Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICCCNT
ICCCNT 2015
Generate Citations
2015 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
July 13 2015 to July 15 2015
Dallas-Fortworth, TX, USA
Table of Contents
Automatic segmentation for 3D dental reconstruction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ionel-Bujorel Pavaloiu
,
Nicolae Goga
,
Iuliana Marin
,
Andrei Vasilateanu
Object recognition-based mnemonics mobile app for senior adults communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Natalie Pang
,
Schubert Foo
,
Aravind Sesagiri Raamkumar
,
Xue Zhang
,
Samantha Vu
Classification and determination of physical intrusion using Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Snehal Bhagat
,
Chandrabala P. Kothari
,
Vishram Bapat
,
Vaishali Kulkarni
SQL Injection: A sample review
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Shubham Mukherjee
,
Pritam Sen
,
Sudeshna Bora
,
Chittaranjan Pradhan
Method for sizing complex CNFET bitcells for balanced read write operation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Prakhar Sharma
,
Isha Garg
Communication energy constrained spare core on NoC
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
B. Naresh Kumar Reddy
,
M.H. Vasantha
,
Y.B. Nithin Kumar
,
Dheeraj Sharma
On the jitter and entropy of the oscillator-based random source
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chenyang Guo
,
Yujie Zhou
,
Hongming Liu
,
Nianhao Zhu
Towards cloud based mobile ad hoc network simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Noman Islam
,
Zubair A. Shaikh
,
Ghazala Shafi Sheikh
Privacy preserving data mining using image slicing and visual cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hare Ram Sah
,
G. Gunasekaran
Dynamic combination of improved max-min and ant colony algorithm for load balancing in cloud system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Navtej Singh Ghumman
,
Rajwinder Kaur
An interactive serious game via visualization of real life scenarios to learn programming concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sajana A.
,
Kamal Bijlani
,
R. Jayakrishnan
Context inference from social networks: A tie strength based approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sneha Kamal
,
Reshmi S.
Incremental iterative time spent based ranking model for online activitybased friend-group recommendation systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sachin V Jose
,
MinuLalitha Madhavu
Event based sentence level interpretation of sentiment variation in twitter data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thejas Mol Thomas
,
Pretty Babu
Improving security and efficiency of enterprise digital rights management
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ahmed H. Soliman
,
Maged H. Ibrahim
,
Adel E. El-Hennawy
DataViz: High velocity data visualization and retrieval of relevant information from social network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Md. Khaledur Rahman
Distinguishing between authentic and fictitious user-generated hotel reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Snehasish Banerjee
,
Alton Y. K. Chua
,
Jung-Jae Kim
Energy efficient femtocell based architecture for low coverage areas in WiMAX
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
H. H. R. Sherazi
,
Razi Iqbal
,
Asfandyar Gilani
,
M.H. Chaudary
A new opportunistic routing forwarders selection scheme to enhance throughput for wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yousaf Bin Zikria
,
Sung Won Kim
,
Jin-Ghoo Choi
,
Byung-Seo Kim
Classification of the liver disorders data using Multi-Layer adaptive Neuro-Fuzzy inference system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Parisa Tavakkoli
,
Davood M. Souran
,
Saeed Tavakkoli
,
Majid Hatamian
,
Armin Mehrabian
,
Valentina E. Balas
Design and implementation of a wireless sensor network based efficient LED lighting system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Deepak R Nair
,
N Krishna Prakash
MOSFET circuit simulation by using nonlinear relaxation and GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chun-Jung Chen
,
Bo-Yi Hsiao
A fuzzy logic scheme for real-time routing in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Babar Shah
,
Asad Masood Khattak
,
Ki-Il Kim
Specific opportunistic routing at road intersection in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Nikita Mangla
,
Shambhawi Srivastava
,
Shweta Jha
,
Debasis Das
Empirical analysis of an improved countermeasure against computer network worms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Khurram Shahzad
,
Steve Woodhead
Low cost and power efficient automated traffic control system using IEEE 802.15.4
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Razi Iqbal
,
Dawer Saeed
,
Hussnain Sherazi
Area-efficient and power-efficient binary to BCD converters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sri Rathan Rangisetti
,
Ashish Joshi
,
Tooraj Nikoubin
A centralized evolutionary clustering protocol for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Majid Hatamian
