Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CICSYN
CICSYN 2009
Generate Citations
Computational Intelligence, Communication Systems and Networks, International Conference on
July 23 2009 to July 25 2009
Indore, India
ISBN: 978-0-7695-3743-6
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Copyright Page
Freely available from IEEE.
pp. iv
Papers
Table of Contents
Freely available from IEEE.
pp. v-xii
Papers
Conference Information
Freely available from IEEE.
pp. xiii-xvii
Papers
Grid Computing: Tenfold Acceleration on the Internet/Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Frank Zhigang Wang
Papers
Microwave High Power Amplifiers for Satellite Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 3
by
Raghuvir Tomar
Papers
Throwing of Objects: A New Technology for Factory Automation
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-5
by
Heinz Frank
Papers
A Fast Method for Detection of Video Shot Boundaries Using Compressed Domain Features of H.264 for PVR Enabled Set Top Boxes: A Novel Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-11
by
Tanushyam Chattopadhyay
,
Ayan Chaki
,
Utpal Garain
Papers
An Ultra Wide-Band VCO Using MOS Varactor in 0.35
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-16
by
H. Mokari
,
A.A. Lotfi Neyestanak
,
G. Zandkarimi
Papers
Refine Crude Corpus for Opinion Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-22
by
Debnath Bhattacharyya
,
Poulami Das
,
Kheyali Mitra
,
Swarnendu Mukherjee
,
Debashis Ganguly
,
Samir Kumar Bandyopadhyay
,
Tai-hoon Kim
Papers
Dynamic Path Selection Algorithm for Beneš Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Amitabha Chakrabarty
,
Martin Collier
,
Sourav Mukhopadhyay
Papers
Rank-Based Genetic Algorithm with Limited Iteration for Grid Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Wael Abdulal
,
Omar Al Jadaan
,
Ahmad Jabas
,
S. Ramachandram
,
Mustafa Kaiiali
,
C.R. Rao
Papers
Integration of Artificial Intelligence and Database Management System: An Inventive Approach for Intelligent Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
Neelu Nihalani
,
Sanjay Silakari
,
Mahesh Motwani
Papers
An Application of OPC Data Interaction in the Bag Filter Monitor System
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-44
by
Chao Pan
,
Qing Wang
,
Wanlin Gao
,
Ganghong Zhang
,
Xinlan Jiang
,
Wei Shao
,
Lina Yu
Papers
Simulation of Coordinating Sniffer Robots for Building Odor Maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-50
by
Niket Tandon
,
A. Karthik
,
Shardul Singh Rana
,
P. Venkata Krihsna
Papers
Engineering Case Studies Using Parameterless Penalty Non-dominated Ranked Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-56
by
Omar Al Jadaan
,
Ahmad Jabas
,
Wael Abdula
,
Lakshmi Rajamani
,
Essa Zaiton
,
C.R. Rao
Papers
Solar Energy Harvesting for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-61
by
P.T.V. Bhuvaneswari
,
R. Balakumar
,
V. Vaidehi
,
P. Balamuralidhar
Papers
Analog Multiplier with High Accuracy
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-66
by
K. Diwakar
,
C. Senthilpari
,
Ajay Kumar Singh
,
Lim Way Soong
Papers
An Approach for Interpretation of MEMS Data for Gesture Based Man Machine Interaction in Advanced Set-top Box
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-72
by
Tanushyam Chattopadhyay
,
Soumali Roychowdhury
,
Mita Nasipuri
Papers
A New Approach to Task Allocation in Wireless Sensor Actor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-78
by
Hossein Momeni
,
Mohsen Sharifi
,
Saeed Sedighian
Papers
An Eifficient Method for Generating Coherent Digital Sweep Signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-85
by
Ashraf Samarah
,
Mohammad Al-Ibrahim
,
Otmar Loffeld
Papers
Transmission of Data Using Distinct Intensity Levels in IR Radiations
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Viranjay M. Srivastava
,
Nitish Paliwal
,
Anupam Chahar
Papers
Fuzzy-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-95
