样式: 排序: IF: - GO 导出 标记为已读
-
A Personalized mHealth Monitoring System for Children and Adolescents with T1 Diabetes by Utilizing IoT Sensors and Assessing Physical Activities Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-04-15 Nurassyl Zholdas, Madina Mansurova, Octavian Postolache, Maksat Kalimoldayev, Talshyn Sarsembayeva
The problem of diabetes mellitus is becoming alarming due to the increase in morbidity among children. Patients are undergoing vital insulin replacement therapy, the dose depends on the level of glucose in the blood. The glucose level prediction program, taking into account the impact of physical activity on the body, the use of mobile health capabilities will allow us to develop personalized tactics
-
Analysis of a Public and Private Networks for Nutrient Measurement System using LoRawan Network Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-04-10 Doan Perdana, Cahya Ariateja, Ibnu Alinursafa, Ongko Cahyono
Lorawan network is ideal for IoT devices that continuously monitor a device and provide information to the gateway if the monitored data is outside the permitted threshold. These devices only require a small bandwidth and are therefore capable of operating on batteries for a long period of time. This study evaluates the design of a tool to measure soil nutrients with parameters of Nitrogen (N), Phosphorus
-
Fault Detection in Three-phase Induction Motor based on Data Acquisition and ANN based Data Processing Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-04-08 Ovidiu Gheorghe Moldovan, Remus Vladimir Ghincu, Alin Octavian Moldovan, Dan Noje, Radu Catalin Tarca
The main objective of this paper is to investigate how a failure in the functioning of a normal electrical system represented by a three-phase asynchronous motor will modify the voltages and currents present in the system and if it is possible to design a system that is able to automatically detect the fault, based on the use of modern data acquisition system and powerful computer processing capabilities
-
Substantial Phase Exploration for Intuiting Covid using form Expedient with Variance Sensor Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-31 Radha Raman Chandan, Pravin R. Kshirsagar, Hariprasath Manoharan, Khalid Mohamed El-Hady, Saiful Islam, Mohammad Shahiq Khan, Abhay Chaturvedi
This article focuses on implementing wireless sensors for monitoring exact distance between two individuals and to check whether everybody have sanitized their hands for stopping the spread of Corona Virus Disease (COVID). The idea behind this method is executed by implementing an objective function which focuses on maximizing distance, energy of nodes and minimizing the cost of implementation. Also
-
Integration of Fuzzy with Incremental Import Vector Machine for Intrusion Detection Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-21 Arun Kumar Ramamoorthy, K. Karuppasamy
IDM design and implementation remain a difficult undertaking and an unsolved research topic. Multi-dimensional irrelevant characteristics and duplicate information are included in the network dataset. To boost the effectiveness of IDM, a novel hybrid model is developed that combines Fuzzy Genetic Algorithms with Increment Import Vector Machines (FGA-I2VM), which works with huge amounts of both normal
-
Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-21 Cong Luo, Xiangbo Fan, Ying Yan, Han Jin, Xuan Wang
Identity authentication is one of the most basic components in the computer network world. It is the key technology of information security. It plays an important role in the protection of system and data security. Biometric recognition technology provides a reliable and convenient way for identity authentication. Compared with other biometric recognition technologies, face recognition has become a
-
Dynamic Traffic Light System to Reduce The Waiting Time of Emergency Vehicles at Intersections within IoT Environment Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-21 Yahya Tashtoush, Mohammed Al-refai, Ghaith Al-refai, Dirar Abdul-Kareem Darweesh, Noor Zaghal, Omar Darwish
Traditional traffic light system, which works based on fixed cycle can be a main reason for traffic jam, due to lack of adaptation to road conditions. Traffic jam has a bad impact on drivers and road users due to the time delay it causes for road users to reach their destinations. This delay can cause a life threat in case of emergency vehicles, such as ambulance vehicles and police cars. One key solution
-
Sentiment Analysis using Improved Novel Convolutional Neural Network (SNCNN) Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-18 M. Kalaiarasu, C. Ranjeeth Kumar
Sentiment Analysis is an important method in which many researchers are working on the automated approach for extraction and analysis of huge volumes of user achieved data, which are accessible on social networking websites. This approach helps in analyzing the direct falls under the domain of SA. SA comprises the vast field of effective classification of user-initiated text under defined polarities
-
Covid-19 Patients’ Hospital Occupancy Prediction During the Recent Omicron Wave via some Recurrent Deep Learning Architectures Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-14 Heni Bouhamed, Monia Hamdi, Rahma Gargouri
