Computer and information sciences topic list of research papers
-
An Auto-management Thesis Program WebMIS Based on Workflow
Abstract An auto-management WebMIS based on workflow for bachelor thesis program is given in this paper. A module used for workflow dispatching is designed and realized using MySQL and J2EE according to the work principle of workflow engine. The...
2012 / Li Chang, Shi Jie, Zhong Weibo -
An automated chimpanzee identification system using face detection and recognition2013 / Alexander Loos, Andreas Ernst
-
An efficient Pseudo microprocessor for engineering education
Abstract Computer architecture, computer organization and digital circuits are among the basic topics that are taught in computer sciences and engineering. Because of the degree of abstraction, students often find it difficult to comprehend the...
2012 / Salih Gorgunoglu, Musa Peker, Baha Sen, Abdullah Cavusoglu -
Comparative Study of Several Intelligent Algorithms for Knapsack Problem
Abstract Knapsack problem in the field of combinatorial optimization is a typical, easy-to-describe but difficult to deal with NP-complete problems. Knapsack problem for large-scale, are not yet very effective way, how quickly and effectively solve...
2012 / Jing Zhang -
Pruning Strategies to Refine Resource List for NN Queries in Location based Services
Abstract Location based services suggest resources (Fuel station, Restaurant, ATM stations etc.) to the users based on the query location during mobility. In case of nearest neighbor query, the list of resources represents those that are within a...
2012 / A. Saravanan, S.R. Balasundaram -
Improvisation of Localization Algorithm for Wireless Sensor Networks
Abstract The advancement in the Information and Communication technology have enabled the growth of Wireless Sensor Networks. Now a day, Wireless Sensor Networks are being used in different environments to perform multiple tasks including...
2012 / K. Jennifer Priyadarshini, A. Balaji Ganesh -
Weaknesses of an efficient and secure dynamic ID-based remote user authentication scheme
Abstract Recently, Wang, Liu, Xiao and Dan proposed an efficient and secure dynamic ID-based remote user authentication scheme and claimed that their scheme provides strong security. We demonstrate that Wang et al.’s scheme is vulnerable to insider, ...
2012 / Rafael Mart’nez-Peláez, Francisco Rico-Novella -
ICT Tools Functionalities Analysis for the Decision Making Process of Their Implementation in Virtual Engineering Teams
Abstract Modern businesses processes are developed by virtual teams (VT) using an adequate collaborative environment consist of specific software, information technology platforms linked together by Internet/Extranet/Intranet. The required...
2012 / Cosmina Carmen Aldea, Anca-Diana Popescu, Anca Draghici, George Draghici -
Sensors and Tracking Methods Used in Wireless Sensor Network Based Unmanned Search and Rescue System -A Review
Abstract Increasing natural and human induced disasters boost up the urge to develop new technologies to design a search and rescue robots that can replace the least reliable methods like partnering search dogs with rescuers, Camera mounted probes,...
2012 / P. Thanu Thavasi, C.D. Suriyakala -
Shadow Removal Using B-Spline for Edges Reconstruction in Surveillance
Abstract Shadows are one of the major problems in objects detection and tracking for automated video surveillance systems. In such systems accurate detection is required even under variable weather conditions. The majority of shadow removal...
2012 / Redwan A.K. Noaman, Mohd. A. Mohd. Ali, Kasmiran Jumari -
LOSTE-Location Oriented System Technology for the Elder
Abstract The demographic evolution of most western developed countries show a progressive increase on population aged 65 and older. One of the consequences of this gradual ageing is the rise of expensive age-related disabilities. Elder dementia...
2012 / Diogo Henriques, Vitor Basto-Fernandes, Alexandra Seco, Miguel Felgueiras, António Pereira -
Power Optimization of EPC Class-1 Gen-2 RFID Sensory Tags
Abstract RFID is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking objects. In addition sensory tag adds the...
2012 / S. Imran Javeed, B. Venkatalakshmi -
Principle Solution for Designing Collaborative Humanoid Soccer Robots
Abstract The task of developing a fully collaborative humanoid robotic soccer team is a challenge. On one hand, the hardware of humanoid robots has evolved to allow fast and stable locomotion as well as precise sensing. On the other hand, the...
2012 / Cheng Yee Low, Norheliena Aziz, Mustafa Aldemir, Martin Mellado, Roman Dumitrescu, et al. -
Depth Estimation for a Mobile Platform Using Monocular Vision
Abstract This paper briefly discusses the depth estimation method for a mobile platform using monocular vision. The biggest challenge for autonomous mobile platform in an unknown environment is the accuracy in the estimation of the distance and the...
2012 / Z. Said, K. Sundaraj, M.N.A. Wahab -
Inside Every Model of Abstract Stone Duality Lies an Arithmetic Universe
Abstract The first paper published on Abstract Stone Duality showed that the overt discrete objects (those admitting ∃ and = internally) form a pretopos, i.e. a category with finite limits, stable disjoint coproducts and stable effective quotients...
2009 / Paul Taylor -
A Generic Framework for Connector Architectures based on Components and Transformations
Abstract The intention of this paper is to extend our generic component framework presented at FASE 2002 [H. Ehrig, F. Orejas, B. Braatz, M. Klein, and M. Piirainen. A generic component concept for system modeling. In Proc. FASE '02, LNCS 2306....
2004 / H. Ehrig, J. Padberg, B. Braatz, M. Klein, F. Orejas, et al. -
Towards Graph Transformation Based Generation of Visual Editors Using Eclipse
Abstract This work discusses the state-of-the-art of visual editor generation based on graph transformation concepts on one hand, and using the Eclipse technology which includes the Graphical Editor Framework (GEF), on the other hand. Due to...
2005 / Karsten Ehrig, Claudia Ermel, Stefan Hänsgen, Gabriele Taentzer -
Optimization Technique for Virtual Topology Reconfiguration for IP-over-WDM Networks with QoS Parameters
Abstract This paper, researches about the application of optimization techniques for the reconfiguration of optical internets using IP-over-WDM technology. Internet Protocol (IP) over Wavelength Division Multiplexed (WDM) networking technology with...
2012 / Ramasamy Mariappan, N.K. Karthikeyan -
Development & evaluation of different acoustic models for Malayalam continuous speech recognition
Abstract Performance of any continuous speech recognition system is dependent on the accuracy of its acoustic model. Hence, preparation of a robust and accurate acoustic model lead to satisfactory recognition performance for a speech recognizer. In...
2012 / Cini Kurian, Kannan Balakrishnan -
Implementing for Networked Motion Control System with Large-Capacity Data Acquisition
Abstract As one of the most popular real-time Industry Ethernet protocols, EherCAT has become widely used in distributed networked motion control systems. By the help of the unique features, the EtherCAT protocol is adopted to construct a networked...
2011 / Lei Wang, Mu Guoli, Jing Wang