Computer and information sciences topic list of research papers
-
A Strategy Based on Cooperative Transmission for Minimizing Delivery Delay in WSN2013 / Qingyu Yang, Xinyu Yang, Yu Wang, Dou An
-
Logic Macroprogramming for Wireless Sensor Networks2012 / Supasate Choochaisri, Nuttanart Pornprasitsakul, Chalermek Intanagonwiwat
-
Neurohab: A Platform for Virtual Training of Daily Living Skills in Autism Spectrum Disorder
Abstract Autism spectrum disorder (ASD) is a neurodevelopmental disorder that besides the core symptoms of impairment in communication, social interaction and repetitive behaviour, seriously compromises adaptive functioning limiting social...
2014 / Marco Simões, Susana Mouga, Fábio Pedrosa, Paulo Carvalho, Guiomar Oliveira, et al. -
Nonparametric Bootstrap-Based Multihop Localization Algorithm for Large-Scale Wireless Sensor Networks in Complex Environments2013 / Yongji Ren, Ning Yu, Xiao Wang, Ligong Li, Jiangwen Wan
-
Supporting Preemptive Multitasking in Wireless Sensor Networks2014 / Emanuele Lattanzi, Valerio Freschi, Alessandro Bogliolo
-
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks2013 / Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, et al.
-
Energy Saving Techniques and Strategies for Illumination in Industry
Abstract Lighting conditions in industrial operations are currently at a level, which in many cases does not satisfy the requirements set out by legislation and standards. Slovakia has highly energy-intensive industrial structure, where dominates...
2015 / Ruzena Kralikova, Miriam Andrejiova, Emil Wessely -
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks2013 / Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min
-
High accuracy and low complexity adaptive Generalized Sidelobe Cancelers for colored noise scenarios
Abstract The Generalized Sidelobe Canceler (GSC) is a beamforming scheme which is applied in many fields such as audio, RADAR, SONAR and telecommunications. Recently, the adaptive Reduced Rank GSC (RR-GSC) has been proposed for applications with a...
2014 / Ricardo Kehrle Miranda, João Paulo C.L. da Costa, Felix Antreich -
Performance comparison of fuzzy and non-fuzzy classification methods
Abstract In data clustering, partition based clustering algorithms are widely used clustering algorithms. Among various partition algorithms, fuzzy algorithms, Fuzzy c-Means (FCM), Gustafson–Kessel (GK) and non-fuzzy algorithm, k-means (KM) are most ...
2015 / B. Simhachalam, G. Ganesan -
Online integrity and authentication checking for Quran electronic versions
Abstract The ability to control data and information through the Internet can be challenging. Preliminary analysis showed that some tampering and forgery may occur to some words of the Quran in the electronic versions that span the Internet. Such...
2015 / Izzat Alsmadi, Mohammad Zarour -
Automatic Detection of Polyp Using Hessian Filter and HOG Features
Abstract An endoscope is a medical instrument that acquires images inside the human body. This paper proposes a new approach for the automatic detection of polyp regions in an endoscope image using a Hessian Filter and machine learning approaches....
2015 / Yuji Iwahori, Akira Hattori, Yoshinori Adachi, M.K. Bhuyan, Robert J. Woodham, et al. -
Formal Translation of Bytecode into BoogiePL
Abstract Many modern program verifiers translate the program to be verified and its specification into a simple intermediate representation and then compute verification conditions on this representation. Using an intermediate language improves the...
2007 / Hermann Lehner, Peter Müller -
Security Issues Over Some Cloud Models
Abstract Cloud computing is an uprising field in information technology (IT) industry because of its performance, high availability, low cost and much more. The data leakage, lack of proper security control policy, and weakness in the data sentry...
2015 / Passent M. El-Kafrawy, Azza A. Abdo, Amr. F. Shawish -
Memristive Threshold Logic Face Recognition
Abstract This paper presents a face recognition method implemented using reconfigurable network of memristive threshold logic cells that can be practically realised in a secondary plane to the pixel arrays. Among the most distinguishing features of...
2014 / Akshay Kumar Maan, Dinesh S. Kumar, Alex Pappachen James -
Using Feature Selection to Improve the Utility of Differentially Private Data Publishing
Abstract Protection of patient's privacy is an obligation enforced by laws and regulations in the US, Canada, and other jurisdictions. With exponential growth of exchange of personal health information (PHI) brought about by e-health, there is a...
2014 / Yasser Jafer, Stan Matwin, Marina Sokolova -
Error Protection of Wavelet Scalable Video Streaming Using Wyner-Ziv Technique over a Lossy Network
Abstract This paper presents a novel error resilience scheme for wavelet scalable video coding. We use Wyner-Ziv codec to produce extra bits protecting the important parts of the embedded video streaming. At the same time these bits also as the...
2012 / Benjian Liu, Ke Xu -
A New Web-based Application Optimization Model in Multicore Web Server
Abstract More and more web servers adopt multi-core CPUs to improve performance because of the development of multi-core technology. However, web applications couldn’t exploit the potential of multi-core web server efficiently because of traditional ...
2012 / Guohua You, Ying Zhao -
A Dummy Active Resistance to Transmit the Navigational Parameters of an ROV
Abstract The task of monitoring the systemic parameters of an ROV requires a reliable and robust communication platform. The optical data transmission which is the most practical method for long range communication in ROV application has multiple...
2012 / A. Nazema, M.R. Arshad -
A Family of Test Criteria for Web Services Transactions
Abstract Web Services (WS) transactions are used to build efficient and reliable web applications which are distributed across the Internet and are accessed by multiple simultaneous users. Current research has developed various models and protocols...
2012 / Rubén Casado, Javier Tuya, Muhammad Younas