


default search action
Open Computer Science, Volume 10
Volume 10, Number 1, January 2020
- Isaac Nyabisa Oteyo

, Mary Esther Muyoka Toili
:
Improving Specimen Labelling and Data Collection in Bio-science Research using Mobile and Web Applications. 1-16 - Ahmed A. Elngar, Mohammed Kayed:

Vehicle Security Systems using Face Recognition based on Internet of Things. 17-29 - Majid E. Abbasov, Faramoz Aliev:

Modifications of the Charged Balls Method. 30-32 - Srilatha Pulipati

, Manjula Ramakrishnan:
Topological and Attribute Link Prediction using Firefly algorithm. 33-41 - Tosin P. Adewumi, Marcus Liwicki:

Inner For-Loop for Speeding Up Blockchain Mining. 42-47 - Victor Gorelik, Tatiana Zolotova:

Linear-quadratic programming and its application to data correction of improper linear programming problems. 48-55 - Neeti Kashyap

, A. Charan Kumari
, Rita Rana Chhikara:
Service Composition in IoT using Genetic algorithm and Particle swarm optimization. 56-64 - Andrei Gorchakov

, Vyacheslav Mozolenko:
On one approach to the approximation of solutions to the direct kinematics problem of parallel manipulators. 65-70 - Igor E. Kaporin:

Preconditioned Subspace Descent Method for Nonlinear Systems of Equations. 71-81 - Kadir Dede, Enno Ohlebusch:

Dynamic construction of pan-genome subgraphs. 82-96 - Taleh Agasiev

:
Characteristic feature analysis of continuous optimization problems based on Variability Map of objective function for optimization algorithm configuration. 97-111 - Andrei Ignatov

, Andrei Gorchakov
:
Tool for Simulating Branch and Bound Computations. 112-116 - Bhulakshmi Bonthu

, M. Subaji:
An effective algorithm to overcome the practical hindrance for Wi-Fi based indoor positioning system. 117-123 - Elena Kiseleva, Olha Prytomanova, Liudmyla Hart

:
Solving a Two-stage Continuous-discrete Problem of Optimal Partitioning-Allocation with Subsets Centers Placement. 124-136 - Tosin A. Adesuyi, Byeong Man Kim:

A Neuron Noise-Injection Technique for Privacy Preserving Deep Neural Networks. 137-152 - Isaac Kofi Nti

, Adebayo Felix Adekoya
, Benjamin Asubam Weyori
:
Efficient Stock-Market Prediction Using Ensemble Support Vector Machine. 153-163 - Theyvaa Sangkaran, Azween B. Abdullah

, N. Z. Jhanjhi
:
Criminal Community Detection Based on Isomorphic Subgraph Analytics. 164-174 - Hussain Ahmad, Muhammad Zubair Asghar, Alam Sher Khan, Anam Habib:

A Systematic Literature Review of Personality Trait Classification from Textual Content. 175-193 - Sanjoy Debnath

, Wasim Arif
, Srimanta Baishya:
Buyer Inspired Meta-Heuristic Optimization Algorithm. 194-219 - Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi

:
Distributed Denial-of-Service Prediction on IoT Framework by Learning Techniques. 220-230 - Crescenzio Gallo, Vito Capozzi:

A Wafer Bin Map "Relaxed" Clustering Algorithm for Improving Semiconductor Production Yield. 231-245 - Yamini Goel, Rinkaj Goyal

:
On the Effectiveness of Self-Training in MOOC Dropout Prediction. 246-258 - Akansha Singh

, Surbhi Dewan:
AutisMitr: Emotion Recognition Assistive Tool for Autistic Children. 259-269 - Alexander V. Pesterev, Ivan Matrosov, Yury V. Morozov:

Optimization-based Attitude Determination in Geodetic Applications. 270-275 - Robert Namm

, Georgiy Tsoy
:
Modified duality methods for solving an elastic crack problem with Coulomb friction on the crack faces. 276-282 - Alexander V. Sokolov, Vladimir V. Voloshinov:

Model Selection by Balanced Identification: the Interplay of Optimization and Distributed Computing. 283-295 - Aditya Kumar Sahu

, Monalisa Sahu
:
Digital image steganography and steganalysis: A journey of the past three decades. 296-342 - Snezana Savoska, Blagoj Ristevski:

Towards Implementation of Big Data Concepts in a Pharmaceutical Company. 343-356 - Farzam Matinfar:

Linking Web Resources in Web of Data to Encyclopedic Knowledge Base. 357-368 - C. M. Thasnimol, R. Rajathy:

The Paradigm Revolution in the Distribution Grid: The Cutting-Edge and Enabling Technologies. 369-395 - Fatiha Loucif, Sihem Kechida:

Optimization of sliding mode control with PID surface for robot manipulator by Evolutionary Algorithms. 396-407 - Abin Oommen Philip

, R. K. K. Saravanaguru:
Secure Incident & Evidence Management Framework (SIEMF) for Internet of Vehicles using Deep Learning and Blockchain. 408-421 - Faris Mohammad Abd, Mehdi Ebady Manaa

:
Predicting Heart Diseases from Large Scale IoT Data Using a Map-Reduce Paradigm. 422-430 - Rachna Jain

, Anand Nayyar:
A novel homomorphic RASD framework for secured data access and storage in cloud computing. 431-443 - Ali Gholami Rudi:

Approximate Discontinuous Trajectory Hotspots. 444-449 - Filip Pruzinec, Peter Mego, Renata Duraciová

:
A low-cost web-based smart street lighting geographical information system for smaller towns and villages. 450-458 - Krishna Kant Singh

, B. Balamurugan, Naveen K. Chilamkurti, Bharat S. Rawal Kshatriya:
Machine Learning approaches for convergence of IoT and Blockchain. 459-460 - Umair Younis, Muhammad Zubair Asghar

, Adil Khan
, Alamsher Khan, Javed Iqbal, Nosheen Jillani:
Applying Machine Learning Techniques for Performing Comparative Opinion Mining. 461-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














