Applied Computing and Informatics , Open Access
Issue(s) available: 7 – From Volume: 16 Issue: 1/2, to Volume: 19 Issue: 3/4

Publisher's note
It has come to the attention of the publisher that the article Zeroual, I. and Lakhouana, A. (2020), “MulTed: a multilingual aligned and tagged parallel corpus”, published in…
Publisher's note
It has come to the attention of the publisher that the article Mustafa, A. and Hatemi-J, A. (2020), “A VBA module simulation for finding optimal lag order in time series models…
Automatic measurement of cardiothoracic ratio in chest x-ray images with ProGAN-generated dataset
Worapan Kusakunniran, Pairash Saiviroonporn, Thanongchai Siriapisith, Trongtum Tongdee, Amphai Uraiverotchanakorn, Suphawan Leesakul, Penpitcha Thongnarintr, Apichaya Kuama, Pakorn YodpromThe cardiomegaly can be determined by the cardiothoracic ratio (CTR) which can be measured in a chest x-ray image. It is calculated based on a relationship between a size of heart…
“Automatic” interpretation of multiple correspondence analysis (MCA) results for nonexpert users, using R programming
Stratos Moschidis, Angelos Markos, Athanasios C. ThanopoulosThe purpose of this paper is to create an automatic interpretation of the results of the method of multiple correspondence analysis (MCA) for categorical variables, so that the…
Detecting and staging diabetic retinopathy in retinal images using multi-branch CNN
Worapan Kusakunniran, Sarattha Karnjanapreechakorn, Pitipol Choopong, Thanongchai Siriapisith, Nattaporn Tesavibul, Nopasak Phasukkijwatana, Supalert Prakhunhungsit, Sutasinee BoonsoponThis paper aims to propose a solution for detecting and grading diabetic retinopathy (DR) in retinal images using a convolutional neural network (CNN)-based approach. It could…
Use of chatbots for customer service in MSMEs
Jorge Cordero, Luis Barba-Guaman, Franco GuamánThis research work aims to arise from developing new communication channels for customer service in micro, small and medium enterprises (MSMEs), such as chatbots. In particular…
An empirical study on the use of a facial emotion recognition system in guidance counseling utilizing the technology acceptance model and the general comfort questionnaire
Dhong Fhel K. Gom-os, Kelvin Y. YongThe goal of this study is to test the real-world use of an emotion recognition system.
Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment
James Crotty, Elizabeth DanielConsumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create…
A lightweight deep learning approach to mouth segmentation in color images
Kittisak Chotikkakamthorn, Panrasee Ritthipravat, Worapan Kusakunniran, Pimchanok Tuakta, Paitoon BenjapornlertMouth segmentation is one of the challenging tasks of development in lip reading applications due to illumination, low chromatic contrast and complex mouth appearance. Recently…
Realizing the promise of big data: how Taiwan can help the world reduce medical errors and advance precision medicine
Kevin Wang, Peter Alexander MuennigThe study explores how Taiwan’s electronic health data systems can be used to build algorithms that reduce or eliminate medical errors and to advance precision medicine.
Neural networks for anatomical therapeutic chemical (ATC) classification
Loris Nanni, Alessandra Lumini, Sheryl BrahnamAutomatic anatomical therapeutic chemical (ATC) classification is progressing at a rapid pace because of its potential in drug development. Predicting an unknown compound's…
Measuring digital transformation in higher education institutions – content validity instrument
Lina María Castro Benavides, Johnny Alexander Tamayo Arias, Daniel Burgos, Alke MartensThis study aims to validate the content of an instrument which identifies the organizational, sociocultural and technological characteristics that foster digital transformation…
Analysis and optimization of Dual Parallel Partition Sorting with OpenMP
Sirilak Ketchaya, Apisit RattanatranurakSorting is a very important algorithm to solve problems in computer science. The most well-known divide and conquer sorting algorithm is quicksort. It starts with dividing the…
Discovering self-quantified patterns using multi-time window models
Luke McCully, Hung Cao, Monica Wachowicz, Stephanie Champion, Patricia A.H. WilliamsA new research domain known as the Quantified Self has recently emerged and is described as gaining self-knowledge through using wearable technology to acquire information on…
Design of ensemble recurrent model with stacked fuzzy ARTMAP for breast cancer detection
Abhishek Das, Mihir Narayan MohantyIn time and accurate detection of cancer can save the life of the person affected. According to the World Health Organization (WHO), breast cancer occupies the most frequent…
Ontological model for the acoustic management in a smart environment
Gabriela Santiago, Jose AguilarThe Reflective Middleware for Acoustic Management (ReM-AM), based on the Middleware for Cloud Learning Environments (AmICL), aims to improve the interaction between users and…
A review of cross-border cooperation regulation for digital forensics in LATAM from the soft systems methodology
Lelia Cristina Díaz-Pérez, Ana Laura Quintanar-Reséndiz, Graciela Vázquez-Álvarez, Rubén Vázquez-MedinaBased on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American…
Email classification analysis using machine learning techniques
Khalid Iqbal, Muhammad Shehrayar KhanIn this digital era, email is the most pervasive form of communication between people. Many users become a victim of spam emails and their data have been exposed.
