- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 15, Issue 3, 2022
Recent Advances in Computer Science and Communications - Volume 15, Issue 3, 2022
Volume 15, Issue 3, 2022
-
-
Simulation and Emulation Tools for Fog Computing
Authors: Simar P. Singh, Rajesh Kumar, Anju Sharma, S. Raji Reddy and Priyanka VashishtBackground: Fog computing paradigm has recently emerged and gained increasing attention in the present era of the Internet of Things. The growth of a large number of devices all around, leads to the situation of the flow of packets everywhere on the Internet. To overcome this situation and to provide computations at network edge, fog computing is the need of the present time that enhances traffic management and av Read More
-
-
-
A Comprehensive Survey on Grey Wolf Optimization
Authors: Isha Sharma, Vijay Kumar and Sanjeewani SharmaGrey wolf optimizer is a recently developed metaheuristic algorithm that mimics hunting and social behaviour. It has been applied in most of the engineering design problems. Grey wolf optimizer and its variants have been effectively used to solve real-life applications. For some complex problems, a grey wolf optimizer has been hybridized with other metaheuristics. This paper summarizes the overview of the grey wolf op Read More
-
-
-
Hybrid Dragonfly and Pattern Search Algorithm Applied to Dynamic Economic Dispatch Problem
Authors: Arun K. Sahoo, Tapas Kumar Panigrahi, Gopal Krishna Nayak and Aurobinda BeheraBackground: In this paper, a novel hybridisation of the dragonfly algorithm (DFA) with the pattern search (PS) algorithm is applied to the dynamic economic dispatch (DED) problem. The DED problem is non-convex, non-linear, and non-smooth and considering practical constraints such as the loading effect of the valve point and ramp rate limits. The conventional DFA is stuck in the local optima and converges prematurely. Intr Read More
-
-
-
Task Scheduling in Cloud Using ACO
Authors: Yuvaraj Natarajan, Srihari Kannan and Gaurav DhimanBackground: Cloud computing is a multi-tenant model for computation that offers various features for computing and storage based on user demand. With increasing cloud users, the usage increases that highlights the problem of load balancing with limited resource availability based on dynamic cloud environment. In such cases, task scheduling creates fundamental issue in cloud environment. Introduction: Certain probl Read More
-
-
-
A Study of Cognitive Radio Sensing Techniques for Optimum Spectrum Utilization
Authors: Darwin N. A. and Inbamalar T.M.Background: The spectrum scarcity plays a vital role in wireless communications. We are in the situation to use it through an efficient methodology. Objective: To identify the holes in the spectrum through an efficient spectrum sensing technique and to allocate the bands to the unlicensed users (Secondary Users - SU). Methods: It has been proposed to make a comparative study among the existing spectrum sensing methods bas Read More
-
-
-
Stock Market Prediction Based on Technical-Deviation-ROC Indicators Using Stock and Feeds Data
Authors: Deepika N. and P. V. PaulBackground: The attempt of this research is to propose a novel approach for the efficient prediction of stock prices. The scope of this research extends by including the feature of sentiment analysis using the emotions and opinions carried by social media platforms. The research also analyzes the impact of social media, feeds data and Technical indicators on stock prices for the design of the prediction model. Objectiv Read More
-
-
-
Research on Medical Multi-Source Data Fusion Based on Big Data
By ShengLi HuObjectives: The uniform data standard system is built to realize the interconnection between the heterogeneous information systems in hospitals and to solve the problem of data island. Methods: The establishment of the integration platform is started from the aspects such as the establishment of integration platform model, design of platform architecture and data interaction process, promotion of standardization Read More
-
-
-
Mobile Ad Hoc Network Security Using Mean Field Game Theoretic Threshold-Based Scheme
More LessBackground: Mobile Ad hoc Networks (MANET’s) have recently attracted attention as it is independent of any pre-existing network infrastructure or centralized administration. Security in MANET’s thus becomes a major concern due to its open and dynamic architecture. Objectives: We have introduced a dynamic mean field game theoretic approach to enable an individual node in MANETs to make strategic security defense d Read More
-
-
-
Pathological Analysis of Blood Cells Using Deep Learning Techniques
