Journal of King Saud University-Computer and Information Sciences

Papers
(The TQCC of Journal of King Saud University-Computer and Information Sciences is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Fruits and vegetables quality evaluation using computer vision: A review200
Stability of feature selection algorithm: A review170
A Survey on Human Face Expression Recognition Techniques124
Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification112
Precision agriculture using IoT data analytics and machine learning100
A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications93
A comprehensive review on ensemble deep learning: Opportunities and challenges85
A new hybrid deep learning model for human action recognition77
Intelligent waste management system using deep learning with IoT76
Machine learning and artificial intelligence based Diabetes Mellitus detection and self-management: A systematic review73
An optimized XGBoost based diagnostic system for effective prediction of heart disease73
A review on TinyML: State-of-the-art and prospects72
Subject independent emotion recognition from EEG using VMD and deep learning70
Capsule Networks – A survey69
Hybridization of meta-heuristic algorithm for load balancing in cloud computing environment63
Review of automatic text summarization techniques & methods62
Clustering based semi-supervised machine learning for DDoS attack classification61
Smart home health monitoring system for predicting type 2 diabetes and hypertension61
RFM model for customer purchase behavior using K-Means algorithm59
IoT and artificial intelligence implementations for remote healthcare monitoring systems: A survey58
Arabic natural language processing: An overview57
Improved anti-occlusion object tracking algorithm using Unscented Rauch-Tung-Striebel smoother and kernel correlation filter55
Load balancing techniques in cloud computing environment: A review55
MapReduce based intelligent model for intrusion detection using machine learning technique54
RFM ranking – An effective approach to customer segmentation53
An adaptive approach: Smart traffic congestion control system53
A deep learning based intelligent framework to mitigate DDoS attack in fog environment53
A survey of fault tolerance in cloud computing52
A literature review on question answering techniques, paradigms and systems52
Blockchain for smart grid51
Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN49
Convolutional neural networks based potholes detection using thermal imaging49
A survey on PSO based meta-heuristic scheduling mechanism in cloud computing environment47
Localization strategies for autonomous mobile robots: A review45
An effective ensemble deep learning framework for text classification44
A Signer Independent Sign Language Recognition with Co-articulation Elimination from Live Videos: An Indian Scenario44
Emerging Trends in Blockchain Technology and Applications: A Review and Outlook44
The survey: Text generation models in deep learning44
Blockchain state-of-the-art: architecture, use cases, consensus, challenges and opportunities43
Heuristic initialization of PSO task scheduling algorithm in cloud computing43
Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm43
A new binary grasshopper optimization algorithm for feature selection problem42
EEG-based emotion recognition: Review of commercial EEG devices and machine learning techniques42
An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map41
Resource management in pervasive Internet of Things: A survey41
Improving parking availability prediction in smart cities with IoT and ensemble-based model40
Self-attention negative feedback network for real-time image super-resolution40
High fidelity based reversible data hiding using modified LSB matching and pixel difference39
Fish Disease Detection Using Image Based Machine Learning Technique in Aquaculture38
Efficient and low complex architecture for detection and classification of Brain Tumor using RCNN with Two Channel CNN38
Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network38
Water quality prediction and classification based on principal component regression and gradient boosting classifier approach38
Performance optimization of criminal network hidden link prediction model with deep reinforcement learning37
A novel DeepMaskNet model for face mask detection and masked facial recognition37
Optimal feature selection using binary teaching learning based optimization algorithm37
Use of optimized Fuzzy C-Means clustering and supervised classifiers for automobile insurance fraud detection37
Concept Drift Detection in Data Stream Mining : A literature review35
Internet of things and data mining: An application oriented survey35
Multilevel thresholding for image segmentation using Krill Herd Optimization algorithm35
A novel optic disc and optic cup segmentation technique to diagnose glaucoma using deep learning convolutional neural network over retinal fundus images35
Web accessibility investigation and identification of major issues of higher education websites with statistical measures: A case study of college websites35
Whale Harris hawks optimization based deep learning classifier for brain tumor detection using MRI images35
Benchmarking on offline Handwritten Tamil Character Recognition using convolutional neural networks34
