default search action
2nd ICTCS 2016: Udaipur, India
- ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, March, 2016. ACM 2016, ISBN 978-1-4503-3962-9 [contents]
- Anubha Parashar, Apoorva Parashar, Somya Goyal, Bharat Sahjalan:
Push Recovery for Humanoid Robot in Dynamic Environment and Classifying the Data Using K-Mean. 1:1-1:6 - S. Ravi Kumar, Md. Abdul Muqsit Khan, Y. K. Sundara Krishna, K. Chandra Sekharaiah:
AB-EUIDE: An approach to the design of ergonomic user interfaces for Cloud Computing. 1:1-1:5 - Birju Tank, Hardik Upadhyay, Hiren Patel:
A Survey on IoT Privacy Issues and Mitigation Techniques. 2:1-2:4 - N. Immanuel Jebadurai, Himanshu Gupta:
Automated Verification in Cryptography System. 2:1-2:5 - S. Ravi Kumar, Md. Abdul Muqsit Khan, K. Chandra Sekharaiah, Y. K. Sundara Krishna:
A Study on Agent Based Ergonomic and Intelligent User Interface Design in Cloud Computing. 3:1-3:5 - Hazel Nicolette Manners, Monica Jha, Pietro H. Guzzi, Pierangelo Veltri, Swarup Roy:
Computational Methods for Detecting Functional Modules from Gene Regulatory Network. 3:1-3:6 - Ronald Ashley Dkhar, Keshab Nath, Swarup Roy, Dhruba K. Bhattacharyya, Sukumar Nandi:
Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters. 4:1-4:6 - Samadrita Guha, Dipti Kapoor Sarmah:
Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization. 4:1-4:5 - Ankur Saxena, Neeraj Kaushik, Nidhi Kaushik:
Implementing and Analyzing Big Data Techniques withSpring Frame Work in Java& J2EEBased Application. 5:1-5:6 - Gagandeep Singh, Sandeep Kad:
Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique. 5:1-5:5 - Pradeep Kamboj, Ram Shringar Raw, Anil Kumar Gautam:
Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks. 6:1-6:5 - Takshak Desai, Udit Deshmukh, Mihir Gandhi, Lakshmi Kurup:
A Hybrid Approach for Detection of Plagiarism using Natural Language Processing. 6:1-6:6 - Rajneesh Tanwar, Purushottam Sharma:
Caught Hacker: Curing DDOS Attack. 7:1-7:4 - Subhamita Mukherjee, Indrajit Pan, Tuhina Samanta:
A Generic Defect Aware Heuristic Approach for Droplet Routing in a Digital Microfluidic Biochip with Minimal Pin Assignment. 7:1-7:4 - Vaishali Wangikar, Sachin Deshmukh, Sunil Bhirud:
Study and Implementation of Record De-duplication Algorithms. 8:1-8:6 - Vikash Singh, Kavita Sharma:
Smartphone Security: Review of Challenges and Solution. 8:1-8:3 - Arunima Dubey, Satyajee Srivastava:
A Major Threat to Big Data: Data Security. 9:1-9:6 - Sheetal Bairwa, Jyoti Gajrani, Satyanarayan Tazi:
Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset. 9:1-9:5 - Manju Khari, Manoj Kumar, Sonakshi Vij, Priyank Pandey, Vaishali:
Smart Cities: A Secure Data Transmission Model. 10:1-10:5 - Chayan Bhatt, Rahul Saxena, D. P. Sharma:
Parallel Computing of Load Flow Analysis. 10:1-10:8 - Ayushi Gupta, Ayushi Gupta, Deepali Virmani:
Centralized Message Reporting System in Wireless Sensor Networks. 11:1-11:5 - Seema Sharma, Babu Ram:
Causes of Human Errors in Early Risk assesment in Software Project Management. 11:1-11:11 - N. L. Manasa:
Nano Sensors and Pattern Recognition for Detection of Hidden Explosives. 12:1-12:6 - Snehasree Behera, K. Hemant Kumar Reddy, Diptendu Sinha Roy:
