Computer and information sciences topic list of research papers
-
A study and analysis of recommendation systems for location-based social network (LBSN) with big data
Abstract Recommender systems play an important role in our day-to-day life. A recommender system automatically suggests an item to a user that he/she might be interested in. Small-scale datasets are used to provide recommendations based on location, ...
2016 / Murale Narayanan, Aswani Kumar Cherukuri -
A multi-stage algorithm for blind source separation
Abstract In the existing classic and representative second order statistics based methods for blind source separation (BSS), the mixing matrix is usually transformed into an unknown unitary matrix after whitening procedure. In order to derive the...
2016 / Xian-feng Xu, Chen-dong Duan, Lai-jun Liu, Xiao-jun Yang -
Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation
Abstract Present Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which leads to rapid depletion of a node's battery life. To address this issue, we propose a new IDS scheme comprising a novel cluster leader election...
2015 / Basant Subba, Santosh Biswas, Sushanta Karmakar -
Comparison of 2D and 3D magnetic field analysis of single-phase shaded pole induction motors
Abstract There has always been doubt on the accuracy of 2D analysis of small electric machines. To investigate the validity of this doubt, in this present work a small uni-coil shaded-pole induction motor is analyzed in 2D and 3D and the results are ...
2015 / Adem Dalcali, Mehmet Akbaba -
Test case minimization approach using fault detection and combinatorial optimization techniques for configuration-aware structural testing
Abstract This paper presents a technique to minimize the number of test cases in configuration-aware structural testing. Combinatorial optimization is used first to generate an optimized test suite by sampling the input configuration. Second, for...
2015 / Bestoun S. Ahmed -
An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks
Abstract In this paper, an improved version of the energy aware distributed unequal clustering protocol (EADUC) is projected. The EADUC protocol is commonly used for solving energy hole problem in multi-hop wireless sensor networks. In the EADUC,...
2016 / Vrinda Gupta, Rajoo Pandey -
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication
Abstract Recently, many identity-based two-party authenticated key agreement (ID-2PAKA) protocols using elliptic curve cryptography (ECC) have been proposed, however, these protocols do not provide adequate security and their computation costs are...
2015 / SK Hafizul Islam, G.P. Biswas -
Forecasting financial time series using a low complexity recurrent neural network and evolutionary learning approach
Abstract The paper presents a low complexity recurrent Functional Link Artificial Neural Network for predicting the financial time series data like the stock market indices over a time frame varying from 1day ahead to 1month ahead. Although...
2015 / Ajit Kumar Rout, P.K. Dash, Rajashree Dash, Ranjeeta Bisoi -
Fuzzy inferencing to identify degree of interaction in the development of fault prediction models
Abstract The software fault prediction models, based on different modeling techniques have been extensively researched to improve software quality for the last three decades. Out of the analytical techniques used by the researchers, fuzzy modeling...
2015 / Rinkaj Goyal, Pravin Chandra, Yogesh Singh -
Truth table invariant cylindrical algebraic decomposition
Abstract When using cylindrical algebraic decomposition (CAD) to solve a problem with respect to a set of polynomials, it is likely not the signs of those polynomials that are of paramount importance but rather the truth values of certain quantifier ...
2015 / Russell Bradford, James H. Davenport, Matthew England, Scott McCallum, David Wilson -
Generalized mean for robust principal component analysis
Abstract In this paper, we propose a robust principal component analysis (PCA) to overcome the problem that PCA is prone to outliers included in the training set. Different from the other alternatives which commonly replace L ...
2016 / Jiyong Oh, Nojun Kwak -
Computer-controlled High Resolution Arbitrary Waveform Generator (HRAWG) for Focusing Beamforming Applications
Abstract In advanced ultrasound imaging systems, expensive high-end integrated analog front-ends have been traditionally used to support generation of arbitrary transmit waveforms, in addition to transmit focusing and apodization control. In this...
2015 / Amauri Amorin Assef, Joaquim Miguel Maia, Eduardo Tavares Costa -
Two-stage Sequence Generation for Partial Disassembly of Products with Sequence Dependent Task Times
Abstract For disassembly sequence generation, partial disassembly and sequence dependent task times are typically not considered together in the same model. We developed a two-stage optimization program that first determines the optimal partial...
2015 / Robert J. Riggs, Xiaoning Jin, S. Jack Hu -
A Software Architecture for Generally Intelligent Humanoid Robotics
Abstract This paper summarizes the authors’ thinking regarding the design of a software framework for interfacing between general-intelligence-oriented software systems and complex mobile robots, including humanoid robots. The framework describes...
2014 / Ben Goertzel, David Hanson, Gino Yu -
Outage Probability of Cognitive Relay Networks Over Generalized Fading Channels with Interference Constraints
Abstract In this paper, we evaluate the outage probability (OP) of a cognitive relay network operating over generalized fading channels, modeled by the generalized-K and generalized-gamma distributions. In particular, secondary users, based on the...
2014 / Petros S. Bithas, George P. Efthymoglou, Dimitris S. Kalivas -
Experience based Reasoning System Coupled with Real World Knowledge
Abstract Human intelligence draws its conclusions from a base of experience-generated knowledge. Beside being able to use this knowledge, it is limited to how much can be accessed at a time and this reasoning is often shown to be illogical, with...
2014 / Ronald L. Hartung, Anne Hakansson -
Reflective Network Tomography Based on Compressed Sensing
Abstract Network tomography means to estimate internal link states from end-to-end path measurements. In conventional network tomog- raphy, to make packets transmissively penetrate a network, a cooperation between transmitter and receiver nodes is...
2015 / Kensuke Nakanishi, Shinsuke Hara, Takahiro Matsuda, Kenichi Takizawa, Fumie Ono, et al. -
Central Routing Algorithm: An Alternative Solution to Avoid Mesh Topology in iBGP
Abstract This paper presents a novel and efficient algorithm to implement Central Routing (CR) as an alternative to the existing approaches to avoid full mesh topology in internal border gateway protocol (iBGP). BGP is a key protocol to exchange...
2014 / Muhammad H. Raza, Ankit K. Kansara, Aliraza Nafarieh, William Robertson -
BlindeDroid: An Information Tracking System for Real-time Guiding of Blind People
Abstract Among the activities affected by visual impairment, navigation plays a fundamental role, since it enables the person to independently move in safety. The heterogeneous environment, easily perceived by visually enabled people, is hardly...
2015 / José Cecílio, Karen Duarte, Pedro Furtado -
Implementation of Data Synchronization with Data Marker Using Web Service Data
Abstract With the increasing number of people who have more than one device or smartphone, every user feel inconvenience if they have to enter the same data over and over again if they use a different device. The research objective is to implement...
2015 / Muhsin Shodiq, Rini Wongso, Rendy Setya Pratama, Eko Rhenardo, Kevin