当前期刊: The Computer Journal Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Lemuria: A Novel Future Crop Prediction Algorithm Using Data Mining
    Comput. J. (IF 1.077) Pub Date : 2020-07-30
    M Tamil Selvi; B Jaison

    Agriculture exhibitions an important role in the progression and enlargement of the economy of any country. Prediction of crop yield will be useful for farmers, but it is difficult to predict crop yield because of the climatic factors such as rainfall, soil factors and so on. To tackle these issues, we are implementing a novel algorithm called Lemuria by applying data mining in agriculture especially

    更新日期:2020-07-30
  • On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement
    Comput. J. (IF 1.077) Pub Date : 2020-07-25
    Haishan Chen; Junying Yuan; Wien Hong; Jiangqun Ni; Tung-Shou Chen

    Reversible data hiding (RDH) with contrast enhancement (RDH-CE) is a special type of RDH in improving the subjective visual perception by enhancing the image contrast during the process of data embedding. In RDH-CE, data hiding is achieved via pairwise histogram expansion, and the embedding rate can be increased by performing multiple cycles of histogram expansions. However, when embedding rate gets

    更新日期:2020-07-25
  • Effective Link Prediction with Topological and Temporal Information using Wavelet Neural Network Embedding
    Comput. J. (IF 1.077) Pub Date : 2020-07-23
    Xian Mo; Jun Pang; Zhiming Liu

    Temporal networks are networks that edges evolve over time, hence link prediction in temporal networks aims at inferring new edges based on a sequence of network snapshots. In this paper, we propose a graph wavelet neural network (TT-GWNN) framework using topological and temporal features for link prediction in temporal networks. To capture topological and temporal features, we develope a second-order

    更新日期:2020-07-25
  • On Enabling Attribute-Based Encryption to Be Traceable Against Traitors
    Comput. J. (IF 1.077) Pub Date : 2020-07-23
    Zhen Liu; Qiong Huang; Duncan S Wong

    Attribute-based encryption (ABE) is a versatile one-to-many encryption primitive, which enables fine-grained access control over encrypted data. Due to its promising applications in practice, ABE schemes with high efficiency, security and expressivity have been continuously emerging. On the other hand, due to the nature of ABE, a malicious user may abuse its decryption privilege. Therefore, being able

    更新日期:2020-07-23
  • SkySlide: A Hybrid Method for Landslide Susceptibility Assessment based on Landslide-Occurring Data Only
    Comput. J. (IF 1.077) Pub Date : 2020-07-21
    Alev Mutlu; Furkan Goz

    Landslide susceptibility assessment is the problem of determining the likelihood of a landslide occurrence in a particular area with respect to the geographical and morphological properties of the area. This paper presents a hybrid method, namely SkySlide, that incorporates clustering, skyline operator, classification and majority voting principle for region-scale landslide susceptibility assessment

    更新日期:2020-07-22
  • Algorithms Based on Path Contraction Carrying Weights for Enumerating Subtrees of Tricyclic Graphs
    Comput. J. (IF 1.077) Pub Date : 2020-07-17
    Yu Yang; Beifang Chen; Guoping Zhang; Yongming Li; Daoqiang Sun; Hongbo Liu

    The subtree number index of a graph, defined as the number of subtrees, attracts much attention recently. Finding a proper algorithm to compute this index is an important but difficult problem for a general graph. Even for unicyclic and bicyclic graphs, it is not completely trivial, though it can be figured out by try and error. However, it is complicated for tricyclic graphs. This paper proposes path

    更新日期:2020-07-22
  • Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model
    Comput. J. (IF 1.077) Pub Date : 2020-07-17
    Cong Li; Qingni Shen; Zhikang Xie; Xinyu Feng; Yuejian Fang; Zhonghai Wu

    Attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message equality comparison without decrypting the ciphertexts. Recently, there have been several literatures about ABEET proposed. Nevertheless, most of them explore the ABEET schemes in the random oracle model, which has been pointed out to have many defects

    更新日期:2020-07-17
  • Reliability Analysis of Alternating Group Graphs and Split-Stars
    Comput. J. (IF 1.077) Pub Date : 2020-07-16
    Mei-Mei Gu; Rong-Xia Hao; Jou-Ming Chang

    Given a connected graph |$G$| and a positive integer |$\ell $|⁠, the |$\ell $|-extra (resp. |$\ell $|-component) edge connectivity of |$G$|⁠, denoted by |$\lambda ^{(\ell )}(G)$| (resp. |$\lambda _{\ell }(G)$|⁠), is the minimum number of edges whose removal from |$G$| results in a disconnected graph so that every component has more than |$\ell $| vertices (resp. so that it contains at least |$\ell

    更新日期:2020-07-17
  • Persistence of Hybrid Diagnosability of Regular Networks Under Testing Diagnostic Model
    Comput. J. (IF 1.077) Pub Date : 2020-07-16
    Guanqin Lian; Shuming Zhou; Eddie Cheng; Jiafei Liu; Gaolin Chen

    Diagnosability is an important metric to fault tolerance and reliability for multiprocessor systems. However, plenty of research on fault diagnosability focuses on node failure. In practical scenario, not only node failures take place but also link malfunctions may arise. In this work, we investigate the diagnosability of general regular networks with failing nodes as well as missing malfunctional

    更新日期:2020-07-16
  • Interference and Coverage Modeling for Indoor Terahertz Communications with Beamforming Antennas
    Comput. J. (IF 1.077) Pub Date : 2020-07-16
    Chao-Chao Wang; Wan-Liang Wang; Xin-Wei Yao

    A general framework to investigate the interference and coverage probability is proposed in this paper for indoor terahertz (THz) communications with beamforming antennas. Due to the multipath effects of THz band (0.1–10 THz), the line of sight and non-line of sight interference from users and access points (APs) (both equipped with beamforming antennas) are separately analyzed based on distance-dependent

    更新日期:2020-07-16
  • EmailDetective: An Email Authorship Identification And Verification Model
    Comput. J. (IF 1.077) Pub Date : 2020-07-13
    Yong Fang; Yue Yang; Cheng Huang

    Emails are often used to illegal cybercrime today, so it is important to verify the identity of the email author. This paper proposes a general model for solving the problem of anonymous email author attribution, which can be used in email authorship identification and email authorship verification. The first situation is to find the author of an anonymous email among the many suspected targets. Another

    更新日期:2020-07-16
  • On the Behaviour of p -Adic Scaled Space Filling Curve Indices for High-Dimensional Data
    Comput. J. (IF 1.077) Pub Date : 2020-07-13
    Patrick Erik Bradley; Markus Wilhelm Jahn

    Space filling curves are widely used in computer science. In particular, Hilbert curves and their generalizations to higher dimension are used as an indexing method because of their nice locality properties. This article generalizes this concept to the systematic construction of |$p$|-adic versions of Hilbert curves based on special affine transformations of the |$p$|-adic Gray code and develops a

    更新日期:2020-07-13
  • MeSH-Based Semantic Indexing Approach to Enhance Biomedical Information Retrieval
    Comput. J. (IF 1.077) Pub Date : 2020-07-09
    Hager Kammoun; Imen Gabsi; Ikram Amous

    Owing to the tremendous size of electronic biomedical documents, users encounter difficulties in seeking useful biomedical information. An efficient and smart access to the relevant biomedical information has become a fundamental need. In this research paper, we set forward a novel biomedical MeSH-based semantic indexing approach to enhance biomedical information retrieval. The proposed semantic indexing

    更新日期:2020-07-13
  • Non-Malleable Zero-Knowledge Arguments with Lower Round Complexity
    Comput. J. (IF 1.077) Pub Date : 2020-07-09
    Zhenbin Yan; Yi Deng

    Round complexity is one of the fundamental problems in zero-knowledge (ZK) proof systems. Non-malleable zero-knowledge (NMZK) protocols are ZK protocols that provide security even when man-in-the-middle adversaries interact with a prover and a verifier simultaneously. It is known that the first constant-round public-coin NMZK arguments for NP can be constructed by assuming the existence of collision-resistant

    更新日期:2020-07-09
  • Incorporating Biterm Correlation Knowledge into Topic Modeling for Short Texts
    Comput. J. (IF 1.077) Pub Date : 2020-07-08
    Kai Zhang; Yuan Zhou; Zheng Chen; Yufei Liu; Zhuo Tang; Li Yin; Jihong Chen

    The prevalence of short texts on the Web has made mining the latent topic structures of short texts a critical and fundamental task for many applications. However, due to the lack of word co-occurrence information induced by the content sparsity of short texts, it is challenging for traditional topic models like latent Dirichlet allocation (LDA) to extract coherent topic structures on short texts.

    更新日期:2020-07-09
  • An Approach for the Evaluation and Correction of Manually Designed Video Game Levels Using Deep Neural Networks
    Comput. J. (IF 1.077) Pub Date : 2020-07-08
    Omid Davoodi; Mehrdad Ashtiani; Morteza Rajabi

    In the current state of the video game productions, most of the video game levels are created by the human operators working as level designers. This manual process is not only time-consuming and resource-intensive but also hard to guarantee uniform quality in the contents created by the level designers. One way to address this issue is to use computer-assisted level design techniques. In this paper

    更新日期:2020-07-08
  • LUISA: Decoupling the Frequency Model From the Context Model in Prediction-Based Compression
    Comput. J. (IF 1.077) Pub Date : 2020-07-07
    Vinicius Fulber-Garcia; Sérgio Luis Sardi Mergen

    Prediction-based compression methods, like prediction by partial matching, achieve a remarkable compression ratio, especially for texts written in natural language. However, they are not efficient in terms of speed. Part of the problem concerns the usage of dynamic entropy encoding, which is considerably slower than the static alternatives. In this paper, we propose a prediction-based compression method

    更新日期:2020-07-08
  • Optimal Slack Stealing Servicing for Real-Time Energy Harvesting Systems
    Comput. J. (IF 1.077) Pub Date : 2020-07-07
    Rola El Osta; Maryline Chetto; Hussein El Ghor

    We consider the problem of real-time scheduling in uniprocessor devices powered by energy harvesters. In particular, we focus on mixed sets of tasks with time and energy constraints: hard deadline periodic tasks and soft aperiodic tasks without deadlines. We present an optimal aperiodic servicing algorithm that minimizes the response times of aperiodic tasks without compromising the schedulability

    更新日期:2020-07-08
  • Two-Factor Decryption: A Better Way to Protect Data Security and Privacy
    Comput. J. (IF 1.077) Pub Date : 2020-07-07
    Hui Cui; Russell Paulet; Surya Nepal; Xun Yi; Butrus Mbimbi

    Biometric information is unique to a human, so it would be desirable to use the biometric characteristic as the private key in a cryptographic system to protect data security and privacy. In this paper, we introduce a notion called two-factor decryption (TFD). Informally speaking, a TFD scheme is a variant of the public-key encryption (PKE) scheme. In a TFD scheme, messages are encrypted under public

    更新日期:2020-07-07
  • Fast Learning Through Deep Multi-Net CNN Model For Violence Recognition In Video Surveillance
    Comput. J. (IF 1.077) Pub Date : 2020-07-06
    Aqib Mumtaz; Allah Bux Sargano; Zulfiqar Habib

    The violence detection is mostly achieved through handcrafted feature descriptors, while some researchers have also employed deep learning-based representation models for violent activity recognition. Deep learning-based models have achieved encouraging results for fight activity recognition on benchmark data sets such as hockey and movies. However, these models have limitations in learning discriminating

    更新日期:2020-07-06
  • Corrigendum to: Congestion Free Transient Plane(CFTP) using bandwidth sharing during link failures in SDN
    Comput. J. (IF 1.077) Pub Date : 2020-07-03
    Muthumanikandan Vanamoorthy; Valliyammai Chinnaiah

    AbstractWith energy consumption in high-performance computing clouds growing rapidly, energy saving has become an important topic. Virtualization provides opportunities to save energy by enabling one physical machine (PM) to host multiple virtual machines (VMs). Dynamic voltage and frequency scaling (DVFS) is another technology to reduce energy consumption. However, in heterogeneous cloud environments

    更新日期:2020-07-03
  • The Notion of Transparency Order, Revisited
    Comput. J. (IF 1.077) Pub Date : 2020-07-03
    Huizhong Li; Yongbin Zhou; Jingdian Ming; Guang Yang; Chengbin Jin

    We revisit the definition of transparency order (TO) and that of modified transparency order (MTO) as well, which were proposed to measure the resistance of substitution boxes (S-boxes) against differential power analysis (DPA). We spot a definitional flaw in original TO, which is proved to significantly affect the soundness of TO. Regretfully, MTO overlooks this flaw, yet it happens to incur no bad

    更新日期:2020-07-03
  • Enabling Smart City With Intelligent Congestion Control Using Hops With a Hybrid Computational Approach
    Comput. J. (IF 1.077) Pub Date : 2020-07-03
    Sagheer Abbas; Muhammad Adnan Khan; Atifa Athar; Syed Ali Shan; Anwar Saeed; Tahir Alyas

    In a smart city, the subject of the congestion-free traffic has been leading objectives from the past decade, and many approaches are adopted to make congestion-free roads. These approaches and signals at one junction are not inter-linked with the signal at the previous one. Therefore, the traffic flow on the same road and at associative roads is not smooth. The study proposed a model with a hybrid

    更新日期:2020-07-03
  • Destination Image Recognition And Emotion Analysis: Evidence From User-Generated Content Of Online Travel Communities
    Comput. J. (IF 1.077) Pub Date : 2020-07-03
    Weidong Huang; Shuting Zhu; Xinkai Yao

    The tourism destination image is an intangible value that enhances the internal and external spiritual value of the region. To improve tourist experiences and provide reference for relevant departments, we applied the GooSeeker web data crawler tool and Python data mining kit to crawl and analyze the representative online tourism community data. We conduct an empirical analysis through data from the

    更新日期:2020-07-03
  • Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies
    Comput. J. (IF 1.077) Pub Date : 2020-07-01
    Lili Jiang; Xiaolin Chang; Runkai Yang; Jelena Mišić; Vojislav B Mišić

    The rapid and widespread adoption of internet of things-related services advances the development of the cloud-edge framework, including multiple cloud datacenters (CDCs) and edge micro-datacenters (EDCs). This paper aims to apply analytical modeling techniques to assess the effectiveness of cloud-edge computing resource allocation policies from the perspective of improving the performance of cloud-edge

    更新日期:2020-07-03
  • QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives
    Comput. J. (IF 1.077) Pub Date : 2020-07-01
    Bechir Alaya; Rehanullah Khan

    The amount of online video content is exponentially increasing, which spurs its access demands. Providing optimal quality of service (QoS) for this ever-increasing video data is a challenging task due to the number of QoS constraints. The system resources, the distributed system platform and the transport protocol thus all need to collaborate to guarantee an acceptable level of QoS for the optimal

    更新日期:2020-07-01
  • Encoder–Decoder Couplet Generation Model Based on ‘Trapezoidal Context’ Character Vector
    Comput. J. (IF 1.077) Pub Date : 2020-06-24
    Rui Gao; Yuanyuan Zhu; Mingye Li; Shoufeng Li; Xiaohu Shi

    This paper studies the couplet generation model which automatically generates the second line of a couplet by giving the first line. Unlike other sequence generation problems, couplet generation not only considers the sequential context within a sentence line but also emphasizes the relationships between the corresponding words of first and second lines. Therefore, a trapezoidal context character embedding

    更新日期:2020-06-24
  • CutTheTail: An Accurate and Space-Efficient Heuristic Algorithm for Influence Maximization
    Comput. J. (IF 1.077) Pub Date : 2020-06-23
    Diana Popova; Ken-ichi Kawarabayashi; Alex Thomo

    Algorithmic problem of computing the most influential nodes in an arbitrary graph (influence maximization) is an important theoretical and practical problem and has been extensively studied for decades. For massive graphs (e.g. modelling huge social networks), randomized algorithms are the answer as the exact computation is prohibitively complex, both for runtime and space. This paper concentrates

    更新日期:2020-06-24
  • Local Pollination-Based Moth Search Algorithm for Task-Scheduling Heterogeneous Cloud Environment
    Comput. J. (IF 1.077) Pub Date : 2020-06-23
    M Gokuldhev; G Singaravel

    Nowadays, Cloud computing is a new computing model in the field of information technology and research. Generally, the cloud environment aims in providing the resource that depends upon the user’s necessity. The major problem caused by cloud computing is task scheduling. Nevertheless, the previous scheduling methods concentrate only on the resource needs, memory, implementation time and cost. In this

    更新日期:2020-06-24
  • Artificial Bee Colony–Based Feature Selection Algorithm for Cyberbullying
    Comput. J. (IF 1.077) Pub Date : 2020-06-23
    Esra Sarac Essiz; Murat Oturakci

    As a nature-inspired algorithm, artificial bee colony (ABC) is an optimization algorithm that is inspired by the search behaviour of honey bees. The main aim of this study is to examine the effects of the ABC-based feature selection algorithm on classification performance for cyberbullying, which has become a significant worldwide social issue in recent years. With this purpose, the classification

