default search action
ICACCI 2012: Chennai, India
- Kaliappan Gopalan, Sabu M. Thampi:
2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012. ACM 2012, ISBN 978-1-4503-1196-0
Regular papers
- Anil G. Rao, Manish R. Joshi:
An effective e-governance model for financial institutions in India. 1-7 - K. M. Anil Kumar, Suresha:
Sentiment dictionary for effective detection of web users' opinion. 8-15 - Vishnuprakash Puthiya Kovilakath, S. D. Madhu Kumar:
Semantic broken link detection using structured tagging scheme. 16-20 - M. Thirumaran, Dhavachelvan Ponnurangam, G. Naga Venkata Kiran, A. Divya:
A novel framework for enterprise web services change management. 21-27 - Sindhu Sudhakaran, Radha Senthilkumar:
Efficient evaluation of partial path queries over a XML compact storage structure. 28-32 - Prajna Paramita Debata, Satyabrata Das, Debahuti Mishra, Sashikala Mishra, Kailash Shaw, Gayatri Mahapatro:
Error encoding and decoding model over communication channel for synthesis of proteins from DNA sequences. 33-37 - Hasin Afzal Ahmed, Priyakshi Mahanta, D. K. Bhattacharyya:
Finding gene coherent patterns using PATSUB+. 38-44 - Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das:
Detection and measurement of bimalleolar fractures using Harris corner. 45-51 - K. Arun Kumar, Vamshi Krishna Konishetty, Kaladhar Voruganti, G. V. Prabhakara Rao:
CASH: context aware scheduler for Hadoop. 52-61 - M. Asif Naeem, Gillian Dobbie, Imran Sarwar Bajwa, Gerald Weber:
Resource optimization for processing of stream data in data warehouse environment. 62-68 - Indu Singh, Manoj Kumar:
Evaluation of approaches for designing secure data warehouse. 69-73 - Harish Verma, Durga Toshniwal, Sateesh Kumar Peddoju:
Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services. 74-81 - Sandeep Varma Nadimpalli, Valli Kumari Vatsavayi:
Detecting dependencies in an anonymized dataset. 82-89 - Sujatha Srinivasan, Sivakumar Ramakrishnan:
Dominators vs pure dominators on the accuracy of a classifier with a multi objective cultural algorithm. 90-96 - Prem Pujari Pati, Kaberi Das, Debahuti Mishra, Shruti Mishra, Lipismita Panigrahi:
Sampling correctly for improving classification accuracy: a hybrid higher order neural classifier (HHONC) approach. 97-101 - R. Vasanth Kumar Mehta, B. Sankarasubramaniam, S. Rajalakshmi:
An algorithm for fuzzy-based sentence-level document clustering for micro-level contradiction analysis. 102-105 - Bikram Keshari Mishra, Amiya Kumar Rath, Nihar Ranjan Nayak, Sagarika Swain:
Far efficient K-means clustering algorithm. 106-110 - R. Sethukkarasi, U. Keerthika, Arputharaj Kannan:
A self learning rough fuzzy neural network classifier for mining temporal patterns. 111-117 - Rudra Kalyan Nayak, Debahuti Mishra, Satyabrata Das, Kailash Shaw, Sashikala Mishra, Ramamani Tripathy:
Clustering and classifying informative attributes using rough set theory. 118-123 - K. Reddy Madhavi, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju:
Identification of optimal cluster centroid of multi-variable functions for clustering concept-drift categorical data. 124-128 - Govinda Kannayaram, Perla Ravitheja:
Identity anonymization and secure data storage using group signature in private cloud. 129-132 - Syed Mujib Rahaman, Mohammad Farhatullah:
A framework for preserving privacy in cloud computing with user service dependent identity. 133-136 - Pardeep Kumar, Amandeep Verma:
Scheduling using improved genetic algorithm in cloud computing for independent tasks. 137-142 - M. K. Mohan Murthy, Sanjay Harogolige Adimurthy, Ashwini Janagal Padmanabha:
Pricing models and pricing schemes of IaaS providers: a comparison study. 143-147 - Sathyanarayanan Rangarajan, Monica Verma, Anand Kannan, Ayush Sharma, Ingmar Schoen:
V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning. 148-154 - T. P. Shabeera, Priya Chandran, S. D. Madhu Kumar:
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications. 155-160 - Anandalakshmi Thevampalayam Kaliappan, Swamidoss Sathiakumar, Nandan Parameswaran:
