skip to main content
10.1145/2905055acmotherconferencesBook PagePublication PagesictcsConference Proceedingsconference-collections
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies Udaipur India March 4 - 5, 2016
ISBN:
978-1-4503-3962-9
Published:
04 March 2016
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 02 Mar 2025Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

research-article
Push Recovery for Humanoid Robot in Dynamic Environment and Classifying the Data Using K-Mean
Article No.: 1, Pages 1–6https://doi.org/10.1145/2905055.2905207

Push recovery is prime ability that is essential to be incorporated in the process of developing a robust humanoid robot to support bipedalism. In real environment it is very essential for humanoid robot to maintain balance. In this paper we are ...

research-article
AB-EUIDE: An approach to the design of ergonomic user interfaces for Cloud Computing
Article No.: 1, Pages 1–5https://doi.org/10.1145/2905055.2905056

Cloud computing is a rapidly growing technology for many organizations with dynamic scalability and services as virtual through the internet. The design of ergonomic user interface for cloud computing environment using the Multi-agent system for user ...

research-article
A Survey on IoT Privacy Issues and Mitigation Techniques
Article No.: 2, Pages 1–4https://doi.org/10.1145/2905055.2905057

Internet of Things (IoT) has emerged as a global network, which intelligently connects different devices or systems which are having self-configuring capabilities. The key idea is to bind or to connect miscellaneous devices or objects via wireless or ...

research-article
Automated Verification in Cryptography System
Article No.: 2, Pages 1–5https://doi.org/10.1145/2905055.2905208

Cryptographic protocols and algorithms are the strength of digital era in which we are living. Unluckily, the security of many confidential information and credentials has been compromised due to ignorance of required security services. As a result, ...

research-article
A Study on Agent Based Ergonomic and Intelligent User Interface Design in Cloud Computing
Article No.: 3, Pages 1–5https://doi.org/10.1145/2905055.2905058

Cloud Computing is changing rapidly the way an adoptable technology for many organizations with dynamic scalability and virtualized services through the internet. The design of ergonomic user interface for cloud computing environment using the agent ...

research-article
Computational Methods for Detecting Functional Modules from Gene Regulatory Network
Article No.: 3, Pages 1–6https://doi.org/10.1145/2905055.2905209

In systems biology, a group of genes constitutes a functional module (group of tightly interconnected nodes) involved in common elementary biological functions. Identifying such modules is helpful in system level understanding of biological and cellular ...

research-article
Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters
Article No.: 4, Pages 1–6https://doi.org/10.1145/2905055.2905210

Traditional clustering techniques are limited in detecting clusters of overlapping in nature. To identify overlapping clusters in a real data is a challenging task in data mining. A number of clustering methods proposed so far to address the issue. They ...

research-article
Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization
Article No.: 4, Pages 1–5https://doi.org/10.1145/2905055.2905059

This paper proposes a steganography technique to enhance the capacity and quality of the stego object. The method is proposed for frequency domain grayscale images. It is assumed that hiding varied number of secret bits in the original image blocks ...

research-article
Implementing and Analyzing Big Data Techniques withSpring Frame Work in Java& J2EEBased Application
Article No.: 5, Pages 1–6https://doi.org/10.1145/2905055.2905211

In the time of big data techniques with spring framework on java, web servers or application server as the significant channel in big data should be updated to meet execution and force imperatives. Significant endeavors have been put resources into web ...

research-article
Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique
Article No.: 5, Pages 1–5https://doi.org/10.1145/2905055.2905060

Multimedia security and copyright protection has been a popular topic for research and application, due to the explosion of data exchange over the internet and the widespread use of digital media. Watermarking is a process of hiding the digital ...

research-article
Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks
Article No.: 6, Pages 1–5https://doi.org/10.1145/2905055.2905212

Recently Vehicular Ad-hoc Network (VANET) has attracted more attention of researchers and wireless industry. In VANET, nodes are moving vehicles, therefore, the mobility is extensive and topology of the networks transforms very frequently. Owing a high ...

research-article
A Hybrid Approach for Detection of Plagiarism using Natural Language Processing
Article No.: 6, Pages 1–6https://doi.org/10.1145/2905055.2905061

Detection of plagiarism in research papers selected for conference publications and journals, or in assignments handed over for evaluation is very important. It ensures the work submitted is free from any copied content. Commercially available ...

research-article
Caught Hacker: Curing DDOS Attack
Article No.: 7, Pages 1–4https://doi.org/10.1145/2905055.2905213

In Present scenario, maintaining information security is very difficult especially on internet or public network. Without strong security measures information can be accessed by any attacker very easily. In this modern world, there are many attacking ...

research-article
A Generic Defect Aware Heuristic Approach for Droplet Routing in a Digital Microfluidic Biochip with Minimal Pin Assignment
Article No.: 7, Pages 1–4https://doi.org/10.1145/2905055.2905062

Multi-tasking digital microfluidic biochip raises some challenging issues in droplet routing in presence of on-chip defects. In this work, a heuristic droplet routing algorithm is proposed that tries to perform defect aware droplet transportation on ...

research-article
Study and Implementation of Record De-duplication Algorithms
Article No.: 8, Pages 1–6https://doi.org/10.1145/2905055.2905063

Record de-duplication is a process of identification and removal of duplicates from the given dataset in a data warehouse environment. The term record linkage is also used in the same context, the difference between record de-duplication and record ...

