- Home
- A-Z Publications
- Recent Patents on Computer Science
- Previous Issues
- Volume 10, Issue 2, 2017
Recent Patents on Computer Science - Volume 10, Issue 2, 2017
Volume 10, Issue 2, 2017
-
-
The 1-Good-Neighbor Diagnosability of Alternating Group Graph Networks Under the PMC Model and MM* Model
Authors: Ji Jirimutu and Shiying WangBackground: Many multiprocessor systems have interconnection networks as underlying topologies, also described in various patents, and an interconnection network is usually represented by a graph where nodes represent processors and links represent communication links between processors. For the system, study of the topological properties of its interconnection network is important. In 2012, Peng et al. proposed Read More
-
-
-
Restricted Version of Paths Avoiding Forbidden Pairs - Complexity and Algorithm
Authors: Eva Milkova and Karel PetranekBackground: NP-complete problems appear in a wide variety of industrial applications and have a high number of forms, as described in various patents. The problem of finding paths avoiding forbidden pairs of vertices which originates in graph theory is known to be NP-complete in general. This paper focuses on an intuitive comprehension of the problem restricted to a special graph and its hardness. Objective: It is known th Read More
-
-
-
An Image Segmentation Method Based on Renyi Relative Entropy and Gaussian Distribution
Authors: Fangyan Nie, Pingfeng Zhang, Jianqi Li and Tianyi TuBackground: Image segmentation is a necessary prerequisite for many higher level computer vision tasks, such as object recognition, image understanding, and image retrieval. However, the segmentation problem is inherently ill-posed due to the large number of possible partitionings for any single image. So, image segmentation remains one of the major challenges in image analysis. There are also many patents on thes Read More
-
-
-
An Efficient Adaptive Broadcast Protocol for Different Scenarios in VANETs
Authors: Qiubo Huang and Fei LiuBackground: VANETs demand a fast and reliable data transmission in real time for safety concerns, which is challenging due to vehicles’ fast movement, network topology dynamics, and communication network varieties. This paper reviews current scientific and patent literature and proposes an efficient and adaptive broadcast protocol using neighbor nodes ’distances and driving directions to determine packet forwa Read More
-
-
-
A Duplicate Data Detection Approach Based on MapReduce and HDFS
Authors: Fang Wei, Wen Xue-Zhi and Zheng YuBackground: With the surge in the volume of collected data, deduplication will undoubtedly become one of the problems faced by researchers. There is significant advantage for deduplication to reduce storage, network bandwidth, and system scalability of coarse-grained redundant data. Since the conventional methods of deleting duplicate data include hash comparison and binary differential incremental. They will lead to Read More
-
-
-
Realization of a Self Powered Road Side Unit Using Network Processor Technology
More LessBackground: Vehicular ad hoc networks (VANET) is a talented system which allows different applications such as road traffic safety, Internet access, advertising and multimedia streaming, as described in the various patents as well. VANETs can work according to two modes of communications, Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I). In the second case, a permanent communication infrastructure, i.e. Road Sid Read More
-
-
-
An Innovative Model-Driven SlicingApproach for Testing Adaptive Software
Authors: Sanaz Sheikhi and Seyed Morteza BabamirBackground: Adaptive software adapts its behavior based on the dynamic changes of its environment and users' requirements. Due to the high complexity of adaptive software, a program slice of adaptive software makes it easier to testing, debugging, and comprehension, also described in various patents. Specifically, program slicing is very useful for testing, which is a critical and costly step in lifecycle of adaptive software. Read More
-
-
-
Safety Risk Assessment of Human-computer Interaction Behavior Based on Bayesian Network
Authors: Zhang Yanjun, Sun Youchao, Zhang Yongjin and Lu ZhongBackground: Safety risk assessment of human-computer interaction behavior is very important for safety design and management in complex human-computer system such as airplane cockpit and monitoring system in nuclear power plant. Many major accidents were a result of lack of efficient hazard identification and risk assessment approaches, as described in various patents. Methods: The process of human-comput Read More
-
-
-
A Novel Method for Intuitionistic Fuzzy MAGDM with Bonferroni Weighted Harmonic Means
Authors: Weihua Su Mail, Jinming Zhou, Shouzhen Zeng, Chonghui Zhang and Kaifeng YuBackground: Multiple attribute group decision making (MAGDM) is the common phenomenon in modern life, which is to select the optimal alternative(s) from several alternatives or to discover their ranking by aggregating the performances of each alternative under several attributes, in which the aggregation techniques play an important role, also described in various patents. Methods: We extend the Bonferroni mean Read More
-
Most Read This Month
Article
content/journals/cseng
Journal
10
5
false
en
