2015 International Conference on Computers, Communications, and Systems (ICCCS)

2-3 Nov. 2015

Filter Results

Displaying Results 1 - 25 of 55
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (566 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):iii - vi
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):261 - 262
    Request permission for commercial reuse | PDF file iconPDF (1540 KB)
    Freely Available from IEEE
  • Multi-label text categorization based on feature optimization using ant colony optimization and relevance clustering technique

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2487 KB) | HTML iconHTML

    Feature optimization and feature selection play an important role multi-label text categorization. In multi-label text categorization multiple features share a common class and the process of classification suffered a problem of selection of relevance feature for the classification. In this paper proposed feature optimization based multi-label text categorization. The process of feature optimizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum computer architectures: An idea whose time is not far away

    Publication Year: 2015, Page(s):6 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2999 KB) | HTML iconHTML

    Current day computers are increasingly getting limited in hardware due to deep sub-micron effects which may prevent finer gate widths. Parallel computing methods with a large number of cores can only give a linear speed up. Quantum computing is an attempt to unite Quantum mechanics and information science together to achieve next generation computation. Quantum computers have simultaneity and para... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient implementation of generalized extreme studentized deviate (GESD) on field programmable gate array (FPGA)

    Publication Year: 2015, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3034 KB) | HTML iconHTML

    Outliers are one of the data problem which cannot be overlooked. The problem arise from the possibility of the outliers to become a bad data which can lead to error. One of the technique for identifying as well as eliminating outliers is generalized extreme student deviate (GESD). In this research the implementation of GESD on FPGA is examined. There are two complicated operations on GESD, i.e. di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning semantic segmentation score in weakly supervised convolutional neural network

    Publication Year: 2015, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3793 KB) | HTML iconHTML

    Semantic segmentation is an image labeling process for each pixels according to defined objects class and its presence in an image. Labeling process consists of recognizing, detecting location and labeling pixels that defines the object in the image. Annotation result of semantic segmentation needs ground truth to verify accuracy of score prediction. Therefore, this research propose a model to pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of user behaviour sensitive Kannada keyboard

    Publication Year: 2015, Page(s):26 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    This India has emerged as $4.5 billion market till 2015. This article focuses to study and produce a novel method to for increasing the usage of smart gadget users in a multilingual country like India. The accurate mechanism proposed in this article concentrates on two aspects of the prediction one of them is, to suggest the user with the words which have been largely used in the database by keepi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for mining closed weighted sequential patterns with flexing time interval for medical time series data

    Publication Year: 2015, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2982 KB) | HTML iconHTML

    In this paper, an algorithm for mining the nonredundant closed weighted sequential patterns with flexible time intervals for the medical time series data is proposed. Initially, the sequence weight for each sequence is calculated based on the time interval between the itemsets and subsequently the candidate sequences are generated with flexible time intervals. The next step is, computation of freq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A completely efficient charge recovery adiabatic logic content addressable memory

    Publication Year: 2015, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1166 KB) | HTML iconHTML

    This paper presents the design of a complete Energy Efficient Charge Recovery Adiabatic Logic Content Addressable Memory using the energy recycling principle of adiabatic logic. Generally, in the design of adiabatic CAM, the storage array is built by using a basic CAM cell but the decoders which drives the bit lines and word lines are realized by using different adiabatic logic structures such as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of classification algorithms for predicting gestational risks in pregnant women

    Publication Year: 2015, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Pregnant women must be protected from complications during the period of gestation which is a stage every woman undergoes many physiological changes, sometimes inducing complications that may turn severe and lead to death of both mother and fetus. Classification methods are popularly used method whose algorithms are best suitable in medical diagnosis. Among them C4.5 Decision Tree algorithm and Na... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M5 model tree and gene expression programming for the prediction of metrological parameters

    Publication Year: 2015, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2981 KB) | HTML iconHTML

    Metrological parameter prediction is an important task carried out by metrological researchers and water resource analyst for the estimation of water demand, water resource planning, management and operation. Accurate predictions of these parameters are still an open problem. M5 model tree and gene expression programming are two popular machine learning techniques which are considered as white-box... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible FPGA-to-FPGA interconnect interface design and implementation

    Publication Year: 2015, Page(s):52 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3039 KB) | HTML iconHTML

    In FPGA-based SoCs, interconnect bus such as PCIe and Ethernet has a separate physical layer and physical layer interface. The physical layer (PHY) consumes quite a few power consumption and area overhead. In this paper, we propose a flexible interconnect interface (Unified PHY Interface, UPI) based on FPGA and describe its design. More specifically, UPI can parse various packets automatically by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-step GA for better results

