scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Computers and Applications in 2021"


Journal ArticleDOI
TL;DR: Improved Fruit Fly Optimization Algorithm (IFFOA) is the proposal for choosing cluster-head, and scheme proposed indicates by results simulated that present analysis conserves power, lengthening the longevity of the network as well as doing choosing proper CH.
Abstract: Efficient data broadcasting to nodes of the target is feasible due to the Internet of Things (IoT) which includes a battery priced at a small value and having a smaller size, along with nodes that ...

48 citations


Journal ArticleDOI
TL;DR: This review paper starts with analyzing the nature of semantic web and its requirements and discusses all domains where semantic web technologies play a vital role and those domains that increase the growth of the semantic web.
Abstract: Semantic web and its technologies have been eyed in many fields. They have the capacity to organize and link data over the web in a consistent and coherent way. Semantic web technologies consist of...

45 citations


Journal ArticleDOI
TL;DR: This review paper discusses various methods and architectures of anomaly detection based on statistical, machine learning and data mining techniques to make various kinds of attacks less vulnerable to cyber-attacks.
Abstract: In an era of the industrial internet of things (IoT), data transferred or saved is always vulnerable to attacks. The IoT networks are needed for implementing security in IoT devices. The IoT networ...

43 citations


Journal ArticleDOI
TL;DR: In this article, hyperparameters optimization using grid search was proposed to optimize the parameters of eight existing models and apply the best parameters to predict the outcomes of HIV tests from test results.
Abstract: In this work, we propose hyperparameters optimization using grid search to optimize the parameters of eight existing models and apply the best parameters to predict the outcomes of HIV tests from t...

36 citations


Journal ArticleDOI
Geeta Singh1, Neelu Khare1
TL;DR: The evolution in the attack scenarios has been such that finding efficient and optimal Network Intrusion Detection Systems (NIDS) with frequent updates has become a big challenge.
Abstract: The evolution in the attack scenarios has been such that finding efficient and optimal Network Intrusion Detection Systems (NIDS) with frequent updates has become a big challenge. NIDS implementati...

28 citations


Journal ArticleDOI
TL;DR: A fast, novel adaptive classification system is presented for the diagnosis of chronic diseases that employs a hybrid approach comprising of PCA and ReliefF method with optimized Support Vector Machine classifier.
Abstract: Chronic diseases represent a major health burden worldwide. Machine learning techniques have been extensively used in the medical field to diagnose chronic diseases. In this research, a fast, novel...

28 citations


Journal ArticleDOI
TL;DR: The proposed metaheuristic algorithm is capable of recognizing the anomalies in the industrial sensor networks with high accuracy and uses the recently proposed optimizers and a neural network for modeling the behavior of the sensor network.
Abstract: Sensor networks are increasingly used in all aspects of the smart city infrastructures. The stream of the data generated by sensor networks contains the information which can be used to model and m...

27 citations


Journal ArticleDOI
TL;DR: By analyzing performance indices and characteristics, cloud enabled multimedia service delivery approach poses advantages, gives promising result and better user experience compare to the conventional adaptive HTTP streaming approach.
Abstract: Web services is software entity allows machine to machine communication, operates as standalone unit and interoperability over network using standard web technologies such as Hypertext transfer pro...

22 citations


Journal ArticleDOI
TL;DR: Video surveillance, within prisons, monitor the emotional status of inmates, as human emotions provide insight into their intended actions and this work attempts to build an automated system that cognizes human emotions in this situation.
Abstract: Video surveillance, within prisons, monitor the emotional status of inmates, as human emotions provide insight into their intended actions. This work attempts to build an automated system that cogn...

21 citations


Journal ArticleDOI
TL;DR: This study focused on separating forests, land, and the vegetation area, including areas under crops and urban development, including regions of localized change in a multitemporal data set enhanced using dimensional reduction and edge sharp techniques on a simple data set.
Abstract: In remote sensing, the land use and land cover (LULC) play a vital role in analyzing Earth information for human development. These objects of change detections are helpful for finding the increase...

20 citations


Journal ArticleDOI
TL;DR: In this paper, CloudMesh CPS architecture is presented as a promising solution to support services like Input-Output data stream, traffic engineering, service function optimization and software defined network monitoring in CPS IPv6 data-center core.
Abstract: Recently, large scale cyber physical systems (LS-CPS) leverage network-cores provided by application providers (APs) to carry out analytics. These CPS-APs uses the automated cloud to gather traffic...

Journal ArticleDOI
TL;DR: A new method for email steganography is proposed which provides a high level of capacity along with a strong security level, and since no surplus information is added to the cover text, it can use any kinds of email bodies as the coverText.
Abstract: Email steganography is one of the subcategories of text steganography This subcategory is noted due to the widespread use of emails for communication In this paper, we propose a new method for em

Journal ArticleDOI
TL;DR: An efficient prediction solution targeted at lossless compression of 8 bits and higher bit depth volumetric medical images up to 16 bits is presented, developing Resolution Independent Gradient Edge Predictor (RIGED) algorithm to support 8- and 16-bit depth medical images.
Abstract: Digital visualization of human body in terms of medical images with high resolution and bit depth generates tremendous amount of data. In the field of medical diagnosis, lossless compression techni...

Journal ArticleDOI
TL;DR: The proposed system is designed to handle the surveillance that detects the vehicles present in the traffic flow that is crucial in today’s scenario.
Abstract: Deployment of adequate surveillance and security measures is crucial in today’s scenario. The proposed system is designed to handle the surveillance that detects the vehicles present in the traffic...

Journal ArticleDOI
TL;DR: Smart Hierarchical Network (SHN) is proposed as a reliable Fog dynamic design structure based on Software Defined Artificial Neural Network (SD-ANN), which features congestion-aware neural switch model with embedded predictive receding horizon for intelligent congestion management.
Abstract: Cloud data centers used for High Performance Computing (HPC) with volatile Internet of Things (IoT) devices absolutely requires zero-speed switching/low latency, normalized throughput, network stab...

Journal ArticleDOI
TL;DR: Experimental results show that machine learning-based approaches perform better than statistical approaches regarding accurate detection of interest flooding attack.
Abstract: Interest flooding attack (IFA) is one of the most severe attacks in named data networking (NDN). Due to IFA, the pending interest table (PIT) of NDN routers get filled with entries of malicious req...

Journal ArticleDOI
TL;DR: Simulation results revealed that the proposed method based on OPTICS density-based clustering algorithm has better performance, compared to similar algorithms such as LEACH, SEP, EEHC, and DBSCAN and could increase network lifetime and the number of packets sent by reducing energy consumption.
Abstract: Todays, using wireless sensor networks including a large number of sensor nodes located in the target environment to monitor physical and environmental activities has widely expanded due to their b...

Journal ArticleDOI
TL;DR: 50 research papers that are based on the land cover classification using satellite images are surveyed and are categorized based on different classification techniques, such as fuzzy, Support Vector Machine (SVM), Neural Network (NN), Bayesian model, Decision Tree (DT) and so on.
Abstract: As the land cover is a basic and important factor, affecting and connecting various parts of the human and physical environment, the classification of land cover plays a major role in the recent re...

Journal ArticleDOI
TL;DR: A weighted matrix based steganographic scheme for highly compressed color image through discrete cosine transform (DCT) to maintain a good balance between payload and imperceptibility and provides good embedding capacity with the high visual quality compared to existing state-of-the-art methods.
Abstract: Due to the rapid growth of internet technology and the advent of various image processing tools, people started using digital media for hidden communication to protect valuable information which is...

Journal ArticleDOI
TL;DR: This research includes a systematical structured review of a wide range of state-of-the-art and recent multi-objective evolutionary algorithms (MOEAs) in terms of their chromosome representation, genetic operators and initial population, which are applied to categorical, quantitative and fuzzy rule mining problems.
Abstract: Searching for patterns in large database is one of the major tasks in data mining. This can be achieved by using association rule mining, which usually tends to find out the relations in an exhaustive manner. In real life, many data mining tasks require optimization between multiple objectives concurrently. Consequently over the years a large number of researches have been conducted on various techniques for efficient association rule mining and among them the field of evolutionary technique is growing rapidly with its large-scale applications and exceptional result. This research includes a systematical structured review of a wide range of state-of-the-art and recent multi-objective evolutionary algorithms (MOEAs) in terms of their chromosome representation, genetic operators and initial population, which are applied to categorical, quantitative and fuzzy rule mining problems. A lucid comparative study on various MOEA-based approaches includes computational complexity and applications within the context of this research. Finally, a guideline toward future studies on MOEA approaches has been presented that incorporates a general discussion of the current state of art literatures, newly rising study area (Interactive MOEA) along with their limitations and numerous possibilities.