by
A. Osmani
,
M. Dehghan
,
H. Pourakbar
,
P. Emdadi
Papers
Touch Sensor Assembly Using Infrared Radiations and its Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-98
by
Vanita Rana
,
Nitish Paliwal
,
Anupam Chahar
Papers
Channel Guard in ROADM Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-101
by
Anuj Malik
,
Sanjay Choudhary
Papers
A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Sushil Kumar Jain
,
Kumkum Garg
Papers
Primary Interference Suppression in Secondary Underlay Transmission Using Direct Sequence Spread Spectrum
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
by
Shadi Ebrahimi Asl
,
Bahman Abolhassani
Papers
PAPR Reduction for OFDM Scheme by New Partial Transmit Sequence Technique in Wireless Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-118
by
Pankaj Kumar Sharma
,
R.K. Nagaria
,
T.N. Sharma
Papers
Wireless System for Monitoring Environmental Variables of Rain Shelter House (RSH)
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Saiful Farhan M. Samsuri
,
Robiah Ahmad
,
Mohamed Hussein
,
Abd. Rahman Abdul Rahim
Papers
Wireless Sensor Network Based Industrial Monitoring & Diagnostic System
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Sumeet Gupta
,
Shekhar Varma
,
G.S. Tomar
,
R.K. Abrol
Papers
Self-Protection Strategies in WSN Using Geometrical Arrays of Directional Antennas and Incremental RSSI Measuments
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-136
by
Mario Limon Mendoza
,
Victor Hugo Zarate Silva
Papers
Evaluation of Self-Organization Architecture for Special WSN Using Geometrical Arrays of Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-142
by
Mario Limon Mendoza
,
Victor Hugo Zarate Silva
Papers
Distributed Energy Efficient Key Distribution for Dense Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-148
by
Abhishek Goyal
,
Navdeep Kaur
,
Padmavati
,
Kuldeep
,
Ramamurthy Garimella
Papers
MAIL: Multi-Hop Adaptive Iterative Localization for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-154
by
S.B. Kotwal
,
Shekhar Verma
,
G.S. Tomar
,
R.K. Abrol
Papers
Electrical Model Simulation for a UHF RFID System
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-159
by
Sara Abou Chakra
,
Usamah O. Farrukh
,
Beatriz Amante Garcia
Papers
RFID Tracking System for Vehicles (RTSV)
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Anala Aniruddha Pandit
,
Ankit Kumar Mundra
,
Jyot Talreja
Papers
RFID Assisted Vehicular Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-171
by
Chirawat Kotchasarn
Papers
Simplified Application of the IEC 61850 for Distributed Energy Resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Heinz Frank
,
Sidonia Mesentean
,
Friederich Kupzog
Papers
A Survey for Designing Attack Resilient and Adaptive Medium Access Control Protocol for Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Piyush Kumar Shukla
,
S. Silakari
,
S.S. Bhadouria
,
Shikha Sharma
Papers
An Adaptive Medium Access Control Protocol for Computer Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-189
by
Piyush Kumar Shukla
,
S. Silakari
,
S.S. Bhadouria
,
Kavindra Raghuvanshi
,
Mitesh Bargadiya
Papers
Joint Radio Resource Management for HSDPA and WiMAX Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-195
by
Hesham Mahmoud El Sawy
,
Hesham Mohamed El Badawy
,
Khaled Ali Shehata
Papers
Multi-Objective Optimization of NARX Model for System Identification Using Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-201
by
S. Mohammad Reza Loghmanian
,
Robiah Ahmad
,
Hishamuddin Jamaluddin
Papers
Utilization of SIP Contact Header for Reducing the Load on Proxy Servers in FoIP Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-206
by
Ketan J. Sarvakar
,
Kiran R. Amin
,
Rajendra J. Patel
,
Menka Patel
,
Komal A. Maheta
,
Bhavesh P. Patel
Papers
C^3 Semantics Modeling--Dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
John Ronczka
Papers
