Download 2014 International Conference on Information Communication and

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
2014 International Conference on
Information Communication and
Embedded Systems
(ICICES 2014)
Chennai, India
27-28 February 2014
Pages 1-808
IEEE Catalog Number:
ISBN:
1/3
CFP1474U-POD
978-1-4799-3698-4
TABLE OF CONTENTS
S.
No
ID
1.
IT001
2.
IT005
3.
IT008
4.
IT009
5.
IT010
6.
IT011
7.
IT020
8.
IT024
9.
IT028
10. IT029
11. IT030
12. IT032
13. IT131
14. IT139
15. IT141
16. IT142
17. IT143
18. IT146
INFORMATION TECHNOLOGY
Managing Performance Of Web Based Application Through Agile Approach And
Improving ROI 1
B.Vani, B.Surya, R.Deepalakshmi
A Novel way of Accessing PL/SQL functions and providing Dynamic
Adaptability using Aspect Oriented Programming 5
BangaruBabuKuravadi, Ravi Teja Myla, ShaliniAlajangi
Automated Diagnosis Of Glaucoma Using Haralick Texture Features 11
S. Simonthomas, N.Thulasi, P.Ashraf
Multioriented Video Scene Based Image Dehazing Using Artificial Bee Colony
Optimization 17
S.Chitra, M.ArockiaIrudayaraja
Dynamic Placement Of Virtualized Resources For Data Centers In Cloud 21
S.Usmin, M.ArockiaIrudayaraja, U.Muthaiah
Envisage And Authoring A Video With Sketch And Text Gloss SSG 27
R.Selvi, K.Satheesh
Secure Multicloud Storage With Policy Based Access Control And Cooperative
Provable Data Possession 31
Vishnupriya.S, P.Saranya, Rajasri
Interfirewall Optimization Across Administrative Domains For Enabling
Privacy Preserving And Security 37
Arunadevi, Pon.Arivanandham
Implementing Secure Data Access Control For Multi-Authority Cloud Storage
System Using Ciphertext Policy-Attribute Based Encryption 42
S.Vijaya Lekshmi, M.P.Revathi
Biosecure-Cloud Ancestry Detector: Persuading Species Analysis And
Ancestral Detector Based On Solitary Score 48
T. Prasath, B.RubaDevi
Implementation of ElGamal Elliptic Curve Cryptography Over Prime Field
Using C 54
DebabratBoruah, MonjulSaikia
Applications and Requirement for Color Bit Depth Scalability Paper's 61
Aravind Kumar. S
Implementing HMAC In Expedite Message Authentication Protocol For Vanet 67
V. Vijayabharathi, P.D.Sheba Kezia Malarchelvi
An Efficient Mobile Commerce Explorer For Mobile User’s Behavior Pattern
Mining And Prediction 72
S. Nagalakshmi, R. Sumathi
Improving Habitability of NLI for Querying Ontologies with Feedback 79
Arivarasan S
Monitoring Qos Parameters Of Composed Web Services 85
Karthikeyan. J, Suresh Kumar.M
A Survey Of Jamming Attack Prevention Techniques In Wireless Networks 91
S. Sowmya, P.D. Sheba KeziaMalarchelvi
Grid Architecture For Scheduling And Load Balancing – An Assessment 95
B.Priya
19. IT147
20. IT150
21. IT151
22. IT152
23. IT153
24. IT 160
25. IT170
26. IT171
27. IT172
28. IT176
29. IT181
30. IT182
31. IT183
32.
IT185
33.
IT186
34.
IT187
35.
IT188
36.
IT189
37.
IT190
38.
IT191
39.
IT196
40.
IT197
SBBSCS: Sha Based Biometric Smartcard Security 102
GerlyEldose, Kovendan.V
Detecting Misbehavior Node In Wifi Networks By Co-Ordinated Sampling Of
Network Monitoring 109
M.Shanthi, S.Suresh
Information Extraction Based On Probing Algorithm With Bayesian Approach 113
Dannie Davidson, I.Jeena Jacob, K.G.srinivasagam
A Survey On Hand Gesture Recognition For Simple Mouse Control 117
R.Suriya, V.Vijayachamundeeswari
Document Grouping With Concept Based Discriminative Analysis And Feature
Partition 122
S Kajapriya, K.N.Vimal Shankar
Complete Study On Distributed Denial Of Service Attacks In The Presence Of
Clock Drift 126
C.Kavitha
Contextual Image Search with Keyword and
Image Input 132
Shiyamala.M, Kalaiarasi.G
MC2 For Enhancing The Lifetime
Of A Cellular Device 137
R.Baskarane, P.Archana, A.Priyadarshini, P.Hemalatha
On The Concert Of Predictable Broadcast Reckon (Pbr) For Wireless Mesh
Networks Used In Vanets 142
Vigneshkanna.B, Manikandan.M
Systematic Approach for validating Java-MongoDB Schema 148
GokulPrabagaren
Data Security And Privacy Using Data Partition And Centric Key Management
In Cloud 152
Sendhil Kumar K.S, Krunal Patel, Navneet Singh, Kushang Parikh, Jaisankar N.
