Computer and information sciences topic list of research papers
-
Secure Access Control Method for Wireless Sensor Networks2015 / Cheng-Yeh Chen, Alan Dahgwo Yein, Te-Cheng Hsu, John Y. Chiang, Wen-Shyong Hsieh
-
Prediction-based VM provisioning and admission control for multi-tier web applications2016 / Adnan Ashraf, Benjamin Byholm, Ivan Porres
-
Computations on Cipher Speech for Secure Biometrics
Abstract Signal Processing in Encrypted Domain (SPED) is a blending of signal processing and cryptography. SPED is a magnificent tool for processing encrypted data. It provides privacy and security for highly confidential and sensitive data. In this ...
2016 / Archana Dinesh, K. Edet Bijoy -
A Hyperconnected Manufacturing Collaboration System Using the Semantic Web and Hadoop Ecosystem System
Abstract With the explosive growth of digital data communications in synergistic operating networks and cloud computing service, hyperconnected manufacturing collaboration systems face the challenges of extracting, processing, and analyzing data...
2016 / Hsiao-Kang Lin, Jennifer A. Harding, Chun-I Chen -
Clustering Analysis in Wireless Sensor Networks: The Ambit of Performance Metrics and Schemes Taxonomy2016 / A. Zeb, A. K. M. M. Islam, M. Zareei, I. Al Mamoon, N. Mansoor, et al.
-
Managing Mysql Cluster Data Using Cloudera Impala
Abstract MySQL Cluster is a widely used clustered database used to store and manipulate data which has a shared-nothing clustering for the MySql database management system providing high availability and high throughput with low latency. The problem ...
2016 / Sahithi Tummalapalli, Venkata rao Machavarapu -
Proposal for an Evaluation Method for the Performance of Work Procedures
Abstract Background Noncompliance of operators with work procedures is a recurrent problem. This human behavior has been said to be situational and studied by many different approaches (ergonomic and others), which consider the...
2016 / Mouda Mohammed, Djebabra Mébarek, Boulagouas Wafa, Chati Makhlouf -
A Proposal of Transaction Processing Method for MongoDB
Abstract At present, to deal with a large amount of variety data in the database, various NoSQL databases have been proposed and put to practical use. However, since most of them support the transaction processing only on the single data, there is...
2016 / Tsukasa Kudo, Masahiko Ishino, Kenji Saotome, Nobuhiro Kataoka -
Analyzing RFID Tags in a Distributed Environment
Abstract RFID technology is widely used in various areas and found to be very useful in the business which includes supply chain management. Also the amount of RFID data is very huge as well. Hence too much time is needed to get particular...
2016 / Sonia A. Joseph, N.J. Joby -
Desirable Complexity
Abstract Design methodologies devote a great degree of effort on deciphering, decomposing, and simplifying problems. This approach is particularly true in Axiomatic Design to the point that inability to simplify and understand a situation is defined ...
2016 / Joseph Timothy Foley, Erik Puik, David S. Cochran -
A constructive bandwidth reduction algorithm—A variant of GPS algorithm
Abstract In this paper, a new viable bandwidth reduction algorithm for reducing the bandwidth of sparse symmetric matrices, is described. The proposed algorithm provides a reliable procedure to reduce the bandwidth and can easily be applied to the...
2016 / L. Jones Tarcius Doss, P. Arathi -
A Mobile Computing Framework for Pervasive Adaptive Platforms2011 / Olivier Brousse, Jérémie Guillot, Gilles Sassatelli, Thierry Gil, François Grize, et al.
-
Exploiting Wikipedia API for Hindi-english Cross-language Information Retrieval
Abstract The rapidly increasing demographics of the internet population and the abundance of multilingual content on the web increased the communication in multiple languages. Most of the people use their regional languages to express their needs...
2016 / Vijay Kumar Sharma, Namita Mittal -
Modeling Knowledge Transfer and the Transdisciplinary Effect on Project-based Learning Activities
Abstract Each scientific project or publication can be attributed to several fields of study with different degrees. Call interdisciplinary distribution the set of the degrees. If we have fixed number of fields of study, the set can be written in...
2016 / Nikita Kogtikov, Alexey Dukhanov, Klavdiya Bochenina -
Multi-flow management for mobile data offloading
Abstract Cellular networks are facing explosive growth of mobile data traffic due to the proliferation of smart devices and traffic-intensive applications. As a cost-effective solution, delayed Wi-Fi offloading was introduced to shift the...
2016 / Yeongjin Kim, Joohyun Lee, Jaeseong Jeong, Song Chong -
Yes-No Answers, Partial Pro-drop Languages and Machine Translation
Abstract This paper addresses the automatic translations of verbal answers to yes-no questions from partial pro-drop languages (Brazilian Portuguese and Russian) into a non-pro-drop language (English). The outputs provided by standard statistical...
2016 / Eduardo Correa Soares -
Pattern Based Cache Coherency Architecture for Embedded Manycores
Abstract Modern parallel programming frameworks like OpenMP often rely on shared memory concepts to harness the processing power of parallel systems. But for embedded devices, memory coherence protocols tend to account for a sizable portion of...
2016 / Jussara Marandola, Stephane Louise, Loic Cudennec -
Inferring propagation paths for sparsely observed perturbations on complex networks2016 / F. A. Massucci, J. Wheeler, R. Beltran-Debon, J. Joven, M. Sales-Pardo, et al.
-
Total Variation Denoising Based Approach for R-peak Detection in ECG Signals
Abstract Detecting R-peak signal from electrocardiogram or ECG signal plays a vital role in cardiac monitoring system and ECG applications. In this paper, Total Variation Denoising (TVD) based approach is proposed to find the locations of R-peaks in ...
2016 / S. Sachin Kumar, Neethu Mohan, P. Prabaharan, K.P. Soman -
Connectivity Node Set Generation Algorithm of Mine WSN Based on the Maximum Distance2016 / K. Wang, D. Xu