Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.20190101.pre
Volume 11
Guest Editorial Preface
Mohammed Affan Alhamdany, Omer K. Jasim Mohammad
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Alhamdany, Mohammed Affan, and Omer K. Jasim Mohammad. "Special Issue on Intelligent Computing in Ubiquitous Computing (ICUC)." IJAPUC vol.11, no.1 2019: pp.5-6. http://doi.org/10.4018/IJAPUC.20190101.pre
APA
Alhamdany, M. A. & Mohammad, O. K. (2019). Special Issue on Intelligent Computing in Ubiquitous Computing (ICUC). International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(1), 5-6. http://doi.org/10.4018/IJAPUC.20190101.pre
Chicago
Alhamdany, Mohammed Affan, and Omer K. Jasim Mohammad. "Special Issue on Intelligent Computing in Ubiquitous Computing (ICUC)," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.1: 5-6. http://doi.org/10.4018/IJAPUC.20190101.pre
Export Reference
Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019010101
Volume 11
Research Article
Nada Ahmed J., Abdul Monem S. Rahma, Maha A. Hmmood Alrawi
This article proposes a new algorithm to discriminate Arabic poems by inserting Arabic poems texts and coding Arabic letters, extracting letters features depending on letter shapes to construct a...
Show More
This article proposes a new algorithm to discriminate Arabic poems by inserting Arabic poems texts and coding Arabic letters, extracting letters features depending on letter shapes to construct a multidimensional contingency table, and analyses the frequencies of letters in the inserted texts statistically. The proposed coding and discrimination (CODIS) algorithm could be applied for different Arabic texts in any media. A sample of five poems for six poets was examined to implement a CODIS algorithm. A Chi-Square statistic is used to determine the relation between the features and discriminate poems.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ahmed J., Nada, et al. "A Novel Coding and Discrimination (CODIS) Algorithm to Extract Features from Arabic Texts to Discriminate Arabic Poems." IJAPUC vol.11, no.1 2019: pp.1-14. http://doi.org/10.4018/IJAPUC.2019010101
APA
Ahmed J., N., Rahma, A. M., & Alrawi, M. A. (2019). A Novel Coding and Discrimination (CODIS) Algorithm to Extract Features from Arabic Texts to Discriminate Arabic Poems. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(1), 1-14. http://doi.org/10.4018/IJAPUC.2019010101
Chicago
Ahmed J., Nada, Abdul Monem S. Rahma, and Maha A. Hmmood Alrawi. "A Novel Coding and Discrimination (CODIS) Algorithm to Extract Features from Arabic Texts to Discriminate Arabic Poems," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.1: 1-14. http://doi.org/10.4018/IJAPUC.2019010101
Export Reference
Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019010102
Volume 11
Research Article
Yosra Abdulaziz Mohammed
Cries of infants can be seen as an indicator of pain. It has been proven that crying caused by pain, hunger, fear, stress, etc., show different cry patterns. The work presented here introduces a...
Show More
Cries of infants can be seen as an indicator of pain. It has been proven that crying caused by pain, hunger, fear, stress, etc., show different cry patterns. The work presented here introduces a comparative study between the performance of two different classification techniques implemented in an automatic classification system for identifying two types of infants' cries, pain, and non-pain. The techniques are namely, Continuous Hidden Markov Models (CHMM) and Artificial Neural Networks (ANN). Two different sets of acoustic features were extracted from the cry samples, those are MFCC and LPCC, the feature vectors generated by each were eventually fed into the classification module for the purpose of training and testing. The results of this work showed that the system based on CDHMM have better performance than that based on ANN. CDHMM gives the best identification rate at 96.1%, which is much higher than 79% of ANN whereby in general the system based on MFCC features performed better than the one that utilizes LPCC features.
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019010103
Volume 11
Research Article
Mohammed Y. Kamil, Ali Mohammed Salih
Breast cancer is one of most dangerous diseases and more common in women. The early detection of cancer is one of the most key factors for possible cure. There are numerous methods of diagnosis...
