By Topic

2013 Third International Conference on Advances in Computing and Communications

29-31 Aug. 2013

Filter Results

Displaying Results 1 - 25 of 113
  • Cover Art

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (883 KB)
    Freely Available from IEEE
  • Title Page i

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Title Page iii

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Copyright Page

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2013, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (344 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s):xvi - xix
    Request permission for commercial reuse | PDF file iconPDF (396 KB)
    Freely Available from IEEE
  • Fractional Fuzzy PID Controller for Speed Control of DC Motor

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    In this paper, a novel technique for controlling the speed of DC motor is developed. It uses the conventional fuzzy control for controlling the Kp, Ki & Kd of an integer-order PID controller along with fractional-order integral and derivative parts. The parameters of the PID controller are first tuned using Ziegler Nichols. Then, using GA, optimized solutions f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimensional Data Mining for Anomaly Extraction

    Publication Year: 2013, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Due to heavy traffic the network monitoring is very difficult and cumbersome job, hence the probability of network attacks increases substantially. So there is the need of extraction anomalies. Anomaly extraction means to find flows associated with the anomalous events, in a large set of flows observed during an anomalous time interval. Anomaly extraction is very important for root-cause analysis,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of Non-convex Obstacle Detection and Avoidance Mobile Robot by Hybrid Cellular Automata

    Publication Year: 2013, Page(s):9 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    In this paper we investigate a particular behavior of autonomous mobile robots for obstacle avoidance, where the geometry of obstacle is non convex in nature. The detection and avoidance of the obstacle is done by means of robot exploration in the given environment. This behavior is modeled using Hybrid Cellular Automata controllers. Finally the validation of the model is checked by simulation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposal for Improving Data Deduplication with Dual Side Fixed Size Chunking Algorithm

    Publication Year: 2013, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    DeDuplication is the technique of data reduction by breaking streams of data down into very granular components, and storing only the first instance of data items on the destination media and all the other similar occurrences to an index. Hash values are computed to identify the similar data items. Fixed size chunking (FSC) is a DeDuplication algorithm which breaks the data into fixed size chunks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRLRM: Category Based Recommendation Using Linear Regression Model

    Publication Year: 2013, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (553 KB) | HTML iconHTML

    A system that suggests list of most popular items to a set of users on the basis of their interest is named as recommendation system. Recommendation system filters the unnecessary information by applying knowledge discovery techniques for online users and has become the most powerful and admired tools in E-Business. ERPM is one of the easiest movie recommendation method, which overcomes the limita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-Augmented Genetic Algorithms for Effective Instruction Template Selection in Compilers

    Publication Year: 2013, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Compilers form one of the most basic components in computing today. The high-level programs used to form applications are translated to assembly code by the compiler, and subsequently to machine code by the assembler. Assembly code generation is preceded by the optimization phase, which reorganizes and modifies the program to give the best possible performance. But the instruction selection is as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a BCI System for Piloting a Wheelchair Using Five Class MI Based EEG

    Publication Year: 2013, Page(s):25 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    Motor imagery is the recreation of a motor activity which can be used to design Brain Computer Interfaces (BCI). A BCI bypasses the neuromuscular system and provides a communication link, which directly connects the human brain to an external device. Each individual is able to control his EEG through imaginary motor act it supports to control devices. In this work for designing a BCI system five c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Modified Spectral Bisection for Segmenting Malayalam Documents

    Publication Year: 2013, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Topic Segmentation has been an area of interest for Text summarizers. Many of the Malayalam documents confirm to a main topic as well as many subtopics. This paper presents the idea of using the repeated spectral bisection method to find the subtopics in the document. This method is a widely used for partitioning graphs based on the properties of the similarity matrix created. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DCA: An Approach for Face Recognition through Component Analysis

    Publication Year: 2013, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1326 KB) | HTML iconHTML

    The developments in digital technologies is enhancing the communication between computers and Human. Face recognition is a vital technique that helps to develops user-friendly methods for Human Computer Interaction (HCI). In this paper we suggest a pattern recognition method using Difference Component Analysis (DCA) and present its application in face recognition. The DCA removes all the general f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of Missing Items Using Naive Bayes Classifier and Graph Based Prediction

    Publication Year: 2013, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    The prediction of missing items in a set is an unresolved area of research on the web. Current approaches use association rule mining techniques which are applied to only small item sets. Association rule mining techniques increase rule generation complexity as the size of data increases. This paper proposes the use of Naïve Bayes text classifier prior to the prediction process to control ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Neuro-fuzzy Classifier for Weapon Detection in X-Ray Images of Luggage Using Zernike Moments and Shape Context Descriptor

    Publication Year: 2013, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Weapon detection in luggages using X-ray machines at various security tight areas especially airports are inevitable. The process tends to be time consuming and requires the skills of a human operator to identify the weapon from the contents of the luggage. An automated weapon (gun) detection method for luggage screening systems utilizing connected component analysis, zernike moments and shape con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Technique for Efficient Text Document Summarization as a Service

    Publication Year: 2013, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Due to an exponential growth in the generation of web data, the need for tools and mechanisms for automatic summarization of Web documents has become very critical. Web data can be accessed from multiple sources, for e.g. on different Web pages, which makes searching for relevant pieces of information a difficult task. Therefore, an automatic summarizer is vital towards reducing human effort. Text... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stress Management Using Artificial Intelligence

    Publication Year: 2013, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    The problem of stress is recognized as one of the major factors leading to a spectrum of health problems. Today the diagnosis and the decision is largely dependent on how experienced the clinician is interpreting the measurements. Computer aided artificial intelligence systems for diagnosis of stress would enable a more objective and consistent diagnosis and decisions. The stress-detection system ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Detection Using Motion Patterns Computed from Optical Flow

    Publication Year: 2013, Page(s):58 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    A method is proposed for detecting anomalies in extremely crowded scenes using analysis of motion patterns. The optical flow is computed by initializing the video as a dynamical system. Optical flow is a vector field where each vector represents the direction and amount of motion. This generated model can be used to define trajectories. Then these trajectories are clustered hierarchically using sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduction of MAI Using Optical Normaliser in an Optical CDMA System

    Publication Year: 2013, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    Optical Code Division Multiple Access (OCDMA) is a technology which supports multiple simultaneous transmissions in the same time slot and the same frequency to realize multiplexing transmission and multiple accesses by coding in the optical domain. But one of the major disadvantages of the multi user system is the Multiple Access Interference (MAI) that can occur due to the false detection of inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritization of Messages on Community Based and Non Community Based Protocols in DTN

    Publication Year: 2013, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A Delay Tolerant Network (DTN) is characterised as partitioned networks with absence of end to- end connectivity and therefore conventional routing techniques applicable to MANET cannot be applied. DTN have found to be useful in number of application areas where prioritization of messages is essential. We have worked with prioritization of messages considering minimum consumption of network resour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convergent Replicated Data Structures that Tolerate Eventual Consistency in NoSQL Databases

    Publication Year: 2013, Page(s):70 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The Eventual consistency is a new type of database approach that has emerged in the field of NoSQL, which provides tremendous benefits over the traditional databases as it allows one to scale an application to new levels. The consistency models used by NoSQL database is explained in this paper. It elaborates how the eventually consistent data structure ensures consistency on storage system with mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Design of UWB Antenna with Dual Tapered Conical Wave Launcher for Biomedical Application

    Publication Year: 2013, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    The extensive availability of electromagnetic technology has led to increasing concerns on the possible health hazards. Meanwhile the EM interactions with biological materials have generated considerable interest in a variety of biological and medical applications. The main application of this work is to treat skin cancer using Impulse Radiating antenna because of its effective focus on the affect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.