Papers results


Affiliation name: King Saud University
Total results: 1144
Author with most papers: Muhammad Khurram Khan

A DWT Ordering Scheme for Hiding Data in Images Using Pixel Value Difference.

Authors: Awad Kh. Al-Asmari , Ahmed S. Salama , Abdullah M. Iliyasu , Mohammed A. Al-Qodah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Computational Intelligence and Security, CIS 2012, Guangzhou, China, November 17-18, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/CIS.2012.130
Year: 2012

Cloud-based Graphical Simulation Tool of ECG for Educational Purpose.

Authors: Mabrook Al-Rakhami , Ahmad Alhamed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1145/2896387.2896410
Year: 2016

A Proposed Game for Promoting Physical Activities among People with Low Back Pain using Virtual Reality.

Authors: Amal Alazba , Hend S. Al-Khalifa , Hana AlSobayel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, Corfu, Greece, June 26-29, 2018
DOI: https://doi.org/10.1145/3197768.3197780
Year: 2018

FPGA based realization of a reduced complexity high speed decoder for error correction.

Authors: Shuja Ahmad Abbasi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2003 10th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2003, Sharjah, United Arab Emirates, December 14-17, 2003
DOI: https://doi.org/10.1109/ICECS.2003.1301678
Year: 2003

A novel low SAR PIFA for mobile terminal.

Authors: Andi Hakim Kusuma , Abdel-Fattah Sheta , Ibrahim Elshafiey , Majeed Alkanhal , Saeed Abdullah Aldosari , Zeeshan Siddiqui , Saleh A. Alshebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2010, 26-29 September 2010, Istanbul, Turkey
DOI: https://doi.org/10.1109/PIMRC.2010.5672066
Year: 2010

Application of evolutionary algorithms in detecting SMS spam at access layer.

Authors: M. Zubair Rafique , Nasser Alrayes , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 13th Annual Genetic and Evolutionary Computation Conference, GECCO 2011, Proceedings, Dublin, Ireland, July 12-16, 2011
DOI: https://doi.org/10.1145/2001576.2001816
Year: 2011

Low-bit-rate generalized quad-tree motion compensation algorithm and its optimal encoding schemes.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Visual Communications and Image Processing 2000, Perth, Australia, June 20, 2000
DOI: Not available
Year: 2000

The Use of Two Authentication Factors to Enhance the Security of Mass Storage Devices.

Authors: Mohamed Hamdy Eldefrawy , Muhammad Khurram Khan , Hassan M. Elkamchouchi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, NV, USA, April 7-9, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ITNG.2014.13
Year: 2014

Evaluating ESB for C4I Architecture Framework Using Analytic Hierarchy Process.

Authors: Abdullah Sharaf Alghamdi , Iftikhar Ahmad 0002 , Muhammad Nasir
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2010 International Conference on Software Engineering Research & Practice, SERP 2010, July 12-15, 2010, Las Vegas, Nevada, USA, 2 Volumes
DOI: Not available
Year: 2010

Mesoscopic Simulations of Unsteady Shear-Thinning Flows.

Authors: Abdel Monim Artoli , Adélia Sequeira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part II
DOI: https://doi.org/10.1007/11758525_11
Year: 2006

Accuracy of 2D Pulsatile Flow in the Lattice Boltzmann BGK Method.

Authors: Abdel Monim Artoli , Alfons G. Hoekstra , Peter M. A. Sloot
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/3-540-46043-8_36
Year: 2002

NS2 based simulation framework to evaluate the performance of wireless distribution systems.

Authors: Amine Dhraief , Abdelfattah Belghith , Nicolas Montavont , Jean-Marie Bonnin , Mohamed Kassab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 1
DOI: Not available
Year: 2007

ECAB: An Efficient Context-Aware multi-hop Broadcasting protocol for wireless sensor networks.

Authors: Dhouha Ghrab , Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Wireless Communications and Mobile Computing Conference, IWCMC 2015, Dubrovnik, Croatia, August 24-28, 2015
DOI: https://doi.org/10.1109/IWCMC.2015.7289223
Year: 2015

Simultaneous Wireless Information and Power Transfer for Buffer-Aided Cooperative Relaying Systems.

Authors: Hina Nasir , Nadeem Javaid , Muhammad Imran 0001 , Muhammad Shoaib 0005 , Mehmoon Anwar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th International Wireless Communications & Mobile Computing Conference, IWCMC 2018, Limassol, Cyprus, June 25-29, 2018
DOI: https://doi.org/10.1109/IWCMC.2018.8450326
Year: 2018

A New Insight Towards Buffer-Aided Relaying in Cooperative Wireless Networks.

Authors: Hina Nasir , Nadeem Javaid , Waseem Raza , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th International Wireless Communications & Mobile Computing Conference, IWCMC 2018, Limassol, Cyprus, June 25-29, 2018
DOI: https://doi.org/10.1109/IWCMC.2018.8450295
Year: 2018

A threat-based privacy preservation system in untrusted environment.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009
DOI: https://doi.org/10.1145/1644993.1645012
Year: 2009

Reusing Software Libraries Using Semantic Graphs.

Authors: Awny Alnusair , Majdi Rawashdeh , Mohammed F. Alhamid , M. Anwar Hossain 0001 , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 17th IEEE International Conference on Information Reuse and Integration, IRI 2016, Pittsburgh, PA, USA, July 28-30, 2016
DOI: http://doi.ieeecomputersociety.org/10.1109/IRI.2016.79
Year: 2016

Moving towards digital manufacturing in the Arab Region: A 3D printing workshop experience.

Authors: Noha A. Al-Rajhi , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 6th International Conference on Information and Communication Technology and Accessibility, ICTA 2017, Muscat, Oman, December 19-21, 2017
DOI: https://doi.org/10.1109/ICTA.2017.8336009
Year: 2017

A new multicast routing algorithm with cost, delay and delay-variation constraints.

Authors: Mohamed Aissa , Adel Ben Mnaouer , Habib Youssef , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Wireless and Ubiquitous Systems , ICWUS 2010, October 8-10, 2010, Sousse, Tunisia
DOI: https://doi.org/10.1109/ICWUS.2010.5670444
Year: 2010

Suitability analysis of mobility and multihoming unification.

Authors: Amine Dhraief , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Wireless and Ubiquitous Systems , ICWUS 2010, October 8-10, 2010, Sousse, Tunisia
DOI: https://doi.org/10.1109/ICWUS.2010.5671364
Year: 2010

Copy-Move Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering.

Authors: Motasem AlSawadi , Ghulam Muhammad , Muhammad Hussain , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh UKSim/AMSS European Modelling Symposium, EMS 2013, 20-22 November, 2013, Manchester UK
DOI: https://doi.org/10.1109/EMS.2013.43
Year: 2013

Automatic Date Fruit Classification by Using Local Texture Descriptors and Shape-Size Features.

Authors: Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 European Modelling Symposium, Pisa, Italy, October 21-23, 2014
DOI: https://doi.org/10.1109/EMS.2014.63
Year: 2014

A Comparative Study of Different Speech Features for Arabic Phonemes Classification.

Authors: Ali H. Meftah , Yousef Ajami Alotaibi , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 European Modelling Symposium, EMS 2016, Pisa, Italy, November 28-30, 2016
DOI: https://doi.org/10.1109/EMS.2016.018
Year: 2016

Arib$@$QALB-2015 Shared Task: A Hybrid Cascade Model for Arabic Spelling Error Detection and Correction.

Authors: Nouf Al-Shenaifi , Rehab AlNefie , Maha M. Al-Yahya , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the Second Workshop on Arabic Natural Language Processing, ANLP@ACL 2015, Beijing, China, July 30, 2015
DOI: https://doi.org/10.18653/v1/W15-3214
Year: 2015

Overcoming gender segregation in service learning projects: a case from Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 11th Conference on Information Technology Education, SIGITE 2010, Midland, MI, USA, October 7-9, 2010
DOI: https://doi.org/10.1145/1867651.1867683
Year: 2010

AraSenTi: Large-Scale Twitter-Specific Arabic Sentiment Lexicons.

Authors: Nora Al-Twairesh , Hend Suliman Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, ACL 2016, August 7-12, 2016, Berlin, Germany, Volume 1: Long Papers
DOI: https://doi.org/10.18653/v1/p16-1066
Year: 2016

Noisy password security technique.

Authors: Khaled Alghathbar , Hanan A. Mahmoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009
DOI: Not available
Year: 2009

Remote to Local attack detection using supervised neural network.

Authors: Iftikhar Ahmad 0002 , Azween Vitra Abdullah , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010
DOI: Not available
Year: 2010

Towards accessible web browsing for visually impaired people using Google Glass.

Authors: Najd A. Al-Mouh , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, iiWAS 2015, Brussels, Belgium, December 11-13, 2015
DOI: https://doi.org/10.1145/2837185.2837265
Year: 2015

Building ontological models from Arabic Wikipedia: a proposed hybrid approach.

Authors: Nora I. Al-Rajebah , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2010 - The 12th International Conference on Information Integration and Web-based Applications and Services, 8-10 November 2010, Paris, France
DOI: https://doi.org/10.1145/1967486.1967644
Year: 2010

A powerful visual formalism for XML data.

Authors: Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2010 - The 12th International Conference on Information Integration and Web-based Applications and Services, 8-10 November 2010, Paris, France
DOI: https://doi.org/10.1145/1967486.1967534
Year: 2010

A Seeding Cellular Learning Automata Approach for Viral Marketing In Social Network.

Authors: Mashael Aldrees , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, Hanoi, Vietnam, December 4-6, 2014
DOI: https://doi.org/10.1145/2684200.2684339
Year: 2014

Advancements in web accessibility evaluation methods: how far are we?

Authors: Ibtehal S. Baazeem , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, iiWAS 2015, Brussels, Belgium, December 11-13, 2015
DOI: https://doi.org/10.1145/2837185.2843850
Year: 2015

Recursive SQL-like Query language for XML.

Authors: Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2007 - The Ninth International Conference on Information Integration and Web-based Applications Services, 3-5 December 2007, Jakarta, Indonesia
DOI: Not available
Year: 2007

Association mining of time series dependency.

Authors: Mourad Ykhlef , Abdulaziz Al-Reshoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia
DOI: https://doi.org/10.1145/1806338.1806389
Year: 2009

A Swarm Random Walk Algorithm for Global Continuous Optimization.

Authors: Najwa Altwaijry , Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/978-3-319-01796-9_4
Year: 2013

Duration modeling in automatic recited speech recognition.

Authors: Yousef Ajami Alotaibi , Mohammed Sidi Yakoub , Ali H. Meftah , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 39th International Conference on Telecommunications and Signal Processing, TSP 2016, Vienna, Austria, June 27-29, 2016
DOI: https://doi.org/10.1109/TSP.2016.7760889
Year: 2016

A new look at the automatic mapping between Arabic distinctive phonetic features and acoustic cues.

Authors: Yousef Alotaibi , Yasser M. Seddiq , Ali H. Meftah , Sid-Ahmed Selouani , Mohammed Sidi Yakoub
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 40th International Conference on Telecommunications and Signal Processing, TSP 2017, Barcelona, Spain, July 5-7, 2017
DOI: https://doi.org/10.1109/TSP.2017.8076007
Year: 2017

A Multistage Credibility Analysis Model for Microblogs.

Authors: Majed A. AlRubaian , Muhammad Al-Qurishi , Mabrook Al-Rakhami , Sk. Md. Mizanur Rahman , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France, August 25 - 28, 2015
DOI: https://doi.org/10.1145/2808797.2810065
Year: 2015

Human-coordinated camera control for monitoring public spaces.

Authors: Bassem Barake , Pradeep K. Atrey , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010, Kuala Lumpur, Malaysia, 10-13 May, 2010
DOI: https://doi.org/10.1109/ISSPA.2010.5605522
Year: 2010

L3MS: A Lightweight Language Learning Management System Using Mobile Web Technologies.

Authors: Reem A. Alamer , Hind M. Al-Otaibi , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 15th IEEE International Conference on Advanced Learning Technologies, ICALT 2015, Hualien, Taiwan, July 6-9, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/ICALT.2015.13
Year: 2015

Making Linear Equations Accessible for Visually Impaired Students Using 3D Printing.

Authors: Noha Al-Rajhi , Amal Al-Abdulkarim , Hend S. Al-Khalifa , Hind M. Al-Otaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 15th IEEE International Conference on Advanced Learning Technologies, ICALT 2015, Hualien, Taiwan, July 6-9, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/ICALT.2015.46
Year: 2015

Incorporating the Prisoners' Dilemma in Peer-Assessment: An Experimental Study.

Authors: Hend S. Al-Khalifa , Henda Chorfi , Afnan A. Al-Subaihin , Amal Al-Ibrahim , Maha M. Al-Yahya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ICALT 2011, 11th IEEE International Conference on Advanced Learning Technologies, Athens, Georgia, USA, 6-8 July 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/ICALT.2011.99
Year: 2011

Creating Structure from Disorder - Using Folksonomies to Create Semantic Metadata.

Authors: Hend S. Al-Khalifa , Hugh C. Davis , Lester Gilbert
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: WEBIST 2007 - Proceedings of the Third International Conference on Web Information Systems and Technologies, Volume SeBeG/eL, Barcelona, Spain, March 3-6, 2007.
DOI: Not available
Year: 2007

LEATCH -L: Low Energy Adaptive Tier Clustering Hierarchy for Large scale WSNs.

Authors: Badia Bouhdid , Wafa Akkari , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 22nd IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2018, Madrid, Spain, October 15-17, 2018
DOI: http://doi.ieeecomputersociety.org/10.1109/DISTRA.2018.8600921
Year: 2018

Comparison of voice features for Arabic speech recognition.

Authors: Mansour Alsulaiman , Muhammad Ghulam , Zulfiqar Ali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sixth IEEE International Conference on Digital Information Management, ICDIM 2011, Melbourne, Australia, September 26-28, 2011
DOI: https://doi.org/10.1109/ICDIM.2011.6093369
Year: 2011

Evaluating Arabic Text-to-Speech synthesizers for mobile phones.

Authors: Hend AlRouqi , Abdulrahman Alarifi , Ahmad Alnafessah , Suheer Alhadhrami , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman , Mai A. Al-Ammar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Tenth International Conference on Digital Information Management, ICDIM 2015, Jeju Island, South Korea, October 21-23, 2015
DOI: https://doi.org/10.1109/ICDIM.2015.7381856
Year: 2015

Exploring NLP web APIs for building Arabic systems.

Authors: Sharefah A. Al-Ghamdi , Joharah Khabti , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Twelfth International Conference on Digital Information Management, ICDIM 2017, Fukuoka, Japan, September 12-14, 2017
DOI: https://doi.org/10.1109/ICDIM.2017.8244649
Year: 2017

Recent developments in data mining applications and techniques.

Authors: Ameera M. Almasoud , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Tenth International Conference on Digital Information Management, ICDIM 2015, Jeju Island, South Korea, October 21-23, 2015
DOI: https://doi.org/10.1109/ICDIM.2015.7381867
Year: 2015

Category Specific Face Recognition Based on Gender.

Authors: Taghreed Alamri , Muhammad Hussain , Hatim Aboalsamh , Ghulam Muhammad , George Bebis , Anwar M. Mirza
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Conference on Information Science and Applications, ICISA 2013, Hilton Pattaya Hotel, Pattaya, Thailand, June 24-26, 2013
DOI: http://doi.ieeecomputersociety.org/10.1109/ICISA.2013.6579382
Year: 2013

Embedding High Capacity Covert Channels in Short Message Service (SMS).

Authors: M. Zubair Rafique , Muhammad Khurram Khan , Khaled Alghathbar , Muddassar Farooq
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings
DOI: https://doi.org/10.1007/978-3-642-22339-6_1
Year: 2011

Fast and secure handoffs for 802.11 Infrastructure Networks.

Authors: Mohamed Kassab , Abdelfattah Belghith , Jean-Marie Bonnin , Sahbi Sassi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Network Control and Engineering for QoS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain
DOI: https://doi.org/10.1007/978-0-387-49690-0_5
Year: 2005

Comparison between WLD and LBP descriptors for non-intrusive image forgery detection.

Authors: Muhammad Hussain , Sahar Q. Saleh , Hatim A. Aboalsamh , Muhammad Ghulam , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications, INISTA 2014, Proceedings, Alberobello, Italy, June 23-25, 2014
DOI: https://doi.org/10.1109/INISTA.2014.6873618
Year: 2014

Memory accesses reduction for MIME algorithm.

Authors: Sumeer Goel , Mohsen Shaaban , Tarek Darwish , Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, ICME 2003, 6-9 July 2003, Baltimore, MD, USA
DOI: http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221739
Year: 2003

Novel remote display method for multimedia cloud.

Authors: Biao Song , Yuan Tian 0003 , Mohammad Mehedi Hassan , Atif Alamri , M. Shamim Hossain , Abdulhameed Alelaiwi , Bingyin Zhou
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 IEEE International Conference on Multimedia and Expo Workshops, Chengdu, China, July 14-18, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2014.6890659
Year: 2014

Automatic scheduling of CCTV camera views using a human-centric approach.

Authors: Pradeep K. Atrey , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, ICME 2008, June 23-26 2008, Hannover, Germany
DOI: http://doi.ieeecomputersociety.org/10.1109/ICME.2008.4607437
Year: 2008

A Machine Learning Based WSN System for Autism Activity Recognition.

Authors: Sami S. Alwakeel , Bassem Alhalabi , Hadi M. Aggoune , Mohammad Alwakeel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th IEEE International Conference on Machine Learning and Applications, ICMLA 2015, Miami, FL, USA, December 9-11, 2015
DOI: https://doi.org/10.1109/ICMLA.2015.46
Year: 2015

A Novel Genetic Algorithm for the Word Sense Disambiguation Problem.

Authors: Wojdan Alsaeedan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Artificial Intelligence - 29th Canadian Conference on Artificial Intelligence, Canadian AI 2016, Victoria, BC, Canada, May 31 - June 3, 2016. Proceedings
DOI: https://doi.org/10.1007/978-3-319-34111-8_21
Year: 2016

Dynamic gain estimation in ambient media services.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 1st ACM Workshop on Semantic Ambient Media Experiences, SAME 2008, Vancouver, British Columbia, Canada, October 31, 2008
DOI: https://doi.org/10.1145/1461912.1461922
Year: 2008

Voice pathology detection and classification using MPEG-7 audio low-level features.

Authors: Ghulam Muhammad , Moutasem Melhem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013
DOI: Not available
Year: 2013

Study on unique pharyngeal and uvular consonants in foreign accented Arabic.

Authors: Yousef Ajami Alotaibi , Khondaker Abdullah-Al-Mamun , Muhammad Ghulam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2008, 9th Annual Conference of the International Speech Communication Association, Brisbane, Australia, September 22-26, 2008
DOI: Not available
Year: 2008

Information Security Awareness Campaign: An Alternate Approach.

Authors: Bilal Khan , Khaled Alghathbar , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Indoor Spatial Awareness - ISA 2011, 3rd International Workshop, Chicago, IL, USA, November 1, 2011. Proceedings
DOI: https://doi.org/10.1007/978-3-642-23141-4_1
Year: 2011

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors.

Authors: Sahar Q. Saleh , Muhammad Hussain , Ghulam Muhammad , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-642-41939-3_40
Year: 2013

Gender Recognition Using Fusion of Local and Global Facial Features.

Authors: Anwar M. Mirza , Muhammad Hussain , Huda Almuzaini , Ghulam Muhammad , Hatim Aboalsamh , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-642-41939-3_48
Year: 2013

Mass Detection in Digital Mammograms Using Optimized Gabor Filter Bank.

Authors: Muhammad Hussain , Salabat Khan , Muhammad Ghulam , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 8th International Symposium, ISVC 2012, Rethymnon, Crete, Greece, July 16-18, 2012, Revised Selected Papers, Part II
DOI: https://doi.org/10.1007/978-3-642-33191-6_9
Year: 2012

Analytical revisit on the use of biased random walks for data forwarding in wireless sensor networks.

Authors: Issam Mabrouki , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM '13, Barcelona, Spain, November 3-8, 2013
DOI: https://doi.org/10.1145/2507924.2507994
Year: 2013

Cross-corpus Arabic and English emotion recognition.

Authors: Ali H. Meftah , Yasser M. Seddiq , Yousef Alotaibi , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2017 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2017, Bilbao, Spain, December 18-20, 2017
DOI: http://doi.ieeecomputersociety.org/10.1109/ISSPIT.2017.8388672
Year: 2017

Finite-precision analysis: Fast QR-decomposition algorithm.

Authors: Mobien Mohammad , Saleh Al-Shebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: http://doi.ieeecomputersociety.org/10.1109/ISSPIT.2010.5711765
Year: 2010

Autonomic Self Tunable Proactive Routing in Mobile Ad Hoc Networks.

Authors: Abdelfattah Belghith , Mohamed Amine Abid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2009, Marrakech, Morocco, 12-14 October 2009, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/WiMob.2009.54
Year: 2009

Suitability Analysis of Probabilistic Proactive Routing for Dynamic Multi-hop Ad Hoc Networks.

Authors: Abdelfattah Belghith , Adel Ben Mnaouer , Mohamed Amine Abid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2009, Marrakech, Morocco, 12-14 October 2009, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/WiMob.2009.84
Year: 2009

TCSR: an AIMD Trust-based Protocol for Secure Routing in VANET.

Authors: Afef Slama , Ilhem Lengliz , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Conference on Smart Communications and Networking, SmartNets 2018, Yasmine Hammamet, Tunisia, November 16-17, 2018
DOI: https://doi.org/10.1109/SMARTNETS.2018.8707389
Year: 2018

A professional development workshop on advanced computing technologies for high and middle school teachers.

Authors: Najd A. Al-Mouh , Hend S. Al-Khalifa , Sharefah A. Al-Ghamdi , Nouf M. Al-Onaizy , Noha A. Al-Rajhi , Wed Al-Ateeq , Bashayer Al-Habeeb
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 15th International Conference on Information Technology Based Higher Education and Training, ITHET 2016, Istanbul, Turkey, September 8-10, 2016
DOI: https://doi.org/10.1109/ITHET.2016.7760696
Year: 2016

Splicing image forgery detection based on DCT and Local Binary Pattern.

Authors: Amani A. Alahmadi , Muhammad Hussain , Hatim A. Aboalsamh , Muhammad Ghulam , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3-5, 2013
DOI: https://doi.org/10.1109/GlobalSIP.2013.6736863
Year: 2013

Efficient Monitoring Mechanisms for Cooperative Storage in Mobile Ad-Hoc Networks: Detection Time and Accuracy Tradeoffs.

Authors: Mustapha Réda Senouci , Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 22-26 June 2009, Montreal, Québec, Canada
DOI: http://doi.ieeecomputersociety.org/10.1109/ICDCSW.2009.54
Year: 2009

Towards the development of haptic-based interface for teaching visually impaired arabic handwriting.

Authors: Abeer S. Bayousuf , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 15th International ACM SIGACCESS Conference on Computers and Accessibility, ASSETS '13, Bellevue, WA, USA, October 21-23, 2013
DOI: https://doi.org/10.1145/2513383.2513400
Year: 2013

Heterogeneous and dynamic multipoint service in ATM networks.

Authors: N. B. Alimakni , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2005.1387069
Year: 2005

Neural Speech Synthesis System for Arabic Language Using CELP Algorithm.

Authors: Sihem Ben Sassi , Rafik Braham , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 26-29 June 2001, Beirut, Lebanon
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2001.933962
Year: 2001

Subjectivity and sentiment analysis of Arabic: Trends and challenges.

Authors: Nora Al-Twairesh , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2014.7073192
Year: 2014

Performance evaluation of IEEE 802.11 multi-interface based wireless distribution system (MI-WDS).

Authors: Rafaa Tahar , Abdelfettah Belghith , Rafik Braham
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069413
Year: 2009

Noisy password scheme: A new one time password system.

Authors: Khaled Alghathbar , Hanan A. Mahmoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada
DOI: https://doi.org/10.1109/CCECE.2009.5090247
Year: 2009

Cloud-assisted framework for health monitoring.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE 28th Canadian Conference on Electrical and Computer Engineering, CCECE 2015, Halifax, NS, Canada, May 3-6, 2015
DOI: https://doi.org/10.1109/CCECE.2015.7129447
Year: 2015

DPF-based japanese phoneme recognition using tandem MLNs.

Authors: Mohammed Rokibul Alam Kotwal , Manoj Banik , Gazi Md. Moshfiqul Islam , M. Shahadat Hossain , Foyzul Hassan , Mohammad Mahedi Hasan , Muhammad Ghulam , Mohammad Nurul Huda
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 10th International Conference on Hybrid Intelligent Systems (HIS 2010), Atlanta, GA, USA, August 23-25, 2010
DOI: https://doi.org/10.1109/HIS.2010.5600078
Year: 2010

Gender Recognition Using Nonsubsampled Contourlet Transform and WLD Descriptor.

Authors: Muhammad Hussain , Sarah Al-Otaibi , Ghulam Muhammad , Hatim Aboalsamh , George Bebis , Anwar M. Mirza
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Image Analysis, 18th Scandinavian Conference, SCIA 2013, Espoo, Finland, June 17-20, 2013. Proceedings
DOI: https://doi.org/10.1007/978-3-642-38886-6_36
Year: 2013

Application of artificial neural network in detection of DOS attacks.

Authors: Iftikhar Ahmad 0002 , Azween B. Abdullah , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009
DOI: https://doi.org/10.1145/1626195.1626252
Year: 2009

Relationship Based Privacy Management for Ubiquitous Society.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-642-02454-2_67
Year: 2009

Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition.

Authors: Lu Leng , Jiashu Zhang , Gao Chen , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Science and Its Applications - ICCSA 2011 - International Conference, Santander, Spain, June 20-23, 2011. Proceedings, Part V
DOI: https://doi.org/10.1007/978-3-642-21934-4_37
Year: 2011

Distributed Algorithm for Connected Dominating Set Construction in Sensor Networks.

Authors: Najla Al-Nabhan , Mznah Al-Rodhaan , Abdullah Al-Dhelaan , Xiuzhen Cheng
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE International Conference on Systems, Man, and Cybernetics, Manchester, SMC 2013, United Kingdom, October 13-16, 2013
DOI: https://doi.org/10.1109/SMC.2013.467
Year: 2013

ACCESS: A Free and Open Source Arabic Assistive Technology Repository.

Authors: Hend S. Al-Khalifa , Muna S. Al-Razgan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HCI International 2014 - Posters' Extended Abstracts - International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-07854-0_37
Year: 2014

Spam Trapping System: Novel security framework to fight against spam botnets.

Authors: Abdelouahid Derhab , Abdelghani Bouras , Fahad Bin Muhaya , Muhammad Khurram Khan , Yang Xiang 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 21st International Conference on Telecommunications, ICT 2014, Lisbon, Portugal, 4-7 May, 2014
DOI: https://doi.org/10.1109/ICT.2014.6845160
Year: 2014

Improved sequential fusion of heart-signal and fingerprint for anti-spoofing.

Authors: Rami Mohammad Jomaa , Md. Saiful Islam 0001 , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE 4th International Conference on Identity, Security, and Behavior Analysis, ISBA 2018, Singapore, January 11-12, 2018
DOI: https://doi.org/10.1109/ISBA.2018.8311476
Year: 2018

Fast synchronisation protocol with collision handling for wireless ad hoc networks.

Authors: Imen Jemili , Hamida Jarraya , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016
DOI: https://doi.org/10.1109/WCNC.2016.7564958
Year: 2016

Study of context-awareness efficiency applied to duty cycled wireless sensor networks.

Authors: Dhouha Ghrab , Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016
DOI: https://doi.org/10.1109/WCNC.2016.7564865
Year: 2016

PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks.

Authors: Sami S. Al-Wakeel , Saad Al-Swailemm
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wireless Communications and Networking Conference, WCNC 2007, Hong Kong, China, 11-15 March, 2007
DOI: https://doi.org/10.1109/WCNC.2007.759
Year: 2007

A Bose-Einstein Extremal Optimization Method for Solving Real-World Instances of Maximum Satisfiablility.

Authors: Mohamed El-bachir Menai , Mohamed Batouche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Artificial Intelligence, IC-AI '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1
DOI: Not available
Year: 2003

Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption.

Authors: Fahad Bin Muhaya , Muhammad Usama , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings
DOI: https://doi.org/10.1007/978-3-642-04070-2_107
Year: 2009

Efficient Initial Solution to Extremal Optimization Algorithm for Weighted MAXSAT Problem.

Authors: Mohamed El-bachir Menai , Mohamed Batouche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Developments in Applied Artificial Intelligence, 16th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2003, Laughborough, UK, June 23-26, 2003, Proceedings
DOI: https://doi.org/10.1007/3-540-45034-3_60
Year: 2003

Enhancing the Transmission Security of Content-Based Hidden Biometric Data.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part II
DOI: https://doi.org/10.1007/11760191_32
Year: 2006

Face Detection and Count Estimates in Surveillance Color Images.

Authors: Mona F. M. Mursi , Ghazy M. R. Assassa , Abeer S. Al-Humaimeedy , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Egypt. Comput. Sci. J. journal
DOI: Not available
Year: 2009

An Ensemble Learning Approach for Accurate Energy Load Prediction in Residential Buildings.

Authors: Mabrook Al-Rakhami , Abdu Gumaei , Ahmed Alsanad , Atif Alamri , Mohammad Mehedi Hassan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2909470
Year: 2019

Impact of Node Deployment and Routing for Protection of Critical Infrastructures.

Authors: Fazli Subhan , Madiha Noreen , Muhammad Imran 0001 , Moeenuddin Tariq , Asfandyar Khan , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2891667
Year: 2019

An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks.

Authors: Zahid Wadud , Muhammad Ismail , Abdul Baseer Qazi , Farrukh Aslam Khan , Abdelouahid Derhab , Ibrar Ahmad , Arbab Masood Ahmad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2955208
Year: 2019

Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking.

Authors: Huda A. Babaeer , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2994587
Year: 2020

A robust anomaly detection method using a constant false alarm rate approach.

Authors: Basil AsSadhan , Rayan AlShaalan , Diab M. Diab , Abraham Alzoghaiby , Saleh AlShebeili , Jalal Al-Muhtadi , Hesham Bin-Abbas , Fathi E. Abd El-Samie
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-020-08653-8
Year: 2020

ConvSRC: SmartPhone-based periocular recognition using deep convolutional neural network and sparsity augmented collaborative representation.

Authors: Amani A. Alahmadi , Muhammad Hussain , Hatim Aboalsamh , Aqil M. Azmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Fuzzy Syst. journal
DOI: https://doi.org/10.3233/JIFS-190834
Year: 2020

Bipolar fuzzy system of linear equations with polynomial parametric form.

Authors: Muhammad Akram , Ghulam Muhammad , Nawab Hussain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Fuzzy Syst. journal
DOI: https://doi.org/10.3233/JIFS-190764
Year: 2019

Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS).

Authors: Noor Asma Husain , Mohd Shafry Mohd Rahim , A. R. Khan , Mznah Al-Rodhaan , Abdullah Al-Dhelaan , Tanzila Saba
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Fuzzy Syst. journal
DOI: https://doi.org/10.3233/IFS-141308
Year: 2015

TabooQMR: A Taboo-based search algorithm improving Mamcra for multicast routing.

Authors: Adel Ben Mnaouer , Abdelfattah Belghith , Naouel Ben Ali , Miklós Molnár
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2008.4664231
Year: 2008

Utilizing QR Code and Mobile Phones for Blinds and Visually Impaired People.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computers Helping People with Special Needs, 11th International Conference, ICCHP 2008, Linz, Austria, July 9-11, 2008. Proceedings
DOI: https://doi.org/10.1007/978-3-540-70540-6_159
Year: 2008

Hybrid Live P2P Streaming Protocol.

Authors: Chourouk Hammami , Imen Jemili , Achraf Gazdar , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies (ANT 2014), the 4th International Conference on Sustainable Energy Information Technology (SEIT-2014), Hasselt, Belgium, June 2-5, 2014
DOI: https://doi.org/10.1016/j.procs.2014.05.410
Year: 2014

Coloring based Hierarchical Routing Approach.

Authors: Dhouha Ghrab , Bilel Derbel , Imen Jemili , Amine Dhraief , Abdelfettah Belghith , El-Ghazali Talbi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013
DOI: https://doi.org/10.1016/j.procs.2013.06.029
Year: 2013

An Evolutionary Local Search Method for Incremental Satisfiability.

Authors: Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Artificial Intelligence and Symbolic Computation, 7th International Conference, AISC 2004, Linz, Austria, September 22-24, 2004, Proceedings
DOI: https://doi.org/10.1007/978-3-540-30210-0_13
Year: 2004

Comparative evaluation of two arabic speech corpora.

Authors: Yousef Ajami Alotaibi , Ali Hamid Meftah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, NLPKE 2010, Beijing, China, August 21-23, 2010
DOI: https://doi.org/10.1109/NLPKE.2010.5587819
Year: 2010

Interactive slotted stream tapping.

Authors: Achraf Gazdar , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: https://doi.org/10.1016/j.comcom.2008.11.031
Year: 2009

Wireless vision-based fuzzy controllers for moving object tracking using a quadcopter.

Authors: Mohammed Algabri , Hassan Mathkour , Mohamed Amine Mekhtiche , Mohamed Abdelkader Bencherif , Mansour Alsulaiman , Mohammed Arafah , Hamid Ghaleb
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1177/1550147717705549
Year: 2017

Speaker recognition based on Arabic phonemes.

Authors: Mansour Alsulaiman , Awais Mahmood , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Speech Commun. journal
DOI: https://doi.org/10.1016/j.specom.2016.11.004
Year: 2017

Speaker environment classification using rhythm metrics in Levantine Arabic dialect.

Authors: Yousef Ajami Alotaibi , Ali H. Meftah , Sid-Ahmed Selouani , Yasser M. Seddiq
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2014, Manchester, UK, July 23-25, 2014
DOI: https://doi.org/10.1109/CSNDSP.2014.6923918
Year: 2014

Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption.

Authors: M. A. Manazir Ahsan , Ihsan Ali , Mohd Yamani Idna Bin Idris , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Parallel Program. journal
DOI: https://doi.org/10.1007/s10766-018-0599-1
Year: 2020

Cloudlet-Based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing.

Authors: Abdulsalam Yassine , M. Shamim Hossain , Ghulam Muhammad , Mohsen Guizani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Veh. Technol. journal
DOI: https://doi.org/10.1109/TVT.2020.2979941
Year: 2020

Double Auction Mechanisms For Dynamic Autonomous Electric Vehicles Energy Trading.

Authors: Abdulsalam Yassine , M. Shamim Hossain , Ghulam Muhammad , Mohsen Guizani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Veh. Technol. journal
DOI: https://doi.org/10.1109/TVT.2019.2920531
Year: 2019

Marker Hiding Methods: Applications in Augmented Reality.

Authors: Rania Mousa , Mohd Shahrizal Sunar , Hoshang Kolivand , Amjad Rehman , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Applied Artificial Intelligence journal
DOI: https://doi.org/10.1080/08839514.2015.993553
Year: 2015

Biometric template extraction from a heartbeat signal captured from fingers.

Authors: Md. Saiful Islam 0001 , Naif Alajlan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-016-3694-6
Year: 2017

A comparison of different Gabor feature extraction approaches for mass classification in mammography.

Authors: Salabat Khan , Muhammad Hussain , Hatim Aboalsamh , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-015-3017-3
Year: 2017

A Survey of Authentication Schemes in Telecare Medicine Information Systems.

Authors: Muhammad Umair Aslam , Abdelouahid Derhab , Kashif Saleem , Haider Abbas , Mehmet A. Orgun , Waseem Iqbal , Baber Aslam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-016-0658-3
Year: 2017

An Authentication Scheme for Secure Access to Healthcare Services.

Authors: Muhammad Khurram Khan , Saru Kumari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-013-9954-3
Year: 2012

Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System.

Authors: Zeeshan Siddiqui , Abdul Hanan Abdullah , Muhammad Khurram Khan , Abdullah S. Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-013-9997-5
Year: 2014

SVM ensembles for named entity disambiguation.

Authors: Amal Alokaili , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. journal
DOI: https://doi.org/10.1007/s00607-019-00748-x
Year: 2020

New Strategies and Extensions in Kruskal's Algorithm in Multicast Routing.

Authors: Mohamed Aissa , Adel Ben Mnaouer , Rion Murray , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Bus. Data Commun. Netw. journal
DOI: https://doi.org/10.4018/jbdcn.2011100103
Year: 2011

Complex dynamic properties of Cournot duopoly games with convex and log-concave demand function.

Authors: Sameh S. Askar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Oper. Res. Lett. journal
DOI: https://doi.org/10.1016/j.orl.2013.12.006
Year: 2014

A hybrid precoding- and filtering-based uplink MC-LNOMA scheme for 5G cellular networks with reduced PAPR.

Authors: Imran Baig , Umer Farooq , Ejaz Ahmed 0003 , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Trans. Emerg. Telecommun. Technol. journal
DOI: https://doi.org/10.1002/ett.3501
Year: 2018

Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks.

Authors: Muhammad Al-Qurishi , M. Shamim Hossain , Majed A. AlRubaian , Sk. Md. Mizanur Rahman , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Ind. Informatics journal
DOI: https://doi.org/10.1109/TII.2017.2753202
Year: 2018

Tree-Based Deep Networks for Edge Devices.

Authors: Ghulam Muhammad , M. Shamim Hossain , Abdulsalam Yassine
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Ind. Informatics journal
DOI: https://doi.org/10.1109/TII.2019.2950326
Year: 2020

Automatic Fruit Classification Using Deep Learning for Industrial Applications.

Authors: M. Shamim Hossain , Muneer H. Al-Hammadi , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Ind. Informatics journal
DOI: https://doi.org/10.1109/TII.2018.2875149
Year: 2019

Scientometric assessment of Saudi publication productivity in computer science in the period of 1978-2012.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/IJWIS-01-2014-0001
Year: 2014

On a Setup Optimization Problem for Interval Orders.

Authors: Ahmad Sharary , Nejib Zaguia
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Process. Lett. journal
DOI: https://doi.org/10.1016/0020-0190(92)90255-T
Year: 1992

Applying Deep Learning for Epilepsy Seizure Detection and Brain Mapping Visualization.

Authors: M. Shamim Hossain , Syed Umar Amin , Mansour Alsulaiman , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ACM Trans. Multim. Comput. Commun. Appl. journal
DOI: https://doi.org/10.1145/3241056
Year: 2019

Traffic Aware Power Saving Protocol in Multi-hop Mobile Ad-Hoc Networks.

Authors: Abdelfattah Belghith , Wafa Akkari , Jean-Marie Bonnin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Networks journal
DOI: https://doi.org/10.4304/jnw.2.4.1-13
Year: 2007

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.

Authors: Muhammad Al-Qurishi , Sk. Md. Mizanur Rahman , Atif Alamri , Mohamed A. Mostafa , Majed A. AlRubaian , M. Shamim Hossain , Brij B. Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Concurr. Comput. Pract. Exp. journal
DOI: https://doi.org/10.1002/cpe.4276
Year: 2018

Reputation-based credibility analysis of Twitter social network users.

Authors: Majed A. AlRubaian , Muhammad Al-Qurishi , Mabrook Al-Rakhami , Mohammad Mehedi Hassan , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Concurr. Comput. Pract. Exp. journal
DOI: https://doi.org/10.1002/cpe.3873
Year: 2017

Pointing a Finger toward Standardized and Automated Biometrics.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Multim. journal
DOI: http://doi.ieeecomputersociety.org/10.1109/MMUL.2006.90
Year: 2006

An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps.

Authors: Sameh S. Askar , Abdelrahman A. Karawia , Abdulrahman Al-Khedhairi , Fatemah S. Al-Ammar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Entropy journal
DOI: https://doi.org/10.3390/e21010044
Year: 2019

Fingerprint verification using statistical descriptors.

Authors: Mohammed S. Khalil , Dzulkifli Bin Mohamad , Muhammad Khurram Khan , Qais Al-Nuzaili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Digit. Signal Process. journal
DOI: https://doi.org/10.1016/j.dsp.2009.12.002
Year: 2010

The State of Distance Education in Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: eLearn Magazine journal
DOI: https://doi.org/10.1145/1626550.1642193
Year: 2009

Finding a Place for Twitter in Higher Education.

Authors: Hend Suliman Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: eLearn Magazine journal
DOI: https://doi.org/10.1145/1795374.1821980
Year: 2010

Efficient Virtual Machine Resource Management for Media Cloud Computing.

Authors: Mohammad Mehedi Hassan , Biao Song , M. Shamim Hossain , Atif Alamri , Mohammed Abdullah Alnuem , Muhammad Mostafa Monowar , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2014.05.004
Year: 2014

CE-OLSR: a Cartography and Stability Enhanced OLSR for Dynamic MANETs with Obstacles.

Authors: Abdelfettah Belghith , Mohamed Belhassen
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2012.01.015
Year: 2012

Secure and efficient data delivery for fog-assisted wireless body area networks.

Authors: Thaier Hayajneh , Kristen N. Griggs , Muhammad Imran 0001 , Bassam Jamil Mohd
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Peer Peer Netw. Appl. journal
DOI: https://doi.org/10.1007/s12083-018-0705-6
Year: 2019

Extended average magnitude difference function (EAMDF) based pitch detection.

Authors: Muhammad Ghulam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. Arab J. Inf. Technol. journal
DOI: Not available
Year: 2011

Cyber-physical cloud-oriented multi-sensory smart home framework for elderly people: An energy efficiency perspective.

Authors: M. Shamim Hossain , Md. Abdur Rahman , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Parallel Distributed Comput. journal
DOI: https://doi.org/10.1016/j.jpdc.2016.10.005
Year: 2017

An improved mechanism for flow rule installation in-band SDN.

Authors: Israr Iqbal Awan , Nadir Shah , Muhammad Imran 0001 , Muhammad Shoaib 0005 , Nasir Saeed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Syst. Archit. journal
DOI: https://doi.org/10.1016/j.sysarc.2019.01.016
Year: 2019

Perception layer security in Internet of Things.

Authors: Hasan Ali Khattak , Munam Ali Shah , Sangeen Khan , Ihsan Ali , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2019.04.038
Year: 2019

AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks.

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira , Sofien Gannouni
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.04.087
Year: 2018

Unsteady flow in a 2D elastic tube with the LBGK method.

Authors: Alfons G. Hoekstra , Jos van't Hoff , Abdel Monim Artoli , Peter M. A. Sloot
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2003.12.003
Year: 2004

Lattice BGK simulations of flow in a symmetric bifurcation.

Authors: Abdel Monim Artoli , Drona Kandhai , Huub C. J. Hoefsloot , Alfons G. Hoekstra , Peter M. A. Sloot
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2003.12.002
Year: 2004

Cloud-Based Multimedia Services for healthcare and other related applications.

Authors: M. Shamim Hossain , Changsheng Xu , Abdel Monim Artoli , M. Manzur Murshed , Stefan Göbel 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2016.07.011
Year: 2017

An efficient key agreement protocol for Sybil-precaution in online social networks.

Authors: Muhammad Al-Qurishi , Sk. Md. Mizanur Rahman , M. Shamim Hossain , Ahmad Almogren , Majed A. AlRubaian , Atif Alamri , Mabrook Al-Rakhami , Brij B. Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2017.07.055
Year: 2018

Accurate detection of sitting posture activities in a secure IoT based assisted living environment.

Authors: Muhammad Tariq , Hammad Majeed , Mirza Omer Beg , Farrukh Aslam Khan , Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.02.013
Year: 2019

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'.

Authors: Saru Kumari , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.2590
Year: 2014

Design of a user anonymous password authentication scheme without smart card.

Authors: Saru Kumari , Muhammad Khurram Khan , Xiong Li 0002 , Fan Wu 0003
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.2853
Year: 2016

Pitch-Synchronous Peak-Amplitude (PS-PA)-Based Feature Extraction Method for Noise-Robust ASR.

Authors: Muhammad Ghulam , Kouichi Katsurada , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1093/ietisy/e89-d.11.2766
Year: 2006

SWNF: Sign Prediction of Weak Ties Based on the Network Features.

Authors: Donghai Guan , Tingting Wang , Weiwei Yuan , Lejun Zhang , Yuan Tian 0003 , Mohammed Al-Dhelaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2928438
Year: 2019

Deep Tree Net-Vector of Locally Aggregated Descriptor (VLAD) Model.

Authors: Abduljawad A. Amory , Ghulam Muhammad , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2947571
Year: 2019

Development of Efficient High Power Amplifier With More Than an Octave Bandwidth.

Authors: Waqar Ahmad Malik , Abdelfattah Ahmad Sheta , Ibrahim Elshafiey
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2789216
Year: 2018

Classification of Authentic and Tampered Video Using Motion Residual and Parasitic Layers.

Authors: Mubbashar Saddique , Khurshid Asghar , Usama Ijaz Bajwa , Muhammad Hussain , Hatim A. Aboalsamh , Zulfiqar Habib
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2980951
Year: 2020

Distinctive Phonetic Features Modeling and Extraction Using Deep Neural Networks.

Authors: Yasser M. Seddiq , Yousef Ajami Alotaibi , Sid-Ahmed Selouani , Ali Hamid Meftah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2924014
Year: 2019

Alignment-Free Cross-Sensor Fingerprint Matching Based on the Co-Occurrence of Ridge Orientations and Gabor-HoG Descriptor.

Authors: Helala AlShehri , Muhammad Hussain , Hatim A. Aboalsamh , Qazi Emad-ul-Haq , Mansour Alzuair , Aqil M. Azmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2924127
Year: 2019

Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment.

Authors: Shaheena Khatoon , Sk. Md. Mizanur Rahman , Majed A. AlRubaian , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2909556
Year: 2019

Blending Big Data Analytics: Review on Challenges and a Recent Study.

Authors: Fairuz Amalina , Ibrahim Abaker Targio Hashem , Zati Hakim Azizul , Tan Fong Ang , Ahmad Firdaus , Muhammad Imran 0001 , Nor Badrul Anuar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2923270
Year: 2020

Selection of Heart-Biometric Templates for Fusion.

Authors: Md. Saiful Islam 0001 , Nassim Ammour , Naif Alajlan , Mohammad Abdullah-Al-Wadud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2667224
Year: 2017

Information Diffusion Predictive Model Using Radiation Transfer.

Authors: Lulwah AlSuwaidan , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2764001
Year: 2017

Use of E-Learning by University Students in Malaysian Higher Educational Institutions: A Case in Universiti Teknologi Malaysia.

Authors: Waleed Mugahed Al-Rahmi , Norma Alias , Mohd Shahizan Othman , Ahmed Ibrahim Alzahrani , Osama Alfarraj , Ali Ali Saged , Nur Shamsiah Abdul Rahman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2802325
Year: 2018

A Novel Vertical Fragmentation, Replication and Allocation Model in DDBSs.

Authors: Hassan Ismail Abdalla , Ali A. Amer , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. UCS journal
DOI: https://doi.org/10.3217/jucs-020-10-1469
Year: 2014

Media Content Adaptation Framework for Technology Enhanced Mobile e-Learning.

Authors: Atif Alamri , Ghulam Muhammad , Abdulhameed A. Al Elaiwi , Khalid N. Al-Mutib , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. UCS journal
DOI: https://doi.org/10.3217/jucs-020-15-2016
Year: 2014

On the Analysis and Detection of Mobile Botnet Applications.

Authors: Ahmad Karim , Rosli Salleh , Muhammad Khurram Khan , Aisha Siddiqa , Kim-Kwang Raymond Choo
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. UCS journal
DOI: Not available
Year: 2016

On the Development of a Web-Based M-Learning System for Dual Screen Handheld Game Consoles.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Interact. Mob. Technol. journal
DOI: Not available
Year: 2011

Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges.

Authors: Linghe Kong , Muhammad Khurram Khan , Fan Wu 0006 , Guihai Chen , Peng Zeng 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2017.1600422CM
Year: 2017

The impact of cost uncertainty on Cournot oligopoly games.

Authors: Sameh S. Askar , M. F. Elettreby
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Math. Comput. journal
DOI: https://doi.org/10.1016/j.amc.2017.05.062
Year: 2017

MLN-based Bangla ASR using context sensitive triphone HMM.

Authors: Foyzul Hassan , Mohammed Rokibul Alam Kotwal , Ghulam Muhammad , Mohammad Nurul Huda
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Speech Technol. journal
DOI: https://doi.org/10.1007/s10772-011-9095-3
Year: 2011

Efficient Resource Management for Cloud-enabled Video Surveillance over Next Generation Network.

Authors: M. Anwar Hossain 0001 , Biao Song
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-016-0699-3
Year: 2016

A Novel FPGA-Based Approach for Digital Waveform Generation Using Orthogonal Functions.

Authors: Syed Manzoor Qasim , Shuja Ahmad Abbasi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Journal of Circuits, Systems, and Computers journal
DOI: https://doi.org/10.1142/S021812660700409X
Year: 2007

Trust models of internet of smart things: A survey, open issues, and future directions.

Authors: Ayesha Altaf , Haider Abbas , Faiza Iqbal , Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2019.02.024
Year: 2019

A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata.

Authors: Adeela Waqar , Asad Raza , Haider Abbas , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2012.09.001
Year: 2013

Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges.

Authors: Abdelmuttlib Ibrahim Abdallaahmed , Siti Hafizah Ab Hamid , Abdullah Gani , Suleman Khan , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2019.102409
Year: 2019

Intrusion response systems: Foundations, design, and challenges.

Authors: Zakira Inayat , Abdullah Gani , Nor Badrul Anuar , Muhammad Khurram Khan , Shahid Anwar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2015.12.006
Year: 2016

Cloud monitoring: A review, taxonomy, and open research issues.

Authors: Hassan Jamil Syed , Abdullah Gani , Raja Wasim Ahmad , Muhammad Khurram Khan , Abdelmuttlib Ibrahim Abdallaahmed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2017.08.021
Year: 2017

Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing.

Authors: Eun-Jun Yoon , Muhammad Khurram Khan , Kee-Young Yoo
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1587/transinf.E93.D.3400
Year: 2010

The dynamics of economic games based on product differentiation.

Authors: Sameh S. Askar , Ahmad M. Alshamrani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. Appl. Math. journal
DOI: https://doi.org/10.1016/j.cam.2014.02.032
Year: 2014

Audio-Visual Emotion-Aware Cloud Gaming Framework.

Authors: M. Shamim Hossain , Ghulam Muhammad , Biao Song , Mohammad Mehedi Hassan , Abdulhameed Alelaiwi , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Circuits Syst. Video Techn. journal
DOI: https://doi.org/10.1109/TCSVT.2015.2444731
Year: 2015

RESTful Discovery and Eventing for Service Provisioning in Assisted Living Environments.

Authors: Jorge Parra , M. Anwar Hossain 0001 , Aitor Uribarren , Eduardo Jacob
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s140509227
Year: 2014

Enhanced Living by Assessing Voice Pathology Using a Co-Occurrence Matrix.

Authors: Ghulam Muhammad , Mohammed F. Alhamid , M. Shamim Hossain , Ahmad S. Almogren , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s17020267
Year: 2017

An Effective Semantic Event Matching System in the Internet of Things (IoT) Environment.

Authors: Noura Alhakbani , Mohammad Mehedi Hassan , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s17092014
Year: 2017

End-to-End Deep Learning Fusion of Fingerprint and Electrocardiogram Signals for Presentation Attack Detection.

Authors: Rami Mohammad Jomaa , Hassan Mathkour , Yakoub Bazi , Md. Saiful Islam 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s20072085
Year: 2020

Exploring the Value of Folksonomies for Creating Semantic Metadata.

Authors: Hend S. Al-Khalifa , Hugh C. Davis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Semantic Web Inf. Syst. journal
DOI: https://doi.org/10.4018/jswis.2007010102
Year: 2007

Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks.

Authors: Abdelouahid Derhab , Abdelghani Bouras
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ad Hoc Sens. Wirel. Networks journal
DOI: Not available
Year: 2016

Smart-Edge-CoCaCo: AI-Enabled Smart Edge with Joint Computation, Caching, and Communication in Heterogeneous IoT.

Authors: Yixue Hao , Yiming Miao , Long Hu , M. Shamim Hossain , Ghulam Muhammad , Syed Umar Amin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.2019.1800235
Year: 2019

A Decision-Support System for the Saudi Ministry of Higher Education.

Authors: Abdulkader Alfantookh , Hussam M. Ramadan , Alaaeldin M. Hafez , Mourad Ykhlef , Ahmad AlShibli , Mourad A. Benchikh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Comput. Their Appl. journal
DOI: Not available
Year: 2012

An improved remote user authentication scheme with key agreement.

Authors: Saru Kumari , Muhammad Khurram Khan , Xiong Li 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Electr. Eng. journal
DOI: https://doi.org/10.1016/j.compeleceng.2014.05.007
Year: 2014

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment.

Authors: Chandrashekhar Meshram , Cheng-Chi Lee , Sarita Gajbhiye Meshram , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Soft Comput. journal
DOI: https://doi.org/10.1007/s00500-019-03855-1
Year: 2019

Impact of preprocessing on medical data classification.

Authors: Sarab Al Muhaideb , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Frontiers Comput. Sci. journal
DOI: https://doi.org/10.1007/s11704-016-5203-5
Year: 2016

Factors affecting student dropout in MOOCs: a cause and effect decision-making model.

Authors: Hanan Aldowah , Hosam Al-Samarraie , Ahmed Ibrahim Alzahrani , Nasser Alalwan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. High. Educ. journal
DOI: https://doi.org/10.1007/s12528-019-09241-y
Year: 2020

Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.

Authors: SK Hafizul Islam , Muhammad Khurram Khan , Mohammad S. Obaidat , Fahad T. Bin Muhaya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Personal Communications journal
DOI: https://doi.org/10.1007/s11277-015-2542-8
Year: 2015

Extending the theory of planned behavior (TPB) to explain online game playing among Malaysian undergraduate students.

Authors: Ahmed Ibrahim Alzahrani , Imran Mahmud , Thurasamy Ramayah , Osama Alfarraj , Nasser Alalwan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telematics Informatics journal
DOI: https://doi.org/10.1016/j.tele.2016.07.001
Year: 2017

On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay.

Authors: Mznah Al-Rodhaan , Lewis M. Mackenzie , Mohamed Ould-Khaoua
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJCNS journal
DOI: https://doi.org/10.4236/ijcns.2009.23022
Year: 2009

Editorial - Chaotic cryptography and its applications in telecommunication systems.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-011-9456-x
Year: 2013

Technological advancements and 2020.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-019-00647-8
Year: 2020

Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network.

Authors: Xiaomin Wang , Wei Guo , Wenfang Zhang , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-011-9457-9
Year: 2013

Privacy-preserving and tokenless chaotic revocable face authentication scheme.

Authors: Muhammad Khurram Khan , Khaled Alghathbar , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-010-9314-2
Year: 2011

Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map.

Authors: Sameh S. Askar , Abdelrahman A. Karawia , Fatmah S. Alammar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IET Image Process. journal
DOI: https://doi.org/10.1049/iet-ipr.2016.0906
Year: 2018

Deep Learning based Computer-Aided Diagnosis Systems for Diabetic Retinopathy: A Survey.

Authors: Norah M. Asiri , Muhammad Hussain , Hatim A. Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2018

Multi-task emotion communication system with dynamic resource allocations.

Authors: Ping Zhou , M. Shamim Hossain , Xiaofen Zong , Ghulam Muhammad , Syed Umar Amin , Iztok Humar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Fusion journal
DOI: https://doi.org/10.1016/j.inffus.2019.03.003
Year: 2019

Swarm intelligence to solve the curriculum sequencing problem.

Authors: Mohamed El-bachir Menai , Hamad Alhunitah , Hussein Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comp. Applic. in Engineering Education journal
DOI: https://doi.org/10.1002/cae.22046
Year: 2018

A new scalable multicast routing algorithm for interactive real-time applications.

Authors: Mohamed Aissa , Adel Ben Mnaouer , Rion Murray , Habib Youssef , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Pers. Ubiquitous Comput. journal
DOI: https://doi.org/10.1007/s00779-011-0370-8
Year: 2011

A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.

Authors: Wenfang Zhang , Xiaomin Wang , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.1051
Year: 2015

More secure smart card-based remote user password authentication scheme with user anonymity.

Authors: Saru Kumari , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.916
Year: 2014

Practical Suitability and Experimental Assessment of Tree ORAMs.

Authors: Kholoud Al-Saleh , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1155/2018/2138147
Year: 2018

Performance optimality enhancement algorithm in DDBS (POEA).

Authors: Hassan Ismail Abdalla , Ali A. Amer , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2013.04.026
Year: 2014

Automated and user involved data synchronization in collaborative e-health environments.

Authors: M. Shamim Hossain , Mehedi Masud , Ghulam Muhammad , Majdi Rawashdeh , Mohammad Mehedi Hassan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2013.06.019
Year: 2014

Enhanced engineering education using smart class environment.

Authors: Abdulhameed Alelaiwi , Abdullah S. Alghamdi , Mohammad Shorfuzzaman , Majdi Rawashdeh , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2014.11.061
Year: 2015

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.

Authors: Abdelouahid Derhab , Kashif Saleem , Jalal Al-Muhtadi , Mehmet A. Orgun
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2016.01.023
Year: 2016

Evaluating the Efficiency of Clustering on Routing and Network Performance.

Authors: Imen Jemili , Abdelfattah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2008 International Conference on Wireless Networks, July 14-17, 2008, Las Vegas, Nevada, USA
DOI: Not available
Year: 2008

Arabic speaker emotion classification using rhythm metrics and neural networks.

Authors: Ali H. Meftah , Yousef Ajami Alotaibi , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 23rd European Signal Processing Conference, EUSIPCO 2015, Nice, France, August 31 - September 4, 2015
DOI: https://doi.org/10.1109/EUSIPCO.2015.7362619
Year: 2015

Program evaluation of highway access with innovative risk-cost-benefit analysis.

Authors: Marwan Alsultan 0002 , Jungwook Jun , James H. Lambert
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Reliab. Eng. Syst. Saf. journal
DOI: https://doi.org/10.1016/j.ress.2019.106649
Year: 2020

Reliability analysis of TLP tethers under impulsive loading.

Authors: Rizwan Ahmad Khan , Nadeem A. Siddiqui , S. Q. A. Naqvi , Suhail Ahmad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Reliab. Eng. Syst. Saf. journal
DOI: https://doi.org/10.1016/j.ress.2004.11.010
Year: 2006

Reliability analysis against progressive failure of TLP tethers in extreme tension.

Authors: Nadeem A. Siddiqui , Suhail Ahmad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Reliab. Eng. Syst. Saf. journal
DOI: https://doi.org/10.1016/S0951-8320(00)00008-9
Year: 2000

Towards Deep Object Detection Techniques for Phoneme Recognition.

Authors: Mohammed Algabri , Hassan Mathkour , Mohamed Abdelkader Bencherif , Mansour Alsulaiman , Mohamed Amine Mekhtiche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2980452
Year: 2020

A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing.

Authors: Seyed Ahmad Soleymani , Abdul Hanan Abdullah , Mahdi Zareei , Mohammad Hossein Anisi , César Vargas Rosales , Muhammad Khurram Khan , Shidrokh Goudarzi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2733225
Year: 2017

Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks.

Authors: Wateen A. Aliady , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2924283
Year: 2019

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.

Authors: Chao Lin , Debiao He , Xinyi Huang , Muhammad Khurram Khan , Kim-Kwang Raymond Choo
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2837650
Year: 2018

Evaluation of an Arabic Speech Corpus of Emotions: A Perceptual and Statistical Analysis.

Authors: Ali Hamid Meftah , Yousef Ajami Alotaibi , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2881096
Year: 2018

Voice Pathology Detection and Classification Using Auto-Correlation and Entropy Features in Different Frequency Regions.

Authors: Ahmed Y. Al-nasheri , Ghulam Muhammad , Mansour Alsulaiman , Zulfiqar Ali , Khalid H. Malki , Tamer A. Mesallam , Mohamed Farahat Ibrahim
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2696056
Year: 2018

A Facial-Expression Monitoring System for Improved Healthcare in Smart Cities.

Authors: Ghulam Muhammad , Mansour Alsulaiman , Syed Umar Amin , Ahmed Ghoneim , Mohammed F. Alhamid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2712788
Year: 2017

Hybrid Feature Model for Emotion Recognition in Arabic Text.

Authors: Nourah Alswaidan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2975906
Year: 2020

Technology-Assisted Decision Support System for Efficient Water Utilization: A Real-Time Testbed for Irrigation Using Wireless Sensor Networks.

Authors: Rahim Khan , Ihsan Ali , Muhammad Zakarya , Ahmad M. Mustafa , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2836185
Year: 2018

An Automatic Digital Audio Authentication/Forensics System.

Authors: Zulfiqar Ali , Muhammad Imran 0001 , Mansour Alsulaiman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2672681
Year: 2017

Cross-Sensor Fingerprint Matching Method Based on Orientation, Gradient, and Gabor-HoG Descriptors With Score Level Fusion.

Authors: Helala AlShehri , Muhammad Hussain , Hatim A. Aboalsamh , Mansour A. Al Zuair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2840330
Year: 2018

Cloud-oriented emotion feedback-based Exergames framework.

Authors: M. Shamim Hossain , Ghulam Muhammad , Muhammad Al-Qurishi , Mehedi Masud , Ahmad Almogren , Wadood Abdul , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-017-4621-1
Year: 2018

A Real Time Window-Based Local Call Admission Control Algorithm for IP Networks.

Authors: Sami S. Alwakeel , Shaker S. AlGhanmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 13th IEEE International Symposium on High-Assurance Systems Engineering, HASE 2011, Boca Raton, FL, USA, November 10-12, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/HASE.2011.32
Year: 2011

A Joint Filtering and Precoding Based Uplink MC-NOMA.

Authors: Imran Baig , Umer Farooq , Najam Ul Hasan , Manaf Zghaibeh , U. Mukhtar Rana , Muhammad Imran 0001 , Muhammad Ayaz
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2018 International Symposium on Networks, Computers and Communications, ISNCC 2018, Rome, Italy, June 19-21, 2018
DOI: https://doi.org/10.1109/ISNCC.2018.8531025
Year: 2018

An efficient intelligent system for the classification of electroencephalography (EEG) brain signals using nuclear features for human cognitive tasks.

Authors: Emad-ul-Haq Qazi , Muhammad Hussain , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Fuzzy Syst. journal
DOI: https://doi.org/10.3233/JIFS-181586
Year: 2019

A robust convolutional neural network for online smartphone-based human activity recognition.

Authors: Bandar Almaslukh , Jalal Al-Muhtadi , Abdel Monim Artoli
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Fuzzy Syst. journal
DOI: https://doi.org/10.3233/JIFS-169699
Year: 2018

Using app inventor 2 in a summer programming workshop: Improvements over previous years.

Authors: Sharefah A. Al-Ghamdi , Noha A. Al-Rajhi , Nouf M. Al-Onaizy , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 IEEE Global Engineering Education Conference, EDUCON 2016, Abu Dhabi, United Arab Emirates, April 10-13, 2016
DOI: https://doi.org/10.1109/EDUCON.2016.7474582
Year: 2016

Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Networks journal
DOI: https://doi.org/10.1016/j.comnet.2016.01.009
Year: 2016

Survivability strategies for emerging wireless networks.

Authors: Ahmed E. Kamal , Muhammad Imran 0001 , Hsiao-Hwa Chen , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Networks journal
DOI: https://doi.org/10.1016/j.comnet.2017.08.004
Year: 2017

3D Object Localization Using Local Shape Features.

Authors: Md. Saiful Islam 0001 , Andrzej Sluzek
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ninth International Conference on Control, Automation, Robotics and Vision, ICARCV 2006, Singapore, 5-8 December 2006, Proceedings
DOI: https://doi.org/10.1109/ICARCV.2006.345221
Year: 2006

Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers.

Authors: Mohamed Belaoued , Bouchra Guelib , Yasmine Bounaas , Abdelouahid Derhab , Mahmoud Boufaïda
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/978-3-030-19945-6_11
Year: 2018

Social Capital and ICT Intervention: a Search for Contextual Relation.

Authors: Zafor Ahmed , Ahmed Alzahrani 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 25th European Conference on Information Systems, ECIS 2017, Guimarães, Portugal, June 5-10, 2017
DOI: Not available
Year: 2017

A Framework for Detecting Malformed SMS Attack.

Authors: M. Zubair Rafique , Muhammad Khurram Khan , Khaled Alghathbar , Muddassar Farooq
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings
DOI: https://doi.org/10.1007/978-3-642-22339-6_2
Year: 2011

Matching interest points of an object.

Authors: Md. Saiful Islam 0001 , Zhu Lin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ICIP.2005.1529765
Year: 2005

A New Block-Matching Motion Estimation Algorithm Based on Successive Elimination.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2000 International Conference on Image Processing, ICIP 2000, Vancouver, BC, Canada, September 10-13, 2000
DOI: https://doi.org/10.1109/ICIP.2000.899527
Year: 2000

How rational are people? Economic behavior based on sentiment analysis.

Authors: Nora AlMuhanna , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ninth International Conference on Digital Information Management, ICDIM 2014, Phitsanulok, Thailand, September 29 - Oct. 1, 2014
DOI: https://doi.org/10.1109/ICDIM.2014.6991405
Year: 2014

A first approach to the evaluation of arabic diacritization systems.

Authors: Alia Bahanshal , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh International Conference on Digital Information Management, ICDIM 2012, Macau, Macao, August 22-24, 2012
DOI: https://doi.org/10.1109/ICDIM.2012.6360097
Year: 2012

Environment sound recognition using zero crossing features and MPEG-7.

Authors: Mubarak Obaid AlQahtani , Muhammad Ghulam , Yousef Ajami Alotaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, July 5-8, 2010, Lakehead University, Thunder Bay, Canada
DOI: https://doi.org/10.1109/ICDIM.2010.5664645
Year: 2010

Heuristic evaluation of the usability of e-government websites: a case from Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25 - 28, 2010
DOI: https://doi.org/10.1145/1930321.1930370
Year: 2010

Requirement elicitation for a toilet training wearable watch to serve autistic children.

Authors: Hend S. Al-Khalifa , Wafa Alrajhi , Sarah Alhassan , Mariah Almotlag
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 6th International Conference on Information and Communication Technology and Accessibility, ICTA 2017, Muscat, Oman, December 19-21, 2017
DOI: https://doi.org/10.1109/ICTA.2017.8336013
Year: 2017

Enhancing the specification and verification techniques of multiparty sessions in SOC.

Authors: Abeer S. Al-Humaimeedy , Maribel Fernández
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, Siena, Italy, July 14-16, 2015
DOI: https://doi.org/10.1145/2790449.2790515
Year: 2015

A Fast Multipath Routing Protocol for wireless sensor networks.

Authors: Imen Jemili , Ghazi Tekaya , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2014.7073275
Year: 2014

VLSI design and implementation of analog CMOS 2nd generation current conveyors.

Authors: S. I. Kayed , H. F. Ragaie , Mohamed Abou El-Ela , F. A. S. Soliman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ISCAS.2001.922371
Year: 2001

A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
DOI: https://doi.org/10.1007/978-3-642-10847-1_24
Year: 2009

A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems.

Authors: Abdullah Sharaf Alghamdi , Syed Amanullah Quadri , Iftikhar Ahmad 0002 , Khalid Al-Nafjan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
DOI: https://doi.org/10.1007/978-3-642-17610-4_28
Year: 2010

Optimal filter design for low entropy pyramid coding.

Authors: Awad Kh. Al-Asmari , M. A. Al-Hakbani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2003 10th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2003, Sharjah, United Arab Emirates, December 14-17, 2003
DOI: https://doi.org/10.1109/ICECS.2003.1301987
Year: 2003

Copy-Move Forgery Detection Using Dyadic Wavelet Transform.

Authors: Najah Muhammad , Muhammad Hussain , Ghulam Muhammad , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Computer Graphics, Imaging and Visualization, CGIV 2011, Singapore, August 17-19, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/CGIV.2011.29
Year: 2011

Privacy Analysis of Smart City Healthcare Services.

Authors: Amjad A. Alghanim , Sk. Md. Mizanur Rahman , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 19th IEEE International Symposium on Multimedia, ISM 2017, Taichung, Taiwan, December 11-13, 2017
DOI: http://doi.ieeecomputersociety.org/10.1109/ISM.2017.79
Year: 2017

A Human Caregiver Support System in Elderly Monitoring Facility.

Authors: M. Anwar Hossain 0001 , Dewan Tanvir Ahmed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2012 IEEE International Conference on Multimedia and Expo Workshops, Melbourne, Australia, July 9-13, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2012.82
Year: 2012

Safety-enabled restful messaging in Ambient-Assisted Living.

Authors: M. Anwar Hossain 0001 , Jorge Parra , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2015 IEEE International Conference on Multimedia & Expo Workshops, ICME Workshops 2015, Turin, Italy, June 29 - July 3, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2015.7169804
Year: 2015

Accuracy versus Performance in Lattice Boltzmann BGK Simulations of Systolic Flows.

Authors: Abdel Monim Artoli , Lilit Abrahamyan , Alfons G. Hoekstra
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part IV
DOI: https://doi.org/10.1007/978-3-540-25944-2_71
Year: 2004

SMPC: Singular division of Multipath Power Control tree based routing protocol for Underwater Wireless Sensor Networks.

Authors: Muhammad Sajid , Ayesha Hussain Khan , Saba Gull , Kamran Khan , Muhammad Imran 0001 , Nadeem Javaid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/IWCMC.2017.7986530
Year: 2017

Towards an Architecture for Mobility Management and Resource Control.

Authors: Imed Lassoued , Jean-Marie Bonnin , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings
DOI: https://doi.org/10.1109/WCNC.2008.498
Year: 2008

Noise Effect on Arabic Alphadigits in Automatic Speech Recognition.

Authors: Yousef Alotaibi , Khondaker Mamun , Muhammad Ghulam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2009 International Conference on Image Processing, Computer Vision, & Pattern Recognition, IPCV 2009, July 13-16, 2009, Las Vegas, Nevada, USA, 2 Volumes
DOI: Not available
Year: 2009

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem.

Authors: Mohamed Hamdy Eldefrawy , Muhammad Khurram Khan , Khaled Alghathbar , Eun-suk Cho
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s100908683
Year: 2010

An Efficient Key Management Technique for the Internet of Things.

Authors: Tamanna Tabassum , S. K. Alamgir Hossain , Md. Anisur Rahman , Mohammed F. Alhamid , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s20072049
Year: 2020

Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility.

Authors: Mariam Akbar , Nadeem Javaid , Ayesha Hussain Khan , Muhammad Imran 0001 , Muhammad Shoaib 0005 , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s16030404
Year: 2016

Building Dynamic Communities of Interest for Internet of Things in Smart Cities.

Authors: Monira N. Aldelaimi , Mohammad Anwar Hossain , Mohammed F. Alhamid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s20102986
Year: 2020

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks.

Authors: Xianfeng Guo , Jiashu Zhang , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s110201607
Year: 2011

More efficient key-hash based fingerprint remote authentication scheme using mobile device.

Authors: Muhammad Khurram Khan , Saru Kumari , Mridul Kumar Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. journal
DOI: https://doi.org/10.1007/s00607-013-0308-2
Year: 2014

A two-stage approach for task and resource management in multimedia cloud environment.

Authors: Biao Song , Mohammad Mehedi Hassan , Atif Alamri , Abdulhameed Alelaiwi , Yuan Tian 0003 , Mukaddim Pathan , Ahmad Almogren
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. journal
DOI: https://doi.org/10.1007/s00607-014-0411-z
Year: 2016

Improving Vehicular Authentication in VANET Using.

Authors: Rasha Al-Mutiri , Mznah Al-Rodhaan , Yuan Tian 0003
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Commun. Networks Inf. Secur. journal
DOI: Not available
Year: 2018

Autonomous Driving Cars in Smart Cities: Recent Advances, Requirements, and Challenges.

Authors: Ibrar Yaqoob , Latif U. Khan , S. M. Ahsan Kazmi , Muhammad Imran 0001 , Nadra Guizani , Choong Seon Hong
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.2019.1900120
Year: 2020

Relative scale method to locate an object in cluttered environment.

Authors: Md. Saiful Islam 0001 , Andrzej Sluzek
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Image Vis. Comput. journal
DOI: https://doi.org/10.1016/j.imavis.2007.06.001
Year: 2008

Evaluation of State-of-the-Art Paraphrase Identification and Its Application to Automatic Plagiarism Detection.

Authors: Alaa Altheneyan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Pattern Recognit. Artif. Intell. journal
DOI: https://doi.org/10.1142/S0218001420530043
Year: 2020

Interaction of low-temperature surfactant-grown InAs superlattice layers with arsenic precipitates.

Authors: Mohammad Abdulaziz Alduraibi , C. Mitchell , S. Chakraborty , M. Missous
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Microelectron. J. journal
DOI: https://doi.org/10.1016/j.mejo.2008.06.026
Year: 2009

Passive copy move image forgery detection using undecimated dyadic wavelet transform.

Authors: Ghulam Muhammad , Muhammad Hussain , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Digital Investigation journal
DOI: https://doi.org/10.1016/j.diin.2012.04.004
Year: 2012

Culture in the design of mHealth UI.

Authors: Ahmed Housni Alsswey , Hosam Al-Samarraie , Fuad Ali El-Qirem , Ahmed Ibrahim Alzahrani , Osama Alfarraj
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Electron. Libr. journal
DOI: https://doi.org/10.1108/EL-04-2019-0097
Year: 2020

Steerable pyramid transform and local binary pattern based robust face recognition for e-health secured login.

Authors: Abdulhameed Alelaiwi , Wadood Abdul , M. Solaiman Dewan , Mahmoud Migdadi , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Electr. Eng. journal
DOI: https://doi.org/10.1016/j.compeleceng.2016.01.008
Year: 2016

Certificateless searchable public key encryption scheme for mobile healthcare system.

Authors: Mimi Ma , Debiao He , Muhammad Khurram Khan , Jianhua Chen 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Electr. Eng. journal
DOI: https://doi.org/10.1016/j.compeleceng.2017.05.014
Year: 2018

M2M Communications in 5G: State-of-the-Art Architecture, Recent Advances, and Research Challenges.

Authors: Yasir Mehmood , Noman Haider , Muhammad Imran 0001 , Andreas Timm-Giel , Mohsen Guizani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2017.1600559
Year: 2017

Bringing Computation Closer toward the User Network: Is Edge Computing the Solution?

