Das, Vinu V
Information Processing and Management
1. SVD and Neural Network Based Watermarking Scheme
Swanirbhar Majumder, Tirtha Shankar Das, Vijay H. Mankar, Subir K. Sarkar
2. Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms
Akshi Kumar, M. P. S. Bhatia
3. Network Management Initialization for Wired and Wireless Communication: A Real Time Study
Navneet Tiwari, Siddarth Jain, Saifuddin A. Tariwala, Ankit Salgia
4. IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network
J. Gnana Jayanthi, S. Albert Rabara
5. An Efficient Multicast Hybrid Routing Protocol for MANETs
Srinivas Sethi, Siba K. Udgata
6. Applications of Graph Theory in Face Biometrics
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
7. Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map
Anil Kumar, M. K. Ghose
8. Hybrid Activities of AODV for Wireless Ad hoc Sensor Network
Srinivas Sethi, Ashima Rout, Dipti Mohanta, Aayush Behera, Manmath N. Sahoo
9. Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm
Shatha J. Kadhim, Kasim M. Al-Aubidy
10. Object Location in Cluster Based Mobile Ad Hoc Networks
Prasad Naik Hamsavath, G. V. Singh, Sanjay K. Dhurandher
11. Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications
Alok Joshi, Davinder S. Saini
12. Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks
Davinder S. Saini, Vipin Balyan, Kanika Mittal, Mansi Saini, Manika Kishore
13. A Closed Form Slew Evaluation Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects
Rajib Kar, Vikas Maheshwari, Md. Maqbool, A. K. Mal, A. K. Bhattacharjee
14. Wavelet-Domain
K. Srinivasan, M. Ramasubba Reddy
15. Fuzzy Based Bandwidth Management for Wireless Multimedia Networks
J. D. Mallapur, Syed Abidhusain, Soumya S. Vastrad, Ajaykumar C. Katageri
16. A Novel Digital Algorithm for Sobel Edge Detection
Jagadish H. Pujar, D. S. Shambhavi
17. Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison
B. Kavitha, S. Karthikeyan, B. Chitra
18. Recognition of Isolated Indian Sign Language Gesture in Real Time
Anup Nandy, Jay Shankar Prasad, Soumik Mondal, Pavan Chakraborty, G. C. Nandi
19. Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors
Megalingam Rajesh Kannan, M. Arunkumar, V. Arjun Ashok, Krishnan Nived, C. J. Daniel
20. Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor
Megalingam Rajesh Kannan, K. B. Deepu, Joseph P. Iype, Ravishankar Parthasarathy, Popuri Gautham
21. Role of Resolution in Noisy Pattern Matching
Alex Pappachen James, Sima Dimitrijev
22. Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security
V. Ruckmani, G. Sudha Sadasivam
23. Bandwidth Estimation Scheme for Mobile Adhoc Network
Deepak Vidhate, Anita Patil, Supriya Sarkar
24. Multimodal Biometric Invariant Moment Fusion Authentication System
P. Viswanathan, P. Venkata Krishna, S. Hariharan
25. Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography
Anjali Naik, Shubhangi Vinayak Tikhe, S. D. Bhide
26. Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images
Bikesh Kr. Singh, G. R. Sinha, Imroze Khan
27. Vector Quantization for Tumor Demarcation of Mammograms
H. B. Kekre, Tanuja K. Sarode, Saylee M. Gharge
28. Selective Encryption of Video Using Multiple Chaotic Maps
L. M. Varalakshmi, G. Florence Sudha
29. Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks
Neeta S. Bosamiya, Devesh C. Jinwala
30. Tracking Based Secure AODV Routing Protocol
Parma Nand, S. C. Sharma, Rani Astya
31. Study of Visitor Behavior by Web Usage Mining
V. V. R. Maheswara Rao, V. Valli Kumari, K. V. S. V. N. Raju
32. A Hybrid Routing Protocol for Wireless Sensor Network
N. Sengottaiyan, Rm. Somasundaram, Balasubramanie
33. Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring
D. V. Naga Raju, V. Valli Kumari, K. V. S. V. N. Raju
34. Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks
A. K. Dwivedi, V. K. Patle, O. P. Vyas
35. A Novel Multipath Routing Scheme in Mobile Adhoc Networks
N. Jaisankar, R. Saravanan, K. Durai Swamy
36. A Novel Security Approach for Detecting Black Hole Attack in MANET
N. Jaisankar, R. Saravanan, K. Durai Swamy
37. NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database
Neera Batra, A. K. Kapil
38. A Secure e-Shopping Using Voice Ordering
Saroj Kumar Panigrahy, Debasish Jena, Sanjay Kumar Jena
39. Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model
Manoj Kr. Dutta, V. K. Chaubey
40. A Concurrent Synchronization Model for Distributed Multimedia Systems
Janani Arthanari, A. Kannan
41. Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS
Rajneesh Gujral, Anil Kapil
42. A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System