A Critical Assessment of ICT Infrastructures for Certain Demand Response Applications in Smart Grid. 12:1-12:6 - Kuwar Kuldeep V. V. Singh, Himanshu Gupta:
A New Approach for the Security of VPN. 13:1-13:5 - K. Hemant Kumar Reddy, Geetika Mudali, Diptendu Sinha Roy:
Energy Aware Heuristic Scheduling of Variable Class Constraint Resources in Cloud Data Centres. 13:1-13:6 - Bharat Singh Deora, Sushma Satpute:
Architecture of Cloud Server with Cache on Server. 14:1-14:5 - N. Rama Rao, K. Chandra Sekharaiah:
A Methodological Review Based Version Control System with Evolutionary Research for Software Processes. 14:1-14:6 - Gurjeet Singh Puri, Himanshu Gupta:
ID Based Encryption in Modern Cryptography. 15:1-15:5 - Ajay Kumar Dadoria, Kavita Khare, R. P. Singh:
Leakage Power Reduction Technique by using FinFET Technology. 15:1-15:5 - Vekhande Neha Eknath, Gogate Uttara Dhananjay:
Emerging opportunities in Domain Specific Search. 16:1-16:4 - Geetika, M. Hanmandlu, Deepti Gaur:
Analyzing DNA Strings using Information Theory Concepts. 16:1-16:5 - Prasenjit Banerjee, Anirban Sarkar:
Quality Evaluation Framework for Component Based Software. 17:1-17:6 - Hiteshwar Kumar Azad, Akshay Deepak, Kumar Abhishek:
Linked Open Data Search Engine. 17:1-17:5 - Ishan Agarwal, Bansidhar Joshi, Shalabh Kumar:
Object Detection using a Handheld Android Device for Processing Image Data in Real Time. 18:1-18:4 - Debendra Kumar Mahalik:
A Model for ROI of IT investment in e-Governance projects. 18:1-18:7 - Anupriya Jain, Mahesh Kumar Sharma:
Fuzzy and ANN based mining approach testing for Social network analysis. 19:1-19:7 - Nitesh M. Tarbani, A. S. Alvi, G. R. Bamnote, S. V. Pattalwar:
Prediction of next Mobile Access Gateway by Tracking Locations of Mobile Node. 19:1-19:3 - Dinesh Singh, Ranvijay, Rama Shankar Yadav:
NWCA: A New Weighted Clustering Algorithm to form Stable Cluster in VANET. 20:1-20:6 - Trupil Limbasiya, Nishant Doshi:
A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems. 20:1-20:5 - Pratik K. Agrawal, Abrar S. Alvi, G. R. Bamnote:
Enhancement of Hybrid Tagger by using Rule Based Approach. 21:1-21:4 - Sachin Santoshkumar Agrawal, Gajendra R. Bamnote, Shrikant L. Satarkar:
A Hybrid Clustering Based Collaborative Filtering (CF) Approach. 21:1-21:5 - Abdul Muqusit Alam, Smita Roy:
Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes. 22:1-22:6 - Sonia Duggal, M. K. Sharma:
Proposed Frame Work of e-Learning Services Through Cloud. 22:1-22:5 - Isha Batra, Ashish Kr. Luhach, Nisrag Pathak:
Research and Analysis of Lightweight Cryptographic Solutions for Internet of Things. 23:1-23:5 - Rupesh Kumar Dewang, Pushpendra Bahadur Singh, Anil Kumar Singh:
Finding of Review Spam through "Corleone, Review Genre, Writing Style and Review Text Detail Features". 23:1-23:6 - Ganga Rama Koteswara Rao, R. Satya Prasad, M. Ramesh:
Neutralizing Cross-Site Scripting Attacks Using Open Source Technologies. 24:1-24:6 - Hamzah Ali Abdulrahman Qasem, Ash Mohammad Abbas:
MoveRL: A Movement Region Based Location Discovery Protocol for Wireless Sensor Networks. 24:1-24:6 - Sugandha Rathi, Rishi Soni, Virendra Singh Kushwah:
