Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM)

6-8 May 2015

Filter Results

Displaying Results 1 - 25 of 124
  • [Front cover]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1494 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (1330 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Messages

    Publication Year: 2015, Page(s):iii - v
    Request permission for commercial reuse | PDF file iconPDF (2890 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2015, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (787 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2015, Page(s):vii - viii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2068 KB)

    Provides an abstract for each of the invited presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Committees

    Publication Year: 2015, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (1417 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2015, Page(s):xi - xviii
    Request permission for commercial reuse | PDF file iconPDF (251 KB)
    Freely Available from IEEE
  • Analyzing the query performances of description logic based service matching using Hadoop

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    Extracting accurate information for the user input is the main drawback for information retrieval system in web. To overcome the matching problem, a description logic based matching technique is proposed. The description logic consists of TBox and ABox to separate the individual and universally quantified properties. The user input can be matched against ontology database and allows us to formaliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision based gesturally controllable human computer interaction system

    Publication Year: 2015, Page(s):8 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Human computer interaction with simple hand gesture recognition system as the interface using computer vision techniques has been developed. Usage of visually interpreted hand gestures as the interface makes it a more natural and intuitive human computer interaction (HCI) system. In this system model, interfacing by traditional methods in virtual environments like a joystick, mouse, and keyboard a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Named Entity Recognition for Malayalam language: A CRF based approach

    Publication Year: 2015, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Named Entity Recognition is an important application area of Natural Language Processing. It is the process of identifying the designators which are present in a sentence called as named entities. Named Entity Recognition can be performed using rule based approaches, machine learning based approaches and hybrid approaches. This paper proposes a method for Named Entity Recognition of Malayalam lang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to identify subject specific Human Emotions

    Publication Year: 2015, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Human Beings are the only living entity on the Earth, whose decisions are guided by their emotions. Human Emotion will vary from situation to situation. Human emotion classification is very much necessary because, now a day, lots of psychological problems are occurring due to over stress and tension of day to day life. Sometimes it is very difficult to identify only single emotion. In this paper i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Knowledge - engineering based approach for anaphora resolution of Tamil pronouns

    Publication Year: 2015, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    This paper discusses the problem of anaphora resolution that needs to be solved for efficient parsing of Tamil sentences and proposes a knowledge-engineering methodology to resolve it. Syntax is the scientific study of sentence structure. The sentences are hierarchically structured. The sentence is not just a linear string of symbols. The position of the words, relative to one another, makes a dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Contemporary semantic search using Natural Language processing

    Publication Year: 2015, Page(s):30 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1235 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles"Contemporary Semantic Search using Natural Language Processing"by N. Anish Kumar, Senduru Srinivasulu, M.N. Dinesh Kannain the Proceedings of the International Conference on Smart Technology and Management for Computing, Communication, Controls, Energy and Materials, May 2015, pp. 30-38After careful and considered review of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DD-SARP: Dynamic data secure Anonymous Routing Protocol for MANETs in attacking environments

    Publication Year: 2015, Page(s):39 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    The most important application of MANETs is to maintain anonymous communication in attacking environment. Though lots of anonymous protocols for secure routing have been proposed, but the proposed solutions happen to be vulnerable at some point. The service rejection attacks or DoS, timing attacks makes both system and protocol vulnerable. This paper studies and discuss about the various existing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Question answering system: A survey

    Publication Year: 2015, Page(s):47 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1482 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles"Question Answering System: A Survey,"by Ashish Mathur and M. T. U. Haider,in the Proceedings of the International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), May 2015, pp. 47-57After careful and considered review of the content and authorship of this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication of MAV communication using Caesar Cipher cryptography

    Publication Year: 2015, Page(s):58 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    This paper suggests the improvement of security in Micro Aerial Vehicle (MAV) communication protocol for the communication between the Ground Control Station (GCS) and the MAV. Proposed method involves the implementation of the Caesar Cipher method of data encryption with a secured key. The method of Ciphering is used for authentication of the Micro Aerial Vehicle at the beginning of the communica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RMCHS: Ridge method based cluster head selection for energy efficient clustering hierarchy protocol in WSN

    Publication Year: 2015, Page(s):64 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    In wireless sensor network (WSN), energy efficiency is a one of the important consequence in smart space and extreme environments and it has a vast variety of applications. The cluster head based communication protocols play an important role for energy saving in hierarchical WSN. In most of the clustering algorithms, a cluster head (CH) will transmit a data to the sink node. This type of techniqu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital brand management — A study on the factors affecting customers' engagement in Facebook pages

    Publication Year: 2015, Page(s):71 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    The continuous growth in digital technologies has resulted in the growth of digital brand management and made it an essential entity for a particular brand's success. It is evident that Social networking sites with its user base of over two billion stands as the most powerful and influential outlet for online branding when compared with other digital channels. Social media marketing (SMM) is a pla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imail: Webmail service in Indian languages

    Publication Year: 2015, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    The main objective of this paper is to introduce an electronic mail service in Indian languages. Electronic mail is an exchange of computer-stored messages by communication. E-mail is prominently used on the Internet and is still the most popular means of communication. At present these services are available in English like Gmail, Yahoo, Rediffmail, and so on. Language barriers are one of the big... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective preprocessing of speech and acoustic features extraction for spoken language identification

    Publication Year: 2015, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    Language identification (LID) systems have become very popular and indispensible in multilingual speech processing applications where there is need of preprocessing of machine systems and preprocessing of human interface. The system predicts the best identified language given the speech utterance. The proposed LID system uses a gaussian mixture model (GMM) based LID which uses generatively trained... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection

    Publication Year: 2015, Page(s):89 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    Intrusion detection is one of the challenging problems encountered by the modern network security industry. A network has to be continuously monitored for detecting policy violation or suspicious traffic. So an intrusion detection system needs to be developed which can monitor network for any harmful activities and generate results to the management authority. Data mining can play a massive role i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMMIX-intrusion detection and prevention system

    Publication Year: 2015, Page(s):96 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    Computer security has become a major problem in our society. Specifically, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to monitor the network traffic and users activity with the aim of distinguishing between hostile and non-hostile traffic. Most of current networks implemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible watermarking using median based prediction and Dynamic prediction error histogram shifting

    Publication Year: 2015, Page(s):102 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    Reversible digital watermarking is used to successfully recover the cover image as well as hidden information with minimum distortion. Reversible watermarking techniques have very sensitive application domains such medical and military fields where integrity of cover image is very important. In this paper, we are using median based predictor to predict the cover image which does not have any effec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migration to Ipv6 from IPV4 by dual stack and tunneling techniques

    Publication Year: 2015, Page(s):107 - 111
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1161 KB) | HTML iconHTML

    The internet can be accessible worldwide which is system of interconnected networks. IPv4 protocol in network enables data sharing between two or more computers which minimize time and energy wastages. In February 2011, all IPv4 addresses had vanished and now we are going for IPv6. Migration technique to IPv6 network is proposed in this project that overcomes all the limitations available in exist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.