Computer and information sciences topic list of research papers
-
Paralleling Simulation of Operations Plan based on Decision Point Controlling
Abstract Operational Plan Paralleling Simulation Based on Decision Point Controlling (P2SDPC) can realize the operational plan's dynamic adjusting and cutting impossible branch based on decision point controlling technology. From then on, we can...
2014 / Zhanguang Cao, Pinggang Yu -
Sort-Mid tasks scheduling algorithm in grid computing
Abstract Scheduling tasks on heterogeneous resources distributed over a grid computing system is an NP-complete problem. The main aim for several researchers is to develop variant scheduling algorithms for achieving optimality, and they have shown a ...
2014 / Naglaa M. Reda, A. Tawfik, Mohamed A. Marzok, Soheir M. Khamis -
Non-Rigid Graph Registration Using Active Testing Search2014 / Eduard Serradell, Miguel Amavel Pinheiro, Raphael Sznitman, Jan Kybic, Francesc Moreno-Noguer, et al.
-
Articulation based admissible wavelet packet feature based on human cochlear frequency response for TIMIT speech recognition
Abstract To deal with non-stationary and quasi-stationary signals, wavelet transform has been used as an effective tool for the time-frequency analysis. In the recent years, wavelet transform has been used extensively for feature extraction in noisy ...
2014 / Astik Biswas, P.K. Sahu, Anirban Bhowmick, Mahesh Chandra -
A New Texture Analysis Approach for Iris Recognition
Abstract One of the most important authentication approaches is the iris recognition system (IRS), which is based on the iris of aperson for the authentication.In this paper, we propose a new iris recognition system using a novel feature extraction...
2014 / Izem Hamouchene, Saliha Aouat -
Mind the gap: a heuristic study of subway tours2014 / M. Drozdowski, D. Kowalski, J. Mizgajski, D. Mokwa, G. Pawlak
-
Realizing actual feedback control of complex network2014 / Chengyi Tu, Yuhua Cheng
-
Fuzzy Load Balancing for IEEE 802.11 Wireless Networks
Abstract Wireless networks (WNs) are today used in many areas thanks to several benefits deriving from the ease of installation and maintenance and the high scalability. However, in large areas, the increasing number of nodes implies that Access...
2014 / Mario Collotta, Gianfranco Scatà -
Task Description Logic Based on Temporal Constrain Net2014 / Cen Yu, Wei Jia Zhou
-
Interactive Models as a System Design Tool: Applications to System Project Management
Abstract Frequent and significant cost and schedule overruns in large aerospace and defense projects are hypothesized to be attributed to limitations on designers’ perception of complex systems. New design methods and tools to improve perception...
2015 / Paul T. Grogan, Olivier L. de Weck, Adam M. Ross, Donna H. Rhodes -
Providing Parallel Debugging for DASH Distributed Data Structures with GDB
Abstract The C++ DASH template library provides distributed data container for Partitioned Global Address Space (PGAS)-like programming. Because DASH is new and under development no debugger is capable to handle the parallel processes or...
2015 / Denis Hünich, Andreas Knüpfer, José Gracia -
Comparison of Digital Tools for Ergonomics in Practice
Abstract Nowadays science is characterized by a phenomenon that has become the link. This trend is digitalization. Ergonomics has also not avoided this trend. The results of these trends are software tools, which include sophisticated digital human...
2015 / Patrik Polášek, Marek Bureš, Michal Šimon -
Hand Gesture Recognition and Interface via a Depth Imaging Sensor for Smart Home Appliances
Abstract This paper presents a novel hand gesture interface system via a depth imaging sensor for appliances control in smart home environments. To control appliances with hand gestures, we recognize the hand parts in a depth hand silhouette and...
2014 / Dong-Luong Dinh, Jeong Tai Kim, Tae-Seong Kim -
Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing Scheme
Abstract Mobile ad hoc network, is nowadays becoming extremely famous in research vicinity. A range of protocols and methodology is coming into account to resolve an assortment of issues associated with a mobile ad hoc network. The nodes in mobile...
2015 / Nidhi Lal, Shishupal Kumar, Aditya Saxena, Vijay Km. Chaurasiya -
Algorithms of Ancestral Gene Length Reconstruction2013 / Alexander Bolshoy, Valery M. Kirzhner
-
A Novel Feature Selection Technique for Text Classification Using Naïve Bayes2014 / Subhajit Dey Sarkar, Saptarsi Goswami, Aman Agarwal, Javed Aktar
-
Fast max-margin clustering for unsupervised word sense disambiguation in biomedical texts2009 / Weisi Duan, Min Song, Alexander Yates
-
Processing SPARQL queries with regular expressions in RDF databases2011 / Jinsoo Lee, Minh-Duc Pham, Jihwan Lee, Wook-Shin Han, Hune Cho, et al.
-
Throughput analysis of buffer-constrained wireless systems in the finite blocklength regime2013 / M Gursoy
-
A scalable method for discovering significant subnetworks2013 / Md Mahmudul Hasan, Yusuf Kavurucu, Tamer Kahveci