By Topic

Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on

Date 5-7 June 2013

Filter Results

Displaying Results 1 - 25 of 83
  • [Front-cover]

    Publication Year: 2013 , Page(s): C4
    Request Permissions | PDF file iconPDF (3689 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013 , Page(s): i
    Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013 , Page(s): iii
    Request Permissions | PDF file iconPDF (140 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): iv
    Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): v - xi
    Request Permissions | PDF file iconPDF (153 KB)  
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2013 , Page(s): xii
    Request Permissions | PDF file iconPDF (122 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2013 , Page(s): xiii
    Request Permissions | PDF file iconPDF (142 KB)  
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2013 , Page(s): xiv
    Request Permissions | PDF file iconPDF (170 KB)  
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2013 , Page(s): xv - xvi
    Request Permissions | PDF file iconPDF (149 KB)  
    Freely Available from IEEE
  • Keynote Speakers

    Publication Year: 2013 , Page(s): xvii - xxiii
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1297 KB)  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical Sponsors, Promoters and Supporters

    Publication Year: 2013 , Page(s): xxiv
    Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • Gesture Recognition from Indian Classical Dance Using Kinect Sensor

    Publication Year: 2013 , Page(s): 3 - 8
    Request Permissions | Click to expandAbstract | PDF file iconPDF (456 KB) |  | HTML iconHTML  

    This work proposes gesture recognition algorithm for Indian Classical Dance Style using Kinect sensor. This device generates the skeleton of human body from which twenty different junction 3-dimensional coordinates are obtained. Here we require only eleven coordinates for the proposed work. Basically six joints coordinates about right and left hands and five upper body joint coordinates are proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Breast Cancer Diagnosis Using Hybrid GA-ANN

    Publication Year: 2013 , Page(s): 9 - 12
    Request Permissions | Click to expandAbstract | PDF file iconPDF (360 KB) |  | HTML iconHTML  

    Breast cancer prevails as one of the infamous deathly diseases among women worldwide. Early detection and treatment of breast cancer can increase the survival rate of patients. Presently, the method of diagnosis depends on the human experiences. The method is time-consuming, subjected to human error and cause unnecessary burden to radiologists. This paper introduces an automatic breast cancer diag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RNN Modelling for Bi-Objective MPM Job Shop Scheduling Problem

    Publication Year: 2013 , Page(s): 13 - 18
    Request Permissions | Click to expandAbstract | PDF file iconPDF (290 KB) |  | HTML iconHTML  

    This paper presents a Recurrent Neural Network approach for the multipurpose machines Job Shop Scheduling Problem. This case of JSSP can be utilized for the modelling of project portfolio management besides the well known adoption in factory environment. Therefore, each project oriented organization develops a set of projects and it has to schedule them as a whole. In this work, we extended a bi-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Backtracking Algorithm for Efficient Sensor-Based Random Tree Exploration

    Publication Year: 2013 , Page(s): 19 - 24
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1969 KB) |  | HTML iconHTML  

    Mobile robots need to explore novel environments to build useful maps for later navigation and motion planning. Sensor-based Random Tree, (SRT), technique had been used for exploration but it is problematic since the robot may visit the same place more than one time during backtracking process. In this paper, we propose a new heuristic algorithm to reduce this backtracking problem using the obtain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Neural Network for TV Idle Channel Prediction in Cognitive Radio Using Particle Swarm Optimization

    Publication Year: 2013 , Page(s): 25 - 29
    Request Permissions | Click to expandAbstract | PDF file iconPDF (329 KB) |  | HTML iconHTML  

    The communications frequency spectrum in Nairobi city is statically allocated. The cellular network is overwhelmed by broadband demand yet TV channels are under-used. Cognitive Radio would enable an opportunistic user to `borrow' an idle band and seamlessly hand it back. Cognitive Radio would conventionally sense idle channels and decide on the most technically-appropriate idle channel to allocate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised Human Activity Detection with Skeleton Data from RGB-D Sensor

    Publication Year: 2013 , Page(s): 30 - 35
    Request Permissions | Click to expandAbstract | PDF file iconPDF (486 KB) |  | HTML iconHTML  

