Login

Das, Vinu V

Information Processing and Management

Das, Vinu V - Information Processing and Management, ebook

110,40€

Ebook, PDF with Adobe DRM
ISBN: 9783642122149
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. SVD and Neural Network Based Watermarking Scheme
Swanirbhar Majumder, Tirtha Shankar Das, Vijay H. Mankar, Subir K. Sarkar

2. Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms
Akshi Kumar, M. P. S. Bhatia

3. Network Management Initialization for Wired and Wireless Communication: A Real Time Study
Navneet Tiwari, Siddarth Jain, Saifuddin A. Tariwala, Ankit Salgia

4. IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network
J. Gnana Jayanthi, S. Albert Rabara

5. An Efficient Multicast Hybrid Routing Protocol for MANETs
Srinivas Sethi, Siba K. Udgata

6. Applications of Graph Theory in Face Biometrics
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

7. Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map
Anil Kumar, M. K. Ghose

8. Hybrid Activities of AODV for Wireless Ad hoc Sensor Network
Srinivas Sethi, Ashima Rout, Dipti Mohanta, Aayush Behera, Manmath N. Sahoo

9. Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm
Shatha J. Kadhim, Kasim M. Al-Aubidy

10. Object Location in Cluster Based Mobile Ad Hoc Networks
Prasad Naik Hamsavath, G. V. Singh, Sanjay K. Dhurandher

11. Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications
Alok Joshi, Davinder S. Saini

12. Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks
Davinder S. Saini, Vipin Balyan, Kanika Mittal, Mansi Saini, Manika Kishore

13. A Closed Form Slew Evaluation Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects
Rajib Kar, Vikas Maheshwari, Md. Maqbool, A. K. Mal, A. K. Bhattacharjee

14. Wavelet-Domain L
 ∞ -Constrained Two-Stage Near-Lossless EEG Coder
K. Srinivasan, M. Ramasubba Reddy

15. Fuzzy Based Bandwidth Management for Wireless Multimedia Networks
J. D. Mallapur, Syed Abidhusain, Soumya S. Vastrad, Ajaykumar C. Katageri

16. A Novel Digital Algorithm for Sobel Edge Detection
Jagadish H. Pujar, D. S. Shambhavi

17. Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison
B. Kavitha, S. Karthikeyan, B. Chitra

18. Recognition of Isolated Indian Sign Language Gesture in Real Time
Anup Nandy, Jay Shankar Prasad, Soumik Mondal, Pavan Chakraborty, G. C. Nandi

19. Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors
Megalingam Rajesh Kannan, M. Arunkumar, V. Arjun Ashok, Krishnan Nived, C. J. Daniel

20. Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor
Megalingam Rajesh Kannan, K. B. Deepu, Joseph P. Iype, Ravishankar Parthasarathy, Popuri Gautham

21. Role of Resolution in Noisy Pattern Matching
Alex Pappachen James, Sima Dimitrijev

22. Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security
V. Ruckmani, G. Sudha Sadasivam

23. Bandwidth Estimation Scheme for Mobile Adhoc Network
Deepak Vidhate, Anita Patil, Supriya Sarkar

24. Multimodal Biometric Invariant Moment Fusion Authentication System
P. Viswanathan, P. Venkata Krishna, S. Hariharan

25. Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography
Anjali Naik, Shubhangi Vinayak Tikhe, S. D. Bhide

26. Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images
Bikesh Kr. Singh, G. R. Sinha, Imroze Khan

27. Vector Quantization for Tumor Demarcation of Mammograms
H. B. Kekre, Tanuja K. Sarode, Saylee M. Gharge

28. Selective Encryption of Video Using Multiple Chaotic Maps
L. M. Varalakshmi, G. Florence Sudha

29. Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks
Neeta S. Bosamiya, Devesh C. Jinwala

30. Tracking Based Secure AODV Routing Protocol
Parma Nand, S. C. Sharma, Rani Astya

31. Study of Visitor Behavior by Web Usage Mining
V. V. R. Maheswara Rao, V. Valli Kumari, K. V. S. V. N. Raju

32. A Hybrid Routing Protocol for Wireless Sensor Network
N. Sengottaiyan, Rm. Somasundaram, Balasubramanie

33. Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring
D. V. Naga Raju, V. Valli Kumari, K. V. S. V. N. Raju

34. Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks
A. K. Dwivedi, V. K. Patle, O. P. Vyas

35. A Novel Multipath Routing Scheme in Mobile Adhoc Networks
N. Jaisankar, R. Saravanan, K. Durai Swamy

36. A Novel Security Approach for Detecting Black Hole Attack in MANET
N. Jaisankar, R. Saravanan, K. Durai Swamy

37. NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database
Neera Batra, A. K. Kapil

38. A Secure e-Shopping Using Voice Ordering
Saroj Kumar Panigrahy, Debasish Jena, Sanjay Kumar Jena

39. Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model
Manoj Kr. Dutta, V. K. Chaubey

