# 2010 IEEE International Conference on Computational Intelligence and Computing Research

## Filter Results

Displaying Results 1 - 25 of 205
• ### [Title page]

Publication Year: 2010, Page(s): i
| PDF (49 KB)
• ### [Copyright notice]

Publication Year: 2010, Page(s): ii
| PDF (27 KB)
• ### Recognizing signs of malignancy — The quest for computer assisted cancer screening and diagnosis systems

Publication Year: 2010, Page(s):1 - 6
Cited by:  Papers (7)
| | PDF (1559 KB) | HTML

Almost all cancers are diagnosed through visual examination of microscopic tissue samples. Visual screening of cell samples, so called PAP-smears, has drastically reduced the incidence of cervical cancers in countries that have implemented population wide screening programs. But the visual examination is tedious, subjective and expensive. There has therefore been much research aiming for computer ... View full abstract»

• ### A general algorithm to design sets of all possible one dimensional unipolar orthogonal codes of same code length and weight

Publication Year: 2010, Page(s):1 - 7
Cited by:  Papers (2)
| | PDF (409 KB) | HTML

This paper describe a general scheme to design all the uni-polar codes characterized by parameter (n, w). The binary sequence of length n' (n' bits) and weight w' (number of bit 1's in the sequence) with its n-1 circular shifted versions represent the same code. These codes can be further put in different subsets characterized by (n, w, λa, λc), where ;... View full abstract»

• ### A new deterministic fault tolerant wormhole routing strategy for k-ary 2-cubes

Publication Year: 2010, Page(s):1 - 7
Cited by:  Papers (2)
| | PDF (133 KB) | HTML

Multicomputers have experienced a rapid development during the last decade. Multicomputers rely on an interconnection network among processors to support the message-passing mechanism. Therefore, the reliability of the interconnection network is very important for the reliability of the whole system. In this paper a new fault-tolerant routing algorithm, which is based on dimension order routing, i... View full abstract»

• ### A new sign normalized block based adaptive decision feedback equalizer for wireless communication systems

Publication Year: 2010, Page(s):1 - 6
| | PDF (103 KB) | HTML

Decision feedback equalizers are used in wireless and mobile communications to reduce the intersymbol interference that is caused by the time dispersive channel. Here, an adaptive decision feedback equalizer is presented with a new adaptive algorithm. The algorithm uses sign normalized block based least mean square algorithm, and achieves a significant reduction of computational complexity. The pr... View full abstract»

• ### A performance study of a consensus clustering algorithm and properties of partition graph

Publication Year: 2010, Page(s):1 - 5
| | PDF (70 KB) | HTML

By applying several clustering algorithms to a dataset E or the same algorithm with different parameters, we get several partitions of the dataset E. The problem of finding the best partition among these partitions is considered in this paper. The best partition, also called as consensus partition, minimizes the average number of disagreements between all the partitions. The first step consists of... View full abstract»

• ### A QoS routing protocol for mobile ad hoc networks based on the load distribution

Publication Year: 2010, Page(s):1 - 6
Cited by:  Papers (2)
| | PDF (429 KB) | HTML

In mobile ad hoc networks, routing protocol area is a challenging issue. In spite of recent research, MANETs lack load balancing capabilities, and thus, they fail to provide expected performance especially in the case of a large volume of traffic such as real time traffic. In this paper, we propose a simple but very efficient algorithm to support Quality of Service (QoS), by the use of load-distri... View full abstract»

• ### A novel region growing segmentation algorithm for the detection of breast cancer

Publication Year: 2010, Page(s):1 - 4
Cited by:  Papers (6)
| | PDF (94 KB) | HTML

As medical images are mostly fuzzy in nature, segmenting regions based intensity is the most challenging task. Segmentation of medical images using seeded region growing technique is increasingly becoming a popular method because of its ability to involve high-level knowledge of anatomical structures in seed selection process. In this paper, we have made improvements in region growing image segmen... View full abstract»

