default search action
Journal of King Saud University - Computer and Information Sciences, Volume 34
Volume 34, Number 1, January 2022
- Abdul Razaque, Syed Rizvi, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh:
State-of-art review of information diffusion models and their impact on social network vulnerabilities. 1275-1294 - Patrick Kwabena Mensah, Adebayo Felix Adekoya, Mighty Abra Ayidzoe, Edward Y. Baagyire:
Capsule Networks - A survey. 1295-1310
- A. N. M. JayaLakshmi, K. V. Krishna Kishore:
Performance evaluation of DNN with other machine learning techniques in a cluster using Apache Spark and MLlib. 1311-1319 - L. B. Krithika, G. G. Lakshmi Priya:
MAFONN-EP: A Minimal Angular Feature Oriented Neural Network based Emotion Prediction system in image processing. 1320-1329 - Aziz Qaroush, Bassam Jaber, Khader Mohammad, Mahdi Washaha, Eman Maali, Nibal Nayef:
An efficient, font independent word and character segmentation algorithm for printed Arabic text. 1330-1344 - Rusul Nabeel, Mohammed H. Al-Jammas:
The GOP Inter Prediction of H.264 AV\C. 1345-1351 - M. Anousouya Devi, J. I. Sheeba, K. Suresh Joseph:
Neutrosophic graph cut-based segmentation scheme for efficient cervical cancer detection. 1352-1360 - Pradip Salve, Pravin L. Yannawar, Milind Sardesai:
Multimodal plant recognition through hybrid feature fusion technique using imaging and non-imaging hyper-spectral data. 1361-1369 - Soufiane Khedairia, Mohamed Tarek Khadir:
A multiple clustering combination approach based on iterative voting process. 1370-1380 - Hussein Abdel-Mawgoud, Salah Kamel, Juan Yu, Francisco Jurado:
Hybrid Salp Swarm Algorithm for integrating renewable distributed energy resources in distribution systems considering annual load growth. 1381-1393 - N. V. S. Lakshmipathi Raju, M. N. Seeta Ramanath, P. Srinivasa Rao:
An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity. 1394-1406 - Radwa M. K. Saeed, Sherine Rady, Tarek F. Gharib:
An ensemble approach for spam detection in Arabic opinion texts. 1407-1416 - Manreet Sohal, Sandeep Sharma:
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. 1417-1425 - Altaf Alaoui, Dakki Mohamed, Soumia Ziti, Badia Ettaki, Jamal Zerouaoui:
Model for data codification in hierarchical classifications with application to the biodiversity domain. 1426-1433 - Sanjaya Kumar Panda, Shradha Surachita Nanda, Sourav Kumar Bhoi:
A pair-based task scheduling algorithm for cloud computing environment. 1434-1445 - Ahmed Farag, Hatem Abd El-Kader, Rashed K. Salem:
Parallel graph-based anomaly detection technique for sequential data. 1446-1454 - Deena P. Francis, Kumudha Raimond:
A practical streaming approximate matrix multiplication algorithm. 1455-1465 - Shikha Mehta, Parul Agarwal, Prakhar Shrivastava, Jharna Barlawala:
Differential bond energy algorithm for optimal vertical fragmentation of distributed databases. 1466-1471 - Zouhaier Brahmia, Hind Hamrouni, Rafik Bouaziz:
TempoX: A disciplined approach for data management in multi-temporal and multi-schema-version XML databases. 1472-1488 - Sai Krishna Mothku, Rashmi Ranjan Rout:
Fuzzy logic based adaptive duty cycling for sustainability in energy harvesting sensor actor networks. 1489-1497 - Kamel Aizi, Mohamed Ouslim:
Score level fusion in multi-biometric identification based on zones of interest. 1498-1509 - C. Kalaiarasy, N. Sreenath:
An incentive-based co-operation motivating pseudonym changing strategy for privacy preservation in mixed zones in vehicular networks. 1510-1520 - Myat Cho Mon Oo, Thandar Thein:
