Academia.eduAcademia.edu

Information Science and Engineering

description205 papers
group4,902 followers
lightbulbAbout this topic
Information Science and Engineering is an interdisciplinary field that focuses on the collection, storage, retrieval, and dissemination of information. It integrates principles from computer science, library science, and information technology to develop systems and methodologies for managing data and information effectively.
lightbulbAbout this topic
Information Science and Engineering is an interdisciplinary field that focuses on the collection, storage, retrieval, and dissemination of information. It integrates principles from computer science, library science, and information technology to develop systems and methodologies for managing data and information effectively.

Key research themes

1. How is the definition and conceptual scope of information science evolving to encompass diverse interdisciplinary domains?

This theme investigates the foundational understanding of information science as a discipline, tracing its historical roots and its transformation as information concepts infiltrate various scientific and technological fields. Understanding this evolution is critical for framing ongoing research, shaping academic curricula, and guiding interdisciplinary collaboration within information science.

Key finding: The paper systematically reviews early definitions and etymological origins of 'information,' highlighting the absence of a universal definition despite extensive discourse. It outlines the historical branching into computer... Read more
Key finding: This work situates information architecture within the broader evolution of information science, clarifying distinctions between physical system architectures and the conceptual structuring of information. It traces its... Read more
Key finding: Through the compilation of research presented at an international conference, this paper emphasizes the multidisciplinary nature of informatics engineering and information science. By showcasing works from 39 countries and... Read more

2. What are effective methodologies for applying information science principles to precision agriculture and environmental monitoring?

This theme focuses on the practical application of information science, sensor technology, and environmental data acquisition in agriculture, leveraging interdisciplinary systems to enhance plant monitoring, resource management, and predictive modeling. It sheds light on how information systems and biosensors can be integrated with data processing for timely and actionable agricultural decision-making.

Key finding: The paper introduces the design of portable biosensor devices, specifically "Floratest," which use chlorophyll fluorescence induction curves to remotely and rapidly assess plant health under environmental stresses such as... Read more
Key finding: This study presents a renewable-energy powered, sensor-driven automatic water pumping system designed for smart greenhouses. It employs soil moisture sensors interfaced with a microcontroller and renewable energy sources such... Read more
Key finding: The paper proposes a distributed information dissemination protocol for VANETs using rateless coding. While focused on vehicular networks, the methodologies for efficient data dissemination, resource management, and... Read more

3. How are advances in computational methods, including machine learning and visual analytics, enhancing traffic analysis and software evolution understanding in information science?

This theme explores sophisticated computational and analytical techniques developed within information science to address complex real-world datasets, such as traffic imagery and long-lived software projects. It analyzes how machine learning models, visual analytics, and evolutionary data mining contribute to deeper insights, improved monitoring, and enhanced decision-making in dynamic systems.

Key finding: Utilizing convolutional neural networks and image processing algorithms, this work develops a real-time traffic analysis system for congestion and incident detection. It demonstrates the use of trained models to classify... Read more
Key finding: The paper articulates a framework for evolutionary visual software analytics aimed at comprehending software evolution. It combines data retrieval, statistical analysis, machine learning, and interactive visualization... Read more
Key finding: This research applies the Single Shot MultiBox Detector (SSD), a fast and accurate deep convolutional neural network, for object detection in self-driving car simulations. It reflects the evolution of computational methods in... Read more

