Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2011 2nd National Conference on Emerging Trends and Applications in Computer Science

4-5 March 2011

Filter Results

Displaying Results 1 - 25 of 40
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (343 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Keynote address: Exciting moments of research: Revisiting a few problems on image processing

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Tutorial on machine translation

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (31 KB) | HTML iconHTML

    Word is multilingual, and never before was the need for multilingual information processing felt more acutely than today. Advent of Web and the presence of enormous amount of text in multiple languages in electronic form have underlined the need for multilingual information access and transfer. The need for understanding and communication in the face of language barrier makes translation of langua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT literacy and employment through Spoken Tutorials

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Network layer specific attacks and their detection mechanisms

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Creativity in interactive designs

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Attacking embedded systems through fault injection

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB) | HTML iconHTML

    Embedded Systems are being used for the development and implementation of Safety and Mission Critical Systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide protective environment to these mission critical systems. Fault injection attack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of MIMO channels using complex time delay fully Recurrent Neural Network

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    Estimation of Multi Input Multi Output (MIMO) channels can be performed by Artificial Neural Network (ANN)s such as Multi Layer Perceptron (MLP)s. However, the cost of training overload in case of time varying MIMO channels is the main bottleneck of such ANN architectures for which a viable alterative, namely, the Recursive Recurrent Network (RNN) is explored. Although for tightly coupled real and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding and adaptive equalization assisted MRC in wireless channels

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    The work is related to the use of error correction coding and adaptive equalization as an aid to Maximal Ratio Combining (MRC) in order to improve bit error rate(BER)s of received signals in wireless channels with fading characteristics. Several modulation schemes are used in the transmission in Gaussian, multipath Rayleigh and Rician fading channels. The work adopts a few error correction codes a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gene expression data clustering analysis: A survey

    Publication Year: 2011, Page(s):1 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    The advent of DNA microarray technology has enabled biologists to monitor the expression levels (MRNA) of thousands of genes simultaneously. In this survey, we address various approaches to gene expression data analysis using clustering techniques. We discuss the performance of various existing clustering algorithms under each of these approaches. Proximity measure plays an important role in makin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient data compression using character replacement through generated code

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (94 KB) | HTML iconHTML

    The algorithm employs a technique which unlike other is independent of repetition. It is based on the replacement of characters through generated code. The total characters used in a file can be arranged in the different dimension of a matrix. Each cell of the matrix will contain a unique code, which will be replaced for respective combination of characters. Further, the codes can be reduced to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • THMIP — A novel mobility management scheme using fluid flow model

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    In this paper we propose an improved hierarchy based mobility management scheme THMIP (Three-level Hierarchical Mobile IP) using fluid flow model to reduce the signaling overhead for a frequently moving mobile node (MN) within its hierarchical domain. In this scheme, the MN sends the binding update to the Home Agent (HA) only for the first time when the Care of address (CoA) gets changed. From the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Navigational approach for mobile robots

    Publication Year: 2011, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In this paper work, we present an algorithm for path planning to a target for mobile robot in unknown environment. An algorithm allows a mobile robot to navigate through static obstacles, and finding the path in order to reach the target without collision. The proposed strategy is designed in a grid-map form of an unknown environment with static unknown obstacles. Mobile robots move by sensing and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design optimization of loop antenna using Competitive Learning ANN

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Out of several antenna design techniques the Artificial Neural Network (ANN) based method is suitable for prediction of characteristic parameters of loop antenna by considering transmit - receive conditions of practical communication set-ups. The predicted set of parameters can be used to fix dimensions of a loop antenna which involves theoretical calculations. This work proposes an approach to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded security for Internet of Things

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which make it significantly different from those contemplated by the canonical doctrine of security in distributed systems. In order to circumvent the problem of security in IoT ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image texture classification using Artificial Neural Network (ANN)

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Texture classification is an important and challenging factor in image processing system which refers to the process of partitioning a digital image into multiple constituent segments. The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Artificial Neural Network (ANN) Based texture classification or Segm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy preserving C4.5 using Gini index

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Now-a-days privacy has become a major concern; the goals of security like confidentiality, integrity and availability do not ensure privacy. Data mining is a threat to privacy. Researchers today focus on how to ensure privacy while performing data mining task. As Data mining algorithms are typically complex and furthermore the input usually consists of massive data sets, the generic protocols in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radial basis function to predict scour depth around bridge abutment

    Publication Year: 2011, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Local scour around bridge abutment is a time-dependent complex phenomenon encountered world-wide. It is difficult to establish a general empirical model that can be applied to all abutment conditions. In this paper, Radial basis function (RBF) Network has been used to predict the maximum scour depth around bridge abutment. An appropriate model is identified using experimental data from literature.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRF based Name Entity Recognition (NER) in Manipuri: A highly agglutinative Indian Language

    Publication Year: 2011, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    This paper deals about the Name Entity Recognition (NER) of Manipuri, a highly agglutinative Indian Language. This language is an Eight Scheduled Language of Indian Constitution. NER plays an important role in the applications of Natural Language Processing like Machine Translation, Part of Speech tagging, Information Retrieval, Question Answering etc. Feature selection is an important factor in r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing some neural network models for software development effort prediction

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (99 KB) | HTML iconHTML

    Software development effort estimation is one of the most major activities in software project management. A number of models have been proposed to make software effort estimations but still no single model can predict the effort accurately. The need for accurate effort estimation in software industry is still a challenge. Artificial Neural Network models can be used for carrying out the effort es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.