The Community for Technology Leaders
2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (2014)
Hefei, China
July 11, 2014 to July 13, 2014
ISBN: 978-1-4799-2695-4
TABLE OF CONTENTS

A novel approach to urban flood monitoring using computer vision (Abstract)

RamKumar Narayanan , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India
V. M. Lekshmy , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India
Sethuraman Rao , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India
Kalyan Sasidhar , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India
pp. 1-7

Location based protocols in Wireless Sensor Network — A review (Abstract)

Jitender Grover , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
Shikha , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
Mohit Sharma , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
pp. 1-5

Cloud computing and its security issues — A review (Abstract)

Jitender Grover , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
Shikha , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
Mohit Sharma , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
pp. 1-5

Wireless sensor networks: Routing protocols and security issues (Abstract)

Anjali , Department of Computer Science & Engineering, GNIT, Mullana, Ambala, India
Shikha , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
Mohit Sharma , Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India
pp. 1-5

Study of virtual billing based communication network performance assessment system (Abstract)

Li Tongyan , Chengdu University of information technology, Chengdu, China
Zheng Kai , Chengdu University of information technology, Chengdu, China
pp. 1-4

Detection of dishonest trust recommendations in mobile ad hoc networks (Abstract)

Zakirullah , Department of Electrical and Computer Engineering, Center for Advanced Studies in Engineering (CASE) Islamabad, Pakistan
M. Hasan Islam , Department of Electrical and Computer Engineering, Center for Advanced Studies in Engineering (CASE) Islamabad, Pakistan
Adnan Ahmed Khan , Department of Electrical Engineering, College of Signals National University of Sciences and Technology (NUST) Rawalpindi, Pakistan
pp. 1-7

Parameters optimization in blind motion deblurring of UAV images (Abstract)

Wen-jun Lu , New Star Research Institute of Applied Technology, Hefei in Anhui Province, China 230031
Libiao Tong , New Star Research Institute of Applied Technology, Hefei in Anhui Province, China 230031
Min-Jie Li , New Star Research Institute of Applied Technology, Hefei in Anhui Province, China 230031
Cong-li Li , New Star Research Institute of Applied Technology, Hefei in Anhui Province, China 230031
pp. 1-5

The design of smart home control system (Abstract)

Yongen Liang , Department of Computer Science, Guangdong Baiyun University, Guangzhou, Guangdong, China
Shiming Wan , Department of Computer Science, Wuhan Vocational College of Software and Engineering, Wuhan, Hubei Province, China
pp. 1-4

Chinese microblogging emotion classification based on support vector machine (Abstract)

Xiao Sun , Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine, School of Computer and Information, Hefei University of Technology, Hefei, China 230009
Chengcheng Li , Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine, School of Computer and Information, Hefei University of Technology, Hefei, China 230009
Jiaqi Ye , Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine, School of Computer and Information, Hefei University of Technology, Hefei, China 230009
pp. 1-5

Sina microblog big data grabbing and analysis based on Multi-strategy model (Abstract)

Xiao Sun , School of Computer and Information, Hefei University of Technology, Hefei, China
Jia-qi Ye , School of Computer and Information, Hefei University of Technology, Hefei, China
Chen-yi Tang , School of Computer and Information, Hefei University of Technology, Hefei, China
pp. 1-6

New adaptations of classic algorithm for mining frequent itemsets from uncertain data (Abstract)

Xiaomei Yu , School of Information Science and Engineering, Shandong Provincial Key Laboratory for Distributed Computer software Novel Technology, Shandong Normal University, Jinan, Shandong, China
Hong Wang , School of Information Science and Engineering, Shandong Provincial Key Laboratory for Distributed Computer software Novel Technology, Shandong Normal University, Jinan, Shandong, China
Xiangwei Zheng , School of Information Science and Engineering, Shandong Provincial Key Laboratory for Distributed Computer software Novel Technology, Shandong Normal University, Jinan, Shandong, China
pp. 1-6

A secure and robust crypto system based on unique dynamic key generation scheme (Abstract)

S. Swaminathan , ECE Department, SRC, SASTRA University, Tamilnadu, India
A. Karthick , Network Professional and Security Associate, Bangalore, India
S. Suganya , CSE Department, A.V.C. Polytechnic College, Tamilnadu, India
pp. 1-7

Foot plant detection for motion capture data by curve saliency (Abstract)

Jingting Lu , School of Computer and Information, Hefei University of Technology, Hefei, Anhui, China
Xiaoping Liu , School of Computer and Information, Hefei University of Technology, Hefei, Anhui, China
pp. 1-6

Studies of improving the performance of A/D conversion by post band-pass filtering method (Abstract)

Ma Manli , Institute of Information Engineering, Xi'an Jiaotong University, Xi'an, P.R China
Chen Yuan , Institute of Information Engineering, Xi'an Jiaotong University, Xi'an, P.R China
Yin Qinye , Institute of Information Engineering, Xi'an Jiaotong University, Xi'an, P.R China
pp. 1-6

The secret image sharing scheme based on improved LSB algorithm (Abstract)

Xiaohong Li , School of Computer and Information, Hefei University of Technology, Hefei, China
Yuan Chen , School of Computer and Information, Hefei University of Technology, Hefei, China
Feng Wang , School of Computer and Information, Hefei University of Technology, Hefei, China
Tao Qinqin , School of Computer and Information, Hefei University of Technology, Hefei, China
pp. 1-5

Virtual merging of fractured fragments based on constraint cluster (Abstract)

Li Jijunnan , Department of Information Science and Technology, the Northwest University, Xi'an, China
Geng Guohua , Department of Information Science and Technology, the Northwest University, Xi'an, China
Liu Lunchun , Department of Information Science and Technology, the Northwest University, Xi'an, China
pp. 1-4

A heterogeneous network access control algorithm based on DS evidence theory (Abstract)

Jianmin Kang , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
Lin Ma , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
Yubin Xu , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
pp. 1-5

Learning a discriminative dictionary for locality constrained coding and sparse representation (Abstract)

Jin Bin , Armament Branch of NED, Beijing 100073, China
Zhang Jing , Department of Electronic and Information Engineering, Naval Aeronautical and Astronautical University, Yantai Shandong 26400, China
Yang Zhiyong , Seven Department, Naval Aeronautical and Astronautical University, Yantai Shandong 264001, China
pp. 1-6

Consensual and co-ordinated vehicular headlight attenuation using wireless sensor networks (Abstract)

K.A. Unnikrishna Menon , Amrita Center for Wireless Networks & Applications Amrita Vishwa Vidyapeetham, Kollam, India
Alin Devassy Ananyase , Amrita Center for Wireless Networks & Applications Amrita Vishwa Vidyapeetham, Kollam, India
Preeja Pradeep , Amrita Center for Wireless Networks & Applications Amrita Vishwa Vidyapeetham, Kollam, India
pp. 1-6

Load distribution for multi-way streams joins using cluster (Abstract)

Xinchun Liu , School of Computer, Science and Technology, University of Science and Technology of China, Hefei, 230026, China
Jing Li , School of Computer, Science and Technology, University of Science and Technology of China, Hefei, 230026, China
Xiaopeng Fan , Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, 518052, China
pp. 1-7

Chinese Facial Expression Database with spontaneous expressions across multiple poses (Abstract)

Xiaoxue Cheng , School of Computer Science & Information, Hefei University of Technology, Hefei, Anhui 230009, China
Lixia Xue , School of Computer Science & Information, Hefei University of Technology, Hefei, Anhui 230009, China
Yanxiang Chen , School of Computer Science & Information, Hefei University of Technology, Hefei, Anhui 230009, China
Lei Liu , School of Computer Science & Information, Hefei University of Technology, Hefei, Anhui 230009, China
pp. 1-6

Design and realization of 3D NOC multicast router base on multicast rotational routing arithmetic (Abstract)

