Computer and information sciences topic list of research papers
-
Design of Neuromorphic Cognitive Module based on Hierarchical Temporal Memory and Demonstrated on Anomaly Detection
Abstract Our presented idea is to integrate artificial neural network (probably of BICA type) with a real biological network (ideally in the future with the human brain) in order to extend or enhance cognitive- and sensory- capabilities (e.g. by...
2016 / Marek Otahal, Michal Najman, Olga Stepankova -
Psychologically Inspired Planning Method for Smart Relocation Task
Abstract Behavior planning is known to be one of the basic cognitive functions, which is essential for any cognitive architecture of any control system used in robotics. At the same time most of the widespread planning algorithms employed in those...
2016 / Aleksandr I. Panov, Konstantin S. Yakovlev -
The HaveNWant Common Cortical Algorithm
Abstract HaveNWant is a low-level cognitive schemata that processes bits of information bidirectionally. It is a common cortical algorithm whose Tinker-Toy® like parts can construct networks that react powerfully in embedded environments. They...
2016 / Allen King -
Experimental Study of Specific Benchmarking Functions for Modified Monkey Algorithm
Abstract This paper presents an optimization algorithm based on a meta-heuristic search inspired from the behavior of monkey. The main steps of the optimization search algorithm comprise climb process, watch-jump process and somersault process. The...
2016 / Rahib H. Abiyev, Mustafa Tunay -
Particular Qualities of the Semantic Web Training Course
Abstract The concept of the semantic web originates from far 1998 years when it was firstly proposed.
2016 / Anita Balandina, Anastasiya Kostkina, Artyom Chernyshov, Boris Shchukin, Valentin Klimov -
PDM Time Analysis with Continuous and Point-to-Point Relations: Calculations Using an Artificial Example
Abstract Two major generalizations of the Precedence Diagramming Method (PDM) and an algorithm solving the generalized network are discussed in this paper: a) Two new types of precedence relations are introduced: minimal point-to-point and minimal...
2016 / Miklos Hajdu -
Identifying High Velocity Objects in Complex Natural Environments Using Neural Networks
Abstract Real-time tracking of highly dynamic and complex objects has been an important aspect of testing in the aerospace industry for several decades. This paper proposes a methodology to identify complex, high velocity targets of interest in a...
2016 / Kyle Buller -
Feedback in On-line Foreign Language Teaching
Abstract Feedback is an important element of eLearning. The term itself occurs in the connection with this new form of learning very early. The eLearning program producers were interested in the level of users satisfaction with their products. They ...
2016 / Sarka Hubackova -
Evolutionary Domains for Varying Individuals
Abstract The domains ranged by the variables using Web-resources can vary with a time. This is possible even in a runtime of Web-application giving rise to various vulnerabilities and bugs. This paper focuses at the problem mentioned as the...
2016 / Viacheslav E. Wolfengagen, Larisa Yu. Ismailova, Sergey V. Kosikov, Viacheslav V. Navrotskiy, Sergey I. Kukalev, et al. -
Dialogue manager domain adaptation using Gaussian process reinforcement learning
Abstract Spoken dialogue systems allow humans to interact with machines using natural speech. As such, they have many benefits. By using speech as the primary communication medium, a computer interface can facilitate swift, human-like acquisition of ...
2016 / Milica Gašić, Nikola Mrkšić, Lina M. Rojas-Barahona, Pei-Hao Su, Stefan Ultes, et al. -
Cloud Challenges towards Free Flow of Data
Abstract The Free Flow of Data is an emerging challenge to which the European Commission is currently working on with a legislative proposal due for the end of 2016, as part of the Digital Single Market (DSM) strategy. The proposal aims at tackling...
2016 / Erkuden Rios, Massimiliano Rak -
Panning for gold: automatically analysing online social engineering attack surfaces
Abstract The process of social engineering targets people rather than IT infrastructure. Attackers use deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a target to disclose sensitive information or to interact...
2016 / Matthew Edwards, Robert Larson, Benjamin Green, Awais Rashid, Alistair Baron -
Artificial Neural Networks Applied to Flow Prediction: A Use Case for the Tomebamba River
Abstract The main aim of this research is to create a model based on Artificial Neural Networks (ANN) that allows predicting the flow in Tomebamba river, at real time and in a specific day of a year. As inputs, this research is using information of...
2016 / Jaime Veintimilla-Reyes, Felipe Cisneros, Pablo Vanegas -
Use of image analysis for the evaluation of rolling bottle tests results
Abstract The adhesion between bitumen and aggregates is of paramount importance for asphalt mixtures, because it is confirmed that a weak bond strength results in a premature failure of the pavement. Methods for determining the affinity or the...
2016 / Claudio Lantieri, Riccardo Lamperti, Andrea Simone, Valeria Vignali, Cesare Sangiorgi, et al. -
Factors Affecting Multinational Team Performance
Abstract In recent years, many empirical studies about the factors affecting multinational/multicultural team performance has been published. But these studies mostly focused on a single factor or only a maximum of three factors. Studies analyzing...
2016 / Serhat Sağ, Ramazan Kaynak, Bülent Sezen -
Leaves Recognition System Using a Neural Network
Abstract Leaf recognition has been gained an importance since the increment of intelligent applications in different platforms such as desktop and mobile. Each leaf contains unique distinct pattern on it that provides effective input for neural...
2016 / Boran Şekeroğlu, Yücel İnan -
A review on Gaussian Process Latent Variable Models
Abstract Gaussian Process Latent Variable Model (GPLVM), as a flexible bayesian non-parametric modeling method, has been extensively studied and applied in many learning tasks such as Intrusion Detection, Image Reconstruction,...
2016 / Ping Li, Songcan Chen -
Towards Assuring Correct Coordination of Multilayer Recovery Using Integrated Ontologies
Abstract Configuring automated recovery in a multilayer virtualized network presents significant architectural issues. The rules that define the interworking strategy between recovery mechanisms must be translated into technology-specific...
2016 / Joseph Kroculick -
Classical Resolution for Many-Valued Logics
Abstract We present a resolution-based proof method for finite-valued propositional logics based on an algorithmic reduction procedure that expresses these logics in terms of bivalent semantics. Our approach is hybrid in using some elements which...
2016 / João Marcos, Cláudia Nalon -
JIT-Based Cost Analysis for Dynamic Program Transformations
Abstract Tracing JIT compilation generates units of compilation that are easy to analyse and are known to execute frequently. The AJITPar project investigates whether the information in JIT traces can be used to dynamically transform programs for a...
2016 / John Magnus Morton, Patrick Maier, Phil Trinder