DocumentCode :
2146514
Title :
[Title page]
fYear :
2012
fDate :
30-31 March 2012
Firstpage :
1
Lastpage :
1
Abstract :
The following topics are dealt with: bio-inspired artificial intelligence; multiprocessor revolution; cache management; peer-to-peer networks; IT innovation; speech recognition; volunteered geographic information dataset mining; floating point numbers; image steganography method; decision tree induction; intellectual ability planning; software tool; sentiment analysis; Assamese character recognition system; tea insect pest database mining; image encryption; electrical driven antenna array; domino CMOS logic; image watermarking algorithm; speech signal semi-automatic annotation model; ECG feature prediction; Gaussian distributions; Cauchy distributions; artifact suppression blocking; workload descriptor; face recognition techniques; Assamese phonemes segmentation; hierarchical grid computing; monofloral honey discrimination; feature extraction method; top-K range-aggregate queries; microarray gene expression data clustering´; logic programming interface; ID-based directed signature scheme; JPEG image compression; secret code embedded authentication of songs; Voronoi based location aware collaborative filtering; visual data mining; intrusion detection; MANET; grid scheduling; randomized load balancing algorithm; wireless sensor networks; diabetes retinopathic analysis; pilot assisted channel estimation technique; LTE-OFMD network; Zigbee; virtualized remote Web desktop; and parts-of-speech tagset.
Keywords :
CMOS logic circuits; Gaussian distribution; Long Term Evolution; OFDM modulation; Zigbee; antenna arrays; biology computing; cache storage; channel estimation; collaborative filtering; data compression; data mining; decision trees; electrocardiography; face recognition; feature extraction; floating point arithmetic; geographic information systems; grid computing; image coding; image watermarking; medical signal processing; mobile ad hoc networks; multiprocessing systems; natural language processing; optical character recognition; pattern clustering; peer-to-peer computing; planning (artificial intelligence); query processing; resource allocation; scheduling; speech recognition; steganography; telecommunication security; wireless sensor networks; Assamese character recognition system; Assamese phonemes segmentation; Cauchy distributions; ECG feature prediction; Gaussian distributions; ID-based directed signature scheme; IT innovation; JPEG image compression; LTE-OFMD network; MANET; Voronoi based location aware collaborative filtering; Zigbee; artifact suppression blocking; bio-inspired artificial intelligence; cache management; decision tree induction; diabetes retinopathic analysis; domino CMOS logic; electrical driven antenna array; face recognition techniques; feature extraction method; floating point numbers; grid scheduling; hierarchical grid computing; image encryption; image steganography method; image watermarking algorithm; intellectual ability planning; intrusion detection; logic programming interface; microarray gene expression data clustering´; monofloral honey discrimination; multiprocessor revolution; parts-of-speech tagset; peer-to-peer networks; pilot assisted channel estimation technique; randomized load balancing algorithm; secret code embedded authentication-of-songs; sentiment analysis; software tool; speech recognition; speech signal semi-automatic annotation model; tea insect pest database mining; top-K range-aggregate queries; virtualized remote Web desktop; visual data mining; volunteered geographic information dataset mining; wireless sensor networks; workload descriptor;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Trends and Applications in Computer Science (NCETACS), 2012 3rd National Conference on
Conference_Location :
Shillong
Print_ISBN :
978-1-4577-0749-0
Type :
conf
DOI :
10.1109/NCETACS.2012.6203276
Filename :
6203276
Link To Document :
بازگشت