A Fuzzy ERM for Extracting and Modeling Uncertain Spatial Expressions in
Text 157
Kanagavali, K.Raja
Efficient And Secure Techniques For Protecting Data In The Cloud 164
R.Jeena, S.Saravana Kumar, S. KavinHari Hara Sudhan
An Object Based Software Tool For Software Measurement 169
G.Santhoshini
Securely Detecting An Intruders In Manets System 174
G.Indumathi, S.Sakthivel
Reconfigurable Hardware for Patient Monitoring Systems
179
PavanKoundinya, Vinod S, Karthik Reddy B M, DeepashreeDevaraj, Mallikarjuna M
Soft Computing Based Estimation Of Software Development Effort 185
S Saraswathi, N Kannan
Data Mining Techniques For Crm 191
R Senkamalavalli, T.Bhuvaneshwari
Supervision Of Network Through Software Defined Networking 194
K. Venkatraman, V. Parthasarathy, S.Senthil Kumaar, M.Jayalakshmi
Efficient Data Delivery In Mobility Aware Zigbee Wireless Networks 201
Prinslin.L, V.Janani
Application Specific Optimization of Coarse-Grained Reconfigurable
Architecture by Dynamic Context Compression 206
S.Priyadharsini, A.Srilalitha
User search goals using classified average precision inference 214
T.Chellathamizhan, S.Bhuvaneswari,
Enhancing Logo Matching and Recognition
using local features 218
C.Kalaiyarasi, S.Karthikeyan
Optimized Cluster Validation Technique for Unsupervised
Techniques 224
R.krishnamoorthy, S. Sreedhar Kumar
A Neural Network based framework for Apache YARN 230
Nivash J.P, Ebin Deni Raj, L.D. Dhinesh Babu, M.Nirmala
Effective Categorization of Text in Practical Design 236
M.Sambath,S.Ravi, K.Ramesh Kumar
41.
IT198
42.
IT218
43.
IT219
44.
IT221
45.
IT300
Handovers In Wimax Technology 241
C. Suganya, A.Sumithra, S.Karthik, J. Rajeevrathan
46.
IT302
47.
IT303
48.
IT307
49.
IT308
50.
IT309
51.
IT311
52.
IT313
53.
IT317
54.
IT324
Enhancing Sample Classification For Microarray Datasets Using Genetic
Algorithm 247
P.Aarthi, E.Gothai
A Survey And Vital Analysis Of Various State Of The Art Solutions For Web
Application Security 250
Anna Thankachan, R.Ramakrishnan, M.Kalaiarasi
Exclusive Technique For Stocking And Probing Data Table Integration Using
The Internet 258
T.Divya, M.Nithya
Performance analysis of static images and solution for dynamic tracking in
private cloud 263
R.Priyadarshini, LathaTamilselvan, Kanimozhi.S
Hybrid Routing Scheme Of Multi Agent Ant Based System In MANET
Combination Of Proactive And Reactive 269
H.Vignesh Ramamoorthy, H.Karthikeyini
Adaptation in Clustering Algorithm by Algorithm Output Granularity for
Mobile Data Stream Mining 276
Rahul Wasule, R.A. Fadnavis
A Performance Analysis of MapReduce Applications on Big Data in Cloud based
Hadoop 280
ParthGohil, DweepnaGarg, BakulPanchal
Data Fusion In
Ontology Based Data Integration 286
K.Saranya, M.S.Hema, S.Chandramathi
Intelligence Inference Semantic Caching And Query Processing 292
P.Mohankumar, J.Vaideeswaran
55.
IT 330
Page Ranking Algorithms Used In Web Mining
M.Sangeetha, K.Suresh Joseph
297
56.
IT336
A Survey on Closed Sequential Pattern Mining
V. Purushothama Raju, G.P.Saradhi Varma
304
57.
IT339
58.
IT340
An Efficient, Dynamic, Privacy Preserving Public Auditing Method On
Untrusted Cloud Storage 310
R. Navajothi, S. Jean Adrien Fenelon
A novelty approach of symmetric encryption algorithm 316
Kishore Dasari, S. Satish Kumar, V.Srikanth, B. Veramallu, K Srinivasulu
59.
