default search action
FICTA 2014: Bhubaneswar, Odisa, India
- Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J. K. Mandal:
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 - Volume 2, Bhubaneswar, Odisa, India, 14-15 November 2014. Advances in Intelligent Systems and Computing 328, Springer 2015, ISBN 978-3-319-12011-9 - Mahesh U. Shankarwar, Ambika Vishal Pawar:
Security and Privacy in Cloud Computing: A Survey. 1-11 - Krishnendu Guha, Romio Rosan Sahani, Moumita Chakraborty, Amlan Chakrabarti, Debasri Saha:
Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores. 13-20 - Gadang Madhulika, Chinta Seshadri Rao:
Generating Digital Signature Using DNA Coding. 21-28 - P. V. S. N. Raju, Pritee Parwekar:
DNA Encryption Based Dual Server Password Authentication. 29-37 - Navneet Kaur Gill, Sarbjeet Singh:
Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System. 39-47 - Boudhayan Bhattacharya, Banani Saha:
Signalling Cost Analysis of Community Model. 49-56 - Akshay Kandul, Ashwin More, Omkar Davalbhakta, Rushikesh Artamwar, Dinesh Kulkarni:
Steganography with Cryptography in Android. 57-64 - Manas Kumar Sanyal, Sudhangsu Das, Sajal Bhadra:
A Cloud Based Architecture of Existing e-District Project in India towards Cost Effective e-Governance Implementation. 65-73 - Musheer Ahmad, Akshay Chopra, Prakhar Jain, Shahzad Alam:
A Chaotic Substitution Based Image Encryption Using APA-transformation. 75-83 - Shiju Satyadevan, Boney S. Kalarickal, M. K. Jinesh:
Security, Trust and Implementation Limitations of Prominent IoT Platforms. 85-95 - Lekha S. Nair, Lakshmi M. Joshy:
An Improved Image Steganography Method with SPIHT and Arithmetic Coding. 97-104 - Savita Goel, Shilpi Gupta, Nisha Kaushik:
Image Steganography - Least Significant Bit with Multiple Progressions. 105-112 - Abhishek Basu, Arindam Saha, Jeet Das, Sandipta Roy, Sushavan Mitra, Indranil Mal, Subir Kumar Sarkar:
On the Implementation of a Digital Watermarking Based on Phase Congruency. 113-120 - Suryaday Sarkar, Meghdut Roychowdhury, Biswa Mohan Sahoo, Souvik Sarkar:
Influence of Various Random Mobility Models on the Performance of AOMDV and DYMO. 121-125 - Anandita Singh Thakur, Pradeep Kumar Gupta, Punit Gupta:
Handling Data Integrity Issue in SaaS Cloud. 127-134 - Punit Gupta, Satya Prakash Ghrera:
Load and Fault Aware Honey Bee Scheduling Algorithm for Cloud Infrastructure. 135-143 - Apoorva Rathi, Nilesh Parmar:
Secure Cloud Data Computing with Third Party Auditor Control. 145-152 - Chintureena, V. Suma:
Effective Disaster Management to Enhance the Cloud Performance. 153-163 - Phuritshabam Robert, B. Naveen Kumar, U. S. Poornima, V. Suma:
Implementation of Technology in Indian Agricultural Scenario. 165-174 - Siddhartha Banerjee, Bibek Ranjan Ghosh, Pratik Roy:
JPEG Steganography and Steganalysis - A Review. 175-187 - Teja Yaramasa, G. Krishna Kishore:
Enhanced Privacy and Surveillance for Online Social Networks. 189-196 - Arindam Sarkar, J. K. Mandal, Pritha Mondal:
Neuro-key Generation Based on HEBB Network for Wireless Communication. 197-205 - Madhumita Sengupta, J. K. Mandal, Arindam Sarkar, Tamal Bhattacharjee:
KSOFM Network Based Neural Key Generation for Wireless Communication. 207-215 - J. K. Mandal, Debdyuti Datta, Arindam Sarkar:
Hopfield Network Based Neural Key Generation for Wireless Communication (HNBNKG). 217-224 - Bharatratna P. Gaikwad, Ramesh R. Manza, Ganesh R. Manza:
Automatic Video Scene Segmentation to Separate Script and Recognition. 225-235 - Saikat Basak, Arundhuti Chowdhury:
Gesture: A New Communicator. 237-244 - R. Eswaraiah, Edara Sreenivasa Reddy:
A Novel Fragile Medical Image Watermarking Technique for Tamper Detection and Recovery Using Variance. 245-253 - Ankita Mitra, Arunava De, Anup Kumar Bhattacharjee:
MRI Skull Bone Lesion Segmentation Using Distance Based Watershed Segmentation. 255-261 - S. Nagaraja, C. J. Prabhakar, P. U. Praveen Kumar:
Extraction of Texture Based Features of Underwater Images Using RLBP Descriptor. 263-272 - Mona, B. G. Prasad:
Summary-Based Efficient Content Based Image Retrieval in P2P Network. 273-280 - Pratik Soygaonkar, Shilpa Paygude, Vibha S. Vyas:
Dynamic Texture Segmentation Using Texture Descriptors and Optical Flow Techniques. 281-288 - Devashree Tripathy, Jagdish Lal Raheja:
Design and Implementation of Brain Computer Interface Based Robot Motion Control. 289-296 - Vineeta Das, Asutosh Kar, Mahesh Chandra:
Advanced Adaptive Algorithms for Double Talk Detection in Echo Cancellers: A Technical Review. 297-305 - Subit K. Jain, Rajendra K. Ray, Arnav Bhavsar:
A Comparative Study of Iterative Solvers for Image De-noising. 307-314 - Somdatta Chakravortty, Devadatta Sinha, Anil Bhondekar:
Assessment of Urbanization of an Area with Hyperspectral Image Data. 315-322 - Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri:
Range Face Image Registration Using ERFI from 3D Images. 323-333 - Vaibhav V. Kamble, Ratnadeep R. Deshmukh, Anil R. Karwankar, Varsha R. Ratnaparkhe, Suresh A. Annadate:
Emotion Recognition for Instantaneous Marathi Spoken Words. 335-346 - Prashant Upadhyaya, Omar Farooq, Musiur Raza Abidi, Priyanka Varshney:
Performance Evaluation of Bimodal Hindi Speech Recognition under Adverse Environment. 347-355 - S. H. Mohana, C. J. Prabhakar:
Extraction of Shape Features Using Multifractal Dimension for Recognition of Stem-Calyx of an Apple. 357-365 - Soumya Smruti, Jagyanseni Sahoo, Monalisa Dash, Mihir N. Mohanty:
An Approach to Design an Intelligent Parametric Synthesizer for Emotional Speech. 367-374 - Birender Singh, Mahesh Chandra, Nikitha Kandru:
Removal of Defective Products Using Robots. 375-382 - Sudipta Roy, Piue Ghosh, Samir Kumar Bandyopadhyay:
Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach. 383-394 - Rajat Sharma, Amit Agarwal:
An Innovative Approach to Show the Hidden Surface by Using Image Inpainting Technique. 395-403 - L. Balaji, K. K. Thyagharajan:
Fast Mode Decision Algorithm for H.264/SVC. 405-412 - Sonali G. Oval, Sankirti Shirawale:
Recognizing Handwritten Devanagari Words Using Recurrent Neural Network. 413-421 - Igor Belykh:
Homomorphic Filtering for Radiographic Image Contrast Enhancement and Artifacts Elimination. 423-430 - C. Sivasankar, A. Srinivasan:
A Framework for Human Recognition Based on Locomotive Object Extraction. 431-439 - Rajat Srivastava, Vinod Kumar Singh, Shahanaz Ayub:
Comparative Analysis and Bandwidth Enhancement with Direct Coupled C Slotted Microstrip Antenna for Dual Wide Band Applications. 449-455 - T. Chandrakanth, B. Sandhya:
Quality Assessment of Images Using SSIM Metric and CIEDE2000 Distance Methods in Lab Color Space. 457-464 - Deepak Kumar Gupta, Vijay Kumar Gupta, Mahesh Chandra:
Review Paper on Linear and Nonlinear Acoustic Echo Cancellation. 465-473 - Abhinav Krishn, Vikrant Bhateja, Himanshi, Akanksha Sahu:
PCA Based Medical Image Fusion in Ridgelet Domain. 475-482 - Anusudha Krishnamurthi, N. Venkateswaran, J. Valarmathi:
Swarm Optimization Based Dual Transform Algorithm for Secure Transaction of Medical Images. 483-491 - R. Anil, K. Manjusha, S. Sachin Kumar, K. P. Soman:
Convolutional Neural Networks for the Recognition of Malayalam Characters. 493-500 - Shabana Urooj, Vikrant Bhateja, Pratiksha Saxena, Aimé Lay-Ekuakille, Patrizia Vergallo:
Modeling of Thorax for Volumetric Computation Using Rotachora Shapes. 501-507 - Nishant Shrivastava, Vipin Tyagi:
A Review of ROI Image Retrieval Techniques. 509-520 - P. Syamala Jaya Sree, Prasant Kumar Pattnaik, S. P. Ghrera:
A Novel Algorithm for Suppression of Salt and Pepper Impulse Noise in Fingerprint Images Using B-Spline Interpolation. 521-528 - Mahesh Chandra, Pratibha Nandi, Aparajita kumari, Shipra Mishra:
Spectral-Subtraction Based Features for Speaker Identification. 529-536 - M. Vaseemahamed, M. Ravishankar:
Automated System for Detection of Cerebral Aneurysms in Medical CTA Images. 537-543 - Inam Ul Islam Wani, M. C. Hanumantharaju, M. T. Gopala Krishna:
Contrast Enhancement of Mammograms Images Based on Hybrid Processing. 545-552 - M. S. Patel, Sanjay Linga Reddy, Krupashankari S. Sandyal:
An Improved Handwritten Word Recognition Rate of South Indian Kannada Words Using Better Feature Extraction Approach. 553-561 - M. S. Patel, Sanjay Linga Reddy, Anuja Jana Naik:
An Efficient Way of Handwritten English Word Recognition. 563-571 - H. Y. Darshan, M. T. Gopala Krishna, M. C. Hanumantharaju:
Text Detection and Recognition Using Camera Based Images. 573-579 - P. Sharath Chandra, M. C. Hanumantharaju, M. T. Gopalakrishna:
Retinal Based Image Enhancement Using Contourlet Transform. 581-587 - Sujay Angadi, M. Ravishankar:
Detection and Classification of Microaneurysms Using DTCWT and Log Gabor Features in Retinal Images. 589-596 - K. Sariya, M. Ravishankar:
Classifying Juxta-Pleural Pulmonary Nodules. 597-603 - Rasmita Panigrahi, Sarada Baboo, Neelamadhab Padhy:
The Statistical Measurement of an Object-Oriented Programme Using an Object Oriented Metrics. 605-618 - Singh Sandeep, Raees Ahmad Khan, Alka Agrawal:
Applicability of Software Defined Networking in Campus Network. 619-627 - Derrick Nazareth, Kavita Asnani, Okstynn Rodrigues:
Author-Profile System Development Based on Software Reuse of Open Source Components. 629-636 - Molla Ramizur Rahman:
Software and Graphical Approach for Understanding Friction on a Body. 637-644 - U. S. Poornima, V. Suma:
An Investigation on Coupling and Cohesion as Contributory Factors for Stable System Design and Hence the Influence on System Maintainability and Reusability. 645-650 - Chaitali More, Louella Colaco, Razia Sardinha:
Application of Component-Based Software Engineering in Building a Surveillance Robot. 651-658 - Bhagavant Deshpande, Jawahar J. Rao, V. Suma:
Comprehension of Defect Pattern at Code Construction Phase during Software Development Process. 659-666 - Divakar Harekal, Jawahar J. Rao, V. Suma:
Pattern Analysis of Post Production Defects in Software Industry. 667-671 - Yogita Wankhade, Vidya Dhamdhere, Pankaj Vidhate:
Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETs. 687-695 - Rama Devi Boddu, Kalitkar Kishan Rao, M. Asha Rani:
Co-operative Shortest Path Relay Selection for Multihop MANETs. 697-706 - Abdur Rahaman Sardar, Rashmi Ranjan Sahoo, Moutushi Singh, Souvik Sarkar, Jamuna Kanta Sing, Koushik Majumder:
Intelligent Intrusion Detection System in Wireless Sensor Network. 707-712 - Zafar Sherin, M. K. Soni:
Secure Routing in MANET through Crypt-Biometric Technique. 713-720 - Shipra Kumari, Hari Om:
Remote Login Password Authentication Scheme Using Tangent Theorem on Circle. 721-728 - Shiju Sathyadevan, Subi Prabhakaranl, K. Bipin:
A Survey of Security Protocols in WSN and Overhead Evaluation. 729-738 - Kumar Nitesh, Prasanta K. Jana:
DFDA: A Distributed Fault Detection Algorithm in Two Tier Wireless Sensor Networks. 739-746 - Souvik Basu, Siuli Roy:
Secured Categorization and Group Encounter Based Dissemination of Post Disaster Situational Data Using Peer-to-Peer Delay Tolerant Network. 747-755 - Manisha Sunil Bhende, Suvarna Patil, Sanjeev Wagh:
Lifetime Maximization in Heterogeneous Wireless Sensor Network Based on Metaheuristic Approach. 757-764 - Moutushi Singh, Abdur Rahaman Sardar, Rashmi Ranjan Sahoo, Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar:
Lightweight Trust Model for Clustered WSN. 765-773 - Indrajit Bhattacharya, Subhash Ghosh, Debashis Show:
An Efficient and Secured Routing Protocol for VANET. 775-783 - B. Anil Kumar, N. Bhaskara Rao, M. S. Sunitha:
Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks. 785-791 - S. R. Biradar, Gunjan Jain:
Rank and Weight Based Protocol for Cluster Head Selection for WSN. 793-801
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.