- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 15, Issue 5, 2022
Recent Advances in Computer Science and Communications - Volume 15, Issue 5, 2022
Volume 15, Issue 5, 2022
-
-
A Rapid Transition from Subversion to Git: Time, Space, Branching, Merging, Offline Commits & Offline builds and Repository Aspects
Authors: Alok Aggarwal, Vinay Singh and Narendra KumarBackground: Software development is the transition from centralized to decentralized version control systems. This transition is driven by the limited features of centralized version control systems in terms of branching, merging, time, space, offline commits & builds and repository aspects. Transition from Subversion; a centralized version control system, to Git; a decentralized version control system has been focused in a li Read More
-
-
-
Part-of-Speech Tagging for Arabic Text using Particle Swarm Optimization and Genetic Algorithm
Authors: Ahmad T. Al-Taani and Fadi A. ALkhazaalehBackground: Part of Speech (POS) Tagging is a process of defining a suitable part of speech for each word in the given context such as defining if a word is a verb, a noun or a particle. POS tagging is an important preprocessing step in many Natural Language Processing (NLP) applications such as question answering, text summarization, and information retrieval. Objectives: The performance of NLP applications depends on the Read More
-
-
-
Towards a Shift in Regression Test Suite Development Approach in Agile
Authors: Sarika Sharma and Deepak KumarObjectives: From the literature review, it is evident that the concept of “regression testing” inherited in agile software testing originates from software maintenance practices. Therefore, the existing algorithms for regression testing revolve around software maintenance principles rather than agile methodology. This paper aims to evaluate the degree of fitness of the existing regression test-suite development algorithms f Read More
-
-
-
Software Reliability Growth Model with Rate of Change in Application Characteristics
Authors: Prarna Mehta, Himanshu Sharma and Abhishek TandonBackground: There has been continuous advancement in technologies for the past few decades by incorporating new features in accordance with the market demand. The evolution of software projects/applications has an intricated debugging process by generating numerous faults in it. Objectives: In this study, an attempt is made to develop a software reliability growth model (SRGM) taking into account the software proj Read More
-
-
-
An Integrated Approach of Proposed Pruning Based Feature Selection Technique (PBFST) for Phishing E-mail Detection
Authors: Hari S. Hota, Dinesh Sharma and Akhilesh ShrivasBackground: The entire world is shifting towards electronic communication through Email for fast and secure communication. Millions of people, including organization, government, and others, are using Email services. This growing number of Email users are facing problems; therefore, detecting phishing Email is a challenging task, especially for non-IT users. Automatic detection of phishing Email is essential to deploy al Read More
-
-
-
An Ensemble of Bacterial Foraging, Genetic, Ant Colony and Particle Swarm Approach EB-GAP: A Load Balancing Approach in Cloud Computing
Authors: Bhupesh K. Dewangan, Anurag Jain, Ram Narayan Shukla and Tanupriya ChoudhuryBackground: In the cloud environment, the satisfaction of service level agreement (SLA) is the prime objective. It can be achieved by providing services in a minimum time in an efficient manner at the lowest cost by efficiently utilizing the resources. This will create a win-win situation for both consumers and service providers. Through literature analysis, it has been found that the procedure of resource optimization is quit Read More
-
-
-
Computation of Improved Searls Estimation of Population Variance Using Robust Auxiliary Parameters
Authors: S. K. Yadav, Dinesh K. Sharma and Julius A. AladeVariation is an inherent phenomenon, whether in natural things or man-made. Thus, it seems essential to estimate this variation. Various authors have worked in the direction of improved estimation of population variance utilizing the known auxiliary parameters for better policymaking. Methods: In this article, a new Searls ratio type class of estimator is suggested for elevated estimation of population variance of the mai Read More
-
-
-
Remaining Useful Life Prediction of Lithium-ion Batteries Using Multiple Kernel Extreme Learning Machine
