By Topic

2013 11th International Conference on Frontiers of Information Technology

16-18 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1307 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2013, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2013, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • List of Reviewers

    Publication Year: 2013, Page(s):xvi - xxiii
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Analytical Model for Delay Distribution of PRMAC

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Delay is one of the most important parameters of interest while providing QOS guarantees for Wireless Sensor Networks (WSN). Various MAC layer protocols for WSN have been proposed for efficient management of delay. Analyzing single hop and end to end delay using queuing analysis can provide significant help in modeling various real time WSN applications. This paper parameterizes the cross-layer an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating the Effect of Malicious Users in Cognitive Networks

    Publication Year: 2013, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Open medium access is an inherent feature of wireless networks that makes them vulnerable to security threats and unauthorized access by foreign entities and malicious users. In cognitive radio networks, effect of these malicious users on network performance becomes more threatening, where they impersonate primary users by emitting similar signals, causing secondary users to vacate the occupied ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Foreground Object Detection and Tracking for Visual Surveillance System: A Hybrid Approach

    Publication Year: 2013, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB) | HTML iconHTML

    Foreground detection is one of the fundamental preprocessing steps in many image processing and computer vision applications. In spite of significant efforts, however, slowly moving foregrounds or temporarily stationary foregrounds remains challenging problem. To address these problems, this paper presents a hybrid approach, which combines background segmentation and long-term tracking with select... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Edges in an Image with the Help of Fuzzy Parameters

    Publication Year: 2013, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    In this research paper a novel image processing technique based on fuzzy logic has been proposed to detect edges in an image. The algorithm formulated for this purpose utilizes the concept of Attanassov's intuitionistic theory of fuzzy sets, which takes into account a hesitation degree. From this parameter, a new distance measure has been derived, which is termed as the intuitionistic fuzzy diverg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for ensemble clustering of colon biopsy images

    Publication Year: 2013, Page(s):25 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1531 KB) | HTML iconHTML

    Colon cancer diagnosis based on microscopic analysis of biopsy sample is a common medical practice. However, the process is subjective, biased and leads to interobserver variability. Further, histopathologists have to analyze many biopsy samples per day. Therefore, factors such as tiredness, experience and workload of histopathologists also affect the diagnosis. These shortcomings require a suppor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Clustering Using Discriminant Image Features

    Publication Year: 2013, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Manifold learning based image clustering models are usually employed at local level to deal with images sampled from nonlinear manifold. Usually, gray level image features are used that are obtained by resizing original images through linear interpolation approach. However, significant image variance information is lost in gray level image features. Clustering models that are based on discriminant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Analysis of Pyramidal Conformal Antenna with Circular Sub-arrays Mounted on a Moving Platform

    Publication Year: 2013, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    In this paper, we have proposed the idea of designing a pyramidal conformal array antenna and install it on a moving vehicle. Uniform circular planar array is used and it is replicated to design pyramidal shape conformal array antenna. Single panel circular planar array at 72 degree and at 42 degree is used to build the array geometry of pyramidal shape conformal array. By using circular arrays at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Power Divider for Dual-Band Microwave Applications

    Publication Year: 2013, Page(s):42 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    In this article, a modified Cheng dual-band power divider is proposed. In modified design, output ports of the divider have been redesigned by incorporating extended lines having electrical length (π/2)(f1/f2) where, f1 and f2 are center frequencies. The impedance of extended lines is calculated from an average value of bi-section impedance transf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Feature Selection and Tumor Identification in Brain MRI Using Swarm Intelligence

    Publication Year: 2013, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Demand for automatic classification of Brain MRI (Magnetic Resonance Imaging) in the field of Diagnostic Medicine is rising. Feature Selection of Brain MRI is critical and it has a great influence on the classification outcomes, however selecting optimal Brain MRI features is difficult. Particle Swarm Optimization (PSO) is an evolutionary meta-heuristic approach that has shown great potential in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Learning Automata for Genetic Operators Allocation Probabilities

    Publication Year: 2013, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The conventional Genetic algorithms (GAs) use a single mutation operator for whole population, It means that all solutions in population apply same leaning strategy. This property may cause lack of intelligence for specific individual, which is difficult to deal with complex situation. Different mutation operators have been suggested in GAs, but it is difficult to select which mutation operator sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Plant Disease Analysis (APDA): Performance Comparison of Machine Learning Techniques

    Publication Year: 2013, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Plant disease analysis is one of the critical tasks in the field of agriculture. Automatic identification and classification of plant diseases can be supportive to agriculture yield maximization. In this paper we compare performance of several Machine Learning techniques for identifying and classifying plant disease patterns from leaf images. A three-phase framework has been implemented for this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motivational and De-motivational Factors for Software Engineers: An Empirical Investigation

    Publication Year: 2013, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    This paper is based on an industrial survey conducted on software engineer motivation as previous research shows that motivation is amongst the most frequently highlighted causes of software projects failure. Motivation greatly impacts practitioner's productivity. Yet motivation is mostly ignored in software engineering literature and practice. Researchers have conducted studies on motivation in s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering Challenges for Ubiquitous Computing in Various Applications

    Publication Year: 2013, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Ubiquitous Computing is a paradigm containing the characteristics to break away from the traditional desktop computing system and turn to such computer systems where everything is available & accessible everywhere through various devices while keeping them effectively invisible. The accomplishment of this vision requires a deep involvement of multiple areas including software engineering. Soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive Control through Hand Gestures

    Publication Year: 2013, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1090 KB) | HTML iconHTML

    In recent years, we have seen dramatic progress in motion capture techniques for digital character animation, yet these techniques are expensive due to the need of special hardware. Keeping in view the trend of making applications interactive and more natural and intuitive, as well as keeping the cost low, a vision-based system is developed to allow interactive control of applications, using hand ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human-Robot Interaction in an Unknown Human Intention Scenario

    Publication Year: 2013, Page(s):89 - 94
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    In this paper an approach is introduced to human robot interaction in a known scenario with unknown human intentions. Initially, the robot reacts by copying the human action. As the human-robot interaction proceeds, the level of human-robot interaction improves. Before each reaction, the robot hypothesizes its potential actions and selects one that is found most suitable. The robot may also use th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Fly Test Suite Optimization with FuzzyOptimizer

    Publication Year: 2013, Page(s):101 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    There occur frequent requirement changes in software systems even after the software has been developed. Regression testing is continuously performed to identify the undesired affects of these requirement changes on already tested system. Test suites grow enormously with these changes due to addition of new test cases for enhanced functionality. Optimization of test suite to perform regression tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content Based Image Retrieval Using Localized Multi-texton Histogram

    Publication Year: 2013, Page(s):107 - 112
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    This paper presents a simple yet efficient image retrieval technique that defines image feature descriptors using localized multi-texton histogram. The proposed technique extracts a unique feature vector for each image in the image database based on its shape, texture and color. First, the image is divided into smaller equal size blocks and then for each block texture orientation is computed indep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.