Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 32, Issue 9

987 -- 999Trilok Nath Pandey, Alok Kumar Jagadev, Satchidananda Dehuri, Sung-Bae Cho. A novel committee machine and reviews of neural network and statistical models for currency exchange rate prediction: An experimental analysis
1000 -- 1011Rajashree Dash. Performance analysis of an evolutionary recurrent Legendre Polynomial Neural Network in application to FOREX prediction
1012 -- 1019Ayesha Atta, Sagheer Abbas, Muhammad Adnan Khan, Gulzar Ahmed, Umer Farooq. An adaptive approach: Smart traffic congestion control system
1020 -- 1033Mohit Ranjan Panda, Pradipta Kumar Das, Saroj Pradhan. Hybridization of IWO and IPSO for mobile robots navigation in a dynamic environment
1034 -- 1044Randa Benkhelifa, Fatima Zohra Laallam. Exploring demographic information in online social networks for improving content classification
1045 -- 1054Sanjay Agrawal 0002, Rutuparna Panda, Leena Samantaray, Ajith Abraham. A novel automated absolute intensity difference based technique for optimal MR brain image thresholding
1055 -- 1062Sara Rekkal, Bakhta Amrane, Lakhdar Loukil. A similarity network for web services operations substitution
1063 -- 1070Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui. Efficient k-means based clustering scheme for mobile networks cell sites management
1071 -- 1080Rachida Boucebsi, Faiza Belala. A Bigraphical Reactive Systems with Sharing for modeling Wireless Mesh Networks
1081 -- 1094Vinod Kumar, Rajendra Kumar, Santosh K. Pandey. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

Volume 32, Issue 8

883 -- 894Nada A. Rasheed, Md. Jan Nordin. Classification and reconstruction algorithms for the archaeological fragments
895 -- 908Abhilasha Singh, Malay Kishore Dutta. A robust zero-watermarking scheme for tele-ophthalmological applications
909 -- 916Samir M. Koriem, Mohamed A. Bayoumi. Detecting and measuring holes in Wireless Sensor Network
917 -- 927Arun Agarwal, Saurabh N. Mehta. PC-CC: An advancement in forward error correction using polar and convolutional codes for MIMO-OFDM system
928 -- 939Nadia Guerroui, Hamid Seridi. Solving computational square jigsaw puzzles with a novel pairwise compatibility measure
940 -- 948Mrutyunjaya Panda. Elephant search optimization combined with deep neural network for microarray data analysis
949 -- 964Subhadra Mishra, Debahuti Mishra, Gour Hari Santra. Adaptive boosting of weak regressors for forecasting of crop production considering climatic variability: An empirical assessment
965 -- 976Mohd Wazih Ahmad, M. N. Doja, Tanvir Ahmad. Enumerative feature subset based ranking system for learning to rank in presence of implicit user feedback
977 -- 986Brahim Belgroun, Lotfi Admane. A traces based system helping to assess knowledge level in e-learning system

Volume 32, Issue 7

755 -- 762Mahmoud Khattab, Akram M. Zeki, Ali A. Alwan, Ahmed S. Badawy. Regularization-based multi-frame super-resolution: A systematic review
763 -- 774O. Deepa, J. Suguna. An optimized QoS-based clustering with multipath routing protocol for Wireless Sensor Networks
775 -- 783Igi Ardiyanto, Sunu Wibirama, Fajri Nurwanto. Sliding variance and data range for lightweight sports activity recognition with fusion of modalities
784 -- 793Sunil Kumar B. S., A. S. Manjunath, S. Christopher. High efficient video coding using weighted entropy with optimized quantization matrix
794 -- 808Kashif Hussain, Mohd. Najib Mohd. Salleh, Shi Cheng, Yuhui Shi, Rashid Naseem. Artificial bee colony algorithm: A component-wise analysis using diversity measurement
809 -- 817Bhavana Srivastava, Md. Tanwir Uddin Haider. Personalized assessment model for alphabets learning with learning objects in e-learning environment for dyslexia
818 -- 828Wahid Chergui, Samir Zidat, Farhi Marir. An approach to the acquisition of tacit knowledge based on an ontological model
829 -- 849P. K. Haleema, N. Ch. S. N. Iyengar. JADETraderPal - JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments
850 -- 859Amine Benhfid, El Bachir Ameur, Youssef Taouil. Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh
860 -- 869Bela Shrimali, Hiren Patel. Multi-objective optimization oriented policy for performance and energy efficient resource allocation in Cloud environment
870 -- 882Noha A. Hikal, Marwa Metwally Eid. A new approach for palmprint image encryption based on hybrid chaotic maps