Face recognition under mask-wearing based on residual inception networks
Warot Moungsouy, Thanawat Tawanbunjerd, Nutcha Liamsomboon, Worapan KusakunniranThis paper proposes a solution for recognizing human faces under mask-wearing. The lower part of human face is occluded and could not be used in the learning process of face…
Spatial prediction of flood-susceptible zones in the Ourika watershed of Morocco using machine learning algorithms
Modeste Meliho, Abdellatif Khattabi, Zejli Driss, Collins Ashianga OrlandoThe purpose of the paper is to predict mapping of areas vulnerable to flooding in the Ourika watershed in the High Atlas of Morocco with the aim of providing a useful tool capable…
A novel independent job rescheduling strategy for cloud resilience in the cloud environment
Fei Xie, Jun Yan, Jun ShenAlthough proactive fault handling plans are widely spread, many unexpected data center outages still occurred. To rescue the jobs from faulty data centers, the authors propose a…
Autonomous cycles of data analysis tasks for innovation processes in MSMEs
Ana Gutiérrez, Jose Aguilar, Ana Ortega, Edwin MontoyaThe authors propose the concept of “Autonomic Cycle for innovation processes,” which defines a set of tasks of data analysis, whose objective is to improve the innovation process…
Identification of markers and artificial intelligence-based classification of radical Twitter data
Mohammad FraiwanSocial networks (SNs) have recently evolved from a means of connecting people to becoming a tool for social engineering, radicalization, dissemination of propaganda and…
Improving handwritten digit recognition using hybrid feature selection algorithm
Fung Yuen Chin, Kong Hoong Lem, Khye Mun WongThe amount of features in handwritten digit data is often very large due to the different aspects in personal handwriting, leading to high-dimensional data. Therefore, the…
Fast-converging chain-cluster-based routing protocols using the Red-Deer Algorithm in Wireless Sensor Networks
Kamalakshi Dayal, Vandana BassooThe performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational…
Subject independent emotion recognition using EEG and physiological signals – a comparative study
Manju Priya Arthanarisamy Ramaswamy, Suja PalaniswamyThe aim of this study is to investigate subject independent emotion recognition capabilities of EEG and peripheral physiological signals namely: electroocoulogram (EOG)…
The construction of an accurate Arabic sentiment analysis system based on resources alteration and approaches comparison
Ibtissam TouahriThis paper purposed a multi-facet sentiment analysis system.
The systems architecture ontology (SAO): an ontology-based design method for cyber–physical systems
Diego Camara Sales, Leandro Buss Becker, Cristian KoliverManaging components' resources plays a critical role in the success of systems' architectures designed for cyber–physical systems (CPS). Performing the selection of candidate…
Ubi-Flex-Cloud: ubiquitous flexible cloud computing: status quo and research imperatives
Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal, Martin ReissleinCloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…
A literature review on users' behavioral intention toward chatbots' adoption
Paraskevi Gatzioufa, Vaggelis SaprikisDespite the fact that chatbots have been largely adopted for the last few years, a comprehensive literature review research focusing on the intention of individuals to adopt…
Modeling of mobile channels using TIMS in IT education
Martin Rakús, Peter Farkaš, Tomáš PáleníkThe purpose of this paper is to directly link information technology (IT) education with real-world phenomena.
