Computer and information sciences topic list of research papers
-
Simulink Based Implementation of Developed A5/1 Stream Cipher Cryptosystems
Abstract The major aim of this paper is to develop GSM networks security by working on improving of one of the elements of the GSM networks security which is A5/1 encryption algorithm. Since the development facilities of the MATLAB. Process depends...
2015 / Sattar B. Sadkhan, Nibras Hadi Jawad -
Smart Space based Recommendation Service for Historical Tourism
Abstract The amount of digital data about regional history is increasing rapidly. These data might be effectively used to promote regional historical and cultural tourism as well as to design special recommendation services for trip developers and...
2016 / Aleksey Varfolomeyev, Dmitry Korzun, Aleksandrs Ivanovs, Henrihs Soms, Oksana Petrina -
WebNLOptics: Web Platform for Nonlinear Optics
Abstract Solution of many interesting tasks in nonlinear optics requires comprehensive database of crystal properties and a large capacity of computational resources for optimization problems. In this paper we present a project intended for...
2015 / Stanislav P. Polyakov, Vladimir A. Lazarev, Nikolay V. Prikhod’ko, Natalia V. Abramovskaya, Viktor A. Abramovsky, et al. -
A Paradigm Shift in Substation Engineering: IEC 61850 Approach
Abstract With the emergence of Ethernet based technology, the industry demands for substation communication protocols that are multivendor, of high speed and built mainly for substation automation. IEC 61850 are here to stay to provide methods of...
2015 / Aurabind Pal, Roma Dash -
Enhancing ELM-based Facial Image Classification by Exploiting Multiple Facial Views
Abstract In this paper, we investigate the effectiveness of the Extreme Learning Machine (ELM) network in facial image classification. In order to enhance performance, we exploit knowledge related to the human face structure. We train a multi-view...
2015 / Alexandros Iosifidis, Anastasios Tefas, Ioannis Pitas -
Heuristics for NP-hard optimization problems - simpler is better!?2015 / Janez Žerovnik
-
Perspectives on software-defined networks: interviews with five leading scientists from the networking community2015 / Daniel M Batista, Gordon Blair, Fabio Kon, Raouf Boutaba, David Hutchison, et al.
-
Using Multiplex Networks for Banking Systems Dynamics Modelling
Abstract The banking systems stability problem is complex and comprehensive. It is believed that the network topological features play a predominant role in banking system robustness. Existing research has investigated different sides of this...
2015 / Valentina Y. Guleva, Maria V. Skvorcova, Alexander V. Boukhanovsky -
Skinware 2.0: A real-time middleware for robot skin
Abstract Robot skins have emerged recently as products of research from various institutes worldwide. Each robot skin is designed with different applications in mind. As a result, they differ in many aspects from transduction technology and...
2015 / S. Youssefi, S. Denei, F. Mastrogiovanni, G. Cannata -
Energy Analysis for Trajectory based Sink Mobility in WSN
Abstract Data collections through mobile sinks conserve the fast depleting battery power of nodes due to transcieving. The movement of the sink is usually predestined according to the type of monitoring application. However, situations may arise...
2015 / I. Snigdh, D. Gosain -
Implementing design patterns as parametric aspects using ParaAJ: The case of the singleton, observer, and decorator design patterns
Abstract Implementation of a design pattern can take many forms according to the programming language being used. Most of the literature presents design patterns in their conventional object-oriented implementations. Several other studies show the...
2015 / Khalid Aljasser -
Recursive Variational Mode Decomposition Algorithm for Real Time Power Signal Decomposition
Abstract Conventional methods of signal decomposition are observed to fail in power system applications and computationally intensive algorithms like EMD, VMD, EWT are found to give better performance. The heavy computations associated with them...
2015 / Soman K.P., Prabaharan Poornachandran, Athira S., Harikumar K. -
A Multimodal Approach To Detect User's Emotion
Abstract Emotion is a feeling, a behaviour, a state of mind of a person that is caused due to internal or external factors. Among the numerous emotions, we have considered a few emotions like happy, sad, fear, anger, surprise, love, hate, exhaust...
2015 / Anil Kumar K.M., Kiran B.R., Shreyas B.R., Sylvester J. Victor -
A new greedy search method for the design of digital IIR filter
Abstract A new greedy search method is applied in this paper to design the optimal digital infinite impulse response (IIR) filter. The greedy search method is based on binary successive approximation (BSA) and evolutionary search (ES). The suggested ...
2015 / Ranjit Kaur, Manjeet Singh Patterh, J.S. Dhillon -
Augmented Reality Technology Spreads Information about Historical Graffiti in Temple of Debod
Abstract Learning can occur at anytime and anywhere, even when you are travelling. In this article, we explain how augmented reality (AR) can be used to better educate tourists and visitors about the sites they choose to visit. Using the Temple of...
2015 / Jorge Martin Gutierrez, Miguel Angel Molinero, Ovidia Soto-Martín, Cristóbal Ruíz Medina -
Modeling semantic compositionality of relational patterns
Abstract Vector representation is a common approach for expressing the meaning of a relational pattern. Most previous work obtained a vector of a relational pattern based on the distribution of its context words (e.g., arguments of the relational...
2016 / Sho Takase, Naoaki Okazaki, Kentaro Inui -
Enhancing digital image integrity by exploiting JPEG bitstream attributes
Abstract The need for protecting a huge amount of digital images on the internet has become an important requirement against different kind of attacks in order to insure transmitted process in a secure way. Cryptography introduces many security...
2015 / Musab Ghadi, Lamri Laouamer, Tarek Moulahi -
Adaptive Utility-based Anonymization Model: Performance Evaluation on Big Data Sets
Abstract Data Anonymization is one of the globally accepted mechanisms for the protection of privacy of individuals in data publishing scenario. Normally the data anonymization impacts on the quality of data especially critical to the success of...
2015 / Jisha Jose Panackal, Anitha S. Pillai -
A new bats echolocation-based algorithm for single objective optimisation2016 / Nafrizuan Mat Yahya, M. Osman Tokhi, Hyreil Anuar Kasdirin
-
Understanding and Analyzing the Impact of Memory Controller's Scheduling Policies on DRAM's Energy and Performance
Abstract In current scenario while designing a computing system it is necessary that detailed emphasis should be laid on two common goals, i.e., increasing performance and decreasing power consumption. As we needto achieve either more performance at ...
2015 / Aastha Modgil, Nitin, Vivek KumarSehgal