Show More
Breast cancer is one of most dangerous diseases and more common in women. The early detection of cancer is one of the most key factors for possible cure. There are numerous methods of diagnosis amongst which: clinical examination, sonar and mammography, which is the best and more effective in detecting breast cancer. Detection of breast tumors is difficult because of the weak illumination in the image and the overlap between regions. Segmentation is one the crucial steps in locating the tumors, which is an important method of diagnosis of the computer. In this study, segmentation techniques are proposed based on; classic morphology and fuzzy morphology, and a comparison between them. The proposed methods were tested using the database of mini -MIAS, which contains 322 images. After the comparison the statistical results, it shows, the detection of tumor boundary with fuzzy morphology give the higher accuracy than the results in classic morphology. The accuracy is 60.69%, 58.61% respectively due to the high flexibility of foggy logic in dealing with the low lighting in the medical images.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kamil, Mohammed Y., and Ali Mohammed Salih. "Breast Tumor Detection Via Fuzzy Morphological Operations." IJAPUC vol.11, no.1 2019: pp.33-44. http://doi.org/10.4018/IJAPUC.2019010103
APA
Kamil, M. Y. & Salih, A. M. (2019). Breast Tumor Detection Via Fuzzy Morphological Operations. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(1), 33-44. http://doi.org/10.4018/IJAPUC.2019010103
Chicago
Kamil, Mohammed Y., and Ali Mohammed Salih. "Breast Tumor Detection Via Fuzzy Morphological Operations," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.1: 33-44. http://doi.org/10.4018/IJAPUC.2019010103
Export Reference
Published: Jan 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019010104
Volume 11
Research Article
Yousif Ahmed Hamad, Konstantin Vasilievich Simonov, Mohammad B. Naeem
The identification, segmentation, and detection of the infected area in brain tumor is a tedious and a time-consuming task. The different structures of the human body can be visualized by an image...
Show More
The identification, segmentation, and detection of the infected area in brain tumor is a tedious and a time-consuming task. The different structures of the human body can be visualized by an image processing concept, an MRI. It is very difficult to visualize abnormal structures of the human brain using simple imaging techniques. An MRI technique contains many imaging modalities that scan and capture the internal structure of the human brain. This article concentrates on a noise removal technique, followed by improvement of medical images for a correct diagnosis using a balance contrast enhancement technique (BCET). Then, image segmentation is used. Finally, the Canny edge detection method is applied to detect the fine edges. The experiment results achieved nearly 98% accuracy in detecting the area of the tumor and normal brain regions in MRI images demonstrating the effectiveness of the proposed technique.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hamad, Yousif Ahmed, et al. "Detection of Brain Tumor in MRI Images, Using a Combination of Fuzzy C-Means and Thresholding." IJAPUC vol.11, no.1 2019: pp.45-60. http://doi.org/10.4018/IJAPUC.2019010104
APA
Hamad, Y. A., Simonov, K. V., & Naeem, M. B. (2019). Detection of Brain Tumor in MRI Images, Using a Combination of Fuzzy C-Means and Thresholding. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(1), 45-60. http://doi.org/10.4018/IJAPUC.2019010104
Chicago
Hamad, Yousif Ahmed, Konstantin Vasilievich Simonov, and Mohammad B. Naeem. "Detection of Brain Tumor in MRI Images, Using a Combination of Fuzzy C-Means and Thresholding," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.1: 45-60. http://doi.org/10.4018/IJAPUC.2019010104
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019040101
Volume 11
Research Article
Weifang Zhai, Yiran Jiang, Song Ji
Nowadays, in the field of intelligent transportation, data mining technology has been applied more and more widely. Data mining technology can find valuable data from amongst massive traffic data...
Show More
Nowadays, in the field of intelligent transportation, data mining technology has been applied more and more widely. Data mining technology can find valuable data from amongst massive traffic data and analyze traffic conditions according to actual traffic conditions. In order to improve the management and control level of ITMS, effective information can be queried from various query conditions, models suitable for various traffic situations can be found, analyzed and predicted, and accurate information can be provided to traffic managers for decision-making. This article mainly studies the data mining algorithm in intelligent transportation, in order to provide practical reference for the application and research of urban traffic big data technology.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Zhai, Weifang, et al. "Research on the Application of Data Mining Algorithms in Intelligent Transportation." IJAPUC vol.11, no.2 2019: pp.1-10. http://doi.org/10.4018/IJAPUC.2019040101
APA
Zhai, W., Jiang, Y., & Ji, S. (2019). Research on the Application of Data Mining Algorithms in Intelligent Transportation. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(2), 1-10. http://doi.org/10.4018/IJAPUC.2019040101
Chicago
Zhai, Weifang, Yiran Jiang, and Song Ji. "Research on the Application of Data Mining Algorithms in Intelligent Transportation," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.2: 1-10. http://doi.org/10.4018/IJAPUC.2019040101
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019040102
Volume 11
Research Article
Afef Gueidi, Hamza Gharsellaoui, Samir Ben Ahmed
In the face of the rapid growth of data, the authors note the birth of new computer systems leading the management of databases. To ensure reliable handling of data which is bulky and heterogeneous...
