default search action
Journal of King Saud University - Computer and Information Sciences, Volume 31
Volume 31, Number 1, January 2019
- Hanan M. Alghamdi, Ali Selamat:
Arabic Web page clustering: A review. 1-14
- Mohammed Alruqimi, Noura Aknin:
Bridging the Gap between the Social and Semantic Web: Extracting domain-specific ontology from folksonomy. 15-21 - Shaik Fathimabi, R. B. V. Subramanyam, Durvasula V. L. N. Somayajulu:
MSP: Multiple Sub-graph Query Processing using Structure-based Graph Partitioning Strategy and Map-Reduce. 22-34 - Anwar Ali Yahya:
Swarm intelligence-based approach for educational data classification. 35-51 - Meera Ramadas, Ajith Abraham, Sushil Kumar:
FSDE-Forced Strategy Differential Evolution used for data clustering. 52-61 - Mohammed Al-aaidroos, Norleyza Jailani, Muriati Mukhtar:
Expert validation on a reference model for e-auctions that conform to Islamic trading principles. 62-71 - Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah:
AMGRP: AHP-based Multimetric Geographical Routing Protocol for Urban environment of VANETs. 72-81 - Amanpreet Kaur, Padam Kumar, Govind P. Gupta:
A weighted centroid localization algorithm for randomly deployed wireless sensor networks. 82-91 - Muhammed Jassem Al-Muhammed, Raed Abu Zitar:
κ-Lookback random-based text encryption technique. 92-104 - Mazhar Ali Dootio, Asim Imdad Wagan:
Syntactic parsing and supervised analysis of Sindhi text. 105-112 - Manoj Kumar, Manoj Diwakar:
A new exponentially directional weighted function based CT image denoising using total variation. 113-124 - Abraham Jobin, Paul Varghese:
An imperceptible spatial domain color image watermarking scheme. 125-133
Volume 31, Number 2, April 2019
- Fahad Taha AL-Dhief, Naseer Sabri Salim, S. Fouad, N. M. Abdul Latiff, Musatafa Abbas Abbood Albadr:
A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective. 135-146 - Shariq Bashir:
Broken link repairing system for constructing contextual information portals. 147-160
- M. Abdul Muqeet, Raghunath S. Holambe:
Local appearance-based face recognition using adaptive directional wavelet transform. 161-174 - Mahin Vazifehdan, Mohammad Hossein Moattar, Mehrdad Jalali:
A hybrid Bayesian network and tensor factorization approach for missing value imputation to improve breast cancer recurrence prediction. 175-184 - Kapil Juneja:
Multiple feature descriptors based model for individual identification in group photos. 185-207 - Ankita Vaish, Sonam Gautam, Manoj Kumar:
A wavelet based approach for simultaneous compression and encryption of fused images. 208-217 - Biplab Bhattacharjee, Muhammad Shafi, Animesh Acharjee:
Network mining based elucidation of the dynamics of cross-market clustering and connectedness in Asian region: An MST and hierarchical clustering approach. 218-228 - Vinod Kumar Khera, R. K. Sharma, A. K. Gupta:
A heuristic fault based optimization approach to reduce test vectors count in VLSI testing. 229-234 - Rahime Ceylan, Hasan Koyuncu:
A Novel Rotation Forest Modality Based on Hybrid NNs: RF (ScPSO-NN). 235-251 - Ajit Kumar, K. S. Kuppusamy, Gnanasekaran Aghila:
A learning model to detect maliciousness of portable executable using integrated feature set. 252-265 - Indra, Edi Winarko, Reza Pulungan:
Trending topics detection of Indonesian tweets using BN-grams and Doc-p. 266-274
Volume 31, Number 3, July 2019
- Nitin Goyal, Mayank Dave, Anil K. Verma:
Data aggregation in underwater wireless sensor network: Recent approaches and issues. 275-286
- Atefeh Nekouie, Mohammad Hossein Moattar:
