Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jksucis/jksucis27.bht:"
@article{DBLP:journals/jksucis/Abdel-jaber15, author = {Hussein Abdel{-}jaber}, title = {Performance study of Active Queue Management methods: Adaptive GRED, REDD, and GRED-Linear analytical model}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {416--429}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.01.003}, doi = {10.1016/J.JKSUCI.2015.01.003}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Abdel-jaber15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AbualkishikOO15, author = {Abdallah M. Abualkishik and Khairuddin Omar and Ghadeer A. Odiebat}, title = {{QEFSM} model and Markov Algorithm for translating Quran reciting rules into Braille code}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {238--247}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.01.001}, doi = {10.1016/J.JKSUCI.2015.01.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/AbualkishikOO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-AdrousyAH15, author = {Waleed M. Al{-}Adrousy and Hesham A. Ali and Taher T. Hamza}, title = {A recommender system for team formation in {MANET}}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {147--159}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.06.014}, doi = {10.1016/J.JKSUCI.2014.06.014}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Al-AdrousyAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-Azzoni15, author = {Issam Al{-}Azzoni}, title = {Server consolidation for heterogeneous computer clusters using Colored Petri Nets and {CPN} Tools}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {376--385}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.02.001}, doi = {10.1016/J.JKSUCI.2015.02.001}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Al-Azzoni15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-KabiAW15, author = {Mohammed Naji Al{-}Kabi and Izzat Mahmoud Alsmadi and Heider A. Wahsheh}, title = {Evaluation of Spam Impact on Arabic Websites Popularity}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {222--229}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.04.005}, doi = {10.1016/J.JKSUCI.2014.04.005}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Al-KabiAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-KabiKAAA15, author = {Mohammed Naji Al{-}Kabi and Saif A. Kazakzeh and Belal Abu Ata and Saif A. Ahmad Alrababah and Izzat Mahmoud Alsmadi}, title = {A novel root based Arabic stemmer}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {94--103}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.04.001}, doi = {10.1016/J.JKSUCI.2014.04.001}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Al-KabiKAAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-NabhaniJWN15, author = {Yahya Al{-}Nabhani and Hamid Abdullah Jalab and Ainuddin Wahid Abdul Wahab and Rafidah Md Noor}, title = {Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {393--401}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.02.002}, doi = {10.1016/J.JKSUCI.2015.02.002}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/Al-NabhaniJWN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-TahrawiA15, author = {Mayy M. Al{-}Tahrawi and Sumaya N. Al{-}Khatib}, title = {Arabic text classification using Polynomial Networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {437--449}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.02.003}, doi = {10.1016/J.JKSUCI.2015.02.003}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Al-TahrawiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Aljazzaf15, author = {Zainab M. Aljazzaf}, title = {Bootstrapping quality of Web Services}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {323--333}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.12.003}, doi = {10.1016/J.JKSUCI.2014.12.003}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Aljazzaf15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AlshammariZ15, author = {Riyad Alshammari and Nur Zincir{-}Heywood}, title = {Identification of VoIP encrypted traffic using a machine learning approach}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {77--92}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.013}, doi = {10.1016/J.JKSUCI.2014.03.013}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/AlshammariZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AlsmadiA15, author = {Izzat Alsmadi and Ikdam Alhami}, title = {Clustering and classification of email contents}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {46--57}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.014}, doi = {10.1016/J.JKSUCI.2014.03.014}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/AlsmadiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AlsmadiZ15, author = {Izzat Alsmadi and Mohammad Zarour}, title = {Building an Islamic financial information system based on policy managements}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {364--375}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.11.001}, doi = {10.1016/J.JKSUCI.2014.11.001}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/AlsmadiZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AlzahraniSP15, author = {Salha M. Alzahrani and Naomie Salim and Vasile Palade}, title = {Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {248--268}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.12.001}, doi = {10.1016/J.JKSUCI.2014.12.001}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/AlzahraniSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AmmarB15, author = {Boulbaba Ben Ammar and Mohamed Tahar Bhiri}, title = {Pattern-based model refactoring for the introduction association relationship}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {170--180}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.06.012}, doi = {10.1016/J.JKSUCI.2014.06.012}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/AmmarB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AtaA15, author = {Belal Abu Ata and Asma Al{-}Omari}, title = {A rule-based stemmer for Arabic Gulf dialect}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {104--112}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.04.003}, doi = {10.1016/J.JKSUCI.2014.04.003}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/AtaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/DasG15, author = {Ashok Kumar Das and Adrijit Goswami}, title = {A robust anonymous biometric-based remote user authentication scheme using smart