for Journals by Title or ISSN
for Articles by Keywords
  Subjects -> ENGINEERING (Total: 2298 journals)
    - CHEMICAL ENGINEERING (192 journals)
    - CIVIL ENGINEERING (192 journals)
    - ELECTRICAL ENGINEERING (104 journals)
    - ENGINEERING (1209 journals)
    - HYDRAULIC ENGINEERING (55 journals)
    - INDUSTRIAL ENGINEERING (69 journals)
    - MECHANICAL ENGINEERING (92 journals)

ENGINEERING (1209 journals)                  1 2 3 4 5 6 7 | Last

Showing 1 - 200 of 1205 Journals sorted alphabetically
3 Biotech     Open Access   (Followers: 7)
3D Research     Hybrid Journal   (Followers: 19)
AAPG Bulletin     Hybrid Journal   (Followers: 7)
AASRI Procedia     Open Access   (Followers: 15)
Abstract and Applied Analysis     Open Access   (Followers: 3)
Aceh International Journal of Science and Technology     Open Access   (Followers: 2)
ACS Nano     Full-text available via subscription   (Followers: 252)
Acta Geotechnica     Hybrid Journal   (Followers: 7)
Acta Metallurgica Sinica (English Letters)     Hybrid Journal   (Followers: 5)
Acta Polytechnica : Journal of Advanced Engineering     Open Access   (Followers: 2)
Acta Scientiarum. Technology     Open Access   (Followers: 3)
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Active and Passive Electronic Components     Open Access   (Followers: 7)
Adaptive Behavior     Hybrid Journal   (Followers: 11)
Adıyaman Üniversitesi Mühendislik Bilimleri Dergisi     Open Access  
Adsorption     Hybrid Journal   (Followers: 4)
Advanced Engineering Forum     Full-text available via subscription   (Followers: 6)
Advanced Science     Open Access   (Followers: 5)
Advanced Science Focus     Free   (Followers: 3)
Advanced Science Letters     Full-text available via subscription   (Followers: 9)
Advanced Science, Engineering and Medicine     Partially Free   (Followers: 7)
Advanced Synthesis & Catalysis     Hybrid Journal   (Followers: 17)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Complex Systems     Hybrid Journal   (Followers: 7)
Advances in Engineering Software     Hybrid Journal   (Followers: 26)
Advances in Fuel Cells     Full-text available via subscription   (Followers: 16)
Advances in Fuzzy Systems     Open Access   (Followers: 5)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 11)
Advances in Heat Transfer     Full-text available via subscription   (Followers: 22)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 26)
Advances in Magnetic and Optical Resonance     Full-text available via subscription   (Followers: 9)
Advances in Natural Sciences: Nanoscience and Nanotechnology     Open Access   (Followers: 30)
Advances in Operations Research     Open Access   (Followers: 11)
Advances in OptoElectronics     Open Access   (Followers: 5)
Advances in Physics Theories and Applications     Open Access   (Followers: 12)
Advances in Polymer Science     Hybrid Journal   (Followers: 41)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Remote Sensing     Open Access   (Followers: 40)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Aerobiologia     Hybrid Journal   (Followers: 2)
African Journal of Science, Technology, Innovation and Development     Hybrid Journal   (Followers: 5)
AIChE Journal     Hybrid Journal   (Followers: 32)
Ain Shams Engineering Journal     Open Access   (Followers: 5)
Akademik Platform Mühendislik ve Fen Bilimleri Dergisi     Open Access   (Followers: 1)
Alexandria Engineering Journal     Open Access   (Followers: 1)
AMB Express     Open Access   (Followers: 1)
American Journal of Applied Sciences     Open Access   (Followers: 28)
American Journal of Engineering and Applied Sciences     Open Access   (Followers: 11)
American Journal of Engineering Education     Open Access   (Followers: 9)
American Journal of Environmental Engineering     Open Access   (Followers: 17)
American Journal of Industrial and Business Management     Open Access   (Followers: 23)
Analele Universitatii Ovidius Constanta - Seria Chimie     Open Access  
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of Regional Science     Hybrid Journal   (Followers: 8)
Annals of Science     Hybrid Journal   (Followers: 7)
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applicable Analysis: An International Journal     Hybrid Journal   (Followers: 1)
Applied Catalysis A: General     Hybrid Journal   (Followers: 6)
Applied Catalysis B: Environmental     Hybrid Journal   (Followers: 18)
Applied Clay Science     Hybrid Journal   (Followers: 5)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Magnetic Resonance     Hybrid Journal   (Followers: 4)
Applied Nanoscience     Open Access   (Followers: 8)
Applied Network Science     Open Access   (Followers: 1)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Physics Research     Open Access   (Followers: 3)
Applied Sciences     Open Access   (Followers: 2)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 5)
Arabian Journal for Science and Engineering     Hybrid Journal   (Followers: 5)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Archives of Foundry Engineering     Open Access  
Archives of Thermodynamics     Open Access   (Followers: 7)
Arkiv för Matematik     Hybrid Journal   (Followers: 1)
ASEE Prism     Full-text available via subscription   (Followers: 3)
Asia-Pacific Journal of Science and Technology     Open Access  
Asian Engineering Review     Open Access  
Asian Journal of Applied Science and Engineering     Open Access   (Followers: 1)
Asian Journal of Applied Sciences     Open Access   (Followers: 2)
Asian Journal of Biotechnology     Open Access   (Followers: 8)
Asian Journal of Control     Hybrid Journal  
Asian Journal of Current Engineering & Maths     Open Access  
Asian Journal of Technology Innovation     Hybrid Journal   (Followers: 8)
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
ATZagenda     Hybrid Journal  
ATZextra worldwide     Hybrid Journal  
Australasian Physical & Engineering Sciences in Medicine     Hybrid Journal   (Followers: 1)
Australian Journal of Multi-Disciplinary Engineering     Full-text available via subscription   (Followers: 2)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 9)
Avances en Ciencias e Ingeniería     Open Access  
Balkan Region Conference on Engineering and Business Education     Open Access   (Followers: 1)
Bangladesh Journal of Scientific and Industrial Research     Open Access  
Basin Research     Hybrid Journal   (Followers: 5)
Batteries     Open Access   (Followers: 6)
Bautechnik     Hybrid Journal   (Followers: 1)
Bell Labs Technical Journal     Hybrid Journal   (Followers: 23)
Beni-Suef University Journal of Basic and Applied Sciences     Open Access   (Followers: 4)