Shakti Mishra, D. S. Kushwaha, A. K. Misra
43. An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine
Divya Mohandass, J. Janet
44. Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata
Abhishek Ray, Debasis Das
45. Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network
Dhaval K. Patel, S. K. Shah, Minesh P. Thaker
46. Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks
Deepali Virmani, Satbir Jain
47. A Cryptographic Approach to Defend against IP Spoofing
Mangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan
48. Multi-agent Based Network Performance Tuning in Grid
C. Valliyammai, S. Thamarai Selvi, R. Satheesh Kumar, E. Pradeep, K. Naveen
49. Finding Discriminative Weighted Sub-graphs to Identify Software Bugs
Saeed Parsa, Somaye Arabi, Neda Ebrahimi, Mojtaba Vahidi-Asl
50. Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information
Manoj V. N. Vadakkepalisseri, K. Chandrashekaran
51. Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures
Balachandra, K. V. Prema
52. Iris Recognition Technique Using Gaussian Pyramid Compression
G. Savithiri, A. Murugan
53. Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN
Leena Arya, S. C. Sharma, Millie Pant
54. Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks
Devaraju Suganya Devi, Ganapathi Padmavathi
55. An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid
P. Varalakshmi, M. Nandini, K. Krithika, R. Aarthi
56. Reactive Network Monitor for DDoS Attacks
P. Varalakshmi, P. Karthik Narayanan, M. Hariharan, P. Nagaraj, K. Amritha
57. Statistical Method for English to Kannada Transliteration
P. J. Antony, V. P. Ajith, K. P. Soman
58. RIFMAS: River Flow Management System Using Wireless Sensing Agents
R. B. Patel, Deepika Jain, Bhanu Kaushik
59. Finite Element Approach to Radial Heat Flow in Human Dermal Tissues
Neha Jain
60. An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas
Sajal Mukhopadhyay, Roshan Kumar Singh, D. Ghosh, Jaya Bhattacharjee, Nivedita Mukherjee
61. Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA
M. Selvanayaki, M. S. Vijaya, K. S. Jamuna, S. Karpagavalli
62. Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback
K. Latha, R. Manivelu
63. Challenges in Segmentation of Text in Handwritten Gurmukhi Script
K. Sharma Rajiv, S. Dhiman Amardeep
64. Exploring the Contrasts of VoIP Phone Services
Bala Dhandayuthapani Veerasamy
65. Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET’S
Shaily Mittal, Prabhjot Kaur
66. Impact Factor of E - Learning: Using Secondary Education Case Study
Tamanna Siddiqui, Munior Ahmad Wani
67. Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology
Sanchit Gupta, Himanshu Gahlot, Varun Gupta, Banshi Dhar Chaudhary
68. A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System
Chandrashekar M. Patil, Sudarshan Patilkulkarni
69. Binary Data Compression Using Medial Axis Transform Algorithm
Jagadish H. Pujar, Pallavi S. Gurjal
70. Internet Usage Monitoring for Crime Detection
Sandeep A. Thorat, Samadhan R. Manore
71. Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition
S. Gunasekaran, K. Revathy
72. Defending against Node Misbehavior to Discover Secure Route in OLSR
Sanjeev Rana, Anil Kapil
73. SIMBIC: SIMilarity Based BIClustering of Expression Data
J. Bagyamani, K. Thangavel
74. An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System
Neera Batra, A. K. Kapil
75. Automatic Incorporation of Corrections into Reviewed Documents
D. S. Guru, B. Vijaya Kumari, S. K. Lathamba
76. Performance Comparison of Multicast Routing Protocols for MANETs
Maya Mohan, S. Mary Saira Bhanu
77. Traffic Aware LSP Selection Method in MPLS Networks
Ravindra Kumar Singh, Kanak Saxena, Reena Singh
78. Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks
R. S. Ambili Chandran, S. Mary Saira Bhanu
79. Energy and Fault Aware Management Framework for Wireless Sensor Network
V. R. Sarma Dhulipala, V. Aarthy, RM. Chandrasekaran
80. An Image Index Model for Retrieval
B. Janet, A. V. Reddy, S. Domnic
81. Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet
N. Bhalaji, Alok V. Kanakeri, Krishna P. Chaitanya, A. Shanmugam
82. Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns
S. Selvakumar, M. R. C. Dinesh, C. Dhineshkumar, N. Ramaraj
83. Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks
Sahil Seth, Anil Gankotiya, Gurdit Singh, Vishal Kumar, Amit Kumar Jaiswal
84. Separation of Machine Printed Roman and Gurmukhi Script Words
Dharamveer Sharma
85. FPGA Implementation of AES Co-processor in Counter Mode
Balwinder Singh, Harpreet Kaur, Himanshu Monga
86. Detecting Plagiarism in Text Documents
