By Topic

Computer Communication and Informatics (ICCCI), 2012 International Conference on

Date 10-12 Jan. 2012

Filter Results

Displaying Results 1 - 25 of 165
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Message from chairman

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Contact us

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Content volume 1

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Content volume 2

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Content volume 3

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Agenda

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Papers list and schedule

    Publication Year: 2012, Page(s):1 - 18
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • [Front and back cover]

    Publication Year: 2012, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (1294 KB)
    Freely Available from IEEE
  • Events in nutshell

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Symbolic verification of web crawler functionality and its properties

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2123 KB) | HTML iconHTML

    Now a days people use search engines every now and then to retrieve documents from the Web. Web crawling is the process by which a search engine gather pages from the Web to index them and support a search engine. Web crawlers are the heart of search engines. Web crawlers continuously keep on crawling the web and find any new web pages that have been added to the web, pages that have been removed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure Ambient Assisted Living (AAL) environment: An implementation view

    Publication Year: 2012, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    T Subjects such as knowledge engineering, pervasive computing, unified communication, ubiquitous sensing and actuation and situation awareness are gaining the most critical and crucial attention from information technology (IT) professionals and pundits across the globe these days in order to accomplish the vision of ambient intelligence (AmI). It is all about effective and round-the-clock gleanin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced analysis of anatomical structures using Hull based Neuro-Retinal Optic Cup Ellipse optimization in glaucoma diagnosis

    Publication Year: 2012, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (909 KB) | HTML iconHTML

    Image processing and analysis to diagnose retinal disease such as diabetic retinopathy (DR) productive computer based screening of large, populations at low cost require robust, automated image analysis. The diabetic patients have many disorders in their eyes. This research relies on the problem of detecting those abnormalities in the eye of a diabetic patient for the earlier detection of DR. Here... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bit plane average filtering to remove Gaussian noise from high contrast images

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    Removal of noise from an image has been studied for decades in the fields of computer vision, signal processing and image processing. Gaussian noise is statistical noise that has a PDF of the normal distribution (also known as Gaussian distribution). In other words, the values that the noise can take are Gaussian-distributed. This model comes into use when all the other noise models fail. This noi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object oriented modeling framework of a Kohonen network based character recognition system

    Publication Year: 2012, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    This paper presents an object-oriented modeling framework of a Kohonen network based character recognition system. The Kohonen network provides faster feature extraction and classification, more so when there are multiple languages present. The object-oriented modeling framework is likely to assist in the development of a meta-model for multi-lingual character recognition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified algorithm for clustering based on particle swarm optimization and K-means

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Clustering is a technique that can divide data objects into meaningful groups. Particle swarm optimization is an evolutionary computation technique developed through a simulation of simplified social models. K-means is one of the popular unsupervised learning clustering algorithms. After analyzing particle swarm optimization and K-means algorithm, a new hybrid algorithm based on both algorithms is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pixel bit manipulation for encoded hiding — An inherent stego

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Steganography is a science dealing with the hiding of the secured information in a harmless signal. The information may be embedded in an image, audio or video file. For image steganography, binary, gray scale or color images may be used as cover-images for hiding the secret data. In this paper a novel information hiding method has been proposed in spatial domain, to improve Imperceptibility, Secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicle position estimation for driving pattern recognition using a monocular vision system

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1028 KB) | HTML iconHTML

    The purpose of this paper is to propose a method to estimate the location of the vehicle within a road around a horizontal axis from the bird's eye perspective. This method uses a road heuristic - the edge length of the road, in order to localize a vehicle within the road. The method aims to determine erratic vehicle steering on roads using a single camera in places where lanes and road discipline... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel fire recognition algorithm based on flame's Multi-features Fusion

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    In this paper, a novel fire recognition algorithm based on muti-features fusion(MFF) with self-adaptive, self-learning and fault tolerance is proposed after analyzing the characteristics of the burning fire, and taking the flame's twinkling frequency and its dynamic contour into account. First, picking up the dynamic video of fire, extracting the eigenvector of suspicious fire area, and using disp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding suspicious masses of breast cancer in mammography images using particle swarm algorithm and its classification using fuzzy methods

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Mammography images which are one of the latest methods of breast imaging can largely help in detecting tumors. But, because of error possibility in determining benign and malignant tumors by physicians, an intelligent system for interpreting these images and diagnosing calcium tissues can always prevent from unnecessary biopsy and human visual errors. The objective of this article is this and ther... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective image noise filtering algorithm using cellular automata

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (713 KB) | HTML iconHTML

    Cellular Automata is a methodology that uses discrete space to represent the state of each element of a domain and this state can be changed according to a transition rule. Image noise is unwanted information of an image and is translated into values which are getting added or subtracted to the true grey-level values. Noise can occur during image capture, transmission or processing and it may depe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of Image Ontology using low-level features for Image Retrieval

    Publication Year: 2012, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    This paper proposes a technique to construct Image Ontology using low-level features like color, texture and shape. The resulting ontology can be used to extract the relevant images from the image database. Retrieving relevant images from an image database is one of the challenging tasks in multimedia technology. More researches are being done in this area, among them Content-Based Image Retrieval... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.