for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> COMPUTER SCIENCE (Total: 1969 journals)
    - ANIMATION AND SIMULATION (29 journals)
    - ARTIFICIAL INTELLIGENCE (97 journals)
    - AUTOMATION AND ROBOTICS (96 journals)
    - CLOUD COMPUTING AND NETWORKS (62 journals)
    - COMPUTER ARCHITECTURE (9 journals)
    - COMPUTER ENGINEERING (10 journals)
    - COMPUTER GAMES (15 journals)
    - COMPUTER PROGRAMMING (23 journals)
    - COMPUTER SCIENCE (1147 journals)
    - COMPUTER SECURITY (45 journals)
    - DATA BASE MANAGEMENT (12 journals)
    - DATA MINING (32 journals)
    - E-BUSINESS (22 journals)
    - E-LEARNING (28 journals)
    - ELECTRONIC DATA PROCESSING (21 journals)
    - IMAGE AND VIDEO PROCESSING (40 journals)
    - INFORMATION SYSTEMS (101 journals)
    - INTERNET (91 journals)
    - SOCIAL WEB (49 journals)
    - SOFTWARE (32 journals)
    - THEORY OF COMPUTING (8 journals)

COMPUTER SCIENCE (1147 journals)                  1 2 3 4 5 6 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 11)
Abakós     Open Access   (Followers: 3)
Academy of Information and Management Sciences Journal     Full-text available via subscription   (Followers: 67)
ACM Computing Surveys     Hybrid Journal   (Followers: 23)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 8)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 13)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 16)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 6)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 11)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 4)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 12)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 3)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 1)
ACM Transactions on Economics and Computation     Hybrid Journal  
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 19)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 9)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 8)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Full-text available via subscription   (Followers: 21)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 3)
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Ad Hoc Networks     Hybrid Journal   (Followers: 11)
Adaptive Behavior     Hybrid Journal   (Followers: 10)
Advanced Engineering Materials     Hybrid Journal   (Followers: 24)
Advanced Science Letters     Full-text available via subscription   (Followers: 5)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 8)
Advances in Artificial Intelligence     Open Access   (Followers: 14)
Advances in Artificial Neural Systems     Open Access   (Followers: 4)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 15)
Advances in Computer Science : an International Journal     Open Access   (Followers: 13)
Advances in Computing     Open Access   (Followers: 3)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 53)
Advances in Engineering Software     Hybrid Journal   (Followers: 25)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 9)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 23)
Advances in Human-Computer Interaction     Open Access   (Followers: 19)
Advances in Materials Sciences     Open Access   (Followers: 16)
Advances in Operations Research     Open Access   (Followers: 11)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Remote Sensing     Open Access   (Followers: 35)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Advances in Technology Innovation     Open Access  
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
Air, Soil & Water Research     Open Access   (Followers: 7)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 6)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1)
Algorithms     Open Access   (Followers: 9)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 3)
American Journal of Computational Mathematics     Open Access   (Followers: 4)
American Journal of Information Systems     Open Access   (Followers: 6)
American Journal of Sensor Technology     Open Access   (Followers: 2)
Anais da Academia Brasileira de Ciências     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 5)
Analysis in Theory and Applications     Hybrid Journal  
Animation Practice, Process & Production     Hybrid Journal   (Followers: 5)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 8)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 6)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of Software Engineering     Hybrid Journal   (Followers: 12)
Annual Reviews in Control     Hybrid Journal   (Followers: 6)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applied and Computational Harmonic Analysis     Full-text available via subscription   (Followers: 2)
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 13)
Applied Categorical Structures     Hybrid Journal   (Followers: 2)
Applied Clinical Informatics     Hybrid Journal   (Followers: 1)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Computer Systems     Open Access   (Followers: 1)
Applied Informatics     Open Access  
Applied Mathematics and Computation     Hybrid Journal   (Followers: 31)
Applied Medical Informatics     Open Access   (Followers: 9)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Soft Computing     Hybrid Journal   (Followers: 16)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 4)
Architectural Theory Review     Hybrid Journal   (Followers: 3)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 4)
Archive of Numerical Software     Open Access  
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Artifact     Hybrid Journal   (Followers: 2)
Artificial Life     Hybrid Journal   (Followers: 5)
Asia Pacific Journal on Computational Engineering     Open Access  
Asia-Pacific Journal of Information Technology and Multimedia     Open Access   (Followers: 1)
Asian Journal of Computer Science and Information Technology     Open Access  
Asian Journal of Control     Hybrid Journal  
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
Australian Educational Computing     Open Access  
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 3)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 8)
Automation in Construction     Hybrid Journal   (Followers: 6)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 7)
Basin Research     Hybrid Journal   (Followers: 3)
Behaviour & Information Technology     Hybrid Journal   (Followers: 52)
Bioinformatics     Hybrid Journal   (Followers: 233)
Biomedical Engineering     Hybrid Journal   (Followers: 16)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 13)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 16)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 31)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 45)
British Journal of Educational Technology     Hybrid Journal   (Followers: 119)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10)
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 1)
CALCOLO     Hybrid Journal  
Calphad     Hybrid Journal  
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 12)
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal  
Cell Communication and Signaling     Open Access   (Followers: 1)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 5)
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 15)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 7)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
CIN Computers Informatics Nursing     Full-text available via subscription   (Followers: 12)
Circuits and Systems     Open Access   (Followers: 13)
Clean Air Journal     Full-text available via subscription   (Followers: 2)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Cluster Computing     Hybrid Journal   (Followers: 1)
Cognitive Computation     Hybrid Journal   (Followers: 4)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 13)
Communication Methods and Measures     Hybrid Journal   (Followers: 11)
Communication Theory     Hybrid Journal   (Followers: 18)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Algebra     Hybrid Journal   (Followers: 3)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 3)
Communications of the ACM     Full-text available via subscription   (Followers: 47)
Communications of the Association for Information Systems     Open Access   (Followers: 18)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3)
Complex & Intelligent Systems     Open Access  
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 6)
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 9)
Computación y Sistemas     Open Access  
Computation     Open Access  
Computational and Applied Mathematics     Hybrid Journal   (Followers: 2)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 2)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 9)
Computational Astrophysics and Cosmology     Open Access  
Computational Biology and Chemistry     Hybrid Journal   (Followers: 12)
Computational Chemistry     Open Access   (Followers: 2)
Computational Cognitive Science     Open Access   (Followers: 1)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Condensed Matter     Open Access  
Computational Ecology and Software     Open Access   (Followers: 8)
Computational Economics     Hybrid Journal   (Followers: 9)
Computational Geosciences     Hybrid Journal   (Followers: 12)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 4)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 2)
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Research     Open Access   (Followers: 1)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 13)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 27)
Computer     Full-text available via subscription   (Followers: 78)
Computer Aided Surgery     Hybrid Journal   (Followers: 3)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 6)
Computer Communications     Hybrid Journal   (Followers: 10)
Computer Engineering and Applications Journal     Open Access   (Followers: 5)
Computer Journal     Hybrid Journal   (Followers: 8)
Computer Methods in Applied Mechanics and Engineering     Hybrid Journal   (Followers: 22)
Computer Methods in Biomechanics and Biomedical Engineering     Hybrid Journal   (Followers: 10)
Computer Methods in the Geosciences     Full-text available via subscription   (Followers: 1)
Computer Music Journal     Hybrid Journal   (Followers: 13)
Computer Physics Communications     Hybrid Journal   (Followers: 6)
Computer Science - Research and Development     Hybrid Journal   (Followers: 7)
Computer Science and Engineering     Open Access   (Followers: 17)
Computer Science and Information Technology     Open Access   (Followers: 10)
Computer Science Education     Hybrid Journal   (Followers: 12)
Computer Science Journal     Open Access   (Followers: 20)
Computer Science Master Research     Open Access   (Followers: 9)
Computer Science Review     Hybrid Journal   (Followers: 10)

