Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2014 International Conference on Emerging Technologies (ICET)

8-9 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 41
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (34338 KB)
    Freely Available from IEEE
  • [Spine art]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (2351 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (533 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s):iv - v
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Technical program committee

    Publication Year: 2014, Page(s):vi - vii
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2014, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (790 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Multi-aspects based requirements priortization technique for value-based software developments

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    In requirements engineering (RE), different activities are carried on to add up business values to the software products. In value-base software (VBS), financial impacts on business are measured, and this phenomenon makes VBS different than other traditional software applications. In VBS systems, determination of valuable requirements is a crucial task and depends on multiple aspects or factors. R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management model for support of requirement engineering

    Publication Year: 2014, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (813 KB) | HTML iconHTML

    Requirement engineering (RE) plays an important role in the success or failure of product and is recognized as the most critical factor in the entire software development process. Due to the fact that RE knowledge is highly dependent on human which may result in inconsistencies, terminology conflicts and lack of understanding of requirement knowledge faced in the implementation of information base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements Engineering process for Software-as-a-Service (SaaS) cloud environment

    Publication Year: 2014, Page(s):13 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1247 KB) | HTML iconHTML

    This paper deals with the important topic of Requirements Engineering in cloud computing, specifically on Software as a Services (SaaS) cloud model and presents a new methodology for Requirements Engineering of SaaS by identifying two key questions to handle Requirements in SaaS. The paper evolves by considering a CMMI modification by adding a new element in such a process, specifically devoted to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of personal and interpersonal competencies of project managers

    Publication Year: 2014, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (729 KB) | HTML iconHTML

    Project success factors consist of a variety of soft skills and competencies in addition to technical skills. These skills and competencies can be broadly categorized into business, personal, interpersonal and management competencies. This paper reports the results of a survey conducted to highlight strengths and weaknesses of personal and interpersonal competencies of software project managers. F... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A state-based fitness function for the integration testing of object-oriented programs

    Publication Year: 2014, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (721 KB) | HTML iconHTML

    Testing object-oriented program is quite challenging task due to the nature of its features like inheritance and polymorphism. In practice test case generation is the most laborious and resource consuming process in software testing hence generating test data for object-oriented programs is even more challenging and effort demanding. Object-oriented evolutionary testing aims at automating test cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service integration for biometric authentication

    Publication Year: 2014, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB) | HTML iconHTML

    Multimodal biometric authentication systems offer immunity to the threats imposed by unimodal biometric systems. However, this comes at significantly higher development and adaptation costs. In this paper we introduce an approach that allows automatic configuration and deployment of heterogeneous biometric systems for different business processes and related environments. The need for development ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysing the performance of EIT images using the point spread function

    Publication Year: 2014, Page(s):36 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1176 KB) | HTML iconHTML

    Electrical impedance tomography (EIT) is a noninvasive medical imaging technique in which a small current is applied to the electrodes attached to the surface of a subject body and a cross-sectional image of the resistivity (or conductivity) distribution inside the body is reconstructed using an inverse algorithm. Due to the ill-posed nature of EIT inverse problem, EIT bears poor spatial resolutio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for automatic gene selection and classification of gene based colon cancer datasets

    Publication Year: 2014, Page(s):42 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1007 KB) | HTML iconHTML

    Colon cancer heavily changes the composition of human genes (expressions). The deviation in the chemical composition of genes can be exploited to automatically diagnose colon cancer. The major challenge in the analysis of human gene based datasets is their large dimensionality. Therefore, efficient techniques are needed to select discerning genes. In this research article, we propose a novel class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid modeling of p53 and Akt associated gene regulatory network

    Publication Year: 2014, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB) | HTML iconHTML

    p53 is known as a genome guardian gene as it bears a putative function in the DNA damage associated gene regulatory networks (GRNs). These GRNs integrate many upstream signals to up-regulate p53 and in turn p53 either up-regulates or down-regulates many downstream signals. In this paper, we model a GRN comprising of the entities p53, Mdm2c, Mdm2n, and Akt using the qualitative and hybrid modeling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet of Things: Challenges & security issues

    Publication Year: 2014, Page(s):54 - 59
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (843 KB) | HTML iconHTML

    Propelled by large-scale advances in wireless technologies, sensing technologies and communication technologies, the transformation of the Internet into an integrated network of things termed as Internet of Things is rapidly unfolding. The Internet of Things enabled by Wireless Sensor Networks (WSN) and RFID sensors finds a plethora of applications in almost all the fields such as health, educatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of Hadoop Clusters configured on virtual machines and as a cloud service

    Publication Year: 2014, Page(s):60 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1239 KB) | HTML iconHTML

    Cloud computing is an emerging trend for online computing and resource management. OpenStack is one of the most widely used open source platform for building public and private clouds. Whereas, Apache Hadoop is an open source framework use to process large data sets spread across clusters of computers. Currently both OpenStack and Apache Hadoop are sharing the major consideration in research and o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the controllability of a sampled-data system under nonuniform sampling

    Publication Year: 2014, Page(s):65 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (670 KB) | HTML iconHTML

    In this paper, controllability of a sampled-data system under nonuniform sampling is investigated. The problem is motivated with the widespread networked and embedded control systems in which sampling periods may be varying and exact sampling instants are unknown. The continuous-time system is assumed to be controllable and a condition is derived for sampling intervals under which the resulting sa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel vehicle-to-grid technology with constraint analysis-a review

    Publication Year: 2014, Page(s):69 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1485 KB) | HTML iconHTML

    This paper presents a detailed review of a vehicle-to-grid (V2G) technology, and analyzes its impacts on power distribution networks. It is shown in this study that a vehicle, equipped with the ability of a V2G application, offers various features such as regulation of active power, support for reactive power, load balancing, current harmonics filtering etc. These features can enable ancillary ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Oppel-2: A new family of FCSR-based stream ciphers

    Publication Year: 2014, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (894 KB) | HTML iconHTML

    This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of chaotic and non-chaotic image encryption schemes

    Publication Year: 2014, Page(s):81 - 86
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB) | HTML iconHTML

    In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmission of digital images to avoid from unauthorized entities. A number of encryption schemes have been developed for security of multimedia data over insecure channel. So, there is a rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security analysis of VoIP architecture for identifying SIP vulnerabilities

    Publication Year: 2014, Page(s):87 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (757 KB) | HTML iconHTML

    Voice over Internet Protocol (VoIP) is an emerging technology that changes the way of communication services over IP networks. It provides flexible and low cost services to the users, which make it more popular than the existing Public Switch Telephone Network (PSTN). With the popularity of this technology, it became targeted victim of different attacks. In this paper we analyzed VoIP architecture... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.