40. A Concurrent Synchronization Model for Distributed Multimedia Systems
Janani Arthanari, A. Kannan

41. Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS
Rajneesh Gujral, Anil Kapil

42. A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System
Shakti Mishra, D. S. Kushwaha, A. K. Misra

43. An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine
Divya Mohandass, J. Janet

44. Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata
Abhishek Ray, Debasis Das

45. Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network
Dhaval K. Patel, S. K. Shah, Minesh P. Thaker

46. Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks
Deepali Virmani, Satbir Jain

47. A Cryptographic Approach to Defend against IP Spoofing
Mangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan

48. Multi-agent Based Network Performance Tuning in Grid
C. Valliyammai, S. Thamarai Selvi, R. Satheesh Kumar, E. Pradeep, K. Naveen

49. Finding Discriminative Weighted Sub-graphs to Identify Software Bugs
Saeed Parsa, Somaye Arabi, Neda Ebrahimi, Mojtaba Vahidi-Asl

50. Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information
Manoj V. N. Vadakkepalisseri, K. Chandrashekaran

51. Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures
Balachandra, K. V. Prema

52. Iris Recognition Technique Using Gaussian Pyramid Compression
G. Savithiri, A. Murugan

53. Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN
Leena Arya, S. C. Sharma, Millie Pant

54. Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks
Devaraju Suganya Devi, Ganapathi Padmavathi

55. An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid
P. Varalakshmi, M. Nandini, K. Krithika, R. Aarthi

56. Reactive Network Monitor for DDoS Attacks
P. Varalakshmi, P. Karthik Narayanan, M. Hariharan, P. Nagaraj, K. Amritha

57. Statistical Method for English to Kannada Transliteration
P. J. Antony, V. P. Ajith, K. P. Soman

58. RIFMAS: River Flow Management System Using Wireless Sensing Agents
R. B. Patel, Deepika Jain, Bhanu Kaushik

59. Finite Element Approach to Radial Heat Flow in Human Dermal Tissues
Neha Jain

60. An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas
Sajal Mukhopadhyay, Roshan Kumar Singh, D. Ghosh, Jaya Bhattacharjee, Nivedita Mukherjee

61. Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA
M. Selvanayaki, M. S. Vijaya, K. S. Jamuna, S. Karpagavalli

62. Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback
K. Latha, R. Manivelu

63. Challenges in Segmentation of Text in Handwritten Gurmukhi Script
K. Sharma Rajiv, S. Dhiman Amardeep

64. Exploring the Contrasts of VoIP Phone Services
Bala Dhandayuthapani Veerasamy

65. Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET’S
Shaily Mittal, Prabhjot Kaur

66. Impact Factor of E - Learning: Using Secondary Education Case Study
Tamanna Siddiqui, Munior Ahmad Wani

67. Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology
Sanchit Gupta, Himanshu Gahlot, Varun Gupta, Banshi Dhar Chaudhary

68. A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System
Chandrashekar M. Patil, Sudarshan Patilkulkarni

69. Binary Data Compression Using Medial Axis Transform Algorithm
Jagadish H. Pujar, Pallavi S. Gurjal

70. Internet Usage Monitoring for Crime Detection
Sandeep A. Thorat, Samadhan R. Manore

71. Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition
S. Gunasekaran, K. Revathy

72. Defending against Node Misbehavior to Discover Secure Route in OLSR
Sanjeev Rana, Anil Kapil

73. SIMBIC: SIMilarity Based BIClustering of Expression Data
J. Bagyamani, K. Thangavel

74. An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System
Neera Batra, A. K. Kapil

75. Automatic Incorporation of Corrections into Reviewed Documents
D. S. Guru, B. Vijaya Kumari, S. K. Lathamba

76. Performance Comparison of Multicast Routing Protocols for MANETs
Maya Mohan, S. Mary Saira Bhanu

77. Traffic Aware LSP Selection Method in MPLS Networks
Ravindra Kumar Singh, Kanak Saxena, Reena Singh

78. Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks
R. S. Ambili Chandran, S. Mary Saira Bhanu

79. Energy and Fault Aware Management Framework for Wireless Sensor Network
V. R. Sarma Dhulipala, V. Aarthy, RM. Chandrasekaran

80. An Image Index Model for Retrieval
B. Janet, A. V. Reddy, S. Domnic

81. Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet
N. Bhalaji, Alok V. Kanakeri, Krishna P. Chaitanya, A. Shanmugam

82. Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns
S. Selvakumar, M. R. C. Dinesh, C. Dhineshkumar, N. Ramaraj

83. Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks
Sahil Seth, Anil Gankotiya, Gurdit Singh, Vishal Kumar, Amit Kumar Jaiswal

