By Topic

2012 International Conference on Communication, Information & Computing Technology (ICCICT)

19-20 Oct. 2012

Filter Results

Displaying Results 1 - 25 of 150
  • [Title page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (773 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Technical program committee and reviewers

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • List of papers

    Publication Year: 2012, Page(s):1 - 10
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2012, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Extended visual cryptography for color images using coding tables

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    Visual cryptography (VC) schemes encrypt a secret image into two or more cover images, called shares. The secret image can be reconstructed by stacking the shares together, with no complex cryptographic calculations. This paper proposes a new VC scheme for color images. The shares generated are similar to the cover images, thereby reducing the suspicion of data encryption. The proposed scheme make... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of congestion control using AODV and signal strength by avoiding link failure in MANET

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Routing in MANET is challenging due to its mobility feature. The main reasons of link failures are mobility, interference and congestion. Mobility means each node is free to move within its transmission range. Interference occurs due to collision and hidden node. Hidden node means two nodes out of each other's radio range, simultaneously try to transmit data to an intermediate node, which is in ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient switching transmission scheme for a cooperative WSN

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1544 KB) | HTML iconHTML

    In this paper, a novel technique is proposed for energy efficient switching transmission scheme in a wireless sensor network (WSN). Distributed sensors can cooperate with the neighborhood and transmit their data to the data collector by choosing a proper transmission mode adaptively based on the channel conditions and distance among the sensors. The analytic performances of two MIMO transmission m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of off-line signature recognition

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Biometrics (or biometric authentication) assigns to the confirmation of humans by their biological features. Computer science, biometrics to be specific, is used as an aspect of determination and access control. It is also used to determine individuals in groups that are under examination. Handwriting is one of the most widely used biometric systems for authentication of person as well as document... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FVF based CDTA and Its application

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    This paper presents a modified CMOS implementation of the current differencing trans-conductance amplifier (CDTA). It uses one current source and one current sink to get the current differencing action. The proposed circuit uses lesser number of transistors, offers higher bandwidth, apart from other qualities associated with them. An application of this CDTA in analog filter is also demonstrated. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust watermarking approach for non numeric relational database

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    One of the major issues concerning all the web application is security of data and proving authority of database. In this paper we present a robust technique of embedding watermark in a relational database with non numeric attributes. In the proposed technique, an attribute is selected using a pseudorandom generator and the watermark is embedded in it. The vowel to be embedded is selected by calli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion of Modified Block Truncation Coding and Kekre transform patterns for colour & texture based CBIR

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1439 KB) | HTML iconHTML

    Content Based Image Retrieval is an interesting topic of research. This paper is about image content-based image search. Specifically, it is on developing technologies for bridging the semantic gap that currently prevents wide-deployment of image content-based search engines. Mostly, content-based methods are based on low-level descriptions, while high-level or semantic descriptions are beyond cur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tabu search for solving personnel scheduling problem

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Personnel scheduling problem is combinatorial optimization problem which belongs to category of NP hard problems. This study presents a tabu search to laboratory personnel scheduling problem, assigning tasks to employees by satisfying organizational, personal and work regulation constraints. The main objective of this paper is to search for better solutions for given instance of laboratory personn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic algorithmic approach for security personnel scheduling

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    Personnel scheduling problems are multi-constrained combinatorial optimization problems. This paper deals with personnel scheduling problem where the objective is to assign personnel to task. The work presented is twofold, formulation of problem and application of genetic algorithmic approach to the problem. We have surveyed 45 Indian railway police stations from Mumbai division to formulate the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low power random number generator using single electron transistor

    Publication Year: 2012, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    Realization of high-quality random number generator (RNG) is essential for secure communication. In this paper, a RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating titanium oxide single-electron transistor(SET) is considered. Electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, a stochastic single-electron capture/emission process ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker identification using feature vector reduction of row mean of different transforms

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    In this paper a novel approach to text dependent speaker identification based on feature vector reduction technique of the row mean is proposed. Five different Orthogonal Transform Techniques: Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Sine Transform (DST), Discrete Hartley Transform (DHT) and Walsh Hadamard Transform (WHT) are applied on the framed speech signal. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A low power high speed dual data rate acquisition system using FPGA

    Publication Year: 2012, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (691 KB) | HTML iconHTML

    Nowadays high speed Data Converters are increasingly needed and much sought after. An application involving high-speed data acquisition systems puts pressure on the analog to digital interface data rate also. The high sampling rate of the Analog to Digital Converters (ADC) demands the use of advanced acquisition techniques as well as the latest technology available. The purpose of this paper is to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling a bipedal humanoid robot using inverted pendulum towards push recovery

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (711 KB) | HTML iconHTML

    Push recovery is an important technology needs to be developed for the effective use of bipedal humanoid robot in the household applications. In this paper, a three mass inverted pendulum model equivalent to Humanoid Open Architecture Platform (HOAP -2) has been developed and the effectiveness of the model has been demonstrated using a software framework known as WEBOTS. It has been developed as a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and hardware implementation of a low complexity MIMO OFDM system

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2221 KB) | HTML iconHTML

    This paper describes a design and implementation of a baseband Orthogonal Frequency Division Multiplexing (OFDM) transceiver utilizing Multiple Input Multiple Output (MIMO) signal processing for increased data rate. MIMO OFDM has many promising features which allow wireless devices to communicate at a higher data rate with reduced errors and hardware complexity. The system is composed of a 2 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking of a target person using face recognition by surveillance robot

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    In this paper we designed an experimental setup in order to have human-robot interaction i.e. first we are going to detect the face and after that we recognise the detected face. Afterwards we get the persons upper body torso color as a key feature. As we extracted the color feature we can compute the moments and also evaluate the motion parameters so that the surveillance robot can track the pers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel feature vector selection methods for Iris recognition

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    Iris scan biometrics employs the unique characteristics and features of the human iris in order to verify the identity of an individual. In today's world, where terrorist attacks are on the rise, employment of infallible security systems is a must. This makes Iris recognition systems unavoidable in emerging security & authentication. In this paper an iris recognition system based on various tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ant Colony Optimizer as an Adaptive Classifier

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    The widespread popularity of Optimization Algorithm in many fields such as Optimization, Pattern Recognition, Feature Extraction, Feature Selection etc. is mainly due to their ability to solve optimization problems in path planning. Out of many kinds of optimization algorithms, Ant Colony Optimization Algorithm is one of the most popular optimization algorithms. Many algorithms that dynamically co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.