Skip to main content
    • by 
    •   12  
      Computer ScienceComputer SecurityAIAdvanced Computing
ABSTRACT
    • by 
    •   14  
      Ant Colony OptimizationVLSIBiologically inspired computingAdvanced Computing
The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the... more
    • by 
    •   12  
      Computer ScienceStatistical AnalysisAdvanced ComputingTraffic Flow
The present paper discusses the problem of estimating the finite population mean in simple random sampling. A class of estimators has been proposed using information on an auxiliary variable and its properties are studied. It has been... more
    • by 
    • Advanced Computing
Horizontally overlapping lines are normally found in printed newspapers of any Indian script. Along with these overlapping lines few other broken components of a line (strip) having text less than a complete line are also found in text.... more
    • by 
    •   2  
      Computational IntelligenceAdvanced Computing
In ant societies, and, more in general, in insect societies, the activities of the individuals, as well as of the society as a whole, are not regulated by any explicit form of centralized control. On the other hand, adaptive and robust... more
    • by 
    •   15  
      Ant Colony OptimizationVLSIBiologically Inspired RoboticsAdvanced Computing
Molecular Dynamics (MD) is one of processes that requires High Performance Computing environments to complete its jobs. In the preparation of virtual screening experiments, MD is one of the important processes particularly for tropical... more
    • by  and +1
    •   5  
      Parallel ComputingAdvanced ComputingBioinformatics, Computational and Systems BiologyHigh-performance computing, GPU programming
https://cndc2020.org/acity/index.html Scope & Topics 10 th International Conference on Advances in Computing and Information Technology (ACITY 2020) will provide an excellent international forum for sharing knowledge and results in... more
    • by 
    •   17  
      Grid ComputingHigh Performance ComputingQuantum ComputingObject Oriented Programming
In content-based image retrieval (CBIR), content of an image can be expressed in terms of different features such as color, texture, and shape. In this paper, the color information of an image is represented by the Global HSV Color... more
    • by 
    •   7  
      Advanced ComputingContent based image retrievalImage RetrievalAdjacency Matrix
    • by 
    •   17  
      Computer ScienceGrid ComputingSoftware EngineeringInformation Technology
In digital electronics, the power dissipation is the major problem. So that the reversible gate can be implemented in microelectronics and electronics which have low power dissipation in the digital designing because, in the reversible... more
    • by 
    •   2  
      PhysicsAdvanced Computing
In this paper Advanced Encryption Standard (AES) algorithm has been designed and implemented as custom hardware. The algorithm is controlled through C-code written in NIOS II IDE. AES as a custom hardware is interfaced with the system... more
    • by 
    •   9  
      Grid ComputingHigh Performance ComputingAspect-Oriented ProgrammingData Mining
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this... more
    • by 
    •   19  
      Computer ScienceAlgorithmsDistributed ComputingSoftware Engineering
Distributed, event based applications executing on publishsubscribe middleware (aka Event Based Middleware or EBM) are subject to many disruptive changes at runtime. These changes can be caused either by a change in environmental... more
    • by 
    •   5  
      MiddlewareAdvanced ComputingPublish/subscribeEnvironmental Conditions
In ant societies, and, more in general, in insect societies, the activities of the individuals, as well as of the society as a whole, are not regulated by any explicit form of centralized control. On the other hand, adaptive and robust... more
    • by 
    •   5  
      EngineeringAnt Colony OptimizationAdvanced ComputingTelecommunication Networks
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and... more
    • by 
    •   4  
      Quantum ComputingDNA computingAdvanced ComputingCyber Security
Security/privacy issues are of paramount importance for widespread acceptance and use of RFID tags. Over the past few years, researchers have addressed this issue through lightweight cryptographic means. A majority of existing literature... more
    • by 
    •   5  
      Vendor Managed InventoryAdvanced ComputingSecurity AnalysisCryptographic Protocols
