Computer and information sciences topic list of research papers
-
Privacy-preserving email forensics
Abstract In many digital forensic investigations, email data needs to be analyzed. However, this poses a threat to the privacy of the individual whose emails are being examined and in particular becomes a problem if the investigation clashes with...
2015 / Frederik Armknecht, Andreas Dewald -
Automatic Generation of 3D Assembly Dimension Chain Based on Feature Model
Abstract This paper presents a method of automatic generate 3D assembly dimension chain based on feature model. Use attributes set of feature to express the information of parts and their relationships, an attributes set mainly include: information...
2016 / Gao Zhenbo, Wang Jing, Cao Yanlong, Yang Jiangxin -
Agent-based Movement Analysis and Location Prediction in Cellular Networks
Abstract The huge quantity of individual location data recorded by mobile phones or mobile networks inspires research questions regarding new and intelligible services on behalf of mobile users. Creating a system for location prediction and...
2015 / Marin Vukovic, Dragan Jevtic -
Health Twitter Big Bata Management with Hadoop Framework
Abstract Social media advancements and the rapid increase in volume and complexity of data generated by Internet services are becoming challenging not only technologically, but also in terms of application areas. Performance and availability of data ...
2015 / João Cunha, Catarina Silva, Mário Antunes -
Towards Accurate Eye Tracker Calibration – Methods and Procedures
Abstract Eye movement is a new emerging modality in human computer interfaces. With better access to devices which are able to measure eye movements (so called eye trackers) it becomes accessible even in ordinary environments. However, the first...
2014 / Katarzyna Harezlak, Pawel Kasprowski, Mateusz Stasch -
Semi-supervised change detection approach combining sparse fusion and constrained k means for multi-temporal remote sensing images
Abstract Change detection is the measure of the thematic change information that can guide to more tangible insights into an underlying process involving land cover, land usage and environmental changes. This paper deals with a semi-supervised...
2015 / Anisha M. Lal, S. Margret Anouncia -
Allocation Reductions in Inconsistent Decision Tables Based on Dominance Relations
Abstract In recent years, many methods have been proposed in order to deal with inconsistent information systems based on indiscernibility relations in rough set theory. However, a little attention has been paid to inconsistent ordered decision...
2015 / Wen-Sheng Du, Bao-Qing Hu -
Denoising Ultrasound Medical Images with Selective Fusion in Wavelet Domain
Abstract Ultrasound medical imaging is undoubtedly an incontestable tool which provides the view of the internal organs of a body. The no ionizing radiation exposure property of the ultrasound medical images made it more fitting for fetus imaging....
2015 / P.V.V. Kishore, K.L. Mallika, M.V.D. Prasad, K.L. Narayana -
Remote Sensing Image Fusion using Multithreshold Otsu Method in Shearlet Domain
Abstract In remote sensing image fusion, preservation of spectral information and enhancement of spatial resolution are key issues. In this paper, a novel approach of remote sensing satellite image fusion method have been proposed based on Otsu's...
2015 / Biswajit Biswas, Kashi Nath Dey, Amlan Chakrabarti -
Evaluating Denoising Performances of Fundamental Filters for T2-Weighted MRI Images
Abstract In Magnetic Resonance (MR) images, noise is a common issue which limits the image accuracy of any quantitative measurements. Noise elimination in MRI image pre-processing is an important step to eliminate the noise and to make the image fit ...
2015 / Iza Sazanita Isa, Siti Noraini Sulaiman, Muzaimi Mustapha, Sailudin Darus -
Investigating the Effect of Formal Training of Phonetic Rules on Intermediate Iranian EFL Learners’ Observing Assimilation
Abstract This study is intended to investigate the effect of formal training of assimilation rules on Iranian intermediate EFL learners. To achieve this goal, first the assimilation rules were fully described and formalized based on Mehmet Yavas...
2015 / Faranak Rezaei, Habib Gowhary, Akbar Azizifar -
Intrusion Intention Identification Methods Based on Dynamic Bayesian Networks
Abstract It is difficult to detect the intention of an intruder, identify semantics of attacks and predict further attacks effectively using intrusion detection methods in the construction of high-level attack scene and disposal of sophisticated...
2011 / Qingtao Wu, Ruijuan Zheng, Guanfeng Li, Juwei Zhang -
Agent-based Simulation for Creating Robust Plans and Schedules
Abstract The paper describes methods for constructing the robust schedules using agent-based simulation. The measure of robustness represents the resistance of the schedule to random phenomena and we present the method for calculating robustness of...
2015 / Peter Jankovič -
Self-managed Networks with Fault Management Hierarchy
Abstract The monitoring of network resources and services, isolating and identifying problems when failures occur, and fixing them by sending technicians to the sites most of the time or downloading certain configuration files remotely to fix...
2014 / Mehmet Toy -
Analysis of Open Innovation Intermediaries Platforms by Considering the Smart Service System Perspective
Abstract Open Innovation and Services Science are two distinct paradigms that share some principles 0. While some attempts to investigate open innovation according to a service science perspective exist, there is currently a gap with regards to the...
2015 / Tindara Abbate, Danilo De Luca, Angelo Gaeta, Mario Lepore, Sergio Miranda, et al. -
Constraining Cycle Alternations in Model Checking for Interval Temporal Logic
Abstract Model checking is one of the most successful techniques in system verification. While a variety of methods and tools exist to check properties expressed in point-based temporal logics, like LTL and CTL, model checking for interval temporal...
2016 / Alberto Molinari, Angelo Montanari, Adriano Peron -
Improving Data Consistency in Production Control
Abstract Under volatile market conditions, manufacturing companies, which achieve a high adherence to promised delivery dates, possess a considerable advantage over their direct competitors. However, due to dynamically changing production...
2016 / Christina Reuter, Felix Brambring -
Utilizing Third Party Auditing to Manage Trust in the Cloud
Abstract Recent trends within the IT industry have led to a tectonic shift in the way organizations utilize information systems to yield maximum efficiency. Cloud computing is the cornerstone of the aforementioned paradigm permutation. Information...
2015 / Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker -
Archival science, digital forensics, and new media art
Abstract Digital archivists and traditional digital forensics practitioners have significant points of convergence as well as notable differences between their work. This paper provides an overview of how digital archivists use digital forensics...
2015 / Dianne Dietrich, Frank Adelstein -
A RED modified weighted moving average for soft real-time application2014 / Joanna Domanśka, Adam Domański, Dariusz R. Augustyn, Jerzy Klamka