Computer and information sciences topic list of research papers
-
An Approach to Splitting Atoms Safely
Abstract The intention of this paper is to make a contribution to (compositional) development methods for concurrent programs. The topics touched on include interference, atomicity, observability and granularity. The paper sets out some requirements ...
2006 / C.B. Jones -
An Efficient Framework for Image Matching
Abstract The goal of this paper is to present an efficient framework for non-rigid medical image matching. Previous non-rigid matching often produces unpredictable deformation field and unwanted stretching in the images. The as-rigid-as-possible...
2012 / Sheng-hui Liao, Zai-liang Chen, Bei-ji Zou -
An “Elder Mode” of New Generation Phone Using Augment Reality
Abstract In this paper we focus on augment reality (AR) used in mobile device and analysis advantages of touch-screen devices in facilitating user experience for elder people. We developed a virtual system on symbian^3 platform considering the...
2011 / Shuo Zhou, Zongxing Chen, Xiaoyang Liu, Hao Tang -
New process: pattern-based model driven architecture
Abstract The aim of this study is introducing a new method, through combination of patterns and MDA and includes four phases of modelling in three different viewpoints. It is considered as a complement to improve and accelerate transformations among ...
2012 / Manouchehr ZadahmadJafarlou, Ali Moeini, Parisa YousefzadehFard -
A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics
Abstract It is crucial in image forensics to prove the authenticity of the digital images. Due to the availability of the using sophisticated image editing software programs, anyone can manipulate the images easily. There are various types of...
2016 / Anil Dada Warbhe, R.V. Dharaskar, V.M. Thakare -
Optimization of Floor-Planning using Genetic Algorithm
Abstract Floor-planning is one of the key design flow of VLSI chip designing process. This paper presents a novel approach to solve the VLSI floor planning problems. This approach is based on iterative prototypes optimization with evolved...
2012 / T. Singha, H.S. Dutta, M. De -
Evolution of Degree of Purity in Programming Languages
Abstract Pure method is a method, which does not have any side effects or the extent of the side effect is limited. Purity Analysis is the technique of determining pure methods. Purity information can be used to perform program analysis,...
2012 / M. RajasekharaBabu, Anu Soosan Baby, Deepu Raveendran, Aswathi Joe -
A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity
Abstract k-Anonymity is one of the most popular techniques for protecting the privacy of an individual and hence preventing an adversary from gaining sensitive information. The observed limitations in this process are: i) The...
2012 / Srinivasa L. Chakravarthy, V. Valli Kumari, Ch. Sarojini -
The Educational Research of the Elevator Safety Warning Pictures for the Young Children
Abstract The vast majority of children aged 2-12 in China seldom have safety consciousness. They are lack of the risk prevention knowledge. The children shouldn’t be allowed to take the elevator alone. However, in the real life, the young children...
2012 / Zhu Liumin, Li Wenwei -
Fast Automatic Schematics for Public Transport Spider Maps
Abstract This paper describes a fast automatic method to generate schematic transportation maps from location data. Maps in general are commonly produced by hand or by purely graphics software. This is a difficult and time consuming task that also...
2012 / João Tiago Ribeiro, Rui Rijo, António Leal -
A Real-time Model for Multiple Human Face Tracking from Low-resolution Surveillance Videos
Abstract This article discusses a novel approach of multiple-face tracking from low-resolution surveillance videos. There has been significant research in the field of face detection using neural-network based training. Neural network based face...
2012 / Rajib Sarkar, Sambit Bakshi, Pankaj K. Sa -
Particle Swarm Optimization Applied to Ascent Phase Launch Vehicle Trajectory Optimization Problem
Abstract The ascent phase trajectory optimization of a single stage liquid propellant hypersonic launch vehicle is considered in this paper. Trajectory optimization is done to achieve desired terminal conditions using angle of attack as a control...
2015 / M.V. Dileep, Surekha Kamath, Vishnu G. Nair -
Coherently Explaining UML Statechart and Collaboration Diagrams by Graph Transformations
Abstract In this paper we continue our work on the formalization and validation of UML models by means of graph transformation systems. We here concentrate on statechart and collaboration diagrams albeit our approach covers use case, class, object,...
2005 / Paul Ziemann, Karsten Hölscher, Martin Gogolla -
On the ω-language Expressive Power of Extended Petri Nets
Abstract In this paper, we study the expressive power of several monotonic extensions of Petri nets. We compare the expressive power of Petri nets, Petri nets extended with non-blocking arcs and Petri nets extended with transfer arcs, in terms of...
2005 / A. Finkel, G. Geeraerts, J.-F. Raskin, L. Van Begin -
A Vision Based Method to Distinguish and Recognize Static and Dynamic Gesture
Abstract Vision based gesture recognizing acquired large improvements these years, as bonds of research achievements in labs become practical in factories. However, most of these findings are still restricted to either dynamic gesture or static...
2012 / Zong-yuan Zhao, Wan-lin Gao, Miao-miao Zhu, Lina Yu -
Spectrum Sensing using Frequency domain Entropy estimation and its FPGA implementation for Cognitive Radio
Abstract Spectrum sensing is an important module in cognitive Radio (CR) technology. This paper presents a spectrum sensing technique based on entropy estimation of the received signal in frequency domain. This approach is extended for cooperative...
2012 / S. Srinu, Samrat. L. Sabat, Siba K. Udgata -
Kernel Support Tensor Regression
Abstract Support vector machine (SVM) not only can be used for classification, can also be applied to regression problems by the introduction of an alternative loss function. Now most of the regress algorithms are based on vector as input, but in...
2012 / Chao Gao, Xiao-jun Wu -
Application Expectation of Virtual Reality in Basketball Teaching
Abstract With the rapid development of modern science and technology, the science and technology with electronic information technology as core has been applied in more and more teaching activities, however, an important content in modern teaching...
2012 / Hua-ping Yao, Yu-zhong Liu, Chang-song Han -
Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues
Abstract The issue of discriminating among players’ styles and associating them with player profile characteristics, demographics and specific interests and needs is of vital importance for creating content, fine tuned and optimized in such a way...
2012 / Stylianos Asteriadis, Kostas Karpouzis, Noor Shaker, Georgios N. Yannakakis -
A New Approach Based on Ncut Clustering Algorithm for Signature Segmentation
Abstract In signature recognition, it is a significant step to segment a text line into characters. And the unsupervised clustering is a commonly used remedy for this task. However, due to the strong overlapping and touch among characters, the...
2012 / Jun Tan, Wen-Xian Wang, Min-Shui Feng, Xiao-Xiong Zuo