{"title":"An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing","authors":"Azzat A. Al-Sadi, El-Sayed M. El-Alfy","doi":"10.1007/978-3-642-22714-1_55","DOIUrl":"https://doi.org/10.1007/978-3-642-22714-1_55","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"2012 1","pages":"535-544"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82640599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks","authors":"Jaydip Sen","doi":"10.1007/978-3-642-22726-4_60","DOIUrl":"https://doi.org/10.1007/978-3-642-22726-4_60","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"10 1","pages":"580-592"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86757063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mach-Zehnder Interferometer Based All-Optical Peres Gate","authors":"G. Maity, J. N. Roy, S. Maity","doi":"10.1007/978-3-642-22720-2_25","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_25","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"10 1","pages":"249-258"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88838735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents","authors":"Muhammad Tahir, D. Gaïti, M. Khan","doi":"10.1007/978-3-642-22714-1_48","DOIUrl":"https://doi.org/10.1007/978-3-642-22714-1_48","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"16 1","pages":"471-479"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83060320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Trace Transform Based Feature Extraction Architecture for CBIR","authors":"M. Meena, K. Pramod, K. Linganagouda","doi":"10.1007/978-3-642-22720-2_46","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_46","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"34 1","pages":"444-451"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80734593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Copyright Protection Scheme Using Visual Cryptography","authors":"A. Nag, J. Singh, S. Biswas, D. Sarkar, P. Sarkar","doi":"10.1007/978-3-642-22714-1_63","DOIUrl":"https://doi.org/10.1007/978-3-642-22714-1_63","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"275 1","pages":"612-619"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83514660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chin-Pan Huang, P. Huang, C. Hsieh, Tsorng-Lin Chia
{"title":"Object Recognition Based on Fuzzy Morphological Polynomial Signal Representation","authors":"Chin-Pan Huang, P. Huang, C. Hsieh, Tsorng-Lin Chia","doi":"10.1007/978-3-642-22720-2_34","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_34","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"4 1","pages":"334-341"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85260687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness in Ubiquitous Computing","authors":"Abhijan Bhattacharyya","doi":"10.1007/978-3-642-22709-7_25","DOIUrl":"https://doi.org/10.1007/978-3-642-22709-7_25","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"14 1","pages":"242-249"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82015372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy Neuro Clustering Based Vector Quantization for Face Recognition","authors":"Elizabeth B. Varghese, M. Wilscy","doi":"10.1007/978-3-642-22720-2_40","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_40","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"1 1","pages":"383-395"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91100604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network","authors":"Sanjeev Rana, Manpreet Singh","doi":"10.1007/978-3-642-22709-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-22709-7_10","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"44 22 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76937830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}