On Prediction Accuracy of Machine Learning Algorithms for Characterizing Shared L2 Cache Behavior of Programs on Multicore Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-219
by
Jitendra Kumar Rai
,
Atul Negi
,
Rajeev Wankar
,
K.D. Nayak
Papers
Saksham: Customizable x86 Based Multi-Core Microprocessor Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Amol Vasudeva
,
Arvind Kumar Sharma
,
Ashish Kumar
Papers
Performance Improvement of Wi-Max IEEE 802.16e in Presence of Different FEC Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-229
by
Shraddha Bansal
,
Raksha Upadhyay
Papers
A Comparative Study between Two Parameter Estimators for the Synthesis of an Electrical Machine Default Detection Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-234
by
Sondess Ben Aoun
,
Nabil Derbil
Papers
Experimental Analysis of Different Metrics (Object-Oriented and Structural) of Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Lalji Prasad
,
Aditi Nagar
Papers
An Architecture for Mobile Social Networking Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Juwel Rana
,
Johan Kristiansson
,
Josef Hallberg
,
Kâre Synnes
Papers
A Design of Sensor Web Registry for Wireless Sensor Networks with SOA Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Kamlendu Kumar Pandey
,
S.V. Patel
Papers
Models and Transformations in MDA
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Yashwant Singh
,
Manu Sood
Papers
Classification Rule Mining for Object Oriented Databases: A Brief Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Ajita Satheesh
,
D.K. Mishra
,
Ravindra Patel
Papers
Design of 1.3 GHz Microstrip Highpass Filter Using Optimum Distributed Short Circuited Stubs
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-267
by
Subodh Kumar Singhal
,
Deepak Sharma
,
Ram Mehar Singh Dhariwal
Papers
Design of 1.5 GHz Quasilumped Microstrip Highpass Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-270
by
Deepak Sharma
,
Subodh Kumar Singhal
,
Ram Mehar Singh Dhariwal
Papers
Prioritization of Scenarios Based on UML Activity Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Sapna P.G.
,
Hrushikesha Mohanty
Papers
Design & Development of Small Linux Operating System for Browser Based Digital Set Top Box
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-281
by
Lalit Kumar
,
Rajesh Kushwaha
,
Rishi Prakash
Papers
Dynamic Interaction Analysis of Soil and End Bearing Pile Using Boundary Element Model Coupled with Finite Element Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
Paulus Karta Wijaya
Papers
Enhanced Authentication Mechanism for Next Generation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-295
by
Mamdouh Gouda
,
Mohamed Haggag
Papers
Content-Split Based Effective String-Matching for Multi-Core Based Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-301
by
Subramanian Neelakantan
,
Shrisha Rao
Papers
Hybrid Spam E-mail Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Ronald Bhuleskar
,
Anoop Sherlekar
,
Anala Pandit
Papers
A Single Sign-On Model for Web Services Based on Password Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-313
by
Lata Kiran
,
Kuldip Singh
,
Sandeep Sood
Papers
Shielding against SQL Injection Attacks Using ADMIRE Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-320
by
Supriya Madan
,
Sushila Madan
Papers
Information Security Risk Assessment in Healthcare: The Experience of an Italian Paediatric Hospital
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Michele Bava
,
Domenico Cacciari
,
Edoardo Sossa
,
Daniel Zotti
,
Riccardo Zangrando
Papers
Correcting Noise in Block Ciphers
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-331
by
Nabil M.K. Mirza
,
Ziad Osman
,
Rached Zantout
,
Mohamed El-Sayed
Papers
Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-335
by
Aditi Yoganand Athavale
,
Kuldip Singh
,
Sandeep Sood
Papers
Efficient Snort Rule Generation Using Evolutionary Computing for Network Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Raghavan Muthuregunathan
,
Siddharth S.
,
Srivathsan R.
,
Rajesh S.R.
