default search action
Journal of King Saud University - Computer and Information Sciences, Volume 30
Volume 30, Number 1, January 2018
- Nasser-Eddine Rikli:
Message from the Editor. 1
- Arvinder Kaur, Inderpreet Kaur:
An empirical evaluation of classification algorithms for fault prediction in open source projects. 2-17 - Prasant Kumar Pattnaik, Jay Sarraf:
Brain Computer Interface issues on hand movement. 18-24
- Arash Chaghari, Mohammad-Reza Feizi-Derakhshi, Mohammad Ali Balafar:
Fuzzy clustering based on Forest optimization algorithm. 25-32 - Zouhir Wakaf, Hamid Abdullah Jalab:
Defect detection based on extreme edge of defective region histogram. 33-40 - Manoj Kumar, Manoj Diwakar:
CT image denoising using locally adaptive shrinkage rule in tetrolet domain. 41-50 - Ahmed Khoumsi, Mohammed Erradi, Wadie Krombi:
A formal basis for the design and analysis of firewall security policies. 51-66 - S. Zeeshan Hussain, Naeem Ahmad:
Minimizing Broadcast Expenses in Clustered Ad-hoc Networks. 67-79 - Mohamed Khalid Yousif, Adnan Shaout:
Fuzzy logic computational model for performance evaluation of Sudanese Universities and academic staff. 80-119 - Bighnaraj Naik, Janmenjoy Nayak, Himansu Sekhar Behera:
A TLBO based gradient descent learning-functional link higher order ANN: An efficient model for learning from non-linear data. 120-139
Volume 30, Number 2, April 2018
- Bensenane Hamdan, Keche Mokhtar:
Face recognition using Angular Radial Transform. 141-151
- Suvendu Chandan Nayak, Chitaranjan Tripathy:
Deadline sensitive lease scheduling in cloud computing environment using AHP. 152-163 - Amr S. Abdelfattah, Tamer Abdelkader, El-Sayed M. El-Horbaty:
RSAM: An enhanced architecture for achieving web services reliability in mobile cloud computing. 164-174 - Yogesh R. Kulkarni, T. Senthil Murugan:
C-mixture and multi-constraints based genetic algorithm for collaborative data publishing. 175-184 - Olugbenga Oluseun Oluwagbemi, Folakemi Oluwagbemi, Olatunji Fagbore:
Malavefes: A computational voice-enabled malaria fuzzy informatics software for correct dosage prescription of anti-malarial drugs. 185-197 - Köksal Gündogdu, Sumeyye Bayrakdar, Ibrahim Yücedag:
Developing and modeling of voice control system for prosthetic robot arm in medical systems. 198-205 - Neha Gulati, Atul Garg:
A Secured Cognitive Agent based Multi-strategic Intelligent Search System. 206-222 - Gour Sundar Mitra Thakur, Rupak Bhattacharyya, Seema Sarkar Mondal:
Stock portfolio selection using Dempster-Shafer evidence theory. 223-235 - Reem Ahmed Alotaibi, Lamiaa A. Elrefaei:
Improved capacity Arabic text watermarking methods based on open word space. 236-248 - Srinivas Bachu, K. Manjunathachari:
Adaptive order search and tangent-weighted trade-off for motion estimation in H.264. 249-258 - Mohamed Elshrkawey, Samiha M. Elsherif, M. Elsayed Wahed:
An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks. 259-267 - Abid Ismail, K. S. Kuppusamy:
Accessibility of Indian universities' homepages: An exploratory study. 268-278 - Ahmed Al-Hunaiyyan, Rana A. Alhajri, Salah Al-Sharhan:
Perceptions and challenges of mobile learning in Kuwait. 279-289
Volume 30, Number 3, July 2018
- Partha Pratim Ray:
A survey on Internet of Things architectures. 291-319 - Hanane Lamaazi, Nabil Benamar, Antonio J. Jara:
RPL-based networks in static and mobile environment: A performance assessment analysis. 320-333 - Sasmita Acharya, Chita Ranjan Tripathy:
An ANFIS estimator based data aggregation scheme for fault tolerant Wireless Sensor Networks. 334-348 - Ziad Dawahdeh, Shahrul Nizam Yaakob, Rozmie Razif Othman:
A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher. 349-355 - Valli Kumari Vatsavayi, Hari Kishan Kondaveeti:
Efficient ISAR image classification using MECSM representation. 356-372 - Mutasem K. Alsmadi:
Query-sensitive similarity measure for content-based image retrieval using meta-heuristic algorithm. 373-381 - Rahima Bentrcia, Samir Zidat, Farhi Marir:
Extracting semantic relations from the Quranic Arabic based on Arabic conjunctive patterns. 382-390 - Natarajan Meghanathan:
δ-Space for real-world networks: A correlation analysis of decay centrality vs. degree centrality and closeness centrality. 391-403 - Mahesh Balaji, Ch. Aswani Kumar, G. Subrahmanya V. R. K. Rao:
Predictive Cloud resource management framework for enterprise workloads. 404-415 - Oumaima Sliti, Habib Hamam, Hamid Amiri:
CLBP for scale and orientation adaptive mean shift tracking. 416-429
Volume 30, Number 4, October 2018
- Ahmed Oussous, Fatima-Zahra Benjelloun, Ayoub Ait Lahcen, Samir Belfkih:
Big Data technologies: A survey. 431-448
- Rakoth Kandan Sambandam, Sasikala Jayaraman:
Self-adaptive dragonfly based optimal thresholding for multilevel segmentation of digital images. 449-461 - Mohammed Ismail. B, B. Eswara Reddy, T. Bhaskara Reddy:
Cuckoo inspired fast search algorithm for fractal image encoding. 462-469 - Nada B. Ibrahim, Mazen Mohamed Selim, Hala Helmy Zayed:
An Automatic Arabic Sign Language Recognition System (ArSLRS). 470-477 - Hela Marouane, Claude Duvallet, Achraf Makni, Rafik Bouaziz, Bruno Sadeg:
An UML profile for representing real-time design patterns. 478-497 - Jagannath E. Nalavade, T. Senthil Murugan:
HRNeuro-fuzzy: Adapting neuro-fuzzy classifier for recurring concept drift of evolving data streams using rough set theory and holoentropy. 498-509 - Y. Jayababu, G. P. Saradhi Varma, A. Govardhan:
Incremental topological spatial association rule mining and clustering from geographical datasets using probabilistic approach. 510-523 - Somya Upadhyay, Chetana Sharma, Pravishti Sharma, Prachi Bharadwaj, K. R. Seeja:
Privacy preserving data mining with 3-D rotation transformation. 524-530 - Issam W. Damaj, Mahmoud Imdoukh, Rached N. Zantout:
Parallel hardware for faster morphological analysis. 531-546 - P. K. Haleema, N. Ch. S. N. Iyengar:
A mathematical model with flexible negotiation strategies for agent based negotiations in dynamic e-commerce environments. 547-560
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.