Computer and information sciences topic list of research papers
-
Formalizing and Verification of an Antivirus Protection Service using Model Checking
Abstract In this paper, a protection service model is proposed for an antivirus system. The proposed model has been focused on maintaining in secure state of the system. According to the proposed antivirus model, the required behavior has been...
2015 / Adalat Safarkhanlou, Alireza Souri, Monire Norouzi, SeyedHassan Es. Haghi Sardroud -
Can local NURBS refinement be achieved by modifying only the user interface?
Abstract NURBS patches have a serious restriction: they are constrained to a strict rectangular topology. This means that a request to insert a single new control point will cause a row of control points to appear across the NURBS patch, a global...
2015 / Neil A. Dodgson, Jiří Kosinka -
Preserving Privacy of Patients Based on Re-identification Risk
Abstract Electronic Medical Records (EMR) holds the medical data of the patients in an electronic form. It appears as a massive Big Data that needs to be stored in elastic clouds which are generally handled by a third party. The cloud service...
2015 / Himanshu Taneja, Kapil, Ashutosh Kumar Singh -
The small world phenomenon and assortative mixing in Polish corporate board and director networks
Abstract This paper investigates the corporate board and director networks in the Polish capital market in 2014. We examined real board and director networks in comparison with networks that were randomly constructed. Through empirical analyses, we...
2015 / Anna Sankowska, Dariusz Siudak -
Wavelet Networks for Reducing the Envelope Fluctuations in WirelessMan-OFDM Systems
Abstract The IEEE 802.16d standard specified Orthogonal Frequency Division Multiplexing (OFDM) modulation for the Worldwide Interoperability for Microwave Access (WiMAX) physical layer. However, the main weakness of OFDM is the high Peak-to-Average...
2016 / Radouane Iqdour, Younes Jabrane -
Integrating Data Selection and Extreme Learning Machine for Imbalanced Data
Abstract Extreme Learning Machine (ELM) is one of the artificial neural network method that introduced by Huang, this method has very fast learning capability. ELM is designed for balance data. Common problems in real-life is imbalanced data...
2015 / Umi Mahdiyah, M. Isa Irawan, Elly Matul Imah -
Subjective interestingness of subgraph patterns2016 / Matthijs van Leeuwen, Tijl De Bie, Eirini Spyropoulou, Cédric Mesnage
-
BinComp: A stratified approach to compiler provenance Attribution
Abstract Compiler provenance encompasses numerous pieces of information, such as the compiler family, compiler version, optimization level, and compiler-related functions. The extraction of such information is imperative for various binary analysis...
2015 / Ashkan Rahimian, Paria Shirani, Saed Alrbaee, Lingyu Wang, Mourad Debbabi -
Real-Time QoS-Aware Vehicle Tracking: An Experimental and Comparative Study
Abstract Recently, web service became popular for Real-time Communication (RTC). It allows bi-directional, real-time communication between web clients and server. On the other hand, Data Distribution Service (DDS) middleware offers unified...
2015 / Basem Almadani, Abdullah Al Mamun, Ahmad Khayyat -
Design and Analysis of a POS Tag Multilingual Dictionary for Mongolian
Abstract In this paper, we report a multilingual parallel electronic dictionary, named MPEDM. The MPEDM dictionary covers the languages in Chinese and Mongolian, including TM (traditional Mongolian), TODO (Mongolian TODO) used in China, and NM (New...
2014 / I. Dawa, W. Aishan, B. Dorjiceren -
Computer-Aided Training for Quranic Recitation
Abstract Computer Aided Language Learning (CALL) systems have gained popularity due to the flexibility they provide in empowering students to practice their language skills at their own pace. Detection/Correction of specific pronunciation error is...
2015 / Huda M. Arfan Tabbaa, Bassel Soudan -
Improvement of LAR1 Routing Protocol
Abstract LAR1 is a reactive and location based routing protocol used in wireless ad hoc network. It has three packets with the help of which it transfer data from one node to another and maintain connection, they are - route request, route reply and ...
2015 / Aakash Jasper, Rajeev Paulus, Shubhanshi Rathore -
The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure
Abstract The present paper proposes a conceptual method for implementing a distributed repository for X.509 Attribute Certificates in a Privilege Management Infrastructure. It describes the idea behind this kind of repository, the security...
2016 / Adam Mihai Gergely, Bogdan Crainicu -
High performance loop closure detection using bag of word pairs
Abstract In this paper, we look into the problem of loop closure detection in topological mapping. The bag of words (BoW) is a popular approach which is fast and easy to implement, but suffers from perceptual aliasing, primarily due to vector...
2015 / Nishant Kejriwal, Swagat Kumar, Tomohiro Shibata -
ccML, a new mark-up language to improve ISO/EN 13606-based electronic health record extracts practical edition2012 / R. Sanchez-de-Madariaga, A. Munoz, J. Caceres, R. Somolinos, M. Pascual, et al.
-
The Gradual Immersion Method (GIM): Pedagogical Transformation into Mixed Reality
Abstract Through increased user interaction in mixed reality environments, the concept of user perception and living space evolves, adapts or is reconstructed. What criteria, however, define the contemporary hybrid learner's perception? Should...
2015 / Jorge C. Sanabria -
Design and Evaluation of a Natural Interface for Remote Operation of Underwater Robots2015 / Juan Garcia Sanchez, Bruno Patrao, Luis Almeida, Javier Perez, Paulo Menezes, et al.
-
Multi-levels AH-MPPM Coding for Indoor Optical Wireless Communications Systems
Abstract The aim of the paper is to present a modified modulation suitable for Indoor Wireless Optical Communications (IWOC)systems that use usually LEDs as transmitter components. As bandwidth of LEDs is times tighter than that of lasers. A...
2015 / Mehdi Rouissat, Riad Borsali -
Business Process Models and Information System Usability
Abstract The paper describes the use of business process models for effective managing of information system execution processes and transparent representation of execution statuses. Contrary to traditional approaches where business process models...
2016 / Janis Bicevskis, Zane Bicevska -
On the parameterized complexity of associative and commutative unification
Abstract This article studies the parameterized complexity of the unification problem with associative, commutative, or associative-commutative functions with respect to the parameter “number of variables”. It is shown that if every variable occurs...
2016 / Tatsuya Akutsu, Jesper Jansson, Atsuhiro Takasu, Takeyuki Tamura