科学出版
期刊
会议
图书
作者:Edward David Moreno , Leila C.M. Buarque , Florꮣio Natan ...
来源:[J].Journal of Computer Science, 2016, Vol.11 (12), pp.1118-1131Science Publications
摘要:This paper describes the impact of using asymmetric encryption algorithms, with emphasis on RSA, ECC and Multivariate Quadratic Quasigroup (MQQ) algorithms, in a scenario of Vehicular Ad hoc Network (VANET). In the research we used the simulator NS-3 with specific module for vehi...
作者:Takuya Ikai , Shota Kamiya , Masahiro Ohka
来源:[J].Journal of Computer Science, 2016, Vol.12 (5), pp.246-254Science Publications
摘要:Stress-free interaction between humans and robots is necessary to support humans in daily life. In order to achieve this, we anticipate the development of new robots equipped with tactile and vision sensors for receiving human instructions. In this article, we focus on spontaneou...
作者:Ahmad Yahya Dawod , Md Jan Nordin , Junaidi Abdullah
来源:[J].Journal of Computer Science, 2016, Vol.11 (12), pp.1090-1098Science Publications
摘要:Fingertips detection is important for recognition of static gesture in sign language. This paper presents a new method that is based on YCbCr colour space and skeletonization for fingertips detection towards gesture segmentation and recognition. The method begins with the convers...
作者:Auday Al-Dulaimy , Ahmed Zekri , Wassim Itani ...
来源:[J].Journal of Computer Science, 2016, Vol.12 (3), pp.113-127Science Publications
摘要:Cloud Computing is a paradigm that delivers services by providing an access to wide range of shared resources which are hosted in cloud data centers. One of the recent challenges in this paradigm is to enhance the energy efficiency in these data centers. In this study, a model th...
作者:Qusay Omran Mosa , Mohammad Faidzul Nasrudin
来源:[J].Journal of Computer Science, 2016, Vol.12 (2), pp.81-87Science Publications
摘要:Active contours also known as snakes became a familiar and widely used in the field of image segmentation and restoration of historical documents in last few decades. Gradient Vector Flow (GVF) snake successes in overcome of converge to boundary concavities which represents the d...
作者:Monica Carfagni , Rocco Furferi , Lapo Governi ...
来源:[J].Journal of Computer Science, 2016, Vol.12 (3), pp.128-140Science Publications
摘要:Minimization techniques are widely used for retrieving a 3D surface starting from a single shaded image i.e., for solving the shape from shading problem. Such techniques are based on the assumption that expected surface to be retrieved coincides with the one that minimize a prope...
作者:Yogan Jaya Kumar , Ong Sing Goh , Halizah Basiron ...
来源:[J].Journal of Computer Science, 2016, Vol.12 (4), pp.178-190Science Publications
摘要:It has been more than 50 years since the initial investigation on automatic text summarization was started. Various techniques have been successfully used to extract the important contents from text document to represent document summary. In this study, we review some of the stud...
作者:Mohamed Emharraf , Mohammed Bourhaleb , Mohammed Saber ...
来源:[J].Journal of Computer Science, 2016, Vol.12 (2), pp.106-112Science Publications
摘要:The autonomy is the most crucial criteria in mobile robots. This operation aims to offer the ability of finding the position and build a map of the environment to the robot. Many methods have been proposed to solve this problem. In this study, an implementation of SLAM approach f...
作者:Ahmad Abdul Qadir Al Rababah
来源:[J].Journal of Computer Science, 2016, Vol.12 (5), pp.241-245Science Publications
摘要:Intelligent video is a new area of research fairly wide allowing to do a study, analysis, or interpretation of digital video such as motion analysis. However, for a video surveillance system, a motion analysis task of digital video includes the detection of moving objects and the...
作者:Nor Azura Husin , Norwati Mustapha , Md. Nasir Sulaiman ...
来源:[J].Journal of Computer Science, 2016, Vol.12 (6), pp.300-306Science Publications
摘要:Early prediction of diseases especially dengue fever in the case of Malaysia, is very crucial to enable health authorities to develop response strategies and context preventive intervention programs such as awareness campaigns for the high risk population before an outbreak occur...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×