researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2012
2013
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Amit Konar
Anil Kumar Bag
Anjali Sardana
Arindam Das
Asit Kumar Das
B. K. Tripathy
Bipan Tudu
C. Tripti
Chaitali Biswas Dutta
D. Chandramohan
D. N. Tibarewala
Dharmender Singh Kushwaha
J. K. Mandal
Manu Vardhan
P. Dhavachelvan
Prasun Ghosal
R. Geetha Ramani
Rituparna Chaki
Satrajit Das
Somanath Tripathy
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
analysis
approach
data
detection
hybrid
image
mining
multi
network
networks
novel
performance
routing
security
system
technique
using
web
wireless
ACITY (3) (acity)
Editions
Publications
Viewing Publication 1 - 100 from 246
2013
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 2
Natarajan Meghanathan
,
Dhinaharan Nagamalai
,
Nabendu Chaki
, editors,
Volume 177 of
Advances in Intelligent Systems and Computing
, Springer,
2013.
[doi]
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 3
Natarajan Meghanathan
,
Dhinaharan Nagamalai
,
Nabendu Chaki
, editors,
Volume 178 of
Advances in Intelligent Systems and Computing
, Springer,
2013.
[doi]
2012
Efficiency Improvement of a-Si: H/μc-Si: H Tandem Solar Cells by Adding a-SiOx: H Layer between Ag Nano Particles and the Active Layer
Ozcan Abdulkadir
,
Dhinaharan Nagamalai
.
acity 2013
:
289-297
[doi]
Processing RDF Using Hadoop
Mehreen Ali
,
K. Sriram Bharat
,
C. Ranichandra
.
acity 2013
:
385-394
[doi]
A Unified Framework for Pervasive Healthcare Medical Computing Based on SOA
K. M. Anandkumar
,
C. Jayakumar
.
acity 2013
:
319-327
[doi]
Dynamic Ontology Construction for E-Trading
K. AnithaKumari
,
G. SudhaSadasivam
,
T. Aruna
,
S. Christie Sajitha
.
acity 2013
:
439-449
[doi]
Optimization of Integration Weights for a Multibiometric System with Score Level Fusion
S. M. Anzar
,
P. S. Sathidevi
.
acity 2013
:
833-842
[doi]
Multi-temporal Satellite Image Analysis Using Unsupervised Techniques
C. S. Arvind
,
Ashoka Vanjare
,
S. N. Omkar
,
J. Senthilnath
,
V. Mani
,
P. G. Diwakar
.
acity 2013
:
757-765
[doi]
Web Mining and Security in E-commerce
Shaikh Mohammed Atiq
,
Dayanand Ingle
,
B. B. Meshram
.
acity 2012
:
477-487
[doi]
Hybrid Algorithm for Job Scheduling: Combining the Benefits of ACO and Cuckoo Search
R. G. Babukarthik
,
R. Raju
,
P. Dhavachelvan
.
acity 2013
:
479-490
[doi]
VCR: Vehicular Cloud for Road Side Scenarios
Dimal Baby
,
R. D. Sabareesh
,
R. A. K. Saravanaguru
,
Arunkumar Thangavelu
.
acity 2013
:
541-552
[doi]
Discovering Dispathcing Rules for Job Shop Schdeuling Using Data Mining
R. Balasundaram
,
N. Baskar
,
R. Siva Sankar
.
acity 2013
:
63-72
[doi]
Identification of Handwritten Text in Machine Printed Document Images
Sandipan Banerjee
.
acity 2013
:
823-831
[doi]
Building OWL Ontology: LMSO-Library Management System Ontology
Ayesha Banu
,
Syeda Sameen Fatima
,
Khaleel Ur Rahman Khan
.
acity 2013
:
521-530
[doi]
Extending Application of Non-verbal Communication to Effective Requirement Elicitation
Md. Rizwan Beg
,
Md. Muqeem
,
Md. Faizan Farooqui
.