This paper described a suggested model to predict bed occupancy for Covid-19 patients by country during the rapid spread of the Omicron variant. This model can be used to make decisions on the introduction or alleviation of restrictive measures and on the prediction of oxygen and health human resource requirements. To predict Covid-19 hospital occupancy, we tested some recurrent deep learning architectures
-
IoT-inspired Framework for Real-time Prediction of Forest Fire Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-14 Abdullah Aljumah
Wildfires are one of the most devastating catastrophes and can inflict tremendous losses to life and nature. Moreover, the loss of civilization is incomprehensible, potentially extending suddenly over vast land sectors. Global warming has contributed to increased forest fires, but it needs immediate attention from the organizations involved. This analysis aims to forecast forest fires to reduce losses
-
A Unique Multi-Agent-Based Approach for Enhanced QoS Resource Allocation in Multi Cloud Environment while Maintaining Minimized Energy and Maximize Revenue Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-07 Umamageswaran Jambulingam, K. Balasubadra
The use of the multi-cloud data storage in one heterogeneous service is a polynimbus cloud strategy. Cloud computing uses a pay-as-you-go model to deliver services to a variety of end users. Customers can outsource daunting tasks to cloud data centres for processing and producing results, thanks to cloud computing. Cloud computing becomes the popular IT brand that provides various on-demand services
-
Data Processing by Fuzzy Methods in Social Sciences Researches. Example in Hospitality Industry Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-03-05 Olimpia I. Ban, Laurențiu Droj, Delia Tușe, Gabriela Droj, Nicoleta Bugnar
Likert-type scales are a common technique used in social science. Plus, the Likert scale is among the most frequently used psychometric tools in social sciences and educational research. Despite its frequently used, the Likert scale raises up many questions mark. We can say that the use of the Likert scale in its classical form is too rigid and loses valuable information. Li (2013, p. 1613) calls on
-
Collaborative Decision-Making: Concepts and Supporting Information and Communication Technology Tools and Systems Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-20 Florin Gheorghe Filip
Collaboration means in substance that several entities such as humans, computers, robots, enterprises and so on jointly perform a certain task instead of working individually so that a better result could be obtained. Decision-making is a specific form of activity, commonly carried out by human agents, which is meant to eventually select a certain course of action which is expected to result in attaining
-
Cassava Leaf Disease Identification and Detection Using Deep Learning Approach Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-18 J. Anitha, N. Saranya
Agriculture is the primary source of livelihood for about 60% of the world's total population according to the Food and Agricultural Organization (FAO). The economy of the developing countries is solely dependent on agriculture commodities. As the world population is increasing at faster pace, the demand for food is also escalating tremendously. In recent days, agriculture is experiencing an automation
-
Video Saliency Detection by using an Enhance Methodology Involving a Combination of 3DCNN with Histograms Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-18 Suresh Kumar R, Mahalakshmi P, Jothilakshmi R, Kavitha M S, Balamuralitharan S
When watching pictures or videos, the Human Visual System has the potential to concentrate on important locations. Saliency detection is a tool for detecting the abnormality and randomness of images or videos by replicating the human visual system. Video saliency detection has received a lot of attention in recent decades, but due to challenging temporal abstraction and fusion for spatial saliency
-
Fuzzy Logic-Based System for the Estimation of the Usability Level in User Tests Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-18 Gabriel Elías Chanchí Golondrino, Luz Marina Sierra Martínez, Wilmar Yesid Campo Muñoz
Starting from the challenge of obtaining the usability level in numerical and linguistic terms within a user test based on the three attributes that define usability, the development of a system based on fuzzy logic is proposed for estimating the level of output usability in a test with users based on the ISO 9241-11 standard. The attributes are effectiveness, efficiency, and satisfaction, which have
-
PLDANet: Reasonable Combination of PCA and LDA Convolutional Networks Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-08 Caicai Zhang, Mei Mei, Zhuolin Mei, Junkang Zhang, Anyuan Deng, Chenglang Lu
Integrating deep learning with traditional machine learning methods is an intriguing research direction. For example, PCANet and LDANet adopts Principal Component Analysis (PCA) and Fisher Linear Discriminant Analysis (LDA) to learn convolutional kernels separately. It is not reasonable to adopt LDA to learn filter kernels in each convolutional layer, local features of images from different classes
