Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mohammed, Amin Salih
- Exploiting the Local Optima in Genetic Algorithm using Tabu Search
Abstract Views :667 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Lebanese French University, Erbil, Kurdistan Region, IQ
2 Department of Electronics and Communication Engineering, PSNA College of Engineering and Technology, Kothandaraman Nagar, Dindigul – 624622, Tamil Nadu, IN
1 Department of Information Technology, Lebanese French University, Erbil, Kurdistan Region, IQ
2 Department of Electronics and Communication Engineering, PSNA College of Engineering and Technology, Kothandaraman Nagar, Dindigul – 624622, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 12, No 1 (2019), Pagination: 1-13Abstract
Objectives: To explores the process of selecting retrieval schemes along with their weights, and fusion function for data fusion in information retrieval. Methods/Statistical Analysis: This has been carried out using the hybrid Genetic Algorithm. The fusion function, retrieval schemes and their weights lead to a tremendous combination. Finding an optimal solution from this great combination is entirely based on the exploration. Findings: We used, odd and even point crossover as an exploration tool. This exploration tool suffers a setback of slow convergence. The convergence rate can be improved by merging Tabu search, a best local search, with the genetic algorithm. This Tabu GA is used to select the retrieval schemes, weights and fusion function. The outcome of the experiments conducted over the test data sets namely: 1. adi, 2. cisi, and 3. cranlooks promising. We achieved 6.89% of improvement in performance, and the significance of the result is tested statistically. The convergence rate is also improved. Application/Improvements: We achieved 6.89% of improvement in performance, and the significance of the result is tested statistically. The convergence rate is also improved.Keywords
Genetic Algorithm, Information Retrieval, Odd and Even Point Crossover, Tabu GA, Tabu SearchReferences
- Salton G, McGill MJ. Introduction to modern Information Retrieval. McGraw-Hill; 1983. p. 1–448.
- Yates RB, Neto BR. Modern Information Retrieval. Addison-Wesley; 1999. p. 1–103. PMid: 10188590.
- Korfhage RR. Information storage and Retrieval. Willey computer Publishing; 1997. p. 1–349.
- ZobelJ, Moffat A. Exploring the similarity space, ACM SIGIR Forum. 1998; 32(1):18–34.
- Lee JH. Combining Multiple Evidence from Different Properties of weighting schemes. Date accessed: 13/07/1995. https://dl.acm.org/citation.cfm?id=215358.
- Lee JH. Combining Multiple Evidence from different relevance feedback network, Database Systems for Advanced Applications. 1997; 97:421–30.
- Billhart H. Learning retrieval expert combinations with genetic algorithms, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2003; 11(3):87– 113. https://doi.org/10.1142/S0218488503001965.
- Fisher HL, Elchesen DR. Effectiveness of combining title words and index terms in machine retrieval searches; Journal of Nature.1972; 109–10.
- Lee JH. Analyses of Multiple Evidence Combination. Proceeding of the ACM SIGIR Conference on Research and Development in Information Retrieval; 1997. 267–76. https://doi.org/10.1145/258525.258587.
- Fox EA, Shaw JA. Combination of multiple searches, Proceeding of the Second Text Retrieval Conference (TREC-2). 1994; 500-215:243–52.
- Fox EA, Shaw JA. Combination of Multiple Searches. Proceeding of the Third Text Retrieval Conference (TREC-3); 1995. p.105–08.
- Gold Berge DE. Genetic Algorithms in Search, Optimization, and Machine learning. Addison-Wesley; 1989. p. 1–432.
- Information Retrieval: A Survey. Date accessed: 30/11/2000. https://www.csee.umbc.edu/csee/research/cadip/readings/ IR.report.120600.book.pdf.
- Chor B, Goldreich O, Kushilevitz E, Sudan M. Private Information Retrieval, Journal of the ACM. 1998; 45(6):965–82. https://doi.org/10.1145/293347.293350.