Authors: Ejaz Ahmed 0003 , Arif Ahmed 0001 , Ibrar Yaqoob , Junaid Shuja , Abdullah Gani , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2017.1700120
Year: 2017

Virtual Caregiver: An Ambient-Aware Elderly Monitoring System.

Authors: M. Anwar Hossain 0001 , Dewan Tanvir Ahmed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Inf. Technol. Biomed. journal
DOI: https://doi.org/10.1109/TITB.2012.2203313
Year: 2012

An effective heuristic algorithm for the maximum satisfiability problem.

Authors: Mohamed El-bachir Menai , Mohamed Batouche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Intell. journal
DOI: https://doi.org/10.1007/s10489-006-8514-7
Year: 2006

HColonies: a new hybrid metaheuristic for medical data classification.

Authors: Sarab Al Muhaideb , Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Intell. journal
DOI: https://doi.org/10.1007/s10489-014-0519-z
Year: 2014

A DEMATEL method in identifying design requirements for mobile environments: students' perspectives.

Authors: Ahmed Ibrahim Alzahrani , Hosam Al-Samarraie , Atef Eldenfria , Nasser Alalwan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. High. Educ. journal
DOI: https://doi.org/10.1007/s12528-018-9176-2
Year: 2018

MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.

Authors: Mohamed Guerroumi , Al-Sakib Khan Pathan , Abdelouahid Derhab , Nadjib Badache , Samira Moussaoui
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Personal Communications journal
DOI: https://doi.org/10.1007/s11277-016-3726-6
Year: 2017

Cloud-supported framework for patients in post-stroke disability rehabilitation.

Authors: M. Shamim Hossain , Mohamad Hoda , Ghulam Muhammad , Ahmad Almogren , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telematics Informatics journal
DOI: https://doi.org/10.1016/j.tele.2017.12.001
Year: 2018

Self-attention based recurrent convolutional neural network for disease prediction using healthcare data.

Authors: Mohd Usama , Belal Ahmad , Wenjing Xiao , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Methods Programs Biomed. journal
DOI: https://doi.org/10.1016/j.cmpb.2019.105191
Year: 2020

Chaos-based secure satellite imagery cryptosystem.

Authors: Muhammad Usama , Muhammad Khurram Khan , Khaled Alghathbar , Changhoon Lee
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Math. Appl. journal
DOI: https://doi.org/10.1016/j.camwa.2009.12.033
Year: 2010

Context-Aware Broadcast in Duty-Cycled Wireless Sensor Networks.

Authors: Imen Jemili , Dhouha Ghrab , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Semantic Web Inf. Syst. journal
DOI: https://doi.org/10.4018/IJSWIS.2017070103
Year: 2017

Named Data Networking: A Promising Architecture for the Internet of Things (IoT).

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Semantic Web Inf. Syst. journal
DOI: https://doi.org/10.4018/IJSWIS.2018040105
Year: 2018

Improving Data Management in a Distributed Environment.

Authors: Hassan Ismail Abdalla
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Digit. Inf. Manag. journal
DOI: Not available
Year: 2011

A Static Attribute-Based Partitioning Algorithm (SAPA) for Vertical Fragmentation Problem in DDBs.

Authors: Hassan Ismail Abdalla , Eltayeb Abuelyaman , Farhi Marir
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2007, Las Vegas, Nevada, USA, June 25-28, 2007, Volume 2
DOI: Not available
Year: 2007

Analyzing the Suitability of Cloud-Based Multimedia Surveillance Systems.

Authors: M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, HPCC/EUC 2013, Zhangjiajie, China, November 13-15, 2013
DOI: https://doi.org/10.1109/HPCC.and.EUC.2013.96
Year: 2013

Efficient localization approach for large scale wireless sensor networks.

Authors: Badia Bouhdid , Wafa Akkari , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2017 IEEE International Conference on Computational Photography, ICCP 2017, Stanford, CA, USA, May 12-14, 2017
DOI: https://doi.org/10.1109/ICCP.2017.8117044
Year: 2017

Energy-aware cooperative localization approach for wireless sensor networks.

Authors: Badia Bouhdid , Wafa Akkari , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2017 IEEE International Conference on Computational Photography, ICCP 2017, Stanford, CA, USA, May 12-14, 2017
DOI: https://doi.org/10.1109/ICCP.2017.8117043
Year: 2017

Replacing the Monolithic LOM: A Folksonomic Approach.

Authors: Hend S. Al-Khalifa , Hugh C. Davis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, ICALT 2007, Niigata, Japan, July 18-20, 2007
DOI: http://doi.ieeecomputersociety.org/10.1109/ICALT.2007.216
Year: 2007

Using NAO Humanoid Robot in Kindergarten: A Proposed System.

Authors: Atheer Alkhalifah , Bashayer Alsalman , Deema Alnuhait , Ohoud Meldah , Sara Aloud , Hend S. Al-Khalifa , Hind M. Al-Otaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 15th IEEE International Conference on Advanced Learning Technologies, ICALT 2015, Hualien, Taiwan, July 6-9, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/ICALT.2015.17
Year: 2015

Video codec incorporating block-based multihypothesis motion-compensated prediction.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Visual Communications and Image Processing 2000, Perth, Australia, June 20, 2000
DOI: Not available
Year: 2000

Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing.

Authors: Lu Leng , Gang Liu , Ming Li , Muhammad Khurram Khan , Ali M. Al-Khouri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, NV, USA, April 7-9, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ITNG.2014.18
Year: 2014

Ultra-wideband applicator for brain-tumor ablation and imaging system.

Authors: Ibrahim Elshafiey , Abdel-Fattah Sheta , Zeeshan Siddiqui , Majeed Alkanhal
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2012, Ho Chi Minh City, Vietnam, December 12-15, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/ISSPIT.2012.6621306
Year: 2012

Preliminary Arabic speech emotion classification.

Authors: Ali H. Meftah , Sid-Ahmed Selouani , Yousef Ajami Alotaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2014, Noida, India, December 15-17, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ISSPIT.2014.7300584
Year: 2014

Detecting counterfeit-money using RFID-enabled mobile devices.

Authors: Mohamed Hamdy Eldefrawy , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012
DOI: Not available
Year: 2012

A proposed indoor navigation system for blind individuals.

Authors: Mai A. Al-Ammar , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2011 - The 13th International Conference on Information Integration and Web-based Applications and Services, 5-7 December 2011, Ho Chi Minh City, Vietnam
DOI: https://doi.org/10.1145/2095536.2095647
Year: 2011

Towards the measurement of Arabic Weblogs credibility automatically.

Authors: Rasha M. BinSultan Al-Eidan , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia
DOI: https://doi.org/10.1145/1806338.1806455
Year: 2009

Exploring political activities in the Saudi Twitterverse.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2011 - The 13th International Conference on Information Integration and Web-based Applications and Services, 5-7 December 2011, Ho Chi Minh City, Vietnam
DOI: https://doi.org/10.1145/2095536.2095604
Year: 2011

Querying Web Forms and Nested Semi-structured Data.

Authors: Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: Not available
Year: 2005

Pitch-Synchronous ZCPA (PS-ZCPA)-Based Feature Extraction with Auditory Masking.

Authors: Muhammad Ghulam , Takashi Fukuda , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ICASSP.2005.1415164
Year: 2005

A Multi-Agent Case-Based Reasoning Architecture for Phishing Detection.

Authors: Hassan Y. A. Abutair , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, July 24-26, 2017, Leuven, Belgium
DOI: https://doi.org/10.1016/j.procs.2017.06.131
Year: 2017

Multimedia Content Repurposing in Ambient Intelligent Environments.

Authors: M. Shamim Hossain , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey
DOI: http://doi.ieeecomputersociety.org/10.1109/ICDEW.2007.4400972
Year: 2007

MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks.

Authors: Mohamed Guerroumi , Abdelouahid Derhab , Al-Sakib Khan Pathan , Nadjib Badache , Samira Moussaoui
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016
DOI: https://doi.org/10.1109/WCNC.2016.7564842
Year: 2016

An architecture design of a VSAT satellite network for multimedia on demand services.

Authors: Sami S. Al-Wakeel , Mohammed M. Al-Wakeel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2000 IEEE Wireless Communications and Networking Conference, WCNC 2000, Chicago, IL, USA, September 23-28, 2000
DOI: https://doi.org/10.1109/WCNC.2000.903959
Year: 2000

Optimal Battery Energy Storage Placement in Highly PV - Penetrated Distribution Networks.

Authors: Ahmed Alzahrani 0001 , Hussain Alharthi , Muhammad Khalid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2020, Washington, DC, USA, February 17-20, 2020
DOI: https://doi.org/10.1109/ISGT45199.2020.9087725
Year: 2020

Investigating Arabic Speakers' Emotions Using Speech Rhythm Metrics.

Authors: Ali H. Meftah , Yousef Alotaibi , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2017 European Modelling Symposium (EMS), Manchester, United Kingdom, November 20-21, 2017
DOI: https://doi.org/10.1109/EMS.2017.23
Year: 2017

KSU Speech Database: Text Selection, Recording and Verification.

Authors: Mansour Alsulaiman , Zulfiqar Ali , Ghulam Muhammad , Mohamed Ajami Bencherif , Awais Mahmood
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh UKSim/AMSS European Modelling Symposium, EMS 2013, 20-22 November, 2013, Manchester UK
DOI: https://doi.org/10.1109/EMS.2013.41
Year: 2013

Towards a better understanding of the it program at a female saudi university.

Authors: Hend S. Al-Khalifa , Nadia S. Al-Ghreimil , Maha M. Al-Yahya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 9th Conference on Information Technology Education, SIGITE 2008, Cincinnati, OH, USA, October 16-18, 2008
DOI: https://doi.org/10.1145/1414558.1414602
Year: 2008

Technologies Developed for Older Adults: Trends and Directions.

Authors: Hend S. Al-Khalifa , Manahel Al-Twaim , Moneerah Al-Mohsin , Muna S. Al-Razgan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HCI International 2014 - Posters' Extended Abstracts - International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-07854-0_49
Year: 2014

Multi-Objective Optimisation Problems: A Symbolic Algorithm for Performance Measurement of Evolutionary Computing Techniques.

Authors: Sameh S. Askar , Ashutosh Tiwari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Evolutionary Multi-Criterion Optimization, 5th International Conference, EMO 2009, Nantes, France, April 7-10, 2009. Proceedings
DOI: https://doi.org/10.1007/978-3-642-01020-0_17
Year: 2009

Two Connected Dominating Set Algorithms for Wireless Sensor Networks.

Authors: Najla Al-Nabhan , Bowu Zhang , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Algorithms, Systems, and Applications - 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012. Proceedings
DOI: https://doi.org/10.1007/978-3-642-31869-6_62
Year: 2012

ELS: Energy-Aware Some-for-Some Location Service for Ad Hoc Mobile Networks.

Authors: Abdelouahid Derhab , Nadjib Badache , Karim Tari , Sihem Sami
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings
DOI: https://doi.org/10.1007/11814856_24
Year: 2006

Automatic Generation of Semantic Features and Lexical Relations Using OWL Ontologies.

Authors: Maha M. Al-Yahya , Hend S. Al-Khalifa , Alia Bahanshal , Iman Al-Odah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Natural Language Processing and Information Systems - 16th International Conference on Applications of Natural Language to Information Systems, NLDB 2011, Alicante, Spain, June 28-30, 2011. Proceedings
DOI: https://doi.org/10.1007/978-3-642-22327-3_3
Year: 2011

An efficient QRS detection method for ECG signal captured from fingers.

Authors: Md. Saiful Islam 0001 , Naif Alajlan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 IEEE International Conference on Multimedia and Expo Workshops, San Jose, CA, USA, July 15-19, 2013
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2013.6618388
Year: 2013

Correlation-Free MultiPath Routing for Multimedia Traffic in Wireless Sensor Networks.

Authors: Dhouha Ghrab , Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ad-hoc, Mobile, and Wireless Networks - 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings
DOI: https://doi.org/10.1007/978-3-319-67910-5_23
Year: 2017

MTM-MAC: Medical Traffic Management MAC Protocol for Handling Healthcare Applications in WBANs.

Authors: Rim Negra , Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ad-Hoc, Mobile, and Wireless Networks - 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1-3, 2019, Proceedings
DOI: https://doi.org/10.1007/978-3-030-31831-4_33
Year: 2019

Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.

Authors: Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ad-hoc, Mobile and Wireless Networks, 7th International Conference, ADHOC-NOW 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings
DOI: https://doi.org/10.1007/978-3-540-85209-4_32
Year: 2008

Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'.

Authors: Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
DOI: https://doi.org/10.1007/978-3-642-13577-4_5
Year: 2010

A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks.

Authors: Abdelouahid Derhab , Nadjib Badache , Abdelmadjid Bouabdallah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2nd International Conference on Wireless on Demand Network Systems and Service (WONS 2005), 19-21 January 2005, St. Moritz, Switzerland
DOI: http://doi.ieeecomputersociety.org/10.1109/WONS.2005.1
Year: 2005

VANETs Routing Protocols Survey: Classifications, Optimization Methods and New Trends.

Authors: Chahrazed Ksouri , Imen Jemili , Mohamed Mosbah , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/978-3-030-40131-3_1
Year: 2019

Copy move image forgery detection method using steerable pyramid transform and texture descriptor.

Authors: Ghulam Muhammad , Muneer H. Al-Hammadi , Muhammad Hussain , Anwar M. Mirza , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013
DOI: https://doi.org/10.1109/EUROCON.2013.6625188
Year: 2013

Graph-Based Multi-Document Summarization: An Initial Investigation.

Authors: Asma Bader Al-Saleh , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Research and Development in Intelligent Systems XXXII - Incorporating Applications and Innovations in Intelligent Systems XXIII. Proceedings of AI-2015, The Thirty-Fifth SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, Cambridge, UK, December 15-17, 2015
DOI: https://doi.org/10.1007/978-3-319-25032-8_13
Year: 2015

Ant Colony System for Multi-Document Summarization.

Authors: Asma Bader Al-Saleh , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 27th International Conference on Computational Linguistics, COLING 2018, Santa Fe, New Mexico, USA, August 20-26, 2018
DOI: Not available
Year: 2018

An ontological model for representing computational lexicons a componential based approach.

Authors: Maha M. Al-Yahya , Hend S. Al-Khalifa , Alia Bahanshal , Iman Alodah 0001 , Nawal Al-Helwah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, NLPKE 2010, Beijing, China, August 21-23, 2010
DOI: https://doi.org/10.1109/NLPKE.2010.5587768
Year: 2010

Semi-structured and unstructured data aggregation scheduling in wireless sensor networks.

Authors: Miloud Bagaa , Abdelouahid Derhab , Noureddine Lasla , Abdelraouf Ouadjaout , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012
DOI: https://doi.org/10.1109/INFCOM.2012.6195676
Year: 2012

Quality of Clustering in Mobile Ad Hoc Networks.

Authors: Mohamed Aissa , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies (ANT 2014), the 4th International Conference on Sustainable Energy Information Technology (SEIT-2014), Hasselt, Belgium, June 2-5, 2014
DOI: https://doi.org/10.1016/j.procs.2014.05.421
Year: 2014

New Strategies and Extensions in Weighted Clustering Algorithms for Mobile Ad Hoc Networks.

Authors: Mohamed Aissa , Abdelfettah Belghith , Khalil Drira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013
DOI: https://doi.org/10.1016/j.procs.2013.06.042
Year: 2013

A Node Quality based Clustering Algorithm in Wireless Mobile Ad Hoc Networks.

Authors: Mohamed Aissa , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 5th International Conference on Ambient Systems, Networks and Technologies (ANT 2014), the 4th International Conference on Sustainable Energy Information Technology (SEIT-2014), Hasselt, Belgium, June 2-5, 2014
DOI: https://doi.org/10.1016/j.procs.2014.05.412
Year: 2014

Using Case-Based Reasoning for Phishing Detection.

Authors: Hassan Y. A. Abutair , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th International Conference on Ambient Systems, Networks and Technologies (ANT 2017) / The 7th International Conference on Sustainable Energy Information Technology (SEIT 2017), 16-19 May 2017, Madeira, Portugal
DOI: https://doi.org/10.1016/j.procs.2017.05.352
Year: 2017

Wireless Body Area Networks: Applications and Technologies.

Authors: Rim Negra , Imen Jemili , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) / The 6th International Conference on Sustainable Energy Information Technology (SEIT-2016) / Affiliated Workshops, May 23-26, 2016, Madrid, Spain
DOI: https://doi.org/10.1016/j.procs.2016.04.266
Year: 2016

Threat-based evaluation for context-aware multimedia surveillance system.

Authors: Yuan Tian 0003 , Biao Song , Mznah Al-Rodhaan , Abdullah Al-Dhelaan , Eui-Nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC '14, Siem Reap, Cambodia - January 09 - 11, 2014
DOI: https://doi.org/10.1145/2557977.2558000
Year: 2014

Increasing high school girls awareness of computer science through summer camp.

Authors: Masheal Al-Duwis , Hend S. Al-Khalifa , Muna S. Al-Razgan , Nora I. Al-Rajebah , Afnan A. Al-Subaihin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Global Engineering Education Conference, EDUCON 2013, Berlin, Germany, March 13-15, 2013
DOI: https://doi.org/10.1109/EduCon.2013.6530111
Year: 2013

Investigating the impact of phonetic cross language modeling on Arabic and English speech recognition.

Authors: Yousef Ajami Alotaibi , Ali H. Meftah , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2014, Manchester, UK, July 23-25, 2014
DOI: https://doi.org/10.1109/CSNDSP.2014.6923896
Year: 2014

Efficient low-bit-rate adaptive mesh-based motion compensation technique.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Visual Information Processing X, Orlando, FL, USA, April 16, 2001
DOI: https://doi.org/10.1117/12.438252
Year: 2001

An Evaluation of Local Image Features for Object Class Recognition.

Authors: Md. Saiful Islam 0001 , Andrzej Sluzek
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010 - Volume 2
DOI: Not available
Year: 2010

Ad Hoc Networks Routing Protocols and Mobility.

Authors: Djamel Djenouri , Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. Arab J. Inf. Technol. journal
DOI: Not available
Year: 2006

Environment recognition for digital audio forensics using MPEG-7 and mel cepstral features.

Authors: Ghulam Muhammad , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. Arab J. Inf. Technol. journal
DOI: Not available
Year: 2013

Intrinsic authentication of multimedia objects using biometric data manipulation.

Authors: Maqsood Mahmud , Muhammad Khurram Khan , Khaled Alghathbar , Abdul Hanan Abdullah , Mohammad Yazid Bin Idris
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. Arab J. Inf. Technol. journal
DOI: Not available
Year: 2012

Cyber security using arabic captcha scheme.

Authors: Bilal Khan , Khaled Alghathbar , Muhammad Khurram Khan , Abdullah M. AlKelabi , Abdulaziz Alajaji
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. Arab J. Inf. Technol. journal
DOI: Not available
Year: 2013

Edge computing framework for enabling situation awareness in IoT based smart city.

Authors: S. K. Alamgir Hossain , Md. Anisur Rahman , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Parallel Distributed Comput. journal
DOI: https://doi.org/10.1016/j.jpdc.2018.08.009
Year: 2018

An autonomous stereovision-based navigation system (ASNS) for mobile robots.

Authors: Khalid Al Mutib , Mohammed Faisal , Muhammad Emaduddin , Mohammed Arafah , Mansour Alsulaiman , Mohamed Mekhtiche , Ramdane Hedjar , Hassan Mathkour , Mohammed Algabri , Mohamed Ajami Bencherif
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Intell. Serv. Robotics journal
DOI: https://doi.org/10.1007/s11370-016-0194-5
Year: 2016

Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions.

Authors: Ikram Ud Din , Suhaidi Hassan , Muhammad Khurram Khan , Mohsen Guizani , Osman Ghazali , Adib Habbal
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Commun. Surv. Tutorials journal
DOI: https://doi.org/10.1109/COMST.2017.2787609
Year: 2018

Optimized Gabor features for mass classification in mammography.

Authors: Salabat Khan , Muhammad Hussain , Hatim Aboalsamh , Hassan Mathkour , George Bebis , Mohammed Zakariah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Soft Comput. journal
DOI: https://doi.org/10.1016/j.asoc.2016.04.012
Year: 2016

Evolutionary Face Recognition using Principle Components Analysis.

Authors: Hatim A. Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Egypt. Comput. Sci. J. journal
DOI: Not available
Year: 2009

Effect of articulatory Δ and ΔΔ parameters on multilayer neural network based speech recognition.

Authors: Manoj Banik , Mohammed Rokibul Alam Kotwal , Foyzul Hassan , Gazi Md. Moshfiqul Islam , Sharif Mohammad Musfiqur Rahman , Mohammad Mahedi Hasan , Ghulam Muhammad , Mohammad Nurul Huda
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2010, Kuala Lumpur, Malaysia, December 6-9, 2010
DOI: https://doi.org/10.1109/APCCAS.2010.5775027
Year: 2010

Bangla triphone HMM based word recognition.

Authors: Mohammad Mahedi Hasan , Foyzul Hassan , Gazi Md. Moshfiqul Islam , Manoj Banik , Mohammed Rokibul Alam Kotwal , Sharif Mohammad Musfiqur Rahman , Ghulam Muhammad , Mohammad Nurul Huda
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2010, Kuala Lumpur, Malaysia, December 6-9, 2010
DOI: https://doi.org/10.1109/APCCAS.2010.5775010
Year: 2010

A text-to-speech system for Arabic using neural networks.

Authors: Sihem Ben Sassi , Rafik Braham , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Joint Conference Neural Networks, IJCNN 1999, Washington, DC, USA, July 10-16, 1999
DOI: https://doi.org/10.1109/IJCNN.1999.836038
Year: 1999

An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks.

Authors: Momina Moetesum , Fazl-e Hadi , Muhammad Imran 0001 , Abid Ali Minhas , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wirel. Networks journal
DOI: https://doi.org/10.1007/s11276-015-1085-y
Year: 2016

Least fresh first cache replacement policy for NDN-based IoT networks.

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Pervasive Mob. Comput. journal
DOI: https://doi.org/10.1016/j.pmcj.2018.12.002
Year: 2019

STCAPLRS: A Spatial-Temporal Context-Aware Personalized Location Recommendation System.

Authors: Quan Fang , Changsheng Xu , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ACM Trans. Intell. Syst. Technol. journal
DOI: https://doi.org/10.1145/2842631
Year: 2016

ICRA: index based cache replacement algorithm for cloud storage.

Authors: YuWei Zhao , Tinghuai Ma , Yu Hao , Wenhai Shen , Yuan Tian 0003 , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJSNet journal
DOI: https://doi.org/10.1504/IJSNET.2019.097556
Year: 2019

Unmanned aerial vehicle for internet of everything: Opportunities and challenges.

Authors: Yalin Liu , Hong-Ning Dai , Qubeijian Wang , Mahendra K. Shukla , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: https://doi.org/10.1016/j.comcom.2020.03.017
Year: 2020

UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things.

Authors: Yalin Liu , Hong-Ning Dai , Hao Wang 0003 , Muhammad Imran 0001 , Xiaofen Wang , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: https://doi.org/10.1016/j.comcom.2020.03.020
Year: 2020

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.

Authors: Muhammad Khurram Khan , Soo-Kyun Kim , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: https://doi.org/10.1016/j.comcom.2010.02.011
Year: 2011

WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Inf. Sci. journal
DOI: https://doi.org/10.5539/cis.v5n6p73
Year: 2012

Race Classification from Face Images using Local Descriptors.

Authors: Ghulam Muhammad , Muhammad Hussain , Fatmah Alenezy , George Bebis , Anwar M. Mirza , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Artif. Intell. Tools journal
DOI: https://doi.org/10.1142/S0218213012500194
Year: 2012

Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing.

Authors: Abdullah Yousafzai , Ibrar Yaqoob , Muhammad Imran 0001 , Abdullah Gani , Rafidah Md Noor
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Internet Things J. journal
DOI: https://doi.org/10.1109/JIOT.2019.2943176
Year: 2020

An Application Development Framework for Internet-of-Things Service Orchestration.

Authors: Wajid Rafique , Xuan Zhao , Shui Yu , Ibrar Yaqoob , Muhammad Imran 0001 , Wanchun Dou
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Internet Things J. journal
DOI: https://doi.org/10.1109/JIOT.2020.2971013
Year: 2020

Detection of Voice Pathology using Fractal Dimension in a Multiresolution Analysis of Normal and Disordered Speech Signals.

Authors: Zulfiqar Ali , Irraivan Elamvazuthi , Mansour Alsulaiman , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-015-0392-2
Year: 2016

Date Fruit Classification for Robotic Harvesting in a Natural Environment Using Deep Learning.

Authors: Hamdi Altaheri , Mansour Alsulaiman , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2936536
Year: 2019

Speaker Identification in Different Emotional States in Arabic and English.

Authors: Ali Hamid Meftah , Hassan Mathkour , Said Kerrache , Yousef Ajami Alotaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2983029
Year: 2020

The Internet of Things: A Review of Enabled Technologies and Future Challenges.

Authors: Ikram Ud Din , Mohsen Guizani , Suhaidi Hassan , Byung-Seo Kim , Muhammad Khurram Khan , Mohammed Atiquzzaman , Syed Hassan Ahmed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2886601
Year: 2019

Credibility in Online Social Networks: A Survey.

Authors: Majed A. AlRubaian , Muhammad Al-Qurishi , Atif Alamri , Mabrook Al-Rakhami , Mohammad Mehedi Hassan , Giancarlo Fortino
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2886314
Year: 2019

Toward Designing a Li-Fi-Based Hierarchical IoT Architecture.

Authors: Lamia Al-Braheem , Lamia H. Alhudaithy , Afnan A. Aljaser , Muneerah R. Aldhafian , Ghada M. Bahliwah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2857627
Year: 2018

Automatic Seizure Detection in a Mobile Multimedia Framework.

Authors: Ghulam Muhammad , Mehedi Masud , Syed Umar Amin , Roobaea Alroobaea , Mohammed F. Alhamid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2859267
Year: 2018

Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models.

Authors: Basil AsSadhan , Khan Zeb , Jalal Al-Muhtadi , Saleh AlShebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2689001
Year: 2017

A Deep Learning Model Based on Concatenation Approach for the Diagnosis of Brain Tumor.

Authors: Neelum Noreen , Sellappan Palaniappan , Abdul Qayyum , Iftikhar Ahmad 0006 , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2978629
Year: 2020

Radix Path: A Reduced Bucket Size ORAM for Secure Cloud Storage.

Authors: Kholoud Al-Saleh , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2925789
Year: 2019

Reliable Path Selection and Opportunistic Routing Protocol for Underwater Wireless Sensor Networks.

Authors: Muhammad Ismail , Mazhar Islam , Ibrar Ahmad , Farrukh Aslam Khan , Abdul Baseer Qazi , Zawar H. Khan , Zahid Wadud , Mabrook Al-Rakhami
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2992759
Year: 2020

MLab: A Mobile Language Learning Lab System for Language Learners.

Authors: Hind M. Al-Otaibi , Reem A. Alamer , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. UCS journal
DOI: Not available
Year: 2015

On the Height and Jump Number of Ordered Sets.

Authors: Ahmad Sharary , Nejib Zaguia , Mohammad Alzohairi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Multiple Valued Log. Soft Comput. journal
DOI: Not available
Year: 2016

Cervical cancer classification using convolutional neural networks and extreme learning machines.

Authors: Ahmed Ghoneim , Ghulam Muhammad , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2019.09.015
Year: 2020

Challenge-response-based biometric image scrambling for secure personal identification.

Authors: Muhammad Khurram Khan , Jiashu Zhang , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2010.05.019
Year: 2011

Edge-centric multimodal authentication system using encrypted biometric templates.

Authors: Zulfiqar Ali , M. Shamim Hossain , Ghulam Muhammad , Ihsan Ullah , Hamid R. Abachi , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.02.040
Year: 2018

Deep convolutional tree networks.

Authors: Abduljawad A. Amory , Ghulam Muhammad , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2019.06.010
Year: 2019

A biometric identity-based signcryption scheme.

Authors: Fagen Li , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2010.11.004
Year: 2012

PCAPooL: unsupervised feature learning for face recognition using PCA, LBP, and pyramid pooling.

Authors: Amani A. Alahmadi , Muhammad Hussain , Hatim A. Aboalsamh , Mansour Zuair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Pattern Anal. Appl. journal
DOI: https://doi.org/10.1007/s10044-019-00818-y
Year: 2020

An efficient privacy preserving Pub-Sub system for ubiquitous computing.

Authors: Yuan Tian 0003 , Biao Song , Mohammad Mehedi Hassan , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Ad Hoc Ubiquitous Comput. journal
DOI: https://doi.org/10.1504/IJAHUC.2013.051374
Year: 2013

An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks.

Authors: Muhammad Khurram Khan , Saru Kumari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2014/347169
Year: 2014

A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.

Authors: Mohammed B. Abazeed , Kashif Saleem , Abdelouahid Derhab , Mehmet A. Orgun , Norsheila Binti Fisal , Jalal Al-Muhtadi , Suleiman Zubair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/524038
Year: 2015

Combined dynamic multi-feature and rule-based behavior for accurate malware detection.

Authors: Mohamed Belaoued , Abdelaziz Boukellal , Mohamed Amir Koalal , Abdelouahid Derhab , Smaine Mazouzi , Farrukh Aslam Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1177/1550147719889907
Year: 2019

Energy-efficient scheme for target recognition and localization in wireless acoustic sensor networks.

Authors: Afnan Algobail , Adel Soudani , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1177/1550147719891406
Year: 2019

PS-ZCPA Based Feature Extraction with Auditory Masking, Modulation Enhancement and Noise Reduction for Robust ASR.

Authors: Muhammad Ghulam , Takashi Fukuda , Kouichi Katsurada , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1093/ietisy/e89-d.3.1015
Year: 2006

Low-Complexity Subband Encoding for HDTV Images.

Authors: Naresh Coppisetti , Subhash C. Kwatra , Awad Kh. Al-Asmari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE J. Sel. Areas Commun. journal
DOI: https://doi.org/10.1109/49.210546
Year: 1993

Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system.

Authors: Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cluster Computing journal
DOI: https://doi.org/10.1007/s10586-015-0439-7
Year: 2015

A parameter based growing ensemble of self-organizing maps for outlier detection in healthcare.

Authors: Samir Elmougy , M. Shamim Hossain , Ahmed S. Tolba , Mohammed F. Alhamid , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cluster Computing journal
DOI: https://doi.org/10.1007/s10586-017-1327-0
Year: 2019

HLPSP: A Hybrid Live P2P Streaming Protocol.

Authors: Chourouk Hammami , Imen Jemili , Achraf Gazdar , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2015.03.011
Year: 2015

A new video compression algorithm for different videoconferencing standards.

Authors: Awad Kh. Al-Asmari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Netw. Manag. journal
DOI: https://doi.org/10.1002/nem.455
Year: 2003

Short-term MPEG-4 video traffic prediction using ANFIS.

Authors: Adel Abdennour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Netw. Manag. journal
DOI: http://doi.acm.org/10.1145/1110969.1110971
Year: 2005

VBR video traffic modeling and synthetic data generation using GA-optimized Volterra filters.

Authors: Adel Abdennour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Netw. Manag. journal
DOI: https://doi.org/10.1002/nem.620
Year: 2007

Artificially intelligent recognition of Arabic speaker using voice print-based local features.

Authors: Awais Mahmood , Mansour Alsulaiman , Ghulam Muhammad , Sheeraz Akram
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Exp. Theor. Artif. Intell. journal
DOI: https://doi.org/10.1080/0952813X.2015.1055827
Year: 2016

Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.

Authors: SK Hafizul Islam , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.2847
Year: 2016

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.

Authors: Min Luo , Yunru Zhang , Muhammad Khurram Khan , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.3333
Year: 2017

An efficient chaos-based 2-party key agreement protocol with provable security.

Authors: Min Luo , Yunru Zhang , Muhammad Khurram Khan , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.3288
Year: 2017

Revisiting distinctive phonetic features from applied computing perspective: unifying views and analyzing modern Arabic speech varieties.

Authors: Yasser M. Seddiq , Yousef Alotaibi , Ali H. Meftah , Sid-Ahmed Selouani , Mansour Al-Ghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Speech Technol. journal
DOI: https://doi.org/10.1007/s10772-018-9548-z
Year: 2018

Acoustic quality normalization for robust automatic speech recognition.

Authors: Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Speech Technol. journal
DOI: https://doi.org/10.1007/s10772-009-9024-x
Year: 2007

Audio-Visual Emotion Recognition Using Big Data Towards 5G.

Authors: M. Shamim Hossain , Ghulam Muhammad , Mohammed F. Alhamid , Biao Song , Khalid N. Al-Mutib
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-016-0685-9
Year: 2016

Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards.

Authors: Xiaomin Wang , Wenfang Zhang , Jiashu Zhang , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Stand. Interfaces journal
DOI: https://doi.org/10.1016/j.csi.2006.11.005
Year: 2007

Improving the security of 'a flexible biometrics remote user authentication scheme'.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Stand. Interfaces journal
DOI: https://doi.org/10.1016/j.csi.2006.01.002
Year: 2007

Cryptanalysis of classical ciphers with ant algorithms.

Authors: Tahar Mekhaznia , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJMHeur journal
DOI: https://doi.org/10.1504/IJMHEUR.2014.065159
Year: 2014

Fast Motion Estimation System Using Dynamic Models for H.264/AVC Video Coding.

Authors: Yasser Ismail , Jason McNeely , Mohsen Shaaban , Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Circuits Syst. Video Techn. journal
DOI: https://doi.org/10.1109/TCSVT.2011.2148450
Year: 2012

Detect structural-connected communities based on BSCHEF in C-DBLP.

Authors: Tinghuai Ma , Huan Rong , Changhong Ying , Yuan Tian 0003 , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Concurr. Comput. Pract. Exp. journal
DOI: https://doi.org/10.1002/cpe.3437
Year: 2016

Reducing Power Consumption in Wireless Body Area Networks: A Novel Data Segregation and Classification Technique.

Authors: Akande Sheriff Abiodun , Mohammad Hossein Anisi , Ihsan Ali , Adnan Akhunzada , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Consumer Electron. Mag. journal
DOI: https://doi.org/10.1109/MCE.2017.2715518
Year: 2017

An educational tool for generating inaccessible page examples based on WCAG 2.0 failures.

Authors: Atheer S. Al-Khalifa , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Cross-Disciplinary Conference on Web Accessibility, W4A 2011, Hyderabad, Andhra Pradesh, India, March 28-29, 2011
DOI: https://doi.org/10.1145/1969289.1969328
Year: 2011

A Two-Phase Backbone-Based Search Heuristic for Partial MAX-SAT - An Initial Investigation.

Authors: Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2005, Bari, Italy, June 22-24, 2005, Proceedings
DOI: https://doi.org/10.1007/11504894_94
Year: 2005

Rhythm-based heartbeat duration normalization for atrial fibrillation detection.

Authors: Md. Saiful Islam 0001 , Nassim Ammour , Naif Alajlan , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comp. in Bio. and Med. journal
DOI: https://doi.org/10.1016/j.compbiomed.2016.03.015
Year: 2016

A Novel Multicast Algorithm for Collaborative Multimedia Applications in Heterogeneous Networks.

Authors: Abdelfettah Belghith , Mohamed Aissa , Adel Ben Mnaouer
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012
DOI: https://doi.org/10.1016/j.procs.2012.06.022
Year: 2012

Emotion recognition using secure edge and cloud computing.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Sci. journal
DOI: https://doi.org/10.1016/j.ins.2019.07.040
Year: 2019

Privacy-preserving based task allocation with mobile edge clouds.

Authors: Yongfeng Qian , Yingying Jiang , M. Shamim Hossain , Long Hu , Ghulam Muhammad , Syed Umar Amin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Sci. journal
DOI: https://doi.org/10.1016/j.ins.2019.07.092
Year: 2020

On the Security of a RSA-based Certificateless Signature Scheme.

Authors: Debiao He , Muhammad Khurram Khan , Shuhua Wu
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: I. J. Network Security journal
DOI: Not available
Year: 2014

The next generation of language labs: Can mobiles help? A case study.

Authors: Hind M. Al-Otaibi , Reem A. Alamer , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2016.02.028
Year: 2016

Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society.

Authors: Kashif Saleem , Abdelouahid Derhab , Jalal Al-Muhtadi , Basit Shahzad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2014.10.010
Year: 2015

Word sense disambiguation using evolutionary algorithms - Application to Arabic language.

Authors: Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2014.06.021
Year: 2014

An emerging - Social and emerging computing enabled philosophical paradigm for collaborative learning systems: Toward high effective next generation learning systems for the knowledge society.

Authors: Miltiadis D. Lytras , Hassan I. Mathkour , Hassan Ismail Abdalla , Wadee Al-Halabi , Cornelio Yáñez-Márquez , Sean Wolfgand Matsui Siqueira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2015.06.004
Year: 2015

A synchronized design technique for efficient data distribution.

Authors: Hassan Ismail Abdalla
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2013.04.025
Year: 2014

Automatic Speaker Recognition for Mobile Forensic Applications.

Authors: Mohammed Algabri , Hassan Mathkour , Mohamed Ajami Bencherif , Mansour Alsulaiman , Mohamed Mekhtiche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mobile Information Systems journal
DOI: https://doi.org/10.1155/2017/6986391
Year: 2017

A recursive visual query language for XML data.

