By Topic

Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on

Date 24-26 July 2012

Filter Results

Displaying Results 1 - 25 of 90
  • CICSyN 2012: Fourth International Conference on Computational Intelligence, Communication Systems & Networks [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (6278 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs - CICSyN 2012

    Publication Year: 2012, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2012, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2012, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Technical sponsors

    Publication Year: 2012, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Keynotes - CICSyN 2012

    Publication Year: 2012, Page(s):xxii - xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB)

    Summary form only given. Provides an abstract for each of the two keynote presentations and a brief professional biography of each presenter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial CICSyN 2012: Cross Layer Optimization in Ad-hoc Network Using Directional Antenna and Switching Network

    Publication Year: 2012, Page(s): xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (115 KB)

    Summary form only given, as follows. In the field of wireless network new challenges have erupted with growing technologies. The challenges are to accommodate new standards, protocols and services with better performance. The parameters to cater are data rate, spatial reuse and reducing interference. In wireless communication lower three layers play a major role thus cross layer communication is r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial Artificial Neural Network (SANN) Based Regional Drought Analysis

    Publication Year: 2012, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1110 KB) | HTML iconHTML

    Drought is one of the most serious hazards that has more effect on human societies than the others. Scentific researches have important roles in drought planning and management of water resources, especially in time of crisis and predicted big event by the event that the crisis management turnover. The main objective of this research is to develop an approach to analyze the spatial patterns of met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Embedded Interface for GSM Based Car Security System

    Publication Year: 2012, Page(s):9 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4519 KB) | HTML iconHTML

    GSM based security system are much more stout then an ordinary security system. The ordinary systems are simply based on the concept of sensors. They sound an alarm on detecting movement. This system of technology has now lost its appeal as it has become a common sighting in metros where these alarms go off unnecessarily. We proposed with GSM techniques and a better decision making process is buil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Method of Relation Extraction Using Subsequence Kernel

    Publication Year: 2012, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    We improve the method of relation extraction using subsequence kernel by adjusting the condition judging whether two words are equivalent and data preprocessing. The traditional subsequence methods suffer a decrease on performance of the less reliable sentence and multi-entity sentence, and their experiment only works on relatively ideal corpus, where there are exactly two entities in each sentenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Diverse Measure in Ensemble Learning Using Unlabeled Data

    Publication Year: 2012, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Ensemble learning has been successfully used in many areas, due to its powerful ability to solve complex problems. In recent years, some researchers have shown that ensemble of some learners instead of all individual learners could get better performances. However, how to select individual learners as diverse as possible is a very important issue. In this paper, a new diversity measure is proposed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of Cuckoo Search in RBF Neural Network for Flood Forecasting

    Publication Year: 2012, Page(s):22 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    The flood forecasting is the key to support the right decision making. A method to forecast flood accurately and timely are important. We propose a method based on Radial Basis Function (RBF) neural network which has the important application in flood water level forecasting. The traditional way of training of the neural network may drive the network to converge in local minima instead of global m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving Operational Mazes Using Mono Sensor Platform Robot (Exprimental Research)

    Publication Year: 2012, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (866 KB) | HTML iconHTML

    Micro-mouse robots used to solve artificial mazes are unable to develop for solving operational mazes due to their weakness in drawing a perfect imagination from environment. In this experimental research this problem has been analyzed and solved by using mono sensor platform robot. This platform is able to gather information from environment with high accuracy and make a perfect picture that can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Algorithm Based Multivariable Control for Exothermic Batch Process

    Publication Year: 2012, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (839 KB) | HTML iconHTML

    Exothermic process is highly nonlinear and complex process. Large amount of heat will be released during the chemical reaction. As a result of the exothermic behaviour, the reaction may become unstable and consequently poses safety concern to the plant if the reactor temperature exceeds the cooling capacity. In the industrial point of view, heating is needed in order to speed up the reaction rate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Neuro-Genetic Hybrid Algorithm Utilizing Outdoors LOS Optical Wireless Channels

    Publication Year: 2012, Page(s):41 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    An Artificial Neural Network (ANN) in the domain of optical wireless communication is presented. The network makes use of a genetic algorithm-based selection and different weather models. The objectives target an attempt to exploit the power of hybrid intelligent systems in the outdoor optical wireless channel and a prediction of a reliable adaptation technique that contributes to the best possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Angular Variation Methodology for Landslide Measurement

    Publication Year: 2012, Page(s):47 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    Landslide detection is very common due to uninten- tional natural disasters. A challenging wireless sensor networks can be used to alarm the effects of landslides well in advance before the cause occurs. The proposed work considers a tiny sensor nodes for the application with base station as central manager and sensor nodes for gathering the raw data that are timely coordinatedto monitor the appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Based Secured Routing in Wireless Multimedia Sensor Networks

    Publication Year: 2012, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    Recent technologies like miniaturization, low cost, low power, devices have attracted active research in Wireless Sensor Networks (WSN'n), which is an emerging technology and finds applications for both public and military. Many unique challenges arise in ensuring the security of sensor nodes and the data they generate. The intent of this paper is to resolve the routing security related issues and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conceptual Frame Work of Smart WSN for Bangalore Urban Environment Monitoring

    Publication Year: 2012, Page(s):59 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (803 KB) | HTML iconHTML

    Wireless Sensor Network will be the lone contender of technologies for Urban environment monitoring in cities enabling us to gather large real time data, process all sort of data with good time and spatial resolution. This paper discusses the case study of Bangalore Urban City and proposes a conceptual framework for the deployment of WSN for environment monitoring. It presents the environmental ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Efficient Clustering with One Time Setup for Wireless Sensor Networks

    Publication Year: 2012, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    A wireless sensor network (WSN) consists of a lot of inexpensive sensors that have a limited energy resource. Many applications including environment monitoring use a clustering approach for efficient energy consumption. LEACH (Low Energy Adaptive Clustering Hierarchy) is the most famous one of clustering protocols, which enables the balanced consumption of energy to prolong network lifetime. In L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronically Tunable Voltage-Mode Universal Filter with One Input and Four Outputs Using Seven OTAs and Two Grounded Capacitors

    Publication Year: 2012, Page(s):70 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    This paper presents a new electronically tunable voltage-mode universal biquadratic filter with single input and four outputs employing seven operational transconductance amplifiers and two grounded capacitors. The use of grounded capacitor makes the circuit ideal for integrated circuit implementation. The proposed filter can realize voltage-mode low-pass, band-pass, high-pass and band-stop filter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.