IT342
Clustering
An Advanced Grammatical Evolution Approach for Intrusion Detection on
multicast routing in MANET 320
A.Fidalcastro, E.Baburaj
60.
IT344
Comparative Analysis Of Wi-Fi And Wimax
D. Roselin Selvarani, T.N.Ravi
324
61.
IT400
A Survey On Video Distribution Services In Cloud Computing
P.Sobiya, M.Gomathinayagam, K.Ramar
62.
IT402
63.
IT406
64.
IT407
65.
IT408
66.
IT409
67.
IT410
68.
IT411
69.
IT413
70.
IT414
71.
IT415
72.
IT416
73.
IT419
74.
IT420
75.
IT421
76.
IT423
77.
IT424
78.
IT425
79.
IT434
80.
IT437
81.
IT439
Depletion of Vampire Attacks in Medium Access Control Level using Interior
Gateway Routing Protocol
338
R.Abirami, G.Premalatha
Face Detection Based On Skin Color Model And Connected Component With
Template Matching 343
M.Mahadevi, C.P.Sumathi
An Acknowledgement Based Secure Data Transmission In MANETS 347
J.K.Harika, C.Jayakumar
Overview of Data backup and Disaster Recovery in Cloud 352
S. Suguna, A. Suhasini
HHCS: Hybrid Hierarchical Cluster Based Secure Routing Protocol For Wireless
Sensor Networks 359
C. Deepa, B.Latha
Creation Of Zonal Map From Point Data Using Morphological Opening By
Skeletonization 365
D.Priya, G.Singaravel
A Novel Approach for Edge Adaptive Steganography on LSB Insertion
Technique 369
P.U.Deshmukh, T.M.Pattewar
Overview Of Mobile Agent Security Issues- Solutions 373
S. SobithaAhila, K.L.Shanmuganathan
Analyzing The Effect Of Bagged Ensemble Approach For Software Fault
Prediction In Class Level And Package Level Metrics 379
Shanthini. A, Chandrasekaran RM
Traffic Sign Detection and Recognition Using OpenCV 384
P. Shopa, N. Sumitha, P.S.K Patra
Equipped Search Results Using Machine Learning From Web Databases 390
G. Abinaya, B.Jaishanthi
Secure Data Transfer In Manet Using Hybrid Cryptosystem 396
Sivaranjani S, Rajashree
Nepotism Responsive Of Data Mining For Prejudice Inimitability 401
C. BalaSaravanan,,R. Sugumar
Broadcast Scheduling And Link Scheduling In Ih-Mac For Wireless Sensor
Networks 404
R.Sivasuriya, T.A.Ananth
Quota Based Routing Protocol In Disruption Tolerant Networks 410
Clarabelle Joanna.D, Sathyavathi.R
Nature Inspired Preemptive Task Scheduling For Load Balancing In Cloud
Datacenter 414
G.Shobana, M.Geetha, R.C.Suganthee
An Enhanced Model For Effective Navigation Of A Website Using Clustering
Technique 420
S.Renuka, P.Jayanthi
Profit Maximization in Cloud Computing 426
R.Raju, M.Kalaiarasi, S.Santhana Krishnan
An Efficient Hardware Multichannel Data Acquisition and Processing (DAQP)
System usingARM 431
A Sundhari, Sam Mathews M, Vijayashanthi N
Bandwidth shared acknowledgment (BSA)-A secure intrusion detection and
331
82.
IT440
83.
IT441
84.
IT445
85.
IT446
86.
IT447
87.
IT 448
88.
IT449
89.
IT455
90.
IT 456
91.
IT459
92.
IT460
93.
IT464
94.
IT465
95.
IT 468
96.
IT 472
97.
IT475
98.
IT478
99.
