


default search action
ICACCI 2012: Chennai, India
- Kaliappan Gopalan, Sabu M. Thampi:

2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012. ACM 2012, ISBN 978-1-4503-1196-0
Regular papers
- Anil G. Rao, Manish R. Joshi

:
An effective e-governance model for financial institutions in India. 1-7 - K. M. Anil Kumar, Suresha:

Sentiment dictionary for effective detection of web users' opinion. 8-15 - Vishnuprakash Puthiya Kovilakath, S. D. Madhu Kumar

:
Semantic broken link detection using structured tagging scheme. 16-20 - M. Thirumaran, Dhavachelvan Ponnurangam, G. Naga Venkata Kiran, A. Divya:

A novel framework for enterprise web services change management. 21-27 - Sindhu Sudhakaran, Radha Senthilkumar

:
Efficient evaluation of partial path queries over a XML compact storage structure. 28-32 - Prajna Paramita Debata, Satyabrata Das

, Debahuti Mishra
, Sashikala Mishra
, Kailash Shaw
, Gayatri Mahapatro:
Error encoding and decoding model over communication channel for synthesis of proteins from DNA sequences. 33-37 - Hasin Afzal Ahmed, Priyakshi Mahanta, D. K. Bhattacharyya

:
Finding gene coherent patterns using PATSUB+. 38-44 - Nilanjan Dey

, Anamitra Bardhan Roy, Achintya Das:
Detection and measurement of bimalleolar fractures using Harris corner. 45-51 - K. Arun Kumar, Vamshi Krishna Konishetty, Kaladhar Voruganti, G. V. Prabhakara Rao:

CASH: context aware scheduler for Hadoop. 52-61 - Muhammad Asif Naeem

, Gillian Dobbie, Imran Sarwar Bajwa
, Gerald Weber:
Resource optimization for processing of stream data in data warehouse environment. 62-68 - Indu Singh

, Manoj Kumar
:
Evaluation of approaches for designing secure data warehouse. 69-73 - Harish Verma, Durga Toshniwal, Sateesh Kumar Peddoju:

Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services. 74-81 - Sandeep Varma Nadimpalli

, Valli Kumari Vatsavayi
:
Detecting dependencies in an anonymized dataset. 82-89 - Sujatha Srinivasan

, Sivakumar Ramakrishnan:
Dominators vs pure dominators on the accuracy of a classifier with a multi objective cultural algorithm. 90-96 - Prem Pujari Pati, Kaberi Das

, Debahuti Mishra
, Shruti Mishra
, Lipismita Panigrahi
:
Sampling correctly for improving classification accuracy: a hybrid higher order neural classifier (HHONC) approach. 97-101 - R. Vasanth Kumar Mehta

, B. Sankarasubramaniam, S. Rajalakshmi:
An algorithm for fuzzy-based sentence-level document clustering for micro-level contradiction analysis. 102-105 - Bikram Keshari Mishra, Amiya Kumar Rath

, Nihar Ranjan Nayak, Sagarika Swain:
Far efficient K-means clustering algorithm. 106-110 - R. Sethukkarasi, U. Keerthika, Arputharaj Kannan

:
A self learning rough fuzzy neural network classifier for mining temporal patterns. 111-117 - Rudra Kalyan Nayak

, Debahuti Mishra
, Satyabrata Das
, Kailash Shaw
, Sashikala Mishra
, Ramamani Tripathy
:
Clustering and classifying informative attributes using rough set theory. 118-123 - K. Reddy Madhavi

, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju:
Identification of optimal cluster centroid of multi-variable functions for clustering concept-drift categorical data. 124-128 - Govinda Kannayaram

, Perla Ravitheja:
Identity anonymization and secure data storage using group signature in private cloud. 129-132 - Syed Mujib Rahaman, Mohammad Farhatullah

:
A framework for preserving privacy in cloud computing with user service dependent identity. 133-136 - Pardeep Kumar, Amandeep Verma