Integration testing of Complex Embedded systems (CES) and associated interconnection network has not been discussed much in the literature. This paper focuses on integration testing among Embedded Processing Components (EPCs) that are... more
    • by 
    •   3  
      Advanced ComputingFault LocalizationEmbedded System
The finite cell method (FCM) belongs to the class of immersed boundary methods, and combines the fictitious domain approach with high-order approximation, adaptive integration and weak imposition of unfitted Dirichlet boundary conditions.... more
    • by 
    • Advanced Computing
Wireless capsule endoscopy (WCE) is relatively a new device which investigates the entire gastrointestinal (GI). About 55000 frames are captured during an examination (two frames per second). Thus, it is bene icial to ind an automatic... more
    • by 
    • Advanced Computing
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands... more
    • by 
    •   9  
      CryptographyAdvanced ComputingHandheld Device UseWorld Wide Web
8 th International conference on Advanced Computing (ADCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information... more
    • by 
    •   13  
      Grid ComputingHigh Performance ComputingQuantum ComputingAspect-Oriented Programming
- Though beaconless geographic routing protocols get rid of the overhead caused by the periodic beacon messages to be broadcast in case of beacon based approaches. But, most of the existing beaconless routing protocols do not consider... more
    • by 
    •   9  
      Wireless Sensor NetworksRouting protocolsAdvanced ComputingRouting Protocol
8th International conference on Advanced Computing (ADCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information... more
    • by 
    •   19  
      Grid ComputingParallel ComputingSoftware EngineeringOntology
AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result... more
    • by 
    •   8  
      AIAdvanced ComputingCybersecuritypower system Automation
In the domain of image processing, face recognition is one of the most well-known research field. When humans have very similar biometric properties, such as identical twins, the face recognition system is considered as a challengeable... more
    • by 
    •   12  
      Computer ScienceSoftware EngineeringArtificial IntelligenceKnowledge Management
Automatic data clustering through determination of optimal number of clusters from the data content, is a challenging proposition. Lack of knowledge regarding the underlying data distribution poses constraints in proper determination of... more
    • by 
    •   7  
      Evolutionary ComputationFuzzy set theoryDifferential EvolutionAdvanced Computing
Though beaconless geographic routing protocols get rid of the overhead caused by the periodic beacon messages to be broadcast in case of beacon based approaches. But, most of the existing beaconless routing protocols do not consider... more
    • by 
    •   9  
      Wireless Sensor NetworksRouting protocolsAdvanced ComputingRouting Protocol
Color, texture and shape information have been the primitive image descriptors in content based image retrieval systems. This paper presents a novel framework for combining all the three i.e. color, texture and shape information, and... more
    • by 
    •   8  
      Computer ScienceAdvanced ComputingContent based image retrievalImage Retrieval
    • by 
    •   7  
      PrivacySecurityPervasive ComputingBiometrics
Intermittent availability of grid resources results in delays or failures of application execution. Hence, the reliability of application execution declines. In order to achieve a reliable application execution, a consistent availability... more
    • by 
    •   2  
      Computer ScienceAdvanced Computing
8th International conference on Advanced Computing (ADCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information... more
    • by 
    •   13  
      Grid ComputingHigh Performance ComputingQuantum ComputingAspect-Oriented Programming
February 20~21, 2021, Dubai, UAE https://necom2021.org/adco/index Scope 8 th International Conference on Advanced Computing (ADCO 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology... more
    • by 
    •   13  
      Grid ComputingHigh Performance ComputingQuantum ComputingAspect-Oriented Programming
Hand gestures recognition is the natural way of Human Machine interaction and today many researchers in the academia and industry are interested in this direction. It enables human being to interact with machine very easily and... more
    • by 
    •   8  
      Fuzzy LogicSoft ComputingAdvanced ComputingHand Gesture Recognition
