Computer and information sciences topic list of research papers
-
Thematic Schema Building for Mediation-based Peer-to-Peer Architecture
Abstract Recently, mediation tools and peer-to-peer systems have allowed an important evolution for data sharing. Mediators are now mature techniques to share structured and heterogeneous data distributed through a reasonable number of nodes....
2006 / Nicolas Lumineau, Anne Doucet, Stéphane Gançarski -
A Design of Mine WSN Layout Strategy
Abstract Wireless sensor networks is a kind of brand-new information acquisition and processing technology, combined with sensing, computation and communication technology, and have great advantages using coal production. Firstly, a ribbon WSN's...
2011 / Zhongbo Zhu, Gang Wang, Dian Zhang -
Text and Structural Data Mining of Influenza Mentions in Web and Social Media2010 / Courtney D. Corley, Diane J. Cook, Armin R. Mikler, Karan P. Singh
-
Effects of Social Constructivist Learning Environment Design on 5th Grade Learners’ Learning
Abstract The aim of this study was to determine the effects of ‘Social Constructivist Learning Environment’ (SCLE) on the 5th grade primary school learners. The study sample was composed of seven 5th grade learners attending at the primary schools...
2011 / Semra Akyol, Seval Fer -
Decryptable searchable encryption with a designated tester
Abstract Public key encryption with keyword search (PEKS) enables user to send a trapdoor T w to a server that will enable the server to locate all encrypted messages containing the ...
2011 / Chengyu Hu, Pengtao Liu -
Visual Importance-based Cross-layer 3D Model Streaming over Lossy Network
Abstract This paper proposes a visual importance-based cross-layer 3D model streaming method over lossy network. Before the transmission, we build an important criterion for each packet of a 3D model from the aspect of rendering dependence among...
2011 / Bailin Yang -
A Novel Group Key Establishment Scheme for MANETs
Abstract In mobile ad hoc networks (MANETs), due to unreliable wireless media, nodes mobility and lack of infrastructure, providing a key establishment scheme is a big challenge in this unique network environment. In this paper, a hybrid group key...
2011 / Huihua Zhou, Minghui Zheng, Tianjiang Wang -
Spatially coupled LDPC coding in cooperative wireless networks2016 / Dushantha Nalin K. Jayakody, Vitaly Skachek, Bin Chen
-
Some basic aspects of knowledge
Abstract Knowledge processing is one of the most significant factors contributing to socioeconomic sustainability. It is therefore important to analyse hindrances that slow or even prevent the growth, communication and use of knowledge. This...
2009 / K. Abhary, H.K. Adriansen, F. Begovac, D. Djukic, B. Qin, et al. -
Social experiment for security camera which protects privacy embedded in vending machine
Abstract With the cooperation of Gunma Prefecture Police Department and Mikuni Coca-Cola Group, e-JIKEI Network started Experiment of Security Camera Embedded in Vending Machine on 19th June 2007. In this experiment, the system of e-JIKEI Network is ...
2010 / Minato Sonoda, Koichi Maru, Kohjiro Kobayashi, Mohamad Salehuddin Bin Sufian, Yoichi Sugita, et al. -
Using the excel spreadsheet in teaching science subjects
Abstract The main reason why teaching engineering and science subjects are more difficult and also more expensive is because of the requirements of laboratories. Experimental analysis teaches the practical aspects of a course and also gives students ...
2009 / Dogan Ibrahim -
Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO) Router Chip2009 / Selcuk Okdem, Dervis Karaboga
-
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
Abstract Securing the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may...
2011 / Abdul Bashah Mat Ali, Ala’ Yaseen Ibrahim Shakhatreh, Mohd Syazwan Abdullah, Jasem Alostad -
Computational intelligence based architecture for cognitive agents
Abstract We discuss some limitations of reflexive agents to motivate the need to develop cognitive agents and propose a hierarchical, layered, architecture for cognitive agents. Our examples often involve the discussion of cognitive agents in...
2010 / Anna T. Lawniczak, Bruno N. Di Stefano -
Implementing online language exams within the Spanish National University Entrance Examination: The PAULEX Universitas Project
Abstract This paper describes the PAULEX Universitas Project, an online system to design, deliver and assess the foreign language exam that is an integral part of the Spanish national university entrance examination. The foreign language exam is...
2012 / Ana Gimeno-Sanz, Jose Macario de Siqueira -
Neural Systems with Numerically Matched Input-Output Statistic: Isotonic Bivariate Statistical Modeling2007 / Simone Fiori
-
Multi-criteria evaluation of stacking yard configuration
Abstract Nowadays container terminals play a pivotally important role in the world. As a consequence of facing the global trend of containerization, this paper proposed a modification in yard layout configuration for terminal throughput improvement. ...
2010 / F. Golbabaie, S.R. Seyedalizadeh Ganji, N. Arabshahi -
Reliable data deliveries using packet optimization in multi-hop underwater sensor networks
Abstract A fundamental challenge in underwater wireless sensor networks (UWSNs) is that acoustic links are subject to high transmission power with high channel impairments. These channel impairments result in higher error rates and temporary path...
2011 / Muhammad Ayaz, Low Tang Jung, Azween Abdullah, Iftikhar Ahmad -
Landmark transfer with minimal graph
Abstract We present an efficient and robust algorithm for the landmark transfer on 3D meshes that are approximately isometric. Given one or more custom landmarks placed by the user on a source mesh, our method efficiently computes corresponding...
2013 / Vasyl Mykhalchuk, Frederic Cordier, Hyewon Seo -
Online Instructional Consultation (OICon) Model for Higher Education Institution (HEIs)
Abstract Virtual discussion between students and lecturers nowadays become easier and effective by using computer-mediated communication (CMC) tools. The issue on geographical distance is no longer a problem but there are some aspects that need...
2013 / Abd Hadi Bin Abdul Razak, Ang Ling Weay, Nur Fadziana Faisal Mohamed