By Topic

2015 International Conference on Computer Communication and Informatics (ICCCI)

8-10 Jan. 2015

Filter Results

Displaying Results 1 - 25 of 106
  • [Copyright notice]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Sri Shakthi Institute of Engineering and Technology [about hosting institute]

    Publication Year: 2015, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Message from chairman

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from principal

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • Preface

    Publication Year: 2015, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Scope of ICCCI 2015

    Publication Year: 2015, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Agenda and speakers list

    Publication Year: 2015, Page(s):vii - x
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2015, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Glimpse of previous editions

    Publication Year: 2015, Page(s):xiv - xviii
    Request permission for commercial reuse | PDF file iconPDF (483 KB)
    Freely Available from IEEE
  • Invitation [2015 International Conference on Computer Communication and Informatics]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1789 KB)
    Freely Available from IEEE
  • IoT workshop poster

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    Provides an abstract of the presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1118 KB)
    Freely Available from IEEE
  • Emphasis on rough Set theory for image retrieval

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    This paper highlights concept of rough Set theory and focus on its active participation in various technologies such as cloud computing, artificial intelligence, data mining, expert system etc. we focus particularly on exploitation of rough set theory image retrieval with hybridization approach. We start with fundamental of rough set theory, its recent development, application, trends, impact on r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for content based image retrieval in context of combination S C techniques

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2926 KB) | HTML iconHTML

    This paper presents content based image retrieval (CBIR) system using immense power of combination of soft computing techniques such as artificial neural network, fuzzy logic and support vector machine. Traditional content based image retrieval system are retrieved images using low level visual features, hence, suffer from semantic gap. There is need to reduce semantic gap and improve accuracy of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical music notes recognition for printed piano music score sheet

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    Entertainment, Therapy and Education are the fields where music is always found in couple with homo-sapiens. Music is presented in various formats to us like aural, visual and one more - written form of music that is known very less to us. In a way music dominates our life. System discussed in this paper inputs music score written for piano music using modern staff notations as image. Segmentation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design principles of request scheduler in cloud

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB) | HTML iconHTML

    The principle of assigning users' requests with computing resources in large scale distributed computing environments highly impacts the system's performance. Therefore, adopting a suitable requests assignment policy will ascertain to achieve high performance. In this paper, we present generic principles of a request assignment scheduler and its structural components. The proposed principle is bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance analysis of load Balancing algorithms in Cloud environment

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Distributed systems in a general term can be defined as a mix a combination of resources which are categorized in two ways, computing and communication. Communication network is used to link a number of workstations or nodes to build a large loosely coupled distributed environment. Load Balancing is essential for efficient operations in distributed environments. As Cloud Computing is growing rapid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for vehicle detection and classification

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (830 KB) | HTML iconHTML

    Day by day numbers of vehicles purchased by humans are increasing which results in more traffic related issues. Especially considering under developed countries, traffic issues are on its peak. Approaches designed till date includes detection and classification of vehicles on highway roads and especially for 4-wheelers rather than 2-wheelers. Proposed approach focuses on university scenario where ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved AODV with restricted route discovery area

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Mobile Ad Hoc Network [MANET] is a network that changes location and organize itself on the fly. The low resource availability demands efficient utilization and motivates optimal routing. This paper introduces an Improved AODV (I-AODV) protocol which considers the location and energy of nodes. Route discovery area is restricted based on the source and destination location. The nodes lying in this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying prefetching in Online Social Network to gain social intelligence

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (898 KB) | HTML iconHTML

    From the past decade, the growth of the Web is intensive and powerful in terms of information and knowledge dissemination. Online Social Network (OSN) is one of the popular applications in the age of Web 2.0 era. The formation of a Social Network [1] is through the daily and continuous communication of people and it includes different relationships among them. Social Network Analysis (SNA) plays a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Opportunistic Routing based on ETX metric to get better performance in MANET

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    The key objective of routing protocols in Wireless Mobile Adhoc Networks is to discover optimal path based on highest routing progress. This can be achieved by minimum HOP count routings metric. The quality of links also directly influence on the efficiency of data transmission. The best probable quality and efficiency of data transmission can be achieved by optimizing several performance metrics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hungarian sculptured Discrete Gould transformed bit planes-a double puzzled image

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB) | HTML iconHTML

    Many possibilities are there that the secret information will be retrieved by an intruder. Information security is used for secure transmission of information through the communication networks via various encryption techniques. Double layered encryption provides more security than encryption. Double image encryption using Gould transform and Rubik's transform was proposed in this paper to provide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2π rotated Key2 shuffling and scrambling - a cryptic track

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    As science grows threats also gets cultivated along with it. Hence Information security is emerging as an integral part of growing technology. In order to achieve this we get into the fields of cryptography, steganography and watermarking. There are many ways to encrypt and decrypt a message to be communicated. Enabling multiple encryptions will disable an intruder to recover the message. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mexican archaeological image retrieval based on object matching and a local descriptor

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    Content-based image retrieval (CBIR) is a hard task which consists in retrieving similar content from a large multimedia database. In the literature, in order to extract descriptors from the images the CBIR techniques use several low-level features such as color, texture, shape, contours, among others. In the recent years, several local descriptors based on the detection of feature points have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big data exchange between Ambulance bus to hospital network through internet in Telemedicine using computer communication network and 3G Mobile antenna

    Publication Year: 2015, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1011 KB) | HTML iconHTML

    India has the second largest population in the world. And at the same time there is more accident death when traveling by road. Accidents mostly lead to death since emergency treatment and the operation cannot be performed in an ambulance bus. Ambulance bus are not equipped with speciality medical equipments because these equipments requires more space which is not available in the ambulance bus. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.