Computer and information sciences topic list of research papers
-
Updation of Activation Sequence of a Chip after its Deployment for Access Control
Abstract For protection of Intellectual Property (IP) in VLSI industry, a design level obfuscation is applied for simultaneous authentication and locking of IPs. When a chip with multiple IPs or System-on-Chip (SoC) is deployed, application of the...
2014 / Debasri Saha, Susmita Sur-Kolay -
Virtual Laboratory Activities in Basic Biochemistry
Abstract In 2009, the Creation Group of Educational Objects in Biochemistry (GCOEB) started to organize virtually practical-laboratory activities in basic Biochemistry for undergraduate students of Pharmacy Course. This occurred through presentation ...
2014 / Vera Maria Treis Trindade, Geancarlo Zanatta, Pablo Ricardo Arantes, Iuri Dos Santos Blanco, Fernanda Paludo Demore, et al. -
Animation Model of Multi-object in Fractal form based on Partitioned-random Iteration Algorithm
Abstract Animation model of objects in fractal form has many advantages over animation model of objects in traditional form. Traditionally simple object is drawn by drawing functions and the slight different form of object should be redrawn by...
2014 / Tedjo Darmanto, Iping Supriana Suwardi, Rinaldi Munir -
Experiment in Knowledge Based Programing
Abstract The paper investigates possibilities of writing programs with having the relevant knowledge on programing available in explicity form, in order to perform experiments, a knowledge base was built which codes some of the knowledge related to...
2013 / Pavol Navrat, Viera Rozinajova -
Concurrent Product – Supply Chain Design: A Conceptual Framework & Literature Review
Abstract The capability to concurrently design the product and the supply chain is becoming a key competence in manufacturing companies. In spite of this development, this competence is still underdeveloped in industry. Research has not been able to ...
2013 / Thiam-Soon Gan, Martin Grunow -
Energy Efficient Mobile Target Tracking Using Flying Drones
Abstract This paper focuses on the energy efficiency problem where camera equipped flying drones are able to detect and follow mobile events that happen on the ground. We give a mathematical formulation of the problem of minimizing the total energy...
2013 / Dimitrios Zorbas, Tahiry Razafindralambo, Di Puglia Pugliese Luigi, Francesca Guerriero -
Small Private Key MQPKS on an Embedded Microprocessor2014 / Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, et al.
-
Integrated Semantics Service Platform for the Internet of Things: A Case Study of a Smart Office2015 / Minwoo Ryu, Jaeho Kim, Jaeseok Yun
-
Ambient Agents: Embedded Agents for Remote Control and Monitoring Using the PANGEA Platform2014 / Gabriel Villarrubia, Juan De Paz, Javier Bajo, Juan Corchado
-
SEMSim Cloud Service: Large-scale urban systems simulation in the cloud
Abstract Large-scale urban systems simulations are complex and with a large number of active simulation entities the computational workload is extensive. Workstation computers have only limited capabilities of delivering results for large-scale...
2015 / Daniel Zehe, Alois Knoll, Wentong Cai, Heiko Aydt -
Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility2013 / Yichao Jin, Serdar Vural, Alexander Gluhak, Klaus Moessner
-
Input-based adaptive randomized test case prioritization: A local beam search approach
Abstract Test case prioritization assigns the execution priorities of the test cases in a given test suite. Many existing test case prioritization techniques assume the full-fledged availability of code coverage data, fault history, or test...
2015 / Bo Jiang, W.K. Chan -
Performance Comparison of Variational Mode Decomposition over Empirical Wavelet Transform for the Classification of Power Quality Disturbances Using Support Vector Machine
Abstract This work considers the classification of power quality disturbances based on VMD (Variational Mode Decomposition) and EWT (Empirical Wavelet Transform) using SVM (Support Vector Machine). Performance comparison of VMD over EWT is done for...
2015 / C. Aneesh, Sachin Kumar, P.M. Hisham, K.P. Soman -
The Internet - A Tool for Interactive Learning
Abstract The success of the network World Wide Web is the fact that it is a huge source of information storage that can be accessed by anyone, anytime and anywhere in the world and that any administrator, with limited funds, has chance to become an...
2014 / Crenguţa Lăcrămioara Oprea -
Design and Performance Analysis of Fixed-point Jacobi SVD Algorithm on Reconfigurable System
Abstract This paper presents design and performance analysis of fixed-point two sided Jacobi Singular Value Decomposition (SVD) algorithm on reconfigurable system using pipelined state-of-the-art CORDIC architecture. The algorithm has been...
2014 / Ramanarayan Mohanty, Gonnabhaktula Anirudh, Tapan Pradhan, Bibek Kabi, Aurobinda Routray -
Acquisition and analysis of compromised firmware using memory forensics
Abstract To a great degree, research in memory forensics concentrates on the acquisition and analysis of kernel- and user-space software from physical memory to date. With the system firmware, a much more privileged software layer exists in modern...
2015 / Johannes Stüttgen, Stefan Vömel, Michael Denzel -
Learning Content Development With Social Tools: Learning Generated Content in Engineering2014 / Ana Maria Lopez Torres, Cristobal Nico Suarez Guerrero
-
Physical and social presence in 3D virtual role-play for pre-service teachers
Abstract Numerous studies have explored the affordances of 3D virtual worlds. Although previous studies indicated that virtual worlds would be helpful for experiential and collaborative learning through enhancing physical and social presence, few...
2015 / Young Hoan Cho, Su Yon Yim, Sunhee Paik -
Removal of EOG artefacts by combining wavelet neural network and independent component analysis
Abstract Eye activity has larger electrical potential than the average electroencephalogram (EEG) recording, thus making it one of the major sources of artefacts. Ocular artefacts (OA) must be removed as completely as possible with little or no loss ...
2014 / Christiaan Burger, David Jacobus van den Heever -
Enhancing DisCSP-Netlogo from Simulation to Real-execution of Agents in Distributed Constraints
Abstract The use of agent-based simulation models in NetLogo for research is growing rapidly in a number of fields of science and en- gineering, including in computer science, for example for analyzing the performances of asynchronous search...
2014 / Ionel Muscalagiu, Popa Horia Emil, Viorel Negru