Computer and information sciences topic list of research papers
-
The Rainbow Connection Number of a Flower (Cm, Kn) Graph and a Flower (C3, Fn) Graph
Abstract An edge-colored graph G is rainbow connected, if any two vertices are connected by a path whose edges have distinct colors. Such a path is called a rainbow path. The smallest number of colors needed in order to make G rainbow connected is...
2015 / Irvania Sukma Kumala, A.N.M. Salman -
Direct Position Determination of Multiple Radio Signals2005 / Anthony J. Weiss, Alon Amar
-
Interactive Exploration for Image Retrieval2005 / Matthieu Cord, Sylvie Philipp-Foliguet, Philippe-Henri Gosselin, Jérôme Fournier
-
Using Geometrical Properties for Fast Indexation of Gaussian Vector Quantizers2006 / EA Vassilieva, D Krob, JM Steyaert
-
Tender with Success – The Pairwise Comparisons Approach
Abstract Organization of a tender is not easy. Preparation of the relevant specification, taking into account the non-price criteria, implementation of the objective and fair assessment procedure, and last but not least, selecting a satisfactory...
2014 / Konrad Kułakowski, Jacek Szybowski, Ryszard Tadeusiewicz -
An Efficient Implementation of the Sign LMS Algorithm Using Block Floating Point Format2007 / Mrityunjoy Chakraborty, Rafiahamed Shaik, Moon Ho Lee
-
Multi-hop Cluster Based Routing Approach for Wireless Sensor Networks
Abstract One of the key challenges in wireless sensor networks is the efficient usage of restricted energy resources in battery operated sensor nodes. Clustering remains the most effective routing approach used in WSN. Low Adaptive Clustering...
2016 / Mounir Arioua, Younes el Assari, Imad Ez-zazi, Ahmed el Oualkadi -
Biometric Knowledge Extraction for Multi-factor Authentication and Key Exchange
Abstract This paper describes a method for achieving strong, multi-factor and mutual authentication from a biometrics-based protocol for authenticated key exchange (B-AKE). Operation of the protocol relies on knowledge shared by communicating...
2015 / Phillip H. Griffin -
A Multilayered Secure Scheme for Transmission of Sensitive Information based on Steganalysis
Abstract We propose a multilayered secure scheme to transfer sensitive text over an unreliable network. The secret text is first encrypted using the AES algorithm. The cipher text produced is hidden in an audio file. The audio file is in turn...
2016 / Divya Jennifer D'Souza, Minu P. Abraham -
Using Dictionary and Lemmatizer to Improve Low Resource English-Malay Statistical Machine Translation System
Abstract Statistical Machine Translation (SMT) is one of the most popular methods for machine translation. In this work, we carried out English-Malay SMT by acquiring an English-Malay parallel corpus in computer science domain. On the other hand,...
2016 / Yin-Lai Yeong, Tien-Ping Tan, Siti Khaotijah Mohammad -
Multilevel Communication Optimal Least Squares
Abstract Using a recently proposed communication optimal variant of TSQR, weak scalability of the least squares solver (LS) with multiple right hand sides is studied. The communication for TSQR based LS solver for multiple right hand sides remains...
2015 / Pawan Kumar -
A Novel Way of Assessing Software Bug Severity Using Dictionary of Critical Terms
Abstract Due to increase in demands of software and decreased delivery span of software, assuring the quality of software is becoming a challenge. However, no software can claim to be error free due to the complexity of software and inadequate...
2015 / Gitika Sharma, Sumit Sharma, Shruti Gujral -
Analyzing Stakeholders Using Fuzzy Cognitive Mapping
Abstract Stakeholder analysis was first explored as a methodology to assist business leaders with their strategic management functions. Stakeholder analysis has since expanded beyond the corporate arena. Stakeholders are a vital element in all...
2015 / Patrick Hester -
Linguacultural Globalization: Objective Tendencies and the Perspective Issue
Abstract The paper addresses the concept of linguacultural globalization and analyses its sociocultural and linguistic manifestations in different geographical areas. With regard to it, the authors try to pinpoint such phenomena as linguistic...
2014 / Olga V. Odegova, Kristina-Audra Zabulionite -
Adaptive Filtering Using Complex Data and Quaternions
Abstract We provide an overview of complex-data and quaternion-based nonlinear adaptive filtering. The use of quaternion-valued data has been drawing recent interest in various areas of statistical signal processing, including adaptive filtering,...
2015 / Tokunbo Ogunfunmi -
Testing Division Rings and Fields Using a Computer Program
Abstract Abstract algebra is a branch of mathematics which is studying algebraic structures of sets with respect to some operations on them. Each structure has its own axioms and properties. In some cases, to test what kind of structure is a given...
2015 / Ricky Aditya, Muhammad Taufiq Zulfikar, Ngarap Imanuel Manik -
Validating the Effectiveness of Object-Oriented Metrics for Predicting Maintainability
Abstract In this study, empirically investigates the relationship of existing class level object-oriented metrics with a quality parameter i.e., maintainability. Here, different subset of Object-Oriented software metrics have been considered to...
2015 / Lov Kumar, Debendra Kumar Naik, Santanu Kumar Rath -
An Automatic Procedure for Multidimensional Temperature Signal Analysis of a SCADA System with Application to Belt Conveyor Components
Abstract In this paper, a problem of interpretation and analysis of multidimensional temperature data acquired using an online monitoring system is presented. It is highlighted, that apart from the data acquisition system there is a strong need to...
2015 / Mateusz Sawicki, Radoslaw Zimroz, Agnieszka Wyłomańsk, Jakub Obuchowski, Pawel Stefaniak, et al. -
A Study on the Representation of the Various Models for Dynamic Social Networks
Abstract This paper describes the method of representation of the Dynamic Social Network. Authors begin the discussion with a formal introduction where they had brought out the need of the emergence of the Dynamic Social Network and its application...
2016 / Anirban Mitra, Subrata Paul, Santoshini Panda, Prasanta Padhi -
Neighbor Adjacency based Hole Detection Protocol for Wireless Sensor Networks
Abstract Coverage and communication holes may appear in sensor networks due to limited battery life, presence of obstacles and physical destruction of nodes. These holes have a negative impact on the network performance. In order to ensure that...
2016 / Pearl Antil, Amita Malik, Sanjay Kumar