Computer and information sciences topic list of research papers
-
A Wavelet Packet and Mel-Frequency Cepstral Coefficients-Based Feature Extraction Method for Speaker Identification
Abstract One of the most widely used approaches for feature extraction in speaker recognition is the filter bank-based Mel Frequency Cepstral Coefficients (MFCC) approach. The main goal of feature extraction in this context is to extract features...
2015 / Claude Turner, Anthony Joseph -
Evolving Gustafson-kessel Possibilistic c-Means Clustering
Abstract This paper presents an idea of evolving Gustafson-Kessel possibilistic c-means clustering (eGKPCM). This approach is extension of well known possiblilistic c-means clustering (PCM) which was proposed to address the drawbacks associated with ...
2015 / Igor Škrjanc, Dejan Dovžan -
Fast Rotation Invariant Detection of Region Duplication Attacks Even on Uniform Background Containing Digital Images
Abstract In copy move forgery, some area of image is copied and pasted elsewhere in the same image. This may contain two motives, either to increase number of objects or to hide objects. In this paper, we propose a fast copy—rotate-paste image...
2015 / Vivek Kumar Singh, R.C. Tripathi -
Hybrid human–machine information systems: Challenges and opportunities
Abstract Micro-task Crowdsourcing has been used for different purposes: creating training data for machine learning algorithms, relevance judgments for evaluation of information systems, sentiment analysis, language translation, etc. In this paper...
2015 / Gianluca Demartini -
Conception of Virtual Private Networks Using IPsec Suite of Protocols, Comparative Analysis of Distributed Database Queries Using Different IPsec Modes of Encryption
Abstract The world of Internet as such is open and insecure by nature. Companies and organizations exploit enormous possibilities that internet offers to build computer systems to enable communication and data sharing capabilities within their...
2015 / Muhamed Elezi, Bujar Raufi -
A Hybrid Metaheuristic for the Distance-constrained Capacitated Vehicle Routing Problem
Abstract The delivery of goods is a crucial operational process, which is at the heart of the supply chain and logistic fields. Numerous companies have known a significant drop of their running costs due to the efficient coping with distribution...
2014 / Takwa Tlili, Sami Faiz, Saoussen Krichen -
Service-oriented Router Simulation Module Implementation in NS2 Simulator
Abstract The Service-oriented Router (SoR) is a router for next generation networks. This router has a high-throughput database and it has the capability to snoop all transaction in its interfaces. The SoR also provides an API which can provide...
2013 / Janaka Wijekoon, Erwin Harahap, Hiroaki Nishi -
HPC Benchmark Assessment with Statistical Analysis
Abstract High-performance computing (HPC) benchmarks are widely used to evaluate and rank system performance. This paper introduces a benchmark assessment tool equipped with a rigorous statistical method to evaluate HPC benchmarks against a set of...
2014 / Fei Xing, Haihang You, Charngda Lu -
Mitigation of the Eclipse Attack in Chord Overlays
Abstract Distributed Hash Table-based overlays are widely used to support efficient information routing and storage in structured peer- to-peer networks, but they are also subject to numerous attacks aimed at disrupting their correct functioning. In ...
2014 / Cristina Rottondi, Alessandro Panzeri, Constantin Yagne, Giacomo Verticale -
Dynamic Data Driven Crowd Sensing Task Assignment
Abstract To realize the full potential of mobile crowd sensing, techniques are needed to deal with uncertainty in participant locations and trajectories. We propose a novel model for spatial task assignment in mobile crowd sensing that uses a...
2014 / Layla Pournajaf, Li Xiong, Vaidy Sunderam -
Wordlength optimization for linear digital signal processing2003 / G.A. Constantinides, P.Y.K. Cheung, W. Luk
-
Canonic Route Splitting
Abstract There are multiple ways to split a path in a directed graph into largest sub-paths of minimal cost. All possible splits constitute path partitions of the same size. By calculating two specific path splittings, it is possible to identify...
2014 / Luk Knapen, Tom Bellemans, Davy Janssens, Geert Wets -
How to Improve Environmental Performance by Negotiating Functional Specifications of Complex System?
Abstract This article aims to present an approach based on a combination of life cycle analysis methods (LCA) and problem solving by constraint satisfaction (CSP). This original approach makes it possible to vary the design of the different...
2014 / Nicolas Tchertchian, Dominique Millet, Pierre-Alain Yvars -
Leveraging social Q&A collections for improving complex question answering
Abstract This paper regards social question-and-answer (Q&A) collections such as Yahoo! Answers as knowledge repositories and investigates techniques to mine knowledge from them to improve sentence-based complex question answering (QA) systems....
2014 / Youzheng Wu, Chiori Hori, Hideki Kashioka, Hisashi Kawai -
Optimize on Data Correlation of Sensor Nodes with Adaptive Fault-tolerant Algorithm
Abstract A-SMAC protocol based on sensor node data traffic dynamic adjusting node listen and sleep time. Based on A-SMAC protocol, sensor nodes sent out the underlying error decisions .In this paper, we propose an adaptive fault-tolerant algorithm...
2014 / Yun Liu, Hongzhi Zhou -
Overcoming the pitfalls of ontology authoring: Strategies and implications for tool design
Abstract The process of authoring ontologies appears to be fragmented across several tools and workarounds, and there exists no well accepted framework for common authoring tasks such as exploring ontologies, comparing versions, debugging, and...
2014 / Markel Vigo, Samantha Bail, Caroline Jay, Robert Stevens -
A Reliable A-MSDU Frame Aggregation Scheme in 802.11n Wireless Networks
Abstract IEEE 802.11n standard is introduced to enhance the throughput to more than 100Mbps at the MAC service access point. This high throughput is achieved through several enhancements at the physical and MAC layers. Frame aggregation is a key...
2013 / Anwar Saif, Mohamed Othman -
An Algebraic Approach Towards Data Cleaning
Abstract There has been a proliferation in the amount of data being generated and collected in the past several years. One of the leading factors contributing to this increased data scale is cheaper commodity storage, making it easier for...
2013 / Ridha Khedri, Fei Chiang, Khair Eddin Sabri -
On the Design of Educational Digital Stories: The Ed-W Model
Abstract This paper focuses on the presentation of an educational, modeling methodology (the Ed-W methodology) that is appropriate for the design of storyboards for educational digital stories. This methodology is based on the creation of the...
2014 / Maria Kordaki -
Determination of Candidate Science Teachers’ Attitudes towards Computer Assisted Teaching
Abstract The purpose of study is to determine candidate science teacher's attitudes towards computer assisted teaching and also to reveal whether teacher candidate's attitudes show a difference according to gender. The sample of the research is...
2014 / Ezgi Güven, Mustafa Aydoğdu