


default search action
6th IC3 2013: Noida, India
- Manish Parashar, Albert Y. Zomaya, Jianer Chen, Jiannong Cao, Pascal Bouvry, Sushil K. Prasad:

Sixth International Conference on Contemporary Computing, IC3 2013, Noida, India, August 8-10, 2013. IEEE 2013, ISBN 978-1-4799-0192-0
Track: Algorithms
- Kajal Joshi, Ashish Verma, Ankita Kandpal, Shalini Garg, Rashmi Chauhan, R. H. Goudar:

Ontology based fuzzy classification of web documents for semantic information retrieval. 1-5 - Anubhav Kumar

:
An efficient text extraction algorithm in complex images. 6-12 - Sanjib Sadhu, Niraj Kumar:

Random polygon generation using 'GRP_AS' heuristic. 13-17 - Amandeep Kaur, Harsh Kumar Verma, Ravindra Kumar Singh

:
3D - Playfair cipher using LFSR based unique random number generator. 18-23 - Abhishek Anand, Vineet Padmanabhan

:
Time Series Qlet: Invariant approach for data mining. 24-29 - Divya Lohani

, Shirshu Varma:
Itinerary planning using grey relational analysis for mobile agent based wireless sensor networks. 29-34 - B. B. Krishna, A. S. Raghuvanshi

:
Centralized border node based cluster balancing protocol for wireless sensor networks. 35-40 - Madasu Hanmadlu, Shaveta Arora

, Gaurav Gupta, Latika Singh:
A novel optimal fuzzy color image enhancement using particle swarm optimization. 41-46 - Himakshi, Ravindra Kumar Singh

, Harsh Kumar Verma, Charan Kamaljit Singh:
Bi-directional pixel-value differencing approach for RGB color image. 47-52 - Sarika M. Potdar, Kishor P. Patil:

Efficient spectrum handoff in CR network based on mobility, QoS and priority using fuzzy logic and neural network. 53-58 - Jyotika Doshi, Savita R. Gandhi

:
Enhanced arithmetic coding using total frequency in power of 2 & processing multi-bits at a time. 59-64 - Japjeet Kaur, Piyush Saxena, Prerna Gaur

:
Genetic algorithm based speed control of hybrid electric vehicle. 65-69 - Anjeneya Swami Kare

, Sanjeev Saxena:
Efficient solutions for finding vitality with respect to shortest paths. 70-75 - Seyed Mohssen Ghafari, Mahdi Fazeli

, Ahmad Patooghy
, Leila Rikhtechi:
Bee-MMT: A load balancing method for power consumption management in cloud computing. 76-80 - Gaurava Srivastava, Tarun Kumar Rawat:

Histogram equalization: A comparative analysis & a segmented approach to process digital images. 81-85 - Ondrej Smirg, Zdenek Smékal

, Malay Kishore Dutta
, Bhavin Kakani
:
Automatic detection of the direction and speed of moving objects in the video. 86-90 - Manpreet Kaur, Ajay K. Sharma:

LEF-P: Leader election using fuzzy for power efficient gathering in wireless sensor networks. 91-96 - Buddha Singh, D. K. Lobiyal:

Energy preserving sleep scheduling for cluster-based wireless sensor networks. 97-101 - Mayank Mani, Ajay K. Sharma:

Modified approach for routing and clustering in sensor network using fuzzy logic control. 102-107 - Malay Kishore Dutta

, Anushikha Singh, Krishan Mohan Soni, Radim Burget, Kamil Ríha:
Watermarking of digital media with encrypted biometric features for digital ownership. 108-112 - Omprakash Kaiwartya

, Sushil Kumar, Reena Kasana:
Traffic light based time stable geocast (T-TSG) routing for urban VANETs. 113-117 - Amita Jain

, Sudesh Yadav
, Devendra K. Tayal:
Measuring context-meaning for open class words in Hindi language. 118-123 - Ranjan Baghel

, Maitreyee Dutta
:
Privacy preserving classification by using modified C4.5. 124-129 - Astha Chharia, Rajendra Kumar Gupta

:
Email classifier: An ensemble using probability and rules. 130-136 - Smita Jhajharia, Swati Mishra, Siddharth Bali:

Public key cryptography using neural networks and genetic algorithms. 137-142 - Adwitiya Sinha

, D. K. Lobiyal:
Performance analysis of data aggregation for overlapping clusters in heterogeneous sensor network. 143-148 - Harleen Kaur, V. K. Panchal, Rajeev Kumar:

A novel approach based on nature inspired intelligence for face feature extraction and recognition. 149-153 - Vikas Chaudhary, R. S. Bhatia, Anil K. Ahlawat:

An efficient self-organizing map learning algorithm using the set of nearest neurons. 154-158 - Anita Sahoo

