CS & IT
Conference Proceedings
menu
Home
Current issue
Archives
Contact
search
CS&IT Conference Proceedings
Home
Current issue
Archives
Contact
search
Search
×
search
keyboard_arrow_up
Volume 2, Number 2, May 2012
The Second International Conference on Computer Science, Engineering and Applications (CCSEA-2012), May 26 ~ 27, 2012, Delhi, India
Volume Editors : David C. Wyld, Jan Zizka, Dhinaharan Nagamalai
ISBN : 978-1-921987-03-8
Resource Allocation Technique Using Load Matrix Method in Wireless Cellular Systems
S. Prabhakar
1
, Banda Sreenivas
2
, D. Karunakar Reddy
3
and S. Ramesh Babu
4
,
1
RRSCET - Hyderabad, India,
2
Jyothishmathi Institute of Technology & Science, India,
3
JNTU - Hyderabad,India and
4
Nigama Engineering College Sambhayapally, India
Detection Techniques of Selective Forwarding Attacks in Wireless Sensor Networks : A Survey
Preeti Sharma
1
, Monika Saluja
1
and Krishan Kumar Saluja
2
,
1
SBSCET Ferozpur, India and
2
PIT Kapurthala, India
Trust Oriented Security Framework for Ad Hoc Network
Amandeep Verma
1
and Manpreet Singh Gujra
2
,
1
Punjabi University Regional Centre for IT & Mgmt., India and
2
University College of Engineering, Punjabi University, India
Dynamic Network Anomaly Intrusion Detection Using Modified SOM
Aneetha.A.S., Revathi.S and Bose.S, Anna University, India
Ingress Filtering at Edge Network to Protect VPN Service from DOS Attack
S.Saraswathi and P.Yogesh, Anna University, India
QoS Issues In Underwater Sensor Networks
Vivekanand Jha, Preeti Gupta and Urvashi Ahuja, Guru Gobind Singh Indraprastha University, India
Analytical Study of Hexapod MIRNAs using Phylogenetic Methods
A.K. Mishra and H.Chandrasekharan, Indian Agricultural Research Institute, India
Information Security Through Image Watermarking Using Least Significant Bit Algorithm
Puneet Kr Sharma and Rajni, SBSCET, Ferozepur
An Emerging Trend of Feature Extraction Method in Video Processing
R.Revathi and M.Hemalatha, Karpagam University, India
A Modified Directional Weighted Cascaded-Mask Median Filter for Removal of Random Impulse Noise
J.K. Mandal and Aparna Sarkar, University of Kalyani, India
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/ Underflow
J. K. Mandal and Debashis Das, University of Kalyani, India
Energy Optimisation Schemes for Wireless Sensor Network
Vivekanand Jha, Elisha Chauhan, Harshpreet Kaur and Neeharika Taneja, Indira Gandhi Institute of Technology, India
A Survey on Tamil Handwritten Character Recognition using OCR Techniques
M. Antony Robert Raj and S.Abirami, Anna University, India
Object-Oriented Database Model for Effective Mining of Advanced Engineering Materials Data Sets
Doreswamy, Manohar M G and Hemanth K S, Mangalore University, India
Impact of Error Filters on Shares in Halftone Visual Cryptography
Sunil Agrawal and Anshul Sharma, Panjab University, India
Combining Jpeg Steganography and Substitution Encryption for Secure Data Communication
Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India
Digital Image Steganalysis for Computer Forensic Investigation
Nanhay Singh, Bhoopesh Singh Bhati and R. S. Raw, Ambedkar Institute of Advanced Communication Technologies and Research, India
Monogenic Scale Space Based Region Covariance Matrix Descriptor for Face Recognition
M. Sharmila Kumari
1
, B H Shekar
2
and G Thippeswamy
3
,
1
P A College of Engineering, India,
2
Mangalore University, India
Visual Attention Based Keyframes Extraction and Video Summarization
P.Geetha, S.Thiruchadai Pandeeswari and SonyMohanan, Anna University, India
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks
Amit Kumar, Dhirendra Srivastav and Suchismita Chinara, National Institute of Technology, India
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
Jayashree V. Shiral and Bhushan N. Mahajan, G.H.R.C.E, India
