BAIP 2010: Trivandrum, Kerala
Vinu V. Das, R. Vijayakumar, Narayan C. Debnath, Janahanlal Stephen, Natarajan Meghanathan, Suresh Sankaranarayanan, P. M. Thankachan, Ford Lumban Gaol, Nessy Thankachan (Eds.): Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings. Springer 2010 Communications in Computer and Information Science 70 ISBN 978-3-642-12213-2
Swanirbhar Majumder, Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar: SVD and Neural Network Based Watermarking Scheme. 1-5
Akshi Kumar, M. P. S. Bhatia: Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms. 6-11
Navneet Tiwari, Siddarth Jain, Saifuddin Tariwala, Ankit Salgia: Network Management Initialization for Wired and Wireless Communication: A Real Time Study. 12-16
J. Gnana Jayanthi, S. Albert Rabara: IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network. 17-21
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing: Applications of Graph Theory in Face Biometrics. 28-33
Anil Kumar, M. K. Ghose: Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map. 34-38
Srinivas Sethi, Ashima Rout, Dipti Mohanta, Aayush Behera, Manmath N. Sahoo: Hybrid Activities of AODV for Wireless Ad hoc Sensor Network. 39-44
Shatha J. Kadhim, Kasim M. Al-Aubidy: Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm. 45-52
Prasad Naik Hamsavath, G. V. Singh, Sanjay Kumar Dhurandher: Object Location in Cluster Based Mobile Ad Hoc Networks. 53-59
Alok Joshi, Davinder S. Saini: Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications. 60-64
Davinder S. Saini, Vipin Balyan, Kanika Mittal, Mansi Saini, Manika Kishore: Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks. 65-70
Rajib Kar, Vikas Maheshwari, Md. Maqbool, A. K. Mal, A. K. Bhattacharjee: A Closed Form Slew Evaluation Approach Using Burr's Distribution Function for High Speed On-Chip RC Interconnects. 71-75
K. Srinivasan, M. Ramasubba Reddy: Wavelet-Domain L ∞ -Constrained Two-Stage Near-Lossless EEG Coder. 76-80
Jayashree Mallapur, Syed Abidhusain, Soumya S. Vastrad, Ajayakumar Katageri: Fuzzy Based Bandwidth Management for Wireless Multimedia Networks. 81-90
B. Kavitha, S. Karthikeyan, B. Chitra: Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison. 96-101
Anup Nandy, Jay Shankar Prasad, Soumik Mondal, Pavan Chakraborty, Gora Chand Nandi: Recognition of Isolated Indian Sign Language Gesture in Real Time. 102-107
Megalingam Rajesh Kannan, M. Arunkumar, V. Arjun Ashok, Krishnan Nived, C. J. Daniel: Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors. 108-113
Megalingam Rajesh Kannan, K. B. Deepu, Joseph P. Iype, Ravishankar Parthasarathy, Popuri Gautham: Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor. 114-119
V. Ruckmani, G. Sudha Sadasivam: Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security. 125-129
Deepak Vidhate, Anita Patil, Supriya Sarkar: Bandwidth Estimation Scheme for Mobile Adhoc Network. 130-135
P. Viswanathan, P. Venkata Krishna, S. Hariharan: Multimodal Biometric Invariant Moment Fusion Authentication System. 136-143
Anjali Naik, Shubhangi Vinayak Tikhe, S. D. Bhide: Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography. 144-151
Bikesh Kr. Singh, G. R. Sinha, Imroze Khan: Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images. 152-156
H. B. Kekre, Tanuja K. Sarode, Saylee M. Gharge: Vector Quantization for Tumor Demarcation of Mammograms. 157-163
L. M. Varalakshmi, G. Florence Sudha: Selective Encryption of Video Using Multiple Chaotic Maps. 164-168
Neeta S. Bosamiya, Devesh C. Jinwala: Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks. 169-174
V. V. R. Maheswara Rao, V. Valli Kumari, K. V. S. V. N. Raju: Study of Visitor Behavior by Web Usage Mining. 181-187
N. Sengottaiyan, Rm. Somasundaram, Balasubramanie: A Hybrid Routing Protocol for Wireless Sensor Network. 188-193
D. V. Naga Raju, V. Valli Kumari, K. V. S. V. N. Raju: Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring. 194-201
A. K. Dwivedi, V. K. Patle, O. P. Vyas: Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks. 202-208
N. Jaisankar, R. Saravanan, K. Durai Swamy: A Novel Multipath Routing Scheme in Mobile Adhoc Networks. 209-216
N. Jaisankar, R. Saravanan, K. Durai Swamy: A Novel Security Approach for Detecting Black Hole Attack in MANET. 217-223
Neera Batra, A. K. Kapil: NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database. 224-232
Saroj Kumar Panigrahy, Debasish Jena, Sanjay Kumar Jena: A Secure e-Shopping Using Voice Ordering. 233-237
Manoj Kr. Dutta, Vinod Kumar Chaubey: Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model. 238-244
Janani Arthanari, A. Kannan: A Concurrent Synchronization Model for Distributed Multimedia Systems. 245-249
Rajneesh Gujral, Anil Kapil: Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS. 250-257
Shakti Mishra, Dharmender Singh Kushwaha, Arun Kumar Misra: A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System. 258-262
Divya Mohandass, J. Janet: An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine. 263-268
Abhishek Ray, Debasis Das: Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata. 269-275
Dhaval K. Patel, S. K. Shah, Minesh P. Thaker: Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network. 276-280
Deepali Virmani, Satbir Jain: Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks. 281-289
Mangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan: A Cryptographic Approach to Defend against IP Spoofing. 290-296
C. Valliyammai, S. Thamarai Selvi, R. Satheesh Kumar, E. Pradeep, K. Naveen: Multi-agent Based Network Performance Tuning in Grid. 297-304
Saeed Parsa, Somaye Arabi Naree, Neda Ebrahimi, Mojtaba Vahidi-Asl: Finding Discriminative Weighted Sub-graphs to Identify Software Bugs. 305-309
Manoj V. N. Vadakkepalisseri, K. Chandrashekaran: Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information. 310-319
Balachandra, K. V. Prema: Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures. 320-324
Leena Arya, Sunita Sharma, Millie Pant: Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN. 332-336
Devaraju Suganya Devi, Ganapathi Padmavathi: Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks. 337-341
P. Varalakshmi, M. Nandini, K. Krithika, R. Aarthi: An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid. 342-348
P. Varalakshmi, P. Karthik Narayanan, M. Hariharan, P. Nagaraj, K. Amritha: Reactive Network Monitor for DDoS Attacks. 349-355
P. J. Antony, V. P. Ajith, K. P. Soman: Statistical Method for English to Kannada Transliteration. 356-362
R. B. Patel, Deepika Jain, Bhanu Kaushik: RIFMAS: River Flow Management System Using Wireless Sensing Agents. 363-368
Neha Jain: Finite Element Approach to Radial Heat Flow in Human Dermal Tissues. 369-375
Sajal Mukhopadhyay, Roshan Kumar Singh, D. Ghosh, Jaya Bhattacharjee, Nivedita Mukherjee: An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas. 376-381
M. Selvanayaki, M. S. Vijaya, K. S. Jamuna, S. Karpagavalli: Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA. 382-384
K. Latha, R. Manivelu: Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback. 385-387
K. Sharma Rajiv, S. Dhiman Amardeep: Challenges in Segmentation of Text in Handwritten Gurmukhi Script. 388-392
Bala Dhandayuthapani Veerasamy: Exploring the Contrasts of VoIP Phone Services. 393-395
Shaily Mittal, Prabhjot Kaur: Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET'S. 396-400
Tamanna Siddiqui, Munior Ahmad Wani: Impact Factor of E - Learning: Using Secondary Education Case Study. 401-404
Sanchit Gupta, Himanshu Gahlot, Varun Gupta, Banshi Dhar Chaudhary: Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology. 405-410
Chandrashekar M. Patil, Sudarshan Patilkulkarni: A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System. 411-416
Jagadish H. Pujar, Pallavi S. Gurjal: Binary Data Compression Using Medial Axis Transform Algorithm. 417-419
S. Gunasekaran, K. Revathy: Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition. 424-429
Sanjeev Rana, Anil Kapil: Defending against Node Misbehavior to Discover Secure Route in OLSR. 430-436
Neera Batra, A. K. Kapil: An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System. 442-445
D. S. Guru, B. Vijaya Kumari, S. K. Lathamba: Automatic Incorporation of Corrections into Reviewed Documents. 446-451
Maya Mohan, S. Mary Saira Bhanu: Performance Comparison of Multicast Routing Protocols for MANETs. 452-454
Ravindra Kumar Singh, Kanak Saxena, Reena Singh: Traffic Aware LSP Selection Method in MPLS Networks. 455-457
R. S. Ambili Chandran, S. Mary Saira Bhanu: Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks. 458-460
V. R. Sarma Dhulipala, V. Aarthy, R. M. Chandrasekaran: Energy and Fault Aware Management Framework for Wireless Sensor Network. 461-464
