Computer and information sciences topic list of research papers
-
A Survey on Opportunistic Routing Protocols for Wireless Sensor Networks
Abstract Opportunistic routing is a new paradigm in routing for wireless sensor network which chooses the node closest to the target node for forwarding the data. It uses the broadcasting nature of wireless sensor networks. Opportunistic routing has ...
2016 / Payal Jadhav, Rachna Satao -
Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation
Abstract Due to extensive use of Cloud services and newly evolving security threats, most cloud service providers (CSP) deploy varieties of security devices such as, firewalls, IPSec, IDS, etc. for controlling resource accesses based on the data...
2016 / Santosh Kumar Majhi, Sunil Kumar Dhal -
Technology Enhanced Learning for Humanities by Active Learning − the Sinus Project Approach2013 / Gennady Agre, Danail Dochev, Liliana Slavkova
-
A study on ship automatic berthing with assistance of auxiliary devices2015 / Van Luong Tran, Namkyun Im
-
Individual Recognition from Gait Using Feature Value Method2013 / Tianxiang Zhang, Gentiane Venture
-
Model Reference Adaptive Control Design for Slow Processes. A Case Study on Level Process Control
Abstract The design of controllers, using conventional techniques, for plants with nonlinear dynamics or model uncertainties can be often quite difficult. Model reference adaptive control (MRAC) is a modern alternative for classic control algorithms ...
2016 / Stelian-Emilian Oltean, Mircea Dulau, Adrian-Vasile Duka -
Detection of Moving Objects in Surveillance Video by Integrating Bottom-up Approach with Knowledge Base
Abstract In the modern age, where every prominent and populous area of a city is continuously monitored, a lot of data in the form of video has to be analyzed. There is a need for an algorithm that helps in the demarcation of the abnormal...
2016 / Aarthi R., Amudha J., Boomika K., Anagha Varrier -
A Critical Analysis of Energy Efficient Virtual Machine Placement Techniques and its Optimization in a Cloud Computing Environment
Abstract Infrastructure-as-a-service cloud computing providers with on-demand infrastructures have become a promising alternative to the rising cost of ownership for computing infrastructures in many enterprises. Many of the touted gains in the...
2016 / Ankita Choudhary, Shilpa Rana, K.J. Matahai -
Forensic analysis of cloud-native artifacts
Abstract Forensic analysis of cloud artifacts is still in its infancy; current approaches overwhelming follow the traditional method of collecting artifacts on a client device. In this work, we introduce the concept of analyzing cloud-native digital ...
2016 / Vassil Roussev, Shane McCulley -
New Applications of “Ontology-to-Text Relation” Strategy for Bulgarian Language2013 / Kamenka Staykova, Petya Osenova, Kiril Simov
-
Haptically Assisted Connection Procedure for the Reconstruction of Dendritic Spines2014 / Loic Corenthy, Marcos Garcia, Sofia Bayona, Andrea Santuy, Jose San Martin, et al.
-
Reducing Call Blocks in Cellular Network with Non-Uniform Traffic Conditions2014 / Abhijit Sharma, Pratik Sharma, Rituparna Chaki, Uma Bhattacharya
-
On the use of multi-agent systems for the monitoring of industrial systems2015 / Nafissa Rezki, Okba Kazar, Leila Hayet Mouss, Laid Kahloul, Djamil Rezki
-
An integrated data envelopment analysis–artificial neural network approach for benchmarking of bank branches2016 / Elsa Shokrollahpour, Farhad Hosseinzadeh Lotfi, Mostafa Zandieh
-
A Variable Service Broker Routing Policy for data center selection in cloud analyst
Abstract Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to the...
2016 / Ahmad M. Manasrah, Tariq Smadi, Ammar ALmomani -
The Derivations of Temporal Logic Formulas2013 / Mariusz Giero
-
Automatic profile generation for live Linux Memory analysis
Abstract Live Memory analysis on the Linux platform has traditionally been difficult to perform. Memory analysis requires precise knowledge of struct layout information in memory, usually obtained through debugging symbols generated at compile time. ...
2016 / Arkadiusz Socała, Michael Cohen -
Efficient Key Management and Cipher Text Generation Using BCD Coded Parity Bits
Abstract In this paper we have presented a new symmetric encryption technique where a BCD converter, a four bit parity checker along with a sign function is used to generate the key sequence. In the next subsequent steps the input text and the key...
2015 / Rahul Ranjan, Debabala Swain, Bijay Paikaray -
Analysis of users’ Sentiments from Kannada Web Documents
Abstract In today's world, there is an explosive growth of data from terabytes to petabytes in the internet. The major problem is not the availability of data but starving for knowledge from the data. Sentiment analysis is an important current...
2015 / K. M. Anil Kumar, N. Rajasimha, Manovikas Reddy, A. Rajanarayana, Kewal Nadgir -
Incorporate Cultural Artifacts Conservation Documentation to Information Exchange Standards – The DOC-CULTURE Case
Abstract The cultural heritage artifacts Conservation Documentation format is not universally agreed upon nor has it always been considered an important aspect of the conservation profession. Conservation records present major drawbacks, which are...
2014 / Dimitris Kouis, Georgios Giannakopoulos