Computer and information sciences topic list of research papers
-
Vineyard Yield Estimation Based on the Analysis of High Resolution Images Obtained with Artificial Illumination at Night2015 / Davinia Font, Marcel Tresanchez, Dani Martínez, Javier Moreno, Eduard Clotet, et al.
-
Emergent Intelligence Based QoS Routing in MANET
Abstract Mobile Ad hoc Networks (MANETs) are self-organized, infrastructureless, decentralized wireless networks consist of a group of heterogeneous mobile devices. Due to the inherent characteristics of MANETs, such as frequent change of topology,...
2015 / Suresh Chavhan, Pallapa Venkataram -
Dynamic Cluster Head Selection Using Fuzzy Logic on Cloud in Wireless Sensor Networks
Abstract One of the most vital activities to reduce energy consumption in wireless sensor networks is clustering. In clustering, one node from a group of nodes is selected to be a cluster head, which handles majority of the computation and...
2015 / Akshay Kumar, Payal Pahwa, Deepali Virmani, Sahil, Vikas Rathi, et al. -
Allocation-aware Task Scheduling for Heterogeneous Multi-cloud Systems
Abstract Cloud computing is one of the growing technology usage for the day-to-day business operations in today's IT industry. The diverse features of cloud such as on-demand self-service, quality of service, pay-per-usage pricing, virtualization...
2015 / Sanjaya K. Panda, Indrajeet Gupta, Prasanta K. Jana -
Middleware to Integrate Mobile Devices, Sensors and Cloud Computing
Abstract The emergence of the Internet of Things (IoT) and the advantages of Mobile Cloud Computing (MCC) have drawn a big absorption from technological experts. This paper investigates the integration of IoT and MCC by introducing the service...
2015 / Thinh Le Vinh, Samia Bouzefrane, Jean-Marc Farinone, Amir Attar, Brian P. Kennedy -
Scalable Privacy Preservation in Big Data a Survey
Abstract Cloud computing provides flexible infrastructure and high storage capacity for BigData applications. The MapReduce framework is most preferable for processing huge volume of unstructured data set in BigData. Increase in data volume leads to ...
2015 / S. Vennila, J. Priyadarshini -
An Enhanced Ant Colony Based Approach to Optimize the Usage of Critical Node in Wireless Sensor Networks
Abstract The issue of energy constrained and non-renewable energy of sensor nodes has made the node weaker as a critical challenge in wireless sensor networks. The workload of nodes may varies depends on position and mobility of each involved nodes. ...
2015 / M. Umadevi, M. Devapriya -
Single Image Haze Removal Using White Balancing and Saliency Map
Abstract Atmospheric phenomenon such as haze, fog, mist etc is originated by small particles in the air such as dust, smoke or moisture, which reduces the visibility of the outdoor scenes. The background theory behind it is the absorption and...
2015 / S. Ansia, A.L. Aswathy -
An Enhanced DACHE Model for the MapReduce Environment
Abstract Big data refers to processing of enormous amount of unstructured data. The MapReduce and Hadoop are open-source softwares for bigdata applications.The unstructured data are processed using MapReduce framework and Hadoop as an environment,...
2015 / S. Sangavi, A. Vanmathi, R. Gayathri, R. Raju, P. Victer Paul, et al. -
Work-based Blended Learning and Technological Scaffolding System to Enhance Communication Skills for Caregivers Under Local Administrative Organization, Ministry of Interior, Thailand (Part I)
Abstract Communication skills are very important factors which contribute to success in every career in the 21st century. Professional development plans for future caregivers; therefore, should include developing these skills. Caregivers are adult...
2015 / Ua-aree Janthon, Noawanit Songkram, Prakob Koraneekij -
Measuring and decomposing firm׳s revenue and cost efficiency: The Russell measures revisited
Abstract Overall inefficiency measurement and decomposition are important for firms facing a world of changing prices since the resultant loss has implications on managers׳ decision making. In this paper, we draw attention to some problems within...
2015 / Juan Aparicio, Fernando Borras, Jesus T. Pastor, Fernando Vidal -
Online and Offline Signature Verification: A Combined Approach
Abstract Handwritten signature verification is an emerging area. In this paper, an automatic signature verification system has been proposed. This work focuses on both online and offine features of handwritten signatures and aims at combining their...
2015 / K.S. Radhika, S. Gopika -
Airworthiness Considerations of Supply Chain Management from Boeing 787 Dreamliner Battery Issue
Abstract With the globalization of the economy, the aviation market competition intensifies and the aviation product development mode has correspondingly changed. The aircraft manufacturers pack more and more works to the suppliers to join the...
2014 / Tao Song, Yan Li, Jiashan Song, Zhao Zhang -
A Proposed RFID Authentication Protocol based on Two Stages of Authentication
Abstract Security and privacy vulnerabilities in RFID authentication protocols may affect RFID users by revealing their identification information especially in Healthcare systems. Previous researches in RFID authentication protocols have mainly...
2014 / Abdulhadi Alqarni, Maali Alabdulhafith, Srinivas Sampalli -
Secure routing for mobile ad hoc networks2006 / P.G. Argyroudis, D. O'Mahony
-
Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A Survey
Abstract Pattern recognition is seen as a major challenge within the field of data mining and knowledge discovery. For the work in this paper, we have analyzed a range of widely used algorithms for finding frequent patterns with the purpose of...
2014 / Shamila Nasreen, Muhammad Awais Azam, Khurram Shehzad, Usman Naeem, Mustansar Ali Ghazanfar -
Improvement of Detection for Warning Students in E-learning Using Web Cameras
Abstract As e-learning systems that use computers and the Internet have become more popular around us, utilization of e-learning systems at schools for classwork has been more activated. However, there are some students that don’t concentrate on...
2014 / Kenichi Takahashi, Masahiro Ueno -
A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments
Abstract Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms...
2014 / Olusegun Folorunso, Olusegun Afeez Mustapha -
LICOD: A Leader-driven algorithm for community detection in complex networks2014 / Zied Yakoubi, Rushed Kanawati
-
Interval-based ranking in noisy evolutionary multi-objective optimization2014 / Hossein Karshenas, Concha Bielza, Pedro Larrañaga