Search Results - "2014 International Conference on Computer and Communication Technology (ICCCT)"
-
1
A survey on scheduling and load balancing techniques in cloud computing environment
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Now-a-days cloud computing is the most emerging technology due to its elasticity of resource provisioning and the pay-as-you-go pricing model which enables…”
Get full text
Conference Proceeding -
2
Passive copy-move forgery detection in videos
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Due to evolution of prevalent sophisticated digital video editing software it has become easier to forge any video. Copy-Move forgery is a special kind of…”
Get full text
Conference Proceeding -
3
Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…As the power of cloud computing became prevalent in the recent years, more and more sensitive information is being now shifted to the cloud. The cloud is a…”
Get full text
Conference Proceeding -
4
A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…We are currently leaving in a pure digital world where all type of information is mostly stored in digital form. Thus storage of the information is no more a…”
Get full text
Conference Proceeding -
5
A new LEACH-based routing protocol for energy optimization in wireless sensor network
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Due to lack of power source, energy is the key concern area in Wireless Sensor Networks. Maximum energy is used in transmission of data. Many research works…”
Get full text
Conference Proceeding -
6
Performance analysis of rectangular, triangular and E-shaped microstrip patch antenna arrays for wireless sensor networks
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Generally wireless sensor nodes have been using omni-directional antennas to broadcast data. But these antennas are not very efficient as they suffer from poor…”
Get full text
Conference Proceeding -
7
A robust hybrid-MAC protocol for M2M communications
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…In M2M communications, there is a critical requirement of a robust MAC protocol to enable multiple M2M devices to access the channel. For this purpose,…”
Get full text
Conference Proceeding -
8
A framework for key frame extraction from surveillance video
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Key frame extraction from video is area of interest in many applications, like video analysis, video summary, semantic video indexing, video organization, and…”
Get full text
Conference Proceeding -
9
Novel frequent sequential patterns based probabilistic model for effective classification of web documents
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Web page classification has been one of essential tasks in web information retrieval such as delivering content specific search results, focused crawling and…”
Get full text
Conference Proceeding -
10
An extended Playfair Cipher using rotation and random swap patterns
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…In this paper, we have proposed an encryption method which is developed by extending Playfair Cipher to make it more secure. Known as Polyalphabetic cipher,…”
Get full text
Conference Proceeding -
11
A comparison of ARIMA, neural network and a hybrid technique for Debian bug number prediction
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…A bug in a software application may be a requirement bug, development bug, testing bug or security bug, etc. To prediet the bug numbers accurately is a…”
Get full text
Conference Proceeding -
12
Mobile WiMAX network security threats and solutions: A survey
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…IEEE 802.16 based WiMAX is an emerging wireless Internet technology. Salient features of WiMAX such as high speed internet facility over a long distance,…”
Get full text
Conference Proceeding -
13
Improving the efficiency of genetic algorithm approach to virtual machine allocation
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Virtual machine (VM) allocation is the process of allocating virtual machines to suitable hosts. This problem is an NP-Hard problem. It can be considered as a…”
Get full text
Conference Proceeding -
14
Effect of variable dielectric constant of Si material rods on 2-D photonic crystal ring resonator based channel drop filter for ITU.T.694.2 CWDM system
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…In this paper, a new work on channel drop filters (CDFs) based on photonic crystals ring resonators (PCRRs) is presented. The filter characteristics for…”
Get full text
Conference Proceeding -
15
A new resource allocation protocol for mobile ad-hoc networks (MANET) in tactical scenario
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…In this paper we propose a New Resource Allocation Protocol for tactical scenario based on mobile Ad Hoc networks. A dynamic slot assignment scheme for Time…”
Get full text
Conference Proceeding -
16
Resolving issues in parsing technique in machine translation from hindi language to english language
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…This paper describes the development of parser algorithm which is used for Hindi-English machine translation (MT). Machine translation requires analysis,…”
Get full text
Conference Proceeding -
17
An interactive interface for instilling trust and providing diverse recommendations
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…A recommendation system's ability to instill trust in its users and convince them about the recommendations provided is found to be effective using suitable…”
Get full text
Conference Proceeding -
18
Using Mahout for clustering similar Twitter users: Performance evaluation of k-means and its comparison with fuzzy k-means
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Traditional k-means algorithm has been used successfully to various problems but its application is restricted to small datasets. Online websites like twitter…”
Get full text
Conference Proceeding -
19
QoS driven distributed multi-channel scheduling MAC protocol for multihop WSNs
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…Multi-Channel Dynamic Scheduling has been centric stage of research in WSNs in recent years. In this paper, we propose a Distributed Multi-Channel Scheduling…”
Get full text
Conference Proceeding -
20
Genre classification of songs using neural network
Published in 2014 International Conference on Computer and Communication Technology (ICCCT) (01-09-2014)“…The objective here is to eliminate the manual work of classifying genres of song in each song. With this startup work songs can be classified in real-time and…”
Get full text
Conference Proceeding