All papers in Information Science and Engineering

Clustering is an important research topic in wireless networks, because cluster structures can facilitate resource reuse and increase system capacity. Ad hoc networks consist of wireless hosts that communicate with each other in the... more
The concept of adaptive technologies is increasingly prevalent in many areas, particularly in learning. In this context we require quick and robust approaches for developing adaptive learning environments. In order to construct such... more
Tools like JUnit and its relatives are making software testing reachable even for introductory students. At the same time, however, many introductory computer sciences courses use graphical interfaces as an "attention grabber"... more
Scalability presents a significant challenge in vehicular communication, particularly when there is no hierarchical structure in place to manage the increasing number of vehicles. As the number of vehicles increases, they may encounter... more
Scalability presents a significant challenge in vehicular communication, particularly when there is no hierarchical structure in place to manage the increasing number of vehicles. As the number of vehicles increases, they may encounter... more
Many applications require to send the information from the source node to the destination node through the communication network. In order to support these applications, it is necessary to determine a path of minimal cost to connect the... more
Irrigation is a traditional method that uses a higher proportion of laborer's than other daily agricultural practices. Sensors and microcontrollers are used to automatically irrigate the plants. identify when the plants need to be... more
Abstract: In automatic plant watering system, an automation of farm irrigation and soil moisture control is carried out by using an embedded system designed around Atmega328 (microcontroller), soil moisture sensor, L293D module, humidity... more
Causal multicast is required for several distributed applications. In a mobile computing environment, it is especially important for applications that involve human interactions from several locations, for example, teleconferencing. In... more
Abstract- Inspiration to this project taken from the nations where financial system depends on farming and the climatic circumstances lead to absence of downpours and shortage of water. When we are away from the crop land for a long day... more
The Common Object Request Broker Architecture (CORBA) is one of the most popular standard for middleware platforms based on object technology. CORBA shields distributed applications from the heterogeneity of the bare distributed system.... more
This paper proposes an automatic water pumping system for a smart greenhouse, optimizing plant irrigation using renewable energy. It features sensors monitoring soil moisture, a pump powered by solar or wind, and a control unit adjusting... more
XML is going to be the main language for exchanging financial information between businesses over the Internet. As more and more banks and financial institutions move to electronic information exchange and reporting, the financial world... more
The more web data sources provide XML data, the greater information flood problem has been caused. Hence, there have been increasing demands for efficient methods of discovering desirable patterns from a large collection of XML data. In... more
The explosive growth of data available in the internet exposes a serious problem, informationoverflow, where each user gets rarely necessary information and which brings blind spot of information search. The blind spot means the areas... more
Modern data privacy regulations such as GDPR, CCPA, and CDPA stipulate that data pertaining to a user must be deleted without undue delay upon the user's request. Existing systems are not designed to comply with these regulations and can... more
This paper presents Flashmon version 2, a tool for monitoring embedded Linux NAND flash memory I/O requests. It is designed for embedded boards based devices containing raw flash chips. Flashmon is a kernel module and stands for "flash... more
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags can be proved to be... more
Mobile networks have been quickly adopted by many companies and individuals. However, multiple factors such as mobility and limited resources often constrain availability and thus cause instability of the wireless environment. Such... more
Mobile ad hoc network (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastructure. This has made it... more
SummaryRecently, the routing problem in vehicular ad hoc networks is one of the most vital research. Despite the variety of the proposed approaches and the development of communications technologies, the routing problem in VANET suffers... more
In this paper, we address the problem of delivering multimedia content to a sparse vehicular network from roadside info-stations, using efficient vehicle-to-vehicle collaboration. Due to the highly dynamic nature of the underlying... more
In this paper, we have presented an efficient non-blocking coordinated check pointing algorithm for distributed systems. It produces a consistent set of checkpoints, without the overhead of taking temporary checkpoints; the algorithm also... more
In distributed systems, there are many opportunities for failure. Any component in any compute node could fail. This includes, but is not limited to, the processor, disk, memory, or network interface on the node. Any of these failures... more
Deeply pipelined, superscalar processors require accurate branch prediction to achieve high performance. Two-level branch predictors have been shown to achieve high prediction accuracy. It has also been shown that branch interference is a... more
Abstract: In automatic plant watering system, an automation of farm irrigation and soil moisture control is carried out by using an embedded system designed around Atmega328 (microcontroller), soil moisture sensor, L293D module, humidity... more
Point pattern matching (PPM) is an important topic in the fields of computer vision and pattern recognition. According to if there exists a one to one mapping between the two point sets to be matched, PPM can be divided into the case of... more
IPSec is a suite of protocols that provides security for internet communications at the IP layer. The security properties of IPSec mainly depend on the key exchange protocols where the efficiency and security of the key management are... more
Frequent tree patterns have many practical applications in different domains such as XML mining, web usage analysis, etc. In this paper, we present OInduced, a novel and efficient algorithm for finding frequent ordered induced tree... more
Internet Protocol Security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). IPSec, proposed by Internet Engineering Task Force (IETF), is a popular tunneling technology adopted for the Virtual... more
There are currently numerous practical applications to improve the effectiveness of Radio Frequency Identification (RFID) Systems. RFID provides an efficient identification for shipping and receiving goods. In warehouse management, RFID... more
The process description languages are used in the business may be useful in the optimization of logistics processes too. The process description languages would be the obvious solution for process control, to handle the main sources of... more
The process description languages are used in the business may be useful in the optimization of logistics processes too. The process description languages would be the obvious solution for process control, to handle the main sources of... more
Checkpointing algorithms suitable for mobile computing environments should be economical in terms of storage and energy consumption, and they should be able to handle that at starting time not all processes are known which are to be... more
The Library for Interface Testing (LIFT) supports writing unit tests for Java applications with graphical user interfaces (GUIs). Current frameworks for GUI testing provide the necessary tools, but are complicated and difficult to use for... more
The following article presents the results on the impact of encryption algorithms and the cryptographic hash function on the QoS (Quality of Service) transmission in a computer network. A network model supporting data encryption using the... more
Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and operation of PEPs.... more
Key Management is the critical issue of a cryptographic system and it requires a better security mechanism. Bio-cryptology provides a strong solution for the said critical issue. Fuzzy vault scheme is a popular scheme to design... more
Over the last few years, connectionism or neural networks (NN) have successfully been applied to a wide range of areas and have demonstrated their capabilities in solving complex problems. Current indications show that these techniques... more
Upcoming ubiquitous computing systems are required to operate in dynamic, diverse, unverified, and unpredictable operating environment. The OSGi (Open Service Gateway initiative) framework employs the service-oriented approach and the... more
Directed signature scheme is applicable when the signed message contains information sensitive to the receiver, because only receiver can directly verify the signature and that he/she can prove its validity to any third party, whenever... more
Mobile computing raises many new issues such as lack of stable storage, low bandwidth of wireless channel, high mobility, and limited battery life. These new issues make traditional checkpointing algorithms unsuitable. Coordinated... more
Recovery from transient failures is one of the prime issues in the context of distributed systems. These systems demand to have transparent yet efficient techniques to achieve the same. Checkpoint is defined as a designated place in a... more
Checkpointing is one of the commonly used techniques to provide fault tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low... more
Considering the popularity of the Internet, an automatic interactive feedback system for e-learning websites is becoming increasingly desirable. However, there are still some problems for computers to understand the natural language,... more
Considering the popularity of the Internet, an automatic interactive feedback system for Elearning websites is becoming increasingly desirable. However, computers still have problems understanding natural languages, especially the Chinese... more
The need for security in lightweight devices such as radio frequency identification tags is increasing and a pseudorandom number generator (PRNG) constitutes an essential part of the authentication protocols that provide security. The... more
Test Driven Development model is identified for the quality of the final product and the ease of development. This model has a few obstacles while applying for Graphical User Interface development, as User Interface Testing possesses a... more
Image This project on "Automatic Irrigation System on Sensing Soil Moisture Content" is intended to create an automated irrigation mechanism which turns the pumping motor ON and OFF on detecting the moisture content of the... more
Download research papers for free!