Shanmugasundaram Hariharan, Sirajudeen Kamal, Abdul Vadud Mohamed Faisal, Sheik Mohamed Azharudheen, Bhaskaran Raman
87. Hiding Relevant Information in an Image
Madhusmita Das, Mahamaya Mohanty
88. Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques
G. Shiva Prasad, N. V. Subba Reddy, U. Dinesh Acharya
89. Context-Aware System Using .NET Approach
Arun Mishra, Bikash Tiwari, J. S. R. Kartik, Arun Kumar Misra
90. Genetic Audio Watermarking
Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo
91. Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure
Keyur N. Upadhyay, Hemant D. Vasava, Viral V. Kapadia
92. Natural Disaster Impact Assessment Using Genetic Algorithm
N. Bhalaji, Nandini Sundara Raman
93. An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition
C. M. Patil, Sudarshan Patilkulkarni
94. A Framework for Priority-Based Inter Vehicle Communication for Highway Safety
A. Kumar, R. K. Chauhan, Rajan Vohra
95. Data Compression on Embedded System
P. S. Revankar, Vijay B. Patil, W. Z. Gandhare
96. A Survey on Preserving Privacy for Sensitive Association Rules in Databases
Chirag Modi, U. P. Rao, Dhiren R. Patel
97. Boon and Bane of Curvelet Transform
G. Geetha, V. Ragavi, K. Thamizhchelvy, K. Mariappan, V. Lalitha, S. Shanmuga Priya
98. Security in High Performance Computing
Urvashi Chugh, Amit Chugh
99. Trust Worthy Architecture for Mobile Ad Hoc Network Environment
V. R. Sarma Dhulipala, B. Vishnu Prabha, RM. Chandrasekaran
100. A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks
V. R. Sarma Dhulipala, K. Kavitha, RM. Chandrasekaran
101. Security Solutions to the Phishing: Transactions Based on Security Questions and Image
Aruna Kumari Devarakonda, Prasamsa Tummala, Indra Praveen Sandrala
102. CloneManager: A Tool for Detection of Type1 and Type2 Code Clones
E. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, B. Vijaya Saranya
103. Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification
Dharamveer Sharma, Bibanjot Kaur
104. An Analysis to BER Performances of Differential OFDM Systems
Kaur Inderjeet
105. MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions
S. Britto R Kumar, S. Albert Rabara
106. Team Automata Based Framework for Spatio-Temporal RBAC Model
N. Jaisankar, S. Veeramalai, A. Kannan
107. Knowledge Discovery in Feedback System Using Pixel Oriented Technique
Malay Bhatt, Rituraj Jain, C. K. Bhensdadia
108. Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level
N. K. Shukla, Shilpi Birla, R. K. Singh
109. Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks
Mamatha Balachandra, K. V. Prema
110. Design Issues for Replacing Credit Card on Mobile Phone
Sukhwant Kaur, H. K. Kaura, Mritunjay Ojha
111. Unknown Key Share Attack on STPKE’ Protocol
R. Padmavathy, Chakravarthy Bhagvati
112. An Effective SOA Model for Developing Efficient Systems
Sasmita Pani, Mahamaya Mohanty
113. Refactoring Interprocedural Dynamic Slicing for Handling Pointers
Santosh Kumar Pani, Priya Arundhati, Mahamaya Mohanty
114. Image Segmentaion and Steganography for Secured Information Transmission
Mamta Juneja, Parvinder Singh Sandhu
115. Ant System Embedded with Local Search for Solving Facility Layout Problem
Surya Prakash Singh
116. Strategic Initiatives and Automated Decision Support with ERP System Environment
Asim Gopal Barman, Ranjan Bhattacharya, Sudip Kumar Deb
117. A Case Study of Strategic Design Management
Fumihiko Isada
118. The Effects of Mannequins on Consumers’ Perception and Shopping Attitude
N. Anitha, C. Selvaraj
119. Knowledge Transfer: Do Instructor Characteristics Matter?
Jaya Chitranshi, Shailja Agarwal
120. Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem
Priyanka Verma, R. R. K. Sharma
121. CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment
Ritu Sinha, Chandrashekhar Kaushik
122. HR Roadmap: Becoming a Strategic Business Partner
Shweta Maheshwari
123. Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra
J. S. Kadam, J. J. Nirmal, M. Y. Khire
Keywords: Computer Science, Information Systems Applications (incl.Internet), Software Engineering, Computers and Society, Computer Communication Networks, Management of Computing and Information Systems, Information Storage and Retrieval
- Author(s)
- Das, Vinu V
- Debnath, Narayan C.
- Gaol, Ford Lumban
- Meghanathan, Natarajan
- Sankaranarayanan, Suresh
- Stephen, Janahanlal
- Thankachan, Nessy
- Thankachan, P. M.
- Vijayakumar, R.
- Publisher
- Springer
- Publication year
- 2010
- Language
- en
- Edition
- 1
- Series
- Communications in Computer and Information Science
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783642122149