By Topic

2016 International Conference on Computer Communication and Informatics (ICCCI)

7-9 Jan. 2016

Filter Results

Displaying Results 1 - 25 of 128
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1026 KB)
    Freely Available from IEEE
  • About hosting institute

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (213 KB)
    Freely Available from IEEE
  • Message from chairman

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Message from principal

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Scope of ICCCI 2016

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Agenda and speakers list

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Committees and reviewers

    Publication Year: 2016, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Glimpse of previous editions [conference photographs & past conference information]

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (1626 KB)
    Freely Available from IEEE
  • Invitation

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1911 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2016, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (58958 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (321 KB)
    Freely Available from IEEE
  • Improving NSGA-II for solving multi objective function optimization problems

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1139 KB) | HTML iconHTML

    It is important for any MOEA (Multi Objective Evolutionary Algorithm) to improve convergence and diversity of solutions of Pareto front, which is obtained at the termination of MOEA. There are many MOEA available in the literature: NSGA-II, SPEA, SPEA2, PESAII and IBEA. This paper aims at improving solutions diversity of Pareto front of a well known multi-objective optimization algorithm, NSGA-II.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student Information Report System with SMS (SIRS)

    Publication Year: 2016, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    The Student Information Report System (SIRS) has been developed for the purpose of sending regular reports to the student's parent about the activities of the student. SIRS consists of five modules which can be useful to work with the system in a simplified manner. Login module provides the authentication to the system and creation of new account for a staff. The access is available to the staff o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of K-Means, DBSCAN and OPTICS

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    In view of today's information available, recent progress in data mining research has lead to the development of various efficient methods for mining interesting patterns in large databases. It plays a vital role in knowledge discovery process by analyzing the huge data from various sources and summarizing it into useful information. It is helpful for analyzing the volumes of data in different dom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data linearity using Kernel PCA with Performance Evaluation of Random Forest for training data: A machine learning approach

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    In this study, Kernel Principal Component Analysis is applied to understand and visualize non-linear variation patterns by inverse mapping the projected data from a high-dimensional feature space back to the original input space. Performance Evaluation of Random Forest on various data sets has been compared to understand accuracy and various statistical measures of interest. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrimination of snow/ice and cloud against various ecological region using DWT and color models

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1196 KB) | HTML iconHTML

    The cloud detection algorithm is important to raise the accuracy of parameters which is used in the research field related to the energy budget of earth and much more. Thus algorithm should be strong enough so that it can differentiate clouds against various surfaces (i.e. Ocean, Vegetation, Soil, and Snow). This paper covers the description of discrete wavelet transform (DWT) and HSV color model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telemedicine using computer communication network and make 3G and 4G USB internet modem antenna and mobile satellite antenna to improve internet speed for downloading and uploading patient details

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1047 KB) | HTML iconHTML

    The patient monitoring system is important in Telemedicine system. The patient details are upload, download by mobile phone, personal computer, Laptop using 3G or 4G internet modem in the Telemedicine nodes. The transmitter and receiver side of the download and upload of X-rays and scanner images speed is less for the problem of uncovered or less internet signal strength in the rural Areas. This p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of drying paint by laser peckle image processing

    Publication Year: 2016, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    In this work, a non contact optical method for the investigation of drying paint using dynamic laser speckle image processing is presented. Intensity of scattered light signals at the time of drying process of paint changes and corresponding correlation function also changes appropriately. Time history of speckle pattern of drying paint helps to assess the drying process. Speckle image photographs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New generation ATM terminal services

    Publication Year: 2016, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6287 KB) | HTML iconHTML

    This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is proposed to be used where in the user, after insert... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gold price prediction using support vector regression and ANFIS models

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    In recent times, gold has been one of the prioritized commodities in terms of long term as well as short term investments since the investors consider gold as a hedgerow against the unforeseen events leading to chaos in the market. Consequentially, the price of gold in the market plays an important role. In this research work, time-series gold price prediction models have been developed using the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of DNA cryptography in cloud computing and using socket programming

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1140 KB) | HTML iconHTML

    Cloud computing is the latest technology in the field of distributed computing. It provides various online and on-demand services for data storage, network services, platform services and etc. Many organizations are unenthusiastic to use cloud services due to data security issues as the data resides on the cloud services provider's servers. To address this issue, there have been several approaches... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cancellable multimodal biometric user authentication system with fuzzy vault

    Publication Year: 2016, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    Biometrics refers to authentication techniques that rely on humans physical and behavioral characteristics that can be automatically checked. Biometric based authentication system provides robust security and ease of use than conventional methods of verification system. Multimodal biometric system is one of the major areas of study identified with large applications in recognition system. Unimodal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and comparison of EEEMR protocol with the Flat Routing Protocols of Wireless Sensor Networks

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Wireless Sensor Communication Networks have more concern on its routing techniques. Since the WSCNs nodes are battery powered, routing algorithms should assure the concept of energy saving without affecting the other performance metric like Throughput, Delay and Packet delivery ratio etc. The modified AOMDV called as Enhanced Energy Efficient Multipath Routing Protocol (EEEMRP) is a proposed algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and energy efficient MANET routing incorporating trust values using hybrid ACO

    Publication Year: 2016, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Routing in a MANET varies considerably from the other networks due to the fact that MANET, being an ad-hoc network does not follow a specific topology and the nodes are dynamic. Further, power consumption is another major aspect, which needs to be kept in check, as the depleted nodes tend to become selfish. This paper presents a Hybrid Ant Colony Optimization based routing algorithm that generates... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.