Wei Wang , Hefei University of Technology; Hefei, China, 230009
Runfeng Li , Hefei University of Technology; Hefei, China, 230009
Fang Fang , Hefei University of Technology; Hefei, China, 230009
Tian Chen , Hefei University of Technology; Hefei, China, 230009
Fuji Ren , Hefei University of Technology; Hefei, China, 230009
Jun Liu , Hefei University of Technology; Hefei, China, 230009
Xi Wu , Hefei University of Technology; Hefei, China, 230009
pp. 1-6

Characteristics of narrow band dual-polarized MIMO over satellite channel model (Abstract)

Xinyue Zhang , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
Zhenyong Wang , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
pp. 1-5

Test wrapper optimization technique using BDF and GA for 3D IP cores (Abstract)

Jun Liu , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Qingqing Qian , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Xi Wu , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Fuji Ren , Department of Information Science & Intelligent Systems, Faculty of Engineering, The University of Tokushima, Tokushima, 7708502, Japan
Wei Wang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Tian Chen , School of Computer and Information, Hefei University of Technology, Hefei, 230009
pp. 1-6

Depth map-based human activity tracking and recognition using body joints features and Self-Organized Map (Abstract)

Ahmad Jalal , Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea
S. Kamal , Department of Electronics and Radio Engineering, Kyung Hee University, Gyeonggi-do, Republic of Korea
Daijin Kim , Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea
pp. 1-6

A novel design and implementation of sub-nanosecond sampling pulse generator for ultra-wideband equivalent sampling receiver (Abstract)

Yu Guo , School of Electronic Science and Engineering, National University of Defense Technology
Guofu Zhu , School of Electronic Science and Engineering, National University of Defense Technology
Zhimin Zhou , School of Electronic Science and Engineering, National University of Defense Technology
pp. 1-5

Ridge body parts features for human pose estimation and recognition from RGB-D video data (Abstract)

Ahmad Jalal , Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea
Yeonho Kim , Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea
Daijin Kim , Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea
pp. 1-6

Microscopic numerical simulation and experimental study of thermal deformation of mechanical parts (Abstract)

Enming Miao , School of Instrument Science and Opto-electronics Engineering, Hefei University of Technology, Hefei 230009, China
Zhishang Xu , School of Instrument Science and Opto-electronics Engineering, Hefei University of Technology, Hefei 230009, China
Xiaoshuai Zhou , School of Instrument Science and Opto-electronics Engineering, Hefei University of Technology, Hefei 230009, China
Derong Lei , Institute of Engineering and Technology, Xinjiang Oilfield, Kelamayi 834000, Xinjiang, China
Guannan Li , Department of Mechanical and Manufacturing Engineering, University of Calgary, 2500 University Drive NW, Calgary, AB, Canada T2N 1N4
pp. 1-6

Design of area and power efficient complex number multiplier (Abstract)

B.S. Premananda , Department of Telecommunication Engineering, R. V. College of Engineering, Bangalore-560059
Samarth S. Pai , Department of Telecommunication Engineering, R. V. College of Engineering, Bangalore-560059
B. Shashank , Department of Telecommunication Engineering, R. V. College of Engineering, Bangalore-560059
Shashank S. Bhat , Department of Telecommunication Engineering, R. V. College of Engineering, Bangalore-560059
pp. 1-5

Rateless codes based file delivery protocols in deep space communications (Abstract)

Zhihong Ren , Dept. of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
Zhenyong Wang , Dept. of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
Qing Guo , Dept. of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
pp. 1-6

An adroit naïve Bayesian based sequence mining approach for prediction of MRI brain tumor image (Abstract)

M. Madheswaran , Centre for Advanced Research, Mahendra Engineering College, Mallasamudram, Tiruchengode, Tamil Nadu 637 503, India
Anto Sahaya Dhas , Research Scholar, Anna University Chennai, India
pp. 1-7

A low power BIST scheme based on block encoding (Abstract)

Tian Chen , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Liuyang Zheng , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Wei Wang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Fuji Ren , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Xishan Zhang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Hao Chang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
pp. 1-7

Enhancement of prediction accuracy in COCOMO model for software project using neural network (Abstract)

M. Madheswaran , Department of Electronics and Communication Engineering, Namakkal- 637503, Tamilnadu, India
D. Sivakumar , Department of Information Technology Mahendra Engineering College, Namakkal- 637503, Tamilnadu, India
pp. 1-5

Estimation of various parameters of fractured femur with different load conditions using Finite element analysis (Abstract)

M. Madheswaran , Department of Electronics and Communication Engineering Mahendra Engineering College, Namakkal, TN, India
R. Vijayakumar , Department of Electronics and Communication Engineering Mahendra Engineering College, Namakkal, TN, India
pp. 1-5

GSM based remote device controller using SIM548C (Abstract)

Md. Shahinoor Mannan , Department of Electrical and Electronic Engineering, United International University, Dhaka, Bangladesh
Md. Nazmus Sakib , Department of Electrical and Electronic Engineering, United International University, Dhaka, Bangladesh
pp. 1-4

Seamless handoff mechanism of broadband mobile communication network in underground mine (Abstract)

Wei Zhen-chun , School of Computer & Information, Hefei University of Technology, Hefei 230009
Lv Zeng-wei , School of Computer & Information, Hefei University of Technology, Hefei 230009
Guo-Ling , School of Computer & Information, Hefei University of Technology, Hefei 230009
Xue-ping , School of Computer & Information, Hefei University of Technology, Hefei 230009
Xu Xiang-wei , School of Computer & Information, Hefei University of Technology, Hefei 230009
Wei Ju-yi , School of Computer & Information, Hefei University of Technology, Hefei 230009
pp. 1-7

Service composition and user modeling for personalized recommendation in cloud computing (Abstract)

Guobing Zou , School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China
Yanglan Gan , School of Computer Science and Technology, Donghua University, Shanghai 201620, China
Jianxing Zheng , School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China
Bofeng Zhang , School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China
pp. 1-7

A hybrid topology based multicast routing for cognitive radio ad hoc networks (Abstract)

Daewook Shin , Department of Computer Engineering, Graduate School of Ajou University, Suwon, Republic of Korea
Jaebeom Kim , Department of Computer Engineering, Graduate School of Ajou University, Suwon, Republic of Korea
Young-Bae Ko , Department of Computer Engineering, Graduate School of Ajou University, Suwon, Republic of Korea
pp. 1-5

An Active Channel Changing Delay method to improve IPTV channel availability (Abstract)

Junyu Lai , University of Electronic Science and Technology of China, Chengdu, P.R. China
Guolin Sun , University of Electronic Science and Technology of China, Chengdu, P.R. China
Gun Li , University of Electronic Science and Technology of China, Chengdu, P.R. China
Yuankai Li , University of Electronic Science and Technology of China, Chengdu, P.R. China
Kaiyu Qin , University of Electronic Science and Technology of China, Chengdu, P.R. China
pp. 1-7

Integrated location fingerprinting and physical neighborhood for WLAN probabilistic localization (Abstract)

Mu Zhou , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Qiao Zhang , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Zengshan Tian , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Feng Qiu , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Qi Wu , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
pp. 1-5

Real time implementation of Elliptic Curve Cryptography over a open source VoIP server (Abstract)

T. Subashri , Department of Electronics and Communication Engineering, Madras Institute of Technology Campus, Anna University, Chennai - 600 044, India
A. Arjun , Department of Electronics and Communication Engineering, Madras Institute of Technology Campus, Anna University, Chennai - 600 044, India
S. Ashok , Department of Electronics and Communication Engineering, Madras Institute of Technology Campus, Anna University, Chennai - 600 044, India
pp. 1-6

To achieve maximal throughputs in CSMA wireless networks through offered-load control (Abstract)

