Skip to main content
    • by 
    • Computing
In many cases poor information quality appears mainly due to in-effectiveness of information management including information production and delivery. Where this situation poses a certain risk. A holistic information risk management model... more
    • by 
    • Computing
    • by 
    •   11  
      ComputingAlgorithmDifferential EquationsMathematical Sciences
Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering,... more
    • by 
    •   20  
      Information SystemsEngineeringElectrical EngineeringMathematics
Motivated by some recent research on the terminal (reduced) distance matrix, we consider the terminal Wiener index (T W ) of trees, equal to the sum of distances between all pairs of pendent vertices. A simple formula for computing T W is... more
    • by 
    •   11  
      ComputingMathematical SciencesTreeMathematical chemistry
Until now, Augmented Reality was mainly associated with visual augmentation which was often reduced to superimposing a virtual object on to a real world. We present in this document a vibro-tactile system called HaptiNav, which... more
    • by 
    •   3  
      Human Computer InteractionArtComputing
In this paper, we propose an approach to possibility and necessity measure speciÿcation. This approach is more adequate to human reasoning than direct speciÿcation of conjunction and implication functions. Using the proposed approach, a... more
    • by  and +1
    •   9  
      ModelingBusiness Information SystemsPure MathematicsComputing
A Computational Study of Redundancy in Randomly Generated Polytopes. In this paper we first survey a number of principles used to randomly generate linear programming problems. Three major classes of LP generators are identified and :on... more
    • by 
    •   3  
      ComputingMathematical SciencesLINEAR PROGRAM
We survey and extend the work on the paradigm called "computing by observing". Its central feature is that one considers the behavior of an evolving system as the result of a computation. To this purpose an external observer records this... more
    • by 
    •   13  
      BehaviorModelingComplexityNatural Computing
The mapping algorithms address the problem of acquiring spatial models of physical environments using mobile robots. We will focus on using the indoor exploration algorithms to construct a map for such environment. Therefore, the problem... more
    • by 
    •   4  
      Computer ScienceTechnologyComputingDepth First Search
    • by 
    •   7  
      Computer VisionComputingNeural NetworkImage segmentation
El presente artículo pretende brindar luces acerca de la importancia de la Psicología Organizacional en el ámbito laboral y ayudarnos a comprender cómo ésta puede resolver conflictos en la organización complementándose con diferentes... more
    • by 
    •   5  
      PsychologyOrganizational PsychologyEducationEmotional intelligence
An Internet of Things (IoT) middleware can solve interoperability problem among "things" in IoT infrastructure by collecting data. However, the sensor nodes' data that is collected by the middleware cannot be directly delivered to cloud... more
    • by 
    • Computing
Automation of several payment processes from start to end is a challenging task, particularly when multiple payments from online and offline billers are involved. In this paper, we introduced a new aggregator system to combine all billing... more
    • by 
    •   5  
      Computer ScienceInformation TechnologyTelecommunicationElectrical
Recently, both companion-matrix methods and subdivision algorithms have been developed for finding the zeros of a truncated spectral series. Since the Chebyshev or Legendre coefficients of derivatives of a function f (x) can be computed... more
    • by 
    •   9  
      Applied MathematicsComputingEngineering MathematicsPolynomial Interpolation
This paper proposes Cognitive Artificial Intelligence (CAI) method for Dissolved Gas Analysis (DGA) interpretation adopting Doernenburg Ratio method. CAI works based on Knowledge Growing System (KGS) principle and is capable of growing... more
    • by 
    • Computing
Computers have a direct impact on our lives nowadays. Human's interaction with the computer has modified with the passage of time as improvement in technology occurred the better the human computer interaction became. Today we are... more
    • by 
    •   18  
      Distributed ComputingGrid ComputingHuman Computer InteractionHuman-Computer Interaction for Games
Document Standard Operating Procedures (SOP) can manage business processes and employee performance in an organization. This study aims to develop a system that can publish SOP documents automatically distributed to employees. In this... more
    • by 
    • Computing
Load balancing functionalities are crucial for best Grid performance and utilization. Accordingly,this paper presents a new meta-scheduling method called TunSys. It is inspired from the natural phenomenon of heat propagation and thermal... more
    • by 
    •   20  
      Computer ScienceAlgorithmsDistributed ComputingDistributed Database
Imaging spectrometry, or hyperspectral imaging as it is now called, has had a long history of development and measured acceptance by the scientific community. The impetus for the development of imaging spectrometry came in the 1970's from... more
    • by 
    •   20  
      HistoryImage ProcessingRemote SensingData Analysis
Pneumonia is one of the highest global causes of deaths especially for children under 5 years old. This happened mainly because of the difficulties in identifying the cause of pneumonia. As a result, the treatment given may not be... more
    • by  and +2
    • Computing
In this paper, we consider smooth words over 2-letter alphabets {a, b}, where a, b are integers having same parity, with 0 < a < b. We show that all are recurrent and that the closure of the set of factors under reversal holds for odd... more
    • by 
    •   13  
      ClosureTheoretical Computer ScienceComputingMathematical Sciences
The concept of the Internet of Things (IoT) is closely related to the concepts of Cyber-Physical System (CPS) and Cyber-Physical-Social System (CPSS). A key feature of these technologies is the integration of the virtual and physical... more
    • by 
    • Computing
Interpolants for Runge-Kutta-Nystriim Methods. Hermite interpolation polynomials arc developed for use with low order Runge-Kutta-Nystr6m methods in producing continuous approximate solutions to second order initial value problems,... more
    • by 
    •   4  
      MathematicsComputer ScienceComputingMathematical Sciences
The quantum cryptography can replace conventional key exchange mechanism with the polarized photons using channels like optic fiber cables. Quantum cryptographic can also provide far and secure data... more
    • by  and +1
