2015 International Conference on Advanced Computing and Communications (ADCOM)

18-20 Sept. 2015

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1277 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Table of content

    Publication Year: 2015, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2015, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • ADCOM 2015 Committees

    Publication Year: 2015, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Zygote: A Framework for Prototyping Smart Devices

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    The Internet of Things (IoT), which has had an unprecedented effect in the manufacturing industry, is now becoming increasingly popular in everyday life. Even with the rising interest in IoT among developers, there is no simple way for them to prototype and realize their ideas. As of today, developing an IoT project requires cross domain knowledge of hardware, embedded systems, communication proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware-Directed Feature Detection for Video Stitching in Intelligent Transportation

    Publication Year: 2015, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    Intelligent transportation is expected to be a part of smart cities in the near future. Vehicles equipped with multiple cameras that convey traffic information to the driver would be an important part of transportation. In this paper, we consider the problem of hardware-efficient stitching of videos captured by multiple cameras. An approach based on detection of interest points in all the video st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Sensing in Smart Cities Using Optical Sensors

    Publication Year: 2015, Page(s):13 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    The concept of Smart Cities becomes paramount importance both to Government and Private Sectors. The increasing pressure of urbanization creates tremendous pressure to civic infrastructures like drainage, water system, electrical networks (Smart Grid), transportation etc [1] -- [3]. The use of Big Data Analytics is becoming a necessary tool to design and monitor Smart Cities. With the cost of sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of TCP Performance Using NDG Loss Predictor in Wireless Networks

    Publication Year: 2015, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Transmission control protocol (TCP), a widely used transport layer protocol provides reliable service and end-to-end congestion control. Performance of TCP is satisfactory in wired networks but fails to perform well in wireless networks. It is because in wireless networks two types of packet losses are important. Congestion loss and transmission loss. Transmission loss can be ignored in wired netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Renewable Energy Micro Grid for Indian Scenarios

    Publication Year: 2015, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    As the patterns of energy production and consumption shift, the need to distribute power more efficiently becomes imperative. This study is based on realization of an operational smart renewable energy micro grid put up by FluxGen Engineering Technologies in a remote village -- Mendil situated in reserve forest of Belgaum district in Karnataka state, India, and it's applicability in urban context;... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Seamless Video Processing in Smart Surveillance Cameras with Multicore

    Publication Year: 2015, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Smart video surveillance is an area of research focus in smart city technology. Smart camera design for this task needs to perform seamless video processing. Multicore is one solution to achieve high performance. In this paper, we propose a pipelined parallel architecture for smart video surveillance that is appropriate for implementation on a multicore environment. The architecture comprises of m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surveillance Drone for Landmine Detection

    Publication Year: 2015, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    Mine detection using a surveillance drone is a modern conceptual prototype, which has been designed to detect landmines. Landmines were primarily used to create defensive and tactical barriers during the Second World War. They are still very much employed in large quantities in countries such as Afghanistan, Korea. A lot of these land mines still go undetected, increasing the death rate and creati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PiCam: IoT Based Wireless Alert System for Deaf and Hard of Hearing

    Publication Year: 2015, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    Deaf and people with hearing impairment face everyday challenges in identifying the occurrence of household sounds like door bell, child crying or phone ringing. The objective of this paper is to design and implement a low cost stand-alone device for deaf people to notify doorbell ringing who live alone in their house. The system is based on Raspberry pi which includes camera, vibrator, wireless G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Token Based Privacy Preserving Access Control in Wireless Sensor Networks

    Publication Year: 2015, Page(s):45 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    In large scale Wireless Sensor Network the network owner and the users of the sensor network may be different. A distributed access control module allows the users to access data from the network for which the user has privileges. The users of such a network required the privacy of their identity and access patterns from the network and other users. To support this user privacy previous works prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Performance of MapReduce Framework in Heterogeneous Environments

    Publication Year: 2015, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    MapReduce framework in no time established as a vital distributed model for the applications which are data-intensive. Hadoop default scheduler is restricted by the idea that cluster nodes are homogeneous. The job execution time is extended by the tasks and TaskTrackers which are running slowly in heterogeneous Hadoop cluster. In this paper, we propose a unique MapReduce scheduler that identifies ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs

    Publication Year: 2015, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In Mobile ad-hoc networks (MANET), QoS protocols includes the intermediate nodes which have sufficient resources along the route, from source to destination. Nodes may turn non cooperative when they are running with shortage of resources, which weakens the effectiveness of the protocol. The proposed model (Uncertain Rule-based Fuzzy Logic QoS Trust Model in MANETs -FQTM) selects the nodes which ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Chaining for NFV and Delivery of Other Applications in a Global Multi-cloud Environment

    Publication Year: 2015, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Network Function Virtualization (NFV) allows Internet Service Providers (ISPs) to implement key function modules, such as, BRAS (Broadband Remote Access Server), IMS (Internet Multimedia System), etc. in virtual machines in a cloud environment. One of the key problems in NFV implementation is the placement of virtual machines (VMs) in clouds managed by different cloud service providers each with i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2015, Page(s): 67
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2015, Page(s): 68
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE