Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 29, Issue 4

427 -- 0Nasser-Eddine Rikli. Message from the Editor
428 -- 448Avinash More, Vijay T. Raisinghani. A survey on energy efficient coverage protocols in wireless sensor networks
449 -- 461Sabeen Tahir, Sheikh Tahir Bakhsh, Abdulrahman H. Altalhi. An Efficient Route Maintenance Protocol for Dynamic Bluetooth Networks
462 -- 472Sumaiya Thaseen Ikram, Cherukuri Aswani Kumar. Intrusion detection model using fusion of chi-square feature selection and multi class SVM
473 -- 483Sudip Roy 0004, Sourav Banerjee, K. R. Chowdhury, Utpal Biswas. Development and analysis of a three phase cloudlet allocation algorithm
484 -- 492Iyad Abu Doush, Sahar Al-Btoush. Currency recognition using a smartphone: Comparison between color SIFT and gray scale SIFT algorithms
493 -- 498Khadidja Kaibiche, Slami Saadi, Djamel Chikouche, Zoubida Messali. Restoration of stained old manuscripts via a hybrid wavelet and bilateral filtering system
499 -- 504Bhaskar Mondal, Tarni Mandal. A light weight secure image encryption scheme based on chaos & DNA computing
505 -- 519Shalini Bhartiya, Deepti Mehrotra, Anup Girdhar. Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment
520 -- 525Abdullah Talha Kabakus, Resul Kara. A performance evaluation of in-memory databases
526 -- 535Waleed Mugahed Al-Rahmi, Akram M. Zeki. A model of using social media for collaborative learning to enhance learners' performance on learning
536 -- 552Ajit Kumar Rout, P. K. Dash, Rajashree Dash, Ranjeeta Bisoi. Forecasting financial time series using a low complexity recurrent neural network and evolutionary learning approach
553 -- 561Murad Ali, Raja Ahmad Iskandar Bin Raja Yaacob, Mohd Nuri Al-Amin Bin Endut, Naseeb Ullah Langove. Strengthening the academic usage of social media: An exploratory study

Volume 29, Issue 3

235 -- 0Nasser-Eddine Rikli. Message from the Editor
236 -- 245Syed Afsar Shah, Babar Nazir, Imran Ali Khan. Congestion control algorithms in wireless sensor networks: Trends and opportunities
246 -- 268Poonam Jindal, Brahmjit Singh. Quantitative analysis of the security performance in wireless LANs
269 -- 280Malik N. Ahmed, Abdul Hanan Abdullah, Hassan Chizari, Omprakash Kaiwartya. F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs
281 -- 287Pradeep Deshmukh. Design of cloud security in the EHR for Indian healthcare services
288 -- 294Abdulmawla Najih, S. A. R. Al-Haddad, Abd. Rahman bin Ramli, Shaiful J. Hashim, Mohammad Ali Nematollahi. Digital image watermarking based on angle quantization in discrete contourlet transform
295 -- 302Umer Farooq, M. Faisal Aslam. Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA
303 -- 310P. Vasudeva Reddy, P. V. S. S. N. Gopal. Identity-based key-insulated aggregate signature scheme
311 -- 324SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li 0002, Saru Kumari. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
325 -- 348Saoussen Rekhis, Nadia Bouassida, Rafik Bouaziz, Claude Duvallet, Bruno Sadeg. A new method for constructing and reusing domain specific design patterns: Application to RT domain
349 -- 364Amarjeet, Jitender Kumar Chhabra. Improving package structure of object-oriented software using multi-objective optimization and weighted class connections
365 -- 377Ahmad M. Manasrah, Tariq Smadi, Ammar Almomani. A Variable Service Broker Routing Policy for data center selection in cloud analyst
378 -- 398Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh. A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks
399 -- 409M. Abdel-Salam Nasr, Mohammed AlRahmawy, Ahmad Tolba. Multi-scale structural similarity index for motion detection
410 -- 425Mansi Jhamb, R. K. Sharma, A. K. Gupta. A high level implementation and performance evaluation of level-I asynchronous cache on FPGA

