• Comput. J. (IF 1.077) Pub Date : 2020-07-30
M Tamil Selvi; B Jaison

Agriculture exhibitions an important role in the progression and enlargement of the economy of any country. Prediction of crop yield will be useful for farmers, but it is difficult to predict crop yield because of the climatic factors such as rainfall, soil factors and so on. To tackle these issues, we are implementing a novel algorithm called Lemuria by applying data mining in agriculture especially

更新日期：2020-07-30
• Comput. J. (IF 1.077) Pub Date : 2020-07-25
Haishan Chen; Junying Yuan; Wien Hong; Jiangqun Ni; Tung-Shou Chen

Reversible data hiding (RDH) with contrast enhancement (RDH-CE) is a special type of RDH in improving the subjective visual perception by enhancing the image contrast during the process of data embedding. In RDH-CE, data hiding is achieved via pairwise histogram expansion, and the embedding rate can be increased by performing multiple cycles of histogram expansions. However, when embedding rate gets

更新日期：2020-07-25
• Comput. J. (IF 1.077) Pub Date : 2020-07-23
Xian Mo; Jun Pang; Zhiming Liu

Temporal networks are networks that edges evolve over time, hence link prediction in temporal networks aims at inferring new edges based on a sequence of network snapshots. In this paper, we propose a graph wavelet neural network (TT-GWNN) framework using topological and temporal features for link prediction in temporal networks. To capture topological and temporal features, we develope a second-order

更新日期：2020-07-25
• Comput. J. (IF 1.077) Pub Date : 2020-07-23
Zhen Liu; Qiong Huang; Duncan S Wong

Attribute-based encryption (ABE) is a versatile one-to-many encryption primitive, which enables fine-grained access control over encrypted data. Due to its promising applications in practice, ABE schemes with high efficiency, security and expressivity have been continuously emerging. On the other hand, due to the nature of ABE, a malicious user may abuse its decryption privilege. Therefore, being able

更新日期：2020-07-23
• Comput. J. (IF 1.077) Pub Date : 2020-07-21
Alev Mutlu; Furkan Goz

Landslide susceptibility assessment is the problem of determining the likelihood of a landslide occurrence in a particular area with respect to the geographical and morphological properties of the area. This paper presents a hybrid method, namely SkySlide, that incorporates clustering, skyline operator, classification and majority voting principle for region-scale landslide susceptibility assessment

更新日期：2020-07-22
• Comput. J. (IF 1.077) Pub Date : 2020-07-17
Yu Yang; Beifang Chen; Guoping Zhang; Yongming Li; Daoqiang Sun; Hongbo Liu

The subtree number index of a graph, defined as the number of subtrees, attracts much attention recently. Finding a proper algorithm to compute this index is an important but difficult problem for a general graph. Even for unicyclic and bicyclic graphs, it is not completely trivial, though it can be figured out by try and error. However, it is complicated for tricyclic graphs. This paper proposes path

更新日期：2020-07-22
• Comput. J. (IF 1.077) Pub Date : 2020-07-17
Cong Li; Qingni Shen; Zhikang Xie; Xinyu Feng; Yuejian Fang; Zhonghai Wu

Attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message equality comparison without decrypting the ciphertexts. Recently, there have been several literatures about ABEET proposed. Nevertheless, most of them explore the ABEET schemes in the random oracle model, which has been pointed out to have many defects

更新日期：2020-07-17
• Comput. J. (IF 1.077) Pub Date : 2020-07-16
Mei-Mei Gu; Rong-Xia Hao; Jou-Ming Chang

