- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 14, Issue 9, 2021
Recent Advances in Computer Science and Communications - Volume 14, Issue 9, 2021
Volume 14, Issue 9, 2021
-
-
An Optimized Software Defect Prediction Model Based on PSO - ANFIS
Authors: Misha Kakkar, Sarika Jain, Abhay Bansal and P.S. GroverIntroduction The Software defect prediction (SDP) model plays a very important role in today’s software industry. SDP models can provide either only a list of defect-prone classes as output or the number of defects present in each class. This output can then be used by quality assurance teams to effectively allocate limited resources for validating software products by putting more effort into these defect-prone classes. T Read More
-
-
-
The Impact of Varying Sinks on Load Distribution in IoT Routing Under Static and Mobile Scenarios
More LessBackground: The majority of routing algorithms proposed for IoT can be categorized under modifications in routing protocols designated for IoT such as RPL objective functions enhancements, while others are enhancements in routing algorithms derived from those which were designed for ad hoc networks. We have thoroughly investigated the literature on these modifications or enhancements. However, there is a lack of a Read More
-
-
-
Hybrid Model using Firefly and BBO for Feature Selection in Software Product Line
Authors: Hitesh Yadav, Rita Chhikara and Charan KumariBackground: Software Product Line is the group of multiple software systems that share a similar set of features with multiple variants. Feature model is used to capture and organize features used in different multiple organizations. Objective: The objective of this research article is to obtain an optimized subset of features capable of providing high performance. Methods: In order to achieve the desired objective, two method Read More
-
-
-
Comparative Analysis of Keyframe Extraction Techniques for Video Summarization
Authors: Vishal Parikh, Jay Mehta, Saumyaa Shah and Priyanka SharmaBackground: With technological advancement, the quality of life of people has improved. Also, with technological advancement, large amounts of data are produced by people. The data is in the forms of text, images and videos. Hence, there is a need for significant efforts and means of devising methodologies for analyzing and summarizing them to manage with the space constraints. Video summaries can be generated Read More
-
-
-
Sequential Model for Digital Image Contrast Enhancement
Authors: Monika Agarwal, Geeta Rani, Shilpy Agarwal and Vijaypal S. DhakaAims: The manuscript aims at designing and developing a model for optimum contrast enhancement of an input image. The output image of model ensures the minimum noise, the maximum brightness and the maximum entropy preservation. Objectives: * To determine an optimal value of threshold by using the concept of entropy maximization for segmentation of all types of low contrast images. * To minimize the problem Read More
-
-
-
Comparative Analysis of a Deep Learning Approach with Various Classification Techniques for Credit Score Computation
Authors: Arvind Pandey, Shipra Shukla and Krishna K. MohbeyBackground: Large financial companies are perpetually creating and updating customer scoring techniques. From a risk management view, this research for the predictive accuracy of probability is of vital importance than the traditional binary result of classification, i.e., noncredible and credible customers. The customer's default payment in Taiwan is explored for the case study. Objective: The aim is to audit the comparis Read More
-
-
-
Performance Analysis of various Front-end and Back End Amalgamations for Noise-robust DNN-based ASR
Authors: Mohit Dua, Pawandeep S. Sethi, Vinam Agrawal and Raghav ChawlaIntroduction: An Automatic Speech Recognition (ASR) system enables to recognize speech utterances and thus can be used to convert speech into text for various purposes. These systems are deployed in different environments such as clean or noisy and are used by all ages or types of people. These also present some of the major difficulties faced in the development of an ASR system. Thus, an ASR system needs to be efficient Read More
-
-
-
FSM based Intrusion Detection of Packet Dropping Attack using Trustworthy Watchdog Nodes
Authors: Radha R. Chandan and P.K MishraIntroduction: The proposed TWIST model aims to achieve a secure MANET by detecting and mitigating packet dropping attack using a finite state machine based IDS model. • To determine the trust values of the nodes using context-aware trust calculation • To select the trustworthy nodes as watchdog nodes for performing intrusion detection on the network • To detect and isolate the packet dropping attackers from routing ac Read More
-
-
-
Implementing the Kalman Filter Algorithm in Parallel Form: Denoising Sound Wave as a Case Study
Authors: Hazem H. Osman, Ismail A. Ismail, Ehab Morsy and Hamid M. HawidiBackground: Kalman filter and its variants had achieved great success in many applications in the field of technology. However, the kalman filter is under heavy computations burden. Under big data, it becomes pretty slow. On the other hand, the computer industry has now entered the multicore era with hardware computational capacity increased by adding more processors (cores) on one chip, the sequential processor Read More
-
-
-
A New Approach for Simplification of Logical Propositions with Two Propositional Variables Using Truth Tables
