Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Processing and Management: International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The CCIS series is devoted to the publication of proceedings of computer science conferences. Its aim is to efficiently disseminate original research results in informatics in printed and electronic form. While the focus is on publication of peer-reviewed full papers presenting mature work, inclusion of reviewed short papers and abstracts reporting on work in progress is welcome, too. Besides globally relevant meetings with internationally representative program committees guaranteeing a strict peer-reviewing and paper selection process, conferences run by societies or of high regional or national relevance are considered for publication as well.

The topical scope of CCIS spans the entire spectrum of informatics ranging from foundational topics in the theory of computing to information and communications science and technology and a broad variety of interdisciplinary application fields.

Publication in CCIS is free of charge. No royalties are paid, however, CCIS volume editors receive 25 complimentary copies of the proceedings. CCIS proceedings can be published in time for distribution at conferences or as post-proceedings, as printed books and/or electronically as CDs; furthermore CCIS proceedings are included in the CCIS electronic book series hosted in the SpringerLink digital library.

The language of publication is exclusively English. Authors publishing in CCIS have to sign the Springer CCIS copyright transfer form, however, they are free to use their material published in CCIS for substantially changed, more elaborate subsequent publications elsewhere. For the preparation of the camera-ready papers/files, authors have to strictly adhere to the Springer CCIS Authors' Instructions and are strongly encouraged to use the CCIS LaTeX style files or templates.
SVD and Neural Network Based Watermarking Scheme
1(5)
Swanirbhar Majumder
Tirtha Shankar Das
Vijay H. Mankar
Subir K. Sarkar
Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms
6(6)
Akshi Kumar
M. P. S. Bhatia
Network Management Initialization for Wired and Wireless Communication: A Real Time Study
12(5)
Navneet Tiwari
Siddarth Jain
Saifuddin A. Tariwala
Ankit Salgia
IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network
17(5)
J. Gnana Jayanthi
S. Albert Rabara
An Efficient Multicast Hybrid Routing Protocol for MANETs
22(6)
Srinivas Sethi
Siba K. Udgata
Applications of Graph Theory in Face Biometrics
28(6)
Dakshina Ranjan Kisku
Phalguni Gupta
Jamuna Kanta Sing
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map
34(5)
Anil Kumar
M. K. Ghose
Hybrid Activities of AODV for Wireless Ad hoc Sensor Network
39(6)
Srinivas Sethi
Ashima Rout
Dipti Mohanta
Aayush Behera
Manmath N. Sahoo
Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm
45(8)
Shatha J. Kadhim
Kasim M. Al-Aubidy
Object Location in Cluster Based Mobile Ad Hoc Networks
53(7)
Prasad Naik Hamsavath
G. V. Singh
Sanjay K. Dhurandher
Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications
60(5)
Alok Joshi
Davinder S. Saini
Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks
65(6)
Davinder S. Saini
Vipin Balyan
Kanika Mittal
Mansi Saini
Manika Kishore
A Closed Form Slew Evaluation Approach Using Burr's Distribution Function for High Speed On-Chip RC Interconnects
71(5)
Rajib Kar
Vikas Maheshwari
Md. Maqbool
A. K. Mal
A. K. Bhattacharjee
Wavelet-Domain L∞-Constrained Two-Stage Near-Lossless EEG Coder
76(5)
K. Srinivasan
M. Ramasubba Reddy
Fuzzy Based Bandwidth Management for Wireless Multimedia Networks
81(10)
J. D. Mallapur
Syed Abidhusain
Soumya S. Vastrad
Ajaykumar C. Katageri
A Novel Digital Algorithm for Sobel Edge Detection
91(5)
Jagadish H. Pujar
D. S. Shambhavi
Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison
96(6)
B. Kavitha
S. Karthikeyan
B. Chitra
Recognition of Isolated Indian Sign Language Gesture in Real Time
102(6)
Anup Nandy
Jay Shankar Prasad
Soumik Mondal
Pavan Chakraborty
G.C. Nandi
Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors
108(6)
Megalingam Rajesh Kannan
M. Arunkumar
V. Arjun Ashok
Krishnan Nived
C. J. Daniel
Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor
114(6)
Megalingam Rajesh Kannan
K. B. Deepu
Joseph P. Iype
Ravishankar Parthasarathy
Popuri Gautham
Role of Resolution in Noisy Pattern Matching
120(5)
Alex Pappachen James
Sima Dimitrijev
Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security
125(5)
V. Ruckmani
G. Sudha Sadasivam
Bandwidth Estimation Scheme for Mobile Adhoc Network
130(6)
Deepak Vidhate
Anita Patil
Supriya Sarkar
Multimodal Biometric Invariant Moment Fusion Authentication System
136(8)
P. Viswanathan
P. Venkata Krishna
S. Hariharan
Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography
144(8)
Anjali Naik
Shubhangi Vinayak Tikhe
S. D. Bhide
Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images
152(5)
Bikesh Kr. Singh
G. R. Sinha
Imroze Khan
Vector Quantization for Tumor Demarcation of Mammograms
157(7)
H. B. Kekre
Tanuja K. Sarode
Saylee M. Gharge
Selective Encryption of Video Using Multiple Chaotic Maps
164(5)
L. M. Varalakshmi
G. Florence Sudha
Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks
169(6)
Neeta S. Bosamiya
Devesh C. Jinwala
Tracking Based Secure AODV Routing Protocol
175(6)
Parma Nand
S. C. Sharma
Rani Astya
Study of Visitor Behavior by Web Usage Mining
181(7)
V. V. R. Maheswara Rao
V. Valli Kumari
K. V. S. V. N. Raju
A Hybrid Routing Protocol for Wireless Sensor Network
188(6)
N. Sengottaiyan
Rm. Somasundaram
Balasubramanie
Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring
194(8)
D. V. Naga Raju
V. Valli Kumari
K. V. S. V. N. Raju
Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks
202(7)
A. K. Dwivedi
V. K. Patle
O. P. Vyas
A Novel Multipath Routing Scheme in Mobile Adhoc Networks
209(8)
N. Jaisankar
R. Saravanan
K. Durai Swamy
A Novel Security Approach for Detecting Black Hole Attack in MANET
217(7)
N. Jaisankar
R. Saravanan
K. Durai Swamy
NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database
224(9)
Neera Batra
A. K. Kapil
A Secure e-Shopping Using Voice Ordering
233(5)
Saroj Kumar Panigrahy
Debasish Jena
Sanjay Kumar Jena
Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model
238(7)
Manoj Kr. Dutta
V. K. Chaubey
A Concurrent Synchronization Model for Distributed Multimedia Systems
245(5)
Janani Arthanari
A. Kannan
Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS
250(8)
Rajneesh Gujral
Anil Kapil
A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System
258(5)
Shakti Mishra
D. S. Kushwaha
A. K. Misra
An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine
263(6)
Divya Mohandass
J. Janet
Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata
269(7)
Abhishek Ray
Debasis Das
Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 80.11s Wireless Mesh Network
276(5)
Dhaval K. Patel
S. K. Shah
Minesh P. Thaker
Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks
281(9)
Deepali Virmani
Satbir Jain
A Cryptographic Approach to Defend against IP Spoofing
290(7)
Mangalam Ravi
S. Narasimman
G. K. Arun Kumar
D. Karthikeyan
Multi-agent Based Network Performance Tuning in Grid
297(8)
G. Valliyammai
S. Thamarai Selvi
R. Satheesh Kumar
E. Pradeep
K. Naveen
Finding Discriminative Weighted Sub-graphs to Identify Software Bugs
305(5)
Saeed Parsa
Somaye Arabi
Neda Ebrahimi
Mojtaba Vahidi-Asl
Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information
310(10)
Manoj V. N. Vadakkepalisseri
K. Chandrashekaran
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures
320(5)
Balachandra
K. V. Prema
Iris Recognition Technique Using Gaussian Pyramid Compression
