


default search action
ICT 2010: Kochi, Kerala, India
- Vinu V. Das

, R. Vijayakumar, K. G. Srinivasa, Hatim A. Aboalsamh, Mohammad Hammoudeh, Vahid Salmani, Dinesh Kumar Tyagi, Anjali Mohapatra, Bharatheesh Jaysimha, Eliathamby Ambikairajah, Jonathan M. Blackledge:
Information and Communication Technologies - International Conference, ICT 2010, Kochi, Kerala, India, September 7-9, 2010. Proceedings. Communications in Computer and Information Science 101, Springer 2010, ISBN 978-3-642-15765-3
Part 1 / Full Paper
- Rajat Sheel Jain, Neeraj Kumar

, Brijesh Kumar
:
Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant). 1-7 - Manash Pratim Sarma

, Kandarpa Kumar Sarma:
Speech Recognition of Assamese Numerals Using Combinations of LPC - Features and Heterogenous ANNs. 8-12 - K. Dhanumjaya, G. Kiran Kumar, M. N. Giriprasad, M. Raja Reddy:

Design and Modeling of Power Efficient, High Performance 32-bit ALU through Advanced HDL Synthesis. 13-21 - Prasenjit Choudhury

, Rajasekhar Gaddam, Rajesh Babu Parisi, Manohar Babu Dasari, Satyanarayana Vuppala:
A New Multi-language Encryption Technique for MANET. 22-28 - A. Mona Subramaniam, A. Manju

, Madhav J. Nigam:
Bi-variate Polynomial Approximation of Fuzzy Controller Using Genetic Algorithm for Trajectory Control of PUMA560. 29-35 - K. Ramani, E. V. Prasad, S. Varadarajan

:
Protecting Digital Images Using DTCWT-DCT. 36-44 - Silpakesav Velagaleti

, Pavankumar Gorpuni, K. K. Mahapatra:
A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offset. 45-49 - Ankita Tijare, Pravin Dakhole

:
VLSI Design of Four Quadrant Analog Voltage-Mode Multiplier and Its Application. 50-54 - S. Karthik, V. P. Arunachalam

, T. Ravichandran, M. L. Valarmathi
:
An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategies. 55-61 - Mala S. Kumar, K. L. Lainu, V. Aghila, Dhanya Purushothaman, K. Varun Gopal, P. K. Krishnan Namboori, Vrinda Harishankar:

Designing a Promotor for a Novel Target Site Identified in Caspases for Initiating Apoptosis in Cancer Cells. 62-67 - Suraiya Jabin

:
Learning Classifier Systems Approach for Automated Discovery of Hierarchical Censored Production Rules. 68-77 - S. S. Sujatha, M. Mohamed Sathik:

Feature Based Watermarking Algorithm by Adopting Arnold Transform. 78-82 - Rio G. L. D'Souza, K. Chandrasekaran, A. Kandasamy:

Inference of Gene Networks from Microarray Data through a Phenomic Approach. 83-89 - V. V. R. Maheswara Rao, V. Valli Kumari

:
A Novel Lattice Based Research Frame Work for Identifying Web User's Behavior with Web Usage Mining. 90-99 - Vydeki Dharmar

, K. Jayanthy:
Design and Analysis of Specification Based Ids for Wireless Networks Using Soft Computing. 100-107 - Lokanadham Naidu Vadlamudi, K. Ramani, D. Ganesh, Sk. Munwar, P. Basha:

A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme. 108-115 - I. Shatheesh Sam, P. Devaraj, Raghuvel S. Bhuvaneswaran:

Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map. 116-123 - Atul Kant Kaushik, Emmanuel S. Pilli

, Ramesh C. Joshi:
Network Forensic Analysis by Correlation of Attacks with Network Attributes. 124-128 - Deepali Virmani

, Satbir Jain:
Robust and Real Time Data Delivery in Wireless Sensor Networks. 129-135 - Sameer Singh Chauhan

, Ramesh Chandra Joshi:
Multiple QoS Guided Heuristic for Independent Task Scheduling in Grid. 136-141 - Emmanuel S. Pilli

, Ramesh C. Joshi, Rajdeep Niyogi:
A Framework for Network Forensic Analysis. 142-147 - Sarangthem Ibotombi Singh, Smriti Kumar Sinha:

A New Trust Model Based on Time Series Prediction and Markov Model. 148-156 - Ashutosh K. Dubey

, Shishir K. Shandilya
:
A Novel J2ME Service for Mining Incremental Patterns in Mobile Computing. 157-164 - A. P. Sarath Chandar, S. Arun Balaji, G. Venkatesh, Susan Elias:

CDPN: Communicating Dynamic Petri Net for Adaptive Multimedia Presentation. 165-170 - Utpala Niranjan, R. B. V. Subramanyam, V. Khanaa:

Developing a Web Recommendation System Based on Closed Sequential Patterns. 171-179 - Lokesh Kumar Sharma

, Om Prakash Vyas, Simon Scheider
, Ajaya K. Akasapu:
Nearest Neighbour Classification for Trajectory Data. 180-185 - Sanjeev Rana, Anil Kapil

:
Security-Aware Efficient Route Discovery for DSR in MANET. 186-194 - Manisha Rathi:

Regression Modeling Technique on Data Mining for Prediction of CRM. 195-200 - Debarshi Kumar Sanyal, Sandip Chakraborty

, Matangini Chattopadhyay, Samiran Chattopadhyay
:
Congestion Games in Wireless Channels with Multipacket Reception Capability. 201-205 - V. S. Meenakshi, G. Padmavathi:

Secure and Revocable Multibiometric Templates Using Fuzzy Vault for Fingerprint and Iris. 206-214 - Aminul Islam

, Mohd. Hasan
:
High Speed Cache Design Using Multi-diameter CNFET at 32nm Technology. 215-222 - Rajkumar Rajavel

, Thamarai Selvi Somasundaram, Kannan Govindarajan:
Dynamic Load Balancer Algorithm for the Computational Grid Environment. 223-227 - Mohd. Amir, Durga Toshniwal:

Instance-Based Classification of Streaming Data Using Emerging Patterns. 228-236 - Prasun Banerjee

, Stephan D'Costa, Sukriti Bhattacharya:
Modified Go-Left Balls and Bins Algorithm for Server Load Balancing. 237-242 - Minu M. Das, Manju Bhaskar, T. Chithralekha:

Three Layered Adaptation Model for Context Aware E-Learning. 243-248 - Amarjeet Kaur, Teek Parval Sharma

:
AFDEP: Agreement Based CH Failure Detection and Election Protocol for a WSN. 249-257 - Paresh Solanki

, Gaurang Raval
, Srikant Pradhan:
Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks. 258-266 - Dinesh B. Bhoyar

, Bharati Y. Masram
:
Operational Transconductance Amplifier Based Two-Stage Differential Charge Amplifiers. 267-273 - Neha Sharma, Kumar Sambhav Pandey:

Graceful Degradation in Performance of WaveScalar Architecture. 274-280
Part 2 / ICT 2010 - Short Paper
- Manish Khare, Tushar Patnaik, Ashish Khare:

Dual Tree Complex Wavelet Transform Based Video Object Tracking. 281-286 - K. Saruladha, Gnanasekaran Aghila, Sathish Kumar Penchala

:
Design of New Indexing Techniques Based on Ontology for Information Retrieval Systems. 287-291 - K. C. Nalavade

, B. B. Meshram:
Identifying the Attack Source by IP Traceback. 292-296 - Arun Kumar Tripathi

, Ajay Agarwal, Yashpal Singh:
An Approach towards Secure and Multihop Time Synchronization in Wireless Sensor Network. 297-302 - A. Joy James Prabhu:

Improving Dynamic Difficulty Adjustment to Enhance Player Experience in Games. 303-306 - Tayebeh Mosavi Miangah, Amin Nezarat:

A Novel Method for Cross-Language Retrieval of Chunks Using Monolingual and Bilingual Corpora. 307-312 - Sathya Ramadass, Annamma Abhraham:

Application of Kohonan SOM in Prediction. 313-318 - K. S. Arun

, K. S. Sarath:
Evaluation of the Role of Low Level and High Level Features in Content Based Medical Image Retrieval. 319-325 - Vali Derhami, Mohammad Ali Saadatjoo, Fatemeh Saadatjoo:

A Reinforcement Learning Approach for Price Offer in Supplier Selection Process. 326-329 - N. A. Ashrafi Payaman:

Generation of k-ary and (k, m)-ary Trees in A-order Using z-Sequences. 330-335 - Sanjay N. Talbar

, Satishkumar L. Varma
:
Wavelet and Hadamard Transforms for Image Retrieval Using Color Models. 336-338 - Byomkesh Mandal, Balaram Bhattacharyya:

A Rough Set Integrated Fuzzy C-Means Algorithm for Color Image Segmentation. 339-343 - K. Gopalakrishnan, V. Rhymend Uthariaraj:

Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks. 344-349 - G. Kalpana, M. Punithavalli:

An Energy Efficient Cluster Based Broadcast Protocol for Mobile Ad Hoc Networks. 350-355 - Sadhana Priyadarshini, Debahuti Mishra

:
A Hybridized Graph Mining Approach. 356-361 - Kanchana Rajaram

, S. Usha Kiruthika:
Dynamic Contract Generation and Monitoring for B2B Applications with Composite Services. 362-364 - Subrata Sinha, Smriti Kumar Sinha, Bipul Syam Purkayastha:

Synchronization of Authorization Flow with Work Object Flow in a Document Production Workflow Using XACML and BPEL. 365-370 - Deepali Virmani

, Satbir Jain:
Virtual Nodes for Self Stabilization in Wireless Sensor Networks. 371-375 - Lourembam Lolit Kumar Singh, Bhaskar Gupta, Partha Pratim Sarkar:

Small Square Microstrip Antenna. 376-379 - J. Bagyamani, K. Thangavel, R. Rathipriya

:
Extraction of Optimal Biclusters from Gene Expression Data. 380-383 - Rolly Gupta, Anjana Gosain:

Analysis of Data Warehouse Quality Metrics Using LR. 384-388 - N. Chenthalir Indra, E. RamaRaj:

Similar - Dissimilar Victor Measure Analysis to Improve Image Knowledge Discovery Capacity of SOM. 389-393 - Parvin Eftekhari, Hamid Shokrzadeh

, Abolfazl Toroghi Haghighat:
Cluster-Base Directional Rumor Routing Protocol in Wireless Sensor Network. 394-399 - Sugam Sharma, Shashi K. Gadia, S. B. Goyal:

On the Calculation of Coldness in Iowa, a North Central Region, United States: A Summary on XML Based Scheme. 400-405 - C. Dharma Raj, G. Sasibhushana Rao, P. V. Y. Jayasree, B. Srinu, P. Lakshman:

Development of a Three Layer Laminate for Better Electromagnetic Compatibility Performance at X-Band. 406-410 - A. Femina Abdulkader, Ajit Joseph:

Pre-Confirmation Neural Network for Reducing the Region of Interest in an Image for Face Detection. 411-416 - K. Sarangam, Hameed Zohaib Samad:

Low Voltage Low Power Op Amp with Gain Boosting and Frequency Compensation Technique for Battery Powered Applications. 417-422 - Soumen Kanrar

, Aroop Mukherjee
:
Performance of Clustering in Mobile Domain. 423-429 - G. Sai Kiranmai, K. Mallika, M. Anand Kumar

, V. Dhanalakshmi
, K. P. Soman
:
Morphological Analyzer for Telugu Using Support Vector Machine. 430-433 - Subbu Ramanathan, Haresh Suresh, Amog Rajenderan, Susan Elias:

Visualization of State Transition Systems in a Parallel Environment. 434-436 - S. K. Jayanthi, S. Prema:

Facilitating Efficient Integrated Semantic Web Search with Visualization and Data Mining Techniques. 437-442 - Biplab Banerjee, Tanusree Bhattacharjee, Nirmalya Chowdhury

:
Image Object Classification Using Scale Invariant Feature Transform Descriptor with Support Vector Machine Classifier with Histogram Intersection Kernel. 443-448 - P. Esther Rani

, R. Shanmuga Lakshmi:
Palmprint Recognition System Using Zernike Moments Feature Extraction. 449-454 - A. Boomaranimalany, R. M. Chandrasekaran:

A QOS Framework for Mobile Ad-Hoc in Large Scale Networks. 455-457 - Tanusree Bhattacharjee, Biplab Banerjee, Nirmalya Chowdhury

