Computer and information sciences topic list of research papers
-
Integrated Signal Control and Route Guidance based on Back-pressure Principles
Abstract Traffic signal control and route guidance are the oldest and most applied dynamic traffic management measures. Most of the time they operate in a local mode, although there is trend toward network-wide traffic management. For traffic signal ...
2015 / Henk Taale, Joost van Kampen, Serge Hoogendoorn -
Al-Yad: A Wearable Sensor Network over DDS Middleware for Industrial Application
Abstract Recently, it is estimated that in the coming five years, 700 million wearable devices for all kinds of applications will be sold worldwide. They owe their fame to their ease of accessibility, which in turn ensures productivity. Meanwhile,...
2015 / Basem Almadani, Farouq Muhammad Aliyu, Elhadi M. Shakshuki -
A Programming Environment for Visual Block-Based Domain-Specific Languages
Abstract Visual block-based programming is useful for various users such as novice programmers because it provides easy operations and improves the readability of programs. Also, in programming education, it is known to be effective to initially...
2015 / Azusa Kurihara, Akira Sasaki, Ken Wakita, Hiroshi Hosobe -
Towards Sustainability Information Systems
Abstract Companies have to submit the postulate of sustainability. Therefore, they necessarily need comprehensive support by efficient information for remaining competitive taking sustainability into account. But such type of information systems are ...
2015 / Horst Junker, Tabassom Farzad -
Instance Selection with Ant Colony Optimization
Abstract Classification is a supervised learning task where a training set is used to construct a classifi- cation model, which is then used to predict the class of unforeseen test instances. It is often beneficial to use only a subset of the full...
2015 / Ismail M. Anwar, Khalid M. Salama, Ashraf M. Abdelbar -
Ergonomic Evaluation and Design of a Mobile Application for Maternal and Infant Health for Smartphone Users among Lower-income Class Filipinos
Abstract The Philippines has one of the highest birth rate in the world with 24.98 births per 1000 population. For every 1000 of these births, 35 suffer infant mortality. According to the Philippines’ National Statistics Office, infant mortality...
2015 / Arizza Ann Nocum, Joy Mary Baltao, Daniel Roi Agustin, Alyssa Jean Portus -
A Study on the Approximation of Clustered Data to Parameterized Family of Fuzzy Membership Functions for the Induction of Fuzzy Decision Trees2015 / Swathi J. Narayanan, Ilango Paramasivam, Rajen B. Bhatt, M. Khalid
-
Czech Insolvency Proceedings Data: Social Network Analysis
Abstract In 2008, the Czech government launched an information system called Insolvency Register of the Czech Republic. Already within the first year of its operation, about 5200 insolvencies were commenced. This number rose, however, immensely in...
2015 / Iveta Mrázová, Peter Zvirinský -
High utility-itemset mining and privacy-preserving utility mining
Summary In recent decades, high-utility itemset mining (HUIM) has emerging a critical research topic since the quantity and profit factors are both concerned to mine the high-utility itemsets (HUIs). Generally, data mining is commonly used to...
2015 / Jerry Chun-Wei Lin, Wensheng Gan, Philippe Fournier-Viger, Lu Yang, Qiankun Liu, et al. -
Quantitative Analysis of Kernel Principal Components and Kernel Fishers Based Face Recognition Algorithms Using Hybrid Gaborlets
Abstract Face recognition is a genre of biometric method used to discern the face of a person from a set of databases. Procuring a low-dimensional feature with aggrandized discriminatory power is of pre-eminent importance to face recognition. In...
2015 / B. Bhaskar, P.S. Anushree, S. Divya Shree, K.V. Mahendra Prashanth -
Methods of Compression of Digital Holograms
Abstract Speed up of transmission of information about 3D-scenes and reducing of archival memory size required to store it, are important for surveillance systems and biomedical applications. For solution of these tasks, methods of digital hologram...
2015 / E.A. Kurbatova, P.A. Cheremkhin, N.N. Evtikhiev, V.V. Krasnov, S.N. Starikov -
Intelligence Amplification in Distance Learning through the Binary Tree of Question-answer System
Abstract The pedagogical science develops together with the information technologies. Advanced theoretical and practical exploratory works of scientists in smart information systems are looked for that can be implemented with the current capacities...
2015 / Olga Popova, Boris Popov, Vladimir Karandey -
The Effectiveness of Integrating Somatosensory Technology into Nuclear Energy Education Learning
Abstract Introductory video games have become an attractive form of entertainment and have surpassed television viewing as a preferred sedentary activity choice for users. Introductory video games are more and more popular for users studying...
2015 / Yen-Ping Huang, Hsin-Wen Wei, Tseng-Yi Chen, Nai-Yuan Jhang, Chun Chen, et al. -
Impact of Signal-Strength on Trusted and Secure Clustering in Mobile Pervasive Environment
Abstract This Proposed work is further extension of our previous work, cluster based Soft Security trust metric evaluation in Mobile Pervasive Environment. Pervasive computing has the potential to provide low cost, high performance, and user centric ...
2015 / Madhu Sharma Gaur, Bhaskar Pant -
Adaptive Pedestrian Detection in Infrared Images Using Background Subtraction and Local Thresholding
Abstract Infrared (IR) imaging is the order of the day with potential real life applications such as surveillance, defence, non-military applications and so on. Low contrast, poor illumination due to capturing devices and moderate to low...
2015 / Rajkumar Soundrapandiyan, P.V.S.S.R. Chandra Mouli -
Model of Collaborative UAV Swarm Toward Coordination and Control Mechanisms Study
Abstract In recent years, thanks to the low cost of deploying, maintaining an Unmanned Aerial Vehicle (UAV) system and the possibility to operating them in areas inaccessible or dangerous for human pilots, UAVs have attracted much research attention ...
2015 / Xueping Zhu, Zhengchun Liu, Jun Yang -
Power Aware Cooperation Enforcement MANET Routing Protocols
Abstract Mobile Ad hoc network (MANET) is a self-organizing multi-hop wireless network, where the topology of the network changes dynamically. Security attacks and limited energy are the most critical issues in MANETs. Meanwhile, to save energy,...
2015 / Abeer Ghander, Eman Shaaban -
Active Learning Attributes of Wii Peripherals in CS Education
Abstract The Wii console and its attendant peripheral hardware (Wii Controller, the “Nunchuck” expansion, the WiiMotionPlus, and the Wii Balance Board) are dropping in price, and are easily available. This makes it an ideal choice for CS...
2014 / Veljko B. Petrović, Dragan Ivetić -
Approximate String Search in Large Spatial Database
Abstract Applications are featured with both text and location information, which leads to a search like: spatial approximate string search (SAS). Mainly four issues are identified in the general area of SAS. They are: (i) Spatial approximate string ...
2015 / M. TamilSelvi, R. Renuga -
Intuitive considerations clarifying the origin and applicability of the Benford law
Abstract The diverse applications of the Benford law attract investigators working in various fields of physics, biology and sociology. At the same time, the groundings of the Benford law remain obscure. Our paper demonstrates that the Benford law...
2015 / G. Whyman, E. Shulzinger, Ed. Bormashenko