for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> COMPUTER SCIENCE (Total: 1993 journals)
    - ANIMATION AND SIMULATION (29 journals)
    - ARTIFICIAL INTELLIGENCE (99 journals)
    - AUTOMATION AND ROBOTICS (100 journals)
    - CLOUD COMPUTING AND NETWORKS (63 journals)
    - COMPUTER ARCHITECTURE (9 journals)
    - COMPUTER ENGINEERING (9 journals)
    - COMPUTER GAMES (16 journals)
    - COMPUTER PROGRAMMING (24 journals)
    - COMPUTER SCIENCE (1157 journals)
    - COMPUTER SECURITY (46 journals)
    - DATA BASE MANAGEMENT (13 journals)
    - DATA MINING (32 journals)
    - E-BUSINESS (22 journals)
    - E-LEARNING (27 journals)
    - ELECTRONIC DATA PROCESSING (21 journals)
    - IMAGE AND VIDEO PROCESSING (40 journals)
    - INFORMATION SYSTEMS (104 journals)
    - INTERNET (91 journals)
    - SOCIAL WEB (50 journals)
    - SOFTWARE (33 journals)
    - THEORY OF COMPUTING (8 journals)

COMPUTER SCIENCE (1157 journals)                  1 2 3 4 5 6 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 13)
Abakós     Open Access   (Followers: 3)
Academy of Information and Management Sciences Journal     Full-text available via subscription   (Followers: 69)
ACM Computing Surveys     Hybrid Journal   (Followers: 22)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 9)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 13)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 16)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 6)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 11)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 4)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 13)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 3)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 1)
ACM Transactions on Economics and Computation     Hybrid Journal  
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 20)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 8)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 7)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 8)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 11)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Full-text available via subscription   (Followers: 21)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 3)
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Ad Hoc Networks     Hybrid Journal   (Followers: 11)
Adaptive Behavior     Hybrid Journal   (Followers: 11)
Advanced Engineering Materials     Hybrid Journal   (Followers: 26)
Advanced Science Letters     Full-text available via subscription   (Followers: 7)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 8)
Advances in Artificial Intelligence     Open Access   (Followers: 16)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 15)
Advances in Computer Science : an International Journal     Open Access   (Followers: 13)
Advances in Computing     Open Access   (Followers: 2)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 53)
Advances in Engineering Software     Hybrid Journal   (Followers: 25)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 10)
Advances in Human-Computer Interaction     Open Access   (Followers: 20)
Advances in Materials Sciences     Open Access   (Followers: 16)
Advances in Operations Research     Open Access   (Followers: 11)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Remote Sensing     Open Access   (Followers: 37)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Advances in Technology Innovation     Open Access   (Followers: 1)
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
Air, Soil & Water Research     Open Access   (Followers: 7)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 6)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1)
Algorithms     Open Access   (Followers: 11)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 4)
American Journal of Computational Mathematics     Open Access   (Followers: 4)
American Journal of Information Systems     Open Access   (Followers: 7)
American Journal of Sensor Technology     Open Access   (Followers: 4)
Anais da Academia Brasileira de Ciências     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 7)
Analysis in Theory and Applications     Hybrid Journal   (Followers: 1)
Animation Practice, Process & Production     Hybrid Journal   (Followers: 5)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 9)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 6)
Annals of Pure and Applied Logic     Open Access   (Followers: 2)
Annals of Software Engineering     Hybrid Journal   (Followers: 12)
Annual Reviews in Control     Hybrid Journal   (Followers: 6)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applied and Computational Harmonic Analysis     Full-text available via subscription   (Followers: 2)
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 14)
Applied Categorical Structures     Hybrid Journal   (Followers: 2)
Applied Clinical Informatics     Hybrid Journal   (Followers: 2)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 12)
Applied Computer Systems     Open Access   (Followers: 1)
Applied Informatics     Open Access  
Applied Mathematics and Computation     Hybrid Journal   (Followers: 32)
Applied Medical Informatics     Open Access   (Followers: 10)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Soft Computing     Hybrid Journal   (Followers: 16)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 4)
Architectural Theory Review     Hybrid Journal   (Followers: 3)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 5)
Archive of Numerical Software     Open Access  
Archives and Museum Informatics     Hybrid Journal   (Followers: 125)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 4)
Artifact     Hybrid Journal   (Followers: 2)
Artificial Life     Hybrid Journal   (Followers: 6)
