Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2007052acmconferencesBook PagePublication PagesacaiConference Proceedingsconference-collections
ACAI '11: Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ACAI '11: International Conference on Advances in Computing and Artificial Intelligence Rajpura/Punjab India July 21 - 22, 2011
ISBN:
978-1-4503-0635-5
Published:
21 July 2011
Sponsors:

Reflects downloads up to 14 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

The Department of Computer Science & Engineering, Chitkara Institute of Engineering, welcomes its distinguished delegates and guests to the International Conference on Advances in Computing and Artificial Intelligence, ACAI 2011 on July 21--22, 2011.

The conference has received overwhelming response from international and national research scholars, and professionals. Over 300 papers covering the main themes of the conference were received electronically. The papers published in these proceedings and to be presented during the conference were selected after a thorough review process. The papers were selected on the basis of originality, clarity and relevance to the theme of the conference. The conference aims to provide a platform for faculty, researchers and designers from academia and industry to present their research ideas, share their experiences, and challenges in the field of Computing, and Artificial Intelligence. The Conference program will include invited lectures by experts in the field. The program will favor interaction amongst participants, who belong to different areas both professionally-academics, research, industry and geographically.

research-article
A comparative study of UML tools

In these days many tools appear in market to support building system. Thus choosing the best tools need to know the most important features of it. Today UML consider as a de facto standard in software development and is used in many domains ranging from ...

research-article
Study of text based mining

Text based Mining is the process of analyzing a document or set of documents to understand the content and meaning of the information they contain. Text Mining enhances human's ability to Process massive quantities of information and it has high ...

research-article
Educational web sites accessibility design model

Web sites accessibility is a basic requirement to protect everyone's equal right of accessing the information in information society. These days it becomes mandatory that all kinds of vulnerable groups should be able to access information and acquire ...

research-article
Automated taxi/cab system using A* algorithm

An Automated Taxi Dispatch System with Multi-agent approach [8] [10] is intends to serve all the customers in distributed fashion. The Automated Taxi System is a location based, traffic-sensing approach that incorporate distributed taxi booking and ...

research-article
Distributed smart camera network and mobile devices

Smart Camera Network [4] enables us to detect, classify, and trace visual events by means of a communication network channel of embedded computing devices equipped with camera sensors. Distributed smart cameras [2] use distributed computing ...

research-article
Scene flow estimation from stereo video source

There are various methods to estimate the scene flow. Most of the methods use motion estimation with stereo re-construction. This paper describes an interesting way to fuse the video from two camera's and create a 3D reconstruction. The proposed ...

research-article
Security policy implementation using connection and event log to achieve network access control

Network as well as Host security has become an essential requirement to guard important network resources against unauthorized and unauthenticated access. The reason is that due to technology advancements, the threats and attacks are becoming all the ...

research-article
Intrusion detection system using honeypots and swarm intelligence

As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to ...

research-article
Analysis of various swarm-based & ant-based algorithms

Ant algorithms and swarm intelligence systems have been offered as a novel computational approach that replaces the traditional emphasis on control, preprogramming and centralization with designs featuring autonomy, emergence and distributed ...

research-article
Performance evaluation on segmentation methods for medical images

This paper presents the performance evaluation of different segmentation algorithms for medical images. Accuracy and clarity are very important issues for medical imaging and same in the case with segmentation. In this paper, we have proposed a level ...

research-article
DMX in MANETs: major research trends since 2004

The last decade has witnessed a tremendous increase in the popularity of mobile ad hoc networks (MANETs). The major computing challenges of distributed environment become more insidious when we try to address them in mobile ad hoc scenario. The ...

research-article
Efficient fault tolerant consensus using preemptive token

The problem of agreement has been widely studied by many research groups in crash-stop as well as Byzantine model for distributed transaction systems. In one of our previous works [12], we assumed a trustworthy Transaction Manager, TM amenable to the ...

research-article
A hybrid method for 3D face localization

Face localization is always a challenging job for a good recognition scheme. If process has to be done for 3D faces, it is quit difficult to localize faces. In this paper we provide a face localization scheme which is based on Average Threshold Value (...

