Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICCCNT
ICCCNT 2013
Generate Citations
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
July 4 2013 to July 6 2013
Tiruchengode, India
Table of Contents
A survey on trust & trust-based schemes in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. Kavitha
,
Shrikant S. Tangade
Performance analysis of Montgomery multiplier for public key cryptosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Sandeep Kakde
,
G. Somulu
,
Pravin Zode
Implementation of Xenserver to ensuring business continuity through power of virtualization for cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
N. Staalinprasannah
,
S. Suriya
Stochastic analysis of data collection using Mobile Sink with fixed and variable trajectories
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Pushpavalli
,
K. Indra Gandhi
Ensemble based optimal classification model for pre-diagnosis of lung cancer
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
K. Balachandran
,
R. Anitha
Fusion fingerprint minutiae matching system for personal identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Pratixa I Mistry
,
Chirag N Paunwala
URED: Upper threshold RED an efficient congestion control algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chandni M. Patel
A novel approach for image enhancement by using contrast limited adaptive histogram equalization method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
S. Muniyappan
,
A. Allirani
,
S. Saraswathi
Data security in cloud using RSA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Pachipala Yellamma
,
Challa Narasimham
,
Velagapudi Sreenivas
Viper Snake intelligent algorithm using missile tracking and attacking system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
M. Venkateswaran
,
M. Backialakshmi
Protection of depth-image-based rendering 3D images using blind watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K. A. Arun
,
P. Jeno Poul
Evaluation performance study of Firefly algorithm, particle swarm optimization and artificial bee colony algorithm for non-linear mathematical optimization functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Siddharth Agarwal
,
Amrit Pal Singh
,
Nitin Anand
Wireless embedded device (PIC) based on MiWi technology for monitoring physiological parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
S. Nurul Hidaya
,
P. Jenopaul
VHDL implementation of UART with BIST capability
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Nitin Patel
,
Naresh Patel
Comparison of data mining classification algorithms for breast cancer prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Chintan Shah
,
Anjali G. Jivani
Mining hidden communities in social networks using KD-Tree and improved KD-Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
R. Renuga Devi
,
M. Hemalatha
Characterization of an optical communication system utilizing dispersion compensating fiber and nonlinear optical effects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K. Miziya
,
S. K. Sudheer
,
Alina C. Kuriakose
An effective numbering and classification system for dental panoramic radiographs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Vijayakumari Pushparaj
,
Ulaganathan Gurunathan
,
Banumathi Arumugam
,
Abhinaya Baskaran
,
Alamelu Valliappan
Design and implementation of a BIST embedded high speed RS-422 utilized UART over FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shumit Saha
,
Md Ashikur Rahman
,
Amit Thakur
Challenges & approaches in multi-label image annotation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
A. Kalaivani
,
S. Chitrakal
Improving dynamic data integrity verification in cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Trushna S. Khatri
,
G. B. Jethava
Energy aware optimal cluster head selection in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
M. Natarajan
,
R. Arthi
,
K. Murugan
Bio-inspired algorithm for optimizing the localization of wireless sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
A. Tamizharasi
,
R. Arthi
,
K. Murugan
Image encryption using separable reversible data hiding scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. Smitha
,
V. E. Jayanthi
,
Ajitha Merlin
“Multi-tenant SaaS cloud”
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Gurudatt Kulkarni
,
Rupali Shelke
,
Rajnikant Palwe
,
Prasad Khatawkar
,
Sadanand Bhuse
,
Hemant Bankar
Low cost real time vehicle tracking system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Rohit Minni
,
Rajat Gupta
Objective assesment of different segmentation algorithm for underwater images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jay C. Acharya
,
Sohil A. Gadhiya
,
Kapil S. Raviya
Information gradient based content search architecture for mobile opportunistic network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Suvadip Batabyal
,
Parama Bhaumik
Multi pattern matching technique on fragmented and out-of-order packet streams for intrusion detection system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Manish Kumar
,
M. Hanumanthappa
Efficient QR decomposition algorithm for LTE standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
K. Kalyani
,
D. Sellathambi
,
S. Rajaram
An efficient web recommender system based on approach of mining frequent sequential pattern from customized web log preprocessing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Manisha Valera
,
Uttam Chauhan
Deployment of femtocell and antenna in commercial building in cost effective way
