


default search action
Journal of King Saud University - Computer and Information Sciences, Volume 31
Volume 31, Number 1, January 2019
- Hanan M. Alghamdi

, Ali Selamat:
Arabic Web page clustering: A review. 1-14
- Mohammed Alruqimi

, Noura Aknin:
Bridging the Gap between the Social and Semantic Web: Extracting domain-specific ontology from folksonomy. 15-21 - Shaik Fathimabi

, R. B. V. Subramanyam, Durvasula V. L. N. Somayajulu:
MSP: Multiple Sub-graph Query Processing using Structure-based Graph Partitioning Strategy and Map-Reduce. 22-34 - Anwar Ali Yahya

:
Swarm intelligence-based approach for educational data classification. 35-51 - Meera Ramadas

, Ajith Abraham, Sushil Kumar
:
FSDE-Forced Strategy Differential Evolution used for data clustering. 52-61 - Mohammed Al-aaidroos

, Norleyza Jailani
, Muriati Mukhtar:
Expert validation on a reference model for e-auctions that conform to Islamic trading principles. 62-71 - Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah:

AMGRP: AHP-based Multimetric Geographical Routing Protocol for Urban environment of VANETs. 72-81 - Amanpreet Kaur, Padam Kumar, Govind P. Gupta:

A weighted centroid localization algorithm for randomly deployed wireless sensor networks. 82-91 - Muhammed Jassem Al-Muhammed, Raed Abu Zitar

:
κ-Lookback random-based text encryption technique. 92-104 - Mazhar Ali Dootio

, Asim Imdad Wagan
:
Syntactic parsing and supervised analysis of Sindhi text. 105-112 - Manoj Kumar, Manoj Diwakar

:
A new exponentially directional weighted function based CT image denoising using total variation. 113-124 - Abraham Jobin

, Paul Varghese:
An imperceptible spatial domain color image watermarking scheme. 125-133
Volume 31, Number 2, April 2019
- Fahad Taha AL-Dhief, Naseer Sabri Salim, S. Fouad, N. M. Abdul Latiff

, Musatafa Abbas Abbood Albadr:
A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective. 135-146 - Shariq Bashir

:
Broken link repairing system for constructing contextual information portals. 147-160
- M. Abdul Muqeet

, Raghunath S. Holambe:
Local appearance-based face recognition using adaptive directional wavelet transform. 161-174 - Mahin Vazifehdan, Mohammad Hossein Moattar

, Mehrdad Jalali
:
A hybrid Bayesian network and tensor factorization approach for missing value imputation to improve breast cancer recurrence prediction. 175-184 - Kapil Juneja

:
Multiple feature descriptors based model for individual identification in group photos. 185-207 - Ankita Vaish, Sonam Gautam, Manoj Kumar:

A wavelet based approach for simultaneous compression and encryption of fused images. 208-217 - Biplab Bhattacharjee, Muhammad Shafi

, Animesh Acharjee
:
Network mining based elucidation of the dynamics of cross-market clustering and connectedness in Asian region: An MST and hierarchical clustering approach. 218-228 - Vinod Kumar Khera, R. K. Sharma, A. K. Gupta:

A heuristic fault based optimization approach to reduce test vectors count in VLSI testing. 229-234 - Rahime Ceylan, Hasan Koyuncu

:
A Novel Rotation Forest Modality Based on Hybrid NNs: RF (ScPSO-NN). 235-251 - Ajit Kumar

, K. S. Kuppusamy, Gnanasekaran Aghila:
A learning model to detect maliciousness of portable executable using integrated feature set. 252-265 - Indra

, Edi Winarko
, Reza Pulungan
:
Trending topics detection of Indonesian tweets using BN-grams and Doc-p. 266-274
Volume 31, Number 3, July 2019
- Nitin Goyal

, Mayank Dave
, Anil K. Verma:
Data aggregation in underwater wireless sensor network: Recent approaches and issues. 275-286
- Atefeh Nekouie, Mohammad Hossein Moattar

