Institute of Research Engineers and Doctors

Support Center
Support Center
  • E-mail: support@theired.org
  • Phone Support
    Tel : +1-(212) 901-3781
    Fax : +1-(212) 901-3786
  • IRED Headquarters
  • 42 Broadway, Suite 12-217, New York, NY 10004, USA

 Helpline: +1- (212) 901-3781
Login 
   

Search 9500+ Documents

Advance search
Search Categories
 Paper Title
 Abstract
 Publisher
 Author
 DOI
 UDI
Search Tips
Search Tips
  • Search with only the important (key)words about your topic or question (don't use sentences)
  • Search Fields: Metadata Only (not full text). Use Advanced Search to expand search to include full text.
  • Content Types: Journals, Conference Proceedings.
  • Publishers: UACEE, UAMAE.
Safe Search
Safe Search
  • A feature that lets you filter implicit web sites contents and images from your search results.
  • Content Types: Journals, Conference Proceedings.
  • Publishers: UACEE, UAMAE.
 
               

International Conference on Advances in Computer Science and Electronics Engineering - CSEE 2012

               
 

 

     

Result per page

 
  • Cover Page Page(s):
     PDF Download(s): 183
  • Table of Contents Page(s): i - iv
     PDF Download(s): 146
  • Ownership Identification using Discrete Wavelet Transform (DWT)-based LOGO Watermarking DOI: 10.3850/978-981-07-1403-1_107
    Page(s): 1 - 5
    Author(s):T MITA KUMARI,GAYADHAR PANDA

     ABSTRACT     PDF Download(s): 146
    Abstract View(s): 1149
  • Clustering of Text Document using Kea-means with F-measure DOI: 10.3850/978-981-07-1403-1_185
    Page(s): 6 - 9
    Author(s):M.J.YEOLA

     ABSTRACT     PDF Download(s): 108
    Abstract View(s): 1077
  • Performance Comparision of LEACH, SEP and DEEC Protocol in Wireless Sensor Network DOI: 10.3850/978-981-07-1403-1_198
    Page(s): 10 - 15
    Author(s):TRIPTI SHARMA,GEETAM SINGH TOMAR,BRIJESH KUMAR

     ABSTRACT     PDF Download(s): 145
    Abstract View(s): 1159
  • Embedded Multiprocessor Architecture using VHDL DOI: 10.3850/978-981-07-1403-1_202
    Page(s): 16 - 20
    Author(s):SUMEDH.S.JADHAV,C.N.BHOYAR

     ABSTRACT     PDF Download(s): 161
    Abstract View(s): 1143
  • Malware Incident Handling DOI: 10.3850/978-981-07-1403-1_210
    Page(s): 21 - 25
    Author(s):M.MOHAMMED ASHIK,A.SANKARA NARAYANAN

     ABSTRACT     PDF Download(s): 117
    Abstract View(s): 1133
  • Controlling Free Riding using Extended Point based Incentive Mechanism in Peer-to-Peer Networks DOI: 10.3850/978-981-07-1403-1_211
    Page(s): 26 - 33
    Author(s):SHRADDHA DIXIT,BIKASH UPADHYAY

     ABSTRACT     PDF Download(s): 189
    Abstract View(s): 1190
  • Missing Value Estimation in DNA Microarray A Fuzzy Approach DOI: 10.3850/978-981-07-1403-1_214
    Page(s): 34 - 39
    Author(s):SUMIT CHAKRABORTY,SUJAY SAHA,KASHINATH DEY

     ABSTRACT     PDF Download(s): 172
    Abstract View(s): 1178
  • Design and Analysis of the Control System of High Voltage (400kV DC) Power Supply for Neutron Generator DOI: 10.3850/978-981-07-1403-1_221
    Page(s): 40 - 44
    Author(s):TARUN PATEL,RAM KUMAR PAUL,P.S. ADHIKARI

     ABSTRACT     PDF Download(s): 156
    Abstract View(s): 1122
  • A Survey on Offline-Methods of Character Segmentation DOI: 10.3850/978-981-07-1403-1_222
    Page(s): 45 - 51
    Author(s):THAKKAR NIRAV B,RUCHITA TAILOR,KRUTI J DANGARWALA,KANDARP PANDYA,JUHI KANERIA

     ABSTRACT     PDF Download(s): 134
    Abstract View(s): 1149
  • Security Challenges & Resolutions in Cloud Computing DOI: 10.3850/978-981-07-1403-1_223
    Page(s): 52 - 60
    Author(s):SANDEEP JAIN

     ABSTRACT     PDF Download(s): 120
    Abstract View(s): 1207
  • E-Waste Management Why to go for it? DOI: 10.3850/978-981-07-1403-1_224
    Page(s): 61 - 66
    Author(s):SIDDHARTHA GUPTA,ADITI MAKOL

