Advances in computing and information technology [electronic resource] : proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India. Volume 1 / Natarajan Meghanathan, Dhinaharan Nagamalai, and Nabendu Chaki (eds.)

The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The S...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: ACITY 2012 Chennai, India
Other Authors: Meghanathan, Natarajan, 1977-, Nagamalai, Dhinaharan, Chaki, Nabendu
Other title:ACITY.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Advances in intelligent systems and computing ; 176.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b7191143
006 m o d
007 cr |||||||||||
008 120711s2012 gw o 101 0 eng d
005 20240418144250.3
019 |a 812251667  |a 849294765  |a 961594747  |a 1058424510  |a 1066451148 
020 |a 9783642315138  |q (electronic bk.) 
020 |a 3642315135  |q (electronic bk.) 
020 |a 9783642315121  |q (print) 
020 |a 3642315127  |q (print) 
020 |z 3642315127 
024 7 |a 10.1007/978-3-642-31513-8 
024 8 |a 9786613943811 
035 |a (OCoLC)spr798818289 
035 |a (OCoLC)798818289  |z (OCoLC)812251667  |z (OCoLC)849294765  |z (OCoLC)961594747  |z (OCoLC)1058424510  |z (OCoLC)1066451148 
037 |a spr978-3-642-31513-8 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d ZMC  |d E7B  |d COO  |d CDX  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCO  |d N$T  |d OCLCF  |d BEDGE  |d VT2  |d OCLCO  |d OCLCQ  |d YDXCP  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d AZK  |d ESU  |d IOG  |d CEF  |d INT  |d U3W  |d AU@  |d WYU  |d OCLCQ  |d YOU  |d TKN  |d OCLCQ  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d AJS  |d OCLCQ 
049 |a GWRE 
050 4 |a TK5105.59  |b .A25 2012 
111 2 |a ACITY 2012  |d (2012 :  |c Chennai, India) 
245 1 0 |a Advances in computing and information technology  |h [electronic resource] :  |b proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India.  |n Volume 1 /  |c Natarajan Meghanathan, Dhinaharan Nagamalai, and Nabendu Chaki (eds.) 
246 3 |a ACITY. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a data file. 
490 1 |a Advances in intelligent systems and computing,  |x 2194-5357 ;  |v 176. 
505 0 0 |t Intelligent Network-Based Intrusion Detection System (iNIDS) /  |r P.R. Mahalingam --  |t Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password /  |r Tumpa Roy, Poonam Sisodia, Divye Upadhyay and Kamlesh Dutta --  |t Securing Multi-agent Systems: A Survey /  |r S.V. Nagaraj --  |t Personal Secret Information Based Authentication towards Preventing Phishing Attacks /  |r Gaurav Varshney, Ramesh Chandra Joshi and Anjali Sardana --  |t Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis /  |r Premraj Mahajan and Anjali Sardana --  |t An Integrated Intrusion Detection System for Credit Card Fraud Detection /  |r M. Sasirekha, I. Sumaiya Thaseen and J. Saira Banu --  |t Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems /  |r Majid Nezakatolhoseini, Sam Jabbehdari and Mohammad Ali Pourmina --  |t ECDLP Based Proxy Multi-signature Scheme /  |r Ramanuj Chouksey, R. Sivashankari and Piyush Singhai --  |t SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues /  |r D. Chandramohan, D. Veeraiah, M. Shanmugam, N. Balaji and G. Sambasivam, et al. --  |t Host-Based Bot Detection Using Destination White-Lists for User's Profile /  |r B. Soniya and M. Wilscy --  |t Effective Implementation and Evaluation of AES in Matlab /  |r Amish Kumar and Namita Tiwari --  |t Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts /  |r Priyanka Dey and Suparna Biswas --  |t An Obfuscated Implementation of RC4 /  |r Roger Zahno and Amr M. Youssef --  |t A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders /  |r Nur Al Hasan Haldar, Muhammad Abulaish and Syed Asim Pasha --  |t SLA for a Pervasive Healthcare Environment /  |r J. Valarmathi, K. Lakshmi, R.S. Menaga, K.V. Abirami and V. Rhymend Uthariaraj --  |t Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment /  |r Mayank Kumar Goyal and Alok Aggarwal. 
