Computer and information sciences topic list of research papers
-
Matrix Factorization Model in Collaborative Filtering Algorithms: A Survey
Abstract Recommendation Systems (RSs) are becoming tools of choice to select the online information relevant to a given user. Collaborative Filtering (CF) is the most popular approach to build Recommendation System and has been successfully employed ...
2015 / Dheeraj Bokde, Sheetal Girase, Debajyoti Mukhopadhyay -
Range-Free Localization Scheme in Wireless Sensor Networks Based on Bilateration2013 / Chi-Chang Chen, Chi-Yu Chang, Yan-Nong Li
-
An Agent Based Architecture Benchmark
Abstract Agent based platforms provide a means for creating applications that run independently of operating system and network architecture; as a result, agents have become part of many systems and support a large number of interactions between...
2014 / Petros Belsis, Stefanos Gritzalis, Costas Lambrinoudakis, Christos Skourlas, Vassilis Tsoukalas, et al. -
Translated Subtitles Language Learning Method: A New Practical Approach to Teaching English
Abstract The purpose of the paper is to present a contrastive audio-textual approach to teaching English which has been made possible with the advance of modern technology. It tackles the problem of how to provide effective learning of English to...
2015 / Mikhail Lunin, Ludmila Minaeva -
Knowledge based query expansion in complex multimedia event detection2015 / Maaike de Boer, Klamer Schutte, Wessel Kraaij
-
Training Neural Networks with Krill Herd Algorithm2015 / Piotr A. Kowalski, Szymon Łukasik
-
Advanced Train Location Simulator (ATLAS) for developing, testing and validating on-board railway location systems2015 / Jon Goya, Leticia Zamora-Cadenas, Saioa Arrizabalaga, Alfonso Brazález, Juan Meléndez, et al.
-
The Effects of Technology on Translation Students in Academic Translation Teaching
Abstract This paper aims at touching upon effects of technological developments on the translation teaching in the 21st century. These technological developments are usually in the area of Information Technology (IT) contributing to the fast growth...
2015 / Mehmet Cem Odacıoglu, Saban Kokturk -
Cloud based centralized task control for human domain multi-robot operations2015 / Rob Janssen, René van de Molengraft, Herman Bruyninckx, Maarten Steinbuch
-
Optimistic Multi-granulation Rough Set Based Classification for Medical Diagnosis
Abstract Medical analysis has been approached by several machine learning methods for many years.Pattern recognition algorithms are capable of improving the quality of prediction, early diagnosis of diseases and disease classification. The...
2015 / S. Senthil Kumar, H. Hannah Inbarani -
A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems
Abstract Cybercrime has led to the loss of billions of dollars, the malfunctioning of computer systems, the destruction of critical information, the compromising of network integrity and confidentiality, etc. In view of these crimes committed on a...
2015 / Adamu I. Abubakar, Haruna Chiroma, Sanah Abdullahi Muaz, Libabatu Baballe Ila -
Empirical Validation of Neural Network Models for Agile Software Effort Estimation based on Story Points
Abstract Now-a-days agile software development process has become famous in industries and substituting the traditional methods of software development. However, an accurate estimation of effort in this paradigm still remains a dispute in...
2015 / Aditi Panda, Shashank Mouli Satapathy, Santanu Kumar Rath -
ORB-PCA Based Feature Extraction Technique for Face Recognition
Abstract Face Recognition is one of the most prevalent fields in the domain of Computer Vision and the problems pertaining to it are very challenging. The potency of FR systems in biometric authentication systems is slowed down by their processing...
2015 / A. Vinay, C. Akshay Kumar, Gaurav R. Shenoy, K. N. Balasubramanaya Murthy, S. Natarajan -
Optimizing Security and Address Configuration in IPv6 SLAAC
Abstract The Neighbor Discovery Protocol (NDP) is the predominant component in IPv6; the next generation internet protocol providing for stateless address auto configuration of nodes (SLAAC), resolution of link layer addresses and neighbor...
2015 / Junaid Latief Shah, Javed Parvez -
Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems
Abstract The number of connections between physical and cyber security systems is rapidly increasing due to centralized control from automated and remotely connected means. As the number of interfaces between systems continues to grow, the...
2015 / Casey Perkins, George Muller -
Towards Search Engine Optimization: Feedback Collation
Abstract The same query submitted to different search engine agents can lead to dissimilar suggestions and results. Comparing these results can be time consuming especially with some queries generating millions of URLs. Thus an efficient tool to...
2015 / Eiman Tamah Al-Shammari -
A Dynamic Recommender System as Reinforcement for Personalized Education by a Fuzzly Linguistic Web System
Abstract The seek of a personalized and quality education is the objective of Bologna process, but to carry out this task has a major economic impact. To soften this impact, one possible solution is to make use of recommender systems, which have...
2015 / Álvaro Tejeda-Lorente, Juan Bernabé-Moreno, Carlos Porcel, Pablo Galindo-Moreno, Enrique Herrera-Viedma -
Frequent Item Set Mining Using INC_MINE in Massive Online Analysis Frame Work
Abstract Frequent Pattern Mining is one of the major data mining techniques, which is exhaustively studied in the past decade. The technological advancements have resulted in huge data generation, having increased rate of data distribution. The...
2015 / P.K. Srimani, Malini M. Patil -
Reversible color transform for Bayer color filter array images2013 / Suvit Poomrittigul, Masanori Ogawa, Masahiro Iwahashi, Hitoshi Kiya
-
Design of Time-constrained Guidance Laws via Virtual Leader Approach
Abstract Guidance problems with flight time constraints are considered in this article. A new virtual leader scheme is used for design of guidance laws with time constraints. The core idea of this scheme is to adopt a virtual leader for real...
2010 / Zhao Shiyu, Zhou Rui, Wei Chen, Ding Quanxin