Computer and information sciences topic list of research papers
-
Computation of Independent Contact Regions for Grasping 3-D Objects2009 / M.A. Roa, R. Suarez
-
Collaboration and information sharing in dyadic supply chains: A literature review over the period 2000–2012
Abstract Information sharing and coordination between the agents of a supply chain are considered to be an effective strategy for improving its global performance. This paper presents an updated review of current literature examining the impacts of...
2014 / Jairo R. Montoya-Torres, Diego A. Ortiz-Vargas -
Sentiment analysis: Bayesian Ensemble Learning
Abstract The huge amount of textual data on the Web has grown in the last few years rapidly creating unique contents of massive dimension. In a decision making context, one of the most relevant tasks is polarity classification of a text source,...
2014 / E. Fersini, E. Messina, F.A. Pozzi -
Tax Aggressiveness and Negotiations: A Conceptual Paper
Abstract Negotiation is a pervasive feature of relationships among auditor-clients, buyer-sellers, as well as being a part of tax audits. Various forms of negotiations occur between the taxpayer and the tax authorities but nothing is mentioned in...
2015 / Anna Azriati Che Azmi, Voon Yuen Hoong -
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Abstract This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). The strategy is divided into two phases: text segmentation using dominant point detection,...
2014 / Moayad Yousif Potrus, Umi Kalthum Ngah, Bestoun S. Ahmed -
RFID Alarm System and Trajectory Correction in Paralympic Athletics Races
Abstract In this paper is presented the work relative to the design of an aid system, for athletes with special needs in terms of vision. The system is based on Radio Frequency Identification (RFID) technology and serves to help visually impaired...
2014 / Nuno T. Almeida, Vitor Pinheiro -
A Systolic Architecture for Hopfield Neural Networks
Abstract Recently the Hopfield Neural Network (HNN) is employed as an optimization tool to solve shortest path problem in communication networks. The hardware implementation of digital Hopfield neural network is an important issue that is considered ...
2014 / Hajar Asgari, Yousef S. Kavian, Ali Mahani -
Gamification in Factory Management Education – A Case Study with Lego Mindstorms
Abstract Research oriented teaching in universities provides opportunities to support the student's desire to explore. A student's learning success can benefit from gamified project work, especially when students face self-guided learning processes...
2015 / Bastian C. Müller, Carsten Reise, Günther Seliger -
Comparative Study of Circular and Hexagonal Antenna Array Synthesis Using Improved Particle Swarm Optimization
Abstract This paper describes the comparison of the performance of Circular array (CA) and Hexagonal Array (HA) of uniformly excited isotropic antennas which can generate directive beam with minimum relative Side Lobe Level (SLL). The Improved...
2015 / Rajesh Bera, Ragini Lanjewar, Durbadal Mandal, Rajib Kar, Sakti Prasad Ghoshal -
Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey2013 / Md. Adnan, Mohammd Razzaque, Ishtiaque Ahmed, Ismail Isnin
-
A Context-Based Approach to Reconciling Data Interpretation Conflicts in Web Services Composition2013 / Xitong Li, Stuart E. Madnick, Hongwei Zhu
-
Constructing HVS-Based Optimal Substitution Matrix Using Enhanced Differential Evolution2013 / Shu-Fen Tu, Ching-Sheng Hsu
-
Managing, Analysing, and Integrating Big Data in Medical Bioinformatics: Open Problems and Future Perspectives2014 / Ivan Merelli, Horacio Pérez-Sánchez, Sandra Gesing, Daniele D’Agostino
-
Overview of the ID, EPI and REL tasks of BioNLP Shared Task 20112012 / Sampo Pyysalo, Tomoko Ohta, Rafal Rak, Dan Sullivan, Chunhong Mao, et al.
-
On the inclusion of prime factors to calculate the theoretical lower bounds in multiplierless single constant multiplications2014 / David E Troncoso Romero, Uwe Meyer-Baese, Gordana Dolecek
-
Prevention of sexually transmitted infections using mobile devices and ubiquitous computing2015 / Felipe Besoain, Antoni Perez-Navarro, Joan A Caylà, Constanza Jacques Aviñó, Patricia García de Olalla
-
SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services2009 / Damian DG Gessler, Gary S Schiltz, Greg D May, Shulamit Avraham, Christopher D Town, et al.
-
Capacity analysis of threshold-based SNR scheduler in LTE systems2013 / Ahmed Iyanda Sulyman, Ishtiaq Ahmad, Hossam Hassanein, Saleh A Alshebeili
-
3D Face Recognition Method Based on Cascade Classifier
Abstract A method for 3D face recognition based on Cascade Classifier algorithm is proposed in this paper. First, 3D point data is mapped to X-Y planar by using iteration interpolation method, and the range image is obtained. Then the principal...
2012 / Bi Kun, Luo Lin, Zhao Li, Fang Shi Liang -
Study on citrus fruit image data separability by segmentation methods
Abstract This paper presents the study on half of the citrus fruit image data acquired from a cold mirror bi-camera acquisition system. The ultimate objective of this project is to extend a ripeness study on the citrus fruit image data and the...
2011 / Peilin Li, Sang-heon Lee, Hung-Yao Hsu