Computer and information sciences topic list of research papers
-
Object Classification Using Substance Based Neural Network2014 / P. Sengottuvelan, R. Arulmurugan
-
Performance analysis of adaptive decode-and-forward relaying in noncoherent cooperative networks2013 / Ha X Nguyen, Nguyen N Tran, Hai T Nguyen
-
“Our Little Secret”: pinpointing potential predators2014 / Anna Vartapetiance, Lee Gillam
-
Towards an Extensible and Secure Cloud Architecture Model for Sensor Information System2013 / Pengfei You, Zhen Huang
-
A Data Driven Approach to Performance Assessment of PID Controllers for Setpoint Tracking
Abstract This paper describes an extension to the detrended fluctuation analysis method for control loop performance where the primary focus is on controller setpoint tracking capabilities. The technique utilizes closed loop control error data and...
2014 / Nelendran Pillay, Poobalan Govender -
Computation of Filtering Functions for Cryptographic Applications
Abstract Large Linear Complexity (LC) is a fundamental requirement for a binary sequence to be used in secret key cryptography. In this paper, a method of computing all the nonlinear filtering functions applied to a shift register with a linear...
2014 / A. Fúster-Sabater -
A QoS-aware Routing Protocol for Reliability Sensitive Data in Hospital Body Area Networks
Abstract The reliability, energy efficiency, and real-time display of patient's data are important factors for Body Area Network (BAN) communication in indoor hospital environments. In this paper we propose a novel routing protocol by considering...
2013 / Zahoor A. Khan, Shyamala Sivakumar, William Phillips, Bill Robertson -
Multi-tenant Elastic Extension Tables Data Management
Abstract Multi-tenant database is a new database solution which is significant for Software as a service (SaaS) and Big Data applications in the context of cloud computing paradigm. This multi-tenant database has significant design challenges to...
2014 / Haitham Yaish, Madhu Goyal, George Feuerlicht -
Learning an L1-Regularized Gaussian Bayesian Network in the Equivalence Class Space2010 / Diego Vidaurre, Concha Bielza, Pedro Larrañaga
-
Scalable Cloudlet-based Mobile Computing Model
Abstract Mobile Cloud Computing (MCC) has been introduced as a feasible solution to the inherited limitations of mobile computing. These limitations include battery lifetime, processing power and storage capacity. By using MCC, the processing and...
2014 / Yaser Jararweh, Lo’ai Tawalbeh, Fadi Ababneh, Abdallah Khreishah, Fahd Dosari -
A robust fingerprint watermark-based authentication scheme in H.264/AVC video2014 / Bac Le, Hung Nguyen, Dat Tran
-
Spatio-temporal Sequential Pattern Mining for Tourism Sciences
Abstract Flickr presents an abundance of geotagged photos for data mining. Particularly, we propose the concept of extracting spatio-temporal meta data from Flickr photos, combining a collection of such photos together results in a spatio-temporal...
2014 / Luke Bermingham, Ickjai Lee -
Geo-referenced flight path estimation based on spatio-temporal information extracted from aircraft take-off noise
Abstract The closer proximity between airports and residential areas has created a growing attention regarding noise pollution. The noise abatement procedures established by the aeronautical authorities and the models for computing noise contours...
2014 / Luis Alejandro Sánchez-Pérez, Luis Pastor Sánchez-Fernández, Sergio Suárez-Guerra, Miguel Márquez-Molina -
Evaluation of Page Response Time between Partial and Full Rendering in a Web-based Catalog System
Abstract The prevalence of the World Wide Web in modern industries has turned web-based systems and internet applications into the main platforms for improving and supporting the completion of users’ tasks. Developments in web programming are...
2014 / Dian Ayuba, Amirah Ismail, Mohd Isa Hamzah -
Neural Network Vs. Bayesian Network to Detect Java Card Mutants
Abstract Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the Card fraudulently in order to access to the services offered by this one. Smartcards are often the...
2013 / Ilhame El Farissi, Mostafa Azizi, Jean-Louis Lanet, Mimoun Moussaoui -
Using a Thermopile Matrix Sensor to Recognize Energy-related Activities in Offices
Abstract Various installations and appliances used by building occupants are manually operated, including office devices, kitchen appliances, washing basins, etc. By monitoring appliances usage and thus energy consumption, office occupants could...
2013 / Luis Ignacio Lopera Gonzalez, Marc Troost, Oliver Amft -
Demotivating Factors in the Arabic Language Clasroom: What Demotivates non-Muslim Malaysian Learners when it Comes to Learning Arabic?
Abstract The objective of this study is to investigate the demotivating factors associated with learning Arabic as a Foreign Language (FL) on the part of non-Muslim Malaysian learners. The data were obtained from an open-ended questionnaire...
2013 / Ashinida Aladdin -
Hierarchical Multiobjective Fuzzy Random Linear Programming Problems
Abstract In this paper, we propose an interactive decision making method for hierarchical multiobjective fuzzy random linear pro- gramming problems (HMOFRLP), in which multiple decision makers in a hierarchical organization have their own multiple...
2013 / Hitoshi Yano, Kota Matsui -
CTML:
Abstract CPP-TRS [2] stands for Communicative Positioning Program - Text Representation Systems and is a visual language based upon a consistent set of dynamic visuals, which may be used in combination to represent qualitative reasoning about the...
2004 / Graziella Tonfoni -
A monadic approach to polycategories
Abstract Polycategories form a rather natural generalization of multicategories. Besides the domains also the codomains of morphisms are allowed to be strings of objects. Small multicategories can be characterized elegantly as monads in a suitable...
2004 / J. Koslowski