Computer and information sciences topic list of research papers
-
A Design and Development Approach to Researching Online Arabic Vocabulary Games Learning in IIUM
Abstract This paper describes the design and development process of an online Arabic vocabulary games learning prototype for elementary learners at the Centre for Foundation Studies (CFS), International Islamic University Malaysia (IIUM). The effort ...
2013 / Muhammad Sabri Sahrir, Nor Aziah Alias -
Computer Assisted Auditory-verbal Education
Abstract This paper presents a computer application to be used in auditory verbal education of young age hearing affected children implementing an exercise designed to train the children to perceive and differentiate non verbal sounds and noises...
2013 / Mariana Popa, Ovidiu Grigore, Valentin Velican -
Document Clustering Using Hybrid XOR Similarity Function for Efficient Software Component Reuse
Abstract In this paper a generalized approach is proposed for clustering a set of given documents or text files or software components for reuse based on the new similarity function called hybrid XOR function defined for the purpose of finding...
2013 / Vangipuram Radhakrishna, C. Srinivas, C.V.Guru Rao -
Monitoring and troubleshooting wireless sensor nodes by measuring the supply current waveform
Abstract A troubleshooting method for debugging wireless sensor nodes using measurements of the supply current waveform and logic outputs is presented. The troubleshooting and debugging technique uses the supply current waveform in conjunction with...
2010 / Mitko Tanevski, Alexis Boegli, Piere-André Farine -
An Intelligent and Multipurpose Digital Ticket using Ad Hoc Network
Abstract We propose the use of an intelligent ticket that can be applied incorporating with the ordinary ticket, where in this case more digital information with for security application is included, especially, the personal data that can be...
2011 / Suriya Pradisathaporn, Somkuan Kaviya, Yusaku Fujii, Preecha P. Yupapin -
Scheduling Parallel Jobs Using Migration and Consolidation in the Cloud2012 / Xiaocheng Liu, Bin Chen, Xiaogang Qiu, Ying Cai, Kedi Huang
-
Optimal Control of Gene Mutation in DNA Replication2012 / Juanyi Yu, Jr-Shin Li, Tzyh-Jong Tarn
-
Matching Cost Filtering for Dense Stereo Correspondence2013 / Yimin Lin, Naiguang Lu, Xiaoping Lou, Fang Zou, Yanbin Yao, et al.
-
Cloud Infrastructures for In Silico Drug Discovery: Economic and Practical Aspects2013 / Daniele D'Agostino, Andrea Clematis, Alfonso Quarati, Daniele Cesini, Federica Chiappori, et al.
-
Coordination Games and Local Interactions: A Survey of the Game Theoretic Literature2010 / Simon Weidenholzer
-
L-Py: An L-System Simulation Framework for Modeling Plant Architecture Development Based on a Dynamic Language2012 / Frédéric Boudon, Christophe Pradal, Thomas Cokelaer, Przemyslaw Prusinkiewicz, Christophe Godin
-
Spec2Fab2013 / Desai Chen, David I. W. Levin, Piotr Didyk, Pitchaya Sitthi-Amorn, Wojciech Matusik
-
Evaluation of the DoDAF Meta-model's Support of Systems Engineering
Abstract The Department of Defense Architectural Framework (DoDAF) is the DoD's mandated method to document system architectures. Consequently, it has a far-reaching and deep impact on systems engineering and acquisition within the DoD. DoDAF...
2015 / Ronald E. Giachetti -
Frankenstein 2.0.: Identifying and characterising synthetic biology engineers in science fiction films2013 / Angela Meyer, Amelie Cserer, Markus Schmidt
-
Segmentation-based video coding system allowing the manipulation of objects2002 / P. Salembier, F. Marques, M. Pardas, J.R. Morros, I. Corset, et al.
-
Anomaly Detection in Medical Wireless Sensor Networks using Machine Learning Algorithms
Abstract Wireless sensor networks suffer from a wide range of faults and anomalies which hinder their smooth working. These faults are even more significant for medical wireless sensor networks, which simply cannot afford such inconsistencies. To...
2015 / Girik Pachauri, Sandeep Sharma -
Semi-supervised Statistical Approach for Network Anomaly Detection
Abstract Intrusion Detection Systems (IDS) have become a very important defense measure against security threats. In recent years, computer networks are widely deployed for critical and complex systems, which make them more vulnerable to network...
2016 / Naila Belhadj Aissa, Mohamed Guerroumi -
The nonverbal structure of patient case discussions in multidisciplinary medical team meetings2012 / Saturnino Luz
-
Routing Protocols in Wireless Sensor Networks2009 / Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera, Cláudia Jacy Barenco Abbas
-
Developing a Reading Concentration Monitoring System by Applying an Artificial Bee Colony Algorithm to E-Books in an Intelligent Classroom2012 / Chia-Cheng Hsu, Hsin-Chin Chen, Yen-Ning Su, Kuo-Kuang Huang, Yueh-Min Huang