Image and template security for palmprint / Munaga V.N.K. Prasad and B. Adinarayana -- Extending network lifetime by time-constrained data aggregation in wireless sensor networks / K.B. Ashwini and G.T. Raju -- The complex network analysis of power grid : a case study of the West Bengal power network / Himansu Das, Gouri Sankar Panda, Bhagaban Muduli and Pradeep Kumar Rath -- Comparison and analysis of node deployment for efficient coverage in sensor network / Ram Shringar Raw, Shailender Kumar, Sonia Mann and Sambit Bakshi -- Performance analysis of routing protocols for VANETs with real vehicular traces / Sanjoy Das, Ram Shringar Raw, Indrani Das and Rajib Sarkar -- A Bluetooth-based autonomous mining system / Saikat Roy, Soumalya Sarkar and Avranil Tah -- Transistor representation of a low-power reversible 32-bit comparator / A.V. AnanthaLakshmi and G.F. Sudha -- Performance enhancement of brillouin distributed temperature sensor using optimized fiber / P.K. Sahu and Himansu Shekhar Pradhan -- To study the architectural designs of a proposed comprehensive software extractor for reengineering tool : a literature survey / Rashmi Yadav, Abhay Kothari and Ravindra Patel -- Detection of web-based attacks by analyzing web server log files / Nanhay Singh, Achin Jain, Ram Shringar Raw and Rahul Raman -- A survey of energy-aware routing protocols and mechanisms for mobile ad hoc networks / Charu Gandhi and Vivek Arya -- Lexical ontology-based computational model to find semantic similarity / Jagendra Singh and Aditi Sharan -- Energy-efficient cluster-based aggregation protocol for heterogeneous wireless sensor networks / Prakashgoud R. Patil and Umakant P. Kulkarni -- Digital watermarking based on magic square and ridgelet transform techniques / Rama Seshagiri Rao Channapragada and Munaga V.N.K. Prasad -- Circle of trust : one-hop-trust-based security paradigm for resource-constraint MANET / K.M. Imtiaz-Ud-Din, Touhid Bhuiyan and Shamim Ripon.
Text of Note
A survey on video segmentation / Dalton Meitei Thounaojam, Amit Trivedi, Kh. Manglem Singh and Sudipta Roy -- A new paradigm for open source software development / Sushil Kumar, Ranjeet Ranjan and Amit Kumar Trivedi -- A real-time signature verification technology using clustering and statistical analysis / Joshane Kelsy and Rajib Sarkar -- Component-aspect separation-based slicing of aspect-oriented programs / Jagannath Singh, Durga Prasad Mohapatra and Pabitra Mohan Khilar -- Evaluation of software understandability using rough sets / D. Srinivasulu, Adepu Sridhar and Durga Prasad Mohapatra -- HCDLST : an indexing technique for current and recent-past sliding window spatio-temporal data / Kuleshwar Sahu, Sangharatna J. Godboley and S.K. Jain -- Solving planar graph coloring problem using PSO with SPV rule / Vaibhav Bhardwaj and Sudhanshu Prakash Tiwari -- Weather prediction using error minimization algorithm on feedforward artificial neural network / Arti R. Naik, Pathan Mohd. Shafi and Shyamsunder P. Kosbatwar -- Mining association rules using adaptive particle swarm optimization / K. Indira, S. Kanmani, V. Ashwini, B. Rangalakshmi, P. Divya Mary and M. Sumithra -- Study of framework of mobile IP and MANET integration / Devendra Chaphekar, Bhisham Sonkar and Gupteshwar Gupta -- Delay analysis of various links using OPNET simulator / Pooja Singh, Chitosia Anamika, C.K. Jha and Anup Bhola -- GenSeeK : a novel parallel multiple pattern recognition algorithm for DNA sequences / Kaliuday Balleda, D. Satyanvesh and P.K. Baruah -- Improvement of PAPR in OFDM systems using SLM technique and digital modulation schemes / Srinu Pyla, K. Padma Raju and N. BalaSubrahmanyam -- Radioactive pollution monitoring using triangular deployment in wireless sensor network / Ankit Khare and Nitin Nitin -- Securing networks using situation-based firewall policy computations / Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan and Sudhanshu Raghuwanshi.
