Skip Content
You are currently on the new version of our website. Access the old version .

Algorithms, Volume 13, Issue 8

2020 August - 27 articles

Cover Story: The novelty in application of the Reed–Solomon algorithm for remote sensing lies in the different interpretation of the algorithm itself at the preparatory stage―data fusion. The rationale is to include all possible information from all acquired spectral bands, assuming that complete composite information in the form of one compound image will improve both the quality of visualization and some aspects of further quantitative and qualitative analyses. The concept arose from an empirical, heuristic combination of geographic information systems (GIS), map algebra, and two-dimensional cellular automata. The challenges are related to handling big quantitative datasets and the awareness that these numbers are, in fact, descriptors of a real-world multidimensional view. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (27)

  • Article
  • Open Access
21 Citations
5,897 Views
27 Pages

A NARX Model Reference Adaptive Control Scheme: Improved Disturbance Rejection Fractional-Order PID Control of an Experimental Magnetic Levitation System

  • Hossein Alimohammadi,
  • Baris Baykant Alagoz,
  • Aleksei Tepljakov,
  • Kristina Vassiljeva and
  • Eduard Petlenkov

18 August 2020

Real control systems require robust control performance to deal with unpredictable and altering operating conditions of real-world systems. Improvement of disturbance rejection control performance should be considered as one of the essential control...

  • Article
  • Open Access
6 Citations
6,272 Views
27 Pages

Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques

  • Abdul Karim,
  • Azhari Azhari,
  • Samir Brahim Belhaouri,
  • Ali Adil Qureshi and
  • Maqsood Ahmad

18 August 2020

Android-based applications are widely used by almost everyone around the globe. Due to the availability of the Internet almost everywhere at no charge, almost half of the globe is engaged with social networking, social media surfing, messaging, brows...

  • Feature Paper
  • Article
  • Open Access
5 Citations
5,009 Views
28 Pages

16 August 2020

We review a number of preconditioners for the advection-diffusion operator and for the Schur complement matrix, which, in turn, constitute the building blocks for Constraint and Triangular Preconditioners to accelerate the iterative solution of the d...

  • Article
  • Open Access
3 Citations
3,561 Views
16 Pages

A Brief Survey of Fixed-Parameter Parallelism

  • Faisal N. Abu-Khzam and
  • Karam Al Kontar

14 August 2020

This paper provides an overview of the field of parameterized parallel complexity by surveying previous work in addition to presenting a few new observations and exploring potential new directions. In particular, we present a general view of how know...

  • Article
  • Open Access
12 Citations
4,710 Views
27 Pages

14 August 2020

In the manuscript, the issue of detecting and segmenting out pavement defects on highway roads is addressed. Specifically, computer vision (CV) methods are developed and applied to the problem based on deep learning of convolutional neural networks (...

  • Feature Paper
  • Article
  • Open Access
7 Citations
4,951 Views
10 Pages

Graph Planarity by Replacing Cliques with Paths

  • Patrizio Angelini,
  • Peter Eades,
  • Seok-Hee Hong,
  • Karsten Klein,
  • Stephen Kobourov,
  • Giuseppe Liotta,
  • Alfredo Navarra and
  • Alessandra Tappini

13 August 2020

This paper introduces and studies the following beyond-planarity problem, which we call h-Clique2Path Planarity. Let G be a simple topological graph whose vertices are partitioned into subsets of size at most h, each inducing a clique. h-Clique2Path ...

  • Article
  • Open Access
33 Citations
4,931 Views
15 Pages

13 August 2020

Natural disasters are phenomena that can occur in any part of the world. They can cause massive amounts of destruction and leave entire cities in great need of assistance. The ability to quickly and accurately deliver aid to impacted areas is crucial...

  • Article
  • Open Access
1 Citations
4,330 Views
21 Pages

13 August 2020

Motivated by the desire to numerically calculate rigorous upper and lower bounds on deviation probabilities over large classes of probability distributions, we present an adaptive algorithm for the reconstruction of increasing real-valued functions....

  • Article
  • Open Access
3 Citations
4,403 Views
12 Pages

10 August 2020

Dimension reduction is often used for several procedures of analysis of high dimensional biomedical data-sets such as classification or outlier detection. To improve the performance of such data-mining steps, preserving both distance information and...

  • Article
  • Open Access
1 Citations
3,199 Views
12 Pages

10 August 2020

Most supervised person re-identification methods show their excellent performance, but using labeled datasets is very expensive, which limits its application in practical scenarios. To solve the scalability problem, we propose a Cross-camera Erased F...

  • Article
  • Open Access
4 Citations
4,111 Views
11 Pages

4 August 2020

In this paper, we propose a new version of the generalized damped Gauss–Newton method for solving nonlinear complementarity problems based on the transformation to the nonsmooth equation, which is equivalent to some unconstrained optimization p...

