Horizon Research Publication Corporation, USA
I have reviewed several manuscripts under the above organization journals as an External Reviewer. The fifteen titles for manuscripts under this organization that I have reviewed and earned accordingly the review certificates are as follows:
1)Acceleration of Compression and Phase Unwrapping for Fringe Projection Profilometry for Computer Science and Technology Journal The paper is based on the computation for fringe projection profilometry using graphics processing unit (GPU) that can improve three dimensional object reconstruction more efficiently than conventional wavelet image coding methods. 2)A Fast and Robust Hybridized Filter for Image De-Noising for Computer Science and Technology Journal This paper is based on the salt and pepper technique to de-noise color images so that their color does not degrade. 3)A Model to Determine Quantitative Savings that can be Achieved through Ixp via Peering – A Case Study of Isps in Kenya for Computer Science and Technology journal The paper discusses two models: IXP via peering, and Transit interconnection models that can be used by ISPs in Kenya. It gives a model for IXP via peering, allowing huge savings on internet connectivity and operation costs. According to the paper, the peering model is preferred when there is high ratio of local traffic to international traffic, and savings increase when the ratio of local traffic to international traffic increases. 4) RDF Transformation Methods for Mapping RDF Data into Relational Database for Computer Science and Technology journal In existing studies of semantic web, table schemas store triple patterns of RDF (Resource Description Framework) data. But sometimes this triple of info cannot be made directly because of special models and abbreviations. Therefore, the author(s) suggest new RDF transformation methods such as abbreviation, stripping pattern and blank node to map RDF data into a table schema with a triple of info. 5) Communication between Deaf and Hearing Children Using Statistical Machine Translation for Computer Science and Technology journal The paper is based on using Persian Sign Language Corpus (PSLC) for both Persian Language and Persian Sign Language for the domain of children conversation between both hearing and deaf children. The corpus is prepared in machine language translation that will be used in online communication among these kinds of children. The challenge of this work is to use video corpus completely and use them in video chatting. 6) Energy Aware Routing Using Improved LEACH Protocol in Universal Journal of Communication and Network The paper presents improved protocols for LEACH (Low energy adaptive clustering hierarchy): Energy LEACH and Multi hop LEACH. In Energy LEACH, cluster heads are initially selected randomly like that of LEACH but in the final phase, only residual energetic cluster heads will be selected, increasing the network life and maximizing the throughput. Multi hop LEACH promises to provide higher network life expectancy and proves to be better than LEACH or Energy LEACH. 7)Insights into Different Energy Efficient Routing Protocols for Wireless Sensor Networks for Computer Science and Technology Journal. A reader of the manuscript does get varying ideas of different routing protocols for wireless sensor networks that exist out there. 8) Universal Electronic Student Course Registration Model (U-ESCRM) The U-ESCRM system model proposed in the paper aims at addressing comprehensiveness in courses registration through the integration of all departments into a single architecture framework. The model is based on UML language which requires to present multiple views (user, structure, behavior, implementation and environment) using diagrams. The upside of the system is that it cuts down operation costs and hardcopy documentation while automating organizational procedures and processes. 9) Modeling of WSN Energy Consumption Supplied by iPV Microsystem The manuscript is based on energy consumption and lifetime of wireless sensor networks (WSNs). The author(s) study clustering based WSNs and simulation results using network parameters. While these show positive results to some extent, they find that integrating cloud computing in WSN applications shows results significantly. 10) A Semantic Web Service Retrieval Approach that Combines Semantic Matching with Quality of Service Matching A web service search system is proposed in the paper that reveals the information structure of OWLS documents which is used to construct indexes and their individual weights which in turn are used to compare the level of similarity between a semantic query from a user and each web service by a vector space model. Then, the result is used in a web service selection procedure consisting of service availability and response time. 11) A Simple and Fast Line-Clipping Method as a Scratch Extension for Computer Graphics Education In this paper a new computation method for 2D line clipping against a rectangular window is introduced as a Scratch extension in order to assist secondary level school’s computer graphics education. Scratch is user-friendly integrated development environment (IDE) or a visual programming language especially useful for children. 12) Bi-objective Optimization Model for Integrated Preventive Maintenance and Flexible Job-Shop Scheduling Problem The manuscript describes a model that has the advantage that it integrates flexible job scheduling problem with preventive maintenance activities. To meet this goal, it optimizes two multi-objective evolutionary algorithms based on performance measures and metrics. The disadvantage is that other maintenance policies, strategies and constraints could have been brought forward to arrive at better solutions to the problem. 13) Using Queuing Theory to Describe Adaptive Mathematical Models of Computing Systems with Resource Virtualization and its Verification Using a Virtual Server with a Configuration Similar to the Configuration of a Given Model In reality, there exists two separate products for resource and load management for adaptive models of an aircraft, which is inconvenient and makes it difficult to create an integrated system taking into account the two features. The author(s) have used virtualized-CS models with a virtual server configured similarly to a given one and achieved the goal of the integrated system. The disadvantage of such a system is that maximum performance is non-attainable within cost restrictions. 14) Detecting Point Outliers Using Prune-based Outlier Factor (PLOF) The research in the manuscript deals with outlier detection which is a process of finding the patterns of data points that deviate significantly from others. It proposes a prune-based local outlier factor approach by introducing a density estimation that reduces the execution time of the local outlier factor (LOF) and at the same time, maintaining good performance of the outlier detection. 15) Student Activities Detection of SUST Using YOLOv3 on Deep Learning In this research the author(s) have used both image and real time approaches for detection of student activities (such as, reading, phoning, using a laptop, taking books, smiling, looking and sleeping) in SUST premises, localization, and image classification based on YOLOv3 (You Only Look Once) algorithm. However, there are performance issues, and their work is confined to SUST premises. They intend to improve the performance of their research work and apply it to detect human action at any place. These activities/actions are detected to prevent unwanted problems on campus, or any other place (as part of future work) |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
![]()
|