Search dblp for Publications

export results for "toc:db/journals/jksucis/jksucis27.bht:"

 download as .bib file

@article{DBLP:journals/jksucis/Abdel-jaber15,
  author       = {Hussein Abdel{-}jaber},
  title        = {Performance study of Active Queue Management methods: Adaptive GRED,
                  REDD, and GRED-Linear analytical model},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {416--429},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.01.003},
  doi          = {10.1016/J.JKSUCI.2015.01.003},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Abdel-jaber15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AbualkishikOO15,
  author       = {Abdallah M. Abualkishik and
                  Khairuddin Omar and
                  Ghadeer A. Odiebat},
  title        = {{QEFSM} model and Markov Algorithm for translating Quran reciting
                  rules into Braille code},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {238--247},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.01.001},
  doi          = {10.1016/J.JKSUCI.2015.01.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/AbualkishikOO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Al-AdrousyAH15,
  author       = {Waleed M. Al{-}Adrousy and
                  Hesham A. Ali and
                  Taher T. Hamza},
  title        = {A recommender system for team formation in {MANET}},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {147--159},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.06.014},
  doi          = {10.1016/J.JKSUCI.2014.06.014},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Al-AdrousyAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Al-Azzoni15,
  author       = {Issam Al{-}Azzoni},
  title        = {Server consolidation for heterogeneous computer clusters using Colored
                  Petri Nets and {CPN} Tools},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {376--385},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.02.001},
  doi          = {10.1016/J.JKSUCI.2015.02.001},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Al-Azzoni15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Al-KabiAW15,
  author       = {Mohammed Naji Al{-}Kabi and
                  Izzat Mahmoud Alsmadi and
                  Heider A. Wahsheh},
  title        = {Evaluation of Spam Impact on Arabic Websites Popularity},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {222--229},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.04.005},
  doi          = {10.1016/J.JKSUCI.2014.04.005},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Al-KabiAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Al-KabiKAAA15,
  author       = {Mohammed Naji Al{-}Kabi and
                  Saif A. Kazakzeh and
                  Belal Abu Ata and
                  Saif A. Ahmad Alrababah and
                  Izzat Mahmoud Alsmadi},
  title        = {A novel root based Arabic stemmer},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {94--103},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.04.001},
  doi          = {10.1016/J.JKSUCI.2014.04.001},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Al-KabiKAAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Al-NabhaniJWN15,
  author       = {Yahya Al{-}Nabhani and
                  Hamid Abdullah Jalab and
                  Ainuddin Wahid Abdul Wahab and
                  Rafidah Md Noor},
  title        = {Robust watermarking algorithm for digital images using discrete wavelet
                  and probabilistic neural network},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {393--401},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.02.002},
  doi          = {10.1016/J.JKSUCI.2015.02.002},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/Al-NabhaniJWN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Al-TahrawiA15,
  author       = {Mayy M. Al{-}Tahrawi and
                  Sumaya N. Al{-}Khatib},
  title        = {Arabic text classification using Polynomial Networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {437--449},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.02.003},
  doi          = {10.1016/J.JKSUCI.2015.02.003},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Al-TahrawiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Aljazzaf15,
  author       = {Zainab M. Aljazzaf},
  title        = {Bootstrapping quality of Web Services},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {323--333},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.12.003},
  doi          = {10.1016/J.JKSUCI.2014.12.003},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Aljazzaf15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AlshammariZ15,
  author       = {Riyad Alshammari and
                  Nur Zincir{-}Heywood},
  title        = {Identification of VoIP encrypted traffic using a machine learning
                  approach},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {77--92},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.013},
  doi          = {10.1016/J.JKSUCI.2014.03.013},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/AlshammariZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AlsmadiA15,
  author       = {Izzat Alsmadi and
                  Ikdam Alhami},
  title        = {Clustering and classification of email contents},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {46--57},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.014},
  doi          = {10.1016/J.JKSUCI.2014.03.014},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/AlsmadiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AlsmadiZ15,
  author       = {Izzat Alsmadi and
                  Mohammad Zarour},
  title        = {Building an Islamic financial information system based on policy managements},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {364--375},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.11.001},
  doi          = {10.1016/J.JKSUCI.2014.11.001},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/AlsmadiZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AlzahraniSP15,
  author       = {Salha M. Alzahrani and
                  Naomie Salim and
                  Vasile Palade},
  title        = {Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based
                  similarity model},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {248--268},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.12.001},
  doi          = {10.1016/J.JKSUCI.2014.12.001},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/AlzahraniSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AmmarB15,
  author       = {Boulbaba Ben Ammar and
                  Mohamed Tahar Bhiri},
  title        = {Pattern-based model refactoring for the introduction association relationship},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {170--180},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.06.012},
  doi          = {10.1016/J.JKSUCI.2014.06.012},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/AmmarB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AtaA15,
  author       = {Belal Abu Ata and
                  Asma Al{-}Omari},
  title        = {A rule-based stemmer for Arabic Gulf dialect},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {104--112},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.04.003},
  doi          = {10.1016/J.JKSUCI.2014.04.003},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/AtaA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/DasG15,
  author       = {Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {A robust anonymous biometric-based remote user authentication scheme