BER : Manufacturing Survey : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Motor Trade Survey     Full-text available via subscription   (Followers: 1)
BER : Retail Sector Survey     Full-text available via subscription   (Followers: 2)
BER : Retail Survey : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Survey of Business Conditions in Manufacturing : An Executive Summary     Full-text available via subscription   (Followers: 3)
BER : Survey of Business Conditions in Retail : An Executive Summary     Full-text available via subscription   (Followers: 4)
Bharatiya Vaigyanik evam Audyogik Anusandhan Patrika (BVAAP)     Open Access   (Followers: 1)
Biofuels Engineering     Open Access   (Followers: 1)
Biointerphases     Open Access   (Followers: 1)
Biomaterials Science     Full-text available via subscription   (Followers: 10)
Biomedical Engineering     Hybrid Journal   (Followers: 15)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 14)
Biomedical Engineering Letters     Hybrid Journal   (Followers: 5)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 18)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 34)
Biomedical Engineering: Applications, Basis and Communications     Hybrid Journal   (Followers: 5)
Biomedical Microdevices     Hybrid Journal   (Followers: 9)
Biomedical Science and Engineering     Open Access   (Followers: 4)
Biomedizinische Technik - Biomedical Engineering     Hybrid Journal  
Biomicrofluidics     Open Access   (Followers: 4)
BioNanoMaterials     Hybrid Journal   (Followers: 2)
Biotechnology Progress     Hybrid Journal   (Followers: 39)
Boletin Cientifico Tecnico INIMET     Open Access  
Botswana Journal of Technology     Full-text available via subscription   (Followers: 1)
Boundary Value Problems     Open Access   (Followers: 1)
Brazilian Journal of Science and Technology     Open Access   (Followers: 2)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10)
Bulletin of Canadian Petroleum Geology     Full-text available via subscription   (Followers: 14)
Bulletin of Engineering Geology and the Environment     Hybrid Journal   (Followers: 14)
Bulletin of the Crimean Astrophysical Observatory     Hybrid Journal  
Cahiers, Droit, Sciences et Technologies     Open Access  
Calphad     Hybrid Journal  
Canadian Geotechnical Journal     Hybrid Journal   (Followers: 30)
Canadian Journal of Remote Sensing     Full-text available via subscription   (Followers: 44)
Case Studies in Engineering Failure Analysis     Open Access   (Followers: 8)
Case Studies in Thermal Engineering     Open Access   (Followers: 4)
Catalysis Communications     Hybrid Journal   (Followers: 6)
Catalysis Letters     Hybrid Journal   (Followers: 2)
Catalysis Reviews: Science and Engineering     Hybrid Journal   (Followers: 8)
Catalysis Science and Technology     Free   (Followers: 7)
Catalysis Surveys from Asia     Hybrid Journal   (Followers: 3)
Catalysis Today     Hybrid Journal   (Followers: 7)
CEAS Space Journal     Hybrid Journal   (Followers: 1)
Cellular and Molecular Neurobiology     Hybrid Journal   (Followers: 3)
Central European Journal of Engineering     Hybrid Journal   (Followers: 1)
CFD Letters     Open Access   (Followers: 6)
Chaos : An Interdisciplinary Journal of Nonlinear Science     Hybrid Journal   (Followers: 2)
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
Chinese Journal of Engineering     Open Access   (Followers: 2)
Chinese Science Bulletin     Open Access   (Followers: 1)
Ciencia e Ingenieria Neogranadina     Open Access  
Ciencia en su PC     Open Access   (Followers: 1)
Ciencias Holguin     Open Access   (Followers: 1)
CienciaUAT     Open Access  
Cientifica     Open Access  
CIRP Annals - Manufacturing Technology     Full-text available via subscription   (Followers: 11)
CIRP Journal of Manufacturing Science and Technology     Full-text available via subscription   (Followers: 14)
City, Culture and Society     Hybrid Journal   (Followers: 24)
Clay Minerals     Full-text available via subscription   (Followers: 10)
Clean Air Journal     Full-text available via subscription   (Followers: 2)
Coal Science and Technology     Full-text available via subscription   (Followers: 3)
Coastal Engineering     Hybrid Journal   (Followers: 11)
Coastal Engineering Journal     Hybrid Journal   (Followers: 5)
Coatings     Open Access   (Followers: 4)
Cogent Engineering     Open Access   (Followers: 2)
Cognitive Computation     Hybrid Journal   (Followers: 4)
Color Research & Application     Hybrid Journal   (Followers: 1)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 14)
Combustion, Explosion, and Shock Waves     Hybrid Journal   (Followers: 13)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Numerical Methods in Engineering     Hybrid Journal   (Followers: 2)
Components, Packaging and Manufacturing Technology, IEEE Transactions on     Hybrid Journal   (Followers: 27)
Composite Interfaces     Hybrid Journal   (Followers: 6)
Composite Structures     Hybrid Journal   (Followers: 268)
Composites Part A : Applied Science and Manufacturing     Hybrid Journal   (Followers: 193)
Composites Part B : Engineering     Hybrid Journal   (Followers: 274)
Composites Science and Technology     Hybrid Journal   (Followers: 192)
Comptes Rendus Mécanique     Full-text available via subscription   (Followers: 2)
Computation     Open Access  
Computational Geosciences     Hybrid Journal   (Followers: 15)
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 8)
Computer Science and Engineering     Open Access   (Followers: 19)
Computers & Geosciences     Hybrid Journal   (Followers: 29)
Computers & Mathematics with Applications     Full-text available via subscription   (Followers: 6)
Computers and Electronics in Agriculture     Hybrid Journal   (Followers: 4)
Computers and Geotechnics     Hybrid Journal   (Followers: 11)
Computing and Visualization in Science     Hybrid Journal   (Followers: 6)
Computing in Science & Engineering     Full-text available via subscription   (Followers: 32)
Conciencia Tecnologica     Open Access  
Concurrent Engineering     Hybrid Journal   (Followers: 3)
Continuum Mechanics and Thermodynamics     Hybrid Journal   (Followers: 7)
Control and Dynamic Systems     Full-text available via subscription   (Followers: 9)
Control Engineering Practice     Hybrid Journal   (Followers: 43)
Control Theory and Informatics     Open Access   (Followers: 8)
Corrosion Science     Hybrid Journal   (Followers: 25)
Corrosion Series     Full-text available via subscription   (Followers: 6)
CT&F Ciencia, Tecnologia y Futuro     Open Access   (Followers: 1)