325(7)
G. Savithiri
A. Murugan
Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN
332(5)
Leena Arya
S. C. Sharma
Millie Pant
Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks
337(5)
Devaraju Suganya Devi
Ganapathi Padmavathi
An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid
342(7)
P. Varalakshmi
M. Nandini
K. Krithika
R. Aarthi
Reactive Network Monitor for DDoS Attacks
349(7)
P. Varalakshmi
P. Karthik Narayanan
M. Hariharan
P. Nagaraj
K. Amritha
Statistical Method for English to Kannada Transliteration
356(7)
P. J. Antony
V. P. Ajith
K. P. Soman
RIFMAS: River Flow Management System Using Wireless Sensing Agents
363(6)
R. B. Patel
Deepika Jain
Bhanu Kaushik
Finite Element Approach to Radial Heat Flow in Human Dermal Tissues
369(7)
Neha Jain
An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas
376(6)
Sajal Mukhopadhyay
Roshan Kumar Singh
D. Ghosh
Jaya Bhattacharjee
Nivedita Mukherjee
Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA
382(3)
M. Selvanayaki
M. S. Vijaya
K. S. Jamuna
S. Karpagavalli
Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback
385(3)
K. Latha
R. Manivelu
Challenges in Segmentation of Text in Handwritten Gurmukhi Script
388(5)
K. Sharma Rajiv
S. Dhiman Amardeep
Exploring the Contrasts of VoIP Phone Services
393(3)
Bala Dhandayuthapani Veerasamy
Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET'S
396(5)
Shaily Mittal
Prabhjot Kaur
Impact Factor of E - Learning: Using Secondary Education Case Study
401(4)
Tamanna Siddiqui
Munior Ahmad Wani
Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology
405(6)
Sanchit Gupta
Himanshu Gahlot
Varun Gupta
Banshi Dhar Chaudhary
A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System
411(6)
C. M. Patil
Sudarshan Patilkulkarni
Binary Data Compression Using Medial Axis Transform Algorithm
417(3)
Jagadish H. Pujar
Pallavi S. Gurjal
Internet Usage Monitoring for Crime Detection
420(4)
Sandeep A. Thorat
Samadhan R. Manore
Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition
424(6)
S. Gunasekaran
K. Revathy
Defending against Node Misbehavior to Discover Secure Route in OLSR
430(7)
Sanjeev Rana
Anil Kapil
SIMBIC: Similarity Based Biclustering of Expression Data
437(5)
J. Bagyamani
K. Thangavel
An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System
442(4)
Neera Batra
A. K. Kapil
Automatic Incorporation of Corrections into Reviewed Documents
446(6)
D. S. Guru
B. Vijaya Kumari
S. K. Lathamba
Performance Comparison of Multicast Routing Protocols for MANETs
452(3)
Maya Mohan
S. Mary Saira Bhanu
Traffic Aware LSP Selection Method in MPLS Networks
455(3)
Ravindra Kumar Singh
Kanak Saxena
Reena Singh
Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks
458(3)
R. S. Ambili Chandran
S. Mary Saira Bhanu
Energy and Fault Aware Management Framework for Wireless Sensor Network
461(4)
V. R. Sarma Dhulipala
V. Aarthy
RM Chandrasekaran
An Image Index Model for Retrieval
465(3)
B. Janet
A. V. Reddy
S. Domnic
Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet
468(7)
N. Bhalaji
Alok V. Kanakeri
Krishna P. Chaitanya
A. Shanmugam
Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns
475(7)
S. Selvakumar
M. R. C. Dinesh
C. Dhineshkumar
N. Ramaraj
Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks
482(3)
Sahil Seth
Anil Gankotiya
Gurdit Singh
Vishal Kumar
Amit Kumar Jaiswal
Separation of Machine Printed Roman and Gurmukhi Script Words
485(6)
Dharamveer Sharma
FPGA Implementation of AES Co-processor in Counter Mode
491(6)
Balwinder Singh
Harpreet Kaur
Himanshu Monga
Detecting Plagiarism in Text Documents
497(4)
Shanmugasundaram Hariharan
Sirajudeen Kamal
Abdul Vadud Mohamed Faisal
Sheik Mohamed Azharudheen
Bhaskaran Raman
Hiding Relevant Information in an Image
501(4)
Madhusmita Das
Mahamaya Mohanty
Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques
505(3)
G. Shiva Prasad
N. V. Subba Reddy
U. Dinesh Acharya
Context-Aware System Using .NET Approach
508(6)
Arun Mishra
Bikash Tiwari
J. S. R. Kartik
Arun Kumar Misra
Genetic Audio Watermarking
514(4)
Mazdak Zamani
Azizah Bt Abdul Manaf
Rabiah Bt Ahmad
Farhang Jaryani
Saman Shojae Chaeikar
Hossein Rouhani Zeidanloo
Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure
518(3)
Keyur N. Upadhyay
Hemant D. Vasava
Viral V. Kapadia
Natural Disaster Impact Assessment Using Genetic Algorithm
521(6)
N. Bhalaji
Nandini Sundara Raman
An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition
527(4)
C. M. Patil
Sudarshan Patilkulkarni
A Framework for Priority-Based Inter Vehicle Communication for Highway Safety
531(4)
A. Kumar
R. K. Chauhan
Rajan Vohra
Data Compression on Embedded System
535(3)
P. S. Revankar
Vijay B. Patil
W. Z. Gandhare
A Survey on Preserving Privacy for Sensitive Association Rules in Databases
538(7)
Chirag Modi
U. P. Rao
Dhiren R. Patel
Boon and Bane of Curvelet Transform
545(7)
G. Geetha
V. Ragavi
K. Thamizhchelvy
K. Mariappan
V. Lalitha
S. Shanmuga Priya
Security in High Performance Computing
552(5)
Urvashi Chugh
Amit Chugh
Trust Worthy Architecture for Mobile Ad Hoc Network Environment
557(4)
V. R. Sarma Dhulipala
B. Vishnu Prabha
RM Chandrasekaran
A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks
561(4)
V. R. Sarma Dhulipala
K. Kavitha
RM Chandrasekaran
Security Solutions to the Phishing: Transactions Based on Security Questions and Image
565(3)
Aruna Kumari Devarakonda
Prasamsa Tummala
Indra Praveen Sandrala
CloneManager: A Tool for Detection of Typel and Type2 Code Clones
568(3)
E. Kodhai
S. Kanmani
A. Kamatchi
R. Radhika
B. Vijaya Saranya
Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification
571(6)
Dharamveer Sharma
Bibanjot Kaur
An Analysis to BER Performances of Differential OFDM Systems
577(5)
Kaur Inderjeet
MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions
582(4)
S. Britto R Kumar
S. Albert Rabara
Team Automata Based Framework for Spatio-Temporal RBAC Model
586(6)
N. Jaisankar
S. Veeramalai
A. Kannan
Knowledge Discovery in Feedback System Using Pixel Oriented Technique
592(3)
Malay Bhatt
Rituraj Jain
C. K. Bhensdadia
Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level
595(3)
N. K. Shukla
Shilpi Birla
R. K. Singh
Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks
598(3)
Mamatha Balachandra
K. V. Prema
Design Issues for Replacing Credit Card on Mobile Phone
601(4)
Sukhwant Kaur
H. K. Kaura
Mritunjay Ojha
Unknown Key Share Attack on STPKE' Protocol
605(4)
R. Padmavathy
Chakravarthy Bhagvati
An Effective SOA Model for Developing Efficient Systems
609(4)
Sasmita Pani
Mahamaya Mohanty
Refactoring Interprocedural Dynamic Slicing for Handling Pointers
613(4)
Santosh Kumar Pani
Priya Arundhati
Mahamaya Mohanty
Image Segmentaion and Steganography for Secured Information Transmission
617(4)
Mamta Juneja
Parvinder Singh Sandhu
Ant System Embedded with Local Search for Solving Facility Layout Problem
621(8)
Surya Prakash Singh
Strategic Initiatives and Automated Decision Support with ERP System Environment
629(7)
Asim Gopal Barman
Ranjan Bhattacharya
Sudip Kumar Deb
A Case Study of Strategic Design Management
636(5)
Fumihiko Isada
The Effects of Mannequins on Consumers' Perception and Shopping Attitude
641(7)
N. Anitha
C. Selvaraj
Knowledge Transfer: Do Instructor Characteristics Matter?
648(8)
Jaya Chitranshi
Shailja Agarwal
Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem
656(4)
Priyanka Verma
R. R. K. Sharma
CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment
660(5)
Ritu Sinha
Chandrashekhar Kaushik
HR Roadmap: Becoming a Strategic Business Partner
665(5)
Shweta Maheshwari
Recent Trends in Indian Technical and Management Education W. R. T. Maharashtra
670(5)
J. S. Kadam
J. J. Nirmal
M. Y. Khire
Author Index
675