Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICCCNT
ICCCNT 2014
Generate Citations
2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
July 11 2014 to July 13 2014
Hefei, China
Table of Contents
A novel approach to urban flood monitoring using computer vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
RamKumar Narayanan
,
V. M. Lekshmy
,
Sethuraman Rao
,
Kalyan Sasidhar
Location based protocols in Wireless Sensor Network — A review
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jitender Grover
,
Shikha
,
Mohit Sharma
Cloud computing and its security issues — A review
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jitender Grover
,
Shikha
,
Mohit Sharma
Wireless sensor networks: Routing protocols and security issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Anjali
,
Shikha
,
Mohit Sharma
Study of virtual billing based communication network performance assessment system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Li Tongyan
,
Zheng Kai
Detection of dishonest trust recommendations in mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Zakirullah
,
M. Hasan Islam
,
Adnan Ahmed Khan
Parameters optimization in blind motion deblurring of UAV images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Wen-jun Lu
,
Libiao Tong
,
Min-Jie Li
,
Cong-li Li
The design of smart home control system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yongen Liang
,
Shiming Wan
Chinese microblogging emotion classification based on support vector machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xiao Sun
,
Chengcheng Li
,
Jiaqi Ye
Sina microblog big data grabbing and analysis based on Multi-strategy model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiao Sun
,
Jia-qi Ye
,
Chen-yi Tang
New adaptations of classic algorithm for mining frequent itemsets from uncertain data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaomei Yu
,
Hong Wang
,
Xiangwei Zheng
A secure and robust crypto system based on unique dynamic key generation scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. Swaminathan
,
A. Karthick
,
S. Suganya
Foot plant detection for motion capture data by curve saliency
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jingting Lu
,
Xiaoping Liu
Studies of improving the performance of A/D conversion by post band-pass filtering method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ma Manli
,
Chen Yuan
,
Yin Qinye
The secret image sharing scheme based on improved LSB algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xiaohong Li
,
Yuan Chen
,
Feng Wang
,
Tao Qinqin
Virtual merging of fractured fragments based on constraint cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Li Jijunnan
,
Geng Guohua
,
Liu Lunchun
A heterogeneous network access control algorithm based on DS evidence theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jianmin Kang
,
Lin Ma
,
Yubin Xu
Learning a discriminative dictionary for locality constrained coding and sparse representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jin Bin
,
Zhang Jing
,
Yang Zhiyong
Consensual and co-ordinated vehicular headlight attenuation using wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K.A. Unnikrishna Menon
,
Alin Devassy Ananyase
,
Preeja Pradeep
Load distribution for multi-way streams joins using cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Xinchun Liu
,
Jing Li
,
Xiaopeng Fan
Chinese Facial Expression Database with spontaneous expressions across multiple poses
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaoxue Cheng
,
Lixia Xue
,
Yanxiang Chen
,
Lei Liu
Design and realization of 3D NOC multicast router base on multicast rotational routing arithmetic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Wei Wang
,
Runfeng Li
,
Fang Fang
,
Tian Chen
,
Fuji Ren
,
Jun Liu
,
Xi Wu
Characteristics of narrow band dual-polarized MIMO over satellite channel model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xinyue Zhang
,
Zhenyong Wang
Test wrapper optimization technique using BDF and GA for 3D IP cores
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jun Liu
,
Qingqing Qian
,
Xi Wu
,
Fuji Ren
,
Wei Wang
,
Tian Chen
Depth map-based human activity tracking and recognition using body joints features and Self-Organized Map
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ahmad Jalal
,
S. Kamal
,
Daijin Kim
A novel design and implementation of sub-nanosecond sampling pulse generator for ultra-wideband equivalent sampling receiver
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yu Guo
,
Guofu Zhu
,
Zhimin Zhou
Ridge body parts features for human pose estimation and recognition from RGB-D video data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ahmad Jalal
,
Yeonho Kim
,
Daijin Kim
Microscopic numerical simulation and experimental study of thermal deformation of mechanical parts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Enming Miao
,
Zhishang Xu
,
Xiaoshuai Zhou
,
Derong Lei
,
Guannan Li
Design of area and power efficient complex number multiplier
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
B.S. Premananda
,
Samarth S. Pai
,
B. Shashank
,
Shashank S. Bhat
Rateless codes based file delivery protocols in deep space communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhihong Ren
,
Zhenyong Wang
,
Qing Guo
An adroit naïve Bayesian based sequence mining approach for prediction of MRI brain tumor image
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
M. Madheswaran
,
Anto Sahaya Dhas
A low power BIST scheme based on block encoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Tian Chen
,
Liuyang Zheng
,
Wei Wang
,
Fuji Ren
,
Xishan Zhang
,
Hao Chang
