Default Cover Image

Computational Intelligence, Communication Systems and Networks, International Conference on

July 26 2011 to July 28 2011

Bali, Indonesia

ISBN: 978-0-7695-4482-3

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Table of ContentsFreely available from IEEE.pp. v-xi
Papers
Welcome Message from the ChairsFreely available from IEEE.pp. xii
Papers
Conference OrganizationFreely available from IEEE.pp. xiii
Papers
International Program CommitteeFreely available from IEEE.pp. xiv
Papers
International ReviewersFreely available from IEEE.pp. xv
Papers
Technical SponsorsFreely available from IEEE.pp. xvi
Papers
Keynote Speaker 1Freely available from IEEE.pp. xvii-xix
Papers
Keynote Speaker 2Freely available from IEEE.pp. xx-xxi
Papers
Tutorial 1Freely available from IEEE.pp. xxii-xxiii
Papers
Tutorial 2Freely available from IEEE.pp. xxiv
Papers
Study of the Eye-tracking Methods Based on VideoFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
An Experimental Evaluation of Ensemble Methods for Pattern ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 6-10
Papers
Viral Systems Application for Knapsack ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 11-16
Papers
An Application of Artificial Intelligent Optimization Techniques to Dynamic Unit Commitment for the Western Area of Saudi ArabiaFull-text access may be available. Sign in or learn about subscription options.pp. 17-21
Papers
Face Recognition Method Based on Adaptively Weighted Block-Two Dimensional Principal Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 22-25
Papers
Searching Candidate Lyapunov Function with Threshold Accepting AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 26-31
Papers
Modelling and Analysis of an Efficient Traffic Network Using Ant Colony Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 32-36
Papers
Towards an Online Diabetes Type II Self Management System: Ontology FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 37-41
Papers
Applying Sequence Alignment in Tracking Evolving Clusters of Web-Sessions Data: An Artificial Immune Network ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Papers
Enhancing the Effectiveness of Usability Evaluation by Automated Heuristic Evaluation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Papers
Multiple Vehicles License Plate Tracking and Recognition via Isotropic DilationFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
Papers
Using Kohonen Maps and Singular Value Decomposition for Plagiarism DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 60-64
Papers
Vision Based Tracking of Multiple Dynamic Obstacles for Autonomous Robot NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 65-71
Papers
Maximum Power Point Tracking for PV Array Under Partially Shaded ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 72-77
Papers
Adaptive Fuzzy Cognitive Maps for Identification of Cause and EffectFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Papers
Cooperative Distributed MISO Wireless Relay Networks Under Jamming Environments with Power ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 84-88
Papers
Noncooperative Distributed MMSE Schemes for AF SIMO Wireless Relay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Papers
A New Routing Algorithm to Reduce Consumed Energy in Wireless SensorFull-text access may be available. Sign in or learn about subscription options.pp. 95-98
Papers
Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using MATLABFull-text access may be available. Sign in or learn about subscription options.pp. 99-102
Papers
Radio Frequency Identification (RFID) Based Toll Collection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 103-107
Papers
The Design of a Stride Query Tree Algorithm for RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
Papers
Toward Benchmarks for Evaluation of Forwarding Strategies in Metro Ethernet NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Papers
Traffic Modeling of LTE Mobile Broadband Network Based on NS-2 SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 120-125
Papers
Simulation of a Manufacturing Assembly Line Based on WITNESSFull-text access may be available. Sign in or learn about subscription options.pp. 132-137
Papers
A High Efficiency Two-dimensional Index Queue Timer Management Algorithm for Network and Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 138-141
Papers
Applications of Graph Theory in Computer ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
Papers
Modeling of Chemical Plant's Rectifying Towers Using Artificial Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Papers
A Remote Control Service for OSGi-based Unmanned Vehicle Using SmartPhone in Ubiquitous EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 158-163
Papers
EasyA: Easy and Effective Way to Generate Pairwise Test DataFull-text access may be available. Sign in or learn about subscription options.pp. 164-167
Papers
Criteria for Selection of Right Accounting SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 168-172
Papers
Identifying Scanning Activities in Honeynet Data Using Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Papers
A Pairwise Key Pre-distribution Scheme Based on Prior Deployment KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 184-189
Papers
A Comparative Study of Authentication Methods for Wi-Fi NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 190-194
Papers
The Impact of Information Technology Threat on IT Appropriation and IT AvoidanceFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
Papers
Detection of SSDF Attack Using SVDD Algorithm in Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Papers
A Vision Substitution Method for the Blind Based on Image Edge Detection and Sound MappingFull-text access may be available. Sign in or learn about subscription options.pp. 209-212
Papers
Skin Color Segmentation by Texture Feature Extraction and K-mean ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Papers
Face Detection Based on Fuzzy Granulation and Skin Color SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 219-224
Papers
Robust Blind Digital Image Watermarking Using DWT and Dual Encryption TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
Papers
A Comparative Analysis of Segmentation Algorithms for Hand Gesture RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
Papers
VHDL Modelling of Fixed-point DWT for the Purpose of EMG Signal DenoisingFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Papers
Digital Watermarking Based on Patchwork and Radial Basis Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 242-246
Papers
Recognition of a Subset of Most Common Persian Words Using Zernike Moments and Back-Propagation Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Papers
Enhancement of Particle Filter Approach for Vehicle Tracking Via Adaptive Resampling AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
Papers
Combined Feature Extraction on Medical X-ray ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 264-268
Papers
Exploring Q-Learning Optimization in Traffic Signal Timing Plan ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 269-274
Papers
An Enhanced Parallel & Distributed Implementation of the Harmony Search Based Supervised Training of Artificial Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
Papers
Distributed Community Detection in Complex NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 281-286
Papers
An Adaptive Task Allocation Approach for MapReduce in a Heterogeneous CloudFull-text access may be available. Sign in or learn about subscription options.pp. 287-291
Papers
Utilizing Bee Colony to Solve Task Scheduling Problem in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Papers
A Network Virtualization Approach in Many-core Processor Based Cloud Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 304-307
Papers
Integration of Grid and Cloud with Semantics Based IntegratorFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
Application of Internet of Things in the Community Security ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Papers
Managing ICT Resources in E-learning Environment: Challenges, Issues and a Proposed ModelFull-text access may be available. Sign in or learn about subscription options.pp. 319-322
Papers
Electronic Data Interchange: A ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 323-327
Papers
Assessment of Throughput Performance Under OPNET Modeler Simulation Tools in Mobile Ad Hoc Networks (MANETs)Full-text access may be available. Sign in or learn about subscription options.pp. 328-331
Papers
A Survey of Intelligent Transportation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Papers
The Security of Vehicular Adhoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
Papers
Resource Allocation Policy of Primary Users in Proactively-Optimization Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 343-347
Papers
HP-EMAA: High Performance Ethernet Traffic Monitoring and Analysis System in the Automotive FieldFull-text access may be available. Sign in or learn about subscription options.pp. 348-351
Papers
Graphical User Interface (GUI) for Thumbprint Image Enhancement and Minutiae ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 352-357
Papers
Technology Transfer to Industry of Biotechnology on Rhizopus sp InoculumFull-text access may be available. Sign in or learn about subscription options.pp. 358-362
Papers
Development of Brainwave Balancing Index Using EEGFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
Papers
Author IndexFreely available from IEEE.pp. 385-387
Papers
Publisher's InformationFreely available from IEEE.pp. 388
Showing 87 out of 87