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Lavina Balraj
,
R. Kavitha
Second order twisting sliding mode control of multi-agent network with input disturbance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Udayan B. Kamble
,
Jayalakshmi O. Chandle
,
V. S. Lahire
,
R. D. Langde
Improve the performance of LRU page replacement algorithm using augmentation of data structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
C. C. Kavar
,
S. S. Parmar
Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM]
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P. Jain Pratik
,
B. R. Madhu
Incremental PSVM for underwater target classification with incorporation of new classes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Poonam Panchal
,
Sarath Gopi
,
R. Pradeepa
Low-power and area-efficient carry select adder using modified BEC-1 converter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
L. Mugilvannan
,
S. Ramasamy
Test pattern generation for benchmark circuits using LFSR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chengani VinodChandra
,
S. Ramasamy
Concentration control of CSTR through fractional order PID controller by using soft techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abhishek Singh
,
Veena Sharma
Sine/cos generator for direct digital frequency synthesizer using pipelined CORDIC processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
P. Saravanan
,
S. Ramasamy
Reliable OSPM schema for secure transaction using mobile agent in micropayment system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
N. Chitra Kiran
,
G. Narendra Kumar
Evaluation of tumor segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sonam Bansal
,
Ajay Mittal
Hand gesture to speech conversion using Matlab
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
R. R. Itkarkar
,
Anil V. Nandi
Adoption of business intelligence: In hotel industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mehdi Daryaei
,
Majid Shirzad
,
Vinod Kumar
Survey on privacy preserving updates on unidentified database
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
E. Gokulakannan
,
K. Venkatachalapathy
Optimization of migration downtime of virtual machines in cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
J. Arputharaj Johnson
Bandwidth Map-TCP friendly rate control algorithm for improving QoS in streaming applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K. Suresh Kumar Reddy
,
D. Rajaveerappa
,
S. Khadeeja Banu
Shot boundary detection using color correlogram and Gauge-SURF descriptors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
C. R. Deepak
,
R. Umesh Babu
,
Khande Bharath Kumar
,
C. M. Rahul Krishnan
Enhancement of coarse-grained parallel genetic algorithm for shortest path routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
L. Venkatesan
,
P. Sivakumar
A survey on scalable image indexing and searching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Suchitra
,
S. Chitrakala
Reputation-based mechanism to mitigate misbehavior in mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P. Mani
,
P. Kamalakkannan
Performance evaluation of encryption techniques and uploading of encrypted data in cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
V. Sreenivas
,
C. Narasimham
,
K. Subrahmanyam
,
P. Yellamma
Virtual world for education and entertainment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ravinsingh Jain
,
Srikant Iyengar
,
Ananyaa Arora
An algorithm to enhance security in RSA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Rohit Minni
,
Kaushal Sultania
,
Saurabh Mishra
,
Durai Raj Vincent
Notice of Violation of IEEE Publication Principles: Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
P. Malathi
Framework for enhanced joint connectivity and coverage using random based distribution in WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Deepak S. Sakkari
,
T. G. Basavaraju
An improved motion detection and tracking of active blob for video surveillance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Michael Kamaraj
,
Balakrishnan
Evolving profligate and conspicuous web applications using reverse AJAX
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Rachit Mohan Garg
,
Mohpreet Singh
Performance analysis of branch-and-bound approach with various model-selection clustering techniques for image data point
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
C. S. Sasireka
,
P. Raviraj
Evaluating MANET routing protocols under multimedia traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ajinkya D. Kadam
,
Sharad S. Wagh
Detection of brain tumor using neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
V. Amsaveni
,
N. Albert Singh
Optimization of encryption technique using evolutionary algorithm for protecting multimedia contents in P2P system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ramesh Shahabadkar
,
Ramachandra V. Pujeri
Behavior recognition in surveillance video using temporal features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
J. Arunnehru
,
M. Kalaiselvi Geetha
Low power analysis of MAC using modified booth algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
T. S. Udhaya Suriya
,
A. Alli Rani
Gear tooth fault detection by autoregressive modelling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Neeta K. Nikhar
,
Sanika S. Patankar
,
Jayant V. Kulkarni
Robust and cost-effective security algorithm for pre-stage and post-stage of data aggregation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. A. Bharathi