        1 2 3 4 5 6 7 | Last

Journal Cover Computer Science and Engineering
  [19 followers]  Follow
  This is an Open Access Journal Open Access journal
   ISSN (Print) 2163-1484 - ISSN (Online) 2163-1492
   Published by SAP Homepage  [105 journals]
  • Automatic Gender Identification Using Fusion of Generative and
           Discriminative Classifiers and Clustering of Spekaers from the Same Gender

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  M. A. Keyvanrad,Mohammad Mehdi HomayounpourThis paper proposes a two layer classifier fusion technique using clustering of training data from speakers of the same gender for automatic gender identification (AGI). The first layer is an acoustic classification layer for mapping MFCC and pitch acoustic feature space to score space. In this layer, a divisive clustering is proposed for dividing the speakers from each gender to some classes, where speakers in each class have similar vocal articulatory characteristics. Finally, the best structure could map 22 feature coefficients to 5 likelihood scores as new features. The second layer is a back-end classifier that receives the vectors of fused likelihood scores from the first layer. This means that the new feature coefficients are used in the second layer. GMM, SVM and MLP classifiers were evaluated in the middle and back-end layers. 96.53% gender classification accuracy was obtained on OGI multilingual corpus which is much better than the performance obtained by traditional AGI methods.
      PubDate: 10/17/2012 17:18:03
  • A Study on the Effect of Codebook and CodeVector Size on Image Retrieval
           Using Vector Quantization

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  B. Janet,A. V. ReddyIn this paper, we study the effect of codebook size and codevector size using vector quantization (VQ) for retrieval of images, not restricted to the compressed domain. We use the image index model, to study the precision and recall values for different similarity measures. The study presents the following findings. The codebook size and codevector size are directly proportional to the precision value for a locally global codebook, but are dependent on the size of the source image for a local codebook. The Encoding Distortion similarity measure calculated from the local codebook produces the highest precision for the same recall over all other similarity measures. The Histogram Intersection using locally global codebook gives higher precision for higher codebook sizes. It is established that VQ can be used to create a single valued feature to represent the image in the image index model. This feature based on distortion measure can be effectively used for image retrieval based on the experimental results
      PubDate: 10/17/2012 17:18:03
  • Data Warehouse Scripts Generation Through MDA Cartridge

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  G. Zimbrão,J. M. D. Souza,R. Salvador,L. A. Fernandes,V. Fagunde,Beatriz Helena NetoIncreasing market competitiveness has led entrepreneurs to require more and more information from Information Technology areas to allow for efficient decision-making. Two alternatives to solving this problem are allied in this work: use of Model Driven Architecture (MDA) and Data Warehousing (DW). This research developed and tested a MDA cartridge. It creates scripts for automatic generation and loads DW based databases on the Online Transaction Processing Model (OLTP) through a MDA tool. With the use of this approach any change in the model would be a corresponding change in the scripts without manual rework.
      PubDate: 10/17/2012 17:18:03
  • A Model Software Reuse Repository with an Intelligent Classification and
           Retrieval Technique

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  P. Niranjan,C.V. Guru RaoThe essence of software reuse is the use of engineering knowledge or artefacts from existing software components to build a new system. Software reuse can significantly improve the quality of software products and reduces the overall development cost. Software reuse repository must be designed and developed in such a way that they can easily locate the components based on the requirements of the developers. This work proposes a new methodology for efficient classification and retrieval of multimedia software components based on user requirements by using attribute classification scheme with genetic algorithm. In this intelligent classification we use Genetic algorithm that performs the classification of reusable software components in an intelligent manner and retrieves the components based on the requirements of the developers.
      PubDate: 10/17/2012 17:18:03
  • Different Approaches in Pattern Recognition

