


default search action
CCSEIT 2012: Coimbatore, India
- Natarajan Meghanathan, Michal Wozniak:

The Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT '12, Coimbatore, India, October 26-28, 2012. ACM 2012, ISBN 978-1-4503-1310-0 - Sundarapandian Vaidyanathan

:
Global chaos synchronization of Arneodo chaotic system via backstepping controller design. 1-6 - Jestin Joy, Anita John

:
Host based attack detection using system calls. 7-11 - Ali Adeli, Mehrnoosh Sinaee, M. Javad Zomorodian

, Mehdi Neshat
:
Harmony-based feature selection to improve the nearest neighbor classification. 12-18 - Meena Sharma, Rajeev G. Vishwakarma

:
CMMI based software metrics to evaluate OOAD. 19-25 - Mansaf Alam

:
Cloud algebra for cloud database management system. 26-29 - Anna Saro Vijendran, G. Paramasivam:

Fusion of gray scale images using Self Organizing Feature Maps. 30-36 - S. Jeyanthi, N. Uma Maheswari, R. Venkatesh:

Implementation of biometrics based security system with integrated techniques. 37-42 - G. Harish, G. Punith Kumar, Anjan K. Koundinya

, Y. V. Pramod, N. K. Srinath, G. E. Raghavendra Kumar, R. Sandeep, Archit Shukla, Madan Acharya:
Parallelization of Pollard's Rho Integer factorization algorithm. 43-46 - A. S. Aneetha, T. S. Indhu, Bose Sundan

:
Hybrid network intrusion detection system using expert rule based approach. 47-51 - Arifa Azeez, K. G. Preetha:

A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution. 52-56 - Niraj Kumar Singh, Soubhik Chakraborty:

A statistical approach to the relative performance analysis of sorting algorithms. 57-62 - Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee:

Secure Multipoint Relay based Routing in MANET. 63-68 - Priyakshi Mahanta, Hasin Afzal Ahmed, Jugal K. Kalita, Dhruba Kumar Bhattacharyya

:
Discretization in gene expression data analysis: a selected survey. 69-75 - T. Thomas, Y. V. B. Reddy, A. M. Prasad, K. Veeraswamy:

Low profile printed antenna array for LTE/WWAN with low SAR. 76-80 - Tahleen A. Rahman, D. K. Bhattacharyya

:
Network module extraction with positive and negative co-regulation. 81-87 - Davis John, M. S. Rajasree:

A framework for the description, discovery and composition of RESTful semantic web services. 88-93 - Soumen Kanrar

:
Enhancement of job allocation in private Cloud by distributed processing. 94-98 - Irene Antony Tharayil, M. S. Rajasree:

A framework for response-awaiting-service migration in Ubiquitous Computing. 99-104 - Sonali Patel, Anupam Shukla

, Ritu Tiwari
:
Efficient strategy for co-ordinated multirobot exploration. 105-111 - Martin Roderus, Alexei V. Matveev, Hans-Joachim Bungartz:

A high-level Fortran interface to parallel matrix algebra. 112-119 - S. Geetha

, G. Geetha Ramani:
Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory. 120-125 - P. Salini, S. Kanmani:

Elicitation of Security requirements for E-Health system by applying Model Oriented Security Requirements Engineering (MOSRE) Framework. 126-131 - N. Valliammal, S. N. Geethalakshmi

:
Efficient feature fusion, selection and classification technique for Plant Leaf Image Retrieval system. 132-137 - Abbas Mohammed, Roshan Kavuri, Niraj Upadhayaya

:
Fault tolerance: case study. 138-144 - Ujan Mukhopadhyay, Souptik Sinha, Poulomi Ghosh, Rilok Ghosh, Dipak Kumar Kole, Aruna Chakraborty:

Enhancing the security of digital Video Watermarking using watermark encryption. 145-150 - K. G. Subramanian, S. Hemalatha

, Ibrahim Venkat:
On Watson-Crick automata. 151-156 - Ritambhra Korpal:

Efficient content-based indexing of sequential data with bitmaps. 157-164 - B. K. Tripathy

, Sasanko Sekhar Gantayat
:
Some new properties of lists and a framework of a list theoretic relation model. 165-170 - Monika Jena, Ajay Rana

:
Exploring routing with multiple Quality of Service parameters in High-Speed Networks. 171-174 - Chinniah Porkodi, Muthusamy Nagarathnam, Ramalingam Arumuganathan:

A special purpose integer factorization algorithm. 175-181 - S. Thirumurugan

, E. George Dharma Prakash Raj:
W-PAC: an efficient weighted partitioning around cluster head mechanism for ad hoc network. 182-188 - Ayesha Banu

, Syeda Sameen Fatima, Khaleel Ur Rahman Khan
:
A re-usability approach to ontology construction. 189-193 - Hirak Jyoti Kashyap, D. K. Bhattacharyya

:
A DDoS attack detection mechanism based on protocol specific traffic features. 194-200 - M. Shobana, R. Saranyadevi, S. Karthik:

Geographic routing used in MANET for black hole detection. 201-204 - R. Uma, P. Dhavachelvan:

Finite state machine optimization in FPGAs. 205-211 - J. I. Sheeba

, K. Vivekanandan:
Low frequency keyword and keyphrase extraction from meeting transcripts with sentiment classification using unsupervised framework. 212-216 - Sangeeta Gupta

, Sujoy Bhattacharya, S. Hemanth Chowdary:
An MRA based image fusion method for sanctuary based on NC. 217-222 - S. Hemalatha

, U. Dinesh Acharya
, A. Renuka
, Priya R. Kamath
:
A novel colorImage steganography using Discrete Wavelet Transform. 223-226 - V. Radha

, C. Vimala, M. Krishnaveni
:
Continuous Speech Recognition system for Tamil language using monophone-based Hidden Markov Model. 227-231 - R. Vijayabhanu, V. Radha

:
Statistical Normalization techniques for the prediction of COD level for an anaerobic wastewater treatment plant. 232-236 - R. Uma, P. Dhavachelvan:

Performance enhancement for variable block optimization in FGPA synthesis process. 237-243 - Karuppana Gounder Somasundaram

, T. Genish
:
Binarization in Magnetic Resonance Images (MRI) of human head scans with intensity inhomogeneity. 244-247 - Anna Saro Vijendran, S. Thavamani:

Survey of caching and replica placement algorithm for content distribution in Peer to Peer overlay networks. 248-252 - G. Geetha:

Detecting epileptic seizures using Electroencephalogram: a novel technique for seizure classification using Fast Walsh-Hadamard Transform and Hybrid Extreme Learning Machine. 253-260 - Aruchamy Rajini, Vasantha Kalyani David:

Swarm optimization and Flexible Neural Tree for microarray data classification. 261-268 - K. Reddy Madhavi

, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju, C. N. Rau:
Graphical method to find optimal cluster centroid for two-variable linear functions of concept-drift categorical data. 269-274 - P. Senthil Vadivu, Vasantha Kalyani David:

Optimized feature extraction and actionable knowledge discovery for Customer Relationship Management (CRM). 275-282 - Ramya Rayacherlu Sambasadasiva Reddy, S. Priyadarshini, S. Karthik:

An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm. 283-287 - S. Deepa

, V. Subbiah Bharathi
:
An efficient digital mammogram image classification using DTCWT and SVM. 288-293 - K. R. Sarath Chandran, S. Aiswarya, R. Kavitha, T. Suganthi Krishnavathi:

Agent based memory management framework for a multi processor environment. 294-300 - P. Ramesh, D. Maheswari:

Survey of cyber crime activities and preventive measures. 301-305 - Karuppana Gounder Somasundaram

, K. Ezhilarasan
:
Automatic brain portion segmentation from T1 and T2-weighted coronal MRI of head scans using Bond Number and Block Truncation method. 306-310 - B. S. Harish

, S. Manjunath, Devanur S. Guru:
Text classification using symbolic similarity measure. 311-314 - M. Thirumaran, P. Dhavachelvan, D. Aishwarya:

Business workflow growth rate analysis using cellular automata. 315-321 - R. Uma, P. Dhavachelvan:

Synthesis optimization by redesigning FPGA architecture for area-speed optimization. 322-327 - T. Santhanam

, C. P. Sumathi, S. Gomathi:
A survey of techniques for human detection in static images. 328-336 - Manoj Kumar

:
Design of 9-transistor single bit full adder. 337-340 - K. M. George:

An application of PCA to rank problem parts. 341-345 - M. Prema Kumar, P. Rajesh Kumar:

Image fusion using Bi-dimensional Empirical Mode Decomposition for salt and pepper noise removal in digital images. 346-351 - Aditya Sinha

, Ajay Ry, Sanjay Singh
:
Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV. 352-357 - Saman Shahid, Anup Nandy, Soumik Mondal

, Maksud Ahamad, Pavan Chakraborty
, Gora Chand Nandi:
A study on human gait analysis. 358-364 - Manu S. Hegde

, H. K. Jnanamurthy, Sanjay Singh
:
Formal verification of the Extensible Authentication Protocol using SPIN. 365-371 - Sangita Roy

, Jyotirmayee Parida, Avinash Kumar Singh
, Ashok Singh Sairam
:
Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization. 372-376 - M. Sujithra

, G. Padmavathi:
Next generation biometric security system: an approach for mobile device security. 377-381 - Mohd Abdul Hameed, Ramachandram Sirandas

