By Topic

Recent Trends in Information Technology (ICRTIT), 2011 International Conference on

Date 3-5 June 2011

Filter Results

Displaying Results 1 - 25 of 266
  • [Front matter]

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (397 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2011, Page(s):1 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial sessions on day 1 — 03/06/2011(Friday)

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (78 KB)

    Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sessions on day 2 — 04/06/2011(Saturday)

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Sessions on day 3 — 05/06/2011(Sunday)

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Keynote address I: From artificial to biologically-connected neural systems and behavior regeneration

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (87 KB) | HTML iconHTML

    Artificial neural network is a class of biologically-inspired systems that offer solutions to various real-life problems. In this talk, we will present recent advances on neural systems at anatomical and system levels. Recent researches on C. elegans disclose the complete wire diagram of the synaptic connections and morphology of C. elegans associated with functionalities. This enables not only th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote address II: Smarter planlet/cities

    Publication Year: 2011, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB)

    Study of networks that arise in a variety of domains is a fast growing area that combines ideas from various disciplines such as graph theory, game theory, sociology, optimization, data mining, etc. In this talk I will present several examples where such networks arise and talk about canonical problems that researchers focus on in the area of social network analysis, which the study of networks am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Ericcson's initiatives on 4G technologies

    Publication Year: 2011, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB) | HTML iconHTML

    Summary form only given: Evolution of 4G technology : Mobile Broadband is doing to internet what mobile phone did to telephony - bringing it anywhere, anytime. Driven by personalization and always-on internet demand, Mobile broadband is becoming a natural part of daily life and we believe that broadband will become a necessity. This section will cover how the mobile networks need to evolve from pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Big data and real time analytics

    Publication Year: 2011, Page(s): 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB)

    Moore's law predicted the processor and other IT technologies providing us faster computing storage and networking power for cheaper cost, year after year. This helped us to automate most of the industries and processes, leading to creation of terabytes data every day in organizations. Social computing is also fueling the growth of the data. If one can able to process this data in real time, it wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Connecting real world Internet

    Publication Year: 2011, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Currently the IT systems capture and use the knowledge at application level. The real world knowledge and events capturing is still at its infancy which use mechanisms including sensor networks, connected devices, and the emerging all encompassing Internet-of-Things. Integrating real world to the internet is part of the future internet vision. One of the major challenges at the bottom is in captur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: A subjective perspective on genderization issues in software development life cycle

    Publication Year: 2011, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB)

    Embedded systems, computer and communication technologies have changed the medical field quite remarkably and will continue to change considerably in the future to come. This paper provides an overview of such technologies to various biomedical applications including the creation of various silicon-based human body parts. The impact of these technologies on the society is vivid and poses several e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Adoption of open source software in corporate sector

    Publication Year: 2011, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Open source software (OSS) can be defined as software released under the terms of a license that allows the licensee to use, modify, and redistribute, either gratis or for a fee. While OSS adoption is relatively high in academic and research segment, it is abysmally low in government and corporate segment. There is a need for an innovative business model that motivates the clients to source-in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Challenges in self organizing networks for wireless telecommunications

    Publication Year: 2011, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB)

    Summary form only given. Telecommunication network systems continue to emerge to meet the demand in Broadband Wireless Access (BWA) especially for data access through internet. The success of communication service providers (CSPs) rely on effective operational strategies to manage the network that includes planning, optimizing and maintenance of networks to meet the desired Quality of Service(QoS)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Semantic Web: Issues and challenges

    Publication Year: 2011, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB)

    The current day World Wide Web (WWW) is a web of documents interlinked by navigable hyperlinks. It has no doubt changed the way information is disseminated or exchanged and gave rise to a host of powerful applications which are hard to live without in our times. However, while the current day web is excellent for humans to browse and understand and assimilate information, it is not easy for softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Self validated labeling of Markov random fields in computer vision

    Publication Year: 2011, Page(s): 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB)

