By Topic

Advance Computing Conference (IACC), 2014 IEEE International

Date 21-22 Feb. 2014

Filter Results

Displaying Results 1 - 25 of 260
  • [Front matter]

    Publication Year: 2014 , Page(s): i - xlii
    Save to Project icon | Request Permissions | PDF file iconPDF (2066 KB)  
    Freely Available from IEEE
  • VAST: Volume adaptive searching technique for optimized routing in mobile ad-hoc networks

    Publication Year: 2014 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (176 KB) |  | HTML iconHTML  

    In this paper we propose a searching technique termed as VAST to determine an optimal path from source node to destination node in densely deployed mobile ad-hoc network. We have compared the proposed VAST algorithm with metaheuristic algorithms GRASP, Semi-greedy and Tabu search, in terms of the routing cost and algorithm execution time. The comparison results shows that the proposed VAST algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VRS algorithm a novel approach to generate pseudo random numbers

    Publication Year: 2014 , Page(s): 7 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (475 KB) |  | HTML iconHTML  

    This paper introduces a new method VRS algorithm to generate pseudo random numbers. Pseudo random numbers are a type of random numbers that are generated using a seed value. Pseudo random number generators are also known as deterministic random number generators. Various pseudo random number generators have been proposed in the past, to generate pseudo random numbers that are uniformly distributed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvements in the Bisection Method of finding roots of an equation

    Publication Year: 2014 , Page(s): 11 - 16
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (293 KB) |  | HTML iconHTML  

    Bisection Method is one of the simplest methods in numerical analysis to find the roots of a non-linear equation. It is based on Intermediate Value Theorem. The algorithm proposed in this paper predicts the optimal interval in which the roots of the function may lie and then applies the bisection method to converge at the root within the tolerance range defined by the user. This algorithm also cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost Estimation Tool for government hospitals and Healthcare facility based on modified step down approach

    Publication Year: 2014 , Page(s): 17 - 23
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (291 KB) |  | HTML iconHTML  

    This paper introduces the Cost Estimation Tool (CET). CET is a costing system used for tracking and analyzing the expenditure incurred by any organization under various departments using step down allocation and apportion technique. The overall aim of the CET is to estimate the cost of all the cost centers in any organization, to guide policy and efficient management of resources for improved serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative analysis of data sets using Machine Learning techniques

    Publication Year: 2014 , Page(s): 24 - 29
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (592 KB) |  | HTML iconHTML  

    Machine Learning techniques are most widely used in the field of clustering of data. The K-means algorithm is one which is widely used algorithm for clustering of data sets and is easy to understand and simulate on different datasets. In our paper work we have used K-means algorithm for clustering of yeast dataset and iris datasets, in which clustering resulted in less accuracy with more number of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defect aware droplet routing technique in digital microfluidic biochip

    Publication Year: 2014 , Page(s): 30 - 35
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (398 KB) |  | HTML iconHTML  

    Significant researches are going on droplet routing of digital microfluidic biochip (DMFB). Detection of failure and performing defect free routing is a new paradigm. This paper proposes a heuristic approach of droplet routing by evading the defective electrode regions. The proposed work tries to minimize multiple usage of same resource, thus by reducing the probability of defects, or routing fail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sudoku solver using minigrid based backtracking

    Publication Year: 2014 , Page(s): 36 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (301 KB) |  | HTML iconHTML  

    `Sudoku' is a popular Japanese puzzle game that trains our logical mind. The word Sudoku means `the digits must remain single'. The Sudoku problem is important as it finds numerous applications in a variety of research domains with some sort of resemblance. Applications of solving a Sudoku instance are found in the fields of Steganography, Secret image sharing with necessary reversibility, Encrypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature selection using mutual information for high- dimensional data sets

    Publication Year: 2014 , Page(s): 45 - 49
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (673 KB) |  | HTML iconHTML  

    To reduce the dimensionality of dataset, redundant and irrelevant features need to be segregated from multidimensional dataset. To remove these features, one of the feature selection techniques needs to be used. Here, a feature selection technique to remove irrelevant features has been used. Correlation measures based on the concept of mutual information has been adopted to calculate the degree of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abstraction of clock interface for conversion of RTL VHDL to SystemC

    Publication Year: 2014 , Page(s): 50 - 55
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    IP design-houses are hard-pressed by their customers to provide SystemC models of their portfolio IPs, despite already existing VHDL views. VHDL IPs can be translated to SystemC, ensuring correctness, quality and maintainability of the translated code. This paper explores optimization scenarios that affect the simulation performance, resulting in upto 38% faster - simulation. In addition to the pl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gene expression profiling by estimating parameters of gene regulatory network using simulated annealing: A comparative study

    Publication Year: 2014 , Page(s): 56 - 61
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1452 KB) |  | HTML iconHTML  

    Gene regulation is either an intra-cellular, inter-cellular, intra-tissue or inter-tissue biochemical phenomenon in an organism where a few genes may regulate the expression(s) of any other gene(s), even the expression of itself. The regulation is performed through proteins, metabolites and other genetic spin-offs resulting from the change in environment that genes experience in the cellular conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kannada text line extraction based on energy minimization and skew correction

    Publication Year: 2014 , Page(s): 62 - 67
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (686 KB) |  | HTML iconHTML  

    There are many governmental, cultural, commercial and educational organizations that manage large number of manuscript textual information. Kannada being one of the official languages of South India, such organizations include Kannada handwritten documents. Text line segmentation in such documents remains an open document analysis problem. Detection and correction of skew angle of the segmented te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C- based algorithm to avoid static obstacles in robot navigation

    Publication Year: 2014 , Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (549 KB) |  | HTML iconHTML  

