Computer and information sciences topic list of research papers
-
Ideality & Bio-Inspired Based Collaborative Bibliographic Search Method
Abstract Bibliographic search is a common entry point to any scientific work. It aims at gathering enough information to support the incoming thoughts. It is usually an unstructured process relying on both information retrieval and serendipity. ...
2016 / Fayemi Pierre-Emmanuel, Duci Stefano, Fayolle Thomas, Nicolas Maranzana, Bersano Giacomo -
A geometrical distance measure for determining the similarity of musical harmony2013 / W. Bas de Haas, Frans Wiering, Remco C. Veltkamp
-
How to assess intelligences through the observational method. The italian experience
Abstract Different Authors were involved in the elaboration of systems to assess Multiple Intelligences. These efforts mainly produced questionnaires and check lists. These devices need users to possess and use linguistic abilities, and intra...
2011 / Paola Nicolini -
RETRACTED: Retraction notice to using Mobile Phones in Language Learning/Teaching [SBSPRO 15C (2011) 2947–2951]
This article has been retracted: please see Elsevier Policy on Article Withdrawal (http://www.elsevier.com/locate/withdrawalpolicy). This article has been retracted at the request of the Editor. The authors have plagiarized part ...
2011 / Masoud Hashemi, Babak Ghasemi -
Retinex-Like Method for Image Enhancement in Poor Visibility Conditions
Abstract Nowadays, still image and video systems are typically of limited use in poor visibility conditions such as in rain, fog, smoke, and at dawn. These situations severely limit the range and effectiveness of imaging systems because of the...
2011 / Wang Hao, Ming He, Hui Ge, Cheng-jin Wang, Qing-Wei Gao -
Dynamic Programming for NP-Hard Problems
Abstract This paper presents the extremely simple algorithms for NP-hard subset-sum like problems with the bitset class. The presented algorithms decrease the time and space complexity of dynamic programming algorithms by exploiting word...
2011 / Xiaodong Wang, Jun Tian -
Apple Grading Method Based on Features Fusion of Size, Shape and Color
Abstract As grading results of apples based on the single feature such as size, shape or color are not accurate, this paper proposes a multi-feature information fusion method based on BP neural network and D-S evidential theory to improve the...
2011 / Xianfeng Li, Weixing Zhu -
Two Cooperative Partitions for the Lase Level Cache
Abstract Currently the most widely used replacement policy in the last cache is the LRU algorithm. Popular as it is, LRU performs poorly when it has a memory-intensive workload whose working set is larger than the available cache capacity. The...
2011 / Baozhong Yu, Zening Qu, Jianlang Ma, Tianzhou Chen -
A Low Energy Image Compression and Transmission in Wireless Multimedia Sensor Networks
Abstract Wireless Multimedia Sensor networks (WMSNs) have shifted the focus from scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, images, audio, as well as scalar sensor data. However, the...
2011 / Enyan Sun, Xuanjing Shen, Haipeng Chen -
Computer aided evaluation of learning management systems
Abstract Learning management systems (LMSs) are software applications that comprise a suite of tools for learning and online teaching. There are many commercial and open source LMSs that can be found on the web. Because there are many LMS systems in ...
2009 / Nadire Cavus, Ala’a M. Momani -
Live sport monitoring using remote camera system
Abstract We present the use of camera for sport judge, where the best sport broadcasting soccer which is popular worldwide to be more interesting with the right result. The audience which is known as sport fan club or spectators expects the right...
2010 / Apatcha Sirichai, Somkuan Kaviya, Preecha P. Yupapin -
Views of painting teaching programme candidates toward virtual exhibitions
Abstract There are lessons including the use of basic information technologies in the Teacher Education Programmes as well as how these technologies can be used in educational activities and Internet supported Distance Education practices. Painting...
2009 / Hurşit Cem Salar -
The Research of Intrusion Detection Algorithms Based on the Clustering of Information Entropy
Abstract Click here and insert your abstract text. Intrusion Detection technology is importantly composed part. And it makes up for absence about firewall and data security protection. This paper carried out based on clustering techniques of...
2012 / Ye Zheng-wang -
Developing a Why–How Question Answering system on community web boards with a causality graph including procedural knowledge
Abstract The research aims to develop an automatic Question Answering system, in particular Why and How questions, on community web-boards to support ordinary people in preliminary diagnosis and problem solving, such as plant disease problems. The...
2016 / C. Pechsiri, R. Piriyakul -
A Service Discovery Approach Based on a Quantitative Similarity Measure for M-Tourism Platforms2012 / Fayçal M’hamed Bouyakoub, Abdelkader Belkhir
-
Hybrid visibility compositing and masking for illustrative rendering
Abstract In this paper, we introduce a novel framework for the compositing of interactively rendered 3D layers tailored to the needs of scientific illustration. Currently, traditional scientific illustrations are produced in a series of composition...
2010 / Stefan Bruckner, Peter Rautek, Ivan Viola, Mike Roberts, Mario Costa Sousa, et al. -
Towards a user model for personalized recommendations in work-integrated learning: A report on an experimental study with a collaborative tagging system
Abstract The informal setting of learning at work give rise for unique challenges to the field of technology enhanced learning systems. Personalized recommendations taking into account the current context of the individual knowledge worker are a...
2010 / K. Schoefegger, P. Seitlinger, T. Ley -
Simultaneous feature selection and ant colony clustering
Abstract Clustering is a widely studied problem in data mining. Ai techniques, evolutionary techniques and optimization techniques are applied to this field. In this study, a novel hybrid modeling approach proposed for clustering and feature...
2011 / Emre Akarsu, Adem Karahoca -
Cluster based bit vector mining algorithm for finding frequent itemsets in temporal databases
Abstract In this paper, we introduce an efficient algorithm using a new technique to find frequent itemsets from a huge set of itemsets called Cluster based Bit Vectors for Association Rule Mining (CBVAR). In this work, all the items in a...
2011 / M. Krishnamurthy, A. Kannan, R. Baskaran, M. Kavitha -
WRSR: wormhole-resistant secure routing for wireless mesh networks2013 / Rakesh Matam, Somanath Tripathy