


default search action
FICTA 2014: Bhubaneswar, Odisa, India
- Suresh Chandra Satapathy

, Bhabendra Narayan Biswal, Siba K. Udgata
, J. K. Mandal
:
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 - Volume 2, Bhubaneswar, Odisa, India, 14-15 November 2014. Advances in Intelligent Systems and Computing 328, Springer 2015, ISBN 978-3-319-12011-9 - Mahesh U. Shankarwar, Ambika Vishal Pawar:

Security and Privacy in Cloud Computing: A Survey. 1-11 - Krishnendu Guha

, Romio Rosan Sahani, Moumita Chakraborty, Amlan Chakrabarti
, Debasri Saha:
Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores. 13-20 - Gadang Madhulika, Chinta Seshadri Rao:

Generating Digital Signature Using DNA Coding. 21-28 - P. V. S. N. Raju, Pritee Parwekar

:
DNA Encryption Based Dual Server Password Authentication. 29-37 - Navneet Kaur Gill, Sarbjeet Singh

:
Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System. 39-47 - Boudhayan Bhattacharya, Banani Saha

:
Signalling Cost Analysis of Community Model. 49-56 - Akshay Kandul, Ashwin More, Omkar Davalbhakta, Rushikesh Artamwar, Dinesh Kulkarni:

Steganography with Cryptography in Android. 57-64 - Manas Kumar Sanyal, Sudhangsu Das, Sajal Bhadra:

A Cloud Based Architecture of Existing e-District Project in India towards Cost Effective e-Governance Implementation. 65-73 - Musheer Ahmad

, Akshay Chopra, Prakhar Jain, Shahzad Alam:
A Chaotic Substitution Based Image Encryption Using APA-transformation. 75-83 - Shiju Satyadevan, Boney S. Kalarickal, M. K. Jinesh:

Security, Trust and Implementation Limitations of Prominent IoT Platforms. 85-95 - Lekha S. Nair, Lakshmi M. Joshy:

An Improved Image Steganography Method with SPIHT and Arithmetic Coding. 97-104 - Savita Goel, Shilpi Gupta, Nisha Kaushik:

Image Steganography - Least Significant Bit with Multiple Progressions. 105-112 - Abhishek Basu

, Arindam Saha
, Jeet Das, Sandipta Roy, Sushavan Mitra, Indranil Mal
, Subir Kumar Sarkar:
On the Implementation of a Digital Watermarking Based on Phase Congruency. 113-120 - Suryaday Sarkar, Meghdut Roychowdhury, Biswa Mohan Sahoo, Souvik Sarkar:

Influence of Various Random Mobility Models on the Performance of AOMDV and DYMO. 121-125 - Anandita Singh Thakur, Pradeep Kumar Gupta

, Punit Gupta
:
Handling Data Integrity Issue in SaaS Cloud. 127-134 - Punit Gupta

, Satya Prakash Ghrera:
Load and Fault Aware Honey Bee Scheduling Algorithm for Cloud Infrastructure. 135-143 - Apoorva Rathi, Nilesh Parmar:

Secure Cloud Data Computing with Third Party Auditor Control. 145-152 - Chintureena, V. Suma

:
Effective Disaster Management to Enhance the Cloud Performance. 153-163 - Phuritshabam Robert, B. Naveen Kumar, U. S. Poornima, V. Suma

:
Implementation of Technology in Indian Agricultural Scenario. 165-174 - Siddhartha Banerjee, Bibek Ranjan Ghosh

, Pratik Roy:
JPEG Steganography and Steganalysis - A Review. 175-187 - Teja Yaramasa, G. Krishna Kishore:

Enhanced Privacy and Surveillance for Online Social Networks. 189-196 - Arindam Sarkar

, J. K. Mandal
, Pritha Mondal:
Neuro-key Generation Based on HEBB Network for Wireless Communication. 197-205 - Madhumita Sengupta, J. K. Mandal

, Arindam Sarkar
, Tamal Bhattacharjee:
KSOFM Network Based Neural Key Generation for Wireless Communication. 207-215 - J. K. Mandal

, Debdyuti Datta, Arindam Sarkar
:
Hopfield Network Based Neural Key Generation for Wireless Communication (HNBNKG). 217-224 - Bharatratna P. Gaikwad, Ramesh R. Manza

, Ganesh R. Manza:
Automatic Video Scene Segmentation to Separate Script and Recognition. 225-235 - Saikat Basak, Arundhuti Chowdhury:

Gesture: A New Communicator. 237-244 - Rayachoti Eswaraiah

, Edara Sreenivasa Reddy:
A Novel Fragile Medical Image Watermarking Technique for Tamper Detection and Recovery Using Variance. 245-253 - Ankita Mitra, Arunava De

, Anup Kumar Bhattacharjee:
MRI Skull Bone Lesion Segmentation Using Distance Based Watershed Segmentation. 255-261 - S. Nagaraja, C. J. Prabhakar

