Computer and information sciences topic list of research papers
-
Cloud Audit: A Data Integrity Verification Approach for Cloud Computing
Abstract Cloud computing is the fastest growing and promising field in the sector of service provision. It is a very trendy situation for security implementation in the Cloud. Thus, security restrictions are increasing on users and service providers ...
2016 / Rajat Saxena, Somnath Dey -
Security threats and their mitigation in infrastructure as a service
Summary Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS) is the basic...
2016 / Bineet Kumar Joshi, Mohit Kumar Shrivastava, Bansidhar Joshi -
Feynman Machine: A Geometric Computational Machinery Based on the Path Integration
Abstract This paper proposes a framework for a new quantum computation based on the Feynman's path integral. The Feynman's path integral has been studied in quantum physics, however, the computational machinery may be used in universal computations. ...
2016 / Yoshiteru Ishida -
Improving Semantic Relatedness Assessments: Ontologies Meet Textual Corpora
Abstract Even though the calculation of the semantic similarity between textual entities has received a lot of attention by the research community, the more general notion of semantic relatedness (which considers both taxonomic and non-taxonomic...
2016 / Montserrat Batet, David Sánchez -
SpikingLab: modelling agents controlled by Spiking Neural Networks in Netlogo2016 / Cristian Jimenez-Romero, Jeffrey Johnson
-
Development of a Web Based Monitoring System for a Distributed and Modern Production
Abstract Web technologies have experienced a rapid development in recent years. In particular web browsers enhanced their abilities because of the improvement of JavaScript, CSS3 and HTML5. Hence, richer web-based software solutions with an...
2016 / Michael Stangl, Julia Pielmeier, Christoph Berger, Stefan Braunreuther, Gunther Reinhart -
Design of Multi-agent Emergency Dispatching Model to Strengthen Resiliency of Taiwan High-speed Rail System
Abstract Although HSR (high-speed rail) systems can provide good service quality, such the systems have not been designed to handle disaster-related events very well, i.e., the trains dispatching work during a disaster. In other words, if there is...
2016 / Ting-Wu Ho, Te-Che Chen, Chuen-Chyi Hsieh, Chien-Cheng Chou -
Goal Based Threat Modeling for Peer-to-Peer Cloud
Abstract Peer-to-peer networks, without central servers, have peers operating both as client and server. This paper discusses flaws of P2P networks and clouds. That P2PClouds can be derived from idle resources is also briefly discussed. A...
2016 / Sanghamitra De, Mridul Sankar Barik, Indrajit Banerjee -
Application of Information Processes Applicative Modelling to Virtual Machines Auto Configuration
Abstract The paper discusses application of the algorithm based information processes modeling and Q-machine learning to the task of virtual machines auto configuration. Usage of virtual machines is one the most common solution nowadays for almost...
2016 / Sergey Zykov, Leonid Shumsky -
Computing geometric median to locate the sink node with the aim of extending the lifetime of wireless sensor networks
Abstract In case of wireless sensor networks (WSNs) the sensed data which are collected by the ordinary senor nodes will have to be forwarded to the sink node (Base Station) in order to be accessible by the remote users. The location of the sink...
2016 / Yahya Kord Tamandani, Mohammad Ubaidullah Bokhari, Mohammad Zarif Kord -
Real time Electronic Control of Multi Fingered Hand Based on Sensors
Abstract In India the general population's majority lost their hand because of street mishap, sickness and troopers lost their arm in war. This paper portrays the outline which controls the hand movement and wrist movement of My electric controlled...
2016 / B. Shyamala -
Semantic Reasoning with Contextual Ontologies on Sensor Cloud Environment2014 / Kyungeun Park, Yanggon Kim, Juno Chang
-
Distance selection based on relevance feedback in the context of CBIR using the SFS meta-heuristic with one round
Abstract In this paper, we address the selection in the context of Content Based-Image Retrieval (CBIR). Instead of addressing features’ selection issue, we deal here with distance selection as a novel paradigm poorly addressed within CBIR field....
2016 / Mawloud Mosbah, Bachir Boucheham -
Towards Improving Storage Cost and Security Features of Honeyword Based Approaches
Abstract Password based authentication shows its vulnerability against inversion attack model in which adversary obtains plaintext password from its corresponding hashed value. To cope up with such attack, honeyword based authentication technique is ...
2016 / Nilesh Chakraborty, Samrat Mondal -
CrowdAR: A Live Video Annotation Tool for Rapid Mapping
Abstract Digital Humanitarians are a powerful and effective resource to analyse the vast amounts of data that disasters generate. Aerial vehicles are increasingly being used for gathering high resolution imagery of affected areas, but require a lot...
2016 / Elliot Salisbury, Sebastian Stein, Sarvapali Ramchurn -
Hybrid Battery-friendly Mobile Solution for Extracting Users’ Visited Places
Abstract Extracting and analyzing outdoor humans’ activities represent a strong support for several applications fields, ranging from traffic management to marketing and social studies. Mobile users take their devices with them everywhere which...
2016 / Mehdi Boukhechba, Abdenour Bouzouane, Sebastien Gaboury, Charles Gouin-Vallerand, Sylvain Giroux, et al. -
Review Paper on Applications of Principal Component Analysis in Multimodal Biometrics System
Abstract Unimodal biometric systems are susceptible to a variety of problems such as noisy data, intra-class variations, limited degrees of freedom, non-universality, spoof attacks and unacceptable error rates. Some of these limitations can be...
2016 / Chhaya Sunil Khandelwal, Ranjan Maheshewari, U.B. Shinde -
Image Registration of Satellite Images with Varying Illumination Level Using HOG Descriptor Based SURF
Abstract Image registration aligns two images geometrically, which is frequently required in medical, computer vision and remote-sensing field. It is a crucial pre-processing step in change detection or growth monitoring using satellite images....
2016 / Manish I. Patel, Vishvjit K. Thakar, Shishir K. Shah -
Definability in Mining Incomplete Data
Abstract In this paper we study local and global definability of incomplete data sets from the view point of decision rule induction. We assume that data sets are incomplete since some attribute values are lost and some are considered as irrelevant...
2016 / Jerzy W. Grzymala-Busse, Teresa Mroczek -
Do resource constraints affect lexical processing? Evidence from eye movements
Abstract Human language is massively ambiguous, yet we are generally able to identify the intended meanings of the sentences we hear and read quickly and accurately. How we manage and resolve ambiguity incrementally during real-time language...
2016 / Mallorie Leinenger, Mark Myslín, Keith Rayner, Roger Levy