Export Citations
No abstract available.
Proceeding Downloads
Push Recovery for Humanoid Robot in Dynamic Environment and Classifying the Data Using K-Mean
Push recovery is prime ability that is essential to be incorporated in the process of developing a robust humanoid robot to support bipedalism. In real environment it is very essential for humanoid robot to maintain balance. In this paper we are ...
AB-EUIDE: An approach to the design of ergonomic user interfaces for Cloud Computing
Cloud computing is a rapidly growing technology for many organizations with dynamic scalability and services as virtual through the internet. The design of ergonomic user interface for cloud computing environment using the Multi-agent system for user ...
A Survey on IoT Privacy Issues and Mitigation Techniques
Internet of Things (IoT) has emerged as a global network, which intelligently connects different devices or systems which are having self-configuring capabilities. The key idea is to bind or to connect miscellaneous devices or objects via wireless or ...
Automated Verification in Cryptography System
Cryptographic protocols and algorithms are the strength of digital era in which we are living. Unluckily, the security of many confidential information and credentials has been compromised due to ignorance of required security services. As a result, ...
A Study on Agent Based Ergonomic and Intelligent User Interface Design in Cloud Computing
Cloud Computing is changing rapidly the way an adoptable technology for many organizations with dynamic scalability and virtualized services through the internet. The design of ergonomic user interface for cloud computing environment using the agent ...
Computational Methods for Detecting Functional Modules from Gene Regulatory Network
In systems biology, a group of genes constitutes a functional module (group of tightly interconnected nodes) involved in common elementary biological functions. Identifying such modules is helpful in system level understanding of biological and cellular ...
Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters
Traditional clustering techniques are limited in detecting clusters of overlapping in nature. To identify overlapping clusters in a real data is a challenging task in data mining. A number of clustering methods proposed so far to address the issue. They ...
Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization
This paper proposes a steganography technique to enhance the capacity and quality of the stego object. The method is proposed for frequency domain grayscale images. It is assumed that hiding varied number of secret bits in the original image blocks ...
Implementing and Analyzing Big Data Techniques withSpring Frame Work in Java& J2EEBased Application
In the time of big data techniques with spring framework on java, web servers or application server as the significant channel in big data should be updated to meet execution and force imperatives. Significant endeavors have been put resources into web ...
Comparative Study of Watermarking an Image Using GA and BFO with GA and HBO Technique
Multimedia security and copyright protection has been a popular topic for research and application, due to the explosion of data exchange over the internet and the widespread use of digital media. Watermarking is a process of hiding the digital ...
Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks
Recently Vehicular Ad-hoc Network (VANET) has attracted more attention of researchers and wireless industry. In VANET, nodes are moving vehicles, therefore, the mobility is extensive and topology of the networks transforms very frequently. Owing a high ...
A Hybrid Approach for Detection of Plagiarism using Natural Language Processing
Detection of plagiarism in research papers selected for conference publications and journals, or in assignments handed over for evaluation is very important. It ensures the work submitted is free from any copied content. Commercially available ...
Caught Hacker: Curing DDOS Attack
In Present scenario, maintaining information security is very difficult especially on internet or public network. Without strong security measures information can be accessed by any attacker very easily. In this modern world, there are many attacking ...
A Generic Defect Aware Heuristic Approach for Droplet Routing in a Digital Microfluidic Biochip with Minimal Pin Assignment
Multi-tasking digital microfluidic biochip raises some challenging issues in droplet routing in presence of on-chip defects. In this work, a heuristic droplet routing algorithm is proposed that tries to perform defect aware droplet transportation on ...
Study and Implementation of Record De-duplication Algorithms
Record de-duplication is a process of identification and removal of duplicates from the given dataset in a data warehouse environment. The term record linkage is also used in the same context, the difference between record de-duplication and record ...
Smartphone Security: Review of Challenges and Solution
Now a day's Smartphone has become most popular and dominant mobile device in this world for accessing internet resources. Smartphone is just like a minicomputer that created technological revolution after the internet. It is a portable electronic device ...