acity 2013
:
623-630
[doi]
A New Hybrid Approach for Denoising Medical Images
Deepa Bharathi
,
Sumithra Manimegalai Govindan
.
acity 2013
:
905-914
[doi]
MSRCC - Mitigation of Security Risks in Cloud Computing
D. Chandramohan
,
T. Vengattaraman
,
M. S. Saleem Basha
,
P. Dhavachelvan
.
acity 2012
:
525-532
[doi]
ECDLP Based Proxy Multi-signature Scheme
Ramanuj Chouksey
,
R. Sivashankari
,
Piyush Singhai
.
acity 2012
:
71-79
[doi]
An Efficient De-noising Technique for Fingerprint Image Using Wavelet Transformation
Ashish Kumar Dass
,
Rabindra Kumar Shial
.
acity 2013
:
709-717
[doi]
A Scheme for Improving Bit Efficiency for Residue Number System
Chaitali Biswas Dutta
,
Partha Garai
,
Amitabha Sinha
.
acity 2013
:
649-656
[doi]
SoC Modeling for Video Coding with Superscalar Projection
S. K. Fairooz
,
B. K. Madhavi
.
acity 2013
:
787-795
[doi]
A Critical Review of Migrating Parallel Web Crawler
Md. Faizan Farooqui
,
Md. Rizwan Beg
,
Md. Qasim Rafiq
.
acity 2013
:
631-637
[doi]
Securing DICOM Format Image Archives Using Improved Chaotic Cat Map Method
M. Arun Fera
,
Suresh Jaganathan
.
acity 2013
:
319-328
[doi]
A Web-Based Adaptive and Intelligent Tutor by Expert Systems
Hossein Movafegh Ghadirli
,
Maryam Rastgarpour
.
acity 2013
:
87-95
[doi]
Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment
Mayank Kumar Goyal
,
Alok Aggarwal
.
acity 2012
:
151-157
[doi]
Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links
Mayank Kumar Goyal
,
Yatendra Kumar Verma
,
Paras Bassi
,
Paurush Kumar Misra
.
acity 2012
:
299-306
[doi]
Personalised High Quality Search with in a Web Site: No User Profiling
L. K. Joshila Grace
,
V. Maheswari
,
Dhinaharan Nagamalai
.
acity 2012
:
307-316
[doi]
Comparative Study and Analysis of Short Channel Effects for 180nm and 45nm Transistors
Kiran Agarwal Gupta
,
Dinesh K. Anvekar
,
V. Venkateswarlu
.
acity 2013
:
707-715
[doi]
Trust Oriented Secured AODV Routing Protocol against Rushing Attack
Swarnali Hazra
,
S. K. Setua
.
acity 2012
:
777-788
[doi]
A Language Independent Approach to Develop Urdu Stemmer
Mohd. Shahid Husain
,
Faiyaz Ahamad
,
Saba Khalid
.
acity 2013
:
45-53
[doi]
Sense Disambiguation Technique for Information Retrieval in Web Search
Rekha Jain
,
G. N. Purohit
.
acity 2013
:
451-461
[doi]
Application Security in Mobile Devices Using Unified Communications
Ramakrishna Josyula
.
acity 2013
:
135-143
[doi]
A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks
Preetha Theresa Joy
,
K. Polouse Jacob
.
acity 2012
:
609-619
[doi]
Performance Improvement in MIMO Systems Using Rotating Codebooks
J. Julia
,
M. Meenakshi
.
acity 2012
:
489-496
[doi]
Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks
V. Kamatchi
,
Rajeswari Mukesh
,
Rajakumar
.
acity 2013
:
365-373
[doi]
Fuzzy Driven Multi-issue Agent Negotiation on Electronic Marketplace
Mohammed S. Karim
,
Joseph Pierluissi
.
acity 2013
:
239-248
[doi]
Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator
Manjusha Karkhanis
,
Achala Deshmukh
.
