Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICCCNT
ICCCNT 2012
Generate Citations
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 2012)
July 26 2012 to July 28 2012
Coimbatore
Table of Contents
An enhanced smart multi-banking integrated system — Service oriented approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
P. Iyappan
,
V. PrasannaVenkatesan
,
R. Amarnath
,
L. Noor Mouhammed
,
A. Selvamani
Channel modelling for ad-hoc communication in an underground sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abishek Thekkeyil Kunnath
,
Prasanth.M. Warrier
A Fuzzy based approach in Multihop network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
A. Narendrakumar
,
K. Thygarajah
,
K. Thiagarajan
Defect detection in woven fabric using weighted morphology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
S. Priya
,
T. Ashok kumar
,
Varghese Paul
Performance analysis of two hop bandwidth request for heterogeneous WiMAX networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rajesh Anbazhagan
,
Nakkeeran Rangaswamy
Signaling analysis of heterogeneous bandwidth request for WiMAX multihop relay networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Rajesh Anbazhagan
,
Nakkeeran Rangaswamy
Steganalysis for audio streaming transmission via data communication networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
K. Sakthisudhan
,
M. Ram kumar
,
P. Thangaraj
Security of cloud computing system using object oriented technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Shipra Shukla
,
Rakesh Kumar Singh
Stability analysis of aperiodic messages scheduled in the dynamic segment of Flexray protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
P. R. Sunil Kumar
,
Lawrence Jenkins
Study of Application Level Event and Interfacing RFID Reader with the Personal Computer
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
S Arul Prakasam
,
R Anusri Sekar
,
S Venkatesa Karthick Kumar
,
G Vijay
Discrimination of environmental background noise sources using HOS based features of their filter bank decomposed sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
D. Jhanwar
,
Kamlesh K. Sharma
,
S.G. Modani
Implementation of HNG using MZI
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Goutam Kumar Maity
,
Santi P. Maity
Case based reasoning approach for adaptive test suite optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
B. Narendra Kumar Rao
,
A. RamaMohan Reddy
On secure multiple image watermarking techniques using DWT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
B. Sridhar
,
C. Arun
Microstrip patch antennas with different polarizations in L-band applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mahender Singh
,
Radhika
,
Priyanka Singh
Text line extraction from handwritten document pages based on line contour estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ram Sarkar
,
Sougata Halder
,
Samir Malakar
,
Nibaran Das
,
Subhadip Basu
,
Mita Nasipuri
Small scale characterization of marine channel using the finite-difference time domain method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jyoti Mansukhani
,
Saswat Chakrabarti
Analog performance of bulk planar junctionless transistor (BPJLT)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Ratul Kumar Baruah
,
Roy P. Paily
Hetero structure based Add Drop Filter for ITU-T G.694.2 CWDM systems using PCRR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Robinson
,
R. Nakkeeran
A novel approach for evaluation of changes in web services business logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. Thirumaran
,
P. Dhavachelvan
,
G. Naga Venkata Kiran
Evaluation of routing schemes for group key distribution in Distributed Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Suresha
,
N. Nalini
Reduced dimension fuzzy controller design based on fusion function and application in rotary inverted pendulum
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Abhishek Kumar
,
Yogesh Kumar
,
R. Mitra
A parallel segmentation of brain tumor from magnetic resonance images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vidhya S. Dessai
,
Megha P. Arakeri
,
Guddeti Ram Mohana Reddy
Detecting eye movement direction from stimulated Electro-oculogram by intelligent algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Anwesha Banerjee
,
Amit Konar
,
D.N. Tibarewala
,
R. Janarthanan
Smart card based remote user authentication schemes — Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
G. Jaspher
,
W. Katherine
,
E. Kirubakaran
,
Parul Prakash
Designing of an interval type-2 fuzzy logic controller for Magnetic Levitation System with reduced rule base
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Anupam Kumar
,
Manoj Kumar Panda
,
Sumanta Kundu
,
Vijay Kumar
Cluster based cooperative caching approach through mobility prophecy in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P. Kuppusamy
,
B. Kalaavathi
Optimal allocation of testing resource for modular software based on testing-effort dependent software reliability growth
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
N. Ahmad
,
M.G.M. Khan
,
Syed Faizul Islam
Analysis of speech characteristics of neurological diseases and their classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K Uma Rani
,
Mallikarjun S. Holi
Generalized fractal dimensions in the recognition of Noise Free Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
R. Uthayakumar
,
D. Easwaramoorthy
Design of MAP-REDUCE and K-MEANS based network clustering protocol for sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jyoti R. Patole
,
Jibi Abraham
Multiple classification system for fracture detection in human bone x-ray images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
N. Umadevi
,
S.N. Geethalakshmi
EEG controlled remote robotic system from motor imagery classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Saugat Bhattacharyya
,
Abhronil Sengupta
,
Tathagatha Chakraborti
,
Dhrubojyoti Banerjee
,
Anwesha Khasnobish
,
Amit Konar
,
D. N. Tibarewala
,
R. Janarthanan
Negative emotion recognition from stimulated EEG signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Garima Singh
,
Arindam Jati
,
Anwesha Khasnobish
,
Saugat Bhattacharyya
,
Amit Konar
,
D.N. Tibarewala
,
R. Janarthanan
Smart bank simulation using Context awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
J. Madhusudanan
,
V. Prasanna Venkatesan
,
P. Karthikeyan
,
S. Shilpa Devi
Spatial load distribution of base station in vehicular network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
K. Ravikumar
,
R. Suganya
Enhanced route discovery in Mobile Adhoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Sikkandar Ali Vashik Ali
,
W.R. Salem Jeyaseelan
,
Shanmugasundaram Hariharan
Super-resolution using DCT based learning with LBP as feature model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Parul V. Pithadia
,
Prakash P. Gajjar
,
J. V. Dave
A low-power dual threshold voltage-voltage scaling technique for domino logic circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
P. Arun
,
S. Ramasamy
A survey of pervasive computing projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
A. Kalaiselvi
,
V. Indumathy
,
G. Gajalakshmi
,
J. Madhusudanan
,
V. Prasanna Venkatesan
Resource allocation in multiuser OFDM systems — A survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
K. Sumathi
,
M. L. Valarmathi
Multi sensor wireless system optimized for elderly health monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nirmalya Samanta
,
Subhadip Dey
,
Chirasree RoyChaudhuri
Certain investigations on adaptive routing protocol based on geo location, energy and mobility for MANETS
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
N. Senthil Kumar
,
R.K. Gnanamurthy
,
N. Senthil vel
Trust-Based Anonymous Communication for malicious user disclosure in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
M. Gunasekaran
,
K. Premalatha
Internal Model Sliding Mode Controller for Mass flow system based on sensed flow rate
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jenita J Shibani
,
Jeraldin D Auxillia
Advance computing enrichment evaluation of cotton leaf spot disease detection using Image Edge detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P. Revathi
,
M. Hemalatha
A novel labelling algorithm for object counting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
M Swaraj Raman
,
M Sukanya
A complete mobile security architecture using client and server driven protocols (WMN)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
N. Suresh Kumar
,
S. Selvakani
Performance analysis of reconfigurable SRAM cell for low power multimedia applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dillibabu Mannem
,
S. Ramasamy
Security Authentication through AES and fine-grained distributed Data Access Control using clustering in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
R. Velayutham
,
J. Mary Suganya
Implementation of Cloud Computing technology in Indian education system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Gaurav Bhatia
,
Ajay Lala
Internet banking fraud detection using HMM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sunil S Mhamane
,
L.M.R.J Lobo
Simulation of multilayer Mobile IPv6 architecture in search of optimal performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nitul Dutta
,
Iti Saha Misra
Improving the resource utilization in grid environment using Aging Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P Dhivya.
,
V Sangamithra.
,
R. KamalRaj
,
S. Karthik
EEG driven model predictive position control of an artificial limb using neural net
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Rinku Roy
,
Amit Konar
,
D. N. Tibarewala
,
R. Janarthanan
Modification of classical two loop lateral missile autopilot design using reduced order observer (DGO) and LQR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Parijat Bhowmick
,
Gourhari Das
Efficient spectrum sharing and allocation schemes for throughput enhancements in a Cognitive Radio Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
V. Jayaraj
,
J. Jegathesh Amalraj
Visual query exploration process and generation of voluminous Image database for CBIR Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
P. Ambika
,
J. Abdul Samath
A novel scheduling algorithm for multiuser MIMO systems with channel decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
V.Vishnu Dharshini
,
K. Chanthirasekaran
Audio-video based segmentation and classification using SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K. Subashini
,
S. Palanivel
,
V. Ramaligam
Towards an approach for improved security in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
T. Thenmozhi
,
R.M. Somasundaram
Object detection and tracking in video using particle filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
T.Senthil Kumar
,
S.N. Sivanandam
A Discrete Wavelet Transform based analysis of sounds of some musical instruments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Raghavendra Sharma
,
V Prem Pyara
Systematic approach for composing Web Service using XML
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Sunil R Dhore
,
Hariswaroop Gangwar
,
Pradyumn Mishra
,
Rahul Sharma
,
Rajeev Singh
Design and performance prediction of 10GHz micro strip array antenna structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
D. Murugan
,
M.Ganesh Madhan
,
S. Piramasubramanian
Design and simulation of triple-band band pass filter for wireless communication applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
M.Manoj Prabhakar
,
M.Ganesh Madhan
An effective stroke feature selection method for online signature verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ritesh C. Sonawane
,
Manoj E. Patil
Load balancing in Cellular Network: A review
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Abhijit Sharma
,
Avijit Roy
,
Suman Ghosal
,
Rituparna Chaki
,
Uma Bhattacharya
Design of differential voltage mode transmitter for on-chip serial link based on method of logical effort
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
M. Bhaskar
,
D. Prasannakumar
,
B. Venkataramani
A simple VCSEL based opto electronic module for optical logic and interface applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
M.R. Rajesh Kumar
,
M.Ganesh Madhan
,
Mahraj Sivaraj
,
Sanjeev Suresh
,
M. Parasuraman
Hardware efficiency comparison of IP Cores for CAN & LIN protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
V V Krishnapriya
,
M Sikha
,
R Nandakumar
,
Jayaraj U Kidav
A survey on secured routing protocols for wireless sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shashikala
,
C Kavitha.
Development of Compact Monopole Antenna for UWB Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S.Oudaya Coumar
,
R. Nakkeeran
,
G. Ashwath
Performance analysis of OFDMA in LTE
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S.S. Prasad
,
C.K. Shukla
,
Raad Farhood Chisab
Implementation of a trust model over AODV in a wireless ad hoc testbed
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chandrakant Gaurav
,
Dhivya Chandramouleeswaran
,
Rashda Khanam
,
Revathi Venkataraman
,
M. Pushpalatha
,
T. Rama Rao
Privacy preserving association rules in unsecured distributed environment using cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ashish C. Patel
,
Udai Pratap Rao
,
Dhiren R. Patel
Continuous monitoring of heart rate variability and haemodynamic stability of an automobile driver to prevent road accidents
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sriram Emarose
,
Rajmohan Asokan
,
Deepak Valayaputtur
Toggle rate estimation technique for FPGA circuits considering spatial correlation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
P.J. Anju
,
S.R. Ramesh
Mining the customer behavior using web usage mining in e-commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mahendra Pratap Yadav
,
Mhd Feeroz
,
Vinod Kumar Yadav
A trust based clustering with Ant Colony Routing in VANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Rashmi Ranjan Sahoo
,
Rameswar Panda
,
Dhiren Kumar Behera
,
Mrinal Kanti Naskar
P2P Botnet detection: Combined host- and network-level analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
K. Muthumanickam
,
E. Ilavarasan
An effective approach to counter application layer DDoS attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
S. Renuka Devi
,
P. Yogesh
Computer Vision system for cashew kernel area estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
V G Narendra
,
Dasharathraj K Shetty
,
K S Hareesh
Performance improvement of MC-DS-CDMA system through ICI cancellation and modified duobinary coding scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. Chitra
,
N. Kumaratharan
Artificial neural network modeling for road traffic noise prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Kranti Kumar
,
M. Parida
,
V.K. Katiyar
Microstrip, slotted rectangular waveguide array and Patch-fed rod antenna design and simulation for Gigabit wireless communications at 60 GHz
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
T. Rama Rao
,
S. Ramesh
Application of exponential atmosphere concept in improving Firefly Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
A Manju
,
M.J Nigam
Signature recognition using Krawtchouk moments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Manoj E. Patil
,
Megha V. Borole
Implantable CPW fed dual folded dipole antenna for biomedical applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Ashok Kumar
,
T. Shanmuganantham
Perspective analysis of machine learning algorithms for detecting network intrusions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
G.V. Nadiammai
,
M. Hemalatha
Speech enhancement by speech intelligibility index in sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Smita Parija
,
Prasanna Kumar Sahu
,
Sudhansu Sekhar Singh
Performance evaluation of the energy efficient localization techniques in WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
D. Angeline Ranjithamani
,
A. Suruliandi
Power aware zone based routing in a pervasive Irrigation Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
S. Udhayakumar
,
Latha TamilSelvan
,
D. Umanandhini
,
U. RajKumar
,
K. Dhinakaran
Conceptual study and operational overview on Variable Frequency Transformer used for grid interconnections
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
V.R. Vanajaa
,
N.A. Vasanthi
VM provisioning policies to improve the profit of cloud infrastructure service providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Komal Singh Patel
,
A. K. Sarje
Real-time breath rate monitor based health security system using non-invasive biosensor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sumanta Bose
,
K Prabu
,
D. Sriram Kumar
Image analysis system for 96-well plate fluorescence assays
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
S. Muttan
,
P Durai Arun
,
K. Sankaran
An efficient detection of flooding attacks to Internet Threat Monitors (ITM) using entropy variations under low traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
K Munivara Prasad
,
A Rama Mohan Reddy
,
K Venugopal Rao
Survey on performance, reliability and future proposal of Cognitive Radio under wireless computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
A. Umamaheswari
,
V. Subashini
,
P. Subhapriya
BER analysis of MIMO-OFDM using V-BLAST system for different modulation schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
P. Samundiswary
,
Selvia Kuriakose
Showing 100 out of 258
Load More
Load All