skip to main content
10.5555/2494763guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and Technologies
2012 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
November 26 - 28, 2012
ISBN:
978-0-7695-4959-0
Published:
26 November 2012

Reflects downloads up to 26 Jan 2025Bibliometrics
Abstract

No abstract available.

Article
Simulation Tools for Mobile Ad-hoc Sensor Networks: A State-of-the-Art Survey

Mobile ad-hoc sensor networks (MASNETs) have recently become an important area of research for Mobile adhoc networks (MANETs) researchers. The increasing capabilities and the decreasing costs of sensors make MASNETs applications possible to be deployed ...

Article
Automated Extraction of Lexicon Applied both to Chinese and Japanese Corpora

A novel statistical approach is described, enabling the automated extraction of large word lists from unsegmented corpora without reliance on existing dictionaries. The main contribution of this approach includes the following two points: First, it's ...

Article
A Rule Based Approach for Implementation of Bangla to English Translation

An initiative to model a Bangla to English (B2E) translation using Natural Language Processing (NLP) was proposed in our previous research. Here we implemented the model with a lot of modifications. A very successful translator is observed in Anubadok ...

Article
An Automated Learner for Extracting New Ontology Relations

Recently, the NLP community has shown a renewed interest in automatic recognition of semantic relations between pairs of words in text which called lexical semantics. This approach to semantics is concerned with psychological facts associated with the ...

Article
Security Analysis of salt| |password Hashes

Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on ...

Article
A Simple Tele-robotic Lunar Excavator

An excavation tele-robotic system is developed to excavate and collect lunar regolith. The excavator has been developed by the team BRACU ChondroBot consisting students from BRAC University for NASA's 2nd Annual Lunabotics Mining Competition (LMC) 2011. ...

Article
Compact Composite Descriptors for Content Based Image Retrieval

This paper focuses on the decrement of computational time, by reducing the size of feature extraction. Thus in this work, we have explored the Compact Composite Descriptors (CCD) approach, which enables to reduce the size of image features without ...

Article
Exothermic Batch Process Optimisation via Multivariable Genetic Algorithm

This paper aims optimise the exothermic batch productivity while minimise the waste production by manipulating the fluid temperature and fluid flow rate. During the process, a large amount of heat is released rapidly when the reactants are mixed ...

Article
Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study

Smart phones have introduced great easiness in our daily life by mobile applications. Nowadays, it is possible to complete tasks on-the-go, without the need of computer. One of the facilities provided is the mechanism to buy flight tickets via mobile ...

Article
Human Computer Interaction for Vision Based Hand Gesture Recognition: A Survey

The ultimate aim is to bring Human Computer Interaction to a regime where interactions with computers will be as natural as an interaction between humans, and to this end, incorporating gestures in HCI is an important research area. Gestures have long ...

Article
Comparative Study on Content-Based Image Retrieval (CBIR)

The process of retrieving desired images from a large collection is widely used in applications of computer vision. In order to improve the retrieval performance an efficient and accurate system is required. Retrieving images based on the content i.e. ...

Article
Using Information Management Architecture to Support Flexible Supply Chain Management

Integration between the members in complex network of the supply chain group has been an issue for flexible supply chain management. Restructuring of pre-planned activities across the group to react to known deviation may not be possible. The authors ...

Article
Examination of Electronic Service Definitions

The electronic service concept stands for one prominent application of using the information and communication technologies in dissimilar areas. However, providing an exact definition of e-service is hard to come by as researchers have been using ...

Article
User Satisfaction on Smart Phone Interface Design, Information Quality Evaluation

Today, smart phone evolution become an important and highest competition channel through which many organisations launch and market their services to the users. Applications have delivering services by different way of attractiveness. The quality of ...

Article
A Model of Information Technology as a Service (ITaaS) in Cloud Computing: A Case of Collaborative Knowledge Management System

Collaborative Knowledge Management System (CKMS) is a system that has been used by members of Cloud Service Provider (CSP) as a place to manage and facilitate the information technology (IT) as a service (ITaaS) environment which is related to knowledge ...

Article
Considering Thermal-aware Proactive and Reactive Scheduling and Cooling for Green Data-centers

Data-centers require huge amount of electricity to continue meeting the computing demands of consumers each year. Fossil fuel based electricity is utilized due to lack of abundant renewable energy resources, resulting in the emission of CO2 in ...

Article
A Seamless Vertical Handoff Algorithm in 4G Networks

The rapid improvement of the mobile generations was for the purpose of supporting as many mobile devices as possible that could benefit the users at anytime and anywhere in terms of common practical applications such as internet access, video-on-demand, ...

Article
Ranking Table for Cluster Head Selection of Wireless Sensor Network

Power consumption is always an important element for Wireless Sensor Network (WSN). The energy is the main constraint should be considered when designing the algorithm, protocol or the methods. Clustering is one of the effective methods to use in ...

Article
Fault-Tolerant Routing Based on Directed Safety Levels in a Hyper-Star Graph

A hyper-star graph HS(2n, n) is promising as a generic topology for interconnection networks of parallel processing systems because it has merits of a hypercube and a star graph. This paper proposes an algorithm that constructs a fault-free path between ...

Article
Application of Change Point Outlier Detection Methods in Real Time Intrusion Detection

Recent years has shown a growing interest in the development of change detection techniques for the analysis of Intrusion Detection. Current research shows that change detection methods can be used for a wide range of real time applications. Detecting ...

Article
Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems

This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is ...

Article
An Introduction to Image Steganography Techniques

Steganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including ...

Article
High Image Quality Watermarking Model by Using Genetic Algorithm

Imperceptibility or quality for digital image watermarking represents one of the most important requirements for any digital watermarking system. Many studies try to enhance the quality by using different techniques and methods. In this study, Genetic ...

Article
Fuzzy Logic Based MPPT for PV Array under Partially Shaded Conditions

This paper presents the fuzzy logic based maximum power point tracking for the optimization of the solar photovoltaic (PV) array under partially shaded conditions. The PV system is modelled in MATLAB/SIMULINK where the PV array is formed by five PV ...

Index Terms

  1. Proceedings of the 2012 International Conference on Advanced Computer Science Applications and Technologies
    Index terms have been assigned to the content through auto-classification.

    Recommendations