Computer and information sciences topic list of research papers
-
Bottleneck Congestion and Distribution of Work Start Times: The Economics of Staggered Work Hours Revisited
Abstract Since the seminal work of Henderson (1981), a number of studies examined the effect of staggered work hours by analyzing models of work start time choice that consider the trade-off between negative congestion externalities and positive...
2015 / Yuki Takayama -
Load Demand Disaggregation Based on Simple Load Signature and User's Feedback
Abstract A detailed and on-line knowledge of the electrical load demand by the users is a critical issue for an effective and responsive deployment of home/building energy management. An approach based on the application of Non Intrusive Appliance...
2015 / Valeria Amenta, Giuseppe Marco Tina -
Modeling and Verification of RBC Handover Protocol
Abstract Radio Block Center (RBC) is a core part of the Chinese Train Control System level 3 (CTCS-3) which is a protocol for safety critical systems. The correctness of the RBC handover protocol is one of the most important factors affecting the...
2014 / Kai Yang, Zhenhua Duan, Cong Tian -
General Architecture for Perception-action Information Flow Control
Abstract The perception-action (P-A) cycle is the process of receiving information about sensory events taking place in the environment through sensory systems, processing this information and triggering motor systems to initiate corresponding...
2014 / Wael Hafez -
An Algorithm for Inferring Big Data Objects Correlation Using Word Net
Abstract The value of big data comes from its variety where data is collected from various sources. One of the key big data challenges is identifying which data objects are relevant or refer to the same logical entity across various data sources....
2016 / M. Basel Almourad, Mohammed Hussain, Talal Bonny -
A New Testing Method for Hardware Trojan Detection
Abstract This paper presents a partitioning approach to improve the Trojan detection process. The proposed transition probability based method tries to partition combinational circuits for pseudo exhaustive testing. The nodes of digital circuit in...
2014 / Fahimeh Nejadmoghadam, Ali Mahani, Yousef S. Kavian -
Semi-supervised Aspect Based Sentiment Analysis for Movies Using Review Filtering
Abstract Aspect based Sentiment Analysis (ABSA) is a subarea of opinion mining which enables one to gain deeper insights into the features of items which interest the users by mining reviews. In this paper we attempt to perform ABSA on movie review...
2016 / Deepa Anand, Deepan Naorem -
Automatic Indonesian's Batik Pattern Recognition Using SIFT Approach
Abstract Batik is a traditional clothwith unique patterns applied to fabric using a wax-resist dyeing technique. Aside from preserving this rich cultural heritage, the automated recognition of Batik patterns would enable many interesting...
2015 / Ida Nurhaida, Ary Noviyanto, Ruli Manurung, Aniati M. Arymurthy -
A New set of Measurement Standards for a Circuit Breaker Application
Abstract During the years, the Standard Solutions (SS) have been reformulated multiple times, through redefinition, simplification and exemplification. The original 76 Standard Solutions are grouped in classes. The fourth class contains the...
2016 / Davide Russo, Christian Spreafico -
Performance of distance-based matching algorithms in 3D facial identification2016 / Petra Urbanová
-
A BRS-Based Approach to Model and Verify Cloud Systems Elasticity
Abstract Elasticity is actually one major and important asset for cloud-based systems. This property grants this kind of systems the ability to dynamically adjust their resources allocation by scaling up/down when needed in autonomic manner,...
2015 / Hamza Sahli, Faiza Belala, Chafia Bouanaka -
Identifying deficits of visual security metrics for images
Abstract Visual security metrics are deterministic measures with the (claimed) ability to assess whether an encryption method for visual data does achieve its defined goal. These metrics are usually developed together with a particular encryption...
2016 / Heinz Hofbauer, Andreas Uhl -
On the time for Brownian motion to visit every point on a circle
Abstract Consider a Wiener process W on a circle of circumference L . We prove the rather surprising result that the Laplace transform of the distribution...
2015 / Philip Ernst, Larry Shepp -
Taking the LEAP with the Oculus HMD and CAD - Plucking at thin Air?
Abstract Achieving adequate visualisation of designs within CAD packages remains a challenge for designers with current methods of 3D CAD visualisation requiring either a high level of technical ability, or expensive hardware and software. The...
2015 / Nathan Beattie, Ben Horan, Sophie McKenzie -
Entropy of the Word as a Correction Factor of Addictive Human Behavior
Abstract The paper considers the influence of text message entropy on human emotional condition for correcting his addictive behavior. The text message is presumed to be transmitted to the recipient by voice. This way of text information...
2015 / Sergey Fadyushin, Alexandra Lobodenko, Ekaterina Milyaeva -
Optimum Detection of Ultrasonic Echoes Applied to the Analysis of the First Layer of a Restored Dome2007 / Luis Vergara, Ignacio Bosch, Jorge Gosálbez, Addisson Salazar
-
A Comparative Analysis of Particle Swarm Optimization and Support Vector Machines for Devnagri Character Recognition: An Android Application
Abstract Devanagari script is widely used in the Indian subcontinent in several major languages such as Hindi, Sanskrit, Marathi and Nepali. Recognition of unconstrained (Handwritten) Devanagari character is more complex due to shape of constituent...
2016 / Prashant M. Kakde, S.M. Gulhane -
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter2014 / Ma Haifeng, Yao Nianmin, Cai Shaobin, Han Qilong
-
Integrating User Information into Design Process to Solve Contradictions in Product Usage
Abstract This paper mainly focuses on improving the product performance by taking user factors into consideration during the engineering design phase. Firstly, the impact of design modification on the product lifecycle and the importance of the user ...
2016 / Xiaoguang Sun, Rémy Houssin, Jean Renaud, Mickael Gardoni -
Machine Perception in Automation: A Call to Arms2011 / Dietmar Bruckner, Rosemarie Velik, Yoseba Penya