Enhancement of prediction accuracy in COCOMO model for software project using neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
M. Madheswaran
,
D. Sivakumar
Estimation of various parameters of fractured femur with different load conditions using Finite element analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
M. Madheswaran
,
R. Vijayakumar
GSM based remote device controller using SIM548C
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Md. Shahinoor Mannan
,
Md. Nazmus Sakib
Seamless handoff mechanism of broadband mobile communication network in underground mine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Zhen-chun wei
,
Zeng-wei lv
,
Guo-Ling
,
Xue-ping
,
Xiang-wei xu
,
Ju-yi wei
Service composition and user modeling for personalized recommendation in cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Guobing Zou
,
Yanglan Gan
,
Jianxing Zheng
,
Bofeng Zhang
A hybrid topology based multicast routing for cognitive radio ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Daewook Shin
,
Jaebeom Kim
,
Young-Bae Ko
An Active Channel Changing Delay method to improve IPTV channel availability
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Junyu Lai
,
Guolin Sun
,
Gun Li
,
Yuankai Li
,
Kaiyu Qin
Integrated location fingerprinting and physical neighborhood for WLAN probabilistic localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mu Zhou
,
Qiao Zhang
,
Zengshan Tian
,
Feng Qiu
,
Qi Wu
Real time implementation of Elliptic Curve Cryptography over a open source VoIP server
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
T. Subashri
,
A. Arjun
,
S. Ashok
To achieve maximal throughputs in CSMA wireless networks through offered-load control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Caihong Kai
,
Qi Zhang
,
Lusheng Wang
Wireless network architecture using sound for ubiquitous signal transmission
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kuruvilla Mathew
,
Biju Issac
,
Tan Chong Eng
A Connected Component-Based Distributed method for overlapping community detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Tian Chen
,
Kai Liu
,
Xin Yi
,
Dandan Shen
,
Wei Wang
,
Fuji Ren
,
Jun Liu
An indoor positioning algorithm using joint information entropy based on WLAN fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Gui Zou
,
Lin Ma
,
Zhongzhao Zhang
,
Yun Mo
Clustering process for maximizing lifetime using probabilistic logic in WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. Prabhavathi
,
A. Subramanyam
,
A. Ananda Rao
Speech enhancement to overcome the effect of near-end noise in mobile phones using psychoacoustics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
B. S. Premananda
,
B. V. Uma
Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Dinesh Kumar Karunakaran
,
N. Mohankumar
A novel application to secure misuse of information in critical organizations for windows environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Maaz Bin Ahmad
,
Muhammad Asif
,
Syed Mashhad Mustuzhar Gilani
,
M. Hasan Islam
,
Saeed-ur-Rehman
A test data compression scheme based on position information coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Tian Chen
,
Bingdong Yang
,
Wei Wang
,
Birong Hao
,
Fuji Ren
,
Jun Liu
,
YiXin Wang
Study of cryptography-based cyberspace data security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Tonghao Yang
,
Bin Yu
An automatic generation method of Hui-style architectures based on 2D planar graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Li Shujie
,
Wu Haijun
,
Zhang Runmei
,
Liu Xiaoping
Intelligent system for remote health monitoring of divers using underwater acoustic communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
K. A. Unnikrishna Menon
,
J. S. Shibina
,
Vrinda. N. Menon
Multi-layer multi-center atom set cohesion clustering algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dongqing Zhou
,
Linliang Zhang
,
Xiaoyue Deng
Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sonali Swetapadma Sahu
,
Pooja Priyadarshini
,
Saurabh Bilgaiyan
On minimum covering of invertible honeycomb meshes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
D. Angel
,
A. Amutha
Differential evolution with M-fitness method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ying Yang
,
Min Yao
Development of a wireless sensor network for detecting fire and Gas leaks in a collapsing building
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sethuraman Rao
,
G. K. Nithya
,
K Rakesh
Simple GSM base station based on universal software radio peripheral
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhilin Li
,
Jian Tang
,
Xuejie Zhu
,
Caihong Kai
Runtime reconfiguration of wireless sensor node using FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Meena
,
N. Krishna Prakash
An introduction to Markov logic networks and application in video activity analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Guangchun Cheng
,
Yiwen Wan
,
Bill P. Buckles
,
Yan Huang
Survey on scheduling in hybrid clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nitish Chopra
,
Sarbjeet Singh
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Surbhi Singh
,
Sangeeta Sharma
Relay selection for alert messaging in vanets based on bi-directional stable communication approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Osama M. Hussain Rehman
,
Hadj Bourdoucen
,
Mohamed Ould-Khaoua
Mobility management analysisy in LTE-A heterogeneous network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Rong Wang
,
Xiang Yu
,
Li Zhang
Utilizing neighbor information in image segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Lingyun Li
,
Xiaofeng Zhang
Securing cloud infrastructure through PKI
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Imran Ijaz
