Computer and information sciences topic list of research papers
-
Achieving a consensual definition of phishing based on a systematic review of the literature2014 / Elmer Lastdrager
-
Adaptive link selection algorithms for distributed estimation2015 / Songcen Xu, Rodrigo C. de Lamare, H. Vincent Poor
-
A New Algorithm in Association Mining, Amoeba for Finding Frequent Patterns Using Functional Dependency and Probability
Abstract In Data Mining, research on association mining has expanded widely in many application areas. APRIORI and FP-Growth are prominent algorithms in association mining for finding frequent patterns. These algorithms have their own shortcomings...
2015 / Sudhir Tirumalasetty, Sreenivasa Reddy Edara -
Data Collection and Analysis Using the Mobile Application for Environmental Monitoring
Abstract This paper considers the analysis of problems and methods of implementation of information systems for monitoring natural and industrial facilities. The new approach of data storage, integration and retrieval developed. The practical...
2015 / Bakhytzhan Akhmetov, Murat Aitimov -
Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-connected PSNR
Abstract Due to the fast advancement of internet and digital technology, secured transmission of data over networks offers a great challenge. This problem of secrecy of information has long been received the attention of researchers due to its...
2015 / Rinita Roy, Sumit Laha -
GoWeb: a semantic search engine for the life science web2009 / Heiko Dietze, Michael Schroeder
-
Towards a HPC-oriented parallel implementation of a learning algorithm for bioinformatics applications2014 / Gianni D'Angelo, Salvatore Rampone
-
Normalizing biomedical terms by minimizing ambiguity and variability2008 / Yoshimasa Tsuruoka, John McNaught, Sophia Ananiadou
-
Web GIS in practice VI: a demo playlist of geo-mashups for public health neogeographers2008 / Maged Boulos, Matthew Scotch, Kei-Hoi Cheung, David Burden
-
Face liveness detection using dynamic texture2014 / Tiago Freitas Pereira, Jukka Komulainen, André Anjos, José De Martino, Abdenour Hadid, et al.
-
Non-interference analysis of delegation subterfuge in distributed authorization systems2014 / Simon N Foley
-
Low Sampling-rate Approach for ECG Signals with Compressed Sensing Theory
Abstract Wireless Body Area Networks (WBANs) consist of tiny Biomedical Wireless Sensors (BWSs) and a Gate Way (GW) to connect to the external databases in the hospital and medical centres. The GW could connect the BWSs, to a range of wireless...
2013 / Mohammadreza Balouchestani, Kaamran Raahemifar, Sridhar Krishnan -
Analysing Factors Affecting Hand Biometrics during Image Capture
Abstract As more people are connected digitally, a highly automatic personal identification system is crucial. Dorsal hand vein biometric is an emerging biometric characteristic which is explored at its full swing. Although, researchers have...
2014 / Maleika Heenaye-Mamode Khan, Naushad Mamode Khan -
Semantic Annotation Tool for Annotating Arabic Web Documents
Abstract The vision of semantic Web is to have a Web of data instead of Web of documents in a form that can be processed by machines. This vision could be achieved in the existing Web using semantic annotation. Due to exponential growth and huge...
2014 / Saeed Al-Bukhitan, Tarek Helmy, Mohammed Al-Mulhem -
Classification of Security Threats in Information Systems
Abstract Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire...
2014 / Mouna Jouini, Latifa Ben Arfa Rabai, Anis Ben Aissa -
Dynamic Distance-Based Shape Features for Gait Recognition2014 / Tenika Whytock, Alexander Belyaev, Neil M. Robertson
-
Crime Data Analysis Using Pig with Hadoop
Abstract Big data is the voluminous and complex collection of data that comes from different sources such as sensors, content posted on social media website, sale purchase transaction etc. Such voluminous data becomes tough to process using ancient...
2016 / Arushi Jain, Vishal Bhatnagar -
On the Frequency Distribution of Retweets
Abstract Social media platforms allow rapid information diffusion, and serve as a source of information to many of the users. Particularly, in Twitter information provided by tweets diffuses over the users through retweets. So it is of great...
2014 / Yao Lu, Peng Zhang, Yanan Cao, Yue Hu, Li Guo -
Stratified Static Analysis Based on Variable Dependencies
Abstract In static analysis by abstract interpretation, one often uses widening operators in order to enforce convergence within finite time to an inductive invariant. Certain widening operators, including the classical one over finite polyhedra,...
2012 / David Monniaux, Julien Le Guen -
Towards Believable Resource Gathering Behaviours in Real-time Strategy Games with a Memetic Ant Colony System
Abstract In this paper, the resource gathering problem in real-time strategy (RTS) games, is modeled as a path-finding problem where game agents responsible for gathering resources, also known as harvesters, are only equipped with the knowledge of...
2013 / Xianshun Chen, Yew Soon Ong, Liang Feng, Meng Hiot Lim, Caishun Chen, et al.