By Topic

2012 International Conference on Computing Sciences

14-15 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 84
  • [Front and back cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1759 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2012, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Technical Committee

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2012, Page(s):xvii - xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB)

    These keynote speeches discuss the following: Middleware for pervasive and cyber-physical systems; Modeling, simulation, and integrated design of complex dynamic systems - challenges, benefits, and trends; Recent research trends in quantum algorithms and the related circuit synthesis; Big data technology and future scenario. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach Based on Wavelet and Non-linear Transfer Function-Based Local Approach for Real Color Image Enhancement

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    In this paper, a novel wavelet-based dynamic range compression algorithm is proposed to improve the visual quality of digital images captured under non-uniform illumination condition. In the proposed method, an input RGB color image is converted to Hue-saturation-value (HSV) color image. The image enhancement technique is applied to the value component of the image, and saturation component is enh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Application of Gabor Filters with Nonlinear Support Vector Machines

    Publication Year: 2012, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Both Gabor filters and Support Vector Machines (SVMs) are widely used in computer vision tasks for feature extraction and classification respectively. However the method is usually plagued by the problems of high computational complexity and memory usage owing to the high dimensionality of the Gabor filter responses. There were methods proposed to mitigate this problem by truncating or finding a g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Design of Interpretable Evolutionary Fuzzy Systems (I-EFS) with Improved Accuracy

    Publication Year: 2012, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Interpretability and accuracy are two important requirements during the development of fuzzy systems. This paper discusses various approaches related to the development of fuzzy systems in an Evolutionary Multiobjective Optimization (EMO) framework with good degree of interpretability and accuracy which are conflicting in their nature. This situation is well known as Interpretability-Accuracy (I-A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Joins and Semi-joins in Centralized and Distributed Database Queries

    Publication Year: 2012, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Database is defined as collection of files or table, where as DBMS stands for Database Management System which is collection of unified programs used to manage overall activities of the database. The two dominant approaches used for storing and managing database are centralized database management system and distributed database management system in which data is placed at central location and dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theory of Markov's Normal Algorithms

    Publication Year: 2012, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    This paper presents the concept of Normal Algorithms proposed by Andreii Andreevich Markov (A. A. Markov) in 1951. This concept is analogous to that of Turing machines introduced by Alan Mathaison Turing. A mathematical object of analysis is called computable if and only if it is Turing computable. One can also define computability in terms of normal algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol Manipulating Techniques

    Publication Year: 2012, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Mathematical objects of analysis are of two types, numbers and words. Number based calculations are essentially arithmetic operations of addition, subtraction, multiplication and division. Symbol or words based calculations are symbol manipulating algorithms. This paper presents certain elementary manipulating techniques using which one can construct algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Normal Algorithmic Signal Processing

    Publication Year: 2012, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    In this paper, we demonstrate the use of the string manipulating techniques in non-numerical signal processing. First, we construct a normal algorithm for carrying out cyclic shifting in a string of arbitrary length. Next, we outline a general method for constructing normal algorithmic systems for signal processing operations on symbolic sequences in general. As an illustration, we then construct ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPL(A) - An Elementary Formal System for Signal Processing

    Publication Year: 2012, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    This paper is concerned with the formulation of a formal language called elementary formal system (EFS) for constructive signal processing. electronic document is a "live" template. Raymond M Smullyan was the first to initiate the concept of EFS. Later Melvin Fitting formulated a theory for string manipulation language in terms of EFS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End Justified Post Turing Rewriting Systems and M-Grammar

    Publication Year: 2012, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    This paper deals with the formulation of a non-Chosky grammar called M-grammar which defines the language of End Justified Post Turing Rewriting Systems. Formulation of this grammar has solved the Problem of Generating Markov Class Rewriting Systems By a Type-0 Phrase Structure Grammar. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rewriting Cyclic Normal Automata and Their Applications

    Publication Year: 2012, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    This paper introduces novel concepts like rewriting cyclic normal automata and flower automata. The principle of normalization of automata states that for any given automaton belonging to a family of automata one can construct a equivalent rewriting cyclic normal automaton. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructive Sets and Extended Topological Filters

    Publication Year: 2012, Page(s):52 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Set and property are synonymous. This paper describes a novel concept of constructive set. The notion of constructive extended topological filter is also presented here from fundamentals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cellular Automata and Their Realizations

    Publication Year: 2012, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    This paper discusses the fundamental notion of cellular automata. 1D, 2D and 3D cellular automata constructions are presented. Cellular automata modeling of discrete space discrete time systems is treated as the ideal way of modeling complex systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Normal Algorithmetic Implementation of Cellular Automata

    Publication Year: 2012, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Markov's Normal Algorithms are idealized sequential machines. Von Neumann's Cellular Automata are idealized parallel processing machines. This paper introduces a state-of-the-art of realizing cellular automata in terms of normal algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User Friendly GUI Based Benchmark for Image Watermarking

    Publication Year: 2012, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Watermarking is a technique used to hide data or identify information within digital multimedia. Bench-marking is used to evaluate the watermarking algorithms. Different benchmarks are available for digital watermarking. These benchmarks work efficiently but they are quite complex and difficult to understand, so a new benchmark is introduced in this paper which is GUI (Graphical user interface) ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DWT, DCT and SVD Based Digital Image Watermarking

    Publication Year: 2012, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    With the rapid development of multimedia and computer technology, images, audio, text and video can be more easily produced, processed as well as stored by digital devices in recent years. To conceal data in transmitting message for preventing the illegal copying or to protect the secret is very important. Data encryption and information hiding schemes are developed to protect the secret data. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Genetic Algorithm Based Image Watermarking Using DWT-SVD Techniques

    Publication Year: 2012, Page(s):82 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    This paper presents a new method to improve the robustness and imperceptibleness in watermarking. In this, the singular value of watermark is embedded to singular value of 3rd-level DWT approximation matrix of original image. The genetic algorithm is used to optimise the scaling factor with which the watermark is embedded to host image. The algorithm makes use of fitness function that takes two va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.