Computer and information sciences topic list of research papers
-
Stego Keys Performance on Feature Based Coding Method in Text Domain2017 / Roshidi Din, Azman Samsudin, Sunariya Utama
-
Solution for Sound Playback Delay on Android Devices
Abstract Recent reports show that there is a 40-200 millisecond delay for sound playback in Android devices. At the same time there is no such reports and identified problem for other platforms. Research focuses on unresolved audio playback latency...
2017 / Dmitrijs Zigunovs, Jekaterina Smirnova, Gatis Vitols, Gintautas Stonys -
Intelligent Control of a Sensor-Actuator System via Kernelized Least-Squares Policy Iteration2012 / Bo Liu, Sanfeng Chen, Shuai Li, Yongsheng Liang
-
Decision Making for the Software Architecture Structure Based on the Criteria Importance Theory
Abstract Software architectural decisions have a significant impact on the software development process as well as on the quality of developed software systems. In this paper, the technique that allows selecting the optimal software architecture...
2017 / Sergey Orlov, Andrei Vishnyakov -
Enhanced PKI authentication with trusted product at claimant
Abstract In this paper, a data structure to enhance PKI (Public Key Infrastructure) authentication is proposed generalizing the concept of ISO/IEC 24761. Current technologies do not provide sufficient information on products which are used in the...
2017 / Asahiko Yamada, Tatsuro Ikeda -
A reduced computational load protein coding predictor using equivalent amino acid sequence of DNA string with period-3 based time and frequency domain analysis2011 / Jayakishan K. Meher, Gananath N. Dash, Pramod Kumar Meher, Mukesh Kumar Raval
-
Low-level trace correlation on heterogeneous embedded systems2017 / Thomas Bertauld, Michel R. Dagenais
-
Acceptance factors for the use of video call via smartphone by blind people
Abstract Using video call via smartphones is a new technology for blind people which can be applied to facilitate their daily lives. This video call technology is different from old technology and the technology acceptance has changed users'...
2017 / Tamanit Chanjaraspong -
Age estimation from a face image in a selected gender-race group based on ranked local binary patterns2017 / Andrey Rybintsev
-
Decode-to-cooperate: a sequential alamouti-coded cooperation strategy in dual-hop wireless relay networks2016 / N. Hussain, K. Ziri-Castro, D. Jayalath, M. Arafah
-
Heading toward Artificial Intelligence 2.0
Abstract With the popularization of the Internet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and fusion of data and information throughout human society, physical space, and...
2017 / Yunhe Pan -
Resistance and Security Index of Networks: Structural Information Perspective of Network Security2016 / Angsheng Li, Qifu Hu, Jun Liu, Yicheng Pan
-
A Fuzzy Decision in Smart Fire and Home Security System
Abstract There has been a major rise in the fire incidents occurring over the past few years in the Pacific Island Countries (PICs) and especially property fires are a major concern. Often it is noticed that these usually lead to loss of homes,...
2017 / Kunal Kumar, Navneet Sen, Sheikh Azid, Utkal Mehta -
Survey of context information fusion for ubiquitous Internet-of-Things (IoT) systems2016 / Vijay Borges
-
A regression tree approach using mathematical programming
Abstract Regression analysis is a machine learning approach that aims to accurately predict the value of continuous output variables from certain independent input variables, via automatic estimation of their latent relationship from data....
2017 / Lingjian Yang, Songsong Liu, Sophia Tsoka, Lazaros G. Papageorgiou -
Automatic Fire Detection System based on Сontour Analysis Video Images2016 / Irina Egoshina, Dmitry Titov, Anton Stuchkov
-
Density peaks clustering based integrate framework for multi-document summarization
Abstract We present a novel unsupervised integrated score framework to generate generic extractive multi-document summaries by ranking sentences based on dynamic programming (DP) strategy. Considering that cluster-based methods proposed by other...
2017 / Baoyan Wang, Jian Zhang, Yi Liu, Yuexian Zou -
Learning to Automatically Detect Features for Mobile Robots Using Second-Order Hidden Markov Models2012 / Olivier Aycard, Jean-Francois Mari, Richard Washington
-
Bucket Brigades to Increase Productivity in a Luxury Assembly Line2013 / Filippo De Carlo, Orlando Borgia, Mario Tucci
-
Robust High-dimensional Bioinformatics Data Streams Mining by ODR-ioVFDT2017 / Dantong Wang, Simon Fong, Raymond K. Wong, Sabah Mohammed, Jinan Fiaidhi, et al.