Computer and information sciences topic list of research papers
-
Labview-based Gait Analysis System for Rehabilitation Monitoring
Abstract In this paper, a newly approach of human gait analysis for rehabilitation monitoring is presented. We developed a prototype for the gait analysis system and display the gait pattern by using LabVIEW software tool. The analysis is carried...
2014 / Y. Wahab, N.A. Bakar, M.Z. Zainol, A.F.M. Anuar, H. Fazmir, et al. -
A Comparison of Open Source Learning Management Systems
Abstract This paper focuses on the comparison communication tools of six open source learning management systems (LMS). It compares the whiteboard/video services, discussion forums, file exchange/internal mail, online journal mail, and real live...
2014 / Nadire Cavus, Teyang Zabadi -
Investigation of Stability and Reliability of the Patient's Wireless Temperature Monitoring Device
Abstract Currently, wireless radio frequency (RF) communication and Wireless Sensor Network (WSN) has shifted its trend on human or item tracking capability to real time monitoring capability especially in healthcare industry. Monitoring patient's...
2015 / Nurul Fauzana Binti Imran Gulcharan, Hanita Daud, Nursyarizal Mohd Nor, Taib Ibrahim, Mohd Zulhelmi Shamsudin -
Trust Model for Measuring Security Strength of Cloud Computing Service
Abstract Cloud computing has become a part of the competitive market today. Various cloud computing service providers are available with their services in the cloud environment. Techniques adopted by various providers to achieve security are of...
2015 / Rizwana Shaikh, M. Sasikumar -
On some metabelian 2-group whose abelianization is of type (2, 2, 2) and applications
Abstract Let G be some metabelian 2-group satisfying the condition G / G ′ ...
2015 / A. Azizi, A. Zekhnini, M. Taous -
Implementation of Hog Edge Detection Algorithm Onfpga's
Abstract In recent years, HOG (Histogram of Oriented Gradients) algorithm has get popularity. Researchers tend to use HOG algorithm for recognizing objects in images. HOG algorithm is used object recognition with very high success rate. Hardware...
2015 / Berkant Başa -
Incoherency Problems in a Combination of Description Logics and Rules2014 / Shasha Huang, Jing Hao, Dang Luo
-
A Proactive Approach to Reversible Data Hiding in Encrypted Images
Abstract We present a reversible data hiding method for encrypted images that guarantees reversibility, i.e., the exact recovery of secret data and cover image by the receiver. This work is based on Zhang's reversible data hiding in encrypted...
2015 / Nirmal S. Nair, Tojo Mathew, A.S. Neethu, Viswajith P. Viswanath, Madhu S. Nair, et al. -
Secure and Robust Watermarking Using Wavelet Transform and Student t-distribution
Abstract In this paper, we propose secure and robust data hiding algorithm based on hiding in random coefficients of Discrete Wavelet Transform and student t-distribution. The watermark image is scrambled to increases its security and robustness....
2015 / Surbhi Singh, Harsh Vikram Singh, Anand Mohan -
Effects of Different Kind of Direct Feedback on Students’ Writing
Abstract Error feedbacks can help students in their writings and one of these questions is that whether teachers should use or not use error correction and feedbacks in writing classes. This study analyzed the holistic use of verbs considered as...
2013 / Saeid Farid, Adlina Abdul Samad -
Multicriteria Decision Making Approach for Cluster Validation
Abstract This paper proposes a multiple criteria decision making (MCDM)-based framework to address two fundamental issues in cluster validation: 1) evaluation of clustering algorithms and 2) estimation of the optimal cluster number for a given data...
2012 / Yi Peng, Yong Zhang, Gang Kou, Jun Li, Yong Shi -
An Optimized AOMDV Routing Algorithm Based on Self-Adaptive Node Speed in Wireless Sensor Network
Abstract Focusing on the requirement the validity of standby route under high speed movement scene of wireless sensor network, an optimized AOMDV routing protocol based on self-adaptive node speed (ANS-AOMDV) is proposed. In ANS-AOMDV, the update...
2012 / Fan Zi Fu, Zhang Ling, Wan Xiao Yu -
A Mobile Ad Hoc Networks Algorithm Improved AODV Protocol
Abstract AODV protocol is based on the minimum delay path as the route selection criteria, regardless of the size of the load path nodes, routing has a large selection of blindness in real-time requirements in the network transmission higher than...
2011 / Zhu Qiankun, Xu Tingxue, Zhou Hongqing, Yang Chunying, Li Tingjun -
Zigbee-Based Positioning System For Coal Miners
Abstract China's present communication systems in coal mine can not effectively provide the information such as dynamic distribution of coal miners in work and production environment. Hence, rescue efforts are hard to be carried out in case of coal...
2011 / Wang Longkang, Nie Baisheng, Zhang Ruming, Zhai Shengrui, Li Hailong -
Interactive modeling of plants2002 / B. Lintermann, O. Deussen
-
Scoring rules for judgment aggregation2013 / Franz Dietrich
-
From Context to Micro-context – Issues and Challenges in Sensorizing Smart Spaces for Assistive Living
Abstract Most smart home based monitoring / assistive systems that attempt to recognize activities within a smart home are targeted towards living-alone elderly, and stop at providing instantaneous coarse grained information such as room-occupancy...
2011 / Jit Biswas, Aung Aung Phyo Wai, Andrei Tolstikov, Lin Jin Hong Kenneth, Jayachandran Maniyeri, et al. -
A Model Lexicalized Hierarchical Reordering for Phrase Based Translation
Abstract In this paper, we present a reordering model based on Maximum Entropy with local and non-local features. This model is extended from a hierarchical reordering model with PBSMT [1], which integrates rich syntactic information directly in...
2011 / Vinh Van Nguyen, Thai Phuong Nguyen, Minh Le Nguyen, Akira Shimazu -
A Novel Network Attack Audit System based on Multi-Agent Technology
Abstract A network attack audit system which includes network attack audit Agent, host audit Agent and management control center audit Agent is proposed. And the improved multi-agent technology is carried out in the network attack audit Agent which...
2012 / Wang Jianping, Chen Min, Wu Xianwen -
Software Components: a Formal Semantics Based on Coloured Petri Nets
Abstract This paper proposes a component model compliant with the current practice of Software Engineering, yet provided with a sound formal semantics based on Coloured Petri nets. Our proposal is structured as follows: 1) Define a component model....
2006 / Remi Bastide, Eric Barboni