Showing papers in "Computers & Electrical Engineering in 2017"
••
TL;DR: Experimental results show that the proposed SCH-SpecPSO outperforms 75% more than state of art mobile social networks by optimizing various handover issues.
308 citations
••
TL;DR: This paper presents two machine learning aided approaches for static analysis of Android malware based on permissions and the other is based on source code analysis utilizing a bag-of-words representation model.
272 citations
••
TL;DR: A scalable three-tier architecture to store and process such huge volume of wearable sensor data in cloud computing is proposed and ROC analysis is performed to identify the most significant clinical parameters to get heart disease.
199 citations
••
TL;DR: A provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks and the simulation through the widely-known Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that the scheme is also secure.
171 citations
••
TL;DR: A strategy for Software Defined Wireless Sensor Network (SDWSN) is proposed as an effort for application improvement in monitored environments and application challenges faced by WSNs for monitored environments are highlighted.
161 citations
••
TL;DR: The comparative study shows that deep learning techniques can be built by introducing a number of methods in combination with supervised and unsupervised training techniques, and indicates that high involvement of humans to design sophisticated and optimized algorithms based on machine and deeplearning techniques is high.
157 citations
••
TL;DR: The use of knowledge discovery techniques to analyse historical student course grade data in order to predict whether or not a student will drop out of a course is proposed and a tutoring action plan is designed.
153 citations
••
TL;DR: Three new time- domain features are proposed to improve the performance of EMG-PR based strategy in arm movement classification and could achieved an average classification accuracy of 92.00% ± 3.11% which was 6.49% higher than that of the commonly used time-domain features.
145 citations
••
TL;DR: A novel Software-Defined Networking (SDN) based detection approach that utilizes the characteristics of the ransomware communication is presented, concluding that an analysis of the HTTP message sequences and their respective content sizes is enough to detect such threats.
140 citations
••
TL;DR: Experimental results show that the proposed scheme can cluster the inter-block embedding changes and perform better than the state-of-the-art steganographic method.
133 citations
••
TL;DR: The paper proves the SLI by the real and experimental results for the statement “any robotics randomized environment transforms into the array” and presents the new variant of genetic algorithm using the binary codes through matrix for mobile robot navigation (MRN) in static and dynamic environment.
••
TL;DR: Comprehensive security analysis is conducted to show that the proposed protocol fixes these flaws of Amin et al.
••
TL;DR: This work demonstrates the suitability of online support vector regression (SVR) method to short term power load forecasting and thoroughly explore its pros and cons, and presents a comparison of ten state-of-the-art forecasting methods in terms of accuracy on public Irish CER dataset.
••
TL;DR: A dynamic annexed balance method is used to solve the problem of cloud load balancing that takes into consideration both server processing power and computer loading, thus making it less likely that a server will be unable to handle excessive computational requirements.
••
TL;DR: A scalable data processing framework with a novel change detection algorithm that is compared with various existing approaches such as pruned exact linear time method, binary segmentation method, and segment neighborhood method to monitor the changes in the seasonal climate.
••
TL;DR: A comprehensive analysis of the main threats that hamper cloud computing adoption on a wide scale, and a right to the point review of the solutions that are currently being provided by the major vendors are provided.
••
TL;DR: This work aims at developing a real time remote health status prediction system built around open source Big Data processing engine, the Apache Spark, deployed in the cloud which focus on applying machine learning model on streaming Big Data.
••
TL;DR: A distributed self-healing approach for both node and cluster head levels for wireless Sensor Networks, where, at node level, battery, sensor and receiver faults can be diagnosed while, at cluster head level, transmitter and mal-functional nodes can be detected and recovered.
••
TL;DR: It is shown that the proposed Controller for automatic voltage regulator (AVR) provides the better time response characteristics than the other existing techniques.
••
TL;DR: A user authentication scheme and data transmission mechanism that facilitates security and privacy protection, enable medical personnel to instantly monitor the health conditions of care receivers, and provide care receivers with prompt and comprehensive medical care is proposed.
••
TL;DR: A new multiple-image encryption algorithm based on the mixed image element and piecewise linear chaotic maps (PWLCM) is presented, which is very efficient and secure.
••
TL;DR: The main components of a surveillance system are presented and studied thoroughly, and the most important deep learning algorithms are presented, along with the smart analytics that they utilize.
••
TL;DR: Evaluation results reveal that the integration of fuzzy approaches could be effective and as well accurate compared to existing approaches for evaluating software project risks.
••
TL;DR: This study presents a survey of the existing and latest technical work on fake profile detection, most of which use the huge volume of unstructured data generated from social networks for this crime.
••
TL;DR: A new metric inspired by the imaging analysis on underwater absorption and scattering characteristics, dubbed the CCF, which is feature-weighted with a combination of colorfulness index, contrast index and fog density index to quantify the color loss caused by absorption, the blurring caused by forward scattering and the foggy caused by backward scattering.
••
TL;DR: A two-tier virtual machine placement algorithm called crow search based VM placement (CSAVMP) and a queueing structure to manage and schedule a large set of VMs are proposed to reduce the resources wastage and power consumption at the data centers.
••
TL;DR: Experimental results show that EA-CRP has superior performance in term of network lifetime, energy efficiency, and scalability.
••
TL;DR: The results illustrate the suitability of the framework and authoring tool for supporting users without programming skills in developing their own mobile augmented reality learning apps.
••
TL;DR: A quantum inspired binary grey wolf optimizer (QI-BGWO) to solve unit commitment (UC) problem and establishes the significance of proposed approaches among existing binary and quantum computing based heuristic approaches.
••
TL;DR: This study proposes a smartphone-based WBSN, named MoPSS, which collects users’ physiological data with body sensors embedded in a smart shirt, and demonstrates that the presented healthcare system provides a better solution for health management.