By Topic

2010 International Conference on Innovative Computing Technologies (ICICT)

12-13 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 27
  • [Front and back cover]

    Publication Year: 2010, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (264 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page ii]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (205 KB)
    Freely Available from IEEE
  • A modified particle swarm optimization for lower order model formulation of linear time invariant continuous systems

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    This paper proposes a new version of the classical particle swarm optimization (PSO), namely, MPSO used to formulate the lower order model for the linear time invariant continuous systems. In the modified PSO, the movement of a particle is governed by three behaviors, namely, inertia, cognitive, and social. The cognitive behavior helps the particle to remember its previous visited best position. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel Load Balancing algorithm for computational Grid

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    The Grid computing environment is a cooperation of distributed computer systems where user jobs can be executed on either local or remote computer. Many problems exist in grid environment. Not only the computational nodes are heterogeneous but also the underlying networks connecting them are heterogeneous. The network bandwidth varies and the network topology among resources is also not fixed. Thu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of cancer gene expressions from micro-array analysis

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    The role of micro array expression data in cancer diagnosis is very significant. Mining for useful information from such micro array data consisting of thousands of genes and a small number of samples is often a tough task. Colon cancer is the second most common cause of cancer mortality in Western countries. According to the WHO 2006 report colorectal cancer causes 655,000 deaths worldwide per ye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQP: An experimental stateless queuing discipline for protecting TCP flows

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    The QoS (Quality of Service) is an important factor in computer networks. Here we proposed an effective queuing discipline for obtaining QoS and thus the throughput is increased. The SQP is a stateless queue management algorithm. The SQP allocates variable bandwidth for TCP (Transmission Control Protocol) flows and performs the matched drops in the queue. Based on the priority of TCP flow the queu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design rationale to source graph [DRG] approach for developing Legacy Code Conversion Kit (LCCK)

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Due to the prominent improvements in the present software engineering, conversion from one programming language to another programming language becomes important task of the industry. Industrial survey shows that major components of development cost of all software goes to maintaining and updating the system software or application package for meeting the current scenario and / or user's satisfact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise suppression and improved edge texture analysis in kidney ultrasound images

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Due to the characteristic speckle noise of ultrasound kidney images, a noise reducing filter must be first applied before image processing stage like segmentation, registration etc. In addition the speckle suppression methods are highly required to improve the quality of the ultrasound image in retaining the edge features of the kidney images. The effect of this stage increases the dynamic range o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video conferencing streaming for the rural upliftment

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The 21st century has already witnessed remarkable achievements in every area of science and technology. By taking full advantage of new information technologies, the scientific community has an unprecedented opportunity to close the vast `Knowledge Gap'among all people. While radio has played a major role in the welfare of rural community in the yesteryears, followed by television, it is the inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACO based spatial data mining for traffic risk analysis

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Many organizations have collected large amounts of spatially referenced data in various application areas such as geographic information systems (GIS), banking and retailing. These are valuable mines of knowledge vital for strategic decision making and motivate the highly demanding field of spatial data mining i.e., discovery of interesting, implicit knowledge from large amounts of spatial data. M... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organising map for document categorization using latent semantic analysis

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    With the increasing amount of unstructured content available electronically on the web, content categorization becomes very important for efficient information retrieval. The basic approaches for information retrieval in text documents are searching using keywords, categorization of the documents and filtering out the stream. To extract information from raw data, its complexity needed to be first ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching video blogs with integration of context and content analysis

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Now a day's video blogs are playing an important role. To effectively manage the vlogs and make them more conveniently accessible for users is a challenging problem. In this paper we proposed a novel vlog management model which is consists of two stages: annotation and search. In Vlog annotation, we extract informative keywords not only from the textual content of the target vlog itself but also f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed heuristic algorithm to optimize the throughput of data driven streaming in peer to peer networks

    Publication Year: 2010, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    During recent years, the Internet has witnessed a rapid growth in deployment of data-driven (or swarming based) peer-to-peer (P2P) media streaming. In these applications, each node independently selects some other nodes as its neighbors (i.e., gossip style overlay construction) and exchanges streaming data with the neighbors (i.e., data scheduling). To improve the performance of such protocol, man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of optimal fuzzy classifier system using Particle Swarm Optimization

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    One of the important issues in the design of fuzzy classifier is the formation of fuzzy if-then rules and the membership functions. This paper presents a Particle Swarm Optimization (PSO) approach to obtain the optimal rule set and the membership function. To develop the fuzzy system the membership functions and rule set are encoded as particles and evolved simultaneously using PSO. While designin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining rare event classes in noisy EEG by over sampling techniques

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Mining is processing data to obtain interesting pattern or knowledge. Noisy EEG can be received on some abnormal state of brain activities. These signals can be logged in data sheets and the samples are taken to identify the rare events. The sampling technique here we used is SMOTE (Synthetic Minority Over-sampling Technique). An approach to the construction of classifiers from imbalanced datasets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework approach using CMMI for SPI to Indian SME'S

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Software development is carried out in different methods and using several standards. Software Process Improvisation (SPI) is the key for developing quality software. Software development companies are not only big organizations but there are many small settings usually called SME (Small and Medium Enterprises) or SMB (Small and Medium Business) which plays a major role in the software industry. C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient group key agreement protocol with authentication security

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GSM based ECG tele-alert system

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    Cardiac arrest is quoted as the major contributor to sudden and unexpected death rate in the modern stress filled lifestyle around the globe. A system that warns the person about the onset of the disease earlier automatically will be a boon to the society. This is achievable by deploying advances in wireless technology to the existing patient monitoring system. This paper proposes the development ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview analysis of reusability metrics in software development for risk reduction

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Software Engineering is a quality software producing strategy. In which software development life cycle involves a sequence of different activities during the development process. . Risk analysis helps to avoid the adaptive reusability problem for transformation of coding. Its main feature is that it encourages the concept of reusability which paves the way for use of functions and packages. Code ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unsupervised learning approach to pixel based image retrieval

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1338 KB) | HTML iconHTML

    In this paper, we are going to study about the ¿Image Indexing through Pixel Variations¿. Grouping images into meaningful categories to retrieve useful information is a challenging and important problem. Content based image retrieval address the problem of retrieving images relevant to the user needs from image databases . Here, in this we are going to gather the similarity between the images wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of Object Oriented testing techniques: Survey and challenges

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Object-orientation has rapidly become accepted as the preferred paradigm for large-scale system design. The product created during Software Development effort has to be tested since bugs may get introduced during its development. This paper presents a comprehensive survey of the various software testing methodologies available to test object-oriented software. Software based on Object Oriented tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.