Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2012 3rd National Conference on Emerging Trends and Applications in Computer Science

30-31 March 2012

Filter Results

Displaying Results 1 - 25 of 44
  • [Front and back cover]

    Publication Year: 2012, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (27435 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (460 KB)
    Freely Available from IEEE
  • Emerging topics in software engineering

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Bio-inspired artificial intelligence

    Publication Year: 2012, Page(s): ii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (53 KB) | HTML iconHTML

    The lecture provides a fast forward on some of the major fields of bio-inspired AI and concentrate on some recent work carried out on the realization of an Artificial Being at the Robotics Lab. of the Department of Computer Science & Engineering, Indian Institute of Technology Guwahati, India. Mechanisms for patrolling and servicing by mobile agents within a network using bio-inspired techniqu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiprocessor revolution and cache management

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Peer-to-peer networks

    Publication Year: 2012, Page(s):iv - v
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • IT innovations for emerging markets: An opportunity for leadership

    Publication Year: 2012, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • A novel steganography method for image based on Huffman Encoding

    Publication Year: 2012, Page(s):14 - 18
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1190 KB) | HTML iconHTML

    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. This paper presents a novel technique for image steganography based on Huffman Enc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intellectual ability planning for intelligent tutoring system in computer science engineering education abstract

    Publication Year: 2012, Page(s):26 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB) | HTML iconHTML

    The development of a hierarchical knowledge map to be used with an intelligent questioning system is described in detail in this paper. The purpose of the intelligent questioning system is to improve the educational process in engineering courses by allowing students to learn more in less time, to understand more deeply, and to enjoy their learning experience. Key elements of this system are a que... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software tool for extraction of annotation data from a PDB file

    Publication Year: 2012, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1489 KB) | HTML iconHTML

    The rapid expansion in the amount of biological data being generated worldwide is exceeding efforts to manage analysis of the data. Annotation can be specified as any piece of information associated with an amino acid sequence. Annotation is a process of relating additional information with a particular point in a piece of information. The present task is completely based on the biological databas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a novel algorithm for sentiment analysis based on adverb-adjective-noun combinations

    Publication Year: 2012, Page(s):38 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    There was an emotional outpouring of unprecedented magnitude because of the death of Michael Jackson thereby creating fresh interest to test various methods of sentiment analysis to obtain insights into how a human beings show emotion in different limitations. Almost no research work has been done, as on date, based on nouns and adverb-adjective-noun (AAN) combinations in sentiment analysis. We ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LPMP: An efficient lightweight protocol for mobile payment

    Publication Year: 2012, Page(s):41 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    The unprecedented development in wireless and mobile communication has brought forward incredible opportunities for mobile commerce. However the limited processing power, memory, power consumption of mobile devices and security aspects of wireless network are some of the major challenges in expanding mobile commence especially in developing country. In the present paper, an efficient protocol for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radon Transform and PCA based feature extraction to design an Assamese Character Recognition system

    Publication Year: 2012, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB) | HTML iconHTML

    Character Recognition is a process of understanding a human readable text document by machines. Today many researchers in the academia and industry are interested in this direction. This paper describes a novel method of Character Recognition. The main objective of this is to use the Radon Transform and Principal Component Analysis to obtain a set of invariant features, on basis of which a charact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A short survey on image steganography and steganalysis techniques

    Publication Year: 2012, Page(s):52 - 55
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    The paper describes a short survey on different types of steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. The strong and weak points of these techniques are mentioned briefly so that researchers who work in steganography and steganalysis gain prior knowledge in designing these techniques and their vari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining a tea insect pests database

    Publication Year: 2012, Page(s):56 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (841 KB) | HTML iconHTML

    Data mining techniques are being applied successfully in wide varieties of databases in order to extract useful information. This paper applies data mining techniques on a new tea insect pests database created on the basis of data available from different tea gardens of North Bengal districts of India. We describe different issues related to the development of a good data mining model in the prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power optimization of reconfigurable aperture of electrically driven antenna array

    Publication Year: 2012, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    Apertures of electrically driven antenna arrays can be reconfigured for optimized power distribution. The benefit is dynamically controlled power availability, which makes the system efficient. In this paper we describe such a dynamic mechanism based on Artificial Neural Network (ANN) which formulates a dynamic regulatory scheme for an electrically driven antenna array. An ANN in feed-forward stru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Generalized Gaussian and Cauchy distributions in modeling of dyadic rearranged 2D DCT coefficients

    Publication Year: 2012, Page(s):89 - 92
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    The dyadic rearrangement of block two-dimensional Discrete Cosine Transform (2D DCT) coefficients when used with zero tree quantizers show comparable performance with that of discrete wavelet transform based methods for image compression applications. Recently we have shown that Generalized Gaussian distribution better models the statistics of subband rearranged 2D DCT coefficients compared to Gau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blocking artifacts suppression in Wavelet transform domain using local Wiener filtering

    Publication Year: 2012, Page(s):93 - 97
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1002 KB) | HTML iconHTML

    In this paper, a new non iterative method is proposed in the wavelet domain for the reduction of blocking artifacts in block discrete cosine transform (DCT) compressed images. The method employs a local Wiener filter in wavelet domain to smooth out the blocking artifacts. The local variance is used in the same domain for pixel adaptive processing. We have demonstrated that the noise standard devia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalization of sequential function chart as synchronous model in LUSTRE

    Publication Year: 2012, Page(s):115 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (815 KB) | HTML iconHTML

    Programmable Controllers (PLCs) are being increasingly used in safety-critical systems, which include control systems in Nuclear Power Plants. The reason lies in their ease of programming and configurability. Sequential function chart (SFC) has been adopted as a graphical language in the IEC 61131-3 standard because SFC model of control logic graphically represents the control flow of execution. U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmentation of Assamese phonemes using SOM

    Publication Year: 2012, Page(s):121 - 125
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1181 KB) | HTML iconHTML

    Phonemes are the smallest distinguishable unit of speech signal. Segmentation of phoneme from its word counterpart is a fundamental and crucial part in speech processing since initial phoneme is used to activate words starting with that phoneme. This work describes an Artificial Neural Network (ANN) based algorithm developed for segmentation and classification of consonant phoneme of Assamese lang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.