default search action
Journal of King Saud University - Computer and Information Sciences, Volume 27
Volume 27, Number 1, January 2015
- B. Saleena, S. K. Srivatsa:
Using concept similarity in cross ontology for adaptive e-Learning systems. 1-12 - G. Suresh Kumar, G. Zayaraz:
Concept relation extraction using Naïve Bayes classifier for ontology-based question answering systems. 13-24 - Suman Kumar Saha, Rajib Kar, Durbadal Mandal, S. P. Ghoshal:
Optimal IIR filter design using Gravitational Search Algorithm with Wavelet Mutation. 25-39 - Hilal Naimi, Amel Baha Houda Adamou-Mitiche, Lahcène Mitiche:
Medical image denoising using dual tree complex thresholding wavelet transform and Wiener filter. 40-45 - Izzat Alsmadi, Ikdam Alhami:
Clustering and classification of email contents. 46-57 - Mohammad Ali Nematollahi, S. A. R. Al-Haddad, Faraneh Zarafshan:
Blind digital speech watermarking based on Eigen-value quantization in DWT. 58-67 - Samaa M. Shohieb, Hamdy K. Elminir, Alaa Mohamed Riad:
SignsWorld Atlas; a benchmark Arabic Sign Language database. 68-76 - Riyad Alshammari, Nur Zincir-Heywood:
Identification of VoIP encrypted traffic using a machine learning approach. 77-92
Volume 27, Number 2, April 2015
- Nasser-Eddine Rikli:
Message from the Editor. 93 - Mohammed Naji Al-Kabi, Saif A. Kazakzeh, Belal Abu Ata, Saif A. Ahmad Alrababah, Izzat Mahmoud Alsmadi:
A novel root based Arabic stemmer. 94-103 - Belal Abu Ata, Asma Al-Omari:
A rule-based stemmer for Arabic Gulf dialect. 104-112 - Md Anisur Rahman, Md Zahidul Islam, Terry Bossomaier:
ModEx and Seed-Detective: Two novel techniques for high quality clustering by using good initial seeds in K-Means. 113-128 - Raed I. Hamed:
Esophageal cancer prediction based on qualitative features using adaptive fuzzy reasoning method. 129-139 - Zulfiqar Habib, Ghulam Rasool, Manabu Sakai:
Admissible curvature continuous areas for fair curves using G2 Hermite PH quintic polynomial. 140-146 - Waleed M. Al-Adrousy, Hesham A. Ali, Taher T. Hamza:
A recommender system for team formation in MANET. 147-159 - Ahmed Mohammed Elaklouk, Nor Azan Mat Zin, Azrulhizam Shapi'i:
Investigating therapists' intention to use serious games for acquired brain injury cognitive rehabilitation. 160-169 - Boulbaba Ben Ammar, Mohamed Tahar Bhiri:
Pattern-based model refactoring for the introduction association relationship. 170-180 - Mrityunjay Singh, S. K. Jain:
Transformation rules for decomposing heterogeneous data into triples. 181-192 - Ashok Kumar Das, Adrijit Goswami:
A robust anonymous biometric-based remote user authentication scheme using smart cards. 193-210 - SK Hafizul Islam, G. P. Biswas:
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system. 211-221 - Mohammed Naji Al-Kabi, Izzat Mahmoud Alsmadi, Heider A. Wahsheh:
Evaluation of Spam Impact on Arabic Websites Popularity. 222-229 - Mohammad A. Sarrayrih, B. Sriram:
Major challenges in developing a successful e-government: A review on the Sultanate of Oman. 230-235
Volume 27, Number 3, July 2015
- Nasser-Eddine Rikli:
Message from the Editor. 237 - Abdallah M. Abualkishik, Khairuddin Omar, Ghadeer A. Odiebat:
QEFSM model and Markov Algorithm for translating Quran reciting rules into Braille code. 238-247 - Salha M. Alzahrani, Naomie Salim, Vasile Palade:
Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model. 248-268 - Anil Garg, O. P. Sahu:
Cuckoo search based optimal mask generation for noise suppression and enhancement of speech signal. 269-277 - Ranjit Kaur, Manjeet Singh Patterh, J. S. Dhillon:
A new greedy search method for the design of digital IIR filter. 278-287 - Soroor Sarafrazi, Hossein Nezamabadi-pour, Saeid Reza Seydnejad:
A novel hybrid algorithm of GSA with Kepler algorithm for numerical optimization. 288-296 - Sam Fletcher, Md Zahidul Islam:
An anonymization technique using intersected decision trees. 297-304 - M. Mazhar Rathore:
Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks. 305-314 - Heba A. Kurdi:
HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems. 315-322 - Zainab M. Aljazzaf:
Bootstrapping quality of Web Services. 323-333 - Malihe Sabeti, Seraj D. Katebi, K. Rastgar:
Source localization algorithms to find attention and memory circuits in the brain. 334-343 - Muhanna A. Muhanna:
Virtual reality and the CAVE: Taxonomy, interaction challenges and research directions. 344-361
Volume 27, Number 4, October 2015
- Nasser-Eddine Rikli:
Message from the Editor. 363 - Izzat Alsmadi, Mohammad Zarour:
Building an Islamic financial information system based on policy managements. 364-375 - Issam Al-Azzoni:
Server consolidation for heterogeneous computer clusters using Colored Petri Nets and CPN Tools. 376-385 - K. Muthumanickam, E. Ilavarasan:
Optimization of rootkit revealing system resources - A game theoretic approach. 386-392 - Yahya Al-Nabhani, Hamid Abdullah Jalab, Ainuddin Wahid Abdul Wahab, Rafidah Md Noor:
Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. 393-401 - Parmeet Kaur Jaggi, Awadhesh Kumar Singh:
Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks. 402-415 - Hussein Abdel-jaber:
Performance study of Active Queue Management methods: Adaptive GRED, REDD, and GRED-Linear analytical model. 416-429 - Sunil Sharma, O. P. Sahu:
A low complexity based spectrum management algorithm for 'Near-Far' problem in VDSL environment. 430-436 - Mayy M. Al-Tahrawi, Sumaya N. Al-Khatib:
Arabic text classification using Polynomial Networks. 437-449 - Pradyot Ranjan Jena, Ritanjali Majhi, Babita Majhi:
Development and performance evaluation of a novel knowledge guided artificial neural network (KGANN) model for exchange rate prediction. 450-457 - Baddrud Z. Laskar, Ashutosh, Swanirbhar Majumder:
Artificial Neural Networks and Gene Expression Programing based age estimation using facial features. 458-467 - Anuradha Yarlagadda, J. V. R. Murthy, Munaga H. M. Krishna Prasad:
A novel method for human age group classification based on Correlation Fractal Dimension of facial edges. 468-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.