Computer and information sciences topic list of research papers
-
Dataflow-Based Mapping of Computer Vision Algorithms onto FPGAs2007 / Mainak Sen, Ivan Corretjer, Fiorella Haim, Sankalita Saha, Jason Schlessman, et al.
-
Roles of teachers in e-learning: How to engage students & how to get free e-learning and the future
Abstract In this paper a model of teachers’ role in the e-learning system has been discussed. According to the model this paper provides pathways for teachers to create online courses that engage students into e-learning more effectively. More over...
2010 / İlker Yengin, Dilek Karahoca, Adem Karahoca, Ahmet Yücel -
Profile-Based Focused Crawling for Social Media-Sharing Websites2009 / Zhiyong Zhang, Olfa Nasraoui
-
Red-Eyes Removal through Cluster-Based Boosting on Gray Codes2010 / Sebastiano Battiato, Giovanni Maria Farinella, Mirko Guarnera, Giuseppe Messina, Daniele Ravì
-
Analysis of Similarity Measures in Times Series Clustering for the Discovery of Building Energy Patterns2013 / Félix Iglesias, Wolfgang Kastner
-
3D Image Acquisition System Based on Shape from Focus Technique2013 / Bastien Billiot, Frédéric Cointault, Ludovic Journaux, Jean-Claude Simon, Pierre Gouton
-
Biomedical Cloud Computing With Amazon Web Services2011 / Vincent A. Fusaro, Prasad Patil, Erik Gafni, Dennis P. Wall, Peter J. Tonellato
-
Breadth-First Search-Based Single-Phase Algorithms for Bridge Detection in Wireless Sensor Networks2013 / Vahid Akram, Orhan Dagdeviren
-
A secure and efficient cryptographic hash function based on NewFORK-256
Abstract Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ...
2012 / Harshvardhan Tiwari, Krishna Asawa -
Unconventional Algorithms: Complementarity of Axiomatics and Construction2012 / Gordana Dodig Crnkovic, Mark Burgin
-
A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments
Abstract In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the...
2011 / Anas El Husseini, Abdallah M’hamed, Bachar EL Hassan, Mounir Mokhtari -
Analysis of LEACH Energy Parameters
Abstract The LEACH protocol is a popular protocol used in wireless sensor network analysis and simulation. This paper analyses the effect of varying the parameter values used in the LEACH protocol. In particular, we study the effect of the bit rate...
2011 / Frank Comeau, Nauman Aslam -
Symbiosis Between a Multilingual Lexicon and Translation Example Banks
Abstract We propose a symbiotic framework in which correspondences between electronic multilingual lexicons and translation example banks can be captured, so that their functions and contents may benefit and improve upon one another. Several...
2011 / Lian Tze Lim, Bali Ranaivo-Malançon, Enya Kong Tang -
A Fast Search Algorithm Based on Agent Association Rules
Abstract This article uses the agent association rules to complete the search task, by group and level of pressure to reduce the load, making a large amount of data processing is possible.
2012 / Wang Xiaohu, Wang Lele, Li Nianfeng -
Scientific Visualizations Based on Integrated Model of Text and Picture Comprehension via Eye-tracking
Abstract This study investigates the “color combination effect” and the “sequence of pictures and text effect” in the “Integrated Model of Text and Picture Comprehension” (ITPC) on the formation of the mental model and cognitive load in both desktop ...
2015 / Azam Majooni, Mona Masood, Amir Akhavan -
Securing Text & Image Password Using the Combinations of Persuasive Cued Click Points with Improved Advanced Encryption Standard
Abstract Security is the main aspect for any application. The main aim is to protect the system from the illegitimate users. The online library system is considered for study and two way authentication techniques are applied on it. Two way...
2015 / Smita Chaturvedi, Rekha Sharma -
Investigation of Feature Selection Methods for Android Malware Analysis
Abstract In this paper we present a method for detecting malicious Android applications using feature selection methods. Three distinguishing features i.e. opcodes, methods and strings are extracted from each Android file and using feature selection ...
2015 / K. Deepa, G. Radhamani, P. Vinod -
The Construction of Meaning in the Second Language Classroom. A Multimodal Discourse Analysis
Abstract As technology increasingly shapes the world we live in, communication is affected by these changes. We can no longer talk about one mode for transmitting a message, since multimodality is common, and interaction between several channels to...
2015 / Eva M. Mestre-Mestre -
A Hole-Tolerant Redundancy Scheme for Wireless Sensor Networks2012 / Juhua Pu, Yu Gu, Yi Zhang, Jia Chen, Zhang Xiong
-
On the Performance of Quasiorthogonal STBC with Relay Selection and Phase Rotation Techniques for Decode and Forward Cooperative Communications2013 / Nikorn Sutthisangiam, Chaiyod Pirak, Gerd Ascheid