Sciweavers

ICSAP
2010
13 years 1 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...
ICSAP
2010
13 years 6 months ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...
ICSAP
2010
13 years 8 months ago
The Effect of Subcarrier-Based Channel Estimation on the BER Bound of Turbo Coded OFDM/SDMA System
—In this paper, we study the performance of the channel estimation in a Turbo coded, orthogonal frequency division multiplexing (OFDM) with multiple antennas at the receiver. We ...
Y. Taghinia, Gholamreza Dadashzadeh, Esrafil Jedar...
ICSAP
2010
13 years 8 months ago
An Enhanced Implementation of Brain Tumor Detection Using Segmentation Based on Soft Computing
—Image Segmentation is an important and challenging factor in the medical image segmentation. This paper describes segmentation method consisting of two phases. In the first phas...
T. Logeswari, M. Karnan
ICSAP
2010
13 years 8 months ago
EEMLA: Energy Efficient Monitoring of Wireless Sensor Network with Learning Automata
— When sensors are redundantly deployed, a subset of sensors should be selected to actively monitor the field (referred to as a "cover"), while the rest of the sensors ...
Habib Mostafaei, Mohammad Reza Meybodi, Mehdi Esna...
ICSAP
2010
13 years 8 months ago
Towards Benchmarking of Video Motion Tracking Algorithms
The environment in which video motion needs to be tracked, places several constraints on the design of the tracking system. Current datasets which are used to evaluate and compare...
Mukesh C. Motwani, Nishith Tirpankar, Rakhi C. Mot...