33, Number 9, November 2021
- Rajendrani Mukherjee, K. Sridhar Patnaik
:
A survey on different approaches for software test case prioritization. 1041-1054
- Aya Hegazi, Ahmed Taha
, Mazen Mohamed Selim:
An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal. 1055-1063 - Sandipan Maiti
, R. B. V. Subramanyam:
Mining co-location patterns from distributed spatial data. 1064-1073 - Abdenour Hacine-Gharbi
, Philippe Ravier:
On the optimal number estimation of selected features using joint histogram based mutual information for speech emotion recognition. 1074-1083 - K. S. Mithra, W. R. Sam Emmanuel:
GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images. 1084-1095 - D. Ane Delphin, Mahabaleswara Ram Bhatt, D. Thiripurasundari
:
Holoentropy measures for image stitching of scenes acquired under CAMERA unknown or arbitrary positions. 1096-1107 - Adnan Abdul-Aziz Gutub
, Khaled Aydh Alaseri:
Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. 1108-1120 - Mourad Brour, Abderrahim Benabbou:
ATLASLang NMT: Arabic text language into Arabic sign language neural machine translation. 1121-1131 - R. Raj Priyadarshini
, N. Sivakumar
:
Cluster head selection based on Minimum Connected Dominating Set and Bi-Partite inspired methodology for energy conservation in WSNs. 1132-1144 - Maha Faisal
, Aisha Bourahma, Feda AlShahwan:
Towards a reference model for sensor-supported learning systems. 1145-1157
Volume 33, Number 10, December 2021
- Priti Kumari, Parmeet Kaur:
A survey of fault tolerance in cloud computing. 1159-1176
- Fatima-Zahra Benjelloun, Ahmed Oussous
, Amine Bennani, Samir Belfkih, Ayoub Ait Lahcen
:
Improving outliers detection in data streams using LiCS and voting. 1177-1185 - Dipika Sarkar
, Swagata Choudhury, Abhishek Majumder
:
Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network. 1186-1201 - Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi
:
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. 1202-1210 - Punugu Vasudeva Reddy, A. Ramesh Babu, N. B. Gayathri
:
Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings. 1211-1218 - Shihab Hamad Khaleefah, Salama A. Mostafa
, Aida Mustapha
, Mohammad Faidzul Nasrudin:
The ideal effect of Gabor filters and Uniform Local Binary Pattern combinations on deformed scanned paper images. 1219-1230 - Rameez Raja Chowdhary, Manju K. Chattopadhyay
, Raj Kamal
:
Comparative study of orchestrated, centralised and decentralised approaches for orchestrator based task allocation and collision avoidance using network controlled robots. 1231-1241 - Belgacem Brahimi, Mohamed Touahria, Abdelkamel Tari:
Improving sentiment analysis in Arabic: A combined approach. 1242-1250 - A. Joy Christy, A. Umamakeswari
, L. Priyatharsini, A. Neyaa:
RFM ranking - An effective approach to customer segmentation. 1251-1257 - Dawid Grzelak, Krzysztof Podlaski
, Grzegorz Wiatrowski:
Analyze the effectiveness of an algorithm for identifying Polish characters in handwriting based on neural machine learning technologies. 1258-1264 - Madhu Khurana
, Vikas Saxena:
Green cover change detection using a modified adaptive ensemble of extreme learning machines for North-Western India. 1265-1273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.