|
Technical Session-1: Algorithm-1 (AL-1) |
|
|
|
A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling |
|
|
1 | (7) |
|
|
|
|
PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images |
|
|
8 | (6) |
|
|
|
|
|
A New Position-Based Fast Radix-2 Algorithm for Computing the DHT |
|
|
14 | (12) |
|
|
|
Study of Bit-Parallel Approximate Parameterized String Matching Algorithms |
|
|
26 | (11) |
|
|
|
Optimization of Finite Difference Method with Multiwavelet Bases |
|
|
37 | (12) |
|
|
|
Technical Session-2: Algorithm-2 (AL-2) |
|
|
|
A Novel Genetic Algoritnn Approach to Mobility Prediction in Wireless Networks |
|
|
49 | (9) |
|
C. Mala. Mohanraj Loganathan |
|
|
|
|
A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks |
|
|
58 | (12) |
|
|
|
An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems |
|
|
70 | (11) |
|
|
|
|
Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip |
|
|
81 | (12) |
|
|
|
A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching |
|
|
93 | (10) |
|
|
|
|
|
Technical Session-3: Algorithm-3 (AL-3) |
|
|
|
Optimized Graph Search Using Multi-Level Graph Clustering |
|
|
103 | (12) |
|
|
|
|
An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns |
|
|
115 | (12) |
|
|
|
|
|
A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization |
|
|
127 | (11) |
|
|
|
|
Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts |
|
|
138 | (11) |
|
|
|
Local Subspace Based Outlier Detection |
|
|
149 | (9) |
|
|
New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions |
|
|
158 | (12) |
|
|
|
|
|
Technical Session-4: Algorithm-4 (AL-4) |
|
|
|
On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoe Networks |
|
|
170 | (12) |
|
|
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature |
|
|
182 | (12) |
|
|
|
|
|
Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands |
|
|
194 | (11) |
|
|
|
|
|
Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties |
|
|
205 | (11) |
|
|
|
Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame |
|
|
216 | (12) |
|
|
|
|
Technical Session-5: Application-1 (AP-1) |
|
|
|
Secure Receipt-Free Sealed-Bid Electronic Auction |
|
|
228 | (12) |
|
|
|
|
An Architeeture for Handling Fuzzy Queries in Data Warehouses |
|
|
240 | (10) |
|
|
|
|
|
Palmprint Based Verification System Using SURF Features |
|
|
250 | (13) |
|
|
|
A Personnel Centric Knowledge Management System |
|
|
263 | (10) |
|
|
|
Technical Session-6: Application-2 (AP-2) |
|
|
|
A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarehical Organization of Wireless Sensor Networks |
|
|
273 | (11) |
|
|
|
Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach |
|
|
284 | (11) |
|
|
|
|
|
CDIS: Circle Density Based Iris Segmentation |
|
|
295 | (12) |
|
|
|
|
|
Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines |
|
|
307 | (11) |
|
|
|
Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine |
|
|
318 | (9) |
|
|
|
|
|
Technical Session-7: Application-3 (AP-3) |
|
|
|
Threshold Signature Gryptography Scheme in Wireless Ad-Hoe Computing |
|
|
327 | (9) |
|
|
|
Vehicular Traflic Control: A Ubiquitous Computing Approach |
|
|
336 | (13) |
|
|
|
Application of Particle Swarm Optimization Algorithm for Better Nano-Devices |
|
|
349 | (9) |
|
Nameirakpam Basanta Singh |
|
|
|
|
|
|
Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES |
|
|
358 | (12) |
|
|
|
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip |
|
|
370 | (11) |
|
|
|
|
|
|
|
|
Technical Session-8: Application-4 (AP-4) |
|
|
|
Color Image Restoration Using Morphological Detectors and Adaptive Filter |
|
|
381 | (8) |
|
|
|
|
|
|
Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography |
|
|
389 | (11) |
|
|
|
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions |
|
|
400 | (11) |
|
Vijay Harishchandra Mankar |
|
|
|
|
Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors |
|
|
411 | (11) |
|
|
|
|
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions |
|
|
422 | (12) |
|
|
|
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks |
|
|
434 | (11) |
|
|
|
Technical Session-9: Bioinformatics-1 (B-1) |
|
|
|
Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology |
|
|
445 | (9) |
|
|
|
|
|
Study of Drug-Nucleic Acid Interactions: 9-amino- [ N-2-(1-morpholinyl)ethyl]acridine-l-carboxamide |
|
|
454 | (7) |
|
|
|
IDChase: Mitigating Identifier Migration Trap in Biological Databases |
|
|
461 | (12) |
|
|
|
|
|
Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships |
|
|
473 | (12) |
|
|
|
|
IITKGP-SESC: Speech Database for Emotion Analysis |
|
|
485 | (8) |
|
|
|
|
|
|
Technical Session-10: Bioinformatics-2 (B-2) |
|
|
|
Detection of Splice Sites Using Support Vector Machine |
|
|
493 | (10) |
|
|
|
|
Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MIIC Class-II Binding Peptides |
|
|
503 | (7) |
|
|
|
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach |
|
|
510 | (11) |
|
|
|
FCM for Gene Expression Bioinformatics Data |
|
|
521 | (12) |
|
|
|
|
Enhaneing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection |
|
|
533 | (11) |
|
|
|
|
Technical Session-11: System-1 (S-1) |
|
|
|
An Electronically Tunable SIMO Biquad Filter Using CCCCTA |
|
|
544 | (12) |
|
|
|
|
|
An Architecture for Cross-Cloud System Management |
|
|
556 | (12) |
|
|
|
|
Energy Efliciency of Thermal-A ware Job Scheduling Algorithms under Various Cooling Models |
|
|
568 | (13) |
|
|
|
|
Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic |
|
|
581 | (11) |
|
|
|
|
Energy-Constrained Scheduling of DAGs on Multi-core Processors |
|
|
592 | (12) |
|
|
|
|
|
|
Technical Session-12: System-2 (S-2) |
|
|
|
Evaluation of Code and Data Spatial Complexity Measures |
|
|
604 | (11) |
|
|
|
Piteherpot: Avoiding Honeypot Detection |
|
|
615 | (10) |
|
|
|
|
Verification of Liveness Properties in Distributed Systems |
|
|
625 | (12) |
|
|
|
InfoSee-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices |
|
|
637 | (12) |
|
|
|
|
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup |
|
|
649 | (12) |
|
|
Author Index |
|
661 | |