        1 2 3 4 5 6 | Last

Journal Cover Advances in Computer Science : an International Journal
  [13 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Online) 2322-5157
   Published by ACSIJ Press Homepage  [1 journal]
  • Timely diagnosis of the heart disease using data mining algorithm

    • Authors: Hamid Reza Sahebi, Mohammad Azimimehr
      Pages: 1 - 8
      Abstract: In the current state of medical knowledge, we are facing abundant data collection about various diseases. Investigating these data and obtaining useful results and patterns in conjunction with diseases, is the main propose for using them. In this paper, considering the significant share of the heart disease in human mortality, a variety of data mining methods and algorithms are applied for timely diagnosis of heart diseases. For this purpose, Dezful Hospital standardized data collection for patients with heart disease, have been used. Most important variables of this collection are exercise-induced angina, type of chest pain, age, maximum heart rate and blood pressure at rest. Classification algorithms of K-NN, PSO, Bagging and SVM + PSO hybrid algorithm, are tested and evaluated on the data sets. Based on our evaluations, the proposed hybrid algorithm, with accuracy of 94.74, had the highest accuracy.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • Biometric Authentication in Financial Institutions: The intention of Banks
           to Adopt Biometric Powered ATM

    • Authors: Herman Mandari, Daniel Koloseni
      Pages: 9 - 17
      Abstract: The main purpose of this study was to assess the intention of banks to adopt biometric powered ATMs in Tanzania’s financial sector. The study adopted Electronic Data Interchange (EDI) model and extended it by introducing perceived risks in order to address the issue of risk which is mostly considered as the main barrier in implementing various technologies. The study used a sample of 47 banks, using ATM in Tanzania, and a multiple respondent’s technique was used to collect 102 valid responses. Multiple regression analysis was used to analyze the data; the empirical result shows that external pressure and perceived benefit are positively influencing the adoption of biometric powered ATM while perceived risk has negative influence. However, organization readiness was found to be insignificant in this study. This study has provided a more holistic understanding on the factors affecting adoption of biometric powered ATM which may enable various banks managers to adopt and implement biometric powered ATMs in Tanzania’s financial sector.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • Multilingual extraction and editing of concept strings for the legal
           domain

