Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 International Conference on Computer, Communications, and Control Technology (I4CT)

21-23 April 2015

Filter Results

Displaying Results 1 - 25 of 139
  • [Front cover]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • About the conference

    Publication Year: 2015, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Chairman's message

    Publication Year: 2015, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Programme schedule short

    Publication Year: 2015, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (689 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2015, Page(s):x - xiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    These keynote discusses the following: Development of Intelligent Systems for Researchers, Engineers and Scientists; Reliability and Fault Tolerance of Electronic Circuits: A Test Perspective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programme schedule long

    Publication Year: 2015, Page(s):xiv - xlvii
    Request permission for commercial reuse | PDF file iconPDF (362 KB)
    Freely Available from IEEE
  • Full papers

    Publication Year: 2015, Page(s): xlviii
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Comparison of low-power wireless communication technologies for wearable health-monitoring applications

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Health monitoring technologies such as Body Area Network (BAN) systems has gathered a lot of attention during the past few years. Largely encouraged by the rapid increase in the cost of healthcare services and driven by the latest technological advances in Micro-Electro-Mechanical Systems (MEMS) and wireless communications. BAN technology comprises of a network of body worn or implanted sensors th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling voice in LTE

    Publication Year: 2015, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Long Term Evolution (LTE) is been strongly deployed by the major operators offering a high data rate up to 100Mbps for users data applications. However, the LTE 4G technology lacks to provide the main source of revenue for the operators, which is the voice service. This paper studies the latest up to date solutions for the voice over LTE problem such as Single Radio Voice Call Continuity, Circuit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organizing network based handover mechanism for LTE networks

    Publication Year: 2015, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Self-Organizing Network (SON) mechanism comprises of three components of self-configuration, self-optimization and self-healing which can contribute to optimize the performance of the next generation broadband network such as the Long Term Evolution (LTE) networks. The aim of this study is to propose a self-organizing handover procedure based on the Self-Organizing Network (SON) concept for LTE ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of scheduling policies for VoIP traffic in LTE-Advanced network

    Publication Year: 2015, Page(s):16 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Resource allocation mechanisms are important in assigning all available resources in the network. Scheduling is one of the resource allocation mechanism which will determine the performance of the network. This paper provides the performance analysis on three different scheduling algorithms in the Long Term Evolution-Advanced downlink transmission system with realistic channel model for urban macr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint channel selection and cluster-based routing scheme based on reinforcement learning for cognitive radio networks

    Publication Year: 2015, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    Cognitive radio network (CRN) has emerged as a promising solution to solve the problem of underutilization of licensed spectrum. It allows opportunistic access of unutilized spectrum (or white spaces) by unlicensed users (or secondary users, SUs) whilst minimizing interference to licensed users (or primary users, PUs). The dynamicity of channel availability has imposed additional challenges for ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Miniaturization of printed monopole antenna through fractal geometry and partial cutting methods for UHF application

    Publication Year: 2015, Page(s):26 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    This paper reports an investigation on a combination of fractal geometry and half cutting methods in designing a printed monopole antenna for low frequency application. The effects of the combination of fractal shape and partial cutting methods to the printed monopole antenna performances were studied. All designs operate at the Ultra High Frequency (UHF) band. The fractal geometry was proposed in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced impulsive noise cancellation based on SSRLS

    Publication Year: 2015, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1703 KB) | HTML iconHTML

    Impulsive noise is a human made noise and it destroys the information completely. Methods must be investigated to mitigate this noise. In this paper, a State Space Recursive Least Square (SSRLS) algorithm based enhanced adaptive impulsive noise cancellation technique is proposed. Initially the scheme is tested on sinusoidal signal showing fast rate of convergence and excellent tracking performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyberloafing: Does workplace internet leisure affect employee satisfaction?

    Publication Year: 2015, Page(s):36 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    The purpose of this study is to examine the relationships among workplace Internet leisure, workplace Internet leisure policy, workplace autonomy orientation, and employee satisfaction. Data were collected from 5 banks located in Kuala Lumpur. Out of 500 questionnaires were distributed, a total number of 282 completed questionnaires were returned. The data were analyzed using statistical package f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing indonesian medicinal plant ontology using socio-technical approach

    Publication Year: 2015, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Data and information about Indonesian genetic resources and traditional knowledge, especially the current data on medicinal plants is not managed optimally yet. The data and information is still scattered which if there is no integrated management action done, the data and information might be lost. One effort to integrate the data about medicinal plants is by building the ontology. This research ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable method to measure similarity between two EDA-generated timing graphs

    Publication Year: 2015, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    This is a case study of the use of graph similarity to correlate the timing models obtained from two electronic design automation (EDA) static timing analysis tools (Altera's Quartus II software versus Synopsys PrimeTime). Timing models are data modelled from the post-layout netlist and parasitics extraction. The field programmable gate array's (FPGA) timing model is used by customers to optimize ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of disk I/O power consumption in modern virtualization

    Publication Year: 2015, Page(s):49 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (754 KB) | HTML iconHTML

    In Cloud Computing, the topic about hypervisors is the key research as it concerns management of physical resources and deployment virtual machines. Currently, modern hypervisors obtain new features to increase their performance under different architectures. Cloud data centers start to adopt techniques for power consumption management that can reduce the power, and meanwhile maintain the performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for human identification through offline handwritten documents

    Publication Year: 2015, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Identification of individuals from handwritten documents using automated recognition systems has gained significant research interest due to the wide variety of applications it offers for forensic analysis, signature verification, classification of historical writings and other document analysis tasks. In this paper, we present a framework that combines different feature space representations of h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrofit control solutions for old buildings using WSN

    Publication Year: 2015, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Sustainability of old buildings is constantly challenged due to its non-compliance with energy saving practices. Old buildings which aim to deploy technologies to improve thermal comfort face some infrastructure constraints. The sustainability of such buildings is dependent on occupant's thermal comfort, low carbon emissions and reduced energy consumption. Such buildings face restraints in the way... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online banking user interface: Perception and attitude

    Publication Year: 2015, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Online banking user interface gives customers' the platform to link-up their bank servers and conduct transactions over the Internet. It provides both customers and banks with great opportunities. Security and privacy are one of the big issues that banks are contending with to survive the global competitive banking market. Many technological innovation and solution are being suggested to combat th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.