2015 Fifth International Conference on Advances in Computing and Communications (ICACC)

2-4 Sept. 2015

Filter Results

Displaying Results 1 - 25 of 116
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (724 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Message from Chairs

    Publication Year: 2015, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (225 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Design Defect Diagnosis in a Buggy Model of SPARC T1 Processor Using Random Test Program Generator

    Publication Year: 2015, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Verification has indisputably become the primary challenge today with recent industry studies estimating that half of all chips manufactured require one or more re-spins. Ideally the performance of the design should be verified for all possible circumstances under which it might be operated in the real world. Unfortunately, it requires a long time to generate and run test sequences. Under the time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithmic Approach for General Video Summarization

    Publication Year: 2015, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    In the current world, multimedia has a significant role in communicating information. Videos can convey more information. Two drawbacks of the video make it inconvenient in some circumstances. First, it requires more storage. Second, we require watching a video completely to identify the content, which takes too much time. Our proposed work makes the video easy to use by solving these issues. We a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tamil to Malayalam Transliteration

    Publication Year: 2015, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Transliteration forms an essential part of transcription which converts text from one writing system to another. The need for translating data has become larger than before as the world is getting together through social media. Machine transliteration has emerged as a part of information retrieval and machine translation projects to translate named entities, that are not registered in the dictiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HiPAD: High Performance Adaptive Deflection Router for On-Chip Mesh Networks

    Publication Year: 2015, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    The efficiency of a router in a Network on Chip (NoC) is characterised by good performance, minimum packet latency, area and power. In this paper, we propose an adaptive deflection router for mesh NoC which offers higher speed of operation by reducing the router critical path latency. We propose a single cycle router that uses an intelligent decision making logic to store deflected flits in minimu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of NTCIP in Road Traffic Controllers for Traffic Signal Coordination

    Publication Year: 2015, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    National Transportation Communication for Intelligent Transportation System Protocol (NTCIP) is a family of open standards, defining common communications protocols and data definitions for transmitting data and messages between computer systems used in Intelligent Transportation Systems (ITS). The Intelligent Transportation Systems make use of Information Technology, Computers, Telecommunication ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Ethernet Architecture Using SDN by Suppressing Broadcast Traffic

    Publication Year: 2015, Page(s):24 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    The simplicity and high performance-to-cost ratio make Ethernet, the most dominant and widely deployed LAN technology. But, a single Ethernet network cannot scale to large networks such as enterprise, campus, data center and wide area networks because of broadcast based services like Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP). The Software-Defined Networking (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of Particle Filters for Single Target Tracking Using CUDA

    Publication Year: 2015, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    In order to implement Sequential Bayesian estimator using Monte carlo simulation and to get rid of limitations of Kalman filter, Particle filtering techniques plays a very crucial role for target tracking applications in state space where Importance sampling approximately distributed by posterior distribution with multimodel feature and robustness to noise. However as the particles becomes very la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilingual Online Handwriting Recognition System: An Android App

    Publication Year: 2015, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (718 KB) | HTML iconHTML

    On-line handwriting recognition means recognizing the user's handwriting as the user is writing the character/stroke, i.e. the recognition is concurrent to the writing process. This paper describes a Multilingual Online handwriting recognition system in Android using SFAM Artificial Neural Network Technique. The app allows the user to select any of the target languages supported. The handwriting s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-posture Human Detection Based on Hybrid HOG-BO Feature

    Publication Year: 2015, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Human detection in images is a fast growing and challenging area of research in computer vision with its main application in video surveillance, robotics, intelligent vehicle, image retrieval, defense, entertainment, behavior analysis, tracking, forensic science, medicalscience and intelligent transportation. This paper presents a robust multi-posture human detection system in images based on loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the Accuracy of Movie Recommendation System Based on Probabilistic Data Structure and Graph Database

    Publication Year: 2015, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    User-based Collaborative-filtering (CF) which uses the matrix to store the ratings of the user, is the most frequently used recommender technique, widely used because of its simplicity and efficient performance. Although it is extensively used, one of its major problems is that its performance decreases when the user-item matrix becomes sparse. This paper provides a novel technique to overcome spa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Associative Memory Model for Distorted On-Line Devanagari Character Recognition

    Publication Year: 2015, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Machine and human interaction is very essential in today's scenario. This interaction would make search engines, social media, artificial intelligence, cognitive computing more interactive and user friendly. Handwriting recognition is the systematic process of identifying the characters, numbers and symbols present in the handwritten document. In the current work, a recognition model for digitizin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forecasting of Significant Wave Height Using Support Vector Regression

    Publication Year: 2015, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    The reliability of wave prediction is a crucial issue in coastal, harbor and ocean engineering. Support vector machine (SVM) is an appropriate and suitable method for significant wave height (Hs) prediction due to its best versatility, robustness, and effectiveness. In this present work, only significant wave height (Hs) of previous time steps were used as predictors during the period 01-01-2004 t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning of Generic Vision Features Using Deep CNN

    Publication Year: 2015, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Eminence of learning algorithm applied for computer vision tasks depends on the features engineered from image. It's premise that different representations can interweave and ensnare most of the elucidative genes that are responsible for variations in images, be it rigid, affine or projective. Hence researches give at most attention in hand-engineering features that capture these variations. But p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Interval Valued Intuitionistic Fuzzy Soft Set in Investment Decision Making

    Publication Year: 2015, Page(s):61 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Research on soft computing techniques have been developed rapidly since it can be applied easily to several areas like artificial intelligence, computer science, medical science, machine learning, information technology, economics, environments, engineering, among others. In this study, we introduce an investment decision making procedure for solving investment decision making formed by interval v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Cautious Adaptive Random Early Detection for Heterogeneous Network

    Publication Year: 2015, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Heterogeneous Network consists of wired and wireless network. In these networks, congestion control and quality of service is major issue. Due to this issues, delay and jitter are increased which decreases the performance of network. For reducing this issues there are various queue management techniques which are classified as Active Queue Management and Passive Queue Management. AQM consists of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Ranking in Triangular Intuitionistic Fuzzy Multi-criteria Decision Making under (a, ß)-cut with 'Useful' Parametric Entropy

    Publication Year: 2015, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    In the present communication, we have applied the concept of Triangular Intuitionistic Fuzzy Numbers (TIFNs) to the study of a Multiple Criteria Decision Making (MCDM) problem for finding the best alternative where the linguistic variables for the criteria are intuitively predefined in the form of TIFNs. On the basis of decision maker's qualitative opinions as well as the management's opinions to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.