CS & IT
Conference Proceedings
menu
Home
Current issue
Archives
Contact
search
CS&IT Conference Proceedings
Home
Current issue
Archives
Contact
search
Search
×
search
keyboard_arrow_up
Volume 3, Number 6, February 2013
Third International Conference on Computer Science & Information Technology (CCSIT 2013),
February 18 ~ 20, 2013, Bangalore, India
Volume Editors : Jan Zizka, Dhinaharan Nagamalai
ISBN : 978-1-921987-00-7
Humanistic Approach in Mobile Adhoc Network : HAMANET
Md. Amir Khusru Akhtar
1
and G. Sahoo
2
,
1
Cambridge Institute of Technology, India and
2
Birla Institute of Technology, India
Fake Face Database and Preprocessing
Aruni Singh, Sanjay Kumar Singh and Shrikant Tiwari, IIT(BHU), India
Node Failure Time Analysis for Maximum Stability vs Minimum Distance Spanning Tree Based Data Gathering in Mobile Sensor Networks
Natarajan Meghanathan
1
and Philip Mumford
2
,
1
Jackson State University, USA and
2
Air Force Research Lab/RYWC, USA
Knowledge Base Compound Approach Against Phishing Attacks Using Some Parsing Techniques
Gaurav Kumar Tak
1
, Gaurav Ojha
2
and Udit Kumar
2
,
1
Lovely Professional University, India and
2
Indian Institute of Information Technology and Management, India
Affect of Parallel Computing on Multicore Processors
V R Rao Konkimalla and Niraj Upadhayaya, JB Institute of Engineering Technology, India
Framework for Tagging Software in Web Application
Karan Gupta and Anita Goel, University of Delhi, India
A RAMP Code for Fine-Grained Access Control
Kannan Karthik, Indian Institute of Technology - Guwahati, India
Fusion Based Multimodal Authentication in Biometrics Using Context-Sensitive Exponent Associative Memory Model : A Novel Approach
P. E. S. N. Krishna Prasad, Pavan Kumar K, M. V. Ramakrishna and B. D. C. N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India
Combined Mining Approach to Generate Patterns for Complex Data
Sumit Kumar
1
, Sweety
2
and Manish Kumar
2
,
1
IVY Comptech Pvt. Ltd, India and
2
IIIT-Allahabad, India
Real Time Database Compression Optimization Using Iterative Length Compression Algorithm
Muthukumar Murugesan
1
and T Ravichandran
2
,
1
Karpagam University, India and
2
Hindusthan Institute of Technology, India
Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures
Ranjit Panigrahi, Kalpana Sharma and M.K. Ghose, SMIT, India
Mapping of Traditional Software Development Methods to Agile Methodology
Rashmi Popli, Anita and Naresh Chauhan, YMCA University of Science & Technology, India
A Model for Aligning Software Projects Requirements with Project Team Members Requirements
Robert Hans, Tshwane University of Technology, South Africa
A Hybrid Approach for Ensuring Security in Data Communication
Shailender Gupta
1
, Bharat Bhushan
1
, Surbhi Singhania
1
and Jeetesh Gulani
2
,
1
YMCA University of Science and Technology, India and
2
Indian Institute of Technology-Kharagpur, India
On Average Case Analysis Through Statistical Bounds : Linking Theory to Practice
Niraj Kumar Singh, Soubhik Chakraborty and Dheeresh Kumar Mallick, BIT Mesra, India
Semantic Web Services - Discovery, Selection and Composition Techniques
Sowmya Kamath S and Ananthanarayana V.S, National Institute of Technology, India
Classification of Tamil Poetry Using Context Free Grammar Using Tamil Grammar Rules
Subasree Venkatsubhramaniyen, Subha Rashmi and Rajeswari Sridhar, Anna University, India
Study of VANET Routing Protocols for End to End Delay