IT482
100. IT 483
101. IT 484
102. IT486
multi path routing for MANETs 437
P.Selvi grija, J.Premkumar
Software Cost Estimation By Analogy Using Feed Forward Neural Network 443
Manikavelan, R.Ponnusamy
Multi Interface Multi Channel and Improved AODV Routing Protocol 448
AditiMandape, DeeptiTheng
Asymmetric Encryption To Secure Multi-Proprietor Data Sharing For Active
Members In Cloud 452
A. Bala Suresh, J.ShinyDuela
Probabilistic Ontology for Social Background Verification - A Belief Fusion Use
Case 457
SuvarnaKadam, MadhuriA.Potey
A Micropartitioning Technique For Massive Data Analysis Using Mapreduce 464
Mohanapriya, P.Natesan
A New Decision Based Unsymmetric Trimmed Median Filter using Euclidean
Distance Measure for Removal of High Density Salt and Pepper Noise from
Images 469
K. Chithra, Santhanam
Spammer Detection And Tagging Based User Generated Video Search
System - A Survey 474
Lavanya Ramprasad, G.Amudha
Energy Aware Scheduling of Real-Time and Non Real-Time Tasks on Cloud
Processors 479
Chandan H K S, Sonika
Syn Flooding Attack - Identification And Analysis 484
K.Geetha, N.Sreenath
Text Extraction from Images using Gamma Correction Method and different
Text Extraction Methods – A Comparative Analysis 490
G.Gayathri Devi, C.P.Sumathi
Survey On Various Mechanisms For Secure And Efficient Vanet
Communication 495
Saranya.S, Vijayalaksmi.V, Sathya.M, Selvaroopini.C
Enforcing Adaptive User Modeling using Ontology 500
Rajashrisadafule, Madhuri A. Potey, P. K.Sinha
A Multi-Level Artificial Bee Colony Method 505
Reza Akbari
A Survey of Reactive Routing Protocols in MANET 512
Daxesh N. Patel, Sejal B. Patel, Hemangi R. Kothadiya, Pinakin D. Jethwa, Rutvij H.
Jhaveri
Connotative Features Based Affective Movie Recommendation System 518
A. P. Bhagat, N. G. Meshram
Text Processing In Information Retrieval System Using Vector Space Model
Premalatha.R, Srinivasan
Handling Big Data With Hadoop Toolkit
R.Devakunchari
525
N/A
531
M.R.M.Veeramanickam, N.Radhika
Dynamic & Hybrid Honeypot Model for Scalable Network Monitoring 536
Ankit D. Patel, KartikChawda
Tracking Control for a Class of Uncertain Nonlinear Systems using Legendre
Neural Network 541
A.Kulkarni, V.Gupta
A New Scalable Reactive Location Based Ad Hoc Routing Protocol for VANETs 547
K.Rajesh, R.VimalKarthick, G.S.Raj
A Study On Educational Games Application Model In E-Learning Cloud System
103. IT490
104. IT492
105. IT 494
106. IT497
107. IT499
108. IT505
109. IT508
110. IT510
111. IT513
112. IT514
113. IT520
114. IT522
115. IT523
116. IT524
117. IT526
118. IT528
119. IT531
120. IT534
121. IT545
122. IT547
123. IT 548
124. IT549
125. IT550
Survey of Handover decision for next generation 552
PoojaTinkhede, PiyushIngole
Fuzzy Logic Based Compromised Node Detection and Revocation in Clustered
Wireless Sensor Networks 557
S. Raj Anand, R. Geetha, E. Kannan
Algorithm for the construction of Rectilinear Steiner Minimum Tree by
identifying the clusters of points 563
Vani V, G.R.Prasad
A New Approach for Grid Load Balancing among Heterogeneous Resources
with Bandwidth Consideration 567
Deepak Kumar Patel, Debashreet Das, C. R. Tripathy
Community Mining in Co-authorship Network 573
Umadevi V
Prediction of Heart Disease Using Multilayer Perceptron Neural Network 578
Jayshri S. Sonawane, Dharmaraj R. Patil
An Evolutional Approach For Record Deduplication And Improving Accuracy
Level In Large Repositories 583
Revathy, R.Suresh
Analysis Of Critical Aspects To 587
Attract Online Contents
D.Kanimozhi, Rajadurai
Comfortable Perception Mining in Videos using Fuzzy Logic 593
Jeeva S, Saranya V
A Survey on Localization of Wireless Sensor Nodes 599
JerilKuriakose, Amruth V, SwathyNandhini N
Overview of Sequential and Parallel SAT solvers 605
Mahesh M. Doijade, Dinesh B. Kulkarni
Flanking Stencil Method for the Detection of Impact Craters 609
Krishnan. R., AndheDharani