Feature selection based on weighted conditional mutual information
Hongfang Zhou, Xiqian Wang, Yao ZhangFeature selection is an essential step in data mining. The core of it is to analyze and quantize the relevancy and redundancy between the features and the classes. In CFR feature…
Forecasting of COVID-19 epidemic size in four high hitting nations (USA, Brazil, India and Russia) by Fb-Prophet machine learning model
Gopi Battineni, Nalini Chintalapudi, Francesco AmentaAs of July 30, 2020, more than 17 million novel coronavirus disease 2019 (COVID-19) cases were registered including 671,500 deaths. Yet, there is no immediate medicine or…
Assessing university students' perception of academic quality using machine learning
Alberto Guillén Perales, Francisco Liébana-Cabanillas, Juan Sánchez-Fernández, Luis Javier HerreraThe aim of this research is to assess the influence of the underlying service quality variable, usually related to university students' perception of the educational experience…
Aspect-based sentiment analysis using smart government review data
Omar Alqaryouti, Nur Siyam, Azza Abdel Monem, Khaled ShaalanDigital resources such as smart applications reviews and online feedback information are important sources to seek customers’ feedback and input. This paper aims to help…
Until you have something to lose! Loss aversion and two-factor authentication adoption
Ahmad R. Pratama, Firman M. FirmansyahIn this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by investigating…
Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou, Abdelhak Mourad GuerouiThe Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Predicting student performance in a blended learning environment using learning management system interaction data
Kiran Fahd, Shah Jahan Miah, Khandakar AhmedStudent attritions in tertiary educational institutes may play a significant role to achieve core values leading towards strategic mission and financial well-being. Analysis of…
An overlapping sliding window and combined features based emotion recognition system for EEG signals
Shruti Garg, Rahul Kumar Patro, Soumyajit Behera, Neha Prerna Tigga, Ranjita PandeyThe purpose of this study is to propose an alternative efficient 3D emotion recognition model for variable-length electroencephalogram (EEG) data.
Swarm intelligence versus direct cover algorithms in synthesis of Multi-Valued Logic functions
Mostafa Abd-El-Barr, Kalim Qureshi, Bambang SarifAnt Colony Optimization and Particle Swarm Optimization represent two widely used Swarm Intelligence (SI) optimization techniques. Information processing using Multiple-Valued…
ELMOPP: an application of graph theory and machine learning to traffic light coordination
Fareed SheriffThis paper presents the Edge Load Management and Optimization through Pseudoflow Prediction (ELMOPP) algorithm, which aims to solve problems detailed in previous algorithms;…
Supervised learning and resampling techniques on DISC personality classification using Twitter information in Bahasa Indonesia
Ema Utami, Irwan Oyong, Suwanto Raharjo, Anggit Dwi Hartanto, Sumarni AdiGathering knowledge regarding personality traits has long been the interest of academics and researchers in the fields of psychology and in computer science. Analyzing profile…
IDMPF: intelligent diabetes mellitus prediction framework using machine learning
Leila Ismail, Huned MaterwalaMachine Learning is an intelligent methodology used for prediction and has shown promising results in predictive classifications. One of the critical areas in which machine…
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Nikolay Andreevich Moldovyan, Dmitriy Nikolaevich MoldovyanThe practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world…
Spline functions for Arabic morphological disambiguation
Mohamed Boudchiche, Azzeddine MazrouiWe have developed in this paper a morphological disambiguation hybrid system for the Arabic language that identifies the stem, lemma and root of a given sentence words. Following…
Revised approach for the prediction of functional size of mobile application
Ziema Mushtaq, Abdul WahidMobile applications affect our everyday activities and have become more and more information centric. Effort estimation for mobile application is an essential factor to consider…
Clustering as feature selection method in spam classification: uncovering sick-leave sellers
Mariam Elhussein, Samiha BrahimiThis paper aims to propose a novel way of using textual clustering as a feature selection method. It is applied to identify the most important keywords in the profile…
Classification models for likelihood prediction of diabetes at early stage using feature selection
Oladosu Oyebisi Oladimeji, Abimbola Oladimeji, Olayanju OladimejiDiabetes is one of the life-threatening chronic diseases, which is already affecting 422m people globally based on (World Health Organization) WHO report as at 2018. This costs…
A lifelong spam emails classification model
Rami Mustafa A. MohammadSpam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet…
Audiogmenter: a MATLAB toolbox for audio data augmentation
Gianluca Maguolo, Michelangelo Paci, Loris Nanni, Ludovico BonanCreate and share a MATLAB library that performs data augmentation algorithms for audio data. This study aims to help machine learning researchers to improve their models using the…
Precise and parallel segmentation model (PPSM) via MCET using hybrid distributions
