2016 International Conference System Modeling & Advancement in Research Trends (SMART)

25-27 Nov. 2016

Filter Results

Displaying Results 1 - 25 of 77
  • [Front cover]

    Publication Year: 2016, Page(s): i
    Request permission for reuse | PDF file iconPDF (720 KB)
    Freely Available from IEEE
  • Acknowledgments

    Publication Year: 2016, Page(s): ii
    Request permission for reuse | PDF file iconPDF (566 KB)
    Freely Available from IEEE
  • Chief patrons

    Publication Year: 2016, Page(s): iii
    Request permission for reuse | PDF file iconPDF (2785 KB)
    Freely Available from IEEE
  • Advisory board

    Publication Year: 2016, Page(s):iv - ix
    Request permission for reuse | PDF file iconPDF (2524 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2016, Page(s): x
    Request permission for reuse | PDF file iconPDF (1015 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2016, Page(s):xi - xiv
    Request permission for reuse | PDF file iconPDF (2012 KB)
    Freely Available from IEEE
  • Track 1: Algorithms and computational mathematics

    Publication Year: 2016, Page(s): 1
    Request permission for reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Agile approach for Software Testing process

    Publication Year: 2016, Page(s):3 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (6806 KB) | HTML iconHTML

    As per the finding of Agile development, Testing is recognized not to be a separate phase, but an integral part of Software Development with the Coding. “Whole-team” approach is being used by Agile team to “baking quality in” to the Software Product. Agile team containing the Testers, who lend their expertise in eliciting examples of desired behavior from customers. They collaborate with the devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Apriori Algorithm for frequent itemset mining

    Publication Year: 2016, Page(s):7 - 13
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (7800 KB) | HTML iconHTML

    Obtaining frequent itemsets from the dataset is one of the most promising area of data mining. The Apriori algorithm is one of the most important algorithm for obtaining frequent itemsets from the dataset. But the algorithm fails in terms of time required as well as number of database scans. Hence a new improved version of Apriori is proposed in this paper which is efficient in terms of time requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel approach for classification of stress EEG data using statistical techniques

    Publication Year: 2016, Page(s):14 - 16
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4257 KB) | HTML iconHTML

    Many people undergo from the stress in their everyday life. Due to there close relationship between the stress, mental health and psychological aspect. Stress management using EEG data is very challenging task. In this paper, classification of EEG data is done by using statistical techniques like, mean, standard deviation, variance and correlation. This algorithm got the 0.0056 correlation which i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical image compression using Embedded Zerotree Wavelet (EZW) coder

    Publication Year: 2016, Page(s):17 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (8725 KB) | HTML iconHTML

    The aim of this paper is to investigate and explore the viability of Embedded Zerotree (EZW) wavelet coder for therapeutic and medical image compression and high lights its performance based on quality evaluation measurements comparing to Mean square Error (MSE), Bit per pixel (BPP), Peak Signal to Noise Ratio (PSNR) and Compression Ratio (CR) for a particular set of medical images of different mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal test sequence generation using River Formation Dynamics

    Publication Year: 2016, Page(s):24 - 31
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (8074 KB) | HTML iconHTML

    Software testing is a complex and exhaustive process, often limited by the resources. Although many approaches for test sequence generation exist in the literature, but none of it is ideal as far as coverage and redundancy is concerned. This paper aims at improving the efficiency of software testing process by generating the optimal test sequences in the control flow graph (CFG) of the program und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposing a New ANN model for solving XNOR problem

    Publication Year: 2016, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (5182 KB) | HTML iconHTML

    Artificial neural network (ANN) are a family of models which are having inspiration from the biological neural network. The goal of an ANN system is to develop algorithms that requires machines to perform cognitive task in an efficient manner using the computing power of the Computer Systems. A variety of problems are solved by various types of ANN systems. In ANN system, the problems that are hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance based comparison of various symmetric cryptographic algorithms in run-time scenario

    Publication Year: 2016, Page(s):37 - 41
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (5706 KB) | HTML iconHTML

    Today, with a wide use of internet all across the globe where it has become a significant tool of commerce, security and protection of information becomes a vital issue to deal with. Cryptography is a historical art and in basic terms it refers to the science of writing in secret and covert code. The first use of it dates back to centuries ago. Without any surprise, with the widespread development... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shaping flexible software development with Agent-Oriented methodology

    Publication Year: 2016, Page(s):42 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2533 KB) | HTML iconHTML

