Ausgabe 2/2018
Engineering: Computer Engineering and Computer Science
Inhalt (40 Artikel)
Weighting Factor Selection Techniques for Predictive Torque Control of Induction Motor Drives: A Comparison Study
M. Mamdouh, M. A. Abido, Z. Hamouz
A Systematic Review of Agent-Based Test Case Generation for Regression Testing
Pardeep Kumar Arora, Rajesh Bhatia
A Quantum-Inspired Evolutionary Algorithm Using Gaussian Distribution-Based Quantization
Sreenivas Sremath Tirumala
Combinatorial Test Set Prioritization Using Data Flow Techniques
Manuj Aggarwal, Sangeeta Sabharwal
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Prem Kumar Singh
Automated Fiducial Points Detection Using Human Body Segmentation
Fozia Rajbdad, Murtaza Aslam, Shoaib Azmat, Tauseef Ali, Shahid Khattak
Solution to Graph Coloring Using Genetic and Tabu Search Procedures
Raja Marappan, Gopalakrishnan Sethumadhavan
Accurate Human Recognition by Score-Level and Feature-Level Fusion Using Palm–Phalanges Print
Gopal, Smriti Srivastava
Subsampling-Based Blind Image Forgery Detection Using Support Vector Machine and Artificial Neural Network Classifiers
Gajanan K. Birajdar, Vijay H. Mankar
Scheduling Heterogeneous Systems Using Relative Latencies
Minhaj Ahmad Khan
A Low-Power Codeword-Based Viterbi Decoder with Fine-Grained Error Detection and Correction Techniques
Shiann-Rong Kuang, Chih-Yuan Liang, I-Ping Tseng
Human Action Recognition Utilizing Variations in Skeleton Dimensions
Mona M. Moussa, Elsayed E. Hemayed, Heba A. El Nemr, Magda B. Fayek
Feature-Learning Shrinkage Prediction for Spatial Error Concealment
Hao Liu, Bing Wang, Kangda Li
Robust Visual Tracking via Incremental Subspace Learning and Local Sparse Representation
Guoliang Yang, Zhengwei Hu, Jun Tang
Using the Modified Diffie–Hellman Problem to Enhance Client Computational Performance in a Three-Party Authenticated Key Agreement
Hung-Yu Chien
Cloud Computing: A Multi-workflow Scheduling Algorithm with Dynamic Reusability
Mainak Adhikari, Santanu Koley
An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem
Preeti Chandrakar, Hari Om
Theoretical and Empirical Validation of Coupling Metrics for Object-Oriented Data Warehouse Design
Gargi Aggarwal, Sangeeta Sabharwal, Sushama Nagpal
Extension of TOPSIS Method and its Application in Investment
Yubo Huang, Wen Jiang
Resource Management Framework for Multi-tier Service Using Case-Based Reasoning and Optimization Algorithm
Mohamed Ghetas, Chan Huah Yong
Interval-Valued Neutrosophic Graph Representation of Concept Lattice and Its ()-Decomposition
Prem Kumar Singh
FFT Consolidated Sparse and Collaborative Representation for Image Classification
Chunwei Tian, Qi Zhang, Guanglu Sun, Zhichao Song, Siyan Li
A Computerized Reversible Arabic Transliteration System
Yasser Alginahi, Abdullah Mohammad Al Binali, Mohammed Dekkak, Abdulkarim Kushk
Mixed Integer Programming Formulations for Two-Machine Flow Shop Scheduling with an Availability Constraint
Zhijun Xu, Dehua Xu, Jie He, Qi Wang, Aihua Liu, Junfang Xiao
Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures
Shatha J. Alghamdi, Lamiaa A. Elrefaei
An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
Azeem Irshad, Shehzad Ashraf Chaudhry, Qi Xie, Xiong Li, Mohammad Sabzinejad Farash, Saru Kumari, Fan Wu
Task Deadline-Aware Energy-Efficient Scheduling Model for a Virtualized Cloud
Neha Garg, Major Singh Goraya
NLP-MTFLR: Document-Level Prioritization and Identification of Dominant Multi-word Named Products in Customer Reviews
R. Sivashankari, B. Valarmathi
RIFT: A Rule Induction Framework for Twitter Sentiment Analysis
Muhammad Zubair Asghar, Aurangzeb Khan, Furqan Khan, Fazal Masud Kundi
An Approach Toward Amelioration of a New Cloudlet Allocation Strategy Using Cloudsim
Sourav Banerjee, Aritra Roy, Amritap Chowdhury, Ranit Mutsuddy, Riman Mandal, Utpal Biswas
A Fast Parallel Modular Exponentiation Algorithm
Khaled A. Fathy, Hazem M. Bahig, A. A. Ragab
Task Partitioning Scheduling Algorithms for Heterogeneous Multi-Cloud Environment
Sanjaya Kumar Panda, Sohan Kumar Pande, Satyabrata Das
Interest-Based Clustering Approach for Social Networks
Lulwah AlSuwaidan, Mourad Ykhlef
A Feature Selection Approach to Detect Spam in the Facebook Social Network
Mohammad Karim Sohrabi, Firoozeh Karimi
Distributed Denial-of-Service Attack Detection and Mitigation Using Feature Selection and Intensive Care Request Processing Unit
Nitesh Bharot, Priyanka Verma, Sangeeta Sharma, Veenadhari Suraparaju
Proportionate Flow Shop Scheduling with Multi-agents to Maximize Total Gains of JIT Jobs
Shi-Sheng Li, Ren-Xia Chen, Wen-Jie Li
Robust Reversible Watermarking Algorithm Based on RIWT and Compressed Sensing
Zhengwei Zhang, Lifa Wu, Shangbing Gao, He Sun, Yunyang Yan
Hybrid Hierarchical Backtracking Search Optimization Algorithm and Its Application
Feng Zou, Debao Chen, Renquan Lu
Embedding Advanced Harmony Search in Ordinal Optimization to Maximize Throughput Rate of Flow Line
Shih-Cheng Horng, Shieh-Shing Lin
An Improved Localization Scheme Based on PMCL Method for Large-Scale Mobile Wireless Aquaculture Sensor Networks
Chunfeng Lv, Jianping Zhu, Zhengsu Tao