Default Cover Image

2014 Fourth International Conference on Advanced Computing & Communication Technologies (ACCT)

Feb. 8 2014 to Feb. 9 2014

Rohtak

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xi
Message from the General ChairFreely available from IEEE.pp. xii-xii
Message from the Program ChairFreely available from IEEE.pp. xiii-xiii
Organizing CommitteeFreely available from IEEE.pp. xiv-xiv
Programme CommitteeFreely available from IEEE.pp. xv-xv
Towards Classification of Weeds through Digital ImageFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A Detailed Review of Feature Extraction in Image Processing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 5-12
GSM Controlled RoboticsFull-text access may be available. Sign in or learn about subscription options.pp. 21-25
A Novel Approach for Species Detection from Oceanographic VideoFull-text access may be available. Sign in or learn about subscription options.pp. 42-46
Robust Digital Image Watermarking in High Frequency Band Using Median Filter Function Based on DWT-SVDFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
Performance Analysis of Region of Interest Based Compression Method for Medical ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 53-58
Cooperative Jamming and Aloha Protocol for Physical Layer SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Partition Access of Data Streams (PADS)Full-text access may be available. Sign in or learn about subscription options.pp. 69-73
Group-Code Technique for Data RepresentationFull-text access may be available. Sign in or learn about subscription options.pp. 74-78
Certain Reduction Rules Useful for De-Duplication Algorithm of Indian Demographic DataFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
Key Dependent Image Steganography Using Edge DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 85-88
Analysis of the System Level Design of a 1.5 Bit/Stage Pipeline ADCFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
A Novel Approach for Efficient S-Box Design Using Multiple High-Dimensional ChaosFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
4-2 Compressor Design with New XOR-XNOR ModuleFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
Stability Analysis of a Novel Proposed Low Power 10T SRAM Cell for Write OperationFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Sparse Signal Reconstruction via Orthogonal Least SquaresFull-text access may be available. Sign in or learn about subscription options.pp. 133-137
Interleaver Design Consideration for IDMA in Optical EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 138-143
A Novel Approach for Computing Dynamic Slices of Web Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 153-158
Software Reuse in PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 159-162
Analysis and Evaluation of Software Aggregative Risk Using Soft Computing TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 172-176
Impact of RACI on Delivery and Outcome of Software Development ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
A Study on Object-Oriented Testing Technique and Object-Oriented Metrics Useful in Reducing Class Testing ComplexityFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Comparative Analysis of Software Engineering Models from Traditional to Modern MethodologiesFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
Critical Analysis of Object Oriented Metrics in Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 197-201
Hybrid Routing Approach for Heterogeneous Wireless Sensor Networks Using Fuzzy Logic TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
Systematic Design of Trust Management Systems for Wireless Sensor Networks: A ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Probabilistic and Neighbour Knowledge Based Flooding Mechanism for AODVFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
Op-LEACH: An Optimized LEACH Method for Busty Traffic in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 222-229
Cloud Computing: A New Age of ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 243-250
A Novel Approach for Data Mining Clustering Technique Using NeuralGas AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 251-254
Mining Students' Data for Prediction PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 255-262
Key Management for Cloud Data Storage: Methods and ComparisonsFull-text access may be available. Sign in or learn about subscription options.pp. 263-270
Modeling ETL Process for Data Warehouse: An Exploratory StudyFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
A New Approach to Pseudorandom Number GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Satellite Remote Sensing and GIS Based Sustainable Development of Coastal CityFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence DesignFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Time Series Modeling and Prediction Using Postfix Genetic ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 307-314
Scheduling in Grid Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 315-324
An Enhanced K-Nearest Neighbor Algorithm Using Information Gain and ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 325-329
An Arithmetic and Logic Unit Optimized for Area and PowerFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
Experimental Study of Remote Job Submission and Execution on LRM through Grid Computing MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 335-341
Design of a Novel Shaped Ultra Wideband Co-Axial Feed Microstrip Patch AntennaFull-text access may be available. Sign in or learn about subscription options.pp. 342-344
Telemonitoring Physiological Parameters of a Patient from a Distance by Near Field Communication MobileFull-text access may be available. Sign in or learn about subscription options.pp. 345-348
Investigation of EBG Array Performance on Decreasing the Mutual CouplingFull-text access may be available. Sign in or learn about subscription options.pp. 359-362
Triple Band Microstrip Slot Antenna for WIMAX/WLAN Applications with SRR Shape RingFull-text access may be available. Sign in or learn about subscription options.pp. 368-371
A Review of De-Facto MAC Standard: IEEE 802.11 DCFFull-text access may be available. Sign in or learn about subscription options.pp. 372-376
Performance Evaluation of CoDel for Active Queue Management in Wired-Cum-Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 381-385
Performance Analysis of Secure Wireless Local Area Network Using Test-BedFull-text access may be available. Sign in or learn about subscription options.pp. 386-389
Distributed and Prioritised Scheduling to Implement Carrier Aggregation in LTE Advanced SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Comparative Analysis of Queue Mechanisms with Respect to Various Traffic in Wired-Cum-Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 394-397
Analyzing Spoofing Attacks in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 398-402
Spectrum Sensing for Cognitive Radio Using Blind Source Separation and Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 409-414
Fuzzy Logic Based Stable On-Demand Multipath Routing Protocol for Mobile Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
Trustful Location Based Energy Deterioration on Demand Multipath Routing in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 427-431
Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 432-438
Green-Learning in IndiaFull-text access may be available. Sign in or learn about subscription options.pp. 447-450
Action-Based Trust Computation Algorithm for Online Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 451-458
Discrete Fractional Fourier Transform and Vector Quantization Based Speaker Identification SystemFull-text access may be available. Sign in or learn about subscription options.pp. 459-463
An Agent Based Efficient Traffic Framework Using FuzzyFull-text access may be available. Sign in or learn about subscription options.pp. 464-470
A Solution to Inverse Kinematics Problem Using the Concept of Sampling Importance ResamplingFull-text access may be available. Sign in or learn about subscription options.pp. 471-477
Glaucoma Detection Using Cross Validation AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 478-482
Performance Evaluation of Steganography Tools Using SVM and NPR ToolFull-text access may be available. Sign in or learn about subscription options.pp. 483-487
ECG Abnormalities Detection Using Doppler Shift MethodFull-text access may be available. Sign in or learn about subscription options.pp. 493-497
Doorway Monitoring System for Gamma Particle DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 502-508
Conflict-Free Collaborative Decision-Making over Mind-MappingFull-text access may be available. Sign in or learn about subscription options.pp. 509-515
Comparison of Characteristics of Transmission Lines Using Different EM SimulatorsFull-text access may be available. Sign in or learn about subscription options.pp. 516-522
MATLAB/Simulink Based Simulation of a Hybrid Power Flow ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 523-531
Controller Design via Sliding Mode Control Approach of Induction Motor -- A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 541-546
Author indexFreely available from IEEE.pp. 547-549
[Publisher's information]Freely available from IEEE.pp. 550-550
Showing 85 out of 85