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Vinita Dutt,Vikas Chadhury,Imran KhanThe objective of this paper is to discuss and compare some aspect of pattern recognition, among the various framework in which pattern recognition has been traditional formulated. The primary goal of pattern recognition is supervised or unsupervised classification. More recently, neural network techniques and methods imported from statistical learning theory have been receiving increasing attention. The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples, and performance evaluation
      PubDate: 10/17/2012 17:18:03
  • PID Type Stabilizer Design for Multi Machine Power System Using IPSO

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Hossein Shayeghi,Ali Ghasemi,Heidarali HeidaraliThis paper presents a modified Iteration Particle Swarm Optimization (IPSO) algorithm to tune optimal gains of a Proportional Integral Derivative (PID) type multiple stabilizers and non-smooth nonlinear parameters (such as saturation limits) for multi machine power system, simultaneously. The problem of robustly tuning of PID based multiple stabilizer design is formulated as an optimization problem according to the time domain-based objective function which is solved by a modified strategy of PSO algorithm called IPSO technique that has a strong ability to find the most optimistic results. In the proposed algorithm, a new index named, Iteration Best, is incorporated in standard Particle Swarm Optimization (PSO) to enrich the searching behavior, solution quality and to avoid being trapped into local optimum. To demonstrate the effectiveness and robustness of the proposed stabilizers, the design process takes a wide range of operating conditions and system configuration into account. The effectiveness of the proposed stabilizer is demonstrated through nonlinear simulation studies and some performance indices on a four- machine two areas power system in comparison with the classical PSO and PSO with Time-Varying Acceleration Coefficients (PSO-TVAC) based optimized PID type stabilizers. The results of these studies show that the proposed IPSO based optimized PID type stabilizers have an excellent capability in damping power system inter-area oscillations and enhance greatly the dynamic stability of the power system for a wide range of loading condition. Also, it is superior that of the PSO and PSO-TVAC based tuned stabilizers in terms of accurateness, convergence and computational effort
      PubDate: 10/17/2012 17:18:03
  • Design of Scheduling Algorithm for QoS Management on WiMAX Networks

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Hattab Guesmi,Sassi Maaloul,Rached TourkiThe apparition of high speed networks and the fast evolution of communication offer currently an unlimited access to an important number of applications. The applications constraints (videoconferencing, communications, VoIP, applications multimedia, etc…) are more complex for wireless systems because they require more constraints: high throughput, low packet loss, low latencies and gigue delays. All present flows in the WiMAX network must share the same medium capacity. Therefore, WiMAX is required to fulfill QoS requirements of any application and information passing over the network. Several mechanisms for QoS management have been studied, among these mechanisms there is an appropriate scheduler implementation for packets carried on WiMAX network which can increase QoS achievement possibility.WiMAX module used in our simulation deploys scheduling algorithms (FIFO, FQ, DRR, and WFQ) to deal with packets transmission. This paper is aimed at evaluating these algorithms in relation with WiMAX network performance. Performance metrics reported in this work are packet loss, throughput, and average delay. This paper tries to design an architecture which is able to convey the data belonging to various classes of traffic that guarantee their respective needs. Simulation results can show the performance of scheduling schemes used in this architecture
      PubDate: 10/17/2012 17:18:03
  • A Novel Scrambling Algorithm for Bio-Data Hiding Technique

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Mohamed Mostafa Abd Allah,Gasim AlandjaniIn this paper we will overview the use of data hiding techniques in digital images. In particular we will describe how one can use steganography to hide biometric information in a digital image. This proposed technique proposes a quite simple solution for inserting a secure authentication watermarking in dispersed-dot halftone images. This technique explain how, the hidden biometric data are extracted accurately from the carrier image using a secret key and describe how it can be applied to any kind of binary images including clustered-dot halftones. Furthermore, this technique explains how data are hidden in the host image in an adaptive way to minimize possible degradations to that image. The proposed technique not only provides a better way for embedding large amounts of data into cover images with imperceptions, but also offers an easy way to accomplish secrecy. This method provides better results as compared to LSB replacement method where the distortions are spread all over the image.
      PubDate: 10/17/2012 17:18:03
  • A New Service Oriented Arcitucture for Data Hiding

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Sepideh Ravanbakhsh,Ravanbakhsh FesharakiThe paper illustrates a distributed frame work based on service oriented architecture, on which a logical transparent steganographic layer is developed. In this approach the related works on steganography and its anatomy is semantically studied and broken down into some independent services which are allocated on a network infrastructure. According to the underlying service oriented architecture (SOA), these services are able to communicate to each other or the other system services through a common language to dynamically form the desired compositions. This structure not only distributes the overall load of the process, it also considers some important system attributes such as reusability, simplicity, outsourcing, maintainability, flexibility and availability. Because of the open structure of the system, varieties of steganography algorithms can be supported for varieties of secrets, according to an evaluation strategy which is also considered as a service on the network. To clarify the proposed approach, the related ADL model together with an example scenario is expressed
      PubDate: 10/17/2012 17:18:03
  • Fuzzy PSS Design for a Multi-machine Power System Using Improved Genetic

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  H. Shayeghi,H. A. Shayanfar,O. AbediniaThis paper addresses a robust fuzzy controller to damp low frequency oscillation following disturbances in power systems. In this research the fuzzy controller is used as a Power System Stabilizer (PSS) to improve the stability in power system. The rule base of the proposed PSS is optimized offline automatically by the improved Genetic Algorithm (GA). Usually in a rule base fuzzy control system, exact tuning of fuzzy rule base is very important for achieving the desired level of robust performance. Hence, the rule set of fuzzy PID based stabilizer is tuned by GA to reduce fuzzy system effort and find optimal stabilizer. The effectiveness of the proposed method is tested on the New England 10-machine 39-bus standard power system and compared with the Tabu Search based tuned PSS under different loading condition through ITAE and FD performance indices.
      PubDate: 10/17/2012 17:18:03
  • Method of Adding Telephone Interface to Web Service (Implication to the
           Self-Care Support System for Life-Style Diseases)

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Masatoshi Kawarasaki,Kyoji Konishi,Makoto Ohara,Tetsuya IgarashiVarious web services are offered over the internet and forms the social infrastructure indispensable to our daily life. Many of healthcare systems developed so far are also offered as web service. However, user interface of web services that require web access makes obstacle to elderly or inexperienced users. As a mean to mitigate such digital divide, we developed a generic method of adding telephone interface to web service and implemented it to the self-care support system ‘iSMBG’ for life-style diseases. In our method, by making software PBX cooperate with web service, input/output to web service can be achieved by ordinary telephone device and users can talk with web service interactively. In parallel to implement telephone interface to iSMBG, we reorganized the architecture and data structure of the original iSMBG web system to be more flexible in adding new functions and data types. Evaluation experiment revealed that the proposed method endures practical use.
      PubDate: 10/17/2012 17:18:03
  • An Intelligent Energy-aware Routing Protocol in Mobile Ad-hoc Networks

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Leila Rezaei,Shahram Jamali,Sajjad Jahanbakhsh GudakahrizMobile ad hoc networks (MANETs) are infrastructure free networks created by wireless mobile devices with restricted battery life. Limited battery capacity and dynamic topology of MANETs put forward routing issue as one of highly active research areas. TORA is a reactive with highly adaptive routing protocol for MANETs, but it has low life time and this cause its performance is low. Binary Particle Swarm Optimization algorithm (BPSO) is an optimization algorithm that it is better for continues problems. Hence in this paper we employ BPSO to improve TORA and present a new routing protocol called IMP-TORA. By simulation in NS-2 simulator environment we show that IMP-TORA has better performance comparing with TORA.
      PubDate: 10/17/2012 17:18:03
  • Effective Minimization of Ill-conditioned Functions

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Ekaterina M. Fedotova,Igor A. BrigadnovThe problem of minimization of ill-conditioned functions is considered. These functions are motivated by the limit analysis problem for dielectrics in powerful electric fields. From computing point of view a minimization of these functions is not following by standard methods because they are nonsmooth. Distinct ravine of objective function in combination with a high dimension variables requires a smooth regularisation of finite-dimensional problem. Convergence of heave-ball method in relation to it’s internal parameters and optimization parameters are studied in numerical computing environment and fourth-generation programming language Matlab.
      PubDate: 10/17/2012 17:18:03
  • Dial-a-Ride and Emergency Transportation Problems in Ambulance Services

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Jihène Jlassi,Jalel Euchi,Habib ChabchoubEmergency Department (ED) crowding is a common problem around the world. Process reengineering methods can be used to understand factors that contribute to crowding and provide tools to help alleviate crowding by improving service quality and patient flow. In the ED of Sfax hospital the patients’ dangerous case could be transported by ambulances. The purpose of this study is to demonstrate the application of Dial-A-Ride Problem (DARP). Computational experiments are performed on real case instances using CPLEX 10.0 on personal computer Intel® Core 2Duo CPU 2.0 GHZ.
      PubDate: 10/17/2012 17:18:03
  • A Z-Based Formalism to Specify Markov Chains

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Hassan Haghighi,Mahsa AfsharProbabilistic techniques in computer programs are becoming more and more widely used. Therefore, there is a big interest in methods for formal specification, verification, and development of probabilistic programs. In this paper, we introduce a Z-based formalism that assists us to specify probabilistic programs simply. This formalism is mainly based on a new notion of Z operation schemas, called probabilistic schemas, and a new set of schema calculus operations that can be applied on probabilistic schemas as well as ordinary operation schemas. To demonstrate the applicability of this formalism, we show that any probabilistic system modelled with Markov chains can be formally specified using the new formalism. More precisely, we show the resulting formalism can be used to specify any discrete-time and continues-time Markov chain. Since our formalism is obtained from enriching Z with probabilistic notions, unlike notations such as Markov chains, it is appropriate for modelling both probabilistic and functional requirements simultaneously. In addition, since we provide an interpretation of our formalism in the Z notation itself, we can still use Z tools, such as Z-eves to check the type and consistency of the written specifications formally. For the same reason, we can still use various methods and tools which are targeted for formal validation, verification and program development based on the Z specification language.
      PubDate: 10/17/2012 17:18:03
  • Real Object Recognition and Augmentation for n-Screen Convergence Service

