Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing
The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunicatio...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer New York : Imprint: Springer,
2013.
|
Edición: | 1st ed. 2013. |
Colección: | Lecture Notes in Electrical Engineering,
150 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Full Papers
- High Through-put VLSI Architecture for FFT Computation
- Formal Approach to Reliability Improvement with Model Checker
- DDoS attacks Defense System using Information Metrics
- CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs)
- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs)
- DoS Attack-resistant Framework for Client/Server Intelligent Computing
- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks
- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine
- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements
- Hybrid Extremal Optimization and Glowworm Swarm Optimization
- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks
- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems
- Developing Embedded Systems from Formal Specifications written in Temporal Logic
- Network log Clustering Using K-means Algorithm
- Improvement Public Key Kerberos using Identity-Based Signcryption
- Intrusion Detection Using Keystroke Dynamics
- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform
- Comparison of Routing Protocols in Mobile Ad-hoc Network
- Analysis of Image Segmentation Algorithms Using MATLAB
- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions
- Mean-Shift Algorithm: Verilog HDL Approach
- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks
- A Security Framework for DDoS Detection In MANETs
- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC)
- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators
- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks
- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation
- Performance Analysis of Different Current Controllers for Active Power Filter
- Optimum LQR Switching Approach for the Improvement of STATCOM Performance
- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine
- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers
- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters
- A Novel Inverter Topology for Low Power Drives
- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods
- Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System
- Design of Adaptive FLANN based model for Non-linear Channel Equalization
- Short Papers
- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network
- Voice Transformation using Radial Basis Function
- IPTC based Ontological Representation of Educational News RSS Feeds
- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem
- Automatic Generation of P2P botnet Network Attack Graph
- Parallelization of Fractal Image Compression over CUDA
- Distributed Shared Files Management
- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization
- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems
- An Algorithm for Traffic Analysis using RFID Technology
- Trust-Based Grid Resource Management
- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach
- An Approach to Encryption using Superior Fractal Sets
- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding
- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network
- Security based Requirements Engineering for E-Voting System
- Analysis of 3 Dimensional Object Watermarking Techniques
- Graph Based Approach for Heart Disease Prediction
- Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks
- An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint
- A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition
- Performance Evaluation of Web Browsers in Android
- FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator®
- Face Recognition Using PCA and Bit-Plane Slicing
- Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor
- Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters
- Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques
- Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation
- Artificial Neural Network based Power System Stability Analysis
- Poster Paper
- Efficient Bandwidth Utilization in Client-Server Models
- Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz
- Intelligent Enterprise Application Servers - A Vision for self-managing performance
- A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk FileSystems
- Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey
- Itinerary Management System
- Trust and Reliability based Scheduling Algorithm for Cloud IaaS
- Hybrid Covert Channel an Obliterate for Information Hiding
- Steganography and Its Technique: Technical Overview
- Data Stream Mining: A Review
- Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces
- Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler
- Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes
- Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.