Volume 32, Issue 6

635 -- 646Marco Antônio Calijorne Soares, Fernando Silva Parreiras. A literature review on question answering techniques, paradigms and systems
647 -- 657J. Uthayakumar, T. Vengattaraman, P. Dhavachelvan. Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: An application of bankruptcy prediction and credit risk analysis
658 -- 665Ahmed Taha, Aya S. Hammad, Mazen Mohamed Selim. A high capacity algorithm for information hiding in Arabic text
666 -- 683Raza Abbas Haidri, Chittaranjan Padmanabha Katti, Prem Chandra Saxena. Cost effective deadline aware scheduling strategy for workflow applications on virtual machines in cloud computing
684 -- 699Golnoush Abaei, Ali Selamat, Jehad Al-Dallal. A fuzzy logic expert system to predict module fault proneness using unlabeled data
700 -- 708Nimisha Patel, Hiren Patel. Energy efficient strategy for placement of virtual machines selected from underloaded servers in compute Cloud
709 -- 717Anmar Abuhamdah. Adaptive elitist-ant system for medical clustering problem
718 -- 729Suparna Biswas, Jaya Sil. An efficient face recognition method using contourlet and curvelet transform
730 -- 740Oluwafolake Ojo, Ayodeji Oludola Oluwatope, Suraju Olusegun Ajadi. Formal verification of a peer-to-peer streaming protocol
741 -- 753Sasmita Acharya, C. R. Tripathy. A reliable fault-tolerant ANFIS model based data aggregation scheme for Wireless Sensor Networks

Volume 32, Issue 5

543 -- 552Haya Al-Tuwaijri, Sanaa Ghouzali. Android data storage security: A review
553 -- 560Sabenabanu Abdulkadhar, Gurusamy Murugesan, Jeyakumar Natarajan. Classifying protein-protein interaction articles from biomedical literature using many relevant features and context-free grammar
561 -- 567Mohamed El Mohadab, Belaid Bouikhalene, Said Safi. Automatic CV processing for scientific research using data mining algorithm
568 -- 575Sharmila Subudhi, Suvasini Panigrahi. Use of optimized Fuzzy C-Means clustering and supervised classifiers for automobile insurance fraud detection
576 -- 582Abdelhay Zoizou, Arsalane Zarghili, Ilham Chaker. A new hybrid method for Arabic multi-font text segmentation, and a reference corpus construction
583 -- 591Suwanto Raharjo, Retantyo Wardoyo, Agfianto Eko Putra. Detecting proper nouns in indonesian-language translation of the quran using a guided method
592 -- 598S. Singaravelan, R. Arun, D. Arunshunmugam, S. Jerina Catherine Joy, D. Murugan. Inner interruption discovery and defense system by using data mining
599 -- 607Waleed Alomoush, Khairuddin Omar, Ayat Alrosan, Yazan M. Alomari, Dheeb Albashish, Ammar Almomani. Firefly photinus search algorithm
608 -- 617N. Sasikala, P. V. V. Kishore. Train bogie part recognition with multi-object multi-template matching adaptive algorithm
618 -- 633Kapil Juneja. MPMFFT based DCA-DBT integrated probabilistic model for face expression classification