Flexible power consumption management in smart homes. 161-167 - Usha Banerjee, Gaurav Bora, Gaurav Batra, Ayush Agarwal:
A novel software system to facilitate better and easier communication for people with speaking disabilities. 168-173 - Aloysius George, B. R. Rajakumar, D. Binu:
Genetic algorithm based airlines booking terminal open/close decision system. 174-179 - Asif Ekbal, Sriparna Saha, Dhirendra Singh:
Active machine learning technique for named entity recognition. 180-186 - Kota Solomon Raju, Gargi Baruah, Manipati Rajesham, Palash Phukan:
FPGA based computing displacement of moving object in a real time video. 187-192 - A. Thilagavathy, K. Aarthi, A. Chilambuchelvan:
Text extraction from videos using a hybrid approach. 193-199 - C. Lakshmi Devasena, M. Hemalatha:
Object detection in video using Lorenz information measure and discrete wavelet transform. 200-206 - Usha Bhanu Nageswaran, A. Chilambuchelvan:
VLSI architectures for lifting based DWT: a detailed survey. 207-214 - G. Muneeswari, K. L. Shunmuganathan:
Time based agent garbage collection algorithm for multicore architectures. 215-219 - Balaji Venu, Ashwani Singh:
Formal verification methodology considerations for network on chips. 220-225 - R. Sakthivel, K. Sravanthi, Harish M. Kittur:
Low power energy efficient pipelined multiply-accumulate architecture. 226-231 - Gagandeep Kaur, Mohammad Ayoub Khan:
Current differencing buffered amplifier an active element: a review of recent developments. 232-236 - Satinder Singh Gill, Brent R. Petersen:
Advanced adaptive call admission control for mobile cellular networks: cell breathing, load shedding and bandwidth degradation. 237-243 - Aditya Ponnada, Ajaykumar Kannan:
Evaluation of mobile games using playability heuristics. 244-247 - V. P. Harigovindan, Anchare V. Babu, Lillykutty Jacob:
Tuning transmission opportunity (TXOP) limits for providing bit-based fairness in IEEE 802.11p V2I networks. 248-254 - Jyoti Prakash Singh, Paramartha Dutta, Amlan Chakrabarti:
Temporal characteristics of clustering in mobile ad hoc network. 255-261 - Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A rate adaptive and multipath routing protocol to support video streaming in MANETs. 262-268 - R. Deepa, S. Swamynathan:
Load balancer for energy efficient clustering protocol in MANETs. 269-274 - Hema Ramachandran, G. R. Bindu:
Wireless charging of lighting gadgets using low Q resonant coupling. 275-278 - Sulata Mitra, Atanu Mondal:
Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET. 279-286 - P. Devi, A. Kannammal:
A hybrid defense mechanism for DDoS attacks using cluster analysis in MANET. 287-291 - Amali Chinnappan, Ramachandran Balasubramanian:
Modified weight function based network selection algorithm for 4G wireless networks. 292-299 - Vishwanath Pratap Singh, Arka Prokash Mazumdar, Ashok Singh Sairam:
On energy consumption analysis for ad hoc routing protocols. 300-306 - Osama A. Omer, Ahmed Abdelreheem:
A novel algorithm for PAPR reduction in LTE system. 307-311 - Nanda Kishore Chavali, Venkata Krishna Reddy Pilli:
Adaptive time synchronization for VHT wireless LAN. 312-317 - Maneesha V. Ramesh, Anoop Jacob, Aryadevi R. Devidas:
Enhanced emergency communication using mobile sensing and MANET. 318-324 - Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh:
Higher layer issues in cognitive radio network. 325-330 - Rinnymol Babu, A. V. Babu:
Resolving rate anomaly in IEEE 802.11p multi-rate vehicle-to-infrastructure networks using TXOP differentiation. 331-336 - P. R. Mahalingam, Shimmi Asokan:
A framework for optimizing GCC for ARM architecture. 337-342 - Shovan Maity, Arnab Raha, Souvik Kumar Mitra, Victor Seal, Mrinal Kanti Naskar, Amitava Mukherjee:
An efficient sleep protocol for lifetime enhancement in multi covered and multi connected WSNs. 343-347 - Sachin Gajjar, Shrikant N. Pradhan, Kankar S. Dasgupta:
Performance analysis of cross layer protocols for wireless sensor networks. 348-354 - Gitanjali Rahul Shinde, Swati Joshi, Shami Jhodge:
Diversity coded directed diffusion for WSN. 355-359 - Ipsita Dutta, Rajib Banerjee, Tamaghna Acharya, DasBit Sipra:
An energy efficient audio compression scheme using wavelet with dynamic difference detection technique in wireless sensor network. 360-366 - Maneesha Vinodini Ramesh, P. L. Divya, Raghavendra V. Kulkarni, Rekha Manoj:
A swarm intelligence based distributed localization technique for wireless sensor network. 367-373 - Maneesha V. Ramesh, A. G. Sreedevi, Kamalanathan Kandasamy, P. Venkat Rangan:
Performance comparison and node failure assessment of energy efficient two level balanced and progressive sensor networks. 374-381 - Jitendra Pradhan, Anil K. Sarje:
A fault tolerant approach for data aggregation in wireless sensor networks. 382-386 - Sabu M. Thampi, Nithya Aniyan, K. Chitharanjan:
Hexagonal groups based key management using deployment knowledge in wireless sensor networks. 387-391 - Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy:
Analysis of IEEE 802.11 DCF for ad hoc networks under nonsaturation conditions. 392-398 - Axel Sikora, Pancraç Villalonga, Klaus Landwehr:
Extensions to wireless M-Bus protocol for smart metering and smart grid application. 399-404 - G. Sreenu, P. M. Dhanya:
Inference of peer temperament in unstructured peer-to-peer networks by creating a virtual multi layer structure. 405-408 - M. Vigilson Prem, S. Swamynathan:
Efficient dynamic itinerary and memory allocation for mobile agents. 409-415 - Raghavendra Sunku, Debabrata Das:
Online differential charging for blended services using service capability interaction manager in IMS network. 416-420 - K. R. Remesh Babu, P. Mathiyalagan, S. N. Sivanandam:
Task scheduling using ACO-BP neural network in computational grids. 428-432 - Jissy Liz Jose, Jayasudha Js, Sabu M. Thampi:
Sybil resilient identity distribution in P2P networks. 433-439 - Ramkumar Dargha:
Cloud computing: from hype to reality: fast tracking cloud adoption. 440-445 - Sajad Khorsandroo, Rafidah Md Noor, Sayid Khorsandroo:
The role of psychophysics laws in quality of experience assessment: a video streaming case study. 446-452 - Susmita Horrow, Sanchika Gupta, Anjali Sardana:
Implementing private cloud at IIT Roorkee: an initial experience. 453-458 - Sheeja S. Manakattu, S. D. Madhu Kumar:
An improved biased random sampling algorithm for load balancing in cloud based systems. 459-462 - Harkeerat Singh Bedi, Sajjan G. Shiva:
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms. 463-469 - Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues, M. Sai Manoj, P. Revathy:
State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. 470-476 - Narasimha Bolloju, San Murugesan:
Cloud-based B2B systems integration for small-and-medium-sized enterprises. 477-480 - Keerthi Balasundaram, Madhan Kumar Srinivasan, K. Sarukesi, Paul Rodrigues:
Implementation of next-generation traffic sign recognition system with two-tier classifier architecture. 481-487 - Li Liu, Cheng Zhang, Haojie Wang:
A new algorithm based on complex wavelet transform for protein sequence classification. 488-492 - Adathala Rajeev, Natarajan Sivakumaran, Sreedharan Sujesh, Chirathodi Vayalappil Muraleedharan:
A linear after-load model for a cardio-vascular pulse duplicator. 493-497 - Nazanin Sabooniha, Danny Toohey, Kevin Lee:
An evaluation of hospital information systems integration approaches. 498-504 - Soubhik Paul, Jayanta Mukhopadhyay, Arun K. Majumdar, Bandana Majumdar, S. Das Bhattacharya:
Methodology to visualize electronic health record for chronic diseases on small display screens. 505-510 - Anup Nandy, Soumik Mondal, Lokesh Rai, Pavan Chakraborty, Gora Chand Nandi:
A study on damping profile for prosthetic knee. 511-517 - Komathy Karuppanan, Abinaya Sree Vairasundaram, Manjula Sigamani:
A comprehensive machine learning approach to prognose pulmonary disease from home. 518-523 - Tanmay Pal, Srinivasu Maka:
Simulation of respiratory system under normal, hypoxia and hypercapnia conditions. 524-532 - Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
An effective unsupervised network anomaly detection method. 533-539 - SK Hafizul Islam, G. P. Biswas:
Certificateless strong designated verifier multisignature scheme using bilinear pairings. 540-546 - Shila Samantaray, Sambit Bakshi, Pankaj Kumar Sa:
An efficient DoG based fingerprint enhancement scheme. 547-550 - Paria Ghanbari, Mahmood Ahmadi, Arash Ahmadi:
Error management and detection in computer networks using Bloom filters. 551-556 - Roli Bansal, Priti Sehgal, Punam Bedi:
Securing fingerprint images using a hybrid technique. 557-565 - Sriparna Saha, Ashok Singh Sairam, Amulya Yadav, Asif Ekbal:
Genetic algorithm combined with support vector machine for building an intrusion detection system. 566-572 - Soumya Mukherjee, Arup Kumar Pal:
A DCT-SVD based robust watermarking scheme for grayscale image. 573-578 - C. K. Raju, Ashok Mishra, P. B. S. Bhadoria:
Synthesis of sustainability and secureness of software in public applications using deductive-nomological model. 579-588 - R. K. N. Sai Krishna, Tummalapalli J. V. R. K. M. K. Sayi, Ravi Mukkamala, Pallav K. Baruah:
Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach. 589-595 - Jaisankar Narayanasamy, Sannasi Ganapathy, Arputharaj Kannan:
Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithm. 596-601 - Gaurav Varshney, Anjali Sardana, Ramesh Chandra Joshi:
Secret information display based authentication technique towards preventing phishing attacks. 602-608 - Yakkala V. Naga Manikanta, Anjali Sardana:
Protecting web applications from SQL injection attacks by using framework and database firewall. 609-613 - A. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi:
FPGA based sliding window architecture for RC5 encryption. 614-618 - Dinesh Kumar Tyagi, Virendra Singh Shekhawat, V. K. Chaubey:
Resource efficient survivability approach for resilient WDM optical networks. 619-624 - Dheerendra Mishra, Sourav Mukhopadhyay:
Privacy rights management in multiparty multilevel DRM system. 625-631 - Suman Sau, Rourab Paul, Tanmay Biswas, Amlan Chakrabarti:
A novel AES-256 implementation on FPGA using co-processor based architecture. 632-638 - Neelam Sharma, Saurabh Mukherjee:
Layered approach for intrusion detection using naïve Bayes classifier. 639-644 - P. Kola Sujatha, C. Suba Priya, Arputharaj Kannan:
Network intrusion detection system using genetic network programming with support vector machine. 645-649 - Animesh Tripathy, Matrubhumi Pradhan:
A novel framework for preserving privacy of data using correlation analysis. 650-655 - Animesh Tripathy, Jayanti Dansana, Debi Prasad Mishra:
A secure packet marking scheme for IP traceback in IPv6. 656-659 - Animesh Tripathy, Jayanti Dansana, Ranjita Mishra:
A classification based framework for privacy preserving data mining. 660-666 - Cibile K. Kanjirathumkal, S. M. Sameer, Lillykutty Jacob:
Exploiting second order statistics of the received signals in AF relay cooperative network for compound channel estimation. 667-672 - Sangeetha Manoharan, Vidhyacharan Bhaskar:
Performance comparison of M-DCSK schemes in MIMO Nakagami channels with and without diversity combining. 673-677 - Vivek G. Rajendran, Vidhyacharan Bhaskar:
Capacity analysis of LMF channels under different adaptation policies with and without diversity combining. 678-682 - E. Ravindran Vimina, K. Poulose Jacob:
Image retrieval using local and global properties of image regions with relevance feedback. 683-689 - Rahul Bankapur, Meena S. Maralappanavar:
Optimized trace transform based content based image retrieval algorithm. 690-696 - G. Geetha, S. N. Geethalakshmi:
Detecting epileptic seizures using electroencephalogram: a novel frequency domain feature extraction technique for seizure classification using fast ANFIS. 697-703 - T. Sumadhi, M. Hemalatha:
Towards improving automatic image annotation using improvised fractal SMOTE approach. 704-709 - Krishna Asawa, Vikrant Verma, Ankit Agrawal:
Recognition of vocal emotions from acoustic profile. 710-716 - M. Sharmila Kumari, B. H. Shekar, N. Harivinod, K. Raghurama Holla:
Monogenic scale space based region covariance matrix descriptor: an efficient and accurate face recognition algorithm. 717-720 - M. C. Hanumantharaju, V. N. Manjunath Aradhya, M. Ravishankar, A. Mamatha:
A particle swarm optimization method for tuning the parameters of multiscale retinex based color image enhancement. 721-727 - Bindu S. Moni, G. Raju:
Handwritten character recognition system using a simple feature. 728-734 - M. A. Leo Vijilious, Sannasi Ganapathy, V. Subbiah Bharathi:
Palmprint feature extraction approach using nonsubsampled contourlet transform and orthogonal moments. 735-739 - Thangavel Deepa, R. Kumar:
PAPR reduction for OFDM systems using clipping and square rooting techniques. 740-744 - Sibendu Samanta, R. P. Maheshwari, Manoj Tripathy:
Directional line edge binary pattern for texture image indexing and retrieval. 745-750 - Battula Tirumala Krishna:
Fractional Fourier transform: a survey. 751-757 - Hongjian Sun, Arumugam Nallanathan, Jing Jiang:
Improving the energy efficiency of power line communications by spectrum sensing. 758-762 - P. Shobana Devi, Jose Stephen, G. Sulochana Kurambath, R. Ravindra Kumar:
Implementation of dictation system for Malayalam office document. 763-767 - M. Asif Naeem, Imran Sarwar Bajwa:
Generating OLAP queries from natural language specification. 768-773 - Ramakrishna Kolikipogu, B. Padmaja Rani, Vijayalaxmi Kakulapati:
Reformulation of Telugu web query using word semantic relationships. 774-780 - V. Jayan, R. Sunil, G. Sulochana Kurambath, R. Ravindra Kumar:
Divergence patterns in machine translation between Malayalam and English. 788-794 - Santosh Gaikwad, Bharti Gawali, Suresh C. Mehrotra:
Novel approach based feature extraction for Marathi continuous speech recognition. 795-804 - R. Santhosh, Gowri Srinivasa:
A compact feature set for recognition of handwritten numerals and vowels in the Kanarese script. 805-811 - Shahrouz Gashmard, Alireza Mehri Dehnavi, Hossein Rabbani:
A new combined method for character recognizing in Farsi printed scripts using principal component analysis. 812-815 - Zouhir Zemirli, Yahya O. Mohamed Elhadj:
Morphar+: an Arabic morphosyntactic analyzer. 816-823 - Saranya D. Krishnan, R. R. Rajeev, Mary Priya Sebastian, Elizabeth Sherly:
Subject and object identification in Malayalam text. 824-827 - P. J. Antony, Hemant B. Raj, B. S. Sahana, Dimple Sonal Alvares, Aishwarya Raj:
Morphological analyzer and generator for Tulu language: a novel approach. 828-834 - Sriparna Saha, Asif Ekbal, Mridula Verma, Utpal Kumar Sikdar, Massimo Poesio:
Active learning technique for biomedical named entity extraction. 835-841 - Navanath Saharia, Utpal Sharma, Jugal Kalita:
Analysis and evaluation of stemming algorithms: a case study with Assamese. 842-846 - Misiriya Shahul Hameed, C. N. Subalalitha, T. V. Geetha, Ranjani Parthasarathi:
A deconverter framework for Malayalam. 847-856 - Kamal Sarkar:
An approach to summarizing Bengali news documents. 857-862 - Paruvelli Sreedevi, Wen-Liang Hwang:
Example-based single image enhanced up-sampling. 863-872 - Rajesh K. Bawa, Ganesh K. Sethi:
A review on binarization algorithms for camera based natural scene images. 873-878 - Jiuwen Zhang, Jincai Mi, Tongfeng Zhang:
Shift-invariant texture retrieval using P- contourlet. 879-883 - A. Benjamin Joseph, R. Baskaran:
Improved edge preserving lossy image compression using wavelet transform. 884-888 - Akshay Kumar Maan, Alex Pappachen James:
Ranking importance based information on the world wide web. 889-897 - Akshansh Gupta, R. K. Agrawal, Baljeet Kaur:
A three phase approach for mental task classification using EEG. 898-904 - Pranali K. Kosamkar, Madhuri Potey:
Feature based retrieval for animation video. 905-909 - Yahya O. Mohamed Elhadj, Zouhir Zemirli, Basma Al-faraj:
Towards a unified 3D animated dictionary for Saudi sign language. 910-917 - Hemantha Kumar Kalluri, Munaga V. N. K. Prasad, Arun Agarwal:
Palmprint identification based on wide principal lines. 918-924 - Sharada Laxman Kore, Shaila D. Apte:
The current state of art: handwriting a behavioral biometric for person identification and verification. 925-930 - Sharafudeen Mohammed Anzar, P. S. Sathidevi:
Multi-normalization: a new method for improving biometric fusion. 931-937 - Nitin Kumar, Ajay Jaiswal, Ramesh K. Agrawal:
Performance evaluation of subspace methods to tackle small sample size problem in face recognition. 938-944
Work-in-progress
- Arockia Anand Raj, T. Mala:
Cloudpress 2.0: a next generation news retrieval system on the cloud with a built-in summarizer. 945-951 - Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Volker Fusenig, Peter Schoo:
N-ary tree based key distribution in a network as a service provisioning model. 952-960 - Ujwala Manoj Patil, Jayantrao Bhaurao Patil:
Web data mining trends and techniques. 961-965 - Lakhwinder Kumar, Hardeep Singh, Ramandeep Kaur:
Web analytics and metrics: a survey. 966-971 - Arlete Teresinha Beuren, Rodrigo Janasieivicz, Gomes Pinheiro, Neusa Grando, Jacques Facon:
Skin melanoma segmentation by morphological approach. 972-978 - Manisha Arora, Dinesh Tagra:
Neuro-fuzzy expert system for breast cancer diagnosis. 979-985 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Capacity planning of telemedicine network through molecular assembly. 986-989 - Susant Kumar Jena, Cuachy Pradhan, N. M. Elango, N. Pradhan:
Use of higher order spectrum in characterizing nonlinear interactions in human brain signals. 990-996 - Shomona Gracia Jacob, R. Geetha Ramani:
Mining of classification patterns in clinical data through data mining algorithms. 997-1003 - Lipismita Panigrahi, Ruchi Ranjan, Kaberi Das, Debahuti Mishra:
Removal and interpolation of missing values using wavelet neural network for heterogeneous data sets. 1004-1009 - Vamshi Krishna Konishetty, K. Arun Kumar, Kaladhar Voruganti, G. V. Prabhakara Rao:
Implementation and evaluation of scalable data structure over HBase. 1010-1018 - Bhupathiraju V. S. Ramakrishnam Raju, Vatsavayi Valli Kumari:
Parameter-lite clustering algorithm based on MST and fuzzy similarity merging. 1019-1026 - Godfrey Winster Sathianesan, Swamynathan Sankaranarayanan:
Hierarchically clustered technical blogs. 1027-1033 - Sunita B. Aher, Louis Lobo:
Applicability of data mining algorithms for recommendation system in e-learning. 1034-1040 - Pardeep Kumar, Nitin, Durg Singh Chauhan, Vivek Kumar Sehgal:
Selection of evolutionary approach based hybrid data mining algorithms for decision support systems and business intelligence. 1041-1046 - R. Priscilla, S. Swamynathan:
Efficient two dimensional clustering of microarray gene expression data by means of hybrid similarity measure. 1047-1053 - G. V. Nadiammai, M. Hemalatha:
An evaluation of clustering technique over intrusion detection system. 1054-1060 - G. LakshmiPriya, Shanmugasundaram Hariharan:
An efficient approach for generating frequent patterns without candidate generation. 1061-1067 - Mayana Humera Khanam, Palli Suryachandra, Kv Madhumurthy:
Experiments on POS tagging and data driven dependency parsing for Telugu language. 1068-1073 - G. Keerthi Prasad, Imran Khan, Naveen Chanukotimath:
On-line Hindi handwritten character recognition for mobile devices. 1074-1078 - K. Saruladha, Gnanasekaran Aghila, B. Sathiya:
Neighbour based structural proximity measures for ontology matching systems. 1079-1085 - Raja Sunkara, Aditya Achanta, Vatsavayi Valli Kumari, K. V. S. V. N. Raju:
SenSim: sentence similarity based on the concept of relevance. 1086-1092 - Jayaraj Jayabharathy, Selvadurai Kanmani, N. Sivaranjani:
Correlation based multi-document summarization for scientific articles and news group. 1093-1099 - Imran Ahmed Khan, Danish Sheikh, Mirza Tariq Beg:
Analysis of double edge triggered clocked storage elements. 1100-1103 - Usha Bhanu Nageswaran, A. Chilambuchelvan:
High speed VLSI implementation of lifting based DWT. 1104-1110 - S. Balamurugan, Balakumaran Srirangaswamy, R. Marimuthu, Partha Sharathi Mallick:
FPGA design and implementation of truncated multipliers using bypassing technique. 1111-1117 - Saambhavi Baskaran, Pachamuthu Rajalakshmi:
Hardware-software co-design of AES on FPGA. 1118-1122 - Nithyanandam Pandian, Ravichandran Thangavel:
A hybrid embedded steganography technique: optimum pixel method and matrix embedding. 1123-1130 - Shyamalendu Kandar, Nabarun Das, Subhabrata Barman:
Symmetric key based blocked oriented digital enveloping. 1131-1135 - N. Sasirekha, M. Hemalatha:
An improved secure code encryption approach based on indexed table. 1136-1142 - R. Thalapathi Rajasekaran, V. Manjula, V. Kishore, T. M. Sridhar, C. Jayakumar:
An efficient and secure key agreement scheme using physiological signals in body area networks. 1143-1147 - S. Deepan Chakravarthy, P. Infant Kingsly, Mahendran Sadhasivam, C. Jayakumar:
Multi-modal biometric approach to enable high security in mobile adhoc network. 1148-1154 - Chandan Maity, Chaitanya Garg, Ashutosh Gupta:
Ultra low power device to track environmental sensitive items in transit. 1155-1162 - Abishek Thekkeyil Kunnath, Preeja Pradeep, Maneesha Vinodini Ramesh:
Locating and monitoring emergency responder using a wearable device. 1163-1168 - Shitala Prasad, Abhay Prakash, Sateesh Kumar Peddoju, Debashis Ghosh:
Control of computer process using image processing and computer vision for low-processing devices. 1169-1174 - M. Hemalatha, R. Revathi:
Efficient method for noise removal techniques and video object segmentation using color based fuzzy c means. 1175-1181 - Hossam Meshref, Isbudeen Noor Mohamed:
Intelligent tutoring systems: a new proposed structure. 1182-1186 - Jaya Sudha Natarajan, Lakshmi Sevukamoorthy:
Auto-clever fuzzy (ACF) based intelligent system for monitoring and controlling the hydrocarbons -air toxics emitted by the vehicle motors. 1187-1192 - K. Sathiyamurthy, T. V. Geetha, M. Senthilvelan:
An approach towards dynamic assembling of learning objects. 1193-1198 - Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
n-Gram modeling of relevant features for lip-reading. 1199-1204 - Porselvi Soundararajan, Vidhyacharan Bhaskar:
Upper and lower bound analysis of the OFDM system impaired by CFO over slow fading channels. 1205-1209 - Yogesh Bhomia, Ashvini Chaturvedi, Yogesh Kumar Sharma:
Microstrip patch antenna combining crown and Sierpinski fractal-shapes. 1210-1213 - Mohamed Chakroun, Ali Wali, Adel M. Alimi:
A new multi-agent system for video objects segmentation and tracking based on spatio-temporal descriptor. 1214-1218 - Anusuya Venkatesan, Latha Parthiban:
Medical image thresholding using WQPSO and maximum entropy. 1219-1224 - Sendhilkumar Selvaraju, G. S. Mahalakshmi, Dilip S. Sam:
Enhancement of co-authorship networks with content-similarity information. 1225-1228 - Sumanta Hati, Santi P. Maity:
Block PIC technique for synchronous CI/MC-CDMA system using neural network. 1229-1235 - Shafali Agarwal, Ashish Negi:
Fixed point results of transcendental superior antifractals. 1244-1248 - Vani Rajamanickam, Sangeetha Marikkannan:
Performance evaluation of motion estimation in H.264/AVC encoder. 1249-1253 - B. Meenakshi, P. Anandhakumar:
Lifetime extension of wireless sensor network by selecting two cluster heads and hierarchical routing. 1254-1260 - Dhanya Sudarsan, G. Jisha:
A survey on various improvements of hybrid zone routing protocol in MANET. 1261-1265 - Ameenudeen Pe, A. V. Babu:
Performance evaluation of regular cycle non-binary LDPC codes in AWGN channel. 1266-1270 - A. Pravin Renold, R. Parthasarathy:
Source based trusted AODV routing protocol for mobile ad hoc networks. 1271-1275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.