default search action
ICT 2010: Kochi, Kerala, India
- Vinu V. Das, R. Vijayakumar, K. G. Srinivasa, Hatim A. Aboalsamh, Mohammad Hammoudeh, Vahid Salmani, Dinesh Kumar Tyagi, Anjali Mohapatra, Bharatheesh Jaysimha, Eliathamby Ambikairajah, Jonathan M. Blackledge:
Information and Communication Technologies - International Conference, ICT 2010, Kochi, Kerala, India, September 7-9, 2010. Proceedings. Communications in Computer and Information Science 101, Springer 2010, ISBN 978-3-642-15765-3
Part 1 / Full Paper
- Rajat Sheel Jain, Neeraj Kumar, Brijesh Kumar:
Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant). 1-7 - Manash Pratim Sarma, Kandarpa Kumar Sarma:
Speech Recognition of Assamese Numerals Using Combinations of LPC - Features and Heterogenous ANNs. 8-12 - K. Dhanumjaya, G. Kiran Kumar, M. N. Giriprasad, M. Raja Reddy:
Design and Modeling of Power Efficient, High Performance 32-bit ALU through Advanced HDL Synthesis. 13-21 - Prasenjit Choudhury, Rajasekhar Gaddam, Rajesh Babu Parisi, Manohar Babu Dasari, Satyanarayana Vuppala:
A New Multi-language Encryption Technique for MANET. 22-28 - A. Mona Subramaniam, A. Manju, Madhav J. Nigam:
Bi-variate Polynomial Approximation of Fuzzy Controller Using Genetic Algorithm for Trajectory Control of PUMA560. 29-35 - K. Ramani, E. V. Prasad, S. Varadarajan:
Protecting Digital Images Using DTCWT-DCT. 36-44 - Silpakesav Velagaleti, Pavankumar Gorpuni, K. K. Mahapatra:
A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offset. 45-49 - Ankita Tijare, Pravin Dakhole:
VLSI Design of Four Quadrant Analog Voltage-Mode Multiplier and Its Application. 50-54 - S. Karthik, V. P. Arunachalam, T. Ravichandran, M. L. Valarmathi:
An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategies. 55-61 - Mala S. Kumar, K. L. Lainu, V. Aghila, Dhanya Purushothaman, K. Varun Gopal, P. K. Krishnan Namboori, Vrinda Harishankar:
Designing a Promotor for a Novel Target Site Identified in Caspases for Initiating Apoptosis in Cancer Cells. 62-67 - Suraiya Jabin:
Learning Classifier Systems Approach for Automated Discovery of Hierarchical Censored Production Rules. 68-77 - S. S. Sujatha, M. Mohamed Sathik:
Feature Based Watermarking Algorithm by Adopting Arnold Transform. 78-82 - Rio G. L. D'Souza, K. Chandrasekaran, A. Kandasamy:
Inference of Gene Networks from Microarray Data through a Phenomic Approach. 83-89 - V. V. R. Maheswara Rao, V. Valli Kumari:
A Novel Lattice Based Research Frame Work for Identifying Web User's Behavior with Web Usage Mining. 90-99 - Vydeki Dharmar, K. Jayanthy:
Design and Analysis of Specification Based Ids for Wireless Networks Using Soft Computing. 100-107 - Lokanadham Naidu Vadlamudi, K. Ramani, D. Ganesh, Sk. Munwar, P. Basha:
A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme. 108-115 - I. Shatheesh Sam, P. Devaraj, Raghuvel S. Bhuvaneswaran:
Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map. 116-123 - Atul Kant Kaushik, Emmanuel S. Pilli, Ramesh C. Joshi:
Network Forensic Analysis by Correlation of Attacks with Network Attributes. 124-128 - Deepali Virmani, Satbir Jain:
Robust and Real Time Data Delivery in Wireless Sensor Networks. 129-135 - Sameer Singh Chauhan, Ramesh Chandra Joshi:
Multiple QoS Guided Heuristic for Independent Task Scheduling in Grid. 136-141 - Emmanuel S. Pilli, Ramesh C. Joshi, Rajdeep Niyogi:
