Scheduled System Maintenance
On Tuesday, February 28, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (18:00-22:00 UTC).
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

2014 Sixth International Conference on Computational Intelligence, Communication Systems and Networks

27-29 May 2014

Filter Results

Displaying Results 1 - 25 of 49
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Copyright Page

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2014, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2014, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (117 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2014, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2014, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Technical Sponsors, Promoters, and Supporters

    Publication Year: 2014, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Keynote 1: Intelligent Decision Support for Intelligence Data Analysis by Qiang Shen

    Publication Year: 2014, Page(s): xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    This talk will present a knowledge-based framework for the development of intelligent decision support systems under uncertain environments. This helps to assist (but not to replace) intelligence analysts by: a) identifying plausible scenarios of criminal or terrorist activity, and b) assessing the reliability, risk and urgency of generated hypotheses. In particular, the talk will introduce an int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2: Time-Frequency Signal Representations by Martin J. Bastiaans

    Publication Year: 2014, Page(s):xvii - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    This keynote paper presents an overview of two classes of time-frequency signal representations. The first class, in which the signal arises linearly, deals with the windowed Fourier transform and its sampled version (also known as the Gabor transform) and the inverse of the latter: Gabor's signal expansion. We will show how Gabor's signal expansion and the windowed Fourier transform are related a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 3: Tutorial: An Overview of IEEE in General and IEEE Region 8 (Europe, Middle East, and Africa) in Particular by Martin Bastiaans

    Publication Year: 2014, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    Summary form only given. IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through IEEE's highly cited publications, conferences, technology standards, and professional and educational activities. IEEE is led by a diverse body of elected and appointed volun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Relationships between Students' Academic Performance and Their Area of Interest Using Data Mining Techniques

    Publication Year: 2014, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Data mining is a field of computer science that combines tools from artificial intelligence and statistics with database management. Data mining can be used in various fields of real life and one of the areas where it is applied and presented in this paper is on education. The findings provided by the use of data mining in education can help in the increase of education quality. In this study we a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generative Modelling and Classification of Students' E-Learning and E-Assessment Results

    Publication Year: 2014, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    In this paper we propose an intelligent modelling of the students' knowledge collected from the e-Learning and e-Assessment processes of a particular course. The paper is focused on proposing a methodology for extracting the students' knowledge from the e-Learning activities, which we refer to as Profiling, then modifying it in compliance with their e-Assessment results and eventually, using it to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Hidden Markov Models to Build Behavioural Models to Detect the Onset of Dementia

    Publication Year: 2014, Page(s):18 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Innovative methodologies to provide care for the elderly people in their homes form an emerging and evolving field of research. Proactive care for Dementia is an important challenge that should be researched. Using Ambient Intelligence (AmI) solutions, different data modalities can be collected from home settings. Suggested solutions are concentrating on providing behaviour monitoring or telemonit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multipath Adaptive Periodic Threshold-Sensitive Energy Efficient Protocol for Wireless Sensor Networks

    Publication Year: 2014, Page(s):33 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Wireless sensor networks enable monitoring and analysis of the environment by using a number of sensor nodes to collect the required data and send it to the user applications. These applications are becoming very important in many areas such as sensing and controlling of temperature. The wireless sensor nodes use routing protocols for sending data between the nodes of the system as required by the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inclusion of Socio-economic Indicators in the Cost Modeling of a WAN Network

    Publication Year: 2014, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (829 KB) | HTML iconHTML

    The most important stages in designing a computer network in a wider geographical area include: definition of requirements, topological description, identification and calculation of relevant parameters (i.e. traffic matrix), determining the shortest paths between nodes, quantification of the effect of various levels of technical and technological development of urban areas involved, the cost of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Simulation Model for Power Density of RF Waves and Its Field Verification

    Publication Year: 2014, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Simulation Models for Power Density of Radio Frequency (RF) Waves are used to ascertain compliance to EMF Standards (Electromagnetic Fields). ITU T has specified these under different accessibility criteria which are widely used and have been extended to revised EMF Standards issued in India. Field measurements of power density are carried out in case the models predict values higher than those sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Discrete Event Monte-Carlo Implementation Algorithm: Application to the Simulation of Indo-China Policy as a Bayesian Network

    Publication Year: 2014, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    The use of Monte-Caro methods in the modeling and simulation community is fairly widespread. There exist several historical algorithms that efficiently accomplish the requirements. However when simulating discrete events, in scenarios where precision plays an important role, present algorithms could do considerably better. In this paper we develop a novel Monte-Carlo implementation based on prime ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of Method for Elicitation, Documentation, and Validation of Software User Requirements (MEDoV) in Agile Software Development Projects

    Publication Year: 2014, Page(s):65 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Agile and lean software development methodologies appear as a popular alternative to plan-driven methodologies, but these methodologies have no structure in the process of user requirements specification. This paper shows how Method for Elicitation, Documentation and Validation of Software User Requirements (MEDoV) supports agile and lean software development methodologies. The MEDoV helps stakeho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accuracy Assessment of D-Model for Modeling Wall Attenuation in Indoor Environment

    Publication Year: 2014, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    Indoor radio signal propagation is always an interesting field to explore, especially after the introduction of Location based services, the charm of indoor localization gets more attraction of researchers and hence the work for better radio signal strength maps got accelerated that causes the development of different indoor propagation models. Most indoor localization techniques are based on fing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning Outcome E-Exam System

    Publication Year: 2014, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    This paper describes the e-exam management system (KAU-eExam). The KAU-eExam allows instructors to build questions bank for concerned course, generate, and delivery examinations sheet for undergraduate students at King Abdulaziz University. The technique of building the exam is to cover all intended learning outcomes of the course such as, knowledge, cognitive, interpersonal & responsibility, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Choosing the Most Suitable Model for Developing a Software

    Publication Year: 2014, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    There is a wide variety of models known that are used during the development of software. Each have its own strengths and weaknesses that based on the project team, availability of the resources, time and budget constraints, is suitable in different situations and types of projects. For choosing the most suitable model for software development the foremost thing is to know what kind of application... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical Hierarchy Process Approach for the Metrics of Information Security Management Framework

    Publication Year: 2014, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Organizations' information technology systems are increasingly being attacked and exposed to risks that lead to loss of valuable information and money. The systems and applications of vulnerability are basically, networks, databases, web services, internet-based services and communications, mobile technologies and people issues associated with them. The major objective of this study therefore, was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Vulnerability Assessment of OpenStack Cloud

    Publication Year: 2014, Page(s):95 - 100
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Migrating the virtual machines from on-premise to cloud raises new security challenges for a company. A potential threat to the tenants are not only the Internet hackers, but also the cloud service provider and the other co-tenants, due to the multi-tenancy feature. The cloud service provider's security is challenged by the tenants, as well. Deploying the open source cloud raises additional challe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.