Authors: Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/17440081111165893
Year: 2011

A First Step towards Understanding Saudi Political Activities on Twitter.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/17440081211282883
Year: 2012

Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges.

Authors: Yalin Liu , Hong-Ning Dai , Qubeijian Wang , Mahendra K. Shukla , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2020

An Automated System for Epilepsy Detection using EEG Brain Signals based on Deep Learning Approach.

Authors: Ihsan Ullah , Muhammad Hussain , Emad-ul-Haq Qazi , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2018

Wireless Sensor Networks Security: State of the Art.

Authors: Mabrook Al-Rakhami , Saleh Almowuena
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2018

An Efficient Intelligent System for the Classification of Electroencephalography (EEG) Brain Signals using Nuclear Features for Human Cognitive Tasks.

Authors: Emad-ul-Haq Qazi , Muhammad Hussain , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

Performance Evaluation of Supervised Machine Learning Techniques for Efficient Detection of Emotions from Online Content.

Authors: Muhammad Zubair Asghar , Fazli Subhan , Muhammad Imran 0001 , Fazal Masud Kundi , Shahaboddin Shamshirband , Amir Mosavi , Peter Csiba , Annamária R. Várkonyi-Kóczy
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

Finding Innovative Design Principles for Multiobjective Optimization Problems.

Authors: Sameh S. Askar , Ashutosh Tiwari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Syst. Man Cybern. Part C journal
DOI: https://doi.org/10.1109/TSMCC.2010.2081666
Year: 2011

Word Sense Disambiguation Using an Evolutionary Approach.

Authors: Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Informatica (Slovenia) journal
DOI: Not available
Year: 2014

Influence of CNF Encodings of AtMost-1 Constraints on UNSAT-based PMSAT Solvers.

Authors: Mohamed El-bachir Menai , Tasniem Nasser Al-Yahya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Informatica (Slovenia) journal
DOI: Not available
Year: 2013

Nonstationary analysis of circuit-switched communication networks.

Authors: Khalid Abdulaziz Alnowibet , Harry G. Perros
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Perform. Evaluation journal
DOI: https://doi.org/10.1016/j.peva.2005.10.001
Year: 2006

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.

Authors: Zhiyan Xu , Libing Wu , Muhammad Khurram Khan , Kim-Kwang Raymond Choo , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Supercomput. journal
DOI: https://doi.org/10.1007/s11227-017-2085-8
Year: 2017

An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols.

Authors: Amine Dhraief , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Smart CR journal
DOI: https://doi.org/10.6029/smartcr.2012.01.001
Year: 2012

Performance analysis of Centralized, Distributed and Hybrid Demand Load Control architecture for Smart power Grid.

Authors: Sami S. Al-Wakeel , Musaed A. Alhussein , Muhammad Ammad-uddin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Smart CR journal
DOI: https://doi.org/10.6029/smartcr.2012.05.007
Year: 2012

Autonomous and adaptive beaconing strategy for multi-interfaced wireless mobile nodes.

Authors: Rafaa Tahar , Amine Dhraief , Abdelfettah Belghith , Hassan Mathkour , Rafik Braham
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Communications and Mobile Computing journal
DOI: https://doi.org/10.1002/wcm.2638
Year: 2016

FPGA design, simulation and prototyping of a high speed 32-bit pipeline multiplier based on Vedic mathematics.

Authors: Shuja Ahmad Abbasi , Zulhelmi , Abdul Rahman M. Alamoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Electronic Express journal
DOI: https://doi.org/10.1587/elex.12.20150450
Year: 2015

Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems".

Authors: Muhammad Khurram Khan , Saru Kumari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.791
Year: 2014

An enhanced privacy preserving remote user authentication scheme with provable security.

Authors: Shehzad Ashraf Chaudhry , Mohammad Sabzinejad Farash , Husnain Naqvi , Saru Kumari , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.1299
Year: 2015

Wireless and mobile sensing technologies for the future Internet.

Authors: Abdelouahid Derhab , Mohamed Guerroumi , Mohamed F. Younis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ann. des Télécommunications journal
DOI: https://doi.org/10.1007/s12243-017-0570-y
Year: 2017

A novel framework for G/M/1 queuing system based on scheduling-cum-polling mechanism to analyze multiple classes of self-similar and LRD traffic.

Authors: Mohsin Iftikhar , Hassan Mathkour , Muhammad Imran 0001 , Abdullah Bedaiwi , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wirel. Networks journal
DOI: https://doi.org/10.1007/s11276-015-1001-5
Year: 2016

From traditional learning into mobile learning in education at the university level: undergraduate students perspective.

Authors: Mohamed Sarrab , Ahmed Alzahrani 0001 , Nasser Alalwan , Osama Alfarraj
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Mob. Learn. Organisation journal
DOI: https://doi.org/10.1504/IJMLO.2014.067014
Year: 2014

Towards wireless sensor networks with enhanced vision capabilities.

Authors: Andrzej Sluzek , Annamalai Palaniappan , Md. Saiful Islam 0001 , Pawel Piotr Czapski
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Annales UMCS, Informatica journal
DOI: Not available
Year: 2006

Grammar checking and relation extraction in text: approaches, techniques and open challenges.

Authors: Nora Madi , Rawan N. Al-Matham , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Data Technol. Appl. journal
DOI: https://doi.org/10.1108/DTA-01-2019-0001
Year: 2019

Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network.

Authors: Sami S. Alwakeel , Mohammad Ilyas
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: Not available
Year: 1995

QoS multicast aggregation under multiple additive constraints.

Authors: Naouel Ben Ali , Abdelfattah Belghith , Joanna Moulierac , Miklós Molnár
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: https://doi.org/10.1016/j.comcom.2008.05.044
Year: 2008

Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components.

Authors: Iftikhar Ahmad 0002 , Muhammad Hussain , Abdullah S. Alghamdi , Abdulhameed Alelaiwi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Neural Computing and Applications journal
DOI: https://doi.org/10.1007/s00521-013-1370-6
Year: 2014

Chaos-cryptography based privacy preservation technique for video surveillance.

Authors: Sk. Md. Mizanur Rahman , M. Anwar Hossain 0001 , Hussein T. Mouftah , Abdulmotaleb El-Saddik , Eiji Okamoto
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multimedia Syst. journal
DOI: https://doi.org/10.1007/s00530-011-0246-9
Year: 2012

Smart healthcare monitoring: a voice pathology detection paradigm for smart cities.

Authors: M. Shamim Hossain , Ghulam Muhammad , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multimedia Syst. journal
DOI: https://doi.org/10.1007/s00530-017-0561-x
Year: 2019

Multimodal fusion for multimedia analysis: a survey.

Authors: Pradeep K. Atrey , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik , Mohan S. Kankanhalli
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multimedia Syst. journal
DOI: https://doi.org/10.1007/s00530-010-0182-0
Year: 2010

Learning Multisensor Confidence Using a Reward-and-Punishment Mechanism.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Instrum. Meas. journal
DOI: https://doi.org/10.1109/TIM.2009.2014507
Year: 2009

Gender Recognition from Face Images with Dyadic Wavelet Transform and Local Binary Pattern.

Authors: Muhammad Hussain , Ihsan Ullah , Hatim A. Aboalsamh , Ghulam Muhammad , George Bebis , Anwar Majid Mirza
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Artif. Intell. Tools journal
DOI: https://doi.org/10.1142/S021821301360018X
Year: 2013

Emotion-Aware Connected Healthcare Big Data Towards 5G.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Internet Things J. journal
DOI: https://doi.org/10.1109/JIOT.2017.2772959
Year: 2018

Deep Deterministic Learning for Pattern Recognition of Different Cardiac Diseases through the Internet of Medical Things.

Authors: Uzair Iqbal , Teh Ying Wah , Muhammad Habib Ur Rehman , Ghulam Mujtaba , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-018-1107-2
Year: 2018

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.

Authors: Dheerendra Mishra , Sourav Mukhopadhyay , Saru Kumari , Muhammad Khurram Khan , Ankita Chaturvedi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-014-0041-1
Year: 2014

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.

Authors: Dheerendra Mishra , Sourav Mukhopadhyay , Ankita Chaturvedi , Saru Kumari , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-014-0024-2
Year: 2014

Novel One Time Signatures (NOTS): A Compact Post-Quantum Digital Signature Scheme.

Authors: Furqan Shahid , Iftikhar Ahmad 0006 , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2966259
Year: 2020

Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing.

Authors: Abdelouahid Derhab , Mohamed Belaoued , Mohamed Guerroumi , Farrukh Aslam Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2971024
Year: 2020

A New Strategic Risk Reduction For Risk Management.

Authors: Mourad Ykhlef , Danah Algawiaz
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Comput. Intell. Syst. journal
DOI: https://doi.org/10.1080/18756891.2014.960236
Year: 2014

Description of the Orders Which Are Hereditarily Half-reconstructible by Their Comparability Graphs.

Authors: Mohammad Alzohairi , Moncef Bouaziz , Youssef Boudabbous , Ahmad Sharary
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Multiple Valued Log. Soft Comput. journal
DOI: Not available
Year: 2017

Estimating VR Sickness and user experience using different HMD technologies: An evaluation study.

Authors: Andrej Somrak , Iztok Humar , M. Shamim Hossain , Mohammed F. Alhamid , M. Anwar Hossain 0001 , Joze Guna
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.11.041
Year: 2019

Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusion.

Authors: Syed Umar Amin , Mansour Alsulaiman , Ghulam Muhammad , Mohamed Amine Mekhtiche , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2019.06.027
Year: 2019

An efficient event matching system for semantic smart data in the Internet of Things (IoT) environment.

Authors: Noura Alhakbani , Mohammad Mehedi Hassan , Mourad Ykhlef , Giancarlo Fortino
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.12.064
Year: 2019

An intelligent healthcare system for detection and classification to discriminate vocal fold disorders.

Authors: Zulfiqar Ali , M. Shamim Hossain , Ghulam Muhammad , Arun Kumar Sangaiah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.02.021
Year: 2018

Evolutionary computation approaches to the Curriculum Sequencing problem.

Authors: Sarab Al Muhaideb , Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Nat. Comput. journal
DOI: https://doi.org/10.1007/s11047-010-9246-5
Year: 2011

An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.

Authors: Dheerendra Mishra , Saru Kumari , Muhammad Khurram Khan , Sourav Mukhopadhyay
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.2946
Year: 2017

Technology Integration Framework for Fast and Low Cost Handovers - Case Study: WiFi-WiMAX Network.

Authors: Mohamed Kassab , Jean-Marie Bonnin , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Journal Comp. Netw. and Communic. journal
DOI: https://doi.org/10.1155/2010/205786
Year: 2010

Passive detection of image forgery using DCT and local binary pattern.

Authors: Amani A. Alahmadi , Muhammad Hussain , Hatim Aboalsamh , Ghulam Muhammad , George Bebis , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Signal, Image and Video Processing journal
DOI: https://doi.org/10.1007/s11760-016-0899-0
Year: 2017

A real time leaky bucket based admission control scheme for VoIP networks.

Authors: Sami S. Alwakeel , Shaker S. AlGhanmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, Tangiers, Morocco, May 10-12, 2012
DOI: https://doi.org/10.1109/ICMCS.2012.6320320
Year: 2012

User profiling for big social media data using standing ovation model.

Authors: Muhammad Al-Qurishi , Saad Alhuzami , Majed A. AlRubaian , M. Shamim Hossain , Atif Alamri , Md. Abdur Rahman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-017-5402-6
Year: 2018

Determining trust in media-rich websites using semantic similarity.

Authors: Pradeep K. Atrey , Hicham Ibrahim , M. Anwar Hossain 0001 , Sheela Ramanna , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-011-0798-x
Year: 2012

Association mining of dependency between time series using Genetic Algorithm and discretisation.

Authors: Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJBIDM journal
DOI: https://doi.org/10.1504/IJBIDM.2011.038274
Year: 2011

Multimodal face and fingerprint biometrics authentication on space-limited tokens.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Neurocomputing journal
DOI: https://doi.org/10.1016/j.neucom.2007.12.017
Year: 2008

A novel Threat Evaluation method for privacy-aware system in RFID.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Ad Hoc Ubiquitous Comput. journal
DOI: https://doi.org/10.1504/IJAHUC.2011.043584
Year: 2011

An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks.

Authors: Amine Dhraief , Abdelfettah Belghith , Hassan Mathkour , Khalil Drira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Ad Hoc Ubiquitous Comput. journal
DOI: https://doi.org/10.1504/IJAHUC.2015.10001739
Year: 2017

An automated system for epilepsy detection using EEG brain signals based on deep learning approach.

Authors: Ihsan Ullah , Muhammad Hussain , Emad-ul-Haq Qazi , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Expert Syst. Appl. journal
DOI: https://doi.org/10.1016/j.eswa.2018.04.021
Year: 2018

A Survey on Sensor-Cloud: Architecture, Applications, and Approaches.

Authors: Atif Alamri , Wasai Shadab Ansari , Mohammad Mehedi Hassan , M. Shamim Hossain , Abdulhameed Alelaiwi , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2013/917923
Year: 2013

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks.

Authors: Muhammad Khurram Khan , Yang Xiang 0001 , Shi-Jinn Horng , Hsiao-Hwa Chen
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2013/956736
Year: 2013

Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014.

Authors: Muhammad Khurram Khan , Yang Xiang 0001 , Shi-Jinn Horng , Hsiao-Hwa Chen
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/958190
Year: 2015

Evolution of Linked Data Application Domains From 2009 to 2015: A Systematic Literature Review.

Authors: Alia Bahanshal , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Technol. Diffusion journal
DOI: https://doi.org/10.4018/IJTD.2018040101
Year: 2018

Revisiting the accessibility of Saudi Arabia government websites.

Authors: Hend S. Al-Khalifa , Ibtehal S. Baazeem , Reem A. Alamer
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Univers. Access Inf. Soc. journal
DOI: https://doi.org/10.1007/s10209-016-0495-7
Year: 2017

The Impact of Cost Uncertainty on Cournot Duopoly Game with Concave Demand Function.

Authors: Sameh S. Askar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Appl. Math. journal
DOI: https://doi.org/10.1155/2013/809795
Year: 2013

Dynamic investigations in a duopoly game with price competition based on relative profit and profit maximization.

Authors: Sameh S. Askar , Abdulrahman Al-Khedhairi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. Appl. Math. journal
DOI: https://doi.org/10.1016/j.cam.2019.112464
Year: 2020

Congestion avoidance through fog computing in internet of vehicles.

Authors: Shumayla Yaqoob , Ata Ullah , Muhammad Akbar , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Ambient Intell. Humaniz. Comput. journal
DOI: https://doi.org/10.1007/s12652-019-01253-x
Year: 2019

CHRA: a coloring based hierarchical routing algorithm.

Authors: Imen Jemili , Dhouha Ghrab , Amine Dhraief , Abdelfettah Belghith , Bilel Derbel , Ahmad S. Al-Mogren , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Ambient Intell. Humaniz. Comput. journal
DOI: https://doi.org/10.1007/s12652-014-0242-y
Year: 2015

ALOE: autonomic locating of obstructing entities in MANETs.

Authors: Mohamed Belhassen , Amine Dhraief , Abdelfettah Belghith , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Ambient Intell. Humaniz. Comput. journal
DOI: https://doi.org/10.1007/s12652-018-0742-2
Year: 2018

Moving average multi directional local features for speaker recognition.

Authors: Awais Mahmood , Ghulam Muhammad , Mansour Alsulaiman , Habib Dhahri , Esam Othman , Mohammed Faisal
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cluster Computing journal
DOI: https://doi.org/10.1007/s10586-018-2030-5
Year: 2019

Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art.

Authors: Suleman Khan , Abdullah Gani , Ainuddin Wahid Abdul Wahab , Mohsen Guizani , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Commun. Surv. Tutorials journal
DOI: https://doi.org/10.1109/COMST.2016.2597193
Year: 2017

Optimum bit rate pyramid coding with low computational and memory requirements.

Authors: Awad Kh. Al-Asmari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Circuits Syst. Video Techn. journal
DOI: https://doi.org/10.1109/76.401095
Year: 1995

Lattice-based signcryption.

Authors: Fagen Li , Fahad Bin Muhaya , Muhammad Khurram Khan , Tsuyoshi Takagi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Concurr. Comput. Pract. Exp. journal
DOI: https://doi.org/10.1002/cpe.2826
Year: 2013

Hand Gesture Recognition Using 3D-CNN Model.

Authors: Muneer H. Al-Hammadi , Ghulam Muhammad , Wadood Abdul , Mansour Alsulaiman , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Consumer Electron. Mag. journal
DOI: https://doi.org/10.1109/MCE.2019.2941464
Year: 2020

An enhanced lightweight anonymous biometric based authentication scheme for TMIS.

Authors: Shehzad Ashraf Chaudhry , Husnain Naqvi , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-017-4464-9
Year: 2018

On the evaluation of linguistic ontological models: An application on the SemQ ontology.

Authors: Hend S. Al-Khalifa , Maha M. Al-Yahya , Alia Bahanshal , Iman Al-Odah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh International Conference on Digital Information Management, ICDIM 2012, Macau, Macao, August 22-24, 2012
DOI: https://doi.org/10.1109/ICDIM.2012.6360090
Year: 2012

Towards the development of an automatic readability measurements for arabic language.

Authors: Amani A. Al-Ajlan , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings
DOI: https://doi.org/10.1109/ICDIM.2008.4746711
Year: 2008

Measuring the credibility of Arabic text content in Twitter.

Authors: Rasha M. BinSultan Al-Eidan , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, July 5-8, 2010, Lakehead University, Thunder Bay, Canada
DOI: https://doi.org/10.1109/ICDIM.2010.5664223
Year: 2010

Exploring the accessibility of Saudi Arabia e-government websites: a preliminary results.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25 - 28, 2010
DOI: https://doi.org/10.1145/1930321.1930378
Year: 2010

Exploring social media usage in Saudi e-government websites.

Authors: Hend S. Al-Khalifa , Muna S. Al-Razgan , Nora I. Al-Rajebah , Ameera M. Almasoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 6th International Conference on Theory and Practice of Electronic Governance, ICEGOV '12, Albany, NY, USA, October 22-25, 2012
DOI: https://doi.org/10.1145/2463728.2463776
Year: 2012

UWB Indoor Tracking System for Visually Impaired People.

Authors: Suheer Alhadhrami , Ahmad Alnafessah , Mai A. Al-Ammar , Abdulrahman Alarifi , Hend Suliman Al-Khalifa , Mansour Alsaleh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2015, Brussels, Belgium, December 11-13, 2015
DOI: https://doi.org/10.1145/2837126.2837141
Year: 2015

A Neural Network Based Handover Management Strategy for Heterogeneous Networks.

Authors: Nasser M. Alotaibi , Sami S. Alwakeel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th IEEE International Conference on Machine Learning and Applications, ICMLA 2015, Miami, FL, USA, December 9-11, 2015
DOI: https://doi.org/10.1109/ICMLA.2015.65
Year: 2015

Protecting Biometric Data for Personal Identification.

Authors: Muhammad Khurram Khan , Jiashu Zhang , Lei Tian
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Biometric Person Authentication, 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings
DOI: https://doi.org/10.1007/978-3-540-30548-4_72
Year: 2004

Interference-aware radio resource allocation techniques for OFDMA-based wireless networks.

Authors: Furaih AlShaalan , Saleh AlShebeili , Abdulkareem Adinoyi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China
DOI: https://doi.org/10.1109/WCINS.2010.5544145
Year: 2010

Towards better understanding of folksonomic patterns.

Authors: Hend S. Al-Khalifa , Hugh C. Davis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HYPERTEXT 2007, Proceedings of the 18th ACM Conference on Hypertext and Hypermedia, September 10-12, 2007, Manchester, UK
DOI: https://doi.org/10.1145/1286240.1286288
Year: 2007

Dynamic content-based cloud data integration system with privacy and cost concern.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings
DOI: https://doi.org/10.1145/2030376.2030399
Year: 2011

EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks.

Authors: Yifeng Cao , Xiao-Yang Liu , Linghe Kong , Min-You Wu , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 22nd IEEE International Conference on Parallel and Distributed Systems, ICPADS 2016, Wuhan, China, December 13-16, 2016
DOI: http://doi.ieeecomputersociety.org/10.1109/ICPADS.2016.0017
Year: 2016

Statistical Machine Translation Context Modelling with Recurrent Neural Network and LDA.

Authors: Shrooq Alsenan , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 1st International Conference on Advanced Intelligent System and Informatics, AISI 2015, November 28-30, 2015, Beni Suef, Egypt
DOI: https://doi.org/10.1007/978-3-319-48308-5_8
Year: 2016

An Efficient Approach for Data Placement in Distributed Systems.

Authors: Hassan Ismail Abdalla
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011, Crete, Greece, 28-30 June, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/MUE.2011.60
Year: 2011

MOB-TOSSIM: An Extension Framework for TOSSIM Simulator to Support Mobility in Wireless Sensor and Actuator Networks.

Authors: Abdelouahid Derhab , Fatma Ounini , Badis Remli
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE 8th International Conference on Distributed Computing in Sensor Systems, DCOSS 2012, Hangzhou, China, 16-18 May, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/DCOSS.2012.34
Year: 2012

Robust Hiding of Fingerprint-Biometric Data into Audio Signals.

Authors: Muhammad Khurram Khan , Ling Xie , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings
DOI: https://doi.org/10.1007/978-3-540-74549-5_74
Year: 2007

Query paraphrasing enhancement using artificial bee colony.

Authors: Abeer AlDayel , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 3rd International Conference on Web Intelligence, Mining and Semantics, WIMS '13, Madrid, Spain, June 12-14, 2013
DOI: https://doi.org/10.1145/2479787.2479803
Year: 2013

A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network.

Authors: Sk. Md. Mizanur Rahman , Mohammad Anwar Hossain , Maqsood Mahmud , Muhammad Imran Chaudry , Ahmad Almogren , Mohammed Abdullah Alnuem , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 IEEE International Symposium on Multimedia, ISM 2014, Taichung, Taiwan, December 10-12, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ISM.2014.84
Year: 2014

LORNAV: A Demo of a Virtual Reality Tool for Navigation and Authoring of Learning Object Repositories.

Authors: Md. Abdur Rahman , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 8th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2004), 21-23 October 2004, Budapest, Hungary
DOI: http://doi.ieeecomputersociety.org/10.1109/DS-RT.2004.28
Year: 2004

A Multipath Layered Cluster Based Routing for Ad Hoc Networks.

Authors: Imen Jemili , Nader Chaabouni , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012
DOI: https://doi.org/10.1109/NTMS.2012.6208730
Year: 2012

Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".

Authors: Muhammad Khurram Khan , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
DOI: https://doi.org/10.1007/978-3-642-34679-8_22
Year: 2012

Enhancing Power Saving Mechanisms for Ad hoc Networks.

Authors: Wafa Akkari , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless and Mobile Networking, IFIP Joint Conference on Mobile and Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30 - October 2, 2008
DOI: https://doi.org/10.1007/978-0-387-84839-6_7
Year: 2008

Qos routing mechanisms for multicast tree stability.

Authors: Abdelfettah Belghith , Mohamed Aissa , Adel Ben Mnaouer , Rion Murray
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 4th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2011, Toulouse, France, 26-28 October, 2011
DOI: https://doi.org/10.1109/WMNC.2011.6097252
Year: 2011

Cost Efficient Edge Intelligence Framework Using Docker Containers.

Authors: Mabrook Al-Rakhami , Mohammed Alsahli , Mohammad Mehedi Hassan , Atif Alamri , Antonio Guerrieri , Giancarlo Fortino
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August 12-15, 2018
DOI: http://doi.ieeecomputersociety.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00138
Year: 2018

Polymorphic Malware Detection Using Hierarchical Hidden Markov Model.

Authors: Fahad Bin Muhaya , Muhammad Khurram Khan , Yang Xiang 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, DASC 2011, 12-14 December 2011, Sydney, Australia
DOI: http://doi.ieeecomputersociety.org/10.1109/DASC.2011.47
Year: 2011

An investigation of MDVP parameters for voice pathology detection on three different databases.

Authors: Ahmed Y. Al-nasheri , Zulfiqar Ali , Ghulam Muhammad , Mansour Alsulaiman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2015, 16th Annual Conference of the International Speech Communication Association, Dresden, Germany, September 6-10, 2015
DOI: Not available
Year: 2015

Secure Clustering Scheme Based Keys Management in VANETs.

Authors: Tahani Gazdar , Abderrahim Benslimane , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 73rd IEEE Vehicular Technology Conference, VTC Spring 2011, 15-18 May 2011, Budapest, Hungary
DOI: https://doi.org/10.1109/VETECS.2011.5956543
Year: 2011

How to Cache in ICN-Based IoT Environments?

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2017, Hammamet, Tunisia, October 30 - Nov. 3, 2017
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2017.37
Year: 2017

Exploiting a clustering mechanism for power saving in ad hoc networks: Performance evaluation.

Authors: Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069406
Year: 2009

Performance evaluation of QoS routing algorithms.

Authors: Karima Maâlaoui , Abdelfattah Belghith , Jean-Marie Bonnin , M. Tezeghdanti
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2005.1387060
Year: 2005

Detection and classification of voice pathology using feature selection.

Authors: Malak Al Mojaly , Ghulam Muhammad , Mansour Alsulaiman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2014.7073250
Year: 2014

A 10-transistor low-power high-speed full adder cell.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ISCAS.1999.777801
Year: 1999

One-Time Password System with Infinite Nested Hash Chains.

Authors: Mohamed Hamdy Eldefrawy , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
DOI: https://doi.org/10.1007/978-3-642-17610-4_18
Year: 2010

Lattice BGK Simulations of Unsteady Flow in a 2D Elastic Tube.

Authors: Alfons G. Hoekstra , Jos van't Hoff , Abdel Monim Artoli , Peter M. A. Sloot
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part IV
DOI: https://doi.org/10.1007/3-540-44860-8_103
Year: 2003

Lattice Boltzmann, a Robust and Accurate Solver for Interactive Computational Hemodynamics.

Authors: Abdel Monim Artoli , Drona Kandhai , Huub C. J. Hoefsloot , Alfons G. Hoekstra , Peter M. A. Sloot
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part IV
DOI: https://doi.org/10.1007/3-540-44860-8_107
Year: 2003

Mobile cloud computing: advantage, disadvantage and open challenge.

Authors: Ahmed Alzahrani 0001 , Nasser Alalwan , Mohamed Sarrab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th Euro American Conference on Telematics and Information Systems, EATIS'14, Valparaiso, Chile - April 02 - 04, 2014
DOI: https://doi.org/10.1145/2590651.2590670
Year: 2014

An Intelligent System to Classify Epileptic and Non-Epileptic EEG Signals.

Authors: Emad-ul-Haq Qazi , Muhammad Hussain , Hatim A. Aboalsamh , Wadood Abdul , Saeed M. Bamatraf , Ihsan Ullah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 12th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2016, Naples, Italy, November 28 - December 1, 2016
DOI: http://doi.ieeecomputersociety.org/10.1109/SITIS.2016.44
Year: 2016

TCP Application Recovery Improvement After Handover in Mobile Networks.

Authors: Hajer Souri , Amine Dhraief , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Communication Technologies for Vehicles - 8th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2015, Sousse, Tunisia, May 6-8, 2015. Proceedings
DOI: https://doi.org/10.1007/978-3-319-17765-6_6
Year: 2015

City-Obstacles Impact on OLSR-Based Routing Protocols.

Authors: Mohamed Belhassen , Amine Dhraief , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Communication Technologies for Vehicles - 8th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2015, Sousse, Tunisia, May 6-8, 2015. Proceedings
DOI: https://doi.org/10.1007/978-3-319-17765-6_5
Year: 2015

Solution Reuse in Partial MAX-SAT Problem.

Authors: Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, IRI - 2004, November 8-10, 2004, Las Vegas Hilton, Las Vegas, NV, USA
DOI: https://doi.org/10.1109/IRI.2004.1431507
Year: 2004

EMASC14: 1st International Workshop on Emerging Multimedia Applications and Services for Smart Cities.

Authors: M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03 - 07, 2014
DOI: https://doi.org/10.1145/2647868.2647872
Year: 2014

EDGS: Efficient data gathering scheme for dense Wireless Sensor Networks.

Authors: Saad A. Al-Ahmadi , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Workshops Proceedings of the Global Communications Conference, GLOBECOM 2013, Atlanta, GA, USA, December 9-13, 2013
DOI: https://doi.org/10.1109/GLOCOMW.2013.6825095
Year: 2013

Genetic Algorithm for Arabic Word Sense Disambiguation.

Authors: Mohamed El-bachir Menai , Wojdan Alsaeedan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2012, Kyoto, Japan, August 8-10, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/SNPD.2012.38
Year: 2012

Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks.

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, MASS 2006, 9-12 October 2006, Vancouver, BC, Canada
DOI: http://doi.ieeecomputersociety.org/10.1109/MOBHOC.2006.278631
Year: 2006

A secure framework for digital Quran certification.

Authors: Muhammad Khurram Khan , Zeeshan Siddiqui , Omar Tayan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE International Conference on Consumer Electronics, ICCE 2017, Las Vegas, NV, USA, January 8-10, 2017
DOI: https://doi.org/10.1109/ICCE.2017.7889229
Year: 2017

A Low PAPR Universal Filtered Multi-Carrier System for 5G Machine Type Communications.

Authors: Imran Baig , Umer Farooq , Najam Ul Hasan , Manaf Zghaibeh , Varun Jeoti , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/WD.2019.8734188
Year: 2019

Distinctive phonetic feature (DPF) based phone segmentation using hybrid neural networks.

Authors: Mohammad Nurul Huda , Muhammad Ghulam , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2007, 8th Annual Conference of the International Speech Communication Association, Antwerp, Belgium, August 27-31, 2007
DOI: Not available
Year: 2007

A Novel Efficient Classification Algorithm for Search Engines.

Authors: Hanan Ahmed Hosni Mahmoud Abd Alla , Nadia Al-Ghreimil
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2008 International Conferences on Computational Intelligence for Modelling, Control and Automation (CIMCA 2008), Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2008), Innovation in Software Engineering (ISE 2008), 10-12 December 2008, Vienna, Austria
DOI: http://doi.ieeecomputersociety.org/10.1109/CIMCA.2008.68
Year: 2008

Supporting Seamless Mobility for Real-Time Applications in Named Data Networking.

Authors: Maram Alajlan , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, July 24-26, 2017, Leuven, Belgium
DOI: https://doi.org/10.1016/j.procs.2017.06.117
Year: 2017

Comprehensive study of buffering mechanisms in hybrid live P2P streaming protocol HLPSP.

Authors: Chourouk Hammami , Achraf Gazdar , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, September 5-9, 2016
DOI: https://doi.org/10.1109/IWCMC.2016.7577082
Year: 2016

NDRECT: Node-disjoint routes establishment for critical traffic in WSNs.

Authors: Dhouha Ghrab , Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, September 5-9, 2016
DOI: https://doi.org/10.1109/IWCMC.2016.7577142
Year: 2016

MOO-SNLP: Multi Objectives Optimization for Sensor Network Localization Problem.

Authors: Badia Bouhdid , Wafa Akkari , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 15th International Wireless Communications & Mobile Computing Conference, IWCMC 2019, Tangier, Morocco, June 24-28, 2019
DOI: https://doi.org/10.1109/IWCMC.2019.8766450
Year: 2019

Improved Support Vector Regression Coupled with Fourier Self-Deconvolution in the Quantitative Analysis of Glucose in NIR Spectra.

Authors: Krishna Chaitanya Patchava , Mohammed Benaissa , Hatim Behairy , Saleh AlShebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 9th International Conference on Information, Intelligence, Systems and Applications, IISA 2018, Zakynthos, Greece, July 23-25, 2018
DOI: http://doi.ieeecomputersociety.org/10.1109/IISA.2018.8633670
Year: 2018

Introducing Islamic history with an Arabic adaptive web-based information system.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications, ISWSA 2010, Amman, Jordan, June 14-16, 2010
DOI: https://doi.org/10.1145/1874590.1874610
Year: 2010

Polymorphic routing using proactive and probabilistic approaches for MANETs.

Authors: Abdelfettah Belghith , Adel Ben Mnaouer , Hanen Idoudi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2008, Hong Kong, July 28-31, 2008
DOI: https://doi.org/10.4108/ICST.QSHINE2008.4180
Year: 2008

Oily Residuals Security Threat on Smart Phones.

Authors: Khalid Airowaily , Majed A. AlRubaian
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: First International Conference on Robot, Vision and Signal Processing, RVSP 2011, Kaohsiung City, Taiwan, November 21-23, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/RVSP.2011.92
Year: 2011

The Effect of Arabic Language on Reading English for Arab EFL Learners: An Eye Tracking Study.

Authors: Kholod S. Al-Khalifah , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Conference on Asian Language Processing, IALP 2011, Penang, Malaysia, 15-17 November, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/IALP.2011.18
Year: 2011

Securing Biometric Templates for Reliable Identity Authentication.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II
DOI: https://doi.org/10.1007/11538356_75
Year: 2005

Optimal Control of a Microgrid with Distributed Renewable Generation and Battery Energy Storage.

Authors: Jaber Alshehri , Ahmed Alzahrani 0001 , Muhammad Khalid , Fahad Alismail
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2020, Washington, DC, USA, February 17-20, 2020
DOI: https://doi.org/10.1109/ISGT45199.2020.9087685
Year: 2020

DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications.

Authors: Abdelraouf Ouadjaout , Noureddine Lasla , Miloud Bagaa , Messaoud Doudou , Cherif Zizoua , Mohamed Amine Kafi , Abdelouahid Derhab , Djamel Djenouri , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, September 22-25, 2014, Halifax, Nova Scotia, Canada
DOI: https://doi.org/10.1016/j.procs.2014.08.029
Year: 2014

Modeling Quality of Information in Multi-sensor Surveillance Systems.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey
DOI: http://doi.ieeecomputersociety.org/10.1109/ICDEW.2007.4400968
Year: 2007

The impact of mobile IPv6 on transport protocols an experimental investigation.

Authors: Amine Dhraief , Abdelfettah Belghith , Zied Chedly
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Wireless and Ubiquitous Systems , ICWUS 2010, October 8-10, 2010, Sousse, Tunisia
DOI: https://doi.org/10.1109/ICWUS.2010.5671365
Year: 2010

Gender Classification with Voice Intensity.

Authors: Mansour Alsulaiman , Zulfiqar Ali , Muhammad Ghulam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the UKSim 5th European Symposium on Computer Modeling and Simulation, EMS 2011, Madrid, Spain, November 16-18, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/EMS.2011.37
Year: 2011

A Proposed Arabic Grammatical Error Detection Tool Based on Deep Learning.

Authors: Nora Madi , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fourth International Conference On Arabic Computational Linguistics, ACLING 2018, November 17-19, 2018, Dubai, United Arab Emirates
DOI: https://doi.org/10.1016/j.procs.2018.10.482
Year: 2018

High performance charge plasma based multi zone lateral bipolar junction transistor.

Authors: Sajad A. Loan , Faisal Bashir , M. Rafat , Shuja A. Abbasi , Abdul Rahman M. Alamoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 26th International Conference on Microelectronics, ICM 2014, Doha, Qatar, December 14-17, 2014
DOI: https://doi.org/10.1109/ICM.2014.7071796
Year: 2014

Design and Implementation of an NFC Food Labeler for Smart Healthcare.

Authors: Yara Al-Tehini , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HCI International 2016 - Posters' Extended Abstracts - 18th International Conference, HCI International 2016, Toronto, Canada, July 17-22, 2016, Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-40542-1_76
Year: 2016

AraMedReader: An Arabic Medicine Identifier Using Barcodes.

Authors: Norah I. Al-Quwayfili , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HCI International 2014 - Posters' Extended Abstracts - International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-07854-0_67
Year: 2014

Management of Ambient Media Preferences in Distributed Environments for Service Personalization.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 9th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2008, 7-9 May 2008, Sydney, NSW, Australia
DOI: http://doi.ieeecomputersociety.org/10.1109/I-SPAN.2008.33
Year: 2008

False Positive Reduction in Breast Mass Detection Using the Fusion of Texture and Gradient Orientation Features.

Authors: Mariam Busaleh , Muhammad Hussain , Hatim A. Aboalsamh , Mansour Zuair , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-319-50835-1_60
Year: 2016

PH-BRINT: Pooled Homomorphic Binary Rotation Invariant and Noise Tolerant Representation for Face Recognition Under Illumination Variations.

Authors: Raqinah Alrabiah , Muhammad Hussain , Hatim A. Aboalsamh , Mansour Zuair , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-319-50835-1_70
Year: 2016

Query paraphrasing using genetic approach for intelligent information retrieval.

Authors: Mourad Ykhlef , Abeer AlDayel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012
DOI: Not available
Year: 2012

Proactive Probabilistic Routing in Mobile Ad-hoc Networks.

Authors: Abdelfattah Belghith , Hanen Idoudi , Miklós Molnár
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2008 International Conference on Wireless Networks, July 14-17, 2008, Las Vegas, Nevada, USA
DOI: Not available
Year: 2008

Towards a Story-Based Search Engine for Arabic-Speaking Children.