:
An Interactive Content Based Image Retrieval Method Integrating Intersection Kernel Based Support Vector Machine and Histogram Intersection Based Similarity Measure for Nearest Neighbor Ranking. 458-462
Part 3 / ICT 2010 - Poster Paper
- R. Pugazendi, K. Duraiswamy:

Analysis and Prediction of Blocking Probability in a Banyan Based ATM Switch. 463-468 - M. Pushpavalli, A. M. Natarajan:

Performance Evaluation of QoS Aware Routing in OLSR (Optimized Link State Routing Protocol) Using Genetic Algorithm. 469-474 - M. E. Paramasivam

, R. S. Sabeenian
:
Handloom Silk Fabric Defect Detection Using First Order Statistical Features on a NIOS II Processor. 475-477 - Yogesh Chaba, Yudhvir Singh

, Kanwar Preet Singh, Prabha Rani:
Performance Modeling of MANET Routing Protocols with Multiple Mode Wormhole Attacks. 478-483 - Binu Jacob, K. V. Promod:

Mining a Ubiquitous Time and Attendance Application Schema Using Oracle Data Miner: A Case Study. 484-489 - P. H. S. T. Murthy, L. Madan Mohan, V. Sreenivasa Rao, V. Malleswara Rao:

4T Carry Look Ahead Adder Design Using MIFG. 490-494 - Gaytri Gupta:

Microcontroller Based Monitoring and Control of Greenhouse Enivironment. 495-497 - R. S. Sabeenian

, M. Vidhya:
Hand written Text to Digital Text Conversion using Radon Transform and Back Propagation Network (RTBPN). 498-500 - N. Kaliammal, G. Gurusamy:

Resource Allocation and Multicast Routing Protocol for Optical WDM Networks. 501-503 - Surya Prakash Singh

:
An Approximate Algorithm for Solving Dynamic Facility Layout Problem. 504-509 - C. S. Vasavi, Saptharshi, R. Radhika Devi, Lakshmi Anand, Megha. P. Varma, P. K. Krishnan Namboori:

Homology Modeling and Protein Ligand Interaction to Identify Potential Inhibitor for E1 Protein of Chikungunya. 510-513 - Rajesh Kumar Aggarwal, Mayank Dave

:
Tied Mixture Modeling in Hindi Speech Recognition System. 514-519 - Krishan Gopal Verma, Brajesh Kumar Kaushik

, Raghuvir Singh:
Propagation Delay Variation due to Process Induced Threshold Voltage Variation. 520-524 - Sanjay N. Talbar

, Anil K. Deshmane:
Biomedical Image Coding Using Dual Tree Discrete Wavelet Transform and Iterative Projection. 525-528 - Bettahally N. Keshavamurthy, Mitesh Sharma, Durga Toshniwal:

Privacy-Preserving Naïve Bayes Classification Using Trusted Third Party and Offset Computation over Distributed Databases. 529-534 - Kavita R. Singh, Mukesh A. Zaveri, Mukesh M. Raghuwanshi:

Extraction of Pose Invariant Facial Features. 535-539 - Tanzila Saba

, Ghazali Sulong, Shafry Rahim, Amjad Rehman
:
On the Segmentation of Multiple Touched Cursive Characters: A Heuristic Approach. 540-542 - B. Vanathi

, V. Rhymend Uthariaraj:
Context Representation and Management in a Pervasive Environment. 543-548 - R. Sangeetha, B. Kalpana:

A Comparative Study and Choice of an Appropriate Kernel for Support Vector Machines. 549-553 - J. Harikiran, R. Usha Rani:

Color Image Restoration Method for Gaussian Noise Removal. 554-560 - Akshara Pande

, Manjari Gupta, Anil Kumar Tripathi:
A Decision Tree Approach for Design Patterns Detection by Subgraph Isomorphism. 561-564 - B. Bhuvaneswari

, K. Malathi:
Realisation of Various EBG Structures. 565-570 - Babita Rathore, Sandeep Kumar Kushwaha

, Madhvi Shakya
:
Identification of Melanoma (Skin Cancer) Proteins through Support Vector Machine. 571-575 - Renu Singh, Swanirbhar Majumder