Soha Rawas, Ali El-ZaartImage segmentation is one of the most essential tasks in image processing applications. It is a valuable tool in many oriented applications such as health-care systems, pattern…
Longitudinal estimation of stress-related states through bio-sensor data
Vadym MozgovoyThe authors aim to develop a conceptual framework for longitudinal estimation of stress-related states in the wild (IW), based on the machine learning (ML) algorithms that use…
Boruta-grid-search least square support vector machine for NO2 pollution prediction using big data analytics and IoT emission sensors
Habeeb Balogun, Hafiz Alaka, Christian Nnaemeka EgwimThis paper seeks to assess the performance levels of BA-GS-LSSVM compared to popular standalone algorithms used to build NO2 prediction models. The purpose of this paper is to…
Robust dual-tone multi-frequency tone detection using k-nearest neighbour classifier for a noisy environment
Arunit Maity, P. Prakasam, Sarthak BhargavaDue to the continuous and rapid evolution of telecommunication equipment, the demand for more efficient and noise-robust detection of dual-tone multi-frequency (DTMF) signals is…
SARS-CoV-2 epidemic calculation in Italy by SEIR compartmental models
Gopi Battineni, Nalini Chintalapudi, Francesco AmentaAfter the identification of a novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) at Wuhan, China, a pandemic was widely spread worldwide. In Italy, about 240,000…
Design of a small-scale and failure-resistant IaaS cloud using OpenStack
Samuel Heuchert, Bhaskar Prasad Rimal, Martin Reisslein, Yong WangMajor public cloud providers, such as AWS, Azure or Google, offer seamless experiences for infrastructure as a service (IaaS), platform as a service (PaaS) and software as a…
Frei-Chen bases based lossy digital image compression technique
Mahmood Al-khassaweneh, Omar AlShormanIn the big data era, image compression is of significant importance in today’s world. Importantly, compression of large sized images is required for everyday tasks; including…
Solar power generation forecasting using ensemble approach based on deep learning and statistical methods
Mariam AlKandari, Imtiaz AhmadSolar power forecasting will have a significant impact on the future of large-scale renewable energy plants. Predicting photovoltaic power generation depends heavily on climate…
Robust ensemble of handcrafted and learned approaches for DNA-binding proteins
Loris Nanni, Sheryl BrahnamAutomatic DNA-binding protein (DNA-BP) classification is now an essential proteomic technology. Unfortunately, many systems reported in the literature are tested on only one or…
An architecture as a code framework to manage documentation of IT projects
Christophe Gaie, Bertrand Florat, Steven MorvanIn the present article, the authors tackle the problem of IT documentation, which plays an important role in information technology (IT) project management.
Autonomous recommender system architecture for virtual learning environments
Julián Monsalve-Pulido, Jose Aguilar, Edwin Montoya, Camilo SalazarThis article proposes an architecture of an intelligent and autonomous recommendation system to be applied to any virtual learning environment, with the objective of efficiently…
ODCR: Energy Efficient and Reliable Density Clustered-based routing protocol for emergency sensor applications
Mohammed S. Al-kahtani, Lutful Karim, Nargis KhanDesigning an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an…
Why and how informatics and applied computing can still create structural changes and competitive advantage
Sarandis Mitropoulos, Christos DouligerisIn the new digital age, enterprises are facing an increasing global competition. In this paper, we first examine how Information Technology (IT) can play an important role in…
Predictive modeling of turning operations under different cooling/lubricating conditions for sustainable manufacturing with machine learning techniques
Djordje Cica, Branislav Sredanovic, Sasa Tesic, Davorin KramarSustainable manufacturing is one of the most important and most challenging issues in present industrial scenario. With the intention of diminish negative effects associated with…
WisdomModel: convert data into wisdom
Israa Mahmood, Hasanen AbdullahTraditional classification algorithms always have an incorrect prediction. As the misclassification rate increases, the usefulness of the learning model decreases. This paper…
Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
Abdullah Alharbi, Wajdi Alhakami, Sami Bourouis, Fatma Najar, Nizar BouguilaWe propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is…
An online emergency medical management information system using mobile computing
Sarandis Mitropoulos, Christos Mitsis, Petros Valacheas, Christos DouligerisThe purpose of this paper is to investigate the way technology affects the provision of prehospital emergency care, upgrading the quality of services offered and significantly…
Using transfer learning for diabetic retinopathy stage classification
Enas M.F. El HoubyDiabetic retinopathy (DR) is one of the dangerous complications of diabetes. Its grade level must be tracked to manage its progress and to start the appropriate decision for…
ISSN:
2634-1964e-ISSN:
2210-8327Online date, start – end:
2020Journal’s owner:
Saudi Computer Society, King Saud University(opens new window)Open Access:
open accessEditor:
- Professor Hatim Aboalsamh