Asia Pacific Journal on Computational Engineering     Open Access  
Asia-Pacific Journal of Information Technology and Multimedia     Open Access   (Followers: 1)
Asian Journal of Computer Science and Information Technology     Open Access  
Asian Journal of Control     Hybrid Journal  
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
Australian Educational Computing     Open Access  
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 3)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 9)
Automation in Construction     Hybrid Journal   (Followers: 6)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8)
Basin Research     Hybrid Journal   (Followers: 5)
Behaviour & Information Technology     Hybrid Journal   (Followers: 52)
Bioinformatics     Hybrid Journal   (Followers: 308)
Biomedical Engineering     Hybrid Journal   (Followers: 16)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 13)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 17)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 31)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 46)
British Journal of Educational Technology     Hybrid Journal   (Followers: 123)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 10)
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 2)
CALCOLO     Hybrid Journal  
Calphad     Hybrid Journal  
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 14)
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal  
Cell Communication and Signaling     Open Access   (Followers: 1)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 5)
CERN IdeaSquare Journal of Experimental Innovation     Open Access  
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 15)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 7)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
CIN Computers Informatics Nursing     Full-text available via subscription   (Followers: 12)
Circuits and Systems     Open Access   (Followers: 16)
Clean Air Journal     Full-text available via subscription   (Followers: 2)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Cluster Computing     Hybrid Journal   (Followers: 1)
Cognitive Computation     Hybrid Journal   (Followers: 4)
COMBINATORICA     Hybrid Journal  
Combustion Theory and Modelling     Hybrid Journal   (Followers: 13)
Communication Methods and Measures     Hybrid Journal   (Followers: 11)
Communication Theory     Hybrid Journal   (Followers: 20)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Algebra     Hybrid Journal   (Followers: 3)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 3)
Communications of the ACM     Full-text available via subscription   (Followers: 53)
Communications of the Association for Information Systems     Open Access   (Followers: 18)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3)
Complex & Intelligent Systems     Open Access  
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 6)
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 9)
Computación y Sistemas     Open Access  
Computation     Open Access  
Computational and Applied Mathematics     Hybrid Journal   (Followers: 2)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 2)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 9)
Computational Astrophysics and Cosmology     Open Access   (Followers: 1)
Computational Biology and Chemistry     Hybrid Journal   (Followers: 12)
Computational Chemistry     Open Access   (Followers: 2)
Computational Cognitive Science     Open Access   (Followers: 2)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Condensed Matter     Open Access  
Computational Ecology and Software     Open Access   (Followers: 9)
Computational Economics     Hybrid Journal   (Followers: 9)
Computational Geosciences     Hybrid Journal   (Followers: 14)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 4)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 2)
Computational Optimization and Applications     Hybrid Journal   (Followers: 7)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Research     Open Access   (Followers: 1)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 13)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 31)
Computer     Full-text available via subscription   (Followers: 84)
Computer Aided Surgery     Hybrid Journal   (Followers: 3)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 6)
Computer Communications     Hybrid Journal   (Followers: 10)
Computer Engineering and Applications Journal     Open Access   (Followers: 5)
Computer Journal     Hybrid Journal   (Followers: 7)
Computer Methods in Applied Mechanics and Engineering     Hybrid Journal   (Followers: 22)
Computer Methods in Biomechanics and Biomedical Engineering     Hybrid Journal   (Followers: 10)
Computer Methods in the Geosciences     Full-text available via subscription   (Followers: 1)
Computer Music Journal     Hybrid Journal   (Followers: 16)
Computer Physics Communications     Hybrid Journal   (Followers: 6)
Computer Science - Research and Development     Hybrid Journal   (Followers: 7)
Computer Science and Engineering     Open Access   (Followers: 17)
Computer Science and Information Technology     Open Access   (Followers: 11)
Computer Science Education     Hybrid Journal   (Followers: 12)
Computer Science Journal     Open Access   (Followers: 20)
Computer Science Master Research     Open Access   (Followers: 10)
Computer Science Review     Hybrid Journal   (Followers: 10)

        1 2 3 4 5 6 | Last

Journal Cover Advances in Computer Science : an International Journal
  [13 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Online) 2322-5157
   Published by ACSIJ Press Homepage  [1 journal]
  • A Novel Approach for Regenerating a Secure and Reliable Password using
           Iris and Fingerprint

