Computer and information sciences topic list of research papers
-
Securing Multiple Color Secrets Using Visual Cryptography
Abstract Visual secret sharing is an encryption methodology that allows to retrieve the secret image where the secret image is cryptographically encoded into shares. The (n,n) visual secret sharing scheme proposed by Naor and shamir is used to...
2012 / M. Jenila Vincent, E. Angeline Helena -
Segmentation and Classification of Raw Arecanuts Based on Three Sigma Control Limits
Abstract Arecanut (Areca catechu L.) is one of the important commercial crops in India. There are several computer based technologies for other crops but there is no computer vision based advanced technology in identifying a grade, variety and...
2012 / Ajit Danti, Suresha -
Requirement Specification in Government IT Procurement
Abstract IT procurement represents a business process of importance, including the ability to articulate requirements that the procurement deals with. Furthermore, specifying requirements is of importance for both procurer, and potential supplier as ...
2012 / Björn Johansson, Markus Lahtinen -
Design and Implementation of Enterprise Systems in Fine-Grained Concurrent Computation
Abstract The computational power required to an enterprise system changes dynamically depending on services and the number of users. Massive concurrent computing is excellent in scalability, so that the paper proposes utilizing it for designing and...
2012 / Kenji Ohmori -
Out-of-Plane Rotated Object Detection using Patch Feature based Classifier
Abstract In this paper, we presented a method to extend the weak classifiers that we have previously developed called the square patch feature for out-of-plane rotated object detection. The square patch feature is as discriminative as the popular...
2012 / Yasir Mohd Mustafah, Amelia Wong Azman -
Automatic Infant Anxiety Character with SVM
Abstract Notable complications of sedation practices have been identified and efforts to modify these practices in ICUs have begun. While sedation-scoring tools have been introduced into clinical practice in intensive care few have been tested for...
2012 / M.N. Mansor, S. Yaacob, M. Hariharan, S.N. Basah, S.H.F.S. Ahmad Jamil, et al. -
Carrier, Symbol and Block Synchronizers
Abstract The general PLL (Phase Lock Loop) is a device (LOOP) whose VCO (Voltage Controlled Oscillator) is able to follow (LOCK) the input signal phase (PHASE). However, the input signal can be a carrier regular sinusoidal wave, or a symbol/bit/data ...
2012 / António D. Reis, José F. Rocha, Atilio S. Gameiro, José P. Carvalho -
Identity Based Secure Algorithm for VANET
Abstract Vehicular ad hoc network is an emerging technology, consists of vehicles and road side units as network nodes and enables inter-vehicle communications along with the road side to vehicle communications. Vehicular Ad hoc network (VANET) can...
2012 / Arpita Chaudhuri, Suparna DasGupta, Soumyabrata Saha -
Robust fiber-optic sensor networks2012 / Rosa Ana Perez-Herrera, Montserrat Fernandez-Vallejo, Manuel Lopez-Amo
-
SPRINT: A Tool to Generate Concurrent Transaction-Level Models from Sequential Code2007 / Johan Cockx, Kristof Denolf, Bart Vanhoof, Richard Stahl
-
A New Graph Based Active Learning Method
Abstract Both semi-supervised learning (SSL) and active learning try to use unlabeled data to train high precision classifier with limited number of labeled data. It's a natural way to think about combine them together to get a good classifier. In...
2012 / Lei Liu, Yinggang Xie, Zhiliang Wang, Jiwei Liu, Zhiguo Shi -
Hide and seek in silicon – Performance analysis of Quad block Equisum Hardware Steganographic systems
Abstract Steganography has become a predominantly employed information security technique in this modern era. Although the software methods which work on spatial as well as transform domain steganography offer a lot of data hiding options, the...
2012 / Sundararaman Rajagopalan, Siva Janakiraman, Har Narayan Upadhyay, K. Thenmozhi -
Averting mobile phone use while driving and technique to locate the mobile phone used vehicle
Abstract The explosion of mobile phone growth has been significant over the past couple of decades but it has been clear that impact on this form of mobile communication having on driving. In today's world, number of accidents is due to distracted...
2012 / H. Abdul Shabeer, R.S.D. Wahidabanu -
Research on an Application-layer Network Performance Measure Method
Abstract This paper propose an application-layer network performance measure method for distributed information collection system, and verified the authenticity and stability of the proposed network distance by experiments. Based on the research...
2012 / Li-jie Cui, Jin-gang Li, Wei Liu -
Tag-Based Intellisense Resource Sharing
Abstract The recommendation work focuses on resource sharing, users’ interaction, similarity interest among people and dynamic changes of information, which can be represented by user behaviour. In order to take full advantage of user action, this...
2012 / Jiayun Wang, Haiqing Zhang, Fei Wang, Haifei Xu, Yintian Liu -
Collaborative video searching on a tabletop2006 / Alan F. Smeaton, Hyowon Lee, Colum Foley, Sinéad McGivney
-
Research on Delay Characteristics of Information in Scale-Free Networks Based on Multi-Agent Simulation
Abstract It is always assumed that the information spreads in the regular networks or completely random networks and utilizes third- order delay to express information delay process in the studies of system dynamic. The information delay is also a...
2013 / Xiaoguang Gong, Jie Xu -
Culinary trompe-l'oeil: A new concept in coating
Abstract In the course of any creative innovation, the visual connection is a constant that, even unconsciously, influences the work. The present paper reveals the development of formulas and recipes that arise in order to realize what, in...
2012 / A. Luis Aduriz, J. Vergara, D. Lasa, O. Oliva, R. Perisé -
Strategy improvement for concurrent reachability and turn-based stochastic safety games
Abstract We consider concurrent games played on graphs. At every round of a game, each player simultaneously and independently selects a move; the moves jointly determine the transition to a successor state. Two basic objectives are the safety...
2012 / Krishnendu Chatterjee, Luca de Alfaro, Thomas A. Henzinger -
User preferences for multi-device context-aware feedback in a digital coaching system2013 / Randy Klaassen, Rieks op den Akker, Tine Lavrysen, Susan van Wissen