    更新日期:2020-06-24
  • Palmprint for Individual’s Personality Behavior Analysis
    Comput. J. (IF 1.077) Pub Date : 2020-06-23
    Shitala Prasad; Tingting Chai

    Palmprint is an important key player in biometric family and also informs some extra basic personality details of an individual. In this paper, we utilize these extra information and designed an automated mobile vision (MV) system to extract principal lines from human palm and analyze them for behavioral significances. Hence, the main concern of this paper is to come up with a simple yet powerful low-level

    更新日期:2020-06-23
  • Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
    Comput. J. (IF 1.077) Pub Date : 2020-06-22
    Ya Liu; Bing Shi; Dawu Gu; Fengyu Zhao; Wei Li; Zhiqiang Liu

    In ASIACRYPT 2014, Jean et al. proposed the authentication encryption scheme Deoxys, which is one of the third-round candidates in CAESAR competition. Its internal block cipher is called Deoxys-BC that adopts the tweakey frame. Deoxys-BC has two versions of the tweakey size that are 256 bits and 384 bits, denoted by Deoxys-BC-256 and Deoxys-BC-384, respectively. In this paper, we revaluate the security

    更新日期:2020-06-23
  • Balancing Power And Performance In HPC Clouds
    Comput. J. (IF 1.077) Pub Date : 2020-06-03
    Lixia Chen; Jian Li; Ruhui Ma; Haibing Guan; Hans-Arno Jacobsen

    With energy consumption in high-performance computing clouds growing rapidly, energy saving has become an important topic. Virtualization provides opportunities to save energy by enabling one physical machine (PM) to host multiple virtual machines (VMs). Dynamic voltage and frequency scaling (DVFS) is another technology to reduce energy consumption. However, in heterogeneous cloud environments where

    更新日期:2020-06-23
  • A Novel CMA+DD_LMS Blind Equalization Algorithm for Underwater Acoustic Communication
    Comput. J. (IF 1.077) Pub Date : 2020-04-20
    Jianqiu Sun; Xingguang Li; Kang Chen; Wei Cui; Ming Chu

    The performance of underwater acoustic communication system is affected seriously by inter-symbol interference caused by multipath effects. Therefore, a novel blind equalization algorithm based on constant modulus algorithm (CMA) and decision-directed least mean square (DD_LMS) is adopted to improve the equalization ability of the system. Firstly, the LMS algorithm is improved by introducing inverse

    更新日期:2020-06-23
  • Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World
    Comput. J. (IF 1.077) Pub Date : 2020-06-17
    Talha Mahboob Alam; Kamran Shaukat; Mubbashar Mushtaq; Yasir Ali; Matloob Khushi; Suhuai Luo; Abdul Wahab

    The area of corporate bankruptcy prediction attains high economic importance, as it affects many stakeholders. The prediction of corporate bankruptcy has been extensively studied in economics, accounting and decision sciences over the past two decades. The corporate bankruptcy prediction has been a matter of talk among academic literature and professional researchers throughout the world. Different

    更新日期:2020-06-17
  • Reliability of DQcube Based on g-Extra Conditional Fault
    Comput. J. (IF 1.077) Pub Date : 2020-06-15
    Hong Zhang; Jixiang Meng

    Diagnosability and connectivity are important metrics for the reliability and fault diagnosis capability of interconnection networks, respectively. The g-extra connectivity of a graph G, denoted by |$\kappa _g(G)$|⁠, is the minimum number of vertices whose deletion will disconnect the network and every remaining component has more than |$g$| vertices. The g-extra conditional diagnosability of graph

    更新日期:2020-06-15
  • Performance Improvement Of Pre-trained Convolutional Neural Networks For Action Recognition
    Comput. J. (IF 1.077) Pub Date : 2020-06-15
    Tayyip Ozcan; Alper Basturk

    Action recognition is a challenging task. Deep learning models have been investigated to solve this problem. Setting up a new neural network model is a crucial and time-consuming process. Alternatively, pre-trained convolutional neural network (CNN) models offer rapid modeling. The selection of the hyperparameters of CNNs is a challenging issue that heavily depends on user experience. The parameters

    更新日期:2020-06-15
  • New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT
    Comput. J. (IF 1.077) Pub Date : 2020-06-15
    AmirHossein Ebrahimi Moghaddam; Zahra Ahmadian