    • Authors: SOROUSH SHIEKHALHOKAMAII, MOHAMMAD AMIN PIRBONYEH
      Pages: 1 - 6
      Abstract: Cryptography - biological authentications are mechanisms that attempt to identify users by combining unique features such as physical and behavioral characteristics. The old method which was based on passwords (e.g., public key, AES, etc.) can be easily discovered by attackers. In order to improve local security key, this paper presents a method that uses biological fingerprints and iris patterns to generate cryptographic keys. In this method, fingerprint and iris images are collected from the users and the security private key will be created by combining extracted patterns of iris and fingerprint and a hash function. The private key is used for cryptographic applications. Results showed that the model presented in this paper is more resistant against attacks compared with the patterns that are solely based on passwords.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Blended Learning Resources in Constrained Bandwidth Environment:
           Considerations for Network and Multimedia Optimization

    • Authors: Nazir Ahmad Suhail, Jude Lubega, Gilbert Maiga
      Pages: 1 - 10
      Abstract: The potential of multimedia teaching and learning approach at higher education is well recognized by researchers, as it is a powerful tool to increase the perceived level of user satisfaction, leading to enhance the blended learning process. However, the learning process can be improved significantly by delivering the content using visual media (video, audio, and graphics). On the other hand, such multimedia contents require larger bandwidth for transmission over the Internet, which is limited in developing environments where demand always exceeds the resource. This paper constructs a framework comprising of network optimization and multimedia optimization, as two main components, aimed to improve the multimedia performance in the context of constrained bandwidth environment.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • A Review of Data Mining Techniques for Result Prediction in Sports

    • Authors: Maral Haghighat, Hamid Rastegari, Nasim Nourafza
      Pages: 7 - 12
      Abstract: In the current world, sports produce considerable statistical information about each player, team, games, and seasons. Traditional sports science believed science to be owned by experts, coaches, team managers, and analyzers. However, sports organizations have recently realized the abundant science available in their data and sought to take advantage of that science through the use of data mining techniques. Sports data mining assists coaches and managers in result prediction, player performance assessment, player injury prediction, sports talent identification, and game strategy evaluation. The present study reviews previous research on data mining systems to predict sports results and evaluates the advantages and disadvantages of each system.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Power and Energy Aware Design of an Autonomous Wireless Sensor Node

    • Authors: Nicolas Ferry, Sylvain Ducloyer, Nathalie Julien, Dominique Jutel
      Pages: 11 - 36
      Abstract: The design of Wireless Sensor Networks is a challenge, requiring to correctly balancing between performance, time, cost and energy. But the main problem with rechargeable WSNs is to predict at design time which will be the total system autonomy. Moreover, it depends on the energy harvested from the environment, and we know that weather may be very unsettled. Thus, it is crucial to design and fine scale the entire power supply chain in order to produce a robust WSN. In this article, we propose an energy estimator able to handle environment like weather parameters to estimate the system autonomy. The key innovation comes from the capability to dynamically rebuild the models all along the project evolution with real measurements on the hardware and to include weather forecasts as dynamic parameters of the DPM policy. Finally, we have experiment various configurations and compared the hardware WSN against the simulator. The results have validated the relevance of the estimator for prospecting various energy problems. By experiment, the estimator has shown that most environmental energy was wasted due to the battery charging constraints. This will foresee the opportunities of energy gains, and the definition of newer extra power modes for the Dynamic Power Management. This work contributes to the domain for WSN design methodology, energy scavenging and energy management to optimize system autonomy.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • An Efficient Protocol for Target Tracking in Wireless Sensor Networks
           (WSNs)

    • Authors: Shabnam Shoaee, Abolfazl Toroghi Haghighat
      Pages: 13 - 19
      Abstract: Target tracking is one of the most important applications in wireless sensor networks. In most of objects tracking sensor networks, a general method which is called clustering has been used. The target to be tracked may go unnoticed due to problems like node failures, communication failures amongst nodes and localization errors. Recovery mechanism needs to be initiated to find the exact location of the lost target. Hence, Using Base Station, a new clustering method and new recovery mechanism with virtual grid, we introduce an efficient protocol namely (EBSOTT). Using Base Station as a fundamental element in tracking process, EBSOTT protocol tries to reduce the number of transmitted packets and subsequently, energy consumption in order to meet the current needs of clustering. Also, using virtual grid reduces time of decision which causes to the object retaining and faster recovering. For evaluation, the proposed protocol was compared to the BSOTT algorithm.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Using Contourlet Transform and Discrete Cosine Transform and SVD for
           Digital Watermarking