    • Authors: Andrea Varga, Andrew N. Edmonds
      Pages: 18 - 23
      Abstract: Identifying semantic expressions (so-called concept strings (CSs)) in multilingual corpora is an important NLP task, as it allows web search engines to define and perform semantic queries over large collection of documents. Existing web search engines in the legal domain are mainly limited to keyword search, in which the query word is matched against the textual content of the documents. This paper presents a novel framework named the Concept Strings Framework that makes use of CSs for representing the content of the documents, and for allowing semantic search over them. These CSs can consist of individual knowledge base (KB) concepts (e.g. WordNet concepts) or combination of them. In addition, this paper presents an interactive web-based toolkit, called the Template Editor that enables the creation, editing and evaluation of CSs. Experiments on two publicly available legislation websites show satisfactory results.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • PNet: A Python Library for Petri Net Modeling and Simulation

    • Authors: Zhu En Chay, Bing Feng Goh, Maurice HT Ling
      Pages: 24 - 30
      Abstract: Petri Net is a formalism to describe changes between 2 or more states across discrete time and has been used to model many systems. We present PNet – a pure Python library for Petri Net modeling and simulation in Python programming language. The design of PNet focuses on reducing the learning curve needed to define a Petri Net by using a text-based language rather than programming constructs to define transition rules. Complex transition rules can be refined as regular Python functions. To demonstrate the simplicity of PNet, we present 2 examples – bread baking, and epidemiological models.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • A Comprehensive Survey on Evaluation of Lightweight Symmetric Ciphers:
           Hardware and Software Implementation

    • Authors: Jaber Hosseinzadeh, Maghsoud Hosseinzadeh
      Pages: 31 - 41
      Abstract: Low-resource devices like wireless sensor networks have some limitations on memory, power and energy. Using common encryption algorithms are not appropriate for these devices due to their hard limitations and leads to a waste of energy and power. Here, lightweight symmetric ciphers have been evaluated in hardware and software implementations. Comprehensive Evaluation of lightweight ciphers in this work is performed based on cost, speed, efficiency and balance criterion. In each of the criteria, evaluation is done based on a specific measure and the best ciphers have been introduced in each. Evaluation in terms of hardware and software implementation indicates the superiority of SPECK and SIMON ciphers. Evaluation in terms of speed in hardware implementation indicates the superiority of Trivium and Grain, and it shows the superiority of MASHA and SPECK in software implementation. Results of the Evaluation in terms of efficiency express the superiority of SIMON and SPECK. The results of these evaluations helps finding ciphers appropriate to the user based on requirements and restrictions. The user sets his desired system and then obtains the system needs; at the final step, based on the type of requirements, the results of our work help the system to select the appropriate cipher.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • MS-TWSVM: Mahalanobis distance-based Structural Twin Support Vector
           Machine

    • Authors: Ramin Rezvani-KhorashadiZadeh, Reza Monsefi
      Pages: 42 - 48
      Abstract: The distribution information of data points in two classes as the structural information is inserted into the classifiers to improve their generalization performance. Recently many algorithms such as S-TWSVM has used this information to construct two non-parallel hyperplanes which each one lies as close as possible to one class and being far away from the other. It is well known that different classes have different data distribution in real world problems, thus the covariance matrices of these classes are not the same. In these situations, the Mahalanobis is often more popular than Euclidean as a measure of distance. In this paper, in addition to apply the idea of S-TWSVM, the classical Euclidean distance is replaced by Mahalanobis distance which leads to simultaneously consider the covariance matrices of the two classes. By this modification, the orientation information in two classes can be better exploited than S-TWSVM. The experiments indicate our proposed algorithm is often superior to other learning algorithms in terms of generalization performance.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • Challenges in SysML Model Simulation

    • Authors: Mara Nikolaidou, George-Dimitrios Kapos, Anargyros Tsadimas, Vassilis Dalakas, Dimosthenis Anagnostopoulos
      Pages: 49 - 56
      Abstract: Systems Modeling Language (SysML) is a standard proposed by the OMG for systems-of-systems (SoS) modeling and engineering. To this end, it provides the means to depict SoS components and their behavior in a hierarchical, multi-layer fashion, facilitating alternative engineering activities, such as system design. To explore the performance of SysML, simulation is one of the preferred methods. There are many efforts targeting simulation code generation from SysML models. Numerous simulation methodologies and tools are employed, while different SysML diagrams are utilized. Nevertheless, this process is not standardized, although most of current approaches tend to follow the same steps, even if they employ different tools. The scope of this paper is to provide a comprehensive understanding of the similarities and differences of existing approaches and identify current challenges in fully automating SysML models simulation process.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • Investigation of Ultimate Shear Capacity of RC Deep Beams with Opening
           using Artificial Neural Networks

    • Authors: Ebrahim KhalilzadeVahidi, Fatemeh Rahimi
      Pages: 57 - 65
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • A bi-population genetic algorithm with two novel greedy mode selection
           methods for MRCPSP

    • Authors: Siamak Farshidi, Koorush Ziarati
      Pages: 66 - 77
      Abstract: The multimode resource-constrained project scheduling problem (MRCPSP) is an extension of the single-mode resource-constrained project scheduling problem (RCPSP). In this problem, each project contains a number of activities which precedence relationship exist between them besides their amount of resource requirements to renewable and non-renewable resources are limited to the resources availabilities. Moreover, each activity has several execution modes, that each of them has its amount of resource requirements and execution duration. The MRCPSP is NP-hard, in addition, proved that if at least 2 non-renewable resources existed, finding a feasible solution for it is NP-complete. This paper introduces two greedy mode selection methods to assign execution modes of the primary schedules’ activities in order to balance their resource requirements and thus reduce the number of infeasible solutions in the initialization phase of a bi-population genetic algorithm for the problem. To investigate the usage effect of these greedy methods on the quality of the final results, in addition, to evaluating the performance of the proposed algorithm versus the other meta-heuristics, the instances of the PSPLIB standard library have been solved. The computational results show that by the growth of the problem size, the proposed algorithm reports better results in comparison with the other metaheuristics in the problem literature.
      PubDate: 2016-07-31
      Issue No: Vol. 5, No. 4 (2016)
       
  • Heuristic Algorithm for Identifying Critical Nodes in Graphs

    • Authors: Dalaijargal Purevsuren, Gang Cui, Nwe Nwe Htay Win, Xiufeng Wang
      Pages: 1 - 4
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • COPADS IV: Fixed Time-Step ODE Solvers for a System of Equations
           Implemented as a Set of Python Functions

    • Authors: Maurice HT Ling
      Pages: 5 - 11
      Abstract: Ordinary differential equation (ODE) systems are commonly used many different fields. The de-facto method to implement an ODE system in Python programming using SciPy requires the entire system to be implemented as a single function, which only allow for inline documentation. Although each equation can be broken up into sub-equations, there is no compart-mentalization of sub-equations to its ODE. A better method will be to implement each ODE as a function. This encapsulates the sub-equations to its ODE, and allow for function and inline documentation, resulting in better maintainability. This study presents the implementation 11 ODE solvers that enable each ODE in a system to be implemented as a function. Three enhancements will be added. Firstly, the solvers will be implemented as generators to allow for virtually infinite simulation and returning a stream of intermediate results for analysis. Secondly, the solvers will allow for non-ODE-bounded variables or solution vector to improve code and results documentation. Lastly, a means to set upper and lower boundary of ODE solutions will be added. Validation testing shows that the enhanced ODE solvers give comparable results to SciPy’s default ODE solver. The implemented solvers are incorporated into COPADS repository (https://github.com/copads/copads).
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • Developing a Hybrid GPS/Wi-Fi Navigation System for User Guidance

    • Authors: Mohsen Rashidian, Hassan Ali Karimi, Mohammad Ali Rajabi, Ali Esmaeili
      Pages: 12 - 20
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • Improving OPTICS Algorithm with Imperialist Competitive Algorithm:
           Choosing Automatically Best Parameters

    • Authors: Mahdi Ghorbani, Mahdi Esmaeili, Maryam Alizadeh
      Pages: 21 - 27
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • An SQP Algorithm for Recourse-based Stochastic Nonlinear Programming

    • Authors: Xinshun Ma, Cunzhe Liu
      Pages: 28 - 32
      Abstract: The stochastic nonlinear programming problem with completed recourse and nonlinear constraints is studied in this paper. We present a sequential quadratic programming method for solving the problem based on the certainty extended nonlinear model. This algorithm is obtained by combing the active set method and filter method. The convergence of the method is established under some standard assumptions. Moreover, a practical design is presented and numerical results are provided.
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • Improving Image steganalysis performance using a graph-based feature
           selection method

    • Authors: Amir Nouri, Alimohammad Nazari
      Pages: 33 - 39
      Abstract: Steganalysis is the skill of discovering the use of steganography algorithms within an image with low or no information regarding the steganography algorithm or/and its parameters. The high-dimensionality of image data with small number of samples has presented a difficult challenge for the steganalysis task. Several methods have been presented to improve the steganalysis performance by feature selection. Feature selection, also known as variable selection, is one of the fundamental problems in the fields of machine learning, pattern recognition and statistics. The aim of feature selection is to reduce the dimensionality of image data in order to enhance the accuracy of Steganalysis task. In this paper, we have proposed a new graph-based blind steganalysis method for detecting stego images from the cover images in JPEG images using a feature selection technique based on community detection. The experimental results show that the proposed approach is easy to be employed for steganalysis purposes. Moreover, performance of proposed method is better than several recent and well-known feature selection-based Image steganalysis methods.
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • Digitization and the Depoliticization of Museum Access The Situation at
           the National Palace Museum

    • Authors: Michelle Chaotzu Wang
      Pages: 40 - 46
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • Leveraging HIV advancement in the light of Tuberculosis and Malaria using
           System Dynamics