    •   6  
      Radio AstronomyQuantum InformationEmbedded SystemsComputing
Both Governments and people around the world have started appreciating the ability of Information and Communications Technology (ICT) to stimulate critical sectors of the economy. These technological innovations provide speedy,... more
    • by 
    • Computing
Performance is a key feature of large-scale computing systems. However, the achieved performance when a certain program is executed is significantly lower than the maximal theoretical performance of the large-scale computing system. The... more
    • by 
    •   19  
      Distributed ComputingParallel ComputingMaterials ScienceComputational Modeling
One of the main causes of traffic congestion, especially at intersections, is because traffic lights have not been able to show the right time according to the existing traffic conditions. Time settings based on peak/off-peak traffic... more
    • by 
    • Computing
In mission critical systems a single failure might cause catastrophic consequences. This sets high expectations to timely detection of design faults and runtime failures. By traditional software testing methods the detection of deeply... more
    • by 
    •   2  
      Computer ScienceComputing
The aim of study is to discover outlier of customer data to found customer behaviour. The customer behaviour determined with RFM (Recency, Frequency and Monetary) models with K-Mean and DBSCAN algorithm as clustering customer data. There... more
    • by 
    • Computing
The problem of predicting a future value of a time series is considered in this paper. If the series follows a stationary Markov process, this can be done by nonparametric estimation of the autoregression function. Two forecasting... more
    • by 
    •   22  
      Data AnalysisTime SeriesPredictionComparative Study
One of the most significant innovation in the Information Technology (IT) industry after the introduction of the personal computer and the internet is Cloud computing. The shift to cloud is a landmark in the IT industry and has raised... more
    • by 
    •   8  
      Information SystemsComputer ScienceComputingCloud Computing
8th International Conference on Computational Science and Engineering (CSE 2020) focuses on Complex systems, information and computation using mathematics and engineering techniques. This conference will act as a major forum for the... more
    • by 
    •   13  
      EngineeringCivil EngineeringMathematics of CryptographyAlgorithms
This work is dedicated to the memory of Prof. Germund Dahlquist.
    • by 
    •   7  
      Applied MathematicsComputingVector CalculusNumerical Analysis and Computational Mathematics
Critical thinking is an essential skill for an educated society. Our experience as computer science educators in an environment with an explicit emphasis on critical thinking has led us to investigate the connection between the two. We... more
    • by  and +1
    •   4  
      Computer Science EducationCritical ThinkingComputingComputer Science Curriculum
This research explores the accessibility issues with regard to the e-commerce websites in developing countries, through a study of Sri Lankan hotel websites. A web survey and a web content analysis were conducted as the methods to elicit... more
    • by 
    •   3  
      ComputingKnowledgeKnowledge Based Organizations
One of the main challenges students in introductory programming courses face is learning the syntax of a particular programming language, such as C++ or Java, while they simultaneously try to understand the fundamental logic of... more
    • by 
    • Computing
Efficient Classes of Runge-Kutta Methods for Two-Point Boundary Value Problems. The standard approach to applying IRK methods in the solution of two-point boundary value problems involves the solution of a non-linear system ofn x s... more
    • by 
    •   3  
      ComputingMathematical SciencesBoundary Value Problem
Meaning is the essence. It is the primary reason for us to keep doing things. Meaning is both significance and the endless unfolding of significance. Visual Meaning is fundamental for visual arts and design processes. One draws, paints,... more
    • by 
    •   22  
      AlgorithmsArtificial IntelligenceHistory Of ComputingPerception
Mathematics is the abstract science of number, quantity, and space, either as abstract concepts (pure mathematics), or as applied to other disciplines such as physics and engineering (applied mathematics). Computing, finance, business,... more
    • by 
    • Computing
The study aims to assess the students' continuance intention (SCI) in using multimedia online learning including students' perceived usefulness (SPU), students' ease of use (SPE), and students' flow experience (SFE). There is no, so far,... more
    • by 
    • Computing
    • by 
    •   10  
      Electrical EngineeringModal AnalysisComputingSimulation
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with... more
    • by 
    •   20  
      MathematicsApplied MathematicsComputer ScienceCombinatorics
Automatic vehicle crash notification system using GSM technology
    • by 
    • Computing
This is an article that was written for the Computer Science Teachers Association (CSTA) of the United States of America journal, entitled The CSTA Voice. It was published in the May 2017 issue of the journal, Volume 13, Issue 2 and... more
    • by 
    •   3  
      ICT in EducationSecondary EducationComputing
The leading-edge of Internet of Things (IoT) gradually make item available on the Internet but data processing is not scaling effectively to fulfil the requirements of centralized cloud environment. One of the main reason of this problem... more
    • by  and +1
    •   20  
      Computer ScienceDistributed ComputingParallel ComputingHigh Performance Computing
Our aim is to estimate the perspective-effected geometric distortion of a scene from a video feed. In contrast to most related previous work, in this task we are constrained to using low-level, spatio-temporally local motion features... more
    • by 
    •   73  
      EngineeringOptimization (Mathematical Programming)Computer ScienceAlgorithms
    • by 
    • Computing
The main goal on this paper is to analyze the Blue Screen of Death – system failure warning – and the communicational experience spawned by it on the Windows operating systems, merchandised by Microsoft Corporation. The suspension of... more
    • by  and +1
    •   5  
      ComputingComputaçãoMicrosoft WindowsProdução De Sentidos
The growth in numbers and capacity of mobile devices such as mobile phones coupled with widespread availability of inexpensive range of biosensors presents an unprecedented opportunity for mobile healthcare applications. In this paper we... more
    • by 
    •   10  
      Health SciencesData MiningSituation awarenessComputing