default search action
CCSEIT 2012: Coimbatore, India
- Natarajan Meghanathan, Michal Wozniak:
The Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT '12, Coimbatore, India, October 26-28, 2012. ACM 2012, ISBN 978-1-4503-1310-0 - Sundarapandian Vaidyanathan:
Global chaos synchronization of Arneodo chaotic system via backstepping controller design. 1-6 - Jestin Joy, Anita John:
Host based attack detection using system calls. 7-11 - Ali Adeli, Mehrnoosh Sinaee, M. Javad Zomorodian, Mehdi Neshat:
Harmony-based feature selection to improve the nearest neighbor classification. 12-18 - Meena Sharma, Rajeev G. Vishwakarma:
CMMI based software metrics to evaluate OOAD. 19-25 - Mansaf Alam:
Cloud algebra for cloud database management system. 26-29 - Anna Saro Vijendran, G. Paramasivam:
Fusion of gray scale images using Self Organizing Feature Maps. 30-36 - S. Jeyanthi, N. Uma Maheswari, R. Venkatesh:
Implementation of biometrics based security system with integrated techniques. 37-42 - G. Harish, G. Punith Kumar, Anjan K. Koundinya, Y. V. Pramod, N. K. Srinath, G. E. Raghavendra Kumar, R. Sandeep, Archit Shukla, Madan Acharya:
Parallelization of Pollard's Rho Integer factorization algorithm. 43-46 - A. S. Aneetha, T. S. Indhu, S. Bose:
Hybrid network intrusion detection system using expert rule based approach. 47-51 - Arifa Azeez, K. G. Preetha:
A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution. 52-56 - Niraj Kumar Singh, Soubhik Chakraborty:
A statistical approach to the relative performance analysis of sorting algorithms. 57-62 - Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee:
Secure Multipoint Relay based Routing in MANET. 63-68 - Priyakshi Mahanta, Hasin Afzal Ahmed, Jugal K. Kalita, Dhruba Kumar Bhattacharyya:
Discretization in gene expression data analysis: a selected survey. 69-75 - T. Thomas, Y. V. B. Reddy, A. M. Prasad, K. Veeraswamy:
Low profile printed antenna array for LTE/WWAN with low SAR. 76-80 - Tahleen A. Rahman, D. K. Bhattacharyya:
Network module extraction with positive and negative co-regulation. 81-87 - Davis John, M. S. Rajasree:
A framework for the description, discovery and composition of RESTful semantic web services. 88-93 - Soumen Kanrar:
Enhancement of job allocation in private Cloud by distributed processing. 94-98 - Irene Antony Tharayil, M. S. Rajasree:
A framework for response-awaiting-service migration in Ubiquitous Computing. 99-104 - Sonali Patel, Anupam Shukla, Ritu Tiwari:
Efficient strategy for co-ordinated multirobot exploration. 105-111 - Martin Roderus, Alexei V. Matveev, Hans-Joachim Bungartz:
A high-level Fortran interface to parallel matrix algebra. 112-119 - S. Geetha, G. Geetha Ramani:
Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory. 120-125 - P. Salini, S. Kanmani:
Elicitation of Security requirements for E-Health system by applying Model Oriented Security Requirements Engineering (MOSRE) Framework. 126-131 - N. Valliammal, S. N. Geethalakshmi:
Efficient feature fusion, selection and classification technique for Plant Leaf Image Retrieval system. 132-137 - Abbas Mohammed, Roshan Kavuri, Niraj Upadhayaya:
Fault tolerance: case study. 138-144 - Ujan Mukhopadhyay, Souptik Sinha, Poulomi Ghosh, Rilok Ghosh, Dipak Kumar Kole, Aruna Chakraborty:
Enhancing the security of digital Video Watermarking using watermark encryption. 145-150 - K. G. Subramanian, S. Hemalatha, Ibrahim Venkat:
On Watson-Crick automata. 151-156 - Ritambhra Korpal:
Efficient content-based indexing of sequential data with bitmaps. 157-164 - B. K. Tripathy, Sasanko Sekhar Gantayat:
Some new properties of lists and a framework of a list theoretic relation model. 165-170 - Monika Jena, Ajay Rana:
Exploring routing with multiple Quality of Service parameters in High-Speed Networks. 171-174 - Chinniah Porkodi, Muthusamy Nagarathnam, Ramalingam Arumuganathan:
A special purpose integer factorization algorithm. 175-181 - S. Thirumurugan, E. George Dharma Prakash Raj:
W-PAC: an efficient weighted partitioning around cluster head mechanism for ad hoc network. 182-188 - Ayesha Banu, Syeda Sameen Fatima, Khaleel Ur Rahman Khan:
A re-usability approach to ontology construction. 189-193 - Hirak Jyoti Kashyap, D. K. Bhattacharyya:
A DDoS attack detection mechanism based on protocol specific traffic features. 194-200 - M. Shobana, R. Saranyadevi, S. Karthik:
Geographic routing used in MANET for black hole detection. 201-204 - R. Uma, P. Dhavachelvan:
Finite state machine optimization in FPGAs. 205-211 - J. I. Sheeba, K. Vivekanandan:
Low frequency keyword and keyphrase extraction from meeting transcripts with sentiment classification using unsupervised framework. 212-216 - Sangeeta Gupta, Sujoy Bhattacharya, S. Hemanth Chowdary:
An MRA based image fusion method for sanctuary based on NC. 217-222 - S. Hemalatha, U. Dinesh Acharya, A. Renuka, Priya R. Kamath:
A novel colorImage steganography using Discrete Wavelet Transform. 223-226 - V. Radha, C. Vimala, M. Krishnaveni:
Continuous Speech Recognition system for Tamil language using monophone-based Hidden Markov Model. 227-231 - R. Vijayabhanu, V. Radha:
Statistical Normalization techniques for the prediction of COD level for an anaerobic wastewater treatment plant. 232-236 - R. Uma, P. Dhavachelvan:
Performance enhancement for variable block optimization in FGPA synthesis process. 237-243 - Karuppana Gounder Somasundaram, T. Genish:
Binarization in Magnetic Resonance Images (MRI) of human head scans with intensity inhomogeneity. 244-247 - Anna Saro Vijendran, S. Thavamani:
Survey of caching and replica placement algorithm for content distribution in Peer to Peer overlay networks. 248-252 - G. Geetha:
Detecting epileptic seizures using Electroencephalogram: a novel technique for seizure classification using Fast Walsh-Hadamard Transform and Hybrid Extreme Learning Machine. 253-260 - Aruchamy Rajini, Vasantha Kalyani David:
Swarm optimization and Flexible Neural Tree for microarray data classification. 261-268 - K. Reddy Madhavi, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju, C. N. Rau:
Graphical method to find optimal cluster centroid for two-variable linear functions of concept-drift categorical data. 269-274 - P. Senthil Vadivu, Vasantha Kalyani David:
Optimized feature extraction and actionable knowledge discovery for Customer Relationship Management (CRM). 275-282 - Ramya Rayacherlu Sambasadasiva Reddy, S. Priyadarshini, S. Karthik:
An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm. 283-287 - S. Deepa, V. Subbiah Bharathi:
An efficient digital mammogram image classification using DTCWT and SVM. 288-293 - K. R. Sarath Chandran, S. Aiswarya, R. Kavitha, T. Suganthi Krishnavathi:
Agent based memory management framework for a multi processor environment. 294-300 - P. Ramesh, D. Maheswari:
Survey of cyber crime activities and preventive measures. 301-305 - Karuppana Gounder Somasundaram, K. Ezhilarasan:
Automatic brain portion segmentation from T1 and T2-weighted coronal MRI of head scans using Bond Number and Block Truncation method. 306-310 - B. S. Harish, S. Manjunath, Devanur S. Guru:
Text classification using symbolic similarity measure. 311-314 - M. Thirumaran, P. Dhavachelvan, D. Aishwarya:
Business workflow growth rate analysis using cellular automata. 315-321 - R. Uma, P. Dhavachelvan:
Synthesis optimization by redesigning FPGA architecture for area-speed optimization. 322-327 - T. Santhanam, C. P. Sumathi, S. Gomathi:
A survey of techniques for human detection in static images. 328-336 - Manoj Kumar:
Design of 9-transistor single bit full adder. 337-340 - K. M. George:
An application of PCA to rank problem parts. 341-345 - M. Prema Kumar, P. Rajesh Kumar:
Image fusion using Bi-dimensional Empirical Mode Decomposition for salt and pepper noise removal in digital images. 346-351 - Aditya Sinha, Ajay Ry, Sanjay Singh:
Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV. 352-357 - Saman Shahid, Anup Nandy, Soumik Mondal, Maksud Ahamad, Pavan Chakraborty, Gora Chand Nandi:
A study on human gait analysis. 358-364 - Manu S. Hegde, H. K. Jnanamurthy, Sanjay Singh:
Formal verification of the Extensible Authentication Protocol using SPIN. 365-371 - Sangita Roy, Jyotirmayee Parida, Avinash Kumar Singh, Ashok Singh Sairam:
Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization. 372-376 - M. Sujithra, G. Padmavathi:
Next generation biometric security system: an approach for mobile device security. 377-381 - Mohd Abdul Hameed, Ramachandram Sirandas, Omar Al Jadaan:
Information Gain Clustering through Prototype-Embedded Genetic K-Mean Algorithm (IGCPGKA): a novel heuristic approach for personalisation of cold start problem. 390-395 - Ganesh Reddy Karri, P. Santhi Thilagam, Bommena Nageswara Rao:
Cross-layer IDS for Rushing attack in Wireless Mesh Networks. 396-400 - A. A. Abd El-Aziz, Arputharaj Kannan:
Storing XML rules in relational storage of XML DTD. 408-412 - Arpita Chakraborty, Arnab Raha, Shovan Maity, Mrinal Kanti Naskar, Anupam Karmakar:
A fuzzy based trustworthy route selection method using LSRP in wireless sensor networks (FTRSP). 413-419 - K. Selvi, R. M. Suresh:
Context similarity measure using Fuzzy Formal Concept Analysis. 420-426 - J. Harikiran, M. Phanendra, N. N. Swamy, P. V. Lakshmi, R. Kiran Kumar:
K-Means with Bi-dimensional Empirical Mode Decomposition for segmentation of microarray image. 427-433 - Randle Oluwarotimi Abayomi:
An efficient hybrid algorithm to evolve an Awale player. 434-438 - Sanjit Kumar Dash, Debi Prasad Mishra, Ranjita Mishra, Sweta Dash:
Privacy preserving K-Medoids clustering: an approach towards securing data in Mobile cloud architecture. 439-443 - N. Sasirekha, M. Hemalatha:
An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection. 444-451 - S. Murali, Govindraj B. Chittapur, H. S. Prabhakara:
Format based photo forgery image detection. 452-457 - Pinaki Bhaskar, Bidhan Chandra Pal, Sivaji Bandyopadhyay:
Comparative & Evaluative QA system in tourism domain. 458-465 - Ayesha Ameen, Khaleel Ur Rahman Khan, B. Padmaja Rani:
Ontological student profile. 466-471 - Sanjiban Sekhar Roy, Anupam Gupta, Anvesha Sinha, Rohit Ramesh:
Cancer data investigation using variable precision Rough set with flexible classification. 472-475 - K. Thanigaivelu, K. Murugan:
K-level based transmission range scheme to alleviate energy hole problem in WSN. 476-483 - S. Pramod, O. P. Vyas:
Recent frequent itemsets mining over data streams. 484-489 - N. Rajasekhar Reddy, Surya Bahadur, K. R. K. Sateesh:
Risk chain prediction metrics for predicting fault proneness in object oriented systems. 490-496 - T. I. Manish, D. Murugan, T. Ganesh Kumar:
Edge detection by combined canny filter with scale multiplication & ant colony optimization. 497-500 - S. Anitha, V. Radha:
Performance of detecting defects in textile fabric using Gabor Wavelet with statistical and Morphological filters. 501-504 - M. Naresh Babu, R. Bhramaramba, Allam Appa Rao:
Structure based drug design studies on urokinase plasminogen activator inhibitors using AutoDock. 505-507 - Sai Bharath Kadati, K. Khaja Baseer, A. Rama Mohan Reddy, Shoba Bindu Chigarepalli:
A M2MC based approach for mapping two ADL models. 508-516 - S. Gokul, G. Santhosh Kumar, M. Sreeraj:
Real time recognition of pedestrian and vehicles from videos. 517-523 - Arvinder Kaur, Samridhi Gulati, Sarita Singh:
A comparative study of two formal specification languages: Z-notation & B-method. 524-531 - A. Uzma Jabrooth, B. Parvathavarthini:
Polymorphic worms detection using Extended PolyTree. 532-538 - R. Revathi, M. Hemalatha:
Efficient method for feature extraction on video preocessing. 539-543 - Pooja Sapra, Suresh Kumar, R. K. Rathy:
Performance analysis of decomposition techniques in multilevel secure relational database systems. 544-549 - Avinash Kumar Singh, Gora Chand Nandi:
Face recognition using facial symmetry. 550-554 - Asit Kumar Das, Soumen Kumar Pati, Saikat Chakrabarty:
Reduct generation of microarray dataset using rough set and graph theory for unsupervised learning. 555-561 - Sangram Ray, G. P. Biswas:
An ECC based public key infrastructure usable for mobile applications. 562-568 - M. Sornam, P. Thangavel:
Complex-valued neural network using simultaneous perturbation with dynamic tunneling technique. 569-574 - Tanmay Bhattacharya, Sirshendu Hore, Nilanjan Dey, S. R. Bhadra Chaudhuri:
Stationary wavelet transform based audio authentication technique. 575-579 - Trisiladevi C. Nagavi, Nagappa U. Bhajantri:
Perceptive analysis of query by singing system through query excerption. 580-586 - B. S. Harish, Ramya M. Hegde, N. Neeti, M. Meghana:
An empirical study on various text classifiers. 587-593 - P. Mahesha, D. S. Vinod:
Feature based classification of dysfluent and normal speech. 594-597 - Bishas Kaur, Aarpit Saxena, Sanjay Singh:
Web opinion mining for social networking sites. 598-605 - Suneetha Manne, Syeda Sameen Fatima:
An extensive empirical study of feature terms selection for text summarization and categorization. 606-613 - Kalpana Johari, Arvinder Kaur:
Interoperability issues in Web Services. 614-619 - Vikram Kumar Santhalia, Sanjay Singh:
Design and development of a desktop monitoring system. 620-625 - A. Anny Leema, M. Hemalatha:
A new deferred cleansing technique for effective warehousing of RFID. 626-631 - Abdelkader Guerid, Amrane Houacine:
A new approach of voice conversion based on the GMM model. 632-636 - K. Praveen, Prabaharan Poornachandran, A. S. Remya Ajai:
Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images. 637-641 - T. Dinesh, V. Jayan, V. K. Bhadran:
Word category disambiguation for malayalam: a language model approach. 642-646 - Renu Dalal, Manju Khari, Yudhvir Singh:
Authenticity check to provide trusted platform in MANET (ACTP). 647-655 - Soumya Antony, Simy Antony, A. S. Ajeena Beegom, M. S. Rajasree:
HTB based packet scheduler for cloud computing. 656-660 - Amritha Sampath, C. Tripti, V. Govindaru:
Online handwritten character recognition for Malayalam. 661-664 - Rupali Vij, Suresh Kumar:
Improved k- means clustering algorithm for two dimensional data. 665-670 - V. Lokeswara Reddy, A. Subramanyam, P. Chenna Reddy:
Implementation of Least Significant Bit Steganography and statistical steganalysis. 671-675 - Anshul Sood, Monish Kaul, Rajesh Siddavatam:
Fast novel image reconstruction Algorithm using Adaptive R-tree based segmentation and Linear Bivariate Splines. 676-682 - N. Nalla Anandakumar, S. Dillibabu:
Correlation power analysis attack of AES on FPGA using customized communication protocol. 683-688 - Gaurav Aggarwal, Gaurav Kumar, Divyashikha Sethia:
Dynamic Prefix Caching of videos with Lazy Update. 689-693 - Inderpreet Kaur, Arvinder Kaur:
Empirical study of Software Quality estimation. 694-700 - Gaurav Bhatia, Vivek Kumar:
A cross layer based reliable route metric for Mobile Ad hoc Networks. 701-705 - Kamaljit Kaur, Gaurav Raj:
Comparative analysis of Black Hole attack over Cloud Network using AODV and DSDV. 706-710 - Yingchi Mao:
Delay-bounded utility-based event detection in energy harvesting sensor networks. 711-716 - Balu Ramu, Devi Thirupathi:
A new methodology for diagnosis of appendicitis using sonographic images in image mining. 717-721 - Rishabh Kulshreshtha, Ayushi Kamboj, Sanjay Singh:
Decoding robustness performance comparison for QR and data matrix code. 722-731 - Natarajan Meghanathan:
Virtualization of virtual memory address space. 732-737 - Aman Jatain, Deepti Gaur:
Estimation of component reusability by identifying quality attributes of component: a fuzzy approach. 738-742 - Kota Solomon Raju, Y. Pratap, Virendra Patel, S. M. M. Naidu, Amit Patwardhan, P. Bhanu Prasad:
GPS signal generation for L1 frequency using model based design tools. 743-748 - Kalavathi Alla, G. Gowri Shankar, G. Bala Subrahmanyam:
Secure transmission of authenticated messages using new encoding scheme and Steganography. 749-752 - Leila Yousefi:
A fair spectrum sharing approach in Cognitive Radio Networks. 753-759 - Alka Aman, Rajeev G. Vishwakarma:
Secure message authentication using true random number generator based on Signcryption scheme using ECC. 760-765 - Brajesh Kumar, Anand Rajavat:
Secure image authentication by distibuted source coding using LDPC encoding. 766-769 - Kartik Sharma, Gianetan Singh Sekhon:
Design and development of an effective ball catching robotic arm with 3DOF. 770-777 - Mohd Mahmood Ali, Mohd S. Qaseem, Lakshmi Rajamani, A. Govardhan:
Improved decision tree induction: Prioritized Height Balanced tree with entropy to find hidden rules. 778-784
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.