Show More
In the face of the rapid growth of data, the authors note the birth of new computer systems leading the management of databases. To ensure reliable handling of data which is bulky and heterogeneous, new systems of basic management data are differentiated from traditional ones by their linear scalability to store and manage data in parallel. Those systems are called NoSQL DB. Robotics database management systems are increasing. These systems ensure good storage of data and with big data analytics, a new approach demands new structures and methods for collecting, recording, and analyzing enterprise data. This journal article deals with the NoSQL DB which are the secret of the continual progression data that new data management solutions have emerged. The implementation of NoSQL for Robotics wrestles all data they acquire into a usable form because with the ordinary type of Robotics, people are facing big limits to find the best decision in real-time. The authors' proposed approach was based on a combination of some experimental studies in the same area.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gueidi, Afef, et al. "The Rise of Robotics Data for Real-Time Management Based on New NoSQL Solution." IJAPUC vol.11, no.2 2019: pp.11-26. http://doi.org/10.4018/IJAPUC.2019040102
APA
Gueidi, A., Gharsellaoui, H., & Ben Ahmed, S. (2019). The Rise of Robotics Data for Real-Time Management Based on New NoSQL Solution. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(2), 11-26. http://doi.org/10.4018/IJAPUC.2019040102
Chicago
Gueidi, Afef, Hamza Gharsellaoui, and Samir Ben Ahmed. "The Rise of Robotics Data for Real-Time Management Based on New NoSQL Solution," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.2: 11-26. http://doi.org/10.4018/IJAPUC.2019040102
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019040103
Volume 11
Research Article
Vishal Passricha, Ashish Chopra, Shubhanshi Singhal
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users...
Show More
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data reduction technique. The dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However, this method affects the deduplication process because encryption methods have varying characteristics. A convergent encryption (CE) scheme is widely used for secure data deduplication. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This article addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Passricha, Vishal, et al. "Secure Deduplication Scheme for Cloud Encrypted Data." IJAPUC vol.11, no.2 2019: pp.27-40. http://doi.org/10.4018/IJAPUC.2019040103
APA
Passricha, V., Chopra, A., & Singhal, S. (2019). Secure Deduplication Scheme for Cloud Encrypted Data. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(2), 27-40. http://doi.org/10.4018/IJAPUC.2019040103
Chicago
Passricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.2: 27-40. http://doi.org/10.4018/IJAPUC.2019040103
Export Reference
Published: Apr 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019040104
Volume 11
Research Article
Stefan Piasecki
Gamification as a tool or procedure to add entertaining and motivating elements to usually non-entertaining environments such as schools or workplaces is becoming more and more popular. E-learning...
Show More
Gamification as a tool or procedure to add entertaining and motivating elements to usually non-entertaining environments such as schools or workplaces is becoming more and more popular. E-learning platforms like Moodle provide tools and sets of functions to add elements of gamification. An important factor, especially for education, is technology: individual achievements and progress can be recorded, measured, tracked and visualized and, therefore, identified and honored through bonus points, awards or rankings. This is where gamification can add some challenge and excitement to learning.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019070101
Volume 11
Research Article
Kamalendu Pal
The use of Radio Frequency Identification (RFID) technology has attracted a huge attention from the supply chain business community. This is due to the use of RFID technology wide range of...
Show More
The use of Radio Frequency Identification (RFID) technology has attracted a huge attention from the supply chain business community. This is due to the use of RFID technology wide range of applications in the fields of logistics and supply chain management. This paper presents a brief overview of a simple industrial RFID system and then describe the basic concept of tag collision problem. Despite many useful applications, the RFID tag collision creates a major problem for fast tag identification process. There are different algorithmic solutions available to overcome tag collision problem in industrial supply chains. Based on binary search algorithm (BSA) of dynamic and backtracking, two variations of binary anti-collision search algorithms for tag identification processes are described in this paper. Simulation-based experimental results on the performance of these algorithms are evaluated when handling multiple RFID tags simultaneously. The backtracking binary search algorithm has obvious advantages in terms of tag identification process compared to the other two algorithms.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019070102
Volume 11
Research Article
Padma Lochan Pradhan
This proposed literature survey provides basic data regarding the first step of risk identification and analysis to achieve a secured infrastructure. The demand and risk are two parts of the same...
Show More
This proposed literature survey provides basic data regarding the first step of risk identification and analysis to achieve a secured infrastructure. The demand and risk are two parts of the same coin. The demand is directly proportional to the risk, but preventive control is inversely proportional to risk. The necessity of preventive control in any organization has increased because of the changes in logic, structure, and the type of technology applied to services that generate risks. Finally, the business increases along with technology, which creates risks and spreads over its infrastructure. We have to focus on protecting, detecting, correcting, verifying and validating the Unix file system. This survey article proposes and resolves the Unix file system by applying a hardening, re-configuration and access control mechanism up to the highest level of preventive control.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019070103
Volume 11
Research Article
Lokesh B. Bhajantri, Tabassum N. Mujawar
Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to...