, Satish Chandra
:
L'evy-flight firefly algorithm based active contour model for medical image segmentation. 159-162 - Rajesh Mehta, Navin Rajpal:

A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visual system model. 163-168 - Aarti

, Pushpendra Kumar Rajput
:
A novel multi secret sharing scheme with MSB extraction using EVCS. 169-174
Track: Systems (Hardware & Software)
- Khushbu Chandrakar, Suchismita Roy:

SAT based low power binding to reduce switching activity. 175-180 - Anant Agarwal, Manish K. Thakur:

Sign language recognition using Microsoft Kinect. 181-185 - N. Rajput, M. Sethi, P. Dobriyal, K. Sharma, G. Sharma:

A novel, high performance and power efficient implementation of 8×8 multiplier unit using MT-CMOS technique. 186-191 - Preeti Saxena, Raj Kamal

:
System architecture and effect of depth of query on XML document filtering using PFilter. 192-195 - Ajay

, Devendra Singh Gurjar
, Neetesh Purohit:
An optimized network selection scheme for heterogeneous wireless networks. 196-201 - Sweta Singh, Anand Singh Jalal

, Charul Bhatnagar:
Automatic trimap and alpha-matte generation for digital image matting. 202-208 - Vidushi Vidyarthi, Arun Yadav

, Divakar Yadav
:
New methodology in GIR systems: Improving web document searching. 208-212 - Priti Bansal

, Sangeeta Sabharwal:
A model based approach to test case generation for testing the navigation behavior of dynamic web applications. 213-218 - Shubhansh Varshney, Niharika Jain, Sandeep K. Singh

:
SmartTouch: A cost-effective infrared based imaging touch screen. 219-224 - Naveen Kumar Gupta, Kavita Pandey

:
Trust based Ad-hoc on Demand Routing protocol for MANET. 225-231 - Pratick Chokhani, Gaurav Somani:

Dynamic resource allocation using auto-negotiation in Haizea. 232-238 - Umesh Kumar Chaurasia, Varsha Singh

:
MAODV: Modified wormhole detection AODV protocol. 239-243 - Rajalakshmi Krishnamurthi

, Krishna Gopal:
Effective optimization and fault tolerance using multi-homed link assignment in cellular access network. 244-249 - Shweta Pandit

, Ghanshyam Singh
:
Self-scheduled MAC-layer protocol for spectrum sharing in cognitive radio communication. 250-255
Track: Education
- Swati Khurana, Mahima Relan, Vivek Kumar Singh

:
A text analytics-based approach to compute coverage, readability and comprehensibility of eBooks. 256-261 - Sujoy Sarkar, Atul Negi:

Designing a high quality online course: A process driven approach using UML. 262-267 - Indushree Banerjee, Indika Perera

, Joydeep Choudhury:
Introducing immersive technologies for learning: A study evaluating the readiness for using virtual worlds for learning and teaching in an Indian University. 268-273 - Waseem Ahmed, Mohammed Mufasir Muthaher, Jamshid M. Basheer

:
Introducing high performance computing (HPC) concepts in institutions with an absence of HPC culture. 274-277
Track: Applications
- Varsha Sarawagi, K. V. Arya

:
Automatic facial expression recognition for image sequences. 278-282 - Soniya Lalwani

, Rajesh Kumar
, Nilama Gupta:
A study on inertia weight schemes with modified particle swarm optimization algorithm for multiple sequence alignment. 283-288 - Prateek Sharma:

Prototype for 3D modeling through gesture analysis coupled with remote access. 289-294 - Tripti Goel, Vijay Nehra, Virendra P. Vishwakarma

:
Illumination normalization using down-scaling of low-frequency DCT coefficients in DWT domain for face recognition. 295-300 - Upendra Kumar Singh, Vineet Padmanabhan

:
Training and classification of ballistic missiles using Hidden Markov model. 301-306 - Bhavna Goel, Charu Agarwal:

An optimized un-compressed video watermarking scheme based on SVD and DWT. 307-312 - Hitendra Garg, Suneeta Agrawal, Gopalji Varshneya

:
A non-blind image based watermarking for 3-D polygonal mesh using its geometrical properties. 313-318 - Rachana Rana, Harvendra Singh Bhadauria, Annapurna Singh:

Brain tumour extraction from MRI images using bounding-box with level set method. 319-324 - Daya Gupta, Lavika Goel

, Vipin Aggarwal:
A hybrid biogeography based heuristic for the mirrored traveling tournament problem. 325-330 - Santosh Verma, Sanjay Goel:

An empirical evaluation of wavelets based viz-a-viz classical state-of-art to image denoising. 331-336 - Manoj Kumar Gupta, Rajdeep Niyogi, Manoj Misra:

A framework for alignment-free methods to perform similarity analysis of biological sequence. 337-342 - Jan Karasek, Radim Burget, Václav Uher