Caihong Kai , School of Computer and Information, Hefei University of Technology, Hefei, China
Qi Zhang , School of Computer and Information, Hefei University of Technology, Hefei, China
Lusheng Wang , School of Computer and Information, Hefei University of Technology, Hefei, China
pp. 1-5

Wireless network architecture using sound for ubiquitous signal transmission (Abstract)

Kuruvilla Mathew , Faculty of IT and Computer Science, University Malaysia Sarawak (UNIMAS), Kuching, Malaysia
Biju Issac , School of Computing Teesside University Middlesbrough, Tees Valley, UK
Tan Chong Eng , Faculty of IT and Computer Science, University Malaysia Sarawak (UNIMAS), Kuching, Malaysia
pp. 1-6

A Connected Component-Based Distributed method for overlapping community detection (Abstract)

Tian Chen , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Kai Liu , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Xin Yi , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Dandan Shen , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Wei Wang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Fuji Ren , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Jun Liu , School of Computer and Information, Hefei University of Technology, Hefei, 230009
pp. 1-7

An indoor positioning algorithm using joint information entropy based on WLAN fingerprint (Abstract)

Gui Zou , Communication Research Center, Harbin Institute of Technology, Harbin, China, 150080
Lin Ma , Communication Research Center, Harbin Institute of Technology, Harbin, China, 150080
Zhongzhao Zhang , Communication Research Center, Harbin Institute of Technology, Harbin, China, 150080
Yun Mo , Communication Research Center, Harbin Institute of Technology, Harbin, China, 150080
pp. 1-6

Clustering process for maximizing lifetime using probabilistic logic in WSN (Abstract)

S. Prabhavathi , RYMEC Bellary, India
A. Subramanyam , AITS Rajampet, India
A. Ananda Rao , JNTUCEA Anantapur, India
pp. 1-7

Speech enhancement to overcome the effect of near-end noise in mobile phones using psychoacoustics (Abstract)

B. S. Premananda , Department of Telecommunication Engineering, R.V. College of Engineering, Bangalore, India
B. V. Uma , Department of Electronics and Communication Engineering, R.V. College of Engineering, Bangalore, India
pp. 1-6

Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology (Abstract)

Dinesh Kumar Karunakaran , VLSI Design, Research Group, Department of Electronics & Communication Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
N. Mohankumar , VLSI Design, Research Group, Department of Electronics & Communication Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
pp. 1-7

A novel application to secure misuse of information in critical organizations for windows environment (Abstract)

Maaz Bin Ahmad , Center for Advanced Studies in Engineering (CASE), Islamabad, Pakistan
Muhammad Asif , Muhammad Ali Jinnah University (MAJU), Islamabad, Pakistan
Syed Mashhad Mustuzhar Gilani , PMAS University of Arid Agriculture, Rawalpindi, Pakistan
M. Hasan Islam , Center for Advanced Studies in Engineering (CASE), Islamabad, Pakistan
Saeed-ur-Rehman , Center for Advanced Studies in Engineering (CASE), Islamabad, Pakistan
pp. 1-7

A test data compression scheme based on position information coding (Abstract)

Tian Chen , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Bingdong Yang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Wei Wang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Birong Hao , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Fuji Ren , School of Computer and Information, Hefei University of Technology, Hefei, 230009
Jun Liu , School of Computer and Information, Hefei University of Technology, Hefei, 230009
YiXin Wang , School of Computer and Information, Hefei University of Technology, Hefei, 230009
pp. 1-7

Study of cryptography-based cyberspace data security (Abstract)

Tonghao Yang , Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
Bin Yu , Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
pp. 1-7

An automatic generation method of Hui-style architectures based on 2D planar graph (Abstract)

Li Shujie , School of Computer and Information, Hefei University of Technology, Hefei, China
Wu Haijun , School of Computer and Information, Hefei University of Technology, Hefei, China
Zhang Runmei , School of Electronic and Infromation Engineering, Anhui Jianzhu University, Hefei, China
Liu Xiaoping , School of Computer and Information, Hefei University of Technology, Hefei, China
pp. 1-8

Intelligent system for remote health monitoring of divers using underwater acoustic communication (Abstract)

K. A. Unnikrishna Menon , Amrita Center for Wireless Networks & Applications, Amrita VishwaVidyapeetham, Kollam, India
J. S. Shibina , Amrita Center for Wireless Networks & Applications, Amrita VishwaVidyapeetham, Kollam, India
Vrinda. N. Menon , Amrita Center for Wireless Networks & Applications, Amrita VishwaVidyapeetham, Kollam, India
pp. 1-7

Multi-layer multi-center atom set cohesion clustering algorithm (Abstract)

Dongqing Zhou , Dalian University of Technolog
Linliang Zhang , Dalian University of Technology
Xiaoyue Deng , Dongbei University of Finance and Economics
pp. 1-6

Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network (Abstract)

Sonali Swetapadma Sahu , School of Computer Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar, India
Pooja Priyadarshini , School of Computer Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar, India
Saurabh Bilgaiyan , School of Computer Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar, India
pp. 1-6

On minimum covering of invertible honeycomb meshes (Abstract)

D. Angel , Sathyabama University, Chennai-600119, India
A. Amutha , Sathyabama University, Chennai-600119, India
pp. 1-6

Differential evolution with M-fitness method (Abstract)

Ying Yang , School of Computer Science, Zhejiang University, Zheda Road No.38, Hangzhou, Zhejiang Province, China
Min Yao , School of Computer Science, Zhejiang University, Zheda Road No.38, Hangzhou, Zhejiang Province, China
pp. 1-7

Development of a wireless sensor network for detecting fire and Gas leaks in a collapsing building (Abstract)

Sethuraman Rao , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India- 690525
G. K. Nithya , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India- 690525
K Rakesh , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kerala, India- 690525
pp. 1-7

Runtime reconfiguration of wireless sensor node using FPGA (Abstract)

S. Meena , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore
N. Krishna Prakash , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore
pp. 1-5

An introduction to Markov logic networks and application in video activity analysis (Abstract)

Guangchun Cheng , University of North Texas, Computer Science and Engineering, Denton, TX 76207, USA
Yiwen Wan , University of North Texas, Computer Science and Engineering, Denton, TX 76207, USA
Bill P. Buckles , University of North Texas, Computer Science and Engineering, Denton, TX 76207, USA
Yan Huang , University of North Texas, Computer Science and Engineering, Denton, TX 76207, USA
pp. 1-7

Survey on scheduling in hybrid clouds (Abstract)

Nitish Chopra , UIET Panjab University Chandigarh India
Sarbjeet Singh , UIET Panjab University, Chandigarh India
pp. 1-6

Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework (Abstract)

Surbhi Singh , Department of Computer Science, Lovely Professional University, Punjab, India
Sangeeta Sharma , Department of Computer Science, Lovely Professional University, Punjab, India
pp. 1-7

Relay selection for alert messaging in vanets based on bi-directional stable communication approach (Abstract)

Osama M. Hussain Rehman , Department of Electrical & Computer Engineering, Communication & Information Research Center, Sultan Qaboos University, Muscat, Oman
Hadj Bourdoucen , Department of Electrical & Computer Engineering, Communication & Information Research Center, Sultan Qaboos University, Muscat, Oman
Mohamed Ould-Khaoua , Department of Electrical & Computer Engineering, Sultan Qaboos University, Muscat, Oman
pp. 1-7

Mobility management analysisy in LTE-A heterogeneous network (Abstract)

Rong Wang , University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China
Xiang Yu , School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Li Zhang , School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
pp. 1-7

Utilizing neighbor information in image segmentation (Abstract)

Lingyun Li , School of Information and Electrical Engineering, Ludong University Yantai, China
Xiaofeng Zhang , School of Information and Electrical Engineering, Ludong University Yantai, China
pp. 1-6

Securing cloud infrastructure through PKI (Abstract)

