By Topic

2015 IEEE International Conference on Computational Intelligence & Communication Technology

13-14 Feb. 2015

Filter Results

Displaying Results 1 - 25 of 170
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1093 KB)
    Freely Available from IEEE
  • Title Page i

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Title Page iii

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Copyright Page

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Welcome from the General Chair

    Publication Year: 2015, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Program Chairs

    Publication Year: 2015, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2015, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2015, Page(s):xix - xxi
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • International Advisory Committee

    Publication Year: 2015, Page(s):xxii - xxv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Posthuman Performance and Cyborg Informatics

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    The Future ambitions and the key principles of sustained performance of humans are definitely towards structured adaption to post humanism. Showcasing the difference or supremacy as continuous improvement in human performance is always due to competition to other fellow humans, and it is proposed to be achieved by aggressive intelligence invoked by adaptive cyborgs in the generations to come. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vehicle Number Plate Detection System for Indian Vehicles

    Publication Year: 2015, Page(s):8 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    An exponential increase in number of vehicles necessitates the use of automated systems to maintain vehicle information. The information is highly required for both management of traffic as well as reduction of crime. Number plate recognition is an effective way for automatic vehicle identification. Some of the existing algorithms based on the principle of learning takes a lot of time and expertis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel E-learning Approach to Add More Cognition to Semantic Web

    Publication Year: 2015, Page(s):13 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB) | HTML iconHTML

    E-Learning approach using semantic web provides relevant and meaningful information to the learner but human mind designs its own cognitive structure of the information which is fuzzy and uncertain. When knowledge structure of any domain is large and well connected then it is very easy to learn and acquire semantically connected knowledge. An E-Learning approach is designed where the semantic web ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet Analysis of Well-Logging Data in Petrophysical and Stratigraphic Correlation

    Publication Year: 2015, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    Sequence stratigraphy is a great contribution to the analysis and characterization of oil reservoirs. But how to divide sequence stratigraphic units quantitatively is the urgent problem to solve. Well logging signal representing litho logy and physical properties embrace much information related to sedimentary cycles, and wavelet analysis of signal has good time-frequency local adjustable performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Based Collaborative Filtering for Tourist Attraction Recommendations

    Publication Year: 2015, Page(s):22 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    A user-based tourist attraction recommender system is developed in this paper. The recommender system is constructed as an online application which is capable of generating a personalized list of preference attractions for the tourist. Modern technologies of classical recommender system, such as collaborative filtering are considered to be effectively adopted in the tourism domain. On the basis of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a Chaos-Based Digitlal Image Encryption Algorithm in Time Domain

    Publication Year: 2015, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    In this paper a chaos-based digital image encryption scheme by a permutation-substitution structure is proposed. Its design and implement have been detailed discussed and tested. The results of simulation and analysis show that the proposed image encryption scheme provides a secure way for image encryption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Study to Suggest Optimal Classification Techniques for Given Dataset

    Publication Year: 2015, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1562 KB) | HTML iconHTML

    Problem statement: Classification techniques play an important role in Data Mining. Large number of classification techniques has been proposed in the literature. No single algorithm can be considered optimal for all type of data set. Accuracy of classification result highly depends on the selection of classification algorithms. Different classification techniques produce different results for the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Analysis: Hybrid Scheme for Face Recognition Using KPCA & SVD

    Publication Year: 2015, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    For the various classification tasks of several visual phenomena, non-linear subspaces that derived from the kernel methods are preferable than the linear subspaces. In these methods some methods such as kernel principal component analysis, kernel singular value decomposition and kernel discriminant analysis are based on kernel approach. According to the studies and researches, incremental computa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Testing Metrics for Object Oriented Applications

    Publication Year: 2015, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    In today's era, most of the softwares are developed using Object Oriented Programming languages. Testing is the integral part of development process for ensuring the quality and reliability of the software. However, testing is needed to be measured in some order to really know its effectiveness. For measuring the effectiveness of the testing, testing metrics are used. This paper empirically explai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Component Quality Characteristics Model for Component Based Software Engineering

    Publication Year: 2015, Page(s):47 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    In Component Based Development, applications are built from existing components, primarily by assembling and replacing interoperable parts. Thus a single component can be reused in many applications, giving a faster development of applications with reduced cost and high quality as components are reused in various applications. Software component has been developed lively. Thus they are likely to b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks in a PKI-Based Architecture for M-commerce

    Publication Year: 2015, Page(s):52 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    This paper presents attacks in a PKI-based architecture for m-commerce. Here, different types of attack will be designed and simulated. In addition, some loophole has been discussed in m-commerce for these attacks. Therefore, to analyze the performance, we developed and tested an application that implements the proposed method in a simulated environment. The results exhibit improvements in securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Various Approaches and Tools on Ontology

    Publication Year: 2015, Page(s):57 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    The increasing volume and unstructured nature of data available on the World Wide Web (WWW) makes information retrieval a tedious and mechanical task. Lots of this information is not semantic driven, and hence not machine process able, but its only in human readable form. The WWW is designed to builds up a source of reference for web of meaning. Ontology information on different subjects spread gl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware Adaptive Web Service Composition Framework

    Publication Year: 2015, Page(s):62 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    It is a challenge for Web service composition to perceive dynamic changes of external environment and adapt to the changes of business process rapidly. In this paper, a context-aware adaptive Web service composition framework is presented and the functions of main modules are also described in detail. In this framework, BPEL is used to describe Web service composition process and a kind of special... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Recent Image Indexing and Retrieval Techniques for Low-Level Feature Extraction in CBIR Systems

    Publication Year: 2015, Page(s):67 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    In the modern era, with the explosive growth of image databases, huge amount of image and video archive led to rise of a new research and development of efficient method to searching, locating and retrieving of image. For this purpose, an efficient tool for searching, locating and retrieval of image is required. This paper presenting a survey on low level feature description techniques for Content... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Indexing Algorithm for CBIR

    Publication Year: 2015, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Due to the continuous development of high quality multimedia technologies and rapid growth in the computational power along with availability of huge sized storage devices, digital image archives of very large size are being created day by day on the ever growing WWW through many commercial, research & development and academic web sites. The bulk of digitized images over the Internet are attra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.