scispace - formally typeset
Search or ask a question

Showing papers in "Applied Computing and Informatics in 2018"


Journal ArticleDOI
TL;DR: The simulations in this study indicate that, the Cuckoo search algorithm with exponentially increasing switching parameter outperformed the other Cuckoos search algorithms.

229 citations


Journal ArticleDOI
TL;DR: This paper presents the current offloading frameworks, computation offloading techniques, and analyzes them along with their main critical issues and summarizes the issues in off loading frameworks in the MCC domain that requires further research.

160 citations


Journal ArticleDOI
TL;DR: In this article, the authors discuss ontology-based information retrieval approaches and techniques by taking into consideration the aspects of ontology modelling, processing and the translation of ontological knowledge into database search requests.

143 citations


Journal ArticleDOI
TL;DR: Results prove the ability of the proposed HBBEPSO algorithm to search the feature space for optimal feature combinations.

89 citations


Journal ArticleDOI
TL;DR: CAMeOnto is an ontology with these characteristics, based on the principles of 5Ws: who, when, what, where and why, which is used by CARMiCLOC, a reflective middleware for context-aware applications, and is instantiated in several case studies.

64 citations


Journal ArticleDOI
TL;DR: The results show that the SVM algorithm provides more precise predictions compared with other predictors with small estimation error and improves the prediction accuracy and suitable for forest fires prediction compared to other methods.

63 citations


Journal ArticleDOI
TL;DR: A novel Cuckoo search based multi- document summarizer (MDSCSA) is proposed to address the problem of multi-document summarization and clearly reveals that the proposed approach outperforms the other summarizers included in this study.

61 citations


Journal ArticleDOI
TL;DR: An overview of main interdependency categories, as well as methods that can be used to identify and study interdependencies are provided, based on a study of recent papers in major archival journals.

50 citations


Journal ArticleDOI
TL;DR: Simulation results indicates proposed routing algorithm’s superiority in terms of residual energy along with considerable improvement regarding network lifetime, and significant reduction in delay when compared with existing PEGASIS protocol and optimised PEG-ACO chain respectively.

50 citations


Journal ArticleDOI
TL;DR: Results indicate that the proposed method offers a consensus solution for handling the vague and qualitative criteria of ambulance location preference and suggests that the ‘road network’ is the best alternative for ambulance location.

49 citations


Journal ArticleDOI
TL;DR: The approach, i.e. enabling a Future IoT Controller (FITC) has been verified with a simulated SmartHome scenario which proves the feasibility of the low-level intelligence in terms of reducing rules domination, faster response time and prediction through learning experiences at the edge.

Journal ArticleDOI
TL;DR: This study has proposed an approach that extracts and classifies opinion words from one domain called source domain and predicts opinion words of another domain called target domain using a semi-supervised approach, which combines modified maximum entropy and bipartite graph clustering.

Journal ArticleDOI
TL;DR: This paper presents an analytical study of Hajj-related mobile apps offered by Google Play, and reveals a number of repetitive apps in terms of application names and services.

Journal ArticleDOI
TL;DR: A new algorithm for detecting and characterizing potholes and bumps directly from noisy signals acquired using an Accelerometer is presented, showing high levels of accuracy, precision and low false alarm rates.

Journal ArticleDOI
TL;DR: This work proposes a method to detect attack-oriented scans and to distinguish them from other types of visits using access log files of Apache (or ISS) web servers and inserts a rule set to detect SQL Injection and XSS attacks.

Journal ArticleDOI
TL;DR: It is concluded from the results that mode change is very effective to improve the optimal makespan of the project and the proposed algorithm is efficient and effective.

Journal ArticleDOI
TL;DR: An effectual method to pact with various fingerprint images to enhance the restrictions of prevailing fingerprint image augmentation approaches is proposed and Adaptive Genetic Neural Network is used for classification of images efficiently.

Journal ArticleDOI
TL;DR: A new fractional two dimensional triangle function combination discrete chaotic map (2D-TFCDM) is proposed by utilizing the discrete fractional calculus and is converted into algorithm, and applied to color image encryption.

Journal ArticleDOI
TL;DR: Bond Energy Algorithm (BEA) is applied with a better affinity measure that improves the generated clusters of attributes and shows more efficient clustering and allocation which gives better performance.

Journal ArticleDOI
TL;DR: It is proved that the metadata within a file offers the potential to include data that can be used to prove integrity, authenticity and provenance of the digital content within the file.

Journal ArticleDOI
TL;DR: It can be said that the soft computing-based diagnostic models could assist the doctors to make informed decisions and be very handy and useful for general physicians working at remote locations.

Journal ArticleDOI
TL;DR: In this study, economy is considered as a major liberation in the fashion world by analyzing six attributes, namely, style, color, fabric, brand, price and size that could bring about commercial success.

Journal ArticleDOI
TL;DR: A new framework to improve the weaknesses of the existing document management procedures in government organizations is proposed and integrates the implementation of an NFC system due to its secure short - range communication, and the peer-to-peer communication capability in most mobile devices.

Journal ArticleDOI
TL;DR: A new compact hybrid lightweight encryption technique using the fastest bit permutation instruction PERMS with S-box of PRESENT block cipher for non-linearity is proposed and results in a very good avalanche effect and compact implementation in the both hardware and software environment.

Journal ArticleDOI
TL;DR: The use of Non-local means (NLM) filter, which is robust against severe noise, to remove speckle noise in breast ultrasound images is investigated.

Journal ArticleDOI
TL;DR: The method provides a more complete view of the reliability management and root cause of failure in the Wind Turbine (WT) system using the flexibility parameter in the model.

Journal ArticleDOI
TL;DR: This paper focuses on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing, which appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.

Journal ArticleDOI
TL;DR: This paper describes not just the concept, layout and methodology used on RobotCraft 2017 but also presents the participants knowledge background and their overall opinions, leading to focus on lessons learned and suggestions for future editions.

Journal ArticleDOI
TL;DR: The issue of not wanting to use large dataset to develop CB-FPM due to tedious duration is resolvable by applying BDA technique, proving that use of larger sample size with the aid of BDA leads to better performingCB-FPMs.

Journal ArticleDOI
TL;DR: A framework is established which gathers cognitive functions into nine intentional processes from the substructures of the human brain, and categorizes cognitive computing functions into the functional hierarchy, through which the functional similarities between cognitive service and human cognitive functions are presented to illustrate what kind of functions are cognitive in the computing.