Volume 32, Issue 4

385 -- 386Faiza Belala, Ramdane Maamri. Formal modeling and analysis of complex software
387 -- 397Chafia Bouanaka, Esma Maatougui, Faiza Belala, Nadia Zeghib. A formal quantitative analysis of elastic cloud systems based on PSMaude
398 -- 407Soumiya Ain El Hayat, Fouad Toufik, Mohamed Bahaj. UML/OCL based design and the transition towards temporal object relational database with bitemporal data
408 -- 418Mohammed Nassim Lacheheub, Nabil Hameurlain, Ramdane Maamri. Resources consumption analysis of business process services in cloud computing using Petri Net
419 -- 424Wasiur Rhmann, Babita Pandey, Gufran Ahmad Ansari, Devendra Kumar Pandey. Software fault prediction based on change metrics using hybrid algorithms: An empirical study
425 -- 432Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia. Comparison of scalar point multiplication algorithms in a low resource device
433 -- 446Samir Benbelkacem, Nadia Zenati-Henda, Djamel Aouam, Yousra Izountar, Samir Otmane. MVC-3DC: Software architecture model for designing collaborative augmented reality and virtual reality systems
447 -- 453Neziha Jaouedi, Noureddine Boujnah, Med Salim Bouhlel. A new hybrid deep learning model for human action recognition
454 -- 464Mouhoub Belazzoug, Mohamed Touahria, Farid Nouioua, Mohammed Brahimi. An improved sine cosine algorithm to select features for text categorization
465 -- 478Zakarya Elaggoune, Ramdane Maamri, Imane Boussebough. A fuzzy agent approach for smart data extraction in big data environments
479 -- 490Rashmi Rekha Sahoo, Mitrabinda Ray. PSO based test case generation for critical path using improved combined fitness function
491 -- 504Abdia Hamdani, Abdelkrim Abdelli. Towards modelling and analyzing timed workflow systems with complex synchronizations
505 -- 513Soufiane Boulehouache, Selma Ouareth, Ramdane Maamri. A self-switching multi-strategic pedagogical agent
514 -- 521Nishtha Jatana, Bharti Suri. Particle Swarm and Genetic Algorithm applied to mutation testing for test data generation: A comparative evaluation
522 -- 528Ahmed Louazani, Larbi Sekhri. Time Petri Nets based model for CL-MAC protocol with packet loss
529 -- 541Lakhdar Derdouri, CongDuc Pham. A delay analysis of active reliable multicast protocols on unreliable wireless mesh network backhaul

Volume 32, Issue 3

267 -- 286Mirsaeid Hosseini Shirvani, Amir Masoud Rahmani, Amir Sahafi. A survey study on virtual machine migration and server consolidation techniques in DVFS-enabled cloud datacenter: Taxonomy and challenges
287 -- 299Leena Mary Francis, N. Sreenath. TEDLESS - Text detection using least-square SVM from natural scene
300 -- 309Md. Tarek Habib, Anup Majumder, A. Z. M. Jakaria, Morium Akter, Mohammad Shorif Uddin, Farruk Ahmed. Machine vision based papaya disease recognition
310 -- 319Ganesh Chandra, Sanjay K. Dwivedi. Query expansion based on term selection for Hindi - English cross lingual IR
320 -- 328Souad Larabi Marie-Sainte, Nada Alalyani. Firefly Algorithm based Feature Selection for Arabic Text Classification
329 -- 334B. Jaya Lakshmi, M. Shashi, K. B. Madhuri. A rough set based subspace clustering technique for high dimensional data
335 -- 344Ah. E. Hegazy, M. A. Makhlouf, Ghada Samy El-Tawel. Improved salp swarm algorithm for feature selection
345 -- 366Smruti Rekha Das, Debahuti Mishra, Minakhi Rout. A hybridized ELM-Jaya forecasting model for currency exchange prediction
367 -- 374Rosziati Ibrahim, Maryam Ahmed 0003, Richi Nayak, Sapiee Jamel. Reducing redundancy of test cases generation using code smell detection and refactoring
375 -- 383Sagar Arun More, Pramod Jagan Deore. Gait-based human recognition using partial wavelet coherence and phase features

Volume 32, Issue 2

149 -- 158Sambit Kumar Mishra, Bibhudatta Sahoo 0001, Priti Paramita Parida. Load balancing in cloud computing: A big picture
159 -- 173Bilal H. Abed-alguni, Faisal Alkhateeb. β-hill climbing algorithm
174 -- 187Subrat Kumar Nayak, Pravat Kumar Rout, Alok Kumar Jagadev, Tripti Swarnkar. Elitism based Multi-Objective Differential Evolution for feature selection: A filter approach with an efficient redundancy measure
188 -- 196Youssef Hanyf, Hassan Silkan. A queries-based structure for similarity searching in static and dynamic metric spaces
197 -- 207Susmita Mahato, Dilip Kumar Yadav, Danish Ali Khan. Personal characters to bits mapping using Dot Pattern Character Encoding Scheme (DPCES)
208 -- 215Andi Sunyoto, Agus Harjoko, Retantyo Wardoyo, Mochamad Hariadi. Wrist detection based on a minimum bounding box and geometric features
216 -- 224Susmita Mahato, Danish Ali Khan, Dilip Kumar Yadav. A modified approach to data hiding in Microsoft Word documents by change-tracking technique
225 -- 231Said Bahassine, Abdellah Madani, Mohammed Al-Sarem, Mohamed Kissi. Feature selection using an improved Chi-square for Arabic text classification
232 -- 247Rasmita Dash. A two stage grading approach for feature selection and classification of microarray data using Pareto based feature ranking techniques: A case study
248 -- 253Muhanna A. Muhanna, Rita N. Amro, Abdallah Qusef. Using a new set of heuristics in evaluating Arabic interfaces
254 -- 265Vikas Bhatnagar, Ritanjali Majhi, Sunil Sahadev. Predicting numbers of successful new products to launch using soft computing techniques: A case of firms from manufacturing sector industries

