Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118097
Yubin Guo, Yuhang Wu, Xiaopeng Zhang, Aofeng Bo, Ximing Li
Clustering algorithm is one of the most popular unsupervised algorithms for data grouping. The K-means algorithm is a popular clustering algorithm for its simplicity, ease of implementation and eff...
{"title":"The FRCK clustering algorithm for determining cluster number and removing outliers automatically","authors":"Yubin Guo, Yuhang Wu, Xiaopeng Zhang, Aofeng Bo, Ximing Li","doi":"10.1504/ijcse.2021.118097","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118097","url":null,"abstract":"Clustering algorithm is one of the most popular unsupervised algorithms for data grouping. The K-means algorithm is a popular clustering algorithm for its simplicity, ease of implementation and eff...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"219 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127325287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118090
Yongxuan Sang, Zhongwen Li, Tien-Hsiung Weng, Bo Wang
Task scheduling is one of the key techniques for effective and reliable resource usage in cloud computing. In this paper, we designed a hybrid heuristic scheduling that employed particle swarm opti...
{"title":"A hybrid heuristic algorithm for optimising SLA satisfaction in cloud computing","authors":"Yongxuan Sang, Zhongwen Li, Tien-Hsiung Weng, Bo Wang","doi":"10.1504/ijcse.2021.118090","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118090","url":null,"abstract":"Task scheduling is one of the key techniques for effective and reliable resource usage in cloud computing. In this paper, we designed a hybrid heuristic scheduling that employed particle swarm opti...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130312507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118108
Jiachang Xu, Yourui Huang, R. Zhao, Yu Liu
For the attitude control of unmanned helicopters used in the intelligent patrolling of coal mines, a spiking neural membrane system is introduced for attitude optimisation control. First, a geometr...
{"title":"Attitude control of an unmanned patrol helicopter based on an optimised spiking neural membrane system for use in coal mines","authors":"Jiachang Xu, Yourui Huang, R. Zhao, Yu Liu","doi":"10.1504/ijcse.2021.118108","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118108","url":null,"abstract":"For the attitude control of unmanned helicopters used in the intelligent patrolling of coal mines, a spiking neural membrane system is introduced for attitude optimisation control. First, a geometr...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118086
Ajay K. Gupta, Udai Shanker
Earlier mobile client cache invalidation-replacement policies used in the location-based information system are not appropriate if the path for the client movement is changing rapidly. Further, pre...
{"title":"CEMP-IR: a novel location aware cache invalidation and replacement policy","authors":"Ajay K. Gupta, Udai Shanker","doi":"10.1504/ijcse.2021.118086","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118086","url":null,"abstract":"Earlier mobile client cache invalidation-replacement policies used in the location-based information system are not appropriate if the path for the client movement is changing rapidly. Further, pre...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125994507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118096
Mahfuzulhoq Chowdhury
The traditional cloud empowered vehicular networks cannot adequately meet the very low-latency prerequisites of real-time vehicular applications due to the absence of a suitable resource allocation...
由于缺乏合适的资源分配,传统的云车辆网络无法充分满足实时车辆应用的低延迟先决条件……
{"title":"Cost-effective and mobility-aware cooperative resource allocation framework for vehicular service delivery in the vehicular cloud networks","authors":"Mahfuzulhoq Chowdhury","doi":"10.1504/ijcse.2021.118096","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118096","url":null,"abstract":"The traditional cloud empowered vehicular networks cannot adequately meet the very low-latency prerequisites of real-time vehicular applications due to the absence of a suitable resource allocation...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"62 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132836565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118098
J. Zhang, Junhong Feng, Xiani Yang, Jianming Liu
There are a wide range of genes in single-cell data, but some are not beneficial to classification. In order to eliminate these redundant genes and select beneficial genes, this study first utilise...
{"title":"Gene selection and classification combining information gain ratio with fruit fly optimisation algorithm for single-cell RNA-seq data","authors":"J. Zhang, Junhong Feng, Xiani Yang, Jianming Liu","doi":"10.1504/ijcse.2021.118098","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118098","url":null,"abstract":"There are a wide range of genes in single-cell data, but some are not beneficial to classification. In order to eliminate these redundant genes and select beneficial genes, this study first utilise...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118094
Debadrita Panda, Debashis Das Chakladar, Tirthankar Dasgupta
Emotion detection using electroencephalogram (EEG) signals has gained widespread acceptance in consumer preference study. It has been observed that emotion classification using brain signals has gr...
{"title":"Prediction of consumer preference for the bottom of the pyramid using EEG-based deep model","authors":"Debadrita Panda, Debashis Das Chakladar, Tirthankar Dasgupta","doi":"10.1504/ijcse.2021.118094","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118094","url":null,"abstract":"Emotion detection using electroencephalogram (EEG) signals has gained widespread acceptance in consumer preference study. It has been observed that emotion classification using brain signals has gr...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118102
Shirole Rashmi PrakashRao, K. Jyothi
Data transfer over the internet is a very common process and security of this data is everyone's responsibility. Many techniques are available to secure such confidential data. Among them, cryptogr...
{"title":"A novel audio steganography technique integrated with a symmetric cryptography: a protection mechanism for secure data outsourcing","authors":"Shirole Rashmi PrakashRao, K. Jyothi","doi":"10.1504/ijcse.2021.118102","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118102","url":null,"abstract":"Data transfer over the internet is a very common process and security of this data is everyone's responsibility. Many techniques are available to secure such confidential data. Among them, cryptogr...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118100
W. Farag
In this paper, a real-time road-object detection and tracking (LR_ODT) method for autonomous driving is proposed. The method is based on the fusion of lidar and radar measurement data, where they a...
{"title":"Real-time lidar and radar fusion for road-objects detection and tracking","authors":"W. Farag","doi":"10.1504/ijcse.2021.118100","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118100","url":null,"abstract":"In this paper, a real-time road-object detection and tracking (LR_ODT) method for autonomous driving is proposed. The method is based on the fusion of lidar and radar measurement data, where they a...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134103663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1504/ijcse.2021.118099
Upendra Verma, Diwakar Bhardwaj
Internet of things (IoT) devices may be easily compromised and incapable of defending and securing themselves due to resource constrained nature. Hence, the integration of devices with resource ric...
由于资源的有限性,物联网设备很容易受到攻击,无法进行自我防御和保护。因此,设备与资源的整合…
{"title":"ECC-based lightweight mutual authentication protocol for fog enabled IoT system using three-way authentication procedure","authors":"Upendra Verma, Diwakar Bhardwaj","doi":"10.1504/ijcse.2021.118099","DOIUrl":"https://doi.org/10.1504/ijcse.2021.118099","url":null,"abstract":"Internet of things (IoT) devices may be easily compromised and incapable of defending and securing themselves due to resource constrained nature. Hence, the integration of devices with resource ric...","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}