Secure File Access Solution For Public Cloud Storage 615
P.Bharathi, S.Rajashree
An Empirical Study of Test Cases in Software Testing
620
Navnath Shete, AvinashJadhav
Profit And Energy Aware Scheduling In Cloud Computing Using Task
Consolidation 625
A.Bharathi, R.S.Mohana, A.UshaPriya
Heterogeneous clustering 631
B.S.Charulatha, PaulRodrigues, T.Chitralekha, Arun Rajaraman4
A Survey On Stochastic Vehicle Routing Problem 634
S. Sathyanarayanan, K. Suresh Joseph
Codon Based Protein Synthesis For Breast Cancer Risk Prediction Through
Parallel Computing 641
Vinu S, Murugaesan.G
Hybrid Approach for Monitoring and Scheduling the Job in Heterogeneous
system 646
S.Rajkumar, N.Rajkumar, V.G.Suresh
Enabling Secure Outsourced Cloud Data 651
G.Sankareeswari, S.Selvi, R.VidhyaLakshmi
Anomaly Extraction Using Association Rule with the Heterogeneous Detectors 657
MadhaviDharmadhikari, V. L. Kolhe
Design of Emergency System for Intelligent Traffic System Using VANET 661
Ganesh S. Khekare
Data Stream Mining Based Resilient Identity Fraudulent Detection 668
S.Sundareswari, V.Mareeswari
126. IT553
127. IT554
128. IT555
129. IT556
130. IT557
131. IT 559
132. IT564
133. IT566
134. IT567
135. IT569
136. IT 570
137. IT571
138. IT 573
139. IT574
140. IT576
141. IT 579
142. IT580
143. IT581
144. IT584
145. IT 587
146. IT588
147. IT589
148. IT590
Intrusion Detection System To Detect Malicious Misbehaviour Nodes In Manet
674
M.Vijay, R.Sujatha
Enhancing Workflow Scheduling Through Promoting Resource Reliability And
Fault Tolerance In Grid Environment 680
Sarayu.R, N.Krishnamoorthy
Sentiment Classification Using Weakly Supervised Learning Techniques 687
P.Bharathi, PCD.Kalaivani
Classification Of Colour Texture Using Shearlets 692
Vivek.C, Audhithan.S
Adaptive Fuzzy C - Means For Human Activity Recognition 696
K.Nanthini, R.ManjulaDevi
Offline Handwritten Writer Independent Tamil Character Recognition 701
S.Sangeetha Devi, T.Amitha
An Efficient Localization for Wireless Sensor Network Using Nearest Neighbor
Reference Method 707
Padma priya, S.Sridhar
Analysis of Simulation of DDOS Attack in Cloud 712
S.Karthik, J.J.Shah
Design of FPGA Based General Purpose Neural Network 717
Prashant D.Deotale, Lalit Dole
Multimedia Questions and Answering using Web Data Mining 722
Bavarabaskar, Dheeraj Kumar Singh
An Efficient Edge Detection Technique by Two Dimensional Rectangular
Cellular Automata 726
Deepak Ranjan Nayak, Jahangir Mohammed
Variants Of Travelling Salesman Problem: A Survey 730
K.Illavarasi, K.Suresh Joseph
Developing Intellectual Patterns In Online Business To Customer Interaction
With Dynamic Recommender System 737
Sharmila.A, Nalinipriya.G, Murugan.K
A Scalable Approach For Efficient Multicast Data Transmission In Wireless
Networks 742
A. R. Aswini, Prabaharan
Dynamic Cluster Based Energy Controlled Routing In Wireless Sensor
Networks 745
H. Shalma, Rajesh
Reliable Data Delivery In Manets Using VDVH Framework 749
Priya.S, Gopinath.B
Enhanced Acknowledgement Based Intrusion Detection For MANETS
T.Archana, N.Rajkumar
755
760
T.Rajalakshmi, R.I.Minu
Secured Authentication using Challenge-Response and Quick-Response Code
for Android Mobiles 765
DhanashreePatil, Kishore
The Secured OLSR Protocol For MANET 769
K.TamilSelvi
Privacy Preserving Data Mining Techniques-Survey 775
Dhanalakshmi.M, Sivasankari.E
Analysis of Security Issues and Their Solutions In Wireless LAN 781
Prashant Singh, Mayank Mishra, P N Barwal
Performance Analysis Of Malicious Nodes in IEEE 802.15.4 Based Wireless
Sensor Network 787
Improving Relevance Feedback For Content Based Medical Image Retrieval
149. IT595
150. IT596
151. IT597
152. IT599
153. IT602
154. IT603
155. IT607
156. IT613
157. IT 614
158. IT616
159. IT 617
160. IT619
161. IT620
162. IT623
163. IT624
164. IT627
165. IT629
166. IT 631
167. IT641
168. IT643
169. IT645
170. IT649
Krishan Kant Varshney, P. Samundiswary