- Data Fusion. Date accessed: 15/01/2009. https://dl.acm.org/citation.cfm?id=1456651.
- Tabu Search. Date accessed: 2011. https://wiki.eecs.yorku.ca/course_archive/201112/F/4403/_media/tabu_search.pdf.
- Tabu Search Fundamentals and Uses. Date accessed: 1995. https://www.researchgate.net/publication/249776329_ Tabu_Search_Fundamentals_and_Uses.
- Senaratna NI. Genetic Algorithm: The crossover-Mutation Debate. A literature survey (CSS3137-B) submitted in partial fulfillment of the requirements for the Degree of Bachelor of Computer Science (Special) of the University of Colombo; 2005. p. 1–26.
- Detection of Accurate Facial Detection using Hybrid Deep Convolutional Recurrent Neural Network
Abstract Views :254 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Lebanese French University, IQ
1 Department of Information Technology, Lebanese French University, IQ
Source
ICTACT Journal on Soft Computing, Vol 9, No SP 2 (2019), Pagination: 1844-1850Abstract
Facial Landmark discovery is an imperative issue in numerous PC vision applications about appearances. It is extremely testing as human faces in wild conditions regularly present expansive varieties fit as a fiddle because of various stances, impediments or demeanors. Profound neural systems have been connected to take in the guide from face pictures to confront shapes. To the best of our insight, Recurrent Neural Network (RNN) has not been utilized in this issue yet. In this paper, we propose a technique which uses RNN and Deep Neural Network (DNN) to take in the face shape. To start with, we design a system utilizing Convolutional Neural Network (CNN) to get the underlying Landmark estimation of appearances. At that point, we utilize feed-forward neural systems for neighborhood look where a segment based seeking technique is investigated. By utilizing LSTM- CNN-RNN, the underlying estimation is more dependable which makes the accompanying segment based pursuit doable and exact. Tests demonstrate that the worldwide system utilizing CNN-LSTM-RNN shows signs of improvement results than past systems in the two recordings and single picture. Our technique beats the cutting edge calculations particularly regarding fine estimation of Landmark spots.Keywords
Facial landmark, Deep Neural Network, Recurrent Neural Network, Convolutional Neural Network.References
- T. Weise, S. Bouaziz, H. Li and M. Pauly, “Realtime Performance-based Facial Animation”, ACM Transactions on Graphics, Vol.30, No. 4, pp. 71-77, 2011.
- Q. Cai, D. Gallup, C. Zhang and Z. Zhang, “3D Deformable Face Tracking with a Commodity Depth Camera”, Proceedings of 11th International Conference on European Conference on Computer Vision, pp. 229-242, 2010.
- G. Fanelli, M. Dantone, and L.V. Gool, “Real Time 3D Face Alignment with Random Forests-based Active Appearance Models”, Proceedings of 10th International Conference and Workshops on Automatic Face and Gesture Recognition, pp. 1-8, 2013.
- Z.Z. Zhang, W. Zhang, J.Z. Liu and X.O. Tang, “Multiview Facial Landmark Localization in RGB-D Images via Hierarchical Regression With Binary Patterns”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, No. 9, pp. 1475-1485, 2014.
- T. Cootes, C.J. Taylor, D.H. Cooper and J. Graham, “Active Shape Models-Their Training and Application”, Computer Vision and Image Understanding, Vol. 61, No. 1, pp. 38-59, 1995.
- T. Cootes, G.J. Edwards and C.J. Taylor, “Active Appearance Models”, Available at: https://www.cs.cmu.edu/~efros/courses/AP06/Papers/cootes-eccv-98.pdf.
- I. Matthews and S. Baker, “Active Appearance Models Revisited”, International Journal of Computer Vision, Vol. 6, No. 2, pp. 135-164, 2004.
- T. Cootes, G.J. Edwards and C.J. Taylor. “Active Appearance Models”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 23, No. 6, pp. 681-685, 2001.
- X. Liu, “Generic Face Alignment using Boosted Appearance Model”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 1-8, 2007.
- D. Cristinacce and T. Cootes, “Automatic Feature Localization with Constrained Local Models”, Pattern Recognition, Vol. 41, No. 10, pp. 3054-3067, 2008.
- D. Cristinacce and T. Cootes, “Feature Detection and Tracking with Constrained Local Models”, Proceedings of International Conference on British Machine Vision Conference, pp. 929-938, 2006.
- J. Saragih, S. Lucey and J. Cohn, “Deformable Model Fitting by Regularized Landmark Mean-Shift”, International Journal of Computer Vision, Vol. 91, No. 2, pp. 200-215, 2011.
- Y. Wang, S. Lucey and J. Cohn, “Enforcing Convexity for Improved Alignment with Constrained Local Model”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 1-8, 2008.
- L. Gu, and T. Kanade, “A Generative Shape Regularization Model for Robust Face Alignment”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 413-426, 2008.
- P. Dollar, P. Welinder and P. Perona, “Cascaded Pose Regression”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 1078-1085, 2010.
- T.C. Patrick Sauer and C. Taylor, “Accurate Regression Procedures for Active Appearance Models”, Proceedings of International Conference on European Conference on Computer Vision, 2011, pp. 1-30, 2011.
- J. Saragih and R. Goecke, “A Nonlinear Discriminative Approach to AAM Fitting”, Proceedings of 7th IEEE International Conference on Computer Vision, pp. 1-8, 2007.
- X.D. Cao, Y.C. Wei, F. Wen and J. Sun, “Face Alignment by Explicit Shape Regression”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2887-2894, 2012.
- F. Visin et al., “ReNet: A Recurrent Neural Network based Alternative to Convolutional Networks”, Available at: https://arxiv.org/pdf/1505.00393.pdf.
- Y. Sun, Q. Liu, H. Lu, “Low Rank Driven Robust Facial Landmark Regression”, Neurocomputing, Vol. 151, pp. 196-206, 2015.
- M. Ozuysal, M. Calonder, V. Lepetit and P. Fua, “Fast Key-Point Recognition using Random Ferns”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 32, No. 3, pp. 448-461, 2009.
- N. Duffy and D.P. Helmbold, “Boosting methods for Regression”, Machine Learning, Vol. 47, No. 2, pp. 153-200, 2002.
- J.H. Friedman, “Greedy Function Approximation: A Gradient Boosting Machine”, Available at: https://statweb.stanford.edu/~jhf/ftp/trebst.pdf.
- D.G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints”, International Journal of Computer Vision, Vol. 60, No. 2, pp. 91-110, 2004.
- M. Calonder, V. Lepetit, C. Strecha and P. Fua, “Brief: Binary Robust Independent Elementary Features”, Proceedings of 10th IEEE International Conference on Computer Vision, pp. 778-792, 2010.
- V. Lepetit, P. Lagger and P. Fua, “Randomized Trees for Real-Time Keypoint Recognition”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 775-781, 2005.
- E. Rublee, V. Rabaud, K. Konolige and G. Bradski, “ORB: An Efficient Alternative to SIFT or SURF”, Proceedings of International Conference on Computer Vision, pp. 2564-2571, 2011.
- S. Leutenegger, M. Chli and R. Siegwart, “Brisk: Binary Robust Invariant Scalable Keypoints”, Proceedings of International Conference on Computer Vision, pp. 2548-2555, 2011.
- A. Alahi, R. Ortiz and P. Vandergheynst, “FREAK: Fast Retina Keypoint”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 510-517, 2012.
- X.P. Burgos-Artizzu, P. Perona and P. Dollar. “Robust Face Landmark Estimation Under Occlusion”, Proceedings of International Conference on Computer Vision, pp. 1513-1520, 2013.
- Y. Sun, X.G. Wang and X.O. Tang, “Deep Convolutional Network Cascade for Facial Point Detection”, Proceedings of International Conference on Computer Vision, pp. 3476-3483, 2013.