cards}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {193--210}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.020}, doi = {10.1016/J.JKSUCI.2014.03.020}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/DasG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ElakloukZS15, author = {Ahmed Mohammed Elaklouk and Nor Azan Mat Zin and Azrulhizam Shapi'i}, title = {Investigating therapists' intention to use serious games for acquired brain injury cognitive rehabilitation}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {160--169}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.019}, doi = {10.1016/J.JKSUCI.2014.03.019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/ElakloukZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Fletcher015, author = {Sam Fletcher and Md Zahidul Islam}, title = {An anonymization technique using intersected decision trees}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {297--304}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.06.015}, doi = {10.1016/J.JKSUCI.2014.06.015}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Fletcher015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/GargS15, author = {Anil Garg and O. P. Sahu}, title = {Cuckoo search based optimal mask generation for noise suppression and enhancement of speech signal}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {269--277}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.04.006}, doi = {10.1016/J.JKSUCI.2014.04.006}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/GargS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/HabibRS15, author = {Zulfiqar Habib and Ghulam Rasool and Manabu Sakai}, title = {Admissible curvature continuous areas for fair curves using {G2} Hermite {PH} quintic polynomial}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {140--146}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.016}, doi = {10.1016/J.JKSUCI.2014.03.016}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/HabibRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Hamed15, author = {Raed I. Hamed}, title = {Esophageal cancer prediction based on qualitative features using adaptive fuzzy reasoning method}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {129--139}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.06.013}, doi = {10.1016/J.JKSUCI.2014.06.013}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Hamed15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamB15, author = {SK Hafizul Islam and G. P. Biswas}, title = {Cryptanalysis and improvement of a password-based user authentication scheme for the integrated {EPR} information system}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {211--221}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.018}, doi = {10.1016/J.JKSUCI.2014.03.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/IslamB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/JaggiS15, author = {Parmeet Kaur Jaggi and Awadhesh Kumar Singh}, title = {Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {402--415}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.022}, doi = {10.1016/J.JKSUCI.2014.03.022}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/JaggiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/JenaMM15, author = {Pradyot Ranjan Jena and Ritanjali Majhi and Babita Majhi}, title = {Development and performance evaluation of a novel knowledge guided artificial neural network {(KGANN)} model for exchange rate prediction}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {450--457}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.01.002}, doi = {10.1016/J.JKSUCI.2015.01.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/JenaMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/KaurP015, author = {Ranjit Kaur and Manjeet Singh Patterh and J. S. Dhillon}, title = {A new greedy search method for the design of digital {IIR} filter}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {278--287}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.021}, doi = {10.1016/J.JKSUCI.2014.03.021}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/KaurP015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Kumar015, author = {G. Suresh Kumar and G. Zayaraz}, title = {Concept relation extraction using Na{\"{\i}}ve Bayes classifier for ontology-based question answering systems}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {13--24}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.001}, doi = {10.1016/J.JKSUCI.2014.03.001}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Kumar015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Kurdi15, author = {Heba A. Kurdi}, title = {HonestPeer: An enhanced EigenTrust algorithm for reputation management in {P2P} systems}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {315--322}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.10.002}, doi = {10.1016/J.JKSUCI.2014.10.002}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/Kurdi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/LaskarAM15, author = {Baddrud Z. Laskar and Ashutosh and Swanirbhar Majumder}, title = {Artificial Neural Networks and Gene Expression Programing based age estimation using facial features}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {458--467}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.06.017}, doi = {10.1016/J.JKSUCI.2014.06.017}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/LaskarAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Muhanna15, author = {Muhanna A. Muhanna}, title = {Virtual reality and the {CAVE:} Taxonomy, interaction challenges and research directions}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {344--361}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.023}, doi = {10.1016/J.JKSUCI.2014.03.023}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/Muhanna15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/MuthumanickamI15, author = {K. Muthumanickam and E. Ilavarasan}, title = {Optimization of rootkit revealing system resources - {A} game theoretic approach}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {386--392}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.10.004}, doi = {10.1016/J.JKSUCI.2014.10.004}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/MuthumanickamI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/NaimiAM15, author = {Hilal Naimi and Amel Baha Houda Adamou{-}Mitiche and Lahc{\`{e}}ne Mitiche}, title = {Medical image denoising using dual tree complex thresholding wavelet transform and Wiener filter}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {40--45}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.015}, doi = {10.1016/J.JKSUCI.2014.03.015}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/NaimiAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/NematollahiAZ15, author = {Mohammad Ali Nematollahi and S. A. R. Al{-}Haddad and Faraneh Zarafshan}, title = {Blind digital speech watermarking based on Eigen-value quantization in {DWT}}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {58--67}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.012}, doi = {10.1016/J.JKSUCI.2014.03.012}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/NematollahiAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Rahman0B15, author = {Md Anisur Rahman and Md Zahidul Islam and Terry Bossomaier}, title = {ModEx and Seed-Detective: Two novel techniques for high quality clustering by using good initial seeds in K-Means}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {113--128}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.04.002}, doi = {10.1016/J.JKSUCI.2014.04.002}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Rahman0B15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Rathore15, author = {M. Mazhar Rathore}, title = {Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over {IP} Networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {305--314}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.06.016}, doi = {10.1016/J.JKSUCI.2014.06.016}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Rathore15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Rikli15, author = {Nasser{-}Eddine Rikli}, title = {Message from the Editor}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {93}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.05.001}, doi = {10.1016/J.JKSUCI.2015.05.001}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Rikli15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Rikli15a, author = {Nasser{-}Eddine Rikli}, title = {Message from the Editor}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {237}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.08.001}, doi = {10.1016/J.JKSUCI.2015.08.001}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Rikli15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Rikli15b, author = {Nasser{-}Eddine Rikli}, title = {Message from the Editor}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {363}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2015.10.003}, doi = {10.1016/J.JKSUCI.2015.10.003}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Rikli15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SabetiKR15, author = {Malihe Sabeti and Seraj D. Katebi and K. Rastgar}, title = {Source localization algorithms to find attention and memory circuits in the brain}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {334--343}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.12.002}, doi = {10.1016/J.JKSUCI.2014.12.002}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/SabetiKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SahaKMG15, author = {Suman Kumar Saha and Rajib Kar and Durbadal Mandal and S. P. Ghoshal}, title = {Optimal {IIR} filter design using Gravitational Search Algorithm with Wavelet Mutation}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {25--39}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.002}, doi = {10.1016/J.JKSUCI.2014.03.002}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/SahaKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SaleenaS15, author = {B. Saleena and S. K. Srivatsa}, title = {Using concept similarity in cross ontology for adaptive e-Learning systems}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {1--12}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.007}, doi = {10.1016/J.JKSUCI.2014.03.007}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/SaleenaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SarafraziNS15, author = {Soroor Sarafrazi and Hossein Nezamabadi{-}pour and Saeid Reza Seydnejad}, title = {A novel hybrid algorithm of {GSA} with Kepler algorithm for numerical optimization}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {3}, pages = {288--296}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.10.003}, doi = {10.1016/J.JKSUCI.2014.10.003}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/SarafraziNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SarrayrihS15, author = {Mohammad A. Sarrayrih and B. Sriram}, title = {Major challenges in developing a successful e-government: {A} review on the Sultanate of Oman}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {230--235}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.04.004}, doi = {10.1016/J.JKSUCI.2014.04.004}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/SarrayrihS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SharmaS15, author = {Sunil Sharma and O. P. Sahu}, title = {A low complexity based spectrum management algorithm for 'Near-Far' problem in {VDSL} environment}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {430--436}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.12.005}, doi = {10.1016/J.JKSUCI.2014.12.005}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/SharmaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ShohiebER15, author = {Samaa M. Shohieb and Hamdy K. Elminir and Alaa Mohamed Riad}, title = {SignsWorld Atlas; a benchmark Arabic Sign Language database}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {1}, pages = {68--76}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.011}, doi = {10.1016/J.JKSUCI.2014.03.011}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/ShohiebER15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SinghJ15, author = {Mrityunjay Singh and S. K. Jain}, title = {Transformation rules for decomposing heterogeneous data into triples}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {181--192}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.017}, doi = {10.1016/J.JKSUCI.2014.03.017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/SinghJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/YarlagaddaMP15, author = {Anuradha Yarlagadda and J. V. R. Murthy and Munaga H. M. Krishna Prasad}, title = {A novel method for human age group classification based on Correlation Fractal Dimension of facial edges}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {4}, pages = {468--476}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.10.005}, doi = {10.1016/J.JKSUCI.2014.10.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/YarlagaddaMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.