Missing value imputation for breast cancer diagnosis data using tensor factorization improved by enhanced reduced adaptive particle swarm optimization. 287-294 - Güliz Toz, Ibrahim Yücedag, Pakize Erdogmus:
A fuzzy image clustering method based on an improved backtracking search optimization algorithm with an inertia weight parameter. 295-303 - Sariga Arjunan, Pothula Sujatha:
A survey on unequal clustering protocols in Wireless Sensor Networks. 304-317 - Shyam P. Joy, Priya Chandran:
A formal framework for verifying IKA property of protocols. 318-326 - Oscar Karnalim:
IR-based technique for linearizing abstract method invocation in plagiarism-suspected source code pair. 327-334 - Pascal Maniriho, Tohari Ahmad:
Information hiding scheme for digital images using difference expansion and modulus function. 335-347 - Md. Khairullah:
A novel steganography method using transliteration of Bengali text. 348-366 - Mohammed Ahmed Ali Abdualrhman, M. C. Padma:
CS-IBC: Cuckoo search based incremental binary classifier for data streams. 367-377 - Ghaith M. Jaradat, Anas Bassam Al-Badareen, Masri Ayob, Mutasem Alsmadi, Ibrahim Almarashdeh, Mahmoud Ash-Shuqran, Eyas Al-Odat:
Hybrid Elitist-Ant System for Nurse-Rostering Problem. 378-384 - Durgesh Nandini, K. R. Seeja:
A novel path planning algorithm for visually impaired people. 385-391 - Marwa F. Mohamed, Abd El Rahman Shabayek, Mahmoud El-Gayyar, Hamed M. Nassar:
An adaptive framework for real-time data reduction in AMI. 392-402 - C. J. Satish, Anand Mahendran:
The effect of 3D visualization on mainframe application maintenance: A controlled experiment. 403-414
Volume 31, Number 4, October 2019
- Venketesh Palanisamy, Ramkumar Thirunavukarasu:
Implications of big data analytics in developing healthcare frameworks - A review. 415-425
- Abdul Majeed:
Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data. 426-435 - Rohit M. Thanki, Vedvyas Dwivedi, Komal R. Borisagar:
A hybrid watermarking scheme with CS theory for security of multimedia data. 436-451 - M. R. Ramli, Zuraida Abal Abas, M. I. Desa, Zaheera Zainal Abidin, Malik Bader Alazzam:
Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor. 452-458 - Sujit Das, Saurabh Kumar, Samarjit Kar, Tandra Pal:
Group decision making using neutrosophic soft matrix: An algorithmic approach. 459-468 - Walid El Shafai, Sayed El-Rabaie, Mohamed M. E. El-Halawany, Fathi E. Abd El-Samie:
Proposed optimized hybrid error recovery techniques for performance improvement of wireless 3D-MVC communication. 469-480 - Sangeeta Lal, Neetu Sardana, Ashish Sureka:
Three-level learning for improving cross-project logging prediction for if-blocks. 481-496 - Hüseyin Yildirim, Amr M. T. Ali-Eldin:
A model for predicting user intention to use wearable IoT devices at the workplace. 497-505 - Archana B. Kanwade, Vinayak K. Bairagi:
Classification of COPD and normal lung airways using feature extraction of electromyographic signals. 506-513 - Umer Farooq, M. Hassan Aslam, Muhammad Usman:
On the comparison of memristor-transistor hybrid and transistor-only heterogeneous FPGAs. 514-527 - Abid Ismail, K. S. Kuppusamy, Ajit Kumar, Pawan Kumar Ojha:
Connect the dots: Accessibility, readability and site ranking - An investigation with reference to top ranked websites of Government of India. 528-540 - Mehrnaz Mazini, Babak Shirazi, Iraj Mahdavi:
Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. 541-553 - Archana Harsing Sable, Sanjay N. Talbar, Haricharan Amarsing Dhirbasi:
Recognition of plastic surgery faces and the surgery types: An approach with entropy based scale invariant features. 554-560
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.