Browse by year :
(4596) Papers Found

An Approach to Image Segmentation using K-means Clustering Algorithm

Author(s) : A.A KHURSHID, CHINKI CHANDHOK, SONI CHATURVEDI
Abstract: This paper presents a new approach for image segmentation by applying k-means algorithm. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means clustering algorithm is one of the most widely used algorithm in the literature, an...     Read More
Keywords: K-means Algorithm, Clustering, local minimum, global minimum, Segmentation.
Conference Title : First International Conference on Advances in Computer, Electronics and Electrical Engineering - CEEE 2012
Conference Date(s) : 2012-03-25
Place : Hotel Vits, Mumbai, India
No fo Author(s) : 3
Page(s) : 197 - 201
Electronic ISBN : 978-981-07-1847-3
Views : 827   |   Download(s) : 111

Improvement Authentication of Routing Protocols for Mobile Ad Hoc Networks

Author(s) : AHMAD ALOMARI
Abstract: Ad Hoc network Consist of mobile hosts (or nodes) which communicate with other nodes through wireless medium without any fixed infrastructure. Dynamic network topology: the mobile nodes are free to move randomly and organize themselves arbitrarily the wireless links in this network are highly error ...     Read More
Keywords: authentification, routing protocol, hash function, AODV, metaID.
Conference Title : International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012
Conference Date(s) : 2012-02-02
Place : VITS - Luxury Business Hotel, Delhi-NCR, India
No fo Author(s) : 1
Page(s) : 271 - 276
Electronic ISBN : 978-981-07-1403-1
Views : 753   |   Download(s) : 149

Physical Analysis of OFDM based IEEE 802.11a for Multipath Rayleigh Channel

Author(s) : SWAPNITA R. DHABRE
Abstract: Wireless local area networks(W-LANs) have become increasingly popular due to the recent availability of affordable devices that are capable of communicating at high data rates.The IEEE 802.11a standard is WLAN standard which uses orthogonal frequency division multiplexing technology.The standard pro...     Read More
Keywords: OFDM, WLAN, BER,SNR, RBAR.
Conference Title : First International Conference on Advances in Computer, Electronics and Electrical Engineering - CEEE 2012
Conference Date(s) : 2012-03-25
Place : Hotel Vits, Mumbai, India
No fo Author(s) : 1
Page(s) : 192 - 196
Electronic ISBN : 978-981-07-1847-3
Views : 743   |   Download(s) : 129

Reliable Protection Scheme Against Cooperative Black Hole Attack in MANET

Author(s) : MAHENDRA SINGH SISODIA, PRANAV TRIPATHI, SANJAY SHARMA
Abstract: Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Black Hole At...     Read More
Keywords: MANET, AODV, Cooperative Black Hole, TCP, UDP, ns-2.
Conference Title : International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012
Conference Date(s) : 2012-02-02
Place : VITS - Luxury Business Hotel, Delhi-NCR, India
No fo Author(s) : 3
Page(s) : 263 - 270
Electronic ISBN : 978-981-07-1403-1
Views : 698   |   Download(s) : 119

Used of Various Edge Detection Operator for Feature Extraction in Video Scene

Author(s) : BHARATRATNA P. GAIKWAD, GANESH R.MANZA, RAMESH R. MANZA
Abstract: This paper presents the implementation of an adaptive edge-detection using Simulink. Simulink is a simulation modeling and design tool and GUI based diagram environment. The Simulink based customizable framework is designed for rapid simulation, implementation, and verification of video and image pr...     Read More
Keywords: Edge Detection, Sobel, Prewitt, Canny, Simulink.
Conference Title : First International Conference on Advances in Computer, Electronics and Electrical Engineering - CEEE 2012
Conference Date(s) : 2012-03-25
Place : Hotel Vits, Mumbai, India
No fo Author(s) : 3
Page(s) : 187 - 191
Electronic ISBN : 978-981-07-1847-3
Views : 787   |   Download(s) : 194