Volume 32, Issue 10

1095 -- 1107S. B. Vinay Kumar, P. V. Rao, H. A. Sharath, B. M. Sachin, U. S. Ravi, B. V. Monica. Review on VLSI design using optimization and self-adaptive particle swarm optimization
1108 -- 1116Yasser Mesmoudi, Mohammed Lamnaour, Yasser El Khamlichi, Abderrahim Tahiri, Abdellah Touhafi, An Braeken. A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT)
1117 -- 1126Nithya Balasubramanian, Thivyavignesh Ramasamy Gurumurthy, Danthala Bharat. Receiver based contention management: A cross layer approach to enhance performance of wireless networks
1127 -- 1139Thandar Thein, Myint Myat Myo, Sazia Parvin, Amjad Gawanmeh. Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers
1140 -- 1148Shankar Thawkar, Ranjana Ingolikar. Classification of masses in digital mammograms using Biogeography-based optimization technique
1149 -- 1157Mücahid Barstugan, Rahime Ceylan. The effect of dictionary learning on weight update of AdaBoost and ECG classification
1158 -- 1172Jyotismita Chaki, Ranjan Parekh, Samar Bhattacharya. Plant leaf classification using multiple descriptors: A hierarchical approach
1173 -- 1181Emad Mohamed Mashhour, Enas M. F. El Houby, Khaled Tawfik Wassif, Akram Ibrahim Salah. A Novel Classifier based on Firefly Algorithm
1182 -- 1193Angulakshmi Maruthamuthu, Lakshmi Priya Gnanapandithan G.. Brain tumour segmentation from MRI using superpixels based spectral clustering
1194 -- 1201Lazim Abdullah, Razamin Ramli, Huda Omar Bakodah, Mahmod Othman. Developing a causal relationship among factors of e-commerce: A decision making approach

Volume 32, Issue 1

1 -- 10Amina El murabet, Anouar Abtoy, Abdellah Touhafi, Abderrahim Tahiri. Ambient Assisted living system's models and architectures: A survey of the state of the art
11 -- 23Kapil Juneja. An XML transformed method to improve effectiveness of graphical password authentication
24 -- 34Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd. Adib Omar, Shahir Akram Hassan. Integrity verification for digital Holy Quran verses using cryptographic hash function and compression
35 -- 49Gagandeep Kaur, Vikas Saxena, J. P. Gupta. Detection of TCP targeted high bandwidth attacks using self-similarity
50 -- 56El-Habib Bensikaddour, Youcef Bentoutou, Nasreddine Taleb. Embedded implementation of multispectral satellite image encryption using a chaos-based block cipher
57 -- 64Kashish Ara Shakil, Farhana Javed Zareen, Mansaf Alam, Suraiya Jabin. BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud
65 -- 72Meisam Kamarei, Ahmad Patooghy, Zohreh Shahsavari, Mohammad Javad Salehi. Lifetime expansion in WSNs using mobile data collector: A learning automata approach
73 -- 87K. Munivara Prasad, A. Rama Mohan Reddy, K. Venugopal Rao. BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web
88 -- 98Yousef E. M. Hamouda, Mohammed M. Msallam. Variable sampling interval for energy-efficient heterogeneous precision agriculture using Wireless Sensor Networks
99 -- 112Gunikhan Sonowal, K. S. Kuppusamy. PhiDMA - A phishing detection model with multi-filter approach
113 -- 125Issa Atoum. A novel framework for measuring software quality-in-use based on semantic similarity and sentiment analysis of software reviews
126 -- 136Djulaga Hadzic, Nermin Sarajlic. Methodology for fuzzy duplicate record identification based on the semantic-syntactic information of similarity
137 -- 148Prabhishek Singh, Raj Shree. A new homomorphic and method noise thresholding based despeckling of SAR image using anisotropic diffusion