Computer Science and
Information System
Edited
by Dr. Panagiotis Petratos & Dr. Demitrios Michalopoulos
ISBN: 960-88672-3-1, 480 pages, Hardback
First
published in 2005 by ATINER
Price: Paperback:
50€ (It
includes Shipping and Handling) Hardcover: 90€ (It includes Shipping and Handling)
Electronic copy: 30€
Table
of Contents
|
Acknowledgments |
v |
|
List of Contributors |
vii |
1. |
Computer Science and Information Systems: An
Introduction to the Current Volume Panagiotis Petratos and Demitrios Michalopoulos |
1 |
PART
I: Computer Science Research in relation to Medicine |
||
2. |
A Computational Model Simulating How Pain Modulation
Can Occur Through Transcutaneous Electrical Nerve
Stimulation (TENS). Karen Prince, Jackie Campbell, Phil Picton and Scott Turner |
15 |
3. |
A
Virtual Healthcare Electronic Medical Record Project - A Lilly Endowment
Sponsored Internship Program for High-tech Startup
Companies Barbara J. Nicolai |
33 |
4. |
Electronic Patient Records (EPR),
a Panacea to Medical Practitioners Woes in Developing Countries – The
Ghanaian Experience Joseph Annan |
49 |
5. |
Techniques for Identifying Tandem Repeats in DNA
Sequences Md Shah Jahan Miah
and Saleh A. Wasimi |
59 |
6. |
Information Organisation and Retrieval of Biological
and Chemical Ontologies Sofia Gleni
and Panagiotis Petratos |
73 |
PART
II: Computer Science Research in relation to Databases, Data Modelling and
Data Mining |
||
7. |
Using Alternative Data Models in the context of Data
Warehousing Victor Gonzalez-Castro and |
83 |
8. |
Quality Measurement and Assessment Models Including
Data Provenance to Grade Data Sources Pilar Angeles and |
101 |
9. |
Information Privacy Principles for Data Mining G. K. Gupta |
119 |
10. |
Application of Data Mining in 1.
A.
Feng and P. Leng
|
129 |
PART
III: Computer Science Research in relation to Information Security |
||
11. |
How Long can Public Key Encryption Stay Secure?
Introducing the Implications of the Riemann Hypothesis and Quantum Computing Mo Adda,
Abby McKeever and Amanda Peart |
135 |
12. |
Primality Testing Algorithm Using Pythagorean Integers Boris S. Verkhovsky
and Andre Mutovic |
143 |
13. |
Vulnerability Assessment: Towards an Integrated
Security Infrastructure C. Onwubiko
and A.P. Lenaghan |
157 |
PART
IV: Computer Science Research in relation to Information Technology and
Information Systems |
||
14. |
Designing a Software Agent(s) to Categorise
End User Computing Personnel with the Prometheus Methodology Stephen Hole and Duncan McPhee |
173 |
15. |
The Modelling of
Information Dissemination: With the ICCMU Website Joseph A. Meloche
and Michelle Mok |
193 |
16. |
Rank-reduced Information Retrieval Models and
Applications Eric Jiang |
205 |
17. |
Electronic Commerce Utilizing Databases on the World
Wide Web Sofia Gleni,
Panagiotis Petratos and Carsten Maple |
215 |
18. |
Validating E-Commerce Solutions Jozef Goetz, Demitrios Michalopoulos
and Eric Reao |
221 |
19. |
Turnover Following a Technological Change Marlene E. Burkhardt
|
237 |
PART
V: Computer Science Research in relation to Distributed Systems and
Networking |
||
20. |
Survey of the latest Concepts in Distributed Systems Paul Gnanayutham
and Amanda Peart |
255 |
21. |
Networking Software Studies with the Structured
Testing Methodology Vladimir V. Riabov
|
261 |
22. |
A Pilot Study of Web Information Change in the
Academic Domain Petros Kotsidis, Anne Comer and Peter Smith |
277 |
23. |
Communication Issues in Large Scale Wireless Ad-hoc
Networks M. Adda, G.
Owen, M. Kasassbeh, A. Paraskelidis
and A. Peart |
299 |
PART
VI: Computer Science Research in relation to Theoretical and Natural Sciences
and Engineering |
||
24. |
JAIDE: A Formal Methods Based Student Assistant Tool in Developing Java
Programs Sotiris Skevoulis
and Vladimir Makarov |
313 |
25. |
The Cycles in Matrix Transposition Jiang Guo, Vladimir Akis
and Yuehong Liao |
327 |
26. |
Analysis and Visualization of Time Complexity in
Fractal Algorithms Irena Pevac
|
337 |
27. |
Using Petri Nets to Introduce Deadlock Concepts Jozef Goetz and Kazimierz Kowalski |
351 |
28. |
Application of Preliminary Data Analysis in Software
Cost Estimation Qin Liu, Robert Mintran and Jonathan Vincent |
367 |
29. |
A Novel Edge Detection Method Based on Maximizing
Objective Function Chung-Chia Kang
and Wen-June Wang |
381 |
30. |
Towards a Domain Theory-based Generative Reuse
Method George Papamargaritis
and Alistair Sutcliffe |
393 |
31. |
Group-by Early in Optimization Son Pham and Thu Pham |
411 |
32. |
An Approach to Reconstruct 3D Models from 2D Images Hong Wei
and Xin Wan |
431 |