scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Electrical Engineering in 2017"


Journal ArticleDOI
TL;DR: Experimental results show that the proposed SCH-SpecPSO outperforms 75% more than state of art mobile social networks by optimizing various handover issues.

308 citations


Journal ArticleDOI
TL;DR: This paper presents two machine learning aided approaches for static analysis of Android malware based on permissions and the other is based on source code analysis utilizing a bag-of-words representation model.

272 citations


Journal ArticleDOI
TL;DR: A scalable three-tier architecture to store and process such huge volume of wearable sensor data in cloud computing is proposed and ROC analysis is performed to identify the most significant clinical parameters to get heart disease.

199 citations


Journal ArticleDOI
TL;DR: A provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks and the simulation through the widely-known Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that the scheme is also secure.

171 citations


Journal ArticleDOI
TL;DR: A strategy for Software Defined Wireless Sensor Network (SDWSN) is proposed as an effort for application improvement in monitored environments and application challenges faced by WSNs for monitored environments are highlighted.

161 citations


Journal ArticleDOI
TL;DR: The comparative study shows that deep learning techniques can be built by introducing a number of methods in combination with supervised and unsupervised training techniques, and indicates that high involvement of humans to design sophisticated and optimized algorithms based on machine and deeplearning techniques is high.

157 citations


Journal ArticleDOI
TL;DR: The use of knowledge discovery techniques to analyse historical student course grade data in order to predict whether or not a student will drop out of a course is proposed and a tutoring action plan is designed.

153 citations


Journal ArticleDOI
TL;DR: Three new time- domain features are proposed to improve the performance of EMG-PR based strategy in arm movement classification and could achieved an average classification accuracy of 92.00% ± 3.11% which was 6.49% higher than that of the commonly used time-domain features.

145 citations


Journal ArticleDOI
TL;DR: A novel Software-Defined Networking (SDN) based detection approach that utilizes the characteristics of the ransomware communication is presented, concluding that an analysis of the HTTP message sequences and their respective content sizes is enough to detect such threats.

140 citations


Journal ArticleDOI
TL;DR: Experimental results show that the proposed scheme can cluster the inter-block embedding changes and perform better than the state-of-the-art steganographic method.

133 citations


Journal ArticleDOI
TL;DR: The paper proves the SLI by the real and experimental results for the statement “any robotics randomized environment transforms into the array” and presents the new variant of genetic algorithm using the binary codes through matrix for mobile robot navigation (MRN) in static and dynamic environment.

Journal ArticleDOI
TL;DR: Comprehensive security analysis is conducted to show that the proposed protocol fixes these flaws of Amin et al.

Journal ArticleDOI
TL;DR: This work demonstrates the suitability of online support vector regression (SVR) method to short term power load forecasting and thoroughly explore its pros and cons, and presents a comparison of ten state-of-the-art forecasting methods in terms of accuracy on public Irish CER dataset.

Journal ArticleDOI
TL;DR: A dynamic annexed balance method is used to solve the problem of cloud load balancing that takes into consideration both server processing power and computer loading, thus making it less likely that a server will be unable to handle excessive computational requirements.

Journal ArticleDOI
TL;DR: A scalable data processing framework with a novel change detection algorithm that is compared with various existing approaches such as pruned exact linear time method, binary segmentation method, and segment neighborhood method to monitor the changes in the seasonal climate.

Journal ArticleDOI
TL;DR: A comprehensive analysis of the main threats that hamper cloud computing adoption on a wide scale, and a right to the point review of the solutions that are currently being provided by the major vendors are provided.

Journal ArticleDOI
TL;DR: This work aims at developing a real time remote health status prediction system built around open source Big Data processing engine, the Apache Spark, deployed in the cloud which focus on applying machine learning model on streaming Big Data.

Journal ArticleDOI
TL;DR: A distributed self-healing approach for both node and cluster head levels for wireless Sensor Networks, where, at node level, battery, sensor and receiver faults can be diagnosed while, at cluster head level, transmitter and mal-functional nodes can be detected and recovered.

Journal ArticleDOI
TL;DR: It is shown that the proposed Controller for automatic voltage regulator (AVR) provides the better time response characteristics than the other existing techniques.

Journal ArticleDOI
TL;DR: A user authentication scheme and data transmission mechanism that facilitates security and privacy protection, enable medical personnel to instantly monitor the health conditions of care receivers, and provide care receivers with prompt and comprehensive medical care is proposed.

Journal ArticleDOI
TL;DR: A new multiple-image encryption algorithm based on the mixed image element and piecewise linear chaotic maps (PWLCM) is presented, which is very efficient and secure.

Journal ArticleDOI
TL;DR: The main components of a surveillance system are presented and studied thoroughly, and the most important deep learning algorithms are presented, along with the smart analytics that they utilize.

Journal ArticleDOI
TL;DR: Evaluation results reveal that the integration of fuzzy approaches could be effective and as well accurate compared to existing approaches for evaluating software project risks.

Journal ArticleDOI
TL;DR: This study presents a survey of the existing and latest technical work on fake profile detection, most of which use the huge volume of unstructured data generated from social networks for this crime.

Journal ArticleDOI
TL;DR: A new metric inspired by the imaging analysis on underwater absorption and scattering characteristics, dubbed the CCF, which is feature-weighted with a combination of colorfulness index, contrast index and fog density index to quantify the color loss caused by absorption, the blurring caused by forward scattering and the foggy caused by backward scattering.

Journal ArticleDOI
TL;DR: A two-tier virtual machine placement algorithm called crow search based VM placement (CSAVMP) and a queueing structure to manage and schedule a large set of VMs are proposed to reduce the resources wastage and power consumption at the data centers.

Journal ArticleDOI
TL;DR: Experimental results show that EA-CRP has superior performance in term of network lifetime, energy efficiency, and scalability.

Journal ArticleDOI
TL;DR: The results illustrate the suitability of the framework and authoring tool for supporting users without programming skills in developing their own mobile augmented reality learning apps.

Journal ArticleDOI
TL;DR: A quantum inspired binary grey wolf optimizer (QI-BGWO) to solve unit commitment (UC) problem and establishes the significance of proposed approaches among existing binary and quantum computing based heuristic approaches.

Journal ArticleDOI
TL;DR: This study proposes a smartphone-based WBSN, named MoPSS, which collects users’ physiological data with body sensors embedded in a smart shirt, and demonstrates that the presented healthcare system provides a better solution for health management.