2014 IEEE International Conference on Computational Intelligence and Computing Research

18-20 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 296
  • [Front and back cover]

    Publication Year: 2014, Page(s):c1 - c4
    Request permission for commercial reuse | |PDF file iconPDF (224 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (306 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Message from the general chair

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | |PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the organizing secretary

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Index

    Publication Year: 2014, Page(s):1 - 14
    Request permission for commercial reuse | |PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Cyber security for a smart nation

    Publication Year: 2014, Page(s):1 - 3
    Cited by:  Papers (3)
    Request permission for commercial reuse | |PDF file iconPDF (196 KB) | HTML iconHTML
    Freely Available from IEEE
  • Adaptive anti-synchronization of 5-D novel hyperchaotic systems and SPICE implementation

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | |PDF file iconPDF (580 KB) | HTML iconHTML
    Freely Available from IEEE
  • Author index

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | |PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Automatic generation control of three area hydro-thermal power systems with electric and mechanical governor

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (414 KB) | HTML iconHTML

    This paper presents the dynamic performance of interconnected three area hydrothermal power systems with conventional controllers. In this work, area 1 and area 2 consists of thermal power plant while area 3 consists of hydro power plant. The thermal and hydro power plant incorporate with reheat turbine and either mechanical governor or electric governor respectively. The conventional Proportional... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new distributed intelligent clustering protocol (ICP) in wireless sensor networks

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    Constraint of energy is one of the main research challenges in wireless sensor network protocol development. High energy efficiency can be achieved if sensor nodes are organized in to groups to form clusters. In this paper, we propose a new distributed clustering approach in which the set of appropriate cluster heads are elected in each data gathering period upon real time decision made by fuzzy e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective technique of ranking for mobile robots

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (213 KB) | HTML iconHTML

    Mobile robots have been extensively used by many industries as well as organizations are a major problem which must be considered with many acceptable attributes. Selection of a robot for a specific task is challenging one and demanding problems in existing event. Selection of Mobile robot satisfies some performance attributes, which can solve the avoidance of significant issues in the field of ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification and classification of fungal disease affected on agriculture/horticulture crops using image processing techniques

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB) | HTML iconHTML

    This paper presents a study on the image processing techniques used to identify and classify fungal disease symptoms affected on different agriculture/horticulture crops. Many diseases exhibit general symptoms that are be caused by different pathogens produced by leaves, roots etc. Images Often do not possess sufficient details to assist in diagnosis, resulting in waste of time, misshaping the dia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of digital image stabilization by using empirical mode decomposition methods

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (367 KB) | HTML iconHTML

    In this paper comparative analysis of digital image stabilization (DIS) is proposed. For comparison purpose Basic Empirical Mode Decomposition (EMD), Improved EMD, Ensemble Empirical Mode Decomposition (EEMD) and Complete Ensemble Empirical Mode Decomposition (CEEMD) methods are considered. Method used for digital image stabilization is of fully data driven approach. With the comparative analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized theory for hybridization of evolutionary algorithms

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (214 KB) | HTML iconHTML

    This study proposes to generalize the hybridization of evolutionary algorithm for solving large dimensional continuous global optimization problems. Inspired by various dual hybridizations being used, this paper proposes hybrid evolutionary algorithms based on crossing over the FFA, PSO, BAT, ACO and GA algorithms. The main idea of the proposed method is to integrate the aforementioned algorithms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal orthogonal pilots design for MIMO-OFDM channel estimation

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (230 KB) | HTML iconHTML

    This paper presents a pilot based channel estimation method for MIMO-OFDM systems, the combination of MIMO with OFDM is used to increase the bit rate as well as capacity. The existing channel estimation methods uses more OFDM periods (STBC) and gives high MSE(conventional pilots). The proposed channel estimation method has very low complexity, With these orthogonal pilots we can obtain the optimal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient routing scheme for MANETs

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (396 KB) | HTML iconHTML

    Mobile Ad hoc Networks (MANETs) are the networks of mobile nodes which do not require any access points to communicate with each other within the radio range. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message security is of paramount importance in mobile ad-hoc networks. The paper proceeds with a brief introduction of MANETs followed b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rectangular patch antenna array design at 13GHz frequency using HFSS

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (355 KB) | HTML iconHTML

    This paper presents a new element antenna array of rectangular topology microstrip patches is introduced to operate at Ku Band. The antenna has been designed as an arrays of patches, where number of elements, spacing's and feeding currents has been optimized to fulfil the requirements of low side lobe level and good cross polarization. The operating frequency range of antenna array is from 12 to 1... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of task scheduling with priority and non-priority in cloud computing

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (362 KB) | HTML iconHTML

    Minimizing the total allocation cost is an unavoidable issue needing to be deal with in task scheduling of cloud computing for processing all the tasks. In this paper, the comparative study has been done among the priority algorithms and secondly between the priority and non-priority task scheduling algorithms. In order to emulate the precedence relation of task, the task scheduling algorithms enu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A vary approach to face recognition veritable mechanisms for Android mobile against spoofing

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (256 KB) | HTML iconHTML

    Authentication is the process of identifying and verifying someone, who it claims to be known as user. The increasing popularity of smart mobile phones provides user to store personal data and user information. It is necessary to ensure the confidential access of the mobile phone to its user. Currently, Face Unlock is the biometric user authenticating system widely available in mobile phone. Howev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of embedded system for tracking and locating the patient suffering from Alzheimer's disease

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (260 KB) | HTML iconHTML

    The proposed project is to design a system to track and locate mobile Alzheimer's disease patients who suffer from lapses of memory and concentration. Alzheimer's disease is a type of dementia that causes problems with memory, thinking and behavior and is the most common form of dementia. It is a progressive disease, where dementia symptoms gradually make over a number of years. In these circumsta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical approach towards packet drop attacks in mobile ad-hoc networks

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (208 KB) | HTML iconHTML

    The Mobile Ad-hoc Network (MANET) is an infrastructure less network of mobile component without any prior structure of communication within the network. The primary major challenge is security and privacy while communicating mobile nodes in the network because of open environment of the MANET. MANETs are vulnerable to Packet Drop Attack is a type of Denial of Service (DoS) attack. Packet Drop Atta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling & analysis of cost effective high availability security architecture for whole of government systems to cater DDoS attack

    Publication Year: 2014, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (17038 KB) | HTML iconHTML

    A Distributed Denial of Service (DDoS) attack can inflict a grave toll on revenues. Developing countries like Nepal where the E-government system services are in infancy state; if attack like DDoS occurs the probability of dying out of system itself is more. Citizens may be reluctant in using E-services. To handle such challenges, this paper compares various security architectures for E-government... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified approach for recognition of 3-D faces with missing parts

    Publication Year: 2014, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (720 KB) | HTML iconHTML

    This paper presents an implementation of face recognition, which is a very important task of identifying human faces. Representation of a face image is dealing with keypoints clustering and curve matching approach. In our work we implement the methods for recognition of a 3-D face image with missing and occluded part. The solutions for this problem is found out with the help of SIFT and RANSAC alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved consistency model in cloud computing databases

    Publication Year: 2014, Page(s):1 - 3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (290 KB) | HTML iconHTML

    Nowadays cloud computing is the fastest growing technology that is used as a source of providing service through Internet. It is an enhanced model of Utility Computing. It embodies all technologies in Computer Architecture. It delivers the clients the needed applications, processes and Information as a service. It provides software platform as a service and virtualized servers, storage area and ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.