Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 33, Issue 9

1041 -- 1054Rajendrani Mukherjee, K. Sridhar Patnaik. A survey on different approaches for software test case prioritization
1055 -- 1063Aya Hegazi, Ahmed Taha, Mazen Mohamed Selim. An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal
1064 -- 1073Sandipan Maiti, R. B. V. Subramanyam. Mining co-location patterns from distributed spatial data
1074 -- 1083Abdenour Hacine-Gharbi, Philippe Ravier. On the optimal number estimation of selected features using joint histogram based mutual information for speech emotion recognition
1084 -- 1095K. S. Mithra, W. R. Sam Emmanuel. GFNN: Gaussian-Fuzzy-Neural network for diagnosis of tuberculosis using sputum smear microscopic images
1096 -- 1107D. Ane Delphin, Mahabaleswara Ram Bhatt, D. Thiripurasundari. Holoentropy measures for image stitching of scenes acquired under CAMERA unknown or arbitrary positions
1108 -- 1120Adnan Abdul-Aziz Gutub, Khaled Aydh Alaseri. Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing
1121 -- 1131Mourad Brour, Abderrahim Benabbou. ATLASLang NMT: Arabic text language into Arabic sign language neural machine translation
1132 -- 1144R. Raj Priyadarshini, N. Sivakumar. Cluster head selection based on Minimum Connected Dominating Set and Bi-Partite inspired methodology for energy conservation in WSNs
1145 -- 1157Maha Faisal, Aisha Bourahma, Feda AlShahwan. Towards a reference model for sensor-supported learning systems

Volume 33, Issue 8

921 -- 935Saniya Zahoor, Roohie Naaz Mir. Resource management in pervasive Internet of Things: A survey
936 -- 946A. Amuthan 0001, Arulmurugan A.. Semi-Markov inspired hybrid trust prediction scheme for prolonging lifetime through reliable cluster head selection in WSNs
947 -- 954Gaurav Kumar Nigam, Chetna Dabas. ESO-LEACH: PSO based energy efficient clustering in LEACH
955 -- 962Imad-Eddine Benkoudad, Abdelmalek Azizi, Mouhammed El Amrani. Rhythms of Arabic words and Fibonacci words
963 -- 974Safia Meteb Awad Al-Nofaie, Adnan Gutub, Manal Al Ghamdi. Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces
975 -- 987Ganesh Singadkar, Abhishek Mahajan, Meenakshi Thakur, Sanjay N. Talbar. Automatic lung segmentation for the inclusion of juxtapleural nodules and pulmonary vessels using curvature based border correction
988 -- 998K. S. Mithra, W. R. Sam Emmanuel. Gaussian model based hybrid technique for infection level identification in TB diagnosis
999 -- 1007Wafa Boukellouz, Abdelouahab Moussaoui. Magnetic resonance-driven pseudo CT image using patch-based multi-modal feature extraction and ensemble learning with stacked generalisation
1008 -- 1017Anusha Achuthan, Mandava Rajeswari. Segmentation of hippocampus guided by assembled and weighted coherent point drift registration
1018 -- 1029J. Ramsingh, V. Bhuvaneswari. An efficient Map Reduce-Based Hybrid NBC-TFIDF algorithm to mine the public sentiment on diabetes mellitus - A big data approach
1030 -- 1039Rawinan Praditsangthong, Bhattarasiri Slakkham, Pattarasinee Bhattarakosol. A fear detection method based on palpebral fissure

Volume 33, Issue 7

761 -- 768Isaac Odun-Ayo, Rowland Goddy-Worlu, Jamaiah Yahaya, Victor Geteloma. A systematic mapping study of cloud policy languages and programming models
769 -- 786Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal. iABC-AL: Active learning-based privacy leaks threat detection for iOS applications
787 -- 797Masurah Mohamad, Ali Selamat, Imam Much Ibnu Subroto, Ondrej Krejcar. Improving the classification performance on imbalanced data sets via new hybrid parameterisation model
798 -- 809M. Sharma, G. Singh, R. Singh. Clinical decision support system query optimizer using hybrid Firefly and controlled Genetic Algorithm
810 -- 819Lo'ai Ali Tawalbeh, Gökay Saldamli. Reconsidering big data security and privacy in cloud and mobile cloud systems
820 -- 835Sagenela Vijaya Kumar, C. Nagaraju. Support vector neural network based fuzzy hybrid filter for impulse noise identification and removal from gray-scale image
836 -- 843Fella Berrimi, Khier Benmahammed, Riadh Hedli. Denoising of degraded face images sequence in PCA domain for recognition
844 -- 851Ranjeet Kumar Singh, Binod Kumar, Dilip Kumar Shaw, Danish Ali Khan. Level by level image compression-encryption algorithm based on quantum chaos map
852 -- 864Kiran Kumar Eepuri, P. V. V. Kishore, Dande Anil Kumar, Maddala Teja Kiran Kumar. Early estimation model for 3D-discrete indian sign language recognition using graph matching
865 -- 877Ali A. Hamzah, Sherif M. Khattab, Hanaa Bayomi. A linguistic steganography framework using Arabic calligraphy
878 -- 889Ahmad Shaik, V. Thanikaiselvan. Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification
890 -- 898Ibtissam Touahri, Azzeddine Mazroui. Studying the effect of characteristic vector alteration on Arabic sentiment classification
899 -- 907Hichem Rahab, Abdelhafid Zitouni, Mahieddine Djoudi. SANA: Sentiment analysis on newspapers comments in Algeria
908 -- 919Akshat Gaurav, Awadhesh Kumar Singh. Light weight approach for secure backbone construction for MANETs

