default search action
ICIT 2014: Bhubaneswar, India
- 2014 International Conference on Information Technology, ICIT 2014, Bhubaneswar, India, December 22-24, 2014. IEEE 2014, ISBN 978-1-4799-8084-0
Session 1: Distributed Computing
- Rangeet Mitra
, Vimal Bhatia
:
Improved Multi-stage Clustering Based Blind Equalisation in Distributed Environments. 1-5 - Uma Boregowda
, Venugopal R. Chakravarthy:
A Framework for Multiple Parallel Task Graphs (PTG) Scheduler. 6-11 - Ekta Gupta, Vidya Deshpande:
A Technique Based on Ant Colony Optimization for Load Balancing in Cloud Data Center. 12-17 - Papia Ray, Debani Mishra
:
Artificial Intelligence Based Fault Location in a Distribution System. 18-23 - B. Venkateswarlu Naik, Shirshendu Das, Hemangee K. Kapoor:
RT-DVS for Power Optimization in Multiprocessor Real-Time Systems. 24-29 - Vishnu Shankar Tiwari, Arti Arya
, Sudha Chaturvedi:
Framework for Horizontal Scaling of Map Matching: Using Map-Reduce. 30-34
Session 2: Wireless Ad Hoc & Sensor Network
- Ditipriya Sinha
, Rituparna Chaki:
Comparative Performance Analysis of AESCRT Using NS2. 35-40 - Syed Jalal Ahmad, V. S. K. Reddy, A. Damodaram, P. Radha Krishna:
An Improved QoS and Ranking Paths for Multimedia Traffic over MANETs. 41-46 - Bhabani Sankar Gouda
, Debasis Patro, Rabindra Kumar Shial:
Scenario-Based Performance Evaluation of Proactive, Reactive and Hybrid Routing Protocols in MANET Using Random Waypoint Model. 47-52 - Basanta K. Nayak, Monalisa Mishra, Satyananda Champati Rai, Sateesh Kumar Pradhan:
A Novel Cluster Head Selection Method for Energy Efficient Wireless Sensor Network. 53-57 - Manoj Kumar
:
Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network. 58-62 - Sanjib Kumar Deka, Prakash Chauhan, Nityananda Sarma
:
Constraint Based Cooperative Spectrum Sensing for Cognitive Radio Network. 63-68 - Nitul Dutta
, Hiren Kumar Deva Sarma, Ashish Kr. Srivastava, Shekhar Verma
:
A SINR Based Clustering Protocol for Cognitive Radio Ad Hoc Network (CRAHN). 69-75 - Nimisha Ghosh
, Sanku Kumar Roy
, Tuhina Samanta, Indrajit Banerjee
:
Path Determination Algorithm of Mobile Sinks for Energy Efficient Data Collection and Optimal Coverage in Wireless Sensor Network. 76-81
Session 3: Industrial Applications
- Gouranga Charan Jena, Tirthankar Dasgupta, Anupam Basu:
Implementation of Unicode Complaint Odia Keyboard and Its Evaluation Using Cognitive Model. 82-87 - Soumya Priyadarsini Panda
, Ajit Kumar Nayak
:
Integration of Fuzzy If-Then Rule with Waveform Concatenation Technique for Text-to-Speech Synthesis in Odia. 88-93 - Siddharth Aravindan, Asif Ekbal:
Feature Extraction and Opinion Mining in Online Product Reviews. 94-99 - Lokender Tiwari, Bhupendra Kumar, Tushar Patnaik:
Robust Camera Captured Image Mosaicking for Document Digitization and OCR Processing. 100-105 - Madhusmita Sahu, Durga Prasad Mohapatra
:
Data Flow Testing of CGI Based Web Applications. 106-111 - Sayan Chakraborty
, Aniruddha Mukherjee, Debmalya Chatterjee, Prasenjit Maji
, Suvojit Acharjee
, Nilanjan Dey
:
A Semi-automated System for Optic Nerve Head Segmentation in Digital Retinal Images. 112-117 - Simran Bijral, Debajyoti Mukhopadhyay
:
Efficient Fuzzy Search Engine with B -Tree Search Mechanism. 118-122 - Sudip Ghosh, Nachiketa Das, Subhajit Das
, Santi P. Maity
, Hafizur Rahaman
:
Digital Design and Pipelined Architecture for Reversible Watermarking Based on Difference Expansion Using FPGA. 123-128 - Shweta Karwa, Niladri Chatterjee:
Discrete Differential Evolution for Text Summarization. 129-133
Session 4: Wireless Network
- Sonika Priyadarsini Biswal, Sunil Kumar Sahoo, Muktikanta Dash:
Three Stacked Conical Dielectric Resonator Antenna for Advanced Ultra Wideband Application. 134-136 - Narayan Patra, B. N. Bhramar Ray, Shakti Prasad Mohanty:
Online Frequency Reassignment for New and Drop Calls in Wireless Cellular Networks. 137-141 - Ravi Sankar Barpanda, Ashok Kumar Turuk, Bibhudatta Sahoo
:
A Review of Optical Burst Switching in Wavelength Division Multiplexing Networks. 142-147 - Anindita Chhotray, Hemanta Kumar Pati:
Estimation of Blocking Performances in Mobile WiMAX Cellular Networks. 148-154 - Nazatul Haque Sultan
, Nityananda Sarma
:
PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks. 155-160 - Sonam Maurya
, Ajai K. Daniel:
An Energy Efficient Routing Protocol under Distance, Energy and Load Parameter for Heterogeneous Wireless Sensor Networks. 161-166
Session 5: Information Security
- K. Meenakshi, Ch. Srinivasa Rao, K. Satya Prasad:
A Robust Watermarking Scheme Based Walsh-Hadamard Transform and SVD Using ZIG ZAG Scanning. 167-172 - Amandeep Singh, Somanath Tripathy
:
TabSol: An Efficient Framework to Defend Tabnabbing. 173-178 - Subhas Barman
, Samiran Chattopadhyay
, Debasis Samanta, Sujoy Bag
, Goutam Show:
An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity. 179-183 - K. Shiva Kumar, Raghu-Kisore Neelisetti:
Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization. 184-189 - Shipra Kumari, Hari Om:
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric. 190-194 - Gaurav Garkoti, Sateesh Kumar Peddoju, Raman Balasubramanian:
Detection of Insider Attacks in Cloud Based e-Healthcare Environment. 195-200 - Debajyoti Mukhopadhyay
, Ashay Shirwadkar, Pratik Gaikar, Tanmay Agrawal:
Securing the Data in Clouds with Hyperelliptic Curve Cryptography. 201-205
Session 6: Data Mining Applications
- Puja R. Kose, Pankaj K. Bharne:
Smart Meeting System: An Approach to Recognize Patterns Using Tree Based Mining. 206-208 - Mrityunjay Singh
, S. K. Jain, V. K. Panchal:
An Architecture of DSP Tool for Publishing the Heterogeneous Data in Dataspace. 209-214 - Anand Gupta
, Hardeo Kumar Thakur
, Pragya Kishore:
Mining Regular Patterns in Weighted-Directed Networks. 215-220 - Mamta Singh, Jyoti Singh, Arpana Rawal:
Feature Extraction Model to Identify At - Risk Level of Students in Academia. 221-227 - Mukesh Kumar Mishra, Rajashree Dash
:
A Comparative Study of Chebyshev Functional Link Artificial Neural Network, Multi-layer Perceptron and Decision Tree for Credit Card Fraud Detection. 228-233 - Janmenjoy Nayak
, N. Sahoo, J. R. Swain, Tirtharaj Dash
, Himansu Sekhar Behera
:
GA Based Polynomial Neural Network for Data Classification. 234-239 - Lambodar Jena
, Narendra Kumar Kamila
:
A Model for Prediction of Human Depression Using Apriori Algorithm. 240-244
Session 7: Machine Learning Algorithms & Applications
- Sudipta Acharya, Sriparna Saha:
Identifying Co-expressed miRNAs using Multiobjective Optimization. 245-250 - Monalisa Mandal
, Anirban Mukhopadhyay
:
Predicting Protein Subcellular Localization: A Multiobjective PSO-based Feature Subset Selection from Amino Acid Sequence of Protein. 251-255 - Rangeet Mitra