research-article
Topic tracking techniques for natural language processing

Text mining is a field that automatically extracts previously unknown and useful information from unstructured textual data. It has strong connections with natural language processing. NLP has produced technologies that teach computers natural language ...

research-article
An efficient broker cloud management system

In Cloud Computing Architecture, Brokers are responsible for providing applications to end user from Clouds. To manage Broker Cloud Communication, an efficient management infrastructure is required which also take care for cost and time to get ...

research-article
Integrated design space exploration based on power-performance trade-off using genetic algorithm

This paper presents a novel approach for Design Space Exploration (DSE) of integrated scheduling, allocation and binding in High Level Synthesis based on user specified power consumption and execution time constraints using multi structure Genetic ...

research-article
Application specific processor vs. microblaze soft core RISC processor: FPGA based performance and CPR analysis

In all application domains of multimedia, communication and network processing where huge amount of data processing at desired performance and power consumption are a mandatory prerequisite for successful functioning; the system architects have to find ...

research-article
Crank-Nicolson scheme to transient MHD free convective flow through semi-infinite vertical porous plate with constant suction and temperature dependent heat source

In this paper, we are considering transient MHD free convective flow through an isothermal semi-infinite vertical porous plate with temperature dependent heat source. The governing equations have been solved by using Crank-Nicolson scheme. The non-...

research-article
Security in real time multimedia data based on generalized keys

In this paper, address the problem of encryption/decryption regions of interest in a video sequence for the purpose of security in video data. The proposed an efficient solution based on 3D encryption/decryption based. More specifically the videos files ...

research-article
Automatic human activity recognition in video using background modeling and spatio-temporal template matching based technique

Human activity recognition is a challenging area of research because of its various potential applications in visual surveillance. A spatio-temporal template matching based approach for activity recognition is proposed in this paper. We model the ...

research-article
Elliptic curve cryptography: survey and its security applications

Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require ...

research-article
Ontology based semantic similarly ranking of documents

Semantic relatedness measures the degree to which some words or concepts are related, considering possible semantic relationships among them. Semantic relatedness is of great interest in different areas, such as Natural Language Processing, Information ...

research-article
Trivial solution for a non-trivial problem in MANETs

The wireless communication has earned much popularity, in the recent past. The discipline has been able to grab the focus of academia and the attention of industry. Specifically, the variants of wireless communication, like MANET, BAN, PAN, VANET, etc, ...

research-article
RR based grid scheduling algorithm

Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important ...

research-article
Frontal view gait based recognition using PCA

Gait is a biometric identification technology, which can identify people from distance, without user cooperation. This paper proposes a simple and efficient automatic gait recognition method taking frontal view silhouette of walking person using ...

research-article
Complexity study on "Carry-along Sort" algorithm

Hierarchy generation is the very familiar and evolving concept in Relational database management system. There are so many methods currently available to generate as well manage hierarchies. But, carry along sort algorithm is the new method which is ...

research-article
A comparative study of ICA algorithms for ECG signal processing

Electro Cardiogram (ECG) signals are affected by various kinds of noise and artifacts that may hide important information of interest. Independent component analysis is a new technique suitable for separating independent component from ECG complexes. ...

research-article
Modeling and designing of machine learning procedures as applied to game playing using artificial intelligence

In this paper, we are proposing a method which is different from many practical computer programs have been developed to exhibit useful types of learning. For problems such as speech recognition, different algorithms based on machine learning outperform ...

research-article
Secured routing over MANET with power management

Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in ...

research-article
Refjav: tool for automated verification by generating CCS of multithreaded Java system in distributed environment

We present here a tool to generate given the CCS automatically for the distributed multithreaded system coded in JAVA. Actually in the current scenario distributed systems are get emphasized and hard fact is to verify these systems. CCS (Concurrent ...

Contributors
  • Chitkara University, Himachal Pradesh

Index Terms

  1. Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
        Index terms have been assigned to the content through auto-classification.
        Please enable JavaScript to view thecomments powered by Disqus.

        Recommendations

        Acceptance Rates

        Overall Acceptance Rate 173 of 395 submissions, 44%
        YearSubmittedAcceptedRate
        ACAI '192039748%
        ACAI '181927640%
        Overall39517344%