Imran Ijaz , Fatima Jinnah Women University Rawalpindi, SZABIST Islamabad, Pakistan
Abroo Aslam , Fatima Jinnah Women University Rawalpindi, SZABIST Islamabad, Pakistan
Bushra Bukhari , Fatima Jinnah Women University Rawalpindi, SZABIST Islamabad, Pakistan
Rabia Javed , Fatima Jinnah Women University Rawalpindi, SZABIST Islamabad, Pakistan
Sumaira Anees , Fatima Jinnah Women University Rawalpindi, SZABIST Islamabad, Pakistan
pp. 1-6

SDN based uniform network architecture for future wireless networks (Abstract)

Shengli Zhang , Department of Communication Engineering, Shenzhen University, 518060, China
Caihong Kai , School of Computer and Information, Hefei University of Technology, Hefei, 230009, China
Lingyang Song , School of Electrical Engineering and Computer Science, Peking University, Beijing 100871, China
pp. 1-5

An interference mitigation scheme for IEEE 802.15.4 networks under IEEE 802.11b/g interference (Abstract)

Kalyan Pathapati Subbu , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidhyapeetham, Kollam, Kerala 690525
Suchith Soman , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidhyapeetham, Kollam, Kerala 690525
pp. 1-6

A hybrid RSSI based localization algorithm for WSN using a mobile anchor node (Abstract)

Fereydoon Abdi , Faculty of Computer and Information Technology Engineering, Qazvin branch, Islamic Azad University, Qazvin, Iran
Abolfazl Toroghi Haghighat , Faculty of Computer and Information Technology Engineering, Qazvin branch, Islamic Azad University, Qazvin, Iran
pp. 1-6

Extending self-organizing network availability using genetic algorithm (Abstract)

Mohamed Elhoseny , Department of Computer Science and Engineering, University of North Texas, Denton, Texas, U.S.A.
Xiaohui Yuan , Department of Computer Science and Engineering, University of North Texas, Denton, Texas, U.S.A.
Hamdy K. El-Minir , Department of Electrical Engineering, Kafr El-Sheikh University, Kafr El-Sheikh, Egypt
A. M. Riad , Department of Information Systems, Mansoura University, Mansoura, Daqahlia, Egypt
pp. 1-6

Smart grids: An approach to integrate the renewable energies and efficiently manage the energy system of Pakistan (Abstract)

Hafiz Bilal Khalil , Department of Electrical Engineering, University of Gujrat, Pakistan
Naeem Abas , Department of Electrical Engineering, University of Gujrat, Pakistan
pp. 1-7

Non blind watermarking technique using enhanced one time pad in DWT domain (Abstract)

Bidyut Jyoti Saha , School of Computer Engineering, KIIT University, Bhubaneswar, India
Arun , School of Computer Engineering, KIIT University, Bhubaneswar, India
Kunal Kumar Kabi , School of Computer Engineering, KIIT University, Bhubaneswar, India
Chittaranjan Pradhan , School of Computer Engineering, KIIT University, Bhubaneswar, India
pp. 1-6

A high performance 2.4 GHz GaAs HBT class J power amplifier (Abstract)

Tao Chen , National ASIC System Engineering Research Center, Southeast University, Nanjing, China
Feng Wang , Suzhou Innotion Tech. Co., Ltd., Suzhou, China
Xiaohong Sun , National ASIC System Engineering Research Center, Southeast University, Nanjing, China
Jianhui Wu , National ASIC System Engineering Research Center, Southeast University, Nanjing, China
pp. 1-4

Performance analysis of MIMO two-way relay channel (Abstract)

Aibing Hou , Dept. Phys. and Telecom. Engineering, South China Normal University, Guangzhou, China
Cuilin Pan , School of Mechanical and Electrical Engineering, WU YI University, Jiangmen, China
pp. 1-4

Research on vertical handover in LTE two-tier Macrocell/Femtocell Systems based on fuzzy neural network (Abstract)

Yang Jiao , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
Lin Ma , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
Yubin Xu , Communication Research Center, Harbin Institute of Technology, Harbin, People's Republic of China
pp. 1-5

Augmenting packet delivery rate in outdoor wireless sensor networks through frequency optimization (Abstract)

Maneesha Vinodini Ramesh , Amrita Center for Wireless Networks and Applications, AMRITA Vishwa Vidyapeetham, Kerala, India-690525
Parvathy Rajan , Amrita Center for Wireless Networks and Applications, AMRITA Vishwa Vidyapeetham, Kerala, India-690525
P. Divya , Amrita Center for Wireless Networks and Applications, AMRITA Vishwa Vidyapeetham, Kerala, India-690525
pp. 1-7

Computational fluid dynamics-based system identification of marine vehicles (Abstract)

Mahmoud Hosny , Faculty of Engineering, Alexandria University
Mohammed Amr , Faculty of Engineering, Alexandria University
Ibrahim Zedan , Faculty of Engineering, Alexandria University
Mohamed AbdelSalam , Faculty of Engineering, Alexandria University
Muhammad Al-Sayd , Faculty of Engineering, Alexandria University
pp. 1-7

Personalized recommendation based on link prediction in dynamic super-networks (Abstract)

Wang Hong , Institute of Information Science and Engineering, Shandong Normal University, Jinan China 250014
Sun Yanshen , Department of Earth Sciences Zhejiang University, Hangzhou China 310000
Yu Xiaomei , Institute of Information Science and Engineering, Shandong Normal University, Jinan China 250014
pp. 1-7

Design of low noise low power two stage CMOS operational amplifier using Equivalent Transistor Replacement Technique for health monitoring applications (Abstract)

Richa Dubey , Department of ECE GLA University Mathura, India
Anjan Kumar , Department of ECE, GLA University, Mathura, India
Manisha Pattanaik , Dept. of Computer Science and Engineering, ABV-IIITM, Gwalior, India
pp. 1-6

Fish school search approach to find optimized thresholds in gray-scale image (Abstract)

Debashis Mishra , School of Computer Engineering, KIIT University, Bhubaneswar, India
Utpal Chandra De , School of Computer Application, KIIT University, Bhubaneswar, India
Isita Bose , School of Computer Engineering, KIIT University, Bhubaneswar, India
Bishwojyoti Pradhan , School of Computer Engineering, KIIT University, Bhubaneswar, India
pp. 1-4

New blind signcryption schemes with application to E-cash systems (Abstract)

Yasmine Abouelseoud , Engineering Mathematics and Physics department, Faculty of Engineering, Alexandria University, Alexandria, Egypt
pp. 1-6

A heuristic overlay multicast routing algorithm for minimum delay optimization (Abstract)

Longxin Lin , College of Information Science and Technology, Jinan University, Guangzhou, China
pp. 1-6

Pedestrian detection using two-stage sparse coding algorithm (Abstract)

Peibei Shi , Department of public computer teaching, Hefei Normal University Hefei, China
Zhong Wang , Department of Digit Technology, No.38 Research Institute of CETC, hefei, China
pp. 1-4

Study and application on power communication operation mode checking and analysis method (Abstract)

Shengchao Yan , Nari Information & Communication Division, State Grid Electric Power Research Institute, Nanjing, China
Shunli Lv , Nari Information & Communication Division, State Grid Electric Power Research Institute, Nanjing, China
Juan Qi , Nari Information & Communication Division, State Grid Electric Power Research Institute, Nanjing, China
pp. 1-4

Compact planar G-shape UWB antenna with notch characteristics for satellite communication (Abstract)

Satyabrata Maiti , School of Electronics Engineering, KIIT University, Bhubaneswar, India
Sangita Das , School of Electronics Engineering, KIIT University, Bhubaneswar, India
Naikatmana Pani , School of Electronics Engineering, KIIT University, Bhubaneswar, India
pp. 1-3

CGF-LQ: An optimal Combined Greedy-Face routing based on local link quality (Abstract)

Shuo Shi , School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
Jiliang Chen , School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
Xuemai Gu , School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
pp. 1-5