-
Survey of Cubic Fibonacci Identities When Cuboids Carry Weight Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-08 Mariana Nagy, Simon Robin Cowell, Valeriu Beiu
The aim of this paper is to present a comprehensive survey of cubic Fibonacci identities, trying to uncover as many as possible. From the outset, our rationale for a very careful search on an apparently obscure problem was not only a matter of mathematical curiosity, but also motivated by a quest for 3D Fibonacci spirals. As we were not able to find any survey on the particular topic of cubic Fibonacci
-
Fault Detection in Nuclear Power Plants using Deep Leaning based Image Classification with Imaged Time-series Data Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-02-03 Yong Shi, Xiaodong Xue, Jiayu Xue, Yi Qu
Fault detection is critical to ensure the safely routine operations in nuclear power plants (NPPs), requiring very high accuracy and efficiency. Meanwhile, the rapid development of modern information technologies have profoundly changed and promoted various sectors including nuclear industry. Inspired by the great progress and promising performance of deep learning based image classification recent
-
In Memoriam: Prof. Ioan Dzitac - Editorial Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-24 Florin Gheorghe Filip
In 2021, the International Journal for Computers, Communications and Control (IJCCC) entered its 16th year of existence. The first issue of the sixteenth volume of IJCCC was planned to be a special one dedicated to pay a tribute to the exceptional work and results of Lotfi Zadech, a great scientist born in 1921, who in uenced an immense number of the scholars all over the world. That special issue
-
Multi-Objective Model to Improve Network Reliability Level under Limited Budget by Considering Selection of Facilities and Total Service Distance in Rescue Operations Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-05 Yiying Wang, Zeshui Xu, Florin Gheorghe Filip
Sudden disasters may damage facilities, transportation networks and other critical infrastructures, delay rescue and bring huge losses. Facility selection and reliable transportation network play an important role in emergency rescue. In this paper, the reliability level between two points in a network is defined from the point of view of minimal edge cut and path, respectively, and the equivalence
-
M-generalised q-neutrosophic extension of CoCoSo method Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-09 Zenonas Turskis, Romualdas Bausys, Florentin Smarandache, Giruta Kazakeviciute-Januskeviciene, Edmundas Kazimieras Zavadskas
Nowadays fuzzy approaches gain popularity to model multi-criteria decision making (MCDM) problems emerging in real-life applications. Modern modelling trends in this field include evaluation of the criteria information uncertainty and vagueness. Traditional neutrosophic sets are considered as the effective tool to express uncertainty of the information. However, in some cases, it cannot cover all recently
-
Romanian Language Technology – a view from an academic perspective Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-05 Dan Tufiș
The article reports on research and developments pursued by the Research Institute for Artificial Intelligence "Mihai Draganescu" of the Romanian Academy in order to narrow the gaps identified by the deep analysis on the European languages made by Meta-Net white papers and published by Springer in 2012. Except English, all the European languages needed significant research and development in order
-
Random Permutation Set Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-10 Yong Deng
For exploring the meaning of the power set in evidence theory, a possible explanation of power set is proposed from the view of Pascal’s triangle and combinatorial number. Here comes the question: what would happen if the combinatorial number is replaced by permutation number? To address this issue, a new kind of set, named as random permutation set (RPS), is proposed in this paper, which consists
-
Information Bottleneck in Deep Learning - A Semiotic Approach Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-09 Bogdan Musat, Razvan Andonie
The information bottleneck principle was recently proposed as a theory meant to explain some of the training dynamics of deep neural architectures. Via information plane analysis, patterns start to emerge in this framework, where two phases can be distinguished: fitting and compression. We take a step further and study the behaviour of the spatial entropy characterizing the layers of convolutional
-
Travel preference of bicycle-sharing users: A multi-granularity sequential pattern mining approach Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-11 Yu Zhou, Mengdie Zhang, Gang Kou, Yiming Li
Public bicycles are an indispensable part of green public transportation and are also a convenient and economical manner for the general public. In operation management, it is very important and imperative to understand the user demand and pattern of the public bicycle system. This paper took the public bicycle system in Hohhot as the research object, collected nearly 4 years of operating data, and
-
Performance Improvement of Low-Cost Iterative Learning-Based Fuzzy Control Systems for Tower Crane Systems Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-05 Radu-Emil Precup, Raul-Cristian Roman, Elena-Lorena Hedrea, Claudia-Adina Bojan-Dragos, Miruna-Maria Damian, Monica-Lavinia Nedelcea
This paper is dedicated to the memory of Prof. Ioan Dzitac, one of the fathers of this journal and its founding Editor-in-Chief till 2021. The paper addresses the performance improvement of three Single Input-Single Output (SISO) fuzzy control systems that control separately the positions of interest of tower crane systems, namely the cart position, the arm angular position and the payload position
-
Broadcast Guidance of Multi-Agent Systems Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-14 Ilana Segall, Alfred M. Bruckstein
We consider the emergent behavior of a group of mobile agents guided by an exogenous broadcast signal. The agents’ dynamics is modelled by single integrators and they are assumed oblivious to their own position, however they share a common orientation (i.e. they have compasses). The broadcast control, a desired velocity vector, is detected by arbitrary subgroups of agents,that upon receipt of the guidance
-
First Responders' Localization and Health Monitoring During Rescue Operations Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-10 Attila Simo, Simona Dzitac, Domnica Dzitac
Currently, first responders’ coordination and decision-making during res-cue, firefighting or police operations is performed via radio/GSM channels with some support of video streaming. In unknown premises, officers have no global situational awareness on operation status, which reduces coordination efficiency and increases decision making mistakes. This paper pro-poses a solution enabling the situational
-
Improve the design and testing of fuzzy systems with a set of (almost) simple rules Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-19 Horia-Nicolai Teodorescu
Prof. Dzitac used to say, ‘The mathematics of fuzzy systems is not fuzzy’. We discuss several limits and potential errors in the design of fuzzy logic systems and how they can be corrected or avoided. Examples from the literature are presented.
-
Segmentation Method of Magnetic Tile Surface Defects Based on Deep Learning Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2022-01-25 Yu An, Yinan Lu, Tieru Wu
Magnet tile is an essential part of various industrial motors, and its performance significantly affects the use of the motor. Various defects such as blowholes, break, cracks, fray, uneven, etc., may appear on the surface of the magnet tile. At present, most of these defects rely on manual visual inspection. To solve the problems of slow speed and low accuracy of segmentation of different defects
-
Threshold based Support Vector Machine Learning Algorithm for Sequential Patterns Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-16 S Imavathy, M. Chinnadurai
Now a days the pattern recognition is the major challenge in the field of data mining. The researchers focus on using data mining for wide variety of applications like market basket analysis, advertisement, and medical field etc., Here the transcriptional database is used for all the conventional algorithms, which is based on daily usage of object and/or performance of patients. Here the proposed research
-
Improving the Performance of Heterogeneous Network Systems in Machine Learning-based 5G Mobile Communication System Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-16 Yoon-Hwan Kim, Dae-Young Lee, Sang-Hyun Bae, Tae Yeun Kim
Mobile traffic, which has increased significantly with the emergence of Fourth generation longterm evolution (4G-LTE) communications and advances in video streaming services, is still currently increasing at an incredible pace. Fifth-generation (5G) mobile communication systems, which were developed to deal with such a drastic increase in mobile traffic, aim to achieve ultra-high-speed data transmission
-
Tversky Similarity based UnderSampling with Gaussian Kernelized Decision Stump Adaboost Algorithm for Imbalanced Medical Data Classification Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-16 M. Kamaladevi, V. Venkatraman
In recent years, imbalanced data classification are utilized in several domains including, detecting fraudulent activities in banking sector, disease prediction in healthcare sector and so on. To solve the Imbalanced classification problem at data level, strategy such as undersampling or oversampling are widely used. Sampling technique pose a challenge of significant information loss. The proposed
-
Fixed Point Theory in Fuzzy Normed Linear Spaces: A General View Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-19 Simona Dzitac, Horea Oros, Dan Deac, Sorin Nădăban
In this paper we have presented, firstly, an evolution of the concept of fuzzy normed linear spaces, different definitions, approaches as well as generalizations. A special section is dedicated to fuzzy Banach spaces. In the case of fuzzy normed linear spaces, researchers have been working, until now, with a definition of completeness inspired by M. Grabiec’s work in the context of fuzzy metric spaces