A New Algorithm for Privacy Preservation in Utility Mining Using Genetic Algorithm. 25:1-25:6 - Praveen Gupta, Pratosh Bansal:
A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks. 25:1-25:5 - K. H. Walse, Rajiv V. Dharaskar, Vilas M. Thakare:
Performance Evaluation of Classifiers on WISDM Dataset for Human Activity Recognition. 26:1-26:7 - Smita Jhajharia, Seema Verma, Rajesh Kumar:
Predictive Analytics for Breast Cancer Survivability: A Comparison of Five Predictive Models. 26:1-26:5 - Varun Prabahkar, Annapurna Singh, Ram Shringar Raw:
Hop Count Analysis of IE-DIR Protocol for VANETs in Wider City Traffic Scenario. 27:1-27:5 - M. Prakash, C. J. KavithaPriya:
An Analysis of Types of Protocol Implemented in Internet of Things Based on Packet Loss Ratio. 27:1-27:6 - Kamlesh Kumari, V. K. Shrivastava:
A Review of Automatic Signature Verification. 28:1-28:5 - Bela Shah, Kinjal Dave:
SIP Based Intrusion Detection System for VoIP based Applications. 28:1-28:5 - Rupali Bhardwaj:
Multimedia Security through LSB Matching. 29:1-29:5 - Richa Mudgal, Rohit Gupta:
An Efficient Approach for Wormhole detection in MANET. 29:1-29:6 - Theyazn H. H. Aldhyani, Manish R. Joshi:
An Integrated Model for Prediction of Loading Packets in Network Traffic. 30:1-30:6 - Himanshi Yaduwanshi, Vijaya Padmadas:
Finding Similar Classes in Ontologies. 30:1-30:5 - Ashka Shastri, Jignesh Joshi:
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention. 31:1-31:4 - Rachana V. Mahule, Chitra A. Dhawale:
An Analytical Study of "Digital Image Watermarking in Frequency Domain". 31:1-31:6 - Sachin Sharma, Shaveta Bhatia:
Analysis of Association rule in Data Mining. 32:1-32:4 - Naveen Kumar, Jaya Kumar, Rishikesh B. Salunkhe, Aniket D. Kadam:
A Scalable Record Retrieval Methodology Using Relational Keyword Search System. 32:1-32:6 - Prateek Srivastava, Akhilesh Sharma:
Rigorous Design of Moving Sequencer Atomic Broadcast in Distributed Systems. 33:1-33:6 - Waris Hooda, Pradeep Kumar Yadav, Amogh Bhole, Deptii D. Chaudhari:
An Image Processing Approach to Intelligent Traffic Management System. 33:1-33:5 - Biswajit Tripathy:
A Critical Analysis of the Cyber Contract Using Electronic Mail. 34:1-34:6 - Asra Aslam, Mohammad Samar Ansari, Shikha Varshney:
Non-Partitioning Merge-Sort: Performance Enhancement by Elimination of Division in Divide-and-Conquer Algorithm. 34:1-34:6 - Shrey Sethi, Vidushi Singhal:
ICTS2016-SS27-07: A Peek into Web Applications Security. 35:1-35:3 - Yogendra Gupta, Lava Bhargava:
Reinforcement Learning based Routing for Cognitive Network on Chip. 35:1-35:3 - Robin Swamy, Vidushi Singhal:
Wi-MAX: Connecting People. 36:1-36:7 - Nishtha Jatana, Bharti Suri, Prateek Kumar, Bimlesh Wadhwa:
Test Suite Reduction by Mutation Testing Mapped to Set Cover Problem. 36:1-36:6 - Kunal Relan, Vidushi Singhal:
Pentest Ninja: XSS And SQLi Takeover Tool. 37:1-37:2 - Shrikant S. Akole, Vinayak B. Kulkarni:
Thermal Analysis of Active Electronic Component with Thermal Imaging. 37:1-37:6 - Tanweer Alam, Mohammed Aljohani:
