Volume 2, Number 1, 2012
First International Conference on Information Technology Convergence and Services ( ITCS 2012 ), January 4, 2012, Bangalore, India, Proceedings
Volume Editors: Natarajan Meghanathan, Nabendu chaki, Dhinaharan Nagamalai
ISBN : 978-1-921987-02-1
Design and simulation of circularly polarized
pentagonal-shaped microstrip patch antenna at RFID frequency
2.4 Hz
Bondili Kohitha Bai, Bhupendra singh and vinod shokeen, ASET, Amity University, India
Adaptive and Dynamic Wireless Routers with Smart Antenna for Power Management
S.Venkata Krishnan, R.Sriram and N.Senthil Kumar, Sri Sai Ram Engineering College, India
Mobility Aware Routing Protocol in Ad-Hoc Network
Suman Halder, Partha Pratim Meta and Sukla Banerjee, RCC Institute of Information Technology, Kolkata, India
Design of A Scheme for Secure Routing in Mobile Ad Hoc Networks
V.Sesha Bhargavi1 M.Seetha1 S.Viswanadharaju2, 1GNITS,Hyderabad, India and 2JNTUH,Hyderabad, India
Pentagonal shaped microstrip patch antenna
in wireless capsule endoscopy system
Bondili Kohitha Bai and Anita Thakur, ASET, Amity University, India
Improvement of CRF Based Manipuri POS Tagger by Using Reduplicated MWE (RMWE)
Kishorjit Nongmeikapam1, Lairenlakpam Nonglenjaoba1, Yumnam Nirmal1 and Sivaji Bandhyopadhyay1, 1Manipur University, India and 2Jadavpur University, India
A Novel Method for Petri Net Modeling
Chen-xi SHAO1,3, Er-hui ZHOU1,2, Zhen-zhong SHAO4, Wei-hua WANG5, Xue-feng WU1, 1University of Science and
Technology of China, China, 2Information Center of Hospital, China, 3Anhui Province Key Laboratory of Software in Computing and Communication, China, 4Jianghuai Automobile Co., Ltd, China and 5Liwei Automobile Oil-pump Co., Ltd., China
Dependable Web Services Security Architecture Development Theoretical and Practical Issues - Spatial Web Services Case Study
D. Shravani1 P. Suresh Varma2 K. Venkateswar Rao3 B. Padmaja Rani3 and M. Upendra Kumar4, 1Rayalaseema University, India, 2Adikavi Nannaya University, India, 3JNTUH CEH Hyderabad, India and 4MGIT Hyderabad, India
Robust Adaptive Threshold Algorithm based
on Kernel Fuzzy Clustering on Image segmentation
Tara.Saikumar1, B.K.Anoop2 and P.S.Murthy3, 1CMR Technical Campus, India, 2MACE, India and 3CMRIT, India
MDAV2K: A Variable-Size Microaggregation Technique for Privacy Preservation
S. K. Chettri1 and B. Borah2, 1Saint Mary's College, India and 2Tezpur University, India
A Survey on Web Pre-Fetching and Web Caching Techniques in a Mobile Environment
Greeshma G. Vijayan and Jayasudha J. S, SCT College of Engineering, India
Assessment of systolic and diastolic cycle
duration from speech analysis in the state of anger and fear
Nivedita Deshpande1, KavitaThakur1 and A.S.Zadgaonkar2, 1Pt. Ravishankar University, India and 2Dr. C.V. Raman University, India
Dwt-SVD Based Secured Image Watermarking for Copyright Protection Using Visual Cryptography
Sushila Kamble, Vikas Maheshkar, Suneeta Agarwal and Vinay K Srivastava, MNNIT, Allahabad, India
A Comparative Study of Incentive Mechanisms Used in Peer-To-Peer System
Guruprasad Khataniar1, Sankhapani Bharali2 and Archana Khataniar3, 1Assam Engineering Institute, India,
2Girl's Polytechnic, Assam, India and 3Bajali College, Assam, India
Innovative field of cryptography: DNA
cryptography
Er.Ranu Soni1, Er.Vishakha Soni2 and Er.Sandeep Kumar Mathariya2, 1LNCT Indore, India and 2PCST Indore, India
Application of Genetic Algorithm in Designing a Security Model for Mobile Adhoc Network
Kumar Nikhil, Swati Agarwal and Pankaj Sharma, ABES Engineering College, India
Frequent Subgraph Mining Algorithms - A Survey and Framework for Classification
K. Lakshmi1 and T. Meyyappan2, 1Sir M. Visvesvaraya Institute of Technology, India and 2Alagappa University,
India
Application of Autonomic Computing Principles in Virtualized Environment
Anala M R and Shobha G, RVCE, India
Object Shape Representation by Kernel Density Feature Points Estimator
Tranos Zuva1, Oludayo O. Olugbara2, Sunday O. Ojo3 and Seleman M.Ngwira1, 1Tshwane University of Technology,