, U. Bhattacharjee, Aheibam Dinamani Singh:
BPNN and Lifting Wavelet Based Image Compression. 576-579 - D. R. Shashi Kumar, R. Ravi Kumar, K. B. Raja, R. K. Chhotaray, Sabyasachi Pattanaik:

Combined Off-Line Signature Verification Using Neural Networks. 580-583 - Mahesh Gadiraju

, V. Valli Kumari
:
Distribution of Continuous Queries over Data Aggregators in Dynamic Data Dissemination Networks. 584-589 - K. V. Krishnam Raju, V. Valli Kumari

, N. Sandeep Varma, K. V. S. V. N. Raju:
Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR. 590-595 - Vijay Kumar

, Dinesh Kumar
:
Digital Image Steganography Based on Combination of DCT and DWT. 596-601 - J. Divya Udayan

, T. Gireesh Kumar
, Roshy M. John, K. J. Poornaselvan, S. A. Lakshmanan:
Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces. 602-605 - P. Kiran Mayee, Rajeev Sangal, Soma Paul:

Neural Networks Based Detection of Purpose Data in Text. 606-609 - Rajneesh Gujral

, Anil Kapil
:
Comparative Performance Analysis of QoS-Aware Routing on DSDV, AODV and DSR Protocols in MANETs. 610-615 - Apeksha V. Sakhare

, Vilas M. Thakare
, Rajiv V. Dharaskar
:
Steering Control of an Automated Vehicle Using Touch Screen with Simulation Result. 616-618 - Samarth Borker, R. B. Lohani:

A Low Cost GPS Based Vehicle Collision Avoidance System. 619-621 - Vijayanandh Rajamanickam, Balakrishnan Ganesan

:
Human Skin Region Identification Using Fusion Technique. 622-625 - Chinnamuthu Annadurai

, D. MuthuKumaran, C. Charithartha Reddy, M. Kanagasabapathy
:
Avoidance of Electromagnetic Interference in Modem with Minimal Bit Error Rate Using Tele Typewriter Signals. 626-631 - (Withdrawn) A State Variables Analysis for Emerging Nanoelectronic Devices. 632-637

- P. P. Amritha, Anoj Madathil, T. Gireesh Kumar

:
Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine. 638-640 - Ahmad Anzaar, Husain Shahnawaz

, Chand Mukesh, S. C. Gupta, R. Gowri:
ASSR Fair Load Distribution Using Efficiency Division Factor with Greedy Booster Approach for MANET. 641-646 - A. Kalai Selvi, M. Mohamed Sathik:

Secret Sharing Scheme for Image Encryption Using new Transformation Matrix. 647-650 - R. Kamalraj

, A. Rajiv Kannan
, P. Ranjani, R. Hemarani:
Measuring the Reusability Level of Software Packages Using Reusability Testing Scripts. 651-653 - Arunarasi Jayaraman, Indumathy Pushpam:

A New Threshold Calculation Approach in the Performance Enhancement of Spread Spectrum System Using Double Density Discrete Wavelet Filter. 654-659 - Ritu Baniwal, Kumar Sambhav Pandey:

Recent Trends in Superscalar Architecture to Exploit More Instruction Level Parallelism. 660-665 - Satyadhyan Chickerur

, M. Aswatha Kumar:
A Neural Network Based Solution to Color Image Restoration Problem. 666-671 - T. Arathi, K. P. Soman

, Latha Parameswaran
:
Spline Biorthogonal Wavelet Design. 672-674 - Sunil Khurana, Sunil Kumar Khatri

:
Securing Password File Using Bezier Curves. 675-680 - Nilesh Shah, Rasika Dhavse, Anand D. Darji:

Reading a 4-Bit SLC NAND Flash Memory in 180nm Technology. 681-685 - Venkateswaran Shanmugapriya

, Ganapathi Padmavathi
:
Keystroke Dynamics Authentication Using Neural Network Approaches. 686-690 - Sanjay Singh

, Srinivasa Murali Dunga, Atanendu S. Mandal, Chandra Shekhar, Anil Vohra:
Moving Object Tracking Using Object Segmentation. 691-694 - Titir Santra:

Mobile Health Care System for Patient Monitoring. 695-700

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














