Computer and information sciences topic list of research papers
-
Notification that new names and new combinations have appeared in volume 57, part 5, of the IJSEM2007 /
-
Middle ear reconstruction estimated by recurrence plot technique
Abstract Middle ear surgery techniques have enabled to improve hearing destroyed by a disease. Despite huge improvement in instrumentation and techniques the results of hearing improvement surgery are still difficult to predict. This paper presents...
2012 / Rafal Rusinek, Jerzy Warminski, Marek Zadrozniak, Marcin Szymanski -
TCP NRT: a new TCP algorithm for differentiating non-congestion retransmission timeouts over multihop wireless networks2013 / Prasanthi Sreekumari, Meejeong Lee
-
Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks2010 / Reza Azarderskhsh, Arash Reyhani-Masoleh
-
Kepler WebView: A Lightweight, Portable Framework for Constructing Real-time Web Interfaces of Scientific Workflows
Abstract Modern web technologies facilitate the creation of high-quality data visualizations, and rich, interactive components across a wide variety of devices. Scientific workflow systems can greatly benefit from these technologies by giving...
2016 / Daniel Crawl, Alok Singh, Ilkay Altintas -
Implementation and Evaluation of an Indexing Model of Teaching and Learning Resources
Abstract With the advent of teaching and learning resources (TLR), indexing becomes essential to ensure his identification, adaptation, reuse and sharing.Several Models indexing of TLR emerged.The problem is to go on a coherent model that would...
2015 / Kamal EL Guemmat, El habib BEN Lahmar, Mohamed Talea, El Khadir Lamrani -
Designing a high performance parallel logic programming system2004 / M. V. Hermenegildo, R. A. Warren
-
Particle Swarm Optimization over Back Propagation Neural Network for Length of Stay Prediction
Abstract Length of stay of an inpatient reflects the severity of illness as well as the practice patterns of the hospital. Predicting the length of stay will provide a better perception of the different resources consumed in a healthcare system....
2015 / Abhijit Suresh, K.V. Harish, N. Radhika -
Adaptive Transmission Range Control for Electromagnetic-based Broadcasting in Nanonetworks
Abstract Nanocommunication is a new paradigm that allows nanomachines to communicate using mechanisms, such as molecular-based, electromagnetic-based, acoustic-based, and nanomechanical-based mechanisms. A nanonetwork is formed of tiny nanomachines...
2015 / O. Yalgashev, M. Bakhouya, J. Gaber, M.-A. Manier -
Radial and Sigmoid Basis Function Neural Networks in Wireless Sensor Routing Topology Control in Underground Mine Rescue Operation Based on Particle Swarm Optimization2013 / Mary Opokua Ansong, Hong-Xing Yao, Jun Steed Huang
-
An Efficient Use of Principal Component Analysis in Workload Characterization-A Study
Abstract PCA is a useful statistical technique that has found application in fields such as face recognition, image compression, dimensionality reduction, Computer System performance analysis etc. It is a common technique for finding patterns in...
2014 / Jyotirmoy Sarkar, Snehanshu Saha, Surbhi Agrawal -
Active cancellation analysis based on the radar detection probability
Abstract In this paper, a cancelling system for linear and three nonlinear frequency modulated signals is proposed. According to the RCS (Radar Cross Section) characteristic of target, amplitude and phase modulation are made to acquire the signal...
2015 / Mingxu Yi, Lifeng Wang, Jun Huang -
An Advanced Multi Class Instance Selection based Support Vector Machine for Text Classification
Abstract Machine learning techniques is most commonly used technique in text mining. Support Vector Machine (SVM) is a most useful supervised learning technique for text classification. In this paper we proposed advanced Multi Class Instance...
2015 / B. Ramesh, J.G.R. Sathiaseelan -
A Context-based Future Network Infrastructure for IoT Services
Abstract According to a recent study, global IP traffic will have increased threefold over 2014 to 2018. This tremendous growth in IoT traffic and number of IoT devices, has given rise to new requirements from its infrastructure, such as for...
2015 / Won Sang Chin, Hyun-soo Kim, Young Ju Heo, Ju Wook Jang -
Esophageal cancer prediction based on qualitative features using adaptive fuzzy reasoning method
Abstract Esophageal cancer is one of the most common cancers world-wide and also the most common cause of cancer death. In this paper, we present an adaptive fuzzy reasoning algorithm for rule-based systems using fuzzy Petri nets (FPNs), where the...
2015 / Raed I. Hamed -
Forensic Linguistics: A Brief Overview of the Key Elements
Abstract The present study scrutinized a framework and brief overview of the key elements of forensic linguistics covering the discipline, the history and development of it, and the use of linguistic evidence in legal proceedings. Moreover, the...
2014 / Mohsen Ghasemi Ariani, Fatemeh Sajedi, Mahin Sajedi -
Fine Grained Access Control and Revocation for Secure Cloud Environment – A Polynomial Based Approach
Abstract Cloud Computing has been emerged as a prominent technology where users can upload their data and do their processing using shared resources. But there always exist a tradeoff between the performance and security of a system. The same is...
2015 / Lija Mohan, M. Sudheep Elayidom -
Experimental Studies of LSB Watermarking with Different Noise
Abstract Now a day information security is the biggest issue of social network. there are numerous technique are available for image and data security, watermarking is one of them. Digital watermarking is a way which is used to verify and...
2015 / Ranjeet Kumar Singh, Dilip Kumar Shaw, M. Javed Alam -
Breaking the Model: Finalisation and a Taxonomy of Security Attacks
Abstract It is well known that security properties are not preserved by refinement, and that refinement can introduce new, covert, channels, such as timing channels. The finalisation step in refinement can be analysed to identify some of these...
2005 / John A. Clark, Susan Stepney, Howard Chivers -
Neuro-Fuzzy Based Hybrid Model for Web Usage Mining
Abstract Web Usage mining consists of three main steps: Pre-processing, Knowledge Discovery and Pattern Analysis. The information gained from the analysis can then be used by the website administrators for efficient administration and...
2015 / G. Shivaprasad, N.V. Subba Reddy, U. Dinesh Acharya, Prakash K. Aithal