default search action
Journal of King Saud University - Computer and Information Sciences, Volume 29
Volume 29, Number 1, January 2017
- Nasser-Eddine Rikli:
Message from the Editor. 1 - Souad Larabi Marie-Sainte:
Detection and visualization of non-linear structures in large datasets using Exploratory Projection Pursuit Laboratory (EPP-Lab) software. 2-18 - Aarti Singh, Dimple Juneja, Manisha Malhotra:
A novel agent based autonomous and service composition framework for cost optimization of resource provisioning in cloud computing. 19-28 - Abdelhak Boukharouba:
A new algorithm for skew correction and baseline detection based on the randomized Hough Transform. 29-38 - Abdullah Al-Hasanat, Abdelwadood Mesleh, Monther Krishan, Ahmed Sharadqh, Aws Al-Qaisi, Wai Lok Woo, Satnam Singh Dlay:
Blind separation of multicomponent seismic wavefield using SVD of reduced dimension spectral matrix. 39-53 - Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay:
An enhanced dynamic ID-based authentication scheme for telecare medical information systems. 54-62 - SK Hafizul Islam, G. P. Biswas:
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. 63-73 - Pawan Singh, Berhane Wolde-Gabriel:
Executed-time Round Robin: EtRR an online non-clairvoyant scheduling on speed bounded processor with energy management. 74-84 - D. C. Kiran, S. Gurunarayanan, Janardan Prasad Misra, Munish Bhatia:
Register allocation for fine grain threads on multicore processor. 85-92 - Rinkaj Goyal, Pravin Chandra, Yogesh Singh:
Fuzzy inferencing to identify degree of interaction in the development of fault prediction models. 93-102 - Salman Ali AlQahtani:
Users' classification-based call admission control with adaptive resource reservation for LTE-A networks. 103-115 - Deepika Saini, Sanjeev Kumar, Tilak Raj Gulati:
NURBS-based geometric inverse reconstruction of free-form shapes. 116-133 - B. Venkata Seshu Kumari, Ramisetty Rajeshwara Rao:
Telugu dependency parsing using different statistical parsers. 134-140
Volume 29, Number 2, April 2017
- Vito Pirrelli, Arsalane Zarghili:
Arabic Natural Language Processing: Models, systems and applications. 1- - Mohamed Boudchiche, Azzeddine Mazroui, Mohamed Ould Abdallahi Ould Bebah, Abdelhak Lakhouaja, Abderrahim Boudlal:
AlKhalil Morpho Sys 2: A robust Arabic morpho-syntactic analyzer. 141-146 - Inès Zribi, Mariem Ellouze, Lamia Hadrich Belguith, Philippe Blache:
Morphological disambiguation of Tunisian dialect. 147-155 - Amine Chennoufi, Azzeddine Mazroui:
Morphological, syntactic and diacritics rules for automatic diacritization of Arabic sentences. 156-163 - Younes Jaafar, Driss Namly, Karim Bouzoubaa, Abdellah Yousfi:
Enhancing Arabic stemming process using resources and benchmarking tools. 164-170 - Imad Zeroual, Abdelhak Lakhouaja, Rachid Belahbib:
Towards a standard Part of Speech tagset for the Arabic language. 171-178 - Claudia Marzi, Marcello Ferro, Ouafae Nahli:
Arabic word processing and morphology induction through adaptive memory self-organisation strategies. 179-188 - Fawaz S. Al-Anzi, Dia AbuZeina:
Toward an enhanced Arabic text classification using cosine similarity and Latent Semantic Indexing. 189-195 - Issam Sahmoudi, Abdelmonaime Lachkar:
Formal Concept Analysis for Arabic Web Search Results Clustering. 196-203 - Viviana Cotik, Horacio Rodríguez, Jorge Vivaldi:
Arabic medical entity tagging using distant learning in a Multilingual Framework. 204-211 - Imen Bouaziz Mezghanni, Faïez Gargouri:
Deriving ontological semantic relations between Arabic compound nouns concepts. 212-228 - Samir Tartir, Ibrahim Abdul-Nabi:
Semantic Sentiment Analysis in Arabic Social Media. 229-233
Volume 29, Number 3, July 2017
- Nasser-Eddine Rikli:
Message from the Editor. 235 - Syed Afsar Shah, Babar Nazir, Imran Ali Khan:
Congestion control algorithms in wireless sensor networks: Trends and opportunities. 236-245 - Poonam Jindal, Brahmjit Singh:
Quantitative analysis of the security performance in wireless LANs. 246-268 - Malik N. Ahmed, Abdul Hanan Abdullah, Hassan Chizari, Omprakash Kaiwartya:
F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs. 269-280 - Pradeep Deshmukh:
Design of cloud security in the EHR for Indian healthcare services. 281-287 - Abdulmawla Najih, S. A. R. Al-Haddad, Abd. Rahman bin Ramli, Shaiful J. Hashim, Mohammad Ali Nematollahi:
Digital image watermarking based on angle quantization in discrete contourlet transform. 288-294 - Umer Farooq, M. Faisal Aslam:
Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA. 295-302 - Punugu Vasudeva Reddy, P. V. S. S. N. Gopal:
Identity-based key-insulated aggregate signature scheme. 303-310 - SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, Saru Kumari:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. 311-324 - Saoussen Rekhis, Nadia Bouassida, Rafik Bouaziz, Claude Duvallet, Bruno Sadeg:
A new method for constructing and reusing domain specific design patterns: Application to RT domain. 325-348 - Amarjeet, Jitender Kumar Chhabra:
Improving package structure of object-oriented software using multi-objective optimization and weighted class connections. 349-364 - Ahmad M. Manasrah, Tariq Smadi, Ammar Almomani:
A Variable Service Broker Routing Policy for data center selection in cloud analyst. 365-377 - Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh:
A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks. 378-398 - M. Abdel-Salam Nasr, Mohammed F. Alrahmawy, Ahmad S. Tolba:
Multi-scale structural similarity index for motion detection. 399-409 - Mansi Jhamb, R. K. Sharma, A. K. Gupta:
A high level implementation and performance evaluation of level-I asynchronous cache on FPGA. 410-425
Volume 29, Number 4, October 2017
- Nasser-Eddine Rikli:
Message from the Editor. 427 - Avinash More, Vijay T. Raisinghani:
A survey on energy efficient coverage protocols in wireless sensor networks. 428-448 - Sabeen Tahir, Sheikh Tahir Bakhsh, Abdulrahman H. Altalhi:
An Efficient Route Maintenance Protocol for Dynamic Bluetooth Networks. 449-461 - Sumaiya Thaseen Ikram, Cherukuri Aswani Kumar:
Intrusion detection model using fusion of chi-square feature selection and multi class SVM. 462-472 - Sudip Roy, Sourav Banerjee, K. R. Chowdhury, Utpal Biswas:
Development and analysis of a three phase cloudlet allocation algorithm. 473-483 - Iyad Abu Doush, Sahar Al-Btoush:
Currency recognition using a smartphone: Comparison between color SIFT and gray scale SIFT algorithms. 484-492 - Khadidja Kaibiche, Slami Saadi, Djamel Chikouche, Zoubida Messali:
Restoration of stained old manuscripts via a hybrid wavelet and bilateral filtering system. 493-498 - Bhaskar Mondal, Tarni Mandal:
A light weight secure image encryption scheme based on chaos & DNA computing. 499-504 - Shalini Bhartiya, Deepti Mehrotra, Anup Girdhar:
Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment. 505-519 - Abdullah Talha Kabakus, Resul Kara:
A performance evaluation of in-memory databases. 520-525 - Waleed Mugahed Al-Rahmi, Akram M. Zeki:
A model of using social media for collaborative learning to enhance learners' performance on learning. 526-535 - Ajit Kumar Rout, P. K. Dash, Rajashree Dash, Ranjeeta Bisoi:
Forecasting financial time series using a low complexity recurrent neural network and evolutionary learning approach. 536-552 - Murad Ali, Raja Ahmad Iskandar Bin Raja Yaacob, Mohd Nuri Al-Amin Bin Endut, Naseeb Ullah Langove:
Strengthening the academic usage of social media: An exploratory study. 553-561
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.