Given a connected graph |$G$| and a positive integer |$\ell$|⁠, the |$\ell$|-extra (resp. |$\ell$|-component) edge connectivity of |$G$|⁠, denoted by |$\lambda ^{(\ell )}(G)$| (resp. |$\lambda _{\ell }(G)$|⁠), is the minimum number of edges whose removal from |$G$| results in a disconnected graph so that every component has more than |$\ell$| vertices (resp. so that it contains at least |$\ell 更新日期：2020-07-17 • Comput. J. (IF 1.077) Pub Date : 2020-07-16 Guanqin Lian; Shuming Zhou; Eddie Cheng; Jiafei Liu; Gaolin Chen Diagnosability is an important metric to fault tolerance and reliability for multiprocessor systems. However, plenty of research on fault diagnosability focuses on node failure. In practical scenario, not only node failures take place but also link malfunctions may arise. In this work, we investigate the diagnosability of general regular networks with failing nodes as well as missing malfunctional 更新日期：2020-07-16 • Comput. J. (IF 1.077) Pub Date : 2020-07-16 Chao-Chao Wang; Wan-Liang Wang; Xin-Wei Yao A general framework to investigate the interference and coverage probability is proposed in this paper for indoor terahertz (THz) communications with beamforming antennas. Due to the multipath effects of THz band (0.1–10 THz), the line of sight and non-line of sight interference from users and access points (APs) (both equipped with beamforming antennas) are separately analyzed based on distance-dependent 更新日期：2020-07-16 • Comput. J. (IF 1.077) Pub Date : 2020-07-13 Yong Fang; Yue Yang; Cheng Huang Emails are often used to illegal cybercrime today, so it is important to verify the identity of the email author. This paper proposes a general model for solving the problem of anonymous email author attribution, which can be used in email authorship identification and email authorship verification. The first situation is to find the author of an anonymous email among the many suspected targets. Another 更新日期：2020-07-16 • Comput. J. (IF 1.077) Pub Date : 2020-07-13 Patrick Erik Bradley; Markus Wilhelm Jahn Space filling curves are widely used in computer science. In particular, Hilbert curves and their generalizations to higher dimension are used as an indexing method because of their nice locality properties. This article generalizes this concept to the systematic construction of |$p$|-adic versions of Hilbert curves based on special affine transformations of the |$p$|-adic Gray code and develops a 更新日期：2020-07-13 • Comput. J. (IF 1.077) Pub Date : 2020-07-09 Hager Kammoun; Imen Gabsi; Ikram Amous Owing to the tremendous size of electronic biomedical documents, users encounter difficulties in seeking useful biomedical information. An efficient and smart access to the relevant biomedical information has become a fundamental need. In this research paper, we set forward a novel biomedical MeSH-based semantic indexing approach to enhance biomedical information retrieval. The proposed semantic indexing 更新日期：2020-07-13 • Comput. J. (IF 1.077) Pub Date : 2020-07-09 Zhenbin Yan; Yi Deng Round complexity is one of the fundamental problems in zero-knowledge (ZK) proof systems. Non-malleable zero-knowledge (NMZK) protocols are ZK protocols that provide security even when man-in-the-middle adversaries interact with a prover and a verifier simultaneously. It is known that the first constant-round public-coin NMZK arguments for NP can be constructed by assuming the existence of collision-resistant 更新日期：2020-07-09 • Comput. J. (IF 1.077) Pub Date : 2020-07-08 Kai Zhang; Yuan Zhou; Zheng Chen; Yufei Liu; Zhuo Tang; Li Yin; Jihong Chen The prevalence of short texts on the Web has made mining the latent topic structures of short texts a critical and fundamental task for many applications. However, due to the lack of word co-occurrence information induced by the content sparsity of short texts, it is challenging for traditional topic models like latent Dirichlet allocation (LDA) to extract coherent topic structures on short texts. 更新日期：2020-07-09 • Comput. J. (IF 1.077) Pub Date : 2020-07-08 Omid Davoodi; Mehrdad Ashtiani; Morteza Rajabi In the current state of the video game productions, most of the video game levels are created by the human operators working as level designers. This manual process is not only time-consuming and resource-intensive but also hard to guarantee uniform quality in the contents created by the level designers. One way to address this issue is to use computer-assisted level design techniques. In this paper 更新日期：2020-07-08 • Comput. J. (IF 1.077) Pub Date : 2020-07-07 Vinicius Fulber-Garcia; Sérgio Luis Sardi Mergen Prediction-based compression methods, like prediction by partial matching, achieve a