505 8 0 |t SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN /  |r Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra and Subrata Nandi --  |t Multi Tree View of Complex Attack -- Stuxnet /  |r Shivani Mishra, Krishna Kant and R.S. Yadav --  |t Secure Peer-Link Establishment in Wireless Mesh Networks /  |r Swathi Bhumireddy, Somanath Tripathy and Rakesh Matam --  |t Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT) /  |r Uttam Kr. Mondal and Jyotsna Kumar Mandal --  |t Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV /  |r Chaitali Biswas Dutta and Utpal Biswas --  |t English to Hindi Machine Translator Using GMT and RBMT Approach /  |r Ambrish Srivastav and Nitin Hambir --  |t Plugging DHCP Security Holes Using S-DHCP /  |r Amit Kumar Srivastava and Arun Kumar Misra --  |t Efficient Cryptography Technique on Perturbed Data in Distributed Environment /  |r Nishant Goswami, Tarulata Chauhan and Nishant Doshi --  |t A Novel Triangle Centroid Authentication Protocol for Cloud Environment /  |r K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna and S. Rubika --  |t Security and Availability of Data in the Cloud /  |r Ahtesham Akhtar Patel, S. Jaya Nirmala and S. Mary Saira Bhanu --  |t A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks /  |r Shanta Mandal and Rituparna Chaki --  |t A Cryptographic Approach towards Black Hole Attack Detection /  |r Pratima Sarkar and Rituparna Chaki --  |t Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels /  |r Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha and P. Dhavachelvan --  |t Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks /  |r Jagadeesh Kakarla and S. Siva Sathya --  |t Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links /  |r Mayank Kumar Goyal, Yatendra Kumar Verma, Paras Bassi and Paurush Kumar Misra. 
505 8 0 |t Personalised High Quality Search with in a Web Site: No User Profiling /  |r L.K. Joshila Grace, V. Maheswari and Dhinaharan Nagamalai --  |t Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System /  |r Tulsidas Patil, Ganesh Bhutkar and Noshir Tarapore --  |t Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control /  |r Sundarapandian Vaidyanathan --  |t String Matching Technique Based on Hardware: A Comparative Analysis /  |r Aakanksha Pandey and Nilay Khare --  |t Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks /  |r R. Shyamala and S. Valli --  |t Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network /  |r Chandra Thapa and C. Chandrasekhar --  |t Temporary Parallel Route Recovery for Frequent Link Failure in VANET /  |r B. Siva Kumar Reddy, M. Sakthi Ganesh and P. Venkata Krishna --  |t Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator /  |r Manjusha Karkhanis and Achala Deshmukh --  |t Efficient Target Recovery in Wireless Sensor Network /  |r Shailaja Patil, Ashish Gupta and Mukesh Zaveri --  |t Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System /  |r Soma Bandyopadhyay and Abhijan Bhattacharyya --  |t Improving TCP Performance in Hybrid Networks /  |r O.S. GnanaPrakasi and P. Varalakshmi --  |t Synchronization in Distributed Systems /  |r Amritha Sampath and C. Tripti --  |t NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component /  |r Debajyoti Mukhopadhyay, Sheetal Vij and Suyog Tasare --  |t Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor /  |r S. Indu Vadhani, G. Vithya and B. Vinayagasundaram --  |t Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network /  |r Suparna Biswas and Sarmistha Neogy --  |t Design of Broadband Optical Sources for OCDMA/WDMA Applications /  |r Lakshmi Priya, M. Meenakshi and G. Geetha. 
505 8 0 |t Localization in Wireless Sensor Network: A Distributed Approach /  |r Shailaja Patil and Mukesh Zaveri --  |t Web Mining and Security in E-commerce /  |r Shaikh Mohammed Atiq, Dayanand Ingle and B.B. Meshram --  |t Performance Improvement in MIMO Systems Using Rotating Codebooks /  |r J. Julia and M. Meenakshi --  |t Efficient Techniques for the Implementation of AES SubByte and MixColumn Transformations /  |r K. Rahimunnisa, M. Priya Zach, S. Suresh Kumar and J. Jayakumar --  |t Feature Selection for Detection of Ad Hoc Flooding Attacks /  |r Sevil Sen and Zeynep Dogmus --  |t Performance Analysis of SCTP Compared to TCP and UDP /  |r Nagesha and S.S. Manvi --  |t MSRCC -- Mitigation of Security Risks in Cloud Computing /  |r D. Chandramohan, T. Vengattaraman, M.S.S. Basha and P. Dhavachelvan --  |t Topology Construction of 3D Wireless Sensor Network /  |r Sarbani Roy and Nandini Mukherjee --  |t Design and Analysis of Dual Capacitively Loaded C-PIFA /  |r Kirti Dhwaj, Rachit Garg, Gaurav Mishra and Neetesh Purohit --  |t Jong Nang 3-Input NOR Channel, /  |r Moon Ho Lee, Md. Hashem Ali Khan and Daechul Park --  |t Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels /  |r Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran and Prabagarane Nagaradjane --  |t Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network /  |r C.H. Sandhya, Deepali R. Borade, Rinki Sharma and Govind R. Kadambi --  |t Reliability Enhanced Routing Protocol for Wireless Mesh Networks /  |r Rakesh Matam and Somanath Tripathy --  |t DARIH: Distributed Adaptive Routing via Information Highway in Sensor Network /  |r Monomita Mazumdar, Srimanta Halder, Prasenjit Chanak and Indrajit Banerjee --  |t A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks /  |r Preetha Theresa Joy and K. Polouse Jacob --  |t FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network /  |r Srimanta Halder, Monomita Mazumdar, Prasenjit Chanak and Indrajit Banerjee. 