Authors: Rawan N. Al-Matham , Wed Al-Ateeq , Reem Alotaibi , Sarah Alabdulkarim , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Digital Libraries at the Crossroads of Digital Information for the Future - 21st International Conference on Asia-Pacific Digital Libraries, ICADL 2019, Kuala Lumpur, Malaysia, November 4-7, 2019, Proceedings
DOI: https://doi.org/10.1007/978-3-030-34058-2_19
Year: 2019

Applying the Marshmallow Challenge in a research methods course: Lessons learned.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 16th International Conference on Information Technology Based Higher Education and Training, ITHET 2017, Ohrid, Macedonia, July 10-12, 2017
DOI: https://doi.org/10.1109/ITHET.2017.8067793
Year: 2017

Biometric driven initiative system for passive continuous authentication.

Authors: Muhammad Khurram Khan , Pei-wei Tsai , Jeng-Shyang Pan 0001 , Bin-Yih Liao
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011
DOI: https://doi.org/10.1109/ISIAS.2011.6122809
Year: 2011

Novel technique for steganography in fingerprints images: Design and implementation.

Authors: Hanan A. Mahmoud , Hanan Saad Al-Hulaibah , Sarah A. Al-Naeem , Suha Ali Al-Qhatani , Aljoharah Al-Dawood , Buthaina Saleh Al-Nassar , Dhay Yousef Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010
DOI: https://doi.org/10.1109/ISIAS.2010.5604078
Year: 2010

StarsRace: A mobile collaborative seriuos game for obesity.

Authors: Muhammad Al-Qurishi , Mohamed A. Mostafa , Mabrook S. Alrakhami , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 IEEE International Conference on Multimedia and Expo Workshops, Chengdu, China, July 14-18, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2014.6890673
Year: 2014

Perspective of health data interoperability on cloud-based Medical Cyber-Physical Systems.

Authors: Mona A. Alhumud , M. Anwar Hossain 0001 , Mehedi Masud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 IEEE International Conference on Multimedia & Expo Workshops, ICME Workshops 2016, Seattle, WA, USA, July 11-15, 2016
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2016.7574715
Year: 2016

Feature Selection for Hand-Shape Based Identification.

Authors: Muhammad Hussain , Awabed Jibreen , Hatim A. Aboalsamh , Hassan Madkour , George Bebis , Gholamreza Amayeh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Joint Conference - CISIS'15 and ICEUTE'15, 8th International Conference on Computational Intelligence in Security for Information Systems / 6th International Conference on EUropean Transnational Education, Burgos, Spain, 15-17 June, 2015
DOI: https://doi.org/10.1007/978-3-319-19713-5_21
Year: 2015

Proxy Service to Contextualize Web Browsing for the Visually Impaired.

Authors: Najd A. Al-Mouh , Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 15th International Conference on Information Integration and Web-based Applications & Services, IIWAS '13, Vienna, Austria, December 2-4, 2013
DOI: https://doi.org/10.1145/2539150.2539210
Year: 2013

A web-based system and web service for coloring and decoding Arabic text for Arabic learners.

Authors: Hend S. Al-Khalifa , Afnan Alfaadhel , Daniah Albulikhi , Lamya Alrakhes , Nada Almugren , Sara Alqubaisi , Muna A. Muhaureq
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016
DOI: https://doi.org/10.1145/3011141.3011188
Year: 2016

An initial comparative study of Arabic speech synthesis engines in iOS and Android.

Authors: Nora B. Al-Saud , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia - December 3-5, 2012
DOI: https://doi.org/10.1145/2428736.2428812
Year: 2012

Makhtota+: enhancing old Arabic manuscripts with linked data.

Authors: Nora I. Al-Rajebah , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia - December 3-5, 2012
DOI: https://doi.org/10.1145/2428736.2428794
Year: 2012

Location-aware system for content delivery using Bluetooth low energy technology.

Authors: Lamya Albraheem , Jawaher Al-Yahya , Nouf Al-Rowais , Sara Al-Shathri , Lamees Alsuhaibani , Amal Alabdulkarim
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016
DOI: https://doi.org/10.1145/3011141.3011187
Year: 2016

Race recognition using local descriptors.

Authors: Muhammad Ghulam , Muhammad Hussain , Fatmah Alenezy , Anwar M. Mirza , George Bebis , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2012, Kyoto, Japan, March 25-30, 2012
DOI: https://doi.org/10.1109/ICASSP.2012.6288181
Year: 2012

Fast and Secure Handover in WLANs: An Evaluation of the Signaling Overhead.

Authors: Mohamed Kassab , Jean-Marie Bonnin , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 5th IEEE Consumer Communications and Networking Conference, CCNC 2008, Las Vegas, NV, USA, January 10-12, 2008
DOI: https://doi.org/10.1109/ccnc08.2007.178
Year: 2008

Discrete interactive staggered broadcasting.

Authors: Achraf Gazdar , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 1st IEEE Consumer Communications and Networking Conference, CCNC 2004, Las Vegas, NV, USA, January 5-8, 2004
DOI: https://doi.org/10.1109/CCNC.2004.1286903
Year: 2004

MPEG-7 audio features based voice pathology detection.

Authors: Ghulam Muhammad , Moutasem Melhem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013
DOI: https://doi.org/10.1109/EUROCON.2013.6625193
Year: 2013

Robust copy-move image forgery detection using undecimated wavelets and Zernike moments.

Authors: Muhammad Ghulam , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ICIMCS 2011, The Third International Conference on Internet Multimedia Computing and Service, Chengdu, China, August 5-7, 2011
DOI: https://doi.org/10.1145/2043674.2043702
Year: 2011

Performance analysis of centralized, distributed and hybrid demand load control architecture for smart power grid.

Authors: Sami S. Alwakeel , Musaed A. Alhussein , Muhammad Ammad-uddin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE International Conference on Electro-Information Technology , EIT 2013, Rapid City, SD, USA, May 9-11, 2013
DOI: https://doi.org/10.1109/EIT.2013.6632718
Year: 2013

Accurate 3D localization scheme based on active RFID tags for indoor environment.

Authors: Ferdews Tlili , Noureddine Hamdi , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, Nice, France, November 5-7, 2012
DOI: https://doi.org/10.1109/RFID-TA.2012.6404550
Year: 2012

Introducing Arabic Sign Language for Mobile Phones.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computers Helping People with Special Needs, 12th International Conference, ICCHP 2010, Vienna, Austria, July 14-16, 2010, Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-642-14100-3_32
Year: 2010

EasyTrans: Accessible Translation System for Blind Translators.

Authors: Dina Al-Bassam , Hessah Alotaibi , Samira Alotaibi , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computers Helping People with Special Needs - 15th International Conference, ICCHP 2016, Linz, Austria, July 13-15, 2016, Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-41267-2_83
Year: 2016

DWT+LSB-based fragile watermarking method for digital Quran images.

Authors: Fajri Kurniawan , Mohammed S. Khalil , Muhammad Khurram Khan , Yasser M. Alginahi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014
DOI: https://doi.org/10.1109/ISBAST.2014.7013137
Year: 2014

Authentication and Tamper Detection of Digital Holy Quran Images.

Authors: Fajri Kurniawan , Mohammed Sayim Khalil , Muhammad Khurram Khan , Yasser M. Alginahi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China
DOI: https://doi.org/10.1109/ISBAST.2013.51
Year: 2013

Notes on "a password-based remote user authentication scheme without smart card".

Authors: Saru Kumari , Muhammad Khurram Khan , Xiong Li 0002 , Rahul Kumar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014
DOI: https://doi.org/10.1109/ISBAST.2014.7013105
Year: 2014

Comparative Survey of Indoor Positioning Technologies, Techniques, and Algorithms.

Authors: Mai A. Al-Ammar , Suheer Alhadhrami , AbdulMalik S. Al-Salman , Abdulrahman Alarifi , Hend Suliman Al-Khalifa , Ahmad Alnafessah , Mansour Alsaleh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 International Conference on Cyberworlds, Santander, Cantabria, Spain, October 6-8, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/CW.2014.41
Year: 2014

Differential Diagnosis of Erythemato-Squamous Diseases Using Ensemble of Decision Trees.

Authors: Mohamed El-bachir Menai , Nuha Altayash
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Modern Advances in Applied Intelligence - 27th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2014, Kaohsiung, Taiwan, June 3-6, 2014, Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-07467-2_39
Year: 2014

Feature Selection Using Particle Swarm Optimization in Intrusion Detection.

Authors: Iftikhar Ahmad 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/806954
Year: 2015

An Automatic Health Monitoring System for Patients Suffering From Voice Complications in Smart Cities.

Authors: Zulfiqar Ali , Ghulam Muhammad , Mohammed F. Alhamid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2680467
Year: 2017

Situation Awareness in Ambient Assisted Living for Smart Healthcare.

Authors: Mashail N. Alkhomsan , M. Anwar Hossain 0001 , Sk. Md. Mizanur Rahman , Mehedi Masud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2731363
Year: 2017

Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare.

Authors: Ghufran Ahmed , Saif ul Islam , Maham Shahid , Adnan Akhunzada , Sohail Jabbar , Muhammad Khurram Khan , Muhammad Riaz , Kijun Han
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2839909
Year: 2018

Towards a Low Complexity Scheme for Medical Images in Scalable Video Coding.

Authors: Muhammad Shoaib 0005 , Muhammad Imran 0001 , Fazli Subhan , Iftikhar Ahmad 0006
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2976715
Year: 2020

Hand Gesture Recognition for Sign Language Using 3DCNN.

Authors: Muneer H. Al-Hammadi , Ghulam Muhammad , Wadood Abdul , Mansour Alsulaiman , Mohamed Ajami Bencherif , Mohamed Amine Mekhtiche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2990434
Year: 2020

Multilevel Weighted Feature Fusion Using Convolutional Neural Networks for EEG Motor Imagery Classification.

Authors: Syed Umar Amin , Mansour Alsulaiman , Ghulam Muhammad , Mohamed Ajami Bencherif , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2895688
Year: 2019

New Zero-Watermarking Algorithm Using Hurst Exponent for Protection of Privacy in Telemedicine.

Authors: Zulfiqar Ali , M. Shamim Hossain , Ghulam Muhammad , Muhammad Aslam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2799604
Year: 2018

K-State Resonators for High-Coding-Capacity Chipless RFID Applications.

Authors: Wazie M. Abdulkawi , Abdelfattah Ahmad Sheta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2961565
Year: 2019

Comprehensive Survey on Big Data Privacy Protection.

Authors: Mohammed Binjubeir , Abdulghani Ali Ahmed , Mohd Arfian Ismail , Ali Safaa Sadiq , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2962368
Year: 2020

Cloud Computing Fitness for E-Government Implementation: Importance-Performance Analysis.

Authors: Fathey Mohammed , Ahmed Ibrahim Alzahrani , Osama Alfarraj , Othman Ibrahim
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2778093
Year: 2018

A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems.

Authors: Anees Ara , Mznah Al-Rodhaan , Yuan Tian 0003 , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2716439
Year: 2017

On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network.

Authors: Mahdi Zareei , Ehab Mahmoud Mohamed , Mohammad Hossein Anisi , César Vargas Rosales , Kazuya Tsukamoto , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2016.2626721
Year: 2016

UMSG: An Extended Model to Investigate the Use of Mobile Social Games.

Authors: Nora AlMuhanna , Hind M. Al-Otaibi , Rawan N. Al-Matham , Nora Al-Twairesh , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2920726
Year: 2019

The accessibility and usage of smartphones by Arab-speaking visually impaired people.

Authors: Najd A. Al-Mouh , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Pervasive Comput. Commun. journal
DOI: https://doi.org/10.1108/IJPCC-09-2015-0033
Year: 2015

Random forests for automatic differential diagnosis of erythemato-squamous diseases.

Authors: Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Medical Eng. Informatics journal
DOI: https://doi.org/10.1504/IJMEI.2015.068506
Year: 2015

A new hybrid metaheuristic for medical data classification.

Authors: Sarab Al Muhaideb , Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJMHeur journal
DOI: https://doi.org/10.1504/IJMHEUR.2014.058860
Year: 2014

A Multi Join Algorithm Utilizing Double Indices.

Authors: Hanan Ahmed Hosni Mahmoud Abd Alla , Lilac A. E. Al-Safadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Convergence Inf. Technol. journal
DOI: Not available
Year: 2009

A Hybrid Computing Solution and Resource Scheduling Strategy for Edge Computing in Smart Manufacturing.

Authors: Xiaomin Li , Jiafu Wan , Hong-Ning Dai , Muhammad Imran 0001 , Min Xia , Antonio Celesti
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Ind. Informatics journal
DOI: https://doi.org/10.1109/TII.2019.2899679
Year: 2019

Modelling digital library success using the DeLone and McLean information system success model.

Authors: Ahmed Ibrahim Alzahrani , Imran Mahmud , Thurasamy Ramayah , Osama Alfarraj , Nasser Alalwan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Libr. Inf. Sci. journal
DOI: https://doi.org/10.1177/0961000617726123
Year: 2019

Efficient 45nm ASIC Architecture for Full-Search Free Intra Prediction in Real-Time H.264/AVC Decoder.

Authors: Tarek A. Elarabi , Randa Ayoubi , Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Signal Process. Syst. journal
DOI: https://doi.org/10.1007/s11265-012-0700-8
Year: 2013

A novel VLSI architecture for a fuzzy inference processor using Gaussian-shaped membership function.

Authors: Sajad A. Loan , Asim M. Murshid , Shuja A. Abbasi , Abdul Rahman M. Alamoud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Fuzzy Syst. journal
DOI: https://doi.org/10.3233/IFS-2012-0503
Year: 2013

Minimizing the number of tardy jobs in single machine sequencing.

Authors: Ahmad Sharary , Nejib Zaguia
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Discret. Math. journal
DOI: https://doi.org/10.1016/0012-365X(93)90336-R
Year: 1993

Requirements Elicitation and Prototyping of a Fully Immersive Virtual Reality Gaming System for Upper Limb Stroke Rehabilitation in Saudi Arabia.

Authors: Maram Al-Mousa , Hend S. Al-Khalifa , Hana AlSobayel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mobile Information Systems journal
DOI: https://doi.org/10.1155/2017/7507940
Year: 2017

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network.

Authors: Shaker Alanazi , Kashif Saleem , Jalal Al-Muhtadi , Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mobile Information Systems journal
DOI: https://doi.org/10.1155/2016/4853924
Year: 2016

An experimental system for measuring the credibility of news content in Twitter.

Authors: Hend S. Al-Khalifa , Rasha M. BinSultan Al-Eidan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/17440081111141772
Year: 2011

A logical foundation for nested semi-structured data and web forms.

Authors: Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/17440080680000097
Year: 2006

An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization.

Authors: Zohair Al-Ameen , Ghazali Sulong , Amjad Rehman , Abdullah Al-Dhelaan , Tanzila Saba , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: EURASIP J. Adv. Signal Process. journal
DOI: https://doi.org/10.1186/s13634-015-0214-1
Year: 2015

An Audio-Visual Emotion Recognition System Using Deep Learning Fusion for a Cognitive Wireless Framework.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wirel. Commun. journal
DOI: https://doi.org/10.1109/MWC.2019.1800419
Year: 2019

Toward end-to-end biomet rics-based security for IoT infrastructure.

Authors: M. Shamim Hossain , Ghulam Muhammad , Sk. Md. Mizanur Rahman , Wadood Abdul , Abdulhameed Alelaiwi , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wirel. Commun. journal
DOI: https://doi.org/10.1109/MWC.2016.7721741
Year: 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.

Authors: Debiao He , Huaqun Wang , Muhammad Khurram Khan , Lina Wang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IET Communications journal
DOI: https://doi.org/10.1049/iet-com.2016.0091
Year: 2016

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

Authors: Kashif Saleem , Abdelouahid Derhab , Mehmet A. Orgun , Jalal Al-Muhtadi , Joel J. P. C. Rodrigues , Mohammed Sayim Khalil , Adel Ali Ahmed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s16040460
Year: 2016

Smarter Traffic Prediction Using Big Data, In-Memory Computing, Deep Learning and GPUs.

Authors: Muhammad Aqib , Rashid Mehmood , Ahmed Alzahrani 0001 , Iyad Katib , Aiiad Albeshri , Saleh M. Altowaijri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s19092206
Year: 2019

Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing.

Authors: Basmah Al-Otaibi , Najla Al-Nabhan , Yuan Tian 0003
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s19040965
Year: 2019

PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices.

Authors: Alia Alabdulkarim , Mznah Al-Rodhaan , Tinghuai Ma , Yuan Tian 0003
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s19010142
Year: 2019

A Taxonomy of Exact Methods for Partial Max-SAT.

Authors: Mohamed El-bachir Menai , Tasniem Nasser Al-Yahya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. Sci. Technol. journal
DOI: https://doi.org/10.1007/s11390-013-1325-5
Year: 2013

Evaluation of neural network architectures for MPEG-4 video traffic prediction.

Authors: Adel Abdennour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Broadcast. journal
DOI: https://doi.org/10.1109/TBC.2006.872994
Year: 2006

Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring.

Authors: Ghulam Muhammad , Sk. Md. Mizanur Rahman , Abdulhameed Alelaiwi , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2017.1600425CM
Year: 2017

Environment Classification for Urban Big Data Using Deep Learning.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2018.1700577
Year: 2018

Self-Aware Autonomous City: From Sensing to Planning.

Authors: Bo-Wei Chen , Muhammad Imran 0001 , Nidal Nasser , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2019.1800628
Year: 2019

Toward Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues.

Authors: Adnan Akhunzada , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2017.1601158
Year: 2017

Inhibition/Enhancement Network Based ASR using Multiple DPF Extractors.

Authors: Foyzul Hassan , Mohammed Rokibul Alam Kotwal , Mohammad Mahedi Hasan , Muhammad Ghulam , Mohammad Nurul Huda
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Journal of Multimedia journal
DOI: https://doi.org/10.4304/jmm.6.5.395-403
Year: 2011

Effects of Syllable Language Model on Distinctive Phonetic Features (DPFs) based Phoneme Recognition Performance.

Authors: Mohammad Nurul Huda , Manoj Banik , Muhammad Ghulam , Mashud Kabir , Bernd J. Kröger
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Journal of Multimedia journal
DOI: https://doi.org/10.4304/jmm.5.6.543-550
Year: 2010

Correction to: Revisiting distinctive phonetic features from applied computing perspective: unifying views and analyzing modern Arabic speech varieties.

Authors: Yasser M. Seddiq , Yousef Alotaibi , Ali H. Meftah , Sid-Ahmed Selouani , Mansour Al-Ghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Speech Technol. journal
DOI: https://doi.org/10.1007/s10772-018-9553-2
Year: 2018

Secure and dependable software defined networks.

Authors: Adnan Akhunzada , Abdullah Gani , Nor Badrul Anuar , Ahmed Abdelaziz , Muhammad Khurram Khan , Amir Hayat , Samee U. Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2015.11.012
Year: 2016

Towards port-knocking authentication methods for mobile cloud computing.

Authors: Suleman Khan , Muhammad Shiraz , Laleh Boroumand , Abdullah Gani , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2017.08.018
Year: 2017

Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.

Authors: Sidra Aslam , Saif ul Islam , Abid Khan , Mansoor Ahmed , Adnan Akhunzada , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2017.10.021
Year: 2017

Collaborative Bibliographic System for Review/Survey Articles.

Authors: Mutaz Beraka , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2015

Connected dominating set algorithms for wireless sensor networks.

Authors: Najla Al-Nabhan , Mznah Al-Rodhaan , Abdullah Al-Dhelaan , Xiuzhen Cheng
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJSNet journal
DOI: https://doi.org/10.1504/IJSNET.2013.053719
Year: 2013

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.

Authors: Baojun Huang , Muhammad Khurram Khan , Libing Wu , Fahad T. Bin Muhaya , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Personal Communications journal
DOI: https://doi.org/10.1007/s11277-015-2735-1
Year: 2015

On the Performance of Mobile WiMAX System: Measurement and Propagation Studies.

Authors: Furaih AlShaalan , Saleh AlShebeili , Abdulkareem Adinoyi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJCNS journal
DOI: https://doi.org/10.4236/ijcns.2011.311117
Year: 2010

Leukocytes dynamics in microcirculation under shear-thinning blood flow.

Authors: Adélia Sequeira , Abdel Monim Artoli , A. S. Silva-Herdade , C. Saldanha
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Math. Appl. journal
DOI: https://doi.org/10.1016/j.camwa.2009.02.003
Year: 2009

Author Correction: A lightweight and cost effective edge intelligence architecture based on containerization technology.

Authors: Mabrook Al-Rakhami , Abdu Gumaei , Mohammed Alsahli , Mohammad Mehedi Hassan , Atif Alamri , Antonio Guerrieri , Giancarlo Fortino
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: World Wide Web journal
DOI: https://doi.org/10.1007/s11280-019-00759-w
Year: 2020

A lightweight and cost effective edge intelligence architecture based on containerization technology.

Authors: Mabrook Al-Rakhami , Abdu Gumaei , Mohammed Alsahli , Mohammad Mehedi Hassan , Atif Alamri , Antonio Guerrieri , Giancarlo Fortino
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: World Wide Web journal
DOI: https://doi.org/10.1007/s11280-019-00692-y
Year: 2020

Traffic Locality Oriented Route Discovery Algorithm with Delay.

Authors: Mznah Al-Rodhaan , Lewis M. Mackenzie , Mohamed Ould-Khaoua
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Comput. Their Appl. journal
DOI: Not available
Year: 2009

Virtualized QoS-Driven Spectrum Allocation in Space-Terrestrial Integrated Networks.

Authors: Kai Lin , Di Wang , Long Hu , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.2018.1800165
Year: 2018

Heterogeneous Space and Terrestrial Integrated Networks for IoT: Architecture and Challenges.

Authors: Wei-Che Chien , Chin-Feng Lai , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.2018.1800182
Year: 2018

A hybrid genetic-ant colony optimization algorithm for the word sense disambiguation problem.

Authors: Wojdan Alsaeedan , Mohamed El Bachir Menai , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Sci. journal
DOI: https://doi.org/10.1016/j.ins.2017.07.002
Year: 2017

A distributed mutual exclusion algorithm over multi-routing protocol for mobile

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Parallel Emergent Distributed Syst. journal
DOI: https://doi.org/10.1080/17445760701536084
Year: 2008

Investigations of Nonlinear Triopoly Models with Different Mechanisms.

Authors: Sameh S. Askar , Abdulrahman Al-Khedhairi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Complexity journal
DOI: https://doi.org/10.1155/2019/4252151
Year: 2019

Exploration of Complex Dynamics for Cournot Oligopoly Game with Differentiated Products.

Authors: Sameh S. Askar , Mona F. El-Wakeel , M. A. Alrodaini
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Complexity journal
DOI: https://doi.org/10.1155/2018/6526794
Year: 2018

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.

Authors: Tanmoy Maitra , SK Hafizul Islam , Ruhul Amin , Debasis Giri , Muhammad Khurram Khan , Neeraj Kumar 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.1653
Year: 2016

A secure cluster-based architecture for certificates management in vehicular networks.

Authors: Tahani Gazdar , Abderrahim Benslimane , Abdelfettah Belghith , Abderrezak Rachedi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.772
Year: 2014

A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.

Authors: Muhammad Khurram Khan , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.573
Year: 2012

Harnessing the power of big data analytics in the cloud to support learning analytics in mobile learning environment.

Authors: Mohammad Shorfuzzaman , M. Shamim Hossain , Amril Nazir , Ghulam Muhammad , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2018.07.002
Year: 2019

Secure transfer of environmental data to enhance human decision accuracy.

Authors: Kashif Saleem , Abdelouahid Derhab , Jalal Al-Muhtadi , Basit Shahzad , Mehmet A. Orgun
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2015.01.023
Year: 2015

Perspectives of human factors in designing elderly monitoring system.

Authors: M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2013.12.010
Year: 2014

Swarm intelligence for natural language processing.

Authors: Wojdan Al-Saeedan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Artif. Intell. Soft Comput. journal
DOI: https://doi.org/10.1504/IJAISC.2015.070634
Year: 2015

CHEMOTION: A gesture based chemistry virtual laboratory with leap motion.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comp. Applic. in Engineering Education journal
DOI: https://doi.org/10.1002/cae.21848
Year: 2017

Solving the student grouping problem in e-learning systems using swarm intelligence metaheuristics.

Authors: Hamad Alhunitah , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comp. Applic. in Engineering Education journal
DOI: https://doi.org/10.1002/cae.21752
Year: 2016

Alignment-Free Cross-Sensor Fingerprint Matching based on the Co-Occurrence of Ridge Orientations and Gabor-HoG Descriptor.

Authors: Helala AlShehri , Muhammad Hussain , Hatim A. Aboalsamh , Qazi Emad-ul-Haq , Aqil M. Azmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

Smart-Edge-CoCaCo: AI-Enabled Smart Edge with Joint Computation, Caching, and Communication in Heterogeneous IoT.

Authors: Yixue Hao , Yiming Miao , Yuanwen Tian , Long Hu , M. Shamim Hossain , Ghulam Muhammad , Syed Umar Amin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: https://doi.org/10.1109/MNET.2019.1800235
Year: 2019

Machine Learning-based Approach for Depression Detection in Twitter Using Content and Activity Features.

Authors: Hatoon S. AlSagri , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2020

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.

Authors: Kashif Saleem , Abdelouahid Derhab , Jalal Al-Muhtadi , Mehmet A. Orgun
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2014.11.030
Year: 2015

Image forgery detection using steerable pyramid transform and local binary pattern.

Authors: Ghulam Muhammad , Muneer H. Al-Hammadi , Muhammad Hussain , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mach. Vis. Appl. journal
DOI: https://doi.org/10.1007/s00138-013-0547-4
Year: 2014

A new journey in the new year.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-018-00545-5
Year: 2019

Guest editorial for special issue on biometric systems and applications.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-010-9310-6
Year: 2011

Optimized intrusion detection mechanism using soft computing techniques.

Authors: Iftikhar Ahmad 0002 , Azween B. Abdullah , Abdullah Sharaf Alghamdi , Muhammad Hussain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Telecommunication Systems journal
DOI: https://doi.org/10.1007/s11235-011-9541-1
Year: 2013

Bio-chaotic Stream Cipher-Based Iris Image Encryption.

Authors: Abdullah Sharaf Alghamdi , Hanif Ullah , Maqsood Mahmud , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: http://doi.ieeecomputersociety.org/10.1109/CSE.2009.317
Year: 2009

A Non-intrusive Method for Copy-Move Forgery Detection.

Authors: Najah Muhammad , Muhammad Hussain , Muhammad Ghulam , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 7th International Symposium, ISVC 2011, Las Vegas, NV, USA, September 26-28, 2011. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-642-24031-7_52
Year: 2011

Curvelet Transform and Local Texture Based Image Forgery Detection.

Authors: Muneer H. Al-Hammadi , Ghulam Muhammad , Muhammad Hussain , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 9th International Symposium, ISVC 2013, Rethymnon, Crete, Greece, July 29-31, 2013. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-642-41939-3_49
Year: 2013

Gender Recognition from Face Images with Dyadic Wavelet Transform and Local Binary Pattern.

Authors: Ihsan Ullah , Muhammad Hussain , Hatim Aboalsamh , Muhammad Ghulam , Anwar M. Mirza , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Visual Computing - 8th International Symposium, ISVC 2012, Rethymnon, Crete, Greece, July 16-18, 2012, Revised Selected Papers, Part II
DOI: https://doi.org/10.1142/S021821301360018X
Year: 2012

A User-Centric Feature Identification and Modeling Approach to Infer Social Ties in OSNs.

Authors: Mudassir Wani , Majed A. AlRubaian , Muhammad Abulaish
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 15th International Conference on Information Integration and Web-based Applications & Services, IIWAS '13, Vienna, Austria, December 2-4, 2013
DOI: https://doi.org/10.1145/2539150.2539194
Year: 2013

Comprehensive study on methods of fraud prevention in credit card e-payment system.

Authors: Saleh Al-Furiah , Lamia Al-Braheem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia
DOI: https://doi.org/10.1145/1806338.1806450
Year: 2009

Toward Recipes for Arabic DBpedia.

Authors: Alia Bahanshal , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 15th International Conference on Information Integration and Web-based Applications & Services, IIWAS '13, Vienna, Austria, December 2-4, 2013
DOI: https://doi.org/10.1145/2539150.2539199
Year: 2013

Comparative study on contributions of pitch-synchronization and peak-amplitude towards robustness issue of ASR.

Authors: Muhammad Ghulam , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2006 - ICSLP, Ninth International Conference on Spoken Language Processing, Pittsburgh, PA, USA, September 17-21, 2006
DOI: Not available
Year: 2006

Voice quality normalization in an utterance for robust ASR.

Authors: Muhammad Ghulam , Takashi Fukuda , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 8th European Conference on Speech Communication and Technology, EUROSPEECH 2003 - INTERSPEECH 2003, Geneva, Switzerland, September 1-4, 2003
DOI: Not available
Year: 2003

The experience of developing Mr. saud educational system using NAO humanoid robot.

Authors: Hend S. Al-Khalifa , Bashayer Alsalman , Deema Alnuhait , Atheer Alkhalifah , Ohoud Meldah , Sara Aloud
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 6th International Conference on Information and Communication Technology and Accessibility, ICTA 2017, Muscat, Oman, December 19-21, 2017
DOI: https://doi.org/10.1109/ICTA.2017.8336008
Year: 2017

Teaching programming for blinds: A review.

Authors: Nusaibah M. Al-Ratta , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fourth International Conference on Information and Communication Technology and Accessibility, ICTA 2013, Hammamet, Tunisia, October 24-26, 2013
DOI: https://doi.org/10.1109/ICTA.2013.6815285
Year: 2013

Promoting Web Accessibility In A Web Applications Engineering Course: A Case From Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ICTA 2009 - The Second International Conference on Information and Communication Technologies and Accessibility, Hammamet, Tunisia, May 7-9, 2009, Proceeding
DOI: Not available
Year: 2009

Context-aware QoI computation in multi-sensor systems.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, MASS 2008, 29 September - 2 October 2008, Atlanta, Georgia, USA
DOI: http://doi.ieeecomputersociety.org/10.1109/MAHSS.2008.4660120
Year: 2008

Touch-Based Mobile Phone Interface Guidelines and Design Recommendations for Elderly People: A Survey of the Literature.

Authors: Muna S. Al-Razgan , Hend S. Al-Khalifa , Mona D. Al-Shahrani , Hessah H. AlAjmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Neural Information Processing - 19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part IV
DOI: https://doi.org/10.1007/978-3-642-34478-7_69
Year: 2012

Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards.

Authors: Hanan A. Mahmoud , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010
DOI: https://doi.org/10.1109/ISIAS.2010.5604079
Year: 2010

A cooperative intrusion detection scheme for clustered mobile ad hoc networks.

Authors: Hajar Al-Hujailan , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011
DOI: https://doi.org/10.1109/ISIAS.2011.6122816
Year: 2011

An analytical G/M/1 queueing model for providing guaranteed QoS in multimedia surveillance.

Authors: Mohsin Iftikhar , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, ICME 2011, 11-15 July, 2011, Barcelona, Catalonia, Spain
DOI: http://doi.ieeecomputersociety.org/10.1109/ICME.2011.6012213
Year: 2011

Boosting tag-based search in social media sites.

Authors: Majdi Rawashdeh , Mohammed F. Alhamid , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2015 IEEE International Conference on Multimedia & Expo Workshops, ICME Workshops 2015, Turin, Italy, June 29 - July 3, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2015.7169862
Year: 2015

Context-aware elderly entertainment support system in assisted living environment.

Authors: M. Anwar Hossain 0001 , Atif Alamri , Jorge Parra
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 IEEE International Conference on Multimedia and Expo Workshops, San Jose, CA, USA, July 15-19, 2013
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2013.6618365
Year: 2013

Automatic voice disorder classification using vowel formants.

Authors: Muhammad Ghulam , Mansour Alsulaiman , Awais Mahmood , Zulfiqar Ali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, ICME 2011, 11-15 July, 2011, Barcelona, Catalonia, Spain
DOI: http://doi.ieeecomputersociety.org/10.1109/ICME.2011.6012187
Year: 2011

A Comparative Analysis of Task Scheduling Approaches in Cloud Computing.

Authors: Muhammad Ibrahim , Said Nabi , Rasheed Hussain , Muhammad Summair Raza , Muhammad Imran 0001 , S. M. Ahsan Kazmi , Alma Oracevic , Fatima Hussain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/CCGrid49817.2020.00-23
Year: 2020

SecAT-Dist: A Novel Secure AT-Dist Localization Scheme for Wireless Sensor Networks.

Authors: Amal Abdelkarim , Abderrahim Benslimane , Issam Mabrouki , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 76th IEEE Vehicular Technology Conference, VTC Fall 2012, Quebec City, QC, Canada, September 3-6, 2012
DOI: https://doi.org/10.1109/VTCFall.2012.6399374
Year: 2012

Throughput-aware Adaptive Water-filling Algorithm for OFDMA-based Networks.

Authors: Furaih AlShaalan , Saleh AlShebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 70th IEEE Vehicular Technology Conference, VTC Fall 2009, 20-23 September 2009, Anchorage, Alaska, USA
DOI: https://doi.org/10.1109/VETECF.2009.5378923
Year: 2009

Face Recognition Using Multiscale and Spatially Enhanced Weber Law Descriptor.

Authors: Muhammad Hussain , Ghulam Muhammad , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012, Sorrento, Naples, Italy, November 25-29, 2012
DOI: https://doi.org/10.1109/SITIS.2012.24
Year: 2012

DPAP: a dynamic polling based access protocol for wireless networks.

Authors: Sami S. Alwakeel , Mohammad M. Alwakeel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 1998, Boston, MA, USA, September 8-11, 1998
DOI: https://doi.org/10.1109/PIMRC.1998.731352
Year: 1998

Quality-driven human-centered approach for service provisioning in ambient environment.

Authors: M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008
DOI: https://doi.org/10.1145/1462027.1462034
Year: 2008

Coupling Scatter Correction with bandpass filtering for preprocessing in the quantitative analysis of glucose from near infrared spectra.

Authors: Osamah Abdulhameed Alrezj , Krishna Chaitanya Patchava , Mohammed Benaissa , Saleh AlShebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Jeju Island, South Korea, July 11-15, 2017
DOI: https://doi.org/10.1109/EMBC.2017.8037194
Year: 2017

Grammatical Error Checking Systems: A Review of Approaches and Emerging Directions.

Authors: Nora Madi , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2018 Thirteenth International Conference on Digital Information Management (ICDIM), Berlin, Germany, September 24-26, 2018
DOI: https://doi.org/10.1109/ICDIM.2018.8847020
Year: 2018

A technique to overcome the problem of small size database for automatic speaker recognition.

Authors: Mansour Alsulaiman , Awais Mahmood , Muhammad Ghulam , Mohamed Ajami Bencherif , Yousef Ajami Alotaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fifth IEEE International Conference on Digital Information Management, ICDIM 2010, July 5-8, 2010, Lakehead University, Thunder Bay, Canada
DOI: https://doi.org/10.1109/ICDIM.2010.5664673
Year: 2010

Towards Building Arabic Corpus For Drug Information.

Authors: Haifa Al-Ibrahim , Hend Suliman Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 6th International Conference on Management of Emergent Digital EcoSystems, MEDES '14, Buraidah Al Qassim, Saudi Arabia, September 15-17, 2014
DOI: https://doi.org/10.1145/2668260.2668275
Year: 2014

Soft Keyboard UX Evaluation: An Eye Tracking Study.

Authors: Hend Suliman Al-Khalifa , Moneerah Al-Mohsin , Manahel Al-Twaim , Muna S. Al-Razgan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 6th International Conference on Management of Emergent Digital EcoSystems, MEDES '14, Buraidah Al Qassim, Saudi Arabia, September 15-17, 2014
DOI: https://doi.org/10.1145/2668260.2668283
Year: 2014

A Framework of Adaptive Interaction Support in Cloud-Based Internet of Things (IoT) Environment.

Authors: Noura Alhakbani , Mohammad Mehedi Hassan , M. Anwar Hossain 0001 , Mohammed Abdullah Alnuem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Internet and Distributed Computing Systems - 7th International Conference, IDCS 2014, Calabria, Italy, September 22-24, 2014. Proceedings
DOI: https://doi.org/10.1007/978-3-319-11692-1_12
Year: 2014

Mining Regularities in Body Sensor Network Data.

Authors: Syed Khairuzzaman Tanbeer , Mohammad Mehedi Hassan , Majed A. AlRubaian , Byeong-Soo Jeong
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Internet and Distributed Computing Systems - 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings
DOI: https://doi.org/10.1007/978-3-319-23237-9_9
Year: 2015

A purpose-based privacy-aware system using privacy data graph.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia
DOI: https://doi.org/10.1145/1821748.1821827
Year: 2009

Biometric access control for wireless nodes.

Authors: Ohood Althobaiti , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012
DOI: https://doi.org/10.1109/CASoN.2012.6412397
Year: 2012

Further cryptanalysis of 'A remote authentication scheme using mobile device'.

Authors: Muhammad Khurram Khan , Saru Kumari , Mridul Kumar Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012
DOI: https://doi.org/10.1109/CASoN.2012.6412408
Year: 2012

LEXI: A Semantic Tool to Enrich Lexical Competence of Language Learners.

Authors: Maha M. Al-Yahya , Hend S. Al-Khalifa , Alia Bahanshal , Iman Alodah 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ICALT 2011, 11th IEEE International Conference on Advanced Learning Technologies, Athens, Georgia, USA, 6-8 July 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/ICALT.2011.112
Year: 2011

The evolution of metadata from standards to semantics in E-learning applications.

