Synopses & Reviews
Synopsis
Third International Conference on Recent Trends in Information, Telecommunication and Computing ITC 2012. ITC 2012 will be held during Aug 03-04, 2012, Kochi, India. ITC 2012, is to bring together innovative academics and industrial experts in the field of Computer Science, Information Technology, Computational Engineering, and Communication to a common forum. The primary goal of the conference is to promote research and developmental activities in Computer Science, Information Technology, Computational Engineering, and Communication. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners."
Synopsis
Full Papers.- High Through-put VLSI Architecture for FFT Computation.- Formal Approach to Reliability Improvement with Model Checker.- DDoS attacks Defense System using Information Metrics.- CEAR: Cluster based Energy Aware RoutingAlgorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs).- TGAR: Trust Dependent Greedy Anti-void Routing in Wireless Sensor Networks (WSNs).- DoS Attack-resistant Framework for Client/Server Intelligent Computing.- Effect of Forwarding Strategy on the Life Time of Multi-hop Multi-sink Sensor Networks.- Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine.- Aspect Dependency Analyzer Framework for Aspect Oriented Requirements.- Hybrid Extremal Optimization and Glowworm Swarm Optimization.- Implementation of New Technic for the Capacity Improvement in Wavelength Division Multiplexing Networks.- A Comparative Review of Contention-Aware Scheduling Algorithms to Avoid Contention in Multicore Systems.- Developing Embedded Systems from Formal Specifications written in Temporal Logic.- Network log Clustering Using K-means Algorithm.- Improvement Public Key Kerberos using Identity-Based Signcryption.- Intrusion Detection Using Keystroke Dynamics.- MRI-PET Medical Image Fusion Technique by Combining Contourlet and Wavelet Transform.- Comparison of Routing Protocols in Mobile Ad-hoc Network.- Analysis of Image Segmentation Algorithms Using MATLAB.- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions.- Mean-Shift Algorithm: Verilog HDL Approach.- Optimal Node Selection using Estimated Data Accuracy Model in Wireless Sensor Networks.- A Security Framework for DDoS Detection In MANETs.- Improvement of system stability margins using coordination control of Static Var Compensator (SVC) and Thyristor Controlled Series Capacitor (TCSC).- Effect of Parasitics of Feed-Forward Compensated OTA on Active-RC Integrators.- Modeling of Photovoltaic Charging System for the Battery Powered Wireless Sensor Networks.- Torque Computation of Induction Motor with VVVF Drive Subjected to Severe Torque Fluctuation.- Performance Analysis of Different Current Controllers for Active Power Filter.- Optimum LQR Switching Approach for the Improvement of STATCOM Performance.- Squirrel Cage Rotor Design for Safety and Reliability Improvement of a Three Phase Induction Machine.- Experimental Validation and Performance Comparison of Multi-Loop MPPT Controlled PV Systems on Low to High End Controllers.- Effect of Temperature on Si-Ge Hetero-Gate Raised Buried Oxide Drain Tunnel FET Electrical Parameters.- A Novel Inverter Topology for Low Power Drives.- Enhancement of ATC In presence of SSSC Using Linear and Reactive Methods.- Improvement of Power Quality and PerformanceAnalysis of PV Fed UPQC in Utility Connected System.- Design of Adaptive FLANN based model for Non-linear Channel Equalization.- Short Papers.- Optimal and Robust Framework for Enhancing Network Lifetime using Power Efficient AODV in Mobile Adhoc Network.- Voice Transformation using Radial Basis Function.- IPTC based Ontological Representation of Educational News RSS Feeds.- Design of Optimized Modular Multiplier using Montgomery Algorithm for RSA Cryptosystem.- Automatic Generation of P2P botnet Network Attack Graph.- Parallelization of Fractal Image Compression over CUDA.- Distributed Shared Files Management.- Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization.- Parallel Pseudo-Exhaustive and Low Power delay testing of VLSI systems.- An Algorithm for Traffic Analysis using RFID Technology.- Trust-Based Grid Resource Management.- Switch Line Fault Diagnosis in FPGA Interconnects Using Line Tracing Approach.- An Approach to Encryption using Superior Fractal Sets.- Shape Based Image Retrieval using Gradient Operators and Block Truncation Coding.- Performance Evaluation of TCP Congestion Control Variants Using Dynamic State Routing In Wireless Ad-HOC Network.- Security based Requirem