Volume 29, Issue 2

1 -- 0Vito Pirrelli, Arsalane Zarghili. Arabic Natural Language Processing: Models, systems and applications
141 -- 146Mohamed Boudchiche, Azzeddine Mazroui, Mohamed Ould Abdallahi Ould Bebah, Abdelhak Lakhouaja, Abderrahim Boudlal. AlKhalil Morpho Sys 2: A robust Arabic morpho-syntactic analyzer
147 -- 155Inès Zribi, Mariem Ellouze, Lamia Hadrich Belguith, Philippe Blache. Morphological disambiguation of Tunisian dialect
156 -- 163Amine Chennoufi, Azzeddine Mazroui. Morphological, syntactic and diacritics rules for automatic diacritization of Arabic sentences
164 -- 170Younes Jaafar, Driss Namly, Karim Bouzoubaa, Abdellah Yousfi. Enhancing Arabic stemming process using resources and benchmarking tools
171 -- 178Imad Zeroual, Abdelhak Lakhouaja, Rachid Belahbib. Towards a standard Part of Speech tagset for the Arabic language
179 -- 188Claudia Marzi, Marcello Ferro, Ouafae Nahli. Arabic word processing and morphology induction through adaptive memory self-organisation strategies
189 -- 195Fawaz S. Al-Anzi, Dia AbuZeina. Toward an enhanced Arabic text classification using cosine similarity and Latent Semantic Indexing
196 -- 203Issam Sahmoudi, Abdelmonaime Lachkar. Formal Concept Analysis for Arabic Web Search Results Clustering
204 -- 211Viviana Cotik, Horacio Rodríguez, Jorge Vivaldi. Arabic medical entity tagging using distant learning in a Multilingual Framework
212 -- 228Imen Bouaziz Mezghanni, Faïez Gargouri. Deriving ontological semantic relations between Arabic compound nouns concepts
229 -- 233Samir Tartir, Ibrahim Abdul-Nabi. Semantic Sentiment Analysis in Arabic Social Media

Volume 29, Issue 1

1 -- 0Nasser-Eddine Rikli. Message from the Editor
2 -- 18Souad Larabi Marie-Sainte. Detection and visualization of non-linear structures in large datasets using Exploratory Projection Pursuit Laboratory (EPP-Lab) software
19 -- 28Aarti Singh, Dimple Juneja, Manisha Malhotra. A novel agent based autonomous and service composition framework for cost optimization of resource provisioning in cloud computing
29 -- 38Abdelhak Boukharouba. A new algorithm for skew correction and baseline detection based on the randomized Hough Transform
39 -- 53Abdullah Al-Hasanat, Abdelwadood Mesleh, Monther Krishan, Ahmed Sharadqh, Aws Al-Qaisi, Wai Lok Woo, Satnam Singh Dlay. Blind separation of multicomponent seismic wavefield using SVD of reduced dimension spectral matrix
54 -- 62Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay. An enhanced dynamic ID-based authentication scheme for telecare medical information systems
63 -- 73SK Hafizul Islam, G. P. Biswas. A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication
74 -- 84Pawan Singh, Berhane Wolde-Gabriel. Executed-time Round Robin: EtRR an online non-clairvoyant scheduling on speed bounded processor with energy management
85 -- 92D. C. Kiran, S. Gurunarayanan 0001, Janardan Prasad Misra, Munish Bhatia. Register allocation for fine grain threads on multicore processor
93 -- 102Rinkaj Goyal, Pravin Chandra, Yogesh Singh. Fuzzy inferencing to identify degree of interaction in the development of fault prediction models
103 -- 115Salman Ali AlQahtani. Users' classification-based call admission control with adaptive resource reservation for LTE-A networks
116 -- 133Deepika Saini, Sanjeev Kumar, Tilak Raj Gulati. NURBS-based geometric inverse reconstruction of free-form shapes
134 -- 140B. Venkata Seshu Kumari, Ramisetty Rajeshwara Rao. Telugu dependency parsing using different statistical parsers