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Jong-il Park,Jong-Hyoun Kim,Soo Hong KimIt is very challenging issue to converge n-screen media (Web, IPTV, SmartPhone) which are encouraged by AR, motion detection, hand shape recognition and non-marker object tracking technologies. Our services converge virtual/real world, individual/social relationship and in-door/out-door space pragmatically and intimately. We propose token-sharing mechanism among media for guarantying synchronization and continuity of playing contents. Web side service is main region for educational works. User develops his/her and friend’s territories as solving educational quests. Our mobile out-door service traces the objects by not a marker but a non-marker image tracking for according the feeling of realistic response during collaboration activities to users. The in-door IPTV service interacts with user’s intuition simultaneously thru motions and hands recognition technologies. These approaches will be one of initiative applications to make virtual and real space seamless, and will open the new field of learning system as last.
      PubDate: 10/17/2012 17:18:03
  • A Study of Distortion Effects on Fingerprint Matching

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Qinghai Gao,Xiaowen ZhangFingerprint matching often suffers from non-linear distortion. In this paper, we study the distortions of the fingerprints in three public available databases. To simulate the real scenarios of fingerprint matching, we distort fingerprint minutiae templates with the following three methods: 1) Randomly remove certain number of minutiae; 2) Randomly replace certain number of minutiae; 3) Randomly disturb the locations and orientations of the minutiae. Our experimental results show how and to what extent the fingerprint minutiae templates can be distorted without causing increases in false non-match rates and false match rates.
      PubDate: 10/17/2012 17:18:03
  • Aprendizaje de Secuencias de AcciÓN Para la Toma de Decisiones en
           Instalaciones DomÓTicas

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Vicente Botón-Fernánde,José Luis Redondo-Garcí,Adolfo Lozano-TelloConocer los hábitos de comportamiento de los individuos puede contribuir a la toma de decisiones en entornos centrados en los humanos. Este trabajo presenta un modelo de aprendizaje dentro del proyecto IntelliDomo, un sistema capaz de aprender los hábitos de los individuos y de realizar la toma de decisiones para generar automáticamente reglas de producción que anticipen las actividades periódicas y frecuentes de los usuarios. La capa de aprendizaje incorpora nuevas características como la detección de secuencias de acción, ya que los hábitos pueden definirse mejor si están relacionados con acciones encadenadas, creando relaciones de acción-acción.
      PubDate: 10/17/2012 17:18:03
  • Planeamento do Território e TIC: Tendências, Mudanças e

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Miguel Branco-Teixeira,Isabel Breda-VázquezResumo Atendendo às novas realidades territoriais resultantes do desenvolvimento da sociedade em rede, o artigo analisa as relações entre as Tecnologias de Informação e Comunicação (TIC) e o planeamento do território. Procura-se, essencialmente, compreender o impacto das TIC no planeamento do território, quer enquanto instrumento de trabalho dos profissionais de planeamento, quer enquanto veículo de comunicação com a população e com organismos públicos e privados. O artigo conclui identificando as principais tendências, mudanças e desafios que a utilização generalizada das TIC coloca na disciplina do planeamento do território.
      PubDate: 10/17/2012 17:18:03
  • RevisiÓN SistemÁTica Sobre la CertificaciÓN del Producto

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Moisés Rodríguez,Mario PiattiniLa calidad del software está adquiriendo durante los últimos años una gran importancia por la necesidad creciente de asegurar el correcto funcionamiento de los sistemas informáticos que cada vez están presentes en más ámbitos de nuestra vida. Este interés por la calidad ha estado centrado principalmente en los procesos que se siguen para el desarrollo del software, surgiendo certificaciones bajo normas como CMMI o ISO/IEC 15504. Sin embargo, cada día es mayor la preocupación por la calidad del propio producto software y no solo por la de los procesos que se utilizan para su desarrollo. De esta manera, han surgido normas como la familia ISO/IEC 25000, que definen un modelo de calidad y un proceso de evaluación para el producto. A pesar de ello, son menos extendidas las certificaciones que tomen como objeto el propio producto software y permitan asegurar el cumplimiento por parte de este de un conjunto de requisitos. En este sentido, la presente revisión sistemática tiene por objetivo identificar las iniciativas existentes sobre la certificación de los productos software, las características que presentan y el estado de madurez en su aplicación.
      PubDate: 10/17/2012 17:18:03
  • Uma Avaliação HeurÍStica da Usabilidade de Interfaces

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Ana Paula Afonso,Jorge Reis Lima,Manuel Perez CotaO PAI, Projeto de Avaliação de Interfaces, investiga o grau de usabilidade de interfaces aplicado num caso de estudo de um sítio Web de uma secretaria de uma Escola do Ensino Superior. O conceito de usabilidade de uma aplicação Web é crucial pois, um elevado grau de usabilidade, reflete que os utilizadores realizam as suas tarefas com facilidade, rapidez e satisfação. A avaliação da usabilidade procura identificar problemas específicos na interface e é em si mesma um processo que pode ser aplicado usando vários métodos. Um desses métodos de avaliação da usabilidade de um sítio Web, a avaliação heurística, é demonstrado através da verificação da conformidade do sítio Web com um conjunto de diretrizes desenvolvidas pela UserFocus1, e amplamente aceites e divulgadas na comunidade científica. Deu excelentes resultados embora tenha o inconveniente, pela sua completude e análise exaustiva, ser muito trabalhoso e demorado no seu uso total como se demonstra.
      PubDate: 10/17/2012 17:18:03
  • El Catálogo de Servicios Como Base Para la Gestión Financiera en Las
           Medianas, Pequeñas y Micro Empresas: Aproximación Práctica Mediante Una
           Biblioteca de Activos de Proceso