                  using smart cards},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {193--210},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.020},
  doi          = {10.1016/J.JKSUCI.2014.03.020},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/DasG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/ElakloukZS15,
  author       = {Ahmed Mohammed Elaklouk and
                  Nor Azan Mat Zin and
                  Azrulhizam Shapi'i},
  title        = {Investigating therapists' intention to use serious games for acquired
                  brain injury cognitive rehabilitation},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {160--169},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.019},
  doi          = {10.1016/J.JKSUCI.2014.03.019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/ElakloukZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Fletcher015,
  author       = {Sam Fletcher and
                  Md Zahidul Islam},
  title        = {An anonymization technique using intersected decision trees},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {297--304},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.06.015},
  doi          = {10.1016/J.JKSUCI.2014.06.015},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Fletcher015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/GargS15,
  author       = {Anil Garg and
                  O. P. Sahu},
  title        = {Cuckoo search based optimal mask generation for noise suppression
                  and enhancement of speech signal},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {269--277},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.04.006},
  doi          = {10.1016/J.JKSUCI.2014.04.006},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/GargS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/HabibRS15,
  author       = {Zulfiqar Habib and
                  Ghulam Rasool and
                  Manabu Sakai},
  title        = {Admissible curvature continuous areas for fair curves using {G2} Hermite
                  {PH} quintic polynomial},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {140--146},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.016},
  doi          = {10.1016/J.JKSUCI.2014.03.016},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/HabibRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Hamed15,
  author       = {Raed I. Hamed},
  title        = {Esophageal cancer prediction based on qualitative features using adaptive
                  fuzzy reasoning method},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {129--139},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.06.013},
  doi          = {10.1016/J.JKSUCI.2014.06.013},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Hamed15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamB15,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Cryptanalysis and improvement of a password-based user authentication
                  scheme for the integrated {EPR} information system},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {211--221},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.018},
  doi          = {10.1016/J.JKSUCI.2014.03.018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/JaggiS15,
  author       = {Parmeet Kaur Jaggi and
                  Awadhesh Kumar Singh},
  title        = {Rollback recovery with low overhead for fault tolerance in mobile
                  ad hoc networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {402--415},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.022},
  doi          = {10.1016/J.JKSUCI.2014.03.022},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/JaggiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/JenaMM15,
  author       = {Pradyot Ranjan Jena and
                  Ritanjali Majhi and
                  Babita Majhi},
  title        = {Development and performance evaluation of a novel knowledge guided
                  artificial neural network {(KGANN)} model for exchange rate prediction},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {450--457},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.01.002},
  doi          = {10.1016/J.JKSUCI.2015.01.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/JenaMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/KaurP015,
  author       = {Ranjit Kaur and
                  Manjeet Singh Patterh and
                  J. S. Dhillon},
  title        = {A new greedy search method for the design of digital {IIR} filter},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {278--287},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.021},
  doi          = {10.1016/J.JKSUCI.2014.03.021},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/KaurP015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Kumar015,
  author       = {G. Suresh Kumar and
                  G. Zayaraz},
  title        = {Concept relation extraction using Na{\"{\i}}ve Bayes classifier
                  for ontology-based question answering systems},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {13--24},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.001},
  doi          = {10.1016/J.JKSUCI.2014.03.001},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Kumar015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Kurdi15,
  author       = {Heba A. Kurdi},
  title        = {HonestPeer: An enhanced EigenTrust algorithm for reputation management
                  in {P2P} systems},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {315--322},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.10.002},
  doi          = {10.1016/J.JKSUCI.2014.10.002},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/Kurdi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/LaskarAM15,
  author       = {Baddrud Z. Laskar and
                  Ashutosh and
                  Swanirbhar Majumder},
  title        = {Artificial Neural Networks and Gene Expression Programing based age
                  estimation using facial features},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {458--467},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.06.017},
  doi          = {10.1016/J.JKSUCI.2014.06.017},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/LaskarAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Muhanna15,
  author       = {Muhanna A. Muhanna},
  title        = {Virtual reality and the {CAVE:} Taxonomy, interaction challenges and
                  research directions},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {344--361},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.023},
  doi          = {10.1016/J.JKSUCI.2014.03.023},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/Muhanna15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/MuthumanickamI15,
  author       = {K. Muthumanickam and
                  E. Ilavarasan},
  title        = {Optimization of rootkit revealing system resources - {A} game theoretic
                  approach},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {386--392},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.10.004},
  doi          = {10.1016/J.JKSUCI.2014.10.004},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/MuthumanickamI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/NaimiAM15,
  author       = {Hilal Naimi and
                  Amel Baha Houda Adamou{-}Mitiche and
                  Lahc{\`{e}}ne Mitiche},
  title        = {Medical image denoising using dual tree complex thresholding wavelet
                  transform and Wiener filter},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {40--45},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.015},
