Computer and information sciences topic list of research papers
-
Automated Production Ramp-up Through Self-Learning Systems
Abstract The ramp-up of production systems is characterised by situations that arise for the first time. Due to the unpredictability of system behaviour in such situations, instabilities occur that lead to reduced production effectiveness. In order...
2016 / Philipp Ennen, Sebastian Reuter, Rene Vossen, Sabina Jeschke -
A Study on Preventing Node Isolation Attack in OLSR Protocol
Abstract A mobile ad hoc network (MANET) is a wireless communication system of continuously self-configuring and infrastructure-less network of mobile devices which can move independently in any direction at any time.Routing protocols is required...
2016 / Jefin Liza James, Bino Thomas -
Trust Necessitated through Metrics: Estimating the Trustworthiness of Websites
Abstract The issue of trust is of exhilarating concern in case of information disseminated through websites. Digitization technologies such as Internet has lowered the cost and increased the access to information of all kinds. This increased...
2016 / Himani Singal, Shruti Kohli -
Comparative analysis of copper intrauterine device impact on female sexual dysfunction subtypes2016 / Mehmet Sakinci, Cihangir Mutlu Ercan, Safak Olgan, Hakan Coksuer, Kazim Emre Karasahin, et al.
-
Data-local Reduce Task Scheduling
Abstract Inspired by the victory of Apache's Hadoop this paper suggests a new reduce task scheduler. Hadoop is an open source implementation of Google's MapReduce framework. Programs which are written in this functional style are automatically...
2016 / J. Geetha, N. UdayBhaskar, P. ChennaReddy -
A Noise Cancellation Approach for an Illuminating LEDs Based Short-range Visible Light Sensing System
Abstract In this paper, an illuminating LEDs based short-range visible light system is proposed and investigated. The LEDs are used not only as illuminating devices but also as ranging and detecting sensors. In this system, the optical rays emitted...
2016 / Dehao Wu, Zhong Wende, Chen chen -
Bee-Sensor-C: An Energy-Efficient and Scalable Multipath Routing Protocol for Wireless Sensor Networks2015 / Xuelian Cai, Yulong Duan, Ying He, Jin Yang, Changle Li
-
Decision Support System for Production Scheduling (DSSPS)
Abstract In this paper, we study scheduling problems that have batching considerations, and with sequence-dependent setup times for single machine and job shop flow planning. An important focus is the explicit treatment of setup times (costs),...
2016 / Watt Kwong Wai, Lin Ting, Liang Wei Pang, Hadianto Budihardjo, Gan Chiu Liang, et al. -
Single Channel Speech Separation with Frame-based Summary Autocorrelation Function Analysis
Abstract Single channel speech separation system with frame based pitch range estimation is presented. The system decomposes the input mixture speech into frames and pitch of the speech is estimated in each frame of modulation spectrum by using...
2016 / E.R. Raghi, M.S. Lekshmi -
Inclusive Cost Attribution for Cache Use Profiling
Abstract For performance analysis tools to be useful, they need to show the relation of detected bottlenecks to source code. To this end, it often makes sense to use the instruction triggering a problematic event. However for cache line utilization, ...
2016 / Josef Weidendorfer, Jens Breitbart -
System for Marathi News Clustering
Abstract An era of multi-lingual web contents has begun. Web users add, update and search contents in local languages. Automatic translator scripts present available contents in local languages. Therefore, web is attracting users from all levels of...
2016 / N. Dangre, A. Bodke, A. Date, S. Rungta, S.S. Pathak -
Information System for Automation of Counterfeited Documents Images Correlation
Abstract Forgery detection of official documents is a continuous challenge encountered by documents’ forensic experts. Among the most common counterfeited documents we may find citizen cards, passports and driving licenses. Forgers are increasingly...
2016 / Rafael Vieira, Catarina Silva, Mário Antunes, Ana Assis -
Natural Language Processing Using Kepler Workflow System: First Steps
Abstract Scientific community across many disciplines is exploring new ways to extract knowledge from all available sources. Historically, written manuscripts have been the media of choice for recording experimental findings. Many disciplines such...
2016 / Ankit Goyal, Alok Singh, Shitij Bhargava, Daniel Crawl, Ilkay Altintas, et al. -
Iteration and Labelled Iteration
Abstract We analyse the conventional sum-based representation of iteration from the perspective of programmers, and show that the syntax they suggest is fundamentally not a good representation of Java-style iteration with for, while, break, and...
2016 / Bram Geron, Paul Blain Levy -
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors2016 / Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker
-
An Efficient Greedy Minimum Spanning Tree Algorithm Based on Vertex Associative Cycle Detection Method
Abstract The minimal spanning tree problem is a popular problem of discrete optimization. Numerous algorithms have been developed using the traditional approach but with the emergence of modern-day complex data structures, new algorithms have been...
2016 / Prantik Biswas, Mansi Goel, Harshita Negi, Megha Datta -
Stochastic Pruning and Its Application for Fast Estimation of the Expected Total Output of Complex Systems
Abstract A powerful method referred to as stochastic pruning is introduced for analysing the performance of common complex systems whose component failures follow a homogeneous Poisson process. The method has been applied to create a very fast...
2016 / Michael Todinov -
Type-theoretic Means for Querying Heterogeneous Data Sources Available via Cloud APIs
Abstract We propose a unified approach for querying data sources which are accessible in form of heterogeneous APIs rather than some standards compliant databases. Different APIs use different query structures and support different capabilities....
2016 / A.I. Domracheva, P.A. Shapkin -
Secured Transmission of Image/Video by Performing Reversible Color Transformation
Abstract A new secured image/video transmission technique is proposed in this paper. Here video is considered as a sequence of frames. The secret image is automatically transformed into a secret-fragment visible mosaic image. This image looks...
2016 / Gija Susan Issac, Jobi Jose -
Querying Medical Datasets While Preserving Privacy
Abstract This paper addresses the challenge of identifying clinically-relevant patterns in medical datasets without endangering patient privacy. To this end, we treat medical datasets as black box for both internal and external users of the data...
2016 / Nafees Qamar, Yilong Yang, Andras Nadas, Zhiming Liu