Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 25, Issue 2

117 -- 126Bipul Goswami, Durbadal Mandal. A genetic algorithm for the level control of nulls and side lobes in linear antenna arrays
127 -- 136Abdullah A. Aljumah, Mohammed Gulam Ahamad, Mohammad Khubeb Siddiqui. Application of data mining: Diabetes health care in young and old patients
137 -- 143Nosaiba A. Sabto, Khalid Al Mutib. Autonomous mobile robot localization based on RSSI measurements using an RFID sensor and neural network BPANN
145 -- 162Mohammed A. Awadallah 0001, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Asaju La'aro Bolaji. Global best Harmony Search with a new pitch adjustment designed for Nurse Rostering
163 -- 171Amit Phadikar. Multibit quantization index modulation: A high-rate robust data-hiding method
173 -- 185Supratim Mukherjee, Samarjit Kar. A three phase supplier selection method based on fuzzy preference degree
187 -- 196A. Britton, Rossitza Setchi, A. Marsh. Intuitive interaction with multifunctional mobile interfaces
197 -- 205Gamal Abdel Fadeel Mohamed Khalaf, Hesham Zarief Badr. A comprehensive approach to vertical handoff in heterogeneous wireless networks
207 -- 218Fazal-e-Malik, Baharum Baharudin. Analysis of distance metrics in content-based image retrieval using statistical quantized histogram texture features in the DCT domain
219 -- 228Ashok Kumar Das, Ashish Massand, Sagar Patil. A novel proxy signature scheme based on user hierarchical access control policy
229 -- 240Walid Al-Ahmad, Abedallah Al-Oqaili. Towards a unified model for successful implementation of outsourcing and reversibility of information systems

Volume 25, Issue 1

1 -- 5Hakim Fourar-Laidi. A smart card based framework for securing e-business transactions in distributed systems
7 -- 24S. Venkatesan 0002, M. S. Saleem Basha, C. Chellappan, Anurika Vaish, P. Dhavachelvan. Analysis of accounting models for the detection of duplicate requests in web services
25 -- 34T. Senthil Kumaran, V. Sankaranarayanan. Dynamic congestion detection and control routing in ad hoc networks
35 -- 42Hari T. S. Narayanan, Geetha Ilangovan, Sumitra Narayanan. Feasibility of SNMP OID compression
43 -- 49Habiba Dahmani, Sid-Ahmed Selouani, Douglas D. O'Shaughnessy, Mohamed Chetouani, Noureddine Doghmane. Assessment of dysarthric speech through rhythm metrics
51 -- 61SK Hafizul Islam, G. P. Biswas. Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
63 -- 75Latifa Ben Arfa Rabai, Mouna Jouini, Anis Ben Aissa, Ali Mili. A cybersecurity model in cloud computing environments
77 -- 87Aloysius George, D. Binu. An approach to products placement in supermarkets using PrefixSpan algorithm
89 -- 98Nasser-Eddine Rikli, Saad Almogari. Efficient priority schemes for the provision of end-to-end quality of service for multimedia traffic over MPLS VPN networks
99 -- 115Zohair Chentouf, Ahmed Khoumsi. A high abstraction level approach for detecting feature interactions between telecommunication services