Advanced Computing: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011. Proceedings, Part III

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.

Author(s): Aravinthan Parthibarajan, Gopalakrishnan Narayanamurthy, Arun srinivas Parthibarajan (auth.), Natarajan Meghanathan, Brajesh Kumar Kaushik, Dhinaharan Nagamalai (eds.)
Series: Communications in Computer and Information Science 133
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 483
Tags: Computer Communication Networks; Artificial Intelligence (incl. Robotics); Information Systems Applications (incl.Internet); Algorithm Analysis and Problem Complexity; Software Engineering; Information Storage and Retrieval

Front Matter....Pages -
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic....Pages 1-9
An Intelligent Network for Offline Signature Verification Using Chain Code....Pages 10-22
An Improved and Adaptive Face Recognition Method Using Simplified Fuzzy ARTMAP....Pages 23-34
An Automatic Evolution of Rules to Identify Students’ Multiple Intelligence....Pages 35-45
A Survey on Hand Gesture Recognition in Context of Soft Computing....Pages 46-55
Handwritten Numeral Recognition Using Modified BP ANN Structure....Pages 56-65
Expert System for Sentence Recognition....Pages 66-75
RODD: An Effective R eference-Based O utlier D etection Technique for Large D atasets....Pages 76-84
A Review of Dynamic Web Service Composition Techniques....Pages 85-97
Output Regulation of Arneodo-Coullet Chaotic System....Pages 98-107
A High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFS....Pages 108-119
A Mathematical Modeling of Exceptions in Healthcare Workflow....Pages 120-129
Functional Based Testing in Web Services Integrated Software Applications....Pages 130-138
Design and Implementation of a Novel Distributed Memory File System....Pages 139-148
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment....Pages 149-160
Adoption of Cloud Computing in e-Governance....Pages 161-172
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching....Pages 173-182
A Semantic Approach to Design an Intelligent Self Organized Search Engine for Extracting Information Relating to Educational Resources....Pages 183-189
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System....Pages 190-199
Integration Testing of Multiple Embedded Processing Components....Pages 200-209
A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks....Pages 210-216
A Model for Delegation Based on Authentication and Authorization....Pages 217-236
Identification of Encryption Algorithm Using Decision Tree....Pages 237-246
A Novel Mechanism for Detection of Distributed Denial of Service Attacks....Pages 247-257
Authenticating and Securing Mobile Applications Using Microlog....Pages 258-267
Assisting Programmers Resolving Vulnerabilities in Java Web Applications....Pages 268-279
Estimating Strength of a DDoS Attack Using Multiple Regression Analysis....Pages 280-289
A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application....Pages 290-299
Chest X-Ray Analysis for Computer-Aided Diagnostic....Pages 300-309
Overcoming Social Issues in Requirements Engineering....Pages 310-324
Range-Free Localization for Air-Dropped WSNs by Filtering Neighborhood Estimation Improvements....Pages 325-337
Evolution of Various Controlled Replication Routing Schemes for Opportunistic Networks....Pages 338-347
Collaborative Context Management and Selection in Context Aware Computing....Pages 348-357
Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis....Pages 358-366
Application of Euclidean Distance Power Graphs in Localization of Sensor Networks....Pages 367-377
Retracted: A New Protocol to Secure AODV in Mobile AdHoc Networks....Pages 378-389
Spelling Corrector for Indian Languages....Pages 390-399
Voltage Collapse Based Critical Bus Ranking....Pages 400-409
Multiplexer Based Circuit Synthesis with Area-Power Trade-Off....Pages 410-420
Exergaming – New Age Gaming for Health, Rehabilitation and Education....Pages 421-430
Inclusion/Exclusion Protocol for RFID Tags....Pages 431-437
Min Max Threshold Range (MMTR) Approach in Palmprint Recognition....Pages 438-449
Power and Buffer Overflow Optimization in Wireless Sensor Nodes....Pages 450-458
Web Log Data Analysis and Mining....Pages 459-469
Steganography Using Version Control System....Pages 470-480
Erratum: A New Protocol to Secure AODV in Mobile AdHoc Networks....Pages E1-E1
Back Matter....Pages -