Computer and information sciences topic list of research papers
-
Communication Resource Planning for Monitoring and Control Systems Based on Distributed Virtual Instrumentation Networks
Abstract Distributed monitoring and control systems based on distributed virtual instrumentation networks consist of numerous components, ranging from field sensors to monitoring and control modules, which are potentially spread across a wide...
2016 / Traian Turc, Adrian Gligor -
Teacher Candidates’ Attitudes towards Spelling and Punctuation Used in Social Communication Tools
Abstract The objective of the study is to determine teacher candidates’ attitudes towards spelling and punctuation used in social communication tools (facebook, twitter, gmail/hotmail, whatsapp, hangouts, vb.). The study group was conducted with...
2014 / Aysun Eroğlu, Alpaslan Okur -
Review on Detection and Mitigation of Sybil Attack in the Network
Abstract Sybil attack is an attack in which the identities of the node are subverted and the large number of pseudonymous identities is produced to gain the access of the network. In this paper, we studied the detection mechanism of Sybil attack in...
2016 / Arpita M. Bhise, Shailesh D. Kamble -
Applying Physical-Layer Network Coding in Wireless Networks2010 / Shengli Zhang, Soung Chang Liew
-
Information Theory for Gabor Feature Selection for Face Recognition2006 / Linlin Shen, Li Bai
-
Automatic Noise Gate Settings for Drum Recordings Containing Bleed from Secondary Sources2011 / Michael Terrell, JoshuaD Reiss, Mark Sandler
-
Challenge of validation in requirements engineering
Abstract This paper will review the evolution of validation techniques and their current status in Requirements Engineering (RE). We start by answering the following questions: What validate? Why the benefits of having the requirements validation...
2016 / Sourour Maalem, Nacereddine Zarour -
Design and Analysis of a Vacation Model for Two-phase Queueing System with Gated Service
Abstract This paper mainly deals with a two phase service queueing model with gated service vacation. In this gated service vacation model, only those customers who are present in the queue when the server starts a batch mode service are taken into...
2015 / K. Ramya, S. Palaniammal, C. Vijayalakshmi -
Even harmonious labelings of disjoint graphs with a small component
Abstract A graph G with q edges is said to be harmonious if there is an injection f from the vertices of ...
2015 / Joseph A. Gallian, Danielle Stewart -
Case Study: Use of Online Tools in the Classroom and their Impact on Industrial Design Pedagogy
Abstract Industrial Design education is going through a rapid evolution with more Design students making use of internet resources and tools such as crowdsourcing, 3D printing services, and other web-based tools to validate their ideas more quickly. ...
2015 / Jose Rivera-Chang -
Standing in Line Behavior Extraction Method by Radio Information
Abstract Wireless communication devices such as smartphones are essential in our recent daily life. The devices are also able to apply to understand human behaviors besides connecting a network via high speed communication links. One of such network ...
2015 / Nobuo Suzuki, Kazuhiko Tsuda -
An experimental search-based approach to cohesion metric evaluation2016 / Mel Ó Cinnéide, Iman Hemati Moghadam, Mark Harman, Steve Counsell, Laurence Tratt
-
Anonymisation of geographical distance matrices via Lipschitz embedding2016 / Martin Kroll, Rainer Schnell
-
Robust Adaptive Beamforming for Multiple Signals of Interest with Cycle Frequency Error2011 / Ju-Hong Lee, Chia-Cheng Huang
-
Key Enablers for Leveraging Non-development Items in a System
Abstract In many cases, leveraging non-development item (NDI) technologies in a system offers the potential for reduced lifecycle costs, shorter time to market, and superior technical performance compared to developing technologies in-house;...
2015 / Clement Smartt, Andrew Register, Richard Wise -
Engaging users in tracking their water usage behavior
Abstract WATERNOMICS is an EU funded project that aims to raise awareness about efficient water management using ICT to provide users with insightful and actionable information. A crucial problem faced in our pilot settings was to enable...
2015 / Christos Kouroupetroglou, Maarten Piso, Wassim Derguech, Edward Curry, Jan Mink, et al. -
ASIC Implementation for Improved Character Recognition and Classification using SNN Model
Abstract The third generation of spiking neural networks raises the level of biological realism by using individual spikes. So instead of using rate coding, these neurons use pulse coding mechanisms where neurons receive and do...
2015 / Mrs. S. Chaturvedi, A.A. Kurshid -
Using Machine Learning Algorithms for Breast Cancer Risk Prediction and Diagnosis
Abstract Breast cancer represents one of the diseases that make a high number of deaths every year. It is the most common type of all cancers and the main cause of women's deaths worldwide. Classification and data mining methods are an effective way ...
2016 / Hiba Asri, Hajar Mousannif, Hassan Al Moatassime, Thomas Noel -
Source and Channel Adaptive Rate Control for Multicast Layered Video Transmission Based on a Clustering Algorithm2004 / Jérôme Viéron, Thierry Turletti, Kavé Salamatian, Christine Guillemot
-
A novel jammer detection framework for cluster-based wireless sensor networks2016 / P. Ganeshkumar, K. P. Vijayakumar, M. Anandaraj