    • Authors: S. A. Hosseini, S. Ghofrani
      Pages: 20 - 28
      Abstract: In this paper, embedding a watermark in the image is performed in discrete Contourlet transform (CT) domain. It is known that the CT is able to capture the directional edges and contours superior to discrete wavelet transform. We introduce three methods. The first proposed method is based on embedding watermark bits into the singular value of the selected blocks within low-pass sub-band of the original gray image CT and uses adaptive quantization. The second method uses quantization step, are implemented. Our experimental results show that the second method with quantization step has better fidelity in terms of peak signal to noise ratio (PSNR) and is more robust against geometrical and non-geometrical attacks in terms of normalized cross correlation (NC) in comparison with the first method, though, the method with adaptive quantization is blind in the sense only quantization strategies but not the original image is required. The third proposed method is based on embedding watermark bits into the selected blocks within last sub-band of first level of the original gray image CT. This method is semi-blind and our experimental results show that robustness against geometrical and non-geometrical attacks in terms of normalized cross correlation (NC) is better than two previous methods and third method robust against too many attacks type.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Automatic identification of corrosive factors categories according to the
           environmental factors

    • Authors: Qing Xu, Dongmei Fu
      Pages: 29 - 34
      Abstract: Time of wetness, and pollutants are three key factors for the selection of metal materials in engineering applications and the determination of atmospheric corrosivity categories. In the past, when one or more corrosive factors data is missing, corrosive factors categories were often subjectively determined according to expert experience. In order to overcome such difficulty, this paper presents a method to automatically determine corrosive factors categories using detected environmental factors data instead of expert scoring. In this method, Bayesian network was used to build the mathematical model. And the inference was obtained by clique tree algorithm. The validity of the model and algorithm was verified by the simulation results.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Text Mining and Image Anomaly Explanation with Machine Consciousness

    • Authors: John Kontos, Polyxene Kasda
      Pages: 35 - 39
      Abstract: In the present paper a series of implemented computer systems of information extraction for question answering that generate explanations of this extraction from text and image are presented. These computer generated explanations of the performance of a computer system may function as a criterion of the exhibition of Machine Consciousness. Additionally the systems presented in the present paper may facilitate their communication with their users. Such communication is very useful for building the confidence of a user to a computer system. The main information extraction method used by the systems described here is the one based on a finite state automaton. Following the presentation of systems that have been implemented by our group for various text bases a novel development is reported concerning the explanation of image anomalies. The presentation of our novel work is helped by an example of anomaly detection and explanation in modern paintings.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Performance and Analysis of the Automated Semantic Object and Spatial
           Relationships Extraction in Traffic Images

    • Authors: Wang Hui Hui
      Pages: 37 - 42
      Abstract: Extraction and representation of spatial relations semantics among objects are important as it can convey important information about the image and to further increase the confidence in image understanding which contributes to richer querying and retrieval facilities. This paper discusses the performance of the automated object spatial relationships semantic information extraction as proposed. Experiments have been conducted to demonstrate that the proposed automated object spatial relationship semantic extraction is succeeded to capture the semantic spatial relationship features in the images.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Performance assessment among hybrid algorithms in tuning SVR parameters to
           predict pipe failure rates

    • Authors: Moosa Kalanaki, Jaber Soltani
      Pages: 40 - 46
      Abstract: Pipe failures often occur in water distribution networks and result in large water loss and social-economic damage. To reduce the water loss and maintain the conveyance capability of a pipe network, pipes that experienced a severe failure history are often necessary to be replaced. Several studies and methods have been introduced for predicting failure rates in urban water distribution network pipes by researchers, each of them has some special features regarding the effective parameters and many methods such as Classical and Intelligent methods are used, leading to some improvements. In this paper, the method incorporates hybrid support vector machine and heuristic algorithms techniques for efficient tuning of SVM meta-parameters for predicting water distribution network. Performance results are Compared with continuous genetic algorithm-based SVR (SVR-GA), continuous ant colony algorithm-based SVR (SVR-ACO), particle swarm optimization-based SVR (SVR-PSO), artificial neural networks (ANNs) and adaptive neuro-fuzzy inference systems (ANFIS).
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Reverse Query Tree approach to cope with Id distribution problem in
           Tree-based tag anti-collision protocols of RFID

    • Authors: Milad HajMirzaei
      Pages: 43 - 46
      Abstract: Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree) which its performance depends on tag id length and construction, have some issues like id distribution. In this paper we discuss about Query tree protocol which may influenced by id distribution. Then we propose a novel type of this protocol called Reverse Query tree to solve it.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Economic growth models: symbolic and numerical computations

