Default Cover Image

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)

July 4 2013 to July 6 2013

Tiruchengode, India

Table of Contents

A survey on trust & trust-based schemes in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance analysis of Montgomery multiplier for public key cryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Stochastic analysis of data collection using Mobile Sink with fixed and variable trajectoriesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Ensemble based optimal classification model for pre-diagnosis of lung cancerFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Fusion fingerprint minutiae matching system for personal identificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
URED: Upper threshold RED an efficient congestion control algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Data security in cloud using RSAFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Viper Snake intelligent algorithm using missile tracking and attacking systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Protection of depth-image-based rendering 3D images using blind watermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Wireless embedded device (PIC) based on MiWi technology for monitoring physiological parametersFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
VHDL implementation of UART with BIST capabilityFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Comparison of data mining classification algorithms for breast cancer predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Mining hidden communities in social networks using KD-Tree and improved KD-TreeFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Design and implementation of a BIST embedded high speed RS-422 utilized UART over FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Challenges & approaches in multi-label image annotationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Improving dynamic data integrity verification in cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Energy aware optimal cluster head selection in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Bio-inspired algorithm for optimizing the localization of wireless sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Image encryption using separable reversible data hiding schemeFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
“Multi-tenant SaaS cloud”Full-text access may be available. Sign in or learn about subscription options.pp. 1-4
Low cost real time vehicle tracking systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Objective assesment of different segmentation algorithm for underwater imagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Information gradient based content search architecture for mobile opportunistic networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient QR decomposition algorithm for LTE standardFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Deployment of femtocell and antenna in commercial building in cost effective wayFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Improve the performance of LRU page replacement algorithm using augmentation of data structureFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM]Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Incremental PSVM for underwater target classification with incorporation of new classesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Low-power and area-efficient carry select adder using modified BEC-1 converterFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Test pattern generation for benchmark circuits using LFSRFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Concentration control of CSTR through fractional order PID controller by using soft techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Sine/cos generator for direct digital frequency synthesizer using pipelined CORDIC processorFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Reliable OSPM schema for secure transaction using mobile agent in micropayment systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Evaluation of tumor segmentationFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Hand gesture to speech conversion using MatlabFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Adoption of business intelligence: In hotel industryFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Survey on privacy preserving updates on unidentified databaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Optimization of migration downtime of virtual machines in cloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Shot boundary detection using color correlogram and Gauge-SURF descriptorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Enhancement of coarse-grained parallel genetic algorithm for shortest path routingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A survey on scalable image indexing and searchingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Reputation-based mechanism to mitigate misbehavior in mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance evaluation of encryption techniques and uploading of encrypted data in cloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Virtual world for education and entertainmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An algorithm to enhance security in RSAFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Framework for enhanced joint connectivity and coverage using random based distribution in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An improved motion detection and tracking of active blob for video surveillanceFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Evolving profligate and conspicuous web applications using reverse AJAXFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Evaluating MANET routing protocols under multimedia trafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Detection of brain tumor using neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Behavior recognition in surveillance video using temporal featuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Low power analysis of MAC using modified booth algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Gear tooth fault detection by autoregressive modellingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Robust and cost-effective security algorithm for pre-stage and post-stage of data aggregationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Addition of polydimethylsiloxane in FOS technology for sustainable sensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Architecture design of illumination change progressive motion estimation algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Energy efficient spinal scheduling on mobile sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Modified full search block matching algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Classification and retrieval of natural scenesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Identifying trusted routing path in WSNs through TARFFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Effectiveness of RTS/CTS in IEEE 802.11 wireless adhoc network in light of order dependent captureFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Automatic registration of images with simulated rotation and translation estimation using HAIRISFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Intrusion detection system on MAC layer for attack prevention in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Efficient method for controlling electric power by automated monitoring system using FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Smooth query processing in spatial databaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A novel algorithm for fingerprint identification using ellipse methodFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
High performance distributed computingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Double image encryption using double pixel scrambling and linear canonical transformFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Detecting anomalies in WLAN using discrimination algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
High performance low power dual edge triggered static D flip-flopFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Hybrid fuzzy classifier based on feature-wise membership given by artificial neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
RESTful Web Service integration using Android platformFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improved power control for femtocells in the presence of channel uncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A remote experimentation using virtual laboratoryFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Enhanced fault tolerance using EMRC in wireless communicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Domain specific modeling framework for agent developmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Review: Performance evolution of different detection techniques in V-BLASTFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance evaluation and comparison of routing protocols in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A novel asymmetric coplanar strip fed antenna for dual band applicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Enhanced ant clustering algorithm (EACA) for distributed databasesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Design and analysis of I-shaped MIMO antenna for wireless applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Performance evaluation of color image segmentation using K means clustering and watershed techniqueFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Towards a cross layer framework for improving the QoS of delay sensitive heterogeneous WMSNsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Embedded VoIP communication system with graphical user interface featuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 100 out of 397