Computer and information sciences topic list of research papers
-
A Hierarchy of Quantum Semantics
Abstract Several domains [S. Abramsky. A Cook's tour of a simple quantum programming language. 3rd International Symposium on Domain Theory, Xi'an, China, May 2004; B. Coecke and K. Martin. A partial order on classical and quantum states. Technical...
2008 / Simon Perdrix -
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability2004 / S. Gnesi, G. Lenzini, F. Martinelli
-
Formal Description of Trust-based Access Control
Abstract Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability...
2012 / Ma Xiaoning -
Construct the Secure Shell Transport Model and Analyze Its Security Performance
Abstract The network management protocol SNMP has its flaws,but it has not solved by itself. So other secure protocol must be borrowed to deal with the flaws of SNMP. It is a good method that the Secure Shell Protocol(SSH) can resolved the flaws of...
2012 / Xiaoqiao Huang, Hongbin Guo -
Use of the recursive-rule extraction algorithm with continuous attributes to improve diagnostic accuracy in thyroid disease
Abstract Thyroid diseases, which often lead to thyroid dysfunction involving either hypo- or hyperthyroidism, affect hundreds of millions of people worldwide, many of whom remain undiagnosed; however, diagnosis is difficult because symptoms are...
2016 / Yoichi Hayashi, Satoshi Nakano, Shota Fujisawa -
Hardware Based Analysis on Automated Early Detection of Diabetic-Retinopathy
Abstract This paper discusses primarily the hardware based issues on early detection of diabetic retinopathy. Software based algorithms for preprocessing, segmentation, and, classification stages are initially analyzed. Later those techniques were...
2012 / N.S. Datta, R. Banerjee, H.S. Dutta, S. Mukhopadhyay -
Deafblind Olympics: A case for a Grand Challenge
Abstract This paper proposes a Grand Challenge to serve as the impetus for the reexamination of sports and sports technology under the prism of enabling elite deafblind participation to foster innovation in sports engineering. Technical obstacles...
2012 / Oleg Schatoff -
A Novel Approach for Missing Value Imputation and Classification of Microarray Dataset
Abstract Various machine learning algorithms are used for classification of microarray data. The accuracy of classifier is generally compromised by the missing value in the data set, due to incorrect collection of data values. Those missing data in...
2012 / Rajashree Senapti, Kailash Shaw, Sashikala Mishra, Debahuti Mishra -
A Compositional Framework for Formally Verifying Modular Systems
Abstract We present a tool-supported framework for proving that the composition of the behaviors of the separate parts of a complex system ensures a desired global property of the overall system. A compositional inference rule is formally introduced ...
2005 / Carlo A. Furia, Matteo Rossi -
Performance analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 Simulator
Abstract Path routing and protocol selection are the primary strategies to design any wireless network. In Mobile Adhoc Network (MANET) the selected protocol should have best in terms of data delivery and data integrity. Hence the performance...
2012 / S. Mohapatra, P. Kanungo -
Incorporating ergonomic factors in disassembly sequence planning
Abstract Due to awareness of the environmental and economical reasons the objective of modern technology is turning away from deposition and incineration of end-of-life products towards a far reaching product reuse. Disassembly is the main stage in...
2011 / M.M. Youssif, R.A. Alkadeem, M.A. El Dardiry -
Fault-diagnosis in discrete event systems: Improvements and new results
Abstract The malfunction of sensors, actuators, and erroneous actions of human operators can have some disastrous consequences in high risk systems especially if these systems have multiple faults that can lead to undesirable shutdowns and...
2011 / Hamdi A. Awad -
Hop-Reservation Multiple Access with Variable Slots
Abstract Hop-reservation multiple access control protocols in Ad Hoc networks are widely researched for its virtue in anti-jamming. Several typical such protocols are introduced and compared. Based on the analysis about their performance on...
2012 / Jianzhao Zhang, Yusheng Li, Yongxiang Liu -
Grouping Partners for Cooperative Learning Using Genetic Algorithm and Social Network Analysis
Abstract This paper employs a novel approach which is based on genetic algorithm (GA) and social network analysis to grouping partners for cooperative learning in the classroom. A social network analysis tool, i.e., sociometry, is used to measure...
2012 / Rong-Chang Chen, Shih-Ying Chen, Jyun-You Fan, Yen-Ting Chen -
Intruder Detection and Prevention in a Smart Grid Communication System
Abstract Smart Grid is an electrical network that uses digital and other advanced technology to monitor and manage the transport of electricity from all generating sources to meet the varying demand of the end-users. The important nodes of the Smart ...
2015 / Vineeth V.V., N. Radhika, V. Vanitha -
Continuous Arabic Sign Language Recognition in User Dependent Mode2010 / K. Assaleh, T. Shanableh, M. Fanaswala, F. Amin, H. Bajaj
-
Remote Alarm Monitor System Based On GSM and ARM
Abstract This paper presents a remote monitor and control alarm system based on GSM and ARM. This system uses ARM-based microcontroller LPC2368 as the MCU, a smoke sensor MQ-2 to detect the harmful gas, the temperature sensor DS18B20 to monitor the...
2011 / Zhijie Tang, Wang Shuai, Luo jun -
A Precision Acceleration Determination Method Based on Combining GPS Carrier Phase and Doppler
Abstract There are always disadvantages when GPS carrier phase observations or Doppler is used alone for determination of vehicle acceleration. Therefore, a combination method is developed in this paper, based on combinational using GPS carrier...
2011 / Qianxin Wang, Tianhe Xu -
Assessment of Integrated Vehicle Safety Systems for Improved Vehicle Safety
Abstract Road safety is a major societal issue. In 2009, more than 35,000 people died on the roads of the European Union, i.e. the equivalent of a medium town, and no fewer than 1,500,000 persons were injured. The cost for society is huge,...
2012 / Paul Lemmen, Helen Fagerlind, Thomas Unselt, Carmen Rodarius, Eduard Infantes, et al. -
Fault Detection in Multi-Threaded C++ Server Applications
Abstract Due to increasing demands in processing power on the one hand, but the physical limit on CPU clock speed on the other hand, multi-threaded programming is becoming more important in current applications. Unfortunately, multi-threaded...
2007 / Arndt Mühlenfeld, Franz Wotawa