Text of Note
Accuracy of atomic transaction scenario for heterogeneous distributed column-oriented databases / Ramesh Dharavath, Amit Kumar Jain, Chiranjeev Kumar and Vikas Kumar -- Implantable CPW-fed double-crossed-type triangular slot antenna for ISM band / S. Ashok Kumar and T. Shanmuganantham -- Training a feed-forward neural network using artificial bee colony with back-propagation algorithm / Partha Pratim Sarangi, Abhimanyu Sahu and Madhumita Panda -- Navigation of autonomous mobile robot using adaptive neuro-fuzzy controller / Prases Kumar Mohanty and Dayal R. Parhi -- Performance estimation of fuzzy logic-based mobile relay nodes in dense multihop cellular networks / Devendra Gurjar, Ajay Bhardwaj and Ashutosh Singh -- Local binary pattern as a texture feature descriptor in object tracking algorithm / Prajna Parimita Dash, Dipti Patra and Sudhansu Kumar Mishra -- A sensor-based technique for speed invariant human gait classification / Anup Nandy, Soumabha Bhowmick, Pavan Chakraborty and G.C. Nandi -- High-speed 100 Gbps/channel DWDM system design and simulation / Bijayananda Patnaik and P.K. Sahu -- Performance analysis of contention-based ranging mechanism for idle-mode mobility / Rajesh Anbazhagan and Nakkeeran Rangaswamy -- A novel approach to face detection using advanced support vector machine / Swastik Mohapatra, Asutosh Kar, Satyanarayan Dash, Sidhant Mohanty and Prasant Swain -- Concept based clustering of documents with missing semantic information / E. Anupriya and N. Ch. S.N. Iyengar -- Theoretical validation of new class cohesion metric against briand properties / Sandip Mal and Kumar Rajnish -- RF-SEA-based feature selection for data classification in medical domain / S. Sasikala, S. Appavu alias Balamurugan and S. Geetha -- Optimizing delay for MAC in randomly distributed wireless sensor networks / Ajay Sikandar, Sushil Kumar and Ghyani Umesh Kumar Maurya.
Text of Note
An ontology-based software development environment using upgraded functionalities of clojure / Mary Alias and C.R. Rene Robin -- Using a cluster for efficient scalability evaluation of multithreaded and event-driven web servers / Syed Mutahar Aaqib and Lalitsen Sharma -- An overview of detection techniques for metamorphic malware / Pratiksha Natani and Deepti Vidyarthi -- Temporal forensics of MPEG video using discrete wavelet transform and support vector machine / Sunil Jaiswal and Sunita Dhavale -- Securing the root through SELinux / Ananya Chatterjee and Arun Mishra -- Automatic ontology extraction from heterogeneous documents for E-learning applications / J. Jeslin Shanthamalar and C.R. Rene Robin -- An appraisal of service-based virtual networks and virtualization tools paves the way toward future Internet / Bhisham Sonkar, Devendra Chaphekar and Gupteshwar Gupta -- Comparative analysis and research issues in classification techniques for intrusion detection / Himadri Chauhan, Vipin Kumar, Sumit Pundir and Emmanuel S. Pilli -- An apriori-based vertical fragmentation technique for heterogeneous distributed database transactions / Ramesh Dharavath, Vikas Kumar, Chiranjeev Kumar and Amit Kumar -- A speech recognition technique using MFCC with DWT in isolated Hindi words / Neha Baranwal, Ganesh Jaiswal and G.C. Nandi -- Mechanism for preventing registration flooding attack in SIP / Bosco Sebastian, Paromita Choudhury and C.D. Jaidhar -- A combined approach : proactive and reactive failure handling for efficient job execution in computational grid / P. Latchoumy and P. Sheik Abdul Khader -- A comparative analysis of keyword- and semantic-based search engines / Yogender Singh Negi and Suresh Kumar -- Slicing MATLAB simulink/stateflow models / Adepu Sridhar and D. Srinivasulu -- Link mining using strength of frequent pattern of interaction / Seema Mishra and G.C. Nandi.
Text of Note
Color image quantization scheme using DBSCAN with K-means algorithm / Kumar Rahul, Rohit Agrawal and Arup Kumar Pal -- A novel approach to text steganography using font size of invisible space characters in Microsoft Word document / Susmita Mahato, Dilip Kumar Yadav and Danish Ali Khan -- Personalizing news documents using modified page rank algorithms / S. Akhilan and S.R. Balasundaram -- Understanding query vulnerabilities for various SQL injection techniques / U. Chandrasekhar and Digvijay Singh -- Effective ontology alignment : an approach for resolving the ontology heterogeneity problem for semantic information retrieval / Ankita Kandpal, R.H. Goudar, Rashmi Chauhan, Shalini Garg and Kajal Joshi -- Classification technique for improving user access on web log data / Bina Kotiyal, Ankit Kumar, Bhaskar Pant and R.H. Goudar -- A review on methods for query personalization / Shivangi Sharma and Prachi Gupta -- A wideband compact microstrip antenna for DCS/PCS/WLAN applications / Vinod Kumar Singh, Zakir Ali, Ashutosh Kumar Singh and Shahanaz Ayub -- Analysis of type-2 fuzzy systems for WSN : a survey / Megha Sharma and Ashutosh Kumar Singh -- Fusion of entropy-based color space selection and statistical color features for ripeness classification of guavas / Suchitra Khoje and S.K. Bodhe -- Optimal positioning of base station in wireless sensor networks : a survey / Prerna Meena, Devendra Gurjar, Ashutosh Kumar Singh and Shekhar Verma -- Testing and implementation process in automation of a university / Vaibhav Sharma, Jyoti Singh and A.S. Zadgaonkar -- Performance of spectral efficiency and blocking probability using distributed dynamic channel allocation / Y.S.V. Raman, S. Sri Gowri and B. Prabhakara Rao -- An effective content-based image retrieval using color, texture and shape feature / Milind V. Lande, Praveen Bhanodiya and Pritesh Jain.