:
Scheduling using improved genetic algorithm in cloud computing for independent tasks. 137-142 - M. K. Mohan Murthy, Sanjay Harogolige Adimurthy, Ashwini Janagal Padmanabha:

Pricing models and pricing schemes of IaaS providers: a comparison study. 143-147 - Sathyanarayanan Rangarajan, Monica Verma, Anand Kannan, Ayush Sharma, Ingmar Schoen:

V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning. 148-154 - T. P. Shabeera, Priya Chandran

, S. D. Madhu Kumar
:
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications. 155-160 - Anandalakshmi Thevampalayam Kaliappan, Swamidoss Sathiakumar, Nandan Parameswaran:

Flexible power consumption management in smart homes. 161-167 - Usha Banerjee, Gaurav Bora, Gaurav Batra, Ayush Agarwal:

A novel software system to facilitate better and easier communication for people with speaking disabilities. 168-173 - Aloysius George, B. R. Rajakumar, D. Binu

:
Genetic algorithm based airlines booking terminal open/close decision system. 174-179 - Asif Ekbal, Sriparna Saha, Dhirendra Singh

:
Active machine learning technique for named entity recognition. 180-186 - Kota Solomon Raju

, Gargi Baruah, Manipati Rajesham, Palash Phukan
:
FPGA based computing displacement of moving object in a real time video. 187-192 - A. Thilagavathy, K. Aarthi, A. Chilambuchelvan:

Text extraction from videos using a hybrid approach. 193-199 - C. Lakshmi Devasena

, M. Hemalatha
:
Object detection in video using Lorenz information measure and discrete wavelet transform. 200-206 - Usha Bhanu Nageswaran

, A. Chilambuchelvan:
VLSI architectures for lifting based DWT: a detailed survey. 207-214 - G. Muneeswari

, K. L. Shunmuganathan
:
Time based agent garbage collection algorithm for multicore architectures. 215-219 - Balaji Venu, Ashwani Singh:

Formal verification methodology considerations for network on chips. 220-225 - R. Sakthivel

, K. Sravanthi, Harish M. Kittur:
Low power energy efficient pipelined multiply-accumulate architecture. 226-231 - Gagandeep Kaur

, Mohammad Ayoub Khan
:
Current differencing buffered amplifier an active element: a review of recent developments. 232-236 - Satinder Singh Gill, Brent R. Petersen

:
Advanced adaptive call admission control for mobile cellular networks: cell breathing, load shedding and bandwidth degradation. 237-243 - Aditya Ponnada, Ajaykumar Kannan:

Evaluation of mobile games using playability heuristics. 244-247 - V. P. Harigovindan

, Anchare V. Babu
, Lillykutty Jacob:
Tuning transmission opportunity (TXOP) limits for providing bit-based fairness in IEEE 802.11p V2I networks. 248-254 - Jyoti Prakash Singh

, Paramartha Dutta
, Amlan Chakrabarti
:
Temporal characteristics of clustering in mobile ad hoc network. 255-261 - Chhagan Lal

, Vijay Laxmi
, Manoj Singh Gaur:
A rate adaptive and multipath routing protocol to support video streaming in MANETs. 262-268 - R. Deepa, S. Swamynathan:

Load balancer for energy efficient clustering protocol in MANETs. 269-274 - Hema Ramachandran, G. R. Bindu:

Wireless charging of lighting gadgets using low Q resonant coupling. 275-278 - Sulata Mitra, Atanu Mondal:

Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET. 279-286 - P. Devi, A. Kannammal:

A hybrid defense mechanism for DDoS attacks using cluster analysis in MANET. 287-291 - Amali Chinnappan

, Ramachandran Balasubramanian
:
Modified weight function based network selection algorithm for 4G wireless networks. 292-299 - Vishwanath Pratap Singh, Arka Prokash Mazumdar

, Ashok Singh Sairam
:
On energy consumption analysis for ad hoc routing protocols. 300-306 - Osama A. Omer