    Publication Year: 2015, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3340 KB) | HTML iconHTML

    GA (Genetic Algorithm) returns a little different optimization results each time GA runs, caused by its stochastic nature. How do we get better results which means the optimization result as close to the actual minimum/maximum as possible by GA? The paper presents a trial method, as a practical optimizing strategy for GA, called multi-step GA to get the better optimization result than that result ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer requirements oriented component based software development life cycle model

    Publication Year: 2015, Page(s):61 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3242 KB) | HTML iconHTML

    Today software development is a big challenge due to market policy, cost, quality and most importantly customer satisfaction. But the conventional system development is not enough to fulfill those requirements. It needs a new method of solution to overcome those challenges. Component Based Software Engineering (CBSE) can be a solution, in where Component Based Software development (CBSD) is a proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A view selection method based on particle swarm optimization

    Publication Year: 2015, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    An automatic viewpoint selection method based on the particle swarm optimization is proposed in this paper. The method introduces artificial intelligent techniques to design transfer function and select optimal viewpoint. By the method, the search for the transfer function and the optimal viewpoint are reformulated as a global optimization problem to decrease the reluctant interactions and computa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fusion design method of transfer function

    Publication Year: 2015, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    The fusion design of the transfer function is a new kind of transfer function design technology that the complex transfer function can be obtained from the multiple simple transfer functions. In this paper, a fusion method based on particle swarm optimization is proposed. The method transforms the fusion of multiple transfer functions into a global optimization problem, whose parameters are the fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of linear phase IIR digital diff-integrators

    Publication Year: 2015, Page(s):77 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3322 KB) | HTML iconHTML

    This paper presents a new kind of multi-purpose filter which acts as a differentiator in lower half of the Nyquist frequency range and as an integrator in upper half of the Nyquist frequency range, and vice-versa. Thus, same filter can be used as a differentiator as well as an integrator in different frequency bands. The transfer functions of the proposed systems have infinite impulse response (II... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of LTE UE RF parameters for 3GPP specification

    Publication Year: 2015, Page(s):82 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3011 KB) | HTML iconHTML

    The 3GPP Specification TS 36.521-1 Radio Transmission and Reception LTE User Equipment (UE) conformance specification defines the measurement practices for LTE terminals with regard to their transmitter and receiver characteristics along with performance characteristics, as a part of the 3GPP Long Term Evolution(LTE) standard. This paper gives brief description about the RF key factors of LTE UE a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel crescent shaped slot UWB antenna with band notch characteristics

    Publication Year: 2015, Page(s):87 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3137 KB) | HTML iconHTML

    A novel compact ultra-wideband (UWB) antenna with wideband and band notch characteristics is presented. Simulation of the designs is done using HFSS 12.1 and the return loss parameters of the two designs along with radiation patterns are presented. The wideband design is an omega type structure which gives a wide band width of approximately 8.3 GHz from 2.6Ghz to 10Ghz. Notched band characteristic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and evaluation of hybrid intrusion detection system models

    Publication Year: 2015, Page(s):93 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2855 KB) | HTML iconHTML

    Detecting intrusions is becoming an important and yet challenging task in information systems. This led to an increasing need for efficient methods of recognising intrusions in order to protect the systems. Existing models of intrusion detection systems (IDS) have produced significant performance but often possesses the inability for detecting multilevel classes of attacks coupled with high traini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA implementation of WSLCE sequence for GNSS applications

    Publication Year: 2015, Page(s):98 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2996 KB) | HTML iconHTML

    Pseudo Random Sequence is used in Spread spectrum system. One such PRN sequence, SLCE (Sidelnikov, Lempel, Cohn, Eastman), is studied in this paper. The SLCE sequence is used in Global Navigation Satellite System(GNSS) as the spreading sequence. By studying the Weil Sequence along with SLCE sequence, a class of Binary PRN sequence called Weil-SLCE(WSLCE) is implemented on Kintex 7 FPGA. The auto c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of GTS allocation in IEEE 802.15.4 with CSMA/CA for Wireless Sensor Network

    Publication Year: 2015, Page(s):103 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2165 KB) | HTML iconHTML

    IEEE 802.15.4 protocol proposes a flexible communication solution for Low-Rate Wireless Personal Area Networks (LR-WPAN) including sensor networks. Timeliness guarantee is an important feature of the recently standardized IEEE 802.15.4 protocol, making it very much appealing for Wireless Sensor Network applications under timing constraints. Guaranteed Time Slot (GTS) is defined by IEEE 802.15.4 MA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.