Computer and information sciences topic list of research papers
-
A novel binary image encryption algorithm based on diffuse representation
Abstract In this paper, we propose a new algorithm to encrypt binary images. The proposed scheme is described in several steps. In the first step, we present a new basis to reduce the amount of data required to present the image. In the second step, ...
2016 / Amrane Houas, Zouhir Mokhtari, Kamal Eddine Melkemi, Abdelmalik Boussaad -
Compressive Sensing Based Underwater Communication System
Abstract Underwater acoustic communication is an important research area having significant industrial and marine applications. Ocean exploration and observation, command and control of Autonomous Underwater Vehicles, coastal surveillance etc. are a ...
2016 / Jinu Joseph, M. Rema Devi, N. Suresh Kumar -
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
Abstract Binary analysis is useful in many practical applications, such as the detection of malware or vulnerable software components. However, our survey of the literature shows that most existing binary analysis tools and frameworks rely on...
2016 / Saed Alrabaee, Lingyu Wang, Mourad Debbabi -
Analysis of Physical Layer Security via Co-operative Communication in Internet of Things
Abstract Co-operative communication in Internet of Things enable the co-existing heterogeneous wireless networks to co-operate with each other in order to facilitate network traffic, guarantee QoS requirements and to enable energy efficient secure...
2016 / Aparna K. Nair, Shaniba Asmi, A. Gopakumar -
Development of an Automated Motion Evaluation System from Wearable Sensor Devices for Ski Jumping
Abstract We developed a system for the automatic evaluation of ski jumps on the base of machine learning algorithms. In several capture sessions during summer jump season, motions of four junior ski jumpers were captured by inertial sensors over the ...
2016 / Heike Brock, Yuji Ohgi, Kazuya Seo -
GPU-based Pedestrian Detection for Autonomous Driving
Abstract We propose a real-time pedestrian detection system for the embedded Nvidia Tegra X1 GPU-CPU hybrid platform. The detection pipeline is composed by the following state-of-the-art algorithms: features extracted from the input image are...
2016 / V. Campmany, S. Silva, A. Espinosa, J.C. Moure, D. Vázquez, et al. -
Recognizing Surgically Altered Face Images and 3D Facial Expression Recognition
Abstract Altering Facial appearances using surgical procedures are common now days. But it raised challenges for face recognition algorithms. Plastic surgery introduces non linear variations. Because of these variations it is difficult to be modeled ...
2016 / B.S. Sruthy, M. Jayasree -
Robust deformable shape reconstruction from monocular video with manifold forests2016 / Lili Tao, Bogdan J. Matuszewski
-
Image Mining Using Association Rule for Medical Image Dataset
Abstract The concept of data mining for discovering frequent image patterns in mammogram images using association rule is presented. Proposed method works in two phases. First phase is segmentation of digital mammogram to find region of interest...
2016 / Jyoti Deshmukh, Udhav Bhosle -
Toward Service Aggregation for Edge Computing
Abstract Interoperability is one of crucial Internet-related research domains. Today, there is a shift in the architecture of the Internet and the traditional communication model; the human part in machine communication is blurring into a more...
2016 / Jabril Abdelaziz, Mehdi Adda, Hamid Mcheick -
A genetic algorithm-based job scheduling model for big data analytics2016 / Qinghua Lu, Shanshan Li, Weishan Zhang, Lei Zhang
-
Using Suffix Arrays to Compute Term Frequency and Document Frequency for All Substrings in a Corpus2002 / Mikio Yamamoto, Kenneth W. Church
-
Routing protocols for wireless sensor networks: What the literature says?
Abstract Routing in Wireless Sensor Networks (WSNs) plays a significant role in the field of environment-oriented monitoring, traffic monitoring, etc. Here, wide contributions that are made toward routing in WSN are explored. The paper mainly aims...
2016 / Amit Sarkar, T. Senthil Murugan -
ABC optimized RBF network for classification of EEG signal for epileptic seizure identification
Abstract The brain signals usually generate certain electrical signals that can be recorded and analyzed for detection in several brain disorder diseases. These small signals are expressly called as Electroencephalogram (EEG) signals. This research...
2016 / Sandeep Kumar Satapathy, Satchidananda Dehuri, Alok Kumar Jagadev -
Self Adaptive Intrusion Detection Technique Using Data Mining Concept in an Ad-hoc Network
Abstract The Intrusion Detection System mainly adopted from the traditional Wired Network or Distributed Network cannot provide a satisfying solution to the increasing security threats in an Ad-Hoc Network. Adhoc-Network due to its typical...
2016 / Bandana Mahapatra, Srikanta Patnaik -
A topological insight into restricted Boltzmann machines2016 / Decebal Constantin Mocanu, Elena Mocanu, Phuong H. Nguyen, Madeleine Gibescu, Antonio Liotta
-
Similarity-based Change Detection for RDF in MapReduce
Abstract Managing and analyzing huge amount of heterogeneous data are essential for various services in the Internet of Things (IoT). Such analysis requires keeping track of data versions over time, and consequently detecting changes between them....
2016 / Taewhi Lee, Dong-Hyuk Im, Jongho Won -
Natural Computing for Automatic Test Data Generation Approach Using Spanning Tree Concepts
Abstract The weight is assigned to all edges of graph according to a uniform policy and focus is on the leaves nodes of the Spanning Tree of Control Flow Graph of Program. If all leaves nodes of Spanning tree are covered by the test cases, then...
2016 / Sanjay Singla, Raj Kumar, Dharminder Kumar -
CSSXC: Context-sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Environments
Abstract This paper presents a context-sensitive sanitization based XSS defensive framework for the cloud environment. It discovers all the hidden injection points in HTML5-based web applications deployed on the platforms of cloud and sanitizes the...
2016 / Shashank Gupta, B.B. Gupta -
An Optimal (k,n)Visual Secret Sharing Scheme for Information Security
Abstract Recently, based on the concept of Visual Secret Sharing (VSS) scheme proposed by Naor and Shamir in 1994, many of schemes have been proposed to protect the security of binary image. Yet, the problems of pixel expansion, extensive codebook...
2016 / Mahmoud E. Hodeish, Linas Bukauskas, Vikas T. Humbe