Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 27, Issue 4

363 -- 0Nasser-Eddine Rikli. Message from the Editor
364 -- 375Izzat Alsmadi, Mohammad Zarour. Building an Islamic financial information system based on policy managements
376 -- 385Issam Al-Azzoni. Server consolidation for heterogeneous computer clusters using Colored Petri Nets and CPN Tools
386 -- 392K. Muthumanickam, E. Ilavarasan. Optimization of rootkit revealing system resources - A game theoretic approach
393 -- 401Yahya Al-Nabhani, Hamid A. Jalab, Ainuddin Wahid Abdul Wahab, Rafidah Md Noor. Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network
402 -- 415Parmeet Kaur Jaggi, Awadhesh Kumar Singh. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks
416 -- 429Hussein Abdel-jaber. Performance study of Active Queue Management methods: Adaptive GRED, REDD, and GRED-Linear analytical model
430 -- 436Sunil Sharma, O. P. Sahu. A low complexity based spectrum management algorithm for 'Near-Far' problem in VDSL environment
437 -- 449Mayy M. Al-Tahrawi, Sumaya N. Al-Khatib. Arabic text classification using Polynomial Networks
450 -- 457Pradyot Ranjan Jena, Ritanjali Majhi, Babita Majhi. Development and performance evaluation of a novel knowledge guided artificial neural network (KGANN) model for exchange rate prediction
458 -- 467Baddrud Z. Laskar, Ashutosh, Swanirbhar Majumder. Artificial Neural Networks and Gene Expression Programing based age estimation using facial features
468 -- 476Anuradha Yarlagadda, J. V. R. Murthy, Munaga H. M. Krishna Prasad. A novel method for human age group classification based on Correlation Fractal Dimension of facial edges

Volume 27, Issue 3

237 -- 0Nasser-Eddine Rikli. Message from the Editor
238 -- 247Abdallah M. Abualkishik, Khairuddin Omar, Ghadeer A. Odiebat. QEFSM model and Markov Algorithm for translating Quran reciting rules into Braille code
248 -- 268Salha M. Alzahrani, Naomie Salim, Vasile Palade. Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model
269 -- 277Anil Garg, O. P. Sahu. Cuckoo search based optimal mask generation for noise suppression and enhancement of speech signal
278 -- 287Ranjit Kaur, Manjeet Singh Patterh, J. S. Dhillon 0001. A new greedy search method for the design of digital IIR filter
288 -- 296Soroor Sarafrazi, Hossein Nezamabadi-pour, Saeid R. Seydnejad. A novel hybrid algorithm of GSA with Kepler algorithm for numerical optimization
297 -- 304Sam Fletcher, Md Zahidul Islam 0001. An anonymization technique using intersected decision trees
305 -- 314M. Mazhar Rathore. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks
315 -- 322Heba A. Kurdi. HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems
323 -- 333Zainab M. Aljazzaf. Bootstrapping quality of Web Services
334 -- 343Malihe Sabeti, S. D. Katebi, K. Rastgar. Source localization algorithms to find attention and memory circuits in the brain
344 -- 361Muhanna A. Muhanna. Virtual reality and the CAVE: Taxonomy, interaction challenges and research directions

Volume 27, Issue 2

93 -- 0Nasser-Eddine Rikli. Message from the Editor
94 -- 103Mohammed Naji Al-Kabi, Saif A. Kazakzeh, Belal Abu Ata, Saif A. Ahmad Alrababah, Izzat Mahmoud Alsmadi. A novel root based Arabic stemmer
104 -- 112Belal Abu Ata, Asma Al-Omari. A rule-based stemmer for Arabic Gulf dialect
113 -- 128Md Anisur Rahman, Md Zahidul Islam 0001, Terry Bossomaier. ModEx and Seed-Detective: Two novel techniques for high quality clustering by using good initial seeds in K-Means
129 -- 139Raed I. Hamed. Esophageal cancer prediction based on qualitative features using adaptive fuzzy reasoning method
140 -- 146Zulfiqar Habib, Ghulam Rasool, Manabu Sakai. Admissible curvature continuous areas for fair curves using G2 Hermite PH quintic polynomial
147 -- 159Waleed M. Al-Adrousy, Hesham A. Ali, Taher T. Hamza. A recommender system for team formation in MANET
160 -- 169Ahmed Mohammed Elaklouk, Nor Azan Mat Zin, Azrulhizam Shapi'i. Investigating therapists' intention to use serious games for acquired brain injury cognitive rehabilitation
170 -- 180Boulbaba Ben Ammar, Mohamed Tahar Bhiri. Pattern-based model refactoring for the introduction association relationship
181 -- 192Mrityunjay Singh, S. K. Jain. Transformation rules for decomposing heterogeneous data into triples
193 -- 210Ashok Kumar Das, Adrijit Goswami. A robust anonymous biometric-based remote user authentication scheme using smart cards
211 -- 221SK Hafizul Islam, G. P. Biswas. Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system
222 -- 229Mohammed Naji Al-Kabi, Izzat Mahmoud Alsmadi, Heider A. Wahsheh. Evaluation of Spam Impact on Arabic Websites Popularity
230 -- 235Mohammad A. Sarrayrih, B. Sriram. Major challenges in developing a successful e-government: A review on the Sultanate of Oman

Volume 27, Issue 1

1 -- 12B. Saleena, S. K. Srivatsa. Using concept similarity in cross ontology for adaptive e-Learning systems
13 -- 24G. Suresh Kumar, G. Zayaraz 0001. Concept relation extraction using Naïve Bayes classifier for ontology-based question answering systems
25 -- 39Suman Kumar Saha, Rajib Kar, Durbadal Mandal, S. P. Ghoshal. Optimal IIR filter design using Gravitational Search Algorithm with Wavelet Mutation
40 -- 45Hilal Naimi, Amel Baha Houda Adamou-Mitiche, Lahcène Mitiche. Medical image denoising using dual tree complex thresholding wavelet transform and Wiener filter
46 -- 57Izzat Alsmadi, Ikdam Alhami. Clustering and classification of email contents
58 -- 67Mohammad Ali Nematollahi, S. A. R. Al-Haddad, Faraneh Zarafshan. Blind digital speech watermarking based on Eigen-value quantization in DWT
68 -- 76Samaa M. Shohieb, Hamdy K. Elminir, Alaa Mohamed Riad. SignsWorld Atlas; a benchmark Arabic Sign Language database
77 -- 92Riyad Alshammari, A. Nur Zincir-Heywood. Identification of VoIP encrypted traffic using a machine learning approach