Authors: Hend S. Al-Khalifa , Hugh C. Davis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HYPERTEXT 2006, Proceedings of the 17th ACM Conference on Hypertext and Hypermedia, August 22-25, 2006, Odense, Denmark
DOI: https://doi.org/10.1145/1149941.1149956
Year: 2006

An adaptive edge-preserving variational framework for color image regularization.

Authors: Zhu Lin , Md. Saiful Islam 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ICIP.2005.1529697
Year: 2005

AAEERP: Advanced AUV-Aided Energy Efficient Routing Protocol for Underwater WSNs.

Authors: Naveed Ilyas , Nadeem Javaid , Zafar Iqbal , Muhammad Imran 0001 , Zahoor Ali Khan , Umar Qasim , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangju, South Korea, March 24-27, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/AINA.2015.169
Year: 2015

Extended Lifetime Based Elliptical Sink-Mobility in Depth Based Routing Protocol for UWSNs.

Authors: Naveed Ilyas , Nadeem Javaid , Zafar Iqbal , Muhammad Imran 0001 , Zahoor Ali Khan , Umar Qasim , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, AINA 2015 Workshops, Gwangju, South Korea, March 24-27, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/WAINA.2015.130
Year: 2015

An Efficient Successive Elimination Algorithm for Block-Matching Motion Estimation.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: http://doi.ieeecomputersociety.org/10.1109/DCC.2000.838206
Year: 2000

Vehicular Cloud Architectures: Taxonomy, Security and Challenges.

Authors: Soukeina Zouaidi , Abdelfettah Belghith , Ilhem Lengliz
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 16th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2019, Abu Dhabi, UAE, November 3-7, 2019
DOI: https://doi.org/10.1109/AICCSA47632.2019.9035313
Year: 2019

A layered cluster based routing for an ad hoc environment.

Authors: Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010, Hammamet, Tunisia, May 16-19, 2010
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2010.5587016
Year: 2010

A taboo-based search algorithm to enhance multicast routing under multiple additive constraints.

Authors: Abdelfettah Belghith , Adel Ben Mnaouer , Naouel Ben Ali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069446
Year: 2009

Automatic pronunciation error detection of nonnative Arabic Speech.

Authors: Afnan Al Hindi , Mansour Alsulaiman , Ghulam Muhammad , Saad Alkahtani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2014.7073198
Year: 2014

A cluster based secure architecture for vehicular ad hoc networks.

Authors: Tahani Gazdar , Abdelfettah Belghith , Abderrahim Benslimane
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010, Hammamet, Tunisia, May 16-19, 2010
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2010.5586996
Year: 2010

Voice pathology detection using auto-correlation of different filters bank.

Authors: Ahmed Y. Al-nasheri , Zulfiqar Ali , Ghulam Muhammad , Mansour Alsulaiman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2014.7073178
Year: 2014

A Parameterized Privacy-Aware Pub-sub System in Smart Work.

Authors: Yuan Tian 0003 , Biao Song , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings
DOI: https://doi.org/10.1007/978-3-642-27189-2_22
Year: 2011

A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing.

Authors: Biao Song , Mohammad Mehedi Hassan , Yuan Tian 0003 , Eui-Nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Grid and Distributed Computing - International Conference, GDC 2009, Held as Part of the Future Generation Information Technology Conferences, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
DOI: https://doi.org/10.1007/978-3-642-10549-4_8
Year: 2009

Collision aware coloring algorithm for wireless sensor networks.

Authors: Imen Jemili , Dhouha Ghrab , Abdelfettah Belghith , Bilel Derbel , Amine Dhraief
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013
DOI: https://doi.org/10.1109/IWCMC.2013.6583786
Year: 2013

Logical sub-region with sink mobility for throughput maximization and energy consumption minimization in rectangular UWSNs.

Authors: Ayesha Hussain Khan , Kamran Khan , Saba Gull , Muhammad Sajid , Muhammad Imran 0001 , Nadeem Javaid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/IWCMC.2017.7986531
Year: 2017

E-SeRLoc: An enhanced serloc localization algorithm with reduced computational complexity.

Authors: Issam Mabrouki , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013
DOI: https://doi.org/10.1109/IWCMC.2013.6583551
Year: 2013

Data Gathering for Internet of Vehicles Safety.

Authors: Chahrazed Ksouri , Imen Jemili , Mohamed Mosbah , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th International Wireless Communications & Mobile Computing Conference, IWCMC 2018, Limassol, Cyprus, June 25-29, 2018
DOI: https://doi.org/10.1109/IWCMC.2018.8450498
Year: 2018

Towards Invariant Interest Point Detection of an Objects.

Authors: Md. Saiful Islam 0001 , Andrzej Sluzek , Zhu Lin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: Not available
Year: 2005

Confidence scoring for accurate HMM-based word recognition by using SM-based monophone score normalization.

Authors: Takaharu Sato , Muhammad Ghulam , Takashi Fukuda , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2002, May 13-17 2002, Orlando, Florida, USA
DOI: https://doi.org/10.1109/ICASSP.2002.5743693
Year: 2002

A Pitch-Synchronous Peak-Amplitude Based Feature Extraction Method for Noise Robust ASR.

Authors: Muhammad Ghulam , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ICASSP.2006.1660068
Year: 2006

Toward Designing Efficient Service Discovery Protocol in Vehicular Networks.

Authors: Lamya Albraheem , Mznah AlRodhan , AbduAllah Aldhlaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Internet of Vehicles - Technologies and Services - First International Conference, IOV, Beijing, China, September 1-3, 2014. Proceedings
DOI: https://doi.org/10.1007/978-3-319-11167-4_9
Year: 2014

Audio Compression Testing Tool for Multimedia Applications.

Authors: Fatimah J. Mohdar , Madawi S. Al-Otaibi , Hatim A. Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Image Processing and Communications Challenges 3 - 3rd International Conference, IP&C 2011, Proceedings
DOI: https://doi.org/10.1007/978-3-642-23154-4_46
Year: 2011

Developing Interactive Quizzes Using LAYAR(TM) Augmented Reality: Lessons Learned.

Authors: Atheer S. Al-Khalifa , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sixth International Conference on Next Generation Mobile Applications, Services and Technologies, NGMAST 2012, Paris, France, September 12-14, 2012
DOI: https://doi.org/10.1109/NGMAST.2012.16
Year: 2012

EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension.

Authors: Honghao Zhou , Tinghuai Ma , Jing Jia , Yuan Tian 0003 , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III
DOI: https://doi.org/10.1007/978-3-030-00012-7_4
Year: 2018

Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition.

Authors: Lu Leng , Jiashu Zhang , Jing Xu , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Conference on Information and Communication Technology Convergence, ICTC 2010, Jeju, South Korea, 17-19 November 2010
DOI: https://doi.org/10.1109/ICTC.2010.5674791
Year: 2010

Q-Routing in Cognitive Packet Network Routing Protocol for MANETs.

Authors: Amal Alharbi , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: NCTA 2014 - Proceedings of the International Conference on Neural Computation Theory and Applications, part of IJCCI 2014, Rome, Italy, 22 - 24 October, 2014
DOI: https://doi.org/10.5220/0005082902340243
Year: 2014

Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device.

Authors: Muhammad Khurram Khan , Saru Kumari , Mridul Kumar Gupta , Fahad Bin Muhaya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Brain Inspired Cognitive Systems - 6th International Conference, BICS 2013, Beijing, China, June 9-11, 2013. Proceedings
DOI: https://doi.org/10.1007/978-3-642-38786-9_31
Year: 2013

Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration.

Authors: Yuan Tian 0003 , Mznah Al-Rodhaan , Biao Song , Abdullah Al-Dhelaan , Tinghuai Ma
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014
DOI: https://doi.org/10.1109/ISBAST.2014.7013115
Year: 2014

Design and Evaluation of Remote Video Surveillance System on Private Cloud.

Authors: Biao Song , Yuan Tian 0003 , Bingyin Zhou
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014
DOI: https://doi.org/10.1109/ISBAST.2014.7013131
Year: 2014

Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes.

Authors: Mohamed Hamdy Eldefrawy , Khaled Alghathbar , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012, Taipei, Taiwan, March 26-29, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/ISBAST.2012.16
Year: 2012

Study of VOD streaming on BitTorrent.

Authors: Chourouk Hammami , Achraf Gazdar , Imen Jemili , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Symposium on Networks, Computers and Communications, ISNCC 2015, Yasmine Hammamet, Tunisia, May 13-15, 2015
DOI: https://doi.org/10.1109/ISNCC.2015.7238581
Year: 2015

Virtual Reality System Specifications for Pain Management Therapy.

Authors: Hatim Aboalsamh , Hind Al Hashim , Faten Alrashed , Nada Alkhamis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE International Conference on Bioinformatics and Bioengineering, BIBE 2011, Taichung, Taiwan, October 24-26, 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/BIBE.2011.69
Year: 2011

An Intelligent Fingerprint-Biometric Image Scrambling Scheme.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings
DOI: https://doi.org/10.1007/978-3-540-74205-0_118
Year: 2007

Arabic and English speech recognition using cross-language acoustic models.

Authors: Yousef Ajami Alotaibi , Sid-Ahmed Selouani , Mansour M. Alghamdi , Ali H. Meftah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012, Montreal, QC, Canada, July 2-5, 2012
DOI: https://doi.org/10.1109/ISSPA.2012.6310585
Year: 2012

Voice Pathology Detection Using Vocal Tract Area.

Authors: Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh UKSim/AMSS European Modelling Symposium, EMS 2013, 20-22 November, 2013, Manchester UK
DOI: https://doi.org/10.1109/EMS.2013.29
Year: 2013

Reintroducing KAPD as a Dataset for Machine Learning and Data Mining Applications.

Authors: Yasser M. Seddiq , Ali H. Meftah , Mansour M. Alghamdi , Yousef Alotaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 European Modelling Symposium, EMS 2016, Pisa, Italy, November 28-30, 2016
DOI: https://doi.org/10.1109/EMS.2016.022
Year: 2016

Voice Pathology Detection Using Multiresolution Technique.

Authors: Ghulam Muhammad , Mansour Alsulaiman , Awais Mahmood , Malak Almojali , Mohamed Abdelkader Bencherif
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 European Modelling Symposium, Pisa, Italy, October 21-23, 2014
DOI: https://doi.org/10.1109/EMS.2014.86
Year: 2014

Introducing mobile widgets development in an advanced web technologies course.

Authors: Hend S. Al-Khalifa , Afnan A. Al-Subaihin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ACM Special Interest Group for Information Technology Education Conference, SIGITE' 12, Calgary, AB, Canada, October 11 - 13, 2012
DOI: https://doi.org/10.1145/2380552.2380569
Year: 2012

A distributed self-healing algorithm for virtual backbone construction and maintenance in Wireless Sensor Networks.

Authors: Najla Al-Nabhan , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE International Conference on Wireless for Space and Extreme Environments, WiSEE 2013, Baltimore, MD, USA, November 7-9, 2013
DOI: https://doi.org/10.1109/WiSEE.2013.6737547
Year: 2013

AraSenTi-Tweet: A Corpus for Arabic Sentiment Analysis of Saudi Tweets.

Authors: Nora Al-Twairesh , Hend S. Al-Khalifa , AbdulMalik Al-Salman , Yousef Al-Ohali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Third International Conference On Arabic Computational Linguistics, ACLING 2017, November 5-6, 2017, Dubai, United Arab Emirates
DOI: https://doi.org/10.1016/j.procs.2017.10.094
Year: 2017

The E-training Caravans: An e-Inclusion Initiative in Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HCI International 2013 - Posters' Extended Abstracts - International Conference, HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-642-39473-7_37
Year: 2013

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.

Authors: Kashif Saleem , Khan Zeb , Abdelouahid Derhab , Haider Abbas , Jalal Al-Muhtadi , Mehmet A. Orgun , Amjad Gawanmeh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/HealthCom.2016.7749423
Year: 2016

Low delay and secure M2M communication mechanism for eHealthcare.

Authors: Kashif Saleem , Abdelouahid Derhab , Jalal Al-Muhtadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/HealthCom.2014.7001822
Year: 2014

Classical Arabic phoneme contextual analysis using HMM classifiers.

Authors: Yousef Alotaibi , Ali H. Meftah , Sid-Ahmed Selouani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2016, Limassol, Cyprus, December 12-14, 2016
DOI: https://doi.org/10.1109/ISSPIT.2016.7886001
Year: 2016

SQUIRREL: Self-Organizing Qos-roUting for IntRa-flow Contention in Ad-Hoc wiRELess Networks.

Authors: Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Self-Organizing Systems, Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings
DOI: https://doi.org/10.1007/978-3-540-92157-8_24
Year: 2008

What Color? A Real-time Color Identification Mobile Application for Visually Impaired People.

Authors: Sara A. Al-Doweesh , Felwah A. Al-Hamed , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: HCI International 2014 - Posters' Extended Abstracts - International Conference, HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-07854-0_36
Year: 2014

Mobile Networks A pull-based service replication protocol in mobile ad hoc networks.

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eur. Trans. Telecommun. journal
DOI: https://doi.org/10.1002/ett.1080
Year: 2007

Efficient Expanding Ring Search for MANETs.

Authors: Mznah Al-Rodhaan , Lewis M. Mackenzie , Mohamed Ould-Khaoua
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Commun. Networks Inf. Secur. journal
DOI: Not available
Year: 2010

Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals.

Authors: Muhammad Khurram Khan , Ling Xie , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Digit. Signal Process. journal
DOI: https://doi.org/10.1016/j.dsp.2009.05.004
Year: 2010

Eye Tracking and e-Learning: Seeing Through Your Students' Eyes.

Authors: Hend Suliman Al-Khalifa , Remya P. George
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: eLearn Magazine journal
DOI: https://doi.org/10.1145/1821982.1833511
Year: 2010

Reliability analysis of projectile penetration into geological targets.

Authors: Nadeem A. Siddiqui , M. A. Choudhury , Husain Abbas
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Reliab. Eng. Syst. Saf. journal
DOI: https://doi.org/10.1016/S0951-8320(02)00050-9
Year: 2002

Deep Feature Learning for Disease Risk Assessment Based on Convolutional Neural Network With Intra-Layer Recurrent Connection by Using Hospital Big Data.

Authors: Mohd Usama , Belal Ahmad , Jiafu Wan , M. Shamim Hossain , Mohammed F. Alhamid , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2879158
Year: 2018

Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures.

Authors: Junaid Shuja , Saad Mustafa , Raja Wasim Ahmad , Sajjad Ahmad Madani , Abdullah Gani , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2713818
Year: 2017

Healthcare Big Data Voice Pathology Assessment Framework.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2016.2626316
Year: 2016

Biometric Security Through Visual Encryption for Fog Edge Computing.

Authors: Wadood Abdul , Zulfiqar Ali , Sanaa Ghouzali , Budour Alfawaz , Ghulam Muhammad , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2693438
Year: 2017

Investigating Smart Home Security: Is Blockchain the Answer?

Authors: Samrah Arif , M. Arif Khan , Sabih ur Rehman , Muhammad Ashad Kabir , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.3004662
Year: 2020

Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols.

Authors: Zeeshan Siddiqui , Omar Tayan , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2845299
Year: 2018

Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm.

Authors: Tinghuai Ma , Jingjing Qu , Wenhai Shen , Yuan Tian 0003 , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2790381
Year: 2018

Blind Detection of Copy-Move Forgery in Digital Audio Forensics.

Authors: Muhammad Imran 0001 , Zulfiqar Ali , Sheikh Tahir Bakhsh , Sheeraz Akram
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2717842
Year: 2017

A New Method of Privacy Protection: Random k-Anonymous.

Authors: Fagen Song , Tinghuai Ma , Yuan Tian 0003 , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2919165
Year: 2019

Extending the Technology Acceptance Model for Use of e-Learning Systems by Digital Learners.

Authors: Aamer Hanif , Faheem Qaisar Jamal , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2881384
Year: 2018

Sybil Defense Techniques in Online Social Networks: A Survey.

Authors: Muhammad Al-Qurishi , Mabrook Al-Rakhami , Atif Alamri , Majed A. AlRubaian , Sk. Md. Mizanur Rahman , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2656635
Year: 2017

Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.

Authors: Wilayat Khan , Muhammad Kamran , Aakash Ahmad , Farrukh Aslam Khan , Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2895261
Year: 2019

An Improved Web Cache Replacement Algorithm Based on Weighting and Cost.

Authors: Tinghuai Ma , Yu Hao , Wenhai Shen , Yuan Tian 0003 , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2829142
Year: 2018

Cognitive Smart Healthcare for Pathology Detection and Monitoring.

Authors: Syed Umar Amin , M. Shamim Hossain , Ghulam Muhammad , Musaed Alhussein , Mohamed Abdur Rahman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2891390
Year: 2019

Robust Detection of Atrial Fibrillation Using Classification of a Linearly-Transformed Window of R-R Intervals Tachogram.

Authors: Md. Saiful Islam 0001 , Mohamed Maher Ben Ismail , Ouiem Bchir , Mohammed Zakariah , Yousef Ajami Alotaibi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2933507
Year: 2019

A low power VLSI architecture for multistage interval-based motion estimation (MIME) algorithm.

Authors: Hanan A. Mahmoud , Sumeer Goel , Mohsen Shaaban , Tarek Darwish , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Third International Workshop on Digital and Computational Video, DCV 2002, Clearwater Beach, Florida, USA, November 14-15, 2002, Proceedings
DOI: https://doi.org/10.1109/DCV.2002.1218757
Year: 2002

An Efficient Low-Bit Rate Adaptive Mesh-Based Motion Compensation Technique.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2nd International Workshop on Digital and Computational Video (DCV 2001), 9 February 2001, Tampa, Florida, USA
DOI: http://doi.ieeecomputersociety.org/10.1109/DCV.2001.929956
Year: 2001

Autonomic Management of the HIP-based M2M Overlay Network.

Authors: Amine Dhraief , Abdelfettah Belghith , Khalil Drira , Tarek Bouali , Mohamed Amine Ghorbali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013
DOI: https://doi.org/10.1016/j.procs.2013.06.018
Year: 2013

Enabling Smarter Societies through Mobile Big Data Fogs and Clouds.

Authors: Yasir Arfat , Muhammad Aqib , Rashid Mehmood , Aiiad Albeshri , Iyad Katib , Nasser N. Albogami , Ahmed Alzahrani 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th International Conference on Ambient Systems, Networks and Technologies (ANT 2017) / The 7th International Conference on Sustainable Energy Information Technology (SEIT 2017), 16-19 May 2017, Madeira, Portugal
DOI: https://doi.org/10.1016/j.procs.2017.05.439
Year: 2017

LEATCH: Low Energy Adaptive Tier Clustering Hierarchy.

Authors: Wafa Akkari , Badia Bouhdid , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015
DOI: https://doi.org/10.1016/j.procs.2015.05.110
Year: 2015

Cluster Connectivity Assurance Metrics in Vehicular ad hoc Networks.

Authors: Mohamed Aissa , Abdelfettah Belghith , Badia Bouhdid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015), London, UK, June 2-5, 2015
DOI: https://doi.org/10.1016/j.procs.2015.05.088
Year: 2015

Cartography Gathering Driven by the OLSR Protocol.

Authors: Mohamed Belhassen , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Networked Digital Technologies - 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012. Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-642-30507-8_42
Year: 2012

Countering Statistical Attacks in Cloud-Based Searchable Encryption.

Authors: M. A. Manazir Ahsan , Ihsan Ali , Mohd Yamani Idna Bin Idris , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Parallel Program. journal
DOI: https://doi.org/10.1007/s10766-018-0584-8
Year: 2020

Automatic Arabic text summarization: a survey.

Authors: Asma Bader Al-Saleh , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Artif. Intell. Rev. journal
DOI: https://doi.org/10.1007/s10462-015-9442-x
Year: 2016

MADAD: A Readability Annotation Tool for Arabic Text.

Authors: Nora Al-Twairesh , Abeer Al-Dayel , Hend S. Al-Khalifa , Maha M. Al-Yahya , Sinaa Alageel , Nora Abanmy , Nouf Al-Shenaifi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, Portorož, Slovenia, May 23-28, 2016.
DOI: Not available
Year: 2016

SAHL: A Touchscreen Mobile Launcher for Arab Elderly.

Authors: Muna S. Al-Razgan , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Mobile Multimedia journal
DOI: Not available
Year: 2017

Autonomic Obstacle Detection and Avoidance in MANETs Driven by Cartography Enhanced OLSR.

Authors: Abdelfettah Belghith , Mohamed Belhassen , Amine Dhraief , Nourelhouda Dougui , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mobile Information Systems journal
DOI: https://doi.org/10.1155/2015/820401
Year: 2015

A Real-Time Intelligent Wireless Mobile Station Location Estimator with Application to TETRA Network.

Authors: Faihan D. Alotaibi , Adel Abdennour , Adel Ahmed Ali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Mob. Comput. journal
DOI: http://doi.ieeecomputersociety.org/10.1109/TMC.2009.66
Year: 2009

NSNAD: negative selection-based network anomaly detection approach with relevant feature subset.

Authors: Naila Belhadj Aissa , Mohamed Guerroumi , Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Neural Computing and Applications journal
DOI: https://doi.org/10.1007/s00521-019-04396-2
Year: 2020

Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems.

Authors: SK Hafizul Islam , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-014-0135-9
Year: 2014

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

Authors: Shehzad Ashraf Chaudhry , Muhammad Tawab Khan , Muhammad Khurram Khan , Taeshik Shon
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-016-0592-4
Year: 2016

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.

Authors: Saru Kumari , Muhammad Khurram Khan , Rahul Kumar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Medical Syst. journal
DOI: https://doi.org/10.1007/s10916-013-9952-5
Year: 2012

An empirical study on cloud computing requirements for better mobile learning services.

Authors: Mohamed Sarrab , Nasser Alalwan , Osama Alfarraj , Ahmed Alzahrani 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Mob. Learn. Organisation journal
DOI: https://doi.org/10.1504/IJMLO.2015.069709
Year: 2015

Evaluation of Current Documents Image Denoising Techniques: A Comparative Study.

Authors: Tanzila Saba , Amjad Rehman , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Applied Artificial Intelligence journal
DOI: https://doi.org/10.1080/08839514.2014.954344
Year: 2014

Towards context-aware media recommendation based on social tagging.

Authors: Mohammed F. Alhamid , Majdi Rawashdeh , M. Anwar Hossain 0001 , Abdulhameed Alelaiwi , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Intell. Inf. Syst. journal
DOI: https://doi.org/10.1007/s10844-015-0364-5
Year: 2016

Natural disaster topic extraction in Sina microblogging based on graph analysis.

Authors: Tinghuai Ma , YuWei Zhao , Honghao Zhou , Yuan Tian 0003 , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Expert Syst. Appl. journal
DOI: https://doi.org/10.1016/j.eswa.2018.08.010
Year: 2019

Sensor-Web Systems, Applications, and Services.

Authors: M. Anwar Hossain 0001 , Jemal H. Abawajy , Raúl García-Castro , Wen-Huang Cheng , Dewan Tanvir Ahmed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2016/5349568
Year: 2016

Cloud-Based Collaborative Media Service Framework for HealthCare.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2014/858712
Year: 2014

Enabling Technologies for Next-Generation Sensor Networks: Prospects, Issues, Solutions, and Emerging Trends.

Authors: Muhammad Imran 0001 , Sana Ullah , Ansar-Ul-Haque Yasar , Athanasios V. Vasilakos , Sajid Hussain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/634268
Year: 2015

Enhancing Safety in Water Transport System Based on Internet of Things for Developing Countries.

Authors: Md Mohaimenuzzaman , S. M. Monzurur Rahman , Musaed Alhussein , Ghulam Muhammad , Khondaker Abdullah-Al-Mamun
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2016/2834616
Year: 2016

Watermarking of Parkinson Disease Speech in Cloud-Based Healthcare Framework.

Authors: Musaed Alhussein , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/264575
Year: 2015

A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient.

Authors: Muhammad Al-Qurishi , Mabrook Al-Rakhami , Fattoh Al-Qershi , Mohammad Mehedi Hassan , Atif Alamri , Hameed Ullah Khan , Yang Xiang 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/985629
Year: 2015

A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks.

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Parallel Distrib. Syst. journal
DOI: http://doi.ieeecomputersociety.org/10.1109/TPDS.2007.70792
Year: 2008

A Hybrid Fusion Technique for Watermarking Digital Images.

Authors: Ahmed S. Salama , Mohammed A. Al-Qodah , Abdullah M. Iliyasu , Awad Kh. Al-Asmari , Fei Yan 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/978-3-319-01857-7_20
Year: 2013

Remote display solution for video surveillance in multimedia cloud.

Authors: Biao Song , Mohammad Mehedi Hassan , Yuan Tian 0003 , M. Shamim Hossain , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-015-2816-x
Year: 2016

A novel countermeasure technique for reactive jamming attack in internet of things.

Authors: Fadele Ayotunde Alaba , Mazliza Othman , Ibrahim Abaker Targio Hashem , Ibrar Yaqoob , Muhammad Imran 0001 , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-018-6684-z
Year: 2019

Mining tag-clouds to improve social media recommendation.

Authors: Majdi Rawashdeh , Mohammad Shorfuzzaman , Abdel Monim Artoli , M. Shamim Hossain , Ahmed Ghoneim
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-016-4039-1
Year: 2017

Research advances in data hiding for multimedia security.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-011-0741-1
Year: 2011

A Backbone-Based Co-evolutionary Heuristic for Partial MAX-SAT.

Authors: Mohamed El-bachir Menai , Mohamed Batouche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/11740698_14
Year: 2005

A Logic-Based Approach to Solve the Steiner Tree Problem.

Authors: Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Artificial Intelligence Applications and Innovations III, Proceedings of the 5TH IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI'2009), April 23-25, 2009, Thessaloniki, Greece
DOI: https://doi.org/10.1007/978-1-4419-0221-4_10
Year: 2009

A two-stage constellation partition algorithm for reduced-complexity MIMO-MLD systems.

Authors: Ahmed Iyanda Sulyman , Yousef Abdullah Al-Zahrani , Saeed Al-Dosari , Abdulhameed M. Al-Sanie , Saleh Al-Shebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2010.5735804
Year: 2010

Hierarchical Object Categorization with Automatic Feature Selection.

Authors: Md. Saiful Islam 0001 , Andrzej Sluzek
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Multiconference on Computer Science and Information Technology - IMCSIT 2010, Wisla, Poland, 18-20 October 2010, Proceedings
DOI: Not available
Year: 2010

A Review of Wrist-Worn Wearable: Sensors, Models, and Challenges.

Authors: Rasha M. BinSultan Al-Eidan , Hend S. Al-Khalifa , AbdulMalik Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Sensors journal
DOI: https://doi.org/10.1155/2018/5853917
Year: 2018

A Privacy-aware Graph-based Access Control System for Healthcare Domain.

Authors: Yuan Tian 0003 , Biao Song , Mohammad Mehedi Hassan , Eui-Nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2012.10.016
Year: 2012

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'.

Authors: Muhammad Khurram Khan , Saru Kumari , Pitam Singh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2013.05.002
Year: 2013

Challenges and Solutions for Internet of Things Driven by IPv6.

Authors: Qazi Emad-ul-Haq , Hatim Aboalsamh , Abdelfettah Belghith , Muhammad Hussain , Wadood Abdul , Mostafa H. Dahshan , Sanaa Ghouzali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2015.12.001
Year: 2015

Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification.

Authors: Zeeshan Siddiqui , Abdul Hanan Abdullah , Muhammad Khurram Khan , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Peer Peer Netw. Appl. journal
DOI: https://doi.org/10.1007/s12083-015-0364-9
Year: 2016

Solving the Maximum Satisfiability Problem Using an Evolutionary Local Search Algorithm.

Authors: Mohamed El-bachir Menai , Mohamed Batouche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. Arab J. Inf. Technol. journal
DOI: Not available
Year: 2005

Self-stabilizing algorithm for high service availability in spite of concurrent topology changes in ad hoc mobile networks.

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Parallel Distributed Comput. journal
DOI: https://doi.org/10.1016/j.jpdc.2008.01.005
Year: 2008

Data replication protocols for mobile ad-hoc networks: a survey and taxonomy.

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Commun. Surv. Tutorials journal
DOI: https://doi.org/10.1109/SURV.2009.090204
Year: 2009

Enabling Synchronous and Asynchronous Communications in CSP for SOC.

Authors: Abeer S. Al-Humaimeedy , Maribel Fernández
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 8th Workshop on Logical and Semantic Frameworks, LSFA 2013, São Paulo, Brazil, September 2-3, 2013
DOI: https://doi.org/10.1016/j.entcs.2015.04.005
Year: 2014

On the Analysis of Twitter Spam Accounts in Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Technol. Diffusion journal
DOI: https://doi.org/10.4018/IJTD.2015010103
Year: 2015

A Self-adaptive Genetic Algorithm for the Word Sense Disambiguation Problem.

Authors: Wojdan Alsaeedan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Current Approaches in Applied Artificial Intelligence - 28th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2015, Seoul, South Korea, June 10-12, 2015, Proceedings
DOI: https://doi.org/10.1007/978-3-319-19066-2_56
Year: 2015

Efficient Route Discovery Algorithm for MANETs.

Authors: Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fifth International Conference on Networking, Architecture, and Storage, NAS 2010, Macau, China, July 15-17, 2010
DOI: http://doi.ieeecomputersociety.org/10.1109/NAS.2010.30
Year: 2010

Digital multimedia audio forensics: past, present and future.

Authors: Mohammed Zakariah , Muhammad Khurram Khan , Hafiz Malik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-016-4277-2
Year: 2018

Spectro-temporal directional derivative based automatic speech recognition for a serious game scenario.

Authors: Muhammad Ghulam , Mehedi Masud , Abdulhameed Alelaiwi , Md. Abdur Rahman , Ali Karime , Atif Alamri , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-014-1973-7
Year: 2015

A Credibility Analysis System for Assessing Information on Twitter.

Authors: Majed A. AlRubaian , Muhammad Al-Qurishi , Mohammad Mehedi Hassan , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Dependable Secur. Comput. journal
DOI: http://doi.ieeecomputersociety.org/10.1109/TDSC.2016.2602338
Year: 2018

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues.

Authors: Arwa Aldweesh , Abdelouahid Derhab , Ahmed Z. Emam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Knowl. Based Syst. journal
DOI: https://doi.org/10.1016/j.knosys.2019.105124
Year: 2020

Deep learning-based intelligent face recognition in IoT-cloud environment.

Authors: Mehedi Masud , Ghulam Muhammad , Hesham Alhumyani , Sultan S. Alshamrani , Omar Cheikhrouhou , Saleh Ibrahim , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Commun. journal
DOI: https://doi.org/10.1016/j.comcom.2020.01.050
Year: 2020

Analysis of Energy Efficiency for MIMO Wireless Network using Manifold Techniques.

Authors: Ahmed Alzahrani 0001 , Vijey Thayananthan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Inf. Sci. Eng. journal
DOI: Not available
Year: 2019

First-order optimality conditions and duality results for multi-objective optimisation problems.

Authors: Sameh S. Askar , Ashutosh Tiwari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Annals OR journal
DOI: https://doi.org/10.1007/s10479-009-0607-3
Year: 2009

Human Face Recognition using Eigen and Fisher Faces.

Authors: Hatim A. Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Egypt. Comput. Sci. J. journal
DOI: Not available
Year: 2009

PSO-Based Feature Selection for Arabic Text Summarization.

Authors: Ahmed M. Al-Zahrani , Hassan Mathkour , Hassan Ismail Abdalla
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. UCS journal
DOI: Not available
Year: 2015

An Efficient Binary Differential Evolution with Parameter Adaptation.

Authors: Dongli Jia , Xintao Duan , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Comput. Intell. Syst. journal
DOI: https://doi.org/10.1080/18756891.2013.769769
Year: 2013

Corrigendum: Correction of Acknowledgment: An improved mechanism for flow rule installation in In-band SDN [Journal of Systems Architecture 96 (2019) 1-19].

Authors: Israr Iqbal Awan , Nadir Shah , Muhammad Imran 0001 , Muhammad Shoaib 0005 , Nasir Saeed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Syst. Archit. journal
DOI: https://doi.org/10.1016/j.sysarc.2019.101649
Year: 2019

A zero-watermarking algorithm for privacy protection in biomedical signals.

Authors: Zulfiqar Ali , Muhammad Imran 0001 , Mansour Alsulaiman , Tanveer A. Zia , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2017.12.007
Year: 2018

Secure privacy vault design for distributed multimedia surveillance system.

Authors: Sk. Md. Mizanur Rahman , M. Anwar Hossain 0001 , Mohammad Mehedi Hassan , Atif Alamri , Abdullah S. Alghamdi , Mukaddim Pathan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2014.10.019
Year: 2016

Cloud-assisted secure video transmission and sharing framework for smart cities.

Authors: M. Shamim Hossain , Ghulam Muhammad , Wadood Abdul , Biao Song , Brij B. Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2017.03.029
Year: 2018

A prediction system of Sybil attack in social network using deep-regression model.

Authors: Muhammad Al-Qurishi , Majed A. AlRubaian , Sk. Md. Mizanur Rahman , Atif Alamri , Mohammad Mehedi Hassan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2017.08.030
Year: 2018

Voice pathology detection using interlaced derivative pattern on glottal source excitation.

Authors: Ghulam Muhammad , Mansour Alsulaiman , Zulfiqar Ali , Tamer A. Mesallam , Mohamed A. Farahat , Khalid H. Malki , Ahmed Y. Al-nasheri , Mohamed Ajami Bencherif
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Biomed. Signal Process. Control. journal
DOI: https://doi.org/10.1016/j.bspc.2016.08.002
Year: 2017

Canonicalization of Feature Parameters for Robust Speech Recognition Based on Distinctive Phonetic Feature (DPF) Vectors.

Authors: Mohammad Nurul Huda , Muhammad Ghulam , Takashi Fukuda , Kouichi Katsurada , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1093/ietisy/e91-d.3.488
Year: 2008

A New Sentiment Case-Based Recommender.

Authors: Mashael Aldayel , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1587/transinf.2016EDP7441
Year: 2017

Edge Computing with Cloud for Voice Disorder Assessment and Treatment.

Authors: Ghulam Muhammad , Mohammed F. Alhamid , Mansour Alsulaiman , Brij Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2018.1700790
Year: 2018

Medical Image Forgery Detection for Smart Healthcare.

Authors: Ahmed Ghoneim , Ghulam Muhammad , Syed Umar Amin , Brij Gupta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2018.1700817
Year: 2018

HBS: A Novel Biometric Feature Based on Heartbeat Morphology.

Authors: Md. Saiful Islam 0001 , Naif Alajlan , Yakoub Bazi , Haikel Hichri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Inf. Technol. Biomed. journal
DOI: https://doi.org/10.1109/TITB.2012.2188535
Year: 2012

The impact of cost uncertainty on Cournot oligopoly game with concave demand function.

Authors: Sameh S. Askar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Math. Comput. journal
DOI: https://doi.org/10.1016/j.amc.2014.01.097
Year: 2014

Tripoly Stackelberg game model: One leader versus two followers.

Authors: Sameh S. Askar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Math. Comput. journal
DOI: https://doi.org/10.1016/j.amc.2018.01.041
Year: 2018

The arising of cooperation in Cournot duopoly games.

Authors: Sameh S. Askar , Ahmad M. Alshamrani , K. Alnowibet
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Math. Comput. journal
DOI: https://doi.org/10.1016/j.amc.2015.10.027
Year: 2016

Developing an Instrument for E-Public Services' Acceptance Using Confirmatory Factor Analysis: Middle East Context.

Authors: Ahmed Alzahrani 0001 , Bernd Carsten Stahl , Mary Prior
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Organ. End User Comput. journal
DOI: https://doi.org/10.4018/joeuc.2012070102
Year: 2012

Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities.

Authors: Hasan Ali Khattak , Zoobia Ameer , Ikram Ud Din , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Sci. Inf. Syst. journal
DOI: https://doi.org/10.2298/CSIS181115004K
Year: 2019

On the security enhancement of integrated electronic patient records information systems.

Authors: Muhammad Khurram Khan , Ankita Chaturvedi , Dheerendra Mishra , Saru Kumari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Sci. Inf. Syst. journal
DOI: https://doi.org/10.2298/CSIS141029030K
Year: 2015

Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things.

Authors: Shichao Li , Ning Zhang , Siyu Lin , Linghe Kong , Ajay K. Katangur , Muhammad Khurram Khan , Minming Ni , Gang Zhu
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.2018.1700163
Year: 2018

Computing and Processing on the Edge: Smart Pathology Detection for Connected Healthcare.

Authors: Ghulam Muhammad , Mohammed F. Alhamid , Xiaomi Long
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.001.1900045
Year: 2019

On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues.

Authors: Ahmed Abdelaziz , Tan Fong Ang , Abdullah Gani , Suleman Khan , Faiz Alotaibi , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. J. journal
DOI: https://doi.org/10.1093/comjnl/bxx063
Year: 2017

An effective memetic differential evolution algorithm based on chaotic local search.

Authors: Dongli Jia , Guoxin Zheng , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Sci. journal
DOI: https://doi.org/10.1016/j.ins.2011.03.018
Year: 2011

Telesurgery Robot Based on 5G Tactile Internet.