remarkable compression ratio, especially for texts written in natural language. However, they are not efficient in terms of speed. Part of the problem concerns the usage of dynamic entropy encoding, which is considerably slower than the static alternatives. In this paper, we propose a prediction-based compression method 更新日期：2020-07-08 • Comput. J. (IF 1.077) Pub Date : 2020-07-07 Rola El Osta; Maryline Chetto; Hussein El Ghor We consider the problem of real-time scheduling in uniprocessor devices powered by energy harvesters. In particular, we focus on mixed sets of tasks with time and energy constraints: hard deadline periodic tasks and soft aperiodic tasks without deadlines. We present an optimal aperiodic servicing algorithm that minimizes the response times of aperiodic tasks without compromising the schedulability 更新日期：2020-07-08 • Comput. J. (IF 1.077) Pub Date : 2020-07-07 Hui Cui; Russell Paulet; Surya Nepal; Xun Yi; Butrus Mbimbi Biometric information is unique to a human, so it would be desirable to use the biometric characteristic as the private key in a cryptographic system to protect data security and privacy. In this paper, we introduce a notion called two-factor decryption (TFD). Informally speaking, a TFD scheme is a variant of the public-key encryption (PKE) scheme. In a TFD scheme, messages are encrypted under public 更新日期：2020-07-07 • Comput. J. (IF 1.077) Pub Date : 2020-07-06 Aqib Mumtaz; Allah Bux Sargano; Zulfiqar Habib The violence detection is mostly achieved through handcrafted feature descriptors, while some researchers have also employed deep learning-based representation models for violent activity recognition. Deep learning-based models have achieved encouraging results for fight activity recognition on benchmark data sets such as hockey and movies. However, these models have limitations in learning discriminating 更新日期：2020-07-06 • Comput. J. (IF 1.077) Pub Date : 2020-07-03 Muthumanikandan Vanamoorthy; Valliyammai Chinnaiah AbstractWith energy consumption in high-performance computing clouds growing rapidly, energy saving has become an important topic. Virtualization provides opportunities to save energy by enabling one physical machine (PM) to host multiple virtual machines (VMs). Dynamic voltage and frequency scaling (DVFS) is another technology to reduce energy consumption. However, in heterogeneous cloud environments 更新日期：2020-07-03 • Comput. J. (IF 1.077) Pub Date : 2020-07-03 Huizhong Li; Yongbin Zhou; Jingdian Ming; Guang Yang; Chengbin Jin We revisit the definition of transparency order (TO) and that of modified transparency order (MTO) as well, which were proposed to measure the resistance of substitution boxes (S-boxes) against differential power analysis (DPA). We spot a definitional flaw in original TO, which is proved to significantly affect the soundness of TO. Regretfully, MTO overlooks this flaw, yet it happens to incur no bad 更新日期：2020-07-03 • Comput. J. (IF 1.077) Pub Date : 2020-07-03 Sagheer Abbas; Muhammad Adnan Khan; Atifa Athar; Syed Ali Shan; Anwar Saeed; Tahir Alyas In a smart city, the subject of the congestion-free traffic has been leading objectives from the past decade, and many approaches are adopted to make congestion-free roads. These approaches and signals at one junction are not inter-linked with the signal at the previous one. Therefore, the traffic flow on the same road and at associative roads is not smooth. The study proposed a model with a hybrid 更新日期：2020-07-03 • Comput. J. (IF 1.077) Pub Date : 2020-07-03 Weidong Huang; Shuting Zhu; Xinkai Yao The tourism destination image is an intangible value that enhances the internal and external spiritual value of the region. To improve tourist experiences and provide reference for relevant departments, we applied the GooSeeker web data crawler tool and Python data mining kit to crawl and analyze the representative online tourism community data. We conduct an empirical analysis through data from the 更新日期：2020-07-03 • Comput. J. (IF 1.077) Pub Date : 2020-07-01 Lili Jiang; Xiaolin Chang; Runkai Yang; Jelena Mišić; Vojislav B Mišić The rapid and widespread adoption of internet of things-related services advances the development of the cloud-edge framework, including multiple cloud datacenters (CDCs) and edge micro-datacenters (EDCs). This paper aims to apply analytical modeling techniques to assess the effectiveness of cloud-edge computing resource allocation policies from the perspective of improving the performance of cloud-edge 更新日期：2020-07-03 • Comput. J. (IF 1.077) Pub Date : 2020-07-01 Bechir Alaya; Rehanullah Khan The amount of online video content is exponentially increasing, which spurs its access