Default Cover Image

2014 Fourth International Conference of Emerging Applications of Information Technology (EAIT)

Dec. 19 2014 to Dec. 21 2014

Kolkata, India

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-x
PrefaceFreely available from IEEE.pp. xi-xiii
Message from the General ChairsFreely available from IEEE.pp. xiv-xiv
Conference CommitteeFreely available from IEEE.pp. xv-xx
Plenary AbstractFreely available from IEEE.pp. xxi-xxii
Keynote SpeechFreely available from IEEE.pp. xxiii-xxiv
SponsorsFreely available from IEEE.pp. xxv-xxv
About the Cover Photo and PhotographerFreely available from IEEE.pp. xxvi-xxvi
Parameter Estimation of Gene Regulatory Network Using Honey Bee Mating OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 3-8
An Improved Job Scheduling Algorithm by Utilizing Released Resources for MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 9-14
Adaptive Fuzzy Control of Inverted Pendulum with a Fuzzy-Based Set-Point Weighting SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Design of Fuzzy-IMC PID Controller for TITO Process with Time DelayFull-text access may be available. Sign in or learn about subscription options.pp. 70-74
Identification of Genetic Pathway for Cervical Cancer Development Using Rough and Bayesian TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
A Discrete Wavelet Packet Transform Based Approach for Selection of Artifact-Free Phonocardiogram SegmentFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Analysis of a Network of AQM Router Supporting TCP Flows and Comparison with XCPFull-text access may be available. Sign in or learn about subscription options.pp. 101-106
Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a Dynamical Systems PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Implementation of Software Cybernetics for Efficient Resource Usage in Software Maintenance ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Handling Resource Failure Towards Load Balancing in Computational Grid EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
An Extension of on-Board TCP (obTCP) for Satellite-Terrestrial Hybrid NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Interference Aware Scheduling of Sensors in IoT Enabled Health-Care Monitoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Learning Based Performance and Power Efficient Cluster Resource Manager for CPU-GPU ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 161-166
Power Efficient Code Converters Using Adiabatic Array LogicFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
NoC Based Multiplier-Less Constant Geometry FFT ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 173-178
An ICT Based Reliable Remote Condition Monitoring of Induction MachineFull-text access may be available. Sign in or learn about subscription options.pp. 179-183
Handwritten Bangla Word Recognition Using HOG DescriptorFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
A Thresholding Approach for Text Extraction in Handwritten Historical Documents Using Adaptive MorphologyFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
An Efficient Slope and Slant Correction Technique for Off-Line Handwritten Text WordFull-text access may be available. Sign in or learn about subscription options.pp. 204-208
Image Super Resolution with Direct Mapping and De-NoisingFull-text access may be available. Sign in or learn about subscription options.pp. 215-221
A Novel Method for Tempo Detection of INDIC Tala-sFull-text access may be available. Sign in or learn about subscription options.pp. 222-227
CS Reconstructed MR Image Segmentation Using Morphological Enhancement and FCMFull-text access may be available. Sign in or learn about subscription options.pp. 228-232
Halftone Feature Based Classification of Commercial White Print Paper Using BP-MLPFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
An Adaptive Bilateral Filter for InpaintingFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
A New Approach to Detect and Classify Graphic Primitives in Engineering DrawingsFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
On Grounding Symbols for RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 249-255
A Fast and Robust Method for Iris LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 262-267
SEVA: A Salient Event Detection Framework from Video Shots Using Support Vector Data DescriptionFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
An Improved Approach to Bengali Keyphrase ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Estimation of Fatigue in Drivers by Analysis of Brain NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 289-293
Maximum Margin Criterion Based Band Extraction of Hyperspectral ImageryFull-text access may be available. Sign in or learn about subscription options.pp. 300-304
A Genetic Approach with Controlled Crossover and Guided Mutation for Biological Sequence AlignmentFull-text access may be available. Sign in or learn about subscription options.pp. 307-312
Inferring Attributes Using Centrality MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 313-319
Sensitive Data Protection of DBaaS Using OPE and FPEFull-text access may be available. Sign in or learn about subscription options.pp. 320-327
Adaptive Partial Image Encryption Technique Based on Chaotic MapFull-text access may be available. Sign in or learn about subscription options.pp. 328-334
Chaotic Artificial Bee Colony for Text ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 337-343
An Efficient Approach for Classification of Gene Expression Microarray DataFull-text access may be available. Sign in or learn about subscription options.pp. 344-348
Software Evolution Prediction Using Fuzzy AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 349-354
Analysis of Product Purchase Patterns in a Co-Purchase NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Using Multiple Query Expansion Algorithms to Predict Query PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSNFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
A Strategic Approach for Area Coverage and Data Collection in MWSNFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
Analysis of Energy Efficient Wireless Sensor Networks Routing SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Trust Aware Directed Diffusion Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 385-391
Author IndexFreely available from IEEE.pp. 393-394
Publisher's InformationFreely available from IEEE.pp. 396-396
Showing 75 out of 75