, P. U. Praveen Kumar
:
Extraction of Texture Based Features of Underwater Images Using RLBP Descriptor. 263-272 - Mona

, B. G. Prasad
:
Summary-Based Efficient Content Based Image Retrieval in P2P Network. 273-280 - Pratik Soygaonkar

, Shilpa Paygude, Vibha S. Vyas
:
Dynamic Texture Segmentation Using Texture Descriptors and Optical Flow Techniques. 281-288 - Devashree Tripathy

, Jagdish Lal Raheja:
Design and Implementation of Brain Computer Interface Based Robot Motion Control. 289-296 - Vineeta Das, Asutosh Kar

, Mahesh Chandra
:
Advanced Adaptive Algorithms for Double Talk Detection in Echo Cancellers: A Technical Review. 297-305 - Subit K. Jain

, Rajendra K. Ray, Arnav Bhavsar
:
A Comparative Study of Iterative Solvers for Image De-noising. 307-314 - Somdatta Chakravortty, Devadatta Sinha, Anil Bhondekar:

Assessment of Urbanization of an Area with Hyperspectral Image Data. 315-322 - Suranjan Ganguly, Debotosh Bhattacharjee

, Mita Nasipuri:
Range Face Image Registration Using ERFI from 3D Images. 323-333 - Vaibhav V. Kamble

, Ratnadeep R. Deshmukh
, Anil R. Karwankar, Varsha R. Ratnaparkhe, Suresh A. Annadate:
Emotion Recognition for Instantaneous Marathi Spoken Words. 335-346 - Prashant Upadhyaya

, Omar Farooq
, Musiur Raza Abidi, Priyanka Varshney:
Performance Evaluation of Bimodal Hindi Speech Recognition under Adverse Environment. 347-355 - S. H. Mohana, C. J. Prabhakar

:
Extraction of Shape Features Using Multifractal Dimension for Recognition of Stem-Calyx of an Apple. 357-365 - Soumya Smruti, Jagyanseni Sahoo, Monalisa Dash, Mihir N. Mohanty

:
An Approach to Design an Intelligent Parametric Synthesizer for Emotional Speech. 367-374 - Birender Singh, Mahesh Chandra

, Nikitha Kandru:
Removal of Defective Products Using Robots. 375-382 - Sudipta Roy

, Piue Ghosh, Samir Kumar Bandyopadhyay:
Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach. 383-394 - Rajat Sharma, Amit Agarwal:

An Innovative Approach to Show the Hidden Surface by Using Image Inpainting Technique. 395-403 - L. Balaji

, K. K. Thyagharajan
:
Fast Mode Decision Algorithm for H.264/SVC. 405-412 - Sonali G. Oval, Sankirti Shirawale:

Recognizing Handwritten Devanagari Words Using Recurrent Neural Network. 413-421 - Igor Belykh:

Homomorphic Filtering for Radiographic Image Contrast Enhancement and Artifacts Elimination. 423-430 - C. Sivasankar, A. Srinivasan:

A Framework for Human Recognition Based on Locomotive Object Extraction. 431-439 - Rajat Srivastava

, Vinod Kumar Singh
, Shahanaz Ayub
:
Comparative Analysis and Bandwidth Enhancement with Direct Coupled C Slotted Microstrip Antenna for Dual Wide Band Applications. 449-455 - T. Chandrakanth, B. Sandhya:

Quality Assessment of Images Using SSIM Metric and CIEDE2000 Distance Methods in Lab Color Space. 457-464 - Deepak Kumar Gupta

, Vijay Kumar Gupta
, Mahesh Chandra
:
Review Paper on Linear and Nonlinear Acoustic Echo Cancellation. 465-473 - Abhinav Krishn, Vikrant Bhateja

, Himanshi, Akanksha Sahu:
PCA Based Medical Image Fusion in Ridgelet Domain. 475-482 - Anusudha Krishnamurthi

, N. Venkateswaran
, J. Valarmathi
:
Swarm Optimization Based Dual Transform Algorithm for Secure Transaction of Medical Images. 483-491 - R. Anil, K. Manjusha, S. Sachin Kumar

, K. P. Soman
:
Convolutional Neural Networks for the Recognition of Malayalam Characters. 493-500 - Shabana Urooj

, Vikrant Bhateja
, Pratiksha Saxena, Aimé Lay-Ekuakille, Patrizia Vergallo:
Modeling of Thorax for Volumetric Computation Using Rotachora Shapes. 501-507 - Nishant Shrivastava

, Vipin Tyagi
:
A Review of ROI Image Retrieval Techniques. 509-520 - P. Syamala Jaya Sree, Prasant Kumar Pattnaik

, S. P. Ghrera:
A Novel Algorithm for Suppression of Salt and Pepper Impulse Noise in Fingerprint Images Using B-Spline Interpolation. 521-528 - Mahesh Chandra

