Computer and information sciences topic list of research papers
-
Towards a Robust Solution of the Non-linear Kinematics for the General Stewart Platform with Estimation of Distribution Algorithms2013 / Eusebio Eduardo Hernandez Martinez, Sergio Ivvan Valdez Pena, Eduardo Sanchez
-
Cyber security risk evaluation of a nuclear I&C system using Bayesian networks and event trees
Abstract Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have...
2016 / Jinsoo Shin, Hanseong Son, Gyunyoung Heo -
Heterogeneous Context-Aware Robots Providing a Personalized Building Tour2013 / Anna Hristoskova, Carlos E., Manuela Veloso, Filip De
-
Realization of the English Assisted Learning System Based on Rule Mining2015 / Kun Li, Yufang Song, Yan Zhang, Chunyi Lou
-
Towards the Realization of Multi-dimensional Elasticity for Distributed Cloud Systems
Abstract As multiple types of distributed, heterogeneous cloud computing environments have proliferated, cloud software can leverage diverse types of infrastructural, platform and data resources with different cost and quality models. This...
2016 / Hong-Linh Truong, Schahram Dustdar, Frank Leymann -
Semantically Enriched Data Access Policies in eHealth2016 / Michał Drozdowicz, Maria Ganzha, Marcin Paprzycki
-
ACSRO: Adaptive cuckoo search based rate adjustment for optimized congestion avoidance and control in wireless sensor networks
Abstract Several sensor nodes in the wireless network collect the data rigorously which aids in many of the applications. The network with high and the consistent data load is the only requirement of the wireless sensor networks. Due to the limited...
2016 / Vaibhav Narawade, Uttam D. Kolekar -
Online game props recommendation with real assessments2016 / De-Chuan Zhan, Jun Tang, Zhi-Hua Zhou
-
Fast Face Detection in Violent Video Scenes
Abstract In this work we aim to detect faces in violence scenes, in order to help the security control. We used the Violent Flow (ViF) descriptor with Horn-Schunck proposed in [V. Machaca Arceda and K. Fernańdez Fabián and J.C. Gutiérrez, Real Time...
2016 / V.E. Machaca Arceda, K.M. Fernández Fabián, P.C. Laguna Laura, J.J. Rivera Tito, J.C. Gutiérrez Cáceres -
Active function Cross-Entropy Clustering
Abstract Gaussian Mixture Models (GMM) have many applications in density estimation and data clustering. However, the models do not adapt well to curved and strongly nonlinear data, since many Gaussian components are typically needed to...
2016 / P. Spurek, J. Tabor, K. Byrski -
Student's Performance Evaluation by Fuzzy Logic
Abstract In connection with the spread of ICT in education there is an acute issue about getting a qualitative education. Therefore, various methods of determining the quality of education are developed and applied. In this paper, we propose a fuzzy ...
2016 / Alibek Barlybayev, Altynbek Sharipbay, Gulden Ulyukova, Talgat Sabyrov, Batyrkhan Kuzenbayev -
A new entropy function for feature extraction with the refined scores as a classifier for the unconstrained ear verification
Abstract For high end security like surveillance there is a need for a robust system capable of verifying a person under the unconstrained conditions. This paper presents the ear based verification system using a new entropy function that changes...
2016 / Mamta Bansal, Madasu Hanmandlu -
Perceptions and challenges of mobile learning in Kuwait
Abstract The rapid development and growth of mobile technology has motivated developers to introduce a wide range of mobile applications, changing users’ behavior and expectations and reshaping industries and businesses. In implementing any learning ...
2016 / Ahmed Alhunaiyyan, Rana A. Alhajri, Salah Al-Sharhan -
Likelihood ratio data to report the validation of a forensic fingerprint evaluation method
Abstract Data to which the authors refer to throughout this article are likelihood ratios (LR) computed from the comparison of 5–12 minutiae fingermarks with fingerprints. These LRs data are used for the validation of a likelihood ratio (LR) method...
2016 / Daniel Ramos, Rudolf Haraksim, Didier Meuwly -
Modeling link quality for high-speed railway wireless networks based on hidden Markov chain2016 / Jiayang Song, Huachun Zhou, Wei Quan, Tao Zheng, Ping Dong
-
Ant colony optimization-based firewall anomaly mitigation engine2016 / Ravi Kiran Varma Penmatsa, Valli Kumari Vatsavayi, Srinivas Kumar Samayamantula
-
What is interaction science? Revisiting the aims and scope of JoIS2016 / Gisela Susanne Bahr, Christian Stary
-
INSPECT: A graphical user interface software package for IDARC-2D
Abstract Modern day Performance-Based Earthquake Engineering (PBEE) pivots about nonlinear analysis and its feasibility. IDARC-2D is a widely used and accepted software for nonlinear analysis; it possesses many attractive features and capabilities....
2016 / Mohammad AlHamaydeh, Mohamad Najib, Sameer Alawnah -
Improving Language Models in Speech-Based Human-Machine Interaction2013 / Raquel Justo, Oscar Saz, Antonio Miguel, M. Ines, Eduardo Llei
-
Optimizing VM allocation and data placement for data-intensive applications in cloud using ACO metaheuristic algorithm
Abstract Nowadays data-intensive applications for processing big data are being hosted in the cloud. Since the cloud environment provides virtualized resources for computation, and data-intensive applications require communication between the...
2016 / T.P. Shabeera, S.D. Madhu Kumar, Sameera M. Salam, K. Murali Krishnan