acity 2012
:
375-383
[doi]
A Novel Rule Based Classifier for Mining Temporal Medical Databases Using Fuzzy Rough Set Approach
U. Keerthika
,
R. Sethukkarasi
,
A. Kannan
.
acity 2013
:
85-95
[doi]
A Naive Approach for Prediction of Sectorial Stock Market
Neeraj Kharya
,
Jyothi Pillai
.
acity 2013
:
195-204
[doi]
MACREE - A Modern Approach for Classification and Recognition of Earthquakes and Explosions
K. Vijay Krishnan
,
S. Viginesh
,
G. Vijayraghavan
.
acity 2013
:
49-56
[doi]
Wavelet SIFT Feature Descriptors for Robust Face Recognition
Nerella Arun Mani Kumar
,
P. S. Sathidevi
.
acity 2013
:
851-859
[doi]
A Two Stage Combinational Approach for Image Encryption
H. S. Sharath Kumar
,
H. T. Panduranga
,
S. K. Naveen Kumar
.
acity 2013
:
843-849
[doi]
Implanted CPW Fed Monopole Antenna for Biomedical Applications
S. Ashok Kumar
,
T. Shanmuganantham
.
acity 2013
:
97-105
[doi]
Jong Nang 3-Input NOR Channel,
Moon Ho Lee
,
Md. Hashem Ali Khan
,
Daechul Park
.
acity 2012
:
551-562
[doi]
Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis
Premraj Mahajan
,
Anjali Sardana
.
acity 2012
:
43-53
[doi]
Application of Information Theory for Understanding of HLA Gene Regulation in Leukemia
Durjoy Majumder
.
acity 2013
:
161-173
[doi]
Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR
Koushik Majumder
,
Sudhabindu Ray
,
Subir Kumar Sarkar
.
acity 2012
:
797-806
[doi]
Invisible Image Watermarking Using Z Transforms (IIWZT)
J. K. Mandal
,
Rakesh Kanji
.
acity 2013
:
797-804
[doi]
Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA)
J. K. Mandal
,
S. K. Ghosal
.
acity 2013
:
767-776
[doi]
A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT)
J. K. Mandal
,
A. Khamrui
,
S. Chakraborty
,
P. Sur
,
S. K. Datta
,
I. RoyChoudhury
.
acity 2013
:
885-893
[doi]
Two-Stage Rejection Algorithm to Reduce Search Space for Character Recognition in OCR
Srivardhini Mandipati
,
Gottumukkala Asisha
,
S. Preethi Raj
,
S. Chitrakala
.
acity 2013
:
215-223
[doi]
CMOS 8-Bit Current-Steering Digital Random Return to Zero DAC
Piyush K. Mathurkar
,
Madan B. Mali
.
acity 2013
:
615-622
[doi]
Rough Set Model for Prediction of Trustworthy Web Services
Sankaranarayanan Murugan
,
Veilumuthu Ramachandran
.
acity 2013
:
307-318
[doi]
Securing Multi-agent Systems: A Survey
S. V. Nagaraj
.
acity 2012
:
23-30
[doi]
Performance Analysis of SCTP Compared to TCP and UDP
Nagesha
,
S. S. Manvi
.
acity 2012
:
515-524
[doi]
Traffic Light Synchronization
K. Sankara Nayaki
,
N. U. Nithin Krishnan
,
Vivek Joby
,
R. Sreelakshmi
.
acity 2013
:
97-106
[doi]
Particle Based Fluid Animation Using CUDA
Uday A. Nuli
,
P. J. Kulkarni
.
acity 2013
:
503-510
[doi]
Study of the EEG Signals of Human Brain for the Analysis of Emotions
Ashish R. Panat
,
Anita S. Patil
.
acity 2013
:
659-665
[doi]
Comparison of PCA, LDA and Gabor Features for Face Recognition Using Fuzzy Neural Network
Dhanya S. Pankaj
,
M. Wilscy
.