Authors: Maher Nabulsi, Nesreen Hamad and Sokyna AlqatawnehBackground: Propositions simplification is a classic topic in discrete mathematics that is applied in different areas of science such as program development and digital circuits design. Investigating alternative methods would assist in presenting different approaches that can be used to obtain better results. This paper proposes a new method to simplify any logical proposition with two propositional variables without using Read More
-
-
-
Securing Energy Routing Protocol Against Black Hole Attacks in Mobile Ad-Hoc Network
Authors: Rajendra P. P. and Shiva ShankarIntroduction: The aim of securing energy routing protocol was to provide the countermeasures to the attacks, particularly to the black hole in a mobile ad-hoc network, and enhancing the network performance metric throughput, also reducing the end-to-end delay between the nodes in the network. To build the protocol that enhances the performance of the network by modifying the existing DSR protocol and by introducing Read More
-
-
-
Improved Background Subtraction Technique for Detecting Moving Objects
More LessIntroduction: Moving object detection from videos is among the most difficult task in different areas of computer vision applications. Among the traditional object detection methods, researchers conclude that the Background Subtraction method performs better in aspects of execution time and output quality. Method: Visual background extractor is a renowned algorithm in the Background Subtraction method for detecting a Read More
-
-
-
Face Detection in Single and Multiple Images Using Different Skin Color Models
Authors: Manpreet Kaur, Jasdev Bhatti, Mohit K. Kakkar and Arun UpmanyuIntroduction: Face Detection is used in many different steams like video conferencing, human-computer interface, face detection, and in the database management of image. Therefore, the aim of our paper is to apply Red Green Blue (RGB) and Hue Saturation Value (HSV) color models in detecting the single, including multiple images of any face. Each color model HSV, Ycbcr and TSL are individually performed with the RG Read More
-
-
-
SVM Kernel and Genetic Feature Selection Based Automated Diagnosis of Breast Cancer
Authors: Indu Singh, Shashank Garg, Shivam Arora, Nikhil Arora and Kripali AgrawalBackground: Breast cancer is the development of a malignant tumor in the breast of human beings (especially females). If not detected at the initial stages, it can substantially lead to an inoperable construct. It is a reason for the majority of cancer-related deaths throughout the world. Objectives: The main aim of this study is to diagnose breast cancer at an early stage so that the required treatment can be provided for Read More
-
-
-
Optimal Feature Selection Methods for Chronic Kidney Disease Classification using Intelligent Optimization Algorithms
Authors: Jerlin R. Lambert and Eswaran PerumalAim: The classification of medical data gives more importance to identify the existence of the disease. Background: Numerous classification algorithms for chronic kidney disease (CKD) are developed that produce better classification results. But, the inclusion of different factors in the identification of CKD reduces the effectiveness of the employed classification algorithm. Objective: To overcome this issue, feature selec Read More
-
-
-
A DCT Fractional Bit Replacement Based Dual Watermarking Algorithm for Image Authentication
Authors: Rahul Dixit, Amita Nandal, Arvind Dhaka, Yohan V. Kuriakose and Vardan AgarwalAbstract: Watermarking is a process of embedding a message inside a digital signal like an image, video, or text. It is used for several key reasons such as authenticity verification, ownership recognition and hidden communication. In this paper, we discuss image watermarking, where secret messages are stored in images. Introduction: We propose a dual watermarking approach, which is based on Discrete Cosine Transform, Read More
-
-
-
Communication Cost Aware Resource Efficient Load Balancing (CARELB) Framework for Cloud Datacenter
Authors: Deepika Saxena and Ashutosh K. SinghBackground: Load balancing of communication-intensive applications, allowing efficient resource utilization and minimization of power consumption, is a challenging multi-objective virtual machine (VM) placement problem. The communication among inter-dependent VMs, raises network traffic, hampers cloud client’s experience and degrades overall performance by saturating the network. Introduction: Cloud co Read More
-
-
-
Energy Adaptive and Max-Min based BFS Model for Route Optimization in Sensor Network
By Kapil JunejaBackground: The restricted energy and network life is a critical issue in the real-time sensor network. The occurrence of low-energy and faulty intermediate nodes can increase communication failure. The number of intermediate nodes affects the number of re-transmission, communication-failures, and increases the energy consumption on the routing path. The existing protocols take the greedy decision on Read More
-
-
-
RCSA Protocol with Rayleigh Channel Fading in Massive-MIMO System
Authors: Umesha G. Basavaiah and Mysore N. S. SwamyIntroduction: Massive MIMO is a process where cellular BSs comprise a large number of antennas. In this study, the focus is to develop end-to-end massive-MIMO system under the Rayleigh channel fading effect. Also, it includes both inter-channel interference and the intra-channel interference in an m-MIMO network system. Methodology: The main aim of this research is to increase the throughput and network capacity and opti Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