Spidernet: An Interaction Tool For Predicting Malicious Web Pages 792
S. Krishnaveni, K. Sathiyakumari
Efficient And Contorlled Sharing Of Privacy Data In Social Networks 798
Th.Theepigaa, A.Bhuvaneshwari
Crawling the page flipping links 804
R.Priya, S.Dhanalakshmi
Learning Based Web Crawl Forum 809
K.Hemakumar, B.Prakash
Globally Trusted Model For Assisting Peers Using Greedy Forwarding
Technique 816
Gajalakshmi.G, S.Anbu
Cluster-Based Mechanisms In Support Vector Machine To Integrate And
Detect Spoofing 820
V. Thulasi, S.Anbu
Weighted Voting Based Trust Management For Intrusion Tolerance In
Heterogeneous Wireless Sensor Networks 824
P.Swaruba
Wireless Data Transmission In Zigbee Using Indegree And Throughput
Optimization 831
Ranjani.V, Sangeetha.S.K.B
Resource Allocation In Next Generation Networks
Using Game Theory 836
Revathy, M.Senthil
An Efficient Query Processing Through Clickthroughs In Personalized Mobile
Search Engines 840
T.J.Salma, N.Geetha
Optimal Vehicular Routing And Driving Directions With Human Intelligence
844
Kalaivani.P, M.Senthil
Data Integrity And Security In Cloud Environment Using Aes Algorithm 848
B.Thiyagarajan, Kamalakannan.R
TCP Congestion Control with Delay Minimization in MANET 853
Hemant Kumar, Piyush Singh
A Survey On Resource Allocation Strategies In Cloud Computing 859
V.P. Anuradha, D.Sumathi
Sensitive Attribute Based Non-Homogeneous Anonymization For Privacy
Preserving Data Mining 866
S.Sathishkumar, P.Usha, R.Shriram
Location Update Suitable For Geographic Routing In Manets 871
B.Manimegalai, D.Geetha
Online Banking in India: Attacks and Preventive Measures to Minimize Risk
874
Rajeshree Khande
Distributed File Load Rebalancing Methodology For Map Reduce System 879
U.Saraswathi, S.Anbu, K.Anbazhagan
Reliable Data Delivery For Emergency And Disaster Recovery In
Wireless Mesh Network 882
R.Murugeswari, S.RadhaKrishnan
Ascertaining Security In Online Reputation Systems Using Rate Auditing Tool
(RAT) 888
Kalaivani, Dhivyalakshmi.D, Tamilarasi.V, Bhavani.P
Uncertain Data Prediction On Dynamic Road Network 893
I.Sasikala, M.Ganesan, John.A
Using Genetic Algorithm For Avoiding Redundant Matched Substring Within
A Web Based Join Framework 897
171. IT 650
172. IT651
173. IT 656
174. IT658
175. IT659
176. IT660
177. IT663
178. IT664
179. IT665
180. IT666
181. IT 668
182. IT670
183. IT671
184. IT673
185. IT 676
186. IT 683
187. IT684
188. IT 685
189. IT686
Anandajothi.M, Thenmozhi.R
Reduced Three Steps Logarithmic Search for Motion Estimation 902
Hussain Ahmed Choudhury, MonjulSaikia
A Scalable Cloud Computing Deployment Framework For Efficient Mapreduce
Operations Using Apache Yarn 907
EbinDeni Raj, Nivash J.P M.Nirmala, L.D DhineshBabu
A Scalable Protocol Agnostic Backup Server 913
Meera Devi, ShrinidhiHudli, AjeetJha Meera Devi, Vandana S,
SardarManoranjitham.R
Survey On Recommendation And Visualization Techniques For Qos-Aware Web
Services 918
J.C. Rosaline Christi, K.PremKumar
Dynamic Downlink Resource Allocation for Wireless Networks with Inter-Cell
Interference 924
P.Karthik, G.Kumaran
Transposition Cryptography Algorithm using Tree Data Structure 929
Nikhil Agrawal, Manoj Kumar, M.A. Rizvi
Social Data Analysis for Predicting Next Event 935
Deivaraghavi, Usharani
Personalized Search Engines On Mining User Preferences Using Clickthrough
Data 940
S .Preetha, Vimal Shankar K.N
Squid-SMP: Design & Implementation of SquidProxy Server for Parallel
Platform 945
Sachin H Malave
Sentiment Classification Using Principal Component AnalysisBased Neural
Network Model 951
G.Vinodhini, R.M.Chandrasekaran
Multiagent Based Open Source For Supply Chain Management Using JADE 956
Rolls John, S.Balakrsihnan
Multi-Application Environment Using Concealed Data Aggregation In Wireless
Sensor Network 962
R.Sowmya, P.Vijayaraghavan
Real Time Recognition Of Traffic Light And Their Signal Count-Down Timings 967