Low complexity MMSE estimator for OFDM systems over slow fading Rayleigh channels (Abstract)

Latif Ullah Khan , University of Engineering & Technology, Peshawar- Pakistan
M. Irfan Khattak , University of Engineering & Technology, Peshawar- Pakistan
Naeem Khan , University of Engineering & Technology, Peshawar- Pakistan
M. Shafi , University of Engineering & Technology, Peshawar- Pakistan
pp. 1-4

The development of a visualization framework for fishing vessels at sea (Abstract)

K. Rakesh , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kollam, Kerala 690525
S. Sunanda , Amrita Center for Wireless Networks and Applications, Amrita Vishwa Vidyapeetham, Kollam, Kerala 690525
pp. 1-5

Modified fuzzy hyperline-segment neural network for classification with mixed attribues (Abstract)

S. V. Shinde , Department Information Technology, Pimpri Chinchwad College of Engineering, Pune, Maharastra, India
U. V. Kulkarni , Department of Computer Science and Engineering, SGGS Institute of Technology, Nanded, Maharastra, India
pp. 1-7

Mining classification rules from fuzzy min-max neural network (Abstract)

S. V. Shinde , Department Information Technology, Pimpri Chinchwad College of Engineering, Pune, Maharastra, India
U. V. Kulkarni , Department of Computer Science and Engineering, SGGS Institute of Technology, Nanded, Maharastra, India
pp. 1-7

Transmitting hidden information using steganography via Facebook (Abstract)

Nathaniel D. Amsden , Department of Computer Science, Sam Houston State University, Huntsville, TX
Lei Chen , Department of Computer Science, Sam Houston State University, Huntsville, TX
Xiaohui Yuan , Department of CS and Engineering, University of North Texas, Denton, TX
pp. 1-7

Towards the formal foundation of orchestration process (Abstract)

Chang Yang , Pinghu Campus, Jiaxing University, Jiaxing, China
Farong Zhong , Department of Computer Science, Zhejiang Normal University, Jinhua, China
pp. 1-6

Routing mechanism in active Peer-to-Peer network (Abstract)

Jing Li , National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China
Wei Jin , National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China
pp. 1-3

Design of a compact ultra wide band microstrip patch antenna (Abstract)

Satyabrata Maiti , School of Electronics Engineering, KIIT University, Bhubaneswar, India
Sudip Kumar Rajak , School of Electronics Engineering, KIIT University, Bhubaneswar, India
Amrit Mukherjee , School of Electronics Engineering, KIIT University, Bhubaneswar, India
pp. 1-3

Design and implementation of block cipher in hummingbird algorithm over FPGA (Abstract)

Shumit Saha , Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh
Md. Rashedul Islam , Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh
Habibur Rahman , Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh
Mehadi Hassan , Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh
A. B. M. Aowlad Hossain , Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology, Khulna-9203, Bangladesh
pp. 1-5

The coverage problem in UAV network: A survey (Abstract)

Yueyue Chen , College of Computer, National University of Defense Technology, Changsha, China 410073
Haidong Zhang , College of Computer, National University of Defense Technology, Changsha, China 410073
Ming Xu , College of Computer, National University of Defense Technology, Changsha, China 410073
pp. 1-5

Selfish node detection and its behavior in WSN (Abstract)

Sujit Kumar Das , School of Computer Engineering, KIIT University, Bhubaneswar, India
Bidyut Jyoti Saha , School of Computer Engineering, KIIT University, Bhubaneswar, India
Pinaki Sankar Chatterjee , School of Computer Engineering, KIIT University, Bhubaneswar, India
pp. 1-6

Traffic scheduling for wireless meter data collection in smart grid communication network (Abstract)

Sujie Shao , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, China
Shaoyong Guo , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, China
Xuesong Qiu , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, China
Luoming Meng , State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, China
Yang Jiao , Information and Communication Technology Service Center, SGEPRI, 100761, Beijing, China
Wei Wei , Information and Communication Technology Service Center, SGEPRI, 100761, Beijing, China
pp. 1-7

A 200Mbps random number generator with jitter-amplified oscillator (Abstract)

Yan Yang , Institute of microelectronics, Tsinghua University, Beijing China
Guoqiang Bai , Institute of microelectronics, Tsinghua University, Beijing China
Hongyi Chen , Institute of microelectronics, Tsinghua University, Beijing China
pp. 1-5

Blind equalization of short burst signals based on twin support vector regressor and data-reusing method (Abstract)

Ling Yang , School of Information Science and Engineering, Lanzhou university
Yanping Fu , School of Information Science and Engineering, Lanzhou university
Zhifen Yang , School of Information Science and Engineering, Lanzhou university
Yanyan Wei , School of Information Science and Engineering, Lanzhou university
pp. 1-6

Comparison of File Integrity Monitoring (FIM) techniques for small business networks (Abstract)

Brittany Wilbert , Department of Computer Science, Sam Houston State University, Huntsville, Texas, United States
Lei Chen , Department of Computer Science, Sam Houston State University, Huntsville, Texas, United States
pp. 1-7

Robust speaker verification using self organizing map (Abstract)

Pranab Das , Dept. Computer Science and Engineering, Rajiv Gandhi University, Doimukh, Arunachal Pradesh, India
Utpal Bhatacharjee , Dept. Computer Science and Engineering, Rajiv Gandhi University, Doimukh, Arunachal Pradesh, India
pp. 1-4

Robust speaker verification using GFCC and joint factor analysis (Abstract)

Pranab Das , Dept. Computer Science and Engineering, Rajiv Gandhi University, Doimukh, Arunachal Pradesh, India
Utpal Bhattacharjee , Dept. Computer Science and Engineering, Rajiv Gandhi University, Doimukh, Arunachal Pradesh, India
pp. 1-4

An hybrid bio-inspired task scheduling algorithm in cloud environment (Abstract)

Rakesh Madivi , Department of Information Technology, National Institute of Technology Karnataka, Surathkal, India - 575025
S Sowmya Kamath , Department of Information Technology, National Institute of Technology Karnataka, Surathkal, India - 575025
pp. 1-7

Tree-conf: A fast automatic address configuration method for tree-like data center networks (Abstract)

Gang Deng , College of Computer, NUDT, Changsha, China
Hong Wang , College of Computer, NUDT, Changsha, China
Zhenghu Gong , College of Computer, NUDT, Changsha, China
pp. 1-6

The recommendation systems for smart TV (Abstract)

Yi Yang , School of Information Science & Engineering, Lanzhou University, China Lanzhou, 730000
Chaoqun Liu , School of Information Science & Engineering, Lanzhou University, China Lanzhou, 730000
Caihong Li , School of Information Science & Engineering, Lanzhou University, China Lanzhou, 730000
Yajie Hu , School of Information Science & Engineering, Lanzhou University, China Lanzhou, 730000
Yi Niu , Department of Computer and Information Science, College of Dongguan, University of Technology, China Dongguan, 523000
Lian Li , School of Computer and Information, Hefei University of Technology, China Hefei, 230000
pp. 1-6

Design and implementation of crossbar switch in NS2 (Abstract)

Sujeet Kumar , School of Computing and Electrical Engineering Indian Institute of Technology Mandi, India, 175001
Anand Srivastava , School of Computing and Electrical Engineering Indian Institute of Technology Mandi, India, 175001
pp. 1-7

An enhanced data security and trust management enabled framework for cloud computing systems (Abstract)

J. Cindhamani , School of Information Technology and Engineering, VIT University, Vellore
Naguboynia Punya , School of Information Technology and Engineering, VIT University, Vellore
Rasha Ealaruvi , School of Information Technology and Engineering, VIT University, Vellore
L. D. Dhinesh Babu , School of Information Technology and Engineering, VIT University, Vellore
pp. 1-5

A novel solution to PnP problem for a camera with unknown focal length (Abstract)

Li Shujie , School of Computer and Information, Hefei University of Technology, Hefei 230009 China
Zhang Yuhang , School of Computer and Information, Hefei University of Technology, Hefei 230009 China
Ma Ling , School of Computer and Information, Hefei University of Technology, Hefei 230009 China
Bao Hui , School of Computer and Information, Hefei University of Technology, Hefei 230009 China
pp. 1-6

Measuring the QoS of Personal Cloud Storage (Abstract)

Pengyan Shen , College of Information of Science, Beijing Normal University, Beijing, China
Kai Guo , College of Information of Science, Beijing Normal University, Beijing, China
Mingzhong Xiao , College of Information of Science, Beijing Normal University, Beijing, China
pp. 1-6

SDWLAN: A flexible architecture of enterprise WLAN for client-unaware fast AP handoff (Abstract)

Dong Zhao , College of Computer, National University of Defense Technology, Changsha, China
Ming Zhu , College of Computer, National University of Defense Technology, Changsha, China
Ming Xu , College of Computer, National University of Defense Technology, Changsha, China
pp. 1-6

Design issues in trust based routing for MANET (Abstract)

Sandeep A. Thorat , Walchand College of Engineering, Sangli, India
P. J. Kulkarni , Computer Science Department, Walchand College of Engineering, Sangli India
pp. 1-7

Different firewall techniques: A survey (Abstract)

Rupam Kumar Sharma , Dept. of CS and Engineering and IT, Don Bosco College of Eng. and Tech., Assam, India
Hemanta Kumar Kalita , Dept. of Information Technology, North Eastern Hills University, Meghalaya, India
Biju Issac , School of Computing, Teesside University, Middlesbrough, UK
pp. 1-6

The extension of the rough set theory based on parallel equivalence operator in pansystems (Abstract)

He Lin , School of Information Science and Engineering, Lanzhou University, Lanzhou, China
Mengyao Nie , School of Information Science and Engineering, Lanzhou University, Lanzhou, China
Lingyue Li , School of Information Science and Engineering, Lanzhou University, Lanzhou, China
pp. 1-5

Parallel universes algorithm: A metaheuristic approach to solve vehicle routing problem (Abstract)

Alireza Akbari Bayat , Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran
pp. 1-7

Transformation between BPMN and BPEL based on graph grammar (Abstract)

Zhan Shi , College of Computer and Information Engineering in HoHai University and College of Command Information Systems in PLA University of Science and Technology, Nanjing, China
Xiaoqin Zeng , College of Computer and Information Engineering in HoHai University, Nanjing, China
Song Huang , College of Command Information Systems in PLA University of Science and Technology, Nanjing, China
Hui Li , College of Command Information Systems in PLA University of Science and Technology, Nanjing, China
Bing Hu , College of Command Information Systems in PLA University of Science and Technology, Nanjing, China
XiaoYu Lei , College of Command Information Systems in PLA University of Science and Technology, Nanjing, China
Yi Wang , College of Computer and Information Engineering in HoHai University, Nanjing, China
pp. 1-6

FPGA implementation of FlexRay protocol with built-in-self-test capability (Abstract)

Shumit Saha , Department of Electronics and Communication Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
Md. Nafiul Alam , Department of Electronics and Communication Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
Raktim Kumar Mondol , Department of Electrical and Electronic Engineering, World University of Bangladesh, Dhaka, Bangladesh
pp. 1-6

Privacy preserving and anonymity in multi sinks wireless sensor networks with master sink (Abstract)

Mina Kazemi , Department Of Computer, Alzahra University, Tehran, Iran
Reza Azmi , Department Of Computer, Alzahra University, Tehran, Iran
pp. 1-7

An hybrid bio-inspired task scheduling algorithm in cloud environment (Abstract)

Rakesh Madivi , Department of Information Technology, National Institute of Technology Karnataka, Surathkal, India - 575025
S Sowmya Kamath , Department of Information Technology, National Institute of Technology Karnataka, Surathkal, India - 575025
pp. 1-7

Fuzzy logic analysis of knitted fabrics spirality (Abstract)

Shumit Saha , Department of Electronics & Communication Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
Md. Milon Hossain , Department of Textile Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
Md. Nafiul Alam , Department of Textile Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh
Raktim Kumar Mondol , Department of Electrical and Electronic Engineering, World University of Bangladesh, Dhaka, Bangladesh
pp. 1-5

DFHM model: Dynamic fault handling model for Webservices (Abstract)

Prachet Bhuyan , School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India
Akhilesh Kumar Pandey , School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India
Durga Prasad Mohapatra , Dept., of Computer Science & Engineering, NIT, Rourkela, Odisha, India
pp. 1-4

Design of low noise low power biopotential tunable amplifier using voltage controlled pseudo-resistor for biosignal acquisition applications (Abstract)

Richa Dubey , Department of ECE, GLA University, Mathura, India
Anjan Kumar , Department of ECE, GLA University, Mathura, India
Manisha Pattanaik , Dept. of Computer Science and Engineering, ABV-IIITM, Gwalior, India
pp. 1-5

An agent-based searchable encryption scheme in mobile computing environment (Abstract)

Yang Jian , College of Mathematics and Computer Science, Dali University, Dali, Yunnan Province, P.R. China, 671003
Yang Dengqi , College of Mathematics and Computer Science, Dali University, Dali, Yunnan Province, P.R. China, 671003
pp. 1-7

Color lock: 16 bit digital color based security system (Abstract)

M D Nasimuzzaman Chowdhury , Dept. of Electrical & Electronic Engineering, American International University-Bangladesh
Mohammed Kawser Jahan , Dept. of Electrical & Electronic Engineering, American International University-Bangladesh
Silvia Shukla Karmokar , Dept. of Electrical & Electronic Engineering, American International University-Bangladesh
Sultan Mahmud , Dept. of Electrical & Electronic Engineering, University of Information Technology & Sciences
pp. 1-5

Comparative analysis of digital watermarking scheme using enhanced playfair cipher in DCT & DWT (Abstract)

Chittaranjan Pradhan , School of Computer Engineering, KIIT University, Bhubaneswar, Odisha
Bidyut Jyoti Saha , School of Computer Engineering, KIIT University, Bhubaneswar, Odisha
Kunal Kumar Kabi , School of Computer Engineering, KIIT University, Bhubaneswar, Odisha
Arun , School of Computer Engineering, KIIT University, Bhubaneswar, Odisha
pp. 1-6

A Load-Adaptive Beacon Scheduling algorithm for IEEE 802.15.4 mesh topology improving throughput and QoS in WMSNs (Abstract)

Mohamad Baseri , Department of Electrical Engineering, Amirkabir University of Technology, AUT, Tehran, Iran
Seyed Ahmad Motamedi , Department of Electrical Engineering, Amirkabir University of Technology, AUT, Tehran, Iran
Mohsen Maadani , Department of Electrical Engineering, Amirkabir University of Technology, AUT, Tehran, Iran
pp. 1-5

A joint error correction and ICI cancellation algorithm for OFDM systems (Abstract)

Latif Ullah Khan , University of Engineering & Technology, Peshawar, Pakistan
M. Irfan Khattak , University of Engineering & Technology, Peshawar, Pakistan
Naeem Khan , University of Engineering & Technology, Peshawar, Pakistan
M. Shafi , University of Engineering & Technology, Peshawar, Pakistan
pp. 1-6

Binary biometric template generation towards security and class separability (Abstract)

Eslam Hamouda , Faculty of Computers and Information, Mansoura University, Mansoura, Daqahlia, Egypt
Xiaohui Yuan , Department of Computer Science and Engineering, University of North Texas, Denton, Texas, U.S.A.
Osama Ouda , Faculty of Computers and Information, Mansoura University, Mansoura, Daqahlia, Egypt
Taher Hamza , Faculty of Computers and Information, Mansoura University, Mansoura, Daqahlia, Egypt
Lei Chen , Department of Computer Science, Sam Houston State University, Huntsville, Texas, USA
pp. 1-6

Component based exception handling framework for SOA based services (Abstract)

Akhilesh Kumar Pandey , School Of Computer Engineering, KIIT University, Bhubaneswar(Orissa)
Prachet Bhuyan , School Of Computer Engineering, KIIT University, Bhubaneswar(Orissa)
Durga Prasad Mohaptra , Dept. of Computer Science & Engineering NIT, Rourkela(Orissa)
pp. 1-5

Towards automated distributed containment of zero-day network worms (Abstract)

Khurram Shahzad , Internet Security Research Laboratory, Department of Electrical and Computer Engineering, University of Greenwich, London, UK
Steve Woodhead , Internet Security Research Laboratory, Department of Electrical and Computer Engineering, University of Greenwich, London, UK
pp. 1-7

A temperature gradient based routing algorithm on 3D NoC (Abstract)

Gaoming Du , Institute of VLSI Design Hefei University of China, Hefei, China
Xin Liu , Institute of VLSI Design Hefei University of China, Hefei, China
Yunkun Song , Institute of VLSI Design Hefei University of China, Hefei, China
Duoli Zhang , Institute of VLSI Design Hefei University of China, Hefei, China
Yanghao Ou , Institute of VLSI Design Hefei University of China, Hefei, China
Miao Li , Institute of VLSI Design Hefei University of China, Hefei, China
pp. 1-5

Design and fabrication of bipedal robot (Abstract)

Ashwin Sushil Kumar , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore, India
Aswin G Krishnan , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore, India
Akshay Sridhar , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore, India
N Kiruthika , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore, India
N. Krishna Prakash , Department of Electrical and Electronics Engineering, Amrita School of Engineering, Coimbatore, India
pp. 1-6

Software service architecture to access weather data using RESTful web services (Abstract)

Ramakrishnan Ramanathan , Department of Electrical Engineering and Computer Science, Ostwestfalen-Lippe, University of Applied Sciences, 32657 Lemgo, Germany
Thomas Korte , Department of Electrical Engineering and Computer Science, Ostwestfalen-Lippe, University of Applied Sciences, 32657 Lemgo, Germany
pp. 1-8

Adaptive power allocation based on the two-hop rate matching of LTE-A relay network (Abstract)

Xiaolin Li , Chongqing University of Posts and Telecommunications: Research Centre for Application of New Communication Technologies, Chongqing 400065, China
Binghua Liu , Chongqing University of Posts and Telecommunications: Research Centre for Application of New Communication Technologies, Chongqing 400065, China
pp. 1-5

A Pseudo-Worm Daemon (PWD) for empirical analysis of zero-day network worms and countermeasure testing (Abstract)

Khurram Shahzad , Internet Security Research Laboratory, Department of Electrical, Electronic and Computer Engineering, University of Greenwich, London, UK
Steve Woodhead , Internet Security Research Laboratory, Department of Electrical, Electronic and Computer Engineering, University of Greenwich, London, UK
pp. 1-6

WSN key distribution method based on PTPP (Abstract)

Wu Haibing , New Star Research Institute of Applied Technology, Hefei, 230031, China
Chen Dong , New Star Research Institute of Applied Technology, Hefei, 230031, China
Liu Ping , New Star Research Institute of Applied Technology, Hefei, 230031, China
Li Mingxi , New Star Research Institute of Applied Technology, Hefei, 230031, China
Yuan Hongwei , New Star Research Institute of Applied Technology, Hefei, 230031, China
Gao Haomin , New Star Research Institute of Applied Technology, Hefei, 230031, China
pp. 1-7

Automatic detection of entry into a restricted area (Abstract)

Sathishkumar Sivagurunathan , Global R& D Crompton Greaves Limited Mumbai, India
Aditya Piratla , Global R& D Crompton Greaves Limited Mumbai, India
Jayalakshmi Surendran , Global R& D Crompton Greaves Limited Mumbai, India
Monotosh Das , Global R& D Crompton Greaves Limited Mumbai, India
pp. 1-5

A localization algorithm for distorted or rotated QR code (Abstract)

Hui Qi , Key Laboratory of Measurement and Control of CSE, School of Automation, Southeast University, Nanjing, China
Xiaobo Lu , Key Laboratory of Measurement and Control of CSE, School of Automation, Southeast University, Nanjing, China
Liying Lu , Key Laboratory of Measurement and Control of CSE, School of Automation, Southeast University, Nanjing, China
pp. 1-4

Performance evaluation of routing protocols in opportunistic networks (Abstract)

Jinbang Chen , East China Normal University, China
Wei Zhang , East China Normal University, China
Paolo Giaccone , Politecnico di Torino, Italy
pp. 1-7

Big data based retail recommender system of non E-commerce (Abstract)

Chen Sun , Department of Automation, University of Science and Technology of China, Hefei
Rong Gao , Department of Automation, University of Science and Technology of China, Hefei
Hongsheng Xi , Department of Automation, University of Science and Technology of China, Hefei
pp. 1-7

Design of novel energy conservative preemptive dynamic source routing for MANET (Abstract)

V. Ramesh , CSE, BVRIT, Narsapur, AP, India
K. Sangeetha Supriya , AITS, Tirupati, AP, India
P. Subbaiah , Dhanalakshmi Engg College, Chennai, TN, India
pp. 1-7

Power analysis of a FPGA implementation of SM4 (Abstract)

Shuang Qiu , Department of Microelectronics and Nanoelectronics, Tsinghua University, Beijing, China, 100084
Guoqiang Bai , Department of Microelectronics and Nanoelectronics, Tsinghua University, Beijing, China, 100084
pp. 1-6

Probabilistic Density Based Adaptive Clustering scheme to improve network survivability in WSN (Abstract)

Jitender Grover , Department of Computer Science & Engineering, Maharishi Markandeshwar University, Sadopur, Ambala, India
Reena Rani , Department of Computer Science & Engineering, Maharishi Markandeshwar University, Sadopur, Ambala, India
pp. 1-7

A Multi-Armed Bandit Problem-Based Target Coverage Protocol for Wireless Sensor Network (Abstract)

Mahmoud Parvin , Computer Engineering Department, Eshragh Institute of Higher Education, Bojnourd, Iran
Ehsan Jafari , Computer Engineering Department, Eshragh Institute of Higher Education, Bojnourd, Iran
Reza Azizi , Young Researchers and Elite Club, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran
pp. 1-5

Efficient PAPR reduction schemes for MIMO SC-FDMA with space-frequency block codes (Abstract)

Chang-Ju Lin , Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan
Li-Chung Chang , Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan
Chih-Yao Huang , Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan
pp. 1-5

Efficient wireless power transfer using underground relay coils (Abstract)

K.A. Unnikrishna Menon , Amrita Center for Wireless Networks and Application, Amrita Vishwa Vidyapeetham, Kollam, India
Achyuta Gungi , Amrita Center for Wireless Networks and Application, Amrita Vishwa Vidyapeetham, Kollam, India
Balaji Hariharan , Amrita Center for Wireless Networks and Application, Amrita Vishwa Vidyapeetham, Kollam, India
pp. 1-5

Evaluation of a trading application using a high performance messaging framework (Abstract)

Payal Guha Nandy , Performance Engineering Research Centre, Tata Consultancy Services, Mumbai, India
Nishant Agrawal , Performance Engineering Research Centre, Tata Consultancy Services, Mumbai, India
Manoj Nambiar , Performance Engineering Research Centre, Tata Consultancy Services, Mumbai, India
pp. 1-7

Defining future SDN based network management systems characterization and approach (Abstract)

Sreekanth Sasidharan , Engineering Services Infosys Limited, Bangalore, India
Saurav Kanti Chandra , Engineering Services Infosys Limited, Bangalore, India
pp. 1-5

