Computer and information sciences topic list of research papers
-
Interactive Learning of a FALCON for a Card Game
Abstract Among many reinforcement learning methods, FALCON is a machine learning method which is an extend fuzzy ART(Adaptive Resonance Theory), and can appropriately discretize a state space. FALCON is an on-line method proposed by Ah-Hwee Tan. It...
2016 / Kazuma Kasahara, Kenta Nimoto, Kenichi Takahashi, Michimasa Inaba -
Estimation for stochastic volatility model: Quasi-likelihood and asymptotic quasi-likelihood approaches
Abstract For estimation of the stochastic volatility model (SVM), this paper suggests the quasi-likelihood (QL) and asymptotic quasi-likelihood (AQL) methods. The QL approach is quite simple and does not require full knowledge of the likelihood...
2016 / Raed Alzghool -
Activity Recognition in Surfing - A Comparative Study between Hidden Markov Model and Support Vector Machine
Abstract The present project describes a comparative study between two different machine learning approaches, the Hidden Markov Model (HMM) and Support Vector Machines (SVMs), for activity recognition in surfing, aiming to distinguish surfing from...
2016 / Hannes Hoettinger, Franziska Mally, Anton Sabo -
Procedure for Defining the System of Objectives in the Initial Phase of an Industry 4.0 Project Focusing on Intelligent Quality Control Systems
Abstract Industry 4.0 describes the fourth industrial revolution, which leads to an intelligent, connected and decentralized production. A core aspect is a continuous communication between humans, machines and products during the production process...
2016 / Albert Albers, Bartosz Gladysz, Tobias Pinner, Viktoriia Butenko, Tobias Stürmlinger -
A Support System for Sensor and Information Fusion System Design
Abstract The complexity of industrial applications has constantly increased over the last decades. New paradigms arise in the context of the fourth industrial revolution by bringing together mechatronic systems and information technologies. Tasks...
2016 / Alexander Fritze, Uwe Mönks, Volker Lohweg -
Fixed-point Implementation of Approximate Message Passing (AMP) algorithm in massive MIMO systems
Abstract In massive multiple input and multiple output (MIMO) systems the challenge is the detection of the individual signals from the composite signal with a large system limit. The optimal detector becomes prohibitively complex. The approximate...
2016 / Mhlaliseni Khumalo, Wan-Ting Shi, Chao-Kai Wen -
A Survey on Security Vulnerabilities in Wireless Ad Hoc High Performance Clusters
Abstract Wireless ad hoc high performance clusters extend the paradigm of contemporary wired cluster architectures to present the great possibility of achieving ubiquitous distributed computing in the near future. The explosion of mobile devices...
2016 / K.N. Shivaramu, P.S. Prasobh, Nagaraj Poti -
Multi-agent System Supporting Automated GIS-based Photometric Computations
Abstract The growing share of LED light sources in outdoor lighting enables developing street lighting solutions characterized by high energy efficiency. It is accomplished by replacing high intensity discharging lamps with LEDs and implementing...
2016 / Adam Sędziwy, Leszek Kotulski -
Runtime Verification of Scientific Codes Using Statistics
Abstract Runtime verification of large-scale scientific codes is difficult because they often involve thousands of processes, and generate very large data structures. Further, the programs often embody complex algorithms making them difficult for...
2016 / Minh Ngoc Dinh, David Abramson, Chao Jin -
Automated Road Extraction From High Resolution Satellite Images
Abstract The importance of road extraction from satellite images arises from the fact that it greatly enhances the efficiency of map generation and thus can be a big help in car navigations systems or any emergency (rescue) system that needs instant ...
2016 / Jose Hormese, C. Saravanan -
A Probabilistic Framework for the Reliability Assessment of Crowd Sourcing Urban Traffic Reports
Abstract Incidents produce heavy congestion in large urban traffic networks and therefore real time information about them (e.g. location, timestamp, type) can be very useful for the drivers. An efficient way of gathering this type of information is ...
2016 / Athanasios Salamanis, Anastasios Drosou, Dimitrios Michalopoulos, Dionysios Kehagias, Dimitrios Tzovaras -
Keypoint Extraction Using SURF Algorithm for CMFD
Abstract Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on another part generally to conceal unwanted portions of the image. Hence, the goal in detection of copy-move forgeries is to detect...
2016 / Reshma Raj, Niya Joseph -
Window Based Input Vector Monitoring Concurrent BIST Using SRAM Cells with Diagnostic Data Compression
Abstract Window based Input vector monitoring concurrent built-in self test (BIST) schemes perform testing during the normal operation of the circuit without the requirement to set the circuit offline to perform the test. It is evaluated based on...
2016 / R. Kavya, S. Santhosh Kumar -
ADAMANT: Tools to Capture, Analyze, and Manage Data Movement
Abstract In the converging world of High Performance Computing and Big Data, moving data is becoming a critical aspect of performance and energy efficiency. In this paper we present the Advanced DAta Movement Analysis Toolkit (ADAMANT), a set of...
2016 / Pietro Cicotti, Laura Carrington -
Composition Colored Petri Nets for the Refinement of Reaction-based Models
Abstract Model refinement is an important step in the model building process. For reaction-based models, data refinement consists in replacing one species with several of its variants in the refined model. We discuss in this paper the implementation ...
2016 / Diana-Elena Gratie, Cristian Gratie -
A Survey on Geographic Routing Protocols in Delay/Disruption Tolerant Networks2016 / Tong Wang, Yue Cao, Yongzhe Zhou, Pengcheng Li
-
The generic rigidity of triangulated spheres with blocks and holes
Abstract A simple graph G = ( V , E ) is 3-rigid if its...
2016 / James Cruickshank, Derek Kitson, Stephen C. Power -
Lateral Control of an Unmaned Car Using GNSS Positionning in the Context of Connected Vehicles
Abstract This paper addresses the problem of path following for unmaned cars using only GNSS positionning. Several papers have already addressed the lane keeping, usually restricting the focus to the computation of the optimal steering wheel angle,...
2016 / Alexandre Lombard, Xuguang Hao, Abdeljalil Abbas-Turki, Abdellah El Moudni, Stéphane Galland, et al. -
Message safety in Dart
Abstract Unlike traditional static type checking, the type system in the Dart programming language is unsound by design, even for fully annotated programs. The rationale has been that this allows compile-time detection of likely errors and enables...
2016 / Erik Ernst, Anders Møller, Mathias Schwarz, Fabio Strocco -
A Novel Tri-Stage Recognition Scheme for Handwritten Malayalam Character Recognition
Abstract The paper proposes an efficient and novel approach of Malayalam character recognition which acquires higher recognition rate for entire character set of Malayalam script. The proposed scheme follows a three stage feature extraction. In the...
2016 / K. Sonu Varghese, Ajay James, Saravanan Chandran