Computer and information sciences topic list of research papers
-
Secure Low-cost Solution for Elder's eCardio Surveillance
Abstract In recent years we have assisted to the growth in two major areas related to eHealth: one dedicated to the conception, creation and implementation of biosensors and another dedicated to the monitoring of vital parameters provided by these...
2014 / Jorge Mendes, Heitor Simões, Patrício Rosa, Nuno Costa, Carlos Rabadão, et al. -
Adaptive content recommendation for mobile users: Ordering recommendations using a hierarchical context model with granularity
Abstract Retrieving timely and relevant information on-site is an important task for mobile users. A context-aware system can understand a user’s information needs and thus select contents according to relevance. We propose a context-dependent...
2013 / Jonghyun Han, Hedda R. Schmidtke, Xing Xie, Woontack Woo -
Reducing the Cognitive Complexity in Reading the Arabic Script of Written Malay via Diacritics
Abstract Malay, the national language of Malaysia, is written in two distinct scripts: the Arabic script and the Romanised script. The Arabic script of written Malay is relatively more cognitively complex (Salehuddin, 2012); making it today the less ...
2014 / Khazriyati Salehuddin, Heather Winskel -
On Block Structures in Quantum Computation
Abstract A block is a language construct in programming that temporarily enlarges the state space. It is typically opened by initialising some local variables, and closed via a return statement. The “scope” of these local variables is then...
2013 / Bart Jacobs -
Out of sight, but not out of mind: Traces of nearby devices' wireless transmissions in volatile memory
Abstract An IEEE 802.11 wireless device can leave traces of its presence in the volatile memories of nearby wireless devices. While the devices need to be in radio range of each other for this to happen, they do not need to be connected to the same...
2014 / Wicher Minnaard -
Sweeping in Abstract Interpretation
Abstract In this paper we present how sweeping line techniques, which are very popular in computational geometry, can be adapted for static analysis of computer software by abstract interpretation. We expose how concept of the sweeping line can be...
2012 / Krzysztof Jakubczyk -
The Effect of Cloud Computing Technology in Personalization and Education Improvements and its Challenges
Abstract With emergence of electronic systems and removal of paper, virtual technologies and electronics are becoming important. This paper discusses the importance of electronic training and emphasizes on its qualitative and quantitative...
2013 / Mansour Jalali, Asgarali Bouyer, Bahman Arasteh, Maryam Moloudi -
The Use of Concordancing Programs in ELT
Abstract Concordance programs have been used in literary and mostly religious text analysis for decades. They aim to count and define the frequency and function of a word or word groups in a given text. The aim is to give an inductive understanding...
2014 / Fatih Yavuz -
Attracting Students to the Computing Disciplines: A Case Study of a Robotics Contest
Abstract Guiding high school students towards a specific career choice is one of the challenges that parents, teachers, and career- counselors alike have to participate in with a lot of involvement. While career-fairs, open-houses, and other such...
2013 / Uvais Qidwai, Ryan Riley, Sayed El-Sayed -
Analytical approximation for Landau’s constants by using the Boubaker Polynomials Expansion Scheme method
Abstract In this study, approximation formulas for evaluating Landau constants are elaborated by using the Boubaker Polynomials Expansion Scheme (BPES). Results are compared to some referred studies.
2013 / Lin Zhang, Karem Boubaker -
A Learning Resource to Acquire Engineering Skills through Programming Languages
Abstract In Science and Engineering studies, MATLAB is one of the preferred tools for scientific computing. Even though the learning curve of MATLAB is moderate, students at the first courses of the new Bologna degrees usually find some difficulties ...
2014 / A. Queiruga-Dios, A. Hernández Encinas, I. Visus Ruiz, L. Hernández Encinas, V. Gayoso Martínez, et al. -
Mobile Learning Application for Basic Router and Switch Configuration on Android Platform
Abstract This paper presents the design and development of Mobile Learning Application for Basic Router and Switch Configuration on Android Platform using Java Programming Language to help students in computer networking courses at the Department of ...
2013 / Kamaruddin Mamat, Farok Azmat -
Optimizing the Transmission Line Cost of a Fault Tolerance Network to Promote Green Power Usage
Abstract Green power is clean without pollution, such as solar and wind power. It has become a resolution to supplement the deficiency of today's high cost/danger energy resources. A challenge is to integrate these distributed resources into the...
2012 / Wen-Li Wang, Robert Weissbach, Mei-Huei Tang -
Design and the Evidence
Abstract The paper introduces a wide range of EB evidence from research into healthcare environments. It explains why so much data can be found on this building typology and argues that it actually has a far wider and more generic value. The paper...
2013 / Bryan Lawson -
Rotator on Chip (RoC) Design Based on Ring Topological NoC
Abstract The paper presents the ring based Network on Chip (NoC) structure design and modeling in Hardware Description Language (HDL). The network configuration is chosen for 65536 nodes, which is synchronized with same clock pulse. The...
2015 / Adesh Kumar, Lopamudra Baruah, Amit Sabu -
Synthesizing data-centric models from business process models2015 / Rik Eshuis, Pieter Van Gorp
-
Security of quantum digital signatures for classical messages2015 / Tian-Yin Wang, Xiao-Qiu Cai, Yan-Li Ren, Rui-Ling Zhang
-
A Computational Framework for Concept Representation in Cognitive Systems and Architectures: Concepts as Heterogeneous Proxytypes
Abstract In this paper a possible general framework for the representation of concepts in cognitive artificial systems and cognitive architectures is proposed. The framework is inspired by the so called proxytype theory of concepts and combines it...
2014 / Antonio Lieto -
Big Data and Hadoop-a Study in Security Perspective
Abstract Big data is the collection and analysis of large set of data which holds many intelligence and raw information based on user data, Sensor data, Medical and Enterprise data. The Hadoop platform is used to Store, Manage, and Distribute Big...
2015 / B. Saraladevi, N. Pazhaniraja, P. Victer Paul, M.S. Saleem Basha, P. Dhavachelvan -
Migration Performance of Cloud Applications- A Quantitative Analysis
Abstract Performance of a cloud data centre must abide the Service Level Agreement parameters and must provide negotiated Quality of Service values. One of the key areas in cloud computing, where the possibility of performance tuning is the maximum, ...
2015 / Narander Kumar, Swati Saxena