By Topic

Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on

Date 6-7 April 2013

Filter Results

Displaying Results 1 - 25 of 80
  • [Front and back cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (699 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (281 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (255 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Component Criticality Approach towards Minimizing the Risks of System Failure

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Component based approach mitigating the risk of system failure has been proposed by detecting of most critical components which's malfunction leads the system towards failure. Individual components have their own chances of occurring fault and these occurrences are silent most often as well as risky, the probability of system failure also becomes high in such phenomena resulting large amount of wr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended Decision Support Matrix for Selection of SDLC-Models on Traditional and Agile Software Development Projects

    Publication Year: 2013, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    Software Development Projects can vary considerably in difficulty, size and type. This has led to evolution and development of many associated project management methodologies and standard SDLC-Models. This paper acknowledges the risks associated with wrong selection of SDLC-models on business critical software projects and offers a pragmatic solution by proposing a handy selection matrix for choo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the Techniques for Software Cost Estimation

    Publication Year: 2013, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    One of the most valuable asset in any software industry is the correct estimation of effort and hence cost estimation of the software to be developed by them. Because of the highly dynamic nature of the Software development, it becomes more and more difficult to get a correct software effort estimation and software cost estimation, which is one of the most important factor which makes software mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating of Software Quality with Clustering Techniques

    Publication Year: 2013, Page(s):20 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Software faults are one of major criteria to estimate the software quality or the software reliability. There is number of matrices defined that uses the software faults to estimate the software quality. When we have a large software system with thousands of class modules, then it is not easy to apply the software matrices on each module of software system. The present work is the solution of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodology of the Heuristic Based Hybrid Clustering Technique for Pattern Classification and Recognition

    Publication Year: 2013, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    In this paper we investigate the problem in different data sets to form similar objects into identical groups. Our technique is an unsupervised based algorithm. Unsupervised portion so high that the no input are given by user. Automatically judge the threshold applying threshold which is selected heuristic manner. It can also be resolve Singleton sets which can be identified in some special condit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intellectual Climate System for Monitoring Industrial Environment

    Publication Year: 2013, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    The monitoring of the temperature and humidity in indoor locations in the industry are very important. Temperature and humidity sensor is the main components of the Intellectual climate control which is more useful. In the manufacturing industry some parameter like temperature, humidity are very important parameter which is directly or indirectly affect on production of the product. Here we need t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modified Approach to Text Steganography Using HyperText Markup Language

    Publication Year: 2013, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Steganography is the tactics of silent communication, where one person communicates with others through cover medium so that intermediary does not has suspicion about the hidden information. In this paper we propose a modified approach for text steganography based on HTML tags and attributes. As HTML is rich in tags and its attributes, easily communicated in the internet, and the source code is ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing E-Healthcare Applications with PPS and PDS

    Publication Year: 2013, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    Instead of being measured face to face, e-healthcare is a new promising technology that facilitates monitoring patients health related parameter continuously and in real time, with the help of wireless sensor network. Wireless Body Sensor Network (WBSN) reduces heavy dependence on specialized healthcare staff and thus a desirable technique for countries that lack sufficient medical infrastructure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Speech Reading by Oral Motion Tracking for User Authentication System

    Publication Year: 2013, Page(s):50 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Automatic speech recognition (ASR) systems are used in recognizing speech with high accuracy rates. Visual information is important for human machine interface. It not only increases the accuracy of an Automatic Speech Recognition (ASR) but also improves its robustness. This paper presents an overview of different approaches used for speech recognition and concentrates on visual only lip reading s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Modeling of a Tele-surgery Domain as a Multi-agent Planning Problem

    Publication Year: 2013, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Technological advancements have led to the development of few commercially available telesurgery systems till date. However such systems are very expensive. In telesurgery, the task of a surgeon (the activities related to a surgery) is partially executed by a robot. Typically, the robot is under the control of a surgeon, it executes the instructions of the controlling surgeon. In this paper we mak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Multispectral Image Using Discrete Wavelet Transform

    Publication Year: 2013, Page(s):59 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    In this paper we have analyzed the discrete wavelet transform of multispectral image of Bareilly region using MatLab tool. The wavelet transform is one of the most useful computational tools for a variety of signal and image processing applications. The wavelet transform is used for the compression of digital image because smaller data are important for storing images using less memory and for tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review on Mosaicing Techniques in Image Processing

    Publication Year: 2013, Page(s):63 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    In image processing, mosaic images are images made by cementing together small tiles. The tiles "tessellate" a source image with the purpose of reproducing the original visual information rendered into a new mosaic-like style. Creation of mosaic images from a sequence of partial views is a powerful means of obtaining a larger view of a scene than available within a single view, and it has been use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Texture Analysis - Survey

    Publication Year: 2013, Page(s):69 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    This paper discusses the various methods used to analyze the texture property of an image. Texture analysis is broadly classified into three categories: Pixel based, local feature based and Region based. Pixel based method uses grey level co occurrence matrices, difference histogram and energy measures and Local Binary Patterns(LBP) Local feature based method uses edges of local features and gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Preparation by CFS: An Essential Approach for Decision Making Using C 4.5 for Medical Data Mining

    Publication Year: 2013, Page(s):77 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Trauma has become the leading cause of death in day to day life. Every year millions of people die and many more are handicapped due to various types of accidents caused by Trauma and many people become handicapped for the rest of their lives. It is necessary to develop a tool for predicting and preventing trauma. Reducing mortality rate and increasing the Health awareness is the aim. We have used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering Technique on Search Engine Dataset Using Data Mining Tool

    Publication Year: 2013, Page(s):86 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    Unlabeled document collections are becoming increasingly common and mining such databases becomes a major challenge. It is a major issue to retrieve good websites from the larger collections of websites. As the number of available Web pages grows, it is become more difficult for users finding documents relevant to their interests. Clustering is the classification of a data set into subsets (cluste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.