,
B. P. Vijaya Kumar
,
D. H. Manjaiah
Addition of polydimethylsiloxane in FOS technology for sustainable sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. H. B. Afzal
Architecture design of illumination change progressive motion estimation algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Madhuri Bamankar
,
P. Muralidhar
,
C. B. Ramarao
Energy efficient spinal scheduling on mobile sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
M. Sudha
,
J. Sundararajan
,
R. Priya
Modified full search block matching algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Madhuri Bamankar
,
P. Muralidhar
,
C. B. Ramarao
Classification and retrieval of natural scenes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
R. Raja
,
S. Md Mansoor Roomi
,
D. Dharmalakshmi
Identifying trusted routing path in WSNs through TARF
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Anitha
,
A. Nithya
Effectiveness of RTS/CTS in IEEE 802.11 wireless adhoc network in light of order dependent capture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kulsum I. Patel
,
Mayur M. Vegad
Automatic registration of images with simulated rotation and translation estimation using HAIRIS
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
K. Priyadharshini
Intrusion detection system on MAC layer for attack prevention in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tapan P. Gondaliya
,
Maninder Singh
Efficient method for controlling electric power by automated monitoring system using FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
R. Kannan
,
T. R. Suresh Kumar
Packet hiding using cryptography with advanced key management against counter jamming attacks in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
S. Swaminathan
,
S. Suganya
,
K. Ambika
Smooth query processing in spatial database
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tukaram Gawali
,
R. B. Wagh
Separation and localisation of heart sound artefacts from respiratory data by adaptive selection of Eigen triples in singular spectrum analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shinto Sebastian
,
S. Rathnakara
A novel algorithm for fingerprint identification using ellipse method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
M. J. Asha
Finite time consensus for leader following multiagent system with distributed observer design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
V. S. Lahire
,
J. O. Chandle
,
V. D. Dhaigude
,
A. A. Suste
High performance distributed computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sneha Kumari
Double image encryption using double pixel scrambling and linear canonical transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Narendra Khatri
,
Navneet Agrawal
Detecting anomalies in WLAN using discrimination algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
P. Kavitha
,
M. Usha
High performance low power dual edge triggered static D flip-flop
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Gagandeep Singh
,
Gurmohan Singh
,
Vemu Sulochna
Hybrid fuzzy classifier based on feature-wise membership given by artificial neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
U. V. Kulkarni
,
S. V. Shinde
RESTful Web Service integration using Android platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohammed Husain Bohara
,
Madhuresh Mishra
,
Sanjay Chaudhary
Improved power control for femtocells in the presence of channel uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
S. Gokila
,
P. Padmaloshani
,
S. Nirmala
A remote experimentation using virtual laboratory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chandrashekhar Gode
,
M. S. Madankar
Enhanced fault tolerance using EMRC in wireless communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Sadanand Patil
,
Ketki Khante
Domain specific modeling framework for agent development
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P. Felcy Judith
,
E. Kirubakaran
Review: Performance evolution of different detection techniques in V-BLAST
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Pratik P. Jariwala
,
Pranav Lapsiwala
Performance evaluation and comparison of routing protocols in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Tejashree S. Khanvilkar
,
K. P. Patil
A novel asymmetric coplanar strip fed antenna for dual band application
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
K. A. Ansal
,
T. Shanmugantham
Enhanced ant clustering algorithm (EACA) for distributed databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
K. Sumangala
Design and analysis of I-shaped MIMO antenna for wireless applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
A. Vishwapriya
,
S. Banu
,
R. Yogamatthi
Performance evaluation of color image segmentation using K means clustering and watershed technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sugandhi Vij
,
Sandeep Sharma
,
Chetan Marwaha
Towards a cross layer framework for improving the QoS of delay sensitive heterogeneous WMSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Sridevi
,
M. Usha
Bandwidth enhancement of microstrip patch antenna using different structures of dielectric resonator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Harshil N. Prajapati
,
Jayesh C. Prajapati
Embedded VoIP communication system with graphical user interface features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
G. S. Divya
,
P. C. Srikanth
Showing 100 out of 397
Load More
Load All