-
Exploring the Antecedents of Online Learning Satisfaction: Role of Flow and Comparison Between use Contexts Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-12-03 Quan Xiao, Xia Li
Learners’ satisfaction plays a critical role in the success of online learning platform. Many factors that affect online learning satisfaction have been addressed by previous studies. However, the mechanisms by which these factors are associated with online learning satisfaction are not sufficiently clear. Moreover, the difference in the antecedents of online learning satisfaction between two use contexts-
-
Failure in Stock Price Prediction: A Comparison bettwen the Curve-Shape-Feature and Non-Curve-Shape-Feature Modes of Existing Machine Learning Algorithms Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-12-03 Ping Zhang, Jia-Yao Yang, Hao Zhu, Yue-Jie Hou, Yi Liu, Chi-Chun Zhou
In the era of artificial intelligence, machine learning methods are successfully used in various fields. Machine learning has attracted extensive attention from investors in the financial market, especially in stock price prediction. However, one argument for the machine learning methods used in stock price prediction is that they are black-box models which are difficult to interpret. In this paper
-
Effect of Sample Sizes in Fingerprinting Database for Wi-Fi System Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-12-05 Ahmad Hakimi bin Ahmad Sa'ahiry, Abdul Halim Ismail, Latifah Munirah Kamaruddin, Mohd Sani Mohamad Hashim, Muhamad Safwan Muhamad Azmi, Muhammad Juhairi Aziz Satar, Masahiro Toyoura
Indoor positioning system has been an essential work to substitute the Global Positioning System (GPS). GPS utilizing Global Navigation Satellite Systems (GNSS) cannot provide an accurate positioning in the indoor due to the multipath effect and shadow fading. Fingerprinting method with Wi-Fi technology is a promising system to solve this issue. However, there are several problems with the fingerprinting
-
C2 Advanced Multi-domain Environment and Live Observation Technologies Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-09 Francisco José Pérez, Alberto García, Víctor J. Garrido, Manuel Esteve, Marcelo Zambrano
Nowadays, the free movement of people and goods within the European Union is one of the topical issues. Each member state and border practitioner exploits its own set of assets in their goal of border surveillance and control. States have invested significantly in these assets and infrastructures necessary to manage and control the transit in the border areas. As new capabilities and assets become
-
Cloud Computing Cloud Computing in Remote Sensing : High Performance Remote Sensing Data Processing in a Big data Environment Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-16 Yassine Sabri, Aouad Siham
Multi-area and multi-faceted remote sensing (SAR) datasets are widely used due to the increasing demand for accurate and up-to-date information on resources and the environment for regional and global monitoring. In general, the processing of RS data involves a complex multi-step processing sequence that includes several independent processing steps depending on the type of RS application. The processing
-
Neuro-inspired Framework for Cognitive Manufacturing Control Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-11-09 Ioan Dumitrache, Simona Iuliana Caramihai, Dragos Constantin Popescu, Mihnea Alexandru Moisescu, Ioan Stefan Sacala
There are currently certain categories of manufacturing enterprises whose structure, organization and operating context have an extremely high degree of complexity, especially due to the way in which their various components interact and influence each other. For them, a series of paradigms have been developed, including intelligent manufacturing, smart manufacturing, cognitive manufacturing; which
-
Video Streaming Service Identification on Software-Defined Networking Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-03 Luis Miguel Castañeda Herrera, Wilmar Yesid Campo-Muñoz, Alejandra Duque Torres
It is well known that video streaming is the major network traffic today. Futhermore, the traffic generated by video streaming is expected to increase exponentially. On the other hand, SoftwareDefined Networking (SDN) has been considered a viable solution to cope with the complexity and increasing network traffic due to its centralised control and programmability features. These features, however,
-
Verification of University Student and Graduate Data using Blockchain Technology Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-03 Yassynzhan Shakan, Bolatzhan Kumalakov, Galimkair Mutanov, Zhanl Mamykova, Yerlan Kistaubayev
Blockchain is a reliable and innovative technology that harnesses education and training through digital technologies. Nonetheless, it has been still an issue keeping track of student/graduate academic achievement and blockchain access rights management. Detailed information about academic performance within a certain period (semester) is not present in the official education documents. Furthermore
-
