K. S. Nayaki, N. Krishnan, Vivek Joby, R. Sreelakshmi
{"title":"Traffic Light Synchronization","authors":"K. S. Nayaki, N. Krishnan, Vivek Joby, R. Sreelakshmi","doi":"10.1007/978-3-642-31552-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_11","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"731 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115062598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, S. Nandi
{"title":"SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN","authors":"Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, S. Nandi","doi":"10.1007/978-3-642-31513-8_17","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_17","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks","authors":"Shanta Mandal, R. Chaki","doi":"10.1007/978-3-642-31513-8_27","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_27","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. U. Kidav, P. A. Ajeesh, Drisya Vasudev, V. S. Deepak, A. Menon
{"title":"A VLSI Architecture for Wavelet Based Image Compression","authors":"J. U. Kidav, P. A. Ajeesh, Drisya Vasudev, V. S. Deepak, A. Menon","doi":"10.1007/978-3-642-31600-5_59","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_59","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum Sub-station Positioning Using Hierarchial Clustering","authors":"Shabbir Uddin, S. Chakravorty, A. Ray","doi":"10.1007/978-3-642-31552-7_42","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_42","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124650765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SEPastry: Security Enhanced Pastry","authors":"Madhumita Mishra, S. Tripathy, Sathya Peri","doi":"10.1007/978-3-642-31513-8_80","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_80","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured Ontology Matching Using Graph Matching","authors":"K. Shenoy, K. Shet, U. D. Acharya","doi":"10.1007/978-3-642-31552-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_2","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Araújo, J. Rodrigues, S. Fraiha, H. Gomes, N. Vijaykumar, G. Cavalcante, C. Francês
{"title":"A Visualization Tool for Analyzing the Design of Physical and Network Layers Parameters of a Wireless Network","authors":"J. Araújo, J. Rodrigues, S. Fraiha, H. Gomes, N. Vijaykumar, G. Cavalcante, C. Francês","doi":"10.1007/978-3-642-31600-5_29","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_29","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127924150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)","authors":"U. K. Mondal, J. K. Mandal","doi":"10.1007/978-3-642-31513-8_20","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_20","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Chandramohan, T. Vengattaraman, M. S. Basha, D. Ponnurangam
{"title":"MSRCC - Mitigation of Security Risks in Cloud Computing","authors":"D. Chandramohan, T. Vengattaraman, M. S. Basha, D. Ponnurangam","doi":"10.1007/978-3-642-31513-8_54","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_54","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126547762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}