Forensic Computing Models: Technical Overview
Gulshan Shrivastava, Kavita Sharma and Akansha Dwivedi, Dronacharya College of Engineering, India
Detection of Application Layer DDOS Attacks Using Information Theory Based Metrics
S. Renuka Devi and P. Yogesh, Anna University, India
A Novel Approach for Feature Extraction and Selection on MRI Images for Brain Tumor Classification
V.P.Gladis Pushpa Rathi and S.Palani, Sudharsan Engineering College Sathiyamangalam, India
Efficient Utilization of Channels Using Dynamic Guard Channel Allocation with Channel Borrowing Strategy in Handoffs
Alagu S and Meyyappan T, Alagappa University, India
Performance analysis of clustering based image segmentation and optimization methods
Jaskirat kaur, Sunil Agrawal and Renu Vig, UIET, Panjab University, India
Tuning Of Cost-231 hata Model for Radio Wave Propagation Predictions
Chhaya Dalela
1
, M V S N Prasad
2
and P K Dalela
3
,
1
JSS Academy of Technical Education, India,
2
National Physical Laboratory, India and
3
C-DOT, India
Neural Network Approach for Eye Detection
Vijayalaxmi, P.Sudhakara Rao and S Sreehari, VITS,Hyderabad, India
Current Trends and Future Aspects in Cross-Layer Design for the Wireless Networks
Sandeep Sharma, Rajesh Mishra and Karan Singh, Gautam Buddha University, India
Analysis of Watermarking Techniques for Medical Images Preserving ROI
Sonika C. Rathi and Vandana S. Inamdar, Pune University, India
A novel Ant Colony Algorithm for multicast routing in wireless ad hoc networks
Sunita Prasad
1
, Zaheeruddin
2
and D.K.Lobiyal
3
,
1
Center for Development of Advanced Computing, India,
2
JMI, India and
3
JNU, India
An Comparison with Property Based Resource Attestation to Secure Cloud Environment
Ravindra K. Gupta
1
, Rajat Pali
2
, Shailendra Singh
3
, Gajendra Singh
2
and Ashutosh k. Dubey
4
,
2
SSSIST, India,
3
NITTTR, India and
4
TITR, India
An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink
Ravindra K. Gupta
1
, Shashank Saxena
2
, Shailendra Singh
3
, Gajendra Singh
3
and Ashutosh k. Dubey
4
,
2
SSSIST, India,
3
NITTTR, India and
4
TITR, India
SubGraD- An Approach for Subgraph Detection
Akshara Pande
1
, Vivekanand Pant
2
and S. Nigam
1
,
1
Human Resource Development Group, India and
2
IBM, India
CloudPass - a passport system based on Cloud Computing and Near Field Communication
Adethya Sudarsanan, Mobile Testing Centre of Excellence Cognizant Technology Solutions India Pvt. Ltd., India
Analysis of Bayes, Neural Network and Tree Classifier of Classification Technique in Data Mining using WEKA
Yugal kumar
1
and G. Sahoo
2
,
1
Hindu College of Engineering, India and
2
Birla Institute of Technology, India
Emotion Detection from Text
Shiv Naresh Shivhare and Saritha Khethawat, Maulana Azad National Institute of Technology, India
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Nisha Chaurasia, Mradul Dhakar, Astha Chharia, Akhilesh Tiwari and R. K. Gupta, MITS Gwalior, India
A Hybrid Clustering Algorithm for Data Mining
Ravindra Jain, Devi Ahilya Vishwavidyalaya, India
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Ravi Kanth Kotha, Gaurav Prasad and Dinesh Naik, National Institute of Technology, India
Generation and Optimization of Test cases for Object-Oriented Software Using State Chart Diagram
Ranjita Kumari Swain
1
, Prafulla Kumar Behera
2
and Durga Prasad Mohapatra
3
,
1
Rourkela Institute of Mgt. Studies,India,
2
Utkal University, India and
3
National Institute of Technology, India
A Novel Approach for Exception Handling in SOA
Prachet Bhuyan
1
, Tapas Kumar Choudhury
1
and Durga Prasad Mahapatra
2
,
1
KIIT University, India and
2
NIT, India
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
Navdeep Prashar and Balwinder Singh, C-DAC, India
settings
Editorial Board
book
Most Cited Articels
list
Indexing
help
FAQ