An Interactive Automation for Human Biliary Tree Diagnosis Using Computer Vision Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-03 Mohammad AL-Oudat, Saleh Alomari, Hazem Qattous, Mohammad Azzeh, Tariq AL-Munaizel
The biliary tree is a network of tubes that connects the liver to the gallbladder, an organ right beneath it. The bile duct is the major tube in the biliary tree. The dilatation of a bile duct is a key indicator for more major problems in the human body, such as stones and tumors, which are frequently caused by the pancreas or the papilla of vater. The detection of bile duct dilatation can be challenging
-
Multi Objective PSO with Passive Congregation for Load Balancing Problem Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-14 Mohammad Marufuzzaman, Muneed Anjum Timu, Jubayer Sarkar, Aminul Islam, Labonnah Farzana Rahman, Lariyah Mohd Sidek
High-level architecture (HLA) and Distributed Interactive Simulation (DIS) are commonly used for the distributed system. However, HLA suffers from a resource allocation problem and to solve this issue, optimization of load balancing is required. Efficient load balancing can minimize the simulation time of HLA and this optimization can be done using the multi-objective evolutionary algorithms (MOEA)
-
Deep Learning and Uniform LBP Histograms for Position Recognition of Elderly People with Privacy Preservation Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-16 Monia Hamdi, Heni Bouhamed, Abeer AlGarni, Hela Elmannai, Souham Meshoul
For the elderly population, falls are a vital health problem especially in the current context of home care for COVID-19 patients. Given the saturation of health structures, patients are quarantined, in order to prevent the spread of the disease. Therefore, it is highly desirable to have a dedicated monitoring system to adequately improve their independent living and significantly reduce assistance
-
Development and Analysis of Low-Cost IoT Sensors for Urban Environmental Monitoring Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-16 Ionut Muntean, George Dan Mois, Silviu Corneliu Folea
The accelerated pace of urbanization is having a major impact over the world’s environment. Although urban dwellers have higher living standards and can access better public services as compared to their rural counterparts, they are usually exposed to poor environmental conditions such as air pollution and noise. In order for municipalities and citizens to mitigate the negative effects of pollution
-
iEEG based Epileptic Seizure Detection using Reconstruction Independent Component Analysis and Long Short Term Memory Network Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-22 Praveena Hirald Dwaraka, Subhas C., Rama Naidu K.
In recent decades, an epileptic seizure is a neurological disorder, which is commonly detected from intracranial Electroencephalogram (iEEG) signals. However, the visual interpretation and inspection of iEEG signal is subjective variability, a time-consuming mechanism, slow and vulnerable to errors. In this research article, an automated epileptic seizure detection model is proposed to highlight the
-
Development of a Hybrid Algorithm for efficient Task Scheduling in Cloud Computing environment using Artificial Intelligence Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-10-04 Mohammed Yousuf Uddin, Hikmat Awad Abdeljaber, Tariq Ahamed Ahanger
Cloud computing is developing as a platform for next generation systems where users can pay as they use facilities of cloud computing like any other utilities. Cloud environment involves a set of virtual machines, which share the same computation facility and storage. Due to rapid rise in demand for cloud computing services several algorithms are being developed and experimented by the researchers
-
HABCSm: A Hamming Based t-way Strategy based on Hybrid Artificial Bee Colony for Variable Strength Test Sets Generation Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-10-04 Ammar Kareem Alazzawi, Helmi Md Rais, Shuib Basri, Yazan A. Alsariera, Luiz Fernando Capretz, Abdullahi Abubakar Imam, Abdullateef Oluwagbemiga Balogun
Search-based software engineering that involves the deployment of meta-heuristics in applicable software processes has been gaining wide attention. Recently, researchers have been advocating the adoption of meta-heuristic algorithms for t-way testing strategies (where t points the interaction strength among parameters). Although helpful, no single meta-heuristic based t-way strategy can claim dominance
-
Role of Modern Technologies and Internet of things in the field of Solid Waste Management Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-09-03 S.Godwin Barnabas, K.Arun vasantha Geethan, S.Valai Ganesh, S. Rajakarunakaran, P.Sabarish Kumar
The process of handling solid waste becomes complex and tedious due to the urbanization and industrialization of the most developing and developed countries. These solid waste issues if it is not addressed properly it affects ecosystem and environment. There is a possibility of many health-oriented issues especially during the pandemic period covid-19. Most of the human beings are struggling with respiratory
-
