Computer and information sciences topic list of research papers
-
Effectiveness for Embedded Spheres and Balls
Abstract We consider arbitrary dimensional spheres and closed balls embedded in Rn as ⫫0 1 classes. Such a strong restriction on the topology of a ⫫0 1 class has computability theoretic repercussions....
2004 / Joseph S. Miller -
An Educational HTTP Proxy Server
Abstract The efficiency and safety of Web access can be enhanced by the deployment of an http proxy server in many cases. The first part of this paper provides an introduction to the issue of an HTTP proxy server. The second part of the paper...
2014 / Martin Sysel, Ondřej Doležal -
Semi-structured Documents Mining: A Review and Comparison
Abstract The number of semi-structured documents that is produced is steadily increasing. Thus, it will be essential for discovering new knowledge from them. In this survey paper, we review popular semi-structured documents mining approaches...
2013 / Amina Madani, Omar Boussaid, Djamel Eddine Zegour -
An End-Case Analyzer of Arabic Sentences
Abstract Natural Language Understanding (NLU) has been a growing area of research in computer science. Although morphology and syntax play an essential role in NLU, end-case analysis in some languages, like Arabic, is an important component in the...
2013 / A.D. Al-Sawadi, M.G. Khayat -
Nonminutiae-Based Decision-Level Fusion for Fingerprint Verification2006 / Sadegh Helfroush, Hassan Ghassemian
-
Improving Turkish Language Training Materials: Grapheme-to- Phoneme Conversion for adding Phonemic Transcription into Dictionary Entries and Course Books
Abstract Course materials for teaching Turkish as a second language lack information about the pronunciation of Turkish. These materials have chapters about the alphabet and the pronunciations of the letters, but they lack notation as phonemic...
2013 / Özgün Koşaner, Çağdas Can Birant, Özlem Aktaş -
Detection of Blackhole Behaviour Using Triangular Encryption in NS2
Abstract Security is an essential requirement in mobile ad hoc network (MANETs) [1]. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. This paper...
2014 / Nabarun Chatterjee, Jyotsna Kumar Mandal -
Ontology-based Search System Using Hierarchical Structure Design
Abstract Major retrieval issues on conventional online database search systems faced by novice researchers are identified and described. An ontology-based search framework is proposed. The framework consists of five elements: (1) user, (2) query,...
2013 / Norasykin Mohd Zaid, Sim Kim Lau, Mohd Nihra Haruzuan Mohamad Said -
Resilience Notions for Scale-free Networks
Abstract Much of traditional graph theoretic analysis of networks had focused on regular or near-regular network models such as random Erdos-Renyi models, where the degree distribution is either the same for every node or highly concentrated about...
2013 / Gunes Ercal, John Matta -
Some applications of M-open sets in topological spaces
Abstract The aim of this paper is to introduce and investigate some new classes of mappings called contra-M-continuous mappings and almost contra-M-continuous mappings via M-open sets. Also, the relationships between these mappings and other types...
2013 / Ahmed Ibrahim Taha El-Maghrabi, Mohammad Ayed Nighimish Al-Juhani -
Detection of Profile-injection Attacks in Recommender Systems Using Outlier Analysis
Abstract E-Commerce recommender systems are vulnerable to different types of profile-injection attacks where a number of fake user profiles are inserted into the system to influence the recommendations made to the users. In this paper, we have...
2014 / Parthasarathi Chakraborty, Sunil Karforma -
Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks
Abstract In certain wireless sensor network (WSN) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data ...
2013 / Jun Wu, Mianxiong Dong, Kaoru Ota, Zhenyu Zhou -
Localized Algorithm for Segregation of Critical/Non-critical Nodes in Mobile Ad Hoc and Sensor Networks
Abstract Timely segregation of connectivity-centric critical/non-critical nodes is extremely crucial in mobile ad hoc and sensor networks to assess network vulnerabilities against critical node failures and provide precautionary means for...
2013 / Muhammad Imran, Mohamed A. Alnuem, Mahmoud S. Fayed, Atif Alamri -
On the MAC/Network/Energy Performance Evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR Routing Protocols2014 / Carolina Del-Valle-Soto, Carlos Mex-Perera, Aldo Orozco-Lugo, Mauricio Lara, Giselle Galván-Tejada, et al.
-
Extracting laboratory test information from biomedical text2014 / YannaShen Kang, Mehmet Kayaalp
-
Mechanisms of Levetiracetam in the Control of Status Epilepticus and Epilepsy2014 / Laxmikant S. Deshpande, Robert J. DeLorenzo
-
Variant of COBWEB Clustering for Privacy Preservation in Cloud DB Querying
Abstract Cloud computing security is the set of control-based technologies and policies designed to protect information, data and infrastructure mapped with cloud computing applications. As Cloud computing includes shared resource, identity...
2015 / Nazneen Mulani, Ambika Pawar, Preeti Mulay, Ajay Dani -
Novel Read Algorithms for Improving the Performance of Big Data Storage Systems
Abstract Cloud computing systems provide scalable infrastructure to store and process Big Data generated by various organizations. Distributed file system (DFS) is used as the main storage component in a cloud computing system for storing and...
2015 / Thirumalaisamy Ragunathan, Sudheer Kumar Battula, Rathnamma Gopisetty, B. RangaSwamy, N. Geethanjali -
Information Quality and Supply Chain Performance: The Mediating Role of Information Sharing
Abstract This paper outlines the critical role of information sharing in the link between information quality and Supply Chain performance. Supply chain partners coordinate their processes through information sharing, in order to facilitate...
2015 / C. Marinagi, P. Trivellas, P. Reklitis -
Simulation Study of MANET Routing Protocols Under FTP Traffic
Abstract Mobile Ad Hoc Networks (MANETs) use many different routing protocols to route data packets between nodes. The performance of these routing protocols has been widely studied and evaluated. However, previous studies evaluate the performance...
2014 / Dimitra Kampitaki, Anastasios A. Economides