By Topic

2014 International Conference on Computer Communication and Informatics

3-5 Jan. 2014

Filter Results

Displaying Results 1 - 25 of 142
  • [Front and back cover]

    Publication Year: 2014, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (5584 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • Invitation

    Publication Year: 2014, Page(s):c2 - c3
    Request permission for commercial reuse | PDF file iconPDF (2583 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2014, Page(s):ii - iv
    Request permission for commercial reuse | PDF file iconPDF (125 KB) | HTML iconHTML
    Freely Available from IEEE
  • Agenda

    Publication Year: 2014, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Workshops and tutorials

    Publication Year: 2014, Page(s):ix - xi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exhibitors list

    Publication Year: 2014, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2014, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Glimpse of previous editions of ICCCI

    Publication Year: 2014, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • An overall activity report of ICCCI 2014

    Publication Year: 2014, Page(s):1 - 12
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • [Pictures of conference events]

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (1279 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Machine learning approach for forecasting crop yield based on climatic parameters

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    With the impact of climate change in India, majority of the agricultural crops are being badly affected interms of their performance over a period of last two decades. Predicting the crop yield well ahead of its harvest would help the policy makers and farmers for taking appropriate measures for marketing and storage. Such predictions will also help the associated industries for planning the logis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JSON encryption

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    JavaScript Object Notation (JSON) is a lightweight data-interchange format. It is easy for humans to read and write. It has a data format that is inter-changeable with a programming languages built-in data structures that eliminates translation time and reduces complexity and processing time. Moreover, JSON has the same strengths of XML. Therefore, it's better to shift form XML security to JSON se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image fusion with Biorthogonal Wavelet Transform based on maximum selection and region energy

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Image Fusion plays major research role in the fields of image processing. Image Fusion is a method of combining the relevant information from a set of images, into a single image, where in the resultant fused image will be more informative and complete than any of the input images. Specifically it serves best in medical diagnosis i.e. Computed Tomography (CT), Magnetic Resonance Image (MRI) scans ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently exploring clusters using genetic algorithm and fuzzy rules

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Cluster is bunch of similar items. Unsupervised classification of patterns into clusters is known as clustering. It is useful in knowledge discovery in data. Clustering is able to deal with different data types. Fuzzy rules are used for data intelligence illustration purpose. User gets highly interpretable discovered clusters using fuzzy rules. To generate accurate fuzzy rules triangular membershi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ontology-based framework for Semantic Web Content Mining

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The voluminous amount of information available in the Web makes information retrieval a challenging task. Most of the surfers' time is wasted in following different links ranked by search engines. Moreover, manual integration of information available in different Web pages is difficult and inefficient. So, to ease the process of information retrieval and to provide the surfer with more relevant in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document layout analysis for Indian newspapers using contour based symbiotic approach

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Document layout analysis is necessary process for automated document recognition systems. Document layout analysis identifies, categorizes and labels the semantics of text blocks for meaningful information retrieval from document images. Our primary target document includes various newspaper and magazine pages which are having complex layout without following any static rules. We propose an effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mammogram classification using Extreme Learning Machine and Genetic Programming

    Publication Year: 2014, Page(s):1 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (769 KB) | HTML iconHTML

    Mammogram is an x-ray examination of breast. It is used to detect and diagnose breast disease in women who either have breast problems such as a lump, pain or nipple discharge as well as for women who have no breast complaints. Digitized mammographic image is analysed for masses, calcifications, or areas of abnormal density that may indicate the presence of cancer. Automated systems to analyse and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining based pervasive system design for Intensive Care Unit

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    Intensive Care Unit is extremely useful for providing health care to critically ill patients for their speedy recovery. An Intensive Care Unit (ICU) consists of multiple life saving machines which are continuously recording vital organs of patients and generating vast data at very high frequency. A context aware based real time monitoring system is extremely useful in the modern era of bio-medical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure image steganography technique with moderately higher significant bit embedding

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Steganography is a process to hide secret data into a cover media in an imperceptible manner. In the spatial domain of image steganography, the most common technique is Least Significant Bit Replacement (LSBR). However, LSBR is extremely sensitive to compression attacks involving truncation of LSBs. As a possible solution to the drawback of the traditional LSBR scheme, this paper proposes an image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opinion mining about a product by analyzing public tweets in Twitter

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    In this paper we have explained the detailed work done in developing a system which can be used for the purpose of opinion analysis of a product or a service. The system readily processes the tweets by pulling data from tweeter posts, preprocessing it and connecting to Alchemy API by REST call method. and showing the result graphically. We have given the analysis for the product Samsung Galaxy Our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Singular Value Decomposition based wavelet domain watermarking

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Popularity of watermarking is increasing day by day due to the significance of copyright protection, broadcast monitoring, content authentication and many other applications. This paper introduces a novel Discrete Wavelet Transform (DWT) - Singular Value Decomposition (SVD) based watermarking technique to improve the robustness and imperceptibility. In this approach watermark images are hided into... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated car parking system commanded by Android application

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The aim of this paper is to automate the car and the car parking as well. It discusses a project which presents a miniature model of an automated car parking system that can regulate and manage the number of cars that can be parked in a given space at any given time based on the availability of parking spot. Automated parking is a method of parking and exiting cars using sensing devices. The enter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS in WiMAX network by using improved handoff scheme

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    The WiMAX provides high speed internet access through the means of wireless communication. Handoff is one of the Quality of Service (QoS) parameter in the WiMAX network which supports mobility and it is the main demanding research in wireless network. The hard handoff (HHO) is performed when the connection with the SBS is broken before creating the new connection with the TBS but it has a poor per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.