    • Authors: Henry Njogo Mwangi, Williams Ddembe, Timothy Waema, Ng’ang’a Zipporah
      Pages: 47 - 54
      Abstract: Chronic illnesses to which HIV/AIDS, Malaria and TB is part, have had long term direct impact on the population, social economic status as well as health in general. A lot of commitment by governments, non-governmental organizations, international organizations etc. intended to reduce mortality of these disease. These intentions have not had proportionate return on investment.This paper explores factors that influence the progression of HIV into AIDS with particular emphasis on opportunistic infections particularly malaria and TB. Although there has been tools and techniques geared towards study of these diseases many of them have been lacking systemic approach or fail to communicate to healthcare providers therefore rendering their efforts ineffective.The authors argue that the range of infectiousness in the population specifically HIV/AIDS, incidence of new cases and its progression including interventions ideally reduce mortality rate leaving more people living with the disease and requiring more care in the course of the disease. Living with the disease while still on medication awakens latent infections which go on unnoticed but the patient continues with the medication allowing these new infection to gain undue advantage of the immune system. With models to leverage realistic predictions and awareness, simultaneously allowing care delivery can unveil hidden trends in the disease under consideration.The descriptive model allows systematic inquiry that yields explanations and provides healthcare providers with common decision making platform. The authors further suggest triumvirate model of HIV, malaria and TB that utilizes system dynamics in a resource limited setting.
      PubDate: 2016-05-31
      Issue No: Vol. 5, No. 3 (2016)
       
  • A Novel Method for Iris Recognition Using BP Neural Network and Parallel
           Computing

    • Authors: Hamid Reza Sahebi, S. Askari
      Pages: 1 - 6
      Abstract: In this paper, we seek a new method in designing an iris recognition system. In this method, first the Haar wavelet features are extracted from iris images. The advantage of using these features is the high-speed extraction, as well as being unique to each iris. Then the back propagation neural network (BPNN) is used as a classifier. In this system, the BPNN parallel algorithms and their implementation on GPUs have been used by the aid of CUDA in order to speed up the learning process. Finally, the system performance and the speeding outcomes in a way that this algorithm is done in series are presented.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • The Deployment of the Future Mobile Network

    • Authors: Eba’ Hamad AlMousa, Feda’ AlShahwan, Rana Alhajri
      Pages: 7 - 13
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • Requirements Prioritization: Challenges and Techniques for Quality
           Software Development

    • Authors: Muhammad Abdullah Awais
      Pages: 14 - 21
      Abstract: Every organization is aware of the consequences and importance of requirements for the development of quality software product whether local or global. Requirement engineering phase of development with focus on the prioritization of requirements is going under huge research every day because in any development methodology, all requirements cannot be implemented at same time so requirements are prioritized to be implemented to give solution as early as possible in phases as scheduled in incremental fashion. Numerous frameworks and practices have been devised, in progress and some being discovered day by day. With such huge knowledge database and research available, it has always been confusing to decide which technique to follow to gain maximum results. Thus many projects fail because of the wrong choice in requirement prioritization because it’s really difficult to employ right technique and framework at right time. And problems do not end here rather due to strict deadlines, it’s often best to develop system in parts by different team members dispersed globally with diverse methodologies and differences and in this situation it becomes more difficult to prioritize requirements. Main focus would be on ETVX based prioritization [1] for in house development and requirement prioritization of software developed globally by diverse team members [2]. This paper will try to provide an overview of different prioritization techniques for software requirement, and a critical analysis of ETVX based model will be presented to highlight issues and challenges in this proposed model of requirement prioritization in [1] and improved version of this model will be presented while an analysis of requirement prioritization for software developed in global environment [2] also be presented.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • Memory Management: Challenges and Techniques for traditional Memory
           Allocation Algorithms in Relation with Today's Real Time Needs

    • Authors: Muhammad Abdullah Awais
      Pages: 22 - 27
      Abstract: Different memory allocation algorithms have been devised to organize memory efficiently in different timestamps according to the needs and scenario of usage yet there are issues and challenges of these allocators to provide full support for real time needs. Real time systems require memory on priority otherwise program may crash or may be unresponsive if demanded memory is not allocated with quick response. Besides the timing constraints, memory allocator algorithms must minimize the memory loss which comes in the form of fragmentation, the unusable memory in response to the memory allocation needs because memory is allocated in the form of blocks. Our focus would be to analyse traditional dynamic memory management algorithms with respect to their functionality, response time and efficiency to find out the issues and challenges with these allocators to sum up the knowledge to know the limitations of these algorithm which might reduce the performance of real time systems. This research paper will give a comparative analysis of some well known memory management techniques to highlight issues for real time systems and innovative techniques suitable for these applications will be argued.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • Organization Networks as Information Integration System: Case study on
           Environment and Health in Southeast Asia

