Computing Journal Articles
Recent Submissions
-
Using vector agents to implement an unsupervised image classification algorithm
(MDPI (Multidisciplinary Digital Publishing Institute), 2021-12-02)Unsupervised image classification methods conventionally use the spatial information of pixels to reduce the effect of speckled noise in the classified map. To extract this spatial information, they employ a predefined ... -
An approach to interesting objects detection in low quality image sequences for fisheries management
(World Scientific and Engineering Academy and Society (WSEAS), 2015)In order to extract interest objects in low quality image sequences from fisheries management, this paper proposes a new significant feature extraction method based on cascade framework. This algorithm involves pre processing ... -
A fuzzy recurrent neural network for driver fatigue detection based on steering-wheel angle sensor data
(SAGE Publications, 2019-08-01)The study of the robust fatigue feature learning method for the driver’s operational behavior is of great significance for improving the performance of the real-time detection system for driver’s fatigue state. Aiming at ... -
A comprehensive review of deep learning algorithms
(Unitec ePress, 2021-11-26)Deep learning algorithms are a subset of machine learning algorithms that aim to explore several levels of the distributed representations from the input data. Recently, many deep learning algorithms have been proposed to ... -
Human biometric traits : a systematic review focusing on vascular patterns
(Unitec ePress, 2020-12-10)Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. ... -
Measuring e-government development : the haves and the have-nots
(IBIMA Publishing, 2020-08-17)Since 2003, the United Nations Department of Economic and Social Affairs (UNDESA) continued to measure the e-government development across the world using a range of indices. The UNDESA produces a biannual report that ranks ... -
Evaluating encryption algorithms for sensitive data using different storage devices
(Hindawi, 2020-05-20)Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise ... -
The impact of human shadowing/movement on performance of 802.11ac client-to-server WLAN
(University of Bahrain (Zallaq, Bahrain), 2019-05-01)This paper investigates the impact of human movement on 802.11ac WLAN performance using IPv4, IPv6, TCP and UDP protocols. The results show that on average, the TCP and UDP on WLAN with human movement has a lower throughput ... -
A comprehensive review of computational methods for automatic prediction of schizophrenia with insight into indigenous populations
(Frontiers Media (parent company: Holtzbrinck Publishing Group), 2019-09-12)Psychiatrists rely on language and speech behavior as one of the main clues in psychiatric diagnosis. Descriptive psychopathology and phenomenology form the basis of a common language used by psychiatrists to describe ... -
MoodJumper : an exploration of game interface preferences in users with/out mood disorder
(Frontiers Media (parent company: Holtzbrinck Publishing Group), 2019-08-08)Mental health conditions pose a major challenge to healthcare providers and society at large. The World Health Organization predicts that by 2030 mental illnesses will be the leading disease burden globally. Mental health ... -
Performance comparison of peer-peer vs client-server 802.11ac WLAN using 80Mhz channel size
(2019-09-01)In this paper, the performance of IEEE 802.11ac wireless LAN using IPv4, IPv6, TCP, UDP, peer-peer, and client-server networks is investigated while implementing WPA2 security. The latest operating systems are used in the ... -
A cluster-driven energy routing protocol for optimal network lifetime in ad hoc networks
(Telecommunications Association Inc., 2019-06-11)Mobile Ad hoc Network (MANET) is a group of networked mobile devices working in a cooperative manner. Due to usage, these devices quickly run out of battery power in critical situations and consequently fail in packet ... -
Models applied in stock market prediction : a literature survey
(Unitec ePress, 2019-03-07)Stock market prices are intrinsically dynamic, volatile, highly sensitive, nonparametric, nonlinear and chaotic in nature, as they are influenced by a myriad of interrelated factors. As such, stock market time series ... -
A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks
(RMIT University, Melbourne, Victoria, Australia, 2017-03-26)This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles ... -
A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol
(TelSoc : Telecommunications and the Digital Economy, 2018-03-30)The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed ... -
Social engineering attacks and countermeasures in the New Zealand banking system : advancing a user-reflective mitigation model
(MDPI (Multidisciplinary Digital Publishing Institute), 2018-05-03)Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in ... -
Technical review : performance of existing imputation methods for missing data in SVM ensemble creation
(AIRCC Publishing Corporation, 2017)Incomplete data is present in many study contents. This incomplete or uncollected data information is named as missing data (values), and considered as vital problem for various researchers. Even this missing data problem ... -
Online scalable SVM ensemble learning method (OSSELM) for spatio-temporal air pollution analysis
(AIRCC Publishing Corporation, 2017)Environmental air pollution studies fail to consider the fact that air pollution is a spatio-temporal problem. The volume and complexity of the data have created the need to explore various machine learning models, however, ... -
An efficient stream-based join to process end user transactions in real-time data warehousing
(2014-06)In the field of real-time data warehousing semistream processing has become a potential area of research since last one decade. One important operation in semi-stream processing is to join stream data with a slowly changing ... -
Role-based process view derivation and composition
(Association for Computing Machinery (ACM), 2015-05)The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for ...