Authors: Yiming Miao , Yingying Jiang , Limei Peng , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-018-1110-3
Year: 2018

Gain-based Selection of Ambient Media Services in Pervasive Environments.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-008-0092-y
Year: 2008

Cognitive IoT-Cloud Integration for Smart Healthcare: Case Study for Epileptic Seizure Detection and Monitoring.

Authors: Musaed Alhussein , Ghulam Muhammad , M. Shamim Hossain , Syed Umar Amin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-018-1113-0
Year: 2018

Cloud-assisted Industrial Systems and Applications.

Authors: Jiafu Wan , Muhammad Khurram Khan , Meikang Qiu , Daqiang Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-016-0744-2
Year: 2016

Cloud-Assisted Speech and Face Recognition Framework for Health Monitoring.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-015-0586-3
Year: 2015

A survey on privacy protection in blockchain system.

Authors: Qi Feng , Debiao He , Sherali Zeadally , Muhammad Khurram Khan , Neeraj Kumar 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2018.10.020
Year: 2019

Special issue on: Recent advances and future directions in biometrics personal identification.

Authors: Muhammad Khurram Khan , Mohamed Kamel , Xudong Jiang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2010.03.019
Year: 2010

A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases.

Authors: Muhammad Usman Younus , Saif ul Islam , Ihsan Ali , Suleman Khan , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2019.04.002
Year: 2019

Modeling and assessing quality of information in multisensor multimedia monitoring systems.

Authors: M. Anwar Hossain 0001 , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: ACM Trans. Multim. Comput. Commun. Appl. journal
DOI: https://doi.org/10.1145/1870121.1870124
Year: 2011

Study on pharyngeal and uvular consonants in foreign accented Arabic for ASR.

Authors: Yousef Ajami Alotaibi , Muhammad Ghulam
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Speech Lang. journal
DOI: https://doi.org/10.1016/j.csl.2009.04.005
Year: 2010

A Deep-Tree-Model-Based Radio Resource Distribution for 5G Networks.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wirel. Commun. journal
DOI: https://doi.org/10.1109/MWC.001.1900286
Year: 2020

Extended Gradient RSSI Predictor and Filter for Signal Prediction and Filtering in Communication Holes.

Authors: Fazli Subhan , Salman Ahmed , Khalid Ashraf , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless Personal Communications journal
DOI: https://doi.org/10.1007/s11277-015-2394-2
Year: 2015

Towards a computerized Arabic Braille environment.

Authors: AbdulMalik S. Al-Salman , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Softw. Pract. Exp. journal
DOI: https://doi.org/10.1002/spe.501
Year: 2003

Weighted curvature-preserving PDE image filtering method.

Authors: Wei Tian , Tinghuai Ma , Yuhui Zheng , Xin Wang , Yuan Tian 0003 , Abdullah Al-Dhelaan , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Math. Appl. journal
DOI: https://doi.org/10.1016/j.camwa.2015.07.022
Year: 2015

Exploring Latent Preferences for Context-Aware Personalized Recommendation Systems.

Authors: Mohammed F. Alhamid , Majdi Rawashdeh , Haiwei Dong , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Hum. Mach. Syst. journal
DOI: https://doi.org/10.1109/THMS.2015.2509965
Year: 2016

A Robust Deep Learning Approach for Position-Independent Smartphone-Based Human Activity Recognition.

Authors: Bandar Almaslukh , Abdel Monim Artoli , Jalal Al-Muhtadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s18113726
Year: 2018

Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.

Authors: Thaier Hayajneh , Bassam Jamil Mohd , Muhammad Imran 0001 , Ghada Almashaqbeh , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s16040424
Year: 2016

KDSR: A Scalable Key Distribution Protocol to Secure Multi-Hop Routing in Large-Scale Wireless Sensor Networks.

Authors: Abderrahmen Guermazi , Abdelfettah Belghith , Mohamed Abid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Bus. Data Commun. Netw. journal
DOI: https://doi.org/10.4018/IJBDCN.2018010102
Year: 2018

A Distributed Secure Architecture for Vehicular Ad Hoc Networks.

Authors: Tahani Gazdar , Abdelfettah Belghith , Abderrahim Benslimane
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Bus. Data Commun. Netw. journal
DOI: https://doi.org/10.4018/jbdcn.2010100103
Year: 2010

Real-Word Errors in Arabic Texts: A Better Algorithm for Detection and Correction.

Authors: Aqil M. Azmi , Manal N. Almutery , Hatim A. Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE ACM Trans. Audio Speech Lang. Process. journal
DOI: https://doi.org/10.1109/TASLP.2019.2918404
Year: 2019

Cloud-Based Wireless Body Area Networks: Managing Data for Better Health Care.

Authors: Akande Sheriff Abiodun , Mohammad Hossein Anisi , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Consumer Electron. Mag. journal
DOI: https://doi.org/10.1109/MCE.2019.2892244
Year: 2019

g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices.

Authors: Mudassar Ali Khan , Ikram Ud Din , Sultan Ullah Jadoon , Muhammad Khurram Khan , Mohsen Guizani , Kamran Ahmad Awan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Consumer Electron. journal
DOI: https://doi.org/10.1109/TCE.2019.2895715
Year: 2019

Dynamic Effects Arise Due to Consumers' Preferences Depending on Past Choices.

Authors: Sameh S. Askar , Abdulrahman Al-Khedhairi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Entropy journal
DOI: https://doi.org/10.3390/e22020173
Year: 2020

Internet of Vehicles for E-Health Applications: A Potential Game for Optimal Network Capacity.

Authors: Di Lin , Yu Tang , Fabrice Labeau , Yuanzhe Yao , Muhammad Imran 0001 , Athanasios V. Vasilakos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Systems Journal journal
DOI: https://doi.org/10.1109/JSYST.2015.2441720
Year: 2017

Intelligent fuzzy approach for fast fractal image compression.

Authors: Ali Nodehi , Ghazali Sulong , Mznah Al-Rodhaan , Amjad Rehman , Abdullah Al-Dhelaan , Tanzila Saba
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: EURASIP J. Adv. Signal Process. journal
DOI: https://doi.org/10.1186/1687-6180-2014-112
Year: 2014

A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness.

Authors: Tinghuai Ma , Limin Guo , Meili Tang , Yuan Tian 0003 , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1587/transinf.2015EDP7380
Year: 2016

Artificial bee colony for the standard cell placement problem.

Authors: Najwa Altwaijry , Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJMHeur journal
DOI: https://doi.org/10.1504/IJMHEUR.2013.056402
Year: 2013

ConvSRC: SmartPhone based Periocular Recognition using Deep Convolutional Neural Network and Sparsity Augmented Collaborative Representation.

Authors: Amani A. Alahmadi , Muhammad Hussain , Hatim Aboalsamh , Mansour Zuair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2018

Automatic Emotion Recognition (AER) System based on Two-Level Ensemble of Lightweight Deep CNN Models.

Authors: Emad-ul-Haq Qazi , Muhammad Hussain , Hatim A. Aboalsamh , Ihsan Ullah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

Energy Harvesting in 5G Networks: Taxonomy, Requirements, Challenges, and Future Directions.

Authors: Muhammad Imran 0001 , Latif U. Khan , Ibrar Yaqoob , Ejaz Ahmed 0003 , Muhammad Ahsan Qureshi , Arif Ahmed 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

SNKnock: A free security tool for Facebook users.

Authors: Mahmoud Samir Fayed , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2016

Security analysis of a publicly verifiable data possession scheme for remote storage.

Authors: Zhiyan Xu , Libing Wu , Debiao He , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Supercomput. journal
DOI: https://doi.org/10.1007/s11227-017-2061-3
Year: 2017

A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.

Authors: Farrukh Aslam Khan , Ashfaq Hussain Farooqi , Abdelouahid Derhab
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Supercomput. journal
DOI: https://doi.org/10.1007/s11227-018-2680-3
Year: 2019

A Union Authentication Protocol of Cross-domain Based on Bilinear Pairing.

Authors: Shen-Gang Hao , Li Zhang , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: JSW journal
DOI: https://doi.org/10.4304/jsw.8.5.1094-1100
Year: 2013

Regular and lightweight mobility management in the HIP-based M2M overlay network.

Authors: Amine Dhraief , Abdelfettah Belghith , Khalil Drira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJAACS journal
DOI: https://doi.org/10.1504/IJAACS.2016.079628
Year: 2016

Analysis of a Four-Firm Competition Based on a Generalized Bounded Rationality and Different Mechanisms.

Authors: Sameh S. Askar , Abdulrahman Al-Khedhairi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Complexity journal
DOI: https://doi.org/10.1155/2019/6352796
Year: 2019

Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning.

Authors: Weiwei Yuan , Jiali Pang , Donghai Guan , Yuan Tian 0003 , Abdullah Al-Dhelaan , Mohammed Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Complexity journal
DOI: https://doi.org/10.1155/2019/4906903
Year: 2019

Challenges and trends in wireless ubiquitous computing systems.

Authors: Abdelfettah Belghith , Anis Koubaa , Elhadi M. Shakshuki
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Pers. Ubiquitous Comput. journal
DOI: https://doi.org/10.1007/s00779-011-0368-2
Year: 2011

A System for True and False Memory Prediction Based on 2D and 3D Educational Contents and EEG Brain Signals.

Authors: Saeed M. Bamatraf , Muhammad Hussain , Hatim A. Aboalsamh , Qazi Emad-ul-Haq , Aamir Saeed Malik , Hafeez Ullah Amin , Hassan Mathkour , Ghulam Muhammad , Hafiz Muhammad Imran
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Intell. Neurosci. journal
DOI: https://doi.org/10.1155/2016/8491046
Year: 2016

Mobile crowd sensing - Taxonomy, applications, challenges, and solutions.

Authors: Djallel Eddine Boubiche , Muhammad Imran 0001 , Aneela Maqsood , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2018.10.028
Year: 2019

The impact of m-learning technology on students and educators.

Authors: Hamid R. Abachi , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2013.06.018
Year: 2014

A hybrid particle swarm optimization algorithm for high-dimensional problems.

Authors: Dongli Jia , Guoxin Zheng , Boyang Qu , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Ind. Eng. journal
DOI: https://doi.org/10.1016/j.cie.2011.06.024
Year: 2011

Secure Instant Messaging Protocol for Centralized Communication Group.

Authors: Mohamed Hamdy Eldefrawy , Khaled Alghathbar , Muhammad Khurram Khan , Hassan M. Elkamchouchi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011, Paris, France, February 7-10, 2011
DOI: https://doi.org/10.1109/NTMS.2011.5720590
Year: 2011

Defining requirements for color-coding text software in teaching of Arabic.

Authors: Hend S. Al-Khalifa , Muna A. Muhaureq
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eleventh International Conference on Digital Information Management, ICDIM 2016, Porto, Portugal, September 19-21, 2016
DOI: https://doi.org/10.1109/ICDIM.2016.7829759
Year: 2016

Design considerations for the localization of arabic e-commerce websites.

Authors: Aram Al-Sedrani , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh International Conference on Digital Information Management, ICDIM 2012, Macau, Macao, August 22-24, 2012
DOI: https://doi.org/10.1109/ICDIM.2012.6360094
Year: 2012

A Cooperative Learning Scheme for Energy Efficient Routing in Wireless Sensor Networks.

Authors: Sami S. Alwakeel , Najla Al-Nabhan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th International Conference on Machine Learning and Applications, ICMLA, Boca Raton, FL, USA, December 12-15, 2012. Volume 2
DOI: https://doi.org/10.1109/ICMLA.2012.143
Year: 2012

Hardware architecture for fast Intra mode and direction prediction in real-time MPEG-2 to H.264/AVC transcoder.

Authors: Tarek A. Elarabi , Randa Ayoubi , Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/WoWMoM.2012.6263798
Year: 2012

Distributed algorithm for the actor coverage problem in WSN-based precision irrigation applications.

Authors: Abdelouahid Derhab , Noureddine Lasla
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Distributed Computing in Sensor Systems, 7th IEEE International Conference and Workshops, DCOSS 2011, Barcelona, Spain, 27-29 June, 2011, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/DCOSS.2011.5982202
Year: 2011

Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009
DOI: http://doi.ieeecomputersociety.org/10.1109/NSS.2009.100
Year: 2009

Middleware for multi-interfaces management through profiles handling.

Authors: Jean-Marie Bonnin , Zied Ben Hamouda , Imed Lassoued , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008, Innsbruck, Austria, February 13 - 15, 2008
DOI: https://doi.org/10.4108/ICST.MOBILWARE2008.2899
Year: 2008

Security Analysis of Firewall Rule Sets in Computer Networks.

Authors: Bilal Khan , Muhammad Khurram Khan , Maqsood Mahmud , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010
DOI: http://doi.ieeecomputersociety.org/10.1109/SECURWARE.2010.16
Year: 2010

An Efficient Low-Bit Rate Motion Compensation Technique Based on Quadtree.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ICME.2000.869581
Year: 2000

Comparative Analysis of Intrusion Detection Approaches.

Authors: Iftikhar Ahmad 0002 , Azween B. Abdullah , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 12th UKSim, International Conference on Computer Modelling and Simulation, Cambridge, UK, 24-26 March 2010
DOI: http://doi.ieeecomputersociety.org/10.1109/UKSIM.2010.112
Year: 2010

Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks.

Authors: Mohamed Kassab , Abdelfattah Belghith , Jean-Marie Bonnin , Sahbi Sassi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: WMuNeP'05 - Proceedings of the First ACM Workshop on Wireless Multimedia Networking and Performance Modeling, Montreal, Quebec, Canada, October 13, 2005
DOI: https://doi.org/10.1145/1089737.1089746
Year: 2005

Trade-offs between Optimality and Validity in Probabilistic Routing for Mobile Multi-Hop Networks.

Authors: Hanen Idoudi , Abdelfattah Belghith , Miklós Molnár
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2008 International Conference on Communications in Computing, CIC 2008, July 14-17, 2008, Las Vegas, Nevada, USA
DOI: Not available
Year: 2008

KSU at SemEval-2019 Task 3: Hybrid Features for Emotion Recognition in Textual Conversation.

Authors: Nourah Alswaidan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 13th International Workshop on Semantic Evaluation, SemEval@NAACL-HLT 2019, Minneapolis, MN, USA, June 6-7, 2019
DOI: https://doi.org/10.18653/v1/s19-2041
Year: 2019

Using a Greedy-Based Approach for Solving Data Allocation Problem in a Distributed Environment.

Authors: Hassan Ismail Abdalla , Mohamed Tounsi 0002 , Farhi Marir
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes
DOI: Not available
Year: 2008

A system based on 3D and 2D educational contents for true and false memory prediction using EEG signals.

Authors: Saeed M. Bamatraf , Muhammad Hussain , Hatim Aboalsamh , Hassan Mathkour , Aamir Saeed Malik , Hafeez Ullah Amin , Ghulam Muhammad , Emad-ul-Haq Qazi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th International IEEE/EMBS Conference on Neural Engineering, NER 2015, Montpellier, France, April 22-24, 2015
DOI: https://doi.org/10.1109/NER.2015.7146819
Year: 2015

Using Interest Points for Robust Visual Detection and Identification of Objects in Complex Scenes.

Authors: Andrzej Sluzek , Md. Saiful Islam 0001 , Annamalai Palaniappan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2006, October 9-15, 2006, Beijing, China
DOI: https://doi.org/10.1109/IROS.2006.282035
Year: 2006

Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".

Authors: Muhammad Khurram Khan , Debiao He
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013
DOI: http://doi.ieeecomputersociety.org/10.1109/TrustCom.2013.212
Year: 2013

Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion.

Authors: Lu Leng , Jiashu Zhang , Gao Chen , Muhammad Khurram Khan , Ping Bai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings
DOI: https://doi.org/10.1007/978-3-642-22339-6_15
Year: 2011

A Synchronous Tiered Based Clustering Algorithm for large-scale Ad hoc Networks.

Authors: Imen Jemili , Abdelfattah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Wireless and Mobile Networking, IFIP Joint Conference on Mobile and Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30 - October 2, 2008
DOI: https://doi.org/10.1007/978-0-387-84839-6_4
Year: 2008

Routing enhancements in dynamic MANETs with obstacles.

Authors: Abdelfettah Belghith , Mohamed Belhassen
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 4th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2011, Toulouse, France, 26-28 October, 2011
DOI: https://doi.org/10.1109/WMNC.2011.6097253
Year: 2011

Integrating mobile web development into IT curriculum.

Authors: Hend S. Al-Khalifa , Nora I. Al-Rajebah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, West Point, NY, USA, October 20-22, 2011
DOI: https://doi.org/10.1145/2047594.2047619
Year: 2011

Toward designing efficient application to identify objects for visually impaired.

Authors: Lamya Albraheem , Hessah Almotiry , Hind Abahussain , Lama Alhammad , Masheal Alshehri , Reem Aldosari , Sara Alkathiri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2014 IEEE Canada International Humanitarian Technology Conference, IHTC 2014, Montreal, QC, Canada, June 1-4, 2014
DOI: https://doi.org/10.1109/IHTC.2014.7147525
Year: 2014

Inter-cloud Data Integration System Considering Privacy and Cost.

Authors: Yuan Tian 0003 , Biao Song , Jimupimg Park , Eui-nam Huh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computational Collective Intelligence. Technologies and Applications - Second International Conference, ICCCI 2010, Kaohsiung, Taiwan, November 10-12, 2010. Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-642-16693-8_22
Year: 2010

Vertical partitioning for database design: A grouping algorithm.

Authors: Mahmoud Y. AlFaress , Hassan Ismail Abdalla , Farhi Marir , Yahiya Najjar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), July 9-11, 2007, Imperial Palace Hotel Las Vegas, Las Vegas, Nevada, USA, Proceedings
DOI: Not available
Year: 2007

Development of mobile government websites: a functional design approach.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2011 - The 13th International Conference on Information Integration and Web-based Applications and Services, 5-7 December 2011, Ho Chi Minh City, Vietnam
DOI: https://doi.org/10.1145/2095536.2095629
Year: 2011

From Web 1.0 to Web 2.0 and Beyond: Is the Web Becoming More Accessible for People with Visual Impairments?

Authors: Hend S. Al-Khalifa , AbdulMalik S. Al-Salman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2006 - The Eighth International Conference on Information Integration and Web-based Applications Services, 4-6 December 2006, Yogyakarta, Indonesia
DOI: Not available
Year: 2006

A proposed checklist for the technical maturity of open government data: an application on GCC countries.

Authors: Nouf Alromaih , Hend Albassam , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016
DOI: https://doi.org/10.1145/3011141.3011211
Year: 2016

AraTation: an Arabic semantic annotation tool.

Authors: Layan M. Bin Saleh , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia
DOI: https://doi.org/10.1145/1806338.1806421
Year: 2009

A crowdsourcing web-based system for reporting predatory publishers.

Authors: Rawan N. Al-Matham , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, iiWAS 2017, Salzburg, Austria, December 4-6, 2017
DOI: https://doi.org/10.1145/3151759.3151844
Year: 2017

GQLX: a new graphical query language for XML data.

Authors: Mourad Ykhlef , Sarra M. Alqahtani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia
DOI: https://doi.org/10.1145/1806338.1806379
Year: 2009

A heuristic checklist for usability evaluation of Saudi government mobile applications.

Authors: Hend S. Al-Khalifa , Bashayer Al-Twaim , Bedour AlHarbi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016
DOI: https://doi.org/10.1145/3011141.3011189
Year: 2016

A hands-on approach to the web of things: the Twitter vending machine experience.

Authors: Wed Al-Ateeq , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2016, Singapore, November 28-30, 2016
DOI: https://doi.org/10.1145/3011141.3011214
Year: 2016

An approach to compare two ontological models for representing quranic words.

Authors: Hend S. Al-Khalifa , Maha M. Al-Yahya , Alia Bahanshal , Iman Al-Odah , Nawal Al-Helwah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2010 - The 12th International Conference on Information Integration and Web-based Applications and Services, 8-10 November 2010, Paris, France
DOI: https://doi.org/10.1145/1967486.1967593
Year: 2010

Building an Arabic learning object repository with an ad hoc recommendation engine.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria
DOI: https://doi.org/10.1145/1497308.1497378
Year: 2008

A novel information diffusion model for online social networks.

Authors: Lulwah AlSuwaidan , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, iiWAS 2017, Salzburg, Austria, December 4-6, 2017
DOI: https://doi.org/10.1145/3151759.3151812
Year: 2017

Exploring the problems of sentiment analysis in informal Arabic.

Authors: Lamya Albraheem , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia - December 3-5, 2012
DOI: https://doi.org/10.1145/2428736.2428813
Year: 2012

An Empirical Pilot Study of CAPTCHA Complexity Using Eye Tracking.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, Hanoi, Vietnam, December 4-6, 2014
DOI: https://doi.org/10.1145/2684200.2684330
Year: 2014

A noise-robust feature extraction method based on pitch-synchronous ZCPA for ASR.

Authors: Muhammad Ghulam , Takashi Fukuda , Junsei Horikawa , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2004 - ICSLP, 8th International Conference on Spoken Language Processing, Jeju Island, Korea, October 4-8, 2004
DOI: Not available
Year: 2004

Improving performance of an HMM-based ASR system by using monophone-level normalized confidence measure.

Authors: Muhammad Ghulam , Takashi Fukuda , Takaharu Sato , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 7th International Conference on Spoken Language Processing, ICSLP2002 - INTERSPEECH 2002, Denver, Colorado, USA, September 16-20, 2002
DOI: Not available
Year: 2002

Designing multiple distinctive phonetic feature extractors for canonicalization by using clustering technique.

Authors: Takashi Fukuda , Muhammad Ghulam , Tsuneo Nitta
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: INTERSPEECH 2005 - Eurospeech, 9th European Conference on Speech Communication and Technology, Lisbon, Portugal, September 4-8, 2005
DOI: Not available
Year: 2005

CredFinder: A real-time tweets credibility assessing system.

Authors: Majed A. AlRubaian , Muhammad Al-Qurishi , Mabrook Al-Rakhami , Mohammad Mehedi Hassan , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, San Francisco, CA, USA, August 18-21, 2016
DOI: http://doi.ieeecomputersociety.org/10.1109/ASONAM.2016.7752431
Year: 2016

Copy-Move Image Forgery Detection Using Multi-Resolution Weber Descriptors.

Authors: Muhammad Hussain , Ghulam Muhammad , Sahar Q. Saleh , Anwar M. Mirza , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012, Sorrento, Naples, Italy, November 25-29, 2012
DOI: https://doi.org/10.1109/SITIS.2012.64
Year: 2012

A Review of Evaluation Methods and Techniques for Simulation Packages.

Authors: Yasmeen Alomair , Iftikhar Ahmad 0002 , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, SCSE'15, Berkeley, CA, USA, March 5-6, 2015
DOI: https://doi.org/10.1016/j.procs.2015.08.447
Year: 2015

mQMA: Multi-Constrained QoS Multicast Aggregation.

Authors: Naouel Ben Ali , Joanna Moulierac , Abdelfattah Belghith , Miklós Molnár
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007
DOI: https://doi.org/10.1109/GLOCOM.2007.370
Year: 2007

Investigating accessibility problems of Arabic PDF documents.

Authors: Ameera M. Almasoud , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Fourth International Conference on Information and Communication Technology and Accessibility, ICTA 2013, Hammamet, Tunisia, October 24-26, 2013
DOI: https://doi.org/10.1109/ICTA.2013.6815294
Year: 2013

Cloud-based parametrized publish/subscribe system for public safety applications in smarter cities.

Authors: Aljawharah Al-muaythir , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 9th International Conference on Utility and Cloud Computing, UCC 2016, Shanghai, China, December 6-9, 2016
DOI: https://doi.org/10.1145/2996890.3007862
Year: 2016

Realization of algorithm for the computation of third-order cross moments using FPGA.

Authors: Syed Manzoor Qasim , Saleh A. Alshebeili , Ateeq A. Khan , Shuja Ahmad Abbasi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 9th International Symposium on Signal Processing and Its Applications, ISSPA 2007, Sharjah, United Arab Emirates, February 12-15, 2007
DOI: https://doi.org/10.1109/ISSPA.2007.4555314
Year: 2007

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.

Authors: Iftikhar Ahmad 0002 , Azween B. Abdullah , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
DOI: https://doi.org/10.1007/978-3-642-13577-4_53
Year: 2010

Applying Knowledge, Skills and Abilities in undergraduate research seminar course.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 12th International Conference on Information Technology Based Higher Education and Training, ITHET 2013, Antalya, Turkey, October 10-12, 2013
DOI: https://doi.org/10.1109/ITHET.2013.6671016
Year: 2013

A multimedia cloud-based framework for constant monitoring on obese patients.

Authors: Majdi Rawashdeh , Muhammad Al-Qurishi , Mabrook Al-Rakhami , Maged S. Al-Quraishi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2017 IEEE International Conference on Multimedia & Expo Workshops, ICME Workshops, Hong Kong, China, July 10-14, 2017
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2017.8026230
Year: 2017

A real-time privacy-sensitive data hiding approach based on chaos cryptography.

Authors: Sk. Md. Mizanur Rahman , M. Anwar Hossain 0001 , Hussein T. Mouftah , Abdulmotaleb El-Saddik , Eiji Okamoto
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, ICME 2010, 19-23 July 2010, Singapore
DOI: http://doi.ieeecomputersociety.org/10.1109/ICME.2010.5583558
Year: 2010

An Efficient Low-Bit Rate Motion Compensation Technique Based on Quadtree.

Authors: Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1109/ICME.2000.869581
Year: 2000

Collaborative recommendation of ambient media services.

Authors: M. Anwar Hossain 0001 , Atif Alamri , Mohammed F. Alhamid , Majdi Rawashdeh , Awny Alnusair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2013 IEEE International Conference on Multimedia and Expo Workshops, Chengdu, China, July 14-18, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/ICMEW.2014.6890715
Year: 2014

A framework for adaptive interaction support based on quality of context information.

Authors: M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, ICME 2011, 11-15 July, 2011, Barcelona, Catalonia, Spain
DOI: http://doi.ieeecomputersociety.org/10.1109/ICME.2011.6012211
Year: 2011

Desynchronizer circuit in SDH system using digital PLL.

Authors: Mohamed Abou El-Ela , Jim M. Noras , Ahmed A. Telba
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2003 10th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2003, Sharjah, United Arab Emirates, December 14-17, 2003
DOI: https://doi.org/10.1109/ICECS.2003.1301876
Year: 2003

A Comparison of Different Gabor Features for Mass Classification in Mammography.

Authors: Muhammad Hussain , Salabat Khan , Ghulam Muhammad , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012, Sorrento, Naples, Italy, November 25-29, 2012
DOI: https://doi.org/10.1109/SITIS.2012.31
Year: 2012

Finding exact solutions for multi-objective optimisation problems using a symbolic algorithm.

Authors: Sameh S. Askar , Ashutosh Tiwari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2009, Trondheim, Norway, 18-21 May, 2009
DOI: https://doi.org/10.1109/CEC.2009.4982926
Year: 2009

Performance evaluation of power save protocols using carrier sensing in multihop ad hoc networks.

Authors: Abdelfettah Belghith , Wafa Akkari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069390
Year: 2009

A novel spreading framework using incremental clustering for viral marketing.

Authors: Lulwah AlSuwaidan , Mourad Ykhlef , Mohammed Abdullah Alnuem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2014.7073182
Year: 2014

A Low Overhead Efficient Localization Approach for Large Scale Wireless Sensor Networks.

Authors: Badia Bouhdid , Wafa Akkari , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 14th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2017, Hammamet, Tunisia, October 30 - Nov. 3, 2017
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2017.184
Year: 2017

Multi-hop routing for distributed clustering protocols in wide wireless sensor networks.

Authors: Abderrahmen Guermazi , Abdelfettah Belghith , Mohamed Abid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 12th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2015, Marrakech, Morocco, November 17-20, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2015.7507209
Year: 2015

A Discrete Optimal Broadcasting Protocol in an IP Network.

Authors: Achraf Gazdar , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah, UAE
DOI: http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205222
Year: 2006

Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding).

Authors: Maqsood Mahmud , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Bio-Science and Bio-Technology - International Conference, BSBT 2009 Held as Part of the Future Generation Information Technology Conference, FGIT 2009 Jeju Island, Korea, December 10-12, 2009 Proceedings
DOI: https://doi.org/10.1007/978-3-642-10616-3_14
Year: 2009

Using Arabic CAPTCHA for Cyber Security.

Authors: Bilal Khan , Khaled Alghathbar , Muhammad Khurram Khan , Abdullah M. AlKelabi , Abdulaziz Alajaji
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
DOI: https://doi.org/10.1007/978-3-642-17610-4_2
Year: 2010

Third line of defense strategy to fight against SMS-based malware in android smartphones.

Authors: Abdelouahid Derhab , Kashif Saleem , Ahmed Youssef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Wireless Communications and Mobile Computing Conference, IWCMC 2014, Nicosia, Cyprus, August 4-8, 2014
DOI: https://doi.org/10.1109/IWCMC.2014.6906414
Year: 2014

Improvement of the Efficient Secret Broadcast Scheme.

Authors: Eun-Jun Yoon , Muhammad Khurram Khan , Kee-Young Yoo
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1587/transinf.E93.D.3396
Year: 2010

An alternative approach to neural network training based on hybrid bio meta-heuristic algorithm.

Authors: Abdullah Khan , Rahmat Shah , Muhammad Imran 0001 , Asfandyar Khan , Javed Iqbal Bangash , Shah Khalid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Ambient Intell. Humaniz. Comput. journal
DOI: https://doi.org/10.1007/s12652-019-01373-4
Year: 2019

CBR-PDS: a case-based reasoning phishing detection system.

Authors: Hassan Y. A. Abutair , Abdelfettah Belghith , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Ambient Intell. Humaniz. Comput. journal
DOI: https://doi.org/10.1007/s12652-018-0736-0
Year: 2019

A scalable and elastic cloud-assisted publish/subscribe model for IPTV video surveillance system.

Authors: Mohammad Mehedi Hassan , M. Anwar Hossain 0001 , Mohammad Abdullah-Al-Wadud , Tsaheel Al-Mudaihesh , Sultan Alyahya , Abdullah Sharaf Alghamdi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cluster Computing journal
DOI: https://doi.org/10.1007/s10586-015-0476-2
Year: 2015

A framework to address inconstant user requirements in cloud SLAs management.

Authors: Waleed Halboob , Haider Abbas , Muhammad Khurram Khan , Farrukh Aslam Khan , Maruf Pasha
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cluster Computing journal
DOI: https://doi.org/10.1007/s10586-014-0408-6
Year: 2015

DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks.

Authors: Tahani Gazdar , Abdelfettah Belghith , Ahmad S. Al-Mogren
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2017.03.016
Year: 2017

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks.

Authors: Abderrahmen Guermazi , Abdelfettah Belghith , Mohamed Abid , Sofien Gannouni
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: KSII Trans. Internet Inf. Syst. journal
DOI: https://doi.org/10.3837/tiis.2017.02.015
Year: 2017

Analysis of P2P, IRC and HTTP traffic for botnets detection.

Authors: Basil AsSadhan , Abdulmuneem Bashaiwth , Jalal Al-Muhtadi , Saleh AlShebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Peer Peer Netw. Appl. journal
DOI: https://doi.org/10.1007/s12083-017-0586-0
Year: 2018

Privacy preserving secure data exchange in mobile P2P cloud healthcare environment.

Authors: Sk. Md. Mizanur Rahman , Md. Mehedi Masud , M. Anwar Hossain 0001 , Abdulhameed Alelaiwi , Mohammad Mehedi Hassan , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Peer Peer Netw. Appl. journal
DOI: https://doi.org/10.1007/s12083-015-0334-2
Year: 2016

A privacy preserving location service for cloud-of-things system.

Authors: Yuan Tian 0003 , Mariya M. Kaleemullah , Mznah Al-Rodhaan , Biao Song , Abdullah Al-Dhelaan , Tinghuai Ma
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Parallel Distributed Comput. journal
DOI: https://doi.org/10.1016/j.jpdc.2018.09.005
Year: 2019

The accessibility of Saudi Arabia government Web sites: an exploratory study.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Univers. Access Inf. Soc. journal
DOI: https://doi.org/10.1007/s10209-010-0215-7
Year: 2012

Adaptive Probabilistic Proactive Routing for Dense MANETs.

Authors: Abdelfettah Belghith , Mohamed Amine Abid , Adel Ben Mnaouer
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Journal Comp. Netw. and Communic. journal
DOI: https://doi.org/10.1155/2012/234824
Year: 2012

A new handover authentication protocol based on bilinear pairing functions for wireless networks.

Authors: Debiao He , Muhammad Khurram Khan , Neeraj Kumar 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Ad Hoc Ubiquitous Comput. journal
DOI: https://doi.org/10.1504/IJAHUC.2015.067774
Year: 2015

A blind reversible method for watermarking relational databases based on a time-stamping protocol.

Authors: Mahmoud E. Farfoura , Shi-Jinn Horng , Jui-Lin Lai , Ray-Shine Run , Rong-Jian Chen , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Expert Syst. Appl. journal
DOI: https://doi.org/10.1016/j.eswa.2011.09.005
Year: 2012

Fortifying Intrusion Detection Systems in Dynamic Ad Hoc and Wireless Sensor Networks.

Authors: Abdelouahid Derhab , Abdelghani Bouras , Mustapha Réda Senouci , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2014/608162
Year: 2014

Framework for a Cloud-Based Multimedia Surveillance System.

Authors: M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2014/135257
Year: 2014

An Efficient Biometric Authentication Protocol for Wireless Sensor Networks.

Authors: Ohood Althobaiti , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2013/407971
Year: 2013

Distributed Energy-Efficient Approaches for Connected Dominating Set Construction in Wireless Sensor Networks.

Authors: Najla Al-Nabhan , Mznah Al-Rodhaan , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2014/625061
Year: 2014

Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices.

Authors: Md. Saiful Islam 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Distributed Sens. Networks journal
DOI: https://doi.org/10.1155/2015/549134
Year: 2015

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.

Authors: Chao Lin , Debiao He , Xinyi Huang , Muhammad Khurram Khan , Kim-Kwang Raymond Choo
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Information Forensics and Security journal
DOI: https://doi.org/10.1109/TIFS.2020.2969565
Year: 2020

On Cournot-Bertrand competition with differentiated products.

Authors: Sameh S. Askar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Annals OR journal
DOI: https://doi.org/10.1007/s10479-014-1612-8
Year: 2014

On energy efficiency in underwater wireless sensor networks with cooperative routing.

Authors: Ashfaq Ahmad , Sheeraz Ahmed , Muhammad Imran 0001 , Masoom Alam , Iftikhar Azim Niaz , Nadeem Javaid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ann. des Télécommunications journal
DOI: https://doi.org/10.1007/s12243-017-0560-0
Year: 2017

Phase-preserving approach in denoising computed tomography medical images.

Authors: Zohair Al-Ameen , Ghazali Sulong , Amjad Rehman , Mznah Al-Rodhaan , Tanzila Saba , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comp. Meth. in Biomech. and Biomed. Eng.: Imaging & Visualization journal
DOI: https://doi.org/10.1080/21681163.2014.955615
Year: 2017

Towards energy-aware cloud-oriented cyber-physical therapy system.

Authors: M. Shamim Hossain , Md. Abdur Rahman , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2017.08.045
Year: 2020

High performance biometrics recognition algorithms and systems.

Authors: Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2011.08.010
Year: 2012

Improving consumer satisfaction in smart cities using edge computing and caching: A case study of date fruits classification.

Authors: M. Shamim Hossain , Ghulam Muhammad , Syed Umar Amin
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.05.050
Year: 2018

Collaborative analysis model for trending images on social networks.

Authors: M. Shamim Hossain , Mohammed F. Alhamid , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2017.01.030
Year: 2018

Chaos-based robust method of zero-watermarking for medical signals.

Authors: Zulfiqar Ali , Muhammad Imran 0001 , Mansour Alsulaiman , Muhammad Shoaib 0005 , Sana Ullah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2018.05.058
Year: 2018

Protection of records and data authentication based on secret shares and watermarking.

Authors: Zulfiqar Ali , Muhammad Imran 0001 , Sally I. McClean , Naveed Khan , Muhammad Shoaib 0005
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Future Gener. Comput. Syst. journal
DOI: https://doi.org/10.1016/j.future.2019.01.050
Year: 2019

Big Data-Driven Service Composition Using Parallel Clustered Particle Swarm Optimization in Mobile Environment.

Authors: M. Shamim Hossain , Mohammad Moniruzzaman , Ghulam Muhammad , Ahmed Ghoneim , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Serv. Comput. journal
DOI: http://doi.ieeecomputersociety.org/10.1109/TSC.2016.2598335
Year: 2016

A morphology alignment method for resampled heartbeat signals.

Authors: Md. Saiful Islam 0001 , Naif Alajlan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Biomed. Signal Process. Control. journal
DOI: https://doi.org/10.1016/j.bspc.2012.11.006
Year: 2013

Pathological voice detection and binary classification using MPEG-7 audio features.

Authors: Ghulam Muhammad , Moutasem Melhem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Biomed. Signal Process. Control. journal
DOI: https://doi.org/10.1016/j.bspc.2014.02.001
Year: 2014

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security.

