By Topic

2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO)

9-10 Jan. 2015

Filter Results

Displaying Results 1 - 25 of 177
  • [Title page]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (951 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Messages

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (627 KB)
    Freely Available from IEEE
  • Keynote and session detail

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advisory committee

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1 - 11
    Request permission for commercial reuse | PDF file iconPDF (246 KB)
    Freely Available from IEEE
  • Mathematical modeling of the Mamdani simplest fuzzy PI or PD TITO controller via Larsen Product inference method

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    This paper presents the mathematical model of Mamdani simplest fuzzy PI or PD Two-Input Two- Output (TITO) controller via Larsen Product (LP) inference method. There are two fuzzy sets on each of the four input variables and five fuzzy sets on each of the two output variables. L - type and Γ - type membership functions are chosen on each input variable, and trapezoidal and triangular member... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQL Injection Attack prevention based on decision tree classification

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    In real world as dependence on World Wide Web applications increasing day by day they transformed vulnerable to security attacks. Out of all the different attacks the SQL Injection Attacks are the most common. In this paper we propose SQL injection vulnerability prevention by decision tree classification technique. The proposed model make use famous decision tree classification model to prevent th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband asymmetric folded dipole antenna for LTE base station

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    In this paper, a broadband asymmetric folded dipole antenna for LTE base station is proposed. The antenna consists of two coplanar asymmetric dipoles, a hook shaped microstripline and a ground reflector. The microstripline is electromagnetically coupled to the dipoles without using any physical shorting pins. A ground reflector is placed below the antenna to obtain the unidirectional radiation pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Essence of Cloud Computing: University admission process in the perception of Bangladesh

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    In this advanced era, thousands of students, apply for the admission test which is a rigorous academic system, build on a foundation of high-quality assessments that have been adopted around countrywide to consent to enter into tertiary education both at private and public universities in Bangladesh. Among them, thousands of students apply to several universities at the same time where they have t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of process driven and event driven web servers

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB) | HTML iconHTML

    Nowadays virtualization playing a vital role in the cloud technology. Users deploying websites on virtual private servers called instances which is cost effective and scalable. The explosive growth in World Wide Web, users are able to access things with any device at any time and any place. Increasing the access will constitutes the load and stress on the servers. Sometrics are useful to gauge the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Vedic mathematics based ALU using application specific reversibility

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB) | HTML iconHTML

    The proposed project utilizes the computational speed advantages of Vedic algorithm and energy optimization benefits of Reversible circuit. The Vedic algorithm optimizes the conventional mathematic computation logic used in the current processors thereby, effectively increasing the speed of computation. The Urdhva Triyambakam method derived from the ancient Indian mathematics will be used in the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient majority logic fault detection and correction using EG-LDPC codes for memory applications

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1050 KB) | HTML iconHTML

    SER is increasing for every IC process generation. Radiation induced soft errors are major concern in semiconductor memories due to technology scaling, higher integration densities and lower operating voltages. Nowadays memory cells are protected by using error correction codes. Among various multiple error correction codes ML decodable codes are suitable for memory applications due to their capab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern recognition using Spiking Neural Netwoks with temporal encoding and learning

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2514 KB) | HTML iconHTML

    Pattern Recognition plays important role in several activities like speech recognition, face recognitions, character recognition. Patterns are recognized using Spiking Neural Networks. Commonly neural networks are used in analytical decision making process and cognitive process. Spiking neural network with leaky integrate fire neurons are used to recognize the patterns. Biologically inspired super... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective approach to mine rare items using Maximum Constraint

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (629 KB) | HTML iconHTML

    Rare association rule mining provides useful information from large database. Traditional association mining techniques generate frequent rules based on frequent itemsets with reference to user defined: minimum support threshold and minimum confidence threshold. It is known as support-confidence framework. As many of generated rules are of no use, further analysis is essential to find interesting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure communication in Wireless Sensor Networks using hybrid encryption scheme and cooperative diversity technique