Sunilkumar M. Bhagat and Vijay Wadhai, MIT Academy of Engineering, India
A Secure Key Computation Protocol for Secure Group Communication with Password Based Authentication
1
Velumadhava Rao R,
1
Vikhnesh ma,
1
Kailash B,
2
Selvamani K and
3
Elakkiya R,
1
Rajalakshmi Institute of Technology, India,
2
Anna University, India and
3
Jerusalem College of Engineering, India
A Survey on Wireless Sensor Networks Security with the Integration of Clustering and Keying Techniques
V K Singh and Kalpana Sharma, Sikkim Manipal Institute of Technology, India
Influence of Priors Over Multityped Object in Evolutionary Clustering
L. Visalatchi
1
and T. Meyyappan
2
,
1
Dr. Umayal Ramanathan College for women, India and
2
Alagappa University, India
Agent Based Intrusion Detection System in MANET
J. K. Mandal
1
, Khondekar Lutful Hassan
2
,
1
University of Kalyani, India and
2
University of Calcutta, India
An Analytical Approach to Generate Unique Song Signal ( AUSS )
Uttam Kr. Mondal
1
and J.K.Mandal
2
,
1
College of Engg. & Management, India and
2
University of Kalyani, India
Secured Wireless Communication Through Simulated Annealing Guided Traingularized Encryption by Multilayer Perception Generated Session Key (SATMLP)
Arindam Sarkar and J. K. Mandal, University of Kalyani, India
Image Coding Through ZTransform with Low Energy and Bandwidth (IZEB)
Madhumita Sengupta, J. K. Mandal, University of Kalyani, India
Edge Detection by Modified OTSU Method
J. K. Mandal and Abhinaba Ghosh, University of Kalyani, India
An Exploration of Periocular Region with Reduced Region for Authentication : Realm of Occult
Ambika D R, Radhika K R and D Seshachalam, BMS College of Engineering, India
Multiple Region of Interest Tracking of Non-Rigid Objects Using Demon's Algorithm
Rohan Pillai, Abhishikta Yalavali Saima Mohan and Amol Patil, iGate, India
Noise Removal Techniques for Microwave Remote Sensing Radar Data and Its Evaluation
Arundhati Misra
1
, B Kartikeyan
1
and S.Garg
2
,
1
ISRO, India and
2
Nirma University, India
Legendre Transform Based Color Image Authentication (LTCIA)
J.K.Mandal and S. K.Ghosal, Kalyani University, India
A GIS Anchored Technique to Obtain Optimal Path Through Minimal Alteration of Land Type
Anirban Chakraborty
1
, J. K. Mandal
2
, T. Neogi
1
& S. Nayek
1
,
1
Barrackpore Rastraguru Surendranath College, India and
2
University of Kalyani, India
A Fragile Watermarking Based on Binomial Transform in Color Images
J. K. Mandal and S. K.Ghosal, University of Kalyani, India
Fractal Image Compression with Adaptive Quardtree Partitioning
Utpal Nandi and Jyotsna Kumar Mandal, University of Kalyani, India
A Novel Voting System Using SMS
M.Kamaraju, P.V.Subba Rao and T.Venkata Lakshmi, Gudlavalleru Engineering College, India
Study of Acoustic Properties of Nasal and Nonnasal Vowels in Temporal Domain
Nishant Singhal and Pradip K. Das, Indian Institute of Technology-Guwahati, India
An Efficient Peak Valley Detection Based VAD Algorithm for Robust Detection of Speech Auditory Brainstem Responses
Ranganadh Narayanam, Bharat Institute of Engineering & Technology, India
Performance Evaluations of GRIORYAN FFT and COOLEY-TUKEY FFT onto XILINX VIRTEX-II PRO and VIRTEX-5 FPGAS
Narayanam Ranganadh and Bindu Tushara D, Bharat Institute of Engineering & Technology, India
An ANN Based Brain Abnormality Detection Using MR Images
K.V. Kulhalli and S.R.Khot, D.Y.Patil College of Engineering and Technology, India
HMM Based POS Tagger for Hindi
Nisheeth Joshi
1
, Hemant Darbari