Authors: Virender Ranga, Shivam Gupta, Priyansh Agrawal and Jyoti MeenaIntroduction: Pathologists are majorly concerned with detecting the diseases and helping the patients in their healthcare and well-being. The present method used by pathologists for this purpose is manually viewing the slides using a microscope and other instruments. However, this method has a number of limitations such as there is no standard way of diagnosis, there are certain chances of human errors and besid Read More
-
-
-
Improving Arabic Text Classification Using P-Stemmer
Authors: Tarek Kanan, Bilal Hawashin, Shadi Alzubi, Eyad Almaita, Ahmad Alkhatib, Khulood A. Maria and Mohammed ElbesIntroduction: Stemming is an important preprocessing step in text classification, and could contribute to increasing text classification accuracy. Although many works have proposed stemmers for the English language, few stemmers have been proposed for Arabic text. Arabic language has gained increasing attention in the previous decades and the need to further improve Arabic text classification. Methods: This work comb Read More
-
-
-
An Enhanced Approach for Number Plate Detection and Recognition
Authors: Diksha Kurchaniya, Mohd. A. Ansari and Durga PatelIntroduction: The number of vehicles is increasing day by day in our life. The vehicle may violate traffic rules and cause accidents. The Automatic Number Plate Detection System (ANPR) plays a significant role to identify these vehicles. Number plate detection is very difficult sometimes because each country has its own format for representing the number plate and font types and sizes may also vary for different vehicle Read More
-
-
-
Plant Leaf Classification using Convolutional Neural Network
Authors: Nidhi and Jay K.P.S. YadavIntroduction: Convolutional Neural Network (CNNet) has proven the indispensable system in order to perform the recognition and classification tasks in different computer vision applications. The purpose of this study was to exploit the marvelous learning ability of CNNet in the image classification field. Methods: In order to circumvent the overfitting issues and to enhance the generalization potential of the proposed FL Read More
-
-
-
Performance Analysis of Hybrid Protocol Under Distributed Denial of Service Attack in Remote Healthcare Systems
Authors: Ashu Gautam, Rashima Mahajan and Sherin ZafarIntroduction: The future of healthcare systems relies on faster communication between sensors and smart devices, which can assist in making decisions for the betterment of patients. The responsiveness of the wireless health care system in case of medical urgencies is a crucial factor for the survival of patient’s life. The routing protocol of infrastructure-less based plays a key role in sending the information in such medical Read More
-
-
-
Prediction of Cardiovascular Risk Using Extreme Learning Machine-Tree Classifier on Apache Spark Cluster
Authors: Jaya L. A, Venkatramaphanikumar S. and Venkata K. K. KolliBackground: Currently, Machine Learning (ML) is considered a popular and important area in diverse fields of science and technology, image processing, automobiles, banking, finance, health care sector, etc. The easy availability of data and rapid improvements over machine learning techniques have made it more feasible to understand and to work on various channels of real-time health analytics. Methods: In this pap Read More
-
-
-
The Fuzzy AHP Based Intelligent Middleware for Load Balancing in Grid Computing Environment
Authors: Sunita Yadav and Jay Kant Pratap Singh YadavBackground: In grid computing, several computing nodes work together to accomplish a common goal. During computation some nodes get overloaded and some nodes remain idle without any job, which degrades the overall grid performance. For better resource utilization, the load balancing strategy of a grid must be improved. Objective: A good load balancing strategy intelligently perceives grid information and fin Read More
-
-
-
Comparative Analysis of Machine Learning Techniques Using Predictive Modeling
Authors: Ritu Khandelwal, Hemlata Goyal and Rajveer S. ShekhawatIntroduction: Machine learning is an intelligent technology that works as a bridge between businesses and data science. With the involvement of data science, the business goal focuses on findings to get valuable insights on available data. The large part of Indian Cinema is Bollywood, which is a multi-million dollar industry. This paper attempts to predict whether the upcoming Bollywood Movie would be Blockbuster, Superhit, Hit Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