, Ahmed Abdelreheem
:
A novel algorithm for PAPR reduction in LTE system. 307-311 - Nanda Kishore Chavali, Venkata Krishna Reddy Pilli:

Adaptive time synchronization for VHT wireless LAN. 312-317 - Maneesha V. Ramesh

, Anoop Jacob, Aryadevi R. Devidas
:
Enhanced emergency communication using mobile sensing and MANET. 318-324 - Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh

:
Higher layer issues in cognitive radio network. 325-330 - Rinnymol Babu, A. V. Babu

:
Resolving rate anomaly in IEEE 802.11p multi-rate vehicle-to-infrastructure networks using TXOP differentiation. 331-336 - P. R. Mahalingam

, Shimmi Asokan
:
A framework for optimizing GCC for ARM architecture. 337-342 - Shovan Maity, Arnab Raha

, Souvik Kumar Mitra, Victor Seal, Mrinal Kanti Naskar, Amitava Mukherjee
:
An efficient sleep protocol for lifetime enhancement in multi covered and multi connected WSNs. 343-347 - Sachin Gajjar

, Shrikant N. Pradhan, Kankar S. Dasgupta:
Performance analysis of cross layer protocols for wireless sensor networks. 348-354 - Gitanjali Rahul Shinde

, Swati Joshi
, Shami Jhodge:
Diversity coded directed diffusion for WSN. 355-359 - Ipsita Dutta, Rajib Banerjee, Tamaghna Acharya, DasBit Sipra

:
An energy efficient audio compression scheme using wavelet with dynamic difference detection technique in wireless sensor network. 360-366 - Maneesha Vinodini Ramesh

, P. L. Divya, Raghavendra V. Kulkarni
, Rekha Manoj:
A swarm intelligence based distributed localization technique for wireless sensor network. 367-373 - Maneesha V. Ramesh

, A. G. Sreedevi
, Kamalanathan Kandasamy, P. Venkat Rangan:
Performance comparison and node failure assessment of energy efficient two level balanced and progressive sensor networks. 374-381 - Jitendra Pradhan, Anil K. Sarje:

A fault tolerant approach for data aggregation in wireless sensor networks. 382-386 - Sabu M. Thampi

, Nithya Aniyan, K. Chitharanjan:
Hexagonal groups based key management using deployment knowledge in wireless sensor networks. 387-391 - Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy

:
Analysis of IEEE 802.11 DCF for ad hoc networks under nonsaturation conditions. 392-398 - Axel Sikora, Pancraç Villalonga, Klaus Landwehr:

Extensions to wireless M-Bus protocol for smart metering and smart grid application. 399-404 - G. Sreenu, P. M. Dhanya:

Inference of peer temperament in unstructured peer-to-peer networks by creating a virtual multi layer structure. 405-408 - M. Vigilson Prem

, S. Swamynathan:
Efficient dynamic itinerary and memory allocation for mobile agents. 409-415 - Raghavendra Sunku, Debabrata Das

:
Online differential charging for blended services using service capability interaction manager in IMS network. 416-420 - K. R. Remesh Babu

, P. Mathiyalagan
, S. N. Sivanandam:
Task scheduling using ACO-BP neural network in computational grids. 428-432 - Jissy Liz Jose, Jayasudha Js, Sabu M. Thampi

:
Sybil resilient identity distribution in P2P networks. 433-439 - Ramkumar Dargha:

Cloud computing: from hype to reality: fast tracking cloud adoption. 440-445 - Sajad Khorsandroo, Rafidah Md Noor

, Sayid Khorsandroo:
The role of psychophysics laws in quality of experience assessment: a video streaming case study. 446-452 - Susmita Horrow, Sanchika Gupta, Anjali Sardana:

Implementing private cloud at IIT Roorkee: an initial experience. 453-458 - Sheeja S. Manakattu, S. D. Madhu Kumar

:
An improved biased random sampling algorithm for load balancing in cloud based systems. 459-462 - Harkeerat Singh Bedi, Sajjan G. Shiva:

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms. 463-469 - Madhan Kumar Srinivasan

, K. Sarukesi, Paul Rodrigues, M. Sai Manoj, P. Revathy:
State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. 470-476 - Narasimha Bolloju, San Murugesan

:
Cloud-based B2B systems integration for small-and-medium-sized enterprises. 477-480 - Keerthi Balasundaram, Madhan Kumar Srinivasan

, K. Sarukesi, Paul Rodrigues:
Implementation of next-generation traffic sign recognition system with two-tier classifier architecture. 481-487 - Li Liu, Cheng Zhang, Haojie Wang:

A new algorithm based on complex wavelet transform for protein sequence classification. 488-492 - Adathala Rajeev, Natarajan Sivakumaran

, Sreedharan Sujesh, Chirathodi Vayalappil Muraleedharan:
A linear after-load model for a cardio-vascular pulse duplicator. 493-497 - Nazanin Sabooniha, Danny Toohey, Kevin Lee

:
An evaluation of hospital information systems integration approaches. 498-504 - Soubhik Paul, Jayanta Mukhopadhyay, Arun K. Majumdar, Bandana Majumdar, S. Das Bhattacharya:

Methodology to visualize electronic health record for chronic diseases on small display screens. 505-510 - Anup Nandy, Soumik Mondal, Lokesh Rai, Pavan Chakraborty

, Gora Chand Nandi:
A study on damping profile for prosthetic knee. 511-517 - Komathy Karuppanan, Abinaya Sree Vairasundaram, Manjula Sigamani:

A comprehensive machine learning approach to prognose pulmonary disease from home. 518-523 - Tanmay Pal

, Srinivasu Maka:
Simulation of respiratory system under normal, hypoxia and hypercapnia conditions. 524-532 - Monowar H. Bhuyan, D. K. Bhattacharyya

, Jugal K. Kalita:
An effective unsupervised network anomaly detection method. 533-539 - SK Hafizul Islam

, G. P. Biswas:
Certificateless strong designated verifier multisignature scheme using bilinear pairings. 540-546 - Shila Samantaray, Sambit Bakshi

, Pankaj Kumar Sa:
An efficient DoG based fingerprint enhancement scheme. 547-550 - Paria Ghanbari, Mahmood Ahmadi

, Arash Ahmadi
:
Error management and detection in computer networks using Bloom filters. 551-556 - Roli Bansal

, Priti Sehgal, Punam Bedi
:
Securing fingerprint images using a hybrid technique. 557-565 - Sriparna Saha, Ashok Singh Sairam

, Amulya Yadav, Asif Ekbal:
Genetic algorithm combined with support vector machine for building an intrusion detection system. 566-572 - Soumya Mukherjee

, Arup Kumar Pal
:
A DCT-SVD based robust watermarking scheme for grayscale image. 573-578 - C. K. Raju, Ashok Mishra, P. B. S. Bhadoria:

Synthesis of sustainability and secureness of software in public applications using deductive-nomological model. 579-588 - R. K. N. Sai Krishna, Tummalapalli J. V. R. K. M. K. Sayi, Ravi Mukkamala, Pallav K. Baruah:

Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach. 589-595 - Jaisankar Narayanasamy

, Sannasi Ganapathy, Arputharaj Kannan
:
Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithm. 596-601 - Gaurav Varshney, Anjali Sardana, Ramesh Chandra Joshi:

Secret information display based authentication technique towards preventing phishing attacks. 602-608 - Yakkala V. Naga Manikanta, Anjali Sardana:

Protecting web applications from SQL injection attacks by using framework and database firewall. 609-613 - A. Ruhan Bevi

, S. S. V. Sheshu, S. Malarvizhi:
FPGA based sliding window architecture for RC5 encryption. 614-618 - Dinesh Kumar Tyagi

, Virendra Singh Shekhawat, V. K. Chaubey:
Resource efficient survivability approach for resilient WDM optical networks. 619-624 - Dheerendra Mishra

, Sourav Mukhopadhyay:
Privacy rights management in multiparty multilevel DRM system. 625-631 - Suman Sau, Rourab Paul

, Tanmay Biswas, Amlan Chakrabarti
:
A novel AES-256 implementation on FPGA using co-processor based architecture. 632-638 - Neelam Sharma

, Saurabh Mukherjee:
Layered approach for intrusion detection using naïve Bayes classifier. 639-644 - P. Kola Sujatha, C. Suba Priya, Arputharaj Kannan

:
Network intrusion detection system using genetic network programming with support vector machine. 645-649 - Animesh Tripathy, Matrubhumi Pradhan:

A novel framework for preserving privacy of data using correlation analysis. 650-655 - Animesh Tripathy, Jayanti Dansana

, Debi Prasad Mishra
:
A secure packet marking scheme for IP traceback in IPv6. 656-659 - Animesh Tripathy, Jayanti Dansana

, Ranjita Mishra:
A classification based framework for privacy preserving data mining. 660-666 - Cibile K. Kanjirathumkal, S. M. Sameer, Lillykutty Jacob:

Exploiting second order statistics of the received signals in AF relay cooperative network for compound channel estimation. 667-672 - Sangeetha Manoharan, Vidhyacharan Bhaskar:

Performance comparison of M-DCSK schemes in MIMO Nakagami channels with and without diversity combining. 673-677 - Vivek G. Rajendran, Vidhyacharan Bhaskar:

Capacity analysis of LMF channels under different adaptation policies with and without diversity combining. 678-682 - E. Ravindran Vimina

, K. Poulose Jacob:
Image retrieval using local and global properties of image regions with relevance feedback. 683-689 - Rahul Bankapur, Meena S. Maralappanavar:

Optimized trace transform based content based image retrieval algorithm. 690-696 - G. Geetha, S. N. Geethalakshmi

:
Detecting epileptic seizures using electroencephalogram: a novel frequency domain feature extraction technique for seizure classification using fast ANFIS. 697-703 - T. Sumadhi, M. Hemalatha

:
Towards improving automatic image annotation using improvised fractal SMOTE approach. 704-709 - Krishna Asawa, Vikrant Verma, Ankit Agrawal:

Recognition of vocal emotions from acoustic profile. 710-716 - M. Sharmila Kumari, B. H. Shekar, N. Harivinod

, K. Raghurama Holla
:
Monogenic scale space based region covariance matrix descriptor: an efficient and accurate face recognition algorithm. 717-720 - M. C. Hanumantharaju

, V. N. Manjunath Aradhya, M. Ravishankar, A. Mamatha:
A particle swarm optimization method for tuning the parameters of multiscale retinex based color image enhancement. 721-727 - Bindu S. Moni, G. Raju

:
Handwritten character recognition system using a simple feature. 728-734 - M. A. Leo Vijilious, Sannasi Ganapathy

, V. Subbiah Bharathi:
Palmprint feature extraction approach using nonsubsampled contourlet transform and orthogonal moments. 735-739 - Thangavel Deepa

, R. Kumar
:
PAPR reduction for OFDM systems using clipping and square rooting techniques. 740-744 - Sibendu Samanta

, R. P. Maheshwari, Manoj Tripathy:
Directional line edge binary pattern for texture image indexing and retrieval. 745-750 - Battula Tirumala Krishna

:
Fractional Fourier transform: a survey. 751-757 - Hongjian Sun

, Arumugam Nallanathan
, Jing Jiang
:
Improving the energy efficiency of power line communications by spectrum sensing. 758-762 - P. Shobana Devi, Jose Stephen, G. Sulochana Kurambath, R. Ravindra Kumar:

Implementation of dictation system for Malayalam office document. 763-767 - Muhammad Asif Naeem

, Imran Sarwar Bajwa
:
Generating OLAP queries from natural language specification. 768-773 - Ramakrishna Kolikipogu

, B. Padmaja Rani, Vijayalaxmi Kakulapati
:
Reformulation of Telugu web query using word semantic relationships. 774-780 - V. Jayan, R. Sunil, G. Sulochana Kurambath, R. Ravindra Kumar:

Divergence patterns in machine translation between Malayalam and English. 788-794 - Santosh Gaikwad

, Bharti Gawali
, Suresh C. Mehrotra
:
Novel approach based feature extraction for Marathi continuous speech recognition. 795-804 - R. Santhosh, Gowri Srinivasa

:
A compact feature set for recognition of handwritten numerals and vowels in the Kanarese script. 805-811 - Shahrouz Gashmard, Alireza Mehri Dehnavi

, Hossein Rabbani
:
A new combined method for character recognizing in Farsi printed scripts using principal component analysis. 812-815 - Zouhir Zemirli, Yahya O. Mohamed Elhadj

:
Morphar+: an Arabic morphosyntactic analyzer. 816-823 - Saranya D. Krishnan, R. R. Rajeev, Mary Priya Sebastian, Elizabeth Sherly:

Subject and object identification in Malayalam text. 824-827 - P. J. Antony

, Hemant B. Raj, B. S. Sahana, Dimple Sonal Alvares, Aishwarya Raj:
Morphological analyzer and generator for Tulu language: a novel approach. 828-834 - Sriparna Saha, Asif Ekbal, Mridula Verma

, Utpal Kumar Sikdar, Massimo Poesio
:
Active learning technique for biomedical named entity extraction. 835-841 - Navanath Saharia

, Utpal Sharma, Jugal Kalita:
Analysis and evaluation of stemming algorithms: a case study with Assamese. 842-846 - Misiriya Shahul Hameed, C. N. Subalalitha

, T. V. Geetha, Ranjani Parthasarathi:
A deconverter framework for Malayalam. 847-856 - Kamal Sarkar

:
An approach to summarizing Bengali news documents. 857-862 - Paruvelli Sreedevi, Wen-Liang Hwang:

Example-based single image enhanced up-sampling. 863-872 - Rajesh K. Bawa, Ganesh K. Sethi:

A review on binarization algorithms for camera based natural scene images. 873-878 - Jiuwen Zhang, Jincai Mi, Tongfeng Zhang:

Shift-invariant texture retrieval using P- contourlet. 879-883 - A. Benjamin Joseph, R. Baskaran:

Improved edge preserving lossy image compression using wavelet transform. 884-888 - Akshay Kumar Maan, Alex Pappachen James

:
Ranking importance based information on the world wide web. 889-897 - Akshansh Gupta, R. K. Agrawal

, Baljeet Kaur:
A three phase approach for mental task classification using EEG. 898-904 - Pranali K. Kosamkar

, Madhuri Potey
:
Feature based retrieval for animation video. 905-909 - Yahya O. Mohamed Elhadj

, Zouhir Zemirli, Basma Al-faraj:
Towards a unified 3D animated dictionary for Saudi sign language. 910-917 - Hemantha Kumar Kalluri

, Munaga V. N. K. Prasad, Arun Agarwal
:
Palmprint identification based on wide principal lines. 918-924 - Sharada Laxman Kore, Shaila D. Apte

:
The current state of art: handwriting a behavioral biometric for person identification and verification. 925-930 - Sharafudeen Mohammed Anzar, P. S. Sathidevi:

Multi-normalization: a new method for improving biometric fusion. 931-937 - Nitin Kumar, Ajay Jaiswal

, Ramesh K. Agrawal
:
Performance evaluation of subspace methods to tackle small sample size problem in face recognition. 938-944
Work-in-progress
- Arockia Anand Raj, T. Mala

:
Cloudpress 2.0: a next generation news retrieval system on the cloud with a built-in summarizer. 945-951 - Anand Kannan, Gerald Q. Maguire Jr.