research-article
Smartphone Security: Review of Challenges and Solution
Article No.: 8, Pages 1–3https://doi.org/10.1145/2905055.2905214

Now a day's Smartphone has become most popular and dominant mobile device in this world for accessing internet resources. Smartphone is just like a minicomputer that created technological revolution after the internet. It is a portable electronic device ...

research-article
A Major Threat to Big Data: Data Security
Article No.: 9, Pages 1–6https://doi.org/10.1145/2905055.2905215

Big Data has nowadays become the most talked latest IT trends. The fact that it can handle all the forms of data which includes unstructured data, big data has now become the preferred choice for analysis of huge amount of data over the Relational ...

research-article
Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset
Article No.: 9, Pages 1–5https://doi.org/10.1145/2905055.2905064

Data mining and machine learning concepts play a vital role in dealing with large number of datasets. Various algorithms embedded within these concepts provide a wide array of mechanisms to classify the data into its specific classes. Least square ...

research-article
Smart Cities: A Secure Data Transmission Model
Article No.: 10, Pages 1–5https://doi.org/10.1145/2905055.2905216

The concept of Smart cities is gaining popularity at an extremely high rate. The data associated with them is of very large amount. This data affects the various services associated with them be it E Governance, smart transportation or smart education. ...

research-article
Parallel Computing of Load Flow Analysis
Article No.: 10, Pages 1–8https://doi.org/10.1145/2905055.2905066

This paper presents a simple and an efficient approach for load flow analysis of a radial distribution network by using parallel computation. By introducing CUDA (Computationally Unified Device Architecture), a platform is provided for performing the ...

research-article
Centralized Message Reporting System in Wireless Sensor Networks
Article No.: 11, Pages 1–5https://doi.org/10.1145/2905055.2905217

Wireless Sensor Networks (WSNs) offer an exquisite fortuity to monitor territory, and have a lot of applications in military. Security is promptly degrading the staging as the first and foremost concern in wireless scenarios is intrusion detection. This ...

research-article
Causes of Human Errors in Early Risk assesment in Software Project Management
Article No.: 11, Pages 1–11https://doi.org/10.1145/2905055.2905069

This paper concerns the role of human errors in the field of Early Risk assessment in Software Project Management. Researchers have recently begun to focus on human errors in early risk assessment in large software projects; statistics show it to be ...

research-article
Nano Sensors and Pattern Recognition for Detection of Hidden Explosives
Article No.: 12, Pages 1–6https://doi.org/10.1145/2905055.2905218

The spread of terrorist assaults over the globe in the most recent decade has underscored the significance of detecting concealed explosives and called for new propelled innovations to ensure the protection of general population. Smelling reminiscent ...

research-article
A Critical Assessment of ICT Infrastructures for Certain Demand Response Applications in Smart Grid
Article No.: 12, Pages 1–6https://doi.org/10.1145/2905055.2905070

Smart Grid (SG) technology highly thrives on the use of sophisticated Information and Communication Technologies (ICTs). In this paper we present a few recently popular use cases from within the smart grid parlance and demonstrate how ICT technologies ...

research-article
A New Approach for the Security of VPN
Article No.: 13, Pages 1–5https://doi.org/10.1145/2905055.2905219

In present days, Internet has become mainstream of the network technology for low cost communications architecture, also it brought great convenience for the organizations and businesses to support growth of their business. Since Internet is highly ...

research-article
Energy Aware Heuristic Scheduling of Variable Class Constraint Resources in Cloud Data Centres
Article No.: 13, Pages 1–6https://doi.org/10.1145/2905055.2905071

Energy consumption management in cloud data centres is a very challenging research issue at present and the growth in cloud data centres have only compounded this challenge. In this paper, we focus on minimizing energy consumption of datacentres ...

research-article
Architecture of Cloud Server with Cache on Server
Article No.: 14, Pages 1–5https://doi.org/10.1145/2905055.2905220

We are aware that some isolated part of memory can be utilized to fast access of data. This utilization of part of memory area is called caching. The data is made available depending on number of access or may be by using other techniques like date of ...

research-article
A Methodological Review Based Version Control System with Evolutionary Research for Software Processes
Article No.: 14, Pages 1–6https://doi.org/10.1145/2905055.2905072

The constant add up of new features and bug fixes often make invariable changes and refinements inevitable in the software development at regular intervals. The software should enable the end-user to decipher the critical version information about the ...

research-article
ID Based Encryption in Modern Cryptography
Article No.: 15, Pages 1–5https://doi.org/10.1145/2905055.2905221

Now a days, ATM is used for money transaction for the convenience of the user by providing round the clock 24*7 services in financial transaction. Bank provides the Debit or Credit card to its user along with particular PIN number (which is only known ...

research-article
Leakage Power Reduction Technique by using FinFET Technology
Article No.: 15, Pages 1–5https://doi.org/10.1145/2905055.2905073

Deep Sub Micron (DSM) technology demands for lower supply voltage, reduced threshold voltage and high transistor density which leads to exponentially increase in leakage power when circuit is in standby mode. To overcome from this situation Double Gate (...

Index Terms

  1. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 97 of 270 submissions, 36%
      YearSubmittedAcceptedRate
      ICTCS '142709736%
      Overall2709736%