Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 26, Issue Issue

1 -- 3Demetrios G. Sampson, Kinshuk, Mohamed Jemni, Nian-Shing Chen. Guest Editorial: Current advances in digital learning technologies
5 -- 10J. Michael Spector. Emerging educational technologies: Tensions and synergy
11 -- 16Lanqin Zheng, Junfeng Yang, Wei Cheng, Ronghuai Huang. Emerging approaches for supporting easy, engaged and effective collaborative learning
17 -- 27Jorge Torres 0002, Jesús Reséndiz, Ignacio Aedo, Juan Manuel Dodero. A model-driven development approach for learning design using the LPCEL Editor
29 -- 45Mohsen Laâbidi, Mohamed Jemni, Leila Jemni Ben Ayed, Hejer Ben Brahim, Amal Ben Jemaa. Learning technologies for people with disabilities
47 -- 61Sergio Gómez, Panagiotis Zervas, Demetrios G. Sampson, Ramón Fabregat. Context-aware adaptive and personalized mobile learning delivery supported by UoLmP
63 -- 70Fan-Ray Kuo, Chi-Chih Hsu, Wei-Chieh Fang, Nian-Shing Chen. The effects of Embodiment-based TPR approach on student English vocabulary learning achievement, retention and acceptance

Volume 26, Issue 4

355 -- 356Hend S. Al-Khalifa. Introduction to the special issue on Arabic NLP: Current state and future challenges
357 -- 371Tressy Arts, Yonatan Belinkov, Nizar Habash, Adam Kilgarriff, Vit Suchomel. arTenTen: Arabic Corpus and Word Sketches
372 -- 378Wael Salloum, Nizar Habash. ADAM: Analyzer for Dialectal Arabic Morphology
379 -- 387Yuval Marton, Imed Zitouni. Transliteration normalization for Information Extraction and Machine Translation
388 -- 397Hanan M. Alghamdi, Ali Selamat, Nor Shahriza Abdul Karim. Arabic web pages clustering and annotation using semantic class features
398 -- 416Iskandar Keskes, Farah Benamara Zitoune, Lamia Hadrich Belguith. Learning explicit and implicit Arabic discourse relations
417 -- 424Fawaz H. H. Mahyoub, Muazzam Ahmed Siddiqui, Mohamed Yehia Dahab. Building an Arabic Sentiment Lexicon Using Semi-supervised Learning
425 -- 440Ines Boujelben, Salma Jamoussi, Abdelmajid Ben Hamadou. A hybrid method for extracting relations between Arabic named entities
441 -- 449Ahmed I. El-taher, Hitahm M. Abo Bakr, Ibrahim Zidan, Khaled Shaalan. An Arabic CCG approach for determining constituent types from Arabic Treebank
450 -- 461Houda Oufaida, Omar Nouali, Philippe Blache. Minimum redundancy and maximum relevance for single and multi-document Arabic text summarization
462 -- 472Mohammed G. H. al Zamil, Qasem A. Al-Radaideh. Automatic extraction of ontological relations from Arabic text
473 -- 484Alaa Saleh Altheneyan, Mohamed El-bachir Menai. Naïve Bayes classifiers for authorship attribution of Arabic texts

Volume 26, Issue 3

247 -- 257Sharifullah Khan, Muhammad Safyan. Semantic matching in hierarchical ontologies
258 -- 275Khairullah Khan, Baharum Baharudin, Aurnagzeb Khan, Ashraf Ullah. Mining opinion components from unstructured reviews: A review
276 -- 286Ziba Eslami, Nasrollah Pakniat. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
287 -- 295Yaseer Arafat Durrani, Teresa Riesgo. Power estimation for intellectual property-based digital systems at the architectural level
296 -- 307Zohair Chentouf. Managing OAM&P requirement conflicts
308 -- 318Lahcène Mitiche, Amel Baha Houda Adamou-Mitiche. An efficient low order model for two-dimensional digital systems: Application to the 2D digital filters
319 -- 331Babita Majhi, Minakhi Rout, Vikas Baghel. On the development and performance evaluation of a multiobjective GA-based RBF adaptive model for the prediction of stock indices
332 -- 346R. Venkata Rao, Gajanan Govindrao Waghmare. A comparative study of a teaching-learning-based optimization algorithm on multi-objective unconstrained and constrained functions
347 -- 354M. Bhanu Sridhar, Yarramalle Srinivas, Munaga H. M. Krishna Prasad. Software reuse in a paralysis dataset based on categorical clustering and the Pearson distribution

Volume 26, Issue 2

161 -- 169Sharifullah Khan, Jibran Mustafa. Effective semantic search using thematic similarity
170 -- 180Sangram Ray, G. P. Biswas. A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations
181 -- 201Santanu Chatterjee, Ashok Kumar Das, Jamuna Kanta Sing. A novel and efficient user access control scheme for wireless body area sensor networks
202 -- 217Mohamed Attia, Waleed Nazih, Mohamed Al-Badrashiny, Hamed Elsimary. A General scheme for dithering multidimensional signals, and a visual instance of encoding images with limited palettes
218 -- 227Salim Lahmiri. Wavelet low- and high-frequency components as features for predicting stock prices with backpropagation neural networks
228 -- 236Ashmita Debnath, Pradheepkumar Singaravelu, Shekhar Verma. Privacy in wireless sensor networks using ring signature
237 -- 246Khalil el Hindi. A noise tolerant fine tuning algorithm for the Naïve Bayesian learning algorithm

Volume 26, Issue 1

1 -- 6Elham Parvinnia, Malihe Sabeti, Mansoor Zolghadri Jahromi, Reza Boostani. Classification of EEG Signals using adaptive weighted distance nearest neighbor algorithm
7 -- 18Minakhi Rout, Babita Majhi, Ritanjali Majhi, Ganapati Panda. Forecasting of currency exchange rates using an adaptive ARMA model with differential evolution based training
19 -- 27K. S. Kuppusamy, G. Aghila. CaSePer: An efficient model for personalized web page change detection based on segmentation
29 -- 40Azeddine Chikh. A general model of learning design objects
41 -- 54Fadi N. Sibai. Performance modeling and analysis of parallel Gaussian elimination on multi-core computers
55 -- 67SK Hafizul Islam, G. P. Biswas. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
69 -- 78Shaker H. Ali El-Sappagh, Samir El-Masri. A distributed clinical decision support system architecture
79 -- 87Rupak Bhattacharyya, Sheikh A. Hossain, Samarjit Kar. Fuzzy cross-entropy, mean, variance, skewness models for portfolio selection
89 -- 97SK Hafizul Islam, G. P. Biswas. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings
99 -- 109Mohamed Said Hamani, Ramdane Maamri, Yacine Kissoum, Maamar Sedrati. Unexpected rules using a conceptual distance based on fuzzy ontology
111 -- 119R. Kalpana, P. Thambidurai. A speedup technique for dynamic graphs using partitioning strategy and multithreaded approach
121 -- 130Prashant Kumar, Amol P. Bhondekar, Pawan Kapur. Measurement of changes in glacier extent in the Rimo glacier, a sub-range of the Karakoram Range, determined from Landsat imagery
131 -- 142Shashank Srivastava, Gora Chand Nandi. Fragmentation based encryption approach for self protected mobile agent
143 -- 152M. Rajeswari, G. Sambasivam, N. Balaji, M. S. Saleem Basha, T. Vengattaraman, P. Dhavachelvan. Appraisal and analysis on various web service composition approaches based on QoS factors
153 -- 160Michael Slavik, Imad Mahgoub, Mohammed M. Alwakeel. Analysis and evaluation of distance-to-mean broadcast method for VANET