    • Authors: P. B. Vasconcelos
      Pages: 47 - 54
      Abstract: Growth economic models play a crucial role in understanding countries development, inter-country macroeconomic relationship and, ultimately, to anticipate the effects on endogenous variables due to political shocks on model parameters or exogenous variables. Yet, build a mathematical model can be a difficult and time consuming task. Symbolic computations can be of great help in the development process. Then, the ability to simulate, under initial assumptions, is, assuredly, a priceless tool for policy makers to take decisions and to adapt them along the time. Robust and efficient solvers are required to allow for reliable and fast answers. This paper deals with an integrated computational approach to economic growth models, based on the exceptional ability of MATLAB`s numerical computing and exploring its symbolic computing capabilities. Illustration is made with the Ramsey-Cass-Koopmans model, one of the macroeconomic workhorse models.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Comparative study of data fusion algorithms in P300 Based BCI

    • Authors: Mohammed J. Alhaddad, Mahmoud Kamel, Noura Al-Otaibi
      Pages: 47 - 54
      Abstract: Brain-Computer interfaces (BCI) research aims at developing systems that help those disabled people communicating through the use of computers and their brain waves. The BCI researchers put most of their effort on developing new algorithms to improve the speed and accuracy of the prediction mechanisms in BCI applications. For that reason, this study is examine the four combination methods that used for aggregate information form several trials. These methods include Summing Scores, Ensemble Average, Bayesian theory and Dempster Shafer. The main purpose of this study is to improve the speed of prediction mechanism with keep a good classification accuracy. This study was applied on able and disable subjects. Our study result show that the performance of four methods is comparable on able subjects. But the Dempster shafer theory appears best in performance for disabled subjects.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Software Architecture Viewpoint Models: A Short Survey

    • Authors: Valiallah Omrani, Seyyed Ali Razavi Ebrahimi
      Pages: 55 - 62
      Abstract: A software architecture is a complex entity that cannot be described in a simple one-dimensional fashion. The architecture views used to describe software provide the architect with a means of explaining the architecture to stakeholders. Each view presents different aspects of the system that fulfill functional and non-functional requirements. A view of a system is a representation of the system from the perspective of a viewpoint. Architecture viewpoints in software products provide guidelines to describe uniformly the total system and its subsystems. It defines the stakeholders whose concerns are reflected in the viewpoint and the guidelines, principles, and template models for constructing its views. The results of this study may serve as a roadmap to the software developers and architects in helping them select the appropriate viewpoint model based on the stakeholders and concerns that need to be covered by views.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Diffuse Objects Extraction in Coronal Holes Using Active Contour Means
           Model

    • Authors: Hamid Reza Tajik, Javad Rahebi
      Pages: 55 - 61
      Abstract: This paper presents the application of active contour models (Snakes) for the segmentation of diffuse objects from coronal holes on the sun imaging telescope by means of active contour. In this paper the partition is less important and the focus is on the extraction of diffuse objects, namely coronal holes in EIT (Extreme Ultraviolet Imaging Telescope) images. Coronal holes are regions of low-density plasma on the sun that have magnetic fields that open freely into interplanetary space. The proposed method is based on level set evolution. Since an active contour is a dynamic spline that can be adjusted to fit onto the boundary of the object based on energy minimization, and this method independent of selective region which we want to extract, hence using this method improved the result of segmentation. In addition to extracting diffuse objects of coronal holes, a new work that has been done to improve results, is that speed algorithm by implementing two methods: Reinitialization and Narrow band which related to the level set method has been used. Received images from satellites have large size so this method is very effective on these images.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • High Capacity Secure Image Steganography Based on Contourlet Transform

    • Authors: Kolsoom Shahryari, Mehrdad Gholami
      Pages: 62 - 65
      Abstract: In this paper we propose an image steganography technique which embeds secret data without making explicit modifications to the image. The proposed method simultaneously provides both imperceptibility and undetectability. We decompose image by contourlet transform and determine nonsmooth regions. Embedding data in these regions cause less degradation in image quality. Contourlet sub-bands are divided into 3×3 blocks. Central coefficient of each block is considered for embedding if they belong to edgy regions. Experiments show that this method can achieve high embedding capacity while remains undetectable by Farid`s universal steganalysis technique.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • A cluster-based topology control algorithm for wireless sensor networks