Design a New Middleware for Communication in Ad Hoc Network of Android Smart Devices. 38:1-38:6 - Thanveer Jahan, Gugulothu Narsimha, C. V. Guru Rao:
Multiplicative Data Perturbation Using Fuzzy Logic in Preserving Privacy. 38:1-38:5 - Gourav Vyas, Loveleen Gaur, Gurinder Singh:
Evolution of Payments Bank and Impact From M-PESA: A Case of Mobile Banking Services in India. 39:1-39:4 - P. Mahesha, D. S. Vinod:
Automatic Segmentation and Classification of Dysfluencies in Stuttering Speech. 39:1-39:6 - Shabina Dhuria, Harmunish Taneja, Kavita Taneja:
An optimal approach for extraction of Web Contents using Semantic Web framework. 40:1-40:5 - Dharavath Ramesh, Rahul Mishra, Shankar Nayak Bhukya:
Cha-Cha 20: Stream Cipher Based Encryption for Cloud Data Centre. 40:1-40:6 - P. Vigneswara Ilavarasan, Han Ei Chew:
A Toolkit on Mobile Apps for Business Growth: Insights from Design and Development. 41:1-41:5 - Rachita Misra, Bijayalaxmi Panda, Mayank Tiwary:
Big data and ICT applications: A study. 41:1-41:6 - Mit Shah, Dhruvesh Parikh, Bharat Deshpande:
Movie Recommendation System Employing Latent Graph Features in Extremely Randomized Trees. 42:1-42:4 - Sushruta Mishra, Pamela Chaudhury, Brojo Kishore Mishra, Hrudaya Kumar Tripathy:
An implementation of Feature ranking using Machine learning techniques for Diabetes disease prediction. 42:1-42:3 - Sunita Chaudhary, Meenu Dave, Amit Sanghi, Jaideep Manocha:
An Elucidation on Steganography and Cryptography. 43:1-43:6 - R. S. Uppal, Shakti Kumar:
Dynamic Deployment of Wireless Sensor Network using PBB-BC Algorithm. 43:1-43:6 - Bhagwan Sahay Meena, K. Hemachandran, Shaine Hussain Laskar:
A Study on effects of multi-dimension reduction on Three-Dimensional wireless sensor network localization. 44:1-44:6 - Sunil More, Mininath Nighot:
AgroSearch: A Web Based Search Tool for Pomegranate Diseases and Pests Detection Using Image Processing. 44:1-44:6 - Loveleen Gaur, Gurinder Singh, Jeyta, Shubhankar Kumar:
Google Analytics: A Tool to make websites more Robust. 45:1-45:7 - S. Venugopalan, M. V. Srinath, Paul Rodrigues:
Recommender System for E-Learning through Content and Profile Based Approach. 45:1-45:5 - Ram Shringar Raw, Loveleen, Arvind Kumar, Arushi Kadam, Nanhay Singh:
Analysis of Message Propagation for Intelligent Disaster Management through Vehicular Cloud Network. 46:1-46:5 - Subit K. Jain, Rajendra K. Ray:
An Alternative Framework of Anisotropic Diffusion for Image Denoising. 46:1-46:6 - Lahar Singh Nishad, Akriti, Jaya Paliwal, Roli Pandey, Sumitra Beniwal, Sarvesh Kumar:
Security, Privacy Issues and challenges In Cloud Computing: A Survey. 47:1-47:7 - Tej Bahadur Chandra, Pushpak Verma, A. K. Dwivedi:
Operating Systems for Internet of Things: A Comparative Study. 47:1-47:6 - Manisha Jailia, Ashok Kumar, Himani Singhal, Manisha Agarwal:
Development and Performance Analysis of Cloud and MVC Based Web application. 48:1-48:5 - Deepak Prashar, Dilip Kumar, Kiran Jyoti:
Performance Analysis of Secure Localization Techniques in Wireless Sensor Network. 48:1-48:7 - Amol Prataprao Bhatkar, Govind Ukhandrao Kharat:
FFT based detection of Diabetic Retinopathy in Fundus Retinal Images. 49:1-49:5 - Padma Prasada, Sathisha, H. D. Ranjith:
90nm Node 1T Floating Gate Embedded Flash Memory with Precharge NMOS Transistor. 49:1-49:5 - Supantha Das, Indrajit Banerjee, Mainak Chatterjee, Tuhina Samanta:
Adaptive Slot Sharing based TDMA Technique for Routing in an Obstructed Wireless Sensor Network. 50:1-50:6 - Chinta Someswara Rao, S. Viswanadha Raju:
A Novel Multi Pattern String Matching Algorithm with While Shift. 50:1-50:5 - Dhanashree Toradmalle, Kumudhan Cherarajan, Mayur Shedage, Nitesh Dogra, Sanket Gawde:
A Secure Protocol for Trust Management in OLSR. 51:1-51:4 - Poonam Sharma, Saloni Sharma, Ayush Goyal:
An MSE (mean square error) based analysis of deconvolution techniques used for deblurring/restoration of MRI and CT Images. 51:1-51:5 - Mugdha Sharma, Laxmi Ahuja:
A Novel and Integrated Semantic Recommendation System for E-Learning using Ontology. 52:1-52:5 - Saurabh Maheshwari, Surbhi Heda:
A Review on Crowd Behavior Analysis Methods for Video Surveillance. 52:1-52:5 - Nisheeth Joshi, Iti Mathur, Hemant Darbari, Ajai Kumar:
Quality Estimation of English-Hindi Machine Translation Systems. 53:1-53:5 - Ashwini Shewale, Nayan Waghmare, Anuja Sonawane, Utkarsha Teke:
High Performance Computation Analysis for Medical Images using High Computational Methods. 53:1-53:6 - Ajai Kumar, Iti Mathur, Hemant Darbari, G. N. Purohit, Nisheeth Joshi:
Implications of Supervised Learning on Word Sense Disambiguation for Hindi. 54:1-54:5 - A. Joy Christy, S. Hari Ganesh:
Performance Based Analysis of Novel Equilin Clustering. 54:1-54:5 - Iti Mathur, Nisheeth Joshi, Hemant Darbari, Ajai Kumar:
Automatic Evaluation of Ontology Matchers. 55:1-55:6 - Binay Kumar, Sadanand Yadav:
Storageless Credentials And Secure Login. 55:1-55:6 - Vaishali Gupta, Nisheeth Joshi, Iti Mathur:
POS tagger for Urdu using Stochastic approaches. 56:1-56:5 - Sreelakshmi Gopal, Rosna P. Haroon:
Word Sense Disambiguation on Dravidian Languages: A Survey. 56:1-56:5 - Anila Dhingra, Varsha Joshi:
Low Noise Rim Preserving Filter. 57:1-57:6 - Narander Kumar, Pooja Patel:
Resource Management using Feed Forward ANN-PSO in Cloud Computing Environment. 57:1-57:6 - Vikram Singh Chauhan, Sarika Khandelwal, Saurabh Maheshwari:
Artificial Multimodal Vein Biometric Template Creation for Enhanced Security. 58:1-58:5 - Rachita Gupta:
Food Security and Safety using advanced Information and Communication Technologies (ICTs). 58:1-58:5 - Ranjit Kumar Behera, K. Hemant Kumar Reddy, Diptendu Sinha Roy:
Reliability Assessment of Energy Monitoring Service for a Futuristic Smart City. 59:1-59:6 - T. A. Shaharban, Rosna P. Haroon:
A Study On Malayalam Machine Translation. 59:1-59:6 - B. Balamurugan, Anil Skariah, Ganapathi Nalinipriya, K. G. Maheswari, Malathi V.:
Acceleration of Bullet Physics Physical Simulation Library Using GPU and Demonstration on a Set-Top Box Platform. 60:1-60:4 - Shubhangi Sapkal, Ratnadeep R. Deshmukh:
Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment. 60:1-60:6 - Ritambhra Korpal, Saugata Bose:
A Framework for Detecting External Plagiarism from Monolingual Documents: Use of Shallow NLP and N-gram Frequency Comparison. 61:1-61:7