{"title":"A Software Agent Based Approach for Fraud Detection in Network Crimes","authors":"M. Patra, B. B. Jayasingh","doi":"10.1007/978-3-540-30176-9_40","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_40","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sirajul Islam Choudhury, L. S. Singh, S. Borgohain, P. Das
{"title":"Morphological Analyzer for Manipuri: Design and Implementation","authors":"Sirajul Islam Choudhury, L. S. Singh, S. Borgohain, P. Das","doi":"10.1007/978-3-540-30176-9_16","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_16","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"513 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123567658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Tamil Speech Recognition System Using Neural Networks","authors":"S. Saraswathi, T. Geetha","doi":"10.1007/978-3-540-30176-9_22","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_22","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Tolerance Studies for Wormhole Routing in Multiconnected Double-Loop Networks","authors":"Ramesh Vasappanavara, S. Kandula, N. Chalamaiah","doi":"10.1007/978-3-540-30176-9_26","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_26","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134119457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. D. Shenoy, K. Srinivasa, A. Thomas, K. Venugopal, L. Patnaik
{"title":"Mining Top - k Ranked Webpages Using Simulated Annealing and Genetic Algorithms","authors":"P. D. Shenoy, K. Srinivasa, A. Thomas, K. Venugopal, L. Patnaik","doi":"10.1007/978-3-540-30176-9_18","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_18","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132110357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Venkatraman, Vijay Raghavan, D. Das, A. Talukder
{"title":"Trust and Security Realization for Mobile Users in GSM Cellular Networks","authors":"J. Venkatraman, Vijay Raghavan, D. Das, A. Talukder","doi":"10.1007/978-3-540-30176-9_39","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_39","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129348075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of BER/PER Performance of a FLAMINGO Network","authors":"S. Majumder, S. Dey","doi":"10.1007/978-3-540-30176-9_25","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_25","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130352143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Algorithm Design in Implementing Real-Time Active Control Systems","authors":"M. A. Hossain, M. Tokhi, K. Dahal","doi":"10.1007/978-3-540-30176-9_32","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_32","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123322458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Phonetic Modeling on Manipuri Digit Recognition Systems Using CDHMMs","authors":"Sirajul Islam Choudhury, P. Das","doi":"10.1007/978-3-540-30176-9_20","DOIUrl":"https://doi.org/10.1007/978-3-540-30176-9_20","url":null,"abstract":"","PeriodicalId":283591,"journal":{"name":"Asian Applied Computing Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126521961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}