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1693 KB) | HTML iconHTML

    A Wireless Sensor Network (WSN) is a versatile sensing system suitable to cover a wide variety of applications. Power efficiency, security and reliability are the major areas of concern in designing WSNs[3][7]. More-over, one of the most important issues in WSN design is to assure the reliability of the collected data which often involve security issues in the wireless communications. This project... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anatomization of miscellaneous approaches for selection and maintenance of Materialized view

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    Data Warehouse is a repository of large amount of data collected from multiple data sources. It is mainly used for processing of queries and detailed analysis of data that is useful for decision makers. Hence to make this data available in less amount of time is essential. Here comes the concept of Materialize view. Materialized view stores result of queries which improve query performance. It is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation on big data generalization using k-Anonymity algorithm on cloud

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    Nowadays data security plays a major issue in cloud computing and it remains a problem in data publishing. Lot of people share the data over cloud for business requirements which can be used for data analysis brings privacy as a big concern. In order to protect privacy in data publishing the anonymization technique is enforced on data. In this technique the data can be either generalized or suppre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvising an automation reference tool GRASP using active data handling approach

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Erudition of formulaic expression language is a complicated task to the second language learners. Usually, they were not proficient to put together the succession of formulaic expression in English language. Therefore, they depend on the learning tool which generates the sequence of formulaic expression. To tackle this, natural language processing is introduced and implemented in the prototype sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent based HVAC optimization model for building energy efficiency

    Publication Year: 2015, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    The Heating, Ventilation and Air Conditioning (HVAC) systems contribute to a considerable percentage (about 50%) of a building's energy consumption. So controlling them will have a significant impact on the energy efficiency of the building, thereby reducing the carbon footprint. The factors that affect the indoor conditions include static factors like the architecture of the building, the number,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong rainbow vertex-connection of cubic graphs

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (826 KB) | HTML iconHTML

    The rainbow vertex - connection number, rvc(G), of a connected graph is the minimum number of colors needed to color its vertices such that every pair of vertices is connected by at least one path whose internal vertices have distinct colors. Rainbow coloring has received much attention recently in the field of interconnection networks. Computing the rainbow connection number of a graph is NP- har... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel transformerless AC-AC static power converter for residential applications

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3206 KB) | HTML iconHTML

    A new type of transformer less ac-ac converter based on the switched-capacitor (SC) has been proposed in this paper, intended to replace transformers. The merits of the proposed ac-ac converter can be understood with the fact that the use of magnetic elements are eliminated i.e. without inductors and transformers, ability to be bidirectional, high efficiency, and voltage stress of the active switc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computer Aided Diagnosis for detection and classification of lung nodules

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (731 KB) | HTML iconHTML

    Lung cancer has been the deadliest among all other types of cancer. Early detection of cancer is required to increase the survival rate of cancer patients. Our purpose is to develop an efficient Computer Aided Diagnosis (CAD) for detection of lung nodules from parenchyma region of lung and classify the nodule into either cancerous (Malignant) or non-cancerous (Benign). The proposed system consists... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced security algorithm with key exchange protocol in wireless network

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (654 KB) | HTML iconHTML

    In this paper, the proposed attack detection scheme in QOS security architecture with elliptic curve Diffie-Hellman (ECDH) protocol to overcome the attacks IMS (IP Multimedia Subsystem) and Femto cell access points (H(e)NBs). Initially, it refers the current security threats and security standards in WiMAX and LTE networks. Both networks WiMAX and LTE are Fourth Generation (4G) wireless technology... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Based Host Intrusion Detection System using semantic based system call patterns

    Publication Year: 2015, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    The Host Based Intrusion Detection System (HIDS) is to prevent the host system from being compromised by intruders. To prevent the execution of malicious codes on the host, HIDS monitors the system audit and event logs. But the design of HIDS is very challenging due to the presence of high false alarm rate. This paper mainly focuses on reducing the problem of false alarm rate, using semantic based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.