,
Abroo Aslam
,
Bushra Bukhari
,
Rabia Javed
,
Sumaira Anees
SDN based uniform network architecture for future wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shengli Zhang
,
Caihong Kai
,
Lingyang Song
An interference mitigation scheme for IEEE 802.15.4 networks under IEEE 802.11b/g interference
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kalyan Pathapati Subbu
,
Suchith Soman
A hybrid RSSI based localization algorithm for WSN using a mobile anchor node
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fereydoon Abdi
,
Abolfazl Toroghi Haghighat
Extending self-organizing network availability using genetic algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamed Elhoseny
,
Xiaohui Yuan
,
Hamdy K. El-Minir
,
A. M. Riad
Smart grids: An approach to integrate the renewable energies and efficiently manage the energy system of Pakistan
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hafiz Bilal Khalil
,
Naeem Abas
Non blind watermarking technique using enhanced one time pad in DWT domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Bidyut Jyoti Saha
,
Arun
,
Kunal Kumar Kabi
,
Chittaranjan Pradhan
A high performance 2.4 GHz GaAs HBT class J power amplifier
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Tao Chen
,
Feng Wang
,
Xiaohong Sun
,
Jianhui Wu
Performance analysis of MIMO two-way relay channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Aibing Hou
,
Cuilin Pan
Research on vertical handover in LTE two-tier Macrocell/Femtocell Systems based on fuzzy neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yang Jiao
,
Lin Ma
,
Yubin Xu
Augmenting packet delivery rate in outdoor wireless sensor networks through frequency optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Maneesha Vinodini Ramesh
,
Parvathy Rajan
,
P. Divya
Computational fluid dynamics-based system identification of marine vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mahmoud Hosny
,
Mohammed Amr
,
Ibrahim Zedan
,
Mohamed AbdelSalam
,
Muhammad Al-Sayd
Personalized recommendation based on link prediction in dynamic super-networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Wang Hong
,
Yanshen Sun
,
Xiaomei Yu
Design of low noise low power two stage CMOS operational amplifier using Equivalent Transistor Replacement Technique for health monitoring applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Richa Dubey
,
Anjan Kumar
,
Manisha Pattanaik
Fish school search approach to find optimized thresholds in gray-scale image
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Debashis Mishra
,
Utpal Chandra De
,
Isita Bose
,
Bishwojyoti Pradhan
New blind signcryption schemes with application to E-cash systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yasmine Abouelseoud
A heuristic overlay multicast routing algorithm for minimum delay optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Longxin Lin
Pedestrian detection using two-stage sparse coding algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Peibei Shi
,
Zhong Wang
Study and application on power communication operation mode checking and analysis method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Shengchao Yan
,
Shunli Lv
,
Juan Qi
Compact planar G-shape UWB antenna with notch characteristics for satellite communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Satyabrata Maiti
,
Sangita Das
,
Naikatmana Pani
CGF-LQ: An optimal Combined Greedy-Face routing based on local link quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shuo Shi
,
Jiliang Chen
,
Xuemai Gu
Low complexity MMSE estimator for OFDM systems over slow fading Rayleigh channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Latif Ullah Khan
,
M. Irfan Khattak
,
Naeem Khan
,
M. Shafi
The development of a visualization framework for fishing vessels at sea
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
K. Rakesh
,
S. Sunanda
Modified fuzzy hyperline-segment neural network for classification with mixed attribues
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. V. Shinde
,
U. V. Kulkarni
Mining classification rules from fuzzy min-max neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. V. Shinde
,
U. V. Kulkarni
Transmitting hidden information using steganography via Facebook
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Nathaniel D. Amsden
,
Lei Chen
,
Xiaohui Yuan
Towards the formal foundation of orchestration process
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chang Yang
,
Farong Zhong
Routing mechanism in active Peer-to-Peer network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Jing Li
,
Wei Jin
Design of a compact ultra wide band microstrip patch antenna
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Satyabrata Maiti
,
Sudip Kumar Rajak
,
Amrit Mukherjee
Design and implementation of block cipher in hummingbird algorithm over FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shumit Saha
,
Md. Rashedul Islam
,
Habibur Rahman
,
Mehadi Hassan
,
A. B. M. Aowlad Hossain
The coverage problem in UAV network: A survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yueyue Chen
,
Haidong Zhang
,
Ming Xu
Selfish node detection and its behavior in WSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sujit Kumar Das
,
Bidyut Jyoti Saha
,
Pinaki Sankar Chatterjee
Traffic scheduling for wireless meter data collection in smart grid communication network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sujie Shao
,
Shaoyong Guo
,
Xuesong Qiu
,
Luoming Meng
,
Yang Jiao
,
Wei Wei
A 200Mbps random number generator with jitter-amplified oscillator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yan Yang
,
Guoqiang Bai
,
Hongyi Chen
Showing 100 out of 170
Load More
Load All