Computer and information sciences topic list of research papers
-
Pseudorandom Number Generation in the Context of a 3D Simulation Model for Tissue Growth
Abstract In this paper, we consider our choice of a pseudorandom number generator (PRNG) in the context of running a simulation model for the growth of 3D tissues. This PRNG is the multiplicative linear congruential generator (MLCG) with carefully...
2014 / Belgacem Ben Youssef, Rachid Sammouda -
Large 2-Independent Sets of Regular Graphs
Abstract We present a simple, yet efficient, heuristic for finding a large 2-independent set of regular graphs. We analyse the average-case performance of this heuristic, which is a randomised greedy algorithm, by analysing its performance on random ...
2004 / W. Duckworth, M. Zito -
Towards Autonomous Agriculture: Automatic Ground Detection Using Trinocular Stereovision2012 / Giulio Reina, Annalisa Milella
-
Virtual Sensors for Designing Irrigation Controllers in Greenhouses2012 / Jorge Sánchez, Francisco Rodríguez, José Guzmán, Manuel Arahal
-
T-Patterns Revisited: Mining for Temporal Patterns in Sensor Data2010 / Albert Ali Salah, Eric Pauwels, Romain Tavenard, Theo Gevers
-
Educational crowdsourcing to support the learning of computer programming2015 / Dhiya Al-Jumeily, Abir Hussain, Mohammed Alghamdi, Chelsea Dobbins, Jan Lunn
-
A Genetic QoS-Aware Routing Protocol for the Smart Electricity Networks2013 / Agustin Zaballos, David Vernet, Josep M. Selga
-
A Symbolic-based Indoor Navigation System with Direction-based Navigation Instruction
Abstract Indoor navigation is difficult because of complexity of indoor space. The efficient navigation system is required for locating the objects in space with accuracy. This research proposes an indoor navigation system which relies on symbolic...
2015 / Gridaphat Sriharee -
An Efficient Processing of Join Queries for Sensor Networks Using Column-Oriented Databases2013 / Kyung-Chang Kim
-
Automatic Resource Allocation for High Availability Cloud Services
Abstract This paper proposes an approach to support cloud brokers finding optimal configurations in the deployment of dependability and security sensitive cloud applications. The approach is based on model-driven principles and uses both UML and...
2015 / Stefano Marrone, Roberto Nardone -
An empirical technique to improve MRA imaging
Abstract In the Region Growing Algorithm (RGA) results of segmentation are totally dependent on the selection of seed point, as an inappropriate seed point may lead to poor segmentation. However, the majority of MRA (Magnetic Resonance Angiography)...
2015 / Sonia Rauf, Kalim Qureshi, Jawad Kazmi, Muhammad Sarfraz -
An approach to identification of unknown IIR systems using crossover cat swarm optimization
Summary Traditional learning techniques creates stability problem in infinite impulse response (IIR) systems identification. Additionally the performance significantly degrades if reduced order adaptive models are used for such identification. In...
2016 / Archana Sarangi, Shubhendu kumar Sarangi, Siba Prasada Panigrahi -
An Energy-Heterogeneous Clustering Scheme to Avoid Energy Holes in Wireless Sensor Networks2013 / Gong Bencan, Jiang Tingyao, Xu Shouzhi, Chen Peng
-
PLUGAM: Plug-In-Based Adaptation Middleware for Network Layer Protocols for Vehicular Ad Hoc Networks2013 / Carlos F. Caloca, J. Antonio García-Macías, Thierry Delot
-
Interconnection between IP Networks and Wireless Sensor Networks2012 / Brandon Keith Maharrey, Alvin S. Lim, Song Gao
-
More Benefits of Adding Sparse Random Links to Wireless Networks: Yet Another Case for Hybrid Networks2012 / Gunes Ercal
-
An Adaptive System Supporting Collaborative Learning Based on a Location-Based Social Network and Semantic User Modeling2012 / Sook-Young Choi, Jang-Mook Kang
-
On the Security of Certificateless Signature Schemes2013 / Gaurav Sharma, Suman Bala, Anil K. Verma
-
Finger Click Detection Using a Depth Camera
Abstract Selection mechanisms are an essential tool for designating elements in a User Interface. The advances in Natural User Interfaces promoted the selection mechanisms from devices such as the mouse, to more natural methods such as hand...
2015 / Hani Karam, Jiro Tanaka -
Qualitative Comparison of Requirements Elicitation Techniques that are Used to Collect Feedback Information about Product Use
Abstract User-centric design requires the application of different techniques to elicit user requirements. Many of these techniques deduct requirements from feedback information concerning a product's actual use. Typical approaches are inquiry and...
2014 / Stefan Wellsandt, Karl A. Hribernik, Klaus-Dieter Thoben