A review of IoT network management: Current status and perspectives34
A novel joint histogram equalization based image contrast enhancement34
An android based course attendance system using face recognition34
Emotion recognition from facial images with simultaneous occlusion, pose and illumination variations using meta-learning33
An improved sine cosine algorithm to select features for text categorization33
Leveraging blockchain for ensuring trust in IoT: A survey33
ESO-LEACH: PSO based energy efficient clustering in LEACH33
A Review on Secure Data Deduplication: Cloud Storage Security Issue33
STORE: Security Threat Oriented Requirements Engineering Methodology33
Forest 4.0: Digitalization of forest using the Internet of Things (IoT)32
An efficient single document Arabic text summarization using a combination of statistical and semantic features32
Reconsidering big data security and privacy in cloud and mobile cloud systems32
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing32
A novel load balancing technique for cloud computing platform based on PSO32
Covid-19 detection in chest X-ray through random forest classifier using a hybridization of deep CNN and DWT optimized features32
Software fault prediction based on change metrics using hybrid algorithms: An empirical study30
A deeper look into cybersecurity issues in the wake of Covid-19: A survey30
Optimization and acceleration of convolutional neural networks: A survey30
A pair-based task scheduling algorithm for cloud computing environment30
An adaptive method for feature selection and extraction for classification of epileptic EEG signal in significant states29
A preference random walk algorithm for link prediction through mutual influence nodes in complex networks29
A machine learning based help desk system for IT service management29
Designing a grey wolf optimization based hyper-parameter optimized convolutional neural network classifier for skin cancer detection29
Lung nodule detection and classification from Thorax CT-scan using RetinaNet with transfer learning29
A Comprehensive Survey on the Application of Deep and Reinforcement Learning Approaches in Autonomous Driving28
Finger vein identification using deeply-fused Convolutional Neural Network28
Vision and research directions of 6G technologies and applications28
Inverted LSB image steganography using adaptive pattern to improve imperceptibility28
Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSNs28
A new attributed graph clustering by using label propagation in complex networks28
A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction27
Effective deep learning approaches for summarization of legal texts27
A Blockchain-based Land Title Management System for Bangladesh27
Airline ticket price and demand prediction: A survey27
A review on big data based parallel and distributed approaches of pattern mining27
The recent trends in cyber security: A review27
Optimization of decision trees using modified African buffalo algorithm27
An Adaptive Harmony Search Approach for Gene Selection and Classification of High Dimensional Medical Data27
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm27
Saliency guided faster-RCNN (SGFr-RCNN) model for object detection and recognition26
A hybrid genetic algorithm and tabu search for minimizing makespan in flow shop scheduling problem26
Cost effective deadline aware scheduling strategy for workflow applications on virtual machines in cloud computing26
Securing matrix counting-based secret-sharing involving crypto steganography26
Improved payload capacity in LSB image steganography uses dilated hybrid edge detection26
A Jaya algorithm based wrapper method for optimal feature selection in supervised classification26
SMOTE-LOF for noise identification in imbalanced data classification26
Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme26
Comparative analysis of median filter and its variants for removal of impulse noise from gray scale images26
A high capacity algorithm for information hiding in Arabic text25
LoRa and server-based home automation using the internet of things (IoT)25
An optimized QoS-based clustering with multipath routing protocol for Wireless Sensor Networks25
CD-SPM: Cross-domain book recommendation using sequential pattern mining and rule mining25
A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition25
A comprehensive survey of deep learning in the field of medical imaging and medical natural language processing: Challenges and research directions25
MultiNet: A deep neural network approach for detecting breast cancer through multi-scale feature fusion25
Decoding ChatGPT: A taxonomy of existing research, current challenges, and possible future directions24
Integrating social media as cooperative learning tool in higher education classrooms: An empirical study24
Machine learning approach in melanoma cancer stage detection24
Container scheduling techniques: A Survey and assessment24
Susceptibility of deforestation hotspots in Terai-Dooars belt of Himalayan Foothills: A comparative analysis of VIKOR and TOPSIS models23
Arabic aspect based sentiment analysis using bidirectional GRU based models23
MRI Brain Tumor Segmentation and Analysis using Rough-Fuzzy C-Means and Shape Based Properties23
