Computer and information sciences topic list of research papers
-
Analytical Insights on Theta-Gamma Coupled Neural Oscillators2013 / Lorenzo Fontolan, Maciej Krupa, Alexandre Hyafil, Boris Gutkin
-
Exact Characterization of Monitor’ Color Showing
Abstract In order to effectively control a monitor's color showing, the key technique is to establish the relationship between RGB data and their corresponding CIE colorimetric values. But in nowadays ICC color management system, there is no the...
2011 / Xu Yanfang, Li Yinan, Liu Haoxue, Huang Min -
Privacy Preservation for Global Cyclic Associations in Distributed Databases
Abstract There have been immense advancements in collaborative data analysis. Hence the desire to keep one's own sensitive data secret is an important challenge of preserving privacy while mining in a distributed setup. There have been indeed...
2012 / Nirali Nanavati, Devesh Jinwala -
Enhancing Recommendation Quality of Content-based Filtering through Collaborative Predictions and Fuzzy Similarity Measures
Abstract Recommender systems (RSs) provide personalized suggestions about items to users while interacting with the large spaces on the web. Content based recommender systems (CB-RSs) offer personalized recommendations to a user mainly based on his...
2012 / Vibhor Kant, Kamal K. Bharadwaj -
Multilingual Online Resources for Minority Languages of a Campus Community
Abstract This paper discusses on an initiative of developing a repository on multilingual language resources for minority languages of a campus community. The choice of language is based on a survey amongst IIUM international students about the...
2011 / Nur Asmaa’ Adila Mohamad, Tg Fatin Najihah Tg Hassan, Tg Norhuda Tg Muda, Normaziah A. Aziz, Ahmad Hasanul Ishraf -
Windowed Huffman Coding with Limited Distinct Symbols
Abstract The adaptive Huffman coding with a window of limited distinct symbols is proposed. The window buffer is used to store a specified number of distinct symbols most recently processed. The total number of symbols within the window may vary,...
2012 / Utpal Nandi, Jyotsna Kumar Mandal -
Design and Implementation of A New Location Management Scheme in Mobile Ad Hoc Network
Abstract Ad hoc networks are an exciting approach to network design. Not relying on complex and expensive infrastructure, which is required by their counterparts, ad hoc network can operate in scenarios where traditional networks fails such as...
2012 / Kuber Datt Gautam, Upendra Verma, Vijay Prakash -
Multimodal Medical Image Fusion Using Discrete Ripplet Transform and Intersecting Cortical Model
Abstract Image fusion is the process of combining multiple images of the same scene into a single fused image. It preserves the full content information and retains the important features from each of the original images. In this paper, a fusion...
2012 / C.T. Kavitha, C.Chellamuthu, R. Rajesh -
Performance Optimization of MIMO Using Space-Time Block Coding Scheme
Abstract In MIMO system multiple antennas are used at Transmitter and receiver side. MIMO has many advantages in comparison of SISO in terms of capacity, bit-rate and reliability. MIMO is classified mainly in three categories: spatial multiplexing,...
2012 / Mehul R. Amin, Sameer D. Trapasiya -
Relationally Staged Computations in Calculi of Mobile Processes
Abstract We apply the recently developed techniques of higher order abstract syntax and functorial operational semantics to give a compositional and fully abstract semantics for the π-calculus equipped with open bisimulation. The key novelty in our...
2004 / Neil Ghani, Kidane Yemane, Björn Victor -
A ρ-Calculus of Explicit Constraint Application
Abstract Theoretical presentations of the ρ-calculus often treat the matching constraint computations as an atomic operation although matching constraints are explicitly expressed. Actual implementations have to take a much more realistic view:...
2005 / Horatiu Cirstea, Germain Faure, Claude Kirchner -
Modeling Fault-tolerant Distributed Systems for Discrete Controller Synthesis
Abstract Embedded systems require safe design methods based on formal methods, as well as safe execution based on fault-tolerance techniques. We propose a safe design method for safe execution systems: it uses discrete controller synthesis (DCS) to...
2005 / Alain Girault, Eric Rutten -
Performance Comparison of WSN &WSAN using Genetic Algorithm
Abstract A wireless sensor network (WSN) consists of two sets of nodes: sensors and actors, where the set of sensors performs all the sensing (data collection) from their surrounding environment. Since sensors operate by batteries, then they are...
2012 / Ramya kulandaivel, S. Periyanayagi, S. Susikala -
An Efficient Technique for Detection and Prevention of SQL Injection Attack using ASCII Based String Matching
Abstract With the rise of the Internet, web applications, such as online banking and web-based email, have become integral to many people's daily lives. Web applications have brought with them new classes of computer security vulnerabilities, such...
2012 / Indrani Balasundaram, E. Ramaraj -
Realization of Physical Hybrid ARQ Indicator Channel for LTE using FPGA
Abstract Realization of transmitter and receiver architecture for LTE is the major research work being carried out by implementation experts. There are four Control channels available in LTE for both uplink and downlink. The uplink control channel...
2012 / S.Syed Ameer Abbas, R.Lakshmi Praba, S.J. Thiruvengadam -
Fused Mel Feature sets based Text-Independent Speaker Identification using Gaussian Mixture Model
Abstract This paper provides an efficient approach for text-independent speaker identification using a fused Mel feature sets and Gaussian Mixture Modeling (GMM). The individual Gaussian components of a GMM are shown to represent some speaker...
2012 / R.Shantha Selva Kumari, S. Selva Nidhyananthan, Anand. G -
An Extended Byte Carry Labeling Scheme for Dynamic XML Data
Abstract It is a crucial problem for XML data query system to determine the structural relationship between any two nodes efficiently. By assigning a unique label which implies the position relationship to each XML tree node, the structural...
2011 / YU Sheng, WU Minghui, LIU Lin -
Ontology for Systems Engineering
Abstract This paper presents an ontology for systems engineering, by means of a set of information models based on a modelling methodology derived from and a simplification of the ISO 15926 part 2 data model. During the engineering phase of several...
2013 / L.C. van Ruijven -
Study on the Prevention and Control of Mass Incidents Based on GIS Technology
Abstract According to the characteristics of mass incidents in information society, the network geospatial analysis method is firstly proposed in this paper. As the breakthrough point of early warning research, it is a feasible, intuitive and visual ...
2011 / Qiang Fan, Jianhua Zhou, Yue Zhang -
Research on Vectorization of Weather Radar Image
Abstract In this paper, a new image vectorization method of weather radar image has been put forward, based on the theory of raster data vectorization. First of all, according to the nature of weather radar image that displays by pseudo-color, the...
2011 / Liu Xumin, Yang Xue