Computer and information sciences topic list of research papers
-
Investigating the Perceived Threats of Computerized Accounting Information Systems in Developing Countries: An Empirical Study on Saudi Organizations
Abstract The objective of this paper is to investigate the significant perceived security threats of computerized accounting information systems (CAIS) in Saudi organizations. An empirical survey using a self-administered questionnaire has been...
2013 / Ahmad A. Abu-Musa -
Proceedings2013 /
-
Reliable Composite Web Services Execution: Towards a Dynamic Recovery Decision
Abstract During the execution of a Composite Web Service (CWS), different faults may occur that cause WSs failures. There exist strategies that can be applied to repair these failures, such as: WS retry, WS substitution, compensation, roll-back, or...
2014 / Rafael Angarita, Yudith Cardinale, Marta Rukoz -
Hiding the Sink Location from the Passive Attack in WSN
Abstract Due to unattended nature of Wireless Sensor network makes it's vulnerable to security issues. The sensor nodes in the wireless sensor networks collect the information from the environment and send the information to a sink node so it's a...
2013 / Devesh Pratap Singh, R.H. Goudar, Mohammad Wazid -
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding
Abstract Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect...
2013 / Xiongwei Xie, Weichao Wang -
Monitoring and Detection Platform to Prevent Anomalous Situations in Home Care2014 / Gabriel Villarrubia, Javier Bajo, Juan De Paz, Juan Corchado
-
Comparison and Characterization of Android-Based Fall Detection Systems2014 / Rafael Luque, Eduardo Casilari, María-José Morón, Gema Redondo
-
An Ideal Approach for Detection and Prevention of Phishing Attacks
Abstract Phishing is a treacherous attempt to embezzle personal information such as bank account details, credit card information, social security number, employment details, and online shopping account passwords and so on from internet users....
2015 / Narendra. M. Shekokar, Chaitali Shah, Mrunal Mahajan, Shruti Rachh -
Efficient mining fuzzy association rules from ubiquitous data streams
Abstract Due to the development in technology, a number of applications such as smart mobile phone, sensor networks and GPS devices produce huge amount of ubiquitous data in the form of streams. Different from data in traditional static databases,...
2015 / Amal Moustafa, Badr Abuelnasr, Mohamed Said Abougabal -
New Creative Educational Technologies for Inter-university Network
Abstract We describe new educational technology (project “Intelligent Robotronics”) designed as a spatially distributed virtual network for the remote training of engineers, humanitarians, marine specialists, and IT-professionals (all courses...
2015 / V.E. Pryanichnikov, B. Katalinic, A.A. Kirilchenko, R.V. Khelemendik, S.V. Kuvshinov, et al. -
Design and Analysis of Optimization Algorithms for Multi-agent Railway Control System
Abstract The paper is concerned with the schedule optimization problem in the railway control systems. The schedule optimization problem has been formulated as a problem of finding the global extreme of the fitness function. Authors propose 2...
2014 / N.A. Kuznetsov, I.K. Minashina, F.F. Pashchenko, N.G. Ryabykh, E.M. Zakharova -
Generating combinatorial test cases using Simplified Swarm Optimization (SSO) algorithm for automated GUI functional testing
Abstract Graphical User Interface (GUI) is the outer skin of programs that facilitate the interaction between the user and different type of computing devices. It is been used in different aspects ranging from normal computers, mobile device, to...
2014 / Bestoun S. Ahmed, Mouayad A. Sahib, Moayad Y. Potrus -
Unwritten rules: virtual bargaining underpins social interaction, culture, and society
Many social interactions require humans to coordinate their behavior across a range of scales. However, aspects of intentional coordination remain puzzling from within several approaches in cognitive science. Sketching a new perspective, we propose that the...
2014 / Jennifer B. Misyak, Tigran Melkonyan, Hossam Zeitoun, Nick Chater -
Automated web usage data mining and recommendation system using K-Nearest Neighbor (KNN) classification method
Abstract The major problem of many on-line web sites is the presentation of many choices to the client at a time; this usually results to strenuous and time consuming task in finding the right product or information on the site. In this work, we...
2014 / D.A. Adeniyi, Z. Wei, Y. Yongquan -
A new approach for automatic control modeling, analysis and design in fully fuzzy environment
Abstract The paper presents a new approach for the modeling, analysis and design of automatic control systems in fully fuzzy environment based on the normalized fuzzy matrices. The approach is also suitable for determining the propagation of...
2015 / Walaa Ibrahim Gabr -
Anomaly Detection Based on Sensor Data in Petroleum Industry Applications2015 / Luis Martí, Nayat Sanchez-Pi, José Molina, Ana Garcia
-
CSA: A Credibility Search Algorithm Based on Different Query in Unstructured Peer-to-Peer Networks2014 / Hongyan Mei, Yujie Zhang, Xiangwu Meng
-
Reuse of terminological resources for efficient ontological engineering in Life Sciences2009 / Antonio Jimeno-Yepes, Ernesto Jiménez-Ruiz, Rafael Berlanga-Llavori, Dietrich Rebholz-Schuhmann
-
NERBio: using selected word conjunctions, term normalization, and global patterns to improve biomedical named entity recognition2006 / Richard Tsai, Cheng-Lung Sung, Hong-Jie Dai, Hsieh-Chuan Hung, Ting-Yi Sung, et al.
-
Explorative search of distributed bio-data to answer complex biomedical questions2014 / Marco Masseroli, Matteo Picozzi, Giorgio Ghisalberti, Stefano Ceri