{"title":"Linguistic Conversion of Syntactic to Semantic Web Page","authors":"G. Nagarajan, K. Thyagarajan","doi":"10.1007/978-3-642-31552-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_22","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122350706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Difference Expansion for Reversible Watermarking Using Fuzzy Logic Based Distortion Control","authors":"H. Maity, S. Maity, Debashis Maity","doi":"10.1007/978-3-642-31552-7_89","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_89","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on Impact of Behavioral Modeling in Performance of Synthesis Process","authors":"R. Uma, D. Ponnurangam","doi":"10.1007/978-3-642-31600-5_58","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_58","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srinivasa Rao Dammavalam, S. Maddala, M. K. Prasad
{"title":"Iterative Image Fusion Using Fuzzy Logic with Applications","authors":"Srinivasa Rao Dammavalam, S. Maddala, M. K. Prasad","doi":"10.1007/978-3-642-31552-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_16","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cryptographic Approach towards Black Hole Attack Detection","authors":"Pratima Sarkar, R. Chaki","doi":"10.1007/978-3-642-31513-8_28","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_28","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalised High Quality Search with in a Web Site: No User Profiling","authors":"L. K. J. Grace, V. Maheswari, D. Nagamalai","doi":"10.1007/978-3-642-31513-8_32","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_32","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120902989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Off-Line Signature Verification Techniques for Reducing Forgeries/Fraud","authors":"Natasha Sharma, Munish Kumar","doi":"10.1007/978-3-642-31600-5_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_16","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Bajpai, M. Vardhan, S. Gupta, Ravinder Kumar, D. S. Kushwaha
{"title":"Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services","authors":"D. Bajpai, M. Vardhan, S. Gupta, Ravinder Kumar, D. S. Kushwaha","doi":"10.1007/978-3-642-31513-8_73","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_73","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Dispathcing Rules for Job Shop Schdeuling Using Data Mining","authors":"R. Balasundaram, N. Baskar, R. Sankar","doi":"10.1007/978-3-642-31600-5_7","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_7","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srivardhini Mandipati, Gottumukkala Asisha, S. Raj, S. Chitrakala
{"title":"Two-Stage Rejection Algorithm to Reduce Search Space for Character Recognition in OCR","authors":"Srivardhini Mandipati, Gottumukkala Asisha, S. Raj, S. Chitrakala","doi":"10.1007/978-3-642-31552-7_23","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_23","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}