- J. Zhang, S.G. Shan, M.N. Kan and X.L. Chen, “Coarse-to-Fine Auto-Encoder Networks (CFAN) for Real-Time Face Alignment, Proceedings of International Conference on European Conference on Computer Vision, pp. 1-16, 2014.
- Y. Chen, W. Luo and J. Yang. “Facial Landmark Detection via Pose-Induced Auto-Encoder Networks”, Proceedings of International Conference on Image Processing, pp. 27-30, 2015.
- Z.P. Zhang, P. Luo, C.C Loy and X.O. Tang, “Facial Landmark Detection by Deep Multi-Task Learning”, Proceedings of International Conference on European Conference on Computer Vision, pp. 94-108, 2014.
- S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory”, Neural Computing, Vol. 9, No. 8, pp. 1735-1780, 1997.
- A. Graves et al., “A Novel Connectionist System for Unconstrained Handwriting Recognition”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 31, No. 5, pp. 855-868, 2009.
- C. Plahl, M. Kozielski, R. Schluter and H. Ney, “Feature Combination and Stacking of Recurrent and Non-Recurrent Neural Networks for LVCSR”, Proceedings of International Conference on Acoustics, Speech and Signal Processing, pp. 6714-6718, 2013.
- M. Wollmer et al., “Online Driver Distraction Detection using Long Short-Term Memory”, IEEE Transactions on Intelligent Transportation Systems, Vol. 12, No. 2, pp. 574-582, 2011.
- S. Hochreiter, Y. Bengio, P. Frasconi and J. Schmidhuber, “Gradient Flow in Recurrent Nets: The Difficulty of Learning Long-Term Dependencies”, IEEE Press, 2001.
- M. Schuster and K.K. Paliwal, “Bidirectional Recurrent Neural Networks”, IEEE Transactions on Signal Processing, Vol. 45, No. 11, pp. 2673-2681, 1997.
- A. Graves and J. Schmidhuber, “Framewise Phoneme Classification with Bidirectional LSTM and other Neural Network Architectures”, Neural Networks, Vol. 18, No. 5-6, pp. 602-610, 2005.
- A. Maas et al., “Recurrent Neural Networks for Noise Reduction in Robust ASR”, Available at: http://www1.icsi.berkeley.edu/~vinyals/Files/rnn_denoise_2012.pdf.
- C. Cao, Q. Hou and K. Zhou, “Displaced Dynamic Expression regression for Real-Time Facial Tracking and Animation”, Proceedings of ACM Conference on Special Interest Group on Computer Graphics, Vol. 33, No. 4, pp. 142-147, 2014.
- C. Sagonas, G. Tzimiropoulos, S. Zafeiriou and M. Pantic, “The First Facial Landmark Localization Challenge”, Proceedings of IEEE International Conference on Computer Vision, pp. 41-52, 2013.
- A. Asthana, S. Zafeiriou, S. Cheng and M. Pantic, “Robust Discriminative Response Map Fitting with Constrained Local Models”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3444-3451, 2013.
- X. Yu, J. Huang, S. Zhang, W. Yan, D. N. Metaxas, “Pose-Free Facial Landmark Fitting via Optimized Part Mixtures and Cascaded Deformable Shape Model”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 1944-1951, 2013.
- X. Zhu and D. Ramanan, “Face Detection, Pose Estimation, and Landmark Localization in the Wild”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 2879-2886, 2012.
- F. Weninger, J. Bergmann and B. Schuller, “Introducing Currennt-The Munich Open-Source CUDA Recurrent Neural Network Toolkit”, Journal of Machine Learning Research, Vol. 16, pp. 547-551, 2015.
- P.N. Belhumeur, D.W. Jacobs, D.J. Kriegman and N. Kumar, “Localizing Parts of Faces using a Consensus of Exemplars”, Proceedings of International Conference on Computer Vision and Pattern Recognition, pp. 545-552, 2013.
