Computer and information sciences topic list of research papers
-
On semigroup ideals and n-derivations in near-rings
Abstract A non-empty subset U of a near-ring N is said to be a semigroup left (resp. right) ideal of N if NU ⊆ U (resp. UN ⊆ U) and if U is both a semigroup left...
2014 / Mohammad Ashraf, Mohammad Aslam Siddeeque, Nazia Parveen -
Image Inpainting based on Self-organizing Maps by Using Multi-agent Implementation
Abstract The image inpainting is a well-known task of visual editing. However, the efficiency strongly depends on sizes and textural neighborhood of “missing” area. Various methods of image inpainting exist, among which the Kohonen Self-Organizing...
2014 / Margarita Favorskaya, Lakhmi C. Jain, Andrey Bolgov -
A flexible radio transceiver for TVWS based on FBMC
Abstract In this paper a flexible radio approach for opportunistic access to the television white space (TVWS) is presented. Requirement stems from the coexistence scheme used in this band between opportunistic transmission and TV broadcast signals...
2014 / Vincent Berg, Jean-Baptiste Doré, Dominique Noguet -
Sports Play Visualization System Using Trajectory Mining Method
Abstract In this paper, a sports strategy decision support system, called SportsViz, for ball games is presented. Both the results of statistical analysis and player motions are visualized in an integrated way to facilitate easy decision making by...
2014 / Toshihiro Tani, Hung-Hsuan Huang, Kyoji Kawagoe -
Rapid Topology Design based on Shortest Path Betweenness for Virtual Network Construction
Abstract Recently, a network virtualization technology has attracted considerable attention as one of new generation network technologies. In this paper, in order to permit the rapid changing for a topology of a virtual network, we propose a new...
2014 / Yasuhiro Urayama, Takuji Tachibana -
Extending Moodle Functionalities with Ontology-based Competency Management
Abstract The Learning Management System (LMS) Moodle is currently the most popular software solution which provides many modules for various teaching and learning purposes. However, several aspects relevant for competency management are typically...
2014 / Kalthoum Rezgui, Hédia Mhiri, Khaled Ghédira -
Detection of fraudulent emails by employing advanced feature abundance
Abstract In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email...
2014 / Sarwat Nizamani, Nasrullah Memon, Mathies Glasdam, Dong Duong Nguyen -
Cloud-based Platform to Facilitate Access to Manufacturing IT
Abstract Today information technology is one of the main enablers of efficient production due to its ability to support manufacturing planning, execution, and optimization. However, most of the tools that provide these features are extremely complex ...
2014 / Daniel Stock, Matthias Stöhr, Ursula Rauschecker, Thomas Bauernhansl -
Characterizing co-NL by a group action2014 / CLÉMENT AUBERT, THOMAS SEILLER
-
A Lessons-learned Mobile System for Construction Companies: Motivation and Design
Abstract Construction projects are an important source of organizational knowledge. Though, it is common to find that most lessons learned in construction projects are lost because most companies never take care of collecting them. To change this...
2014 / Ximena Ferrada, Marcos Sepúlveda, Alfredo Serpell, Daniela Núñez, Andrés Neyem -
Measures of region failure survivability for wireless mesh networks2014 / Jacek Rak
-
Artificial neural network based method for handwriting recognition to speech generation2009 / Frédéric Magoulès, Vincent Marquevielle, Pierre-Arnaud Dutilleul
-
BIBDs algorithm
Abstract In this paper, we explore the planar near-rings to build BIBDs (Balanced Incomplete Block Designs) which is an important tool in the field of the theory of error-correcting code. Our purpose is to supply a program which determines BIBDs and ...
2015 / A. Raji, L. Oukhtite, A. Boua, O. Ait Zemzami -
Accountable Metadata-Hiding Escrow: A Group Signature Case Study2015 / Markulf Kohlweiss, Ian Miers
-
Automated Prediction of RCT (Root Canal Treatment) Using Data Mining Techniques: ICT in Health Care
Abstract With the use of various data mining techniques to be implemented on rapid minor tool, diseases can be detected .This paper makes use of classification technique based on cross validation and decision tree to detect RCT before seeking advice ...
2015 / Kavita Choudhary, Pinki Bajaj -
RFID in textile and clothing manufacturing: technology and challenges2015 / Rajkishore Nayak, Amanpreet Singh, Rajiv Padhye, Lijing Wang
-
A Heuristic Feature Selection Approach for Text Categorization by Using Chaos Optimization and Genetic Algorithm2013 / Hao Chen, Wen Jiang, Canbing Li, Rui Li
-
Dynamic Reverse Code Generation for Backward Execution
Abstract The need for backward execution in debuggers has been raised a number of times. Backward execution helps a user naturally think backwards and, in turn, easily locate the cause of a bug. Backward execution has been implemented mostly by...
2007 / Jooyong Lee -
A rigorous approach to facilitate and guarantee the correctness of the genetic testing management in human genome information systems2011 / Luciano V Araújo, Simon Malkowski, Kelly R Braghetto, Maria R Passos-Bueno, Mayana Zatz, et al.
-
Integrated social network reputation inspired routing for effective data forwarding2014 / Femilda Josephin Shobana, Ramaraj Narayanasamy