A Framework for Network Forensic Analysis. 142-147 - Sarangthem Ibotombi Singh, Smriti Kumar Sinha:
A New Trust Model Based on Time Series Prediction and Markov Model. 148-156 - Ashutosh K. Dubey, Shishir K. Shandilya:
A Novel J2ME Service for Mining Incremental Patterns in Mobile Computing. 157-164 - A. P. Sarath Chandar, S. Arun Balaji, G. Venkatesh, Susan Elias:
CDPN: Communicating Dynamic Petri Net for Adaptive Multimedia Presentation. 165-170 - Utpala Niranjan, R. B. V. Subramanyam, V. Khanaa:
Developing a Web Recommendation System Based on Closed Sequential Patterns. 171-179 - Lokesh Kumar Sharma, Om Prakash Vyas, Simon Scheider, Ajaya K. Akasapu:
Nearest Neighbour Classification for Trajectory Data. 180-185 - Sanjeev Rana, Anil Kapil:
Security-Aware Efficient Route Discovery for DSR in MANET. 186-194 - Manisha Rathi:
Regression Modeling Technique on Data Mining for Prediction of CRM. 195-200 - Debarshi Kumar Sanyal, Sandip Chakraborty, Matangini Chattopadhyay, Samiran Chattopadhyay:
Congestion Games in Wireless Channels with Multipacket Reception Capability. 201-205 - V. S. Meenakshi, G. Padmavathi:
Secure and Revocable Multibiometric Templates Using Fuzzy Vault for Fingerprint and Iris. 206-214 - Aminul Islam, Mohd. Hasan:
High Speed Cache Design Using Multi-diameter CNFET at 32nm Technology. 215-222 - Rajkumar Rajavel, Thamarai Selvi Somasundaram, Kannan Govindarajan:
Dynamic Load Balancer Algorithm for the Computational Grid Environment. 223-227 - Mohd. Amir, Durga Toshniwal:
Instance-Based Classification of Streaming Data Using Emerging Patterns. 228-236 - Prasun Banerjee, Stephan D'Costa, Sukriti Bhattacharya:
Modified Go-Left Balls and Bins Algorithm for Server Load Balancing. 237-242 - Minu M. Das, Manju Bhaskar, T. Chithralekha:
Three Layered Adaptation Model for Context Aware E-Learning. 243-248 - Amarjeet Kaur, Teek Parval Sharma:
AFDEP: Agreement Based CH Failure Detection and Election Protocol for a WSN. 249-257 - Paresh Solanki, Gaurang Raval, Srikant Pradhan:
Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks. 258-266 - Dinesh B. Bhoyar, Bharati Y. Masram:
Operational Transconductance Amplifier Based Two-Stage Differential Charge Amplifiers. 267-273 - Neha Sharma, Kumar Sambhav Pandey:
Graceful Degradation in Performance of WaveScalar Architecture. 274-280
Part 2 / ICT 2010 - Short Paper
- Manish Khare, Tushar Patnaik, Ashish Khare:
Dual Tree Complex Wavelet Transform Based Video Object Tracking. 281-286 - K. Saruladha, Gnanasekaran Aghila, Sathish Kumar Penchala:
Design of New Indexing Techniques Based on Ontology for Information Retrieval Systems. 287-291 - K. C. Nalavade, B. B. Meshram:
Identifying the Attack Source by IP Traceback. 292-296 - Arun Kumar Tripathi, Ajay Agarwal, Yashpal Singh:
An Approach towards Secure and Multihop Time Synchronization in Wireless Sensor Network. 297-302 - A. Joy James Prabhu:
Improving Dynamic Difficulty Adjustment to Enhance Player Experience in Games. 303-306 - Tayebeh Mosavi Miangah, Amin Nezarat:
A Novel Method for Cross-Language Retrieval of Chunks Using Monolingual and Bilingual Corpora. 307-312 - Sathya Ramadass, Annamma Abhraham:
Application of Kohonan SOM in Prediction. 313-318 - K. S. Arun, K. S. Sarath:
Evaluation of the Role of Low Level and High Level Features in Content Based Medical Image Retrieval. 319-325 - Vali Derhami, Mohammad Ali Saadatjoo, Fatemeh Saadatjoo:
