Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 85
GENERAL NOTES
Text of Note
International conference proceedings.
CONTENTS NOTE
Text of Note
Baskaran --; Virtual Interactive Prototyping / Kurien Zacharia, Eldo P. Elias and Surekha Mariam Varghese --; Chaotic Masking of Voice Bitstream Using Mixed Sequences for Authorized Listening / Musheer Ahmad, Bashir Alam and Omar Farooq --; A Framework for Transparency in SHGs / A.B. Sagar --; Classification of Text Documents Using B-Tree / B.S. Harish, D.S. Guru and S. Manjunath --; Comparison between Different Feature Extraction Techniques to Identify the Emotion 'Anger' in Speech / Bageshree V. Pathak and Ashish R. Panat --; Feature Image Generation Using Energy Distribution for Face Recognition in Transform Domain / Vikas Maheshkar, Sushila Kamble, Suneeta Agarwal and Vinay Kumar Srivastava --; A Comparative Study of Placement of Processor on Silicon and Thermal Analysis / C. Ramya Menon and Vinod Pangracious.
Text of Note
Part 1. Advaances in Computer Science and Engineering --; Qualitative Optimization of Coupling Parasitics and Driver Width in Global VLSI Interconnects / Devendra Kumar Sharma, Brajesh Kumar Kaushik and R.K. Sharma --; Survey on Optimization Techniques in High Level Synthesis / B. Saravanakumaran and M. Joseph --; An Adaptive Technique Using Advanced Encryption Standard to Implement Hard Disk Security for Personalized Devices / Minal Moharir and A.V. Suresh --; Design of Fractional Order Digital Differentiator Using Inverse Multiquadric Radial Basis Function / Nitin Kumar and Tarun Kumar Rawat --; Cognitive Symmetric Key Cryptographic Algorithm / Y.R.A. Kannan, S. Aravind Prasad and P. Varalakshmi --; Modeling and Verification of Fiat-Shamir Zero Knowledge Authentication Protocol / Amit K. Maurya, Murari S. Choudhary, P. Ajeyaraj and Sanjay Singh --; Developing Software Metrics for Analysis and Design Artifacts in Unified Process / Meena Sharma and Rajeev G. Vishwakarma --; A Novel Approach for Green Computing through Event-Driven Power Aware Pervasive Computing / Jeeva Susan Jacob and K.G. Preetha --; Coloured Petri Net for Modelling and Validation of Dynamic Transmission Range Adjustment Protocol in an Ad-Hoc Network / Lopamudra Mohapatra and Debansu Panda --; Security Analysis of Proxy Blind Signature Scheme Based on Factoring and ECDLP / Namita Tiwari and Sahadeo Padhye --; Dynamic Enterprises Architecture for One or More Clouds / P. Mangayarkarasi and R. Selvarani --; Congestion Control in Distributed Networks --; A Comparative Study / K. Vinodha and R. Selvarani --; Adaptive Controller and Synchronizer Design for the Qi-Chen Chaotic System / Sundarapandian Vaidyanathan --; Opinion Mining from Weblogs and Its Relevance for Socio-political Research / Vivek Kumar Singh, Mousumi Mukherjee, Ghanshyam Kumar Mehta, Shekhar Garg and Nisha Tiwari --; Generalized Projective Synchronization of Three-Scroll Chaotic Systems via Active Control / Sarasu Pakiriswamy and Sundarapandian Vaidyanathan --; Switching Algorithms in Peer to Peer Networks --; Review / M. Padmavathi and R.M. Suresh --; Proposed Software Development Model for Small Organization and Its Explanation / Vinish Kumar and Sachin Gupta --; A Comparative Analysis of Reduction Algorithms in Picasso Tool for Cost Based Query Optimizers of Relational Databases / Neeraj Sharma and Yogendra Kumar Jain --; Tele-control of Remote Digital Irrigation System Performed through Internet / Akin Cellatoglu and Balasubramanian Karuppanan --; A Fuzzy Rule Based Expert System for Effective Heart Disease Diagnosis / E.P. Ephzibah and V. Sundarapandian --; Moving Object Detection Using Incremental Statistical Mean Technique / Safvan A. Vahora, Narendra C. Chauhan and Nilesh B. Prajapati --; Classification of Moving Vehicles in Traffic Videos / Elham Dallalzadeh, D.S. Guru, S. Manjunath and M.G. Suraj --; Use of Augmented Reality in Serious Game for Training Medical Personnel / Arun Kumar Karthikeyan, Praveen Kumar Mani, Suresh Kumar Balasubramaniyan and Praveen Jelish Panneer Selvam --; Encouraging the Usage of Neural Network in Video Text Detection Application / Suresh Kumar Balasubramaniyan, Praveen Kumar Mani, Arun Kumar Karthikeyan and Ganesh Shankar --; A Novel Face Recognition Method Using PCA, LDA and Support Vector Machine / U. Raghavendra, P.K. Mahesh and Anjan Gudigar --; Contextual Strategies for Detecting Spam in Academic Portals / Balaji Rajendran and Anoop Kumar Pandey --; Hybrid Synchronization of Hyperchaotic Chen Systems via Sliding Mode Control / Sundarapandian Vaidyanathan and Sivaperumal Sampath --; Design and Implementation of Efficient Viterbi Decoders / K.S Arunlal and S.A Hariprasad --; Classification of MRI Brain Images Using Cosine-Modulated Wavelets / Yogita K. Dubey and Milind M. Mushrif --; A Novel Approach for Email Login System / Bhavesh Patel, Dipak Patel, Shakti Patel, Rajendra Patel and Bhavin Tanti, et al --; A Non-revisiting Genetic Algorithm with Adaptive Mutation for Function Optimization / Saroj and Devraj --; xScribble: A Generalized Scheme for String-Encoding Graphical Data in Multiuser Graphical Chat / Rahul Anand, Joshy Joseph, P. Dipin Dev, Hegina Alex and P.C. Rafeeque --; Analysis of IG DV Protocols in MPLS Network for Quality of Video Conference / Swarnalatha Mannar Mannan, Arunkumar Jayaraman and Kolachina Srinivasa Kranthi Kiran --; A Comparative Analysis of Watermarking Techniques for Copy Protection of Digital Images / Dolley Shukla and Manisha Sharma --; Unique-Minimum Conflict-Free Coloring for a Chain of Rings / Einollah Pira --; Enhanced Ad Hoc on Demand Distance Vector Local Repair Trial for MANET / P. Priya Naidu and Meenu Chawla --; Multi-class SVM for EEG Signal Classification Using Wavelet Based Approximate Entropy / A.S. Muthanantha Murugavel and S. Ramakrishnan --; Hybrid Intrusion Detection with Rule Generation / V.V. Korde, N.Z. Tarapore, S.R. Shinde and M.L. Dhore --; Tele-Operation of Web Enabled Wireless Robot for Old Age Surveillance / Yatin Wadhawan and Sajal Gupta --; DSP Implementation of Wavelet Transform Based Embedded Block Coder Using Quadtree Partitioning Method / Deepali P. Ladhi and Richa R. Khandelwal --; Calculation of the Minimum Time Complexity Based on Information Entropy / Xue WU --; Enhancing E-Learning through Cognitive Structures for Learning Sports / S. MuthuLakshmi, S. Nagasundari, S.P. Surender Nath and G.V. Uma --; Speaker Independent Connected Digit Recognition Using VQ and HMM in Additive Noise Environment / A. Revathi and Y. Venkataramani --; Decomposition+: Improving l-Diversity for Multiple Sensitive Attributes / Devayon Das and Dhruba K. Bhattacharyya --; Radix-4 Modified Interleaved Modular Multiplier Based on Sign Detection / Mohamed A. Nassar and Layla A.A. El-Sayed --; Adapting Temporal Aspects to Static GIS Models / K.C.S. Murti and Viksit Agarwal --; A Basic Comparison of Different Memories for Object Oriented Computer Architecture / Ankit V. Patel and Paresh Mathur --; Performance Evaluation of Segmentation of Frog-Eye Spot Lesions on Tobacco Seedling Leaves / P.B. Mallikarjuna and D.S. Guru --; Password Authentication Using Context-Sensitive Associative Memory Neural Networks: A Novel Approach / P.E.S.N. Krishna Prasad, B.D.C.N. Prasad, A.S.N. Chakravarthy and P.S. Avadhani --; A Heuristic Approach for Community Detection in Protein Networks / Sminu Izudheen and Sheena Mathew --; Single Reduct Generation by Attribute Similarity Measurement Based on Relative Indiscernibility / Shampa Sengupta and Asit Kr. Das --; Adaptive QoS-Aware Web Service Composition / Deivamani Mallayya and Baskaran Ramachandran --; Key Dependent Feature Point Based Image Watermaking Scheme / Ramesh Kumar Surapathi, Kamalika Datta and I. Sengupta --; A Survey on ATTACK --; Anti Terrorism Technique for ADHOC Using Clustering and Knowledge Extraction / K. Sudharson and V. Parthipan --; SecureWear: A Framework for Securing Mobile Social Networks / Baishakhi Ray and Richard Han --; Throughput Analysis of Next-Hop Forwarding Method for Non-linear Vehicular Ad Hoc Networks / Ram Shringar Raw and D.K. Lobiyal --; A Novel Algorithm for Prediction of Protein Coding DNA from Non-coding DNA in Microbial Genomes Using Genomic Composition and Dinucleotide Compositional Skew / Baharak Goli, B.L. Aswathi and Achuthsankar S. Nair --; User-Centric Situation Awareness in Ubiquitous Computing Environments / Gautham Pallapa and Sajal K. Das --; A Review of QoS Driven Optimal Selection of Web Services for Compositions / Demian Antony D'Mello and V.S. Ananthanarayana --; Location Service Management Protocol for Vehicular Ad Hoc Network Urban Environment / Salim M. Zaki, M.A. Ngadi, Shukor Abd Razak, Maznah Kamat and Johan Mohamad Shariff --; CNT Based Channel Interconnect for CMOS Devices / Ginto Johnson and Vinod Pangracious --; Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks / S. Sridhar and R.
SUMMARY OR ABSTRACT
Text of Note
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 70 revised full papers presented in this volume were carefullyreviewed and selected from numerous submissions and address all major fields ofthe Computer Science and Information Technology in theoretical, methodological, and practical or applicative aspects. The papers feature cutting-edge developmentand current research in computer science and engineering.
PARALLEL TITLE PROPER
Parallel Title
CCSIT 2012
TOPICAL NAME USED AS SUBJECT
Computer science -- Congresses.
Computer science.
Information technology -- Congresses.
PERSONAL NAME - PRIMARY RESPONSIBILITY
edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai.