Computer and information sciences topic list of research papers
-
Best connected rectangular arrangements
Abstract It can be found quite often in the literature that many well-known architects have employed either the golden rectangle or the Fibonacci rectangle in their works. On contrary, it is rare to find any specific reason for using them so often....
2016 / Krishnendra Shekhawat -
FCA based ontology development for data integration
Abstract Data is a valuable asset to our society. Effective use of data can enhance productivity of business and create economic benefit to customers. However with data growing at unprecedented rates, organisations are struggling to take full...
2016 / Gaihua Fu -
Insurance Dynamics – A Data Mining Approach for Customer Retention in Health Care Insurance Industry2013 / V. Sree Hari Rao, Murthy V. Jonnalagedda
-
The behavior of Jurík's nearest point approach algorithm on some 3-dimensional problems2012 / Ondrej ŠUCH
-
Life science data analysis workflow development using the bioextract server leveraging the iPlant collaborative cyberinfrastructure2014 / Carol M. Lushbough, Etienne Z. Gnimpieba, Rion Dooley
-
Producers, parasites and poverty traps
Abstract We studied the population dynamics of producers and parasites in a developing economy through the Lotka–Volterra model. Our baseline model found a cyclical equilibrium between these two groups of agents. When the equilibrium output is low,...
2015 / Marcelo de Carvalho Griebeler, Ronald Otto Hillbrecht -
Tree Representation: Knowledge Discovery from Uncertain Data
Abstract Most of the real-world data is gathered locally, organized regionally leading to distributed environment. The analysis of such data will assist decision makers for promoting their business. Most of the data mining strategies are multi-pass...
2016 / K. Swarupa Rani -
Using Concatenated Steganography for Visual Analysis in GIS SOA2013 / Andrew Yershov, Vitaly Zabiniako, Pavel Semenchuk
-
Boolean Signatures for Metamorphic Malware
Abstract This paper tries to model the code obfuscation as satisfiability problem. In this paper, we try to develop the model to represent the obfuscated code as the satisfiable problem which could be then checked by the SAT solver to check whether...
2016 / Aditya Kaushal Ranjan, Raja Ali, Vijay Kumar, Minoo Hosseinzadeh -
Google Books Ngrams Recompressed and Searchable2013 / Szymon Grabowski, Jakub Swacha
-
Scalability of Stochastic Gradient Descent based on “Smart” Sampling Techniques
Abstract Various appealing ideas have been recently proposed in the statistical literature to scale-up machine learning techniques and solve predictive/inferential problems from “Big Datasets”. Beyond the massively parallelized and distributed...
2015 / Stephan Clémençon, Aurélien Bellet, Ons Jelassi, Guillaume Papa -
From Interactive Open Learner Modelling to Intelligent Mentoring: STyLE-OLM and Beyond2015 / Vania Dimitrova, Paul Brna
-
Learning processes and processing learning: from organizational needs to learning designs2008 / Ambjörn Naeve, Miguel‐Angel Sicilia, Miltiadis D. Lytras
-
Walker Rehabilitation for Children with Disabilities: The Method User-centered
Abstract This paper shows a product project that was developed by students of bachelor's degree in design of the Federal University of Paraíba (UFPB) with FUNAD (Support Foundation Persons with Disabilities). The Project has origin in a dynamics...
2015 / Eduardo Jorge Neves, Renato Fonseca Livramento da Silva, Leandro Lopes Pereira, Francisco islard Rocha de Moura, Marllon de Oliveira Freitas, et al. -
Homomorphic Encryption for Security of Cloud Data
Abstract Cloud computing is a broad and diverse phenomenon. Users are allowed to store large amount of data on cloud storage for future use. The various security issues related to data security, privacy, confidentiality, integrity and authentication ...
2016 / Manish M. Potey, C.A. Dhote, Deepak H. Sharma -
Design and Implementation of Trust Based Approach to Mitigate Various Attacks in Mobile Ad hoc Network
Abstract A Mobile ad hoc network (MANET) is self organizing, decentralized and infrastructure less wireless network. The successful transmission of data packet is depends on the cooperation of each node in the network. These types of network don’t...
2016 / Nilesh N. Dangare, R.S. Mangrulkar -
Segmentation of Arabic Handwritten Text to Lines
Abstract Automatic recognition of writing is among the most important axes in the NLP (Natural language processing). Several entities of different areas demonstrated the need in recognition of handwritten Arabic characters; particularly banks check...
2015 / Mokhtari Younes, Yousfi Abdellah -
Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack
Abstract MANET stands for Mobile ad hoc network and is an infrastructure-less network and it is having ability to configure itself. The topology of network changes dynamically. It consists of wireless mobile nodes which communicate with each other...
2016 / A.A. Chavan, D.S. Kurule, P.U. Dere -
Design of Deadbeat Algorithm for a Nonlinear Conical Tank System
Abstract The control of nonlinear process is the main problem in process industries which repeatedly show its nonlinear activity. In this paper the control action of nonlinear framework using Digital controller with Deadbeat Algorithm was presented. ...
2015 / D. Marshiana, P. Thirusakthimurugan -
An autonomous teaching-learning based optimization algorithm for single objective global optimization2016 / Fangzhen Ge, Liurong Hong, Li Shi