Volume 3, Number 6, 2013
Third International Conference on Computer Science & Information Technology (CCSIT 2013), Feb 18~20, Bangalore, India.
Volume Editors: Jan Zizka, Dhinaharan Nagamalai
ISBN : 978-1-921987-00-7
Humanistic Approach in Mobile Adhoc Network : HAMANET
Md. Amir Khusru Akhtar1 and G. Sahoo2, 1 Cambridge Institute of Technology, India and 2 Birla Institute of Technology, India
Fake Face Database and Preprocessing
Aruni Singh, Sanjay Kumar Singh and Shrikant Tiwari, IIT(BHU), India
Node Failure Time Analysis for Maximum Stability vs Minimum Distance Spanning Tree Based Data Gathering in Mobile Sensor Networks
Natarajan Meghanathan1 and Philip Mumford2, 1 Jackson State University, USA and 2 Air Force Research Lab/RYWC, USA
Knowledge Base Compound Approach Against Phishing Attacks Using Some Parsing Techniques
Gaurav Kumar Tak1, Gaurav Ojha2 and Udit Kumar2, 1 Lovely Professional University, India and 2 Indian Institute of Information Technology and Management, India
Affect of Parallel Computing on Multicore Processors
V R Rao Konkimalla and Niraj Upadhayaya, JB Institute of Engineering Technology, India
Framework for Tagging Software in Web Application
Karan Gupta and Anita Goel, University of Delhi, India
A RAMP Code for Fine-Grained Access Control
Kannan Karthik, Indian Institute of Technology - Guwahati, India
Fusion Based Multimodal Authentication in Biometrics Using Context-Sensitive Exponent Associative Memory Model : A Novel Approach
P. E. S. N. Krishna Prasad, Pavan Kumar K, M. V. Ramakrishna and B. D. C. N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India
Combined Mining Approach to Generate Patterns for Complex Data
Sumit Kumar1, Sweety2 and Manish Kumar2, 1IVY Comptech Pvt. Ltd, India and 2IIIT-Allahabad, India
Real Time Database Compression Optimization Using Iterative Length Compression Algorithm
Muthukumar Murugesan1 and T Ravichandran2, 1Karpagam University, India and 2Hindusthan Institute of Technology, India
Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures
Ranjit Panigrahi, Kalpana Sharma and M.K. Ghose, SMIT, India
Mapping of Traditional Software Development Methods to Agile Methodology
Rashmi Popli, Anita and Naresh Chauhan, YMCA University of Science & Technology, India
A Model for Aligning Software Projects Requirements with Project Team Members Requirements
Robert Hans, Tshwane University of Technology, South Africa
A Hybrid Approach for Ensuring Security in Data Communication
Shailender Gupta1, Bharat Bhushan1, Surbhi Singhania1 and Jeetesh Gulani2, 1YMCA University of Science and Technology, India and 2Indian Institute of Technology-Kharagpur, India
On Average Case Analysis Through Statistical Bounds : Linking Theory to Practice
Niraj Kumar Singh, Soubhik Chakraborty and Dheeresh Kumar Mallick, BIT Mesra, India
Semantic Web Services - Discovery, Selection and Composition Techniques
Sowmya Kamath S and Ananthanarayana V.S, National Institute of Technology, India
Classification of Tamil Poetry Using Context Free Grammar Using Tamil Grammar Rules
Subasree Venkatsubhramaniyen, Subha Rashmi and Rajeswari Sridhar, Anna University, India
Study of VANET Routing Protocols for End to End Delay
Sunilkumar M. Bhagat and Vijay Wadhai, MIT Academy of Engineering, India
A Secure Key Computation Protocol for Secure Group Communication with Password Based Authentication
1Velumadhava Rao R, 1Vikhnesh ma,1Kailash B, 2Selvamani K and 3Elakkiya R, 1Rajalakshmi Institute of Technology, India, 2Anna University, India and 3Jerusalem College of Engineering, India
A Survey on Wireless Sensor Networks Security with the Integration of Clustering and Keying Techniques
V K Singh and Kalpana Sharma, Sikkim Manipal Institute of Technology, India
Influence of Priors Over Multityped Object in Evolutionary Clustering
L. Visalatchi1 and T. Meyyappan2, 1Dr. Umayal Ramanathan College for women, India and 2Alagappa University, India
Agent Based Intrusion Detection System in MANET
J. K. Mandal1, Khondekar Lutful Hassan2, 1University of Kalyani, India and 2University of Calcutta, India
An Analytical Approach to Generate Unique Song Signal ( AUSS )
Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani, India
Secured Wireless Communication Through Simulated Annealing Guided Traingularized Encryption by Multilayer Perception Generated Session Key (SATMLP)
Arindam Sarkar and J. K. Mandal, University of Kalyani, India
Image Coding Through ZTransform with Low Energy and Bandwidth (IZEB)
Madhumita Sengupta, J. K. Mandal, University of Kalyani, India
Edge Detection by Modified OTSU Method
J. K. Mandal and Abhinaba Ghosh, University of Kalyani, India
An Exploration of Periocular Region with Reduced Region for Authentication : Realm of Occult
Ambika D R, Radhika K R and D Seshachalam, BMS College of Engineering, India
Multiple Region of Interest Tracking of Non-Rigid Objects Using Demon's Algorithm
Rohan Pillai, Abhishikta Yalavali Saima Mohan and Amol Patil, iGate, India