South Africa, 2Durban University of Technology, South Africa and 3Faculty of Information and Communication
Technology, South Africa
Performance Evaluation of JPEG Image Compression Using Symbol Reduction Technique
Bheshaj Kumar1,Kavita Thakur1 and G.R. Sinha2, 1Pt. R. S. University,Raipur,India and 2Shri Shankarachrya
College of Engineering & Technology,
Content-Based Image Retrieval Using Modified Human Colour Perception Histogram
Shaila S.G and A.Vadivel, National Institute of Technology, India
Terrian Identification Using Co-Clustered Model of the Swarm Intellegence & Segmentation Technique
Ritesh Srivastava1 Shivani Agarwal2 Ankit Goel2 Vipul Gupta2, 1Galgotia College, Greater Noida and
2IMS Engineering College, Ghaziabad
Human Vision Thresholding with Enhancement for Dark Blurred Images for Local Content Preservation
Chelsy Sapna Josephus and Remya .S, University of Kerala, India
Hardware Software Co-Simulation of Motion Estimation in H.264 Encoder
S. Valarmathi1, R. Vani2 and M. Sangeetha1, 1Karpaga Vinayaga College of Engg. and Technology, India and
2Anna University of Technology, India
Medical Image Texture Segmentation Usingrange Filter
Amir Rajaei, LalithaRangarajan and ElhamDallalzadeh, University of Mysore, India
Tile Boundary Artifacts Reduction of
JPEG2000 Compressed Images
Singara Singh, R. K. Sharma and M. K. Sharma, Thapar University, India
State Space Point Distribution Parameter for Support Vector Machine Based CV Unit Classification
N K Narayanan1 T M Thasleema1 and V Kabeer2, 1Kannur University, India and 2University of Calicut, India
"Openness of Search Engine": A Critical Flaw in Search Systems; A Case Study on Google, Yahoo and Bing
Katuru SM Kalyana Chakravarthy, ISTQB Certified QA Engineer, India
Automatic Assessment of Programming assignment
Surendra Gupta and Shiv Kumar Dubey, Shri G. S. Institute of Technology & Science, India
A Framework Studio for Component Reusability
N Md Jubair Basha1 and Salman Abdul Moiz2, 1Muffakham Jah College of Engineering & Technology India and
2MVSR Engineering College, India
Boolean Specification Based Testing Techniques: A Survey
Usha Badhera, Purohit G.N and S.Taruna, Banasthali University, India
A Novel Algorithm for Watermarking and Image Encryption
Rakesh S, Ajitkumar A Kaller, Shakshari B C and Annappa B, National Institute of Technology - Karnataka, India
Integrating Related XML Data into Multiple Data Warehouse Schemas
Soumya Sen1, Ranak Ghosh2, Debanjali Paul2 and Nabendu Chaki1, 1University of Calcutta Kolkata, India and
2Barrackpore Rastraguru Surendranath College, India
Symmetric Encryption Algorithm in Speech Coding for Defence Communications
Akella Amarendra Babu1 and Ramadevi Yellasiri2, 1Progressive Engineering College, India and 2Chaitanya
Bharathi Institute of Technology, Hyderabad, India
Early Stage Software Development Effort Estimations - Mamdani FIS Vs Neural Network Models
Roheet Bhatnagar and Mrinal Kanti Ghose, Sikkim Manipal University, India
An Innovative SQA Service Maturity Model Using CMMI And ITIL
Shankar Gurumoorthy, Senior Quality Leader, Bangalore, India
Applying Requirement Based Complexity for the Estimation of Software Development and Testing Effort
Ashish Sharma1 and Dharmender Singh Kushwaha2, 1GLA University, Mathura, India and 2MNNIT - Allahabad,
India
SXC-JMS: A WEB -Based Journal Management System
Sahon Bhattacharyya, Kalyan Mondal, Shalabh Agarwal and Asoke Nath, St. Xavier's College, India
Adaptive Guidance System for SPEM
Hamid Khemissa1 Mohamed Ahmed-nacer1 and Mourad Oussalah2, 1USTHB University, Algeria and 2Nantes
University, France
Program Test Data Generation for Branch Coverage with Genetic Algorithm: Comparative Evaluation of
A Maximization and Minimization Approach
Ankur Pachauri Gursaran, Dayalbagh Educational Institute, Agra
Knowledge Base of Project Managers in the South African ICT Sector
Robert T. Hans1and Pantaleo M.D. Rwelamila2, 1Tshwane University of Technology, South Africa and
2University of South Africa, South Africa