Computer and information sciences topic list of research papers
-
Color Image Compression Using Vector Quantization and Hybrid Wavelet Transform
Abstract This paper presents simpler image compression technique using vector quantization and hybrid wavelet transform. Hybrid wavelet transform is generated using Kronecker product of two different transforms. Image is converted to transform...
2016 / H.B. Kekre, Prachi Natu, Tanuja Sarode -
Penalty-Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor
Abstract Cloud computing is the distribution of computing resources over the Internet. A shared pool of resources, including data storage space, computer processing power and applications are provided by Cloud computing. In spite of being...
2016 / Partha Ghosh, Akash Saha, Santanu Phadikar -
An Invisible Logo Watermarking Using Arnold Transform
Abstract Digital watermarking is the process of hiding information into the digital content. The method of embedding a smaller logo image into the host image is called logo watermarking. The system proposes an invisible and secure watermarking. The...
2016 / N. Saikrishna, M.G. Resmipriya -
A unified framework for evaluating the risk of re-identification of text de-identification tools
Abstract Objectives It has become regular practice to de-identify unstructured medical text for use in research using automatic methods, the goal of which is to remove patient identifying information to minimize re-identification...
2016 / Martin Scaiano, Grant Middleton, Luk Arbuckle, Varada Kolhatkar, Liam Peyton, et al. -
Partitioning Application Using Graph Theory for Mobile Devices in Pervasive Computing Environments
Abstract The very first phase in software partitioning is to choose an appropriate clustering methodology before moving the clusters to multiple computational nodes since this stage can impact on the distribution of clusters and eventually on the...
2016 / Nevin Vunka Jungum, Nawaz Mohamudally, Nimal Nissanke -
Role of Text Pre-processing in Twitter Sentiment Analysis
Abstract Ubiquitous nature of online social media and ever expending usage of short text messages becomes a potential source of crowd wisdom extraction especially in terms of sentiments therefore sentiment classification and analysis is a...
2016 / Tajinder Singh, Madhu Kumari -
Meta-survey on medium access control surveys in wireless sensor networks2016 / W. M. Arain, S. Ghani
-
SDAMQ: Secure Data Aggregation for Multiple Queries in Wireless Sensor Networks
Abstract Wireless Sensor Network consists of severely energy constrained sensor nodes and are susceptible to security attacks due to broadcast communication model. It is necessary to optimize the transmission of packets to reduce the energy...
2016 / E.G. Prathima, T. Shiv Prakash, K.R. Venugopal, S.S. Iyengar, L.M. Patnaik -
Further results on super graceful labeling of graphs
Abstract Let G = ( V ( G ...
2016 / Gee-Choon Lau, Wai Chee Shiu, Ho-Kuen Ng -
Combining traffic-shaping methods with congestion control variants for HTTP adaptive streaming2016 / Chiheb Ben Ameur, Emmanuel Mory, Bernard Cousin
-
Using social network analysis of human aspects for online social network software: a design methodology2016 / Faiza Ghafoor, Muaz A. Niazi
-
A static video summarization method based on the sparse coding of features and representativeness of frames2016 / Dong-ju Jeong, Hyoung Jin Yoo, Nam Ik Cho
-
Collaborative Vietnamese WordNet building using consensus quality2016 / Trong Hai Duong, Minh Quang Tran, Thi Phuong Trang Nguyen
-
Innovative Design and Analysis of Production Systems by Multi-objective Optimization and Data Mining
Abstract This paper presents an innovative approach for the design and analysis of production systems using multi-objective optimization and data mining. The innovation lies on how these two methods using different computational intelligence...
2016 / Amos H.C. Ng, Sunith Bandaru, Marcus Frantzén -
Integration of Web Services with E-Learning for Knowledge Society
Abstract The study aims of creating a knowledge society (KS) through e-learning (EL) with the support of web services. EL system with its elements is the matter of discussion at the beginning of the study. For effective EL system, integration of web ...
2016 / Jui Pattnayak, Sabyasachi Pattnaik -
Two-stage approach to extracting visual objects from paper documents2016 / Paweł Forczmański, Andrzej Markiewicz
-
Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution
Abstract Steganography is the art of encoding/embedding secret information in cover media in such a way so as not to provoke an eavesdropper's suspicion. The primary purpose of this paper is to provide three levels of security, first is provided by...
2016 / Rupali Bhardwaj, Vaishali Sharma -
Feature Analysis, Evaluation and Comparisons of Classification Algorithms Based on Noisy Intrusion Dataset
Abstract Various studies have been carried on an Intrusion Detection System (IDS) environment bycomparingthe performance of various Machine Learning (ML)based on a refined intrusion dataset with an error-free environment. However, the real-world...
2016 / Jamal Hussain, Samuel Lalmuanawma -
Design of a Government Collaboration Service Map by Big Data Analytics
Abstract Korean government has divided works by bureau in order to handle diverse social phenomena in an efficient manner. Due to increase in social complexity, however, abrupt social phenomena have frequently occurred. In addition, it has become...
2016 / YoungGun Lee, Sungbum Park -
A generic trajectory similarity operator in moving object databases
Abstract Evaluating similarity between trajectories of moving objects is important for wide range of applications. The existing similarity measures typically define some meaning of similarity and propose algorithms for computing it. We think that...
2016 / Nehal Magdy, Mahmoud A. Sakr, Khaled El-Bahnasy