demands. Providing optimal quality of service (QoS) for this ever-increasing video data is a challenging task due to the number of QoS constraints. The system resources, the distributed system platform and the transport protocol thus all need to collaborate to guarantee an acceptable level of QoS for the optimal 更新日期：2020-07-01 • Comput. J. (IF 1.077) Pub Date : 2020-06-24 Rui Gao; Yuanyuan Zhu; Mingye Li; Shoufeng Li; Xiaohu Shi This paper studies the couplet generation model which automatically generates the second line of a couplet by giving the first line. Unlike other sequence generation problems, couplet generation not only considers the sequential context within a sentence line but also emphasizes the relationships between the corresponding words of first and second lines. Therefore, a trapezoidal context character embedding 更新日期：2020-06-24 • Comput. J. (IF 1.077) Pub Date : 2020-06-23 Diana Popova; Ken-ichi Kawarabayashi; Alex Thomo Algorithmic problem of computing the most influential nodes in an arbitrary graph (influence maximization) is an important theoretical and practical problem and has been extensively studied for decades. For massive graphs (e.g. modelling huge social networks), randomized algorithms are the answer as the exact computation is prohibitively complex, both for runtime and space. This paper concentrates 更新日期：2020-06-24 • Comput. J. (IF 1.077) Pub Date : 2020-06-23 M Gokuldhev; G Singaravel Nowadays, Cloud computing is a new computing model in the field of information technology and research. Generally, the cloud environment aims in providing the resource that depends upon the user’s necessity. The major problem caused by cloud computing is task scheduling. Nevertheless, the previous scheduling methods concentrate only on the resource needs, memory, implementation time and cost. In this 更新日期：2020-06-24 • Comput. J. (IF 1.077) Pub Date : 2020-06-23 Esra Sarac Essiz; Murat Oturakci As a nature-inspired algorithm, artificial bee colony (ABC) is an optimization algorithm that is inspired by the search behaviour of honey bees. The main aim of this study is to examine the effects of the ABC-based feature selection algorithm on classification performance for cyberbullying, which has become a significant worldwide social issue in recent years. With this purpose, the classification 更新日期：2020-06-24 • Comput. J. (IF 1.077) Pub Date : 2020-06-23 Shitala Prasad; Tingting Chai Palmprint is an important key player in biometric family and also informs some extra basic personality details of an individual. In this paper, we utilize these extra information and designed an automated mobile vision (MV) system to extract principal lines from human palm and analyze them for behavioral significances. Hence, the main concern of this paper is to come up with a simple yet powerful low-level 更新日期：2020-06-23 • Comput. J. (IF 1.077) Pub Date : 2020-06-22 Ya Liu; Bing Shi; Dawu Gu; Fengyu Zhao; Wei Li; Zhiqiang Liu In ASIACRYPT 2014, Jean et al. proposed the authentication encryption scheme Deoxys, which is one of the third-round candidates in CAESAR competition. Its internal block cipher is called Deoxys-BC that adopts the tweakey frame. Deoxys-BC has two versions of the tweakey size that are 256 bits and 384 bits, denoted by Deoxys-BC-256 and Deoxys-BC-384, respectively. In this paper, we revaluate the security 更新日期：2020-06-23 • Comput. J. (IF 1.077) Pub Date : 2020-06-03 Lixia Chen; Jian Li; Ruhui Ma; Haibing Guan; Hans-Arno Jacobsen With energy consumption in high-performance computing clouds growing rapidly, energy saving has become an important topic. Virtualization provides opportunities to save energy by enabling one physical machine (PM) to host multiple virtual machines (VMs). Dynamic voltage and frequency scaling (DVFS) is another technology to reduce energy consumption. However, in heterogeneous cloud environments where 更新日期：2020-06-23 • Comput. J. (IF 1.077) Pub Date : 2020-04-20 Jianqiu Sun; Xingguang Li; Kang Chen; Wei Cui; Ming Chu The performance of underwater acoustic communication system is affected seriously by inter-symbol interference caused by multipath effects. Therefore, a novel blind equalization algorithm based on constant modulus algorithm (CMA) and decision-directed least mean square (DD_LMS) is adopted to improve the equalization ability of the system. Firstly, the LMS algorithm is improved by introducing inverse 更新日期：2020-06-23 • Comput. J. (IF 1.077) Pub Date : 2020-06-17 Talha Mahboob Alam; Kamran Shaukat; Mubbashar Mushtaq; Yasir Ali; Matloob Khushi; Suhuai Luo; Abdul Wahab The area of corporate bankruptcy prediction attains high economic importance, as it affects many stakeholders. The