     ABSTRACT     PDF Download(s): 177
    Abstract View(s): 1210
  • Low Power 1-Bit 9T Full Adder Cell using XNOR Logic DOI: 10.3850/978-981-07-1403-1_225
    Page(s): 67 - 69
    Author(s):TRIPTI SHARMA,SHIWANI SINGH,K. G. SHARMA,B. P. SINGH

     ABSTRACT     PDF Download(s): 160
    Abstract View(s): 1166
  • Debug and Optimization Techniques for Performance Enhancement of Termination Application in Real Time System DOI: 10.3850/978-981-07-1403-1_235
    Page(s): 70 - 72
    Author(s):YASHPAL DUTTA,SANDEEP MALIK

     ABSTRACT     PDF Download(s): 164
    Abstract View(s): 1065
  • Implementation of Reconstruction of Underwater Image using FPGA DOI: 10.3850/978-981-07-1403-1_241
    Page(s): 73 - 76
    Author(s):R.C. IYER,MANGESH KAKDE

     ABSTRACT     PDF Download(s): 165
    Abstract View(s): 1157
  • Encryption Mechanism for System-on-Chip using miniDES Algorithm with Digital Signature for Secure Communication of Embedded Real Time Applications DOI: 10.3850/978-981-07-1403-1_245
    Page(s): 77 - 82
    Author(s):KURRA MALLAIAH

     ABSTRACT     PDF Download(s): 208
    Abstract View(s): 1131
  • Elliptic Curve Cryptographic Algorithm DOI: 10.3850/978-981-07-1403-1_246
    Page(s): 83 - 87
    Author(s):SANTOSHI KETAN POTE

     ABSTRACT     PDF Download(s): 149
    Abstract View(s): 1065
  • Implementation, Analysis and Application of Retroactive Data Structures DOI: 10.3850/978-981-07-1403-1_247
    Page(s): 88 - 92
    Author(s):SUNEETA AGARWAL,PRAKHAR PANWARIA

     ABSTRACT     PDF Download(s): 185
    Abstract View(s): 1127
  • Transaction Security of Mobile Payments using IMEI Number and Call Back Technique DOI: 10.3850/978-981-07-1403-1_252
    Page(s): 93 - 96
    Author(s):SONALI BHUTAD,SACHIN BOJEWAR,KAJAL JEWANI

     ABSTRACT     PDF Download(s): 184
    Abstract View(s): 1138
  • Performance Analysis of Web based Applications on Single and Multi Core Servers DOI: 10.3850/978-981-07-1403-1_260
    Page(s): 97 - 101
    Author(s):GITIKA KHARE,DIPTIKANT PATHY,ANIL RAWAT,ALPANA RAJAN,ALOK JAIN

     ABSTRACT     PDF Download(s): 112
    Abstract View(s): 1134
  • Multiple Routing Algorithm for Wireless Ad Hoc Network DOI: 10.3850/978-981-07-1403-1_262
    Page(s): 102 - 105
    Author(s):PRAJAKTA RANE,KSHAMA KULLHALI

     ABSTRACT     PDF Download(s): 203
    Abstract View(s): 1104
  • Design of Microcontroller based Wireless SCADA System for Real Time Data DOI: 10.3850/978-981-07-1403-1_263
    Page(s): 106 - 108
    Author(s):SUMIT BALGUVHAR,NEERAJ KHERA

     ABSTRACT     PDF Download(s): 111
    Abstract View(s): 1151
  • Development of Wireless Sensor Network (WSN) for Remote Monitoring of Illegal Cutting Trees in Forest DOI: 10.3850/978-981-07-1403-1_265
    Page(s): 109 - 113
    Author(s):R.V. KSHIRSAGAR,MAMTA SARDE

     ABSTRACT     PDF Download(s): 143
    Abstract View(s): 1134
  • A Rule Extraction based on the Rough Set Theory with Decremental Data DOI: 10.3850/978-981-07-1403-1_295
    Page(s): 114 - 118
    Author(s):ZHI-XING CHEN,YING-LING HSIEH,HORNG-FU CHUANG,CHUN-CHE HUANG

     ABSTRACT     PDF Download(s): 136
    Abstract View(s): 1114

CSEE-2012

  • CHIEF EDITOR:
    Dr. R.K. Singh
  • ISBN:
    978-981-07-1403-1
  • CONFERENCE DATE:
    February 2-3, 2012
  • ASSOCIATED NETWORK:
    UACEE
  • RELATED SUBJECTS:
    Computer Networks
    Network Security
    Computer Science Applications
    Neural Networks
    Digital Signal Processing
    Satellite Communication
    Electronics Engineering and related areas
  • CONFERENCE VENUE:
    VITS - Luxury Business Hotel, Delhi-NCR, India
  • RELATED LINKS:
    Conference Calender
  • CONTACT DETAILS:
    conferences@theired.org
  • Recently Viewed Publications