Novel Machine learning approach for Self-Aware prediction based on the Contextual reasoning Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-26 Andrius Daranda, Gintautas Dzemyda
Machine learning is compelling in solving various applied problems. Nevertheless, machine learning methods lack the contextual reasoning capabilities and cannot be fitted to utilize additional information about circumstances, environments, backgrounds, etc. Such information provides essential knowledge about possible reasons for particular actions. This knowledge could not be processed directly by
-
The Modeling of Interval-Valued Time Series Using Possibility Measure-Based Encoding-Decoding Mechanism Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-06 Zefeng Lv, Dan Shan, Xiaopeng Hu, Wei Lu
Interval-valued time series (ITS) is a collection of interval-valued data whose entires are ordered by time. The modeling of ITS is an ongoing issue pursued by many researchers. There are diverse ITS models showing better performance. This paper proposes a new ITS model using possibility measure-based encoding-decoding mechanism involved in fuzzy theory. The proposed model consists of four modules
-
Performance Evaluation of River Water Quality Monitoring Using Lora Connectivity with Fuzzy Algorithm Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-06 Doan Perdana, Julian Naufal, Ibnu Alinursafa
This study was proposed a river water quality monitoring application, connected by sensors such as pH, turbidity and Total Dissolved Solids (TDS) sensor to measure acidity, turbidity levels and amount of dissolved solids, respectively, as well as reduce bad effect of polluted river water. This river water quality monitoring tool was able to process input data from sensors using fuzzy algorithms and
-
A Semi Smart Adaptive Approach for Trash Classification Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-09 Faisal Alzyoud, Waleed Maqableh, Faiz Al Shrouf
Waste management and recycling play a crucial factor in world economy sustainability as they prevent the squander of useful materials which can lead in garbage landfill reduction and cost reduction respectively. Garbage sorting into different categories plays an important role in recycling and waste management; but unfortunately, most garbage sorting still depends on labor which has a reverse impact
-
Vehicle Speed Estimation Using Gaussian Mixture Model and Kalman Filter Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-30 Ahmed Abdulwahab Tayeb, Rabah Wasel Aldhaheri, Muhammad Shehzad Hanif
Many countries use traffic enforcement camera to monitor the speed limit and capture over speed violations. The main objective of such a system is to enforce the speed limits which results in the reduction of number of accidents, fatalities, and serious injuries. Traditionally, the task is carried out manually by the enforcement agencies with the help of specialized hardware such as radar and camera
-
Improved RBF Network Intrusion Detection Model Based on Edge Computing with Multi-algorithm Fusion Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-30 Xuejun Liu, Kaili Li, Wenhui Wang, Yong Yan, Yun Sha, Jianping Chen, Jiaojiao Qin
Edge computing is difficult to deploy a complete and reliable security strategy due to its distributed computing architecture and inherent heterogeneity of equipment and limited resources. When malicious attacks occur, the loss will be immeasurable. RBF neural network has strong nonlinear representation ability and fast learning convergence speed, which is suitable for intrusion detection of edge detection
-
Efficient Building Extraction for High Spatial Resolution Images Based on Dual Attention Network Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-07-30 Dandong Zhao, Haishi Zhao, Renchu Guan, Chen Yang
Building extraction with high spatial resolution images becomes an important research in the field of computer vision for urban-related applications. Due to the rich detailed information and complex texture features presented in high spatial resolution images, the distribution of buildings is non-proportional and their difference of scales is obvious. General methods often provide confusion results
-
Entropic Explanation of Power Set Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-08-13 Yutong Song, Yong Deng
A power set of a set S is defined as the set of all subsets of S, including set S itself and empty set, denoted as P(S) or 2S. Given a finite set S with |S|=n hypothesis, one property of power set is that the amount of subsets of S is |P(S)| = 2n. However, the physica meaning of power set needs exploration. To address this issue, a possible explanation of power set is proposed in this paper. A power
-
Secure Real-Time Computational Intelligence System Against Malicious QR Code Links Int. J. Comput. Commun. Control (IF 2.7) Pub Date : 2021-05-09 Heider A. M. Wahsheh, Mohammed S. Al-Zahrani
Web attackers aim to propagate malicious links using various techniques to deceive users. They attempt to control victims’ devices or obtain their passwords remotely, thereby acquiring access to bank accounts, financial transactions, or private and sensitive information they trade via the Internet. QR codes are accessible, free, easy to use, and can be scanned through several free apps on smartphones