    • Authors: Abolfazl Toroghi Haghighat, Maryam Rashidi
      Pages: 66 - 69
      Abstract: Wireless sensor networks and limitation of their energy resources are big challenges for the researchers at present. Topology control is one of the mechanisms for improving energy consume of these networks. The protocol which is presented is a Neighbor-based Clustering Topology Control Algorithm which is called NCTC. NCTC uses centralized and distributed algorithms. For this reason, it is regarded as a hybrid approach. In addition, it doesn’t need local information for topology construction. NCTC consumes low energy and also it has low complexity message. Simulation results show that in NCTC algorithm network lifetime is prolonged significantly.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Petro-physical characterization and 3D digital modeling for geometric
           reconstruction of the Neolithic ``domus de janas`` of Sedini field
           (North-Sardinia, Italy)

    • Authors: Stefano Columbu, Giovanni Guccini, Giorgio Verdiani
      Pages: 70 - 80
      Abstract: The subject of the investigation is a volcanic rock in which a group of Neolithic tombs named ``domus de janas`` have been excavated. this operation is quite common in Sardinia, even if in this specific case it assumes some even more interesting characteristics. The research started gathering the 3D digital models with a high level of details and developing this virtual model with its great accuracy within its geographical -virtual- environment. The further steps were aimed at providing the information about its petrophysical characteristics, alteration processes and the evidences of the missing parts fallen during an ancient collapse. The main task is showing how to put together the 3D survey of this monument with all the data about its decay. The further development of this research will be aimed to: the definition of a searchable model with all these information linked in it, to produce a complete reconstruction of the original structure of the tombs, the definition of the potential threats on the future for this monument conservation.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Application of Pre-evolution Genetic Algorithm in Fast Path Planning for
           UCAV

    • Authors: Lu Cao, An Zhang
      Pages: 74 - 79
      Abstract: Due to the complex constraints, more uncertain factors and critical real-time demand of path planning for unmanned combat aerial vehicle (UCAV), an approach of fast path planning based on Voronoi diagram and pre-evolution genetic algorithm (PEGA) is proposed, which makes use of the principle of hierarchical path planning. First the Voronoi diagram is utilized to generate the initial paths and calculate the weight of the paths by considering the constraints. Then the optimal path is searched by using PEGA. Multiprocessors parallel computing techniques are used for PEGA to improve the traditional genetic algorithm and the optimal time is greatly reduced. Simulation results verify that the method of path planning is more favorable in the real-time operation. It can improve the adaptability of dynamic battlefield and unexpected threats for UCAV.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • A Survey: variants of TCP in Ad-hoc networks

    • Authors: Komal Zaman, Muddesar Iqbal, Muhammad Shafiq, Azeem Irshad
      Pages: 80 - 87
      Abstract: MANET (Mobile Ad-hoc network) forms a temporary network of wireless mobile nodes without any infrastructure where all nodes are allowed to move freely, configure themselves and interconnect with its neighbors to perform peer to peer communication and transmission. TCP (Transmission Control Protocol) offers reliable, oriented connection and mechanism of end to end delivery. This article provides the review and comparison of existing variants of TCP for instance: The TCP Tahoe, The TCP Reno, The TCP New Reno, The Lite, The Sack, The TCP Vegas, Westwood and The TCP Fack. TCP’s performance depends on the type of its variants due to missing of congestion control or improper activation procedures such as Slow Start, Fast Retransmission, and Congestion Avoidance, Retransmission, Fast Recovery, Selective Acknowledgement mechanism and Congestion Control. This analysis is essential to be aware about a better TCP implementation for a specific scenario and then nominated a suitable one.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Adaptive Majority-based Re-routing for Differentiated Delay in Wireless
           Sensor Networks

    • Authors: Akram Golmohammadi, Sayyed Majid Mazinani
      Pages: 81 - 88
      Abstract: The main purpose of a sensor network is information gathering and delivery. Therefore, the quantity and quality of the data delivered to the end-user is very important. In this paper, we focus on building one aspect of service quality based routing model as delay called MRHD which can route packets towards the destination node by classifying data into differentiated classes. Moreover, MRHD employs an adaptive policy called majority based re-routing policy in order to route the packets with instantaneously change in number implying occurrence of special events via paths with lower delay.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Design Context Aware Activity Recommender System for Iranian Customer Mind
           Activism in Online Shopping