, Malay Kishore Dutta
, Yogesh Kumar
:
Optimization of logistic distribution centers process planning and scheduling. 343-348 - S. Venkatramaphanikumar

, V. Kamakshi Prasad:
Gabor based face recognition with dynamic time warping. 349-353 - Farhana Javed Zareen, Suraiya Jabin

:
A comparative study of the recent trends in biometric signature verification. 354-358 - Shruti V. Kamath, Mayank Darbari, Rajashree Shettar

:
Classification and indexing in highway traffic videos. 359-364 - Manish Khare, Alok Kumar Singh Kushwaha

, Rajneesh Kumar Srivastava, Ashish Khare:
An approach towards wavelet transform based multiclass object classification. 365-368 - Viney Sharma

, Gur Mauj Saran Srivastava:
Energy efficient architectural framework for virtual machine management in IaaS clouds. 369-374 - Indu Chawla, Sandeep K. Singh

:
Performance evaluation of VSM and LSI models to determine bug reports similarity. 375-380 - Anuja Arora

, Madhavi Sinha:
Avoiding state explosion problem of generated AJAX web application state machine using BDD. 381-386 - Anuradha Gupta:

Privacy preserving efficient digital forensic investigation framework. 387-392 - Gagandeep Kaur, Suyash Varma, Arpit Jain:

A novel statistical technique for detection of DDoS attacks in KDD dataset. 393-398 - Gopalji Varshneya

, Deepak Kumar, Rajeev Kumar
, Dileep Singh:
Aggregate discovery and retrieval of contents from authenticated interface. 399-403 - Avita Katal

, Mohammad Wazid
, R. H. Goudar:
Big data: Issues, challenges, tools and Good practices. 404-409 - Hem Jyotsana Parashar, Shelly Sachdeva

, Shivani Batra, Pulkit Mehndiratta
:
Usability and information retrieval issues for electronic healthcare record databases. 410-414 - Rajat Sharma, Akshay Jain, Rohit Rastogi

:
A new face to photo security of Facebook. 415-420 - Adarsh Kumar, Krishna Gopal, Alok Aggarwal

:
Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs). 421-426 - Raju Pal

, Ajay K. Sharma:
FSEP-E: Enhanced stable election protocol based on fuzzy Logic for cluster head selection in WSNs. 427-432 - Saurabh Jaiswal, Anamika Yadav

:
Fuzzy based adaptive congestion control in wireless sensor networks. 433-438 - Charu, Vivek Arya:

A quality of service analysis of energy aware routing protocols in mobile ad hoc networks. 439-444 - Mohd. Tariq Khan, Deepak Arora, Shashwat Shukla:

Feature extraction through iris images using 1-D Gabor filter on different iris datasets. 445-450 - P. V. Nagarjuna

, K. Ranjeet:
Robust blind digital image watermarking scheme based on stationary wavelet transform. 451-454 - N. Hema, Krishna Kant:

Optimization of sensor deployment in WSN for precision irrigation using spatial arrangement of permanent crop. 455-460 - Shikha Mehta

:
Bio-inspired approach to solve chemical equations. 461-466 - Manish K. Thakur, Vikas Saxena

, J. P. Gupta:
Data-parallel full reference algorithm for dropped frame identification in uncompressed video using genetic algorithm. 467-471 - Vicente Palacios, Sonia Sánchez-Cuadrado

, Divakar Yadav
, Jorge Morato
, Christos Dimou:
Ontologies evaluation for a conceptual retrieval system of metadata schemes: Case study. 472-478 - Saket Kanth, Anamika Jaiswal, Misha Kakkar

:
Identification of different stages of Diabetic Retinopathy using artificial neural network. 479-484 - Jainath Yadav, K. Sreenivasa Rao:

Analysis of detection of vowel offset point for coded speech. 485-490 - Garima Bharti, Ghanshyam Singh

, Kumud Ranjan Jha, Rajeev Jyoti
:
Circular ring frequency selective surface: A novel synthesis technique. 491-496 - Richa Srivastava, Rajiv Singh

, Ashish Khare:
Fusion of multifocus noisy images using contourlet transform. 497-502 - Anand Gupta

, Ashima Arora, Bhawna Juneja:
TAG: A two-level framework for user authentication through hand gestures. 503-509 - Shivani Batra, Hem Jyotsana Parashar, Shelly Sachdeva

, Pulkit Mehndiratta
:
Applying data mining techniques to standardized electronic health records for decision support. 510-515 - T. Sobha Rani, P. V. Soujanya:

An ensemble method using small training sets for imbalanced data sets: Application to drugs used for kinases. 516-521 - Avinash Gautam

, Sudeept Mohan, Virendra Singh Shekhawat:
A token passing approach for circle formation by multiple mobile robots. 522-527

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