, Omar Al Jadaan
:
Information Gain Clustering through Prototype-Embedded Genetic K-Mean Algorithm (IGCPGKA): a novel heuristic approach for personalisation of cold start problem. 390-395 - Ganesh Reddy Karri

, P. Santhi Thilagam
, Bommena Nageswara Rao:
Cross-layer IDS for Rushing attack in Wireless Mesh Networks. 396-400 - A. A. Abd El-Aziz, Arputharaj Kannan

:
Storing XML rules in relational storage of XML DTD. 408-412 - Arpita Chakraborty, Arnab Raha

, Shovan Maity, Mrinal Kanti Naskar, Anupam Karmakar:
A fuzzy based trustworthy route selection method using LSRP in wireless sensor networks (FTRSP). 413-419 - K. Selvi

, R. M. Suresh:
Context similarity measure using Fuzzy Formal Concept Analysis. 420-426 - J. Harikiran, M. Phanendra, N. N. Swamy, P. V. Lakshmi

, R. Kiran Kumar
:
K-Means with Bi-dimensional Empirical Mode Decomposition for segmentation of microarray image. 427-433 - Randle Oluwarotimi Abayomi:

An efficient hybrid algorithm to evolve an Awale player. 434-438 - Sanjit Kumar Dash

, Debi Prasad Mishra
, Ranjita Mishra, Sweta Dash:
Privacy preserving K-Medoids clustering: an approach towards securing data in Mobile cloud architecture. 439-443 - N. Sasirekha, M. Hemalatha

:
An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection. 444-451 - S. Murali, Govindraj B. Chittapur

, H. S. Prabhakara:
Format based photo forgery image detection. 452-457 - Pinaki Bhaskar, Bidhan Chandra Pal, Sivaji Bandyopadhyay:

Comparative & Evaluative QA system in tourism domain. 458-465 - Ayesha Ameen

, Khaleel Ur Rahman Khan
, B. Padmaja Rani:
Ontological student profile. 466-471 - Sanjiban Sekhar Roy

, Anupam Gupta, Anvesha Sinha, Rohit Ramesh:
Cancer data investigation using variable precision Rough set with flexible classification. 472-475 - K. Thanigaivelu, K. Murugan:

K-level based transmission range scheme to alleviate energy hole problem in WSN. 476-483 - S. Pramod, O. P. Vyas:

Recent frequent itemsets mining over data streams. 484-489 - N. Rajasekhar Reddy, Surya Bahadur, K. R. K. Sateesh:

Risk chain prediction metrics for predicting fault proneness in object oriented systems. 490-496 - T. I. Manish

, D. Murugan, T. Ganesh Kumar:
Edge detection by combined canny filter with scale multiplication & ant colony optimization. 497-500 - S. Anitha, V. Radha

:
Performance of detecting defects in textile fabric using Gabor Wavelet with statistical and Morphological filters. 501-504 - Naresh Babu Muppalaneni

, R. Bhramaramba, Allam Appa Rao:
Structure based drug design studies on urokinase plasminogen activator inhibitors using AutoDock. 505-507 - Sai Bharath Kadati, K. Khaja Baseer

, A. Rama Mohan Reddy, Shoba Bindu Chigarepalli
:
A M2MC based approach for mapping two ADL models. 508-516 - S. Gokul, G. Santhosh Kumar

, M. Sreeraj
:
Real time recognition of pedestrian and vehicles from videos. 517-523 - Arvinder Kaur, Samridhi Gulati, Sarita Singh

:
A comparative study of two formal specification languages: Z-notation & B-method. 524-531 - A. Uzma Jabrooth, B. Parvathavarthini

:
Polymorphic worms detection using Extended PolyTree. 532-538 - R. Revathi, M. Hemalatha

:
Efficient method for feature extraction on video preocessing. 539-543 - Pooja Sapra, Suresh Kumar

, R. K. Rathy:
Performance analysis of decomposition techniques in multilevel secure relational database systems. 544-549 - Avinash Kumar Singh

, Gora Chand Nandi:
Face recognition using facial symmetry. 550-554 - Asit Kumar Das, Soumen Kumar Pati, Saikat Chakrabarty:

Reduct generation of microarray dataset using rough set and graph theory for unsupervised learning. 555-561 - Sangram Ray

, G. P. Biswas:
An ECC based public key infrastructure usable for mobile applications. 562-568 - M. Sornam, P. Thangavel

:
Complex-valued neural network using simultaneous perturbation with dynamic tunneling technique. 569-574 - Tanmay Bhattacharya, Sirshendu Hore

, Nilanjan Dey
, S. R. Bhadra Chaudhuri:
Stationary wavelet transform based audio authentication technique. 575-579 - Trisiladevi C. Nagavi