- V. Le, J. Brandt, Z. Lin, L. Bourdev and T.S. Huang, “Interactive Facial Feature Localization”, Proceedings of International Conference on European Conference on Computer Vision, pp. 679-692, 2012.
- J. Yang, J.K. Deng, K.H. Zhang and Q.S. Liu, “Facial Shape Tracking Via Spatio-Temporal Cascade Shape Regression”, Proceedings of the IEEE International Conference on Computer Vision Workshop, pp. 41-49, 2015.
- G.S. Chrysos, E. Antonakos, S. Zafeiriou and P. Snape. “Offline Deformable Face Tracking in Arbitrary Videos, Proceedings of the IEEE International Conference on Computer Vision Workshops, pp. 32-35, 2015.
- J. Shen, S. Zafeiriou, G.S. Chrysos, J. Kossaifi, G. Tzimiropoulos and M. Pantic, “The First Facial Landmark Tracking in-the-Wild Challenge: Benchmark and Results”, Proceedings of IEEE International Conference and Workshop on Computer Vision, pp. 11-17, 2015.
- G. Tzimiropoulos, “Project-Out Cascaded Regression with an Application to Face Alignment”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 3659-3667, 2015.
- C. Sagonas, E. Antonakos, G, Tzimiropoulos, S. Zafeiriou and M. Pantic, “300 faces In-the-wild challenge: Database and Results”, Image and Vision Computing, Vol. 47, pp. 3-18, 2016.
- C. Sagonas, G. Tzimiropoulos, S. Zafeiriou and M. Pantic, “A Semi-Automatic Methodology for Facial Landmark Annotation”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2111-2117, 2013.
- S. Bell, K. Bala, L. Zitnick and R. Girshick, “Inside-Outside Net: Detecting Objects in Context with Skip Pooling and Recurrent Neural Networks”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2874-2883, 2016.
- V. Kazemi and J. Sullivan, “One Millisecond Face Alignment with an Ensemble of Regression Trees”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1867-1874, 2014.
- A. Graves and J. Schmidhuber, “Offline Handwriting Recognition with Multidimensional Recurrent Neural Networks”, Proceedings of the 21st International Conference on Neutral Information Processing Systems, pp. 545-552, 2008.
- W. Byeon, T.M. Breuel, F. Raue and M. Liwicki, “Scene Labeling with LSTM Recurrent Neural Networks”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 111-117, 2015.
- Privacy Preserving Data Mining using Threshold Based Fuzzy C-Means Clustering
Abstract Views :472 |
PDF Views:1
Authors
Affiliations
1 Department of Information Technology, Lebanese French University, Erbil, IQ
1 Department of Information Technology, Lebanese French University, Erbil, IQ
Source
ICTACT Journal on Soft Computing, Vol 9, No 1 (2018), Pagination: 1813-1816Abstract
Privacy preserving is critical in the field of where data mining is transformed into cooperative task among individuals. In data mining, clustering algorithms are most skilled and frequently used frameworks. In this paper, we propose a privacy-preserving threshold clustering that uses code based technique with threshold estimation for sharing of secret data in privacy-preserving mechanism. The process includes code based methodology which enables the information to be partitioned into numerous shares and handled independently at various servers. The proposed method takes less number of iterations in comparison with existing methods that does not require any trust among the clients or servers. The paper additionally provides experimental results on security and computational efficiency of proposed method.Keywords
Privacy Preserving, Data Mining, Threshold Cryptography, Fuzzy C-Means Clustering, Vandermonde Matrix, Secure Multiparty Computation.References
- R. Agrawal and R. Srikant, “Privacy Preserving Data Mining. ACM SIGMOD”, Proceedings of International Conference on Management of Data, pp. 439-450, 2000.
- Y. Lindell and Pinkas, “Privacy Preserving Data Mining”, Journal of Cryptology, Vol. 15, No. 3, pp. 177-183, 2002.
