Cargando…

Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing

The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunicatio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Das, Vinu V. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Colección:Lecture Notes in Electrical Engineering, 150
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Full Papers
  • High Through-put VLSI Architecture for FFT Computation
  • Formal Approach to Reliability Improvement with Model Checker
  • DDoS attacks Defense System using Information Metrics
  • CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs)
  • TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs)
  • DoS Attack-resistant Framework for Client/Server Intelligent Computing
  • Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks
  • Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine
  • Aspect Dependency Analyzer Framework for Aspect Oriented Requirements
  • Hybrid Extremal Optimization and Glowworm Swarm Optimization
  • Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks
  • A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems
  • Developing Embedded Systems from Formal Specifications written in Temporal Logic
  • Network log Clustering Using K-means Algorithm
  • Improvement Public Key Kerberos using Identity-Based Signcryption
  • Intrusion Detection Using Keystroke Dynamics
  • MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform
  • Comparison of Routing Protocols in Mobile Ad-hoc Network
  • Analysis of Image Segmentation Algorithms Using MATLAB
  • Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions
  • Mean-Shift Algorithm: Verilog HDL Approach
  • Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks
  • A Security Framework for DDoS Detection In MANETs
  • Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC)
  • Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators
  • Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks
  • Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation
  • Performance Analysis of Different Current Controllers for Active Power Filter
  • Optimum LQR Switching Approach for the Improvement of STATCOM Performance
  • Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine
  • Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers
  • Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters
  • A Novel Inverter Topology for Low Power Drives
  • Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods
  • Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System
  • Design of Adaptive FLANN based model for Non-linear Channel Equalization
  • Short Papers
  • Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network
  • Voice Transformation using Radial Basis Function
  • IPTC based Ontological Representation of Educational News RSS Feeds
  • Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem
  • Automatic Generation of P2P botnet Network Attack Graph
  • Parallelization of Fractal Image Compression over CUDA
  • Distributed Shared Files Management
  • Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization
  • Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems
  • An Algorithm for Traffic Analysis using RFID Technology
  • Trust-Based Grid Resource Management
  • Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach
  • An Approach to Encryption using Superior Fractal Sets
  • Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding
  • Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network
  • Security based Requirements Engineering for E-Voting System
  • Analysis of 3 Dimensional Object Watermarking Techniques
  • Graph Based Approach for Heart Disease Prediction
  • Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks
  • An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint
  • A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition
  • Performance Evaluation of Web Browsers in Android
  • FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator®
  • Face Recognition Using PCA and Bit-Plane Slicing
  • Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor
  • Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters
  • Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques
  • Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation
  • Artificial Neural Network based Power System Stability Analysis
  • Poster Paper
  • Efficient Bandwidth Utilization in Client-Server Models
  • Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz
  • Intelligent Enterprise Application Servers - A Vision for self-managing performance
  • A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk FileSystems
  • Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey
  • Itinerary Management System
  • Trust and Reliability based Scheduling Algorithm for Cloud IaaS
  • Hybrid Covert Channel an Obliterate for Information Hiding
  • Steganography and Its Technique: Technical Overview
  • Data Stream Mining: A Review
  • Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces
  • Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler
  • Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes
  • Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.