Default Cover Image

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 2012)

July 26 2012 to July 28 2012

Coimbatore

Table of Contents

Channel modelling for ad-hoc communication in an underground sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Fuzzy based approach in Multihop networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Defect detection in woven fabric using weighted morphologyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance analysis of two hop bandwidth request for heterogeneous WiMAX networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Signaling analysis of heterogeneous bandwidth request for WiMAX multihop relay networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Steganalysis for audio streaming transmission via data communication networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Security of cloud computing system using object oriented techniqueFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Stability analysis of aperiodic messages scheduled in the dynamic segment of Flexray protocolFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Implementation of HNG using MZIFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Case based reasoning approach for adaptive test suite optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
On secure multiple image watermarking techniques using DWTFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Microstrip patch antennas with different polarizations in L-band applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Small scale characterization of marine channel using the finite-difference time domain methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Analog performance of bulk planar junctionless transistor (BPJLT)Full-text access may be available. Sign in or learn about subscription options.pp. 1-4
Hetero structure based Add Drop Filter for ITU-T G.694.2 CWDM systems using PCRRFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A novel approach for evaluation of changes in web services business logicFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Evaluation of routing schemes for group key distribution in Distributed Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A parallel segmentation of brain tumor from magnetic resonance imagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Smart card based remote user authentication schemes — SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Cluster based cooperative caching approach through mobility prophecy in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Analysis of speech characteristics of neurological diseases and their classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Generalized fractal dimensions in the recognition of Noise Free ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Design of MAP-REDUCE and K-MEANS based network clustering protocol for sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Multiple classification system for fracture detection in human bone x-ray imagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Smart bank simulation using Context awarenessFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Spatial load distribution of base station in vehicular networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Enhanced route discovery in Mobile Adhoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Super-resolution using DCT based learning with LBP as feature modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A low-power dual threshold voltage-voltage scaling technique for domino logic circuitsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A survey of pervasive computing projectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Resource allocation in multiuser OFDM systems — A surveyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Multi sensor wireless system optimized for elderly health monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Trust-Based Anonymous Communication for malicious user disclosure in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Internal Model Sliding Mode Controller for Mass flow system based on sensed flow rateFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Advance computing enrichment evaluation of cotton leaf spot disease detection using Image Edge detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A novel labelling algorithm for object countingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A complete mobile security architecture using client and server driven protocols (WMN)Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
Performance analysis of reconfigurable SRAM cell for low power multimedia applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Implementation of Cloud Computing technology in Indian education systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Internet banking fraud detection using HMMFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Simulation of multilayer Mobile IPv6 architecture in search of optimal performanceFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improving the resource utilization in grid environment using Aging TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
EEG driven model predictive position control of an artificial limb using neural netFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Efficient spectrum sharing and allocation schemes for throughput enhancements in a Cognitive Radio NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Visual query exploration process and generation of voluminous Image database for CBIR SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A novel scheduling algorithm for multiuser MIMO systems with channel decompositionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Audio-video based segmentation and classification using SVMFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Towards an approach for improved security in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Object detection and tracking in video using particle filterFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
A Discrete Wavelet Transform based analysis of sounds of some musical instrumentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Systematic approach for composing Web Service using XMLFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Design and performance prediction of 10GHz micro strip array antenna structuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Design and simulation of triple-band band pass filter for wireless communication applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An effective stroke feature selection method for online signature verificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Load balancing in Cellular Network: A reviewFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Hardware efficiency comparison of IP Cores for CAN & LIN protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
A survey on secured routing protocols for wireless sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Development of Compact Monopole Antenna for UWB ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance analysis of OFDMA in LTEFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Privacy preserving association rules in unsecured distributed environment using cryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Toggle rate estimation technique for FPGA circuits considering spatial correlationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Mining the customer behavior using web usage mining in e-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A trust based clustering with Ant Colony Routing in VANETFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
P2P Botnet detection: Combined host- and network-level analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An effective approach to counter application layer DDoS attacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Computer Vision system for cashew kernel area estimationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance improvement of MC-DS-CDMA system through ICI cancellation and modified duobinary coding schemeFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Artificial neural network modeling for road traffic noise predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Application of exponential atmosphere concept in improving Firefly AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Signature recognition using Krawtchouk momentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Implantable CPW fed dual folded dipole antenna for biomedical applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Perspective analysis of machine learning algorithms for detecting network intrusionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Speech enhancement by speech intelligibility index in sensor networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance evaluation of the energy efficient localization techniques in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Power aware zone based routing in a pervasive Irrigation Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Conceptual study and operational overview on Variable Frequency Transformer used for grid interconnectionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
VM provisioning policies to improve the profit of cloud infrastructure service providersFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Real-time breath rate monitor based health security system using non-invasive biosensorFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Image analysis system for 96-well plate fluorescence assaysFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Survey on performance, reliability and future proposal of Cognitive Radio under wireless computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
BER analysis of MIMO-OFDM using V-BLAST system for different modulation schemesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 100 out of 258