• ### An empirical model for clustering and classification of instrumental music using machine learning technique

Publication Year: 2010, Page(s):1 - 7
| | PDF (483 KB) | HTML

To extract implicit knowledge and data relationships from the audio and audio similarity measure, this paper uses the audio mining techniques. A model for audio clustering and classification technique is proposed. Neural networks are used for classifying the data. The working prototype of the Music classification system has been developed and tested in MATLAB 6.5 using the signal Processing Toolbo... View full abstract»

• ### An energy efficient cluster based node scheduling protocol for wireless sensor networks

Publication Year: 2010, Page(s):1 - 5
| | PDF (137 KB) | HTML

The Wireless sensor network (WSN) is a type of the wireless ad-hoc networks. It consisting of a large number of sensors is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited power, it is a great challenging aim to design an energy efficient routing protocol, which can minimize the delay while offering high-energy efficiency and long span of n... View full abstract»

• ### An enhanced algorithm for Character Segmentation in document image processing

Publication Year: 2010, Page(s):1 - 5
Cited by:  Papers (3)
| | PDF (448 KB) | HTML

Optical Character Recognition consists of various steps like skew detection, segmentation of columns, lines, words, and characters before feeding the isolated character to an optical character recognition system. Several methodologies are followed to perform these steps using conventional Hough Transformation. In this paper, a new algorithm is proposed to perform all those steps involved in docume... View full abstract»

• ### An evolutionary computation based approach for reduced order modelling of linear systems

Publication Year: 2010, Page(s):1 - 8
Cited by:  Papers (10)
| | PDF (476 KB) | HTML

A new model order reduction algorithm taking the advantages of reciprocal transformation and principal pseudo break frequency estimation is presented. The denominator polynomial is constructed using the approximate dominant poles obtained. Ultimately the denominator polynomial formation is based on simple calculations involving high order system characteristic polynomial. Numerator polynomial is t... View full abstract»

• ### An overview of cryptographic solutions to web security

Publication Year: 2010, Page(s):1 - 5
| | PDF (76 KB) | HTML

The Internet is huge and largely unregulated place. There are a lot of dangers in putting up a web page on Internet. These vary from invasions of privacy to hackers cracking our system. One of the most important issues in traditional and modern network architecture is security. Web security is a vast area encompassing computer system security, network security, authentication services, message val... View full abstract»

• ### An unmanned aerial vehicle as human-assistant robotics system

Publication Year: 2010, Page(s):1 - 6
| | PDF (897 KB) | HTML

According to the American Heritage Dictionary, Robotics is the science or study of the technology associated with the design, fabrication, theory, and application of Robots. The term Hoverbot is also often used to refer to sophisticated mechanical devices that are remotely controlled by human beings even though these devices are not autonomous. This paper describes a remotely controlled hoverbot b... View full abstract»

• ### Analysis of Markov model on different web Prefetching and caching schemes

Publication Year: 2010, Page(s):1 - 6
| | PDF (646 KB) | HTML

The World Wide Web is growing rapidly in terms of number of users and number of web application. With this growth the response time of retrieving the web document is increasing. User's experience on the internet can be improved by minimizing user's web access latency. This can be done by predicting the next step taken by user towards the accessing of web page in advance, so that the predicted web ... View full abstract»

• ### Analysis of Sieve of Eratosthenes method using MPI program over grid and cluster platforms using stastical DOE methodology

Publication Year: 2010, Page(s):1 - 4
| | PDF (139 KB) | HTML

This work evaluates the performance of block based Sieve of Eratosthenes method over cluster and LAN grid platform using Design of Experiments Methodology. The MPI Implementation of Sieve of Eratosthenes method in the form of prime number programs are experimented as per the DOE full factorial method. The main idea of applying DOE is to identify how job completion time of “Sieve of Eratosth... View full abstract»

