Computer and information sciences topic list of research papers
-
Semantically-based crossover in genetic programming: application to real-valued symbolic regression2010 / Nguyen Quang Uy, Nguyen Xuan Hoai, Michael O’Neill, R. I. McKay, Edgar Galván-López
-
Use of Single Board Computers as Smart Sensors in the Manufacturing Industry
Abstract The continuously growing presence of cyber-physical systems in the industry, especially in the field of processes automation and control, represents the paradigm of the so called fourth industrial revolution, in which the systems are...
2015 / A. Gómez, D. Cuiñas, P. Catalá, L. Xin, W. Li, et al. -
Neutrality in evolutionary algorithms… What do we know?2011 / Edgar Galván-López, Riccardo Poli, Ahmed Kattan, Michael O’Neill, Anthony Brabazon
-
Wireless sensor network localization with connectivity-based refinement using mass spring and Kalman filtering2012 / Sangwoo Lee, Hyunjae Woo, Chaewoo Lee
-
Dynamic rate-adaptive MIMO mode switching between spatial multiplexing and diversity2012 / Chanhong Kim, Jungwoo Lee
-
Formal Properties and Characteristics of Malay Rhythmic Reduplication
Abstract Reduplication is a process of Malay word formation. Generally it can be divided into full, partial and rhythmic reduplication. Another set is the undefined group which is called free-form reduplication. Lexically, the rhythmic reduplication ...
2010 / Mohd Yunus Sharum, Zaitul Azma Zainon Hamzah, Mohd Rohaizat Abd. Wahab, Mat Rofa Ismail -
What is search engine optimization: SEO?
Abstract Web sites, which index and class other web sites according to their keywords, explanations and contents and make it easier and faster to reach obtained site-search results, are called as search engines. SEO “Search Engine Optimization” is...
2011 / Nursel Yalçın, Utku Köse -
Capability Maturity Model Integration (CMMI) for Optimizing Object-Oriented Analysis and Design (OOAD)
Abstract The current popular method in analysis and design phase is object-oriented analysis design (OOAD). The OOAD method aims to identify the objects which are responsible for their own. Mostly, the measurements of OOAD results are using...
2015 / Evi Septiana Pane, Riyanarto Sarno -
Building and Operating Context-aware Services for Groups of Users
Abstract This paper presents a framework for providing context-aware services in public spaces, e.g., museums. The framework is unique to other existing context-aware systems in implementing services as mobile agents and supporting groups of users...
2011 / Ichiro Satoh -
An Alternative Approach to k-Anonymity for Location-Based Services
Abstract Users of location-based services (LBSs) may have serious privacy concerns when using these technologies since their location can be utilized by adversaries to infer privacy-sensitive information about them. In this work, we analyze the...
2011 / Amirreza Masoumzadeh, James Joshi -
The protection of privacy in the i-Tour framework
Abstract In this paper we describe the privacy concerns, risks and protection mechanisms within the i-Tour project. The role of legislation for privacy in Europe and other global sectors is examined to describe a privacy protection model that...
2011 / Scott W Cadzow -
Extracting Connected Concepts from Biomedical Texts using Fog Index
Abstract In this paper, we establish Fog Index (FI) as a text filter to locate the sentences in texts that contain connected biomedical concepts of interest. To do so, we have used 24 random papers each containing any of the four pairs of connected...
2011 / Rushdi Shams, Robert E. Mercer -
Part-of-Speech in a Node-Link Scoring Techniques for Assessing Learners’ Understanding
Abstract Assessment is the process of which the quality of the candidate achievements can be judged. Automated assessment tools can be useful assistants to human examiners. This paper discusses a work on an automated assessment tool that applied a...
2011 / Adidah Binti Lajis, Normaziah Abdul Aziz -
The research and implementation of a unified identity authentication in e-government network
Abstract Current problem existing in e-government network is that the applications of information system are developed independently by various departments, and each has its own specific set of authentication and access control mechanism. To build a ...
2012 / Zhou Feng -
An Optimized NBC Approach in Text Classification
Abstract state-of-the-art text classification algorithms are good at categorizing the Web documents into a few categories. But such a classification method does not give very detailed topic-related class information for the user because the first...
2012 / Zhao Yao, Chen Zhi-Min -
The Comprehensive Evaluation of the Unascertained Measure for Software Quality
Abstract Use the unascertained measure method in the research of software quality evaluation, analyses the inner fuzziness and uncertain factors in the measure of software test, this paper presents a method that using the unascertained measure model ...
2012 / Bingjiang Gong, Lei Chen -
A novel algorithm to form stable clusters in vehicular ad hoc networks on highways2012 / Zaydoun Y Rawashdeh, Syed Mahmud
-
A Case for Using Signal Transition Graphs for Analysing and Refining Genetic Networks
Abstract In order to understand and analyse genetic regulatory networks (GRNs), the complex control structures which regulate cellular systems, well supported qualitative formal modelling techniques are required. In this paper, we make a case that...
2009 / Richard Banks, Victor Khomenko, L. Jason Steggles -
Confluence Results for a Quantum Lambda Calculus with Measurements
Abstract A strong confluence result for Q*, a quantum λ-calculus with measurements, is proved. More precisely, confluence is shown to hold both for finite and infinite computations. The technique used in the confluence proof is syntactical but...
2011 / Ugo Dal Lago, Andrea Masini, Margherita Zorzi -
Proof Search for the First-Order Connection Calculus in Maude
Abstract This paper develops a rewriting logic specification of the connection method for first-order logic, implemented in Maude. The connection method is a goal-directed proof procedure that requires a careful control over clause copies. The...
2009 / Bjarne Holen, Einar Broch Johnsen, Arild Waaler