acity 2013
:
413-422
[doi]
Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System
Tulsidas Patil
,
Ganesh Dattatray Bhutkar
,
Noshir Tarapore
.
acity 2012
:
317-328
[doi]
Localization in Wireless Sensor Network: A Distributed Approach
Shailaja Patil
,
Mukesh Zaveri
.
acity 2012
:
467-476
[doi]
The Simulation of the Assembling Production Process
Róbert Paulicek
,
Tomás Haluska
,
Pavel Vazan
.
acity 2013
:
273-278
[doi]
HURI - A Novel Algorithm for Mining High Utility Rare Itemsets
Jyothi Pillai
,
O. P. Vyas
,
Maybin Muyeba
.
acity 2013
:
531-540
[doi]
Left Object Detection with Reduced False Positives in Real-Time
Aditya Piratla
,
Monotosh Das
,
Jayalakshmi Surendran
.
acity 2013
:
691-698
[doi]
An Efficient Flash Crowd Attack Detection to Internet Threat Monitors (ITM) Using Honeypots
K. Munivara Prasad
,
M. Ganesh Karthik
,
E. S. Phalguna Krishna
.
acity 2013
:
595-610
[doi]
Hybrid Ant Colony Optimization and Cuckoo Search Algorithm for Job Scheduling
R. Raju
,
R. G. Babukarthik
,
P. Dhavachelvan
.
acity 2013
:
491-501
[doi]
Performance Comparison of Rectangular and Circular Patch Microstrip Yagi Antenna
K. RamaDevi
,
A. Jhansi Rani
,
A. Mallikarjuna Prasad
.
acity 2013
:
481-490
[doi]
Design of Efficient Reversible Multiplier
H. G. Rangaraju
,
Aakash Babu Suresh
,
K. N. Muralidhara
.
acity 2013
:
571-579
[doi]
Comprehensive Study of Estimation of Path Duration in Vehicular Ad Hoc Network
R. S. Raw
,
Vikas Toor
,
N. Singh
.
acity 2013
:
309-317
[doi]
Temporary Parallel Route Recovery for Frequent Link Failure in VANET
B. Siva Kumar Reddy
,
M. Sakthi Ganesh
,
P. Venkata Krishna
.
acity 2012
:
369-374
[doi]
A Decentralised Routing Algorithm for Time Critical Applications Using Wireless Sensor Networks
R. A. Roseline
,
P. Sumathi
.
acity 2013
:
125-133
[doi]
E-Government Adoption: A Conceptual Demarcation
Rahmath Safeena
,
Abdullah Kammani
.
acity 2013
:
67-76
[doi]
Word Spotting in Cursive Handwritten Documents Using Modified Character Shape Codes
Sayantan Sarkar
.
acity 2013
:
269-278
[doi]
Design of Video Conferencing Solution in Grid
Soumilla Sen
,
Ajanta De Sarkar
.
acity 2013
:
445-457
[doi]
Optimum Sub-station Positioning Using Hierarchial Clustering
Shabbiruddin
,
Sandeep Chakravorty
,
Amitava Ray
.
acity 2013
:
405-412
[doi]
A Dynamic Approach for Mining Generalised Sequential Patterns in Time Series Clinical Data Sets
M. Rasheeda Shameem
,
M. Razia Naseem
,
N. K. Subanivedhi
,
R. Sethukkarasi
.
acity 2013
:
667-674
[doi]
Brain Tumor Segmentation Using Genetic Algorithm and Artificial Neural Network Fuzzy Inference System (ANFIS)
Minakshi Sharma
,
Sourabh Mukharjee
.
acity 2013
:
329-339
[doi]
Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks
R. Shyamala
,
S. Valli
.
acity 2012
:
349-359
[doi]
Partition Sort versus Quick Sort: A Comparative Average Case Analysis with Special Emphasis on Parameterized Complexity
Niraj Kumar Singh
,
Soubhik Chakraborty
.
