Computer and information sciences topic list of research papers
-
Theory, Methodology, and Implementation of Robotic Intelligence and Communication
Abstract This paper makes several uncommon claims. First, it suggests a theoretical approach, even though the theory comes with a clear methodology and implementation, so that we know what we do, how we do it, and why it is best to do it that way....
2015 / Victor Raskin -
An Efficient Multi-objective Meta-heuristic Method for Probabilistic Transmission Network Planning
Abstract In this paper, a new method is proposed for probabilistic transmission network expansion planning in Smart Grid. The proposed method makes use of Controlled Nondominated Sorting Genetic Algorithm (CNSGA-II) of multi-objective...
2014 / Kakuta Hiroki, Hiroyuki Mori -
Improving of the Generation Method of Repeated PWM Based on the Signals Combinations Applied to a PV Pumping System
Abstract In this paper, we present a new method of the PWM signal generation with repetition of data segments, based on the round robin segment of different amplitudes converters, applied to the photovoltaic water pumping system and the variable...
2015 / Abdelâali Boumâaraf, Tayeb Mohamadi, Nadhir Messai -
Clustering of Web User Sessions to Maintain Occurrence of Sequence in Navigation Pattern
Abstract Web log data available at server side helps in identifying the most appropriate pages based on the user request. Analysis of web log data poses challenges as it consists of abundant information of a web page. In this paper a novel technique ...
2015 / D.S. Anupama, Sahana D. Gowda -
Agent-based Framework for Sensor-to-Sensor Personalization
Abstract In Wireless Sensor Networks, personalization has been seen by researchers as the process of tailoring services to fulfill requests of different users with different profiles. This vision ignores that individual sensors commonly have...
2013 / Nabil Sahli, Nafaa Jabeur, Mohamad Badra -
Strategic Issues, Problems and Challenges in Inductive Theorem Proving
Abstract (Automated) Inductive Theorem Proving (ITP) is a challenging field in automated reasoning and theorem proving. Typically, (Automated) Theorem Proving (TP) refers to methods, techniques and tools for automatically proving general (most often ...
2005 / Bernhard Gramlich -
Towards a Holistic Approach for Problems in the Energy and Mobility Domain
Abstract With the current rise of electric vehicles, it is possible to use those vehicles for storing surplus energy from renewable energy sources; however, this can be in conflict with providing and ensuring the mobility of the vehicle's user. ...
2014 / Marco Lützenberger, Nils Masuch, Tobias Küster, Jan Keiser, Daniel Freund, et al. -
Combining Lexical and Semantic Features for Short Text Classification
Abstract In this paper, we propose a novel approach to classify short texts by combining both their lexical and semantic features. We present an improved measurement method for lexical feature selection and furthermore obtain the semantic features...
2013 / Lili Yang, Chunping Li, Qiang Ding, Li Li -
Hybrid Live P2P Streaming Protocol
Abstract A considerable part of the Internet traffic is due to Peer-to-Peer (P2P) protocols. The scalability of the P2P networks encourages implementing many P2P applications such as the file sharing, the media on demand and the live streaming....
2014 / Chourouk Hammami, Imen Jemili, Achraf Gazdar, Abdelfettah Belghith, Mohamed Mosbah -
Specification-based Approach for Denotational Semantic of Orthogonal Object/Relational DBMS
Abstract The issue of the article is at the crossroads of databases modeling, software engineering and databases verification using formal methods. Development of databases software would be provided with a high-level specification suitable for...
2014 / Amel Benabbou, Safia Nait Bahloul -
Adding Federated Identity Management to OpenStack2013 / David W. Chadwick, Kristy Siu, Craig Lee, Yann Fouillat, Damien Germonville
-
Framework and Architecture for Programming Education Environment as a Cloud Computing Service
Abstract Cloud computing is an emerging platform for e-learning in current and future learning management system. Many e-learning cloud computing models have been proposed to support e-Learning. However using e-Learning environment for teaching...
2014 / Amir Mohamed Elamir, Norleyza Jailani, Marini Abu Bakar -
Analyzing and Evaluating Contention Access Period of Slotted CSMA/CA for IEEE802.15.4
Abstract IEEE standard 802.15.4 is widely studied due to its huge applicability. This vary study is based upon analyzing techniques and methodology discussed in IEEE 802.15.4 standard in context of contention access period. According to standard...
2014 / D. Mahmood, Z.A. Khan, U. Qasim, M. Umair Naru, S. Mukhtar, et al. -
Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points
Abstract In general users tend to choose memorable passwords that are easy for attackers to guess, but strong system assigned passwords are hard for users to remember. In this paper focuses on the integrated evaluation of the Persuasive Cued Click...
2016 / Atish Nayak, Rajesh Bansode -
Communicating centrality in policy network drawings2003 / U. Brandes, P. Kenis, D. Wagner
-
Application-level Performance Optimization: A Computer Vision Case Study on STHORM
Abstract Computer vision applications constitute one of the key drivers for embedded many-core architectures. In order to exploit the full potential of such systems, a balance between computation and communication is critical, but many computer...
2014 / Vítor Schwambach, Sébastien Cleyet-Merle, Alain Issard, Stéphane Mancini -
Channel assignment with closeness multipath routing in cognitive networks
Abstract Routing in cognitive networks is a challenging problem due to the primary users’ (PU) activities and mobility. Multipath routing is a general solution to improve reliability of connections. Routes closeness metric was proposed for multipath ...
2013 / Islam Beltagy, Moustafa Youssef, Magdy Abd El-Azim, Mohamed El-Derini -
DoS detection in IEEE 802.11 with the presence of hidden nodes
Abstract The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) ...
2013 / Joseph Soryal, Xijie Liu, Tarek Saadawi -
An Alternative Approach to Reduce Massive False Positives in Mammograms Using Block Variance of Local Coefficients Features and Support Vector Machine
Abstract Computer Aided Detection (CAD) systems for detecting lesions in mammograms have been investigated because the computer can improve radiologists’ detection accuracy. However, the main problem encountered in the development of CAD systems is...
2013 / M.P. Nguyen, Q.D. Truong, D.T. Nguyen, T.D. Nguyen, V.D. Nguyen -
Towards Intelligent Personal Health Record Systems: Review, Criteria and Extensions
Abstract Personal health record (PHR) systems are a constantly evolving area in the field of health information technology which motivates an ongoing research towards their evaluation in several different aspects. In this direction, we present an...
2013 / Irini Genitsaridi, Haridimos Kondylakis, Lefteris Koumakis, Kostas Marias, Manolis Tsiknakis