By Topic

2012 Nirma University International Conference on Engineering (NUiCONE)

Date 6-8 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 118
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Index

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Aspect based reverse engineering process

    Publication Year: 2012, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Reverse Engineering has been one of the most promising technologies to understand the legacy system and help them in reengineering it. Similar to reverse engineering is the process of aspect mining. Introduction of aspect mining in the process of reengineering in place of reverse engineering enables programmers to better modularize the system incorporating aspect. In this paper aspect mining in te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient iris retrieval using neural networks

    Publication Year: 2012, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Biometrics in high technology refers to the automatic recognition of individuals physiological and behavioral traits which determines their identity. Iris recognition is one of the most reliable and widely used biometric techniques for personal identification and security. The major objective of the work presented here is to accurately recognize the users with iris patterns and with faster computa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A nobel approach for effective selection of data using GA approach

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    The goal of query optimization is to produce optimized execution plan which minimizes execution cost. But in order to achieve this goal query optimizer must deal with NP-Complete problem. The problem is formalized as a constraint problem. In this paper we present how genetic algorithms (GA) could be applied to a group of people working in an organization for selecting a team of members who showed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel frequent set mining using inverted matrix approach

    Publication Year: 2012, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Mining frequent patterns in large transactional database is considered as one of the most important data mining problems. The recent explosive growth in data collection made the current rule mining algorithms restricted and insufficient to analyze excessively large transaction sets because they suffer from many problems when mining massive transaction datasets. Some of the major problems are: (1) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Students' performance evaluation using fuzzy logic

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Students' Evaluation must be done in best possible fairer manner, if not done it will degrade their morals and will also affect their future prospects and career opportunities. To solve the problem of students' evaluation, the proposed system takes into consideration the vagueness of question paper besides accuracy rate, complexity and importance. The objective of proposed system is to provide mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement for data security in cloud computing environment

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and development of Delay Tolerant Network: A case study

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Routing is an issue of great interest for opportunistic network called Delay Tolerant Network. The majority of routing schemes that have been proposed till now are broadly classified as flooding and forwarding strategies. All these are categorized on the basis of the important characteristic of any routing protocol i.e. message transmission capability. In this paper, author summarize work as case ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of hierarchical visual cryptography

    Publication Year: 2012, Page(s):1 - 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    This paper describes the concept of hierarchical visual cryptography. The key idea behind hierarchical visual cryptography is to encrypt the secret information in number of levels. As the number of levels in hierarchical visual cryptography increases, the secrecy of data tends to increase. An intelligent authentication system is also proposed using hierarchical visual cryptography. The shares gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Genetic-Ant Optimization Algorithm for continuous functions

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    During the last few years, Evolutionary Computation has its growth to the extent. Its computation approaches such as Genetic Algorithms and Ant Colony Algorithm are used in optimization of the problems. These procedures and computational techniques as a result with their performance are evaluated and compared. The problem area here in this paper we have chosen is continuous functions for the simul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for efficient mining and hiding of sensitive association rule

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in database. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of LBP and LDP rotated and scaled faces

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Face detection and recognition is becoming increasingly important in context of surveillance, credit card fraud detection, assistive devices for visual impaired, etc. There are multiple cues available and can be used as features. It has been observed that local features perform better than global cues. Local binary pattern and local derivative pattern try to encode directional pattern of a face im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient risk analysis in requirement engineering

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The requirement engineering is one of the emerging sections in software engineering. The main factors that a requirement engineering process considers are business requirements and user requirements and provide solutions according to it. We have proposed a requirement engineering model based on the Tropos goal model. A modified Tropos goal model is used in the proposed goal risk model. The goal ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS and performance optimization with VM provisioning approach in Cloud computing environment

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Cloud computing is the computing paradigm which delivers IT resources as a service, hence user are free from setting up the infrastructure and managing hardware etc. Cloud Computing provides dynamic provisioned resources and presented as one or more integrated computing resources based on constraints. The process of provisioning in Clouds requires the application provisioner to compute the best so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility aware routing strategy in MANET using cross layer design approach

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Mobile Ad Hoc networks belong to the class of networks where every activity is an area of interest and provides scope of optimization. Here, we study the Cross Layer Design (CLD) approach in which we use the Physical layer Characteristics at Network layer. We have proposed a techinique, which would use the concept of Doppler Effect in Routing and eliminates the noisy signals received at physical l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security, privacy and trust oriented requirements modeling for examination system

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    The requirement engineering phase of Software Engineering (SE) deals with various activities starting from customer interaction to specifications of the requirements for the designing initiative. Now-a-days security, privacy and trustworthiness have become additional set of crucial requirements in view of the fact that software is vulnerable to various attacks. Many existing paradigms of SE deal w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance enhancement of multimedia traffic over wireless ad hoc networks using network coding

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (823 KB) | HTML iconHTML

    Network coding is a new area of networking, in which data is processed inside the network to increase throughput, to balance traffic load and to save bandwidth of a network. Network Coding performs well in lossy wireless networks in both multicast and broadcast scenarios. Even in wireless networks with low density of nodes network coding performs well using its multi-copy packet transmission schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling technique of data intensive application workflows in Cloud computing

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Cloud computing is a highly scalable distributed computing platform in which computing resources are offered `as a service' leveraging virtualization. Cloud Computing distributes the computational tasks on the resource pool which consists of massive computers so that the service consumer can gain maximum computation strength, more storage space and software services for its application according t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of network traffic classifier using semi supervised machine learning approach

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Network Traffic Classification using classical techniques such as port number based and payload based is becoming very difficult because many applications use dynamic port number and encryption technique to avoid detection. To overcome the drawbacks of classical techniques various machine learning techniques were proposed. Machine learning technique faces the problem of labeled instances (in super... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competent multi relational classifier using filter based feature selection method on CrossMine algorithm

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    Multi Relational Classifier deals with structured data which is stored in relational databases. When working with MRC (Multi relational Classifier) no need to convert multiple relations in single universal relation. CrossMine algorithm works with relational dataset without doing propositionalization. CrossMine algorithm use Tuple ID Propagation provides the way to directly search pattern from mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-series data prediction using fuzzy data dredging

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    As information technology (I.T.) is progressing rapidly day by day a massive amount of data is emerging at a fast rate in different sectors. Data dredging provides techniques to have relevant data from a large amount of data for the task. This paper introduces an algorithm for fuzzy data dredging through which fuzzy association rules can be generated for time series data. Time series data can be s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research relevant novel categorization of domain specific scientific articles using data mining techniques

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Domain specific technical scientific articles are published in most of the international journals, conferences or workshops. Since these multiple articles are domain specific and application centric therefore have similarity in contents and the relevant information is also repeated. Thus reading these all related articles completely one by one to get the latest research developments in the interes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving QA performance through semantic reformulation

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Crushing of textual information is available in electronic form on internet. As a result finding the answer to user query essential in natural Language processing, information retrieval and question answering. Semantic based question reformulation is frequently used in question answering system to retrieve answer from large document collection. The goal of this paper is to find useful and standard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended performance comparison of pixel window size for colorization of grayscale images using YUV color space

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    There is no exact solution for colorization of grayscale images. In the initial work done [1], color traits transfer techniques to color grayscale images are proposed. The main focus of the techniques [1] is to minimize the human efforts needed in manually coloring the grayscale images. The human interaction is needed only to find a reference color image, then the job of transferring color traits ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.