Computer and information sciences topic list of research papers
-
Improving the Connectivity of Community Detection-based Hierarchical Routing Protocols in Large-scale WSNs
Abstract The recent growth in the use of wireless sensor networks (WSNs) in many applications leads to the raise of a core infrastructure for communication and data gathering in Cyber-Physical Systems (CPS). The communication strategy in most of the ...
2016 / Matheus A. de Paulo, Mariá C.V. Nascimento, Valério Rosset -
Multi-objective optimisation of wavelet features for phoneme recognition2016 / Leandro Daniel Vignolo, Diego Humberto Milone, Hugo Leonardo Rufiner
-
Robust feature representation for classification of bird song syllables2016 / Maria Sandsten, Mareile Große Ruse, Martin Jönsson
-
Leveraging the Internet of Things: Integration of Sensors and Cloud Computing Systems2016 / M. Villari, A. Al-Anbuky, A. Celesti, K. Moessner
-
Simulation modeling and analysis of the hop count distribution in cognitive radio ad-hoc networks with shadow fading
Abstract The number of hops between source node and destination node is a key parameter in studying multi-hop wireless networks. Although hop count in wireless ad-hoc networks (AHNs) has been studied in the literature, no works on investigating the...
2016 / Le The Dung, Tran Dinh Hieu, Seong-Gon Choi -
Extracting Chinese polarity shifting patterns from massive text corpora2016 / Ge Xu, Chu-Ren Huang
-
ECG Beat Classification Using Evidential K -Nearest Neighbours
Abstract The Electrocardiogram (ECG) signal provides a useful non-interventional method for identifying cardiac arrhythmias. In this paper, we look at automatic ECG beat classification into 2 categories-Normal and Premature ventricular contraction...
2016 / Shameer Faziludeen, Praveen Sankaran -
Communication Framework for Jointly Addressing Issues of Routing Overhead and Energy Drainage in MANET
Abstract The advancement into smart mobile devices has accelerated the adoption of various pervasive computing based ubiquitous applications, where Mobile Adhoc Network (MANET) has extended its usability from hard core military applications to civil ...
2016 / Sachidananda S. Joshi, Sangappa Ramachandra Biradar -
An Integrated Approach of Physical Biometric Authentication System
Abstract Protecting the sensitive information is paramount important in this digital world due to the vulnerable access by malicious users. Nowadays, the digital information theft is increasing in digital society. Furthermore, identifying and...
2016 / Malathi R., Jeberson Retna Raj R. -
Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments2014 / Jin-Mook Kim, Jeong-Kyung Moon
-
Analyzing surface sampling patterns using the localized pair correlation function2016 / Weize Quan, Jianwei Guo, Dong-Ming Yan, Weiliang Meng, Xiaopeng Zhang
-
An Evacuation Route Planning for Safety Route Guidance System after Natural Disaster Using Multi-objective Genetic Algorithm
Abstract When a natural disaster occurred, some roads cannot be used anymore and sometimes blocked. Also, survivors and refugees cannot follow the evacuation procedures by just using default maps after disaster. A previous study proposed a safety...
2016 / Yukie Ikeda, Masahiro Inoue -
New Algorithm for Frequent Itemsets Mining from Evidential Data Streams
Abstract Mining frequent itemsets is a very interesting issue in Data Streams handling, useful for several real world applications. This task reveals many challenges such the one-pass principle as well as performance problems due to the huge volumes ...
2016 / Amine Farhat, Mohamed Salah Gouider, Lamjed Ben Said -
A connectionist computational method for face recognition2016 / Francisco A. Pujol, Higinio Mora, José A. Girona-Selva
-
Internet of Things, Blockchain and Shared Economy Applications
Abstract This paper explores how the Internet of Things and blockchain technology can benefit shared economy applications. The focus of this research is understanding how blockchain can be exploited to create decentralised, shared economy...
2016 / Steve Huckle, Rituparna Bhattacharya, Martin White, Natalia Beloff -
Technological, Organizational and Environmental Security and Privacy Issues of Big Data: A Literature Review
Abstract This paper provides a literature review on security and privacy issues of big data. These issues are classified into three contexts; technological, organizational and environmental that is meant to facilitate future research. The main...
2016 / Khairulliza Ahmad Salleh, Lech Janczewski -
Methods for Stochastic Collection and Replenishment (SCAR) optimisation for persistent autonomy
Abstract Consideration of resources such as fuel, battery charge, and storage space, is a crucial requirement for the successful persistent operation of autonomous systems. The Stochastic Collection and Replenishment (SCAR) scenario is motivated by...
2016 / Andrew W. Palmer, Andrew J. Hill, Steven J. Scheding -
A New Unsupervised Approach to Word Segmentation2011 / Hanshi Wang, Jian Zhu, Shiping Tang, Xiaozhong Fan
-
A Novel Approach For Generation of OTP'S Using Image's
Abstract Security is a major concern in the web applications often requires certain degree of technical sophistication. Today the naive users have been increasingly targeted by miscreants who are aiming to make an easy profit by means of illegal...
2016 / Kalyanapu Srinivas, V. Janaki -
Assessing the Role of General Chemistry Learning in Higher Education
Abstract The inclusion of General Chemistry (GC) in the curricula of higher education courses in science and technology aims, on the one hand, to develop students’ skills necessary for further studies and, on the other hand, to respond to the need...
2016 / Margarida Figueiredo, José Neves, Guida Gomes, Henrique Vicente