Hand gestures recognition is the natural way of Human Machine interaction and today many researchers in the academia and industry are interested in this direction. It enables human being to interact with machine very easily and... more
    • by 
    •   8  
      Fuzzy LogicSoft ComputingAdvanced ComputingHand Gesture Recognition
Aliasing occurs when two variables refer to the same memory location. This technique has been exploited for constructing resilient obfuscation transforms in languages that extensively use indirect referencing. The theoretical basis for... more
    • by  and +1
    • Advanced Computing
In digital electronics, the power dissipation is the major problem. So that the reversible gate can be implemented in microelectronics and electronics which have low power dissipation in the digital designing because, in the reversible... more
    • by 
    •   3  
      PhysicsAdvanced ComputingReversible Logic Circuits
The success of web services has influenced the way in which Grid applications are being written. Web services are increasingly used as a means to realise service-oriented distributed computing. Grid users often submit their applications... more
    • by 
    •   13  
      Computer ArchitectureDistributed ComputingGrid ComputingComputational Modeling
Abstract Grid is a collection of distributed computing resources that performs tasks in co-ordination to achieve high-end computational capabilities by dividing a given task into sub-tasks. Each sub-task could be large and run for several... more
    • by 
    •   8  
      Distributed ComputingGrid ComputingSchedulingDistributed System
Page 1. STUDY OF PATTERN STORAGE TECHNIQUE IN SELF ORGANIZING MAP USING HOPFIELD ENERGY FUNCTION ANALYSIS Sumeet Gill*, Dr. Manu Pratap Singh# and Naveen Sharma# Government Polytechnic ...
    • by 
    •   9  
      StabilityAdvanced ComputingUnsupervised LearningCompetitive Learning
- Though beaconless geographic routing protocols get rid of the overhead caused by the periodic beacon messages to be broadcast in case of beacon based approaches. But, most of the existing beaconless routing protocols do not consider... more
    • by 
    •   9  
      Wireless Sensor NetworksRouting protocolsAdvanced ComputingRouting Protocol
This paper presents efficient methods of vertical A comparison of UMTS and WLAN [4] shows that they handoffs from UMTS to WLAN and vice versa in a loose possess many desirable and complementary features. As coupling architectnre. When a... more
    • by 
    •   10  
      Mobile IPAdvanced ComputingProtocolsIP networks
    • by 
    •   13  
      Grid ComputingInformation TheoryHealth InformaticsComputational Intelligence
August 24 ~25, 2019, Vienna, Austria https://necom2019.org/adco/index.html SCOPE 6 th International Conference on Advanced Computing (ADCO 2019) will provide an excellent international forum for sharing knowledge and results in theory,... more
    • by 
    •   18  
      Grid ComputingSoftware EngineeringData MiningSoft Computing
The user-level brokers in grids consider individual application QoS requirements and minimize their cost without considering demands from other users. This results in contention for resources and sub-optimal schedules. Meta-scheduling in... more
    • by 
    •   17  
      Cognitive ScienceDistributed ComputingGrid ComputingGenetic Algorithms
This paper presents an agent oriented approach for grid computing. As opposed to existing approaches, agent technology promises a more flexible approach, easier installation and management of the agent framework, and better ability to... more
    • by 
    •   6  
      Grid ComputingUser InterfaceAdvanced ComputingAgent Technology
The success of web services has influenced the way in which Grid applications are being written. Web services are increasingly used as a means to realise service-oriented distributed computing. Grid users often submit their applications... more
    • by 
    •   13  
      Computer ArchitectureDistributed ComputingGrid ComputingComputational Modeling
The mobile ad hoc networks (MANETs) are highly vulnerable to attacks because of its unique characteristics such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic network topology. In... more
    • by 
    •   10  
      Distributed Denial of Service AttackAdvanced ComputingMobile Ad Hoc NetworkMAC Layer
This paper presents efficient methods of vertical A comparison of UMTS and WLAN shows that they handoffs from UMTS to WLAN and vice versa in a loose possess many desirable and complementary features. As coupling architectnre. When a... more
    • by 
    •   7  
      Mobile IPAdvanced ComputingIP networksInternet services