Normal view MARC view ISBD view

Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing [electronic resource] / edited by Vinu V. Das.

Contributor(s): Das, Vinu V [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Electrical Engineering: 150Publisher: New York, NY : Springer New York : Imprint: Springer, 2013Description: XIV, 670 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781461433637.Subject(s): Engineering | Computer hardware | Input-output equipment (Computers) | Electronic circuits | Engineering | Circuits and Systems | Computer Hardware | Input/Output and Data CommunicationsAdditional physical formats: Printed edition:: No titleDDC classification: 621.3815 Online resources: Click here to access online
Contents:
Full Papers -- High Through-put VLSI Architecture for FFT Computation -- Formal Approach to Reliability Improvement with Model Checker -- DDoS attacks Defense System using Information Metrics -- CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs) -- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs) -- DoS Attack-resistant Framework for Client/Server Intelligent Computing -- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks -- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine -- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements -- Hybrid Extremal Optimization and Glowworm Swarm Optimization -- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks -- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems -- Developing Embedded Systems from Formal Specifications written in Temporal Logic -- Network log Clustering Using K-means Algorithm -- Improvement Public Key Kerberos using Identity-Based Signcryption -- Intrusion Detection Using Keystroke Dynamics -- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform -- Comparison of Routing Protocols in Mobile Ad-hoc Network -- Analysis of Image Segmentation Algorithms Using MATLAB -- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions -- Mean-Shift Algorithm: Verilog HDL Approach -- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks -- A Security Framework for DDoS Detection In MANETs -- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC) -- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators -- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks -- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation -- Performance Analysis of Different Current Controllers for Active Power Filter -- Optimum LQR Switching Approach for the Improvement of STATCOM Performance -- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine -- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers -- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters -- A Novel Inverter Topology for Low Power Drives -- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods -- Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System -- Design of Adaptive FLANN based model for Non-linear Channel Equalization -- Short Papers -- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network -- Voice Transformation using Radial Basis Function -- IPTC based Ontological Representation of Educational News RSS Feeds -- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem -- Automatic Generation of P2P botnet Network Attack Graph -- Parallelization of Fractal Image Compression over CUDA -- Distributed Shared Files Management -- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization -- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems -- An Algorithm for Traffic Analysis using RFID Technology -- Trust-Based Grid Resource Management -- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach -- An Approach to Encryption using Superior Fractal Sets -- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding -- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network -- Security based Requirements Engineering for E-Voting System -- Analysis of 3 Dimensional Object Watermarking Techniques -- Graph Based Approach for Heart Disease Prediction -- Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks -- An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint -- A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition -- Performance Evaluation of Web Browsers in Android -- FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator� -- Face Recognition Using PCA and Bit-Plane Slicing -- Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor -- Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters -- Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques -- Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation -- Artificial Neural Network based Power System Stability Analysis -- Poster Paper -- Efficient Bandwidth Utilization in Client-Server Models -- Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz -- Intelligent Enterprise Application Servers - A Vision for self-managing performance -- A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk FileSystems -- Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey -- Itinerary Management System -- Trust and Reliability based Scheduling Algorithm for Cloud IaaS -- Hybrid Covert Channel an Obliterate for Information Hiding -- Steganography and Its Technique: Technical Overview -- Data Stream Mining: A Review -- Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces -- Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler -- Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes -- Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.
In: Springer eBooksSummary: The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunication Technology. This book provides a broad vision for the future of research in these fields with ideas on how to support these new technologies currently practice. Every submitted paper received a careful review from the committee and the final accept/reject decisions were made by the co-chairs on the bases of recommendations from the committee members.
    average rating: 0.0 (0 votes)
No physical items for this record

Full Papers -- High Through-put VLSI Architecture for FFT Computation -- Formal Approach to Reliability Improvement with Model Checker -- DDoS attacks Defense System using Information Metrics -- CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs) -- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs) -- DoS Attack-resistant Framework for Client/Server Intelligent Computing -- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks -- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine -- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements -- Hybrid Extremal Optimization and Glowworm Swarm Optimization -- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks -- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems -- Developing Embedded Systems from Formal Specifications written in Temporal Logic -- Network log Clustering Using K-means Algorithm -- Improvement Public Key Kerberos using Identity-Based Signcryption -- Intrusion Detection Using Keystroke Dynamics -- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform -- Comparison of Routing Protocols in Mobile Ad-hoc Network -- Analysis of Image Segmentation Algorithms Using MATLAB -- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions -- Mean-Shift Algorithm: Verilog HDL Approach -- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks -- A Security Framework for DDoS Detection In MANETs -- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC) -- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators -- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks -- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation -- Performance Analysis of Different Current Controllers for Active Power Filter -- Optimum LQR Switching Approach for the Improvement of STATCOM Performance -- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine -- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers -- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters -- A Novel Inverter Topology for Low Power Drives -- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods -- Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System -- Design of Adaptive FLANN based model for Non-linear Channel Equalization -- Short Papers -- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network -- Voice Transformation using Radial Basis Function -- IPTC based Ontological Representation of Educational News RSS Feeds -- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem -- Automatic Generation of P2P botnet Network Attack Graph -- Parallelization of Fractal Image Compression over CUDA -- Distributed Shared Files Management -- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization -- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems -- An Algorithm for Traffic Analysis using RFID Technology -- Trust-Based Grid Resource Management -- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach -- An Approach to Encryption using Superior Fractal Sets -- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding -- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network -- Security based Requirements Engineering for E-Voting System -- Analysis of 3 Dimensional Object Watermarking Techniques -- Graph Based Approach for Heart Disease Prediction -- Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks -- An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs based on Dynamic Weight Constraint -- A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition -- Performance Evaluation of Web Browsers in Android -- FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator� -- Face Recognition Using PCA and Bit-Plane Slicing -- Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-source Inverter fed Induction Motor -- Advanced DSP based PLC Modem over DC Lines for Real-time Remote Monitoring of PV Plant Parameters -- Digital security with Thermal Dorsal Hand Vein patterns Using Morphological Techniques -- Design of a Two Phase Inverter for a Specific Two Phase Induction Motor through MATLAB Simulation -- Artificial Neural Network based Power System Stability Analysis -- Poster Paper -- Efficient Bandwidth Utilization in Client-Server Models -- Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz -- Intelligent Enterprise Application Servers - A Vision for self-managing performance -- A review of disc Scrubbing and Intra Disk Redundancy for reducing data loss in Disk FileSystems -- Homogeneous & Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey -- Itinerary Management System -- Trust and Reliability based Scheduling Algorithm for Cloud IaaS -- Hybrid Covert Channel an Obliterate for Information Hiding -- Steganography and Its Technique: Technical Overview -- Data Stream Mining: A Review -- Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces -- Real Time Remote Monitoring and Measurement of Loss due to Dry Flue Gas for an Industrial Boiler -- Characterization of Electrical and Thermal Properties of Enamel Filled with Carbon Nanotubes -- Tuned Fuzzy Logic Control of Switched Reluctance Motor Drives.

The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunication Technology. This book provides a broad vision for the future of research in these fields with ideas on how to support these new technologies currently practice. Every submitted paper received a careful review from the committee and the final accept/reject decisions were made by the co-chairs on the bases of recommendations from the committee members.

There are no comments for this item.

Log in to your account to post a comment.