Loading [MathJax]/extensions/MathZoom.js
2016 IEEE International Conference on Advances in Computer Applications (ICACA) - Conference Table of Contents | IEEE Xplore
IEEE International Conference on Advances in Computer Applications (ICACA)

2016 IEEE International Conference on Advances in Computer Applications (ICACA)

DOI: 10.1109/ICACA40133.2016

24-24 Oct. 2016

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Advances in Computer Applications (ICACA), 2016 IEEE International Conference on

[Front cover]

Publication Year: 2016,Page(s):1 - 1

[Copyright notice]

Publication Year: 2016,Page(s):1 - 1

Table of contents

Publication Year: 2016,Page(s):viii - xii

List of reviewers

Publication Year: 2016,Page(s):xv - xvi
Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self configuring network. It does not use any existing infrastructure. The dynamic nature of MANETs and memory and energy constraints of mobile nodes require an effective routing algorithm. This paper proposes HEEMCORP routing algorithm. It is a hierarchical, energy efficient on demand routing algorithm. The simulatio...Show More
Medical Imaging is one of the important technique which plays a major role in diagnosis of diseases which are present inside of our body. These medical images are produced by many imaging modalities such as, Computed Tomography (CT), Magnetic Resonance Imaging (MRI), Ultrasound(US) and X-ray. Mostly these medical images are corrupted by noise during image acquisition and transmission process. The ...Show More
Stomach based diseases are diagnosed in terms of various parameters which are gathered from the clinical data centres. The general factors that are considered as the symptoms are lack of appetite, an early feeling of fullness when eating, abdominal bloating, vomiting of undigested food, heart burn, nausea, weight loss, erratic blood glucose levels, spasms of the stomach wall, gastroesophageal refl...Show More
Ground Battlefield Simulation (GBS) is carried out to avoid actual movement/usage of resources (manpower, vehicles and weapons). GBS usually stretches from hours, days to months, depending upon the Scenario visualized/exercised. Though we have already saved upon resources, time is still an important factor that we are always short of. Simulating a Ground Battlefield scenario of a few hours at norm...Show More
Feature selection is one of the techniques in machine learning for selecting a subset of relevant features namely variables for the construction of models. The feature selection technique aims at removing the redundant or irrelevant features or features which are strongly correlated in the data without much loss of information. It is broadly used for making the model much easier to interpret and i...Show More
In the field of cloud computing the approach for sharing of data and storage between a group of people requires efficient approach with cost cutting and low maintenance procedure. Sharing of outsourced files assures security and ensures data veracity according to the frequent changes in shared data files. Issues like preserving privacy of data among the group stored data shared in common cloud sto...Show More
Security places an important role in communication applications for secure data transfers. Image Steganography is one of the most reliable technique in encryption and decryption of an image (hidden) inside other image (cover) such way that only cover image is visible. In this paper frequency domain Image Steganography using DWT and Modified LSB technique is proposed. The proposed approach uses DWT...Show More
Automatic personality recognition aims to assign a personal profile to the author by measuring the Big Five personality factors automatically. The present paper focuses on an approach developed to recognize the personality of the author by evaluating their writings. The score for each of the Big-Five personality traits is computed programmatically. Based on the essays of the author as an input, pa...Show More
Data mining involves discovering interesting patterns from large dataset to maximize the profit of the future business. Association rule mining is the main area in the field of data mining exploration with wide range of applications. Determining the frequent item-sets in large dataset is the core task of association rule mining and it is frequently used by business decision makers to improve their...Show More
With the exponential rise in the amount of information in the World Wide Web, there is a need for a much efficient algorithm for Web Search. The traditional keyword matching as well as the standard statistical techniques is insufficient as the Web Pages they recommend are not highly relevant to the query. With the growth in Semantic Web, an algorithm which semantically computes the most relevant W...Show More
Nowadays, video contents are stored in huge files or it is televised in continuous streams but the users need to retrieve only a particular part of topic or shots from video. So we need to split it in to short video segments with respect to appropriate retrieval units automatically and efficiently. In this research work, based on shot changes two different approaches are to detect shot boundaries....Show More
In this work we plan to develop a framework called, Multimodal Geometric Sparse Representation (MGSR) for reliable social network communication with Face, and Fingerprint features of human individuals on social networks. Neighbor Flow Feature Extraction (NFFE) algorithm performs feature extraction using Neighborhood flow for both the face and fingerprint features. The most predominant attributes a...Show More
Semantic inferences about the structural features are achieved through a semantic structure markup system with the support of ontological relationships. The significance of the markup system is the description of valence electrons of every atom in the structure. The semantics of chemical structure is captured in different levels with appropriate XML elements. The advantage of the markup system is ...Show More
Nowadays there are many risks related to bank loans, especially for the banks so as to reduce their capital loss. The analysis of risks and assessment of default becomes crucial thereafter. Banks hold huge volumes of customer behaviour related data from which they are unable to arrive at a judgement if an applicant can be defaulter or not. Data Mining is a promising area of data analysis which aim...Show More
Data mining is the process of extracting the hidden predictive model from large databases. It has various methods and algorithms. Classification is a supervised method, which builds a model for predicting the new instances. Different algorithms like decision tree, neural networks, support vector machines, k nearest neighbour, Bayesian classification are available for the classification. Decision t...Show More
Internet of Things (IoT) and Cloud Computing platforms are becoming the basis of future technologies which intend to create a smart world. This paper describes implementation of a smart IoT and Cloud interoperable real-time application based on Android platform. It uses advanced cloud services like Google Cloud Messaging (GCM) and Dropbox API's. The application can be used to perform basic IoT ope...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Advances in Computer Applications (ICACA), 2016 IEEE International Conference on