Computer and information sciences topic list of research papers
-
Part of Speech Tagging in Odia Using Support Vector Machine
Abstract Part of Speech (POS) Tagging is a challenging task to identify the meaning of each word in a sentence. This paper shows the task of identifying each word in an odia sentence using the technique of Support Vector Machine. The POS Tagger is...
2015 / Bishwa Ranjan Das, Smrutirekha Sahoo, Chandra Sekhar Panda, Srikanta Patnaik -
Resolving Problems Based on Peer to Peer Network Security Issue's
Abstract A peer to Peer network, which is a part of highly distributed systems, contains a diverse number of nodes to form a network. These nodes are used to exchange content containing audio, video, data and various kinds of files without the use...
2016 / Pravin Wararkar, Naman Kapil, Vyom Rehani, Yash Mehra, Yashi Bhatnagar -
Supporting engineering design communication using a custom-built social media tool – PartBook
Abstract Engineering Design Communication is the main tributary for the sharing of information, knowledge & insights, and is fundamental to engineering work. Engineers spend a significant portion of their day communicating as they ‘fill in the...
2015 / James A. Gopsill, Hamish C. McAlpine, Ben J. Hicks -
Comparative Analysis of Nearest Neighbor Query Processing Techniques
Abstract The goal of Nearest Neighbour (NN) search is to find the objects in a dataset A that are closest to a query point q. Existing algorithms presume that the dataset is indexed by an R-tree and searching a query point q in a large volume of a...
2015 / Rajendra Prasad Mahapatra, Partha Sarathi Chakraborty -
Neighbor Node Trust based Intrusion Detection System for WSN
Abstract Timely detection of anomalous activity in wireless sensor network is critical for the smooth working of the network. This paper presents an intrusion detection technique based on the calculation of trust of the neighboring node. In the...
2015 / Syed Muhammad Sajjad, Safdar Hussain Bouk, Muhammad Yousaf -
CloudStore – Towards Scalability Benchmarking in Cloud Computing
Abstract This paper describes CloudStore, an open source application that lends itself to analyzing key characteristics of Cloud computing platforms. Based on an earlier standard from transaction processing, it represents a simplified version of a...
2015 / Richard Sanders, Gunnar Brataas, Mariano Cecowski, Kjetil Haslum, Simon Ivanšek, et al. -
Improve the Adaptation Navigation in Educational Cross-systems
Abstract The adaptive educational systems include several solutions for providing personalized access to the learning process. The learner's profile constitutes the key element of these solutions. Therefore, an educational system represents the...
2015 / Leila Ghorbel, Corinne Amel Zayani, Ikram Amous -
Trust management in vehicular ad hoc network: a systematic review2015 / Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Wan Haslina Hassan, Mohammad Hossein Anisi, Shidrokh Goudarzi, et al.
-
Automated Detection of Human Users in Twitter
Abstract This paper compares Suppport Vector Machine (SVM) classification and a number of clustering approaches to separate human from not human users in Twitter in order to identify normal human activity. These approaches have similar F1 accuracy...
2015 / M.A. Fernandes, P. Patel, T. Marwala -
Armentum: a hybrid direct search optimization methodology2016 / Francisco Zorrilla Briones, Jaime Sánchez Leal, Inocente Yuliana Meléndez Pastrana
-
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
Abstract In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message...
2015 / S.K. Hafizul Islam, Ruhul Amin, G.P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, et al. -
Analyzing the Realization of Degree Sequence by Constructing Orthogonally Diagonalizable Adjacency Matrix
Abstract A finite sequence d: d 1 , d 2 , d ...
2015 / Prantik Biswas, Abhisek Paul, Paritosh Bhattacharya -
Design of hardware efficient FIR filter: A review of the state-of-the-art approaches
Abstract Digital signal processing (DSP) is one of the most powerful technologies which will shape the science, engineering and technology of the twenty-first century. Since 1970, revolutionary changes took place in the broad area of DSP which has...
2015 / Abhijit Chandra, Sudipta Chattopadhyay -
Contextual motivation in physical activity by means of association rule mining
Abstract The primary thrust of this work is to demonstrate the applicability of association rule mining in public health domain, focusing on physical activity and exercising. In this paper, the concept of association rule mining is shown assisting...
2015 / Sugam Sharma, Udoyara Sunday Tim, Marinelle Payton, Hari Cohly, Shashi Gadia, et al. -
Artificial Neural Networks and Gene Expression Programing based age estimation using facial features
Abstract This work is about estimating human age automatically through analysis of facial images. It has got a lot of real-world applications. Due to prompt advances in the fields of machine vision, facial image processing, and computer graphics,...
2015 / Baddrud Z. Laskar, Ashutosh, Swanirbhar Majumder -
Towards a Knowledge Based Approach to Style Driven Architecture Design
Abstract Nowadays, knowledge is the key to success in all software engineering processes. This valuable knowledge, obtained through analysis, design, development, and maintenance processes of the system, should be saved and reused in designing and...
2015 / Shahrouz Moaven, Jafar Habibi, Razie Alidoosti, Alireza Parvizi Mosaed -
Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining
Abstract RC4 is a popular stream cipher, which is widely used in many security protocols and standards due to its speed and flexibility. Several hardware implementations were previously suggested in the literature with the goal of improving the...
2015 / Eyad Taqieddin, Ola Abu-Rjei, Khaldoon Mhaidat, Raed Bani-Hani -
Taking Decisions Late: End-Based Choice Combined with Action Refinement
Abstract A choice in concurrent systems is usually taken by the starting of an action. We propose the alternative view that a choice is determined by the ending of actions as this alternative has relevant applications and interesting implications....
2005 / Harald Fecher, Mila Majster-Cederbaum -
Much Ado About Nothing?
Abstract In our quest on formalizing distributed algorithms, notably one to solve Distributed Consensus, we have at first found it natural to describe the algorithm using an algebraic process calculus. However, both for the purpose of the mere...
2006 / Rachele Fuzzati, Uwe Nestmann -
Parallelism and Concurrency in Adhesive High-Level Replacement Systems with Negative Application Conditions
Abstract The goal of this paper is the generalization of parallelism and concurrency results for adhesive High-Level Replacement (HLR) systems to adhesive HLR systems with negative application conditions. These conditions restrict the application of ...
2008 / Leen Lambers, Hartmut Ehrig, Ulrike Prange, Fernando Orejas