Showing papers in "Applied Computing and Informatics in 2018"
••
TL;DR: The simulations in this study indicate that, the Cuckoo search algorithm with exponentially increasing switching parameter outperformed the other Cuckoos search algorithms.
229 citations
••
TL;DR: This paper presents the current offloading frameworks, computation offloading techniques, and analyzes them along with their main critical issues and summarizes the issues in off loading frameworks in the MCC domain that requires further research.
160 citations
••
TL;DR: In this article, the authors discuss ontology-based information retrieval approaches and techniques by taking into consideration the aspects of ontology modelling, processing and the translation of ontological knowledge into database search requests.
143 citations
••
TL;DR: Results prove the ability of the proposed HBBEPSO algorithm to search the feature space for optimal feature combinations.
89 citations
••
TL;DR: CAMeOnto is an ontology with these characteristics, based on the principles of 5Ws: who, when, what, where and why, which is used by CARMiCLOC, a reflective middleware for context-aware applications, and is instantiated in several case studies.
64 citations
••
TL;DR: The results show that the SVM algorithm provides more precise predictions compared with other predictors with small estimation error and improves the prediction accuracy and suitable for forest fires prediction compared to other methods.
63 citations
••
TL;DR: A novel Cuckoo search based multi- document summarizer (MDSCSA) is proposed to address the problem of multi-document summarization and clearly reveals that the proposed approach outperforms the other summarizers included in this study.
61 citations
••
TL;DR: An overview of main interdependency categories, as well as methods that can be used to identify and study interdependencies are provided, based on a study of recent papers in major archival journals.
50 citations
••
TL;DR: Simulation results indicates proposed routing algorithm’s superiority in terms of residual energy along with considerable improvement regarding network lifetime, and significant reduction in delay when compared with existing PEGASIS protocol and optimised PEG-ACO chain respectively.
50 citations
••
TL;DR: Results indicate that the proposed method offers a consensus solution for handling the vague and qualitative criteria of ambulance location preference and suggests that the ‘road network’ is the best alternative for ambulance location.
49 citations
••
TL;DR: The approach, i.e. enabling a Future IoT Controller (FITC) has been verified with a simulated SmartHome scenario which proves the feasibility of the low-level intelligence in terms of reducing rules domination, faster response time and prediction through learning experiences at the edge.
••
TL;DR: This study has proposed an approach that extracts and classifies opinion words from one domain called source domain and predicts opinion words of another domain called target domain using a semi-supervised approach, which combines modified maximum entropy and bipartite graph clustering.
••
TL;DR: This paper presents an analytical study of Hajj-related mobile apps offered by Google Play, and reveals a number of repetitive apps in terms of application names and services.
••
TL;DR: A new algorithm for detecting and characterizing potholes and bumps directly from noisy signals acquired using an Accelerometer is presented, showing high levels of accuracy, precision and low false alarm rates.
••
TL;DR: This work proposes a method to detect attack-oriented scans and to distinguish them from other types of visits using access log files of Apache (or ISS) web servers and inserts a rule set to detect SQL Injection and XSS attacks.
••
TL;DR: It is concluded from the results that mode change is very effective to improve the optimal makespan of the project and the proposed algorithm is efficient and effective.
••
TL;DR: An effectual method to pact with various fingerprint images to enhance the restrictions of prevailing fingerprint image augmentation approaches is proposed and Adaptive Genetic Neural Network is used for classification of images efficiently.
••
TL;DR: A new fractional two dimensional triangle function combination discrete chaotic map (2D-TFCDM) is proposed by utilizing the discrete fractional calculus and is converted into algorithm, and applied to color image encryption.
••
TL;DR: Bond Energy Algorithm (BEA) is applied with a better affinity measure that improves the generated clusters of attributes and shows more efficient clustering and allocation which gives better performance.
••
TL;DR: It is proved that the metadata within a file offers the potential to include data that can be used to prove integrity, authenticity and provenance of the digital content within the file.
••
TL;DR: It can be said that the soft computing-based diagnostic models could assist the doctors to make informed decisions and be very handy and useful for general physicians working at remote locations.
••
TL;DR: In this study, economy is considered as a major liberation in the fashion world by analyzing six attributes, namely, style, color, fabric, brand, price and size that could bring about commercial success.
••
TL;DR: A new framework to improve the weaknesses of the existing document management procedures in government organizations is proposed and integrates the implementation of an NFC system due to its secure short - range communication, and the peer-to-peer communication capability in most mobile devices.
••
TL;DR: A new compact hybrid lightweight encryption technique using the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity is proposed and results in a very good avalanche effect and compact implementation in the both hardware and software environment.
••
TL;DR: The use of Non-local means (NLM) filter, which is robust against severe noise, to remove speckle noise in breast ultrasound images is investigated.
••
TL;DR: The method provides a more complete view of the reliability management and root cause of failure in the Wind Turbine (WT) system using the flexibility parameter in the model.
••
TL;DR: This paper focuses on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing, which appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.
••
TL;DR: This paper describes not just the concept, layout and methodology used on RobotCraft 2017 but also presents the participants knowledge background and their overall opinions, leading to focus on lessons learned and suggestions for future editions.
••
TL;DR: The issue of not wanting to use large dataset to develop CB-FPM due to tedious duration is resolvable by applying BDA technique, proving that use of larger sample size with the aid of BDA leads to better performingCB-FPMs.
••
TL;DR: A framework is established which gathers cognitive functions into nine intentional processes from the substructures of the human brain, and categorizes cognitive computing functions into the functional hierarchy, through which the functional similarities between cognitive service and human cognitive functions are presented to illustrate what kind of functions are cognitive in the computing.