By Renxiong LiuObjective: Lithium-ion batteries are important components used in electric automobiles (EVs), fuel cell EVs and other hybrid EVs. Therefore, it is greatly important to discover its remaining useful life (RUL). Methods: In this paper, a battery RUL prediction approach using multiple kernel extreme learning machine (MKELM) is presented. The MKELM’s kernel keeps diversified by consisting of multiple kernel functions includi Read More
-
-
-
An Analog Circuit Fault Diagnosis Approach Based on Wavelet-based Fractal Analysis and Multiple Kernel SVM
More LessObjectives: In order to diagnose the analog circuit fault correctly, an analog circuit fault diagnosis approach on the basis of wavelet-based fractal analysis and multiple kernel support vector machine (MKSVM) is presented in the paper. Methods: Time responses of the circuit under different faults are measured, and then the wavelet-based fractal analysis is used to process the collected time responses for the purpose of gen Read More
-
-
-
Research on Monitoring System of Daily Statistical Indexes Through Big Data
By ShengLi HuObjectives: By constructing a monitoring system, the dynamic monitoring of various statistical indexes is realized, and scientific evaluation is carried out at the same time, so as to promote the rational allocation of medical resources in hospitals and facilitate management. Methods: Starting from the design of the monitoring system database and main functions, the development of the monitoring system is initiated through index Read More
-
-
-
Key Issues in Software Reliability Growth Models
Authors: Md. A. Haque and Nesar AhmadBackground: Software Reliability Growth Models (SRGMs) are the most widely used mathematical models to monitor, predict and assess the software reliability. They play an important role in industries to estimate the release time of a software product. Since 1970s, researchers have suggested a large number of SRGMs to forecast software reliability based on certain assumptions. They all have explained how the syste Read More
-
-
-
A Study on E-Learning and Recommendation System
Authors: A Madhavi, A Nagesh and A GovardhanIntroduction: Today, technology and internet both are proliferating due to which information access is becoming easier, and is creating new challenges and opportunities in all fields, especially when working in the field of education. For example, the e-learning education system can be personalized in order to acquire knowledge level and learner’s requirements in a learning process. The learning experience, as per the i Read More
-
-
-
A CMT Device for Electrical Energy Meter Detection
Authors: Zhi Zeng and Yongfu ZhouBackground: Detection technology is a product development technique that serves as a basis for quality assurance. As electric energy meters (EEMs) are measurement instruments whose use is mandatory in several nations, their accuracy, which directly depends on their reliability and proper functioning, is paramount. In this study, to eliminate electromagnetic interference, a device is developed for testing a set of EEM Read More
-
-
-
Container Elasticity: Based on Response Time using Docker
Authors: Mahendra P. Yadav, Harishchandra A. Akarte and Dharmendra Kumar YadavObjectives: Cloud computing is an approach to provide the computing resources (machine) to end-users for running their application over the Internet. The computing resources consist of various things (e.g. RAM, Memory, CORE, etc.). These resources are allocated to an application without human intervention for managing the fluctuating workload. To manage the real-time fluctuating workload, cloud providers use V Read More
-
-
-
ASMA: An Advanced Secure Messaging Application
Authors: Ankur Gupta, Purnendu Prabhat and Arun SharmaBackground: User-generated digital content, typically from mobile devices, can be of a personal nature. There have been several instances in which this personal content, including but not limited to, photographs, videos, messages and personal information, has been misused by the recipients. The misuse has ranged from violating privacy through unauthorized sharing to manipulating/ modifying the original content and finally f Read More
-
-
-
Efficient Vessel Segmentation Based on Proposed Adaptive Conditional Random Field Model
Authors: Laxmi Math and Ruksar FatimaObjectives: The objective is to provide a precise segmentation technique based on ACRF, which can handle the variations between major and minor vessels and reduce the interference present in the model due to overfitting and can provide a high-quality reconstructed image. Therefore, a robust method with statistical properties needs to be presented to enhance the performance of the model. Moreover, a statistical frame Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