,
Seyed Sajad Ahmadpoor
,
Samaneh Berenjian
,
Behrooz Razeghi
,
Hamid Barati
Safety of communication and neural networks for security enhancement in data warehouse for remote laboratories and Laboratory Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
L. Palka
,
F. Schauer
Using rays cycle mining to clarify sentiment analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
James P. Buckley
,
Jennifer Seitzer
,
Matt Mize
High-rate turbo equalization modem on GNU Radio and USRP
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ali G. Dezfuli
,
Ali Moeineslam
,
Yahya Ravaei
,
Eesa Nikahd
,
Armin Khaledi
3D Voronoi Subdivision Tree for granular materials
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Matthew Clothier
,
Mike Bailey
Side channel analysis of an elliptic curve crypto-system based on multi-class classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ehsan Saeedi
,
Md. Selim Hossain
,
Yinan Kong
A particle swarm optimization algorithm for power-aware virtual machine allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
P. Aruna
,
S. Vasantha
Gamification to enhance Learning using Gagne's learning model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
R Sreelakshmi
,
ML McLain
,
Abhishek Rajeshwaran
,
Bhavani Rao
,
R Jayakrishnan
,
Kamal Bijlani
CNTFET full-adders for energy-efficient arithmetic applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mahdieh Grailoo
,
Mona Hashemi
,
Kawsar Haghshenas
,
Shima Rezaee
,
Swetha Rapolu
,
Tooraj Nikoubin
RCA with conditional BEC in CSLA structure for area-power efficiency
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Nikhil Patil
,
Ashish Joshi
,
Nima Eskandari
,
Tooraj Nikoubin
Collective wisdom based blog clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tavakkoli H. Parisa
,
Behrooz Razeghi
,
Niloofar Okati
,
Davood M. Souran
,
Mahdi Mir
A novel clustering algorithm for dynamic base station in Wireless Sensor Networks based on DWT and SVD algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohammad V. Malakooti
,
Amir Aghasharif
,
Nilofar Masourzadeh
Boundary static clustering target tracking in wirless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sara Rouhani
,
Abolfazl Toroghi Haghighat
Priority-based congestion control mechanism for wireless sensor networks using fuzzy logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Majid Hatamian
,
Hamid Barati
Application of hybrid meta-heuristic algorithm for assigning real-time tasks to heterogeneous processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Poongothai Marimuthu
,
Rajeswari Arumugam
On relay selection to maximize coverage region for cooperative cellular networks with multiple fixed and unfixed relays
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Niloofar Okati
,
Behrooz Razeghi
,
Mohammad Reza Mosavi
Implementation of caching algorithm in scady Grid Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Rakesh Bhatnagar
,
Jayesh Patel
,
Snehal Rindani
,
Nirav Vasoya
Fast and energy efficient FinFET full adders with Cell Design Methodology (CDM)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Swetha Rapolu
,
Tooraj Nikoubin
Adaptive reliability-based iteration min-sum decoding algorithm for majority-logic decodable LDPC codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Hongwei Zhao
,
Kai Zhang
,
Mengmeng Shi
A new mobile payment protocol (GMPCP) by using a new group key agreement protocol (VTGKA)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohammad Vahidalizadehdizaj
,
Lixin Tao
,
Jigar Jadav
Roadm framework for Enhanced Constraint-based Optical Network (Econ) for enhancing Osnr
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Kavitha G.R
,
Indumathi T.S
Real-world investigation of mobility models in an anycast wireless ad hoc network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Reza Azizi
,
Hamid Shoja
,
Hamid Hasanzadeh
A new plugin to support new relations in Protege
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohammad Vahidalizadehdizaj
,
Lixin Tao
,
Jigar Jadav
,
Akshay Agrawal
,
Abdolaziz Altowayan
Security challenges in swarm intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Mohammad Vahidalizadehdizaj
,
Jigar Jadav
,
Lixin Tao
Dynamic scene analysis using Kalman filter and mean shift tracking algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
K. V Sriharsha
,
N.V Rao
Performance analysis of different plasmonic metallic nanoparticles using for ultra-sensitive optical sensor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Munir AL-Hadad
,
Amr Yousef
,
Ali Elrashidi
Power dissipation reduction using adiabatic logic techniques for CMOS inverter circuit
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Irfan Ahmad Pindoo
,
Tejinder Singh
,
Amritpal Singh
,
Ankit Chaudhary
,
P. Mohan Kumar
Implementation of an RTL synthesizable asynchronous FIFO for conveying data by avoiding actual data movement via FIFO
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Shruti Sharmaa