:
Missing value imputation for breast cancer diagnosis data using tensor factorization improved by enhanced reduced adaptive particle swarm optimization. 287-294 - Güliz Toz

, Ibrahim Yücedag, Pakize Erdogmus:
A fuzzy image clustering method based on an improved backtracking search optimization algorithm with an inertia weight parameter. 295-303 - Sariga Arjunan, Pothula Sujatha

:
A survey on unequal clustering protocols in Wireless Sensor Networks. 304-317 - Shyam P. Joy, Priya Chandran

:
A formal framework for verifying IKA property of protocols. 318-326 - Oscar Karnalim

:
IR-based technique for linearizing abstract method invocation in plagiarism-suspected source code pair. 327-334 - Pascal Maniriho

, Tohari Ahmad
:
Information hiding scheme for digital images using difference expansion and modulus function. 335-347 - Md. Khairullah

:
A novel steganography method using transliteration of Bengali text. 348-366 - Mohammed Ahmed Ali Abdualrhman, M. C. Padma:

CS-IBC: Cuckoo search based incremental binary classifier for data streams. 367-377 - Ghaith M. Jaradat

, Anas Bassam Al-Badareen, Masri Ayob, Mutasem Alsmadi, Ibrahim Almarashdeh, Mahmoud Ash-Shuqran, Eyas Al-Odat:
Hybrid Elitist-Ant System for Nurse-Rostering Problem. 378-384 - Durgesh Nandini

, K. R. Seeja
:
A novel path planning algorithm for visually impaired people. 385-391 - Marwa F. Mohamed

, Abd El Rahman Shabayek
, Mahmoud El-Gayyar, Hamed M. Nassar
:
An adaptive framework for real-time data reduction in AMI. 392-402 - C. J. Satish, Anand Mahendran

:
The effect of 3D visualization on mainframe application maintenance: A controlled experiment. 403-414
Volume 31, Number 4, October 2019
- Venketesh Palanisamy

, Ramkumar Thirunavukarasu
:
Implications of big data analytics in developing healthcare frameworks - A review. 415-425
- Abdul Majeed:

Attribute-centric anonymization scheme for improving user privacy and utility of publishing e-health data. 426-435 - Rohit M. Thanki

, Vedvyas Dwivedi
, Komal R. Borisagar:
A hybrid watermarking scheme with CS theory for security of multimedia data. 436-451 - M. R. Ramli

, Zuraida Abal Abas, M. I. Desa, Zaheera Zainal Abidin, Malik Bader Alazzam
:
Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor. 452-458 - Sujit Das

, Saurabh Kumar, Samarjit Kar, Tandra Pal
:
Group decision making using neutrosophic soft matrix: An algorithmic approach. 459-468 - Walid El Shafai

, Sayed El-Rabaie
, Mohamed M. E. El-Halawany, Fathi E. Abd El-Samie:
Proposed optimized hybrid error recovery techniques for performance improvement of wireless 3D-MVC communication. 469-480 - Sangeeta Lal, Neetu Sardana, Ashish Sureka:

Three-level learning for improving cross-project logging prediction for if-blocks. 481-496 - Hüseyin Yildirim, Amr M. T. Ali-Eldin

:
A model for predicting user intention to use wearable IoT devices at the workplace. 497-505 - Archana B. Kanwade

, Vinayak K. Bairagi
:
Classification of COPD and normal lung airways using feature extraction of electromyographic signals. 506-513 - Umer Farooq, M. Hassan Aslam

, Muhammad Usman:
On the comparison of memristor-transistor hybrid and transistor-only heterogeneous FPGAs. 514-527 - Abid Ismail, K. S. Kuppusamy, Ajit Kumar

, Pawan Kumar Ojha:
Connect the dots: Accessibility, readability and site ranking - An investigation with reference to top ranked websites of Government of India. 528-540 - Mehrnaz Mazini, Babak Shirazi

, Iraj Mahdavi:
Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. 541-553 - Archana Harsing Sable, Sanjay N. Talbar

, Haricharan Amarsing Dhirbasi:
Recognition of plastic surgery faces and the surgery types: An approach with entropy based scale invariant features. 554-560

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