    In this paper, using Mixed-Integer Linear Programming, a new automatic search tool for truncated differential characteristic is presented. Our method models the problem of finding a maximal probability truncated differential characteristic, being able to distinguish the cipher from a pseudo-random permutation. Using this method, we analyze Midori64, SKINNY64/X and CRAFT block ciphers, for all of which

    更新日期:2020-06-15
  • A Novel Hybrid UE Selection Scheme for Efficient Data Offloading Using D2D Communication
    Comput. J. (IF 1.077) Pub Date : 2020-06-12
    Balaji C G; Anu Monisha A; Murugan K

    The exponential growth in mobile broadband data traffic with demand for faster data connectivity has become the most engaging challenges for mobile operators. They are facing an enormous data load in the core network and are finding new solutions to offload data to other complementary technologies. Mobile data offloading using device-to-device (D2D) communication stands out as the promising and the

    更新日期:2020-06-12
  • Rider-Rank Algorithm-Based Feature Extraction for Re-ranking the Webpages in the Search Engine
    Comput. J. (IF 1.077) Pub Date : 2020-06-12
    Lata Jaywant Sankpal; Suhas H Patil

    The webpage re-ranking is a challenging task while retrieving the webpages based on the query of the user. Even though the webpages in the search engines are ordered depends on the importance of the content, retrieving the necessary documents based on the input query is quite difficult. Hence, it is required to re-rank the webpages available in the websites based on the features of the pages in the

    更新日期:2020-06-12
  • A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search
    Comput. J. (IF 1.077) Pub Date : 2020-06-10
    Sha Ma; Qiong Huang

    In the era of cloud computing, public key encryption with keyword search (PEKS) is an extremely useful cryptographic tool for searching on encryption data, whose strongest security notion is indistinguishability encryption against chosen ciphertext attack (ind-cca). Adballa et al. presented a transformation from identity based encryption (IBE) to PEKS in the Theory of Cryptography Conference 2010.

    更新日期:2020-06-10
  • Reusable Fuzzy Extractor Based on the LPN Assumption
    Comput. J. (IF 1.077) Pub Date : 2020-06-08
    Yiming Li; Shengli Liu; Dawu Gu; Kefei Chen

    A fuzzy extractor derives uniformly random strings from noisy sources that are neither reliably reproducible nor uniformly random. The basic definition of fuzzy extractor was first formally introduced by Dodis et al. and has achieved various applications in cryptographic systems. However, it has been proved that a fuzzy extractor could become totally insecure when the same noisy random source is extracted

    更新日期:2020-06-08
  • Enhanced Interactive Performance of Zoom-In/Out Gestures Using Electrostatic Tactile Feedback on Touchscreens
    Comput. J. (IF 1.077) Pub Date : 2020-06-08
    Qinglong Wang; Xiaoying Sun; Dekun Cao; Guohong Liu

    Tactile feedback added to touchscreens provides users with a high-quality interactive experience. The effect of tactile feedback on typical interaction gestures requires to be evaluated. With a custom-designed electrostatic tactile feedback device, we explore the effects of tactile feedback on zoom-in/out gestures and determine the issues satisfied by the relationship between completion time (CT) and

    更新日期:2020-06-08
  • Dynamic QoS-Aware Cloud Service Selection Using Best-Worst Method and Timeslot Weighted Satisfaction Scores
    Comput. J. (IF 1.077) Pub Date : 2020-06-04
    Falak Nawaz; Naeem Khalid Janjua

    The number of cloud services has dramatically increased over the past few years. Consequently, finding a service with the most suitable quality of service (QoS) criteria matching the user’s requirements is becoming a challenging task. Although various decision-making methods have been proposed to help users to find their required cloud services, some uncertainties such as dynamic QoS variations hamper

    更新日期:2020-06-04
  • Public-Key Encryption In The Standard Model Against Strong Leakage Adversary
    Comput. J. (IF 1.077) Pub Date : 2020-06-03
    Janaka Alawatugoda

    Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact

    更新日期:2020-06-03
  • Minimum Status, Matching and Domination of Graphs
    Comput. J. (IF 1.077) Pub Date : 2020-06-02
    Caixia Liang; Bo Zhou; Haiyan Guo

    Given a graph, the status of a vertex is the sum of the distances between the vertex and all other vertices. The minimum status of a graph is the minimum of statuses of all vertices of this graph. We give a sharp upper bound for the minimum status of a connected graph with fixed order and matching number (domination number, respectively) and characterize the unique trees achieving the bound. We also