    Since, both the business and technological environments changed at an increasing rate, flexibility has become a main and important reason for project management in software developing regions. Methodology plays a significant role in flexible development of software. However, the question is, How should we do it? The web technology, communicating network technologies and system hardware is in rapid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role of Evolutionary algorithms in Software Reliability Optimization

    Publication Year: 2016, Page(s):45 - 48
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2778 KB) | HTML iconHTML

    Software Reliability is an important feature of software quality, like other quality attribute as functionality, usability, performance, serviceability, maintainability, documentation etc. This Software reliability optimization is very important in software development field. Lots of software reliability models have been specified in last few years. This paper reviews the different Evolutionary al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vector Quantization with codebook and index compression

    Publication Year: 2016, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (8020 KB) | HTML iconHTML

    This paper presents a hybrid (lossless and lossy) technique for image vector quantization. The codebook is generated in two steps. 1. The training set is sorted based on the magnitudes of the training vectors. 2. From the sorted list, training vector from every n<sup>th</sup> position is selected to form the codevectors. Followed by that, centroid computation with clustering is done by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DES: The oldest symmetric block key encryption algorithm

    Publication Year: 2016, Page(s):53 - 58
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (5771 KB) | HTML iconHTML

    Cryptography is a part of Cryptology; which deals with reading, writing and breaking of code. Cryptography is a technique used to camouflage the message into some unreadable text. It is a way of ensuring security when transmitted through an insecure channel. An insecure channel is that channel, where unethical hacking, tampering of information is easily possible. Encryption is a process which enci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Association redetection of Regular insulin and NPH insulin using statistical features

    Publication Year: 2016, Page(s):59 - 62
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2540 KB) | HTML iconHTML

    Diabetes Mellitus (DM), commonly referred as diabetes is a disorder that most of the people suffer from and which also leads to death many of the times. Type 1, Type 2 and Gestational diabetes are the types of diabetes. The present study is of patients suffering from Type 1 DM. In Type 1 diabetes a patient has to take external insulin to maintain the blood glucose level (BGL). Insulin is a hormone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blur image detection using Laplacian operator and Open-CV

    Publication Year: 2016, Page(s):63 - 67
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (9526 KB) | HTML iconHTML

    With the increased usage of digital cameras and picture clicking devices, the number of digital images increases rapidly, which in return demand for image quality assessment in terms of blur. Based on the edge type and sharpness analysis using Laplacian operator, an effective representation of blur image detection scheme is proposed in this paper, which can determine that whether the image is blur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling algorithm with plotter in cloud environment

    Publication Year: 2016, Page(s):68 - 70
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2699 KB) | HTML iconHTML

    Cloud computing is a rising technology. Scheduling techniques performs a major role in clouds because it process vast amount of data. We design a protocol to reduce the execution time and maximize the throughput and improve the performance of the server and also try to reduce the drawback of the existing protocols. We use the priority based load balancing algorithm based on the nature of the job t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A literature survey for fuzzy based soft classification techniques and uncertainty estimation

    Publication Year: 2016, Page(s):71 - 75
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3595 KB) | HTML iconHTML

    Remote sensing is a popular and fast way to acquire information on geographic surface. The multispectral images are main source of information on geo-surface. Classification is used to obtain this data and constructing maps. In general, the classification is crisp and assigns a single class to each image elements or pixel, known as hard classification. However, there is another consequence that so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Track 2: Machine learning and optimization

    Publication Year: 2016, Page(s): 1
    Request permission for reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Global LBP features for Iris Recognition using blood vessel segmentation

    Publication Year: 2016, Page(s):79 - 83
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (6453 KB) | HTML iconHTML

    Iris Recognition is found to be one of the most reliable and efficient technique for biometrics identification. In this paper iris recognition using blood vessel segmentation is proposed. After blood vessel segmentation, the segmented iris image is recognized using global texture features. The GLCM, Gabor and Local Binary Patterns are used for feature extraction. The for training of the extracted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Intelligence using Data Mining techniques and Business Analytics

    Publication Year: 2016, Page(s):84 - 89
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4368 KB) | HTML iconHTML

    The objective of this paper is to present a review literature on what are impacts of Data Mining (DM) in Business Intelligence (BI). The paper highlights various features of DM. It involves three steps: explorations, pattern identification and deployment. BI is the hot topic among all industries aiming for relevance. BI emphasizes on detail integration and or organizing of data. DM and BI work tog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.