    Mobile robots have the capability to navigate in the environment. We need some approaches for their collision-free and stable navigation. Authors have given their own algorithm and have implemented in C- language to move a robot from initial to final position. They have also shown the comparison in path length required by robot with the model proposed by Sir Parhi et al. in 2009. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient modular multiplication algorithms for public key cryptography

    Publication Year: 2014 , Page(s): 74 - 78
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    The modular exponentiation is an important operation for cryptographic transformations in public key cryptosystems like the Rivest, Shamir and Adleman, the Difie and Hellman and the ElGamal schemes. computing ax mod n and axby mod n for very large x,y and n are fundamental to the efficiency of almost all pubic key cryptosystems and digital signature schemes. To ach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-objective asset routing problem within a dynamic environment

    Publication Year: 2014 , Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (614 KB) |  | HTML iconHTML  

    Coordination among maritime assets is crucial for reducing task latencies and enabling the effectiveness and success of the mission. Specifically, determining when the assets are dispatched to task locations, optimizing how the assets traverse to the task location, and how much time the assets wait at various intermediate points on the way to task location is a difficult problem due to dynamic and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilevel hybrid graph partitioning algorithm

    Publication Year: 2014 , Page(s): 85 - 89
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    Balanced graph partition is a type of graph partitioning problem that divides the given graph into components, such that the components are of about the same size and there are few connections between the components. The existing approaches partition the graph initially in a random manner which has a very high impact on determining the final quality of the solution. Recently, Multilevel Partitioni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating various views in Mind Mapping Tool

    Publication Year: 2014 , Page(s): 90 - 94
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1097 KB) |  | HTML iconHTML  

    In this era, every person is burdened with a number of activities to be carried out. With this busy schedule, some tasks are bound to slip out which may be crucial. It would be easier to deal with tasks if their logical relationships could be recorded and explored by focusing exclusively on the relevant and hiding the irrelevant. Mind Mapping Software allows these relationships to be stored in a g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient hybrid technique for detecting zero-day polymorphic worms

    Publication Year: 2014 , Page(s): 95 - 100
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (363 KB) |  | HTML iconHTML  

    This paper presents an efficient technique for detecting zero-day polymorphic worms with almost zero false positives. Zero-day polymorphic worms not only exploit unknown vulnerabilities but also change their own representations on each new infection or encrypt their payloads using a different key per infection. Thus, there are many variations in the signatures for the same worm, making fingerprint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realization of a low power sensor node processor for Wireless Sensor Network and its VLSI implementation

    Publication Year: 2014 , Page(s): 101 - 105
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (389 KB) |  | HTML iconHTML  

    In a large Wireless Sensor Network, power efficiency of sensor node is one of the most important factor. Nowadays, WSN based solution have been used widely and is getting pervasively deployed in various applications. Long time operating capability with efficient energy management plays very important role for a sensor node. In this article, the sensor intelligence has been emerged with a low power... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MuteTrans: A communication medium for deaf

    Publication Year: 2014 , Page(s): 106 - 111
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1284 KB) |  | HTML iconHTML  

    People who are deaf or hard-of-hearing may have challenges communicating with others via spoken words and may have challenges being aware of audio events in their environments. This is especially true in public places, which may not have accessible ways of communicating announcements and other audio events. In this paper, the design and evolution of a mobile sound transcription tool for the deaf a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranked linear discriminant analysis features for metamorphic malware detection

    Publication Year: 2014 , Page(s): 112 - 117
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (220 KB) |  | HTML iconHTML  

    Metamorphic malware modifies the code of every new offspring by using code obfuscation techniques. Recent research have depicted that metamorphic writers make use of benign dead code to thwart signature and Hidden Markov based detectors. Failure in the detection is due to the fact that the malware code appear statistically similar to benign programs. In order to detect complex malware generated wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid based clustering protocol with dynamic range cluster head advertisement and traffic splitting in wireless sensor networks

    Publication Year: 2014 , Page(s): 118 - 123
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    Energy efficient protocol design and algorithm is one of the key issues to elongate lifetime of sensor networks. The cluster heads advertisements in each virtual grid are supposed to outreach the corresponding grid member nodes. With different competition radius, sensor node in the middle and at the edge of each virtual grid can cover grid members which implies that each cluster head should have v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node movement stability and congestion aware Anycast Routing in Mobile Ad hoc Networks

    Publication Year: 2014 , Page(s): 124 - 131
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (199 KB) |  | HTML iconHTML  

    Anycast is an important way of communication for Mobile Ad hoc Networks (MANETs) in terms of resources, robustness and efficiency for replicated service applications. Most of the anycast routing protocols for MANETs select unstable and congested intermediate nodes, thereby causing frequent path failures and packet losses. We propose Node movement Stability and Congestion aware Anycast Routing sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Order management Sudoku simplified approach to transform OSS/BSS

    Publication Year: 2014 , Page(s): 132 - 136
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    The rapid changes in the Telecommunication world and the advances in the Information Technology have paved way for a highly competitive market for the Service Providers, where new services and products need to be offered frequently. This paper examines the Order Management aspect of the Communication Providers and the challenges faced by the companies to make the application as agile and flexible ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS mapping from user to network requirements in WMSN: A fuzzy logic based approach

    Publication Year: 2014 , Page(s): 137 - 142
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    Wireless Multimedia Sensor Networks (WMSNs) are resource constrained (compared to the requirement of video communication), where the sensor nodes have limited bandwidth, energy, processing power and memory. Resource mapping is required in such networks, which is based on user requirements to offer better communication services as well as to use optimal resources. This paper proposes Mamdani's fuzz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.