Categories
Journal of Computer Science

A fast approximate string searching algorithm

A fast approximate string searching algorithm Mahmoud Mhashi Abstract: In both approximate and exact string searching algorithms, the shift distance at the skipping step plays a major role in the performance of string matching algorithms. A new algorithm called the Modified Character-Weight Algorithm (MWA) has been developed to test the effect of the shift distance […]

Categories
Journal of Computer Science

Comparison of approaches for predicting break indices in mandarin speech synthesis

Comparison of approaches for predicting break indices in mandarin speech synthesis Shao Yan-qiu Abstract: This study adopts a large-scale corpus with five-tier break indices annotated according to C-TOBI. Based on it, several approaches, N-gram, Markov model and decision tree learning are applied to predict break indices automatically for unrestricted mandarin text. These approaches differ mutually […]

Categories
Journal of Computer Science

Towards a temporal multilevel secure database

Towards a temporal multilevel secure database Ramzi A. Haraty Abstract: Standard Relational Databases are used to store the state of reality at a single moment of time. Temporal Databases are used to store Time-Varying Data. Multilevel Secure Databases are used to securely store highly sensitive data. Each of these databases serves its purpose well, but […]

Categories
Journal of Computer Science

Artificial intelligence based three-phase unified power quality conditioner

Artificial intelligence based three-phase unified power quality conditioner Moleykutty George INTRODUCTION The better controllability, higher efficiency, higher current carrying capability, and fast switching characteristics of static power converters are promoting major changes in controlling the power flow of transmission and distribution systems. On the other hand the nonlinear characteristics of these switching devices introduce many […]

Categories
Journal of Computer Science

An efficient algorithm for Capacitated multifacility location problems

An efficient algorithm for Capacitated multifacility location problems Chansiri Singhtaun INTRODUCTION Facility location problem, searching for the optimum locations of facilities to attain minimum cost or maximum profit, is a significant problem that almost every organization has to face with. The appropriate locations for the facilities, such as warehouses, factories, service centers, outlets, clinics, and […]

Categories
Journal of Computer Science

The use of neural networks in real-time face detection

The use of neural networks in real-time face detection Kevin Curran Abstract: As continual research is being conducted in the area of computer vision, one of the most practical applications under vigorous development is in the construction of a robust real-time face detection system. Successfully constructing a real-time face detection system not only implies a […]

Categories
Journal of Computer Science

Redundancy schemes for high availability computer clusters

Redundancy schemes for high availability computer clusters Christian Kobhio Bassek Abstract: The primary goal of computer clusters is to improve computing performances by taking advantage of the parallelism they intrinsically provide. Moreover, their use of redundant hardware components enables them to offer high availability services. In this paper, we present an analytical model for analyzing […]

Categories
Journal of Computer Science

Design of a neural networks classifier for face detection

Design of a neural networks classifier for face detection F. Smach Abstract: Face detection and recognition has many applications in a variety of fields such as security system, videoconferencing and identification. Face classification is currently implemented in software. A hardware implementation allows real-time processing, but has higher cost and time to-market. The objective of this […]

Categories
Journal of Computer Science

Revisiting overflow in integer multiplication

Revisiting overflow in integer multiplication Eyas El-Qawasmeh Abstract: Integer multiplication is a very common operation that is executed in many applications. However, some of these applications suffer from the overflow problem caused by the multiply operation of two operands. The overflow occurs whenever the multiplication of any two-integer numbers exceeds the maximum limit available for […]

Categories
Journal of Computer Science

Data mining: a preprocessing engine

Data mining: a preprocessing engine Luai Al Shalabi Abstract: This study is emphasized on different types of normalization. Each of which was tested against the ID3 methodology using the HSV data set. Number of leaf nodes, accuracy and tree growing time are three factors that were taken into account. Comparisons between different learning methods were […]