D.VishnuPriya, M.BalaSubramanium, S.Sathya
Multidimensional Image Registered Scanner Using Mdpso (Multi-Objective
Discrete Particle Swarm Optimization) 973
V. Rishiganesh, Vishwanathan
An Optimized Bandwidth Allocation Scheme In Relay Node For Concentrated
WSNS 979
P.Bharathi, E.Kodhai
Providing Security and Integrity for Data Stored In Cloud Storage 984
Sujitkumar V. Chaudhari, Chandrashekhar S. Pawar, Pankaj R. Patil
IRMA-Improvisation of Image Retrieval with Markov chain based on
Annotation 989
G. Nandha kumar, V.Saranya
Blackhole and Grayhole Attacks in MANET 996
Ankit D. Patel, KartikChawda
An Optimal Centroid Based Actionable 3d Subspace Clustering 1002
V.Atchaya, R.Vanitha
190. IT689
Semantics Based Access Management Framework For Securing Data In Cloud
191. IT693
Auxilia.M, K.Raja
Performance Analysis Of Modified OLSR Protocol For MANET Using ESPR
Algorithm 1012
1007
192. IT694
193. IT696
194. IT699
195. IT701
196. IT703
197. IT710
198. IT711
199. IT713
200. IT716
201. IT718
202. IT725
203. IT728
204. IT732
205. IT735
206. IT739
207. IT743
208. IT745
209. IT746
210. IT748
211. IT845
K.Prabu, A.Subramani
A Secured Event Log Storage Management System In Cloud Computing 1017
D.Esther Grace Vinitha, J.Shiny Duela
Rfid Sensors For Food Safety Centre By Identifying The Physical Factors That
Affecting The Food 1022
M.S.Saravanan, N.Thirumoorthy, Jeyanta Kumar Singh
Privacy Conserving And Secure Distribution Of Personal Health Information
Using Cloud
1028
Kamalakannan.E, Aravind.K.S
Preferences Extraction and Ranking Functions in Mobile Search 1032
P. Anandajayam, D. Ashok Kumar
Moving Object Detection, Classification and its Parametric Evaluation 1037
R.Raj Bharath, G.Dhivya
Efficient Mining And Recommendation Of Sparse Data Through Collaborative
Filtering Technique In Medical Transcriptions 1043
P. Hema, N. Sowriraja Pillai
Probe Packet Based Congestion Free Service Discovery Architecture For Manet 1048
S Pariselvam, R.M.S. Parvathi, D. Franklin Thomas Antony Sharp
Effective Cooperative Diversity Technique For High Throughput In Mimo
Adhoc Networks 1053
B. Durgadevi, P. Sivakumar
Pose Invariant Face Recognition Using Hmm And Svm Using Pca For
Dimensionality Reduction 1058
R. Indumathi,N. Palanivel
A Robust Trust Aware Secure Intrusion Detection In Manet 1064
M. Jegannath, P. Sivakumar
Object removal strategy using 1070
Spatiogramic Technique
K. Seetharaman, N.Palanivel, K.Maruthavanan
Steganography Technique to Secure Patient Confidential information using
ECG Signal 1074
V. Sankari, K. Nandhini
Acquaint based grid clustering algorithm for Underwater wireless sensor
network 1081
V.Sundarameena, D.Priyatharisini
Model Based Essential Interactions Cluster Mining In Multivariate Time 1085
V.Saravanan, S.Chitra
Diagnosing Hepatitis B Using Artificial Neural Network Based Expert System 1091
C.Mahesh, K.Kiruthika, M.Dhilsathfathima
Intrusion Detection In Mobile Ad Hoc Networks Using Machine Learning
Approach 1098
T.Poongothai, K.Duraisamy
A perspective of Fault Tolerance for XOR in Neural Network 1103
Farhana Kausur, Mohammed Ameen Ulla
Dynamic Detection of Node Replication Attacks using X-RED in Wireless
Sensor Networks 1107
Abinaya, C.Geetha
On Field Performance Analysis of IEEE 802.11p and WAVE Protocol Stack for
V2V & V2I Communication 1111
Srikanth
Building Secure Network Using Polynomial Key Pre Distribution 1117
R. Parthiban,V. Vaishnavi
212. IT850
213. IT851
214. IT856
215. IT876
216. IT896
217. IT888
218. IT900
219. IT1303
Foreground Object Motion Detection By Background Subtraction And
Signalling Using GSM 1123
S.Priyadharshini, S.Dhanalakshmi
Discover Information And Knowledge From Websites Using An Visualization
Framework 1129
K.Santhi, P.Ramya
Greedy perimeter stateless routing in MANET’s 1135
G.Sujatha, N.Sridivya
Creating Ontology Based User Profile for 1142
Searching Web Information
P.Jayakumar, P.Shobana