, Vimal Bhatia
:
The Diffusion-KLMS Algorithm. 256-259 - Abinash Pujahari
, Vineet Padmanabhan
:
An Approach to Content Based Recommender Systems Using Decision List Based Classification with k-DNF Rule Set. 260-263 - Jay Prakash, Pramod Kumar Singh:
Evolutionary and Swarm Intelligence Methods for Partitional Hard Clustering. 264-269 - Om Prakash Patel, Aruna Tiwari
:
Quantum Inspired Binary Neural Network Algorithm. 270-274 - Mrityunjay Singh
, S. K. Jain, V. K. Panchal:
Modeling Semantic Heterogeneity in Dataspace: A Machine Learning Approach. 275-280
Session 8: NOC Design and Applications
- Anirban Sengupta, Vipul Kumar Mishra
:
Time Varying vs. Fixed Acceleration Coefficient PSO Driven Exploration during High Level Synthesis: Performance and Quality Assessment. 281-286 - B. N. Bhramar Ray, Alok Ranjan Tripathy
, Pralipta Samal, Manimay Das, Pushpanjali Mallik:
Half-Perimeter Wirelength Model for VLSI Analytical Placement. 287-292 - Rama Krushna Das
, Sujata Patnaik, Arati Kumari Padhy, Chinmaya Mohini
:
Service Oriented Layered Approach for E-Governance System Implementation. 293-298 - M. Lakshmi Prasad, Shirshendu Das, Hemangee K. Kapoor:
An Approach for Multicast Routing in Networks-on-Chip. 299-304 - Vijayata Waghmare, Debajyoti Mukhopadhyay
:
Mobile Agent Based Market Basket Analysis on Cloud. 305-310 - Dhiman Ghosh, Prasun Ghosal, Saraju P. Mohanty:
A Highly Parameterizable Simulator for Performance Analysis of NoC Architectures. 311-315 - Keshava Munegowda
, G. T. Raju, Veera Manikandan Raju, T. N. Manjunath
:
Design Methodologies of Transaction-Safe Cluster Allocations in TFAT File System for Embedded Storage Devices. 316-320
Session 9: Application Specific Hardware
- Debajyoti Mukhopadhyay
, Chetan Agrawal, Devesh Maru, Pooja Yedale, Pranav Gadekar:
Addressing Name Node Scalability Issue in Hadoop Distributed File System Using Cache Approach. 321-326 - T. Ratna Mani, O. Vijay Kumar, Raj Kumar:
Application of Ocean Acoustic Tomography in Shape Reconstruction of Underwater Objects. 327-332 - S. Selvi, Manas Rath, N. K. Sinha, S. P. Singh, N. N. J. Hemrom, A. Bhattacharya, A. K. Biswal:
HR e-Leave Tour Management System at RDCIS, SAIL. 333-338 - A. G. Rao, A. K. D. Dwivedi:
Design of Multifunctional DR Gate and Its Application in ALU Design. 339-344 - Anirban Sengupta, Saumya Bhadauria
:
Error Masking of Transient Faults: Exploration of a Fault Tolerant Datapath Based on User Specified Power and Delay Budget. 345-350 - Anshu Maheshwari, Aprna Tripathi
, Dharmender Singh Kushwaha:
A New Design Based Software Coupling Metric. 351-355 - Nitika Sharma, Apurva Naik
, M. Selva Balan:
Non-intrusive Water Surface Velocity Measurement Using Spatial Cross Correlation Technique. 356-361
Session 10: Applied Cryptography
- Susmita Mandal
, Sujata Mohanty
:
Multi-party Key-Exchange with Perfect Forward Secrecy. 362-367 - P. Lalitha Surya Kumari, Avula Damodaram:
An Alternative Methodology for Authentication and Confidentiality Based on Zero Knowledge Protocols Using Diffie-Hellman Key Exchange. 368-373 - Laxmi Lahoti, Chaitali Chandankhede
, Debajyoti Mukhopadhyay
:
Modified Apriori Approach for Evade Network Intrusion Detection System. 374-378 - Shubhra Rana, P. Santhi Thilagam
:
Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining. 379-385
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.