Computer and information sciences topic list of research papers
-
Robust interactive image segmentation via graph-based manifold ranking2015 / Hong Li, Wen Wu, Enhua Wu
-
PhishShield: A Desktop Application to Detect Phishing Webpages through Heuristic Approach
Abstract Phishing is a website forgery with an intention to track and steal the sensitive information of online users. The attacker fools the user with social engineering techniques such as SMS, voice, email, website and malware. ...
2015 / Routhu Srinivasa Rao, Syed Taqi Ali -
Descriptive Modeling of Social Networks
Abstract These last years, many analysis methods have been proposed to extract knowledge from social networks. As for the traditional data mining domain, these network-based approaches can be classified according to two main families. The approaches ...
2015 / Erick Stattner, Martine Collard -
Lustre as a System Modeling Language: Lussensor, a Case-Study with Sensor Networks
Abstract We describe how we use Lustre to build global and accurate executable models of energy consumption in sensor networks, intended to be used for both simulations and formal validation. One of the key ideas is to build a component-based global ...
2008 / Florence Maraninchi, Ludovic Samper, Kevin Baradon, Antoine Vasseur -
Using Semantic Web Technologies for Integrating Domain Specific Modeling and Analytical Tools
Abstract This paper discusses the potential advantages and pitfalls of using semantic web technologies for representing and integrating modeling and analysis tools. Analytical tools are often not designed to be integrated with information sources...
2015 / Mark R. Blackburn, Peter O. Denno -
Edge Detection Using Sparse Banded Filter Matrices
Abstract Edges are intensity change, which occur on the boundary between two regions in an image. Edges can be used as feature descriptors of an object. Hence, edge detection plays an important role in computer vision applications. This paper...
2015 / V. Sowmya, Neethu Mohan, K.P. Soman -
Novel wireless channels characterization model for underground mines
Abstract The propagation characteristics of electromagnetic waves in underground mines are different from those in free space because of the harsh underground environment. Physical phenomena like severe reflection, scattering, and diffraction along...
2015 / Wisam Farjow, Kaamran Raahemifar, Xavier Fernando -
Distributed Computation of Connected Dominating Set for Multi-Hop Wireless Networks
Abstract In large wireless multi-hop networks, routing is a main issue as they include many nodes that span over relatively a large area. In such a scenario, finding smallest set of dominant nodes for forwarding packets would be a good approach for...
2015 / Simi Surendran, Sreelakshmy Vijayan -
A comparative study of a teaching–learning-based optimization algorithm on multi-objective unconstrained and constrained functions
Abstract Multi-objective optimization is the process of simultaneously optimizing two or more conflicting objectives subject to certain constraints. Real-life engineering designs often contain more than one conflicting objective function, which...
2014 / R. Venkata Rao, G.G. Waghmare -
GLOUDS: Representing tree-like graphs
Abstract The Graph Level Order Unary Degree Sequence (GLOUDS) is a new succinct data structure for directed graphs that are “tree-like,” in the sense that the number of “additional” edges (w.r.t. a spanning tree) is not too high. The algorithmic...
2015 / Johannes Fischer, Daniel Peters -
A Secure Verifiable Scheme for Secret Image Sharing
Abstract Verifiable Secret Image Sharing has become an important field of study in modern cryptography. As the era demands the need of security and verifiability to resist cheating scenario, a new secret image sharing scheme identifying the...
2015 / A. Angel Rose, Sabu M. Thampi -
Stereo Vision-based Hand Gesture Recognition under 3D Environment
Abstract Human hand gestures as a natural way of communication with computers is becoming an emerging field of research due to its various applications like sign language recognition, human computer interaction, gaming, virtual reality etc. Hand...
2015 / Mohidul Alam Laskar, Amlan Jyoti Das, Anjan Kumar Talukdar, Kandarpa Kumar Sarma -
Quantitative analysis of the security performance in wireless LANs
Abstract A comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11 b/g/n standards in various network scenarios is presented in this paper. By setting-up an experimental testbed we have measured results...
2015 / Poonam Jindal, Brahmjit Singh -
Aiding Effective Encrypted Document Manipulation Incorporated with Document Categorization Technique in Cloud
Abstract Cloud computing involves storage as well as usage of computer resources and services online. It has emerged as a promising area for data outsourcing. Since the users data are stored in servers controlled by cloud service provider there are...
2015 / Samantha Susan Mathew, C.A. Hafsath -
On Invariance Weakness in the KSAm Algorithm
Abstract In this paper, we analyze the effect of the invariance weakness defined by Fluhrer, Mantin and Shamir in [8] on the a new variant of RC4 Key-Scheduling Algorithm, called KSAm, proposed by Crainicu and Boian in [2]. We demonstrate that the...
2015 / Bogdan Crainicu -
Mobility Management for Wireless Sensor Networks A State-of-the-Art
Abstract The advent of the Internet of Things where billions of devices are able to exchange their data to give a better control to users on their environment has led to the expansion of Wireless Sensor Networks (WSN). To address the specificities...
2015 / Amel Achour, Laurent Deru, Jean Christophe Deprez -
Background Modelling from a Moving Camera
Abstract In video analytics based systems, an efficient method for segmenting foreground objects from video frames is the need of the hour. Currently, foreground segmentation is performed by modelling background of the scene with statistical...
2015 / Amitha Viswanath, Reena Kumari Behera, Vinuchackravarthy Senthamilarasu, Krishnan Kutty -
Continuous Indian Sign Language Gesture Recognition and Sentence Formation
Abstract Hand gestures are a strong medium of communication for hearing impaired society. It is helpful for establishing interaction between human and computer. In this paper we proposed a continuous Indian Sign Language (ISL) gesture recognition...
2015 / Kumud Tripathi, Neha Baranwal G.C. Nandi -
Optimized PMU Stationing for Wide Area Monitoring of Power Grid
Abstract At present time concerted efforts are being made for the implementation of smart grid technologies. PMUs play a significant role in the wide area monitoring system (WAMS). The major advantages of the WAMS include dynamic wide area...
2015 / Arvind Biswal, H.D. Mathur -
A new privacy preserving technique for cloud service user endorsement using multi-agents
Abstract In data analysis the present focus on storage services are leveraged to attain its crucial part while user data get compromised. In the recent years service user’s valuable information has been utilized by unauthorized users and service...
2015 / D. Chandramohan, T. Vengattaraman, D. Rajaguru, P. Dhavachelvan