Computer and information sciences topic list of research papers
-
Handwritten Marathi Compound Character Segmentation Using Minutiae Detection Algorithm
Abstract Segmentation process is the heart of handwritten Script Identification system. Aside from the large variation of individual's handwriting, many researchersfound difficulty to separate characters from scanned word document Image. The key...
2016 / Snehal S. Golait, Latesh Malik -
On the Use of Surplus Division to Facilitate Efficient Negotiation in the Presence of Incomplete Information
Abstract Classic results in game theory state that private information is a cause for a negotiation to end with suboptimal outcome. Subse- quently, private information is a compelling explanation for the frequent occurrence of negotiation breakdowns ...
2016 / Quoc Bao Vo, Trong Hieu Tran, Thi Hong Khanh Nguyen -
On Strong Normalization in Proof-Graphs for Propositional Logic
Abstract Traditional proof theory of Propositional Logic deals with proofs whose size can be huge. Proof theoretical studies discovered exponential gaps between normal or cut free proofs and their respective non-normal proofs. The use of...
2016 / Marcela Quispe-Cruz, Edward Haeusler, Lew Gordeev -
Recommendation System Based on Complete Personalization
Abstract Current recommender systems are very inefficient. There are many metrics that are used to measure the effectiveness of recommender systems. These metrics often include “conversion rate” and “click through rate”. Recently, these rates are in ...
2016 / Kourosh Modarresi -
Classification Framework of Knowledge Transfer Issues Across Value Networks
Abstract Co-creating integrated solutions with customers requires collaboration of different partners within a value network. In this emerging context, knowledge is considered as a foundation for value co-creation. Therefore, identifying different...
2016 / Samaneh Bagheri, Rob J. Kusters, Jos J.M. Trienekens, Hugo V.N. van der Zandt -
A review on compressed pattern matching
Summary Compressed pattern matching (CPM) refers to the task of locating all the occurrences of a pattern (or set of patterns) inside the body of compressed text. In this type of matching, pattern may or may not be compressed. CPM is very useful in...
2016 / Surya Prakash Mishra, Col. Gurmit Singh, Rajesh Prasad -
Algorithm for Jitter and Shimmer Measurement in Pathologic Voices
Abstract An algorithm to measure the jitter (jitta, jitter, rap and ppq5) and shimmer (ShdB, Shim, apq3 and apq5) parameters was developed. These parameters can be used in an intelligent system to diagnose voice pathologies. The algorithm is...
2016 / João Paulo Teixeira, André Gonçalves -
Enhanced Scalable Video Coding Technique with an Adaptive Dual Tree Complex Wavelet Transform
Abstract The scalable Video is the most suitable video format for the current day scenario where there are different varieties of electronic gadgets used to communicate and play back. As the device resolution varies, the codec designed for Scalable...
2016 / B.S. Sunil Kumar, A.S. Manjunath, S. Christopher, Rajalaxmi Menon -
Developing Design Support System Based on Semantic of Design Model
Abstract A design support system is developed for engineering design based on the ontology which is declarative description conceptualized the world that agents (men and programs) focused on. The design process is understood as determining the...
2016 / Yoshikazu Tanaka, Kazuhiko Tsuda -
SegChainW2V: Towards a Generic Automatic Video Segmentation Framework, Based on Lexical Chains of Audio Transcriptions and Word Embeddings
Abstract With the advances in multimedia broadcasting through a rich variety of channels and with the vulgarization of video production, it becomes essential to be able to provide reliable means of retrieving information within videos, not only the...
2016 / Adrian-Gabriel Chifu, Sébastien Fournier -
Towards a More Effective Hospital: Helping Health Professionals to Learn from their Own Practice by Developing an Easy to use Clinical Processes Querying Language
Abstract Application of complex socio-technical systems theory to optimization of clinical processes in hospitals highlights the importance of the acceptance and promotion of responsible autonomy among health professionals. Therefore the independent ...
2016 / Juris Barzdins, Mikus Grasmanis, Edgars Rencis, Agris Sostaks, Aslak Steinsbekk -
ODE: An Ontology for Numerical Design of Experiments
Abstract Numerical Designs of Experiments (DoE) are used in a product development process for several purposes as optimization, surrogate modelling or sensitivity analysis. Methods used to shorten the execution of DoE demands advanced knowledge and...
2016 / Gaëtan Blondet, Julien Le Duigou, Nassim Boudaoud -
EMINENT: Embarrassingly Parallel Mutation Testing
Abstract During the last decade, the fast evolution in communication networks has facilitated the development of complex applications that manage vast amounts of data, like Big Data applications. Unfortunately, the high complexity of these...
2016 / Pablo C. Cañizares, Mercedes G. Merayo, Alberto Núñez -
User Search Goals Evaluation with Feedback Sessions
Abstract In today's e-world, search engines play a vital role in retrieving and organizing relevant data for various purposes. Different methods are used to find user search goals. Personalization is the process of finding exact needs of a user...
2016 / V. Febna, Anish Abraham -
How to Think of Intersection Types as Cartesian Products
Abstract In their paper “Intersection types and lambda definability” [Bucciarelli, A., Piperno, A., Salvo I., Intersection types and lambda definability, MSCS03, 13 (1), pp. 15–53, (2003)] Bucciarelli, Piperno, and Salvo give a mapping of the...
2016 / Rick Statman -
Some q-analogues of Hermite–Hadamard inequality of functions of two variables on finite rectangles in the plane
Abstract Preliminaries of q-calculus for functions of two variables over finite rectangles in the plane are introduced. Some q-analogues of the famous Hermite–Hadamard inequality of functions of two variables defined on finite rectangles in the...
2016 / M.A. Latif, S.S. Dragomir, E. Momoniat -
Scalable Information Gain Variant on Spark Cluster for Rapid Quantification of Microarray
Abstract Microarray technology is one of the emerging technologies in the field of genetic research, which many researchers often use to monitor expression levels of genes in a given organism. Microarray experiments have wide range of applications...
2016 / Ransingh Biswajit Ray, Mukesh Kumar, Anand Tirkey, Santanu Kumar Rath -
Electronic-secure Vehicle Authorization Mechanism (e-SVAM)
Abstract This work deals with the creation of a real-life android application, where all the necessary details of a vehicle (i.e., Registration Certificate, Insurance Policy and vehicle's Pollution Under Control Certificate) are coordinated and...
2016 / Asha Krishnan, P.A. Shyjila, Jubilant J. Kizhakethottam -
An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks
Abstract Mobile ad-hoc network is an infrastructure-less and self-organizing network, where nodes communicate through wireless links. Because of its dynamic topology, security becomes a vital issue compared to infrastructure networks. MANETs are...
2016 / Srinivas Aluvala, K. Raja Sekhar, Deepika Vodnala -
A Performance Prediction and Analysis Integrated Framework for SpMV on GPUs
Abstract This paper presents unique modeling algorithms of performance prediction for sparse matrix-vector multiplication on GPUs. Based on the algorithms, we develop a framework that is able to predict SpMV kernel performance and to analyze the...
2016 / Ping Guo, Chung-wei Lee