Notice
There is currently an issue with the citation download feature. Learn more

2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)

15-17 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 125
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2468 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (2294 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):iii - xv
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Design of web data mining in agents based e-commerce

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    Due to the explosive growth of information sources available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools and design in finding the desired information resources. Web Mining can be broadly defined as extraction of interesting and potentially useful patterns and implicit information from artifacts or activity related to the World Wide Web. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for selecting informative genes from gene expression data using Signal-to-Noise Ratio and t-statistics

    Publication Year: 2011, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    Signal-to-Noise Ratio (SNR) and t-statistics are widely used for gene ranking in the analysis of microarray gene expression data. By implementing these filtering techniques directly to the microarray data may give redundant features, as we may have redundant expression values of number of genes in the data set. By grouping the genes bearing similar expression values in a single cluster and then im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Page ranking based on number of visits of links of Web page

    Publication Year: 2011, Page(s):11 - 14
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Search engines generally return a large number of pages in response to user queries. To assist the users to navigate in the result list, ranking methods are applied on the search results. Most of the ranking algorithms proposed in the literature are either link or content oriented, which do not consider user usage trends. In this paper, a page ranking mechanism called Page Ranking based on Visits ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Particle swarm optimization based fuzzy frequent pattern mining from gene expression data

    Publication Year: 2011, Page(s):15 - 20
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    The FP-growth algorithm is currently one of the fastest approaches to frequent item set mining. Fuzzy logic provides a mathematical framework where the entire range of the data lies in between 0 and 1. The PSO algorithm was developed from observations of the social behavior of animals, including bird flocking and fish schooling. It is easier to implement than evolutionary algorithms because it onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FDCA: A fast density based clustering algorithm for spatial database system

    Publication Year: 2011, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1300 KB) | HTML iconHTML

    Cluster detection in Spatial Databases is an important task for discovery of knowledge in spatial databases and in this domain density based clustering algorithms are very effective. Density Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm effectively manages to detect clusters of arbitrary shape with noise, but it fails in detecting local clusters as well as clusters of diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-domain query answering: Using Web scrapper and data integration

    Publication Year: 2011, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2558 KB) | HTML iconHTML

    Information drives today's businesses and the internet is a powerhouse of information. So data integration gives the user with a unified view of all heterogeneous data sources. The basic service provided by data integration is query processing. But if we are considering a query that involves multiple domains, then we find that general purpose search engines fail to answer such queries and domain s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taxonomy of tree based classification algorithm

    Publication Year: 2011, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1444 KB) | HTML iconHTML

    In this paper we are suggesting improvements over an existing C4.5 Algorithm. This is a very popular tree based classification algorithm, used to generate decision tree from a set of training examples. The heuristic function used in this algorithm is based on the concept of information entropy. We are proposing two new heuristic functions which are better than the one used by C4.5 Algorithm by som... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Different similarity measures for text classification using KNN

    Publication Year: 2011, Page(s):41 - 45
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    Present days humans are associated with many electronic gadgets which generate large amount of data on regular basis. The sole purpose of generated data was to meet the immediate needs and no attempt in organizing the data for later efficient retrieval was attempted. Over the period of time, the data generated became voluminous, this paper attempts to classify the huge data into different categori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SkewBoost: An algorithm for classifying imbalanced datasets

    Publication Year: 2011, Page(s):46 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (671 KB) | HTML iconHTML

    Many real world data sets have an imbalanced distribution of the instances. Learning from such data sets results in the classifier being biased towards the majority class, thereby tending to misclassify the minority class samples. In this paper, we provide a technique, SkewBoost which classifies the minority instances correctly without compromising much on the correct classification of the majorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variable density spatial data clustering

    Publication Year: 2011, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    This paper presents an effective clustering method which can detect embedded and nested clusters over variable density space. The proposed method, VDSC uses a density based approach for detecting clusters of arbitrary shapes, sizes and densities. VDSC was compared with several other comparable algorithms and the experimental results show that our method could detect all clusters effectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic based AGC regulators for power system with asynchronous tie-lines incorporating parametric uncertainties

    Publication Year: 2011, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    A fuzzy logic based approach for the design of optimal automatic generation controllers of three area interconnected power system is proposed in this paper. A three area interconnected power system model consisting of identical power plants with reheat thermal turbines is considered as a test system. The HVDC link in parallel with EHV AC transmission line is incorporated as an area interconnection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document image retrieval using signature as query

    Publication Year: 2011, Page(s):66 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    In this paper, we presents a new approach to document image retrieval based on signature. The database contains document images with English text combined with headlines, ruling lines, logo, trade mark and signature. In searching a repository of business documents, task of interest is that of using a query signature image to retrieve from a database. The signature retrieval task involves a two ste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive content-based texture image retrieval

    Publication Year: 2011, Page(s):71 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1278 KB) | HTML iconHTML

    Due to the semantic gap between low-level image features and high level concepts, content-Based image retrieval (CBIR) systems are incapable to provide the effective results to the user. To address this problem, we have presented a framework for effective image retrieval by proposing a novel idea of cumulative learning using Support Vector Machines (SVM). It creates a knowledge base model to incre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal and dynamic vehicular traffic management system

    Publication Year: 2011, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    The management of vehicular traffic is always an issue of concern for major city administrations. Even major metropolitan cities in India can be seen suffering with the poor traffic management system which is leading to vehicular jams at various routes, while free traffic at others. This needs to be balanced, so as to utilize the resources like highways and flyovers in an efficient manner. We prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic controlled shunt active power filter for reactive power compensation and harmonic elimination

    Publication Year: 2011, Page(s):82 - 87
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1277 KB) | HTML iconHTML

    Active filters are widely used in electrical distribution system for reactive power compensation and voltage / current harmonic elimination. In this paper, a fuzzy logic controlled, three-phase shunt active filter to improve power quality by compensating reactive power and current harmonics required by a nonlinear load is presented. PI regulator is replaced by fuzzy logic controller to improve the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of bangla basic characters using multiple classifiers

    Publication Year: 2011, Page(s):88 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB) | HTML iconHTML

    Character recognition is an important area in image processing and pattern recognition fields. A novel scheme for recognition of offline basic characters of Bangla using multiple classifiers is described here. Compared to English characters, there are different complex shaped characters in Bangla alphabet. Dealing with such a large number of characters with a suitably designed feature set is a cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering of scale free networks using a k-medoid framework

    Publication Year: 2011, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (730 KB) | HTML iconHTML

    Clustering is a very important topic in the field of pattern recognition and artificial intelligence. Also it has become popular in newer application areas like communication networking, data mining, bio-informatics, web mining, mobile computing etc. This article describes a network clustering technique based on PAM or k-medoid algorithm with appropriate modification. This algorithm works faster t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection and classification of faults on six phase transmission line using ANN

    Publication Year: 2011, Page(s):100 - 103
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    The demand of electrical energy is continuously increasing. High phase order transmission system is a viable alternative due to increasing costs of right of way. Six phase transmission lines can carry more power for same phase to phase voltage with the same right of way economically. Protection of six phase transmission lines has been a very challenging task. Earlier simulations of six phase trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.