A Reinforcement Learning Approach for Price Offer in Supplier Selection Process. 326-329 - N. A. Ashrafi Payaman:
Generation of k-ary and (k, m)-ary Trees in A-order Using z-Sequences. 330-335 - Sanjay N. Talbar, Satishkumar L. Varma:
Wavelet and Hadamard Transforms for Image Retrieval Using Color Models. 336-338 - Byomkesh Mandal, Balaram Bhattacharyya:
A Rough Set Integrated Fuzzy C-Means Algorithm for Color Image Segmentation. 339-343 - K. Gopalakrishnan, V. Rhymend Uthariaraj:
Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks. 344-349 - G. Kalpana, M. Punithavalli:
An Energy Efficient Cluster Based Broadcast Protocol for Mobile Ad Hoc Networks. 350-355 - Sadhana Priyadarshini, Debahuti Mishra:
A Hybridized Graph Mining Approach. 356-361 - Kanchana Rajaram, S. Usha Kiruthika:
Dynamic Contract Generation and Monitoring for B2B Applications with Composite Services. 362-364 - Subrata Sinha, Smriti Kumar Sinha, Bipul Syam Purkayastha:
Synchronization of Authorization Flow with Work Object Flow in a Document Production Workflow Using XACML and BPEL. 365-370 - Deepali Virmani, Satbir Jain:
Virtual Nodes for Self Stabilization in Wireless Sensor Networks. 371-375 - Lourembam Lolit Kumar Singh, Bhaskar Gupta, Partha Pratim Sarkar:
Small Square Microstrip Antenna. 376-379 - J. Bagyamani, K. Thangavel, R. Rathipriya:
Extraction of Optimal Biclusters from Gene Expression Data. 380-383 - Rolly Gupta, Anjana Gosain:
Analysis of Data Warehouse Quality Metrics Using LR. 384-388 - N. Chenthalir Indra, E. RamaRaj:
Similar - Dissimilar Victor Measure Analysis to Improve Image Knowledge Discovery Capacity of SOM. 389-393 - Parvin Eftekhari, Hamid Shokrzadeh, Abolfazl Toroghi Haghighat:
Cluster-Base Directional Rumor Routing Protocol in Wireless Sensor Network. 394-399 - Sugam Sharma, Shashi K. Gadia, S. B. Goyal:
On the Calculation of Coldness in Iowa, a North Central Region, United States: A Summary on XML Based Scheme. 400-405 - C. Dharma Raj, G. Sasibhushana Rao, P. V. Y. Jayasree, B. Srinu, P. Lakshman:
Development of a Three Layer Laminate for Better Electromagnetic Compatibility Performance at X-Band. 406-410 - A. Femina Abdulkader, Ajit Joseph:
Pre-Confirmation Neural Network for Reducing the Region of Interest in an Image for Face Detection. 411-416 - K. Sarangam, Hameed Zohaib Samad:
Low Voltage Low Power Op Amp with Gain Boosting and Frequency Compensation Technique for Battery Powered Applications. 417-422 - Soumen Kanrar, Aroop Mukherjee:
Performance of Clustering in Mobile Domain. 423-429 - G. Sai Kiranmai, K. Mallika, M. Anand Kumar, V. Dhanalakshmi, K. P. Soman:
Morphological Analyzer for Telugu Using Support Vector Machine. 430-433 - Subbu Ramanathan, Haresh Suresh, Amog Rajenderan, Susan Elias:
Visualization of State Transition Systems in a Parallel Environment. 434-436 - S. K. Jayanthi, S. Prema:
Facilitating Efficient Integrated Semantic Web Search with Visualization and Data Mining Techniques. 437-442 - Biplab Banerjee, Tanusree Bhattacharjee, Nirmalya Chowdhury:
Image Object Classification Using Scale Invariant Feature Transform Descriptor with Support Vector Machine Classifier with Histogram Intersection Kernel. 443-448 - P. Esther Rani, R. Shanmuga Lakshmi:
Palmprint Recognition System Using Zernike Moments Feature Extraction. 449-454 - A. Boomaranimalany, R. M. Chandrasekaran:
A QOS Framework for Mobile Ad-Hoc in Large Scale Networks. 455-457 - Tanusree Bhattacharjee, Biplab Banerjee, Nirmalya Chowdhury:
An Interactive Content Based Image Retrieval Method Integrating Intersection Kernel Based Support Vector Machine and Histogram Intersection Based Similarity Measure for Nearest Neighbor Ranking. 458-462
Part 3 / ICT 2010 - Poster Paper
- R. Pugazendi, K. Duraiswamy:
Analysis and Prediction of Blocking Probability in a Banyan Based ATM Switch. 463-468 - M. Pushpavalli, A. M. Natarajan:
Performance Evaluation of QoS Aware Routing in OLSR (Optimized Link State Routing Protocol) Using Genetic Algorithm. 469-474 - M. E. Paramasivam, R. S. Sabeenian:
Handloom Silk Fabric Defect Detection Using First Order Statistical Features on a NIOS II Processor. 475-477 - Yogesh Chaba, Yudhvir Singh, Kanwar Preet Singh, Prabha Rani:
Performance Modeling of MANET Routing Protocols with Multiple Mode Wormhole Attacks. 478-483 - Binu Jacob, K. V. Promod:
Mining a Ubiquitous Time and Attendance Application Schema Using Oracle Data Miner: A Case Study. 484-489 - P. H. S. T. Murthy, L. Madan Mohan, V. Sreenivasa Rao, V. Malleswara Rao:
4T Carry Look Ahead Adder Design Using MIFG. 490-494 - Gaytri Gupta:
Microcontroller Based Monitoring and Control of Greenhouse Enivironment. 495-497 - R. S. Sabeenian, M. Vidhya:
Hand written Text to Digital Text Conversion using Radon Transform and Back Propagation Network (RTBPN). 498-500 - N. Kaliammal, G. Gurusamy:
Resource Allocation and Multicast Routing Protocol for Optical WDM Networks. 501-503 - Surya Prakash Singh:
An Approximate Algorithm for Solving Dynamic Facility Layout Problem. 504-509 - C. S. Vasavi, Saptharshi, R. Radhika Devi, Lakshmi Anand, Megha. P. Varma, P. K. Krishnan Namboori:
Homology Modeling and Protein Ligand Interaction to Identify Potential Inhibitor for E1 Protein of Chikungunya. 510-513 - Rajesh Kumar Aggarwal, Mayank Dave:
Tied Mixture Modeling in Hindi Speech Recognition System. 514-519 - Krishan Gopal Verma, Brajesh Kumar Kaushik, Raghuvir Singh:
Propagation Delay Variation due to Process Induced Threshold Voltage Variation. 520-524 - Sanjay N. Talbar, Anil K. Deshmane:
Biomedical Image Coding Using Dual Tree Discrete Wavelet Transform and Iterative Projection. 525-528 - Bettahally N. Keshavamurthy, Mitesh Sharma, Durga Toshniwal:
Privacy-Preserving Naïve Bayes Classification Using Trusted Third Party and Offset Computation over Distributed Databases. 529-534 - Kavita R. Singh, Mukesh A. Zaveri, Mukesh M. Raghuwanshi:
Extraction of Pose Invariant Facial Features. 535-539 - Tanzila Saba, Ghazali Sulong, Shafry Rahim, Amjad Rehman:
On the Segmentation of Multiple Touched Cursive Characters: A Heuristic Approach. 540-542 - B. Vanathi, V. Rhymend Uthariaraj:
Context Representation and Management in a Pervasive Environment. 543-548 - R. Sangeetha, B. Kalpana:
A Comparative Study and Choice of an Appropriate Kernel for Support Vector Machines. 549-553 - J. Harikiran, R. Usha Rani:
Color Image Restoration Method for Gaussian Noise Removal. 554-560 - Akshara Pande, Manjari Gupta, Anil Kumar Tripathi:
A Decision Tree Approach for Design Patterns Detection by Subgraph Isomorphism. 561-564 - B. Bhuvaneswari, K. Malathi:
Realisation of Various EBG Structures. 565-570 - Babita Rathore, Sandeep Kumar Kushwaha, Madhvi Shakya:
Identification of Melanoma (Skin Cancer) Proteins through Support Vector Machine. 571-575 - Renu Singh, Swanirbhar Majumder, U. Bhattacharjee, Aheibam Dinamani Singh:
BPNN and Lifting Wavelet Based Image Compression. 576-579 - D. R. Shashi Kumar, R. Ravi Kumar, K. B. Raja, R. K. Chhotaray, Sabyasachi Pattanaik:
Combined Off-Line Signature Verification Using Neural Networks. 580-583 - Mahesh Gadiraju, V. Valli Kumari:
Distribution of Continuous Queries over Data Aggregators in Dynamic Data Dissemination Networks. 584-589 - K. V. Krishnam Raju, V. Valli Kumari, N. Sandeep Varma, K. V. S. V. N. Raju:
Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR. 590-595 - Vijay Kumar, Dinesh Kumar:
Digital Image Steganography Based on Combination of DCT and DWT. 596-601 - J. Divya Udayan, T. Gireesh Kumar, Roshy M. John, K. J. Poornaselvan, S. A. Lakshmanan:
Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces. 602-605 - P. Kiran Mayee, Rajeev Sangal, Soma Paul:
Neural Networks Based Detection of Purpose Data in Text. 606-609 - Rajneesh Gujral, Anil Kapil:
Comparative Performance Analysis of QoS-Aware Routing on DSDV, AODV and DSR Protocols in MANETs. 610-615 - Apeksha V. Sakhare, Vilas M. Thakare, Rajiv V. Dharaskar:
Steering Control of an Automated Vehicle Using Touch Screen with Simulation Result. 616-618 - Samarth Borker, R. B. Lohani:
A Low Cost GPS Based Vehicle Collision Avoidance System. 619-621 - Vijayanandh Rajamanickam, Balakrishnan Ganesan:
Human Skin Region Identification Using Fusion Technique. 622-625 - Chinnamuthu Annadurai, D. MuthuKumaran, C. Charithartha Reddy, M. Kanagasabapathy:
Avoidance of Electromagnetic Interference in Modem with Minimal Bit Error Rate Using Tele Typewriter Signals. 626-631 - (Withdrawn) A State Variables Analysis for Emerging Nanoelectronic Devices. 632-637
- P. P. Amritha, Anoj Madathil, T. Gireesh Kumar:
Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine. 638-640 - Ahmad Anzaar, Husain Shahnawaz, Chand Mukesh, S. C. Gupta, R. Gowri:
ASSR Fair Load Distribution Using Efficiency Division Factor with Greedy Booster Approach for MANET. 641-646 - A. Kalai Selvi, M. Mohamed Sathik:
Secret Sharing Scheme for Image Encryption Using new Transformation Matrix. 647-650 - R. Kamalraj, A. Rajiv Kannan, P. Ranjani, R. Hemarani:
Measuring the Reusability Level of Software Packages Using Reusability Testing Scripts. 651-653 - Arunarasi Jayaraman, Indumathy Pushpam:
A New Threshold Calculation Approach in the Performance Enhancement of Spread Spectrum System Using Double Density Discrete Wavelet Filter. 654-659 - Ritu Baniwal, Kumar Sambhav Pandey:
Recent Trends in Superscalar Architecture to Exploit More Instruction Level Parallelism. 660-665 - Satyadhyan Chickerur, M. Aswatha Kumar:
A Neural Network Based Solution to Color Image Restoration Problem. 666-671 - T. Arathi, K. P. Soman, Latha Parameswaran:
Spline Biorthogonal Wavelet Design. 672-674 - Sunil Khurana, Sunil Kumar Khatri:
Securing Password File Using Bezier Curves. 675-680 - Nilesh Shah, Rasika Dhavse, Anand D. Darji:
Reading a 4-Bit SLC NAND Flash Memory in 180nm Technology. 681-685 - Venkateswaran Shanmugapriya, Ganapathi Padmavathi:
Keystroke Dynamics Authentication Using Neural Network Approaches. 686-690 - Sanjay Singh, Srinivasa Murali Dunga, Atanendu S. Mandal, Chandra Shekhar, Anil Vohra:
Moving Object Tracking Using Object Segmentation. 691-694 - Titir Santra:
Mobile Health Care System for Patient Monitoring. 695-700
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.