Show More
Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grained access control mechanism. The most widely used and efficient access control scheme for cloud computing is Attribute Based Encryption (ABE). The Attribute Based Encryption (ABE) scheme provides a new technique for embedding access policies cryptographically into encryption process. The article presents an overview of various existing attribute-based encryption schemes and traditional access control models. Also, the comparison of existing ABE schemes for cloud computing, on basis of various criteria is presented in the article.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Bhajantri, Lokesh B., and Tabassum N. Mujawar. "A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing." IJAPUC vol.11, no.3 2019: pp.33-52. http://doi.org/10.4018/IJAPUC.2019070103
APA
Bhajantri, L. B. & Mujawar, T. N. (2019). A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(3), 33-52. http://doi.org/10.4018/IJAPUC.2019070103
Chicago
Bhajantri, Lokesh B., and Tabassum N. Mujawar. "A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.3: 33-52. http://doi.org/10.4018/IJAPUC.2019070103
Export Reference
Published: Jul 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019070104
Volume 11
Research Article
Vikram Singh
Modern information systems are expected to assist users with diverse goals, via exploiting the topical dimension (‘what' the user is searching for) of information needs. However, the intent...
Show More
Modern information systems are expected to assist users with diverse goals, via exploiting the topical dimension (‘what' the user is searching for) of information needs. However, the intent dimension (‘why' the user is searching) has preferred relatively lesser for the same intention. Traditionally, the intent is an ‘immediate reason, purpose, or goal' that motivates the user search, and captured in search contexts (Pre-search, In-search, Pro-Search), an ideal information system would be able to use. This article proposes a novel intent estimation strategy; based on the intuition that captured intent, and proactively extracts likely results. The captured ‘Pre-search' context adapts query term proximities within matched results beside document-term statistics and pseudo-relevance feedback with user-relevance feedback for In-search. The assessment asserts the superior performance of the proposed strategy over the equivalent on tradeoffs, e.g., novelty, diversity (coverage, topicality), retrieval (precision, recall, F-measure) and exploitation vs exploration.
Content Forthcoming
Add to Your Personal Library: Article Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019100101
Volume 11
Research Article
Vishal Passricha, Shubhanshi Singhal
CNNs are playing a vital role in the field of automatic speech recognition. Most CNNs employ a softmax activation layer to minimize cross-entropy loss. This layer generates the posterior probability...
Show More
CNNs are playing a vital role in the field of automatic speech recognition. Most CNNs employ a softmax activation layer to minimize cross-entropy loss. This layer generates the posterior probability in object classification tasks. SVMs are also offering promising results in the field of ASR. In this article, two different approaches: CNNs and SVMs, are combined together to propose a new hybrid architecture. This model replaces the softmax layer, i.e. the last layer of CNN by SVMs to effectively deal with high dimensional features. This model should be interpreted as a special form of structured SVM and named the Convolutional Neural SVM. (CNSVM). CNSVMs incorporate the characteristics of both models which CNNs learn features from the speech signal and SVMs classify these features into corresponding text. The parameters of CNNs and SVMs are trained jointly using a sequence level max-margin and sMBR criterion. The performance achieved by CNSVM on Hindi and Punjabi speech corpus for word error rate is 13.43% and 15.86%, respectively, which is a significant improvement on CNNs.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Passricha, Vishal, and Shubhanshi Singhal. "Hindi and Punjabi Continuous Speech Recognition Using CNSVM." IJAPUC vol.11, no.4 2019: pp.1-15. http://doi.org/10.4018/IJAPUC.2019100101
APA
Passricha, V. & Singhal, S. (2019). Hindi and Punjabi Continuous Speech Recognition Using CNSVM. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(4), 1-15. http://doi.org/10.4018/IJAPUC.2019100101
Chicago
Passricha, Vishal, and Shubhanshi Singhal. "Hindi and Punjabi Continuous Speech Recognition Using CNSVM," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.4: 1-15. http://doi.org/10.4018/IJAPUC.2019100101
Export Reference
Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019100102
Volume 11
Research Article
Praveen Shivashankrappa Challagidad, Mahantesh N. Birje
Data loss occurs due to crashing, correlated failure, logical failure, power outages and security threats. Several techniques (e.g. NoBackup, WARBackup and LocalRecovery) are being used to recover...