    更新日期:2020-06-02
  • Sclera Recognition Based on Efficient Sclera Segmentation and Significant Vessel Matching
    Comput. J. (IF 1.077) Pub Date : 2020-05-30
    Dong Xu; Wei Dong; Han Zhou

    The visible blood vein in sclera has unique characteristics for each person, and it can be captured in visible light conditions. Therefore, the sclera vessels have been used as an important feature to improve the performance of identification recognition systems, for example, mobile payment and phone encryption system. But recent studies show that unsatisfactory sclera segmentation and tedious matching

    更新日期:2020-05-30
  • Intra-Tile Parallelization for Two-Level Perfectly Nested Loops With Non-Uniform Dependences
    Comput. J. (IF 1.077) Pub Date : 2020-05-28
    Zahra Abdi Reyhan; Shahriar Lotfi; Ayaz Isazadeh; Jaber Karimpour

    Most important scientific and engineering applications have complex computations or large data. In all these applications, a huge amount of time is consumed by nested loops. Therefore, loops are the main source of the parallelization of scientific and engineering programs. Many parallelizing compilers focus on parallelization of nested loops with uniform dependences, and parallelization of nested loops

    更新日期:2020-05-28
  • Review-Based Recommender Systems: A Proposed Rating Prediction Scheme Using Word Embedding Representation of Reviews
    Comput. J. (IF 1.077) Pub Date : 2020-05-22
    S Hasanzadeh; S M Fakhrahmad; M Taheri

    Recommender systems nowadays play an important role in providing helpful information for users, especially in ecommerce applications. Many of the proposed models use rating histories of the users in order to predict unknown ratings. Recently, users’ reviews as a valuable source of knowledge have attracted the attention of researchers in this field and a new category denoted as review-based recommender

    更新日期:2020-05-22
  • Adaptive IoT Empowered Smart Road Traffic Congestion Control System Using Supervised Machine Learning Algorithm
    Comput. J. (IF 1.077) Pub Date : 2020-05-19
    Ayesha Ata; Muhammad Adnan Khan; Sagheer Abbas; Muhammad Saleem Khan; Gulzar Ahmad

    The concept of smart systems blessed with different technologies can enable many algorithms used in Machine Learning (ML) and the world of the Internet of Things (IoT). In a modern city many different sensors can be used for information collection. Algorithms that are cast-off in Machine Learning improves the capabilities and intelligence of a system when the amount of data collectedincreases. In this

    更新日期:2020-05-19
  • Who Face Me? Neighbor Identification With LED Camera Communication
    Comput. J. (IF 1.077) Pub Date : 2020-05-13
    Jianhui Zhang; Tianhao Zhang; Feilong Jiang; Bei Zhao

    Neighbor discovery is a fundamental task to support many other services in wireless multihop networks (WMN). Most existing related methods in WMN rely heavily on the information of radio waves. To extend the way to the neighbor discovery, this paper introduces another interesting way, visual light communication, to explore its property of linear transmission. We apply light emitting diode (LED) array

    更新日期:2020-05-13
  • Auto-Scale Resource Provisioning In IaaS Clouds
    Comput. J. (IF 1.077) Pub Date : 2020-05-12
    Zolfaghar Salmanian; Habib Izadkhah; Ayaz Isazadeh

    Users of cloud computing technology can lease resources instead of spending an excessive charge for their ownership. For service delivery in the infrastructure-as-a-service model of the cloud computing paradigm, virtual machines (VMs) are created by the hypervisor. This software is installed on a bare-metal server, called the host, and acted as a broker between the hardware of the host and its VMs

    更新日期:2020-05-12
  • A Snap-Stabilizing m-wave Algorithm for Tree Networks
    Comput. J. (IF 1.077) Pub Date : 2020-02-05
    Hakan Karaata M, Nais AlMutairi A, Bassiouni M.

