The proceedings contain 69 papers. The special focus in this conference is on computerscience and informationtechnology. The topics include: Qualitative optimization of coupling parasitics and driver width in global...
ISBN:
(纸本)9783642273070
The proceedings contain 69 papers. The special focus in this conference is on computerscience and informationtechnology. The topics include: Qualitative optimization of coupling parasitics and driver width in global VLSI interconnects;survey on optimization techniques in high level synthesis;design of fractional order digital differentiator using inverse multiquadric radial basis function;cognitive symmetric key cryptographic algorithm;modeling and verification of Fiat-Shamir zero knowledge authentication protocol;developing software metrics for analysis and design artifacts in unified process;a novel approach for green computing through event-driven power aware pervasive computing;security analysis of proxy blind signature scheme based on factoring and ECDLP;dynamic enterprises architecture for one or more clouds;congestion control in distributed networks - a comparative study;opinion mining from weblogs and its relevance for socio-political research;generalized projective synchronization of three-scroll chaotic systems via active control;switching algorithms in peer to peer networks - review;proposed software development model for small organization and its explanation;Tele-control of remote digital irrigation system performed through internet;a fuzzy rule based expert system for effective heart disease diagnosis;moving object detection using incremental statistical mean technique;classification of moving vehicles in traffic videos;use of augmented reality in serious game for training medical personnel;encouraging the usage of neural network in video text detection application;a novel face recognition method using PCA, LDA and support vector machine;contextual strategies for detecting spam in academic portals;hybrid synchronization of hyperchaotic Chen systems via sliding mode control;design and implementation of efficient Viterbi decoders;classification of MRI brain images using cosine-modulated wavelets;a novel approach for email login system;a non-revisiting
The proceedings contain 116 papers. The special focus in this conference is on Signal and image processing, computer security, Communication and networking, Cloud computing, Data processing, Algorithms and Artificial ...
ISBN:
(纸本)9788132217589
The proceedings contain 116 papers. The special focus in this conference is on Signal and image processing, computer security, Communication and networking, Cloud computing, Data processing, Algorithms and Artificial intelligence and computer applications. The topics include: The PSF measurement for motion-blurred image based on analyzing the frequency spectrum;EBR analysis of digital image watermarking;Image descriptors based on statistical thermodynamics and applications;A novel image retrieval method based on fractal code and fuzzy set;Velocity evaluation in traffic accidents occurred at the road intersection based on image processing;A hybrid method for extracting liver from 3D CT image;A new image-fusion technique based on blocked sparse representation;The studying of the restoration of defocused images;High-order total variation-based image restoration with spatially adapted parameter selection;Research of vehicle identification based on adaptive corner detection;Knowledge-aided bayesian optimum radar detector;An improvement of an identity-based key-insulated signcryption;Stability analysis of a rapid scanning worm propagation model with quarantine strategy;A fuzzy bayesian approach to enhance SCADA network security;Trusted network access authentication scheme based on the label;A mobile terminal authentication scheme based on symmetric cryptographic mechanisms;Wormhole detection algorithm based on rtt and neighborhood information;Intrusion detection algorithm for the wormhole attack in ad hoc network;Ad hoc eavesdropping algorithm-based network coding;Improved halftone visual cryptography by random grids;Statistical tests for combined secret key sequence and Interactive satellite remote education system based on bluetooth and GPRS.
The proceedings contain 66 papers. The special focus in this conference is on computerscience and informationtechnology. The topics include: Adaptive quorum based MAC protocol in non uniform node distribution of wir...
ISBN:
(纸本)9783642272981
The proceedings contain 66 papers. The special focus in this conference is on computerscience and informationtechnology. The topics include: Adaptive quorum based MAC protocol in non uniform node distribution of wireless sensor networks;mobile agent in InVANET - traffic management;the design of observers for nonlinear control systems around equilibria;a node stability index-based connected dominating set algorithm for mobile ad hoc networks;energy efficient dynamic routing protocol for wireless sensor networks;energy efficient stable connected dominating set construction in mobile ad hoc networks;hybrid synchronization of Arneodo and Rossler chaotic systems by active nonlinear control;realization of SDR in partial reconfigurable FPGA using different types of modulation techniques;a recommender system for sweaty sock syndrome;enhanced AODV routing protocol for wireless sensor network based on zigbee;sliding mode controller design for the global chaos synchronization of Coullet systems;generalized projective synchronization of double-scroll chaotic systems using active feedback control;mobile ad hoc networks security attacks and secured routing protocols;privacy and security in digital networks from the perspective of modeling and software development;a logical topology to find alternate routes in WDM lightwave network;a trust based routing scheme for wireless sensor networks;survey of trust schemes on ad-hoc network;improve service discovery performance over different networks utilization and sizes;adaptive K-means clustering to handle heterogeneous data using basic rough set theory;different types of attacks mitigation in mobile ad hoc networks using cellular automata;a location dependent semantic cache replacement strategy in mobile environment;connectivity of autonomous agents using ad-hoc mobile router networks;a new approach to Stegnography;survey on key pre distribution for security in wireless sensor networks;a link distance ratio based stable multicast rout
Copyright and Reprint Permission:Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume...
详细信息
Copyright and Reprint Permission:Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center
Copyright (c)2014 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permission Abstracting is permitted with credit to the source. Libraries are permitted to pho...
Copyright (c)2014 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permission Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Other copying, reprint, or reproduction requests should be addressed to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 1331, Piscataway, NJ 08855-1331. IEEE Catalog Number CFPI4YAE-ART. ISBN 978-1-4799-3999-2.
暂无评论