    • Authors: Claire Lajaunie, Pierre Mazzega
      Pages: 28 - 39
      Abstract: We present a method for evaluating the capacity of a network of organizations to function as Information Integration System (IIS) as required in the performance of complex common objectives such as the design of inter-sectoral policies in "Health and Environment". Inspired by the information integration theory issued from the modeling of consciousness, the method poses that the information integration is limited by the partition of the set of organizations that presents major difficulties to share information. It proceeds in two steps: a) the establishment of a network where vertices are organizations and links are induced by the average mutual information between organizations, information assessed on the basis of textual corpora associated with each organization; b) the assessment of the ability to function as IIS, defined as the minimum of the average mutual information between components of a partition, minimum found among all partitions of the set of the organizations.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • On the automatic construction of LTAG Grammars from a Vietnamese
           Dictionary

    • Authors: Phan Thi Ha, Ha Hai Nam
      Pages: 40 - 46
      Abstract: This paper presents a method for automatically extracting lexicalized tree-adjoining grammars (LTAG) from a Vietnamese dictionary. A system for automatically extracting LTAG grammars for Vietnamese from an electronic dictionary has been implemented for evaluation purpose. The experiment results of the proposed method are evaluated against the results of extracting LTAG grammars from VietTreeBank.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • Evaluation of the current status of E-government implementation in
           Tanzania: Government websites perspectives

    • Authors: Ashura Abdallah Magayane, Juniter Kwamboka Mokua, Yang Lanrong
      Pages: 47 - 55
      Abstract: This paper provides an evaluation of the current status of e-government implementation in Tanzania by examining websites for ministries and government agencies. The data used to analyze fifty one websites for ministries and government agencies were qualitative and quantitative as well. The results were compared with indicators for Tanzania e-government implementation framework. The findings depicted out that the level of e-government implementation was in the stages of digital presence and interaction. The study is useful in improving the implementation of e-government in Tanzania.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • Enhancing Data Security in the Cloud Using the Proposed Algorithm

    • Authors: Naser Attar
      Pages: 56 - 62
      Abstract: The distinctive advantages of the clouds have attracted the attention of many organizations, but the aspect leading to hesitation of these organizations is the method used for securing the data in the clouds and insuring about the security of the environment. By entrance of computers to human life and its development, the security has always been an issue. In this content, various schemes have been applied for security maintenance one of which is application of proper algorithm for encryption of data. Currently, standard encryption algorithms, such as WER, are used for encryption of data in cloud. As WER algorithm has been the subject of some attacks, in addition to solving its problems, a new algorithm is introduced. Regarding the extent of cloud network, the most important feature of the proposed algorithm is its resistivity against the attacks. The algorithm is designed and implemented in java script in cloudsim environment.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • Towards An Algorithms Ontology Cluster: for Modular Code Reuse and
           Polyglot Programming

    • Authors: Karabo Selaolo, Hlomani Hlomani
      Pages: 63 - 72
      Abstract: Code reuse is rarely practiced and polyglot programming an informal discipline. This paper proposes the use of ontologies in tackling these issues, seeing as ontologies inherently encourage reuse and are often used as bridges between languages. This paper also reviews existing research and literature in the fields of ontologies in software engineering, code reuse and polyglot programming.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • The new strategy to develop scenarios in compliance with legal and ethical
           issues

    • Authors: Adnan Imeri, Abdelaziz Khadraoui, André Rifaut, Damien Nicolas
      Pages: 73 - 82
      Abstract: The Service scenarios have a crucial role in the overall functionality of Information Systems (IS). They should be treated and examined very carefully in order to fulfill the end-user expectations and the overall platform behavior by itself. To have a qualitative scenarios it is not enough to treat only the user expectation but also these scenarios should be in compliance with legal and ethical issues otherwise it will be meaningless to have scenarios which are in contradiction with legal and ethical aspects. In this research document, we propose an approach to develop service scenarios in an early stage in order to start the development phase without any concern about compliance rules.
      PubDate: 2016-04-01
      Issue No: Vol. 5, No. 2 (2016)
       
  • C3 Effective features inspired from Ventral and ‎dorsal stream of visual
           cortex for view independent ‎face recognition

    • Authors: Somayeh Saraf Esmaili, Keivan Maghooli, Ali Motie Nasrabadi
      Pages: 1 - 9
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Providing a framework to improve the performance of business process
           management projects based on BPMN

    • Authors: Mojtaba Ahmadi, Alireza Nikravanshalmani
      Pages: 10 - 17
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • A Survey on Applications of Augmented Reality

    • Authors: Andrea Sanna, Federico Manuri
      Pages: 18 - 27
      Abstract: The term Augmented Reality (AR) refers to a set of technologies and devices able to enhance and improve human perception, thus bridging the gap between real and virtual space. Physical and artificial objects are mixed together in a hybrid space where the user can move without constraints. This mediated reality is spread in our everyday life: work, study, training, relaxation, time spent traveling are just some of the moments in which you can use AR applications.This paper aims to provide an overview of current technologies and future trends of augmented reality as well as to describe the main application domains, outlining benefits and open issues.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Provable Data Possession Scheme based on Homomorphic Hash Function in
           Cloud Storage

