Computer and information sciences topic list of research papers
-
Vertebral Metrics: Scapula Evaluation
Abstract The normal function of the shoulder is deeply dependent on the adequate and proper motion of the scapula. In its turn, the abnormal alignment of the thoracic and cervical portions of the spine, like the excessive thoracic kyphosis and...
2014 / G. Mateus, C. Quaresma, P. Vieira -
Collaborative Construction of Online L2 Task Accomplishment through Epistemic Progression
Abstract Technology-mediated task-based language learning and teaching has long been a research focus (Chapelle, 2001; Gonzalez-Lloret & Ortega, 2014). The focus has mainly been on the task-as-workplan (Ellis, 2003) leaving the process aspect as ...
2015 / Ufuk Balaman -
Skew Detection and Correction of Devanagari Script Using Hough Transform
Abstract In this paper we have proposed a method for skew detection and correction of handwritten Devanagari script using Hough transform. In this approach we used Hough transform algorithm for skew detection at word level. Skew of the word is the...
2015 / Trupti A. Jundale, Ravindra S. Hegadi -
Accelerated simulated annealing algorithm applied to the flexible job shop scheduling problem2015 / Marco Antonio Cruz-Chávez, Martín G. Martínez-Rangel, Martín H. Cruz-Rosales
-
Beyond Mere Application Structure Thoughts on the Future of Cloud Orchestration Tools
Abstract Managing cloud applications running on IaaS is complicated and error prone. This is why DevOps tools and application description languages have been emerging. While these tools and languages enable the user to define the application and...
2015 / Jörg Domaschka, Frank Griesinger, Daniel Baur, Alessandro Rossini -
An enhanced low overhead and stable clustering scheme for crossroads in VANETs2016 / Yan Huo, Yuejia Liu, Liran Ma, Xiuzhen Cheng, Tao Jing
-
DDOS Attack Aware DSR Routing Protocol in WSN
Abstract Open nature of wireless sensor networks (WSN) makes it vulnerable to outside attacks. Many security threats like denial of service, black hole, sinkhole etc. may affect the network performance. Distributed denials of service (DDOS) attacks...
2016 / Raksha Upadhyay, Uma Rathore Bhatt, Harendra Tripathi -
Improved entropy encoding for high efficient video coding standard
Abstract The High Efficiency Video Coding (HEVC) has better coding efficiency, but the encoding performance has to be improved to meet the growing multimedia applications. This paper improves the standard entropy encoding by introducing the...
2016 / B.S. Sunil Kumar, A.S. Manjunath, S. Christopher -
On abstract modular inference systems and solvers
Abstract Integrating diverse formalisms into modular knowledge representation systems offers increased expressivity, modeling convenience, and computational benefits. We introduce the concepts of abstract inference modules and abstract modular...
2016 / Yuliya Lierler, Miroslaw Truszczynski -
Gabor Wavelets Based Word Retrieval from Kannada Documents
Abstract In this paper, we propose a technique for word retrieval based on Gabor wavelets. Gabor wavelets are employed to capture directional energy features of the word image. A pre-processing step is performed in order to improve the quality of...
2016 / Mallikarjun Hangarge, Veershetty C., Rajmohan Pardeshi, B.V. Dhandra -
Master Synchronization in Physical-Layer Communications of Wireless Sensor Networks2011 / Lin Zheng, Wei Ge, Hongbing Qiu
-
On detecting the playing/non-playing activity of musicians in symphonic music videos
Abstract Information on whether a musician in a large symphonic orchestra plays her instrument at a given time stamp or not is valuable for a wide variety of applications aiming at mimicking and enriching the classical music concert experience on...
2016 / Alessio Bazzica, Cynthia C.S. Liem, Alan Hanjalic -
Evaluation of the European Union Structural Funds' Support in Poland: Scope and Significance2010 / Jaroslav Dvorak
-
Usage of graph patterns for concept map extension2013 / Maija Strautmane
-
Multiclass Classification with Cross Entropy-Support Vector Machines
Abstract In this paper, an important sampling method – Cross Entropy method is presented to deal with solving support vector machines (SVM) problem for multiclass classification cases. The use of this method is intended to accelarate the process of...
2015 / Budi Santosa -
Stream Computing: Opportunities and Challenges in Smart Grid
Abstract Traditional Power Grid is transformed to Smart Grid by utilizing the technological advancements of Information and Communication Technology. In Smart Grid data is flowing between different components of the system. Advanced and online...
2015 / Shibily Joseph, Jasmin E.A., Soumya Chandran -
Risk Weighted Social Trust Index for Online Social Networks
Abstract Online social networks (OSN) are a great boon for connecting internet user communities for sharing ideas, important happenings and life events. At the same time, there is a negative perception among user community that OSN compromises...
2016 / Jayprakash Lalchandani, Hari Bhaskar Sankaranarayanan -
Ensuring Mobile Device Security and Compliance at the Workplace
Abstract End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and...
2015 / Carsten Kleiner, Georg Disterer -
Jointly optimized multiple Reed-Muller codes for wireless half-duplex coded-cooperative network with joint decoding2015 / Saqib Ejaz, Fengfan Yang, Hongjun Xu, Shunwai Zhang
-
Appraise: an Open-Source Toolkit for Manual Evaluation of MT Output2012 / Christian Federmann