505 8 0 |t Effective Resource Allocation Technique for Wireless Cellular System /  |r Banda Sreenivas, S. Ramesh Babu, S. Prabhakar and D. Karunakar Reddy --  |t Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots /  |r Rajesh P. Barnwal and Arnab Thakur --  |t Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack /  |r Payal Chaudhari and Hiteishi Diwanji --  |t Super Peer Deployment in Unstructured Peer-to-Peer Networks /  |r R. Venkadeshan and M. Jegatha --  |t Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN /  |r Subrata Dutta, Nandini Mukherjee, Monideepa Roy and Sarmistha Neogy --  |t Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK Modulation /  |r Gaurav Sikri and Rajni --  |t MERCC: Multiple Events Routing with Congestion Control for WSN /  |r Ayan Kumar Das and Rituparna Chaki --  |t Awareness Based Approach against E-Mail Attacks /  |r Gaurav Kumar Tak and Gaurav Ojha --  |t On the Fly File Dereplication Mechanism /  |r Paras Gupta, Manu Vardhan, Akhil Goel, Abhinav Verma and Dharmender Singh Kushwaha --  |t Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services /  |r Durgesh Bajpai, Manu Vardhan, Sachin Gupta, Ravinder Kumar and Dharmender Singh Kushwaha --  |t Load Balancing in Cluster Using BLCR Checkpoint/Restart /  |r Hemant Hariyale, Manu Vardhan, Ankit Pandey, Ankit Mishra and Dharmender Singh Kushwaha --  |t Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging /  |r Utpal Nandi and Jyotsna Kumar Mandal --  |t Human Tracking in Video Surveillance /  |r Helly Patel and Mahesh P. Wankhade --  |t Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET /  |r Manpreet Kaur, Rajni and Parminder Singh --  |t An Efficient Approach to Secure Routing in MANET /  |r Dipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha and Debika Bhattacharyya, et al. --  |t Trust Oriented Secured AODV Routing Protocol against Rushing Attack /  |r Swarnali Hazra and S.K. Setua --  |t SEPastry: Security Enhanced Pastry /  |r Madhumita Mishra, Somanath Tripathy and Sathya Peri --  |t Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR /  |r Koushik Majumder, Sudhabindu Ray and Subir Kumar Sarkar. 
520 |a The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes. 
546 |a English. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490. 
650 0 |a Computer science  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101220. 
650 0 |a Information technology  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008104441. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341. 
650 7 |a Computer science.  |2 fast  |0 (OCoLC)fst00872451. 
650 7 |a Information technology.  |2 fast  |0 (OCoLC)fst00973089. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Meghanathan, Natarajan,  |d 1977-  |0 http://id.loc.gov/authorities/names/no2009203282  |1 http://isni.org/isni/0000000098608479. 
700 1 |a Nagamalai, Dhinaharan.  |0 http://id.loc.gov/authorities/names/no2011005178  |1 http://isni.org/isni/0000000120360917. 
700 1 |a Chaki, Nabendu.  |0 http://id.loc.gov/authorities/names/no2011005177  |1 http://isni.org/isni/0000000114109507. 
776 0 8 |i Print version:  |z 9786613943811. 
830 0 |a Advances in intelligent systems and computing ;  |v 176.  |0 http://id.loc.gov/authorities/names/no2012152797. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-31513-8  |z Full Text (via Springer) 
907 |a .b71911431  |b 04-01-21  |c 09-28-12 
998 |a web  |b 03-31-21  |c b  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b71911431  |b 03-31-21  |c 09-28-12 
944 |a MARS - RDA ENRICHED 
956 |b Springer Nature - Springer Engineering eBooks 2012 English International 
915 |a - 
956 |a Springer e-books 
956 |b Springer Nature - Springer Engineering eBooks 2012 English International 
999 f f |i 7c049700-d392-5d02-a70e-5ae99eaf9c18  |s fe2d2ff2-8e3e-5565-bbdb-46d81d57eea9 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TK5105.59 .A25 2012  |h Library of Congress classification  |i Ebooks, Prospector  |n 1