Computer and information sciences topic list of research papers
-
Speaker Independent Isolated Speech Recognition System for Tamil Language using HMM
Abstract The ambitious speech research for more than 50 years is having a machine to understand fluently spoken speech. This can be achieved by developing an Automatic Speech Recognition (ASR) system. Such a significant job specifically for Indian...
2012 / Ms. Vimala C., V. Radha -
An Intelligent Surveillance Platform for Large Metropolitan Areas with Dense Sensor Deployment2013 / Jorge Fernández, Lorena Calavia, Carlos Baladrón, Javier Aguiar, Belén Carro, et al.
-
Using ART2 Neural Network and Bayesian Network for Automating the Ontology Constructing Process
Abstract Ontology is one of the fundamental cornerstones of the semantic Web. The pervasive use of ontologies in information sharing and knowledge management calls for efficient and effective approaches to ontology development. Ontology learning,...
2012 / Maryam Hourali, Gholam Ali Montazer -
Research on Routing and Self-Configuration Ability of Topic-Based Pub/Sub System
Abstract The event-driven publish/subscribe system decouples event producers from consumers, enhancing scalability and flexibility of distributed system. Event routing and self-configuration are two key issues in this system. A lot of researches...
2012 / Hui Xie, Yang Zhang, Xiaofeng Li, Ruisheng Shi -
Further remarks on P systems with active membranes, separation, merging, and release rules2004 / Linqiang Pan, Artiom Alhazov, Tseren-Onolt Isdorj
-
Pattern matching through Chaos Game Representation: bridging numerical and discrete data structures for biological sequence analysis2012 / Susana Vinga, Alexandra M Carvalho, Alexandre P Francisco, Luís MS Russo, Jonas S Almeida
-
Querying large read collections in main memory: a versatile data structure2011 / Nicolas Philippe, Mikaël Salson, Thierry Lecroq, Martine Léonard, Thérèse Commes, et al.
-
Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme
Abstract Authentication is the important issue over the internet. It results in need of robust security services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with Cascade forward back propagation neural network. The...
2016 / Supriya Narad, Pallavi Chavan -
Fast mode decision on H.264/AVC baseline profile for real-time performance2007 / Marcos Nieto, Luis Salgado, Julián Cabrera, Narciso García
-
A unified framework for managing provenance information in translational research2011 / Satya S Sahoo, Vinh Nguyen, Olivier Bodenreider, Priti Parikh, Todd Minning, et al.
-
Hardware and software system-level simulator for wireless sensor networks
Abstract Wireless Sensor Network is a large-scale network of resource-constrained (energy, memory and processing) sensor nodes that are deployed at different locations, in order to monitor physical or environmental conditions. A design problem is...
2010 / D. Navarro, W. Du, F. Mieyeville, L. Carrel -
Infinitary Howe's Method
Abstract Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences). It proceeds by constructing an extension of the given relation...
2008 / Paul Blain Levy -
EXPTIME-complete Decision Problems for Modal and Mixed Specifications
Abstract Modal and mixed transition systems are formalisms that allow mixing of over- and under-approximation in a single specification. We show EXPTIME-completeness of three fundamental decision problems for such specifications: whether a set of...
2009 / Adam Antonik, Michael Huth, Kim G. Larsen, Ulrik Nyman, Andrzej Wąsowski -
Refinement-Based Verification of Interactive Real-Time Systems
Abstract Formal specification provides a system description that is much more precise than the natural language one and it can help to solve a lot of specification problems. But even a formal specification of a system can contain mistakes or can...
2008 / Maria Spichkova -
Parallel Model Checking Large-Scale Genetic Regulatory Networks with DiVinE
Abstract Studies of cells in silico can greatly reduce the need for expensive and prolonged laboratory experimentation. The use of model checking for the analysis of biological networks has attracted much attention recently. One of the practical...
2008 / J. Barnat, L. Brim, I. Černá, S. Dražan, D. Šafránek -
On the Role of Metadata in Visual Language Reuse and Reverse Engineering – An Industrial Case
Abstract Collecting metadata on a family of programs is useful not only for generating statistical data on the programs but also for future re-engineering and reuse purposes. In this paper we discuss an industrial case where a project library is...
2005 / Mika Karaila, Tarja Systä -
Quality of experience evaluation of voice communication: an affect-based approach2012 / Abhishek Bhattacharya, Wanmin Wu, Zhenyu Yang
-
Authentication in mobile devices through hand gesture recognition2012 / J. Guerra-Casanova, C. Sánchez-Ávila, G. Bailador, A. de Santos Sierra
-
Formal Study of a Novel Network Role-based Routing Intelligent Algorithm
Abstract NORIA (Network rOle-based Routing Intelligent Algorithm) is a novel routing algorithm for Wireless Sensor Networks (WSNs) which combines various effective techniques in order to reduce energy consumption and improve data routes. This paper...
2013 / J.A. Mateo, H. Macià, M.C. Ruiz, J.J. Pardo, A.M. Ortiz -
The research about the usability of a visual dictionary developed for the hearing impaired students
Abstract In this study, the usability of the visuals belonging to the visual dictionary created to be used in the education program planned on the purpose of developing literacy skills of the hearing impaired students has been researched. The visual ...
2011 / Hasan Karal, Lokman Şılbır