Computer and information sciences topic list of research papers
-
Evaluation of Features on Sentimental Analysis
Abstract Sentimental analysis is the method of finding sentiment such as positive or negative from a text data. In this paper we are using some feature selection techniques such as Mutual information, Chi-Square, Information gain and TF-idf to...
2015 / P.H. Shahana, Bini Omman -
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks2013 / Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang
-
Human-Robot Interaction Learning Using Demonstration-Based Learning and Q -Learning in a Pervasive Sensing Environment2013 / Yunsick Sung, Seoungjae Cho, Kyhyun Um, Young-Sik Jeong, Simon Fong, et al.
-
T-DLRP: Detection of Fast Retransmission Losses Using TCP Timestamp for Improving the End-to-End Performance of TCP over Wireless Networks2013 / Prasanthi Sreekumari, Sang-Hwa Chung, Meejeong Lee, Won-Suk Kim
-
The Novel Authentication Scheme Based on Theory of Quadratic Residues for Wireless Sensor Networks2013 / Chen-Xu Liu, Yun Liu, Zhen-Jiang Zhang, Zi-Yao Cheng
-
Shortest Path Routing Algorithm for Hierarchical Interconnection Network-on-Chip
Abstract Interconnection networks play a significant role in efficient on-chip communication for multicore systems. This paper introduces a new interconnection topology called the Hierarchical Cross Connected Recursive network (HCCR) and a shortest...
2015 / Omair Inam, Sharifa Al Khanjari, Wim Vanderbauwhede -
Performance comparison of LOE protection of synchronous generator in the presence of UPFC
Abstract Generator loss of excitation (LOE) protection is a principal protection of power system which operate based on impedance measurement. This relay calculates impedance by measuring voltage and current at the generator terminal. On the other...
2015 / Seyed Yaser Ebrahimi, Amir Ghorbani -
The Coinductive Resumption Monad
Abstract Resumptions appear in many forms as a convenient abstraction, such as in semantics of concurrency and as a programming pattern. In this paper we introduce generalised resumptions in a category-theoretic, coalgebraic context and show their...
2014 / Maciej Piróg, Jeremy Gibbons -
The Validity and Reliability of the Turkish Version of the New Computer Game Attitude Scale for Adolescents
Abstract The aim of this research is to examine the validity and reliability of the Turkish version of the New Computer Game Attitude Scale (Liu, Lee, & Chen, 2013). Participants were 312 high school students (183 were female and 129 were male)...
2014 / Ahmet Akın, Mehmet Emin Turan, Yunus Altundağ, Umran Akın -
HTML5 in Development of Assessment Tasks for e-Learning2015 / Kateryna Synytsya, Natalya Prokofyeva, Aleksejs Grocevs, Vladimirs Tomko
-
State of the Art of Semantic Web for Healthcare
Abstract The ultimate goal to improve healthcare practices and the development of better biomedical products largely depends on the ability to share and link the wealth of collected medical data. The key challenge to pursue this ambitious objective...
2015 / Xhemal Zenuni, Bujar Raufi, Florije Ismaili, Jaumin Ajdari -
Stack Memory Buffer Overflow Protection based on Duplication and Randomization
Abstract With software systems continuously growing in size and complexity, the number and variety of security vulnerabilities in those systems is increasing in an alarming rate. Vulnerabilities in the program's stack are commonly exploited by...
2013 / Sahel Alouneh, Mazen Kharbutli, Rana AlQurem -
Attitude-independent 3-axis Accelerometer Calibration Based on Adaptive Neural network
Abstract The article presents a novel adaptive iterative calibration algorithm, which can be successfully applied for the calibration constants of a 3-axis accelerometer determination. The theory is based on the neural network that creates an...
2014 / Katarína Draganová, Miroslav Laššák, Dušan Praslička, Viktor Kán -
Trust-based Throughput in Cognitive Radio Networks
Abstract Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Nowa-days...
2012 / Sazia Parvin, Farookh Khadeer Hussain, Omar Khadeer Hussain, Abdullah Al Faruque -
RFDMRP: River Formation Dynamics based Multi-hop Routing Protocol for Data Collection in Wireless Sensor Networks
Abstract In Wireless sensor networks, sensor nodes sense the data from environment according to its functionality and forwards to its base station. This process is called Data collection and it is done either direct or multi-hop routing. In direct...
2015 / Koppala Guravaiah, R. Leela Velusamy -
Integrated web visualizations for protein-protein interaction databases2015 / Fleur Jeanquartier, Claire Jean-Quartier, Andreas Holzinger
-
Phases of inquiry-based learning: Definitions and the inquiry cycle
Abstract Inquiry-based learning is gaining popularity in science curricula, international research and development projects as well as teaching. One of the underlying reasons is that its success can be significantly improved due to the recent...
2015 / Margus Pedaste, Mario Mäeots, Leo A. Siiman, Ton de Jong, Siswa A.N. van Riesen, et al. -
Using Knowledge-automation Expert Systems to Enhance the Use and Understanding of Traffic Monitoring Data in State DOTs
Abstract Traffic monitoring is the process of observing and collecting data that describes the use and performance of the roadway systems. Strong and effective traffic monitoring program not only improves the mobility on roadways and reliability of...
2016 / Abdulkadir Ozden, Ardeshir Faghri, Mingxin Li -
Dynamic Isolation of Network Devices Using OpenFlow for Keeping LAN Secure from Intra-LAN Attack
Abstract With the emergence of inexpensive network components and high-speed network services, a variety of network-capable electronic devices have become available. Typical examples of such devices include printers, network access storage (NAS),...
2013 / Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe -
A Practical and Automated Image-based Framework for TrackingPedestrian Movements from a Video
Abstract Video tracking of pedestrian movements can be used to gain better understanding of crowd features and behaviors as nowadays pedestrian safety is a very important consideration in many situations. The existing works on video tracking have...
2013 / Halimatul Saadiah Md. Yatim, Abdullah Zawawi Talib, Fazilah Haron