


default search action
8th IC3 2015: Noida, India
- Manish Parashar, Tirumale Ramesh, Jaric Zola, Nanjangud C. Narendra, Kishore Kothapalli, Joseph Amudha, Purushotham V. Bangalore, Deepa Gupta, Animesh Pathak, Sanjay Chaudhary, K. V. Dinesha, Sushil K. Prasad:

Eighth International Conference on Contemporary Computing, IC3 2015, Noida, India, August 20-22, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7947-2
Algorithms
- Shailendra Tiwari, Rajeev Srivastava

:
An efficient and modified median root prior based framework for PET/SPECT reconstruction algorithm. 1-6 - T. Ragunathan, Mohammed Sharfuddin:

Frequent block access pattern-based replication algorithm for cloud storage systems. 7-12 - Ruoqian Liu, Ankit Agrawal

, Wei-keng Liao
, Alok N. Choudhary, Zhengzhang Chen
:
Pruned search: A machine learning based meta-heuristic approach for constrained continuous optimization. 13-18 - Ashok Kumar Yadav

, Rajesh Mehta, Raj Kumar:
Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domain. 19-24 - Aniruddha Banerjee, Sharan Kumar Allur, Syam Prasad Kuncha:

Task behaviour inputs to a heterogeneous multiprocessor scheduler. 25-29 - Chandresh Kumar Maurya

, Durga Toshniwal, Gopalan Vijendran Venkoparao:
Online anomaly detection via class-imbalance learning. 30-35 - Ritu Kapur

:
A workload balanced approach for resource scheduling in cloud computing. 36-41 - Tasleem Arif

, M. Asger, Majid Bashir Malik, Rashid Ali
:
Extracting academic social networks among conference participants. 42-47 - Tobias Kutzner

, Fanyu Ye, Ingrid Bönninger, Carlos M. Travieso
, Malay Kishore Dutta
, Anushikha Singh:
User verification using safe handwritten passwords on smartphones. 48-53 - Marcos del Pozo-Baños

, Carlos M. Travieso
, Jaime Roberto Ticay-Rivas
, Jesús B. Alonso
, Malay Kishore Dutta
, Anushikha Singh:
Real cepstrums on electroencephalogram biometric identification. 54-58 - Juan J. Noda Arencibia, Carlos M. Travieso

, David Sánchez-Rodríguez, Malay Kishore Dutta
, Garima Vyas
:
Automatic classification of frogs calls based on fusion of features and SVM. 59-63 - Kanika Mehta, Satya Prakash Ghrera:

DNA compression using referential compression algorithm. 64-69 - Gaurav Gupta, Amit Mahesh Joshi

, Kanika Sharma:
An efficient DCT based image watermarking scheme for protecting distribution rights. 70-75 - Surbhi Kapoor, Chetna Dabas

:
Cluster based load balancing in cloud computing. 76-81 - Arko Banerjee

:
Leveraging probabilistic segmentation to document clustering. 82-87 - Joydeep Tamuli, Aishwarya Jain, Aaishwarya V. Dhan, Anupama Bhan

, Malay Kishore Dutta
:
An image processing based method to identify and grade conjunctivitis infected eye according to its types and intensity. 88-92 - Abhishek Jatram, Bhaskar Biswas:

Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs. 93-96 - Musheer Ahmad

, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar:
Designing chaos based strong substitution box. 97-100 - Gurkiran Kaur, Rajan Miglani

, Gurjot Singh Gaba
, Ruchi Pasricha:
Energy conservation and collision avoidance by controlled access protocol in WSN. 101-105
Applications
- Harsh M. Vyas, Suma S. M., Shashidhar G. Koolagudi, K. R. Guruprasad

:
Identifying gamakas in Carnatic music. 106-110 - Deepika Saxena

, Shilpi Saxena:
Highly advanced cloudlet scheduling algorithm based on Particle Swarm Optimization. 111-116 - Divyesh Patel, Tanuja Srivastava