prediction of corporate bankruptcy has been extensively studied in economics, accounting and decision sciences over the past two decades. The corporate bankruptcy prediction has been a matter of talk among academic literature and professional researchers throughout the world. Different 更新日期：2020-06-17 • Comput. J. (IF 1.077) Pub Date : 2020-06-15 Hong Zhang; Jixiang Meng Diagnosability and connectivity are important metrics for the reliability and fault diagnosis capability of interconnection networks, respectively. The g-extra connectivity of a graph G, denoted by |$\kappa _g(G)$|⁠, is the minimum number of vertices whose deletion will disconnect the network and every remaining component has more than |$g$| vertices. The g-extra conditional diagnosability of graph 更新日期：2020-06-15 • Comput. J. (IF 1.077) Pub Date : 2020-06-15 Tayyip Ozcan; Alper Basturk Action recognition is a challenging task. Deep learning models have been investigated to solve this problem. Setting up a new neural network model is a crucial and time-consuming process. Alternatively, pre-trained convolutional neural network (CNN) models offer rapid modeling. The selection of the hyperparameters of CNNs is a challenging issue that heavily depends on user experience. The parameters 更新日期：2020-06-15 • Comput. J. (IF 1.077) Pub Date : 2020-06-15 AmirHossein Ebrahimi Moghaddam; Zahra Ahmadian In this paper, using Mixed-Integer Linear Programming, a new automatic search tool for truncated differential characteristic is presented. Our method models the problem of finding a maximal probability truncated differential characteristic, being able to distinguish the cipher from a pseudo-random permutation. Using this method, we analyze Midori64, SKINNY64/X and CRAFT block ciphers, for all of which 更新日期：2020-06-15 • Comput. J. (IF 1.077) Pub Date : 2020-06-12 Balaji C G; Anu Monisha A; Murugan K The exponential growth in mobile broadband data traffic with demand for faster data connectivity has become the most engaging challenges for mobile operators. They are facing an enormous data load in the core network and are finding new solutions to offload data to other complementary technologies. Mobile data offloading using device-to-device (D2D) communication stands out as the promising and the 更新日期：2020-06-12 • Comput. J. (IF 1.077) Pub Date : 2020-06-12 Lata Jaywant Sankpal; Suhas H Patil The webpage re-ranking is a challenging task while retrieving the webpages based on the query of the user. Even though the webpages in the search engines are ordered depends on the importance of the content, retrieving the necessary documents based on the input query is quite difficult. Hence, it is required to re-rank the webpages available in the websites based on the features of the pages in the 更新日期：2020-06-12 • Comput. J. (IF 1.077) Pub Date : 2020-06-10 Sha Ma; Qiong Huang In the era of cloud computing, public key encryption with keyword search (PEKS) is an extremely useful cryptographic tool for searching on encryption data, whose strongest security notion is indistinguishability encryption against chosen ciphertext attack (ind-cca). Adballa et al. presented a transformation from identity based encryption (IBE) to PEKS in the Theory of Cryptography Conference 2010. 更新日期：2020-06-10 • Comput. J. (IF 1.077) Pub Date : 2020-06-08 Yiming Li; Shengli Liu; Dawu Gu; Kefei Chen A fuzzy extractor derives uniformly random strings from noisy sources that are neither reliably reproducible nor uniformly random. The basic definition of fuzzy extractor was first formally introduced by Dodis et al. and has achieved various applications in cryptographic systems. However, it has been proved that a fuzzy extractor could become totally insecure when the same noisy random source is extracted 更新日期：2020-06-08 • Comput. J. (IF 1.077) Pub Date : 2020-06-08 Qinglong Wang; Xiaoying Sun; Dekun Cao; Guohong Liu Tactile feedback added to touchscreens provides users with a high-quality interactive experience. The effect of tactile feedback on typical interaction gestures requires to be evaluated. With a custom-designed electrostatic tactile feedback device, we explore the effects of tactile feedback on zoom-in/out gestures and determine the issues satisfied by the relationship between completion time (CT) and 更新日期：2020-06-08 • Comput. J. (IF 1.077) Pub Date : 2020-06-04 Falak Nawaz; Naeem Khalid Janjua The number of cloud services has dramatically increased over the past few years. Consequently, finding a service with the most suitable quality of service (QoS) criteria matching the user’s requirements is becoming a challenging task. Although various decision-making methods have been proposed to help users to