Computer Science and Information System

Edited by Dr. Panagiotis Petratos & Dr. Demitrios Michalopoulos

ISBN: 960-88672-3-1, 480 pages, Hardback
First published in 2005 by ATINER

Price: Paperback: 50 (It includes Shipping and Handling) Hardcover: 90 (It includes Shipping and Handling)

Electronic copy: 30

Order Form

Table of Contents

 

 

Acknowledgments

v

 

List of Contributors

vii

1.

Computer Science and Information Systems: An Introduction to the Current Volume

Panagiotis Petratos and Demitrios Michalopoulos

1

PART I: Computer Science Research in relation to Medicine

2.

A Computational Model Simulating How Pain Modulation Can Occur Through Transcutaneous Electrical Nerve Stimulation (TENS).

Karen Prince, Jackie Campbell, Phil Picton and Scott Turner

15

3.

A Virtual Healthcare Electronic Medical Record Project - A Lilly Endowment Sponsored Internship Program for High-tech Startup Companies

Barbara J. Nicolai

33

4.

Electronic Patient Records (EPR), a Panacea to Medical Practitioners Woes in Developing Countries The Ghanaian Experience

Joseph Annan

49

5.

Techniques for Identifying Tandem Repeats in DNA Sequences

Md Shah Jahan Miah and Saleh A. Wasimi

59

6.

Information Organisation and Retrieval of Biological and Chemical Ontologies

Sofia Gleni and Panagiotis Petratos

73

PART II: Computer Science Research in relation to Databases, Data Modelling and Data Mining

7.

Using Alternative Data Models in the context of Data Warehousing

Victor Gonzalez-Castro and Lachlan MacKinnon

83

8.

Quality Measurement and Assessment Models Including Data Provenance to Grade Data Sources

Pilar Angeles and Lachlan MacKinnon

101

9.

Information Privacy Principles for Data Mining

G. K. Gupta

 

119

10.

Application of Data Mining in Mobile Radio Network

1.                  A.                Feng and P. Leng

129

PART III: Computer Science Research in relation to Information Security

11.

How Long can Public Key Encryption Stay Secure? Introducing the Implications of the Riemann Hypothesis and Quantum Computing

Mo Adda, Abby McKeever and Amanda Peart

135

12.

Primality Testing Algorithm Using Pythagorean Integers

Boris S. Verkhovsky and Andre Mutovic

143

13.

Vulnerability Assessment: Towards an Integrated Security Infrastructure

C. Onwubiko and A.P. Lenaghan

157

PART IV: Computer Science Research in relation to Information Technology and Information Systems

14.

Designing a Software Agent(s) to Categorise End User Computing Personnel with the Prometheus Methodology

Stephen Hole and Duncan McPhee

173

15.

The Modelling of Information Dissemination: With the ICCMU Website

Joseph A. Meloche and Michelle Mok

193

16.

Rank-reduced Information Retrieval Models and Applications

Eric Jiang

205

17.

Electronic Commerce Utilizing Databases on the World Wide Web

Sofia Gleni, Panagiotis Petratos and Carsten Maple

215

18.

Validating E-Commerce Solutions

Jozef Goetz, Demitrios Michalopoulos and Eric Reao

221

19.

Turnover Following a Technological Change

Marlene E. Burkhardt

237

PART V: Computer Science Research in relation to Distributed Systems and Networking

20.

Survey of the latest Concepts in Distributed Systems

Paul Gnanayutham and Amanda Peart

255

21.

Networking Software Studies with the Structured Testing Methodology

Vladimir V. Riabov

261

22.

A Pilot Study of Web Information Change in the Academic Domain

Petros Kotsidis, Anne Comer and Peter Smith

277

23.

Communication Issues in Large Scale Wireless Ad-hoc Networks

M. Adda, G. Owen, M. Kasassbeh, A. Paraskelidis and A. Peart

299

PART VI: Computer Science Research in relation to Theoretical and Natural Sciences and Engineering

24.

JAIDE: A Formal Methods Based Student Assistant Tool in Developing Java Programs

Sotiris Skevoulis and Vladimir Makarov

313

25.

The Cycles in Matrix Transposition

Jiang Guo, Vladimir Akis and Yuehong Liao

327

26.

Analysis and Visualization of Time Complexity in Fractal Algorithms

Irena Pevac

337

27.

Using Petri Nets to Introduce Deadlock Concepts

Jozef Goetz and Kazimierz Kowalski

351

28.

Application of Preliminary Data Analysis in Software Cost Estimation

Qin Liu, Robert Mintran and Jonathan Vincent

367

29.

A Novel Edge Detection Method Based on Maximizing Objective Function

Chung-Chia Kang and Wen-June Wang

381

30.

Towards a Domain Theory-based Generative Reuse Method

George Papamargaritis and Alistair Sutcliffe

393

31.

Group-by Early in Optimization

Son Pham and Thu Pham

411

32.

An Approach to Reconstruct 3D Models from 2D Images

Hong Wei and Xin Wan

431