:
Reconstructing h-convex binary images from its horizontal and vertical projections by simulated annealing. 117-121 - Leo Pauly, Rahul D. Raj, Binu Paul:

Hand written digit recognition system for South Indian languages using artificial neural networks. 122-126 - Prithvi Upadhyaya, Suma S. M., Shashidhar G. Koolagudi:

Identification of allied raagas in Carnatic music. 127-131 - Pravin B. Ramteke, Shashidhar G. Koolagudi, Arun Prabhakar:

Feature analysis for mispronounced phonemes in the case of alvoelar approximant (/r/) substituted with voiced dental consonant (/∂/). 132-137 - Siddharth Gulati, Abhinav Rastogi, Manish K. Thakur:

Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zone. 138-143 - Prakhar Mohan, Shreya Srivastava, Garvita Tiwari, Rahul Kala

:
Background and skin colour independent hand region extraction and static gesture recognition. 144-149 - Anuranjan Kumar, Sahil Gupta, Sanjay Kumar Singh

, Kaushal K. Shukla
:
Comparison of various metrics used in collaborative filtering for recommendation system. 150-154 - Vijyant Agarwal:

Novel fuzzy clustering algorithm for fuzzy data. 155-161 - Mayank Taneja, Kavyanshi Garg, Archana Purwar, Samarth Sharma:

Prediction of click frauds in mobile advertising. 162-166 - Srikumar Panda, Ranjan Das

:
Inverse analysis of a radial porous fin using genetic algorithm. 167-170 - Vartika Agrawal, Satish Chandra:

Feature selection using Artificial Bee Colony algorithm for medical image classification. 171-176 - Khushboo Singhal, Sumit Kumar Banshal

, Ashraf Uddin
, Vivek Kumar Singh
:
A Scientometric analysis of computer science research in India. 177-182 - Prabhat Dansena

, K. Pramod Kumar, Rajarshi Pal:
Line based extraction of important regions from a cheque image. 183-189 - Chandra Prakash

, Anshul Mittal, Rajesh Kumar
, Namita Mittal
:
Identification of gait parameters from silhouette images. 190-195 - Avinash Kumar Singh

, Neha Baranwal, Gora Chand Nandi:
Human perception based criminal identification through human robot interaction. 196-201 - Narwant Singh Grewal, Munish Rattan, Manjeet Singh Patterh:

A linear antenna array failure detection using Bat Algorithm. 202-207 - Prayasee Pradhan, Ashish Kumar Dwivedi

, Santanu Kumar Rath
:
Detection of design pattern using Graph Isomorphism and Normalized Cross Correlation. 208-213 - Randheer Bagi

, Jainath Yadav, K. Sreenivasa Rao:
Improved recognition rate of language identification system in noisy environment. 214-219 - Harikrishna D. M., Gurunath Reddy M., K. Sreenivasa Rao:

Multi-stage children story speech synthesis for Hindi. 220-224 - Parakrant Sarkar

, K. Sreenivasa Rao:
Analysis and modeling pauses for synthesis of storytelling speech based on discourse modes. 225-230 - Nikita Lemos, Kavita V. Sonawane

, Bidisha Roy:
Secure data transmission using video. 231-234 - Daya Gupta, Chand Anand, Tejas Dewan:

Enhanced heuristic approach for Traveling Tournament Problem based on Grey Wolf Optimizer. 235-240 - Manju Venugopalan

, Deepa Gupta
:
Exploring sentiment analysis on twitter data. 241-247 - Vinayak Ray, Ayush Goyal:

Image based sub-second fast fully automatic complete cardiac cycle left ventricle segmentation in multi frame cardiac MRI images using pixel clustering and labelling. 248-252 - Arup Kumar Dutta, K. Sreenivasa Rao:

Robust language identification using Power Normalized Cepstral Coefficients. 253-256 - Vandana Agarwal

, Surekha Bhanot:
Firefly inspired feature selection for face recognition. 257-262 - Arijul Haque, K. Sreenivasa Rao:

Analysis and modification of spectral energy for neutral to sad emotion conversion. 263-268 - Sarthak Singhal, Prabhat Ralhan, Nishtha Jatana:

Smartphone-based colorimetric detection to measure Blood Glucose Levels. 269-274 - Tushar Jadhav

, Aditi Kotibhaskar:
Cloud detection in all sky ConCam images by Gaussian fitting and valley detection in histogram. 275-278 - Oshin Anand, Praveen Ranjan Srivastava

:
A comparative gender based evaluation of e-commerce website: A hybrid MCDM approach. 279-284 - Akshi Kumar

, Prakhar Dogra, Vikrant Dabas:
Emotion analysis of Twitter using opinion mining. 285-290 - Ajay Kumar Singh, Souvik Roy:

ANPR Indian system using surveillance cameras. 291-294 - Srishti Sharma, Kanika Aggarwal, Palak Papneja, Saheb Singh:

Extraction, summariz ation and sentiment analysis of trending topics on Twitter. 295-301 - S. Saravanan:

Design of large-scale Content-based recommender system using hadoop MapReduce framework. 302-307 - Palki Gupta, Lasit Pratap Singh, Anoop Khandelwal, Kavita Pandey

:
Reduction of congestion and signal waiting time. 308-313 - Abhinav Duhan, Bhupendra Singh

, Mohd Zayed, Haneet Rana
, Gagan Tiwari, Sanjeev Yadav
:
A compact monopole wideband antenna for WiMAX/WLAN/BLUETOOTH/IEEE 802.11y services. 314-317 - Shwet Ketu, Sonali Agarwal

:
Performance enhancement of distributed K-Means clustering for big Data analytics through in-memory computation. 318-324 - Greeshma Sarath

, Megha Lal S. H:
Privacy preservation and content protection in location based queries. 325-330 - Arpan Kumar Dubey, Adwitiya Sinha

:
Congestion control for self similar traffic in wireless sensor network. 331-335 - Rakhi Joon

, Archana Singhal:
A system for compound adverbs MWEs extraction in Hindi. 336-341 - Gurunath Reddy M., K. Sreenivasa Rao:

Neutral to happy emotion conversion by blending prosody and laughter. 342-347 - Suja P, Kalyan Kumar V. P, Shikha Tripathi:

Dynamic facial emotion recognition from 4D video sequences. 348-353 - Eva Katta, Anuja Arora

:
An improved approach to English-Hindi based Cross Language Information Retrieval system. 354-359 - Akriti Saini, Nishank Bhatia, Vikas Saxena

:
VISORV: Board reading, getting directions through Marker Detection for partially visually impaired people. 360-364 - Namrata Srivastava, Utkarsh Agrawal, Soumava Kumar Roy, Uma Shanker Tiwary

:
Human identification using Linear Multiclass SVM and Eye Movement biometrics. 365-369 - Gaurav Dubey

, Vikram Khurana, Shelly Sachdeva
:
Implementing security technique on generic database. 370-376 - Jithu Raphel, P. Vinod:

Pruned feature space for metamorphic malware detection using Markov Blanket. 377-382 - Varsha M. V., P. Vinod, Dhanya K. A.

:
Heterogeneous feature space for Android malware detection. 383-388 - Vikas Saxena

, Ananya, Juhi Shukla:
Removing occlusion using even odd interlacing for efficient class room teaching. 389-392
Education
- Sanjay Goel, Suma Dawn

, G. Dhanalekshmi
, Hema N, Sandeep Kumar Singh
, Sanchika Gupta, Taj Alam
, Prashant Kaushik, Kashav Ajmera
:
Collaborative teaching in large classes of computer science courses. 397-403
Systems
- Anil Kumar, Rahul Kala

:
Geometric shape drawing using a 3 link planar manipulator. 404-409 - Nishit Gupta, Sunil Alag:

Unified approach for Performance Evaluation and Debug of System on Chip at early design phase. 410-415 - Vaibhav Rastogi, Ankit Agrawal

:
All your Google and Facebook logins are belong to us: A case for single sign-off. 416-421 - Anuradha Pughat, Vidushi Sharma

:
Stochastic model for lifetime improvement of wireless sensor node. 422-427 - Sapna Gambhir

, Vrisha Tickoo, Madhumita Kathuria:
Priority based congestion control in WBAN. 428-433 - Ambika Prasad Shah

, Vaibhav Neema
, Shreeniwas Daulatabad:
A novel leakage reduction DOIND approach for nanoscale domino logic circuits. 434-438 - Aashik Sadar, Vinitha Panicker J

:
DocTool - a tool for visualizing software projects using graph database. 439-442 - Anup Nandy, Pavan Chakraborty

:
A new paradigm of human gait analysis with Kinect. 443-448 - Joyeeta Goswami, Shirsha Ghosh, Shivaditya Katiyar, Alak Majumder:

Development of a prototype to detect speed limit violation for better traffic management. 449-454 - Sunil Kumar, Balwinder Raj

:
Modeling of DG-Tunnel FET for low power VLSI circuit design. 455-458 - Balakrishnan Jayavel, Subbaramaiah Mandava, Jyoti Johri:

Enhanced page Reclaim for Android devices. 459-462 - Anand Kumar Gupta

, Neetu Sardana:
Significance of Clustering Coefficient over Jaccard Index. 463-466 - Prafulla K. Choubey, Ashish K. Singh, Raghu B. Bankapur, Vaisakh P. C. SB, Manoj Prabhu B:

Content aware targeted image manipulation to reduce power consumption in OLED panels. 467-471 - Krishna Kishor Jha:

Logging method for high execution frequency paths of Linux kernel. 472-475 - Ruby Ansar, Prachi Upadhyay, Manish Singhal

, Ashish Sharma, Manoj Singh Gaur:
Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip. 476-480 - Arshi Dhammi, Maninder Singh

:
Behavior analysis of malware using machine learning. 481-486 - Amar Nath

, Rajdeep Niyogi:
An extension of FMAP for joint actions. 487-492 - Tapas Kumar Mishra, Sachin Tripathi

:
Explicit Throughput and Buffer Notification based congestion control: A cross layer approach. 493-497 - Anuj Chaudhary, Deepkumar Kagathara, Vibha Patel:

A GPU based implementation of Needleman-Wunsch algorithm using skewing transformation. 498-502 - P. Sasipriya

, V. S. Kanchana Bhaaskaran
:
Two phase sinusoidal power clocked quasi-static adiabatic logic families. 503-508 - Ritu Arora, Sanjay Goel:

Investigating syntactic and semantic inconsistencies in Collaborative Software Development. 509-515 - Pratik Ranjan, Hari Om:

An efficient undeniable signature scheme using braid groups. 516-520 - Vidur S. Bhatnagar, Rachit Magon, Rashi Srivastava, Manish K. Thakur:

A cost effective Sign Language to voice emulation system. 521-525 - Bhoopal Rao Gangadari, Shaik Rafi Ahamed:

Analysis and algebraic construction of S-Box for AES algorithm using irreducible polynomials. 526-530 - Mahesh Shirole

, Rajeev Kumar:
Test scenario selection for concurrency testing from UML models. 531-536 - Ashish Jain

, Narendra S. Chaudhari:
Analysis of the improved knapsack cipher. 537-541 - Deepti Agarwal, Sagar Anand Sharma, Kavita Pandey

:
N-Hop broadcast and Street Broadcast Reduction algorithm using OMNeT++ and Google Earth plugin. 542-547 - Swaminathan Jayaraman

, Dinoop Hari, Bharat Jayaraman:
Consistency of Java run-time behavior with design-time specifications. 548-554 - Bhuvan Mehan, Sanjay Batish, Rajesh Bhatia, Amardeep Dhiman:

BNSR: Border Node preferred Social Ranking based Routing Protocol for VANETs. 555-560 - Pavan Kumar Reddy K, Beerappa R. Chandavarkar

:
Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE. 561-566

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-04 23:13 CEST by the 







