By Topic

2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)

12-13 Feb. 2016

Filter Results

Displaying Results 1 - 25 of 151
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1098 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (256 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (236 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2016, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (167 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2016, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (177 KB) | HTML iconHTML
    Freely Available from IEEE
  • International Advisory Committee

    Publication Year: 2016, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s):xxii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2016, Page(s):xxv - xxxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Programming Tool for the Development of Software Tool to Improve the Quality of Software Product Using Fuzzy Quality Function Deployment

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    The tremendous growth in IT companies is due to bringing high-quality software products in the market. Quality plays a very important role for the success of any software company. The inappropriate extraction of requirements causes failure of the software product. Thus to gain superior quality software product the primary goal is to excavate correct requirements. Researchers suggested Quality Func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Botnet Infection Determination through Multiple Mechanisms Applied on Honeynet Data

    Publication Year: 2016, Page(s):6 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    Botnets are a class of internet attacks having different characteristics as compared to the normal internet attacks. One of the features that uniquely characterize a botnet attack is that "the infected machine (Bot) is being remotely controlled by an entity called "Botmaster". The Botmaster remotely controls these infected systems through "Command and Control" servers (C&C). Over a period of time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and Analysis of Few Parametric and Nonparametric Classification Methods

    Publication Year: 2016, Page(s):14 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Image processing is one of most popular research area. Image processing consists of a number of phases to be carried out, among which classification is one. Classification of an object is a vital job in computer vision area. Classification reflects the final results accuracies. So everyone has to pay attention at this phase. Lots of work is done on comparative learning of classification methods. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Quality of Machine Translation Using Text Rewriting

    Publication Year: 2016, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Machine Translation may be defined as the task of transformation of source text from one language to another. In the following paper, we have discussed the improvement in quality of Machine Translation (MT) using Source text Rewriting. We have performed English to Hindi translation on our MT system and also translation of rewritten English text to Hindi and then compared their performances and eva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applicability and Impact of ERP: A Survey

    Publication Year: 2016, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2105 KB) | HTML iconHTML

    Enterprise Resource Planning along with Business Intelligence, if implemented effectively can provide several benefits such as improved visibility, real time data access, fast interdepartmental communications etc. In paper presented, a depth studies is carried out over ERP implementation and their issues. Some of the identified issues can be categorized into Misalignment and security aspects. Misa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Automatic Generated Test Cases for Path Testing Using Genetic Algorithm

    Publication Year: 2016, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Software testing is a process for insuring the delivery of an error free software to customers. The success or failure of the software to achieve its desirability is depend on the software testing components. All the software industries spend a lot of their money and time for software testing process. Automatic testing is a key area where cost and time of software testing process has been consider... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilabel Approach Using Binary Relevance and One-versus-Rest Least Squares Twin Support Vector Machine for Scene Classification

    Publication Year: 2016, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    The classification of an image scene having multiple class labels produces significant challenge to the researchers. A semantic scene may be described by multiple objects or by multiple classes. For example, a beach scene may also contain mountain or buildings in the background. This research work proposes a multi-label scene classification model by using Binary Relevance (BR) based one-versus-res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Binary Data Hiding Technique in Boundary Points

    Publication Year: 2016, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Data hiding is now becoming most important research area now a day. One efficient binary data hiding technique into a digital image has been proposed in this study. The proposed work focuses on the learning of different edge detection and data hiding techniques and analysis of their relative performances. Work focuses on finding the boundary edges of size of the length of the data to be hided. Sob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of the Competitive Learning Algorithms on Gaussian Data in Automatic Cluster Selection

    Publication Year: 2016, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB) | HTML iconHTML

    A clustering problem occurs when an object needs to be assigned into a predefined group or class based on a number of observed attributes related to that object. The existing Competitive Learning (CL) algorithm and its variants (Frequency Sensitive Competitive Learning (FSCL), Rival Penalized Competitive Learning (RPCL), and Rival Penalized Controlled Competitive Learning (RPCCL)) have provided an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Clustering for Segmenting Fused Image Using Discrete Cosine Transform with Artificial Bee Colony Optimization

    Publication Year: 2016, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    In this paper, a robust and improved image segmentation technique is proposed for segmentation of a fused image based on Discrete Cosine Transform (DCT) with Artificial Bee Colony Optimization (ABC) termed as DCTopti. It is very challenging task to perceive details information from a visual image due to variation of light, reflection, existence of shadow etc., while in case of infrared images, as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Region of Interest Based Contrast Enhancement Techniques for CT Images

    Publication Year: 2016, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Medical imaging refers to an approach through which radiographers diagnose the human body using X-rays, CT, ultrasound, and magnetic resonance techniques. It is widely used safe imaging system in medical field that assists in extracting and visualizing the fine details from the image. In order to extract the details from an image, it should be of high quality, but presence of noise in images makes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect Oriented Programming and Types of Software Testing

    Publication Year: 2016, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    Software testing is a process to determine that a software product satisfies the specified requirements. Software testing spans over all phases of the Software Development Life Cycle namely, requirement specification, analysis, designing, development, deployment and maintenance of a software. Software testing is important to point out the defects in the software and to ensure that the developed so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Approach for Latent Fingerprint Recognition

    Publication Year: 2016, Page(s):70 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1240 KB) | HTML iconHTML

    The online fingerprints by biometric system is not widely used now a days and there is less scope as user is friendly with the system. This paper represents a framework and applying the latent fingerprints obtained from the crime scene. These prints would be matched with our database and we identify the criminal. For this process we have to get the fingerprints of all the citizens. This technique ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis of Contrast Enhancement Techniques of Different Image

    Publication Year: 2016, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (511 KB) | HTML iconHTML

    Contrast enhancement is an important technique of image processing for the enhancement of contrast of an image in the spatial domain. Numbers of contrast enhancement techniques are available. This paper proposes comparative analysis of various contrast enhancement techniques applied on different images. PSNR and MSE value after enhancement is depicted in the tabular form as well as graphical form ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.