Search
Now showing items 1-10 of 19
Developing Single page application with best practices
(2017-04-26)
Browsers have been around since early 1990 and have been used for disseminating information using HTML, CSS and Javascript. Initially, Javascript was used as client side scripting language and its use was limited to data ...
RFID data cleansing with Bayesian Filters
(2017-01-09)
People spend a significant amount of time in indoor spaces (e.g.,
office buildings, subway systems, etc.) in their daily lives.
Therefore, it is important to develop efficient indoor spatial query
algorithms for supporting ...
An Evaluation and Comparison of Ad Hoc Routing Algorithms for the Purpose of Autonomous Vehicle Control
(2017-07-26)
The capability to communicating through a decentralized network with no pre-existing structure is invaluable in numerous different scenarios. In order to effectively utilize these networks, an efficient routing algorithm ...
Framework for Formal Automated Analysis of Simulation Experiments
(2017-04-20)
Simulation experiments are becoming a widely feasible medium for scientific discovery
due to the amount of traceability and reproducibility which computing systems are able to
provide. These characteristics help to ensure ...
A Collaborative, Adaptive-Based Approach to Informal E-Learning Technology Design
(2017-04-25)
Significant innovations in learning technologies are encouraging individuals, especially high school students, to seek enrichment learning opportunities that they normally are not able to take advantage of due to the ...
Energy Usage Pro ling and Topology-Based Scheduling for Clusters
(2017-11-30)
Energy saving is rapidly becoming one of the hottest topics in technology field within recent decades. With the development of technology, it brings a sheer increasing trend of data and the growth scale of clusters and ...
COURSEBUILDER: Design and Development of an eLearning System
(2017-11-28)
Web-based learning environments have the potential to support collaboration among teachers and students and encourage interaction in the classroom by providing quality Internet resources for learning. By incorporating these ...
Comparison of IoT Application Layer Protocols
(2017-04-25)
It has been almost 20 years since the concept of the Internet of Things was first proposed. Now, IoT has become a leading technology that is becoming pervasive in our lives. However, behind the wide deployment of IoT ...
Android Malware Detection through Machine Learning on Kernel Task Structure
(2017-12-11)
The popularity of free Android applications has risen rapidly along with the advent of smart phones. This has led to malicious Android apps being involuntarily installed, which violate the user privacy or conduct attack. ...
Cyber Security System Dynamic Modeling
(2017-12-15)
Cyber security modeling is the process of creating a normalized view of the cyber security situation. A typical cyber security model has information about the network infrastructure, security settings, and a list of possible ...