By Topic

2005 3rd International Conference on Intelligent Sensing and Information Processing

Date 14-17 Dec. 2005

Filter Results

Displaying Results 1 - 25 of 52
  • [Cover]

    Publication Year: 2005, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (932 KB)
    Freely Available from IEEE
  • ICISIP 2005

    Publication Year: 2005, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • Third International Conference on Intelligent Sensing and Information Processing

    Publication Year: 2005, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (416 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (325 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • EEG Artifact Reduction in VEP Using 2-Stage PCA and N4 Analysis of Alcoholics

    Publication Year: 2005, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2513 KB) | HTML iconHTML

    In this paper, repeated applications of principal component analysis (PCA) are proposed to reduce background electroencephalogram (EEC) artifact from multi-channel and multi-trial visual evoked potential (VEP) signals. This allows single trial analysis of VEP signals. PCA has been used for noise reduction but the method of repeated applications of PCA is novel. In the study here, PCA was applied i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Coding Method for Teleconferencing and Medical Image Sequences

    Publication Year: 2005, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1967 KB) | HTML iconHTML

    In this paper, an efficient video coding, based on three-dimensional vector quantization system has been proposed. There are a few contributions of this paper, the proposed technique uses a pyramid code book based model instead of conventional single level code book. According to this model, if a specific motion cannot be matched accurately in higher level code book according to coarse partitionin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ECG Signal Compression using Discrete Sinc Interpolation

    Publication Year: 2005, Page(s):14 - 19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1146 KB) | HTML iconHTML

    This paper presents a novel ECG data compression algorithm based on discrete sinc interpolation (DSI) technique. The compression and decompression of ECG data is achieved using discrete sinc interpolation (DSI), which is realized by an efficient discrete Fourier transform (DFT). The proposed algorithm is evaluated using MIT-BIH arrhythmia database (sampled at 360 Hz with 11 bits resolution). The p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hypergraphs: Organizing complex natural neural networks

    Publication Year: 2005, Page(s):20 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2179 KB) | HTML iconHTML

    Data from neuroscience research has shown that the brain can be studied as a neural network. In view of the brain's seemingly infinite complexity, we organize the entire network into a series of sub-networks, each of whose functionalities combine to become the knowledge representation capability of the entire network. Thus, we look at the brain in terms of modules and sub-modules, at varying level... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Oriented Modelling of Real-Time Systems for Critical Events

    Publication Year: 2005, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3056 KB) | HTML iconHTML

    In this paper we outline a task-centered agent-oriented approach to modelling (or software engineering) of intelligent real-time systems for critical events like environmental disasters (e.g., bush fires, earthquakes), alarm processing in critical and emergency situations in power systems, and in war situations involving detection and destruction of enemy planes by fighter pilots. We model the use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic Feature Extraction for Classification using Fuzzy C - Means Clustering

    Publication Year: 2005, Page(s):33 - 38
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (979 KB) | HTML iconHTML

    Knowledge discovery and data mining (KDD) process includes preprocessing, transformation, data mining and knowledge extraction. The two important tasks of data mining are clustering and classification. In this paper, we propose a generic feature extraction for classification using fuzzy C-means (FCM) clustering. The raw data is preprocessed, normalized and then data points are clustered using the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Mining of Contrast Patterns and Their Applications to Classification

    Publication Year: 2005, Page(s):39 - 47
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2450 KB) | HTML iconHTML

    Data mining is one of the most important areas in the 21st century with many wide ranging applications. These include medicine, finance, commerce and engineering. Pattern mining is amongst the most important and challenging techniques employed in data mining. Patterns are collections of items which satisfy certain properties. Emerging patterns are those whose frequencies change significantly from ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disulphide Bridge Prediction using Fuzzy Support Vector Machines

    Publication Year: 2005, Page(s):48 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1606 KB) | HTML iconHTML

    One of the major contributors to the native form of protein is cystines forming covalent bonds in oxidized state. The prediction of such bridges from the sequence is a very challenging task given that the number of bridges rises exponentially as the number of cystines increases. We propose a novel technique for disulphide bridge prediction based on fuzzy support vector machines. We call the system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio Steganalysis using Ensemble of Autonomous Multi-Agent and Support Vector Machine Paradigm

    Publication Year: 2005, Page(s):55 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2084 KB) | HTML iconHTML

    This paper investigates the use of support vector machines (SVM) to create and train agents capable of detecting any hidden information in audio files. This agent would make up the detection agent in an architecture comprising of several different agents that collaborate together to detect the hidden information. The system exploits a soft computing approach to detect the presence of hidden messag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Naive-Bayes Classification using Fuzzy Approach

    Publication Year: 2005, Page(s):61 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB) | HTML iconHTML

    Data mining is the quest for knowledge in databases to uncover previously unimagined relationships in the data. This paper generalizes Naive-Bayes classification technique using fuzzy set theory, when the available numerical probabilistic information is incomplete or partially correct. We consider a training dataset, where attribute values have certain similarities in nature. Though nothing can re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MANET Internet Access using Reactive Mobile Agent Protocol

    Publication Year: 2005, Page(s):66 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2994 KB) | HTML iconHTML

    Internet-based mobile ad hoc networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures, and is one which is expected to be of great use in commercial and military applications. A new routing scheme for mobile ad hoc network is proposed in this paper. In the proposed mechanism, ad hoc on-demand distance vector (AODV) is modified to achieve a link b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics

    Publication Year: 2005, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB) | HTML iconHTML

    Cryptanalysis of ciphertext has gained considerable interest among the research community engaged in security studies. Optimisation heuristics are alternative candidates for brute force attack of ciphers. This paper demonstrates the classical applicability of two optimisation heuristics, simulated annealing (SA) and tabu search for the cryptanalysis of simplified data encryption standard (SDES). R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hindi Question Answering system for E-learning documents

    Publication Year: 2005, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2755 KB) | HTML iconHTML

    To empower the general mass through access to information and knowledge, organized efforts are being made to develop relevant content in local languages and provide local language capabilities to utility software. We have developed a question answering (QA) system for Hindi documents that would be relevant for masses using Hindi as the primary language of education. The user should be able to acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Temporal Gene Networks Using Signal Processing Metrics on Time-Series Gene Expression Data

    Publication Year: 2005, Page(s):86 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1319 KB) | HTML iconHTML

    A gene network refers to the knowledge of the activators and inhibitors of all genes. The genes themselves are believed to function as regulators of other genes. Most work done so far either ignores time delay in gene regulation or assumes that it is constant. We here propose the use of signal processing metrics like correlation techniques to find the gene interactions. Also, a post-processing sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predict Protein-Protein Interaction using Heuristic Approaches

    Publication Year: 2005, Page(s):93 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1894 KB) | HTML iconHTML

    Proteins interact with each other for a common purpose such as cell formation. They come in contact with each other following the biochemical properties. The understanding of protein-protein interactions in metabolic networks is an important aspect of molecular biology and biochemistry. The proposed prediction system uses protein sequence data to learn the interactions. Based on sequence data, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D Object Recognition System using Ultrasound

    Publication Year: 2005, Page(s):99 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2480 KB) | HTML iconHTML

    The patterns of ultrasonic reflected echoes from objects contain information about the geometric shape, size, orientation and the surface material properties of the reflector. Accurate estimation of the ultrasonic echo signal pattern is essential for recognition of the target object. We propose a method to classify different objects having specific geometric shape such as cylindrical, rectangular,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Low Complexity Technique for Data Fusion in Digital Images and Lossless Retrieval

    Publication Year: 2005, Page(s):105 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1295 KB) | HTML iconHTML

    A simple technique based on integer discrete Hartley transform (DHT) is presented for embedding data of various different forms in digital images. Not only it involves significantly less computational complexity, but also accommodates considerably more payload and offers better visual quality over the existing schemes. Due to the lossless reversal behaviour of the integer DHT, the proposed techniq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.