Computer and information sciences topic list of research papers
-
A Cloud Service Broker with Legal-Rule Compliance Checking and Quality Assurance Capabilities
Abstract The ICT industry, and specifically critical sectors such as healthcare, transportation, energy and government require as mandatory the compliance of the ICT systems and services with legislation and regulation, as well as with standards. In ...
2015 / Emiliano Casalicchio, Monica Palmirani -
An Energy-Aware Routing Protocol for Wireless Sensor Networks Based on New Combination of Genetic Algorithm & k-means
Abstract Wireless Sensor Networks (WSNs) consist of large number of sensors which having capabilities such as sensing, computing, and communicating. Beside these features, sensors have limited computational and communication power. Therefore, energy ...
2015 / Behrang Barekatain, Shahrzad Dehghani, Mohammad Pourzaferani -
Modeling acquaintance networks based on balance theory2014 / Vida Vukašinović, Jurij Šilc, Risth Škrekovski
-
Hyperrectangles Selection for Monotonic Classification by Using Evolutionary Algorithms2016 / Javier García, Adnan M. AlBar, Naif R. Aljohani, José-Ramón Cano, Salvador García
-
Automatic Classification of Cardiac Views in Echocardiogram Using Histogram and Statistical Features
Abstract Automatic classification cardiac views is the first step to automate wall motion analysis, computer aided disease diagnosis, measurement computation etc. In this paper a fully automatic classification of cardiac view in echocardiogram is...
2015 / G.N. Balaji, T.S. Subashini, N. Chidambaram -
A Method for Text Steganography Using Malayalam Text
Abstract Recent researches regarding information hiding is mostly concentrating on Linguistic steganography. In this paper, a method to steganography is proposed with an Indian local language, Malayalam. The proposed method consists of custom...
2015 / P.M. Vidhya, Varghese Paul -
Performance Test of Vitamin B6 Test Kit Candidate
Abstract Vitamin B6 test kit was designed as an alternative, affordable and user-friendly analysis tool for small and medium enterprises which process bananas. Its performance was evaluated twice with 70 respondents and the measurements considered...
2015 / Teuku Beuna Bardant, Anastasia Fitria Devi, Zatil Afrah Athailah, Wirasuwasti Nugrahani, Ahmad Latiful Qolbi, et al. -
A Distributed and Flexible Architecture for Internet of Things
Abstract The great breakthrough in technological devices has lead to the migration of actual Internet to the Internet of Things. There are merely trillions of smart dynamic objects that will be connected to the Internet and that interact and...
2015 / Ghofrane Fersi -
Secure DNA data compression using algebraic curves2015 / I. Soto, I. Jiron, A. Valencia, R. Carrasco
-
Automatic detection of non-convulsive seizures: A reduced complexity approach
Abstract Detection of non-convulsive seizures (NCSz) is a challenging task because they lack convulsions, meaning no physical visible symptoms are there to detect the presence of a seizure activity. Hence their diagnosis is not easy, also continuous ...
2015 / Tazeem Fatma, Omar Farooq, Yusuf U. Khan, Manjari Tripathi, Priyanka Sharma -
5G mobile technology: A survey
Abstract All new 5G mobile technology is expected to be operational by 2020. This time, it is therefore crucial to know the direction of research and developments enabling 5G technology. This paper provides an inclusive and comprehensive analysis of ...
2016 / Rupendra Nath Mitra, Dharma P. Agrawal -
Autonomous Tour Guide Robot using Embedded System Control
Abstract This paper describes an interactive autonomous tour guide robot designed to guide visitors through Asia Pacific University Engineering Labs. Although tour guide robots with various self-localization abilities such as mapping has been...
2015 / Alpha Daye Diallo, Suresh Gobee, Vickneswari Durairajah -
A Signature-based Data Authentication Method with Bitmap-based Transformed Datain Database Outsourcing
Abstract Due to the advancement in cloud computing technology, the research on database outsourcing has been actively done. In database outsourcing, because a service provider might be untrusted or compromised, two issues of data security emerge:...
2015 / Miyoung Jang, Min Yoon, Youngho Song, Jae-Woo Chang -
Analysis of a Vector Space Model, Latent Semantic Indexing and Formal Concept Analysis for Information Retrieval2013 / Ch. Aswani Kumar, M. Radvansky, J. Annapurna
-
Fusion of geometric and texture features for finger knuckle surface recognition
Abstract Hand-based biometrics plays a significant role in establishing security for real-time environments involving human interaction and is found to be more successful in terms of high speed and accuracy. This paper investigates on an integrated...
2015 / K. Usha, M. Ezhilarasan -
Unobtrusive Tremor Detection and Measurement via Human-Machine Interaction
Abstract Elderly people possess enhanced working experience during their living. Therefore it is a big value loss for companies, when such individuals get into retirement. Through the development of a novel workspace, which allows elderly people to...
2015 / J. Güttler, R. Shah, C. Georgoulas, T. Bock -
Modelling discrete longitudinal data using acyclic probabilistic finite automata
Abstract Acyclic probabilistic finite automata (APFA) constitute a rich family of models for discrete longitudinal data. An APFA may be represented as a directed multigraph, and embodies a set of context-specific conditional independence relations...
2015 / Smitha Ankinakatte, David Edwards -
NURBS-based geometric inverse reconstruction of free-form shapes
Abstract In this study, a geometric inverse algorithm is proposed for reconstructing free-form shapes (curves and surfaces) in space from their arbitrary perspective images using a Non-Uniform Rational B-Spline (NURBS) model. In particular, NURBS...
2015 / Deepika Saini, Sanjeev Kumar, Tilak Raj Gulati -
Reconstructing David Huffman's Origami Tessellations 12013 / Eli Davis, Erik D. Demaine, Martin L. Demaine, Jennifer Ramseyer
-
Automatic Vectorization of Interleaved Data Revisited2015 / Andrew Anderson, Avinash Malik, David Gregg