- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 14, Issue 5, 2021
Recent Advances in Computer Science and Communications - Volume 14, Issue 5, 2021
Volume 14, Issue 5, 2021
-
-
Mathura (MBI) - A Novel Imputation Measure for Imputation of Missing Values in Medical Datasets
Authors: B. M. Bai, N. Mangathayaru, B. Padmaja Rani and Shadi AljawarnehAims: Propose an imputation measure for filling missing data values so as to make the incomplete medical datasets as complete datasets. Apply this imputation measure on imputed datasets to achieve improved classifier accuracies. Objective: The basic intention of the present study is to present an imputation measure to find the proximity between medical records and an approach for imputation of missing values in med Read More
-
-
-
Email Fraud Attack Detection Using Hybrid Machine Learning Approach
Authors: Yousef A. Yaseen, Malik Qasaimeh, Raad S. Al-Qassas and Mustafa Al-FayoumiBackground: E-mail is an efficient way to communicate. It is one of the most commonly used communication methods, and it can be used for achieving legitimate and illegitimate activities. Many features that can be effective in detecting email fraud attacks, are still under investigation. Methods: This paper proposes an improved classification accuracy for fraudulent emails that is implemented through feature extraction Read More
-
-
-
Intrusion Detection System for Malicious Traffic Using Evolutionary Search Algorithm
Authors: Samar Al-Saqqa, Mustafa Al-Fayoumi and Malik QasaimehIntroduction: Intrusion detection systems play a key role in system security by identifying potential attacks and giving appropriate responses. As new attacks are always emerging, intrusion detection systems must adapt to these attacks, and more work is continuously needed to develop and propose new methods and techniques that can improve efficient and effective adaptive intrusion systems. Feature selection is one of th Read More
-
-
-
An Optimized Classification of Apps Reviews for Improving Requirement Engineering
Authors: M.P.S. Bhatia, Akshi Kumar and Rohit BeniwalBackground: The App Stores, for example, Google Play and Apple Play Store provide a platform that allows users to provide feedback on the apps in the form of reviews. An app review typically includes star rating followed by a comment. Recent studies have shown that these reviews possess a vital source of information that can be used by the app developers and the vendors for improving the future versions of an app. Howeve Read More
-
-
-
Decision Making Using Machine Learning Based Opinion Prediction Model for Smart Governance
Authors: Akshi Kumar and Abhilasha SharmaBackground: Decision making requires a rigorous process of evaluation, which is an analytical and organized process to figure out the present positive influences, favourable future prospects, existing shortcomings and ulterior complexities of any plan, program, practice or a polity. Evaluation of policy is an essential and vital process required to measure the performance or progression of the scheme. The main purp Read More
-
-
-
A Secure Framework to Preserve Privacy of Biometric Templates on Cloud Using Deep Learning
Authors: Shefali Arora and M.P.S. BhatiaIntroduction: Cloud computing involves the use of maximum remote services through a network using minimum resources via internet. There are various issues associated with cloud computing, such as privacy, security and reliability. Due to rapidly increasing information on the cloud, it is important to ensure security of user information. Biometric template security over cloud is one such concern. Leakage of unprotected bi Read More
-
-
-
Effects of the Dynamic and Energy Based Feature Extraction on Hindi Speech Recognition
Authors: Shobha Bhatt, Amita Dev and Anurag JainBackground: Speech Recognition is the most effective and suitable way of communication. Extracted features play an important role in speech recognition. Previous research works for Hindi speech recognition lack detailed comparative analysis of the feature extraction methods using dynamic and energy parameters. Objective: The research work presents experimental work done to explore the effects of integrating d Read More
-
-
-
Identification of Key Nodes in Distributed Access Control Model
Authors: Fangbo Cai, Jingsha He, Song Han and Wenxin LiBackground: With the complexity of the network structure and the diversity of access, the access control model of distributed permissions management came into being. Aims: The central idea of the model is to store the access permissions of all nodes in the model to the network nodes covered by the access control model, and let the neighboring nodes act as access control agents. That is, each node in the model Read More
-
-
-
A Study of Malware Propagation Dynamics in Wireless Sensor Network Using Spatially Correlated Security Model
Authors: Satya R. Biswal and Santosh K. SwainBackground: The paper discussed about the malware propagation dynamics in wireless sensor network. Malware attack is harmful for network stability as well as battery consumption of sensor nodes. Objective: The objective of proposed study is to develop a model that describes the dynamic propagation behavior of malware in wireless sensor network and suggest corrective measure through which breakout from the Read More
-
-
-
An Intelligent Ranking Model for Multi-Criteria Decision Making Using Fuzzy Matrix Method
Authors: Naveen Dahiya and Pardeep SangwanBackground: In daily life, one may encounter several problems whose solution is based on the consideration of several criteria altogether. To generate a solution for such problems is, in fact, a complex task. If one generates a solution, then there is no guarantee that the solution is optimal. It is really challenging to take into account all the criteria at the same time and generate a solution that is optimal. Several techniques h Read More
-
-
-
Bayesian Spam Detection Framework on Mobile Device
Authors: Yitao Yang, Guozi Sun and Chengyan QiuBackground: The spam message aimed at mobile devices has become a prevalent activity in recent years. About 76% of mobile users received spam messages of Ads, fraud messages and phishing links. It has led to a significant financial loss of 91.5 billion Yuan per year and this problem will be more severe in the coming future. Although the operators are making much effort against spam message, the number of spams are Read More
-
-
-
Movie Recommendation to Friends Using Whale Optimization Algorithm
Authors: Sachin Papneja, Kapil Sharma and Nitesh KhilwaniBackground: Recent advances in the World Wide Web and semantic networks have amplified social networking platforms, where the users share their photos, hobbies, location, interests, and experiences such as movie or restaurants. Social media platforms such as Facebook, twitter and LinkedIn are used to recommend the users the things of their interests such as movie, food, locations and friends. Objective: A novel me Read More
-
-
-
An Automatic Question Generation System Using Rule-Based Approach in Bloom’s Taxonomy
Authors: Deena Gnanasekaran, Raja Kothandaraman and Kannan KaliyanBackground: In this competing era, education has become part of everyday life. The process of imparting the knowledge to the learner through education is the core idea in the Teaching- Learning Process (TLP). An assessment is one way to identify the learner’s weak spot in the area under discussion. An assessment question has higher preferences in judging the learner's skill. In manual preparation, the questions are not as Read More
-
-
-
Genes Expression Classification Through Histone Modification Using Temporal Neural Network
Authors: Rajit Nair and Amit BhagatBackground: Genes expression is high dimensional data, so it is very difficult to classify high dimensional data through traditional machine learning approaches. In this work we have proposed a model based on combined approach of Convolutional Neural Network and Recurrent Neural Network, both belong to deep learning model. The prediction has shown improved result than other machine learning algorithms. Expressions are Read More
-
-
-
BlockChain Based Combinatorial Grouping Auction with Reserve Price Mechanism in Cloud Computing
Background: The block-chain is a growing decentralized scheme applied in many applications, such as an auction, smart contract, Health, and banking sector. The cloud service providers can sell the resource to cloud consumers using an auction. The main challenge in resource allocation using auction is to provide reliability to the users. Methods: In this paper, a blockchain-based combinatorial grouping auction with a reser Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
