Computer and information sciences topic list of research papers
-
E –Payment System Using Visual and Quantum Cryptography
Abstract In recent years E-shopping gained a tremendous growth due to its benefits. Even though benefits of E-shopping are considerable, it creates some security threats such as debit, credit card fraud, phishing etc. In this paper we introduce an...
2016 / P.A. Shemin, K.S. Vipinkumar -
Accessibility of Indian universities’ homepages: An exploratory study
Abstract Websites have evolved into an excellent medium of information dissemination and visibility. Hence governments and organizations around the world have websites as primary medium for information communication. The universal accessibility of...
2016 / Abid Ismail, K.S. Kuppusamy -
Binary-weighted photonic digital-to-analogue converter2016 / Seyedreza Abdollahi, Hamed Saffa Al-Raweshidy, Thomas J. Owens
-
Topic detection using paragraph vectors to support active learning in systematic reviews
Abstract Systematic reviews require expert reviewers to manually screen thousands of citations in order to identify all relevant articles to the review. Active learning text classification is a supervised machine learning approach that has been...
2016 / Kazuma Hashimoto, Georgios Kontonatsios, Makoto Miwa, Sophia Ananiadou -
Pedestrian lane detection in unstructured scenes for assistive navigation
Abstract Automatic detection of the pedestrian lane in a scene is an important task in assistive and autonomous navigation. This paper presents a vision-based algorithm for pedestrian lane detection in unstructured scenes, where lanes vary...
2016 / Son Lam Phung, Manh Cuong Le, Abdesselam Bouzerdoum -
Efficient geometry-based similarity search of 3D spatial databases2005 / Daniel A. Keim
-
Forward Error Correction for DNA Data Storage
Abstract We report on a strong capacity boost in storing digital data in synthetic DNA. In principle, synthetic DNA is an ideal media to archive digital data for very long times because the achievable data density and longevity outperforms today's...
2016 / Meinolf Blawat, Klaus Gaedke, Ingo Huetter, Xiao-Ming Chen, Brian Turczyk, et al. -
The recoverable robust spanning tree problem with interval costs is polynomially solvable2016 / Mikita Hradovich, Adam Kasperski, Paweł Zieliński
-
Performance Analysis of Malayalam Language Speech Emotion Recognition System Using ANN/SVM
Abstract Automatic recognition of emotions from speech by machines has been one of the most challenging areas of research in the field of human machine interaction. Automatic emotion recognition system by speech merely means that to monitor and...
2016 / T.M. Rajisha, A.P. Sunija, K.S. Riyas -
Robust Ad-hoc Sensor Routing (RASeR) protocol for mobile wireless sensor networks
Abstract Robust Ad-hoc Sensor Routing (RASeR) is a novel protocol for data routing in mobile wireless sensor networks (MWSNs). It is designed to cope with the demanding requirements of emerging technologies, which require the reliable and...
2016 / T. Hayes, F.H. Ali -
D-STHARk: Evaluating Dynamic Scheduling of Tasks in Hybrid Simulated Architectures1
Abstract The emergence of applications that demand to handle efficiently growing amounts of data has stimulated the development of new computing architectures with several Processing Units (PUs), such as CPUs core, graphics processing units (GPUs)...
2016 / Sávyo Toledo, Danilo Melo, Guilherme Andrade, Fernando Mourão, Aniket Chakrabarti, et al. -
Assessing and generating test sets in terms of behavioural adequacy2015 / Gordon Fraser, Neil Walkinshaw
-
Bounds, Breaks and Unit Root Tests2015 / Josep Lluís Carrion-I-Silvestre, María Dolores Gadea
-
Mining of High Utility Itemsets of Size-2 with Pruning Strategies and Negative Item Values for B2C Companies Based on Experiential Marketing Approach
Summary Business to customer (B2C) marketing for the retail organisations is the most rapid adoption made by the developed countries, while it has the pitfalls in the developing nations. B2C companies have been continually putting some or the other...
2016 / Gaurav Gahlot, Nagamma Patil -
A parallel algorithm for Bayesian network structure learning from large data sets
Abstract This paper considers a parallel algorithm for Bayesian network structure learning from large data sets. The parallel algorithm is a variant of the well known PC algorithm. The PC algorithm is a constraint-based algorithm consisting of five...
2016 / Anders L. Madsen, Frank Jensen, Antonio Salmerón, Helge Langseth, Thomas D. Nielsen -
Searchable symmetric encryption capable of searching for an arbitrary string2016 / Yoshinao Uchide, Noboru Kunihiro
-
Knowledge Management in Construction Using a SocioBIM Platform: A Case Study of AYO Smart Home Project
Abstract Knowledge is one of an organization's most important assets, hence organizations should strive to capture and reuse the knowledge of their workers in order to have continuous improvements. The construction industry is often associated with...
2016 / Raghav Grover, Thomas M. Froese -
A tunable bandstop filter using T shaped DGS and MEMS switches on CPW
Summary In the present work, a band stop filter with tunable resonant frequency and tunable bandwidth is proposed using micro electromechanical (MEMS) switches. The band stop filter is based on defected ground structures (DGS). Tunability of...
2016 / K. Nisha Jose, M.R. Baiju -
Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks2015 / Alessio Di Mauro, Xenofon Fafoutis, Nicola Dragoni
-
Digital Image Steganography Using Variable Length Group Of Bits Substitution
Abstract This paper presents two new steganography methods in spatial domain. The basic idea is the substitution of a group of bits in a pixel by another group of bits of same length to hide one or two bits of secret data. The number of bits...
2016 / Gandharba Swain