Computer and information sciences topic list of research papers
-
Spoof Face Recognition in Video Using KSVM
Abstract With the advancement of video and its transmission technologies, video has found its use extensively in surveillance, security, especially in detecting forgery. Unlike still images, video provide large amount of intra-personal variations,...
2016 / T. Faseela, M. Jayasree -
Impostor Detection through Chat Analysis
Abstract With the growth of IM technology, identity safekeeping has became an important problem. There is a constant threat of one's account being hacked or being used by an unauthorized user unknowingly. In this paper we have tried to verify the...
2016 / Sarang Shrivastava, Priyanja Singh, Ranvijay -
On Atomic Batch Executions in Stream Processing
Abstract Stream processing is about processing continuous streams of data by programs in a workflow. Continuous execution is discretized by grouping input stream tuples into batches and using one batch at a time for the execution of programs. As...
2016 / K. Vidyasankar -
Tabu Search for Partitioning Dynamic Dataflow Programs
Abstract An important challenge of dataflow programming is the problem of partitioning dataflow components onto a target architecture. A common objective function associated to this problem is to find the maximum data processing throughput. This...
2016 / Małgorzata Michalska, Nicolas Zufferey, Marco Mattavelli -
Humans display a reduced set of consistent behavioral phenotypes in dyadic games2016 / J. Poncela-Casasnovas, M. Gutierrez-Roig, C. Gracia-Lazaro, J. Vicens, J. Gomez-Gardenes, et al.
-
Efficient and privacy-preserving biometric identification in cloud
Abstract With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based...
2016 / Changhee Hahn, Junbeom Hur -
Application of adaptive Savitzky–Golay filter for EEG signal processing
Summary A Savitzky–Golay filter typically requires pre-determined values of order and frame size for its fabrication. Generally, a random hit-and-trial method or prior experience is required to determine the suitable values of design parameters....
2016 / Deepshikha Acharya, Asha Rani, Shivangi Agarwal, Vijander Singh -
Modelling Adaptive Learning Behaviours for Consensus Formation in Human Societies2016 / Chao Yu, Guozhen Tan, Hongtao Lv, Zhen Wang, Jun Meng, et al.
-
Asymmetry of Strategies in Proposal: Gale-Shapley Algorithm on Diagrams
Abstract This paper proposes a new diagram for a specific matching problem: the stable marriage problem. The diagram allows us to elicit not only the structure of with a blocking relation among the nodes representing pairs, but also asymmetry in the ...
2016 / Yoshiteru Ishida, Shigetaka Ikeno -
Analysis of Eight Data Mining Algorithms for Smarter Internet of Things (IoT)
Abstract Internet of Things (IoT) is set to revolutionize all aspects of our lives. The number of objects connected to IoT is expected to reach 50 billion by 2020, giving rise to an enormous amounts of valuable data. The data collected from the IoT...
2016 / Furqan Alam, Rashid Mehmood, Iyad Katib, Aiiad Albeshri -
The Capabilities of Automated Functional Testing of Programming Assignments
Abstract In the emerging world of information technologies, a growing number of students is choosing this specialization for their education. Therefore, the number of homework and laboratory research assignments that should be tested is also...
2016 / Aleksejs Grocevs, Natālija Prokofjeva -
Effectuses from Monads
Abstract Effectuses have recently been introduced as categorical models for quantum computation, with probabilistic and Boolean (classical) computation as special cases. These 'probabilistic' models are called commutative effectuses. All known...
2016 / Bart Jacobs -
Humanoid robot path planning with fuzzy Markov decision processes
Abstract In contrast to the case of known environments, path planning in unknown environments, mostly for humanoid robots, is yet to be opened for further development. This is mainly attributed to the fact that obtaining thorough sensory information ...
2016 / Mahdi Fakoor, Amirreza Kosari, Mohsen Jafarzadeh -
Supervised Process of Un-structured Data Analysis for Knowledge Chaining
Abstract Along the product life-cycle, industrial processes generate massive digital assets containing precious information. Besides structured databases, written reports hold unstructured information hardly exploitable due to the lack of vocabulary ...
2016 / Matthieu Quantin, Benjamin Hervy, Florent Laroche, Alain Bernard -
Risk Rating System of X.509 Certificates
Abstract X.509 certificates enable to affirm the distinguishing proof of the parties involved in the communication. As of now, majority of individuals and communities are using X.509 certificates to demonstrate their ID during on-line exchanges, so...
2016 / Varsharani Hawanna, V.Y. Kulkarni, R.A. Rane, P. Mestri, S. Panchal -
A design methodology for soft-core platforms on FPGA with SMP Linux, OpenMP support, and distributed hardware profiling system2016 / Vittoriano Muttillo, Giacomo Valente, Fabio Federici, Luigi Pomante, Marco Faccio, et al.
-
Ontology- Based Annotation for Semantic Multimedia Retrieval
Abstract Numerous educational video lectures, CCTV surveillance, transport and other types have upgraded the impact of multimedia video content. In order to make large video databases realistic, video data has to be automatically indexed in order to ...
2016 / R. Lakshmi Tulasi, M. Srinivasa Rao, K. Usha, R.H. Goudar -
A BBN-based Method to Manage Adaptive Behavior of a Smart User Interface
Abstract The present study proposes a new method to manage adaptation behaviour of adaptive system according to the output information provide by a user model based on Bayesian Belief Network (BBN). Such method has been applied in the development of ...
2016 / Francesca Gullà, Lorenzo Cavalieri, Silvia Ceccacci, Michele Germani -
Secure (n, n + 1)-Multi Secret Image Sharing Scheme Using Additive Modulo
Abstract Multi Secret Image Sharing (MSIS) scheme is a protected method to transmit more than one secret images over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up,...
2016 / Mohit Rajput, Maroti Deshmukh -
F2D: A Location Aware Fall Detection System Tested with Real Data from Daily Life of Elderly People
Abstract Falls among older people remain a very important public healthcare issue. In the majority of fall events external support is imperative in order to avoid major consequences. Therefore, the ability to automatically detect these fall events...
2016 / Panagiotis Kostopoulos, Athanasios I. Kyritsis, Michel Deriaz, Dimitri Konstantas