A comparative survey on load balancing algorithms in cloud computing (Abstract)

Hamid Shoja , Dept. of Computer Engineering and Information Technology PNU Tehran, Iran
Hossein Nahid , Dept. of Engineering and Information Technology PNU Tehran, Iran
Reza Azizi , Young Researchers and Elite Club Bojnourd Branch IAU Bojnourd, Iran
pp. 1-5

Low-power delay buffer design using Asymmetric C-element gated clock strategy (Abstract)

C. Aarthi , ECE Sengunthar Engineering College Tiruchengode, Tamilnadu, India
R. K. Gnanamurthy , S.K.P. Engineering College, Tiruvannamalai, Tamilnadu, India
pp. 1-6

Correlated received signal strength correction for radio-map based indoor Wi-Fi localization (Abstract)

Mu Zhou , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Qiao Zhang , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Zengshan Tian , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Feng Qiu , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Qi Wu , Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
pp. 1-6

Performance analysis of single-walled carbon nanotube and multi-walled carbon nanotube in 32nm technology for on-chip interconnect applications (Abstract)

P. Murugeswari , Department of Electronics and Communication, Theni Kammavar Sangam College of Technology, Theni-625534
A. P. Kabilan , Department of Electronics and Communication, Vivekanandha College of Engineering for Women, Nammakal
M. Vaishnavi , Department of Electronics and Communication, Theni Kammavar Sangam College of Technology, Theni-625534
C. Divya , Department of Electronics and Communication, Theni Kammavar Sangam College of Technology, Theni-625534
pp. 1-6

Edge detection of noisy images based on time-multiplexing CNN simulator (Abstract)

V. Murugesh , Department of Computer Science, College of Computer Science, King Khalid University, Abha, Saudi Arabia
V. Arthy , Wipro Technologies, Sholinganallur, Chennai - 600 119, Tamilnadu, India
V. Agalya , Cognizant Technology Systems, Tambaram, Chennai - 600 119, Tamilnadu, India
pp. 1-5

Reactive protocols analysis with wormhole attack in ad-hoc networks (Abstract)

Gaurav Garg , UIET, Panjab University, Chandigarh
Sakshi Kaushal , UIET, Panjab University, Chandigarh
Akashdeep Sharma , UIET, Panjab University, Chandigarh
pp. 1-7

Key agreement with authenticated between trusted nodes based on self-issued certificate in WSN (Abstract)

Liu Tao , School of Computer and Information Anhui Polytechnic University Wuhu 241000, China
Huang Gan , School of Computer and Information Anhui Polytechnic University Wuhu 241000, China
Gong Yi-Dong , School of Computer and Information Engineering Harbin University of Commerce Harbin, 150000, China
pp. 1-3

Multiplierless FIR filter design using Global Valued Numbering and architecture (Abstract)

Rejisha Krishnan , ME (VLSI DESIGN) Department of Electronics and Communication Engineering Paavai engineering college Pachal
S. Vijayakumar , Department of Electronics and communication Engineering Paavai engineering college Pachal
pp. 1-5

Adaptive regularization of infrared image super-resolution reconstruction (Abstract)

Shao-Sheng Dai , Chongqing Key Laboratory of Signal and Information Processing (CqKLS&IP), Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Hai-Yan Xiang , Chongqing Key Laboratory of Signal and Information Processing (CqKLS&IP), Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Zhi-Hui Du , Chongqing Key Laboratory of Signal and Information Processing (CqKLS&IP), Chongqing University of Posts and Telecommunications, Chongqing 400065, China
Jin-Song Liu , Chongqing Key Laboratory of Signal and Information Processing (CqKLS&IP), Chongqing University of Posts and Telecommunications, Chongqing 400065, China
pp. 1-4

Enhanced digital watermarking scheme using fractal images in wavelets (Abstract)

Arun , School of Computer Engineering, KIIT University, Bhubaneswar, India
Kunal Kumar Kabi , School of Computer Engineering, KIIT University, Bhubaneswar, India
Bidyut Jyoti Saha , School of Computer Engineering, KIIT University, Bhubaneswar, India
Chittaranjan Pradhan , School of Computer Engineering, KIIT University, Bhubaneswar, India
pp. 1-6

Secure Mail using Visual Cryptography (SMVC) (Abstract)

S. Ajish , M-Tech Information Security, Department of Computer science and Engineering, College of Engineeering, Trivandrum, Thiruvananthapuram, India
R. Rajasree , Department of Computer science and Engineering, College of Engineeering, Trivandrum, Thiruvananthapuram, India
pp. 1-7

Weak BPSK signal demodulation by chaotic synchronization method (Abstract)

Shuo Shi , School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
Jinjie Ji , School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
Xuemai Gu , School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China
pp. 1-4

Reprojection of textured depth map for network rendering (Abstract)

Li Cao , Department of Computer Science, The University of Hong Kong
Zhan Yuan , Department of Computer Science, The University of Hong Kong
Bin Chan , Department of Computer Science, The University of Hong Kong
Wenping Wang , Department of Computer Science, The University of Hong Kong
pp. 1-7

Study of a WSN cooperation vehicle information collection method (Abstract)

Hu Beilei , School of Computer and Information, HeFei University of Technology, anhui, 230009
Shen Mingyu , School of Computer and Information, HeFei University of Technology, anhui, 230009
Zhao Jiao , School of Computer and Information, HeFei University of Technology, anhui, 230009
pp. 1-5

Webshell detection techniques in web applications (Abstract)

Truong Dinh Tu , School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
Cheng Guang , School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
Guo Xiaojun , School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
Pan Wubin , School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
pp. 1-7

An improved multi-channel mac protocol in vehicle-to-vehicle communication system (Abstract)

Hua Yang , Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China
Xiaojin Yang , Multi-source Information Mining & Security, Guangxi Normal University, Guilin, China
pp. 1-5

The performance of LDPC coded FFH/BFSK system over Rayleigh fading channel under multitone jamming (Abstract)

Jingke Dai , Xi'an Research Institute of High Technology, Xi'an, China
Donghui Xu , Xi'an Research Institute of High Technology, Xi'an, China
Yaque Jing , Xi'an Research Institute of High Technology, Xi'an, China
pp. 1-5

An adaptive strategy for network coding based reliability transmission mechanism (Abstract)

Hu Peng , Beijing Institute of Tracking and Telecommunications, Technology Beijing, China
Song Xiaoquan , Beijing Institute of Tracking and Telecommunications, Technology Beijing, China
pp. 1-5

An energy-efficient two-level cache architecture for chip multiprocessors (Abstract)

Mian Lou , Research Center of SoC, Xi'an Microelectronics Technology Institute, Xi'an, China
Longsheng Wu , Research Center of SoC, Xi'an Microelectronics Technology Institute, Xi'an, China
Senmao Shi , Research Center of SoC, Xi'an Microelectronics Technology Institute, Xi'an, China
Pengwei Lu , Research Center of SoC, Xi'an Microelectronics Technology Institute, Xi'an, China
pp. 1-5

Improved approximation algorithm for vertex cover problem using articulation points (Abstract)

Smit Patel , Department of Information Technology, National Institute of Technology Karnataka, Surathkal, India-575025
Sowmya Kamath S , Department of Information Technology, National Institute of Technology Karnataka, Surathkal, India-575025
pp. 1-5

Analysis on enhancing storm to efficiently process big data in real time (Abstract)

J.P. Nivash , School of Information Technology and Engineering, VIT University, Vellore, India
Ebin Deni Raj , School of Information Technology and Engineering, VIT University, Vellore, India
L.D. Dhinesh Babu , School of Information Technology and Engineering, VIT University, Vellore, India
M. Nirmala , School of Information Technology and Engineering, VIT University, Vellore, India
V. Manoj Kumar , School of Information Technology and Engineering, VIT University, Vellore, India
pp. 1-5
88 ms
(Ver 3.3 (11022016))