Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
IoT based smart security and home automation system
Kodali, Ravi Kishore, Jain, Vishal, Bose, Suvadeep, Boppana, Lakshmi
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
VANET: Architectures, research issues, routing protocols, and its applications
Dixit, Mayank, Kumar, Rajesh, Sagar, Anil Kumar
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A literature survey on social engineering attacks: Phishing attack
Gupta, Surbhi, Singhal, Abhishek, Kapoor, Akanksha
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Big data analytics for security and privacy challenges
Dev Mishra, Aditya, Beer Singh, Youddha
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A genetic algorithm inspired task scheduling in cloud computing
Agarwal, Mohit, Srivastava, Gur Mauj Saran
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Techniques for sentiment analysis of Twitter data: A comprehensive survey
Desai, Mitali, Mehta, Mayuri A.
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Integrating RSA cryptography & audio steganography
Gambhir, Ankit, Khara, Sibaram
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Turbidity detection using image processing
Karnawat, Vaibhav, Patil, S. L.
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A study of position based VANET routing protocols
Goel, Neha, Sharma, Gaurav, Dhyani, Isha
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A space based reversible high capacity text steganography scheme using font type and style
Kumar, Rajeev, Malik, Aruna, Singh, Samayveer, Kumar, Bijendra, Chand, Satish
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Comparative analysis of speed control strategies for vector controlled PMSM drive
Hussain, Shoeb, Bazaz, Mohammad Abid
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A framework for detecting anti-forensics in cloud environment
Rani, Deevi Radha, Kumari, G. Geetha
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Literature review of routing attacks in MANET
Singh, Ram Kishore, Nand, Parma
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A survey on techniques to achive energy efficiency in cloud computing
Singh, Sobinder, Swaroop, Abhishek, Kumar, Ajay, Anamika
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
Spatial data analysis with ArcGIS and MapReduce
Singh, Hari, Bawa, Seema
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding
A comprehensive inspection of cross site scripting attack
Dayal Ambedkar, Mohit, Ambedkar, Nanhay Singh, Raw, Ram Shringar
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01.04.2016)
Get full text
Conference Proceeding