Authors: Mohammad Sabzinejad Farash , Shehzad Ashraf Chaudhry , Mohammad Heydari , Seyed Mohammad Sajad Sadough , Saru Kumari , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Communication Systems journal
DOI: https://doi.org/10.1002/dac.3019
Year: 2017

Social Network and Tag Sources Based Augmenting Collaborative Recommender System.

Authors: Tinghuai Ma , Jinjuan Zhou , Meili Tang , Yuan Tian 0003 , Abdullah Al-Dhelaan , Mznah Al-Rodhaan , Sungyoung Lee
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEICE Trans. Inf. Syst. journal
DOI: https://doi.org/10.1587/transinf.2014EDP7283
Year: 2015

RecAm: a collaborative context-aware framework for multimedia recommendations in an ambient intelligence environment.

Authors: Mohammed F. Alhamid , Majdi Rawashdeh , Haiwei Dong , M. Anwar Hossain 0001 , Abdulhameed Alelaiwi , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multimedia Syst. journal
DOI: https://doi.org/10.1007/s00530-015-0469-2
Year: 2016

The State of Social Media in Saudi Arabia's Higher Education.

Authors: Hend S. Al-Khalifa , Regina A. Garcia
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJTEM journal
DOI: https://doi.org/10.4018/ijtem.2013010105
Year: 2013

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.

Authors: Jalal Al-Muhtadi , Ma Qiang , Khan Zeb , Junaid Ahsenali Chaudhry , Kashif Saleem , Abdelouahid Derhab , Mehmet A. Orgun , Rajan Shankaran , Muhammad Imran 0001 , Maruf Pasha
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2812741
Year: 2018

Automatic Voice Pathology Monitoring Using Parallel Deep Models for Smart Healthcare.

Authors: Musaed Alhussein , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2905597
Year: 2019

TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.

Authors: Farrukh Aslam Khan , Abdu Gumaei , Abdelouahid Derhab , Amir Hussain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2899721
Year: 2019

Flow-Aware Elephant Flow Detection for Software-Defined Networks.

Authors: Mosab Hamdan , Bushra Mohammed , Usman Humayun , Ahmed Abdelaziz , Suleman Khan , M. Akhtar Ali , Muhammad Imran 0001 , Muhammad Nadzir Marsono
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2987977
Year: 2020

EEG Pathology Detection Based on Deep Learning.

Authors: Musaed Alhussein , Ghulam Muhammad , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2901672
Year: 2019

MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance.

Authors: Mohamed Belaoued , Abdelouahid Derhab , Smaine Mazouzi , Farrukh Aslam Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2966321
Year: 2020

Research and Implementation of ECG-Based Biological Recognition Parallelization.

Authors: Yiming Miao , Yuanwen Tian , Limei Peng , M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2771220
Year: 2018

Fog Intelligence for Real-Time IoT Sensor Data Analytics.

Authors: Hazem M. Raafat , M. Shamim Hossain , Ehab Essa , Samir Elmougy , Ahmed S. Tolba , Ghulam Muhammad , Ahmed Ghoneim
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2754538
Year: 2017

Current Trends and Ongoing Progress in the Computational Alignment of Biological Sequences.

Authors: Muhammad Ishaq , Asfandyar Khan , Majid Khan , Muhammad Imran 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2916154
Year: 2019

CAST: A Cross-Article Structure Theory for Multi-Article Summarization.

Authors: Nouf Ibrahim Altmami , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2997881
Year: 2020

Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection Protocol for Underwater Wireless Sensor Networks.

Authors: Anwar Khan , Ihsan Ali , Atiq Ur Rahman , Muhammad Imran 0001 , Fazal-e-Amin , Hasan Mahmood
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2837108
Year: 2018

A System for Decoding and Coloring Arabic Text for Language Learners.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2925011
Year: 2019

An Enhanced Distributed Trust Computing Protocol for VANETs.

Authors: Tahani Gazdar , Abdelfettah Belghith , Hassan Y. A. Abutair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2765303
Year: 2018

Voice Pathology Detection Using Deep Learning on Mobile Healthcare Framework.

Authors: Musaed Alhussein , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2856238
Year: 2018

An Emotion Recognition System for Mobile Applications.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2672829
Year: 2017

Measuring Reputation and Influence in Online Social Networks: A Systematic Literature Review.

Authors: Sami Al-Yazidi , Jawad Berri , Muhammad Al-Qurishi , Majed A. AlRubaian
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2020.2999033
Year: 2020

Integrated Three Theories to Develop a Model of Factors Affecting Students' Academic Performance in Higher Education.

Authors: Nasser Alalwan , Waleed Mugahed Al-Rahmi , Osama Alfarraj , Ahmed Alzahrani 0001 , Noraffandy Yahaya , Ali Mugahed Al-Rahmi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2019.2928142
Year: 2019

Enhancing Quality-of-Service Conditions Using a Cross-Layer Paradigm for Ad-Hoc Vehicular Communication.

Authors: Sabih ur Rehman , M. Arif Khan , Muhammad Imran 0001 , Tanveer A. Zia , Mohsin Iftikhar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2717501
Year: 2017

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.

Authors: Qiming Zheng , Xiaomin Wang , Muhammad Khurram Khan , Wenfang Zhang , Brij B. Gupta , Wei Guo
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2017.2775038
Year: 2018

Trust Management Techniques for the Internet of Things: A Survey.

Authors: Ikram Ud Din , Mohsen Guizani , Byung-Seo Kim , Suhaidi Hassan , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Access journal
DOI: https://doi.org/10.1109/ACCESS.2018.2880838
Year: 2019

The Social Media in Academia and EducationResearch R-evolutions and a Paradox: Advanced Next Generation Social Learning Innovation.

Authors: Miltiadis D. Lytras , Hassan Mathkour , Hassan Ismail Abdalla , Cornelio Yáñez-Márquez , Patricia Ordóñez de Pablos
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. UCS journal
DOI: Not available
Year: 2014

A novel extension of Kruskal's algorithm in multicast routing.

Authors: Mohamed Aissa , Adel Ben Mnaouer , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2009.5355090
Year: 2009

Dynamically self adjustable proactive routing protocols for mobile ad hoc networks.

Authors: Abdelfattah Belghith , Mohamed Amine Abid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2009.5355176
Year: 2009

Neighborhood aware power saving mechanisms for ad hoc networks.

Authors: Abdelfattah Belghith , Wafa Akkari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2008.4664159
Year: 2008

Cache coherence in Machine-to-Machine Information Centric Networks.

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 40th IEEE Conference on Local Computer Networks, LCN 2015, Clearwater Beach, FL, USA, October 26-29, 2015
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2015.7366345
Year: 2015

Strategies and approaches for multicast tree stability.

Authors: Mohamed Aissa , Adel Ben Mnaouer , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2010.5735701
Year: 2010

Do-It-Yourself Object Identification Using Augmented Reality for Visually Impaired People.

Authors: Atheer S. Al-Khalifa , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computers Helping People with Special Needs - 13th International Conference, ICCHP 2012, Linz, Austria, July 11-13, 2012, Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-642-31534-3_82
Year: 2012

A First Look into MOOCs Accessibility - The Case of Coursera.

Authors: Najd A. Al-Mouh , Atheer S. Al-Khalifa , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Computers Helping People with Special Needs - 14th International Conference, ICCHP 2014, Paris, France, July 9-11, 2014, Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-319-08596-8_22
Year: 2014

Producer Mobility support in Named Data Internet of Things Network.

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: The 8th International Conference on Ambient Systems, Networks and Technologies (ANT 2017) / The 7th International Conference on Sustainable Energy Information Technology (SEIT 2017), 16-19 May 2017, Madeira, Portugal
DOI: https://doi.org/10.1016/j.procs.2017.05.385
Year: 2017

Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design.

Authors: M. Anwar Hossain 0001 , Sk. Md. Mizanur Rahman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China
DOI: https://doi.org/10.1109/ISBAST.2013.49
Year: 2013

Core-Point Detection on Camera-Based Fingerprint Image.

Authors: Fajri Kurniawan , Mohammed Sayim Khalil , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China
DOI: https://doi.org/10.1109/ISBAST.2013.42
Year: 2013

Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme".

Authors: Saru Kumari , Fahad Bin Muhaya , Muhammad Khurram Khan , R. Kumar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China
DOI: https://doi.org/10.1109/ISBAST.2013.43
Year: 2013

Energy-aware Scheme for Animal Recognition in Wireless Acoustic Sensor Networks.

Authors: Afnan Algobail , Adel Soudani , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 7th International Conference on Sensor Networks, SENSORNETS 2018, Funchal, Madeira - Portugal, January 22-24, 2018.
DOI: https://doi.org/10.5220/0006604100310038
Year: 2018

A Lightweight Approach to Semantify Saudi Open Government Data.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 16th International Conference on Network-Based Information Systems, NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013
DOI: http://doi.ieeecomputersociety.org/10.1109/NBiS.2013.99
Year: 2013

A New Efficient Block-Matching Algorithm for Motion Estimation.

Authors: Hanan A. Mahmoud , Sumeer Goel , Mohsen Shaaban , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. VLSI Signal Process. journal
DOI: https://doi.org/10.1007/s11265-005-4160-2
Year: 2006

Guest editorial: Advances in multimedia surveillance.

Authors: Pradeep K. Atrey , M. Anwar Hossain 0001 , Mohan S. Kankanhalli
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-012-1342-3
Year: 2014

A more secure digital rights management authentication scheme based on smart card.

Authors: Saru Kumari , Muhammad Khurram Khan , Xiong Li 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-014-2361-z
Year: 2016

A framework for human-centered provisioning of ambient media services.

Authors: M. Anwar Hossain 0001 , Jorge Parra , Pradeep K. Atrey , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-009-0285-9
Year: 2009

Ant-based service selection framework for a smart home monitoring environment.

Authors: M. Shamim Hossain , S. K. Alamgir Hossain , Atif Alamri , M. Anwar Hossain 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-012-1006-3
Year: 2013

User emotion recognition from a larger pool of social network data using active learning.

Authors: Ghulam Muhammad , Mohammed F. Alhamid
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-016-3912-2
Year: 2017

Collective control over sensitive video data using secret sharing.

Authors: Pradeep K. Atrey , Saeed Alharthi , M. Anwar Hossain 0001 , Abdullah Sharaf Alghamdi , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Multim. Tools Appl. journal
DOI: https://doi.org/10.1007/s11042-013-1644-0
Year: 2014

An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.

Authors: Muhammad Khurram Khan , Jiashu Zhang
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
DOI: https://doi.org/10.1007/11689522_24
Year: 2006

High speed intra mode and direction prediction for MPEG-2 to H.264/AVC realtime transcoder.

Authors: Tarek A. Elarabi , Ahmed M. Ragab , Hanan A. Mahmoud , Magdy A. Bayoumi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the IEEE Workshop on Signal Processing Systems, SiPS 2011, October 4-7, 2011, Beirut, Lebanon
DOI: https://doi.org/10.1109/SiPS.2011.6088953
Year: 2011

Image forgery detection using multi-resolution Weber local descriptors.

Authors: Muhammad Hussain , Ghulam Muhammad , Sahar Q. Saleh , Anwar M. Mirza , George Bebis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013
DOI: https://doi.org/10.1109/EUROCON.2013.6625186
Year: 2013

Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme.

Authors: Muhammad Khurram Khan , Saru Kumari , Xiaomin Wang , Rahul Kumar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, DASC 2014, Dalian, China, August 24-27, 2014
DOI: http://doi.ieeecomputersociety.org/10.1109/DASC.2014.31
Year: 2014

FAsTA: A Folksonomy-Based Automatic Metadata Generator.

Authors: Hend S. Al-Khalifa , Hugh C. Davis
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Creating New Learning Experiences on a Global Scale, Second European Conference on Technology Enhanced Learning, EC-TEL 2007, Crete, Greece, September 17-20, 2007, Proceedings
DOI: https://doi.org/10.1007/978-3-540-75195-3_30
Year: 2007

Website Design Based on Cultures: An Investigation of Saudis, Filipinos, and Indians Government Websites' Attributes.

Authors: Hend S. Al-Khalifa , Regina A. Garcia
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Design, User Experience, and Usability. User Experience Design for Diverse Interaction Platforms and Environments - Third International Conference, DUXU 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part II
DOI: https://doi.org/10.1007/978-3-319-07626-3_2
Year: 2014

Heuristics for Evaluating the Usability of Mobile Launchers for Elderly People.

Authors: Muna S. Al-Razgan , Hend S. Al-Khalifa , Mona D. Al-Shahrani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience - Third International Conference, DUXU 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part I
DOI: https://doi.org/10.1007/978-3-319-07668-3_40
Year: 2014

Educational Data Mining: A Systematic Review of the Published Literature 2006-2013.

Authors: Muna S. Al-Razgan , Atheer S. Al-Khalifa , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1007/978-981-4585-18-7_80
Year: 2013

On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications.

Authors: Shaker Alanazi , Jalal Al-Muhtadi , Abdelouahid Derhab , Kashif Saleem , Afnan N. AlRomi , Hanan S. Alholaibah , Joel J. P. C. Rodrigues
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 17th International Conference on E-health Networking, Application & Services, HealthCom 2015, Boston, MA, USA, October 14-17, 2015
DOI: https://doi.org/10.1109/HealthCom.2015.7454499
Year: 2015

A Methodology for Evaluating Vertical Handoff Decision Mechanisms.

Authors: Imed Lassoued , Jean-Marie Bonnin , Zied Ben Hamouda , Abdelfattah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico
DOI: http://doi.ieeecomputersociety.org/10.1109/ICN.2008.71
Year: 2008

Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications.

Authors: Abdelouahab Amira , Abdelraouf Ouadjaout , Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017
DOI: https://doi.org/10.1145/3029806.3029838
Year: 2017

Half-Symmetric Lens based localization algorithm for wireless sensor networks.

Authors: Noureddine Lasla , Abdelouahid Derhab , Abdelraouf Ouadjaout , Miloud Bagaa , Adlen Ksentini , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, October 22-25, 2012
DOI: http://doi.ieeecomputersociety.org/10.1109/LCN.2012.6423639
Year: 2012

Performance analysis of mixed polling schemes with multiple classes of self-similar traffic input to build comprehensive SLAs.

Authors: Mohsin Iftikhar , Muhammad Imran 0001 , Ghazi Al-Naymat , Mohammed Abdullah Alnuem , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013 - Workshop Proceedings
DOI: http://doi.ieeecomputersociety.org/10.1109/LCNW.2013.6758543
Year: 2013

Perspectives on System of Systems for pilgrimage ritual guidance and management.

Authors: Sami S. Alwakeel , Bassem Alhalabi , Mohammad M. Alwakeel
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE International Systems Conference, SysCon 2014, Proceedings, Ottawa, ON, Canada, March 31 - April 3, 2014
DOI: https://doi.org/10.1109/SysCon.2014.6819292
Year: 2014

Evaluating Encryption Techniques for C4I System.

Authors: Abdullah Sharaf Alghamdi , Hanif Ullah , Iftikhar Ahmad 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, CAINE 2010, November 8-10 2010, Imperial Palace Hotel, Las Vegas, Nevada, USA
DOI: Not available
Year: 2010

Design and FPGA implementation of reduced-complexity MIMO-MLD systems.

Authors: Yousef Abdullah Al-Zahrani , Saleh Al-Marshed , Abdullah Al-Dhofyan , Ahmed Iyanda Sulyman , Saeed Al-Dosari , Mohamed Elnamaky , Saleh Al-Shebeili
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: http://doi.ieeecomputersociety.org/10.1109/ISSPIT.2010.5711809
Year: 2010

VALS: Vehicle-aided location service in urban environment.

Authors: Raik Aissaoui , Amine Dhraief , Abdelfettah Belghith , Hamid Menouar , Fethi Filali , Hassan Mathkour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016
DOI: https://doi.org/10.1109/WCNC.2016.7565020
Year: 2016

Semantic Graph Based Automatic Summarization of Multiple Related Work Sections of Scientific Articles.

Authors: Nouf Ibrahim Altmami , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Artificial Intelligence: Methodology, Systems, and Applications - 18th International Conference, AIMSA 2018, Varna, Bulgaria, September 12-14, 2018, Proceedings
DOI: https://doi.org/10.1007/978-3-319-99344-7_23
Year: 2018

'External Optimization' for Max-SAT.

Authors: Mohamed El-bachir Menai , Mohamed Batouche
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the International Conference on Artificial Intelligence, IC-AI '02, June 24 - 27, 2002, Las Vegas, Nevada, USA, Volume 3
DOI: Not available
Year: 2002

A proposed FPGA-based parallel architecture for matrix multiplication.

Authors: Syed Manzoor Qasim , Shuja Ahmad Abbasi , Bandar Almashary
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2008, Macao, China, November 30 2008 - December 3, 2008
DOI: https://doi.org/10.1109/APCCAS.2008.4746382
Year: 2008

OTP-Based Two-Factor Authentication Using Mobile Phones.

Authors: Mohamed Hamdy Eldefrawy , Khaled Alghathbar , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/ITNG.2011.64
Year: 2011

Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.

Authors: M. Zubair Rafique , Zeeshan Shafi Khan , Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eighth International Conference on Information Technology: New Generations, ITNG 2011, Las Vegas, Nevada, USA, 11-13 April 2011
DOI: http://doi.ieeecomputersociety.org/10.1109/ITNG.2011.102
Year: 2011

A Framework for Optimum Selection of Online Social Network Management Systems.

Authors: Mohammed Al-Hougbany , Muhammad Al-Qurishi , Mabrook Al-Rakhami , Majed A. AlRubaian , Atif Alamri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.1145/2896387.2896409
Year: 2016

Interactive Artificial Bee Colony Supported Passive Continuous Authentication System.

Authors: Pei-wei Tsai , Muhammad Khurram Khan , Jeng-Shyang Pan 0001 , Bin-Yih Liao
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Systems Journal journal
DOI: https://doi.org/10.1109/JSYST.2012.2208153
Year: 2014

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing.

Authors: Vinod Kumar , Musheer Ahmad , Dheerendra Mishra , Saru Kumari , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Veh. Commun. journal
DOI: https://doi.org/10.1016/j.vehcom.2019.100213
Year: 2020

E-Learning and ICT Integration in Colleges and Universities in Saudi Arabia.

Authors: Hend Suliman Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: eLearn Magazine journal
DOI: https://doi.org/10.1145/1735103.1735849
Year: 2010

Twitter in academia: a case study from Saudi Arabia.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: eLearn Magazine journal
DOI: https://doi.org/10.1145/1454105.1454109
Year: 2008

Teaching Mobile Application Development in 20 Hours for High School Girls: A Web-Based Approach.

Authors: Hend S. Al-Khalifa , Hadil R. Faisal , Ghadah N. Al-Gumaei
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Global Engineering Education Conference, EDUCON 2019, Dubai, United Arab Emirates, April 8-11, 2019
DOI: https://doi.org/10.1109/EDUCON.2019.8725049
Year: 2019

Extremely low loss THz guidance using Kagome lattice porous core photonic crystal fiber.

Authors: Md. Anwar Hossain , G. K. M. Hasanuzzaman , Md. Selim Habib , S. M. Abdur Razzak , Yoshinori Namihira
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Optical Fiber Communications Conference and Exhibition, OFC 2015, Los Angeles, CA, USA, March 22-26, 2015
DOI: Not available
Year: 2015

Making Arabic PDF books accessible using gamification.

Authors: Hend AlRouqi , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: International Web for All Conference, W4A '14, Seoul, Republic of Korea, April 7-9, 2014
DOI: https://doi.org/10.1145/2596695.2596712
Year: 2014

A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications.

Authors: Arwa Alromih , Mznah Al-Rodhaan , Yuan Tian 0003
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s18124346
Year: 2018

Data Structures in Multi-Objective Evolutionary Algorithms.

Authors: Najwa Altwaijry , Mohamed El-bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. Sci. Technol. journal
DOI: https://doi.org/10.1007/s11390-012-1296-y
Year: 2012

Mobility Impact on Session Survivability under the SHIM6 Protocol and Enhancement of its Rehoming Procedure.

Authors: Amine Dhraief , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Networks journal
DOI: https://doi.org/10.4304/jnw.6.11.1521-1532
Year: 2011

Authenticated media uploading framework for mobile cloud computing.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Memetic Comput. journal
DOI: https://doi.org/10.1007/s12293-016-0200-7
Year: 2016

Traffic Locality Oriented Route Discovery Algorithm with Chase Packets for Mobile Ad Hoc Networks.

Authors: Mznah Al-Rodhaan , Lewis M. Mackenzie , Mohamed Ould-Khaoua
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 2009 International Conference on Wireless Networks, ICWN 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes
DOI: Not available
Year: 2009

Multi-Objective Optimal Tuning of Power Plant Controls using Genetic Algorithms.

Authors: Adel Abdennour
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Control. Intell. Syst. journal
DOI: https://doi.org/10.2316/Journal.201.2004.2.201-1148
Year: 2004

Breaking the F5 Algorith: An Improved Approach.

Authors: Hatim A. Aboalsamh , Sami A. Dokheekh , Hassan Mathkour , Ghazy M. R. Assassa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Egypt. Comput. Sci. J. journal
DOI: Not available
Year: 2007

A secure service provisioning framework for cyber physical cloud computing systems.

Authors: Anees Ara , Mznah Al-Rodhaan , Yuan Tian 0003 , Abdullah Al-Dhelaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2016

Eigen Values Features for the Classification of Brain Signals corresponding to 2D and 3D Educational Contents.

Authors: Saeed M. Bamatraf , Muhammad Hussain , Emad-ul-Haq Qazi , Hatim Aboalsamh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

Two-stage constellation partition algorithm for reduced-complexity multiple-input multiple-output-maximum-likelihood detection systems.

Authors: Ahmed Iyanda Sulyman , Yousef Abdullah Al-Zahrani , Saeed Al-Dosari , Abdulhameed M. Al-Sanie , Saleh Al-Shebeili , Vahid Tarokh
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IET Communications journal
DOI: https://doi.org/10.1049/iet-com.2012.0173
Year: 2012

A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem.

Authors: Helala AlShehri , Muhammad Hussain , Hatim Aboalsamh , Mansour Alzuair
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s18041008
Year: 2018

A Framework for a Context-Aware Elderly Entertainment Support System.

Authors: M. Anwar Hossain 0001 , Atif Alamri , Ahmad S. Almogren , S. K. Alamgir Hossain , Jorge Parra
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s140610538
Year: 2014

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security.

Authors: Abdelouahid Derhab , Mohamed Guerroumi , Abdu Gumaei , Leandros A. Maglaras , Mohamed Amine Ferrag , Mithun Mukherjee 0001 , Farrukh Aslam Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s19143119
Year: 2019

Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances.

Authors: Abdulrahman Alarifi , AbdulMalik S. Al-Salman , Mansour Alsaleh , Ahmad Alnafessah , Suheer Alhadhrami , Mai A. Al-Ammar , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s16050707
Year: 2016

Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'.

Authors: Muhammad Khurram Khan , Khaled Alghathbar
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Sensors journal
DOI: https://doi.org/10.3390/s100302450
Year: 2010

Toward Dynamic Resources Management for IoT-Based Manufacturing.

Authors: Jiafu Wan , Baotong Chen , Muhammad Imran 0001 , Fei Tao , Di Li 0001 , Chengliang Liu , Shafiq Ahmad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2018.1700629
Year: 2018

Semantic Multimedia Fog Computing and IoT Environment: Sustainability Perspective.

Authors: Md. Abdur Rahman , M. Shamim Hossain , Elham Hassanain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Communications Magazine journal
DOI: https://doi.org/10.1109/MCOM.2018.1700907
Year: 2018

Dynamic Cournot duopoly games with nonlinear demand function.

Authors: Sameh S. Askar , Ahmad M. Alshamrani , K. Alnowibet
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Appl. Math. Comput. journal
DOI: https://doi.org/10.1016/j.amc.2015.02.072
Year: 2015

Nonstationary analysis of the loss queue and of queueing networks of loss queues.

Authors: Khalid Abdulaziz Alnowibet , Harry G. Perros
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eur. J. Oper. Res. journal
DOI: https://doi.org/10.1016/j.ejor.2007.10.066
Year: 2009

A framework for evaluating university mobile websites.

Authors: Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Online Inf. Rev. journal
DOI: https://doi.org/10.1108/OIR-12-2012-0231
Year: 2014

Association-based dynamic computation of reputation in web services.

Authors: Pradeep K. Atrey , M. Anwar Hossain 0001 , Abdulmotaleb El-Saddik
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IJWGS journal
DOI: https://doi.org/10.1504/IJWGS.2008.018886
Year: 2008

HCBLS: A Hierarchical Cluster-Based Location Service in Urban Environment.

Authors: Raik Aissaoui , Amine Dhraief , Abdelfettah Belghith , Hamid Menouar , Hassan Mathkour , Fethi Filali , Adnan A. Abu-Dayya
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mobile Information Systems journal
DOI: https://doi.org/10.1155/2015/490191
Year: 2015

Automatic Gender Detection Based on Characteristics of Vocal Folds for Mobile Healthcare System.

Authors: Musaed Alhussein , Zulfiqar Ali , Muhammad Imran 0001 , Wadood Abdul
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Mobile Information Systems journal
DOI: https://doi.org/10.1155/2016/7805217
Year: 2016

Enhancing web accessibility by implementing context aware proxy.

Authors: Najd A. Al-Mouh , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/IJWIS-11-2015-0037
Year: 2016

Querying and restructuring XML data by graphical query language.

Authors: Mourad Ykhlef , Sarra M. Alqahtani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Web Inf. Syst. journal
DOI: https://doi.org/10.1108/17440081011070169
Year: 2010

Towards an Efficient Data Fragmentation, Allocation, and Clustering Approach in a Distributed Environment.

Authors: Hassan Ismail Abdalla , Abdel Monim Artoli
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. journal
DOI: https://doi.org/10.3390/info10030112
Year: 2019

Verifying the Images Authenticity in Cognitive Internet of Things (CIoT)-Oriented Cyber Physical System.

Authors: M. Shamim Hossain , Ghulam Muhammad , Muhammad Al-Qurishi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: MONET journal
DOI: https://doi.org/10.1007/s11036-017-0928-4
Year: 2018

Solving Multi-Document Summarization as an Orienteering Problem.

Authors: Asma Bader Al-Saleh , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Algorithms journal
DOI: https://doi.org/10.3390/a11070096
Year: 2018

A microservice recommendation mechanism based on mobile architecture.

Authors: Ru Wang , Muhammad Imran 0001 , Kashif Saleem
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2019.102510
Year: 2020

Identity-based online/offline signcryption for low power devices.

Authors: Fagen Li , Muhammad Khurram Khan , Khaled Alghathbar , Tsuyoshi Takagi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Netw. Comput. Appl. journal
DOI: https://doi.org/10.1016/j.jnca.2011.08.001
Year: 2012

BCWB: A P300 Brain-Controlled Web Browser.

Authors: Sofien Gannouni , Nourah Alangari , Hassan Mathkour , Hatim Aboalsamh , Kais Belwafi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Semantic Web Inf. Syst. journal
DOI: https://doi.org/10.4018/IJSWIS.2017040104
Year: 2017

New Technique to Deal with Dynamic Data Mining in the Database.

Authors: Hassan Ismail Abdalla
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Digit. Inf. Manag. journal
DOI: Not available
Year: 2011

Progressive edge detection compression for fingerprint images.

Authors: Awad Kh. Al-Asmari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Imaging Syst. Technol. journal
DOI: https://doi.org/10.1002/ima.10025
Year: 2002

Building an Ensemble of Fine-Tuned Naive Bayesian Classifiers for Text Classification.

Authors: Khalil M. El Hindi , Hussien AlSalman , Safwan Qasem , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Entropy journal
DOI: https://doi.org/10.3390/e20110857
Year: 2018

A Novel Numerical Approach for a Nonlinear Fractional Dynamical Model of Interpersonal and Romantic Relationships.

Authors: Jagdev Singh , Devendra Kumar , Maysaa Mohamed Al Qurashi , Dumitru Baleanu
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Entropy journal
DOI: https://doi.org/10.3390/e19070375
Year: 2017

Audio-visual emotion recognition using multi-directional regression and Ridgelet transform.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Multimodal User Interfaces journal
DOI: https://doi.org/10.1007/s12193-015-0207-2
Year: 2016

Personality and individual differences: the potential of using preferences for visual stimuli to predict the Big Five traits.

Authors: Hosam Al-Samarraie , Samer Muthana Sarsam , Ahmed Ibrahim Alzahrani , Nasser Alalwan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Cogn. Technol. Work. journal
DOI: https://doi.org/10.1007/s10111-018-0470-6
Year: 2018

Locality Aware Path ORAM: Implementation, Experimentation and Analytical Modeling.

Authors: Kholoud Al-Saleh , Abdelfettah Belghith
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. journal
DOI: https://doi.org/10.3390/computers7040056
Year: 2018

Secure multi-owner-based cloud computing scheme for big data.

Authors: Maram Al-Shablan , Yuan Tian 0003 , Mznah Al-Rodhaan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Int. J. Big Data Intell. journal
DOI: https://doi.org/10.1504/IJBDI.2016.078401
Year: 2016

From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living.

Authors: M. Anwar Hossain 0001 , Jorge Parra , Sk. Md. Mizanur Rahman , Atif Alamri , Sana Ullah , Hussein T. Mouftah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Wirel. Commun. journal
DOI: https://doi.org/10.1109/MWC.2016.7462491
Year: 2016

User authentication schemes for wireless sensor networks: A review.

Authors: Saru Kumari , Muhammad Khurram Khan , Mohammed Atiquzzaman
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ad Hoc Networks journal
DOI: https://doi.org/10.1016/j.adhoc.2014.11.018
Year: 2015

Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service.

Authors: Abdelouahid Derhab , Nadjib Badache
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Ad Hoc Networks journal
DOI: https://doi.org/10.1016/j.adhoc.2007.10.001
Year: 2008

Hybrid immunizing solution for job recommender system.

Authors: Shaha T. Al-Otaibi , Mourad Ykhlef
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Frontiers Comput. Sci. journal
DOI: https://doi.org/10.1007/s11704-016-5241-z
Year: 2017

New Strategies and Approaches for Efficient Overlay Multicast Routing.

Authors: Adel Ben Mnaouer , Abdelfettah Belghith , Mohamed Aissa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012
DOI: https://doi.org/10.1016/j.procs.2012.06.024
Year: 2012

Emerging URL Patterns in Mobile Websites: A Preliminary Results.

Authors: Atheer S. Al-Khalifa , Hend S. Al-Khalifa
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012), the 9th International Conference on Mobile Web Information Systems (MobiWIS-2012), Niagara Falls, Ontario, Canada, August 27-29, 2012
DOI: https://doi.org/10.1016/j.procs.2012.06.130
Year: 2012

An efficient certificateless aggregate signature scheme for the Internet of Vehicles.

Authors: Yanan Zhao , Yingzhe Hou , Lili Wang , Saru Kumari , Muhammad Khurram Khan , Hu Xiong
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Trans. Emerg. Telecommun. Technol. journal
DOI: https://doi.org/10.1002/ett.3708
Year: 2020

A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory.

Authors: Jiafu Wan , Jiapeng Li , Muhammad Imran 0001 , Di Li 0001
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Trans. Ind. Informatics journal
DOI: https://doi.org/10.1109/TII.2019.2894573
Year: 2019

Automatic document-level semantic metadata annotation using folksonomies and domain ontologies.

Authors: Hend S. Al-Khalifa , Jessica Rubart
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: SIGWEB Newsl. journal
DOI: https://doi.org/10.1145/1408940.1408944
Year: 2008

A survey of state-of-the-art approaches for emotion recognition in text.

Authors: Nourah Alswaidan , Mohamed El Bachir Menai
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Knowl. Inf. Syst. journal
DOI: https://doi.org/10.1007/s10115-020-01449-0
Year: 2020

Improving Cognitive Ability of Edge Intelligent IIoT through Machine Learning.

Authors: Baotong Chen , Jiafu Wan , Yanting Lan , Muhammad Imran 0001 , Di Li 0001 , Nadra Guizani
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: IEEE Network journal
DOI: https://doi.org/10.1109/MNET.001.1800505
Year: 2019

Emotion recognition using deep learning approach from audio-visual emotional big data.

Authors: M. Shamim Hossain , Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Fusion journal
DOI: https://doi.org/10.1016/j.inffus.2018.09.008
Year: 2019

Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability.

Authors: Md. Saiful Islam 0001 , Naif Alajlan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. J. journal
DOI: https://doi.org/10.1093/comjnl/bxu150
Year: 2015

Cache Freshness in Named Data Networking for the Internet of Things.

Authors: Maroua Meddeb , Amine Dhraief , Abdelfettah Belghith , Thierry Monteil 0001 , Khalil Drira , Saad A. Al-Ahmadi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. J. journal
DOI: https://doi.org/10.1093/comjnl/bxy005
Year: 2018

Date fruits classification using texture descriptors and shape-size features.

Authors: Ghulam Muhammad
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Eng. Appl. Artif. Intell. journal
DOI: https://doi.org/10.1016/j.engappai.2014.10.001
Year: 2015

Short-term and long-term memory analysis of learning using 2D and 3D educational contents.

Authors: Ghulam Muhammad , Muhammad Hussain , Muneer H. Al-Hammadi , Hatim Aboalsamh , Hassan Mathkour , Amir Malik Saeed
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Behav. Inf. Technol. journal
DOI: https://doi.org/10.1080/0144929X.2016.1212094
Year: 2016

The role of personality characteristics in informing our preference for visual presentation: An eye movement study.

Authors: Hosam Al-Samarraie , Samer Muthana Sarsam , Ahmed Ibrahim Alzahrani , Nasser Alalwan , Mona Masood
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Ambient Intell. Smart Environ. journal
DOI: https://doi.org/10.3233/AIS-160399
Year: 2016

Surfactant-mediated growth of InAs-GaAs superlattices and quantum dot structures grown at different temperatures.

Authors: Mohammad Abdulaziz Alduraibi , C. Mitchell , S. Chakraborty , M. Missous
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Microelectron. J. journal
DOI: https://doi.org/10.1016/j.mejo.2008.06.055
Year: 2009

A hybrid deep learning model for efficient intrusion detection in big data environment.

Authors: Mohammad Mehedi Hassan , Abdu Gumaei , Ahmed Alsanad , Majed A. AlRubaian , Giancarlo Fortino
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Inf. Sci. journal
DOI: https://doi.org/10.1016/j.ins.2019.10.069
Year: 2020

General dynamic recovery for compensating CSP.

Authors: Abeer S. Al-Humaimeedy , Maribel Fernández
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in:
DOI: https://doi.org/10.4204/EPTCS.143.1
Year: 2012

Process migration-based computational offloading framework for IoT-supported mobile edge/cloud computing.

Authors: Abdullah Yousafzai , Ibrar Yaqoob , Muhammad Imran 0001 , Abdullah Gani , Rafidah Md Noor
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2019

Sentiment Analysis of Arabic Tweets: Feature Engineering and A Hybrid Approach.

Authors: Nora Al-Twairesh , Hend S. Al-Khalifa , AbdulMalik Al-Salman , Yousef Al-Ohali
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: CoRR journal
DOI: Not available
Year: 2018

Context-aware medium access control protocols in wireless sensor networks.

Authors: Dhouha Ghrab , Imen Jemili , Abdelfettah Belghith , Mohamed Mosbah
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Internet Technol. Lett. journal
DOI: https://doi.org/10.1002/itl2.43
Year: 2018

Efficient techniques of key management and quantum cryptography in RFID networks.

Authors: Vijey Thayananthan , Ahmed Alzahrani 0001 , Muhammad Shuaib Qureshi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.1005
Year: 2015

Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems.

Authors: Abdelouahid Derhab , Abdelghani Bouras
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.1074
Year: 2015

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.

Authors: Saru Kumari , Mridul Kumar Gupta , Muhammad Khurram Khan , Xiong Li 0002
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.906
Year: 2014

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.

Authors: Ruhul Amin , SK Hafizul Islam , Muhammad Khurram Khan , Arijit Karati , Debasis Giri , Saru Kumari
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1155/2017/5989151
Year: 2017

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.

Authors: SK Hafizul Islam , Muhammad Khurram Khan , Ali M. Al-Khouri
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.1165
Year: 2015

Mobile one-time passwords: two-factor authentication using mobile phones.

Authors: Mohamed Hamdy Eldefrawy , Muhammad Khurram Khan , Khaled Alghathbar , Tai-Hoon Kim , Hassan M. Elkamchouchi
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Security and Communication Networks journal
DOI: https://doi.org/10.1002/sec.340
Year: 2012

Evaluating the impact of a cloud-based serious game on obese people.

Authors: Atif Alamri , Mohammad Mehedi Hassan , M. Anwar Hossain 0001 , Muhammad Al-Qurishi , Yousuf Aldukhayyil , M. Shamim Hossain
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Hum. Behav. journal
DOI: https://doi.org/10.1016/j.chb.2013.06.021
Year: 2014

Binary Artificial Bee Colony optimization using bitwise operation.

Authors: Dongli Jia , Xintao Duan , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: Comput. Ind. Eng. journal
DOI: https://doi.org/10.1016/j.cie.2014.08.016
Year: 2014

Temporal, Delegable and Cheap Update Access control to published XML Documents.

Authors: Waleed Halboob , Ali Mamat , Ramlan Mahmod , Muhammad Khurram Khan
Affiliation: King Saud University, Riyadh, Saudi Arabia
Published in: J. Comput. Sci. journal
DOI: https://doi.org/10.3844/jcssp.2013.427.432
Year: 2013