Show More
Data loss occurs due to crashing, correlated failure, logical failure, power outages and security threats. Several techniques (e.g. NoBackup, WARBackup and LocalRecovery) are being used to recover data locally. And, strongly consistent Cloud services (SCCS) must provide good performance and high availability. However, conventional strong consistency replication methods have the limitation of availability of replicated services when recovering huge amount of data across wide area links. There is a need for remote recovery mechanisms for high availability of service/data, because distributed nature of cloud infrastructures. To address these issues, the article proposes a hierarchical system architecture for replication across a data center, and employs the backward atomic backup recovery technique (BABRT) for local recovery and remote recovery for high availability of the cloud services/data. A mathematical model for BABRT is described. Simulation results show that BABRT reduces the storage consumption, recovery time, window of vulnerability and failure rates, compared to other recovery models.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Challagidad, Praveen Shivashankrappa, and Mahantesh N. Birje. "Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability." IJAPUC vol.11, no.4 2019: pp.16-33. http://doi.org/10.4018/IJAPUC.2019100102
APA
Challagidad, P. S. & Birje, M. N. (2019). Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(4), 16-33. http://doi.org/10.4018/IJAPUC.2019100102
Chicago
Challagidad, Praveen Shivashankrappa, and Mahantesh N. Birje. "Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.4: 16-33. http://doi.org/10.4018/IJAPUC.2019100102
Export Reference
Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019100103
Volume 11
Research Article
Song Ji, Weifang Zhai, Yiran Jiang
Workflow technology is the core technology to realize business process modeling, process operation, monitoring and management, and ultimately realize business process automation. Workflow-based...
Show More
Workflow technology is the core technology to realize business process modeling, process operation, monitoring and management, and ultimately realize business process automation. Workflow-based office automation system can separate code writing and the operation mode. When business processes need to be changed, there is no need to modify the program. Users only need to customize the workflow through the visual process customization mode. The workflow engine is the core of the whole workflow management system and the control center of the whole system. This article designs a workflow engine based on a relational structure, including the design of workflow engine class, functional component, interface and database. Finally, a flexible office automation system with customizable business processes is implemented.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ji, Song, et al. "Design of Workflow Engine Based on Relational Structures." IJAPUC vol.11, no.4 2019: pp.34-43. http://doi.org/10.4018/IJAPUC.2019100103
APA
Ji, S., Zhai, W., & Jiang, Y. (2019). Design of Workflow Engine Based on Relational Structures. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(4), 34-43. http://doi.org/10.4018/IJAPUC.2019100103
Chicago
Ji, Song, Weifang Zhai, and Yiran Jiang. "Design of Workflow Engine Based on Relational Structures," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.4: 34-43. http://doi.org/10.4018/IJAPUC.2019100103
Export Reference
Published: Oct 1, 2019
Converted to Gold OA:
DOI: 10.4018/IJAPUC.2019100104
Volume 11
Research Article
Rakshith M.D. Hegde, Harish H Kenchannavar
The Smart Home is an environment that enables the resident to interact with home appliances which provide resident intended services. In recent years, predicting resident intention based on the...
Show More
The Smart Home is an environment that enables the resident to interact with home appliances which provide resident intended services. In recent years, predicting resident intention based on the contextual modalities like activity, speech, emotion, object affordances, and physiological parameters have increased importance in the field of pervasive computing. Contextual modality is the feature through which resident interacts with the home appliances like TVs, lights, doors, fans, etc. These modalities assist the appliances in predicting the resident intentions making them recommend resident intended services like opening and closing doors, turning on and off televisions, lights, and fans. Resident-appliance interaction can be achieved by embedding artificial intelligence-based machine learning algorithms into the appliances. Recent research works on the contextual modalities and associated machine learning algorithms which are required to build resident intention prediction system have been surveyed in this article. A classification taxonomy of contextual modalities is also discussed.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Hegde, Rakshith M.D., and Harish H. Kenchannavar. "A Survey on Predicting Resident Intentions Using Contextual Modalities in Smart Home." IJAPUC vol.11, no.4 2019: pp.44-59. http://doi.org/10.4018/IJAPUC.2019100104
APA
Hegde, R. M. & Kenchannavar, H. H. (2019). A Survey on Predicting Resident Intentions Using Contextual Modalities in Smart Home. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(4), 44-59. http://doi.org/10.4018/IJAPUC.2019100104
Chicago
Hegde, Rakshith M.D., and Harish H. Kenchannavar. "A Survey on Predicting Resident Intentions Using Contextual Modalities in Smart Home," International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) 11, no.4: 44-59. http://doi.org/10.4018/IJAPUC.2019100104
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100