Proceedings of the third International Conference on Trends in Information, Telecommunication and Computing /
The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunicatio...
Saved in:
Corporate Authors: | ; |
---|---|
Group Author: | |
Published: |
Springer,
|
Publisher Address: | New York, NY : |
Publication Dates: | 2013. |
Literature type: | eBook |
Language: | English |
Series: |
Lecture notes in electrical engineering ; v.150. |
Subjects: | |
Online Access: |
http://dx.doi.org/10.1007/978-1-4614-3363-7 |
Summary: |
The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunication Technology. This book provides a broad vision for the future of research in these fields with ideas on how to support these new technologies currently practice. Every submitted paper received a careful review from the committee and the final accept/reject decisions were made by the co-chairs on the bases of recommendations from the committee members. |
Item Description: | International conference proceedings. |
Carrier Form: | 1 online resource. |
Bibliography: | Includes bibliographical references. |
ISBN: |
9781461433637 (electronic bk.) 1461433630 (electronic bk.) |
Index Number: | TK5105 |
CLC: | TP393-532 |
Contents: |
Full Papers -- High Through-Put VLSI Architecture for FFT Computation / Formal Approach to Reliability Improvement with Model Checker / DDoS Attacks Defense System Using Information Metrics / CEAR: Cluster based Energy Aware Routing Algorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs) / TGAR: Trust Dependent Greedy Anti-Void Routing in Wireless Sensor Networks (WSNs) / DoS Attack-Resistant Framework for Client/Server Intelligent Computing / Effect of Forwarding Strategy on the Life Time of Multi-Hop Multi-Sink Sensor Networks / Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine / Aspect Dependency Analyzer Framework for Aspect Oriented Requirements / Hybrid Extremal Optimization and Glowworm Swarm Optimization / Implementation of New Technique for the Capacity Improvement in Wavelength Division Multiplexing Networks / A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems / Developing Embedded Systems from Formal Specifications Written in Temporal Logic / Network Log Clustering Using K-Means Algorithm / Improvement Public Key Kerberos Using Identity-Based Signcryption / Intrusion Detection Using Keystroke Dynamics / MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform / Comparison of Routing Protocols in Mobile Ad-hoc Network / Analysis of Image Segmentation Algorithms Using MATLAB / Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions / Mean-Shift Algorithm: Verilog HDL Approach / Optimal Node Selection Using Estimated Data Accuracy Model in Wireless Sensor Networks / Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC) / Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators / Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks / Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation / Performance Analysis of Different Current Controllers for Active Power Filter / Optimum LQR Switching Approach for the Improvement of STATCOM Performance / Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine / Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers / Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters / A Novel Inverter Topology for Low Power Drives / Enhancement of ATC in Presence of SSSC Using Linear and Reactive Methods / Improvement of Power Quality and Performance Analysis of PV Fed UPQC in Utility Connected System / Design of Adaptive FLANN Based Model for Non-Linear Channel Equalization / A Security Framework for DDoS Detection In MANETs / Short Papers -- Optimal and Robust Framework for Enhancing Network Lifetime Using Power Efficient AODV in Mobile Ad-hoc Network / Voice Transformation Using Radial Basis Function / IPTC Based Ontological Representation of Educational News RSS Feeds / Design of Optimized Modular Multiplier Using Montgomery Algorithm for RSA Cryptosystem / Automatic Generation of P2P Botnet Network Attack Graph / Parallelization of Fractal Image Compression Over CUDA / Distributed Shared Files Management / Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization / Parallel Pseudo-Exhaustive and Low Power Delay Testing of VLSI Systems / An Algorithm for Traffic Analysis Using RFID Technology / Trust-Based Grid Resource Management / Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach / An Approach to Encryption Using Superior Fractal Sets / Shape Based Image Retrieval Using Gradient Operators and Block Truncation Coding / Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-hoc Network / Security Based Requirements Engineering for E-Voting System / Analysis of 3 Dimensional Object Watermarking Techniques / Graph Based Approach for Heart Disease Prediction / Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks / An Efficient Algorithm for Finding Frequent Sequential Traversal Patterns from Web Logs Based on Dynamic Weight Constraint / A Blind Watermarking Algorithm for Audio Signals Based on Singular Value Decomposition / Performance Evaluation of Web Browsers in Android / FPGA Triggered Space Vector Modulated Voltage Source Inverter Using MATLAB/System Generator?/ Face Recognition Using PCA and Bit-Plane Slicing / Operational Analysis, Performance Evaluation and Simulation of Solar Cell Powered Embedded EZ-Source Inverter Fed Induction Motor / Advanced DSP Based PLC Modem Over DC Lines for Real-Time Remote Monitoring of PV Plant Parameters / Digital Security with Thermal Dorsal Hand Vein Patterns Using Morphological Techniques / Design of a Two Phase Inverter for a Specific Two Phase Induction Motor Through MATLAB Simulation / Artificial Neural Network Based Power System Stability Analysis / Poster Papers -- Efficient Bandwidth Utilization in Client-Server Models / Vlsi Approach for Four Quadrant Analog Multiplier for 2.4 Ghz to 2.5 Ghz / Intelligent Enterprise Application Servers: A Vision for Self-Managing Performance / A Review of Disc Scrubbing and Intra Disk Redundancy for Reducing Data Loss in Disk FileSystems / Homogeneous and Heterogeneous Energy Schemes for Hierarchical Cluster Based Routing Protocols in WSN: A Survey / Itinerary Management System / Trust and Reliability Based Scheduling Algorithm for Cloud IaaS / Hybrid Covert Channel an Obliterate for Information Hiding / Steganography and Its Technique: Technical Overview / Data Stream Mining: A Review / Comparison of Various Harmonic Mitigation Techniques in Induction Furnaces / 637-644 / 645-653 / 655-668 / |