Computer and information sciences topic list of research papers
-
Hidost: a static machine-learning-based detector of malicious files2016 / Nedim Šrndić, Pavel Laskov
-
Proof Certificates for Equality Reasoning
Abstract The kinds of inference rules and decision procedures that one writes for proofs involving equality and rewriting are rather different from proofs that one might write in first-order logic using, say, sequent calculus or natural deduction....
2016 / Zakaria Chihani, Dale Miller -
Development of Heartbeat Detection Kit for Biometric Authentication System
Abstract Automated security is one of the major concerns in modern time where secure and reliable authentication is in great demand. However, traditional authentication methods such as password and smart card are now outdated because they can be...
2016 / D.A. Ramli, M.Y. Hooi, K.J. Chee -
A Hybrid Filtering Approach of Digital Video Stabilization for UAV Using Kalman and Low Pass Filter
Abstract In this paper a new video stabilization algorithm for unmanned aerial vehicles (UAV) has been presented which is used to stabilize the video being transmitted from UAV to the ground station. First, the corner points are extracted using Good ...
2016 / Lakshya Kejriwal, Indu Singh -
ℓ1 Trend Filter for Image Denoising
Abstract The major problem in digital image processing is the presence of unwanted frequencies(noise). In this paper ℓ1 trend filter is proposed as an image denoising technique. ℓ1-trend filter estimates the hidden trend in the data by formulating a ...
2016 / Sreelekshmy Selvin, S.G. Ajay, B. Ganga Gowri, V. Sowmya, K.P. Soman -
Enhanced Merge Sort- A New Approach to the Merging Process
Abstract One of the major fundamental issues of Computer Science is arrangement of elements in the database. The efficiency of the sorting algorithms is to optimize the importance of other sorting algorithms11. The optimality of these sorting...
2016 / Smita Paira, Sourabh Chandra, S.K. Safikul Alam -
A Unified Procedure for Provability and Counter-Model Generation in Minimal Implicational Logic
Abstract This paper presents results on the definition of a sequent calculus for Minimal Implicational Propositional Logic ( M ...
2016 / Jefferson de Barros Santos, Bruno Lopes Vieira, Edward Hermann Haeusler -
Recovering the MSS-sequence via CA
Abstract A cryptographic sequence generator, the modified self-shrinking generator (MSSG), was recently designed as a novel version of the self-shrinking generator. Taking advantage of the cryptographic properties of the irregularly decimated...
2016 / Sara D. Cardell, Amparo Fúster-Sabater -
A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET
Abstract Ad hoc On Demand Distance Vector Routing is an extensively accepted routing protocol for Mobile Ad hoc Network. The inadequacy of security considerations in the design of AODV makes it vulnerable to black hole attack in which, malicious...
2016 / K.S. Arathy, C.N. Sminesh -
Two Novel DV-Hop Localization Algorithms for Randomly Deployed Wireless Sensor Networks2015 / Guozhi Song, Dayuan Tam
-
A Proportion Learning Algorithms with Density Peaks
Abstract As a powerful tool of weakly labeled learning, proportion learning has drawn much attention in recent years. In this problem, instances are grouped in bags and only the proportion of labels is known in each bag. It has broad applications,...
2016 / Limeng Cui, Zhiquan Qi, Fan Meng -
Self-Adaptively Auto-scaling for Mobile Cloud Applications
Abstract This paper proposes an approach to adapting distributed applications to changes in user requirements and resource availability. The key ideas behind the framework were dynamic deployment of components and dividing and merging components....
2016 / Ichiro Satoh -
Privacy Preserving In-network Aggregation in Wireless Sensor Networks
Abstract The use of attack-prone hardware makes designing secure schemes for data collection a complex task. Addressing the continuous threat of attacks at the aggregator nodes, this work proposes a privacy preserving secure in-network data...
2016 / Vishal Krishna Singh, Saurabh Verma, Manish Kumar -
A New Approach to Model and Optimize the Order Sequence of a Two-stage Storage and Order Picking System with Particular Attention to Restrictions of the Material Flow
Abstract This article shows the fundamental research concerning the modeling and optimizing a two-stage storage and order picking system. Therefore are elected for the type of modeling flexible flowshop problems and for the optimizing method tools...
2016 / Jens Schweitzer -
Using the one–versus–rest strategy with samples balancing to improve pairwise coupling classification2016 / Wiesław Chmielnicki, Katarzyna Stąpor
-
Minimizing Broadcast Expenses in Clustered Ad-hoc Networks
Abstract One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue...
2016 / S. Zeeshan Hussain, Naeem Ahmad -
Log-based Evaluation of Label Splits for Process Models
Abstract Process mining techniques aim to extract insights in processes from event logs. One of the challenges in process mining is identifying interesting and meaningful event labels that contribute to a better understanding of the process. Our...
2016 / Niek Tax, Natalia Sidorova, Reinder Haakma, Wil M.P. van der Aalst -
An Improved Wideband Covariance Matrix Sparse Representation (W-CMSR) Method for Wideband Direction of Arrival Estimation Using Simulated Annealing
Abstract In this paper, we optimize the size of aperture and number of sensors for Wideband Covariance Matrix Sparse representation (W-CMSR) method for Wideband Direction of Arrival estimation using Simulated Annealing. The performance of W-CMSR is...
2016 / Sandeep Santosh, O.P. Sahu -
Enhanced XSS Defensive Framework for Web Applications Deployed in the Virtual Machines of Cloud Computing Environment
Abstract To thwart the virtual machines from being a victim of XSS attacks on the cloud computing environment, this paper presents an enhanced XSS defensive methodology for the cloud platforms. This framework initially scans the HTTP requests for...
2016 / Shashank Gupta, B.B. Gupta -
Automatic Categorization of Social Sensor Data
Abstract Today, there is a huge impact on generation of data in everyday life due to micro blogging sites like Twitter, Facebook, and other social networking web sites. The valuable data that is broadcast through micro blogging can provide useful...
2016 / Olivera Kotevska, Sarala Padi, Ahmed Lbath