N. Bhalaji, Alok V. Kanakeri, Krishna P. Chaitanya, A. Shanmugam: Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet. 468-474
S. Selvakumar, M. R. C. Dinesh, C. Dhineshkumar, N. Ramaraj: Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns. 475-481
Sahil Seth, Anil Gankotiya, Gurdit Singh, Vishal Kumar, Amit Kumar Jaiswal: Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks. 482-484
Dharamveer Sharma: Separation of Machine Printed Roman and Gurmukhi Script Words. 485-490
Balwinder Singh, Harpreet Kaur, Himanshu Monga: FPGA Implementation of AES Co-processor in Counter Mode. 491-496
Shanmugasundaram Hariharan, Sirajudeen Kamal, Abdul Vadud Mohamed Faisal, Sheik Mohamed Azharudheen, Bhaskaran Raman: Detecting Plagiarism in Text Documents. 497-500
G. Shiva Prasad, N. V. Subba Reddy, U. Dinesh Acharya: Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques. 505-507
Arun Mishra, Bikash Tiwari, J. S. R. Kartik, Arun Kumar Misra: Context-Aware System Using .NET Approach. 508-513
Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo: Genetic Audio Watermarking. 514-517
Keyur N. Upadhyay, Hemant D. Vasava, Viral V. Kapadia: Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure. 518-520
N. Bhalaji, Nandini Sundara Raman: Natural Disaster Impact Assessment Using Genetic Algorithm. 521-526
Chandrashekar M. Patil, Sudarshan Patilkulkarni: An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition. 527-530
A. Kumar, R. K. Chauhan, Rajan Vohra: A Framework for Priority-Based Inter Vehicle Communication for Highway Safety. 531-534
Chirag Modi, Udai Pratap Rao, Dhiren R. Patel: A Survey on Preserving Privacy for Sensitive Association Rules in Databases. 538-544
G. Geetha, V. Ragavi, K. Thamizhchelvy, K. Mariappan, V. Lalitha, S. Shanmuga Priya: Boon and Bane of Curvelet Transform. 545-551
V. R. Sarma Dhulipala, B. Vishnu Prabha, R. M. Chandrasekaran: Trust Worthy Architecture for Mobile Ad Hoc Network Environment. 557-560
V. R. Sarma Dhulipala, K. Kavitha, R. M. Chandrasekaran: A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks. 561-564
Aruna Kumari Devarakonda, Prasamsa Tummala, Indra Praveen Sandrala: Security Solutions to the Phishing: Transactions Based on Security Questions and Image. 565-567
E. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, B. Vijaya Saranya: CloneManager: A Tool for Detection of Type1 and Type2 Code Clones. 568-570
Dharamveer Sharma, Bibanjot Kaur: Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification. 571-576
Kaur Inderjeet: An Analysis to BER Performances of Differential OFDM Systems. 577-581
S. Britto R. Kumar, S. Albert Rabara: MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions. 582-585
N. Jaisankar, S. Veeramalai, A. Kannan: Team Automata Based Framework for Spatio-Temporal RBAC Model. 586-591
Malay Bhatt, Rituraj Jain, C. K. Bhensdadia: Knowledge Discovery in Feedback System Using Pixel Oriented Technique. 592-594
Neeraj Kumar Shukla, Shilpi Birla, Rakesh Kumar Singh: Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level. 595-597
Mamatha Balachandra, K. V. Prema: Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks. 598-600
Sukhwant Kaur, H. K. Kaura, Mritunjay Ojha: Design Issues for Replacing Credit Card on Mobile Phone. 601-604

Santosh Kumar Pani, Priya Arundhati, Mahamaya Mohanty: Refactoring Interprocedural Dynamic Slicing for Handling Pointers. 613-616
Mamta Juneja, Parvinder Singh Sandhu: Image Segmentaion and Steganography for Secured Information Transmission. 617-620
Surya Prakash Singh: Ant System Embedded with Local Search for Solving Facility Layout Problem. 621-628
Asim Gopal Barman, Ranjan Bhattacharya, Sudip Kumar Deb: Strategic Initiatives and Automated Decision Support with ERP System Environment. 629-635
Fumihiko Isada: A Case Study of Strategic Design Management. 636-640
N. Anitha, C. Selvaraj: The Effects of Mannequins on Consumers' Perception and Shopping Attitude. 641-647
Priyanka Verma, R. R. K. Sharma: Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem. 656-659
Ritu Sinha, Chandrashekhar Kaushik: CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment. 660-664
Shweta Maheshwari: HR Roadmap: Becoming a Strategic Business Partner. 665-669
J. S. Kadam, J. J. Nirmal, M. Y. Khire: Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra. 670-673



