skip to main content
Volume 1, Issue 1Jan 2020
Bibliometrics
research-article
An End-to-End Recognition System for Unconstrained Vietnamese Handwriting
Abstract

Inspired by recent successes in neural machine translation and image caption generation, we present an attention-based encoder–decoder model (AED) to recognize handwritten Vietnamese text. The model consists of two parts: a Convolutional Neural ...

research-article
Lower-Bound Study for Function Computation in Distributed Networks via Vertex-Eccentricity
Abstract

Distributed computing network-systems are modeled as graphs with vertices representing compute elements and adjacency-edges capturing their uni- or bi-directional communication. Distributed function computation has a wide spectrum of major ...

research-article
Using Auditory Features for WiFi Channel State Information Activity Recognition
Abstract

Activity recognition has gained significant attention recently, due to the availability of smartphones and smartwatches with movement sensors which facilitate the collection and processing of relevant measurements, by almost everyone. Using the ...

research-article
An Analysis of Software Bug Reports Using Machine Learning Techniques
Abstract

Bug tracking systems manage bug reports for assuring the quality of software products. A bug report (alsoreferred as trouble, problem, ticket or defect) contains several features for problem management and resolution purposes. Severity and ...

research-article
Data Science for Genomic Data Management: Challenges, Resources, Experiences
Abstract

We highlight several challenges which are faced by data scientists who use public datasets for solving biological and clinical problems. In spite of the large efforts in building such public datasets, they are dispersed over many sources and ...

review-article
Automatic Learning Algorithms for Local Support Vector Machines
Abstract

In this paper, we propose automatic learning algorithms (called auto-kSVM-1p, autokSVM-dp) being possible to automatically tune hyper-parameters of k local support vector machines (SVM) for classifying large data sets. The autokSVM algorithms are ...

research-article
A Lightweight Indexing Approach for Efficient Batch Similarity Processing with MapReduce
Abstract

Similarity search is a principle operation in different fields of study. However, the cost for that operation is expensive due to several reasons, mainly by redundancy and big data load. There are many approaches that concentrate on how to speed ...

research-article
Energy Packet Networks: an Annotated Bibliography
Abstract

Since the beginning of the age of the digital-revolution, computer and communication systems have used massive electrical power. As a result, the usage of electrical energy by the Information and Communication Technologies (ICT) has now become a ...

research-article
A General Approach to Conflict Detection in Software-Defined Networks
Abstract

Software-defined networks (SDN) replacing the network appliances of traditional networks with logically centrally deployed applications, which are able to introduce the network function they implement into any element in the network. This ...

research-article
A Signature-Based Mutual Authentication Protocol for Remote Health Monitoring
Abstract

Remote health monitoring can offer a lot of advantage to all the players in healthcare industry and it can contribute to reduced healthcare expenses. Wireless medical sensor networks capable of accumulating and transferring vital parameters of ...

research-article
Classification of Anti-phishing Solutions
Abstract

Phishing is an online fraud through which phisher gains unauthorized access to the user system to lure the personal credentials (such as username, password, credit/debit card number, validity, CVV number, and pin) for financial gain. Phishing can ...

research-article
AutoAlias: Automatic Variable-Precision Alias Analysis for Object-Oriented Programs
Abstract

The aliasing question (can two reference expressions point, during an execution, to the same object?) is both one of the most critical in practice, for applications ranging from compiler optimization to programmer verification, and one of the most ...

research-article
An Experiment with Denotational Semantics
Abstract

The paper is devoted to showing how to systematically design a programming language in “reverse order”, i.e., from denotations to syntax. This construction is developed in an algebraic framework consisting of three many-sorted algebras: of ...

research-article
Diagramming Multi-Level Service-Oriented Enterprise Architecture
Abstract

Today’s enterprise architecture should incorporate high-level enterprise services that are considered as wrappers of business processes and ICT capabilities. This service-oriented enterprise model consists of a large number of model elements ...

research-article
Performance Assessment and Comparison of Efficient Ad Hoc Reactive and Proactive Network Routing Protocols
Abstract

The research on mobile ad hoc networks is intensively attracted by the research community due to their good characteristic of multi-hop wireless connectivity and energetically altering network topology. It collects infra-structure less mobile ...

research-article
Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering Algorithm
Abstract

The cyberspace continues to evolve more complex than ever anticipated, and same is the case with security dynamics there. As our dependence on cyberspace is increasing day-by-day, regular and systematic monitoring of cyberspace security has become ...

research-article
Improvement of Malware Classification Using Hybrid Feature Engineering
Abstract

Polymorphic malware has evolved as a major threat in Computer Systems. Their creation technology is constantly evolving using sophisticated tactics to create multiple instances of the existing ones. Current solutions are not yet able to ...

research-article
Evaluation of Out-of-Band Channels for IoT Security
Abstract

Secure bootstrapping is the process by which a device gets the necessary configuration information and security credentials to become operational. In many pervasive computing and Internet-of-Things scenarios, it is often not possible to rely on ...

research-article
Theoretical and Computational Analysis of the Falling Ladder Problem
Abstract

A comprehensive study of the falling ladder problem is presented. The ladder may fall naturally under the influence of gravity alone and at some point lose its contact with the wall or it may be kept in contact with the wall by a physical ...

research-article
Improved QUBO Formulation of the Graph Isomorphism Problem
Abstract

In this paper, we provide a practically efficient QUBO formulation for the Graph Isomorphism Problem that is suitable for quantum annealers such as those produced by D-Wave. After proving the correctness of our new method, based on exploiting ...

research-article
Newton-2EGSOR Method for Unconstrained Optimization Problems with a Block Diagonal Hessian
Abstract

We find that finding the unconstrained optimizer for large-scale problems with the Newton method can be very expensive. Therefore, in this paper, we developed a new efficient method for solving large-scale unconstrained optimization problems with ...

research-article
Access Controls for IoT Networks
Abstract

The message queuing telemetry transport (MQTT) protocol is becoming the main protocol for the internet of things (IoT). In this paper, we define a highly expressive attribute-based access control (ABAC) security model for the MQTT protocol. Our ...

research-article
ARA: Aggregated RAPPOR and Analysis for Centralized Differential Privacy
Abstract

Differential privacy (DP) has now become a standard in case of sensitive statistical data analysis. The two main approaches in DP are local and central. Both the approaches have a clear gap in terms of data storing,amount of data to be analyzed, ...

research-article
Green Information Extraction from Family Books
Abstract

There is rising demand for the retrieval of genealogical information from semi-structured books. Nuggets of personal interest are currently transcribed piecemeal by volunteers. GreenBook is an effective alternative for recovering most of the ...

research-article
Public Access
Single-Shot 3D Mesh Estimation via Adversarial Domain Adaptation: Learning Directly from Synthetic Data
Abstract

We present an adversarial deep domain adaptation (ADA) approach for training deep neural networks that estimate 3D pose and shape of a human from a single image. Existing datasets of in-the-wild images of humans have limited availability of 3D ...

review-article
Clustering and Association Rules for Web Service Discovery and Recommendation: A Systematic Literature Review
Abstract

The purpose of this study is to identify, summarize, and systematically compare various clustering and association rule techniques for web service discovery and recommendation, identify the most common data sets used in the extant literature, and ...

research-article
Secret Key Rate Adaption for Multicarrier Continuous-Variable Quantum Key Distribution
Abstract

A multicarrier continuous-variable quantum key distribution (CVQKD) protocol uses Gaussian subcarrier quantum continuous variables (CVs) for the transmission. Here, we define an iterative error-minimizing secret key adaption method for ...

research-article
Characterization of a New Potential Family of Organic-Like Pattern-Generating Dynamical Systems
Abstract

In this paper, we characterize a new broad family of discrete-time dynamical systems, whose organic-like patterns resemble part of the external morphology of some families of invertebrates and the bioluminescence of some specific families of ...

research-article
Modeling Green Data-Centers and Jobs Balancing with Energy Packet Networks and Interrupted Poisson Energy Arrivals
Abstract

We investigate micro data-centers systems with intermittent energy (due to solar panels or price of energy) which balance their jobs to mitigate these fluctuations. The model is based on energy packet networks recently proposed by E. Gelenbe and ...

research-article
Model-Driven Joint Optimization of Power and Latency Guarantee in Data center Applications
Abstract

Cloud data centers try to achieve two primary but competing goals for latency-sensitive services: meeting latency service-level objective (SLO) and reducing energy utilization. In this paper, we perform a joint optimization of both goals, such ...

Comments

-