Computer and information sciences topic list of research papers
-
Automatic Answer Assessment in LMS Using Latent Semantic Analysis
Abstract E-Learning uses systems like Learning Management Systems (LMSs), to support and enhance teaching-learning process. When we compared some of the popular LMSs, a lack of efficient mechanisms to assess descriptive answers like long answers and ...
2015 / N.T. Thomas, Ashwini Kumar, Kamal Bijlani -
Usability Evaluation of a Health Care Application Based on IPTV
Abstract This paper presents the usability evaluation of the AAL@MEO, an application running in a commercial service of Internet Protocol TV that integrates technological solutions to support home care. The evaluation methodology comprises the...
2015 / Vitor Simões Ribeiro, Ana Isabel Martins, Alexandra Queirós, Anabela G. Silva, Nelson Pacheco Rocha -
Preliminary Study on the 3D Digitization of Millimeter Scale Products by Means of Photogrammetry
Abstract Photogrammetry is a passive 3D digitization technique, mainly oriented to large sized objects, since its origins are in architectural and civil engineering. With the continuos development of digital imaging hardware and software,...
2015 / Gianluca Percoco, Fulvio Lavecchia, Antonio J. Sánchez Salmerón -
The Implementation of Hand Detection and Recognition to Help Presentation Processes
Abstract This research was conducted with the aim of utilizing the human hands as an object to operate computers. It is intended to support and use technologies especially in the field of education for helping teachers to do presentation with ease....
2015 / Rhio Sutoyo, Bellinda Prayoga, Fifilia, Dewi Suryani, Muhsin Shodiq -
Dialogical Self on Virtual Reality Systems: Presence and Embodiment in Human Situated Interaction
Abstract Presence is a concept that is widely used in academic research studies and involves human interaction in Virtual Reality (VR). It is considered fundamental to any human experience in virtual environments. In order to explore the fundamental ...
2015 / Ana Carol Pontes de França, Marcelo Márcio Soares -
Dendritic Cell Algorithm for Mobile Phone Spam Filtering
Abstract With the revolution of mobile devices and their applications, significant improvements have been witnessed over years to support new features in addition to normal phone communication including web browsing, social networking and...
2015 / Ali A. Al-Hasan, El-Sayed M. El-Alfy -
A comprehensive survey of handwritten document benchmarks: structure, usage and evaluation2015 / Raashid Hussain, Ahsen Raza, Imran Siddiqi, Khurram Khurshid, Chawki Djeddi
-
Design Framework for Multifunctional Additive Manufacturing: Placement and Routing of Three-Dimensional Printed Circuit Volumes2015 / A. Panesar, D. Brackett, I. Ashcroft, R. Wildman, R. Hague
-
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks2012 / HyungJun Kim
-
Security in Multi-Agent Systems
Abstract Multi-agent systems become more and more popular due to successful implementations in different fields. However, there is a number of threats that can compromise security of the agent and jeopardize systems security. Therefore, security...
2015 / Yaqin Hedin, Esmiralda Moradian -
A Communication Protocol for Different Communication Technologies in Cyber-Physical Systems
Abstract The world is moving towards a time where more and more objects, like Internet of Things, will be connected in cyber-physical systems. These objects need excellent tools to collect information from sources in the surrounding environment. By...
2015 / Mathias Persson, Anne Håkansson -
Improving package structure of object-oriented software using multi-objective optimization and weighted class connections
Abstract The software maintenance activities performed without following the original design decisions about the package structure usually deteriorate the quality of software modularization, leading to decay of the quality of the system. One of the...
2015 / Amarjeet, Jitender Kumar Chhabra -
Polar Business Design2014 / S. Caisse, B. Montreuil
-
Automated space allocation using mathematical techniques
Abstract This paper presents a systematic pathway for the floor plan design when given the shape of required floor plan, the list of spaces, the dimensions of each space and the weighted matrix of required adjacencies between the spaces. ...
2015 / Krishnendra Shekhawat -
Reliability of BPMN Business Processes
Abstract Organizations increasingly use business processes and the Business Process Model and Notation (BPMN) to model them. Taking into account the relevance of Quality of Service (QoS) aspects in business processes, we can find in the literature...
2015 / Ana Respício, Dulce Domingos -
Collecting road traffic information using vehicular ad hoc networks2016 / Singha Wongdeethai, Peerapon Siripongwutikorn
-
Seamless Vertical Handoff using Invasive Weed Optimization (IWO) algorithm for heterogeneous wireless networks
Abstract Heterogeneous wireless networks are an integration of two different networks. For better performance, connections are to be exchanged among the different networks using seamless Vertical Handoff. The evolutionary algorithm of invasive weed...
2016 / T. Velmurugan, Sibaram Khara, S. Nandakumar, B. Saravanan -
$$\mathcal {IRORS}$$ IRORS : intelligent recommendation of RSS feeds2016 / Nedia Araibi, Eya Ben Ahmed, Wahiba Karaa Ben Abdessalem
-
Semantic sensitive tensor factorization
Abstract The ability to predict the activities of users is an important one for recommender systems and analyses of social media. User activities can be represented in terms of relationships involving three or more things (e.g. when a user tags...
2015 / Makoto Nakatsuji, Hiroyuki Toda, Hiroshi Sawada, Jin Guang Zheng, James A. Hendler -
Is Symbolic Gestural Interaction Better for the Visual Attention?
Abstract Thanks to improvements of the last decades in the robotic field, small Unmanned Aerial Vehicle (sUAV) have become efficient remote sensors for infantrymen on the battlefield. Their increasing mobility and autonomy allow acquiring essential...
2015 / Florent Taralle, Alexis Paljic, Sotiris Manitsaris, Jordane Grenier, Christophe Guettier