An efficient predictive analytics system for high dimensional big data. 1521-1532 - Sakshi Dhall, Saibal K. Pal, Kapil Sharma:
A chaos-based probabilistic block cipher for image encryption. 1533-1543
Volume 34, Number 2, February 2022
- Anureet Kaur, Kulwant Kaur:
Systematic literature review of mobile application development and testing effort estimation. 1-15 - Martin Luther Mfenjou, Ado Adamou Abba Ari, Arouna Ndam Njoya, David Jaurès Fotsa-Mbogne, Kolyang, Wahabou Abdou, François Spies:
Control points deployment in an Intelligent Transportation System for monitoring inter-urban network roadway. 16-26 - Vishal Kumar Arora, Vishal Sharma, Monika Sachdeva:
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes. 27-35 - Aya H. Allam, Mohamed Taha, Hala H. Zayed:
Enhanced Zone-Based Energy Aware Data Collection Protocol for WSNs (E-ZEAL). 36-46 - Aya Ayadi, Oussama Ghorbel, M. S. Ben Saleh, Mohamed Abid:
A framework of monitoring water pipeline techniques based on sensors technologies. 47-57 - P. Shamna, V. K. Govindan, K. A. Abdul Nazeer:
Content-based medical image retrieval by spatial matching of visual words. 58-71 - Meera Doshi, Prakash Gajjar, Ashish Kothari:
Zoom based image super-resolution using DCT with LBP as characteristic model. 72-85 - Md Shamim Hossain:
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images. 86-94 - Anisha M. Lal, S. Margret Anouncia:
Modernizing the multi-temporal multispectral remotely sensed image change detection for global maxima through binary particle swarm optimization. 95-103 - De Rosal Ignatius Moses Setiadi:
Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. 104-114 - Abhishek Bal, Minakshi Banerjee, Amlan Chakrabarti, Punit Sharma:
MRI Brain Tumor Segmentation and Analysis using Rough-Fuzzy C-Means and Shape Based Properties. 115-133 - Agnieszka Jastrzebska:
Time series classification through visual pattern recognition. 134-142 - Dande Anil Kumar, A. S. C. S. Sastry, P. V. V. Kishore, Kiran Kumar Eepuri:
3D sign language recognition using spatio temporal graph kernels. 143-152 - Muhammad Aminu, Noor Atinah Ahmad:
Locality preserving partial least squares discriminant analysis for face recognition. 153-164 - Priya Mariam Raju, Madhu S. Nair:
Copy-move forgery detection using binary discriminant features. 165-178 - Rami Mustafa A. Mohammad:
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime. 179-190 - Md Tarique Jamal Ansari, Dhirendra Pandey, Mamdouh Alenezi:
STORE: Security Threat Oriented Requirements Engineering Methodology. 191-203 - Lamiaa A. Elrefaei, Ashwaq M. Al-Mohammadi:
Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme. 204-217 - Mudasir Ahmad Wani, Suraiya Jabin:
Mutual clustering coefficient-based suspicious-link detection approach for online social networks. 218-231 - Abdul A. Orunsolu, Adesina S. Sodiya, A. T. Akinwale:
A predictive model for phishing detection. 232-247 - Dheeraj Malhotra, Om Prakash Rishi:
IMSS-P: An intelligent approach to design & development of personalized meta search & page ranking system. 248-263 - Ema Utami, Anggit Dwi Hartanto, Sumarni Adi, Irwan Oyong, Suwanto Raharjo:
Profiling analysis of DISC personality traits based on Twitter posts in Bahasa Indonesia. 264-269 - N. Arunachalam, A. Amuthan:
Improved Cosine Similarity-based Artificial Bee Colony Optimization scheme for reactive and dynamic service composition. 270-281 - Suvendu Chandan Nayak, Sasmita Parida, Chitaranjan Tripathy, Prasant Kumar Pattnaik:
An enhanced deadline constraint based task scheduling mechanism for cloud environment. 282-294 - Qurrat Ain, Muhammad Amir Mehmood:
Runtime performance evaluation and optimization of type-2 hypervisor for MIPS64 architecture. 295-307 - Sankalap Arora, Ranjit Kaur:
An escalated convergent firefly algorithm. 308-315 - Hichem Haouassi, Elkamel Merah, Mehdaoui Rafik, Maarouk Toufik Messaoud, Ouahiba Chouhal:
A new binary grasshopper optimization algorithm for feature selection problem. 316-328 - Allam Mohan, Malaiyappan Nandhini:
Optimal feature selection using binary teaching learning based optimization algorithm. 329-341 - Hajer Toumi, Zaki Brahmi, Mohamed Mohsen Gammoudi:
RTSLPS: Real time server load prediction system for the ever-changing cloud computing environment. 342-353 - Mutaz A. B. Al-Tarawneh, Amjed A. Al-Mousa:
Adaptive user-oriented fuzzy-based service broker for cloud services. 354-364 - Zubair Jeelani, Fasel Qadir:
Cellular automata-based approach for salt-and-pepper noise filtration. 365-374 - Kaavya Kanagaraj, G. G. Lakshmi Priya:
Curvelet transform based feature extraction and selection for multimedia event classification. 375-383 - Kasiprasad Mannepalli, Panyam Narahari Sastry, Maloji Suman:
Emotion recognition in speech signals using optimization based multi-SVNN classifier. 384-397 - Ismail Keshta:
A model for defining project lifecycle phases: Implementation of CMMI level 2 specific practice. 398-407 - Mona Moradi, Mohammad Rahmanimanesh, Ali Shahzadi:
On evaluating the collaborative research areas: A case study. 408-420 - Ankita Gupta, Chetna Gupta:
CDBR: A semi-automated collaborative execute-before-after dependency-based requirement prioritization approach. 421-432 - Saeid Masoumi, Ali Mahjur:
A new way of crosscutting roles in set oriented programming. 433-442 - Debashreet Das, Chita Ranjan Tripathy, Pradyumna Kumar Tripathy, Manas Ranjan Kabat:
A Genetic Algorithm based approach for designing multi-state computational grid with cost and bandwidth constraints. 443-456 - R. Padmanaban, M. Thirumaran, P. Anitha, A. Moshika:
Computability evaluation of RESTful API using Primitive Recursive Function. 457-467 - Gebeyehu Belay Gebremeskel, Birhanu Hailu Belay, Belete Biazen:
Architecture and optimization of data mining modeling for visualization of knowledge extraction: Patient safety care. 468-479 - Guru Prasad Bhandari, Ratneshwer Gupta:
Dependency-based fault diagnosis approach for SOA-based systems using Colored Petri Nets. 480-491 - M. Chennakesavulu, T. Jayachandra Prasad, V. Sumalatha:
Data encoding techniques to improve the performance of System on Chip. 492-503
Volume 34, Number 3, March 2022
- Anwar Shah, Javed Iqbal Bangash, Abdul Waheed Khan, Imran Ahmed, Abdullah Khan, Asfandyar Khan, Arshad Khan:
Comparative analysis of median filter and its variants for removal of impulse noise from gray scale images. 505-519 - Pawan Kumar Upadhyay, Satish Chandra:
An improved bag of dense features for skin lesion recognition. 520-525 - Md. Mahmodul Hasan, Nazrul Islam, Mohammad Motiur Rahman:
Gastrointestinal polyp detection through a fusion of contourlet transform and Neural features. 526-533 - Kavitha A. V., Srikrishna Atluri, Satyanarayana Ch.:
Crop image classification using spherical contact distributions from remote sensing images. 534-545 - Fahima Tabassum, Md. Imdadul Islam, Risala Tasin Khan, M. Ruhul Amin:
Human face recognition with combination of DWT and machine learning. 546-556 - C. Jaspin Jeba Sheela, G. Suganthi:
Automatic Brain Tumor Segmentation from MRI using Greedy Snake Model and Fuzzy C-Means Optimization. 557-566 - Ivan William Harsono, Suryadiputra Liawatimena, Tjeng Wawan Cenggoro:
Lung nodule detection and classification from Thorax CT-scan using RetinaNet with transfer learning. 567-577 - Aparna, Yukti Bhatia, Rachna Rai, Varun Gupta, Naveen Aggarwal, Aparna Akula:
Convolutional neural networks based potholes detection using thermal imaging. 578-588 - Leena Mary Francis, N. Sreenath:
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine. 589-604 - Dhani Ariatmanto, Ferda Ernawan:
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking. 605-614 - Vipul Sharma, Roohie Naaz Mir:
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. 615-626 - Subiono, Joko Cahyono, Dieky Adzkiya, Bijan Davvaz:
A cryptographic algorithm using wavelet transforms over max-plus algebra. 627-635 - Subhadeep Koley:
A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. 636-645 - Ismail Boucherit, Mohamed Ould-Zmirli, Hamza Hentabli, Bakhtiar Affendi Rosdi:
Finger vein identification using deeply-fused Convolutional Neural Network. 646-656 - Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan:
Multi-level Fuzzy system for usable-security assessment. 657-665 - Anak Agung Gde Agung, Rini Handayani:
Blockchain for smart grid. 666-675 - N. Sasikaladevi, K. Geetha, A. Revathi:
EMOTE - Multilayered encryption system for protecting medical images based on binary curve. 676-686 - Stéphane Cédric Koumétio Tékouabou, El Arbi Abdellaoui Alaoui, Walid Cherif, Hassan Silkan:
Improving parking availability prediction in smart cities with IoT and ensemble-based model. 687-697 - Akber Ali Khan, Vinod Kumar, Musheer Ahmad:
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. 698-705 - Gandeva Bayu Satrya, Soo Young Shin:
Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks. 706-715 - Kale Navnath Dattatraya, K. Raghava Rao:
Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN. 716-726 - Shahan Yamin Siddiqui, Muhammad Adnan Khan, Sagheer Abbas, M. Farrukh Khan:
Smart occupancy detection for road traffic parking using deep extreme learning machine. 727-733 - Anvesha Katti:
Target coverage in random wireless sensor networks using cover sets. 734-746 - Marwa K. Elteir, Shaimaa Lazem, Mohamed Azab:
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study. 747-756 - Sheikh Fahad Ahmad, Deepak Kumar Singh:
Automatic detection of tree cutting in forests using acoustic properties. 757-763 - Mohammad K. Nammous, Khalid Saeed, Pawel Kobojek:
Using a small amount of text-independent speech data for a BiLSTM large-scale speaker identification approach. 764-770 - P. K. Athira, C. J. Sruthi, A. Lijiya:
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario. 771-781 - Obed Appiah, Michael Asante, James Benjamin Hayfron-Acquah:
Improved approximated median filter algorithm for real-time computer vision applications. 782-792 - Taushif Anwar, V. Uma:
CD-SPM: Cross-domain book recommendation using sequential pattern mining and rule mining. 793-800 - Dede Rohidin, Noor Azah Samsudin, Mustafa Mat Deris:
Association rules of fuzzy soft set based classification for text classification problem. 801-812 - Amanpreet Kaur, Bikrampal Kaur:
Load balancing optimization based on hybrid Heuristic-Metaheuristic techniques in cloud environment. 813-824 - Rojalina Priyadarshini, Rabindra Kumar Barik:
A deep learning based intelligent framework to mitigate DDoS attack in fog environment. 825-831 - Kareem Kamal A. Ghany, Amr Mohamed AbdelAziz, Taysir Hassan A. Soliman, Adel Abu El-Magd Sewisy:
A hybrid modified step Whale Optimization Algorithm with Tabu Search for data clustering. 832-839 - Ali Sabah Abdulameer, Sabrina Tiun, Nor Samsiah Sani, Masri Ayob, Adil Yaseen Taha:
Enhanced clustering models with wiki-based k-nearest neighbors-based representation for web search result clustering. 840-850 - Mamta Kayest, Sanjay Kumar Jain:
Optimization driven cluster based indexing and matching for the document retrieval. 851-861 - Saiteja Prasad Chatrati, Gahangir Hossain, Ayush Goyal, Anupama Bhan, Sayantan Bhattacharya, Devottam Gaurav, Sanju Mishra Tiwari:
Smart home health monitoring system for predicting type 2 diabetes and hypertension. 862-870 - Abdelaziz I. Hammouri:
A modified biogeography-based optimization algorithm with guided bed selection mechanism for patient admission scheduling problems. 871-879 - Rasmita Dash, Rajashree Dash, Rasmita Rautray:
An evolutionary framework based microarray gene selection and classification approach using binary shuffled frog leaping algorithm. 880-891 - Ahmed Aziz, Walid Osamy, Ahmed M. Khedr, Ahmed Salim:
Iterative selection and correction based adaptive greedy algorithm for compressive sensing reconstruction. 892-900 - Abid Ismail, K. S. Kuppusamy:
Web accessibility investigation and identification of major issues of higher education websites with statistical measures: A case study of college websites. 901-911 - Md. Shahidul Islam, Md. Rafiqul Islam:
A hybrid framework based on genetic algorithm and simulated annealing for RNA structure prediction with pseudoknots. 912-922 - R. Sakthi Murugan, V. S. Ananthanarayana:
WordCode using WordTrie. 923-933 - Ensaf Hussein Mohamed, Eyad Mohamed Shokry:
QSST: A Quranic Semantic Search Tool based on word embedding. 934-945 - Anureet Kaur, Kulwant Kaur:
A COSMIC function points based test effort estimation model for mobile applications. 946-963 - Bata Krishna Tripathy, Kshira Sagar Sahoo, Ashish Kr. Luhach, N. Z. Jhanjhi, Swagat Kumar Jena:
A virtual execution platform for OpenFlow controller using NFV. 964-971 - Sharmila Subudhi, Suvasini Panigrahi:
Application of OPTICS and ensemble learning for Database Intrusion Detection. 972-981 - Jihene Younes, Hadhemi Achour, Emna Souissi, Ahmed Ferchichi:
Romanized Tunisian dialect transliteration using sequence labelling techniques. 982-992 - Sonali Pradhan, Mitrabinda Ray, Santosh Kumar Swain:
Transition coverage based test case generation from state chart diagram. 993-1002 - Samuel Asante Gyamerah:
On forecasting the intraday Bitcoin price using ensemble of variational mode decomposition and generalized additive model. 1003-1009
Volume 34, Number 4, April 2022
- Nouf Ibrahim Altmami, Mohamed El Bachir Menai:
Automatic summarization of scientific articles: A survey. 1011-1028 - Adhika Pramita Widyassari, Supriadi Rustad, Guruh Fajar Shidik, Edi Noersasongko, Abdul Syukur, Affandy Affandy, De Rosal Ignatius Moses Setiadi:
Review of automatic text summarization techniques & methods. 1029-1046 - Bam Bahadur Sinha, R. Dhanalakshmi:
Evolution of recommender paradigm optimization over time. 1047-1059 - Utkarsh Mahadeo Khaire, R. Dhanalakshmi:
Stability of feature selection algorithm: A review. 1060-1073 - Amer F. Al-Badarneh, Salahaldeen Atef Rababa:
An analysis of two-way equi-join algorithms under MapReduce. 1074-1085 - Punam Kumari, K. R. Seeja:
Periocular biometrics: A survey. 1086-1097 - Madhulika Yarlagadda, Gangadhara Rao Kancherla, Srikrishna Atluri:
Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering. 1098-1109 - Salha Alzahrani, Hanan Aljuaid:
Identifying cross-lingual plagiarism using rich semantic features and deep neural networks: A study on Arabic-English plagiarism cases. 1110-1123 - Hanane Zitouni