    • Authors: Li Yu, Junyao Ye
      Pages: 28 - 34
      Abstract: Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP) makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes, find that these schemes have some drawbacks, such as computationally expensive, only performing a limited number provable data possession. This paper proposes a provable data possession scheme based on homomorphic hash function according to the problems exist in the existing algorithms. The advantage of homomorphic hash function is that it provides provable data possession and data integrity protection. The scheme is a good way to ensure the integrity of remote data and reduce redundant storage space and bandwidth consumption on the premise that users do not retrieve data. The main cost of the scheme is in the server side, it is suitable for mobile devices in the cloud storage environments. We prove that the scheme is feasible by analyzing the security and performance of the scheme.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Summarization of Various Security Aspects and Attacks in Distributed
           Systems: A Review

    • Authors: Istam Uktamovich Shadmanov, Kamola Shadmanova
      Pages: 35 - 39
      Abstract: The modern world is filled with a huge data. As data is distributed across different networks by the distributed systems so security becomes the most important issues in these systems. Data is distributed via public networks so the data and other resources can be attacked by hackers. In this paper we define different security aspects including on the basis of authorization, authentication, encryption and access control for distributed systems.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Persons’ Personality Traits Recognition using Machine Learning
           Algorithms and Image Processing Techniques

    • Authors: kalani sriya ilmini, TGI Fernando
      Pages: 40 - 44
      Abstract: The context of this work is the development of persons’ personality recognition system using machine learning techniques. Identifying the personality traits from a face image are helpful in many situations, such as identification of criminal behavior in criminology, students’ learning attitudes in education sector and recruiting employees.Identifying the personality traits from a face image has rarely been studied. In this research identifying the personality traits from a face image includes three separate methods; ANN, SVM and deep learning. Face area of an image is identified by a color segmentation algorithm. Then that extracted image is input to personality recognition process. Features of the face are identified manually and input them to ANN and SVM. Each personality trait is valued from 1 to 9. In the second attempt m-SVM is used because outputs are multi-valued. ANN gave better results than m-SVM. In the third attempt we propose a methodology to identify personality traits using deep learning.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Ranking user’s comments by use of proposed weighting method

    • Authors: zahra hariri
      Pages: 45 - 51
      Abstract: The main challenges which are posed in opinion mining is information retrieval of large volumes of ideas and categorize and classify them for use in related fields. The ranking can help the users to make better choices and manufacturers in order to help improve the quality. As one of the pre-processing techniques in the field of classification, weighting methods have a crucial role in ranking ideas and comments. So, we decided to offer a new weighting method to improve some other similar methods, especially Dirichlet weighting method. In this paper, the proposed method will be described in detail, and the comparison with the three weighting methods: Dirichlet, Pivoted and Okapi also described. The proposed weighting method has higher accuracy and efficiency in comparison to similar methods. In the following, user comments of online newspapers are ranked and classified by use of proposed method. The purpose is to provide more efficient and more accurate weighting method, therefor the results of ranking will be more reliable and acceptable to users.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • A Simple Study on Search Engine Text Classification for Retails Store

    • Authors: Renien John Joseph, Samith Sandanayake, Thanuja Perera
      Pages: 52 - 57
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • A Novel Performance Evaluation Approach for the College Teachers Based on
           Individual Contribution

    • Authors: XING Lining
      Pages: 58 - 62
      Abstract: The performance evaluation to college teachers has very important theoretical significance and practical value. Therefore, a novel performance evaluation approach is proposed to the college teachers based on individual contribution. Experimental results suggest that this approach is feasible and efficacious.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Text Anomalies Detection Using Histograms of Words

    • Authors: Abdulwahed Faraj Almarimi, Gabriela Andrejkova
      Pages: 63 - 68
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Software-As-A-Service for improving Drug Research towards a standardized
           approach

    • Authors: Keis Husein, Ezendu Ariwa, Paul Bocij
      Pages: 69 - 72
      Abstract: Software as a Service (SaaS) is one of the most interesting applications of a service-oriented architecture. SaaS spares users the cost of acquiring and maintaining hardware and software. The SaaS business model is very widely appreciated in the economy, because it brings not only financial benefits but also process-optimizing benefits. Drug research is a lengthy, complex and costly process that involves a number of disciplines, from medicine through economics to natural science. Until recently, the standard programs and infrastructure used for data analysis were almost exclusively commercial, proprietary, closed source and expensive. One of the major attractions of the open-source model is to customize the platform to suite the requirements and react faster on changes. There are different proprietary approaches. However there is a gap in knowledge regarding using closed and proprietary infrastructure. The aim of this research is to investigate the impact of an open source SaaS approach on the drug research process.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Investigation of Coherent Multicarrier Code Division Multiple Access for
           Optical Access Networks

