Computer and information sciences topic list of research papers
-
Tree Based Energy Efficient and High Accuracy Data Aggregation for Wireless Sensor Networks
Abstract In wireless sensor networks, communication overhead is the most critical issue because of the innate behavior of the resource constrained sensors. To reduce the communication overhead, a technique called as data aggregation was implemented. ...
2012 / S. Vinoth Selvin, S. Manoj Kumar -
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs2013 / Youngho Cho, Gang Qu
-
Application-Oriented Fault Detection and Recovery Algorithm for Wireless Sensor and Actor Networks2012 / Jinglin Du, Li Xie, Xiaoyan Sun, Ruoqin Zheng
-
Optical Vibration Analysis with Linear CCD Sensor and Reconfigurable Hardware
Abstract This article introduces a research on vibration analysis. The goal of the research is to develop a novel method that is convenient to use and can be used flexibly for measuring displacement, amplitude, frequency and analyze the spectrum of...
2014 / József Lénárt -
An Efficient Association Rule Based Clustering of XML Documents
Abstract Mining the web data is one of the emerging researches in data mining. The HTML can be used for maintaining the web data but it is hard to achieve the accurate web mining results from HTML documents. The XML documents make more convenient...
2015 / A. Muralidhar, V. Pattabiraman -
A Reliable Method for Detecting Road Regions from a Single Image Based on Color Distribution and Vanishing Point Location
Abstract Numerous advanced driver assistance systems (ADAS) are gaining popularity even in the mid to low end segment cars. Vision based technologies assisted by the use of cameras cater to a lot of these ADAS systems. These systems enhance the...
2015 / Neethu John, B. Anusha, Krishnan Kutty -
State and path coalition effectivity models of concurrent multi-player games2015 / Valentin Goranko, Wojciech Jamroga
-
Single Image Super Resolution from Compressive Samples Using Two Level Sparsity Based Reconstruction
Abstract Super Resolution based on Compressed Sensing (CS) considers low resolution (LR) image patch as the compressive samples of its high resolution (HR) patch. Compressed sensing based image acquisition systems acquire less number of random...
2015 / Aneesh G. Nath, Madhu S. Nair, Jeny Rajan -
An Outlier Mining Algorithm Based on Attribute Entropy
Abstract This paper describes the outlier data mining and commonly used outlier mining methods, on this basis, it proposes an outlier mining algorithm based on attribute entropy (OMABAE). Firstly, the concept of attribute entropy is introduced to...
2012 / Ming-Jian Zhou, Jun-Cai Tao -
A Novel Ear Recognition Process Using Appearance Shape Model, Fisher Linear Discriminant Analysis and Contourlet Transform
Abstract Biometric authentication using ear images becoming popular nowadays in the field of security surveillance to identify a person. In this paper image processing techniques are used to study about the characteristics of several databases Ear...
2012 / C. Murukesh, A. Parivazhagan, K. Thanushkodi -
How System Errors Affect Aircrew Resource Management (CRM)
Abstract System errors, both mechanical and human in nature, can have a grave effect on aircrew judgement in flight. The effects of these errors can be massively compounded during emergency situations. Crew Resource Management (CRM) is an important...
2015 / Justin Y. Adkins, Kevin MacG. Adams, Patrick T. Hester -
Study of Quiver Infant Level with LDA
Abstract The management of sedation in critically ill infants is a complex issue for Intensive Care Units (ICU) worldwide. Notable complications of sedation practices have been identified and efforts to modify these practices in ICUs have begun....
2012 / M.N. Mansor, S. Yaacob, M. Hariharan, S.N. Basah, S.H.F.S. Ahmad Jamil, et al. -
Fitting the Problem to the Paradigm: Algorithm Characteristics Required for Effective Use of MapReduce
Abstract While the Hadoop MapReduce paradigm offers a linearly scalable approach to solving many complex problems, it does not work for every problem type. General examples of problems that can and cannot be solved with MapReduce have been discussed ...
2012 / Fred Highland, John Stephenson -
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN
Abstract The deployment of Wireless Sensor Networks (WSN) in unattended environment has led to various security threats. This paper provides an overview of LEACH, the most popular clustered routing protocol of WSN and how LEACH can be compromised by ...
2013 / Meenakshi Tripathi, M.S. Gaur, V. Laxmi -
Self-timed Periodic Scheduling for a Cyclo-static DataFlow Model
Abstract Real-time and time-constrained applications programmed on many-core systems can suffer from unmet timing constraints even with correct-by-construction schedules. Such unexpected results are usually caused by unaccounted for delays due to...
2014 / Amira Dkhil, XuanKhanh Do, Paul Dubrulle, Stéphane Louise, Christine Rochange -
Performance Improvement of Data Mining in Weka through GPU Acceleration
Abstract Data mining tools may be computationally demanding, so there is an increasing interest on parallel computing strategies to improve their performance. The popularization of Graphics Processing Units (GPUs) increased the computing power of...
2014 / Tiago Augusto Engel, Andrea Schwertner Charão, Manuele Kirsch-Pinheiro, Luiz-Angelo Steffenel -
E-lifestyle in EFL Course Books: Case Study of Top Notch Series
Abstract Different issues and themes are being raised in EFL course books with miscellaneous illustrations here and there among the exercises and readings. This study aimed to analyze the content of a popular EFL course book in terms of priming what ...
2014 / Mohammad Amerian, Fatemeh Amerian -
Management of Distributed RFID Surfaces: A Cooking Assistant for Ambient Computing in Kitchen
Abstract Interactive tabletops are used to support interaction when designing applications. The design is generally displayed on the detection surface, but in some cases, the display uses other surfaces in a distributed way. This paper proposes some ...
2014 / Yoann Lebrun, Sophie Lepreux, Sylvain Haudegond, Christophe Kolski, René Mandiau -
A scalable approach for content based image retrieval in cloud datacenter2013 / Jianxin Liao, Di Yang, Tonghong Li, Jingyu Wang, Qi Qi, et al.
-
Universal Connector Framework for Pervasive Computing Using Cloud Technologies
Abstract Today, software architecture has a vital role in achieving quality goals for large scale distributed software systems which is made up of components and connectors. Especially, software development mainly consists of composing re-usable...
2014 / Hamid Mcheick, Louis Deladiennee, Mickael Wajnberg, Benoit Martin, Marc Abi-Khalil