Volume 33, Issue 6

619 -- 628I. Michael Revina, W. R. Sam Emmanuel. A Survey on Human Face Expression Recognition Techniques
629 -- 646Manal Abd Al-Jabbar Ahmad Mizher, Riza Sulaiman, Ayman Mahmoud Aref Abdalla, Manar Abduljabbar Ahmad Mizher. A simple flexible cryptosystem for meshed 3D objects and images
647 -- 657Babita Majhi, C. M. Anish, Ritanjali Majhi. On development of novel hybrid and robust adaptive models for net asset value prediction
658 -- 667Nur Aqilah Paskhal Rostam, Nurul Hashimah Ahamed Hassain Malim. Text categorisation in Quran and Hadith: Overcoming the interrelation challenges using machine learning and term weighting
668 -- 676Varsha Harpale, Vinayak K. Bairagi. An adaptive method for feature selection and extraction for classification of epileptic EEG signal in significant states
677 -- 692Aziz Qaroush, Ibrahim Abu Farha, Wasel Ghanem, Mahdi Washaha, Eman Maali. An efficient single document Arabic text summarization using a combination of statistical and semantic features
693 -- 701Sajidha Syed Azimuddin, Siddha Prabhu Chodnekar, Kalyani Desikan. Initial seed selection for K-modes clustering - A distance and density based approach
702 -- 718Feras Al-Hawari, Hala Barham. A machine learning based help desk system for IT service management
719 -- 727Deepti Mehrotra, Rashi Srivastava, Renuka Nagpal, Deepshikha Nagpal. Multiclass classification of mobile applications as per energy consumption
728 -- 739Nur Aini Rakhmawati, Jauhar Fatawi, Ahmad Choirun Najib, Azmi Adi Firmansyah. Linked open data for halal food products
740 -- 752Shailendra Pratap Singh, Vibhav Prakash Singh, Ashok Kumar Mehta. Differential evolution using homeostasis adaption based mutation operator and its application for software cost estimation
753 -- 760Faiza Beirade, Hamid Azzoune, Djamel Eddine Zegour. Semantic query for Quranic ontology

Volume 33, Issue 5

497 -- 507Imane Guellil, Houda Saadane, Faiçal Azouaou, Billel Gueni, Damien Nouvel. Arabic natural language processing: An overview
508 -- 517Jaspreet Singh, Gurvinder Singh, Rajinder Singh, Prithvipal Singh. Morphological evaluation and sentiment analysis of Punjabi text using deep learning classification
518 -- 527Rizki Nurfauzi, Hanung Adi Nugroho, Igi Ardiyanto, Eka Legya Frannita. Autocorrection of lung boundary on 3D CT lung cancer images
528 -- 541K. P. Baby Resma, Madhu S. Nair. Multilevel thresholding for image segmentation using Krill Herd Optimization algorithm
542 -- 551Fahima Tabassum, Md. Imdadul Islam, M. Ruhul Amin. Comparison of filter banks of DWT in recovery of image using one dimensional signal vector
552 -- 561Sanjeev Narayan Bal, Manas Ranjan Nayak, Subir Kumar Sarkar. On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching
562 -- 571Ali Shakiba. A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad
572 -- 579Sudhansu Bala Das, Sugyan Kumar Mishra, Anup Kumar Sahu. Alarm Coloring and Grouping algorithm for root cause analysis
580 -- 592Mohamed Ibrahim Beer Mohamed, Mohd Fadzil Hassan 0001, Sohail Safdar, Muhammad Qaiser Saleem. Adaptive security architectural model for protecting identity federation in service oriented computing
593 -- 599Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti. A secure and efficient remote data auditing scheme for cloud storage
600 -- 607Santosh Kumar, Awadhesh Kumar Singh. A localized algorithm for clustering in cognitive radio networks
608 -- 618Shamanth Nagaraju, Lucy J. Gudino, Nikhil Tripathi, V. Sreejith, C. K. Ramesha. Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach

Volume 33, Issue 4

375 -- 391Juhar Ahmed Abdella, Nazar M. Zaki, Khaled Shuaib, Fahad Shahbaz Khan. Airline ticket price and demand prediction: A survey
392 -- 398I. Michael Revina, W. R. Sam Emmanuel. Face expression recognition using LDN and Dominant Gradient Local Ternary Pattern descriptors
399 -- 407Ayodeji Olalekan Salau, Thomas Kokumo Yesufu, Babatunde Sunday Ogundare. Vehicle plate number localization using a modified GrabCut algorithm
408 -- 416Sridhar Raj S, Malaiyappan Nandhini. Ensemble human movement sequence prediction model with Apriori based Probability Tree Classifier (APTC) and Bagged J48 on Machine learning
417 -- 425Khalid Hussain, N. Z. Jhanjhi, Hafiz Mati-ur-Rahman, Jawad Hussain, Muhammad Hasan Islam. Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes
426 -- 435Sreeja Cherillath Sukumaran, Mohammed Misbahuddin. PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
436 -- 446Muhammad Aamir 0008, Syed Mustafa Ali Zaidi. Clustering based semi-supervised machine learning for DDoS attack classification
447 -- 452Sandeep Kumar Raghuwanshi, Rajesh Kumar Pateriya. Accelerated Singular Value Decomposition (ASVD) using momentum based Gradient Descent Optimization
453 -- 467Parimal Kumar Giri, Sagar S. De, Satchidananda Dehuri. Adaptive neighbourhood for locally and globally tuned biogeography based optimization algorithm
468 -- 475Mazhar Ali Dootio, Asim Imdad Wagan. Development of Sindhi text corpus
476 -- 488Moukrim Chouaib, Abderrahim Tragha, El Habib Benlahmer, Tarik Almalki. An innovative approach to autocorrecting grammatical errors in Arabic texts
489 -- 496Amuthan Arjunan, Kaviarasan Ramu. Weighted Distance Hyperbolic Prediction-Based Detection Scheme for Non Line Of Sight nodes in VANETs

Volume 33, Issue 3

243 -- 257Anuja Bhargava, Atul Bansal. Fruits and vegetables quality evaluation using computer vision: A review
258 -- 267Abderrahim Nabi, Zoubir Ahmed-Foitih, Mohammed El-Amine Cheriet. Improved triangular-based star pattern recognition algorithm for low-cost star trackers
268 -- 280Priyanka Ahlawat, Mayank Dave. An attack resistant key predistribution scheme for wireless sensor networks
281 -- 290Samir Gourdache, Azeddine Bilami, Kamel Barka. A framework for spectrum harvesting in heterogeneous wireless networks integration
291 -- 303Sunny Behal, Krishan Kumar 0001, Monika Sachdeva. ϕ-Divergence based distributed DDoS defense system
304 -- 312Dwi Sunaryono, Joko Siswantoro, Radityo Anggoro. An android based course attendance system using face recognition
313 -- 328Prabhishek Singh, Raj Shree, Manoj Diwakar. A new SAR image despeckling using correlation based fusion and method noise thresholding
329 -- 339Hanung Adi Nugroho, Zulfanahri, Eka Legya Frannita, Igi Ardiyanto, Lina Choridah. Computer aided diagnosis for thyroid cancer system based on internal and external characteristics
340 -- 350Bo Xu, Xiaoyu Wang, Jiao Zhang, Asghar A. Razzaqi. Polyscale gradients residual demosaicking
351 -- 363Sarah Saad Eldin, Ammar Mohammed, Hesham A. Hefny, Ahmed Sharaf Eldin Ahmed. An Enhanced Opinion Retrieval Approach on Arabic Text for Customer Requirements Expansion
364 -- 373Sunita, Deepak Garg. Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue

Volume 33, Issue 2

119 -- 140Uthayakumar J., Vengattaraman Thirumal, Dhavachelvan Ponnurangam. A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications
141 -- 149Saliha Mezzoudj, Ali Behloul, Rachid Seghir, Yassmina Saadna. A parallel content-based image retrieval system using spark and tachyon frameworks
150 -- 160Meenakshi Pawar, Sanjay N. Talbar. Local entropy maximization based image fusion for contrast enhancement of mammogram
161 -- 182Md. Khaliluzzaman. Analytical justification of vanishing point problem in the case of stairways recognition
183 -- 194Dheeraj Malhotra, Om Prakash Rishi. An intelligent approach to design of E-Commerce metasearch and ranking system using next-generation big data analytics
195 -- 207Rasmita Dash. An Adaptive Harmony Search Approach for Gene Selection and Classification of High Dimensional Medical Data
208 -- 217Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin. EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network
218 -- 224Hamza Alami, Noureddine Ennahnahi, Khalid Alaoui Zidani, Saïd El Alaoui Ouatik. An arabic question classification method based on new taxonomy and continuous distributed representation of words
225 -- 234Gayathri Nemani Bhagya, Thumbur Gowri, Krishna Rao Ravva Rama Venkata, Punugu Vasudeva Reddy. Efficient and secure pairing-free certificateless directed signature scheme
235 -- 242Fatma Elghannam. Text representation and classification based on bi-gram alphabet

Volume 33, Issue 10

1159 -- 1176Priti Kumari 0004, Parmeet Kaur. A survey of fault tolerance in cloud computing
1177 -- 1185Fatima-Zahra Benjelloun, Ahmed Oussous, Amine Bennani, Samir Belfkih, Ayoub Ait Lahcen. Improving outliers detection in data streams using LiCS and voting
1186 -- 1201Dipika Sarkar, Swagata Choudhury, Abhishek Majumder. Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network
1202 -- 1210Marcus Lim, Azween B. Abdullah, N. Z. Jhanjhi. Performance optimization of criminal network hidden link prediction model with deep reinforcement learning
1211 -- 1218Punugu Vasudeva Reddy, A. Ramesh Babu, N. B. Gayathri. Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
1219 -- 1230Shihab Hamad Khaleefah, Salama A. Mostafa, Aida Mustapha, Mohammad Faidzul Nasrudin. The ideal effect of Gabor filters and Uniform Local Binary Pattern combinations on deformed scanned paper images
1231 -- 1241Rameez Raja Chowdhary, Manju K. Chattopadhyay, Raj Kamal. Comparative study of orchestrated, centralised and decentralised approaches for orchestrator based task allocation and collision avoidance using network controlled robots
1242 -- 1250Belgacem Brahimi, Mohamed Touahria, Abdelkamel Tari. Improving sentiment analysis in Arabic: A combined approach
1251 -- 1257A. Joy Christy, A. Umamakeswari, L. Priyatharsini, A. Neyaa. RFM ranking - An effective approach to customer segmentation
1258 -- 1264Dawid Grzelak, Krzysztof Podlaski, Grzegorz Wiatrowski. Analyze the effectiveness of an algorithm for identifying Polish characters in handwriting based on neural machine learning technologies
1265 -- 1273Madhu Khurana, Vikas Saxena. Green cover change detection using a modified adaptive ensemble of extreme learning machines for North-Western India

Volume 33, Issue 1

1 -- 10Pawan Kumar Ojha, Abid Ismail, K. S. Kuppusamy. Perusal of readability with focus on web content understandability
11 -- 20Dewi Rahmawati, Riyanarto Sarno. Anomaly detection using control flow pattern and fuzzy regression in port container handling
21 -- 32Rabei Raad Ali, Kamaruddin Malik Mohamad. RX_myKarve carving framework for reassembling complex fragmentations of JPEG images
33 -- 44Shailendra Aswale, Vijay Ram Ghorpade. Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks
45 -- 53Shahzeb Khan, Jawwad Ahmed Shamsi. Health Quest: A generalized clinical decision support system with multi-label classification
54 -- 67Bhagyalakshmi Vishwanath, Ramchandra Vittal Pujeri, Geetha Dundesh Devanagavi. GB-SVNN: Genetic BAT assisted support vector neural network for arrhythmia classification using ECG signals
68 -- 76Zouaoui Samia, Rezeg Khaled. Islamic inheritance calculation system based on Arabic ontology (AraFamOnto)
77 -- 85Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
86 -- 98Renu Mary Daniel, Elijah Blessing Rajsingh, Salaja Silas. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography
99 -- 109Khawlah Altuwairqi, Salma Kammoun Jarraya, Arwa Allinjawi, Mohamed Hammami. A new emotion-based affective model to detect student's engagement
110 -- 117Revathi Balasundaram, Gnanou Florence Sudha. Retrieval performance analysis of multibiometric database using optimized multidimensional spectral hashing based indexing
118 -- 0Sariga Arjunan, Pothula Sujatha. Corrigendum to "A survey on unequal clustering protocols in Wireless Sensor Networks" [J. King Saud Univ. - Comput. Inf. Sci. 31 (2019) 304-317]