By Topic

The 2010 International Conference on Computer Engineering & Systems

Nov. 30 2010-Dec. 2 2010

Filter Results

Displaying Results 1 - 25 of 92
  • Program

    Publication Year: 2010, Page(s):1 - 32
    Request permission for commercial reuse | PDF file iconPDF (4018 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1106 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • You are welcome

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (290 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICCES'2010 papers statistics

    Publication Year: 2010, Page(s):iv - vi
    Request permission for commercial reuse | PDF file iconPDF (1031 KB)
    Freely Available from IEEE
  • ICCES'2010 reviewers

    Publication Year: 2010, Page(s):vii - ix
    Request permission for commercial reuse | PDF file iconPDF (906 KB)
    Freely Available from IEEE
  • ICCES'2010 Committees

    Publication Year: 2010, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (314 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):xiii - xviii
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Embedded systems for IT security applications: Specific properties and design considerations

    Publication Year: 2010, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Survivability in cyberspace

    Publication Year: 2010, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (52 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session AI: Artificial intelligence & evolutionary computing

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • On-line signature verification based on PCA feature reduction and statistical analysis

    Publication Year: 2010, Page(s):3 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    This paper presents a novel online signature verification method that uses PCA for dimensional-reduction of signature snapshot. The resulting vectors from PCA are submitted to a multilayer perceptron (MLP) neural network with EBP and sigmoid activation function. In the other hand, Dynamic features such as x, y coordinates, pressure, velocity, acceleration, pen down time, distance, altitude, azimut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy framework for joint segmentation and registration of brain MRI with prior information

    Publication Year: 2010, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    This paper introduces a fuzzy framework for the simultaneous segmentation and registration of MRI datasets. The framework utilizes prior information which may be available about the class center and class's pixels distribution through the datasets. The algorithm is evaluated using phantom and real medical MRI brain volume. The results show that the algorithm has considerable accuracy for segmentat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Particle swarm optimization method for very low bit rate segmented image compression

    Publication Year: 2010, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB)

    In this paper a new very low bit rate segmented image compression method based on particle swarm optimization (PSO) is proposed. In the segmented image coding schemes, the given image is firstly segmented and, then, the contours and textures of regions are extracted and encoded. In our method seeded region growing method (SRG) is used to segment the image. The proposed algorithm randomly initializ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing iris recognition system performance

    Publication Year: 2010, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Biometrics has become more and more important in security applications. In comparison with many other biometrie features, iris recognition has very high recognition accuracy. Successful iris recognition matching depends on how similar the stored template in database is compared with the introduced template. The main objective of this paper is to introduce a high performance scheme for iris recogni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid strategy for interest-based negotiation

    Publication Year: 2010, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Negotiation provides a powerful metaphor for automating the allocation and reallocation of resources in multi-agent systems. Interest-based negotiation (IBN) has been accepted as a promising alternative to the classical negotiation approaches. Reframing is a sub-type of interest-based negotiation strategy. It enhances bargaining by allowing the negotiators to ask for the underlying goal of the neg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session CN1: Computer networks & security I

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Delay based routing for real-time traffic in ad hoc networks

    Publication Year: 2010, Page(s):33 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    In this paper, we propose a routing protocol in an ad hoc network that ensures timely delivery of real-time data packets. This is achieved by carefully accessing the resources available to a route before a session is admitted along that route. Each link in the route is checked for sufficient bandwidth not only for the new session to be admitted but also for the sessions that are already using that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of BER for one-stage Optical Parallel Interference Cancellation for the optical CDMA

    Publication Year: 2010, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    Optical CDMA systems suffer from multiple access interferences (MAI) originating from other simultaneous users. As the number of simultaneous user increases, the bit error probability becomes higher. Several interference cancellation techniques have been proposed aiming at lowering MAI as Optical Parallel Interference Cancellation (OPIC), this system is complex, and the hardware is increased as th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond steganography for Voice Over IP (VOIP)

    Publication Year: 2010, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    The functional and cost advantages of Internet telephony are evident. By today's technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking for new weak spots and developing ingenious methods of attack to gain access to confidential information and penetrate further into the network. One of the most s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High performance adaptive framework for scheduling Grid Workflow applications

    Publication Year: 2010, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    The Grid Workflow scheduling is one of the most important issues in Workflow management because of its impact on the performance. Due to its importance, many scheduling approaches are proposed including static, dynamic and adaptive ones. Static approaches performance in Grid environment is questioned due to the continuous environment changes. The main objective of this paper is to introduce an ada... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access point selection and reducing the handoff latency to support VoIP traffic

    Publication Year: 2010, Page(s):58 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    In IEEE 802.11 WLANs, a station can associate with more than one access point (AP). Previous algorithms which consider only the received signal strength indicator (RSSI) can cause stations to be associated to a single or only a few number of AP. However, it results in an overall network performance degradation. Besides, Hondoff in wireless networks is one of the critical issues for delay sensitive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE