default search action
ICWET 2010: Mumbai, Maharashtra, India
- B. K. Mishra:
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26 - 27, 2010. ACM 2010, ISBN 978-1-60558-812-4
Advance computer application (ACA)
- H. B. Kekre, V. A. Bharadi, Shiwani Gupta, A. A. Ambardekar, V. B. Kulkarni:
Off-line signature recognition using morphological pixel variance analysis. 3-10 - H. B. Kekre, V. A. Bharadi, Tanuja K. Sarode:
Signature recognition using vector quantization. 11-18 - Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh:
An improvement of Hsiang-Shih's authentication scheme using smart cards. 19-25 - H. B. Kekre, Kamal Shah, Tanuja K. Sarode:
Application of Kekre's fast code book generation algorithm for face recognition. 26-30 - I. Chopra, Maninder Singh:
Agent based self-healing system for grid computing. 31-35 - H. B. Kekre, Tanuja K. Sarode, V. A. Bharadi, Abhishek A. Agrawal, R. J. Arora, M. C. Nair:
Iris recognition using discrete cosine transform and Kekre's fast codebook generation algorithm. 36-42 - S. Chakrabarti, Mohuya Chakraborty, Indraneel Mukhopadhyay:
Study of snort-based IDS. 43-47 - Varsha Turkar:
Polarimetric SAR image classification by using artificial neural network. 48-52 - Lata R. Ragha, M. Sasikumar:
Using moments features from Gabor directional images for Kannada handwriting character recognition. 53-58 - D. A. Vidhate, A. K. Patil, S. S. Pophale:
Performance evaluation of low energy adaptive clustering hierarchy protocol for wireless sensor networks. 59-63 - D. A. Vidhate, A. K. Patil, D. V. Guleria:
Dynamic cluster resource allocations for jobs with known memory demands. 64-69 - Deepak Kumar, F. Khan, Saiful Islam:
Mobile SMS to Braille transcription: a new era of mobile for the blinds. 70-74 - P. Muhamed Ilyas, R. Vijayakumar:
A proxy based dynamic data management using hierarchical database for location based services. 75-80 - H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar, V. K. Banura:
Performance comparison of DCT and Walsh transform for steganography. 81-88 - B. K. Mishra, R. R. Sedamkar, Y. Chaudhari:
Multispectral/hyperspetral image compression using inter-band correlation and wavelet transform. 89-95 - H. B. Kekre, Archana A. Athawale, Uttara A. Athawale:
Increased capacity for information hiding using Walsh transform. 96-101 - H. B. Kekre, Sudeep D. Thepade, Archana A. Athawale, Anant Shah, Prathamesh Verlekar, Suraj Shirke:
Image retrieval using DCT on row mean, column mean and both with image fragmentation. 102-108 - Poonam Gera, Kumkum Garg, Manoj Misra:
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes. 109-114 - Sanatan Mohanty, Sarat Kumar Patra:
Performance analysis of quality of service parameters for IEEE 802.15.4 star topology using MANET routing. 115-120 - Md. Tawhidul Islam, M. Shaikh, Abhaya C. Nayak, Shoba Ranganathan:
Biomarker information extraction tool (BIET) development using natural language processing and machine learning. 121-126 - H. B. Kekre, Tanuja K. Sarode, Sudeep D. Thepade:
Image retrieval by Kekre's transform applied on each row of Walsh transformed VQ codebook. 127-133 - C. Desai, V. Colaco:
Development of a personalized integrated voice recognition and synthesis system. 134-137 - C. A. Dhote, Ramchandra S. Mangrulkar, M. Shahade:
Hybrid routing protocol with unicast reply for mobile ad hoc network. 138-140 - Ansari Vaqar Ahmed M. H.:
Transform error concealment on video coding. 141-144 - N. Beriwal, P. Desai:
Comparison and analysis of segmentation techniques in pattern analysis and machine intelligence. 145-146 - Dwarkoba P. Gaikwad, S. J. Wagh:
Genetic algorithm based filter and ANN based classifier for face recognition. 147-150 - A. Bhandari, P. Raju, S. Chavan, P. Das, S. Rajguru:
3-way associative collision warning system. 151-152 - M. P. Arakeri, B. Lakshmana:
Automatic segmentation of liver tumor on computed tomography images. 153-155 - R. Tamilkodi, K. Valli Madhavi, K. Jayasudha:
Segmentation of image using watershed and wavelet transform. 156-158 - Poonam Mittal, Ashutosh Dixit, A. K. Sharma:
A scalable, extensible web crawler based on P2P overlay networks. 159-162 - D. R. Gala, A. Vasoya, V. M. Misra:
Speech enhancement combining spectral subtraction and beamforming techniques for microphone array. 163-166 - S. Kolhe, S. Sawarkar:
Detection of mass and circumscribed mass in mammograms employing radial-basis-function neural networks. 167-169 - Birmohan Singh, Manpreet Kaur:
IT applications in healthcare. 170-172 - J. Vrindavanam:
Video compression for movie transmission: a comparative analysis. 173-175 - A. Pachauri, Praveen Varshney, Mohammed Abdul Qadeer:
Mobile web browser with streaming capability. 176-178 - S. Shirgaonkar, Sheetal Rathi, T. Rajkumar:
Overview of real time decision support system. 179-181 - Amiya Kumar Tripathy, G. Andrades, R. Almeida:
Prepaid energy metering system using SMS. 182-184 - K. Rajalakshmi:
Solving assignment problem of cellular mobile network using iterative local search algorithm. 185-187 - M. Bhagwat, R. K. Krishna, V. E. Pise:
A novel approach to image segmentation using improved watershed transformation. 188-189 - S. Prasad, A. Nadkarni, P. Mishra, S. Sinha:
CyberCrux: world's first online test centre. 190-193 - R. R. Dube, Shantanu K. Dixit:
Process-oriented complete requirement engineering cycle for generic projects. 194-197 - T. R. Srinivasan, R. Shanmugalakshmi, B. Madhusudhanan:
Dynamic remote host classification in grid computing using Clonalg. 198-201 - H. B. Kekre, Tanuja K. Sarode, V. A. Bharadi, Abhishek A. Agrawal, R. J. Arora, M. C. Nair:
Performance comparison of full 2-D DCT, 2-D Walsh and 1-D transform over row mean and column mean for iris recognition. 202-205 - M. A. Potey, N. V. Upasani:
Generalized ring averaging: a new method for left and right directional illumination invariant face recognition for frontal poses and their small variants. 206-210 - K. C. Nalavade, B. B. Meshram:
Intrusion prevention systems: data mining approach. 211-214 - S. Vaidya, P. Waingankar, S. S. Dubal, I. A. Landge:
DCT based image compression for low bit rate video processing and band limited communication. 215-217 - V. Padmadas, Jayant Gadge:
Web data extracion using visual features. 218-221 - Satish S. Salunkhe, S. Radke Shashikant, Vijay K. Sambhe, Rahul B. Shelke, Ganesh Kocharekar:
A minimum cardinality consistency-checking algorithm for UML class diagrams. 222-223 - (Withdrawn) A novel neuro-fuzzy classifier based on weightless neural network. 224-226
- Uma Gurav, R. Shaikh:
Virtualization: a key feature of cloud computing. 227-229 - Sanchita Ghatak, Satyendra K. Singh:
Measuring citizen's perception and acceptance of e-Suvidha in relation to TAM: an empirical study. 230-233 - Sonu Gupta:
Computing with green responsibility. 234-236 - R. Khokale, A. R. Panat, Y. H. Gulhane:
Analysis of affective speech for fatigue detection. 237-240 - Hemant B. Kekre, Tanuja K. Sarode, V. A. Bharadi, Tejas Bajaj, Somesh Chatterjee, Mithilesh Bhat, Kunal Bihani:
A comparative study of DCT and Kekre's median code book generation algorithm for face recognition. 241-244 - Sangeeta Mishra, Sudhir Sawarkar, Payel Saha:
SPECK: a low complexity wavelet coder. 245-248 - S. R. Barahate, J. Saturwar:
Face recognition using PCA based algorithm and neural network. 249-252 - Kiran Bhandari, N. Dugar, N. Jain, N. Shetty:
A novel high performance multi-modal approach for content based image retrieval. 253-256 - Girish Madhukar Tere, Bharat T. Jadhav:
How to improve XML web services performance? 257-260
Communication engineering (CE)
- M. Prabu, R. Shanmugalakshmi:
A new variant vision on ECDSA. 263-267 - Mohammed Abdul Qadeer, Shahid Habib, Ahmad Y. Javaid, Mohammed A. Hafeez:
A novel approach for resource allocation in broadband access networks. 268-272 - Mohammed Abdul Qadeer, Afaq Hasan Khan, Ahmad Ali Habeeb, Mohammed A. Hafeez:
Bottleneck analysis and traffic congestion avoidance. 273-278 - S. A. Talekar:
Bandwidth estimation with RTS/CTS mechanism for IEEE 802.11 adhoc networks using cross layer design. 279-285 - P. Agrawal, M. Chatterjee:
Incentive and rebuke based reputation model for peer to peer applications. 286-291 - Sudip Dogra, Subir Kumar Sarkar, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya:
A RFID based novel scheme for detection of Swine flu and managing the piggery in a cost effective way. 292-297 - G. Prakash, P. Thangaraj:
Throughput analysis of IEEE 802.11b WLAN under a non-saturated condition. 298-303 - Lata L. Ragha, K. V. Ghag:
Multiple route selector BGP (MRS-BGP). 304-308 - S. C. Venkateswarlu, P. B. Reddy, Y. D. Solomon Raju:
Watermarking for JPEG2000 compression standard on FPGA. 309-314 - B. R. Vikram, M. A. Bhanu, S. C. Venkateswarlu, M. R. Babu:
Adaptive neuro fuzzy for image segmentation and edge detection. 315-319 - S. Madhavi, K. Duraiswamy, B. Kalaavathi, S. Vijayaragavan:
Survey of attacks on AODV and MAODV. 320-324 - S. K. Srivastava, J. R. Gaydhane, N. S. Killarikar:
A preemptive channel allocation scheme for multimedia traffic in mobile wireless networks. 325-328 - A. P. Bagade, P. R. Indurkar:
Real time AVL security system. 329-332 - Vidya Gogate, S. Nema, R. P. Singh, A. Goyal:
Performance analysis of MIMO systems for different data traffics. 333-339 - Fabian T. R. Barreto, S. Y. Patni, Srija Unnikrishnan:
Enhanced spectral efficiency using AMC MIMO-OFDM in WiMAX (802.16d) system. 340-344 - Satish Narayanrao Gujar, S. R. Gupta, M. S. Ali:
Protocol scrubbing: network security through transparent flow modification using active real time database. 345-350 - Ashima Rout, Srinivas Sethi:
Optimized sub-band coding for MANETs. 351-357 - B. K. Mishra, Joanne Gomes:
Multidimensional Hermite based modulation with dual error correction over UWB channel. 362-367 - Srinivas Sethi, Siba K. Udgata:
SRMAODV: a scalable reliable MAODV for MANET. 368-373 - (Withdrawn) A readily cache update algorithm for dynamic source routing. 374-379
- Sanjay K. Dhurandher, Megha Gupta:
Link stability based geocasting model for underwater sensor networks. 380-386 - Chapala Venkatesh, M. Madheswaran:
Performance analysis of RLS based channel estimation in UWB OFDM system. 387-391 - B. K. Mishra, S. K. Singh, M. Sharma:
Development of media resource broker and transcoder for QOS support in next generation network. 392-396 - B. K. Mishra, S. K. Singh:
Performance evaluation of NGN reference model for a queuing network. 397-400 - B. K. Mishra, S. K. Singh, C. V. Joshi:
Modeling arrival rate and service rate for next generation network as an open queue using M/M/1 queue model. 401-405 - Kamla Prasan Ray, N. M. Ammanagi:
The effect of mutual coupling in a linear array and planar array environment of a 3-element Yagi-Uda antenna. 406-410 - Rafi U. Zaman, Khaleel Ur Rahman Khan, A. Venugopal Reddy:
Gateway load balancing in integrated internet-MANET using WLB-AODV. 411-416 - M. P. Nerkar, J. Pasalkar:
On demand broadcasting: efficient mode. 417-419 - D. C. Shah, B. U. Rindhe, S. K. Narayankhedkar:
Effects of cyclic prefix on OFDM system. 420-424 - M. Prabu, R. Shanmugalakshmi:
A study of elliptic curve cryptography and its application. 425-427 - Afaq Hasan Khan, Mohammed Abdul Qadeer, Misbah Siddiqui:
IP multimedia subsystem testbed using open source elements. 428-429 - M. R. Dixit, K. V. Ajetrao, V. Jain:
Performance analysis of CDMA network for mobile communication. 430-432 - S. L. Haridas, N. K. Choudhari:
Design of Viterbi decoder with minimum transition hybrid register exchange processing. 432-434 - S. A. Attarde, S. K. Dhamal:
A scalable BGP configurationNOTE FROM ACM: It has been determined that the contents of this paper plagiarize that of a previously published work. ACM has therefore shut off access to this paper. 435-436 - A. L. Khade, Balaji G. Hogade, V. B. Gaikwad:
Secret communication via image hiding in image by pixel value differencing. 437-438 - M. M. Puranik, S. Krishnan:
Volume segmentation in medical image analysis: a survey. 439-442 - Nusrat J. Ansari, Shikha Nema, R. P. Singh, Aditya Goel:
Dense wavelength-division multiplexing networks waves system for high data rate communication. 443-444 - P. K. Mudholkar, M. Mudholkar:
Security in distributed system. 445-447 - S. A. Thorat, M. Chatterjee:
Implementation of message layer protocol with non-repudiation. 448-450 - M. Prabu, R. Shanmugalakshmi:
An efficient implementation of elliptic curve over finite fields. 451-453 - Zahir Aalam, Sanjay L. Nalbalwar, Sangeeta Vhatkar:
Simulation and performance analysis of 802.15.1. 454-457 - Ashwini Kotrashetti, Joe Anthony, Hansel Crasto, Neha Ram:
Design and development of microstrip patch antenna for ISM band transmitter-receiver system. 458-461
Algorithms, database engineering, intelligent systems, software engineering: Algorithms
- U. S. Sutar, S. K. Bodhe:
An energy efficient hierarchical multiple backup cluster head algorithm for wireless sensor networks. 465-470 - Deepak J. Jayaswal, Mukesh A. Zaveri, R. E. Chaudhari:
Multi step motion estimation algorithm. 471-476 - S. Choudhary, G. N. Purohit:
Randomized distributed algorithm for vertex coloring. 477-480 - H. B. Kekre, Sudeep D. Thepade, Archana A. Athawale, Adib Parkar:
Using assorted color spaces and pixel window sizes for colorization of grayscale images. 481-486 - Swati Ringe, Jayant Gadge:
Semantic web services matchmaking using bipartite graph matching with ranking. 487-492 - D. B. Vernekar, Gayatri Malhotra, V. Colaco:
Reconfigurable FPGA using genetic algorithm. 493-497 - H. B. Kekre, Tanuja K. Sarode, Dhirendra Mishra:
Coloring gray scale digital images using Kekre's fast code book generation algorithm. 498-501 - R. Muley, M. Chatterjee:
High performance load balancing schemes for cluster based secure web server. 502-504 - Amit R. Khaparde, A. Mokhade, P. D. Dahiwale:
Goal oriented ranking scheme. 505-508 - N. Singh, S. J. Petkar:
Genatically optimized approximants using dominant pole retention method. 509-512 - Samuel Beatrice, Rajkumar Thirumahal, S. P. Raja:
Comparing the computational complexity and accuracy of classification algorithms. 513-514 - Gaurav Ravindra Sawant, Anish Rajendra Singh, Krishnat Shivaji Kadam, R. Mazarello, Pratibha R. Dumane:
Speech synthesis using LPC. 515-517
Algorithms, database engineering, intelligent systems, software engineering: Database engineering
- B. Bose, Sunita S. Sane:
DTCOT: distributed timeout based transaction commit protocol for mobile database systems. 518-523 - M. Sumana, K. S. Hareesh, H. S. Shashidhara:
An approach of private classification on vertically partitioned data. 524-528 - Raj Gaurang Tiwari, Mohd. Husain, S. Gupta, Arun Pratap Srivastava:
Improving ant colony optimization algorithm for data clustering. 529-534 - S. Shirgaonkar, T. Rajkumar, Vikas Singh:
Application of improved Apriori in University Library. 535-540 - S. M. Chaware, Srikantha Rao:
Phonetic matching through writing style. 541-543 - P. M. Agarkar, Sanjay N. Talbar:
Algorithm for iris code organization and searching for iris recognition system. 544-547 - B. Garg, N. Beriwal:
Improved version of hybrid neural-genetic algorithm to increase the efficiency of neural network. 548-549 - P. Kshirsagar, V. Munde, Sachin Deshpande:
Semantic based search technology for images. 550-553