Computer and information sciences topic list of research papers
-
A New Approach to Integrate Internet-of-Things and Software-as-a-Service Model for Logistic Systems: A Case Study2014 / Shang-Liang Chen, Yun-Yao Chen, Chiang Hsu
-
A comparative study of input devices for digital slide navigation2015 / Jesper Molin, Claes Lundström, Morten Fjeld
-
The Symmetric-Partitioning and Incremental-Relearning Classification and Back-Propagation-Network Tree Approach for Cycle Time Estimation in Wafer Fabrication2014 / Toly Chen
-
Investigating therapists’ intention to use serious games for acquired brain injury cognitive rehabilitation
Abstract Acquired brain injury is one cause of long-term disability. Serious games can assist in cognitive rehabilitation. However, therapists’ perception and feedback will determine game adoption. The objective of this study is to investigate...
2015 / Ahmed Mohammed Elaklouk, Nor Azan Mat Zin, Azrulhizam Shapii -
Assessment Model of the Architecture of the Aerospace Embedded Computer
Abstract Typical aerospace embedded computers have many characters in common, especially in the aspect of the design of computer architecture. To evaluate this category of computers, 3 typical aerospace embedded computers were sampled and their...
2015 / Wei Han, Xiaoying Bai, Jianchun Xie -
An Integer Linear Programming approach to the single and bi-objective Next Release Problem
Abstract Context The Next Release Problem involves determining the set of requirements to implement in the next release of a software project. When the problem was first formulated in 2001, Integer Linear Programming, an exact...
2015 / Nadarajen Veerapen, Gabriela Ochoa, Mark Harman, Edmund K. Burke -
Estimating translation probabilities for social tag suggestion
Abstract The task of social tag suggestion is to recommend tags automatically for a user when he or she wants to annotate an online resource. In this study, we focus on how to make use of the text description of a resource to suggest tags. It is...
2014 / Xinxiong Chen, Zhiyuan Liu, Maosong Sun -
Text-Independent Speaker Identification Using Vowel Formants2015 / Noor Almaadeed, Amar Aggoun, Abbes Amira
-
A Low Cost Implementation of Multi-label Classification Algorithm Using Mathematica on Raspberry Pi
Abstract Implementation of data mining algorithms with low cost is one of the challenging tasks in the present world of massively increasing data. The key idea of this paper is to utilize the functionalities of Mathematica which is freely accessible ...
2015 / Neethu John, R. Surya, R. Ashwini, S. Sachin Kumar, K.P. Soman -
A VDM-based Approach for Specifying and Testing Requirements of Web-applications
Abstract The objective of this paper is to demonstrate the use of formal methods in a uniform way for functional as well as interface-requirements. We propose some add-ons to ‘Vienna Development Method Specification Language'syntaxes to cover the...
2015 / Souvik Sengupta, Ranjan Dasgupta -
Communication of Simulation and Modelling Activities in Early Systems Engineering
Abstract In this paper we present a framework that aids and supports communication of modeling and simulation activities in early systems engineering. We do this by analyzing existing simulation and modelling frameworks, both in systems engineering...
2015 / Steven P. Haveman, G. Maarten Bonnema -
Online Interactive Data Mining Tool
Abstract Nowadays various fields of industries and studies require data mining tools to extract knowledge from variety of databases. Developing such data mining tool is nontrivial task, due to selections required from variety of available...
2015 / Mahesh Borhade, Preeti Mulay -
Network design and planning of wireless embedded systems for industrial automation2015 / Ramon Hugo de Souza, Stefano Savazzi, Leandro Buss Becker
-
Data Classification for Achieving Security in Cloud Computing
Abstract Data is the valuable asset and of great concerns when moving towards the cloud. Data privacy and security is the active area of research and experimentations in cloud computing. Data leakage and privacy protection is becoming crucial for...
2015 / Rizwana Shaikh, M. Sasikumar -
Optimised three-dimensional Fourier interpolation: An analysis of techniques and application to a linear-scaling density functional theory code
Abstract The Fourier interpolation of 3D data-sets is a performance critical operation in many fields, including certain forms of image processing and density functional theory (DFT) quantum chemistry codes based on plane wave basis sets, to which...
2014 / Francis P. Russell, Karl A. Wilkinson, Paul H.J. Kelly, Chris-Kriton Skylaris -
Bias Compensation of Gyroscopes in Mobiles with Optical Flow
Abstract In this paper a new technique is introduced for bias compensation of gyroscopes with a focus on mobiles phones. The standard problem of using gyroscopes is that integration of raw angular rates with non-zero bias will lead to continuous...
2014 / László Kundra, Péter Ekler -
Synchronous Modeling and Analysis of Data Intensive Applications2008 / Abdoulaye Gamatié, Éric Rutten, Huafeng Yu, Pierre Boulet, Jean-Luc Dekeyser
-
Swift Pre Rendering Volumetric Visualization of Magnetic Resonance Cardiac Images based on Isosurface Technique
Abstract Magnetic Resonance imaging (MRI) is a medical imaging procedure which uses strong magnetic fields and radio waves to produce cross sectional images of organs and internal structures of the body. Three dimensional (3D) models of CT is...
2014 / Nikhilkumar P. Patel, Shankar K. Parmar, Kavindra R. Jain -
An efficient method for mining association rules based on minimum single constraints2014 / Hai Van Duong, Tin Chi Truong
-
Scripting Language for Java Source Code Recognition
Abstract This paper presents general results on the Java source code snippet detection problem. We propose the tool which uses graph and subgraph isomorphism detection. A number of solutions for all of these tasks have been proposed in the...
2014 / Tomáš Bublík, Miroslav Virius