  • Article
  • Open Access
9 Citations
4,600 Views
30 Pages

4 August 2020

Computing shortest-path distances is a fundamental primitive in the context of graph data mining, since this kind of information is essential in a broad range of prominent applications, which include social network analysis, data routing, web search...

  • Article
  • Open Access
2 Citations
4,309 Views
18 Pages

3 August 2020

The Reed-Solomon algorithm is well known in different fields of computer science. The novelty of this study lies in the different interpretation of the algorithm itself and its scope of application for remote sensing, especially at the preparatory st...

  • Article
  • Open Access
17 Citations
5,324 Views
20 Pages

3 August 2020

The wireless sensor network (WSN) has the advantages of low cost, high monitoring accuracy, good fault tolerance, remote monitoring and convenient maintenance. It has been widely used in various fields. In the WSN, the placement of node sensors has a...

  • Article
  • Open Access
4 Citations
4,513 Views
20 Pages

31 July 2020

Cloud provider Amazon Elastic Compute Cloud (EC2) gives access to resources in the form of virtual servers, also known as instances. EC2 spot instances (SIs) offer spare computational capacity at steep discounts compared to reliable and fixed price o...

  • Article
  • Open Access
8 Citations
5,159 Views
29 Pages

30 July 2020

This paper studies the hybridization of Mixed Integer Programming (MIP) with dual heuristics and machine learning techniques, to provide dual bounds for a large scale optimization problem from an industrial application. The case study is the EURO/ROA...

  • Article
  • Open Access
5 Citations
3,559 Views
21 Pages

30 July 2020

The initial value problem for a special type of scalar nonlinear fractional differential equation with a Riemann–Liouville fractional derivative is studied. The main characteristic of the equation is the presence of the supremum of the unknown...

  • Article
  • Open Access
32 Citations
19,017 Views
23 Pages

A Review on Recent Advancements in FOREX Currency Prediction

  • Md. Saiful Islam,
  • Emam Hossain,
  • Abdur Rahman,
  • Mohammad Shahadat Hossain and
  • Karl Andersson

30 July 2020

In recent years, the foreign exchange (FOREX) market has attracted quite a lot of scrutiny from researchers all over the world. Due to its vulnerable characteristics, different types of research have been conducted to accomplish the task of predictin...

  • Article
  • Open Access
7 Citations
4,608 Views
23 Pages

Influence Maximization with Priority in Online Social Networks

  • Canh V. Pham,
  • Dung K. T. Ha,
  • Quang C. Vu,
  • Anh N. Su and
  • Huan X. Hoang

29 July 2020

The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in info...

  • Article
  • Open Access
7 Citations
5,124 Views
23 Pages

Trajectory Clustering and k-NN for Robust Privacy Preserving k-NN Query Processing in GeoSpark

  • Elias Dritsas,
  • Andreas Kanavos,
  • Maria Trigka,
  • Gerasimos Vonitsanos,
  • Spyros Sioutas and
  • Athanasios Tsakalidis

28 July 2020

Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection. The k-anonymity is considered a key...

  • Article
  • Open Access
4 Citations
6,861 Views
26 Pages

27 July 2020

In this article, we design and evaluate several algorithms for the computation of the optimal Rice coding parameter. We conjecture that the optimal Rice coding parameter can be bounded and verify this conjecture through numerical experiments using re...

  • Article
  • Open Access
8 Citations
4,763 Views
15 Pages

24 July 2020

Considering the increasing use of emerging technologies in industrialized construction in recent years, the primary objective of this article is to develop and validate predictive models to predict the emerging technology utilization level of industr...

  • Article
  • Open Access
4 Citations
3,924 Views
16 Pages

23 July 2020

The paper addresses issues associated with implementing GPC controllers in systems with multiple input signals. Depending on the method of identification, the resulting models may be of a high order and when applied to a control/regulation law, may r...

  • Article
  • Open Access
6 Citations
3,631 Views
16 Pages

23 July 2020

Road departure crashes tend to be hazardous, especially in rural areas like Wyoming. Traffic barriers could be installed to mitigate the severity of those crashes. However, the severity of traffic barriers crashes still persists. Besides various driv...

  • Article
  • Open Access
87 Citations
13,164 Views
27 Pages

Towards Cognitive Recommender Systems

  • Amin Beheshti,
  • Shahpar Yakhchi,
  • Salman Mousaeirad,
  • Seyed Mohssen Ghafari,
  • Srinivasa Reddy Goluguri and
  • Mohammad Amin Edrisi

22 July 2020

Intelligence is the ability to learn from experience and use domain experts’ knowledge to adapt to new situations. In this context, an intelligent Recommender System should be able to learn from domain experts’ knowledge and experience, a...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Algorithms - ISSN 1999-4893