    • Authors: Saber Pahlavan, Morteza Hajizadeh, Adel Azadkhah, Ali Ansarifard
      Pages: 88 - 96
      Abstract: E-commerce has made life simple and innovative of individuals and groups. Nowadays, social networks are widely used by everyone. So, it is necessary to do appropriate and situation aware activities in these networks to gain benefits, In this research, a context aware recommender system has modeled for using in social networks focus on Iranian customer mind activism in online shopping. This system makes its recommendations for user based on behavior and activities of her friends in the same situation in social network. In other word, this modeled recommender system uses collaborative filtering algorithm. All the connections of user in social network, containing direct and indirect, are considered for recommending by recommender system; but, based on connection type and its distance to user, proportional factor is assigned. On the other, In this research we study the consumer behavior in online shopping of electronics especially in Iran. Primary data was collected through the questionnaire survey and by emails from personal contacts in two major cities of Iran. Price, time saving and convenience were identified as important factors which lead to certain buying behavior in online shopping.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Image Content Based Retrieval System using Cosine Similarity for Skin
           Disease Images

    • Authors: Sukhdeep Kaur, Deepak Aggarwal
      Pages: 89 - 95
      Abstract: A content based image retrieval system (CBIR) is proposed to assist the dermatologist for diagnosis of skin diseases. First, after collecting the various skin disease images and their text information (disease name, symptoms and cure etc), a test database (for query image) and a train database of 460 images approximately (for image matching) are prepared. Second, features are extracted by calculating the descriptive statistics. Third, similarity matching using cosine similarity and Euclidian distance based on the extracted features is discussed. Fourth, for better results first four images are selected during indexing and their related text information is shown in the text file. Last, the results shown are compared according to doctor’s description and according to image content in terms of precision and recall and also in terms of a self developed scoring system.
      PubDate: 2013-09-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • The use of a Comprehensive Identification Infrastructure in Enhancing the
           lifetime of Sensor Networks

    • Authors: Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi
      Pages: 97 - 103
      Abstract: Regarding to the application of sensor networks, sensor nodes should be designed so that they are cheap and small. Therefore, the sensor nodes are severely in energy constraints. On the other hand, the increase in the operating time of sensor networks especially in military and environmental applications is a criterion in evaluating the performance of sensor networks. Thus, increasing the lifetime of sensor networks has permanently attracted attention of researchers. The use of a virtual backbone, as well as clustering methods has a significant impact on increasing the network lifetime. Thus, in this paper, we attempted to combine backbone composition-based methods and clustering methods in order to introduce a new method based on the use of convex clusters connected with lower power consumption for data collection in networks. Simulation results show that above mentioned approach has had a significant improvement in comparison with the clustering methods and techniques involved in making a backbone.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • An Ontology Design Pattern of the Multidisciplinary and Complex Field of
           Climate Change

    • Authors: Ibrahima Diop, Moussa Lo
      Pages: 104 - 113
      Abstract: This article presents the manual and collaborative construction of an ontology design pattern (a generic ontology), named OntoCLUVA, of climate change (CC) field. This pattern is built for the needs of the construction of climate change ontologies. We used this pattern for a knowledge management system (KMS) of climate change. It will allow to each module of this KMS to build its own ontology of climate change domain for its tasks consisting in discovering and adapting the ontology components.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Measuring Trust and Selecting Cloud Database Services

    • Authors: W.P. Eureka Priyadarshani, Gihan N. Wikramanayake, E.M. Piyal Ekanayake
      Pages: 114 - 120
      Abstract: In a cloud environment, third party controlled asset sharing cloud databases is the motivation for search of trust. Lack of trust appears to be a probable major cause for fear when outsourcing databases. Research literature reviews indicate that the architecture of cloud databases has a potential to mitigate user distrust. In this paper, we focus on measuring trust in cloud database services based on user selected relative or direct factors. Our study proposes a formal trust mechanism in cloud databases where the user can select his most trusted Cloud Service Provider.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Real-Time and Robust Method for Hand Gesture Recognition System Based on
           Cross-Correlation Coefficient

    • Authors: Reza Azad, Babak Azad, Iman tavakoli kazerooni
      Pages: 121 - 125
      Abstract: Hand gesture recognition possesses extensive applications in virtual reality, sign language recognition, and computer games. The direct interface of hand gestures provides us a new way for communicating with the virtual environment. In this paper a novel and real-time approach for hand gesture recognition system is presented. In the suggested method, first, the hand gesture is extracted from the main image by the image segmentation and morphological operation and then is sent to feature extraction stage. In feature extraction stage the Cross-correlation coefficient is applied on the gesture to recognize it. In the result part, the proposed approach is applied on American Sign Language (ASL) database and the accuracy rate obtained 98.34%.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Optimized Method for Real-Time Face Recognition System Based on PCA and
           Multiclass Support Vector Machine