FinTech enablers, use cases, and role of future internet of things23
An in-depth exploration of automated jackfruit disease recognition23
Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks23
Early detection of crypto-ransomware using pre-encryption detection algorithm23
PSO based test case generation for critical path using improved combined fitness function23
BDNet: Bengali Handwritten Numeral Digit Recognition based on Densely connected Convolutional Neural Networks23
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem23
An ensemble agglomerative hierarchical clustering algorithm based on clusters clustering technique and the novel similarity measurement22
A survey on different approaches for software test case prioritization22
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system22
GB-SVNN: Genetic BAT assisted support vector neural network for arrhythmia classification using ECG signals22
Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing22
Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers22
Android data storage security: A review22
A predictive model for phishing detection22
Vehicle plate number localization using a modified GrabCut algorithm22
Developing a causal relationship among factors of e-commerce: A decision making approach22
Normalized square difference based multilevel thresholding technique for multispectral images using leader slime mould algorithm21
BiCHAT: BiLSTM with deep CNN and hierarchical attention for hate speech detection21
An approach to the acquisition of tacit knowledge based on an ontological model21
Cluster head selection based on Minimum Connected Dominating Set and Bi-Partite inspired methodology for energy conservation in WSNs21
Load balancing optimization based on hybrid Heuristic-Metaheuristic techniques in cloud environment21
An Improved Multi-Modal based Machine Learning Approach for the Prognosis of Alzheimer’s disease21
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach21
Multi-level residual network VGGNet for fish species classification21
Real-time Jordanian license plate recognition using deep learning21
IDEA: Intellect database for emotion analysis using EEG signal21
Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing21
SANA: Sentiment analysis on newspapers comments in Algeria21
A systematic literature mapping on secure identity management using blockchain technology21
An intelligent approach to design of E-Commerce metasearch and ranking system using next-generation big data analytics21
An ensemble approach for spam detection in Arabic opinion texts21
Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces20
Systematic literature review of mobile application development and testing effort estimation20
A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment20
A Fuzzy Logic based feature engineering approach for Botnet detection using ANN20
An enhanced deadline constraint based task scheduling mechanism for cloud environment20
Brain tumour segmentation from MRI using superpixels based spectral clustering20
Stereo matching algorithm based on deep learning: A survey20
Distributed Ledger Technology-based land transaction system with trusted nodes consensus mechanism20
Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing20
Improving Sentiment Analysis of Arabic Tweets by One-way ANOVA20
Novel fusion of color balancing and superpixel based approach for detection of tomato plant diseases in natural complex environment19
Domain knowledge based genetic algorithms for mobile robot path planning having single and multiple targets19
Automatic Brain Tumor Segmentation from MRI using Greedy Snake Model and Fuzzy C-Means Optimization19
Copy-move forgery detection using binary discriminant features19
Contextual semantic embeddings based on fine-tuned AraBERT model for Arabic text multi-class categorization19
RN-SMOTE: Reduced Noise SMOTE based on DBSCAN for enhancing imbalanced data classification19
Periocular biometrics: A survey19
Big data analytics in telecommunications: Governance, architecture and use cases19
Improved Black Hole optimization algorithm for data clustering19
Morphological evaluation and sentiment analysis of Punjabi text using deep learning classification19
A survey on fish classification techniques19
Malaria detection using deep residual networks with mobile microscopy19
Review and classification of content recommenders in E-learning environment19
Artificial Intelligence and COVID-19: A Systematic umbrella review and roads ahead18
Ensemble of multi-stage deep convolutional neural networks for automated grading of diabetic retinopathy using image patches18
Skin cancer image segmentation utilizing a novel EN-GWO based hyper-parameter optimized FCEDN18
A multilingual offensive language detection method based on transfer learning from transformer fine-tuning model18
A novel improved random forest for text classification using feature ranking and optimal number of trees18
Adaptive boosting of weak regressors for forecasting of crop production considering climatic variability: An empirical assessment18
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering18
Entropy based automatic unsupervised brain intracranial hemorrhage segmentation using CT images18
Computer aided diagnosis for thyroid cancer system based on internal and external characteristics18