, Ayush Sharma, Volker Fusenig, Peter Schoo:
N-ary tree based key distribution in a network as a service provisioning model. 952-960 - Ujwala Manoj Patil, Jayantrao Bhaurao Patil:

Web data mining trends and techniques. 961-965 - Lakhwinder Kumar, Hardeep Singh

, Ramandeep Kaur:
Web analytics and metrics: a survey. 966-971 - Arlete Teresinha Beuren, Rodrigo Janasieivicz, Gomes Pinheiro, Neusa Grando, Jacques Facon

:
Skin melanoma segmentation by morphological approach. 972-978 - Manisha Arora, Dinesh Tagra:

Neuro-fuzzy expert system for breast cancer diagnosis. 979-985 - Sami J. Habib, Paulvanna Nayaki Marimuthu:

Capacity planning of telemedicine network through molecular assembly. 986-989 - Susant Kumar Jena, Cuachy Pradhan, N. M. Elango, N. Pradhan:

Use of higher order spectrum in characterizing nonlinear interactions in human brain signals. 990-996 - Shomona Gracia Jacob, R. Geetha Ramani:

Mining of classification patterns in clinical data through data mining algorithms. 997-1003 - Lipismita Panigrahi

, Ruchi Ranjan, Kaberi Das
, Debahuti Mishra
:
Removal and interpolation of missing values using wavelet neural network for heterogeneous data sets. 1004-1009 - Vamshi Krishna Konishetty, K. Arun Kumar, Kaladhar Voruganti, G. V. Prabhakara Rao:

Implementation and evaluation of scalable data structure over HBase. 1010-1018 - Bhupathiraju V. S. Ramakrishnam Raju, Vatsavayi Valli Kumari

:
Parameter-lite clustering algorithm based on MST and fuzzy similarity merging. 1019-1026 - Godfrey Winster Sathianesan

, Swamynathan Sankaranarayanan:
Hierarchically clustered technical blogs. 1027-1033 - Sunita B. Aher, Louis Lobo

:
Applicability of data mining algorithms for recommendation system in e-learning. 1034-1040 - Pardeep Kumar

, Nitin
, Durg Singh Chauhan, Vivek Kumar Sehgal
:
Selection of evolutionary approach based hybrid data mining algorithms for decision support systems and business intelligence. 1041-1046 - R. Priscilla, S. Swamynathan:

Efficient two dimensional clustering of microarray gene expression data by means of hybrid similarity measure. 1047-1053 - G. V. Nadiammai, M. Hemalatha

:
An evaluation of clustering technique over intrusion detection system. 1054-1060 - G. LakshmiPriya, Shanmugasundaram Hariharan

:
An efficient approach for generating frequent patterns without candidate generation. 1061-1067 - Mayana Humera Khanam, Palli Suryachandra, Kv Madhumurthy:

Experiments on POS tagging and data driven dependency parsing for Telugu language. 1068-1073 - G. Keerthi Prasad, Imran Khan, Naveen Chanukotimath:

On-line Hindi handwritten character recognition for mobile devices. 1074-1078 - K. Saruladha, Gnanasekaran Aghila, B. Sathiya:

Neighbour based structural proximity measures for ontology matching systems. 1079-1085 - Raja Sunkara, Aditya Achanta, Vatsavayi Valli Kumari

, K. V. S. V. N. Raju:
SenSim: sentence similarity based on the concept of relevance. 1086-1092 - Jayaraj Jayabharathy, Selvadurai Kanmani, N. Sivaranjani

:
Correlation based multi-document summarization for scientific articles and news group. 1093-1099 - Imran Ahmed Khan, Danish Sheikh, Mirza Tariq Beg:

Analysis of double edge triggered clocked storage elements. 1100-1103 - Usha Bhanu Nageswaran

, A. Chilambuchelvan:
High speed VLSI implementation of lifting based DWT. 1104-1110 - S. Balamurugan

, Balakumaran Srirangaswamy, R. Marimuthu, Partha Sharathi Mallick
:
FPGA design and implementation of truncated multipliers using bypassing technique. 1111-1117 - Saambhavi Baskaran, Pachamuthu Rajalakshmi

