Search Results - "2014 International Conference on Computer and Communication Technology (ICCCT)"

Refine Results
  1. 1

    A survey on scheduling and load balancing techniques in cloud computing environment by Shaw, Subhadra Bose, Singh, A. K.

    “…Now-a-days cloud computing is the most emerging technology due to its elasticity of resource provisioning and the pay-as-you-go pricing model which enables…”
    Get full text
    Conference Proceeding
  2. 2

    Passive copy-move forgery detection in videos by Pandey, Ramesh Chand, Singh, Sanjay Kumar, Shukla, K. K.

    “…Due to evolution of prevalent sophisticated digital video editing software it has become easier to forge any video. Copy-Move forgery is a special kind of…”
    Get full text
    Conference Proceeding
  3. 3

    Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data by Khan, Neelam S., Krishna, C. Rama, Khurana, Anu

    “…As the power of cloud computing became prevalent in the recent years, more and more sensitive information is being now shifted to the cloud. The cloud is a…”
    Get full text
    Conference Proceeding
  4. 4

    A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms by Hashmi, Mohammad Farukh, Anand, Vijay, Keskar, Avinash G.

    “…We are currently leaving in a pure digital world where all type of information is mostly stored in digital form. Thus storage of the information is no more a…”
    Get full text
    Conference Proceeding
  5. 5

    A new LEACH-based routing protocol for energy optimization in wireless sensor network by Singh, Jyoti, Singh, Bhanu Pratap, Shaw, Subhadra

    “…Due to lack of power source, energy is the key concern area in Wireless Sensor Networks. Maximum energy is used in transmission of data. Many research works…”
    Get full text
    Conference Proceeding
  6. 6

    Performance analysis of rectangular, triangular and E-shaped microstrip patch antenna arrays for wireless sensor networks by Nagaraju, Shamanth, Kadam, Bhushan V., Gudino, Lucy J., Nagaraja, Srinivasprasad M., Dave, Neisarg

    “…Generally wireless sensor nodes have been using omni-directional antennas to broadcast data. But these antennas are not very efficient as they suffer from poor…”
    Get full text
    Conference Proceeding
  7. 7

    A robust hybrid-MAC protocol for M2M communications by Verma, Pawan Kumar, Tripathi, Rajeev, Naik, Kshirasagar

    “…In M2M communications, there is a critical requirement of a robust MAC protocol to enable multiple M2M devices to access the channel. For this purpose,…”
    Get full text
    Conference Proceeding
  8. 8

    A framework for key frame extraction from surveillance video by Raikwar, Suresh C., Bhatnagar, Charul, Jalal, Anand Singh

    “…Key frame extraction from video is area of interest in many applications, like video analysis, video summary, semantic video indexing, video organization, and…”
    Get full text
    Conference Proceeding
  9. 9

    Novel frequent sequential patterns based probabilistic model for effective classification of web documents by Haleem, Hammad, Sharma, Pankaj Kumar, Sufyan Beg, M. M.

    “…Web page classification has been one of essential tasks in web information retrieval such as delivering content specific search results, focused crawling and…”
    Get full text
    Conference Proceeding
  10. 10

    An extended Playfair Cipher using rotation and random swap patterns by Hans, Swati, Johari, Rahul, Gautam, Vishakha

    “…In this paper, we have proposed an encryption method which is developed by extending Playfair Cipher to make it more secure. Known as Polyalphabetic cipher,…”
    Get full text
    Conference Proceeding
  11. 11

    A comparison of ARIMA, neural network and a hybrid technique for Debian bug number prediction by Pati, Jayadeep, Shukla, K. K.

    “…A bug in a software application may be a requirement bug, development bug, testing bug or security bug, etc. To prediet the bug numbers accurately is a…”
    Get full text
    Conference Proceeding
  12. 12

    Mobile WiMAX network security threats and solutions: A survey by Jatav, Vinod Kumar, Singh, Vrijendra

    “…IEEE 802.16 based WiMAX is an emerging wireless Internet technology. Salient features of WiMAX such as high speed internet facility over a long distance,…”
    Get full text
    Conference Proceeding
  13. 13

    Improving the efficiency of genetic algorithm approach to virtual machine allocation by Joseph, Christina Terese, Chandrasekaran, K., Cyriac, Robin

    “…Virtual machine (VM) allocation is the process of allocating virtual machines to suitable hosts. This problem is an NP-Hard problem. It can be considered as a…”
    Get full text
    Conference Proceeding
  14. 14

    Effect of variable dielectric constant of Si material rods on 2-D photonic crystal ring resonator based channel drop filter for ITU.T.694.2 CWDM system by Chhipa, Mayur Kumar, Rewar, Ekta

    “…In this paper, a new work on channel drop filters (CDFs) based on photonic crystals ring resonators (PCRRs) is presented. The filter characteristics for…”
    Get full text
    Conference Proceeding
  15. 15

    A new resource allocation protocol for mobile ad-hoc networks (MANET) in tactical scenario by Pande, Hemant K., Srivastava, Kapil K., Thapliyal, Sunil, Mangal, Lal Chand

    “…In this paper we propose a New Resource Allocation Protocol for tactical scenario based on mobile Ad Hoc networks. A dynamic slot assignment scheme for Time…”
    Get full text
    Conference Proceeding
  16. 16

    Resolving issues in parsing technique in machine translation from hindi language to english language by Mall, Shachi, Jaiswal, Umesh Chandra

    “…This paper describes the development of parser algorithm which is used for Hindi-English machine translation (MT). Machine translation requires analysis,…”
    Get full text
    Conference Proceeding
  17. 17

    An interactive interface for instilling trust and providing diverse recommendations by Katarya, Rahul, Jain, Ivy, Hasija, Hitesh

    “…A recommendation system's ability to instill trust in its users and convince them about the recommendations provided is found to be effective using suitable…”
    Get full text
    Conference Proceeding
  18. 18

    Using Mahout for clustering similar Twitter users: Performance evaluation of k-means and its comparison with fuzzy k-means by Jain, Eeti, Jain, S. K.

    “…Traditional k-means algorithm has been used successfully to various problems but its application is restricted to small datasets. Online websites like twitter…”
    Get full text
    Conference Proceeding
  19. 19

    QoS driven distributed multi-channel scheduling MAC protocol for multihop WSNs by Kumaraswamy, M., Shaila, K., Tejaswi, V., Venugopal, K. R., Iyengar, S. S., Patnaik, L. M.

    “…Multi-Channel Dynamic Scheduling has been centric stage of research in WSNs in recent years. In this paper, we propose a Distributed Multi-Channel Scheduling…”
    Get full text
    Conference Proceeding
  20. 20

    Genre classification of songs using neural network by Goel, Anshuman, Sheezan, Mohd, Masood, Sarfaraz, Saleem, Aadam

    “…The objective here is to eliminate the manual work of classifying genres of song in each song. With this startup work songs can be classified in real-time and…”
    Get full text
    Conference Proceeding