Computer and information sciences topic list of research papers
-
Power Consumption Analysis and Dimensioning of UMTS-LTE with Relays
Abstract In the perspective of Green ICT, the massive deployment of cellular mobile radio networks claims attentions to their energy efficiency to favor both the eco-sustainability and the economic aspects. In this paper, we investigate on the...
2014 / Romeo Giuliano, Franco Mazzenga, Marco Petracca -
MOSS-IR: Multi-Ontology Based Search System for Information Retrieval in E-health Domain
Abstract With the development of the Semantic Web, ontology has become the crucial means for representing concepts in various domains of interest. Although the current search engines return results based on keyword search and page ranking, human...
2015 / V. Viji Rajendran, S. Swamynathan -
Learning styles of dental students
Abstract Aims This study was conducted to determine the learning styles of dental students at King Saud University. Methods and material The Arabic version of the...
2015 / Moshabab A. Asiry -
Proposing a Features Preprocessing Method Based on Artificial Immune and Minimum Classification Errors Methods
Abstract Artificial immune systems that have been inspired from organic immune systems, have drawn many attentions in recent years (and have been considered) as an evolutionary algorithm and have been applied in different papers. This algorithm can...
2015 / M. Miralvand, S. Rasoolzadeh, M. Majidi -
A Rule Based Feature Selection Approach for Target Classification in Wireless Sensor Networks with Sensitive Data Applications2014 / Zhiyong Hao, Bin Liu
-
Dynamic Access Control Model for Security Client Services in Smart Grid2014 / Sang-Soo Yeo, Si-Jung Kim, Do-Eun Cho
-
E-Learning Recommender Systems Based on Goal-Based Hybrid Filtering2014 / Muhammad Waseem Chughtai, Ali Selamat, Imran Ghani, Jason J. Jung
-
Efficient Complex Event Processing over RFID Streams2012 / Kyoung Soo Bok, Myung Ho Yeo, Byoung Yeop Lee, Jae Soo Yoo
-
Multiagent-Based Data Fusion in Environmental Monitoring Networks2012 / Samuel Dauwe, Timothy Van Renterghem, Dick Botteldooren, Bart Dhoedt
-
Asymmetric Programming: A Highly Reliable Metadata Allocation Strategy for MLC NAND Flash Memory-Based Sensor Systems2014 / Min Huang, Zhaoqing Liu, Liyan Qiao
-
Review of Multi-platform Mobile Application Development Using WebView: Learning Management System on Mobile Platform
Abstract The advancement of mobile technology and the internet network and their rapid adoption has enabled instant information access without relying on desktop or notebook computers. By using this technology, Learning Management System (LMS) can...
2015 / Timothy Yudi Adinugroho, Reina, Josef Bernadi Gautama -
Preserving Data Confidentiality Using Multi-cloud Architecture
Abstract Cloud Computing offers resources as services that are dynamically provisioned over the internet. The security of cloud computing has always been an important aspect of the quality of service from cloud service providers. The main problem...
2015 / M. Sulochana, Ojaswani Dubey -
The influence of developer multi-homing on competition between software ecosystems
Abstract Having a large number of applications in the marketplace is considered a critical success factor for software ecosystems. The number of applications has been claimed to determine which ecosystems holds the greatest competitive advantage and ...
2015 / Sami Hyrynsalmi, Arho Suominen, Matti Mäntymäki -
A Minutiae Count Based Method for Fake Fingerprint Detection
Abstract Fingerprint based biometric systems are ubiquitous because they are relatively cheaper to install and maintain, while serving as a fairly accurate biometric trait. However, it has been shown in the past that spoofing attacks on many...
2015 / Kumar Abhishek, Ashok Yogi -
A Trusted Portable Computing Device
Abstract A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a ...
2012 / Fang Ming-wei, Wu Jun-jun, Yu Peng-fei, Zhang Xin-fang -
Buffer-aware adaptive resource allocation scheme in LTE transmission systems2015 / Ruiyi Zhu, Jian Yang
-
A Virtual Reality Platform to Study Crowd Behaviors
Abstract Microscopic pedestrian simulation models are based on local interactions between agents. Many interactions occur between walkers, with many factors of influence. There is a need for observations of individuals facing interactions in crowds...
2014 / Anne-Hélène Olivier, Julien Bruneau, Gabriel Cirio, Julien Pettré -
Medium Access Control Protocols for Wireless Sensor Networks Classifications and Cross-Layering
Abstract Wireless Sensor Networks (WSNs) have become a leading solution in many important applications such as intrusion detection, target tracking, industrial automation, smart building and so on. The sensor nodes are generally unattended after...
2015 / Ahlam Saud Althobaiti, Manal Abdullah -
Multilayer Neuro PID Controller based on Back Propagation Algorithm
Abstract The paper covers the basic idea, mathematical features of conventional Neuro PID controller which is a technique to make any linear or nonlinear system unaffected to unpredictability of system's parameters and disturbances such as noise....
2015 / Rahul Patel, Vijay Kumar -
Network-flow based algorithms for scheduling production in multi-processor open-pit mines accounting for metal uncertainty
Abstract The open-pit mine production scheduling problem (MPSP) deals with the optimization of the net present value of a mining asset and has received significant attention in recent years. Several solution methods have been proposed for its...
2015 / Amina Lamghari, Roussos Dimitrakopoulos