ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 International Conference on Computer and Communication Technology (ICCCT)
Latest Publications
TOTAL DOCUMENTS
68
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
9781479967582, 9781479967575, 9781479967568
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A secured approach to protect SIP signaling message
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001480
◽
2014
◽
Cited By ~ 1
Author(s):
Narendra M. Shekokar
Start Chat
Download Full-text
A comparison of ARIMA, neural network and a hybrid technique for Debian bug number prediction
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001468
◽
2014
◽
Cited By ~ 8
Author(s):
Jayadeep Pati
◽
K. K. Shukla
Keyword(s):
Neural Network
◽
Hybrid Technique
Start Chat
Download Full-text
Performance analysis of multicast routing protocols in ad-hoc networks
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001504
◽
2014
◽
Cited By ~ 3
Author(s):
Kanwalpreet Kaur
◽
Krishan Kumar Saluja
◽
Rajdeep Singh
Keyword(s):
Performance Analysis
◽
Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Multicast Routing
◽
Multicast Routing Protocols
◽
Hoc Networks
Start Chat
Download Full-text
Passive copy-move forgery detection in videos
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001509
◽
2014
◽
Cited By ~ 14
Author(s):
Ramesh Chand Pandey
◽
Sanjay Kumar Singh
◽
K. K. Shukla
Keyword(s):
Forgery Detection
◽
Copy Move Forgery Detection
Start Chat
Download Full-text
A framework for key frame extraction from surveillance video
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001508
◽
2014
◽
Cited By ~ 9
Author(s):
Suresh C. Raikwar
◽
Charul Bhatnagar
◽
Anand Singh Jalal
Keyword(s):
Surveillance Video
◽
Key Frame Extraction
◽
Key Frame
Start Chat
Download Full-text
Route discovery in Mobile Ad hoc Network using an optimum angle selection based approach
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001492
◽
2014
◽
Cited By ~ 1
Author(s):
Pravin Ranjan
◽
R. Leela Velusamy
Keyword(s):
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Route Discovery
◽
Optimum Angle
◽
Mobile Ad Hoc
Start Chat
Download Full-text
An ordered weighted operator approach towards web usage mining
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001472
◽
2014
◽
Cited By ~ 2
Author(s):
Shruti Kohli
◽
Ankit Gupta
Keyword(s):
Web Usage Mining
◽
Operator Approach
◽
Web Usage
Start Chat
Download Full-text
Fast parameterized word matching on compressed text
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001512
◽
2014
◽
Author(s):
Rama Garg
◽
Rajesh Prasad
◽
Suneeta Agarwal
Start Chat
Download Full-text
Evaluation of filtration and pruning approach for Apriori algorithm
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001464
◽
2014
◽
Author(s):
Lalit Mohan Goyal
◽
M. M. Sufyan Beg
Keyword(s):
Apriori Algorithm
Start Chat
Download Full-text
An extended Playfair Cipher using rotation and random swap patterns
2014 International Conference on Computer and Communication Technology (ICCCT)
◽
10.1109/iccct.2014.7001485
◽
2014
◽
Cited By ~ 5
Author(s):
Swati Hans
◽
Rahul Johari
◽
Vishakha Gautam
Keyword(s):
Random Swap
Start Chat
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close