Noise Removal Techniques for Microwave Remote Sensing Radar Data and Its Evaluation
Arundhati Misra1, B Kartikeyan1 and S.Garg2, 1 ISRO, India and 2Nirma University, India
Legendre Transform Based Color Image Authentication (LTCIA)
J.K.Mandal and S. K.Ghosal, Kalyani University, India
A GIS Anchored Technique to Obtain Optimal Path Through Minimal Alteration of Land Type
Anirban Chakraborty1, J. K. Mandal2, T. Neogi1 & S. Nayek1, 1Barrackpore Rastraguru Surendranath College, India and 2University of Kalyani, India
A Fragile Watermarking Based on Binomial Transform in Color Images
J. K. Mandal and S. K.Ghosal, University of Kalyani, India
Fractal Image Compression with Adaptive Quardtree Partitioning
Utpal Nandi and Jyotsna Kumar Mandal, University of Kalyani, India
A Novel Voting System Using SMS
M.Kamaraju, P.V.Subba Rao and T.Venkata Lakshmi, Gudlavalleru Engineering College, India
Study of Acoustic Properties of Nasal and Nonnasal Vowels in Temporal Domain
Nishant Singhal and Pradip K. Das, Indian Institute of Technology-Guwahati, India
An Efficient Peak Valley Detection Based VAD Algorithm for Robust Detection of Speech Auditory Brainstem Responses
Ranganadh Narayanam, Bharat Institute of Engineering & Technology, India
Performance Evaluations of GRIORYAN FFT and COOLEY-TUKEY FFT onto XILINX VIRTEX-II PRO and VIRTEX-5 FPGAS
Narayanam Ranganadh and Bindu Tushara D, Bharat Institute of Engineering & Technology, India
An ANN Based Brain Abnormality Detection Using MR Images
K.V. Kulhalli and S.R.Khot, D.Y.Patil College of Engineering and Technology, India
HMM Based POS Tagger for Hindi
Nisheeth Joshi1, Hemant Darbari2 and Iti Mathur1, 1Banasthali University, India and 2Center for Development of Advanced Computing, India
Domain Ontology Development for Communicable Diseases
Iti Mathur1, Hemant Darbari2 and Nisheeth Joshi1, 1Banasthali University, India and 2Center for Development of Advanced Computing, India
Self Learning Real Time Expert System
Latha B. Kaimal, Abhir Raj Metkar and Rakesh G, C-DAC, India
Comparison Analysis of Shunt Active Filter and Transformerless Parallel Hybrid Active Filter
Sakshi Bangia, P.R.Sharma and Maneesha Garg, YMCA University of Science and Technology, India
An Analysis of Minimax Search and Endgame Databases in Evolving Awale Game Player
Ngwira Seleman, Randle O.A and Zuva T, Tshwane University of Technology, South Africa
AMTR : The ANT Based QOS Aware Multipath Temporally Ordered Routing Algorithm for MANETs
Debajit Sensarma and Koushik Majumder, West Bengal University of Technology, India
A Language Independent Approach to Develop URDUIR System
Mohd. Shahid Husain and Iram Siraj, Integral University, India
Software Project Scope Verification Through Deliverable-Oriented Work Breakdown Structure
Robert T. Hans, Tshwane University of Technology, South Africa
A Novel Approach for Selection of Learning Objects for Personalized Delivery of E-Learning Content
D. Anitha and C. Deisy, Thiagarajar College of Engineering, India
Contextual Model of Recommending Resources on an Academic Networking Portal
Anoop Kumar Pandey, Amit Kumar and Balaji Rajendran, Centre for Development of Advanced Computing, India
Size Estimation of OLAP Systems
Madhu Bhan1, T V Suresh Kumar1 and K.Rajanikanth2, 1M. S. Ramaiah Institute of Technology, India and 2Visvesvaraya Technological University, India
Adaptation of Parametric Uniform Crossover in Genetic Algorithm
Farhad Nadi and Ahamad Tajudin Khader, Universiti Sains Malaysia, Malaysia
The Effective Way of Processor Performance Enhancement By Proper Branch Handling
Jisha P Abraham1 and Sheena Mathew2, 1M A College of Engineering, India and 2 Cochin University of Science and Technology, India
Information Technology Model for Product Lifecycle
Engineering
Bhanumathi KS and B Haridas, CSIR-National Aerospace Laboratories, India
Modeling of Distributed Mutual Exclusion System Using Event-B
Raghuraj Suryavanshi1 and Divakar Yadav2, 1GBTU, India and 2South Asian University, India
Estimating Project Development Effort Using Clustered Regression Approach
Geeta Nagpal1, Moin Uddin2 and Arvinder Kaur3, 1National Institute of Technology, India, 2Delhi Technological University, India and 3GGSIPU, India
A Semantic Based Approach for Information Retrieval from Html Documents Using Wrapper Induction Technique
A.M.Abirami1, A.Askarunisa2, T.M.Aishwarya1 and K.S.Eswari1, 1Thiagarajar College of Engineering, India and 2Vickram College of Engineering, India
An Approach to Word Sense Disambiguation Combining
Modified Lesk and Bag-of-Words
Alok Ranjan Pal1,3, Anirban Kundu2,3, Abhay Singh1, Raj Shekhar1 and Kunal Sinha1, 1College of Engineering and Management, India, 2Kuang-Chi Institute of Advanced Technology, P.R.China and 3Innovation Research Lab (IRL), India
Facial Landmarking Localization for Emotion Recognition Using Bayesian Shape Models
Hernan F. Garcia, Alejandro T. Valencia and Alvaro A. Orozco, Technological University of Pereira, Colombia