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Magdalena Arcilla,Jose A. Calvo-Manzano,Jose Antonio CerradaLast decades have brought a transformation in the use of Information Technologies. However, IT spending is not under a proper control. This situation is even worse in medium, small and micro enterprises. A fundamental aspect is to know what services they spend their money. For this, it is necessary to know what services the IT department provides. The objective of this paper is to show a model based on the concept of process asset library that allows a medium, small and micro enterprise to obtain its catalogue of services in a simple, flexible and inexpensive way.
      PubDate: 10/17/2012 17:18:03
  • Herramienta de Simulación del Protocolo EPC GEN2 Class1 de RFID

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Hugo Landaluce,Asier Perallos,Ignacio AnguloDebidoal creciente desarrollo de la tecnología RFID, las aplicaciones en las que se ve involucrada esta tecnología son cada vez más sofisticadas,empleando grandes cantidades de tags. Por ello es importante disponer de una herramienta de testeo de la aplicación antes de implementarse de forma definitiva. En este artículo se presenta un simulador del protocolo EPC Gen2 Class1 (para tags pasivos), para permitir al usuario conocer el comportamiento del sistema RFID con un determinado número de tags, ya que es uno de los protocolos más empleados actualmente. Para la validación del simulador, se han realizado una serie de pruebas con un lector RFID comercial y se han comparado las latencias obtenidas con las proporcionadas por el simulador.
      PubDate: 10/17/2012 17:18:03
  • Proposal of a Learning Styles Identification Tool for Sakai Virtual
           Learning Environment

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Paulo Alves,Luísa Miranda,Carlos Morais,Evandro AlvesWe are living in an essentially technological world, in which technology facilitates and promotes the development of institutions and the people who work or study in these institutions. Thus, it is claimed that technology should increasingly meet people’s needs according to their goals, interests and learning styles. Aiming to improve the teaching and learning process, and based on a perspective of adaptation of the learning environment to the learner’s needs, we present, in this article, the integration of learning styles in learning management systems by integrating the Honey-Alonso Learning Styles Questionnaire (CHAEA) in Sakai collaborative learning environment, which was adopted in a higher education institution.
      PubDate: 10/17/2012 17:18:03
  • Uma Ferramenta Livre e ExtensÍVel Para Detecção de
           Vulnerabilidades em Sistemas Web

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Douglas Rocha,Diego Kreutz,Rogério TurchettiThe increasing number of intrusions and data thefts on online systems is one of the triggers of the growing concern about security inside organizations. Nowadays, dynamic and extensible detection tools are required and critical to detect and diagnose vulnerabilities in Web systems. In this paper we present the development and evaluation of a vulnerability scanner for online systems. Unlike most existing tools, it is free and open source, available at SourceForge, and has a modular and extensible architecture. The achieved results show that the proposed tool, called Uniscan, is able to better detect and diagnose vulnerabilities such as LFI, RFI and RCE.
      PubDate: 10/17/2012 17:18:03
  • Evaluación de los Procesos Software de una Organización Enfocando en la
           Disminución de la Resistencia al Cambio

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Calvo-Manzano Jose A.,Cuevas Gonzalo,San Feliu Tomás,Muñoz Mirna,Mejia JezreelResumen En este artículo se describe un método para la evaluación del rendimiento de los procesos software de una organización de desarrollo de software utilizando técnicas alternativas a los cuestionarios (utilizados actualmente como técnica principal para evaluar el rendimiento de los procesos software en las organizaciones de desarrollo software). La importancia de la evaluación de procesos de una organización radica en qué, si es realizada de manera correcta, esta actividad permite identificar las oportunidades de mejora y dirigir el esfuerzo de la mejora hacia los procesos software que necesitan ser mejorados para alcanzar los objetivos del negocio establecidos por la alta dirección con la finalidad de generar ventajas competitivas respecto de sus competidores y garantizar su permanencia en el mercado.
      PubDate: 10/17/2012 17:18:03
  • Sistema Inteligente para Auxílio na Seleção e Execução de Tarefas num
           Jogo Social

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Brígida Mónica Faria,Luís Paulo Reis,Romina Neves,Pedro AbreuNowadays social networks are used for various recreational purposes. It is believed that every day a user spend, on average, two hours playing this type of networkgames. Farmville is a social game available at one of the most successful social networks: Facebook.Farmville game allows each user to use a diverse set of actions in order to manage a virtual farm. However, this management quickly becomes a boring and time consuming process and often the user quitsplaying this game. In this context this project main objective was related with the development of an intelligent system able to effectively assist the player when playing Farmville. The system will help the user in most of his management tasks on the farm such as seeding and harvesting, receiving and sending gifts and managing the farm animals. The use of the implemented system ensures greater progress in the game, because there is a decrease in the time spent in performing the tasks enabling the user to focus on the strategies for advancingin the game.
      PubDate: 10/17/2012 17:18:03
  • Statistical Score Calculation of Information Retrieval Systems using Data
           Fusion Technique

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  B. Dhivakar,S. V. Saravanan,M. Sivaram,R. Abirama KrishnanEffective information retrieval is defined as the number of relevant documents that are retrieved with respect to user query. In this paper, we present a novel data fusion in IR to enhance the performance of the retrieval system. The best data fusion technique that unite the retrieval results of numerous systems using various data fusion algorithms. The study show that our approach is more efficient than traditional approaches.
      PubDate: 10/17/2012 17:18:03
  • A Language Independent Platform for High Secured Communication Using
           Encrypted Steganography

