Computer and information sciences topic list of research papers
-
Radio Frequency Identification (RFID) Based Attendance & Assessment System with Wireless Database Records
Abstract In the modern era, great developments have been done; which are based on Radio Frequency Identification Techniques. The applications are effectively applied to various diverse areas as transportation, agriculture, hospital / health care and ...
2015 / Sarmad Hameed, Syed Muhammad Taha Saquib, Moez ul Hassan, Faraz Junejo -
Derivation and Comparison of Open-loop and Closed-loop Neural Network Battery State-of-Charge Estimators
Abstract This paper presents two artificial neural network (ANN) based algorithms for battery state-of-charge (SOC) estimation. The SOC is an important quantity that must be estimated in real-time in many applications. ANN is a mathematical model...
2015 / Ala A. Hussein -
Advancing Listening Comprehension Through Movies
Abstract Teaching listening comprehension is one of the most vital and difficult tasks for any foreign language teacher because there are no rules as in grammar teaching. This study explored to what extent students enhance listening comprehension...
2015 / Jelisaveta Safranj -
Quantum Key Distribution: Simulation and Characterizations
Abstract All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are actually unsafe and apt by many attackers (quantum and man-in-the-middle attacks)....
2015 / Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem -
Comparative Analysis of Inter Satellite Optical Wireless Channel for NRZ and RZ Modulation Formats for Different Levels of Input Power
Abstract Integration of DWDM in Optical wireless communication has undoubtedly revolutionized the satellite communication systems for use in the coming future. Thus OWC systems have become popular due to their outstanding performance uniqueness....
2015 / Prabhdeep Kaur, Amit Gupta, Mandeep Chaudhary -
Conductive Microbead Array Detection Based on Eddy-Current Testing Using SV-GMR Sensor and Helmholtz Coil Exciter2006 / T. Somsak, K. Chomsuwan, S. Yamada, M. Iwahara
-
Soft Computing Techniques for Video De-Interlacing2010 / Piedad Brox, Iluminada Baturone, Santiago Sanchez-Solano
-
Bus Control Strategy Application: Case Study of Santiago Transit System
Abstract Buses have an inherent tendency to bunch due to randomness in passenger demand and congestion. Many sophisticated control strategies have been developed to reduce bus bunching, however, few of them have been implemented in high frequency...
2014 / Pedro Lizana, Juan Carlos Muñoz, Ricardo Giesen, Felipe Delgado -
“Server-less” Social Network for Enhanced Privacy
Abstract A privacy issue regarding social networks nowadays is the fact that users’ posted data is stored on company-owned servers, adding a third person in between the sender and the receiver. We propose Square Pigeon, an android application which...
2014 / Dylan Bedrossian, Anas Harb, Rawad Khalil, Ali Chehab, Hassan Ali Artail -
Assessing the Utility of Mobile Applications with Support for or as Replacement of Hearing Aids
Abstract Hearing aids are becoming more and more important in an aging society. One of the main aspects is speech intelligibility. This requires algorithms that separate speech signals from other sources of sound and filter the latter ones away from ...
2014 / Marvin C. Offiah, Susanne Rosenthal, Markus Borschbach -
A Framework for LTE-A Proximity-based Device-to-Device Service Registration and Discovery
Abstract Device-to-Device (D2D) communications in Long Term Evolution (LTE) networks has been proposed as a promising concept as part of the LTE-Advanced (LTE-A) framework, whose aim is to improve user experiences and resource utilization, taking...
2014 / Salam Doumiati, Hassan Artail, David M. Gutierrez-Estevez -
A Cloud-based Interaction Management System Architecture for Mobile Devices
Abstract The number of interruptions people experience on a daily basis has grown considerably over the last decade and this growth has not shown any signs of subsiding. In fact, with the exponential growth of mobile computing, interruptions are...
2014 / Edward R. Sykes -
Interaction within Dynamic IPS2 Networks – A Proposal of an IPS2 Lifecycle Management and IPS2 Delivery Management Architecture
Abstract In the delivery of Industrial Product-Service Systems (IPS2), a dynamic network of partners is involved. To deliver and use IPS2 efficiently, the IPS2 has to be managed from several heterogeneous perspectives, namely from a strategic,...
2014 / Thomas M. Dorka, Hoang Bao Dang, Horst Meier, Michael Abramovici -
Topology Control in Cooperative Ad Hoc Wireless Networks
Abstract Cooperative communication (CC) is a technique that exploits spatial diversity allowing multiple nodes to cooperatively relay signals to the receiver so that it can combine the received signals to obtain the original message. CC can be...
2014 / T.F. Neves, J.L. Bordim -
The Illinois Pattern Recognition Computer-ILLIAC III2007 / Bruce H. McCormick
-
ARMA model maximum entropy power spectral estimation2004 / M. Lagunas-Hernandez, M. Santamaria-Perez, A. Figueiras-Vidal
-
A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks
Abstract RSA Cryptography is a well-known example of public key cryptographic algorithms that involves robust encryption/decryption processes. In this paper, a microcontroller based RSA is designed and proposed. Arduino Mega2560R3 microcontroller...
2014 / Qasem Abu Al-Haija, Mashhoor Al Tarayrah, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi -
Planning for Resilient Lean Programs
Abstract What would happen if the key program stakeholders are included in the up-front planning? What if the stakeholders developed the schedule? What if they identified risks, opportunities, critical actions, and key assumptions, prior to program...
2014 / Deborah Secor, Sebastian Lucae, Eric Rebentisch -
Arrest Chemokines2014 / Klaus Ley
-
Formal Concept Analysis – Overview and Applications
Abstract In this article we give a brief overview of the theory behind the formal concept analysis, a novel method for data representation and analysis. From given tabular input data this method finds all formal concepts and computes a concept...
2014 / Frano Škopljanac-Mačina, Bruno Blašković