find their required cloud services, some uncertainties such as dynamic QoS variations hamper 更新日期：2020-06-04 • Comput. J. (IF 1.077) Pub Date : 2020-06-03 Janaka Alawatugoda Over the years, security against adaptively chosen-ciphertext attacks (CCA2) is considered as the strongest security definition for public-key encryption schemes. With the uprise of side-channel attacks, new security definitions are proposed, addressing leakage of secret keys together with the standard CCA2 definition. Among the new security definitions, security against continuous and after-the-fact 更新日期：2020-06-03 • Comput. J. (IF 1.077) Pub Date : 2020-06-02 Caixia Liang; Bo Zhou; Haiyan Guo Given a graph, the status of a vertex is the sum of the distances between the vertex and all other vertices. The minimum status of a graph is the minimum of statuses of all vertices of this graph. We give a sharp upper bound for the minimum status of a connected graph with fixed order and matching number (domination number, respectively) and characterize the unique trees achieving the bound. We also 更新日期：2020-06-02 • Comput. J. (IF 1.077) Pub Date : 2020-05-30 Dong Xu; Wei Dong; Han Zhou The visible blood vein in sclera has unique characteristics for each person, and it can be captured in visible light conditions. Therefore, the sclera vessels have been used as an important feature to improve the performance of identification recognition systems, for example, mobile payment and phone encryption system. But recent studies show that unsatisfactory sclera segmentation and tedious matching 更新日期：2020-05-30 • Comput. J. (IF 1.077) Pub Date : 2020-05-28 Zahra Abdi Reyhan; Shahriar Lotfi; Ayaz Isazadeh; Jaber Karimpour Most important scientific and engineering applications have complex computations or large data. In all these applications, a huge amount of time is consumed by nested loops. Therefore, loops are the main source of the parallelization of scientific and engineering programs. Many parallelizing compilers focus on parallelization of nested loops with uniform dependences, and parallelization of nested loops 更新日期：2020-05-28 • Comput. J. (IF 1.077) Pub Date : 2020-05-22 S Hasanzadeh; S M Fakhrahmad; M Taheri Recommender systems nowadays play an important role in providing helpful information for users, especially in ecommerce applications. Many of the proposed models use rating histories of the users in order to predict unknown ratings. Recently, users’ reviews as a valuable source of knowledge have attracted the attention of researchers in this field and a new category denoted as review-based recommender 更新日期：2020-05-22 • Comput. J. (IF 1.077) Pub Date : 2020-05-19 Ayesha Ata; Muhammad Adnan Khan; Sagheer Abbas; Muhammad Saleem Khan; Gulzar Ahmad The concept of smart systems blessed with different technologies can enable many algorithms used in Machine Learning (ML) and the world of the Internet of Things (IoT). In a modern city many different sensors can be used for information collection. Algorithms that are cast-off in Machine Learning improves the capabilities and intelligence of a system when the amount of data collectedincreases. In this 更新日期：2020-05-19 • Comput. J. (IF 1.077) Pub Date : 2020-05-13 Jianhui Zhang; Tianhao Zhang; Feilong Jiang; Bei Zhao Neighbor discovery is a fundamental task to support many other services in wireless multihop networks (WMN). Most existing related methods in WMN rely heavily on the information of radio waves. To extend the way to the neighbor discovery, this paper introduces another interesting way, visual light communication, to explore its property of linear transmission. We apply light emitting diode (LED) array 更新日期：2020-05-13 • Comput. J. (IF 1.077) Pub Date : 2020-05-12 Zolfaghar Salmanian; Habib Izadkhah; Ayaz Isazadeh Users of cloud computing technology can lease resources instead of spending an excessive charge for their ownership. For service delivery in the infrastructure-as-a-service model of the cloud computing paradigm, virtual machines (VMs) are created by the hypervisor. This software is installed on a bare-metal server, called the host, and acted as a broker between the hardware of the host and its VMs 更新日期：2020-05-12 • Comput. J. (IF 1.077) Pub Date : 2020-02-05 Hakan Karaata M, Nais AlMutairi A, Bassiouni M. AbstractIn this paper, we propose the first efficient, reliable and safe snap-stabilizing$m$-$wave$(multi-initiator wave) algorithm implementing concurrent waves started by multiple initiator processes in tree networks. Unlike its self-stabilizing counterpart and broadcast algorithms, the proposed algorithm is a reliable and safe$m$-wave algorithm, i.e. it implements an$m\$-wave such that after

