Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (65)
- Computer and Systems Architecture (7)
- Computational Engineering (5)
- Civil and Environmental Engineering (4)
- Electrical and Computer Engineering (4)
-
- Structural Engineering (4)
- Architecture (2)
- Education (2)
- Other Computer Engineering (2)
- Academic Advising (1)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Automotive Engineering (1)
- Biomedical (1)
- Business (1)
- Business Analytics (1)
- Business Intelligence (1)
- Chemical Engineering (1)
- Civil Engineering (1)
- Community College Leadership (1)
- Construction Engineering and Management (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Electrical and Electronics (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Engineering Education (1)
- Geography (1)
- Health and Medical Administration (1)
- Management Information Systems (1)
- Manufacturing (1)
- Keyword
-
- Forecasting; Nonlinear time series; Neural networks; Moving averages (3)
- Machine Learning (2)
- Activity recognition; Depth; Feature extraction; Video; Human body detection; Hand gesture (1)
- Algorithmic Composition Artificial Intelligence (1)
- Annotation; Semantic labeling; Deep web; Surface web (1)
-
- Antiques (1)
- Architectural design (1)
- Automatic Programming (1)
- Autonomous; Unmanned vehicle; Robots; Sensors (1)
- Biomedical documents; PubMed; Rank prediction; Web usage; User patterns; Server log (1)
- Boosting classifier; Antlion optimization; Feature selection; Spam email; Classification (1)
- Breast cancer; Survival rate (SR); Disease free survival (DFS); Recurrence detection; Prediction; Data mining (1)
- Business process reengineering; Knowledge map; Ontology; Analytic hierarchical processing (1)
- Bvlgari (1)
- Chinese Remainder Theorem (CRT). (1)
- Cloud ERP; SaaS ERP; SLR; Cloud ERP benefits; Cloud ERP challenges (1)
- Cloud computing models; E-government; E-government's challenges; Governmental cloud (1)
- Cloud computing; Interoperability; SaaS broker (1)
- Cloud computing; Resource allocation; Pareto solutions; Bacteria foraging; Genetic algorithms (1)
- Cloud computing; Task scheduling; QOS; Load balancing (1)
- Cloud-based Healthcare systems (1)
- Cold-formed Steel frames Finite Element Modeling Moment-rotation (1)
- Colorectal Cancer Deep Learning Algorithms (1)
- Complaint Handling System (1)
- Complaint Management System (1)
- Computational Intelligence (1)
- Computer Music (1)
- Concept Map (1)
- Continuous requirements prioritization. (1)
- Controller (1)
Articles 61 - 78 of 78
Full-Text Articles in Engineering
Informative Gene Selection Using Adaptive Analytic Hierarchy Process (A2hp), Abhishek Bhola, Shafa Mahajan
Informative Gene Selection Using Adaptive Analytic Hierarchy Process (A2hp), Abhishek Bhola, Shafa Mahajan
Future Computing and Informatics Journal
Gene expression dataset derived from microarray experiments are marked by large number of genes, which contains the gene expression values at different sample conditions/time-points. Selection of informative genes from these large datasets is an issue of major concern for various researchers and biologists. In this study, we propose a gene selection and dimensionality reduction method called Adaptive Analytic Hierarchy Process (A2HP). Traditional analytic hierarchy process is a multiple-criteria based decision analysis method whose result depends upon the expert knowledge or decision makers. It is mainly used to solve the decision problems in different fields. On the other hand, A2HP is …
A New Method To Reduce The Effects Of Http-Get Flood Attack, Hamid Mirvaziri
A New Method To Reduce The Effects Of Http-Get Flood Attack, Hamid Mirvaziri
Future Computing and Informatics Journal
HTTP Get Flood attack is known as the most common DDOS attack on the application layer with a frequency of 21 percent in all attacks. Since a huge amount of requests is sent to the Web Server for receiving pages and also the volume of responses issued by the server is much more than the volume received by zombies in this kind of attack, hence it could be done by small botnets; in the other hand, because every zombie attempts to issue the request by the use of its real address, carries out all stages of the three-stage handshakes, and …
A Nove L F U Z Z Y L O G I C B A S E D R Eve R S E E N G I N E E R I N G O F G E N E R Eg U L A T O R Y N E T W O R K, Raviajot Kaur, Abhishek Bhola, Shailendra Singh
A Nove L F U Z Z Y L O G I C B A S E D R Eve R S E E N G I N E E R I N G O F G E N E R Eg U L A T O R Y N E T W O R K, Raviajot Kaur, Abhishek Bhola, Shailendra Singh
Future Computing and Informatics Journal
Genes of an organism play a very crucial role in the working of various cellular activities. Genes and other biological molecules like DNA, RNA do not operate alone but they all are correlated. Their relationships are shown with the help of networks commonly known as Gene Regulatory Networks. Gene Regulatory Networks are complex control networks that show the map of interactions among the genes. They provide very useful contribution to the genomic science and increase the understanding of various biological processes. In this paper, fuzzy logic based method is proposed for the reverse engineering of gene regulatory network from microarray …
Wavelet Based Transition Region Extraction For Image Segmentation, Priyadarsan Parida, Nilamani Bhoi
Wavelet Based Transition Region Extraction For Image Segmentation, Priyadarsan Parida, Nilamani Bhoi
Future Computing and Informatics Journal
Transition region based approaches are recent hybrid segmentation techniques well known for its simplicity and effectiveness. Here, the segmentation effectiveness depends on robust extraction of transition regions. So, we have proposed a transition region method which initially decomposes the gray image in wavelet domain. Two existing transition region approaches are applied on approximate coefficients to extract transition region feature matrix. Using this feature matrix the corresponding prominent wavelet coefficients of different bands are found. Inverse wavelet transform are then applied on the modified coefficients to get edge image with more than one pixel width. Otsu thresholding is applied on it …
Enersave Api: Android-Based Power-Saving Framework For Mobile Devices, Y Beeharry, A.M Muharum, V Hurbungs, Vershley Joyejob
Enersave Api: Android-Based Power-Saving Framework For Mobile Devices, Y Beeharry, A.M Muharum, V Hurbungs, Vershley Joyejob
Future Computing and Informatics Journal
Power consumption is a major factor to be taken into consideration when using mobile devices in the IoT field. Good Power management requires proper understanding of the way in which it is being consumed by the end-devices. This paper is a continuation of the work in Ref. [1] and proposes an energy saving API for the Android Operating System in order to help developers turn their applications into energy-aware ones. The main features heavily used for building smart applications, greatly impact battery life of Android devices and which have been taken into consideration are: Screen brightness, Colour scheme, CPU frequency, …
Forecasting Of Nonlinear Time Series Using Ann, Ahmed Tealab, Hesham Hefny, Amr Badr
Forecasting Of Nonlinear Time Series Using Ann, Ahmed Tealab, Hesham Hefny, Amr Badr
Future Computing and Informatics Journal
When forecasting time series, it is important to classify them according linearity behavior that the linear time series remains at the forefront of academic and applied research, it has often been found that simple linear time series models usually leave certain aspects of economic and financial data unexplained. The dynamic behavior of most of the time series in our real life with its autoregressive and inherited moving average terms issue the challenge to forecast nonlinear times series that contain inherited moving average terms using computational intelligence methodologies such as neural networks. It is rare to find studies that concentrate on …
Designing Fuzzy Rule Base Using Spider Monkey Optimization Algorithm In Cooperative Framework, Joydip Dhar
Designing Fuzzy Rule Base Using Spider Monkey Optimization Algorithm In Cooperative Framework, Joydip Dhar
Future Computing and Informatics Journal
The paper focusses on the implementation of cooperative Spider Monkey Optimization Algorithm (SMO) to design and optimize the fuzzy rule base. Spider Monkey Optimization Algorithm is a fission-fusion based Swarm Intelligence algorithm. Cooperative Spider Monkey Algorithm is an off-line algorithm used to optimize all the free parameters in a fuzzy rule base. The Spider Monkeys are divided into various groups the solution from each group represents a fuzzy rule. These groups work in a cooperative way to design the whole fuzzy rule base. Simulation on fuzzy rules of two nonlinear controllers is done with a parametric study to verify the …
Interesting Association Rule Mining With Consistent And Inconsistent Rule Detection From Big Sales Data In Distributed Environment, Dinesh J. Prajapati, Sanjay Garg, N.C. Chauhan
Interesting Association Rule Mining With Consistent And Inconsistent Rule Detection From Big Sales Data In Distributed Environment, Dinesh J. Prajapati, Sanjay Garg, N.C. Chauhan
Future Computing and Informatics Journal
Nowadays, there is an increasing demand in mining interesting patterns from the big data. The process of analyzing such a huge amount of data is really computationally complex task when using traditional methods. The overall purpose of this paper is in twofold. First, this paper presents a novel approach to identify consistent and inconsistent association rules from sales data located in distributed environment. Secondly, the paper also overcomes the main memory bottleneck and computing time overhead of single computing system by applying computations to multi node cluster. The proposed method initially extracts frequent itemsets for each zone using existing distributed …
A Supporting Tool For Requirements Change Management In Distributed Agile Development, Ramdan Mowad, Domia Lloyd, Mona Kadry
A Supporting Tool For Requirements Change Management In Distributed Agile Development, Ramdan Mowad, Domia Lloyd, Mona Kadry
Future Computing and Informatics Journal
Software development industry has witnessed the growth of the agile movement and approaches. Applying the agile approaches and practices in the distributed environment will lead to gain a lot of benefits such as reduced costs, higher efficiency and better customization, on the other hand it will face many challenges for example working in different time zones, requirements changes, personal selection and knowledge management. In order to gain these benefits, it should address the challenges that will face the agile approaches in a distributed environment. One of the main challenges is managing the requirements changes during the process of distributed agile …
A Survey On Exploring Key Performance Indicators, Amira Idrees
A Survey On Exploring Key Performance Indicators, Amira Idrees
Future Computing and Informatics Journal
Key Performance Indicators (KPIs) allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs).
A Survey Of Iot Cloud Platforms, Partha Pratim Ray
A Survey Of Iot Cloud Platforms, Partha Pratim Ray
Future Computing and Informatics Journal
Internet of Things (IoT) envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving …
A Cloud Interoperability Broker (Cib) For Data Migration In Saas, Hassan Ali, Ramdan Mowad, Amira Farouk
A Cloud Interoperability Broker (Cib) For Data Migration In Saas, Hassan Ali, Ramdan Mowad, Amira Farouk
Future Computing and Informatics Journal
Cloud computing is becoming increasingly popular. Information technology market leaders, e.g., Microsoft, Google, and Amazon, are extensively shifting toward cloud-based solutions. However, there is isolation in the cloud implementations provided by the cloud vendors. Limited interoperability can cause one user to adhere to a single cloud provider; thus, a required migration of an application or data from one cloud provider to another may necessitate a significant effort and/or full-cycle redevelopment to fit the new provider's standards and implementation. The ability to move from one cloud vendor to another would be a step toward advancing cloud computing interoperability and increasing customer …
Fixing Rules For Data Cleaning Based On Conditional Functional Dependency, Asmaa Abdo
Fixing Rules For Data Cleaning Based On Conditional Functional Dependency, Asmaa Abdo
Future Computing and Informatics Journal
Most existing databases suffer from data inconsistencies. Enhancing data quality efforts are necessary to resolve this issue. In this paper, two techniques are proposed for mining accurate conditional functional dependencies rules from such databases to be employed for data cleaning. The idea of the proposed techniques is to mine firstly maximal closed frequent patterns, then mine the dependable conditional functional dependencies rules with the help of lift measure. Moreover, data repairing algorithm is proposed for fixing inconsistent tuples found in the database exploiting the generated rules. An extensive experimental is conducted study to confirm the effectiveness of the proposed techniques …
Benefits And Challenges Of Cloud Erp Systems – A Systematic Literature Review, Mohamed Abd Elmonem, Eman Nasr, Mervat Geith
Benefits And Challenges Of Cloud Erp Systems – A Systematic Literature Review, Mohamed Abd Elmonem, Eman Nasr, Mervat Geith
Future Computing and Informatics Journal
Enterprise Resource Planning (ERP) systems provide extensive benefits and facilities to the whole enterprise. ERP systems help the enterprise to share and transfer data and information across all functions units inside and outside the enterprise. Sharing data and information between enterprise departments helps in many aspects and aims to achieve different objectives. Cloud computing is a computing model which takes place over the internet and provides scalability, reliability, availability and low cost of computer reassures. Implementing and running ERP systems over the cloud offers great advantages and benefits, in spite of its many difficulties and challenges. In this paper, we …
A Shape Grammars Approach To Bvlgari’Semerald Necklaces Design Language, Youssef Elrafie, Samir S. Hosny, Mohamed Eladly, Sahar Morsy
A Shape Grammars Approach To Bvlgari’Semerald Necklaces Design Language, Youssef Elrafie, Samir S. Hosny, Mohamed Eladly, Sahar Morsy
Future Engineering Journal
For more than forty years now, shape grammars have been the interest of many researchers in many domains including Paintings and Arts, Architecture, and Product Design [March, 2011]. However, by tracing the time line of shape grammars under “Product Design”, it does not show any interest in “Antiques or Vintages” as such [Chau et al. 2004]. This paper addresses shape grammars as a style generator of Bulgari’s emerald necklace designs, being considered as a vintage that bears a specific style, character and importance as a cultural symbol. The paper discusses the issue of style in design. Then it presents an …
Numerical Study Of Bolted Moment Connections In Cold-Formed Steel Frames, Mohamed El Aghoury, Essam Amoush, Mohamed Soliman
Numerical Study Of Bolted Moment Connections In Cold-Formed Steel Frames, Mohamed El Aghoury, Essam Amoush, Mohamed Soliman
Future Engineering Journal
Bolted moment connections for cold-formed steel frames are considered very important and complicated items which need in depth studies. This paper studies the behaviour and strength of eave connections for members that consist of back to back cold-formed double channels in portal (right angle) steel frames. Relatively new configuration is suggested to facilitate the construction and reduce the cost of this type of connections. The connection is comprised of two stubs (welded built-up I shape) connected with two head plates, each stub is welded to its head plate, keeping in mind that the rafter stub is tapered I-shape. The web …
Compressive Strength Of Axially Loaded Built-Up Sigma Cold Formed Sections Columns, Mohamed El Aghoury, Maged Tawfic, Essam Amoush
Compressive Strength Of Axially Loaded Built-Up Sigma Cold Formed Sections Columns, Mohamed El Aghoury, Maged Tawfic, Essam Amoush
Future Engineering Journal
The use of cold formed steel sections in building constructions has lately seen rapid growth due to their light weight and easier erection. Generally, lipped channel sections are used more frequently .Sigma sections while requiring more effort in fabrication, they exhibit high strength to weight ratios compared with the lipped channel sections. This work presents experimental as well as numerical study of the strength of pinned-pinned axially loaded columns utilizing sigma sections. The column section consists of two back to back sigma cold formed sections. The two sections are connected through their webs with connecting fasteners. Eight specimens with variable …
Origins Of Computational Design In Architecture, Ossama Mohamed Al-Rawi
Origins Of Computational Design In Architecture, Ossama Mohamed Al-Rawi
Future Engineering Journal
The changes that the computer is bringing to architecture are one part of a revolutionary social upheaval. Tools not only change individual patterns and behaviour, but also cause transformations in institutions. Just as other tools have in the past, the computer is in the process of conditioning our understanding of the world and our perception of our place in it. The application of computers to architecture is more than anew sophisticated tool that can be manipulated like a pencil or pen. It is rather, “the culmination of the objectifying mentality of modernity and it is, therefore, inherently perspectival. The tyranny …