A Major Threat to Big Data: Data Security
Big Data has nowadays become the most talked latest IT trends. The fact that it can handle all the forms of data which includes unstructured data, big data has now become the preferred choice for analysis of huge amount of data over the Relational ...
Enhancement of the Classification Performance of Least Square Support Vector Machine using Simple Particle Swarm Optimization for Phishing Dataset
Data mining and machine learning concepts play a vital role in dealing with large number of datasets. Various algorithms embedded within these concepts provide a wide array of mechanisms to classify the data into its specific classes. Least square ...
Smart Cities: A Secure Data Transmission Model
The concept of Smart cities is gaining popularity at an extremely high rate. The data associated with them is of very large amount. This data affects the various services associated with them be it E Governance, smart transportation or smart education. ...
Parallel Computing of Load Flow Analysis
This paper presents a simple and an efficient approach for load flow analysis of a radial distribution network by using parallel computation. By introducing CUDA (Computationally Unified Device Architecture), a platform is provided for performing the ...
Centralized Message Reporting System in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) offer an exquisite fortuity to monitor territory, and have a lot of applications in military. Security is promptly degrading the staging as the first and foremost concern in wireless scenarios is intrusion detection. This ...
Causes of Human Errors in Early Risk assesment in Software Project Management
This paper concerns the role of human errors in the field of Early Risk assessment in Software Project Management. Researchers have recently begun to focus on human errors in early risk assessment in large software projects; statistics show it to be ...
Nano Sensors and Pattern Recognition for Detection of Hidden Explosives
The spread of terrorist assaults over the globe in the most recent decade has underscored the significance of detecting concealed explosives and called for new propelled innovations to ensure the protection of general population. Smelling reminiscent ...
A Critical Assessment of ICT Infrastructures for Certain Demand Response Applications in Smart Grid
Smart Grid (SG) technology highly thrives on the use of sophisticated Information and Communication Technologies (ICTs). In this paper we present a few recently popular use cases from within the smart grid parlance and demonstrate how ICT technologies ...
A New Approach for the Security of VPN
In present days, Internet has become mainstream of the network technology for low cost communications architecture, also it brought great convenience for the organizations and businesses to support growth of their business. Since Internet is highly ...
Energy Aware Heuristic Scheduling of Variable Class Constraint Resources in Cloud Data Centres
Energy consumption management in cloud data centres is a very challenging research issue at present and the growth in cloud data centres have only compounded this challenge. In this paper, we focus on minimizing energy consumption of datacentres ...
Architecture of Cloud Server with Cache on Server
We are aware that some isolated part of memory can be utilized to fast access of data. This utilization of part of memory area is called caching. The data is made available depending on number of access or may be by using other techniques like date of ...
A Methodological Review Based Version Control System with Evolutionary Research for Software Processes
The constant add up of new features and bug fixes often make invariable changes and refinements inevitable in the software development at regular intervals. The software should enable the end-user to decipher the critical version information about the ...
ID Based Encryption in Modern Cryptography
Now a days, ATM is used for money transaction for the convenience of the user by providing round the clock 24*7 services in financial transaction. Bank provides the Debit or Credit card to its user along with particular PIN number (which is only known ...
Leakage Power Reduction Technique by using FinFET Technology
Deep Sub Micron (DSM) technology demands for lower supply voltage, reduced threshold voltage and high transistor density which leads to exponentially increase in leakage power when circuit is in standby mode. To overcome from this situation Double Gate (...
Cited By
-
Chourey N and Soni R (2022). Privacy Preservation Technique Based on Sensitivity Levels for Multiple Numerical Sensitive Overlapped Attributes Hybrid Intelligent Systems, 10.1007/978-3-030-96305-7_5, (38-55),
- Thombare B and Soni D Prevention of SQL Injection Attack by Using Black Box Testing Proceedings of the 23rd International Conference on Distributed Computing and Networking, (266-272)
-
Singh O, Singh R and Saxena A AI And Precision Medicine For Oncology, SSRN Electronic Journal, 10.2139/ssrn.3566788
Index Terms
- Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ICTCS '14 | 270 | 97 | 36% |
Overall | 270 | 97 | 36% |