Vinu V. Das 
Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing [PDF ebook] 

Apoio

Third International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners.

€213.99
Métodos de Pagamento

Tabela de Conteúdo

Full Papers.- High Through-put VLSI Architecture for FFT Computation.- Formal Approach to Reliability Improvement with Model Checker.- DDo S attacks Defense System using Information Metrics.- CEAR: Cluster based Energy Aware Routing Algorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs).- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs).- Do S Attack-resistant Framework for Client/Server Intelligent Computing.- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks.- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine.- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements.- Hybrid Extremal Optimization and Glowworm Swarm Optimization.- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks.- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems.- Developing Embedded Systems from Formal Specifications written in Temporal Logic.- Network log Clustering Using K-means Algorithm.- Improvement Public Key Kerberos using Identity-Based Signcryption.- Intrusion Detection Using Keystroke Dynamics.- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform.- Comparison of Routing Protocols in Mobile Ad-hoc Network.- Analysis of Image Segmentation Algorithms Using MATLAB.- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions.- Mean-Shift Algorithm: Verilog HDL Approach.- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks.- A Security Framework for DDo S Detection In MANETs.- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC).- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators.- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks.- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation.- Performance Analysis of Different Current Controllers for Active Power Filter.- Optimum LQR Switching Approach for the Improvement of STATCOM Performance.- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine.- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers.- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters.- A Novel Inverter Topology for Low Power Drives.- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods.- Improvement of Power Quality and Performance Analysis of PV Fed UPQC in Utility Connected System.- Design of Adaptive FLANN based model for Non-linear Channel Equalization.- Short Papers.- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network.- Voice Transformation using Radial Basis Function.- IPTC based Ontological Representation of Educational News RSS Feeds.- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem.- Automatic Generation of P2P botnet Network Attack Graph.- Parallelization of Fractal Image Compression over CUDA.- Distributed Shared Files Management.- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization.- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems.- An Algorithm for Traffic Analysis using RFID Technology.- Trust-Based Grid Resource Management.- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach.- An Approach to Encryption using Superior Fractal Sets.- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding.- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network.- Security based Requirements Engineering for E-Voting System.- Analysis of 3 Dimensional Object Watermarking Techniques.- Graph Based Approach for Heart Disease Prediction.- Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks.- An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint.- A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition.- Performance Evaluation of Web Browsers in Android.- FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator®.- Face Recognition Using PCA and Bit-Plane Slicing.- Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor.- Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters.- Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques.- Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation.- Artificial Neural Network based Power System Stability Analysis.- Poster Paper.- Efficient Bandwidth Utilization in Client-Server Models.- Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz .- Intelligent Enterprise Application Servers – A Vision for self-managing performance.- A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk File Systems.- Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey.- Itinerary Management System.- Trust and Reliability based Scheduling Algorithm for Cloud Iaa S.- Hybrid Covert Channel an Obliterate for Information Hiding.- Steganography and Its Technique: Technical Overview.- Data Stream Mining: A Review.- Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces.- Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler.- Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes.- Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.

Sobre o autor

Dr. Vinu V Das, an authority in Network Security and Wireless Network is heading the Network Security Group (NSG), Science Park, Amsterdam and an Editor in Chief of the International Journal of Network Security. He is also the Chief Executive of the Association of Computer Electronics and Electrical Engineers (ACEEE) and the Institute of Doctors Engineers and Scientists – IDES. So far he has authored three books, and edited many in field of Computer Science.

Compre este e-book e ganhe mais 1 GRÁTIS!
Língua Inglês ● Formato PDF ● Páginas 670 ● ISBN 9781461433637 ● Tamanho do arquivo 16.2 MB ● Editor Vinu V. Das ● Editora Springer New York ● Cidade NY ● País US ● Publicado 2012 ● Carregável 24 meses ● Moeda EUR ● ID 2662623 ● Proteção contra cópia DRM social

Mais ebooks do mesmo autor(es) / Editor

18.519 Ebooks nesta categoria