2
and Iti Mathur
1
,
1
Banasthali University, India and
2
Center for Development of Advanced Computing, India
Domain Ontology Development for Communicable Diseases
Iti Mathur
1
, Hemant Darbari
2
and Nisheeth Joshi
1
,
1
Banasthali University, India and
2
Center for Development of Advanced Computing, India
Self Learning Real Time Expert System
Latha B. Kaimal, Abhir Raj Metkar and Rakesh G, C-DAC, India
Comparison Analysis of Shunt Active Filter and Transformerless Parallel Hybrid Active Filter
Sakshi Bangia, P.R.Sharma and Maneesha Garg, YMCA University of Science and Technology, India
An Analysis of Minimax Search and Endgame Databases in Evolving Awale Game Player
Ngwira Seleman, Randle O.A and Zuva T, Tshwane University of Technology, South Africa
AMTR : The ANT Based QOS Aware Multipath Temporally Ordered Routing Algorithm for MANETs
Debajit Sensarma and Koushik Majumder, West Bengal University of Technology, India
A Language Independent Approach to Develop URDUIR System
Mohd. Shahid Husain and Iram Siraj, Integral University, India
Software Project Scope Verification Through Deliverable-Oriented Work Breakdown Structure
Robert T. Hans, Tshwane University of Technology, South Africa
A Novel Approach for Selection of Learning Objects for Personalized Delivery of E-Learning Content
D. Anitha and C. Deisy, Thiagarajar College of Engineering, India
Contextual Model of Recommending Resources on an Academic Networking Portal
Anoop Kumar Pandey, Amit Kumar and Balaji Rajendran, Centre for Development of Advanced Computing, India
Size Estimation of OLAP Systems
Madhu Bhan
1
, T V Suresh Kumar
1
and K.Rajanikanth
2
,
1
M. S. Ramaiah Institute of Technology, India and
2
Visvesvaraya Technological University, India
Adaptation of Parametric Uniform Crossover in Genetic Algorithm
Farhad Nadi and Ahamad Tajudin Khader, Universiti Sains Malaysia, Malaysia
The Effective Way of Processor Performance Enhancement By Proper Branch Handling
Jisha P Abraham
1
and Sheena Mathew
2
,
1
M A College of Engineering, India and
2
Cochin University of Science and Technology, India
Information Technology Model for Product Lifecycle Engineering
Bhanumathi KS and B Haridas, CSIR-National Aerospace Laboratories, India
Modeling of Distributed Mutual Exclusion System Using Event-B
Raghuraj Suryavanshi
1
and Divakar Yadav
2
,
1
GBTU, India and
2
South Asian University, India
Estimating Project Development Effort Using Clustered Regression Approach
Geeta Nagpal
1
, Moin Uddin
2
and Arvinder Kaur
3
,
1
National Institute of Technology, India,
2
Delhi Technological University, India and
3
GGSIPU, India
A Semantic Based Approach for Information Retrieval from Html Documents Using Wrapper Induction Technique
A.M.Abirami
1
, A.Askarunisa
2
, T.M.Aishwarya
1
and K.S.Eswari
1
,
1
Thiagarajar College of Engineering, India and
2
Vickram College of Engineering, India
An Approach to Word Sense Disambiguation Combining Modified Lesk and Bag-of-Words
Alok Ranjan Pal
1,3
, Anirban Kundu
2,3
, Abhay Singh
1
, Raj Shekhar
1
and Kunal Sinha
1
,
1
College of Engineering and Management, India,
2
Kuang-Chi Institute of Advanced Technology, P.R.China and
3
Innovation Research Lab (IRL), India
Facial Landmarking Localization for Emotion Recognition Using Bayesian Shape Models
Hernan F. Garcia, Alejandro T. Valencia and Alvaro A. Orozco, Technological University of Pereira, Colombia
settings
Editorial Board
book
Most Cited Articels
list
Indexing
help
FAQ