:
Hardware-software co-design of AES on FPGA. 1118-1122 - Nithyanandam Pandian

, Ravichandran Thangavel:
A hybrid embedded steganography technique: optimum pixel method and matrix embedding. 1123-1130 - Shyamalendu Kandar, Nabarun Das, Subhabrata Barman

:
Symmetric key based blocked oriented digital enveloping. 1131-1135 - N. Sasirekha, M. Hemalatha

:
An improved secure code encryption approach based on indexed table. 1136-1142 - R. Thalapathi Rajasekaran, V. Manjula

, V. Kishore, T. M. Sridhar
, C. Jayakumar
:
An efficient and secure key agreement scheme using physiological signals in body area networks. 1143-1147 - S. Deepan Chakravarthy, P. Infant Kingsly, Mahendran Sadhasivam, C. Jayakumar

:
Multi-modal biometric approach to enable high security in mobile adhoc network. 1148-1154 - Chandan Maity, Chaitanya Garg, Ashutosh Gupta

:
Ultra low power device to track environmental sensitive items in transit. 1155-1162 - Abishek Thekkeyil Kunnath, Preeja Pradeep

, Maneesha Vinodini Ramesh
:
Locating and monitoring emergency responder using a wearable device. 1163-1168 - Shitala Prasad, Abhay Prakash, Sateesh Kumar Peddoju, Debashis Ghosh

:
Control of computer process using image processing and computer vision for low-processing devices. 1169-1174 - M. Hemalatha

, R. Revathi:
Efficient method for noise removal techniques and video object segmentation using color based fuzzy c means. 1175-1181 - Hossam Meshref

, Isbudeen Noor Mohamed:
Intelligent tutoring systems: a new proposed structure. 1182-1186 - Jaya Sudha Natarajan, Lakshmi Sevukamoorthy:

Auto-clever fuzzy (ACF) based intelligent system for monitoring and controlling the hydrocarbons -air toxics emitted by the vehicle motors. 1187-1192 - K. Sathiyamurthy, T. V. Geetha, M. Senthilvelan:

An approach towards dynamic assembling of learning objects. 1193-1198 - Preety Singh

, Vijay Laxmi
, Manoj Singh Gaur:
n-Gram modeling of relevant features for lip-reading. 1199-1204 - Porselvi Soundararajan, Vidhyacharan Bhaskar:

Upper and lower bound analysis of the OFDM system impaired by CFO over slow fading channels. 1205-1209 - Yogesh Bhomia

, Ashvini Chaturvedi, Yogesh Kumar Sharma:
Microstrip patch antenna combining crown and Sierpinski fractal-shapes. 1210-1213 - Mohamed Chakroun, Ali Wali

, Adel M. Alimi
:
A new multi-agent system for video objects segmentation and tracking based on spatio-temporal descriptor. 1214-1218 - Anusuya Venkatesan, Latha Parthiban

:
Medical image thresholding using WQPSO and maximum entropy. 1219-1224 - Sendhilkumar Selvaraju

, G. S. Mahalakshmi, Dilip S. Sam:
Enhancement of co-authorship networks with content-similarity information. 1225-1228 - Sumanta Hati, Santi P. Maity

:
Block PIC technique for synchronous CI/MC-CDMA system using neural network. 1229-1235 - Shafali Agarwal

, Ashish Negi:
Fixed point results of transcendental superior antifractals. 1244-1248 - Vani Rajamanickam, Sangeetha Marikkannan

:
Performance evaluation of motion estimation in H.264/AVC encoder. 1249-1253 - B. Meenakshi, P. Anandhakumar:

Lifetime extension of wireless sensor network by selecting two cluster heads and hierarchical routing. 1254-1260 - Dhanya Sudarsan, G. Jisha:

A survey on various improvements of hybrid zone routing protocol in MANET. 1261-1265 - Ameenudeen Pe, A. V. Babu

:
Performance evaluation of regular cycle non-binary LDPC codes in AWGN channel. 1266-1270 - A. Pravin Renold

, R. Parthasarathy:
Source based trusted AODV routing protocol for mobile ad hoc networks. 1271-1275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














