Computer and information sciences topic list of research papers
-
Longest common substrings with k mismatches
Abstract The longest common substring with k-mismatches problem is to find, given two strings S ...
2015 / Tomas Flouri, Emanuele Giaquinta, Kassian Kobert, Esko Ukkonen -
A Software Scheme for UAV's Safe Landing Area Discovery
Abstract This paper proposes a software processing scheme for small-sized UAV in its landing area discovery using its single onboard camera and machine learning algorithms. The two-stage processing procedure was proposed. In first stage a similarity ...
2013 / Xiaoming Li -
A Distributed Self-Adaptive Intrusion Detection System for Mobile Ad-hoc Networks Using Tamper Evident Mobile Agents
Abstract This paper brings forth a distributed self adaptive intrusion detection system (IDS) based on programmable mobile agents which can act as a key line of defense against major security attacks. The proposed intrusion detection model is...
2015 / Deepa Krishnan -
An admission control mechanism for dynamic QoS-enabled opportunistic routing protocols2015 / Ivo Calado, Saulo OD Luiz, Gustavo Soares, Hyggo Almeida, Angelo Perkusich
-
Complexity Analysis of Chaotically Encrypted Rate-1/n Convolutional Encoders
Abstract In this paper we have studied the performance of chaotically encrypted rate-1/n convolutional encoders. The design goal is to achieve a crypto-coding system that possesses the error correction and encryption features. The proposed system is ...
2013 / Davoud Arasteh -
Several Duality Theorems for Interlocking Ridge and Channel Networks2004 / C. Werner
-
A Modeling Language Based on UML for Modeling Simulation Testing System of Avionic Software
Abstract With direct expression of individual application domain patterns and ideas, domain-specific modeling language (DSML) is more and more frequently used to build models instead of using a combination of one or more general constructs. Based on ...
2011 / Lize WANG, Bin LIU, Minyan LU -
Greatest Bisimulations for Binary Methods
Abstract In previous work [14] I introduced a generalised notion of coalgebra that is capable of modelling binary methods as they occur in object-oriented programming. An important problem with this generalisation is that bisimulations are not...
2004 / Hendrik Tews -
Analyzing the Impact of Body Postures and Power on Communication in WBAN
Abstract Wireless Body Area Network has become emerging technology to improve the health care and provide a cost effective solution for the remote sensing of physiological parameters of the human body. The different body postures impact the...
2014 / Anum Talpur, Natasha Baloch, Nafeesa Bohra, Faisal Karim Shaikh, Emad Felemban -
A Framework for Evaluating Skyline Query Over Uncertain Autonomous Databases
Abstract The perception of skyline query is to find a set of objects that is much preferred in all dimensions. While this theory is easily applicable on certain and complete database, however, when it comes to data integration of databases where...
2014 / Nurul Husna Mohd Saad, Hamidah Ibrahim, Ali Amer Alwan, Fatimah Sidi, Razali Yaakob -
Efficient Vocabulary Learning Through Online Activities
Abstract In the current teaching methodology, computer-assisted language instruction is considered to be an important tool that helps extend education beyond the classroom and facilitates both interactive and individualised learning. This paper is...
2013 / Marika Kalyuga, Lilia Mantai, Mauricio Marrone -
Clustering and Classification of Software Component for Efficient Component Retrieval and Building Component Reuse Libraries
Abstract A Software Repository is a collection of library files and function codes. Programmers and Engineers design develop and build software libraries in a continuous process. Selecting suitable function code from one among many in the repository ...
2014 / Chintakindi Srinivas, Vangipuram Radhakrishna, C.V. Guru Rao -
New Aspects in the Teaching of Information Technology Polish Perspective
Abstract The modern world of science are increasingly used tools for e-learning, m-learning and blended learning to enhance the educational offer of the Institute, the Faculty and the University. The interest of such facilities, according to the...
2014 / Jarosław Kinal, Witold Jedynak -
Comparison of Traditional and Video Mediated Learning of English: Tracking a New Approach
Abstract Nowadays technology plays an important role in our lives, and also technological tools such as computers, laptops and cellphones with camera; Therefore students and teachers may interact from a distance. Speaking skills can be developed...
2014 / Samaneh Yousefi -
Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks
Abstract The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach the need of a powerful mechanism to ...
2014 / Dahane Amine, Berrached Nassreddine, Kechar Bouabdellah -
Space Time Block Code for Next Generation Multi-user MIMO Systems
Abstract Space-time block codes (STBCs) based single user multiplexing techniques are already part of the LTE standard. However, the rapid increase in demand for high speed and reliable communications is propelling us towards the next generation...
2014 / Nidhi Sharma -
Using Wavelength/Time Signatures Scrambling to Realize Cryptographic Coded-WDM Data Networks
Abstract To combat with multiple-users interference and malicious eavesdropping, this paper proposes a double scrambling scheme over time/wavelength for a cryptographic optical CDMA (OCDMA) data transmission. By using...
2014 / Jen-Fa Huang, Sheng-Hui Meng, Ying-Chen Lin, Kai-Sheng Chen, An-Chi Huang -
Non-deterministic Semantics in Polynomial Format
Abstract The method for automatic theorem proving proposed in [Carnielli, W. A., Polynomial ring calculus for many-valued logics, Proceedings of the 35th International Symposium on Multiple-Valued Logic, IEEE Computer Society. Calgary, Canada...
2014 / Walter Carnielli, Mariana Matulovic -
Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack2014 / Pete Burnap, Matthew L. Williams, Luke Sloan, Omer Rana, William Housley, et al.
-
Formalization and Verification of Relational Database Normal Forms Using the Gamma Framework
Abstract The General Abstract Model for Multi-set mAnipulation (GAMMA) is a parallel computational and programming paradigm. It utilizes the multi-set data structure and a program structure that is defined as a pair of <condition, action>. The ...
2013 / Hassan Mathkour