84. Separation of Machine Printed Roman and Gurmukhi Script Words
Dharamveer Sharma

85. FPGA Implementation of AES Co-processor in Counter Mode
Balwinder Singh, Harpreet Kaur, Himanshu Monga

86. Detecting Plagiarism in Text Documents
Shanmugasundaram Hariharan, Sirajudeen Kamal, Abdul Vadud Mohamed Faisal, Sheik Mohamed Azharudheen, Bhaskaran Raman

87. Hiding Relevant Information in an Image
Madhusmita Das, Mahamaya Mohanty

88. Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques
G. Shiva Prasad, N. V. Subba Reddy, U. Dinesh Acharya

89. Context-Aware System Using .NET Approach
Arun Mishra, Bikash Tiwari, J. S. R. Kartik, Arun Kumar Misra

90. Genetic Audio Watermarking
Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo

91. Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure
Keyur N. Upadhyay, Hemant D. Vasava, Viral V. Kapadia

92. Natural Disaster Impact Assessment Using Genetic Algorithm
N. Bhalaji, Nandini Sundara Raman

93. An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition
C. M. Patil, Sudarshan Patilkulkarni

94. A Framework for Priority-Based Inter Vehicle Communication for Highway Safety
A. Kumar, R. K. Chauhan, Rajan Vohra

95. Data Compression on Embedded System
P. S. Revankar, Vijay B. Patil, W. Z. Gandhare

96. A Survey on Preserving Privacy for Sensitive Association Rules in Databases
Chirag Modi, U. P. Rao, Dhiren R. Patel

97. Boon and Bane of Curvelet Transform
G. Geetha, V. Ragavi, K. Thamizhchelvy, K. Mariappan, V. Lalitha, S. Shanmuga Priya

98. Security in High Performance Computing
Urvashi Chugh, Amit Chugh

99. Trust Worthy Architecture for Mobile Ad Hoc Network Environment
V. R. Sarma Dhulipala, B. Vishnu Prabha, RM. Chandrasekaran

100. A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks
V. R. Sarma Dhulipala, K. Kavitha, RM. Chandrasekaran

101. Security Solutions to the Phishing: Transactions Based on Security Questions and Image
Aruna Kumari Devarakonda, Prasamsa Tummala, Indra Praveen Sandrala

102. CloneManager: A Tool for Detection of Type1 and Type2 Code Clones
E. Kodhai, S. Kanmani, A. Kamatchi, R. Radhika, B. Vijaya Saranya

103. Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification
Dharamveer Sharma, Bibanjot Kaur

104. An Analysis to BER Performances of Differential OFDM Systems
Kaur Inderjeet

105. MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions
S. Britto R Kumar, S. Albert Rabara

106. Team Automata Based Framework for Spatio-Temporal RBAC Model
N. Jaisankar, S. Veeramalai, A. Kannan

107. Knowledge Discovery in Feedback System Using Pixel Oriented Technique
Malay Bhatt, Rituraj Jain, C. K. Bhensdadia

108. Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level
N. K. Shukla, Shilpi Birla, R. K. Singh

109. Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks
Mamatha Balachandra, K. V. Prema

110. Design Issues for Replacing Credit Card on Mobile Phone
Sukhwant Kaur, H. K. Kaura, Mritunjay Ojha

111. Unknown Key Share Attack on STPKE’ Protocol
R. Padmavathy, Chakravarthy Bhagvati

112. An Effective SOA Model for Developing Efficient Systems
Sasmita Pani, Mahamaya Mohanty

113. Refactoring Interprocedural Dynamic Slicing for Handling Pointers
Santosh Kumar Pani, Priya Arundhati, Mahamaya Mohanty

114. Image Segmentaion and Steganography for Secured Information Transmission
Mamta Juneja, Parvinder Singh Sandhu

115. Ant System Embedded with Local Search for Solving Facility Layout Problem
Surya Prakash Singh

116. Strategic Initiatives and Automated Decision Support with ERP System Environment
Asim Gopal Barman, Ranjan Bhattacharya, Sudip Kumar Deb

117. A Case Study of Strategic Design Management
Fumihiko Isada

118. The Effects of Mannequins on Consumers’ Perception and Shopping Attitude
N. Anitha, C. Selvaraj

119. Knowledge Transfer: Do Instructor Characteristics Matter?
Jaya Chitranshi, Shailja Agarwal

120. Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem
Priyanka Verma, R. R. K. Sharma

121. CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment
Ritu Sinha, Chandrashekhar Kaushik

122. HR Roadmap: Becoming a Strategic Business Partner
Shweta Maheshwari

123. Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra
J. S. Kadam, J. J. Nirmal, M. Y. Khire

Keywords: Computer Science, Information Systems Applications (incl.Internet), Software Engineering, Computers and Society, Computer Communication Networks, Management of Computing and Information Systems, Information Storage and Retrieval

Similar titles