    Human activity recognition is an important functionality in any intelligent system designed to support human daily activities. While majority of human activity recognition systems use supervised learning, these systems lack the ability to detect new activities by themselves. In this paper, we report the results of our investigation of unsupervised human activity detection with features extracted f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Premature Ventricular Contraction Arrhythmia Detection and Classification with Gaussian Process and S Transform

    Publication Year: 2013 , Page(s): 36 - 41
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (213 KB) |  | HTML iconHTML  

    This paper presents an efficient Bayesian classification system based on Gaussian process classifiers (GPC) for detecting premature ventricular contraction (PVC) beats in electrocardiographic (ECG) signals. GPC have the advantage over SVM classifiers in that the parameters of its kernel are automatically selected according to the Bayesian estimation procedure based on Laplace approximation. We als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Recommender System Combining Social Networks for Tourist Attractions

    Publication Year: 2013 , Page(s): 42 - 47
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (916 KB) |  | HTML iconHTML  

    The fast development of Web technologies has introduced a world of big data. How efficiently and effectively to retrieve the information from the ocean of data that the users really want is an important topic. Recommendation systems have become a popular approach to personalized information retrieval. On the other hand, social media have quickly entered into your life. The information from social ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of NNs Detectors for Targets with Unknown Correlation in Gaussian Interference

    Publication Year: 2013 , Page(s): 48 - 53
    Request Permissions | Click to expandAbstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    This paper carries out a study of the suitability of Neural Networks (NN) as solutions for the problem of detecting Gaussian targets with unknown one-lag correlation coefficient (ρs) in different radar clutter environments (Additive White Gaussian Noise (AWGN) and correlated Gaussian clutter plus AWGN). The optimum Neyman-Pearson detector is formulated assuming an uniform variati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SNS Search in Developing Countries: Linking the People to End Digital Division in Information Retrieval

    Publication Year: 2013 , Page(s): 57 - 62
    Request Permissions | Click to expandAbstract | PDF file iconPDF (548 KB) |  | HTML iconHTML  

    Using Social Network Sites (SNS) as an information source has drawn the attention of the researchers for a while now. There has been many works that analyzed the types and topics of questions people ask in these networks and why. Topics like what motivate people to answer such queries, how to integrate the traditional search engines and SNS together are also well investigated. In this paper, we fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smartphones for Payments and Withdrawals Utilizing Embedded LED Flashlight for High Speed Data Transmission

    Publication Year: 2013 , Page(s): 63 - 66
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (337 KB) |  | HTML iconHTML  

    In this paper, we experimentally transmit the required information to the automatic teller machine (ATM) or card readers over a visible light communication channel employing mobile smartphones LED flashlight at high data rates. Due to the dependence of users on their personal digital assistants and smartphones to perform almost everyday tasks including payments and banking transactions, it is of g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Higher Compression Rates for Code Excited Linear Prediction Coding Using Lossless Compression

    Publication Year: 2013 , Page(s): 67 - 70
    Request Permissions | Click to expandAbstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    In this paper, we exploit the Hamming Correction Code Compressor (HCDC) Code Excited Linear Prediction frame's Parameter. These parameters includes Linear Prediction Coefficients, Gain and Excitation Bits; which is DCT residual for the signal frame, consist of 40 coefficients, each is quantized using 4 bits. For the signals used in experiments; the total bits in frame were 261 bits with transmissi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Actual Travel Path Based Room Connectivity Graph Generation

    Publication Year: 2013 , Page(s): 73 - 76
    Request Permissions | Click to expandAbstract | PDF file iconPDF (453 KB) |  | HTML iconHTML  

    Indoor Location-Based Services (LBS) inevitably require the map of the target indoor environment. Manually designed map is generally used for the purpose in the legacy indoor LBS application. However, this approach is not easy to acquire the dynamic knowledge from the environment such as preferred moving path, traffic of walkers and temporal blocked area. In this paper, we proposed a new method th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplified Secure Wireless Railway for Public Transport

    Publication Year: 2013 , Page(s): 77 - 82
    Request Permissions | Click to expandAbstract | PDF file iconPDF (752 KB) |  | HTML iconHTML  

    In the New era of technology all system has to be updated, Indian Railway is the 2nd largest Rail Network in India it is the backbone of public and goods transport in India. Bulk of long distance traffic is carried by the Indian Railway. RFID system at many transport system so we think to implement biometrics in our research and then decided to use fingerprint module also for the add-on for user f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.