Journal ArticleDOI
TL;DR: Intra-day stock market forecasting is one of the challenging tasks as its nature is difficult to predict due to the non-volatility of the stock market.
Abstract: Intra-day stock market forecasting is one of the challenging tasks as its nature is difficult to predict due to the non-volatility of the stock market. Therefore, the building block concepts of mac...

Journal ArticleDOI
TL;DR: The empirical results clarify that top management support, financial revenue, relative Advantage, compatibility, coercive pressure, and mimetic pressure are positive while complexity is negatively influencing the adoption of HIS.
Abstract: Hospital information system (HIS) is an electronic system that aims to provide comprehensive hospital- and patient-related information to authorized people, on one click. The diffusion of HIS is in...

Journal ArticleDOI
TL;DR: In this article, the authors proposed a CBMIR system that includes two phases: feature extraction and feature extraction a.k.a. feature extraction stage for medical image retrieval and analysis.
Abstract: Content-based medical image retrieval (CBMIR) is the emerging research area in the field of medical image retrieval and analysis. The proposed CBMIR system includes two phases: feature extraction a...

Journal ArticleDOI
TL;DR: This work proposes Fast Converging Cuckoo Search Algorithm to obtain optimized filter coefficients to implement lowpass, highpass and bandpass FIR filters and Responses of the implemented filters using the proposed method are compared with the responses obtained by the filters designed using conventional Cuckoos search Algorithm and Parks McClellan algorithm.
Abstract: Elimination of noise from transmitted signals inevitably incorporated during transmission persisted important task for the researchers from the preliminary days of Signal Processing. Among differen...

Journal ArticleDOI
TL;DR: A Comprehensive survey of existing state-of-the-art RFID mutual authentication protocols is presented and is beneficial for new researchers to have a quick overview and understanding of the domain and will serve as an input to devise more effective and efficient algorithms for RFid mutual authentication.
Abstract: Mutual Authentication is the initial and the most significant line of defense in any open and trusted network system. Weaknesses in mutual authentication protocol may lead to eavesdropping, unautho...

Journal ArticleDOI
TL;DR: In this paper, the extraction of background knowledge of news articles, published over the web is a complex task and less explored by knowledge-mining researchers, and there is no source of background o...
Abstract: Automatic extraction of background knowledge of news articles, published over the web is a complex task and less explored by knowledge-mining researchers. Suppose there is no source of background o...

Journal ArticleDOI
TL;DR: This paper presents a low-level approach with a more-efficient comparison; the comparison only takes linear time complexity with the help of Cosine Correlation in Vector Space Model.
Abstract: Low-level approach is a recent way for source code plagiarism detection. Instead of relying on source code tokens, it relies on low-level structural representation resulted from compiling given sou...

Journal ArticleDOI
TL;DR: The main objectives are to implement the real-time video object detection and classification using the hybrid texture feature extraction method called the GLCM-DWT technique, and investigate the performance evaluation of the proposed methodology and compare with the existing technique.
Abstract: In video processing, feature extraction and classification are necessary steps to classify the video frames. To improve accuracy, an efficient texture-based feature extraction is required. Also, be...

Journal ArticleDOI
TL;DR: A combination of genetic algorithm and particle swarm optimization with a chaotic function model is proposed to solve the encryption issue in digital image processing.
Abstract: Image encryption is a very common and attractive issue in digital image processing. Here, a combination of genetic algorithm and particle swarm optimization with a chaotic function model is propose...

Journal ArticleDOI
TL;DR: A knowledge treasure for situation awareness is developed to provide real-time decision support to make recovery from incidents with the help of available resources and compared the results with other existing ontology.
Abstract: In this work, we have developed a knowledge treasure for situation awareness. Background knowledge and information for emergency situations are required to support the decision makers. Our main mot...