  doi          = {10.1016/J.JKSUCI.2014.03.015},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/NaimiAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/NematollahiAZ15,
  author       = {Mohammad Ali Nematollahi and
                  S. A. R. Al{-}Haddad and
                  Faraneh Zarafshan},
  title        = {Blind digital speech watermarking based on Eigen-value quantization
                  in {DWT}},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {58--67},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.012},
  doi          = {10.1016/J.JKSUCI.2014.03.012},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/NematollahiAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Rahman0B15,
  author       = {Md Anisur Rahman and
                  Md Zahidul Islam and
                  Terry Bossomaier},
  title        = {ModEx and Seed-Detective: Two novel techniques for high quality clustering
                  by using good initial seeds in K-Means},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {113--128},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.04.002},
  doi          = {10.1016/J.JKSUCI.2014.04.002},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Rahman0B15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Rathore15,
  author       = {M. Mazhar Rathore},
  title        = {Threshold-based generic scheme for encrypted and tunneled Voice Flows
                  Detection over {IP} Networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {305--314},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.06.016},
  doi          = {10.1016/J.JKSUCI.2014.06.016},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Rathore15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Rikli15,
  author       = {Nasser{-}Eddine Rikli},
  title        = {Message from the Editor},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {93},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.05.001},
  doi          = {10.1016/J.JKSUCI.2015.05.001},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Rikli15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Rikli15a,
  author       = {Nasser{-}Eddine Rikli},
  title        = {Message from the Editor},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {237},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.08.001},
  doi          = {10.1016/J.JKSUCI.2015.08.001},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Rikli15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/Rikli15b,
  author       = {Nasser{-}Eddine Rikli},
  title        = {Message from the Editor},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {363},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2015.10.003},
  doi          = {10.1016/J.JKSUCI.2015.10.003},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/Rikli15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SabetiKR15,
  author       = {Malihe Sabeti and
                  Seraj D. Katebi and
                  K. Rastgar},
  title        = {Source localization algorithms to find attention and memory circuits
                  in the brain},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {334--343},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.12.002},
  doi          = {10.1016/J.JKSUCI.2014.12.002},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/SabetiKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SahaKMG15,
  author       = {Suman Kumar Saha and
                  Rajib Kar and
                  Durbadal Mandal and
                  S. P. Ghoshal},
  title        = {Optimal {IIR} filter design using Gravitational Search Algorithm with
                  Wavelet Mutation},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {25--39},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.002},
  doi          = {10.1016/J.JKSUCI.2014.03.002},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/SahaKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SaleenaS15,
  author       = {B. Saleena and
                  S. K. Srivatsa},
  title        = {Using concept similarity in cross ontology for adaptive e-Learning
                  systems},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {1--12},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.007},
  doi          = {10.1016/J.JKSUCI.2014.03.007},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/SaleenaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SarafraziNS15,
  author       = {Soroor Sarafrazi and
                  Hossein Nezamabadi{-}pour and
                  Saeid Reza Seydnejad},
  title        = {A novel hybrid algorithm of {GSA} with Kepler algorithm for numerical
                  optimization},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {3},
  pages        = {288--296},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.10.003},
  doi          = {10.1016/J.JKSUCI.2014.10.003},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/SarafraziNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SarrayrihS15,
  author       = {Mohammad A. Sarrayrih and
                  B. Sriram},
  title        = {Major challenges in developing a successful e-government: {A} review
                  on the Sultanate of Oman},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {230--235},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.04.004},
  doi          = {10.1016/J.JKSUCI.2014.04.004},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/SarrayrihS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SharmaS15,
  author       = {Sunil Sharma and
                  O. P. Sahu},
  title        = {A low complexity based spectrum management algorithm for 'Near-Far'
                  problem in {VDSL} environment},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {430--436},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.12.005},
  doi          = {10.1016/J.JKSUCI.2014.12.005},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/SharmaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/ShohiebER15,
  author       = {Samaa M. Shohieb and
                  Hamdy K. Elminir and
                  Alaa Mohamed Riad},
  title        = {SignsWorld Atlas; a benchmark Arabic Sign Language database},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {1},
  pages        = {68--76},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.011},
  doi          = {10.1016/J.JKSUCI.2014.03.011},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/ShohiebER15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SinghJ15,
  author       = {Mrityunjay Singh and
                  S. K. Jain},
  title        = {Transformation rules for decomposing heterogeneous data into triples},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {181--192},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.017},
  doi          = {10.1016/J.JKSUCI.2014.03.017},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/SinghJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/YarlagaddaMP15,
  author       = {Anuradha Yarlagadda and
                  J. V. R. Murthy and
                  Munaga H. M. Krishna Prasad},
  title        = {A novel method for human age group classification based on Correlation
                  Fractal Dimension of facial edges},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {4},
  pages        = {468--476},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.10.005},
  doi          = {10.1016/J.JKSUCI.2014.10.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/YarlagaddaMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics