Applied Computing and Informatics , Open Access
Issue(s) available: 5 – From Volume: 16 Issue: 1/2, to Volume: 18 Issue: 3/4

Publisher's note
It has come to the attention of the publisher that the article Zeroual, I. and Lakhouana, A. (2020), “MulTed: a multilingual aligned and tagged parallel corpus”, published…
Publisher's note
It has come to the attention of the publisher that the article Mustafa, A. and Hatemi-J, A. (2020), “A VBA module simulation for finding optimal lag order in time series…
Analysis and optimization of Dual Parallel Partition Sorting with OpenMP
Sirilak Ketchaya, Apisit RattanatranurakSorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing…
Improving handwritten digit recognition using hybrid feature selection algorithm
Fung Yuen Chin, Kong Hoong Lem, Khye Mun WongThe amount of features in handwritten digit data is often very large due to the different aspects in personal handwriting, leading to high-dimensional data. Therefore, the…
The construction of an accurate Arabic sentiment analysis system based on resources alteration and approaches comparison
Ibtissam TouahriThis paper purposed a multi-facet sentiment analysis system.
Design of ensemble recurrent model with stacked fuzzy ARTMAP for breast cancer detection
Abhishek Das, Mihir Narayan MohantyIn time and accurate detection of cancer can save the life of the person affected. According to the World Health Organization (WHO), breast cancer occupies the most…
Autonomous cycles of data analysis tasks for innovation processes in MSMEs
Ana Gutiérrez, Jose Aguilar, Ana Ortega, Edwin MontoyaThe authors propose the concept of “Autonomic Cycle for innovation processes,” which defines a set of tasks of data analysis, whose objective is to improve the innovation…
Ubi-Flex-Cloud: ubiquitous flexible cloud computing: status quo and research imperatives
Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal, Martin ReissleinCloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…
Realizing the promise of big data: how Taiwan can help the world reduce medical errors and advance precision medicine
Kevin Wang, Peter Alexander MuennigThe study explores how Taiwan’s electronic health data systems can be used to build algorithms that reduce or eliminate medical errors and to advance precision medicine.
Email classification analysis using machine learning techniques
Khalid Iqbal, Muhammad Shehrayar KhanIn this digital era, email is the most pervasive form of communication between people. Many users become a victim of spam emails and their data have been exposed.
Face recognition under mask-wearing based on residual inception networks
Warot Moungsouy, Thanawat Tawanbunjerd, Nutcha Liamsomboon, Worapan KusakunniranThis paper proposes a solution for recognizing human faces under mask-wearing. The lower part of human face is occluded and could not be used in the learning process of…
Fast-converging chain-cluster-based routing protocols using the Red-Deer Algorithm in Wireless Sensor Networks
Kamalakshi Dayal, Vandana BassooThe performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and…
Neural networks for anatomical therapeutic chemical (ATC) classification
Loris Nanni, Alessandra Lumini, Sheryl BrahnamAutomatic anatomical therapeutic chemical (ATC) classification is progressing at a rapid pace because of its potential in drug development. Predicting an unknown…
Discovering self-quantified patterns using multi-time window models
Luke McCully, Hung Cao, Monica Wachowicz, Stephanie Champion, Patricia A.H. WilliamsA new research domain known as the Quantified Self has recently emerged and is described as gaining self-knowledge through using wearable technology to acquire information…
Ontological model for the acoustic management in a smart environment
Gabriela Santiago, Jose AguilarThe Reflective Middleware for Acoustic Management (ReM-AM), based on the Middleware for Cloud Learning Environments (AmICL), aims to improve the interaction between users…
Spatial prediction of flood-susceptible zones in the Ourika watershed of Morocco using machine learning algorithms
Modeste Meliho, Abdellatif Khattabi, Zejli Driss, Collins Ashianga OrlandoThe purpose of the paper is to predict mapping of areas vulnerable to flooding in the Ourika watershed in the High Atlas of Morocco with the aim of providing a useful tool…
A novel independent job rescheduling strategy for cloud resilience in the cloud environment
Fei Xie, Jun Yan, Jun ShenAlthough proactive fault handling plans are widely spread, many unexpected data center outages still occurred. To rescue the jobs from faulty data centers, the authors…
Identification of markers and artificial intelligence-based classification of radical Twitter data
Mohammad FraiwanSocial networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and…
The systems architecture ontology (SAO): an ontology-based design method for cyber–physical systems
Diego Camara Sales, Leandro Buss Becker, Cristian KoliverManaging components' resources plays a critical role in the success of systems' architectures designed for cyber–physical systems (CPS). Performing the selection of…
Modeling of mobile channels using TIMS in IT education
Martin Rakús, Peter Farkaš, Tomáš PáleníkThe purpose of this paper is to directly link information technology (IT) education with real-world phenomena.
Predicting student performance in a blended learning environment using learning management system interaction data
Kiran Fahd, Shah Jahan Miah, Khandakar AhmedStudent attritions in tertiary educational institutes may play a significant role to achieve core values leading towards strategic mission and financial well-being…
An overlapping sliding window and combined features based emotion recognition system for EEG signals
Shruti Garg, Rahul Kumar Patro, Soumyajit Behera, Neha Prerna Tigga, Ranjita PandeyThe purpose of this study is to propose an alternative efficient 3D emotion recognition model for variable-length electroencephalogram (EEG) data.
Supervised learning and resampling techniques on DISC personality classification using Twitter information in Bahasa Indonesia
Ema Utami, Irwan Oyong, Suwanto Raharjo, Anggit Dwi Hartanto, Sumarni AdiGathering knowledge regarding personality traits has long been the interest of academics and researchers in the fields of psychology and in computer science. Analyzing…
Clustering as feature selection method in spam classification: uncovering sick-leave sellers
Mariam Elhussein, Samiha BrahimiThis paper aims to propose a novel way of using textual clustering as a feature selection method. It is applied to identify the most important keywords in the profile…
Audiogmenter: a MATLAB toolbox for audio data augmentation
Gianluca Maguolo, Michelangelo Paci, Loris Nanni, Ludovico BonanCreate and share a MATLAB library that performs data augmentation algorithms for audio data. This study aims to help machine learning researchers to improve their models…
Longitudinal estimation of stress-related states through bio-sensor data
Vadym MozgovoyThe authors aim to develop a conceptual framework for longitudinal estimation of stress-related states in the wild (IW), based on the machine learning (ML) algorithms that…
Boruta-grid-search least square support vector machine for NO2 pollution prediction using big data analytics and IoT emission sensors
Habeeb Balogun, Hafiz Alaka, Christian Nnaemeka EgwimThis paper seeks to assess the performance levels of BA-GS-LSSVM compared to popular standalone algorithms used to build NO2 prediction models. The purpose of this paper…
Design of a small-scale and failure-resistant IaaS cloud using OpenStack
Samuel Heuchert, Bhaskar Prasad Rimal, Martin Reisslein, Yong WangMajor public cloud providers, such as AWS, Azure or Google, offer seamless experiences for infrastructure as a service (IaaS), platform as a service (PaaS) and software as…
Why and how informatics and applied computing can still create structural changes and competitive advantage
Sarandis Mitropoulos, Christos DouligerisIn the new digital age, enterprises are facing an increasing global competition. In this paper, we first examine how Information Technology (IT) can play an important role…
WisdomModel: convert data into wisdom
Israa Mahmood, Hasanen AbdullahTraditional classification algorithms always have an incorrect prediction. As the misclassification rate increases, the usefulness of the learning model decreases. This…
Using transfer learning for diabetic retinopathy stage classification
Enas M.F. El HoubyDiabetic retinopathy (DR) is one of the dangerous complications of diabetes. Its grade level must be tracked to manage its progress and to start the appropriate decision…
Forecasting of COVID-19 epidemic size in four high hitting nations (USA, Brazil, India and Russia) by Fb-Prophet machine learning model
Gopi Battineni, Nalini Chintalapudi, Francesco AmentaAs of July 30, 2020, more than 17 million novel coronavirus disease 2019 (COVID-19) cases were registered including 671,500 deaths. Yet, there is no immediate medicine or…
Until you have something to lose! Loss aversion and two-factor authentication adoption
Ahmad R. Pratama, Firman M. FirmansyahIn this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by…
ELMOPP: an application of graph theory and machine learning to traffic light coordination
Fareed SheriffThis paper presents the Edge Load Management and Optimization through Pseudoflow Prediction (ELMOPP) algorithm, which aims to solve problems detailed in previous…
IDMPF: intelligent diabetes mellitus prediction framework using machine learning
Leila Ismail, Huned MaterwalaMachine Learning is an intelligent methodology used for prediction and has shown promising results in predictive classifications. One of the critical areas in which…
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Nikolay Andreevich Moldovyan, Dmitriy Nikolaevich MoldovyanThe practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST…
Classification models for likelihood prediction of diabetes at early stage using feature selection
Oladosu Oyebisi Oladimeji, Abimbola Oladimeji, Olayanju OladimejiDiabetes is one of the life-threatening chronic diseases, which is already affecting 422m people globally based on (World Health Organization) WHO report as at 2018. This…
Precise and parallel segmentation model (PPSM) via MCET using hybrid distributions
Soha Rawas, Ali El-ZaartImage segmentation is one of the most essential tasks in image processing applications. It is a valuable tool in many oriented applications such as health-care systems…
Robust dual-tone multi-frequency tone detection using k-nearest neighbour classifier for a noisy environment
Arunit Maity, P. Prakasam, Sarthak BhargavaDue to the continuous and rapid evolution of telecommunication equipment, the demand for more efficient and noise-robust detection of dual-tone multi-frequency (DTMF…
Robust ensemble of handcrafted and learned approaches for DNA-binding proteins
Loris Nanni, Sheryl BrahnamAutomatic DNA-binding protein (DNA-BP) classification is now an essential proteomic technology. Unfortunately, many systems reported in the literature are tested on only…
An architecture as a code framework to manage documentation of IT projects
Christophe Gaie, Bertrand Florat, Steven MorvanIn the present article, the authors tackle the problem of IT documentation, which plays an important role in information technology (IT) project management.
An online emergency medical management information system using mobile computing
Sarandis Mitropoulos, Christos Mitsis, Petros Valacheas, Christos DouligerisThe purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and…
Feature selection based on weighted conditional mutual information
Hongfang Zhou, Xiqian Wang, Yao ZhangFeature selection is an essential step in data mining. The core of it is to analyze and quantize the relevancy and redundancy between the features and the classes. In CFR…
Energy-efficient genetic algorithm variants of PEGASIS for 3D Wireless Sensor Networks
Aaqil Somauroo, Vandana BassooDue to its boundless potential applications, Wireless Sensor Networks have been subject to much research in the last two decades. WSNs are often deployed in remote…
Assessing university students' perception of academic quality using machine learning
Alberto Guillén Perales, Francisco Liébana-Cabanillas, Juan Sánchez-Fernández, Luis Javier HerreraThe aim of this research is to assess the influence of the underlying service quality variable, usually related to university students' perception of the educational…
Aspect-based sentiment analysis using smart government review data
Omar Alqaryouti, Nur Siyam, Azza Abdel Monem, Khaled ShaalanDigital resources such as smart applications reviews and online feedback information are important sources to seek customers’ feedback and input. This paper aims to help…
An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams
F.J. Farsana, V.R. Devi, K. GopakumarThis paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with…
Predictive model of cardiac arrest in smokers using machine learning technique based on Heart Rate Variability parameter
R. Shashikant, P. ChetankumarCardiac arrest is a severe heart anomaly that results in billions of annual casualties. Smoking is a specific hazard factor for cardiovascular pathology, including…
Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou, Abdelhak Mourad GuerouiThe Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done…
A hybrid approach for log signature generation
Prabhat Pokharel, Roshan Pokhrel, Basanta JoshiAnalysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable…
Swarm intelligence versus direct cover algorithms in synthesis of Multi-Valued Logic functions
Mostafa Abd-El-Barr, Kalim Qureshi, Bambang SarifAnt Colony Optimization and Particle Swarm Optimization represent two widely used Swarm Intelligence (SI) optimization techniques. Information processing using…
DNA short read alignment on apache spark
Maryam AlJame, Imtiaz AhmadThe evolution of technologies has unleashed a wealth of challenges by generating massive amount of data. Recently, biological data has increased exponentially, which has…
Spline functions for Arabic morphological disambiguation
Mohamed Boudchiche, Azzeddine MazrouiWe have developed in this paper a morphological disambiguation hybrid system for the Arabic language that identifies the stem, lemma and root of a given sentence words…
Revised approach for the prediction of functional size of mobile application
Ziema Mushtaq, Abdul WahidMobile applications affect our everyday activities and have become more and more information centric. Effort estimation for mobile application is an essential factor to…
A lifelong spam emails classification model
Rami Mustafa A. MohammadSpam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting…
SARS-CoV-2 epidemic calculation in Italy by SEIR compartmental models
Gopi Battineni, Nalini Chintalapudi, Francesco AmentaAfter the identification of a novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) at Wuhan, China, a pandemic was widely spread worldwide. In Italy, about…
Frei-Chen bases based lossy digital image compression technique
Mahmood Al-khassaweneh, Omar AlShormanIn the big data era, image compression is of significant importance in today’s world. Importantly, compression of large sized images is required for everyday tasks;…
Solar power generation forecasting using ensemble approach based on deep learning and statistical methods
Mariam AlKandari, Imtiaz AhmadSolar power forecasting will have a significant impact on the future of large-scale renewable energy plants. Predicting photovoltaic power generation depends heavily on…
Understanding trust on social networking sites among tertiary students: An empirical study in Ghana
Felix Nti Koranteng, Isaac Wiafe, Ferdinand Apietu Katsriku, Richard ApauUser trust in social networking sites (SNS) has become an important issue in SNS discussions. This is because of its impact on knowledge sharing, social commerce, social…
A prototype mobile application for the Athens Numismatic Museum
Pantelis Chasapis, Sarandis Mitropoulos, Christos DouligerisThe continuous development of mobile platforms provides the opportunity to integrate and improve existing applications or to introduce new features to make life better…
Deep learning for plankton and coral classification
Alessandra Lumini, Loris Nanni, Gianluca MaguoloIn this paper, we present a study about an automated system for monitoring underwater ecosystems. The system here proposed is based on the fusion of different deep…
Joint method using Akamatsu and discrete wavelet transform for image restoration
Jihad Maulana Akbar, De Rosal Ignatius Moses SetiadiCurrent technology makes it easy for humans to take an image and convert it to digital content, but sometimes there is additional noise in the image so it looks damaged…
Conceptual framework of a skill-based interactive employee engaging system: In the Context of Upskilling the present IT organization
Siddarth Nair, Abhishek Kaushik, Harnaik DhootSkills form an integral part of an organization for its efficient functioning. This research study investigates mechanisms to actively persuade employees and organizations…
Neonatal pain detection in videos using the iCOPEvid dataset and an ensemble of descriptors extracted from Gaussian of Local Descriptors
Sheryl Brahnam, Loris Nanni, Shannon McMurtrey, Alessandra Lumini, Rick Brattin, Melinda Slack, Tonya BarrierDiagnosing pain in neonates is difficult but critical. Although approximately thirty manual pain instruments have been developed for neonatal pain diagnosis, most are…
Autonomous recommender system architecture for virtual learning environments
Julián Monsalve-Pulido, Jose Aguilar, Edwin Montoya, Camilo SalazarThis article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of…
Utility of a Shuffled Differential Evolution algorithm in designing of a Pi-Sigma Neural Network based predictor model
Rajashree Dash, Rasmita Rautray, Rasmita DashSince the last few decades, Artificial Neural Networks have been the center of attraction of a large number of researchers for solving diversified problem domains. Due to…
ODCR: Energy Efficient and Reliable Density Clustered-based routing protocol for emergency sensor applications
Mohammed S. Al-kahtani, Lutful Karim, Nargis KhanDesigning an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for…
Predictive modeling of turning operations under different cooling/lubricating conditions for sustainable manufacturing with machine learning techniques
Djordje Cica, Branislav Sredanovic, Sasa Tesic, Davorin KramarSustainable manufacturing is one of the most important and most challenging issues in present industrial scenario. With the intention of diminish negative effects…
Integrated data reduction model in wireless sensor networks
Walaa M. El-Sayed, Hazem M. El-Bakry, Salah M. El-SayedWireless sensor networks (WSNs) are periodically collecting data through randomly dispersed sensors (motes), which typically consume high energy in radio communication…
Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
Abdullah Alharbi, Wajdi Alhakami, Sami Bourouis, Fatma Najar, Nizar BouguilaWe propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital…
A literature review on users' behavioral intention toward chatbots' adoption
Paraskevi Gatzioufa, Vaggelis SaprikisDespite the fact that chatbots have been largely adopted for the last few years, a comprehensive literature review research focusing on the intention of individuals to…
Mobile application for the purpose of marketing, product distribution and location-based logistics for elderly farmers
Sumitra NuanmeesriThis research has developed a one-stop service supply chain mobile application for the purpose of marketing, product distribution and location-based logistics for elderly…
ISSN:
2634-1964e-ISSN:
2210-8327Online date, start – end:
2020Journal’s owner:
Saudi Computer Society, King Saud University(opens new window)Open Access:
open accessEditor:
- Professor Hatim Aboalsamh