Computer and information sciences topic list of research papers
-
Constraint based Sequential Pattern Mining in Time Series Databases - A Two Way Approach
Abstract Most of the patter search algorithms in literature are mostly string based and do not concentrate on finding sequential patterns with constraints in a given database. Also in query languages such as SQL or MySQL, the select clause does not...
2013 / Vangipuram Radhakrishna, Chintakindi Srinivas, C.V. Guru Rao -
Social Networks Mining for Analysis and Modeling Drugs Usage
Abstract This paper presents approach for mining and analysis of data from social media which is based on using Map Reduce model for processing big amounts of data and on using composite applications for performing more sophisticated analysis which...
2014 / Andrei Yakushev, Sergey Mityagin -
A Hybrid Artificial Reputation Model Involving Interaction Trust, Witness Information and the Trust Model to Calculate the Trust Value of Service Providers2014 / Gurdeep Ransi, Ziad Kobti
-
Text Categorization based on Clustering Feature Selection
Abstract In this paper, we discuss a text categorization method based on k-means clustering feature selection. K-means is classical algorithm for data clustering in text mining, but it is seldom used for feature selection. For text data, the words...
2014 / Xiaofei Zhou, Yue Hu, Li Guo -
Wireless Sensor Networks for Heritage Object Deformation Detection and Tracking Algorithm2014 / Zhijun Xie, Guangyan Huang, Roozbeh Zarei, Jing He, Yanchun Zhang, et al.
-
Memory Capacity of Networks with Stochastic Binary Synapses2014 / Alexis M. Dubreuil, Yali Amit, Nicolas Brunel
-
Content Based Image Retrieval Using Colour Strings Comparison
Abstract Content Based Image Retrieval (CBIR) is a technique that enables a user to extract an image based on a query, from a database containing a large amount of images. A very fundamental issue in designing a content based image retrieval system...
2015 / Kommineni Jenni, Satria Mandala, Mohd Shahrizal Sunar -
A model for syntactic control of interference2009 / P. W. O'Hearn
-
Attacks on IEEE wireless networks2013 / Tepsic Dejan, Veinovic Mladen
-
Quadratic and nonlinear programming problems solving and analysis in fully fuzzy environment
Abstract This paper presents a comprehensive methodology for solving and analyzing quadratic and nonlinear programming problems in fully fuzzy environment. The solution approach is based on the...
2015 / Walaa Ibrahim Gabr -
Health Monitoring System by Prognotive Computing Using Big Data Analytics
Abstract Big data is a modern age concept that is used to process large amount of data in various fields ranging from medical, remote sensing, customer service etc., The Medical Sphere is a tangential aspect to every individual's life.Technological...
2015 / M. Srivathsan, K. Yogesh Arjun -
MCMAS: an open-source model checker for the verification of multi-agent systems2015 / Alessio Lomuscio, Hongyang Qu, Franco Raimondi
-
Inference of Probabilistic Grammars in Different Rules Systems of Natural Languages
Abstract Grammar induction is an important and current area within computational linguistics. The results in induction of string transformation rules can be applied not only in linguistics but in many other pattern recognition tasks. The task of...
2014 / László Kovács, Zsolt Tóth -
Using visual representations for the searching and browsing of large, complex, multimedia data sets
Abstract Recent years have seen a huge increase in the digital data generated by companies, projects and individuals. This has led to significant challenges in visualizing and using large, diverse collections of digital information. Indeed the speed ...
2015 / H.J. Grierson, J.R. Corney, G.D. Hatcher -
The Pistoia Alliance Controlled Substance Compliance Service Project: from start to finish
Pharmaceutical companies and other life science R&D organizations routinely work with controlled substances, and must have adequate controls in place to meet the legislative requirements of the countries in which they operate. Controlled substances include a...
2014 / Daniel Taylor, Stuart G. Bowden, Reinhard Knorr, Derek R. Wilson, John Proudfoot, et al. -
On the Mahalanobis Distance Classification Criterion for Multidimensional Normal Distributions2013 / Guillermo Gallego, Carlos Cuevas, Raul Mohedano, Narciso Garcia
-
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
Abstract As sensor networks get increasingly deployed in real-world scenarios such as home and industrial automation, there is a similarly growing demand in analyzing, consolidating, and storing the data collected by these networks. The dynamic,...
2014 / Martin Henze, Sebastian Bereda, René Hummen, Klaus Wehrle -
Interactive preferences in multiobjective ant colony optimisation for assembly line balancing2014 / Manuel Chica, Óscar Cordón, Sergio Damas, Joaquín Bautista
-
A Framework for a BIM-based Knowledge Management System
Abstract Knowledge is generated in projects throughout the design and construction processes in Architecture/Engineering/Construction (AEC) projects. The management of this knowledge has been implemented by various firms in AEC the industry through...
2014 / Abhijeet Deshpande, Salman Azhar, Shreekanth Amireddy -
Intelligent User Interface of Smartphones for On-vehicle Information Devices
Abstract The current technological trend in automotive navigation systems is toward “Display Audio” systems connected to a smartphone. However, there are some issues stemming from the differing life cycles of on-vehicle information devices and...
2014 / Seiji Matsuyama, Takatomo Yamabe, Natsumi Takahashi, Ryozo Kiyohara