    • Authors: Reza Azad, Babak Azad, Iman tavakoli kazerooni
      Pages: 126 - 132
      Abstract: Automatic face recognition system is one of the core technologies in computer vision, machine learning, and biometrics. The present study presents a novel and improved way for face recognition. In the suggested approach, first, the place of face is extracted from the original image and then is sent to feature extraction stage, which is based on Principal Component Analysis (PCA) technique. In the previous procedures which were established on PCA technique, the whole picture was taken as a vector feature, then among these features, key features were extracted with use of PCA algorithm, revealing finally some poor efficiency. Thus, in the recommended approach underlying the current investigation, first the areas of face features are extracted; then, the areas are combined and are regarded as vector features. Ultimately, its key features are extracted with use of PCA algorithm. Taken together, after extracting the features, for face recognition and classification, Multiclass Support Vector Machine (SVMs) classifiers, which are typical of high efficiency, have been employed. In the result part, the proposed approach is applied on FEI database and the accuracy rate achieved 98.45%.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Designing Expert System for Detecting Faults in Cloud Environment

    • Authors: Marzieh Shabdiz, Alireza Mohammadrezaei, Hossein Bobarshad
      Pages: 133 - 140
      Abstract: Many fault detection techniques for detecting faults in rule bases system have appeared in the literature. These techniques assume that the rule base is static. This paper presents a new approach by designing Expert system for detecting faults in dynamic environment, such as cloud. Cloud resources are usually not only shared by multiple users but are also dynamically re-allocated per demand. Therefore, rules may be added/deleted in response to certain events happening in the integrated system being controlled by the rules. The approach makes use of spanning trees and Complementary sets to check a dynamic rule base for different kinds of faults underlying directed graph and devises a new method with scripting language on web based tools. This is performed as rules are being added to the dynamic rule base one at a time without the need to rebuild the structures and update rules and paths by expert system.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • High-Speed Optical Home Network Using Graded Index Plastic Optical Fibers
           for a Smart House

    • Authors: Tetsuya Toma, Hideo Asada, Tetsuro Ogi, Yasuhiro Koike
      Pages: 141 - 149
      Abstract: In this paper, we propose a home monitoring, management, and communication system (HMMCS) with high-seed optical home network for a smart house in a smart city to optimize the energy usage and to create a comfortable environment. The HMMCS monitors the interior environment and the electricity consumption of all electric appliances. It also records log data, shares information and movies/images, and cross-connects with web services. We assembled small-scale prototype HMMCS and developed application software with an original user interface. The results of a test run reveal that the HMMCS can monitor electricity consumption and interior environments in real time and can control different types of electric appliances including servers that play movies. The maximum data traffic load in a smart house has been calculated using the measured traffic data. Moreover, we found that a smart house with HMMCS inevitably requires a high-speed optical network for real-time, high-quality responses.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • Prolonging sensor networks lifetime using convex clusters

    • Authors: Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi
      Pages: 150 - 156
      Abstract: Reducing the energy consumption of nodes in sensor networks and prolonging the network life time has been proposed as one of the most important challenges facing researchers in the field of sensor networks. Therefore, designing an energy-aware protocol to gather data from network level and transmitting it to sink is placed on the agenda at this paper. After presenting an analysis of the processes of clustering in sensory networks and investigating the effect of sending interval on the amount of energy consumption, We have shown that if the use of convex static casters be done such as all the communications within the cluster with the sending distance less than the optimal threshold, it Will help to increase the lifetime of nodes. also have shown that if we create a virtual backbone between cluster heads to transfer far cluster heads data from sink to sink , will has a significant impact on increasing the network lifetime. For this reason, a detailed discussion on how to determine the size of clusters and partitioning of the network environment to them is presented in Chapter 4.Simulation results show considerable improvement of the proposed algorithm.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
  • A New Image Steganography Method Based on Pixel Neighbors and 6 Most
           Significant Bit(MSB) Compare

    • Authors: Mashallah Abbasi Dezfouli, Sajad Nikseresht, Seyed.Enayatallah Alavi
      Pages: 157 - 162
      Abstract: Today, steganography is known as an effective way to convey secret data. A wide range of techniques has been developed in this context, each seeking to improve certain problems of their own. The current paper presents a method by which, when comparing three color values at each pixel to the corresponding ones from all its eight neighbors, it is attempted to embed message bits into the two least significant bits of a color component of an image that an acceptable color difference has happened in. Due to the mechanism proposed, this method makes the message difficult to be discovered. However, since message detection does not need to insert additional data to identify the colors containing message bits, changes in image is less and the imperceptibility is higher.
      PubDate: 2013-11-30
      Issue No: Vol. 4, No. 6 (2013)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 23.20.166.68
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016