- A. Shamir, “How to Share a Secret”, Communications of the ACM, 1979.
- M. Mignotte. “How to Share a Secret”, Proceedings of Workshop on Cryptography, pp. 371-375, 1983.
- Josef Pieprzyk and Xian-Mo Zhang, “Ideal Threshold Schemes from MDS Codes”, Proceedings of International Conference on Information Security and Cryptology, pp. 253-263, 2003.
- B. Pinkas, “Cryptographic Techniques for Privacy-Preserving Data Mining”, Available at: http://www.pinkas.net/PAPERS/sigkdd.pdf.
- S. Verykios et al., “State of the-Art in Privacy Preserving Data Mining”, ACM SIGMOD Record, Vol. 33, No. 1, pp. 50-57, 2004.
- V Baby and Subhash N Chandra, “Privacy-Preserving Distributed Data Mining Techniques: A Survey”, International Journal of Computer Applications, Vol. 143, No. 10, pp. 37-41, 2016.
- J. Brickell and V. Shmatikov, “Privacy-Preserving Classifier Learning”, Proceedings of 13th International Conference on Financial Cryptography and Data Security, pp. 1-6, 2009.
- G. Jagannathan and R.N. Wright, “Privacy-Preserving Distributed k-Means Clustering over Arbitrarily Partitioned Data”, Proceedings of 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593-599, 2005.
- P. Bunn and R. Ostrovsky, “Secure Two-Party K-Means Clustering”, Proceedings of ACM International Conference on Computer and Communications Security, pp. 486-497, 2007.
- M. Upmanyu, A.M. Namboodiri, K. Srinathan and C.V. Jawahar, “Efficient Privacy Preserving K-Means Clustering”, Proceedings of Pacific-Asia Workshop on Intelligence and Security Informatics, pp. 154-166, 2010.
- E. Bertino, I.N. Fovino and L.P. Provenza. “A Framework for Evaluating Privacy Preserving Data Mining Algorithms”, Data Mining and Knowledge Discovery, Vol. 11, No. 2, pp. 121-154, 2005.
- Optimized Cooperative QOS Enhanced Distributed Multipath Routing Protocol
Abstract Views :199 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Engineering, Lebanese French University, IQ
2 Department of Information Technology, Emirates College for Management and Information Technology, AE
3 Department of Master of Computer Application, Jain University, IN
1 Department of Computer Engineering, Lebanese French University, IQ
2 Department of Information Technology, Emirates College for Management and Information Technology, AE
3 Department of Master of Computer Application, Jain University, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 3 (2019), Pagination: 2061-2065Abstract
The link failure is considered in this paper in order to guarantee reliable and continuous transmission of data. And to ensure that cooperative routing is done faster response and effective packet transmission. Cooperative communications are the most recent fields of research; they combine wireless channels’ link quality and broadcasting nature. So communication in ad hoc mobile networks only works properly if the participating nodes work together in routing and transmission. A flow is divided into batches of data packets. When they leave the source node every packet in the same batch has the same forwarder list. The underlying routing protocol used in this work is Proactive Source Routing (PSR), which provides each node with all other nodes on the network. The forwarder list therefore contains the identity of the path nodes from the source node to the location. Once packets progress through the network, forwarding nodes can amend the forwarder list when any changes in the network topology have been observed. In addition, some other nodes not listed as transmitting data may also be transmitted, which is called as small-scale retransmission.Keywords
Link-Quality, QOS, Proactive Source Routing, Multipath Routing Protocol.References
- Y. Chai, W. Shi, T. Shi and X. Yang, “An Efficient Cooperative Hybrid Routing Protocol for Hybrid Wireless Mesh Networks”, Wireless Networks, Vol. 23, No. 5, pp. 1387-1399, 2017.
- P. Vivekanandan and A. Sunitha Nadhini, “A Survey on Efficient Routing Protocol using Mobile Networks”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-382, 2013.