, Nagappa U. Bhajantri:
Perceptive analysis of query by singing system through query excerption. 580-586 - B. S. Harish

, Ramya M. Hegde, N. Neeti, M. Meghana:
An empirical study on various text classifiers. 587-593 - P. Mahesha

, D. S. Vinod
:
Feature based classification of dysfluent and normal speech. 594-597 - Bishas Kaur, Aarpit Saxena, Sanjay Singh

:
Web opinion mining for social networking sites. 598-605 - Suneetha Manne

, Syeda Sameen Fatima:
An extensive empirical study of feature terms selection for text summarization and categorization. 606-613 - Kalpana Johari, Arvinder Kaur:

Interoperability issues in Web Services. 614-619 - Vikram Kumar Santhalia, Sanjay Singh

:
Design and development of a desktop monitoring system. 620-625 - A. Anny Leema, M. Hemalatha

:
A new deferred cleansing technique for effective warehousing of RFID. 626-631 - Abdelkader Guerid, Amrane Houacine:

A new approach of voice conversion based on the GMM model. 632-636 - K. Praveen, Prabaharan Poornachandran

, A. S. Remya Ajai
:
Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images. 637-641 - T. Dinesh, V. Jayan, V. K. Bhadran:

Word category disambiguation for malayalam: a language model approach. 642-646 - Renu Dalal, Manju Khari

, Yudhvir Singh
:
Authenticity check to provide trusted platform in MANET (ACTP). 647-655 - Soumya Antony, Simy Antony, A. S. Ajeena Beegom

, M. S. Rajasree:
HTB based packet scheduler for cloud computing. 656-660 - Amritha Sampath, C. Tripti

, V. Govindaru:
Online handwritten character recognition for Malayalam. 661-664 - Rupali Vij, Suresh Kumar

:
Improved k- means clustering algorithm for two dimensional data. 665-670 - V. Lokeswara Reddy

, A. Subramanyam, P. Chenna Reddy
:
Implementation of Least Significant Bit Steganography and statistical steganalysis. 671-675 - Anshul Sood, Monish Kaul, Rajesh Siddavatam

:
Fast novel image reconstruction Algorithm using Adaptive R-tree based segmentation and Linear Bivariate Splines. 676-682 - N. Nalla Anandakumar

, S. Dillibabu:
Correlation power analysis attack of AES on FPGA using customized communication protocol. 683-688 - Gaurav Aggarwal, Gaurav Kumar, Divyashikha Sethia

:
Dynamic Prefix Caching of videos with Lazy Update. 689-693 - Inderpreet Kaur

, Arvinder Kaur:
Empirical study of Software Quality estimation. 694-700 - Gaurav Bhatia, Vivek Kumar

:
A cross layer based reliable route metric for Mobile Ad hoc Networks. 701-705 - Kamaljit Kaur

, Gaurav Raj
:
Comparative analysis of Black Hole attack over Cloud Network using AODV and DSDV. 706-710 - Yingchi Mao:

Delay-bounded utility-based event detection in energy harvesting sensor networks. 711-716 - Balu Ramu, Devi Thirupathi

:
A new methodology for diagnosis of appendicitis using sonographic images in image mining. 717-721 - Rishabh Kulshreshtha, Ayushi Kamboj, Sanjay Singh

:
Decoding robustness performance comparison for QR and data matrix code. 722-731 - Natarajan Meghanathan

:
Virtualization of virtual memory address space. 732-737 - Aman Jatain

, Deepti Gaur:
Estimation of component reusability by identifying quality attributes of component: a fuzzy approach. 738-742 - Kota Solomon Raju

, Y. Pratap, Virendra Patel
, S. M. M. Naidu, Amit Patwardhan, P. Bhanu Prasad:
GPS signal generation for L1 frequency using model based design tools. 743-748 - Kalavathi Alla, G. Gowri Shankar, G. Bala Subrahmanyam:

Secure transmission of authenticated messages using new encoding scheme and Steganography. 749-752 - Leila Yousefi

:
A fair spectrum sharing approach in Cognitive Radio Networks. 753-759 - Alka Aman, Rajeev G. Vishwakarma:

Secure message authentication using true random number generator based on Signcryption scheme using ECC. 760-765 - Brajesh Kumar, Anand Rajavat:

Secure image authentication by distibuted source coding using LDPC encoding. 766-769 - Kartik Sharma, Gianetan Singh Sekhon:

Design and development of an effective ball catching robotic arm with 3DOF. 770-777 - Mohd Mahmood Ali

, Mohd S. Qaseem
, Lakshmi Rajamani, A. Govardhan
:
Improved decision tree induction: Prioritized Height Balanced tree with entropy to find hidden rules. 778-784

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














