Computer and information sciences topic list of research papers
-
Alma: An adaptive learning models environment from texts and activities that improves students’ science comprehension
Abstract This paper presents the Adaptive Learning Models from texts and Activities (ALMA) environment and the interaction of undergraduate students in Computer Science with it, while studying the learning goal “Computer Networks’ Principles”. The...
2011 / Alexandra Gasparinatou, Maria Grigoriadou -
The improving pattern matching algorithm of intrusion detection
Abstract Pattern matching algorithm is usually used in intrusion detection system. During the detection process, the efficiency of pattern matching algorithm determines the performance of the intrusion detection system. However the low efficiency...
2011 / Zhaoyang Qu, Xiaobo Huang -
A Novel Secure Communication Protocol Combining Steganography and Cryptography
Abstract In this paper, a new secure communication protocol that combines steganography and cryptography techniques organically is proposed. It is based on the LSB matching method and the well-developed Boolean functions in stream ciphers. The cover ...
2011 / Shouchao Song, Jie Zhang, Xin Liao, Jiao Du, Qiaoyan Wen -
Construction of d-Hop Connected Dominating Sets in Wireless Sensor Networks
Abstract To improve the network performance and quality of service (QoS) requirement, a connected dominated subset of nodes in wireless network is selected to form a virtual backbone. However the backbone tends to be rather large for large-scaled...
2011 / Chan Zheng, Ling Yin, Shixin Sun -
Study on SVM Calibration Model Parameter for Mixed Gas
Abstract The calibration model of infrared spectra analysis is established combined with support vector machine, a new information processing method. As the model parameters have an impact on the analysis, selection of SVM calibration model...
2011 / Bai Peng, Liu Peng, Geng Dao-tian, Li Yan -
Port Supply Chain Simulation Model under Interactive Analysis
Abstract To probe into special port supply chain and analyze the interaction between ports, this paper establishes a port supply chain simulation model through system dynamics (SD) approach, and then, Simulink tool is adopted for that model. Through ...
2011 / Jianfeng Li, WeiHang Li, Yan Lin -
Restrained surveillance towards community benefit
Abstract Today, there are millions of surveillance cameras monitoring and recording day to day activities of people in the sake of safety and security of general public. However, like double-edged sword, there are both pros and cons when using such...
2010 / Sabaragamu Koralalage Krishan, Noriaki Yoshiura -
Methods of adapting digital content for the learning process via mobile devices
Abstract This article analyses different methods of adapting digital content for its delivery via mobile devices taking into account two aspects which are a fundamental part of the learning process; on the one hand, functionality of the contents,...
2009 / J.L. Gimenez López, T. Magal Royo, Jesus García Laborda, F. Garde Calvo -
Cybernetic Approaches to Robotics2012 / Nazmul Haque Siddique, Richard Mitchell, Michael O’Grady, Hamid Jahankhani
-
Game Interactivity in CAD as Productive Systems
Abstract Over the past few years, the interest in using games to educate, motivate, and change behaviour has grown tremendously by international groups of practitioners, educators, gamers engineers, medical scientists, and many other researchers...
2012 / Z. Kosmadoudi, T. Lim, J.M. Ritchie, R.C.W. Sung, Y. Liu, et al. -
The analysis of Range Quickselect and related problems
Abstract Range Quickselect, a simple modification of the well-known Quickselect algorithm for selection, can be used to efficiently find an element with rank k in a given range ...
2011 / Conrado Martínez, Alois Panholzer, Helmut Prodinger -
Development of Control Systems Guided by Models of their Environment
Abstract Event-B is a formal method that allows one to develop various kinds of systems including discrete control systems. However, it is lacking a systematic approach for developing this type of systems and it hinders the applicability of Event-B. ...
2011 / Simon Hudon, Thai Son Hoang -
Illumination invariant face recognition: A survey of passive methods
Abstract Face recognition under varying illumination is one of the challenging problems in real-time applications. Numerous methods have been developed by the research community to handle the problem. Existing surveys of methods are either too old...
2010 / Ramji M. Makwana -
Using the loci framework for automated program and component generation
Abstract In this paper we discuss the Loci framework and its ability for automated program and component generation for computational simulation code development. Specifically we examine the use of the Loci framework for program structure synthesis, ...
2010 / Yang Zhang, Edward A. Luke -
Semantic ranking of lecture slides based on conceptual relationship and presentational structure
Abstract We describe a presentation content retrieval method involving the semantic ranking of target slides based on the relations between slides related to a user query. This method uses a keyword conceptual structure of the conceptual...
2010 / Yuanyuan Wang, Kazutoshi Sumiya -
Performance analysis of relay selection in cooperative networks over Rayleigh flat fading channels2012 / Hanan Al-Tous, Imad Barhumi
-
Beyond learner autonomy: A dynamic systems view of the informal learning of English in virtual online communities
Abstract This paper discusses the informal learning of English by non-native speakers with particular reference to the role of virtual communities. A model of informal language learning is presented and related to current areas of interest in the...
2012 / Geoffrey Sockett, Denyze Toffoli -
Fuzzy Grammaticality Models: A Tool for Web Language Analysis
Abstract In this paper, we highlight the need to propose formal models that consider grammaticality as a gradient property instead of the categorical view of grammaticality defended in theoretical linguistics. Given that deviations from the norm are ...
2015 / M. Dolores Jiménez-López, Adrià Torrens Urrutia -
Runtime analysis of the (1+1) EA on computing unique input output sequences
Abstract Computing unique input output (UIO) sequences is a fundamental and hard problem in conformance testing of finite state machines (FSM). Previous experimental research has shown that evolutionary algorithms (EAs) can be applied successfully...
2010 / Per Kristian Lehre, Xin Yao -
Augmented Reality Smartphone Environment Orientation Application: A Case Study of the Fu-Jen University Mobile Campus Touring System
Abstract Traditionally, environment orientations are given via signposts, tour guides, or through the web. However, these methods cannot construct a personal context-aware learning environment. With the advancement of augmented reality (AR) and...
2012 / Te-Lien Chou, Lih-Juan ChanLin