SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2014)
-
A Review of Trust-Aware Recommender Systems Based on Graph Theory
The Web is currently characterised by user contribution. As a result, content is generated in an uncontrolled way leading to the so-called “information overload”. The role of information ...Authors: Panagiota Tselenti, Konstantinos Danas
Year Published: Dec. 2014 | 1-12 | CSCESM2014 -
Generating Random Paths between Two Points in Space: Proposed Algorithm
In this paper, a computerized method is proposed to generate a random path that consists of finite number of points in space, those points are randomly generated in number. They satisfy ...Authors: Ahmad Tayyar
Year Published: Dec. 2014 | 13-16 | CSCESM2014 -
Information Visualisation View Design: Principles and Guidelines
Research in the field of Information Visualisation usually results in the construction of an artifact to visually represent information. Since the end product of design science research is also an ...Authors: Louis Engelbrecht, Adele Botha, Ronell Alberts
Year Published: Dec. 2014 | 17-28 | CSCESM2014 -
Numerical Block High-Level Synthesis
Nowadays, contemporary complex digital integrated circuits (ICs) are very difficult to deliver in the market on time. Therefore, formal, fully automated and rapid methods are needed for designing ...Authors: Michael Dossis, Vasilios Hados, Georgios Dimitriou
Year Published: Dec. 2014 | 29-40 | CSCESM2014 -
Toward Multi-level Self-organization in Graph-rewriting Automata
We have been working on a class of connected planar 3-regular graphs (rotation systems) with states on each node, and their dynamical behaviors based on three structurally rewriting rules. In this ...Authors: Kohji Tomita, Akiya Kamimura, Haruhisa Kurokawa
Year Published: Dec. 2014 | 41-46 | CSCESM2014 -
Designing Mobile Guide Service for Small Tourism Companies Using User Centered Design Principle
This paper describes the design and development process of a mobile web service for tourism sector by using User Centered Design (UCD) principles. The result of applying UCD method is a robust mobile ...Authors: Ari Alamäki, Amir Dirin
Year Published: Dec. 2014 | 47-58 | CSCESM2014 -
IWFMS: An Internal Workflow Management System/Optimizer for Hadoop
The scale of jobs running on parallel computation platform such as Hadoop is increasing quickly, thus workflow engines that manage data processing jobs have become increasingly important. However, ...Authors: Lian Liu, Yao Shen
Year Published: Dec. 2014 | 59-68 | CSCESM2014 -
Spatio-Temporal Propagation for Web Sensors
We experience or forecast various phenomena (e.g., rain, snow, and earthquake) in the physical world, while we carry out various actions (e.g., blogging, searching, and e-shopping) in the Web world. ...Authors: Shun Hattori
Year Published: Dec. 2014 | 69-76 | CSCESM2014 -
Fast Detection and Removal Algorithms for Ruled Lines in Full-Color Scanned Handwritten Documents
Converting handwritten documents into its machine written counterpart automatically requires several processes including removing background noise and ruled lines, then Optical Character Recognition. ...Authors: Mohammed A. A. Refaey
Year Published: Dec. 2014 | 77-80 | CSCESM2014 -
Online Handwriting Recognition for Maldivian Language
An online handwriting recognition (OHWR) is a tool that automatically converts screen brush strokes into text using a special digitizer. Gesture recognition and several customized methods are ...Authors: Jamal Zraqou
Year Published: Dec. 2014 | 81-85 | CSCESM2014 -
Enhancing the Performance of Condensed Graph's Computation in Distributed Systems by Using Numerical Libraries as Super Nodes
Condensed Graph is a graph based programming model which is mainly used for the modeling of imperative, eager and lazy computation and also, it is a simple way to present a workflow. The biggest ...Authors: Samira Pakdel, Anne C. Elster
Year Published: Dec. 2014 | 86-93 | CSCESM2014 -
Applying Reinforcement and Mastery Learning: How It Works Based on Personalized E-learning Curriculum?
Many researchers in the field of personalized learning or topic sequencing have proposed and implemented various mechanisms to improve the learning process with the main objectives of maximizing ...Authors: Melvin Ballera, Ismail AteyaLukandu, Aziza Ehmaid Omar
Year Published: Dec. 2014 | 94-103 | CSCESM2014 -
Rapid E-Learning and Desktop Virtualization in Education
Generally it is not easy for an instructor to prepare and deliver electronic courses via e-learning. Therefore it is necessary to work and develop an easy method to deliver e-learning courses. In ...Authors: Alaattin Parlakkılıç
Year Published: Dec. 2014 | 104-111 | CSCESM2014 -
Decentralized Bittorrent Social Online Network
With the emergence of Facebook, Twitter, and LinkedIn, web-based social online networks have become increasingly popular among users worldwide as a way to connect with friends, family, and ...Authors: Chang-Shyh Peng, Suhail Alsuhail
Year Published: Dec. 2014 | 112-120 | CSCESM2014 -
The Benefits and Challenges of e-Health Applications: A Content Analysis of the South African Context
e-Health is referred to in literature as the usage of information and communication technologies (ICT’s) in the health domain, to administer treatment of patients, research, health education and ...Authors: Marna Botha, Adele Botha, Marlien Herselman
Year Published: Dec. 2014 | 121-131 | CSCESM2014 -
Modified Constrained Two-bit Transform for Motion Estimation
Motion estimation (ME) using bit-plane matching (BPM) algorithm has been proposed. The bit-plane matching algorithm transforms original images into bit-planes and performs a fast block ...Authors: Hyungdo Kim, Jechang Jeong
Year Published: Dec. 2014 | 132-135 | CSCESM2014 -
Improving Throughput and Fairness in IEEE 802.11e
WLANs have become increasingly popular and widely deployed. The MAC protocol is one of the important technology of the WLAN and affects communication efficiency directly. In this paper, focusing on ...Authors: Takumi Sanada, Xuejun Tian, Takashi Okuda, Tetsuo Ideguchi
Year Published: Dec. 2014 | 136-147 | CSCESM2014 -
An Approach to the Wireless Sensor Network Design for Stored Food Robust Monitoring
New applications of WSN as advanced monitoring of stored food to ensure their optimum state for human consumption require providing reliability. This paper presents an approach for designing WSN ...Authors: Juan V. Capella, Alberto Bonastre, Rafael Ors, Susana Rubio-Arraez, Marisa L. Castelló
Year Published: Dec. 2014 | 148-153 | CSCESM2014 -
Security and Resilience of Data Shared and Exchanged within a Wireless Sensor Network
The data exchanged within the wireless sensor network often contains the information important to save the human lives, e.g. vital parameters of the firefighters during an action. The crucial issue ...Authors: Anna Sojka-Piotrowska, Krzysztof Piotrowski, Jana Krimmling
Year Published: Dec. 2014 | 154-164 | CSCESM2014 -
Compact Physical Model of TSV for Quick and Accurate Exploration of 3DICs
This paper presents a novel physics-based analytical TSV model that allows fast and accurate design space exploration of signal propagation and attenuation properties in 3D ICs, and represents a ...Authors: Michalis Zervas, Maria Spanou, George Dimitriou, Georgios I. Stamoulis
Year Published: Dec. 2014 | 165-172 | CSCESM2014 -
Electromigration: Estimation Methodology for the Sub-45nm Era
Electromigration is starting to be one of the most significant problems considering reliability in integrated circuits design. The problem is induced by the large current density in circuit ...Authors: George Floros, George Dimitriou, Georgios I. Stamoulis
Year Published: Dec. 2014 | 173-178 | CSCESM2014 -
Optimization of an Integrated Circuit Placement Algorithm in a Parallel Environment
This paper presents an implementation of GORDIAN [1], a method for Global Placement of standard-cell based circuit designs, incorporating a number of algorithmic optimizations and parallelization in ...Authors: Stavros K. Ioannidis, Dimos Ntioudis, Charalampos Antoniadis, Antonios N. Dadaliaris, Panagiota Tsompanopoulou, Nestor E. Evmorfopoulos, Georgios I. Stamoulis
Year Published: Dec. 2014 | 179-192 | CSCESM2014 -
SER Analysis for Multiple Affected Gates
Reliability of VLSI circuits had always been a major issue during the design process. It becomes more significant if we consider that modern integrated circuits are extremely sensitive to various ...Authors: Georgios Ioannis Paliaroutis, Pelopidas Tsoumanis, George Dimitriou, Georgios I. Stamoulis
Year Published: Dec. 2014 | 193-199 | CSCESM2014 -
VDA-Place: Voltage-Drop-Aware Standard Cell Placement
Voltage drop is becoming increasingly significant as integrated circuit (IC) fabrication processes move beyond 45nm, affecting both timing and reliability. We propose an IR-Drop based detailed ...Authors: Antonios N. Dadaliaris, George Dimitriou, Georgios I. Stamoulis
Year Published: Dec. 2014 | 200-205 | CSCESM2014 -
Energy Efficient Virtual Topology Configuration Algorithm for IP Over WDM Optical Networks
Until recently the main limitation to the development of networks was the cost of equipment and transmission. Today the main problem is the increasing energy consumption. A number of studies ...Authors: Georgia Beletsioti, Georgios Papadimitriou, Petros Nicopolitidis, Emmanouel Varvarigos
Year Published: Dec. 2014 | 206-213 | CSCESM2014