A Security Mechanism for Remote Monitoring System Security using Smartphone

Author(s) : CHAU NGOC TU, SOUHWAN JUNG, SUNGJAE YU
Abstract: This paper proposes a security mechanism for remote monitoring system through a combination between user's password and random number by using SMS service over 3G networks. By using random number and phone number, this mechanism is not only able to provide robust security from replay attack and dict...     Read More
Keywords: component; Remote monitoring system; Smartphone; Security event; Security alarm
Conference Title : International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012
Conference Date(s) : 2012-02-02
Place : VITS - Luxury Business Hotel, Delhi-NCR, India
No fo Author(s) : 3
Page(s) : 258 - 262
Electronic ISBN : 978-981-07-1403-1
Views : 681   |   Download(s) : 160

Implementation of Watermarking Techniques in Images and Videos using 2D-DWT/IDWT Compression and Decompression Methods

Author(s) : CHAITRA S. K, KRISHNA BHUSHAN VUTUKURU, LOURTS DEEPAK A, RANJITH KUMAR S.
Abstract: Nowadays in every field there is an enormous use of digital contents handled with the help of Internet, Multimedia and Network system in digital form. There are more chances of copying of such digital information, so that the necessity of prohibiting illegal activities. The watermarking is the power...     Read More
Keywords: Watermarking in videos and images; MATLAB; 2D-DWT;
Conference Title : International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012
Conference Date(s) : 2012-02-02
Place : VITS - Luxury Business Hotel, Delhi-NCR, India
No fo Author(s) : 4
Page(s) : 253 - 257
Electronic ISBN : 978-981-07-1403-1
Views : 674   |   Download(s) : 136

M-FISH Chromosome Images Classification by watershed based Segmentation Approach

Author(s) : LIJIYA A, SREEJINI K.S, V. K. GOVINDAN
Abstract: Karyotyping is a technique used to display and study the human chromosomes for detecting abnormalities, genetic disorders or defects. M-FISH (Multiplex Fluorescent In-Situ Hybridization) provides color karyotyping. In this paper, naive Bayes classification of M-FISH chromosome images based on waters...     Read More
Keywords: M-FISH, chromosome, segmentation, karyotyping, watershed transform, Bayes classifier.
Conference Title : First International Conference on Advances in Computer, Electronics and Electrical Engineering - CEEE 2012
Conference Date(s) : 2012-03-25
Place : Hotel Vits, Mumbai, India
No fo Author(s) : 3
Page(s) : 182 - 186
Electronic ISBN : 978-981-07-1847-3
Views : 754   |   Download(s) : 191

Design of OTA based Chebyshev 5th Order Low Pass Filter in 0.18µm CMOS Technology

Author(s) : D.S AJNAR, GAURAV BHARGAVA, NEERAJ SHRIVASTAVA, PRAMOD KUMAR JAIN
Abstract: The design of OTA based low pass filter for video applications in Broadband Communication is described in this paper. A low-pass, fifth-order Chebyshev filter based on the Folded Cascode Operational Trans conductance Amplifier in0.18 um CMOS process is designed.Folded Cascode OTA is chosen as it all...     Read More
Keywords: Analog IC design, Folded Cascode OTA, Chebyshev low pass filter.
Conference Title : International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012
Conference Date(s) : 2012-02-02
Place : VITS - Luxury Business Hotel, Delhi-NCR, India
No fo Author(s) : 4
Page(s) : 249 - 252
Electronic ISBN : 978-981-07-1403-1
Views : 753   |   Download(s) : 152

ECG Compression and Encryption Techniques for Diagnosis of Cardiovascular Disease — This is a Diagonosis of Cardiovascular Disease

Author(s) : P.SANTHI, V.MURALIBHASKARAN
Abstract: The cardiovascular disease is number one killer of the world for both men and women. The ECG signal is mainly used to monitoring this type disease. In this paper proposes the compression of ECG signals and provide the encryption for that signals. The encryption technique of ECG signal is used to pro...     Read More
Keywords: Compression, Encryption, Security, ECG, Hybrid algorithm.
Conference Title : International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012
Conference Date(s) : 2012-02-02
Place : VITS - Luxury Business Hotel, Delhi-NCR, India
No fo Author(s) : 2
Page(s) : 245 - 248
Electronic ISBN : 978-981-07-1403-1
Views : 667   |   Download(s) : 179