, Pratibha Nandi, Aparajita kumari, Shipra Mishra:
Spectral-Subtraction Based Features for Speaker Identification. 529-536 - M. Vaseemahamed, M. Ravishankar:

Automated System for Detection of Cerebral Aneurysms in Medical CTA Images. 537-543 - Inam Ul Islam Wani, M. C. Hanumantharaju

, M. T. Gopala Krishna:
Contrast Enhancement of Mammograms Images Based on Hybrid Processing. 545-552 - M. S. Patel, Sanjay Linga Reddy

, Krupashankari S. Sandyal:
An Improved Handwritten Word Recognition Rate of South Indian Kannada Words Using Better Feature Extraction Approach. 553-561 - M. S. Patel, Sanjay Linga Reddy

, Anuja Jana Naik
:
An Efficient Way of Handwritten English Word Recognition. 563-571 - H. Y. Darshan, M. T. Gopala Krishna, M. C. Hanumantharaju

:
Text Detection and Recognition Using Camera Based Images. 573-579 - P. Sharath Chandra, M. C. Hanumantharaju

, M. T. Gopalakrishna:
Retinal Based Image Enhancement Using Contourlet Transform. 581-587 - Sujay Angadi, M. Ravishankar:

Detection and Classification of Microaneurysms Using DTCWT and Log Gabor Features in Retinal Images. 589-596 - K. Sariya, M. Ravishankar:

Classifying Juxta-Pleural Pulmonary Nodules. 597-603 - Rasmita Panigrahi, Sarada Baboo, Neelamadhab Padhy

:
The Statistical Measurement of an Object-Oriented Programme Using an Object Oriented Metrics. 605-618 - Singh Sandeep, Raees Ahmad Khan, Alka Agrawal:

Applicability of Software Defined Networking in Campus Network. 619-627 - Derrick Nazareth, Kavita Asnani, Okstynn Rodrigues:

Author-Profile System Development Based on Software Reuse of Open Source Components. 629-636 - Molla Ramizur Rahman

:
Software and Graphical Approach for Understanding Friction on a Body. 637-644 - U. S. Poornima, V. Suma

:
An Investigation on Coupling and Cohesion as Contributory Factors for Stable System Design and Hence the Influence on System Maintainability and Reusability. 645-650 - Chaitali More, Louella Colaco, Razia Sardinha:

Application of Component-Based Software Engineering in Building a Surveillance Robot. 651-658 - Bhagavant Deshpande, Jawahar J. Rao, V. Suma

:
Comprehension of Defect Pattern at Code Construction Phase during Software Development Process. 659-666 - Divakar Harekal, Jawahar J. Rao, V. Suma

:
Pattern Analysis of Post Production Defects in Software Industry. 667-671 - Yogita Wankhade, Vidya Dhamdhere

, Pankaj Vidhate:
Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETs. 687-695 - Rama Devi Boddu

, Kalitkar Kishan Rao, M. Asha Rani:
Co-operative Shortest Path Relay Selection for Multihop MANETs. 697-706 - Abdur Rahaman Sardar, Rashmi Ranjan Sahoo

, Moutushi Singh
, Souvik Sarkar, Jamuna Kanta Sing, Koushik Majumder
:
Intelligent Intrusion Detection System in Wireless Sensor Network. 707-712 - Zafar Sherin

, M. K. Soni:
Secure Routing in MANET through Crypt-Biometric Technique. 713-720 - Shipra Kumari, Hari Om:

Remote Login Password Authentication Scheme Using Tangent Theorem on Circle. 721-728 - Shiju Sathyadevan, Subi Prabhakaranl, K. Bipin:

A Survey of Security Protocols in WSN and Overhead Evaluation. 729-738 - Kumar Nitesh, Prasanta K. Jana:

DFDA: A Distributed Fault Detection Algorithm in Two Tier Wireless Sensor Networks. 739-746 - Souvik Basu, Siuli Roy:

Secured Categorization and Group Encounter Based Dissemination of Post Disaster Situational Data Using Peer-to-Peer Delay Tolerant Network. 747-755 - Manisha Sunil Bhende, Suvarna Patil, Sanjeev Wagh

:
Lifetime Maximization in Heterogeneous Wireless Sensor Network Based on Metaheuristic Approach. 757-764 - Moutushi Singh

, Abdur Rahaman Sardar, Rashmi Ranjan Sahoo
, Koushik Majumder
, Sudhabindu Ray, Subir Kumar Sarkar:
Lightweight Trust Model for Clustered WSN. 765-773 - Indrajit Bhattacharya, Subhash Ghosh, Debashis Show:

An Efficient and Secured Routing Protocol for VANET. 775-783 - B. Anil Kumar, N. Bhaskara Rao, M. S. Sunitha:

Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks. 785-791 - S. R. Biradar, Gunjan Jain:

Rank and Weight Based Protocol for Cluster Head Selection for WSN. 793-801

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