    • Authors: Ali Tamini, Mohammad Molavi Kakhki
      Pages: 73 - 77
      Abstract: Orthogonal frequency division multiplexing (OFDM) has proved to be a promising technique to increase the reach and bit rate both in long‑haul communications and in passive optical networks. This paper, for the first time, investigates the use of OFDM combined with electrical CDMA in presence of coherent detection as a multiple access scheme. The proposed multicarrier‑CDMA system is simulated using Walsh‑Hadamard codes and its performance is compared to that of coherent WDM-OFDM system in terms of bit‑error‑rate and bandwidth efficiency. It is shown that MC‑CDMA benefits from better spectral efficiency while its performance slightly deteriorates in comparison to WDM-OFDM when the number of users is increased.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Digital Image Encryption Based On Multiple Chaotic Maps

    • Authors: Amir Houshang Arab Avval, Jila ayubi, Farangiz Arab
      Pages: 78 - 85
      Abstract: A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Using k-means clustering algorithm for common lecturers timetabling among
           departments

    • Authors: hamed babaei, Jaber Karimpour, Sajjad Mavizi
      Pages: 86 - 102
      Abstract: University course timetabling problem is one of the hard problems and it must be done for each term frequently which is an exhausting and time consuming task. The main technique in the presented approach is focused on developing and making the process of timetabling common lecturers among different departments of a university scalable. The aim of this paper is to improve the satisfaction of common lecturers among departments and then minimize the loss of resources within departments. The applied method is to use a collaborative search approach. In this method, at first all departments perform their scheduling process locally; then two clustering and traversing agents are used where the former is to cluster common lecturers among departments and the latter is to find unused resources among departments. After performing the clustering and traversing processes, the mapping operation in done based on principles of common lecturers constraint in redundant resources in order to gain the objectives of the problem. The problem’s evaluation metric is evaluated via using clustering algorithm k-means on common lecturer constraints within a multi agent system. An applied dataset is based on meeting the requirements of scheduling in real world among various departments of Islamic Azad University, Ahar Branch and the success of results would be in respect of satisfying uniform distribution and allocation of common lecturers on redundant resources among different departments.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • New Media Display Technology and Exhibition Experience

    • Authors: Chen-Wo Kuo, Chih-ta Lin, Michelle Chaotzu Wang
      Pages: 103 - 109
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Real-Time Color Coded Object Detection Using a Modular Computer Vision
           Library

    • Authors: Antonio J. R. Neves, Alina Trifan, Bernardo Cunha, José Luís Azevedo
      Pages: 110 - 123
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Integrating Learning Style in the Design of Educational Interfaces

    • Authors: Rana Alhajri, Ahmed AL-Hunaiyyan
      Pages: 124 - 131
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • TAPPS Release 1: Plugin-Extensible Platform for Technical Analysis and
           Applied Statistics

    • Authors: Justin Sam Chew, Maurice HT Ling
      Pages: 132 - 141
      Abstract: We present the first release of TAPPS (Technical Analysis and Applied Statistics System); a Python implementation of a thin software platform aimed towards technical analyses and applied statistics. The core of TAPPS is a container for 2-dimensional data frame objects and a TAPPS command language. TAPPS language is not meant to be a programming language for script and plugin development but for the operational purposes. In this aspect, TAPPS language takes on the flavor of SQL rather than R, resulting in a shallower learning curve. All analytical functions are implemented as plugins. This results in a defined plugin system, which enables rapid development and incorporation of analysis functions. TAPPS Release 1 is released under GNU General Public License 3 for academic and non-commercial use. TAPPS code repository can be found at http://github.com/mauriceling/tapps.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Pictographic steganography based on social networking websites

    • Authors: Feno Heriniaina RABEVOHITRA, Xiaofeng Liao
      Pages: 142 - 150
      Abstract: Steganography is the art of communication that does not let a third party know that the communication channel exists. It has always been influenced by the way people communicate and with the explosion of social networking websites, it is likely that these will be used as channels to cover the very existence of communication between different entities. In this paper, we present a new effective pictographic steganographic channel. We make use of the huge amount of photos available online as communication channels. We are exploiting the ubiquitousness of those social networking platforms to propel a powerful and pragmatic protocol. Our novel scheme exploiting social networking websites is robust against active and malicious.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
  • Evaluating the Impact of Image Delays on the Rise of MMI-Driven
           Telemanipulation Applications: Hand-Eye Coordination Interference from
           Visual Delays during Minute Pointing Operations

    • Authors: Iwane Maida, Tetsuya Toma, Hisashi Sato
      Pages: 151 - 160
      Abstract: Robots with high freedom of movement can be used for minute manipulation, enabling a wide range of real-world applications. However, the use of telemanipulation systems driven by man-machine interaction (MMI) is currently limited to experimental trials, partly because the image delay during transmission interferes with the operator’s hand-eye coordination. This study examined how delays affect operation efficiency by pointing target size, and the degree of difficulty when performing telemanipulation operations. We conducted tests in which subjects performed pointing operations while visual delays interfered with their hand-eye coordination. Our findings show statistically that regardless of target size, delay variance of 200 ms or less hardly affects operation efficiency, and that difficulty increases for a target diameter of between 4 and 2 mm.
      PubDate: 2016-01-31
      Issue No: Vol. 5, No. 1 (2016)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 23.20.157.174
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016