Computer and information sciences topic list of research papers
-
Image Classification of Education Resources Based on Texture Features
Abstract With the computer and network technology development, educational resource databases are more and more abundant, Images, as an important information expression, are widely used in teaching, courseware, software development and etc. How...
2012 / Shi Yujing, Bai Haijing, Wang Xuejun -
Constructing an Adaptive Mobile Learning System for the Support of Personalized Learning and Device Adaptation
Abstract This paper presents an adaptive mobile learning system (AMLS) that provides learners with adaptive content according to their knowledge levels, learning styles, and heterogeneous learning devices. The aim of the proposed work is to provide...
2012 / Ho-Chuan Huang, Tsui-Ying Wang, Fu-Ming Hsieh -
An Improved Distance Matrix Computation Algorithm for Multicore Clusters2014 / Mohammed W. Al-Neama, Naglaa M. Reda, Fayed F. M. Ghaleb
-
Policy Decomposition for Evaluation Performance Improvement of PDP2014 / Fan Deng, Ping Chen, Li-Yong Zhang, Xian-Qing Wang, Sun-De Li, et al.
-
CPU-GPU hybrid accelerating the Zuker algorithm for RNA secondary structure prediction applications2012 / Guoqing Lei, Yong Dou, Wen Wan, Fei Xia, Rongchun Li, et al.
-
An improved peptide-spectral matching algorithm through distributed search over multiple cores and multiple CPUs2014 / Jian Sun, Bolin Chen, Fang-Xiang Wu
-
Integrating domain similarity to improve protein complexes identification in TAP-MS data2013 / Bingjing Cai, Haiying Wang, Huiru Zheng, Hui Wang
-
Side peak cancellation method for sine-BOC(m,n)-modulated GNSS signals2014 / Salim Attia, Khaled Rouabah, Djamel Chikouche, Mustapha Flissi
-
SoRoute: a reliable and effective social-based routing in cognitive radio ad hoc networks2014 / Tao Jing, Jie Zhou, Hang Liu, Zhewei Zhang, Yan Huo
-
Multi-scale elastic graph matching for face detection2013 / Yasuomi D Sato, Yasutaka Kuriya
-
An adaptive transmission protocol for exploiting diversity and multiplexing gains in wireless relaying networks2015 / Mohammed O El Astal, Ammar M Abu-Hudrouss, Brian P Salmon, Jan Olivier
-
On-site configuration of disaster recovery access networks made easy
Abstract Catastrophic disasters can destroy large regions and, in the process, leave many victims isolated from the rest of the world. Recovering the communication infrastructure is typically slow and expensive, which is not suitable for emergency...
2016 / Quang Tran Minh, Yoshitaka Shibata, Cristian Borcea, Shigeki Yamada -
Ubiquitous Tele-health System for Elderly Patients with Alzheimer's
Abstract Chronic diseases are becoming one of the world's leading causes of death and disability. By 2020, it is predicted to account for almost three quarters of all deaths. A potential approach to monitor patients with chronic diseases is the...
2015 / Muhammad Wasim Raad, Tarek Sheltami, Elhadi Shakshuki -
A game theoretical approach for QoS provisioning in heterogeneous networks
Abstract With the proliferation of mobile phone users, interference management is a big concern in this neoteric years. To cope with this problem along with ensuring better Quality of Service (QoS), femtocell plays an imperious preamble in...
2015 / A.S.M. Zadid Shifat, Mostafa Zaman Chowdhury, Yeong Min Jang -
An improved algorithm for information hiding based on features of Arabic text: A Unicode approach
Abstract Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography...
2014 / A.A. Mohamed -
On Intelligent Base Station Activation for Next Generation Wireless Networks
Abstract The evolution of mobile communications, during the last decades, has led to a rapid increase in the number of users that mobile operators have to serve. To cope with this increase, mobile operators increment the number of base stations they ...
2015 / Pavlos Kosmides, Evgenia Adamopoulou, Konstantinos Demestichas, Miltiades Anagnostou, Angelos Rouskas -
Policy Misuse Detection in Communication Networks with Hidden Markov Models
Abstract With the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations while...
2014 / Umut Tosun -
On Enhancing Network Reliability and Throughput for Critical-range based Applications in UWSNs
Abstract Underwater Wireless Sensor Networks (UWSNs) support various applications like pollution monitoring, tsunami warnings, offshore exploration, tactical surveillance, etc. Distinctive features of UWSNs like low available bandwidth, large...
2014 / A. Umar, M.A. Hasnat, M. Behzad, I. Baseer, Z.A. Khan, et al. -
The application of fuzzy Delphi and fuzzy inference system in supplier ranking and selection2014 / Farzad Tahriri, Maryam Mousavi, Siamak Hozhabri Haghighi, Siti Zawiah Md Dawal
-
Control of Artificial Swarms with DDDAS
Abstract A framework for incorporating a swarm intelligent system with the Dynamic Data Driven Application System (DDDAS) is presented. Swarm intelligent systems, or artificial swarms, self-organize into useful emergent structures that are capable...
2014 / R. Ryan McCune, Greg R. Madey