- S. Paruchuri and S. Awate, “Organizational Knowledge Networks and Local Search: The Role of IntraOrganizational Inventor Networks”, Strategic Management Journal, Vol. 38, No. 3, pp. 657-675, 2017.
- V. Balasubramanian and A. Karmouch, “Managing the Mobile Ad-Hoc Cloud Ecosystem using software Defined Networking Principles”, Proceedings of International Symposium on Networks, Computers and Communications, pp. 1-6, 2017.
- T.X. Tran, A. Hajisami, P. Pandey and D. Pompili, “Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges”, IEEE Communications Magazine, Vol. 55, No. 4, pp. 54-61, 2017.
- B. Blanco, J.O. Fajardo, I. Giannoulakis, E. Kafetzakis, S. Peng, J. Perez Romero and E. Sfakianakis, “Technology Pillars in the Architecture of Future 5G Mobile Networks: NFV, MEC and SDN”, Computer Standards and Interfaces, Vol. 54, pp. 216-228, 2017.
- M.L. Duckers, A.B. Witteveen, J.I. Bisson and M. Olff, “The Association between Disaster Vulnerability and PostDisaster Psychosocial Service Delivery across Europe”, Administration and Policy in Mental Health and Mental Health Services Research, Vol. 44, No. 4, pp. 470-479, 2017.
- C. Arrighi, L. Rossi, E. Trasforini, R. Rudari, L. Ferraris, M. Brugioni and F. Castelli, “Quantification of Flood Risk Mitigation Benefits: A Building-Scale Damage Assessment through the RASOR Platform”, Journal of Environmental Management, Vol. 207, pp. 92-104, 2018.
- C. Zhou and L.Y. Ding, “Safety Barrier Warning System for Underground Construction Sites using Internet-of-Things Technologies”, Automation in Construction, Vol. 83, pp. 372-389, 2017.
- N. Kumar and R.A. Khan, “Emergency Information System Architecture for Disaster Management: Metro City Perspective”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, pp. 560-564, 2017.
- E. Burke, M. Pinedo, K.G. Zografos, M.A. Madas and K.N. Androutsopoulos, “Increasing Airport Capacity Utilisation through Optimum Slot Scheduling: Review of Current Developments and Identification of Future Needs”, Journal of Scheduling, Vol. 20, No. 1, pp. 103-113, 2017.
- F. Al-Turjman, “Cognitive Routing Protocol for DisasterInspired Internet of Things”, Future Generation Computer Systems, Vol. 92, pp. 1103-1115, 2017.
- C. Funai, C. Tapparello and W. Heinzelman, “Enabling Multi-Hop Ad Hoc Networks through WiFi Direct MultiGroup Networking”, Proceedings of International Conference on Computing, Networking and Communications, pp. 491-497, 2017.
- D. Aggarwal, “A Study on the Role of Mobile Ad Hoc Networks (MANETS) In Disaster Management”, International Journal of Advanced Research in Computer Science, Vol. 8, No. 5, pp. 1963-1966, 2017.
- X. Xu, A. Chen and C. Yang, “An Optimization Approach for Deriving Upper and Lower Bounds of Transportation Network Vulnerability under Simultaneous Disruptions of Multiple Links”, Transportation Research Procedia, Vol. 23, No. 7, pp. 645-663, 2017.
- S. Rani, J. Malhotra and R. Talwar, “Energy Efficient Chain based Cooperative Routing Protocol for WSN”, Applied Soft Computing, Vol. 35, pp. 386-397, 2015.
- M. Maalej, S. Cherif and H. Besbes, “QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks”, The Scientific World Journal, Vol. 2013, pp. 1-11, 2013.
- M. Chen, T. Kwon, S. Mao, Y. Yuan and V.C. Leung, “Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks”, International Journal of Sensor Networks, Vol. 4, No. 1-2, pp. 104-112, 2008.