    AbstractIn this paper, we propose the first efficient, reliable and safe snap-stabilizing $m$-$wave$ (multi-initiator wave) algorithm implementing concurrent waves started by multiple initiator processes in tree networks. Unlike its self-stabilizing counterpart and broadcast algorithms, the proposed algorithm is a reliable and safe $m$-wave algorithm, i.e. it implements an $m$-wave such that after

    更新日期:2020-05-10
  • Double-Layer Network Negative Public Opinion Information Propagation Modeling Based on Continuous-Time Markov Chain
    Comput. J. (IF 1.077) Pub Date : 2020-05-09
    Xiaoyang Liu; Ting Tang; Daobing He

    In view of the fact that the existing public opinion propagation aspects are mostly based on single-layer propagation network, these works rarely consider the double-layer network structure and the negative opinion evolution. This paper proposes a new susceptible-infected-vaccinated-susceptible negative opinion information propagation model with preventive vaccination by constructing double-layer network

    更新日期:2020-05-09
  • From Relation Algebra to Semi-join Algebra: An Approach to Graph Query Optimization
    Comput. J. (IF 1.077) Pub Date : 2020-05-09
    Jelle Hellings; Catherine L Pilachowski; Dirk Van Gucht; Marc Gyssens; Yuqing Wu

    Many graph query languages rely on composition to navigate graphs and select nodes of interest, even though evaluating compositions of relations can be costly. Often, this need for composition can be reduced by rewriting toward queries using semi-joins instead, resulting in a significant reduction of the query evaluation cost. We study techniques to recognize and apply such rewritings. Concretely,

    更新日期:2020-05-09
  • ‘Will I Regret for This Tweet?’—Twitter User’s Behavior Analysis System for Private Data Disclosure
    Comput. J. (IF 1.077) Pub Date : 2020-05-09
    R Geetha; S Karthika; Ponnurangam Kumaraguru

    Twitter is an extensively used micro-blogging site for publishing user’s views on recent happenings. This wide reachability of messages over large audience poses a threat, as the degree of personally identifiable information disclosed might lead to user regrets. The Tweet-Scan-Post system scans the tweets contextually for sensitive messages. The tweet repository was generated using cyber-keywords for

    更新日期:2020-05-09
  • Clustering-Evolutionary Random Support Vector Machine Ensemble for fMRI-Based Asperger Syndrome Diagnosis
    Comput. J. (IF 1.077) Pub Date : 2020-05-09
    Xia-an Bi; Hao Wu; Xi Hu; Yu Fu; Shaoliang Peng

    It is a hot spot in the field of computer application to diagnose complex brain diseases such as Asperger syndrome (AS) using machine learning technology. To identify AS patients and detect lesions, this paper proposes a novel clustering-evolutionary random support vector machine (SVM) ensemble (CERSVME) based on graph theory. Firstly, we extract graph theory indexes from the resting-state functional

    更新日期:2020-05-09
  • Early Diabetes Discovery From Tongue Images
    Comput. J. (IF 1.077) Pub Date : 2020-05-08
    Safia Naveed; Geetha G; Leninisha S

    Medical imaging shows the internal structures hidden in the skin and bone to diagnose the disease. Diabetes mellitus (DM) is a metabolic disorder that causes high blood sugar levels due to the inadequate secretion of insulin or the body does not respond properly to the secreted insulin. This paper proposes a non-invasive method to detect DM at an early stage based on the physiognomy extracted from

    更新日期:2020-05-08
  • Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table
    Comput. J. (IF 1.077) Pub Date : 2020-05-08
    Bin Yu; Xiaofeng Li; He Zhao

    The inability to scale is one of the most concerning problems looming in blockchain systems, where every node has to store all contents of the ledger database locally, leading to centralization and higher operation costs. In this paper, we propose a model named virtual block group (VBG), which aims at addressing the node storage scalability problem. Adopting the VBG model, each node only needs to store

    更新日期:2020-05-08
  • Enriching Topic Coherence on Reviews for Cross-Domain Recommendation
    Comput. J. (IF 1.077) Pub Date : 2020-05-08
    Mala Saraswat; Shampa Chakraverty

    With the advent of e-commerce sites and social media, users express their preferences and tastes freely through user-generated content such as reviews and comments. In order to promote cross-selling, e-commerce sites such as eBay and Amazon regularly use such inputs from multiple domains and suggest items with which users may be interested. In this paper, we propose a topic coherence-based cross-domain

    更新日期:2020-05-08
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
欢迎访问IOP中国网站
GIANT
产业、创新与基础设施
自然科研线上培训服务
材料学研究精选
胸腔和胸部成像专题
屿渡论文,编辑服务
何川
苏昭铭
陈刚
姜涛
李闯创
李刚
北大
跟Nature、Science文章学绘图
隐藏1h前已浏览文章
中洪博元
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
x-mol收录
上海纽约大学
张健
毛峥伟
陈芬儿
厦门大学
李祥
江浪
张昊
杨中悦
试剂库存
天合科研
down
wechat
bug