Particle Swarm and Genetic Algorithm applied to mutation testing for test data generation: A comparative evaluation18
State-of-art review of information diffusion models and their impact on social network vulnerabilities18
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment18
A new SAR image despeckling using correlation based fusion and method noise thresholding18
Influence maximization frameworks, performance, challenges and directions on social network: A theoretical study18
A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization18
A framework of monitoring water pipeline techniques based on sensors technologies18
Elephant search optimization combined with deep neural network for microarray data analysis17
A differential evolutionary adaptive Harris hawks optimization for two dimensional practical Masi entropy-based multilevel image thresholding17
Automatic lung segmentation for the inclusion of juxtapleural nodules and pulmonary vessels using curvature based border correction17
Smart occupancy detection for road traffic parking using deep extreme learning machine17
TEO-MCRP: Thermal exchange optimization-based clustering routing protocol with a mobile sink for wireless sensor networks17
A chaos-based probabilistic block cipher for image encryption17
Dynamizing Dijkstra: A solution to dynamic shortest path problem through retroactive priority queue17
Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function17
A dynamic load scheduling in IaaS cloud using binary JAYA algorithm17
UBMTR: Unsupervised Boltzmann machine-based time-aware recommendation system17
“A systematic literature review on IoT gateways”16
Review on VLSI design using optimization and self-adaptive particle swarm optimization16
SRL-ACO: A text augmentation framework based on semantic role labeling and ant colony optimization16
Intelligent handwritten recognition using hybrid CNN architectures based-SVM classifier with dropout16
A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT)16
A squeeze and excitation ResNeXt-based deep learning model for Bangla handwritten compound character recognition16
Deep-learning based descriptors in application to aging problem in face recognition16
Development of trust based access control models using fuzzy logic in cloud computing16
Similarity measures for Collaborative Filtering-based Recommender Systems: Review and experimental comparison16
A review of diabetic retinopathy: Datasets, approaches, evaluation metrics and future trends16
Classification of bird sounds as an early warning method of forest fires using Convolutional Neural Network (CNN) algorithm16
FPGA implementation of a chaos-based image encryption algorithm16
An experimental analysis of different Deep Learning based Models for Alzheimer’s Disease classification using Brain Magnetic Resonance Images16
Deterministic weather forecasting models based on intelligent predictors: A survey16
A heuristic-based task scheduling algorithm for scientific workflows in heterogeneous cloud computing platforms16
Target coverage in random wireless sensor networks using cover sets16
A hybrid modified step Whale Optimization Algorithm with Tabu Search for data clustering16
Top data mining tools for the healthcare industry16
Forwarding strategies in vehicular named data networks: A survey16
Secure decentralized electronic health records sharing system based on blockchains16
Capsule network based analysis of histopathological images of oral squamous cell carcinoma16
Human face recognition with combination of DWT and machine learning15
Multi-document extractive text summarization based on firefly algorithm15
An effective robust and imperceptible blind color image watermarking using WHT15
Single level UNet3D with multipath residual attention block for brain tumor segmentation15
Performance evaluation of text-mining models with Hindi stopwords lists15
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images15
Gastrointestinal polyp detection through a fusion of contourlet transform and Neural features15
Deep learning framework for rapid and accurate respiratory COVID-19 prediction using chest X-ray images15
An adaptive outlier removal aided k-means clustering algorithm15
A new emotion–based affective model to detect student’s engagement15
Multi objective trust aware task scheduling algorithm in cloud computing using whale optimization15
Towards activation function search for long short-term model network: A differential evolution based approach15
Multi-Model Generative Adversarial Network Hybrid Prediction Algorithm (MMGAN-HPA) for stock market prices prediction15
Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation15
Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks15
CNN based efficient approach for emotion recognition15
Mal-Detect: An intelligent visualization approach for malware detection15
A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations15
A survey on near-human conversational agents15
Improved routing in MANET with optimized multi path routing fine tuned with hybrid modeling15
Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses15
An efficient face recognition method using contourlet and curvelet transform15
An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal15
0.078940868377686