The Department of Computer Science & Engineering, Chitkara Institute of Engineering, welcomes its distinguished delegates and guests to the International Conference on Advances in Computing and Artificial Intelligence, ACAI 2011 on July 21--22, 2011.
The conference has received overwhelming response from international and national research scholars, and professionals. Over 300 papers covering the main themes of the conference were received electronically. The papers published in these proceedings and to be presented during the conference were selected after a thorough review process. The papers were selected on the basis of originality, clarity and relevance to the theme of the conference. The conference aims to provide a platform for faculty, researchers and designers from academia and industry to present their research ideas, share their experiences, and challenges in the field of Computing, and Artificial Intelligence. The Conference program will include invited lectures by experts in the field. The program will favor interaction amongst participants, who belong to different areas both professionally-academics, research, industry and geographically.
A comparative study of UML tools
In these days many tools appear in market to support building system. Thus choosing the best tools need to know the most important features of it. Today UML consider as a de facto standard in software development and is used in many domains ranging from ...
Study of text based mining
Text based Mining is the process of analyzing a document or set of documents to understand the content and meaning of the information they contain. Text Mining enhances human's ability to Process massive quantities of information and it has high ...
Educational web sites accessibility design model
Web sites accessibility is a basic requirement to protect everyone's equal right of accessing the information in information society. These days it becomes mandatory that all kinds of vulnerable groups should be able to access information and acquire ...
Automated taxi/cab system using A* algorithm
An Automated Taxi Dispatch System with Multi-agent approach [8] [10] is intends to serve all the customers in distributed fashion. The Automated Taxi System is a location based, traffic-sensing approach that incorporate distributed taxi booking and ...
Distributed smart camera network and mobile devices
Smart Camera Network [4] enables us to detect, classify, and trace visual events by means of a communication network channel of embedded computing devices equipped with camera sensors. Distributed smart cameras [2] use distributed computing ...
Scene flow estimation from stereo video source
There are various methods to estimate the scene flow. Most of the methods use motion estimation with stereo re-construction. This paper describes an interesting way to fuse the video from two camera's and create a 3D reconstruction. The proposed ...
Security policy implementation using connection and event log to achieve network access control
Network as well as Host security has become an essential requirement to guard important network resources against unauthorized and unauthenticated access. The reason is that due to technology advancements, the threats and attacks are becoming all the ...
Intrusion detection system using honeypots and swarm intelligence
As the number and size of the Network and Internet traffic increase and the need for the intrusion detection grows in step to reduce the overhead required for the intrusion detection and diagnosis, it has made public servers increasingly vulnerable to ...
Analysis of various swarm-based & ant-based algorithms
Ant algorithms and swarm intelligence systems have been offered as a novel computational approach that replaces the traditional emphasis on control, preprogramming and centralization with designs featuring autonomy, emergence and distributed ...
Performance evaluation on segmentation methods for medical images
This paper presents the performance evaluation of different segmentation algorithms for medical images. Accuracy and clarity are very important issues for medical imaging and same in the case with segmentation. In this paper, we have proposed a level ...
DMX in MANETs: major research trends since 2004
The last decade has witnessed a tremendous increase in the popularity of mobile ad hoc networks (MANETs). The major computing challenges of distributed environment become more insidious when we try to address them in mobile ad hoc scenario. The ...
Efficient fault tolerant consensus using preemptive token
The problem of agreement has been widely studied by many research groups in crash-stop as well as Byzantine model for distributed transaction systems. In one of our previous works [12], we assumed a trustworthy Transaction Manager, TM amenable to the ...
A hybrid method for 3D face localization
Face localization is always a challenging job for a good recognition scheme. If process has to be done for 3D faces, it is quit difficult to localize faces. In this paper we provide a face localization scheme which is based on Average Threshold Value (...
Topic tracking techniques for natural language processing
Text mining is a field that automatically extracts previously unknown and useful information from unstructured textual data. It has strong connections with natural language processing. NLP has produced technologies that teach computers natural language ...
An efficient broker cloud management system
In Cloud Computing Architecture, Brokers are responsible for providing applications to end user from Clouds. To manage Broker Cloud Communication, an efficient management infrastructure is required which also take care for cost and time to get ...
Integrated design space exploration based on power-performance trade-off using genetic algorithm
This paper presents a novel approach for Design Space Exploration (DSE) of integrated scheduling, allocation and binding in High Level Synthesis based on user specified power consumption and execution time constraints using multi structure Genetic ...
Application specific processor vs. microblaze soft core RISC processor: FPGA based performance and CPR analysis
In all application domains of multimedia, communication and network processing where huge amount of data processing at desired performance and power consumption are a mandatory prerequisite for successful functioning; the system architects have to find ...
Crank-Nicolson scheme to transient MHD free convective flow through semi-infinite vertical porous plate with constant suction and temperature dependent heat source
In this paper, we are considering transient MHD free convective flow through an isothermal semi-infinite vertical porous plate with temperature dependent heat source. The governing equations have been solved by using Crank-Nicolson scheme. The non-...
Security in real time multimedia data based on generalized keys
In this paper, address the problem of encryption/decryption regions of interest in a video sequence for the purpose of security in video data. The proposed an efficient solution based on 3D encryption/decryption based. More specifically the videos files ...
Automatic human activity recognition in video using background modeling and spatio-temporal template matching based technique
Human activity recognition is a challenging area of research because of its various potential applications in visual surveillance. A spatio-temporal template matching based approach for activity recognition is proposed in this paper. We model the ...
Elliptic curve cryptography: survey and its security applications
Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require ...
Ontology based semantic similarly ranking of documents
Semantic relatedness measures the degree to which some words or concepts are related, considering possible semantic relationships among them. Semantic relatedness is of great interest in different areas, such as Natural Language Processing, Information ...
Trivial solution for a non-trivial problem in MANETs
The wireless communication has earned much popularity, in the recent past. The discipline has been able to grab the focus of academia and the attention of industry. Specifically, the variants of wireless communication, like MANET, BAN, PAN, VANET, etc, ...
RR based grid scheduling algorithm
Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important ...
Frontal view gait based recognition using PCA
Gait is a biometric identification technology, which can identify people from distance, without user cooperation. This paper proposes a simple and efficient automatic gait recognition method taking frontal view silhouette of walking person using ...
Complexity study on "Carry-along Sort" algorithm
Hierarchy generation is the very familiar and evolving concept in Relational database management system. There are so many methods currently available to generate as well manage hierarchies. But, carry along sort algorithm is the new method which is ...
A comparative study of ICA algorithms for ECG signal processing
Electro Cardiogram (ECG) signals are affected by various kinds of noise and artifacts that may hide important information of interest. Independent component analysis is a new technique suitable for separating independent component from ECG complexes. ...
Modeling and designing of machine learning procedures as applied to game playing using artificial intelligence
In this paper, we are proposing a method which is different from many practical computer programs have been developed to exhibit useful types of learning. For problems such as speech recognition, different algorithms based on machine learning outperform ...
Secured routing over MANET with power management
Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in ...
Refjav: tool for automated verification by generating CCS of multithreaded Java system in distributed environment
We present here a tool to generate given the CCS automatically for the distributed multithreaded system coded in JAVA. Actually in the current scenario distributed systems are get emphasized and hard fact is to verify these systems. CCS (Concurrent ...
Index Terms
- Proceedings of the International Conference on Advances in Computing and Artificial Intelligence