Browse Conferences
Malware detection vectors and analysis techniques: A brief survey
Over the last decade, a war has been taking place which involves the computer security community and the black hat hackers. The security community uses every possible routine and strategies in order to cease and also to remove the damage ca...
Hyperspectral image analysis using neighborhood rough set and mathematical morphology
Classification of hyperspectral remote sensing images is a challenging task because of its high dimensionality. In this paper, a two stepped method for classification of hyperspectral images is presented. The first step performs band select...
Fusion of projected feature for classification of EMG patterns
In medical domain, proper set of information fusion is the vital requirement for quantitative interpretation. In this paper, we present a novel feature fusion technique based on two-fold feature projection (FP) for EMG classification. Canon...
Signal type detection in CRN: A hierarchical modulation classification framework using SVM and Decision tree approaches
To ensure effective dynamic spectrum access in cognitive radio proper signal classification in fading channels and low signal to noise ratio environment is essential. Due to lack of information about the modulation scheme used it cannot dis...
A survey on feature remeshing of 3D triangular boundary meshes
Remeshing is an important technique used for the improvement of the quality of 3D models. The original features of a particular mesh may distort or change while using certain remeshing techniques. This may impact further processing on the m...
Survey and analysis of Modern Authentication system
Modern Authentication system ensures that only the entrusted entities should communicate and ensures that unauthorized user which is trying to establish some connection in order to gain login to the system by impersonating his identity shou...
A computationally light scheme for enhanced privacy in LTE
In the authentication and key agreement protocol adopted in LTE, pseudonyms are employed for identity presentation, so that the real identity of the subscriber remains confidential. However, there are occasions where pseudonyms may fail to ...
Contrast various tests for primality
With the increasing popularity and usage of cryptography and network security, prime generation and primality testing has become a significant issue. Various primality tests have been introduced in the past and we compare and contrast some ...
An alert analysis approach to DDoS attack detection
Since networked applications have become common place in our daily life, vulnerabilities or attacks on networks are also on the rise. Although a significant number of defense mechanisms have been developed to counter attacks on networks, at...
Smart glove for Sign Language communications
Human beings have a natural ability to see, listen and interact with their external environment. Unfortunately, there are some people who are differently abled and do not have the ability to use their senses to the best extent possible. Suc...