Computer and information sciences topic list of research papers
-
The Computation of Pitch with Vectors2010 / Aluizio Arcela
-
Ensembles of Instance Selection Methods based on Feature Subset
Abstract In this paper the application of ensembles of instance selection algorithms to improve the quality of dataset size reduction is evaluated. In order to ensure diversity of sub models, selection of a feature subsets was considered. In the...
2014 / Marcin Blachnik -
Antecedents of Health Information Privacy Concerns
Abstract Due to demographic changes, health information technologies comprising electronic health records (EHR), electronic medical records (EMR), personal health records (PHR), remote patient monitoring (RPM) and other healthcare related websites...
2015 / Tatiana Ermakova, Benjamin Fabian, Stefan Kelkel, Theresa Wolff, Rüdiger Zarnekow -
A Model for Information Security Compliant Behaviour in the Healthcare Context
Abstract Healthcare professionals are dedicated to maintaining the confidentiality of patient information but are resistant to maintaining an information security compliant environment within a health information system. In this paper, a literature...
2014 / Debra Box, Dalenca Pottas -
New Method to Use Idle Personal Computers for Solving Coherent Tasks
Abstract In this paper authors offer the new method for solving coherent tasks in distributed computing system, based on resources of personal computers. Parameters of such resources are dynamically varying and that makes it hard for their...
2014 / Anatoly Kalyaev, Iakov Korovin -
Bluetooth Smart Based Attendance Management System
Abstract Bluetooth Smart is a wireless technology aimed at innovative applications in the healthcare, fitness, beacons, security, and home entertainment industries. The technology makes use of electronic tags to facilitate automatic wireless...
2015 / Riya Lodha, Suruchi Gupta, Harshil Jain, Harish Narula -
A Genetic Algorithm-Based Approach for Single-Machine Scheduling with Learning Effect and Release Time2014 / Der-Chiang Li, Peng-Hsiang Hsu, Chih-Chieh Chang
-
Spectrum-compatible accelerograms with harmonic wavelets
Abstract Modern building codes allow the analysis and design of earthquake-resistant structures with recorded and/or generated accelerograms, provided that they are compatible with the elastic design spectrum. The problem then arises to generate...
2014 / Domenico Cecini, Alessandro Palmeri -
Hazardous Odor Recognition by CMAC Based Neural Networks2009 / İhsan Ömür Bucak, Bekir Karlık
-
Computer-assisted Language Learning: Challenges in Teaching Multilingual and Multicultural Student Populations
Abstract This paper reports on the integration of computer-assisted language learning (CALL) into courses of English for Academic Purposes at the Technion-IIT. CALL users include Hebrew and Arabic speakers, immigrants and international students...
2012 / Michal Tal, Maria Yelenevskaya -
A robust cross-layer metric for routing protocol in mobile wireless ad hoc networks2012 / Lorenzo Mucchi, Luigi Chisci, Luca Fabbrini, Giulio Giovannetti
-
Application of data mining: Diabetes health care in young and old patients
Abstract This research concentrates upon predictive analysis of diabetic treatment using a regression-based data mining technique. The Oracle Data Miner (ODM) was employed as a software mining tool for predicting modes of treating diabetes. The...
2012 / Abdullah A. Aljumah, Mohammed Gulam Ahamad, Mohammad Khubeb Siddiqui -
Improving Fingerprint Verification Using Minutiae Triplets2012 / Miguel Angel Medina-Pérez, Milton García-Borroto, Andres Eduardo Gutierrez-Rodríguez, Leopoldo Altamirano-Robles
-
Resource Allocation for Multi-User Cognitive Radio Systems Using Multi-agent Q-Learning
Abstract Cognitive Radio (CR) is a new generation of wireless communication system that enables unlicensed users to exploit underutilized licensed spectrum to optimize the radio spectrum utilization. The resource allocation is difficult to achieve...
2012 / Azzouna Ahmed, Guezmil Amel, Sakly Anis, Mtibaa Abdellatif -
A Novel Multiple Watch marking for Relational Databases using Multi-Media
Abstract As a tool for interests in both storing and managing data, relational database is widely used in many information systems. In this paper, a novel method of watermarking is presented to protect relational databases copyright. We propose a...
2012 / Xuemin Zhao, Lingling Li, Qingtao Wu -
A cross layer interception and redirection cooperative caching scheme for MANETs2012 / Francisco J González-Cañete, Eduardo Casilari, Alicia Triviño-Cabrera
-
2-Bit Branch Predictor Modeling Using Markov Model
Abstract Power consumption is a very important issue when it comes to embedded devices, therefore every processing cycle should be optimally utilized and considered. In speculated execution, highly mispredicted branches are considered a critical...
2015 / -
Relation Based Access Control in Campus Social Network System
Abstract As one of the most popular network applications, online social network system has gained huge adoption in the past few years. Campus social network system is a special type of social network system which focuses on providing information...
2013 / Zhao Du, Yuguang Liu, Ye Wang -
Local Reasoning about Data Update
Abstract We present local Hoare reasoning about data update, introducing Context Logic for analysing structured data. We apply our reasoning to tree update, heap update, and term rewriting. Our reasoning about heap update is exactly analogous to the ...
2007 / Cristiano Calcagno, Philippa Gardner, Uri Zarfaty -
On the Security of Tag-KEM for Signcryption
Abstract Signcryption tag-KEM (Key Encapsulation Mechanism with a tag) is an authenticated tag-KEM for generic construction of hybrid signcryption. Signcryption tag-KEM allows the sender to encapsulate a symmetric key along with a tag so that the...
2007 / Maki Yoshida, Toru Fujiwara