• ### Biometric security system based on signature verification using neural networks

Publication Year: 2010, Page(s):1 - 6
Cited by:  Papers (3)
| | PDF (170 KB) | HTML

The signature verification is the behavioral parameter of biometrics and is used to authenticate a person. A typical signature verification system generally consists of four components: data acquisition, preprocessing, feature extraction and verification. In this paper, Biometric Security System Based on Signature Verification Using Neural Networks (BSSV) is presented. The global and grid features... View full abstract»

• ### Certain investigations on video scene segementaion techniques

Publication Year: 2010, Page(s):1 - 4
Cited by:  Papers (2)
| | PDF (197 KB) | HTML

In this paper we propose temporal and optimized video scene segmentation techniques. Temporal video scene segmentation methods aims to partition the video to elementary image sequences termed scenes. The main purpose of video scene segmentation is to extract objects from series of consecutive video frames. One important goal in video analysis is to group the shots, such that all shots in a single ... View full abstract»

• ### Least and Most significant Bit Arbitration algorithm in uniform distributed passive RFID tags

Publication Year: 2010, Page(s):1 - 4
| | PDF (87 KB) | HTML

Tag Collisions in RFID systems is a prime issue which causes identification delay and data loss. This paper presents an efficient algorithm called Least and Most significant Bit Arbitration (LaMSBA) to reduce idle and collision slots. The algorithm makes the reader to take full advantage when ever a collision occurs by constructing a partial tree for multiple tags, which in turn prevents redundanc... View full abstract»

• ### Cluster based packet loss prediction using packet lost segment in wireless network

Publication Year: 2010, Page(s):1 - 4
| | PDF (77 KB) | HTML

Congestion in wireless network is primarily due to the lower bandwidth in the wireless portion of the network compared to the wired portion of the network. Extensive planning has to be made on the wireless network side as it is difficult to predict the number of nodes connecting to the network at a given period of time. In this paper we study the correlation of the packet lost segment flag with re... View full abstract»

• ### Efficient ensemble algorithm for mixed numeric and categorical data

Publication Year: 2010, Page(s):1 - 4
| | PDF (616 KB) | HTML

Most previous clustering algorithms focus on numerical data whose inherent geometric properties can be exploited naturally to define distance functions between data points. However, much of the data existed in the databases is categorical, where attribute values cannot be naturally ordered as numerical values. Due to the differences in the characteristics of these two kinds of data, attempts to de... View full abstract»

• ### Combining visual features of an image at different precision value of unsupervised content based image retrieval

Publication Year: 2010, Page(s):1 - 4
Cited by:  Papers (10)
| | PDF (173 KB) | HTML

Image Retrieval is a technique of searching, browsing, and retrieving the images from an image database. There are two types of different image retrieval techniques namely text based image retrieval and content based image retrieval techniques. Text-Based image retrieval uses traditional database techniques to manage images. Content-based image retrieval (CBIR) uses the visual features of an image... View full abstract»

• ### Comparative study of engineering problem-solving models

Publication Year: 2010, Page(s):1 - 5
Cited by:  Papers (4)
| | PDF (83 KB) | HTML

Models of the cognitions used by engineering students to solve problems have always been a part of engineering education. Many, such as the engineering mechanics model (select free-body, draw vector diagram, write equilibrium equations, and solve equilibrium equations), have been part of the introduction of students to engineering topics for a long time. More recently, student problem-solving proc... View full abstract»

• ### Comparison of vertical handoff decision scheme in heterogeneous wireless network

Publication Year: 2010, Page(s):1 - 5
| | PDF (187 KB) | HTML

One of the most challenged area in fourth generation wireless network is service continuity, i.e., when a mobile node is moving in an overlapping area continuous service must need so there a technique is used called “HANDOVER”. This technique is used to achieve the service continuity, for this we must rely on seamless vertical handover techniques with minimum processing delay. Thus i... View full abstract»