Computer and information sciences topic list of research papers
-
Performance evaluation of hyperspectral classification algorithms on AVIRIS mineral data
Summary Hyperspectral sensors enable the acquisition of data with increased number of spectral bands at a higher spectral resolution. Data acquired through such sensors has been widely utilized in many remote sensing applications including mineral...
2016 / Ramesh Nityanand Adep, Aswin P. Vijayan, Amba Shetty, H. Ramesh -
A 100Mbps Visible Light Communication System Using Optical Wireless Channel for Indoor Application Based on Composite White Light Generated Using RGB LEDs
Abstract This work is based upon the concept of illumination and communication using LEDs. The dependency on wavelength of silicon photodiodes (Si PD) used in optical communications is studied by means of simulation. The sensitivity of the Si PD is...
2016 / Vinay Kumar Singh, Dhananjay Patel, U.D. Dalal -
KCCA-based technique for profile face identification2016 / Malek Nadil, Feryel Souami, Abdenour Labed, Hichem Sahbi
-
Handoff Decision for Multi-user Multi-class Traffic in MIMO-LTE-A Networks
Abstract LTE-A networks do not have a central controlling system or node and is made up of several networking technologies. Handover is a method to assure that users can move freely within a network without losing the network connection. Thus,...
2016 / T. Padmapriya, V. Saminadan -
Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model2016 / Liaojun Pang, Huiyang Zhao, Xia Zhou, Huixian Li
-
Knowledge-based Framework for Intelligent Emotion Recognition in Spontaneous Speech
Abstract Automatic speech emotion recognition plays an important role in intelligent human computer interaction. Identifying emotion in natural, day to day, spontaneous conversational speech is difficult because most often the emotion expressed by...
2016 / Rupayan Chakraborty, Meghna Pandharipande, Sunil Kumar Kopparapu -
Toward Mending Two Nation-Scale Brokered Identification Systems2015 / Luís T. A. N. Brandão, Nicolas Christin, George Danezis, Anonymous
-
Matrix and discrepancy view of generalized random and quasirandom graphs2016 / Marianna Bolla, Ahmed Elbanna
-
Are Lock-Free Concurrent Algorithms Practically Wait-Free?2016 / Dan Alistarh, Keren Censor-Hillel, Nir Shavit
-
GPS and GIS Methods to Reproduce Vehicle Trajectories in Urban Areas
Abstract Intelligent vehicles – both automated and autonomous – have gained more and more importance due to the opportunity they offer to reduce congestion and particularly increase safety. As an example, accidents may occur when vehicle...
2016 / Vincenzo Barrile, Maria Nadia Postorino -
Smoothening and Segmentation of ECG Signals Using Total Variation Denoising –Minimization-Majorization and Bottom-Up Approach
Abstract An ECG Signal records electrical activity of heart. It includes information on heart's rhythm and is useful for diagnosis of heart related diseases. It encounters with various artifacts during acquisition and transmission. The unwanted...
2016 / Om Prakash Yadav, Shashwati Ray -
An efficient traceable access control scheme with reliable key delegation in mobile cloud computing2016 / Zhitao Guan, Jing Li, Ying Zhang, Ruzhi Xu, Zhuxiao Wang, et al.
-
Trust Based Certificate Revocation for Secure Routing in MANET
Abstract Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation. In order to reduce the hazards ...
2016 / Banoth Rajkumar, G. Narsimha -
A Novel Fuzzy Based Relay Node Deployment Scheme for Multi-hop Relay Network
Abstract In cellular communication, a multi-hop relay (MHR) network plays an important role by reducing the cost of deployment and extending the coverage area. To achieve high transmission rate and coverage, an efficient placement of relay nodes...
2016 / Mariya Vincent, K. Vinoth Babu, M. Arthi, P. Arulmozhivarman -
Talking About Task Progress: Towards Integrating Task Planning and Dialog for Assistive Robotic Services2015 / Frank Broz, Alessandro Di Nuovo, Tony Belpaeme, Angelo Cangelosi
-
QoS Routing RPL for Low Power and Lossy Networks2015 / Belghachi Mohamed, Feham Mohamed
-
Application of a rule extraction algorithm family based on the Re-RX algorithm to financial credit risk assessment from a Pareto optimal perspective
Abstract Historically, the assessment of credit risk has proved to be both highly important and extremely difficult. Currently, financial institutions rely on the use of computer-generated credit scores for risk assessment. However, automated risk...
2016 / Yoichi Hayashi -
The Smith normal form of product distance matrices2016 / R. B. Bapat, Sivaramakrishnan Sivasubramanian
-
Situation Adapted Field Service Support Using Business Process Models and ICT Based Human-Machine-Interaction
Abstract The use of conventional service manuals is still common among service technicians during on-site support. If problems occur during the service process, service technicians have to analyze the situation and react accordingly. Problem...
2016 / Eckart Uhlmann, Claudio Geisert, Niels Raue, Christian Gabriel -
A survey on energy efficient coverage protocols in wireless sensor networks
Abstract A Wireless Sensor Network (WSN) is used to monitor an area for events. Each node in the WSN has a sensing range and a communication range. The sensing coverage of a sensor node is the area determined by the sensing range of the sensor node. ...
2016 / Avinash More, Vijay Raisinghani