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Vijayaratnam Ganeshkumar,Ravindra L. W. KoggalageComputer usage is increasing, for both social and business areas, and it will continue to do so. This naturally leads to an increase in the way in which we as individuals and organizations we work for may be attacked.Increase of cyber-crime has compelledto re-think for a secure communication medium in our day-to-day life. Protecting the information during transmission is a foremostchallenge against eavesdroppers. Encryption is one of the widely used techniques that ensure the security of the message. However, sending encrypted messages often draw eavesdropper’s attention. Steganography is a method of letteringsecret messages in a way that nobody except for the sender and the recipient would suspect the existence of the hidden message. In other words, it’s an art/science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.Historical steganography involved techniques such as disappearing ink or microdots. Modern steganography involves in computer files such as images, audio, video files and even in text documents. However, each stereographic technique is focused in just one medium; such as image or audio file and etc. And each steganographic algorithms had independent implementation; as a resultthere is no generic framework or application that will produce stegano medium for an end-user. In this paper, a generic framework is presented, which provides generic steganographic functionality via well-defined Application Programming Interface (API). So that the advanced developers can develop framework modules, this can be used by the end-users directly as stegangraphicapplication. And also this paper describes a newly invented steganographic technique which utilizes the inter-character spacing of a Rich-Text-Format (RTF) document. This technique can be used to transmit concealed messages in multi-language or combination of languages, which can be represented in Unicode. As an additional optimization technique; user defined code based (UDC) technique is also proposed to achieve compression of Unicode languages. Another advantage is that this technique can be used to send multi different language secret messages through the communication channel.
      PubDate: 10/17/2012 17:18:03
  • About a Method of Calculation of Importance Degree of Geometrical
           Characteristics to Identify a Human Face on the Basis of Photo Portraits

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Tofiq Kazimov,Shafagat MahmudovaThe paper offers a new algorithm to find coefficients which determines importance degree of the values of geometrical characteristics used to identify a human face on the basis of photo portraits. Significance of coefficients determining importance degree of the values of geometrical characteristics for identification is explained. Determination of coefficients determining importance degree of the values of geometrical characteristics for identification leads to the reduction in the number of values of insignificant geometrical characteristics, as well as to the improvement of identification quality and to the decrease in time spent for identification.
      PubDate: 10/17/2012 17:18:03
  • Secure Transmission of Biometric Scan Images Using Data Encryption
           Standards(DES) Algorithm

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Ghanshyam Gaur,R. S. MeenaBiometric Scan Images, however, is vulnerable to unauthorized access while in storage and during transmission over a network. Unauthorized user can make a fake copy from image file from memory device or computer. Biometric Data in form of images are very confidential information of user. If they are in unauthorized hand then misuse of data may be harmful to authorized user. As in case of Unique ID each and every citizen of country have their Biometric scan images of finger, face and thumb and Iris all in original form like JPEG,JPG,GIF,PNG,BMP etc. To protect them from unauthorized access we can encrypt images so they can’t be detected and used. Protection is required at very initial end so that images can be directly saved in form of encrypted image in memory device. First image will be converted into pixels. Each pixel will be converted into DataStream and stored in codebook in same order as of pixels in image. Digitized pixels will have a group of data bits and each pixels or set of pixels will be encrypted using DES algorithm. The whole Programming and design can be done in any platform like MATLAB, C, C++, Xilinx ISE 13.4 Software. The advantage of using Xilinx is that in this platform we can design a Layout of it so that finally a Chip level Solution can be provided.
      PubDate: 10/17/2012 17:18:03
  • Requirements for Operations to Take Advantage of the Flexibility of Soa

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Liane WillEfficient, controlled, and managed IT operations are strongly influenced by the architecture of a solution. A service-oriented architecture has a high level of flexibility and can respond to environmental changes and requirements. In this paper, we show, within the change management process, that simple reuse of operation tools, typically developed for client/server-based architectures, do not work with the requirements of SOA. To take advantage of the flexibility of SOA, the traditional change management system-oriented approach has to be changed into a business process-oriented approach, which results in fundamental new requirements for change management tools and services. Furthermore similar conclusions can be derived for other typical operation tasks. Consequently, the common understanding of the necessary central elements of SOA has to be extended. Another fundamental element is required for process-oriented operations: a central operations cockpit. We show what such a tool looks like and which requirements services have to fulfil. We use the example of change management. For service design and development, a SOA-compatible service has not only to fulfil requirements of the common basic elements, but also has to provide a central operations cockpit.
      PubDate: 10/17/2012 17:18:03
  • New Chaos-Based Image Encryption Scheme for RGB Components of Color Image

    • Abstract: Publication year:  2011Source:Computer Science and Engineering,  Volume  1,  Number  1  Nashwan A. Al-Romema,Abdulfatah S. Mashat,Ibrahim AlBidewiThe widely use of data digitization leads to the necessity of hiding the content of a message when it enters an insecure channel. The message prepared by the sender is encrypted before transmission. The encryption process requires an encryption algorithm and a key. In image cryptography, recently numbers of effective chaos-based image encryption schemes have been proposed. This paper presents a novel image encryption scheme which encrypts the pixels' RGB component instead of the pixels itself, where every pixel in the image will be extracted to its RGB triple, encrypted, and prepared to be transmitted. In the encryption process we use another image as a key, this image should be larger than or of the same size of the plain image that we intend to encrypt. The image encryption scheme introduced is based on chaotic systems. Simulation results show that the proposed image encryption scheme achieves high level of security, and reduces the encryption and the decryption time of image data.
      PubDate: 10/17/2012 17:18:03
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016