更新日期：2020-05-10
• Comput. J. (IF 1.077) Pub Date : 2020-05-09
Xiaoyang Liu; Ting Tang; Daobing He

In view of the fact that the existing public opinion propagation aspects are mostly based on single-layer propagation network, these works rarely consider the double-layer network structure and the negative opinion evolution. This paper proposes a new susceptible-infected-vaccinated-susceptible negative opinion information propagation model with preventive vaccination by constructing double-layer network

更新日期：2020-05-09
• Comput. J. (IF 1.077) Pub Date : 2020-05-09
Jelle Hellings; Catherine L Pilachowski; Dirk Van Gucht; Marc Gyssens; Yuqing Wu

Many graph query languages rely on composition to navigate graphs and select nodes of interest, even though evaluating compositions of relations can be costly. Often, this need for composition can be reduced by rewriting toward queries using semi-joins instead, resulting in a significant reduction of the query evaluation cost. We study techniques to recognize and apply such rewritings. Concretely,

更新日期：2020-05-09
• Comput. J. (IF 1.077) Pub Date : 2020-05-09
R Geetha; S Karthika; Ponnurangam Kumaraguru

Twitter is an extensively used micro-blogging site for publishing user’s views on recent happenings. This wide reachability of messages over large audience poses a threat, as the degree of personally identifiable information disclosed might lead to user regrets. The Tweet-Scan-Post system scans the tweets contextually for sensitive messages. The tweet repository was generated using cyber-keywords for

更新日期：2020-05-09
• Comput. J. (IF 1.077) Pub Date : 2020-05-09
Xia-an Bi; Hao Wu; Xi Hu; Yu Fu; Shaoliang Peng

It is a hot spot in the field of computer application to diagnose complex brain diseases such as Asperger syndrome (AS) using machine learning technology. To identify AS patients and detect lesions, this paper proposes a novel clustering-evolutionary random support vector machine (SVM) ensemble (CERSVME) based on graph theory. Firstly, we extract graph theory indexes from the resting-state functional

更新日期：2020-05-09
• Comput. J. (IF 1.077) Pub Date : 2020-05-08
Safia Naveed; Geetha G; Leninisha S

Medical imaging shows the internal structures hidden in the skin and bone to diagnose the disease. Diabetes mellitus (DM) is a metabolic disorder that causes high blood sugar levels due to the inadequate secretion of insulin or the body does not respond properly to the secreted insulin. This paper proposes a non-invasive method to detect DM at an early stage based on the physiognomy extracted from

更新日期：2020-05-08
• Comput. J. (IF 1.077) Pub Date : 2020-05-08
Bin Yu; Xiaofeng Li; He Zhao

The inability to scale is one of the most concerning problems looming in blockchain systems, where every node has to store all contents of the ledger database locally, leading to centralization and higher operation costs. In this paper, we propose a model named virtual block group (VBG), which aims at addressing the node storage scalability problem. Adopting the VBG model, each node only needs to store

更新日期：2020-05-08
• Comput. J. (IF 1.077) Pub Date : 2020-05-08
Mala Saraswat; Shampa Chakraverty

With the advent of e-commerce sites and social media, users express their preferences and tastes freely through user-generated content such as reviews and comments. In order to promote cross-selling, e-commerce sites such as eBay and Amazon regularly use such inputs from multiple domains and suggest items with which users may be interested. In this paper, we propose a topic coherence-based cross-domain

更新日期：2020-05-08
Contents have been reproduced by permission of the publishers.

down
wechat
bug