The impact of environmental factors to skiing injuries: Bayesian regularization neural network model for predicting skiing injuries
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fisnik Dalipi
,
Sule Yildirim Yayilgan
Transient response and dynamic power dissipation comparison of various Dickson charge pump configurations based on charge transfer switches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Amritpal Singh
,
Tejinder Singh
,
Irfan Pindoo
,
Ankit Choudhary
,
Raman Kumar
,
Pawandeep Bhullar
Improved OpenMM algorithms for CUDA and OpenCL using new stochastic dynamics and the Berendsen thermostat
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Andreea Moga
,
Iuliana Marin
,
Nicolae Goga
,
Anton Hadar
,
Dragoi Geroge
,
Kamoru Oluwatoyin
A amendatory LRP channel condition prediction algorithm base on Kalman Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Xiaojin Yang
,
Jinjin Pan
Distributed computation of 2D inundation modelling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chen-Jia Huang
,
Ming-Hsi Hsu
,
Sen-Hai Yeh
Discrepancies in real time Jitter Measurements pertaining to on-board irregularities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Divya Mittal
,
Damandeep Saini
,
Maneesh Kumar Pandey
Modeling XHCI in term of EHCI
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Shwetank Shekhar
,
Ritika Sharma
,
Maneesh Kumar Pandey
A method to simplify description and implementation of Graph Grammars
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhan Shi
,
Xiaoqin Zeng
,
Song Huang
,
Zekun Qi
,
Hui Li
,
Bin Hu
,
Sainan Zhang
,
Yanyun Liu
,
Cailing Wang
RF power harvesting system for RFID applications in multiband systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Pratik Mhatre
,
Ravindra Duche
,
Shankar Nawale
,
Pravin Patil
Enterprise domain ontology learning from web-based corpus
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Andrei Vasilateanu
,
Nicolae Goga
,
Elena-Alice Tanase
,
Iuliana Marin
Solving generalized vehicle routing problem by parallel universes and Tabu search
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohammadhossein Navidadham
,
Mostafa Arbabsadeghi
,
Alireza Akbari Bayat
,
Farzad Didehvar
Analysis of an adjustable modified Kaiser weighting function and its application to linear array antenna beamforming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sajjad Abazari Aghdam
,
Jonathan Bagby
Adaptive time-frequency Kernel Local Fisher Discriminant Analysis to distinguish range deception jamming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mahdi Nouri
,
Mohsen Mivehchy
,
Sajjad Abazari Aghdam
Effect of wormhole attack in hierarchical body area network and need for strict security measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
R. Divya
,
T.V.P. Sundararajan
,
KR Deepak
NDN-Hippo: A streaming media system over named data networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Kai Lei
,
Yunbo Xun
,
Longyu Yu
,
Tao Chen
,
Zhi Tan
Automatic segmentation of moving objects considering single moving camera
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Xiaochun Zou
,
Xinbo Zhao
,
Yongjia Yang
Noise removal in MR images using non linear filters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Priyanka Punhani
,
Naresh Kumar Garg
A clustering optimization algorithm based on WCA in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hua Yang
,
Zhimei Li
Socialcircle: A message forwarding technique for pocket switched networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mahrukh Fida
,
Muhammad Ali
,
Awais Adnan
Towards composition of RESTful web services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Digvijaysinh M. Rathod
,
M S Dahiya
,
Satyen M. Parikh
A heuristic approach towards the designs of digital logic circuits in Built-In Test environment with optimal solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
A. Ahmad
,
S. Ahmad
,
D. Al-Abri
,
T. Jamil
,
M. A. K. Rizvi
An improved motion detection algorithm using ViBe
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ehsan Mahoor
,
Hossein Maghsoumi
,
Davud Asemani
Leveraging biologically inspired models for cyber-physical systems analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Keith L. Keller
Determining the possible minimal Boolean expressions via a newly developed procedure and tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
A. Ahmad
,
D. Ruelens
,
S. Ahmad
,
L. Pathuri
Hadoop based real-time Big Data Architecture for remote sensing Earth Observatory System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
M. Mazhar Rathore
,
Awais Ahmad
,
Anand Paul
,
Alfred Daniel
Towards a new computing problem solving model for organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Raluca-Andreea Nedelcu
,
Simona Iuliana Caramihai
,
Nicolae Goga
,
Aurelian Mihai Stanescu
Copyright
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
Front matter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
Table of contents
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
Showing 84 out of 84