Default Cover Image

2015 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

July 13 2015 to July 15 2015

Dallas-Fortworth, TX, USA

Table of Contents

Automatic segmentation for 3D dental reconstructionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
SQL Injection: A sample reviewFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Method for sizing complex CNFET bitcells for balanced read write operationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Communication energy constrained spare core on NoCFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
On the jitter and entropy of the oscillator-based random sourceFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Towards cloud based mobile ad hoc network simulationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Privacy preserving data mining using image slicing and visual cryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Dynamic combination of improved max-min and ant colony algorithm for load balancing in cloud systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An interactive serious game via visualization of real life scenarios to learn programming conceptsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Context inference from social networks: A tie strength based approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Event based sentence level interpretation of sentiment variation in twitter dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improving security and efficiency of enterprise digital rights managementFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
DataViz: High velocity data visualization and retrieval of relevant information from social networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Distinguishing between authentic and fictitious user-generated hotel reviewsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Energy efficient femtocell based architecture for low coverage areas in WiMAXFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Design and implementation of a wireless sensor network based efficient LED lighting systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
MOSFET circuit simulation by using nonlinear relaxation and GPUFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A fuzzy logic scheme for real-time routing in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Specific opportunistic routing at road intersection in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Empirical analysis of an improved countermeasure against computer network wormsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Low cost and power efficient automated traffic control system using IEEE 802.15.4Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Area-efficient and power-efficient binary to BCD convertersFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Using rays cycle mining to clarify sentiment analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
High-rate turbo equalization modem on GNU Radio and USRPFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
3D Voronoi Subdivision Tree for granular materialsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Side channel analysis of an elliptic curve crypto-system based on multi-class classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A particle swarm optimization algorithm for power-aware virtual machine allocationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Gamification to enhance Learning using Gagne's learning modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
CNTFET full-adders for energy-efficient arithmetic applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
RCA with conditional BEC in CSLA structure for area-power efficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Collective wisdom based blog clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Boundary static clustering target tracking in wirless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Priority-based congestion control mechanism for wireless sensor networks using fuzzy logicFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Implementation of caching algorithm in scady Grid FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Fast and energy efficient FinFET full adders with Cell Design Methodology (CDM)Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Adaptive reliability-based iteration min-sum decoding algorithm for majority-logic decodable LDPC codesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A new mobile payment protocol (GMPCP) by using a new group key agreement protocol (VTGKA)Full-text access may be available. Sign in or learn about subscription options.pp. 1-7
Roadm framework for Enhanced Constraint-based Optical Network (Econ) for enhancing OsnrFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Real-world investigation of mobility models in an anycast wireless ad hoc networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A new plugin to support new relations in ProtegeFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Security challenges in swarm intelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Dynamic scene analysis using Kalman filter and mean shift tracking algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Implementation of an RTL synthesizable asynchronous FIFO for conveying data by avoiding actual data movement via FIFOFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A amendatory LRP channel condition prediction algorithm base on Kalman FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Distributed computation of 2D inundation modellingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Discrepancies in real time Jitter Measurements pertaining to on-board irregularitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Modeling XHCI in term of EHCIFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A method to simplify description and implementation of Graph GrammarsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
RF power harvesting system for RFID applications in multiband systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Enterprise domain ontology learning from web-based corpusFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Effect of wormhole attack in hierarchical body area network and need for strict security measuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
NDN-Hippo: A streaming media system over named data networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Automatic segmentation of moving objects considering single moving cameraFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Noise removal in MR images using non linear filtersFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A clustering optimization algorithm based on WCA in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Socialcircle: A message forwarding technique for pocket switched networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Towards composition of RESTful web servicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An improved motion detection algorithm using ViBeFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Leveraging biologically inspired models for cyber-physical systems analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Determining the possible minimal Boolean expressions via a newly developed procedure and toolFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Hadoop based real-time Big Data Architecture for remote sensing Earth Observatory SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
CopyrightFull-text access may be available. Sign in or learn about subscription options.pp. 1-1
Front matterFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Table of contentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Showing 84 out of 84