Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing


ISBN: 978-1-4614-3362-0 (Print) 978-1-4614-3363-7 (Online)

Table of contents (79 chapters)

previous Page of 4
  1. Front Matter

    Pages i-xiv

  2. Full Papers

    1. Front Matter

      Pages 561-561

    2. Chapter

      Pages 3-13

      High Through-Put VLSI Architecture for FFT Computation

    3. Chapter

      Pages 15-24

      Formal Approach to Reliability Improvement with Model Checker

    4. Chapter

      Pages 25-30

      DDoS Attacks Defense System Using Information Metrics

    5. Chapter

      Pages 31-37

      CEAR: Cluster based Energy Aware Routing Algorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs)

    6. Chapter

      Pages 39-45

      TGAR: Trust Dependent Greedy Anti-Void Routing in Wireless Sensor Networks (WSNs)

    7. Chapter

      Pages 47-53

      DoS Attack-Resistant Framework for Client/Server Intelligent Computing

    8. Chapter

      Pages 55-64

      Effect of Forwarding Strategy on the Life Time of Multi-Hop Multi-Sink Sensor Networks

    9. Chapter

      Pages 65-74

      Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine

    10. Chapter

      Pages 75-81

      Aspect Dependency Analyzer Framework for Aspect Oriented Requirements

    11. Chapter

      Pages 83-89

      Hybrid Extremal Optimization and Glowworm Swarm Optimization

    12. Chapter

      Pages 91-98

      Implementation of New Technique for the Capacity Improvement in Wavelength Division Multiplexing Networks

    13. Chapter

      Pages 99-106

      A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems

    14. Chapter

      Pages 107-113

      Developing Embedded Systems from Formal Specifications Written in Temporal Logic

    15. Chapter

      Pages 115-124

      Network Log Clustering Using K-Means Algorithm

    16. Chapter

      Pages 125-136

      Improvement Public Key Kerberos Using Identity-Based Signcryption

    17. Chapter

      Pages 137-144

      Intrusion Detection Using Keystroke Dynamics

    18. Chapter

      Pages 145-151

      MRI–PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform

    19. Chapter

      Pages 153-162

      Comparison of Routing Protocols in Mobile Ad-hoc Network

    20. Chapter

      Pages 163-172

      Analysis of Image Segmentation Algorithms Using MATLAB

    21. Chapter

      Pages 173-180

      Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions

previous Page of 4