default search action
8th IC3 2015: Noida, India
- Manish Parashar, Tirumale Ramesh, Jaric Zola, Nanjangud C. Narendra, Kishore Kothapalli, Joseph Amudha, Purushotham V. Bangalore, Deepa Gupta, Animesh Pathak, Sanjay Chaudhary, K. V. Dinesha, Sushil K. Prasad:
Eighth International Conference on Contemporary Computing, IC3 2015, Noida, India, August 20-22, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7947-2
Algorithms
- Shailendra Tiwari, Rajeev Srivastava:
An efficient and modified median root prior based framework for PET/SPECT reconstruction algorithm. 1-6 - T. Ragunathan, Mohammed Sharfuddin:
Frequent block access pattern-based replication algorithm for cloud storage systems. 7-12 - Ruoqian Liu, Ankit Agrawal, Wei-keng Liao, Alok N. Choudhary, Zhengzhang Chen:
Pruned search: A machine learning based meta-heuristic approach for constrained continuous optimization. 13-18 - Ashok Kumar Yadav, Rajesh Mehta, Raj Kumar:
Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domain. 19-24 - Aniruddha Banerjee, Sharan Kumar Allur, Syam Prasad Kuncha:
Task behaviour inputs to a heterogeneous multiprocessor scheduler. 25-29 - Chandresh Kumar Maurya, Durga Toshniwal, Gopalan Vijendran Venkoparao:
Online anomaly detection via class-imbalance learning. 30-35 - Ritu Kapur:
A workload balanced approach for resource scheduling in cloud computing. 36-41 - Tasleem Arif, M. Asger, Majid Bashir Malik, Rashid Ali:
Extracting academic social networks among conference participants. 42-47 - Tobias Kutzner, Fanyu Ye, Ingrid Bönninger, Carlos M. Travieso, Malay Kishore Dutta, Anushikha Singh:
User verification using safe handwritten passwords on smartphones. 48-53 - Marcos del Pozo-Baños, Carlos M. Travieso, Jaime Roberto Ticay-Rivas, Jesús B. Alonso, Malay Kishore Dutta, Anushikha Singh:
Real cepstrums on electroencephalogram biometric identification. 54-58 - Juan J. Noda Arencibia, Carlos M. Travieso, David Sánchez-Rodríguez, Malay Kishore Dutta, Garima Vyas:
Automatic classification of frogs calls based on fusion of features and SVM. 59-63 - Kanika Mehta, Satya Prakash Ghrera:
DNA compression using referential compression algorithm. 64-69 - Gaurav Gupta, Amit Mahesh Joshi, Kanika Sharma:
An efficient DCT based image watermarking scheme for protecting distribution rights. 70-75 - Surbhi Kapoor, Chetna Dabas:
Cluster based load balancing in cloud computing. 76-81 - Arko Banerjee:
Leveraging probabilistic segmentation to document clustering. 82-87 - Joydeep Tamuli, Aishwarya Jain, Aaishwarya V. Dhan, Anupama Bhan, Malay Kishore Dutta:
An image processing based method to identify and grade conjunctivitis infected eye according to its types and intensity. 88-92 - Abhishek Jatram, Bhaskar Biswas:
Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs. 93-96 - Musheer Ahmad, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar:
Designing chaos based strong substitution box. 97-100 - Gurkiran Kaur, Rajan Miglani, Gurjot Singh Gaba, Ruchi Pasricha:
Energy conservation and collision avoidance by controlled access protocol in WSN. 101-105
Applications
- Harsh M. Vyas, Suma S. M., Shashidhar G. Koolagudi, K. R. Guruprasad:
Identifying gamakas in Carnatic music. 106-110 - Deepika Saxena, Shilpi Saxena:
Highly advanced cloudlet scheduling algorithm based on Particle Swarm Optimization. 111-116 - Divyesh Patel, Tanuja Srivastava:
Reconstructing h-convex binary images from its horizontal and vertical projections by simulated annealing. 117-121 - Leo Pauly, Rahul D. Raj, Binu Paul:
Hand written digit recognition system for South Indian languages using artificial neural networks. 122-126 - Prithvi Upadhyaya, Suma S. M., Shashidhar G. Koolagudi:
Identification of allied raagas in Carnatic music. 127-131 - Pravin B. Ramteke, Shashidhar G. Koolagudi, Arun Prabhakar:
Feature analysis for mispronounced phonemes in the case of alvoelar approximant (/r/) substituted with voiced dental consonant (/∂/). 132-137 - Siddharth Gulati, Abhinav Rastogi, Manish K. Thakur:
Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zone. 138-143 - Prakhar Mohan, Shreya Srivastava, Garvita Tiwari, Rahul Kala:
Background and skin colour independent hand region extraction and static gesture recognition. 144-149 - Anuranjan Kumar, Sahil Gupta, Sanjay Kumar Singh, Kaushal K. Shukla:
Comparison of various metrics used in collaborative filtering for recommendation system. 150-154 - Vijyant Agarwal:
Novel fuzzy clustering algorithm for fuzzy data. 155-161 - Mayank Taneja, Kavyanshi Garg, Archana Purwar, Samarth Sharma:
Prediction of click frauds in mobile advertising. 162-166 - Srikumar Panda, Ranjan Das:
Inverse analysis of a radial porous fin using genetic algorithm. 167-170 - Vartika Agrawal, Satish Chandra:
Feature selection using Artificial Bee Colony algorithm for medical image classification. 171-176 - Khushboo Singhal, Sumit Kumar Banshal, Ashraf Uddin, Vivek Kumar Singh:
A Scientometric analysis of computer science research in India. 177-182 - Prabhat Dansena, K. Pramod Kumar, Rajarshi Pal:
Line based extraction of important regions from a cheque image. 183-189 - Chandra Prakash, Anshul Mittal, Rajesh Kumar, Namita Mittal:
Identification of gait parameters from silhouette images. 190-195 - Avinash Kumar Singh, Neha Baranwal, Gora Chand Nandi:
Human perception based criminal identification through human robot interaction. 196-201 - Narwant Singh Grewal, Munish Rattan, Manjeet Singh Patterh:
A linear antenna array failure detection using Bat Algorithm. 202-207 - Prayasee Pradhan, Ashish Kumar Dwivedi, Santanu Kumar Rath:
Detection of design pattern using Graph Isomorphism and Normalized Cross Correlation. 208-213 - Randheer Bagi, Jainath Yadav, K. Sreenivasa Rao:
Improved recognition rate of language identification system in noisy environment. 214-219 - Harikrishna D. M., Gurunath Reddy M., K. Sreenivasa Rao:
Multi-stage children story speech synthesis for Hindi. 220-224 - Parakrant Sarkar, K. Sreenivasa Rao:
Analysis and modeling pauses for synthesis of storytelling speech based on discourse modes. 225-230 - Nikita Lemos, Kavita V. Sonawane, Bidisha Roy:
Secure data transmission using video. 231-234 - Daya Gupta, Chand Anand, Tejas Dewan:
Enhanced heuristic approach for Traveling Tournament Problem based on Grey Wolf Optimizer. 235-240 - Manju Venugopalan, Deepa Gupta:
Exploring sentiment analysis on twitter data. 241-247 - Vinayak Ray, Ayush Goyal:
Image based sub-second fast fully automatic complete cardiac cycle left ventricle segmentation in multi frame cardiac MRI images using pixel clustering and labelling. 248-252 - Arup Kumar Dutta, K. Sreenivasa Rao:
Robust language identification using Power Normalized Cepstral Coefficients. 253-256 - Vandana Agarwal, Surekha Bhanot:
Firefly inspired feature selection for face recognition. 257-262 - Arijul Haque, K. Sreenivasa Rao:
Analysis and modification of spectral energy for neutral to sad emotion conversion. 263-268 - Sarthak Singhal, Prabhat Ralhan, Nishtha Jatana:
Smartphone-based colorimetric detection to measure Blood Glucose Levels. 269-274 - Tushar Jadhav, Aditi Kotibhaskar:
Cloud detection in all sky ConCam images by Gaussian fitting and valley detection in histogram. 275-278 - Oshin Anand, Praveen Ranjan Srivastava:
A comparative gender based evaluation of e-commerce website: A hybrid MCDM approach. 279-284 - Akshi Kumar, Prakhar Dogra, Vikrant Dabas:
Emotion analysis of Twitter using opinion mining. 285-290 - Ajay Kumar Singh, Souvik Roy:
ANPR Indian system using surveillance cameras. 291-294 - Srishti Sharma, Kanika Aggarwal, Palak Papneja, Saheb Singh:
Extraction, summariz ation and sentiment analysis of trending topics on Twitter. 295-301 - S. Saravanan:
Design of large-scale Content-based recommender system using hadoop MapReduce framework. 302-307 - Palki Gupta, Lasit Pratap Singh, Anoop Khandelwal, Kavita Pandey:
Reduction of congestion and signal waiting time. 308-313 - Abhinav Duhan, Bhupendra Singh, Mohd Zayed, Haneet Rana, Gagan Tiwari, Sanjeev Yadav:
A compact monopole wideband antenna for WiMAX/WLAN/BLUETOOTH/IEEE 802.11y services. 314-317 - Shwet Ketu, Sonali Agarwal:
Performance enhancement of distributed K-Means clustering for big Data analytics through in-memory computation. 318-324 - Greeshma Sarath, Megha Lal S. H:
Privacy preservation and content protection in location based queries. 325-330 - Arpan Kumar Dubey, Adwitiya Sinha:
Congestion control for self similar traffic in wireless sensor network. 331-335 - Rakhi Joon, Archana Singhal:
A system for compound adverbs MWEs extraction in Hindi. 336-341 - Gurunath Reddy M., K. Sreenivasa Rao:
Neutral to happy emotion conversion by blending prosody and laughter. 342-347 - Suja P, Kalyan Kumar V. P, Shikha Tripathi:
Dynamic facial emotion recognition from 4D video sequences. 348-353 - Eva Katta, Anuja Arora:
An improved approach to English-Hindi based Cross Language Information Retrieval system. 354-359 - Akriti Saini, Nishank Bhatia, Vikas Saxena:
VISORV: Board reading, getting directions through Marker Detection for partially visually impaired people. 360-364 - Namrata Srivastava, Utkarsh Agrawal, Soumava Kumar Roy, Uma Shanker Tiwary:
Human identification using Linear Multiclass SVM and Eye Movement biometrics. 365-369 - Gaurav Dubey, Vikram Khurana, Shelly Sachdeva:
Implementing security technique on generic database. 370-376 - Jithu Raphel, P. Vinod:
Pruned feature space for metamorphic malware detection using Markov Blanket. 377-382 - Varsha M. V., P. Vinod, Dhanya K. A.:
Heterogeneous feature space for Android malware detection. 383-388 - Vikas Saxena, Ananya, Juhi Shukla:
Removing occlusion using even odd interlacing for efficient class room teaching. 389-392
Education
- Sanjay Goel, Suma Dawn, G. Dhanalekshmi, Hema N, Sandeep Kumar Singh, Sanchika Gupta, Taj Alam, Prashant Kaushik, Kashav Ajmera:
Collaborative teaching in large classes of computer science courses. 397-403
Systems
- Anil Kumar, Rahul Kala:
Geometric shape drawing using a 3 link planar manipulator. 404-409 - Nishit Gupta, Sunil Alag:
Unified approach for Performance Evaluation and Debug of System on Chip at early design phase. 410-415 - Vaibhav Rastogi, Ankit Agrawal:
All your Google and Facebook logins are belong to us: A case for single sign-off. 416-421 - Anuradha Pughat, Vidushi Sharma:
Stochastic model for lifetime improvement of wireless sensor node. 422-427 - Sapna Gambhir, Vrisha Tickoo, Madhumita Kathuria:
Priority based congestion control in WBAN. 428-433 - Ambika Prasad Shah, Vaibhav Neema, Shreeniwas Daulatabad:
A novel leakage reduction DOIND approach for nanoscale domino logic circuits. 434-438 - Aashik Sadar, Vinitha Panicker J:
DocTool - a tool for visualizing software projects using graph database. 439-442 - Anup Nandy, Pavan Chakraborty:
A new paradigm of human gait analysis with Kinect. 443-448 - Joyeeta Goswami, Shirsha Ghosh, Shivaditya Katiyar, Alak Majumder:
Development of a prototype to detect speed limit violation for better traffic management. 449-454 - Sunil Kumar, Balwinder Raj:
Modeling of DG-Tunnel FET for low power VLSI circuit design. 455-458 - Balakrishnan Jayavel, Subbaramaiah Mandava, Jyoti Johri:
Enhanced page Reclaim for Android devices. 459-462 - Anand Kumar Gupta, Neetu Sardana:
Significance of Clustering Coefficient over Jaccard Index. 463-466 - Prafulla K. Choubey, Ashish K. Singh, Raghu B. Bankapur, Vaisakh P. C. SB, Manoj Prabhu B:
Content aware targeted image manipulation to reduce power consumption in OLED panels. 467-471 - Krishna Kishor Jha:
Logging method for high execution frequency paths of Linux kernel. 472-475 - Ruby Ansar, Prachi Upadhyay, Manish Singhal, Ashish Sharma, Manoj Singh Gaur:
Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip. 476-480 - Arshi Dhammi, Maninder Singh:
Behavior analysis of malware using machine learning. 481-486 - Amar Nath, Rajdeep Niyogi:
An extension of FMAP for joint actions. 487-492 - Tapas Kumar Mishra, Sachin Tripathi:
Explicit Throughput and Buffer Notification based congestion control: A cross layer approach. 493-497 - Anuj Chaudhary, Deepkumar Kagathara, Vibha Patel:
A GPU based implementation of Needleman-Wunsch algorithm using skewing transformation. 498-502 - P. Sasipriya, V. S. Kanchana Bhaaskaran:
Two phase sinusoidal power clocked quasi-static adiabatic logic families. 503-508 - Ritu Arora, Sanjay Goel:
Investigating syntactic and semantic inconsistencies in Collaborative Software Development. 509-515 - Pratik Ranjan, Hari Om:
An efficient undeniable signature scheme using braid groups. 516-520 - Vidur S. Bhatnagar, Rachit Magon, Rashi Srivastava, Manish K. Thakur:
A cost effective Sign Language to voice emulation system. 521-525 - Bhoopal Rao Gangadari, Shaik Rafi Ahamed:
Analysis and algebraic construction of S-Box for AES algorithm using irreducible polynomials. 526-530 - Mahesh Shirole, Rajeev Kumar:
Test scenario selection for concurrency testing from UML models. 531-536 - Ashish Jain, Narendra S. Chaudhari:
Analysis of the improved knapsack cipher. 537-541 - Deepti Agarwal, Sagar Anand Sharma, Kavita Pandey:
N-Hop broadcast and Street Broadcast Reduction algorithm using OMNeT++ and Google Earth plugin. 542-547 - Swaminathan Jayaraman, Dinoop Hari, Bharat Jayaraman:
Consistency of Java run-time behavior with design-time specifications. 548-554 - Bhuvan Mehan, Sanjay Batish, Rajesh Bhatia, Amardeep Dhiman:
BNSR: Border Node preferred Social Ranking based Routing Protocol for VANETs. 555-560 - Pavan Kumar Reddy K, Beerappa R. Chandavarkar:
Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE. 561-566
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.