Text of Note
Design of a biometric security system using support vector machine classifier / J. Manikandan, V.K. Agrawal and B. Venkataramani -- Impact of distance measures on the performance of clustering algorithms / Vijay Kumar, Jitender Kumar Chhabra and Dinesh Kumar -- Gender identification using gait biometrics / Richa Shukla, Reenu Shukla, Anupam Shukla and Nirupama Tiwari -- A survey on business context / Danijel Novakovic and Christian Huemer -- Enhanced caching for geocast routing in vehicular ad hoc network / Omprakash Kaiwartya and Sushil Kumar -- Cooperation enforcement and collaboration inducement in mobile ad hoc networks / Ghyani Umesh Kumar Maurya and Sushil Kumar -- Uncoupling of mobile cloud computing services : an architectural perspective / Sohini De and Suddhasil De -- Non-subsampled contourlet transform-based image denoising in ultrasound images using elliptical directional windows and block-based noise estimation / J. Jai Jaganath Babu and Gnanou Florence Sudha -- Marathi parts-of-speech tagger using supervised learning / Jyoti Singh, Nisheeth Joshi and Iti Mathur -- Design and evaluation of N-module reconfigurable systems / Kunal Yogeshkumar Parikh, J. Manikandan and V.K. Agrawal -- Genre-based classification of song using perceptual features / Arijit Ghosal, Rudrasis Chakraborty, Bibhas Chandra Dhara and Sanjoy Kumar Saha -- Novel distributed dual beamforming for randomly distributed sensor by phase tracking using bilateral probability function / G. Vaikundam and G.F. Sudha -- Electrical network modeling of amino acid string and its application in cancer cell prediction / T. Roy, S. Das and S. Barman -- Generation of AES-like 8-bit random S-box and comparative study on randomness of corresponding ciphertexts with other 8-bit AES S-boxes / S. Das -- BCube-IP : BCube with IP address hierarchy / A.R. Ashok Kumar, S.V. Rao and Diganta Goswami.
Text of Note
Image retrieval using fuzzy color histogram and fuzzy string matching : a correlation-based scheme to reduce the semantic gap / Nidhi Goel and Priti Sehgal -- A multi-objective optimization approach for lifetime and coverage problem in wireless sensor network / Anil Kumar Sagar and D.K. Lobiyal -- Evaluation of English-to-Urdu machine translation / Vaishali Gupta, Nisheeth Joshi and Iti Mathur -- A novel edge detection technique for multi-focus images using image fusion / Priya Ranjan Muduli and Umesh Chandra Pati -- Event detection refinement using external tags for Flickr collections / Sheba Selvam, B. Ramadoss and S.R. Balasundaram -- Proposed threshold based certificate revocation in mobile ad hoc networks / Priti Swapnil Rathi and Parikshit N. Mahalle -- ''Bin SDR'' : effective algorithm for wireless sensor-actor network / M.E. Sanap and Rachana A. Satao -- An elliptic-curve-based hierarchical cluster key management in wireless sensor network / Srikanta Kumar Sahoo and Manmanth Narayan Sahoo -- Probabilistic approach-based congestion-aware swarm-inspired load-balancing multipath data routing in MANETs / Subhankar Joardar, Debasis Giri and Vandana Bhattacherjee -- Integration of eco-friendly POF-based splitter and optical filter for low-cost WDM network solutions / Archana Rathore -- Sensor cloud : the scalable architecture for future generation computing / Subasish Mohapatra, Banshidhar Majhi and Srikanta Patnaik -- Partial fingerprint matching using minutiae subset / S. Asha and C. Chellappan -- Genetic algorithm-based approach for adequate test data generation / Swagatika Swain and D.P. Mohapatra -- ISA : an intelligent search algorithm for peer-to-peer networks / Mahdi Ghorbani, Mohammad Jooyan and Mostafa Safarpour -- Modified graph-cut algorithm with adaptive shape prior / Adonu Celestine and J. Dinesh Peter -- Analysis on optimization of energy consumption in mobile ad hoc networks / A. Karmel and C. Jayakumar.
Text of Note
Integration of HSV color histogram and LMEBP joint histogram for multimedia image retrieval / K. Prasanthi Jasmine and P. Rajesh Kumar -- DBC co-occurrence matrix for texture image indexing and retrieval / K. Prasanthi Jasmine and P. Rajesh Kumar -- M-band and rotated M-band dual-tree complex wavelet transform for texture image retrieval / K. Prasanthi Jasmine and P. Rajesh Kumar -- A rank-based hybrid algorithm for scheduling data and computation-intensive jobs in grid environments / Mohsen Abdoli, Reza Entezari-Maleki and Ali Movaghar -- Performance evaluation of video communications over 4G network / Gaurav Pande -- Online hybrid model for online fraud prevention and detection / Ankit Mundra and Nitin Rakesh -- An efficient approach to analyze users' interest on significant web access patterns with period constraint / M. Thilagu and R. Nadarajan -- Efficient privacy preserving distributed association rule mining protocol based on random number / Reena Kharat, Madhuri Kumbhar and Preeti Bhamre -- Directional local quinary patterns : a new feature descriptor for image indexing and retrieval / Santosh Kumar Vipparthi and S.K. Nagar -- Data mining approach for developing various models based on types of attack and feature selection as intrusion detection systems (IDS) / H.S. Hota and Akhilesh Kumar Shrivas -- Facial expression recognition using local binary patterns with different distance measures / Sarika Jain, Sunny Bagga, Ramchand Hablani, Narendra Chaudhari and Sanjay Tanwani -- Cluster-based routing for optimal communication in port logistics / J. Thejo Kishan, M.M. Manohara Pai and Radhika M. Pai -- Secure adaptive traffic lights system for VANETs / Kishore Biradar, Radhika M. Pai, M.M. Manohara Pai and Joseph Mouzana -- Analysis of image segmentation techniques on morphological and clustering / M. Sivagami and T. Revathi -- Performance impact of TCP and UDP on the mobility models and routing protocols in MANET / Sunil Kumar Singh, Rajesh Duvvuru and Jyoti Prakash Singh.
Text of Note
Underwater communication with IDMA scheme / Tanuja Pande, Kulbhushan Gupta, M. Shukla, Prachi Tripathi and Ashutosh Singh -- M-ARY PSK modulation technique for IDMA scheme / Pratibha Verma, Sanjiv Mishra, M. Shukla and Ashutosh Singh -- A novel approach for eye gaze and tilt estimation / Sambit Bakshi, Rahul Raman and Pankaj K. Sa -- Enhanced single-pass algorithm for efficient indexing using hashing in map reduce paradigm / Piyush Kumar Sinha, Prashant Joshi, Pooja Pundir, Manisha Negi and R.H. Goudar -- Data structures for IP lookups, a comparative analysis with scalability to IPV6 / Soumyadeep Ghosh, Oaindrila Das and Arindam Majumdar -- Multiobjective clustering using support vector machine : application to microarray cancer data / Anita Bai -- Prediction of warning level in aircraft accidents using classification techniques : an empirical study / A.B. Arockia Christopher and S. Appavu Alias Balamurugan -- Fuzzy TOPSIS method applied for ranking of teacher in higher education / H.S. Hota, L.K. Sharma and S. Pavani -- Performance analysis of transformation methods in multi-label classification / P.K.A. Chitra and S. Appavu Alias Balamurugan -- Predictive data mining techniques for forecasting Tamil Nadu Electricity Board (TNEB) load demand : an empirical study / T.M. Usha and S. Appavu Alias Balamurugan -- Novel approach for finding patterns in product-based enhancement using labeling technique / Hemant Palivela, H.K. Yogish, N. Shalini and S.N. Raghavendra -- Optimal path and best-effort delivery in wireless sensor networks / Vipin Kumar and Sushil Kumar -- Spanning-tree-based position-based routing in WSNs / Vipin Kumar and Sushil Kumar -- Feature extraction and classification of microarray cancer data using intelligent techniques / Anita Bai and Anima Pradhan -- Survey of route choice models in transportation networks / Madhavi Sharma, Jitendra Kumar Gupta and Archana Lala -- Secure routing technique in MANET : a review / Aartika Chandrakar and Rajib Sarkar.
0
8
8
8
8
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
This book presents original research articles, case-studies, as well as review articles in the said field of study with emphasis on their implementation and practical application. Portrays the latest technology aspects in the domain of Computer Science and Engineering along with comparative studies.
OTHER EDITION IN ANOTHER MEDIUM
Title
Intelligent computing, networking, and informatics.
International Standard Book Number
9788132216643.
TOPICAL NAME USED AS SUBJECT
Computer networks, Congresses.
Computer science, Congresses.
Computer networks.
Computer science.
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA75
.
5
Book number
.
I524
2014
CORPORATE BODY NAME - PRIMARY RESPONSIBILITY
International Conference on Advanced Computing, Networking, and Informatics(2013 :, Raipur, Chhattisgarh, India)