acity 2013
:
107-113
[doi]
Host-Based Bot Detection Using Destination White-Lists for User's Profile
B. Soniya
,
M. Wilscy
.
acity 2012
:
87-93
[doi]
Effective Resource Allocation Technique for Wireless Cellular System
Banda Sreenivas
,
S. Ramesh Babu
,
S. Prabhakar
,
D. Karunakar Reddy
.
acity 2012
:
633-640
[doi]
M-ADTCP: An Approach for Congestion Control in MANET
B. C. Sreenivasa
,
G. C. Bhanu Prakash
,
K. V. Ramakrishnan
.
acity 2013
:
531-540
[doi]
Physical Abstraction Method (RBIR) for OFDM System
Banda Sreenivasa
,
R. Jawahar Lal
.
acity 2013
:
431-438
[doi]
Awareness Based Approach against E-Mail Attacks
Gaurav Kumar Tak
,
Gaurav Ojha
.
acity 2012
:
699-708
[doi]
Hybrid Technique for Effective Knowledge Representation
Poonam Tanwar
,
T. V. Prasad
,
Kamlesh Datta
.
acity 2013
:
33-43
[doi]
An Extension of FFT Based Image Registration
P. Thangavel
,
R. Kokila
.
acity 2013
:
729-737
[doi]
Conceptual Application of List Theory to Data Structures
B. K. Tripathy
,
S. S. Gantayat
.
acity 2013
:
551-560
[doi]
Analysis on Impact of Behavioral Modeling in Performance of Synthesis Process
R. Uma
,
P. Dhavachelvan
.
acity 2013
:
593-602
[doi]
Semantic Based Image Retrieval System for Web Images
K. K. Umesh
,
Suresha
.
acity 2013
:
491-499
[doi]
Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor
S. Indu Vadhani
,
G. Vithya
,
B. Vinayagasundaram
.
acity 2012
:
435-445
[doi]
SLA for a Pervasive Healthcare Environment
J. Valarmathi
,
K. Lakshmi
,
R. S. Menaga
,
K. V. Abirami
,
V. Rhymend Uthariaraj
.
acity 2012
:
141-149
[doi]
Unsymmetrical Trimmed Midpoint as Detector for Salt and Pepper Noise Removal
K. Vasanth
,
V. Jawahar Senthil Kumar
,
V. Elanangai
.
acity 2013
:
813-822
[doi]
Service-Oriented Architecture (SOA) and Semantic Web Services for Web Portal Integration
T. G. K. Vasista
,
Mohammed A. T. AlSudairi
.
acity 2013
:
253-261
[doi]
Super Peer Deployment in Unstructured Peer-to-Peer Networks
R. Venkadeshan
,
M. Jegatha
.
acity 2012
:
661-669
[doi]
Transforming Election Polling from Electronic Voting to Cloud as a Software Service in India
P. Vidhya
.
acity 2013
:
225-232
[doi]
Building Concept System from the Perspective of Development of the Concept
Cheng Xian-Yi
,
Shen Xue-hua
,
Shi Quan
.
acity 2013
:
57-65
[doi]
Fuzzy Terrain-Based Navigation on Urban Terrains
Wong Kit Yee
,
Subramaniam Parasuraman
,
Velappa Ganapathy
.
acity 2013
:
249-258
[doi]
Mobile Robot Navigation: Neural Q-Learning
Soh Chin Yun
,
Subramaniam Parasuraman
,
Velappa Ganapathy
.
acity 2013
:
259-268
[doi]
Oil Spill Cleaning Up Using Swarm of Robots
Emaad Mohamed H. Zahugi
,
Mohamed M. Shanta
,
T. V. Prasad
.
acity 2013
:
215-224
[doi]
Chemical Sensors Employed in Electronic Noses: A Review
Syeda Erfana Zohora
,
A. M. Khan
,
Nisar Hundewale
.
acity 2013
:
177-184
[doi]
Sign in
or
sign up
to see more results.