Computer and information sciences topic list of research papers
-
A Multicarrier Digital Communication System for an Underwater Acoustic Environment
Abstract Underwater acoustic applications are popular and vast, given the low attenuation of sound waves in water. However, these mediums are a challenge to efficient digital communication systems, due to their time and frequency dispersive nature....
2014 / Mário Lopes, Renato Costa, Paulo Marques -
Advanced Memory Reusing Mechanism for Virtual Machines in Cloud Computing
Abstract Cloud computing is an emerging computing technology for large data centers that maintains computational resources through the internet, rather than on local computers. With the increasing popularity of cloud computing, also increase the...
2015 / Gursharan Singh, Sunny Behal, Monal Taneja -
Automatic Identification of Licorice and Rhubarb by Microscopic Image Processing
Abstract This paper presents a method for automatic identification of Herbal Plants Licorice and Rhubarb by microscopic image processing. This method is useful for identifying species from fragments or powders and for distinguishing species with...
2015 / Bhupendra Fataniya, Meet Joshi, Urmil Modi, Tanish Zaveri -
Optimizing Server Resource by Using Virtualization Technology
Abstract Data and information needs for large organizations, rely heavily on information technology infrastructure support. One of the necessary supporting components is the availability of a sufficient number of servers to increase data center. The ...
2015 / Edwar Ali, Susandri, Rahmaddeni -
Specifics of Visual Perception of the Augmented Reality in the Context of Education
Abstract Paper deals with visual perception, which is a prerequisite for the functioning of augmented reality and very important area in the context of the use of augmented reality in education. The paper aims to analyse the specifics of visual...
2015 / Tomáš Jeřábek, Vladimír Rambousek, Radka Wildová -
Advancing Mac OS X rootkit detection
Abstract In the last few years there has been a sharp increase in the use of Mac OS X systems in professional settings. This has led to increased activity in the development of malware and attack toolkits focused specifically on OS X systems, and...
2015 / Andrew Case, Golden G. Richard -
MPJ Express Meets YARN: Towards Java HPC on Hadoop Systems
Abstract Many organizations—including academic, research, commercial institutions—have invested heavily in setting up High Performance Computing (HPC) facilities for running computational science applications. On the other hand, the Apache Hadoop...
2015 / Hamza Zafar, Farrukh Aftab Khan, Bryan Carpenter, Aamir Shafi, Asad Waqar Malik -
Target Detection Using Orthogonal Polyphase MIMO Radar Waveform against Compound Gaussian Clutter
Abstract This paper mainly deals with the target detection using orthogonal Polyphase Multiple Input Multiple Output (MIMO) radar waveforms against compound-Gaussian clutter with an unknown covariance matrix. The design of orthogonal code sets with...
2013 / B. Roja Reddy, M. Uttara Kumari -
Learning to Predict the Need of Summarization on News Articles
Abstract Recently, we live with a huge amount of data. For example, we have great amount of news articles everyday. But there are small amount of useful information in the articles and it is hard to extract useful information manually. As a result,...
2013 / Ji Eun Lee, Hyun Soo Park, Kyung Joong Kim, Jae Chun No -
X-Klaim and Klava
Abstract Highly distributed networks have now become a common infrastructure for a new kind of wide-area distributed applications whose key design principle is network awareness, namely the ability to deal with dynamic changes of the network...
2004 / Lorenzo Bettini, Rocco De Nicola, Rosario Pugliese -
Lower bounds for the number of small convex k-holes
Abstract Let S be a set of n points in the plane in general position, that is, no three points of S are on a line. We consider an Erdős-type question on the least number ...
2013 / Oswin Aichholzer, Ruy Fabila-Monroy, Thomas Hackl, Clemens Huemer, Alexander Pilz, et al. -
Using Documentaries for Designing Elearning Activities
Abstract In this paper, we are proposing a method for segmenting the content of a documentary in order to design a series of elearning activities.From a case study, we begin by segmenting the content of a documentary in the form of knowledge (facts, ...
2014 / Abdallah Hariri, Hicham Fihri Fassi -
Survey of scheduling algorithms in IEEE 802.16 PMP networks
Abstract IEEE 802.16 standard has been proposed to support wide-range wireless broadband access. It is based on a common medium access control (MAC) protocol compliance with several physical layer specifications and operates in two modes...
2014 / Akashdeep, Karanjeet S. Kahlon, Harish Kumar -
A Technology for BigData Analysis Task Description Using Domain-specific Languages
Abstract The artic le presents a technology for dynamic knowledge -based building of Do main -Specific Languages (DSL) to describe data-intensive scientific discovery tasks using BigData technology. The proposed technology supports high level...
2014 / Sergey V. Kovalchuk, Artem V. Zakharchuk, Jiaqi Liao, Sergey V. Ivanov, Alexander V. Boukhanovsky -
Photonic Timeslot Interchangers with a Reduced Number of Feed-forward Fiber Delay Lines
Abstract Time Division Multiplexing has been employed for decades in backbone networks. However, time channels have yet to be switched in the optical domain. The conventional time-switching method is to convert a signal from the optical to...
2014 / Luai E. Hasnawi, Richard A. Thompson -
Determining the Time Window Threshold to Identify User Sessions of Stakeholders of a Commercial Bank Portal
Abstract In this paper, we focus on finding the suitable value of the time threshold, which is then used in the method of user session identification based on the time. To determine its value, we used the Length variable representing the time a user ...
2014 / Jozef Kapusta, Michal Munk, Peter Svec, Anna Pilkova -
iSENSE: Intelligent Sensor Monitoring Services with Integrated WSN Testbed
Abstract Wireless sensor network (WSN) is drawing interest in various areas as they have great potential for many distributed applications in different scenarios. This paper demonstrates iSENSE, which provides a web-based sensor monitoring service...
2014 / Sovan Bisoi, Suman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee -
Change Detection and Visualization of Functional Brain Networks using EEG Data
Abstract Mining dynamic and non-trivial patterns of interactions of functional brain networks has gained significance due to the recent advances in the field of computational neuroscience. Sophisticated data search capabilities, advanced signal...
2014 / R. Vijayalakshmi, Naga Dasari, D. Nandagopal, R. Subhiksha, Bernie Cocks, et al. -
Optimizing Shared-memory Hyperheuristics on Top of Parameterized Metaheuristics
Abstract This paper studies the auto-tuning of shared-memory hyperheuristics developed on top of a unified shared-memory metaheuristic scheme. A theoretical model of the execution time of the unified scheme is empirically adapted for particular...
2014 / José-Matías Cutillas-Lozano, Domingo Giménez -
Lean manufacturing measurement: the relationship between lean activities and lean metrics
Abstract Lean Manufacturing was developed by Toyota Motor company to address their specific needs in a restricted market in times of economic trouble. These concepts have been studied and proven to be transferrable and applicable to a wide variety...
2013 / Manotas Duque Diego Fernando, Leonardo Rivera Cadavid