    Summary form only given. In computer vision a large number of problems is about finding boundaries in a scene which are usually ill-defined due to lack of resolution, noise and occlusions, etc. Traditional approaches such as regularization and the well-known Laplacian of Gaussian (LoG) type filters throughout the 70s to early 90s have not led to satisfactory results. We have found, however, combin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Making sense of a connected world: An introduction to social network analysis

    Publication Year: 2011, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB)

    Summary form only given. Study of networks that arise in a variety of domains is a fast growing area that combines ideas from various disciplines such as graph theory, game theory, sociology, optimization, data mining, etc. In this talk I will present several examples where such networks arise and talk about canonical problems that researchers focus on in the area of social network analysis, which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary talk: Enterprise telecom expense management

    Publication Year: 2011, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Research shows that Fortune 500 companies spend 3.6% of their top line revenues on telecommunications expenses. In the TEM space, Enterprises top challenges are visibility and improved asset and services management. Enterprises are forfeiting 12% to 18% if they do not have a proactive approach to cost management that leverages technology. Bills, Inventory and Contracts are the most critical compon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CPW-fed antenna for dual band WiMAX/WLAN applications

    Publication Year: 2011, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    This paper presents a Novel antenna for dual band application. This Antenna is designed to satisfy two licensed frequency bands (2.7 to 2.9 GHz); (5.15 to 5.85 GHz). These bands are suitable for WiMAX and WLAN applications. This antenna is designed on FR4 substrate with dielectric constant εr=4.4. With size 26.5mm×32mm×1.6mm. The effects of extrusion depth and number of rectan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of adaptive beamforming algorithms for wireless communication networks

    Publication Year: 2011, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    It is required to provide enough capacity in the wireless communication system due to increased number of users as well as new high bit rate services being introduced. One of the most promising techniques for increasing the capacity is smart antenna based space division multiplexing. One approach to implement smart antennas is based on array beamforming, where a narrow main beam is directed toward... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing throughput by controlling content delivery in mobile network

    Publication Year: 2011, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    In Mobile Ad hoc network many useful techniques are developed for mobile communication applications, with high efficiency and poor scalability. This paper involves its superior performance while passing a giant amount of data through access point based data to nodes at a choice of locations. In conveying the data it introduces extensive delay due to movements of nodes. There are different algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimension reduction of feature vectors using WPCA for robust speaker identification system

    Publication Year: 2011, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    Speaker identification based on speech signal has been receiving enhanced attention from the research community. In this context the effect of dimension reduction of feature vectors using Principal Component Analysis (PCA) and Weighted Principal Component Analysis (WPCA) are compared for speaker identification in a noisy environment. MFCC feature vectors are used as original features and their dim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Call Admission Control for WiMAX networks

    Publication Year: 2011, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    Existing Call Admission Control (CAC) mechanism in IEEE 802.16 Broadband Wireless Access (BWA) standard gives priority for VoIP calls in busy hour. The mechanism analyses the performance of UGS service without considering the arrival of non-UGS services. This leads to lack of fairness since the usage of video streaming is also increasing day by day. However the proposed Enhanced Call Admission Con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of pilot symbol assisted rateless codes to mitigate fading in Rayleigh fading channels

    Publication Year: 2011, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (933 KB) | HTML iconHTML

    The principal design problem encountered in wireless communications is how to overcome the distortion of received signals by a time-varying and frequency-selective propagation path due to the phenomenon called fading. In this paper, a channel coding method referred as pilot symbol assisted rateless coding (PSAR) is considered to mitigate the effects of fading; where a predetermined fraction of bin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative energy detection scheme for cognitive radio using RSTC

    Publication Year: 2011, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    The objective of this paper is to design a spectrum sensing scheme using the concept of cooperative diversity and to implement Randomized Space Time Coding (RSTC) scheme for reducing the information overhead. The most important aspect in cognitive radio is spectrum sensing where the secondary user is able to access the spectrum of the primary user in the absence of the latter. Hidden terminals act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.