By Topic

Information Technology, (ICIT 2007). 10th International Conference on

Date 17-20 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 69
  • 10th International Conference on Information Technology - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (266 KB)
    Freely Available from IEEE
  • 10th International Conference on Information Technology - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • 10th International Conference on Information Technology - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • 10th International Conference on Information Technology - TOC

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (242 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (236 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (233 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (244 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • Fast Robust Intellectual Property Protection for VLSI Physical Design

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    In deep sub-micron VLSI technology, design reuse has become essential due to more integration on a single chip in shorter time. Design reuse however is susceptible to misappropriation of the intellectual property (IP) of the design. There may be illegal reselling or unauthorized reuse of the design, creating false charges on legal buyer by the IP owner, false claim for IP ownership, tampering of w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crosstalk Analysis of an Inductively and Capacitively Coupled Interconnect Driven by a CMOS Gate

    Publication Year: 2007, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    This paper deals with crosstalk analysis of a CMOS gate driven capacitively and inductively coupled interconnect. Alpha Power Law model of MOS - transistor is used to represent a transistor in CMOS- driver. This is combined with a transmission line based coupled RLC-model of interconnect to develop a composite driver interconnect load (DIL) model for analytical purpose. On this basis a transient a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single Event Upset Detection and Correction

    Publication Year: 2007, Page(s):13 - 18
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    This paper proposes a low cost solution to detect and correct a transient faults in registers of a design. The proposed method realizes a single-event upset detection and correction (SEU-DC) technique. The detection and correction of SEU in registers of a design is difficult and requires some efficient approaches without significant area overhead and timing penalty. Furthermore, the proposed metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash

    Publication Year: 2007, Page(s):19 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    In this paper, a novel Blind Signature Scheme (BSS) based on Nyberg-Rueppel Signature Scheme (NRSS) using Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. Blind signature allows a requester to obtain signature from a signer on any document, in such a way that the authority learns nothing about the message that is being signed. Blind Signatures are useful in protocols that guara... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule Based Evidence Mining for Network Attack

    Publication Year: 2007, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (942 KB) | HTML iconHTML

    Today the Internet technology has made it possible to form virtual communities in the cyber space thereby facilitating different types of electronic transactions. There is also a negative force to this technology, which is trying to threaten the security aspects. In order to guard against such threats one must adopt a well-planned approach and apply it systematically. In this paper, an in-depth st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Simulation of Parallel Algorithms for Motion Estimation

    Publication Year: 2007, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Block-based motion estimation technique is being widely used in video compression applications, for the removal of video temporal redundancy. In this paper we have implemented the six-level nested do-loop full-search block-matching motion estimation algorithm proposed by H.Yeo and Y.H.Hu by breaking the respective frames into macroblocks. We have used Matlab for the simulation of the algorithm and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Growth Estimation with Artificial Neural Network Considering Weather Parameters Using Factor and Principal Component Analysis

    Publication Year: 2007, Page(s):35 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB) | HTML iconHTML

    The production of a plant in terms of fruit generation plays a major role in economic and financial condition of the state and the country. If the information related to fruit generation is available before time, the planners of the state in various fields find it easy to perform their work in various fields related to them. By observing the initial growth of shoot length it is needed to predict t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Edge Detection Algorithm for Road Boundary Extraction under Non-uniform Light Condition

    Publication Year: 2007, Page(s):38 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1116 KB) | HTML iconHTML

    In this paper a fast edge detection algorithm based on a simple logic has been implemented for road boundary detection in non-uniform light condition. Road images taken in the campus have been used to test the algorithm. First the image samples are segregated into different segments depending on the intensity. Subsequently standard edge detectors are applied to extract the edges in each of the seg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive Visual Cryptography Using Random Basis Column Pixel Expansion

    Publication Year: 2007, Page(s):41 - 43
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    In this paper we present a new method for a visual cryptography scheme that uses random basis column pixel expansion technique. This method encoded the secret image into 'n' share images in a recursive manner, which have dimensions identical to the secret image. In this scheme, the encoded n shares further encoded into number of subshares recursively. It will increase the level of security of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical Datamining with a New Algorithm for Feature Selection and Naive Bayesian Classifier

    Publication Year: 2007, Page(s):44 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Much research work in datamining has gone into improving the predictive accuracy of statistical classifiers by applying the techniques of discretization and feature selection. As a probability-based statistical classification method, the Naive Bayesian classifier has gained wide popularity despite its assumption that attributes are conditionally mutually independent given the class label. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Classification Algorithm Based on Pattern Range Tree Prototypes

    Publication Year: 2007, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Abstraction based Pattern Classifier has drawn a lot of attention today. This type of classifier has two phases. They are: design phase, where the abstractions are created and classification phase, where the classification is done using these abstractions. Techniques like neural networks, genetic algorithms require very high design time. In other techniques like nearest neighbor classifier, the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of the English-Hindi Cross Language Information Retrieval System Based on Dictionary Based Query Translation Method

    Publication Year: 2007, Page(s):56 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    International communication and multitude of information in several languages require information retrieval systems that can cross language borders. Cross-language information retrieval (CLIR) is defined as the retrieval of documents in another language than the language of the request or query in Anurag Seetha, et al (2004). The language of request is the source language and the language of docum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Assessment of Some Clustering Algorithms Based on a Fuzzy Granulation-Degranulation Criterion

    Publication Year: 2007, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB) | HTML iconHTML

    In this paper a fuzzy quantization dequantization criterion is used to propose an evaluation technique to determine the appropriate clustering algorithm suitable for a particlar data set. In general, the goodness of a partitioning is measured by computing the variances within it, which is a measure of compactness of the obtained partitioning. Here a new kind of error function, which reflects how w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification of Nuclear Receptors and Its Family Using Wavelet Variance Features

    Publication Year: 2007, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Nuclear receptors are important transcriptional regulators involved in widely diverse physiological functions such as control of embryonic development, cell differentiation, and homeostasis. In addition, these molecules are extremely important in medical research since a large number of them are implicated in diseases such as cancer, diabetes, or hormone resistance syndromes. Identification of nuc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiobjective Genetic Fuzzy Clustering of Categorical Attributes

    Publication Year: 2007, Page(s):74 - 79
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Most of the algorithms designed for categorical data clustering optimize a single measure of the clustering goodness. Such a single measure may not be appropriate for different kinds of data sets. Therefore, consideration of multiple, often conflicting, objectives appears to be natural for this problem. In this article a multiobjective genetic algorithm based approach for fuzzy clustering of categ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Multiple Large Databases

    Publication Year: 2007, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Effective data analysis with multiple databases requires highly accurate patterns. But, local pattern analysis might extract low quality of patterns from multiple databases. Thus, it is necessary to improve mining multiple databases. In this paper, we propose a new technique of mining multiple databases. In this technique, each local database is mined using a traditional data mining technique in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.