Papers
An Ethical Way of Image Encryption Using ECC
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-345
by
Kamlesh Gupta
,
Sanjay Silakari
,
Ranu Gupta
,
Suhel A. Khan
Papers
Synthetic Aperture Radar Image Processing Based on Piecewise Linear Mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Navneet Agrawal
,
K. Venugopalan
Papers
Amplitude Phase Algorithm for SAR Signal Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Navneet Agrawal
,
K. Venugopalan
Papers
Probability Based Search Motion Estimation Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Deepak J. Jayaswal
,
Mukesh A. Zaveri
Papers
A New Fast Radix-2 Decimation-in-Frequency Algorithm for Computing the Discrete Hartley Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-368
by
Gautam Abhaychand Shah
,
Tejmal Saubhagyamal Rathore
Papers
Orthogonal Hermite Pulses for Indoor Communication with UWB (S-V) Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-373
by
Joanne Newton Gomes
,
B.K. Mishra
Papers
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Debnath Bhattacharyya
,
Jhuma Dutta
,
Poulami Das
,
Samir Kumar Bandyopadhyay
,
Tai-hoon Kim
Papers
Cyclostationarity-Based Spectrum Sensing for Analog TV and Wireless Microphone Signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
Alfateh M. Alhassan Mossa
,
Varun Jeoti
Papers
Adaptive Classified Vector Quantisation of Non-orthogonal Representations of Images and its Application to Image Compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-391
by
Abir Jaafar Hussain
,
Dhiya Al-Jumeily
,
Paulo Lisboa
Papers
Compressed Domain Image Retrieval Using Thumbnails of Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-396
by
Vidya R. Khapli
,
Anjali S. Bhalchandra
Papers
Multiple Subgroup Data Compression Technique Based on Huffman Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
Piyush Kumar Shukla
,
Pradeep Rusiya
,
Deepak Agrawal
,
Lata Chhablani
,
Balwant Singh Raghuwanshi
Papers
Image Clustering Using Color and Texture
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-408
by
Manish Maheshwari
,
Sanjay Silakari
,
Mahesh Motwani
Papers
High Immunity Triple Channelized Correlation Receiver
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-413
by
Mamdouh Gouda
Papers
Detection and Classification of Moving Objects by Using Real Time Traffic Flux through Differential and Graphical Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
H.S. Mohana
,
M. Ashwathakumar
,
G. Shivkumar
,
Manjunatha K.C.
Papers
Pseudonym Based Mechanism for Sustaining Privacy in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Brijesh Kumar Chaurasia
,
Shekhar Verma
,
Geetam Singh Tomar
,
S.M. Bhaskar
Papers
Agent Based Replica Placement in a Data Grid Environement
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-430
by
Shaik Naseera
,
K.V. Madhu Murthy
Papers
Reducing Feed-Forward Neural Network Processing Time Utilizing Matrix Multiplication Algorithms on Heterogeneous Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-435
by
Ali Kattan
,
Rosni Abdullah
,
Rosalina Abdul Salam
Papers
A Communication-Centric Embedded System Architecture (ACCESA)
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-441
by
Radha Guha
Papers
PASE: P2P Network Based Academic Search and File Sharing Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-447
by
Amol Vasudeva
,
J. Sandeepan
,
Nitin Kumar
Papers
Semantic Similarity Based Focused Crawling
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-453
by
Mehdi Ravakhah
,
Mohsen Kamyar
Papers
Fuzzy Two Time-scale Congestion Control Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-458
by
Mehdi Mohtashamzadeh
,
Mohsen Soryani
,
Mahmoud Fathy
Papers
Toward the Intelligent Web Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-463
by
Radha Guha
Papers
Design of Energy Efficient Scheme for Conducting Secure E-Class Application on MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-469
by
Ekta Verma
,
Jibi Abraham
,
Snehlata Yadav
Papers
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-475
by
K. Kumar
,
J. Nafeesa Begum
,
V. Sumathy
Papers
Remote Surveillance System over MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-481
by
Bathrun J.
,
Manju R.
,
Darshana R.
,
Kathiravan K.
Papers
Throughput Enhancement of Multi-hop Static Ad-hoc Networks through Concurrent Transmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 482-485
by
Rajesh Verma
,
Arun Prakash
,
Rajeev Tripathi
,
Neeraj Tyagi
Papers
A Class of ANFIS Based Channel Equalizers for Mobile Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-491
by
K.C. Raveendranathan
Papers
Call Admission Control Approaches in Beyond 3G Networks Using Multi Criteria Decision Making
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-496
by
Ramesh Babu H.S.
,
Gowri Shankar
,
Satyanarayana P.S.
Papers
User Centric Quality of Experience Testing for Video on Demand over IMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-504
by
Alhad Kuwadekar
,
Khalid Al-Begain
Papers
Multimedia Transmission over Wireless LANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-510
by
K. Kathiravan
,
R. Ramya
,
Tinu Sara Titus
Papers
Performance Evaluation Techniques for Mobile Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-515
by
Ranjeet Singh Tomar
,
Geetam Singh Tomar
Papers
Author Index
Freely available from IEEE.
pp. 516-519
Showing 100 out of 101
Load More
Load All