Secure Localization of Multiple Spoofing Attackers 1148
M.Vijayalakshmi, S.Banumathi
e-Learning Management System Using WebServices 1155
N.Partheeban, N.SankarRam
A Framework for Fast IP Rerouting 1162
Vimal Kumar Pal, Sneha M. Ramteke
Various Job Scheduling Algorithms in Cloud Computing: A Survey
1168
Yash P. Dave, Avani S. Shelat, Dhara S. Patel, Rutvij H. Jhaveri
220. IT1315
Enforcing Secure and Privacy in Information Brokering System
K.Gunasekaran, M.Indumathi, D.Saravanan
1173
221. IT1318
Speech to Text and Accelerometer based Smart Phone Interaction System
1180
Monali P. Admane, Ratnaprabha Jasutkar
222. IT1323
223. IT1324
224. IT1325
225. IT1326
226. IT 1359
227. IT2015
228. IT2016
229. IT3001
230. IT3002
231. IT3003
232. IT3004
233. IT3005
Analysing The Effect Of Cluster Strategies In Multicast Traffic Using TAM
Protocol For Ad-Hoc Networks 1184
S Deepakraj, R.Thamilselvan
Implementation Of Multimodal Biometric Authentication Using Soft
Computing Techniques 1189
K.Gunasekaran, P.Mahalakshmi
Prevention Of Sybil Attack And Priority Batch Verification In Vanets 1195
P.Vinoth kumar, Maheswari
Modified AES Based Algorithm for MPEG Video Encryption 1200
PoojaDeshmukh, VaishaliKolhe
Design and Implementation of Three Phase Commit Protocol (3PC) Directory
Structure through Remote Procedure Call (RPC) Application 1205
Nitesh Kumar, Ashish Kumar, SoumyajitGiri
Production Inventory Model For Two Levels Of Production With Defective
Items And Shortages 1210
Shivashankari
Stronger Authentication for Password using Virtual Password and Secret Little
Functions 1217
V. Saranya, P. Umadevi
User Preferred Data Enquiry System Using Mobile Communications 1223
J.Allen Shanny, K.Sudharson
Enhanced Techniques To Strengthening DTN Against Flood Attacks 1228
D.S.Delphin Hepsiba, S.Prabhu
Power Draining Prevention In Ad-Hoc SensorNetworks Using Sensor Network
EncryptionProtocol 1232
E.Mariyappan, C.Balakrishnan
A Partial Inference Control Based Data 1237
Disclosure with Effective Cost in Cloud
T.Pavithra, G.Umarani Srikanth
An Efficient Data Security System For Group Data Sharing In Cloud System
Environment 1242
S.Simla Mercy, G.Umarani Srikanth
234. IT3006
1246
Parallel Computing Based Intelligent Web Service for Healthcare Platform
S.Srinivasan, S.Muthukumarasamy, N.Sivagamy
COMMUNICATION
Microstrip antenna based on durer pentagon fractal patch for multiband
wireless applications. 1251
Jacob Abraham, Aju John K.K, Thomaskutty Mathew
Lossy Image Compression using Multiwavelet Transform Coding. 1256
K. Rajakumar, T. Arivoli
235.
CS113
236.
CS114
237.
CS116
238.
CS117
239.
CS118
Data Hiding Technique By Using RGB-LSB Mechanism.
Vinit K. Agham, Tareek M. Pattewar
240.
CS122
241.
CS123
DT-CWT: Feature level Image Fusion based on Dual-Tree Complex Wavelet
Transform. 1276
Saleem Malik.S, S.P. Prashanth Kumar, Maruthi G.B.
Medical Image Tracking of Fluorescent Cells Using Otsu Model. 1282
P.Radhikala, G. Thiyagarajan
242.
CS130
Secure and Lossless Data Hiding by Histogram Shifting and Scan Paths using
Integer Wavelet Transform. 1286
A. Vinothini, L. Anju
243.
CS131
Patch Based Image Restoration Using Adaptive Bilateral Filtering.
Ammu G, K. Sakthidasan, Dr. V. Nagarajan
244.
CS136
Heartbeat Rate Monitoring System by Pulse Technique Using HB Sensor. 1296
Narinder Pal Singh, Jatin Arora, Amandeep Singh, Gagandeep, Gurvinder Singh,
Sarvesh S.S. Rawat
245.
CS137
Next generation auto theft prevention and tracking system for land vehicles.
MUX-Based Design of DPLL for Wireless Communication. 1262
Sabyasachi Bhattacharyya, Ripunjoy Sarma, Kaustubh Bhattacharyya, Roushan
Saikia, Ragib Nasir Ahmed
ASIC Implementation of High Speed Pipelined DDR SDRAM Controller. 1266
Satish Reddy. N, Ganesh Chokkakula, Bhumarapu Devendra, K. Sivasankaran
1271
1291
1301
Bavya R, Mohanamurali R
246.
CS142
An Electronic Walking Stick For Blinds.
Shashank Chaurasia, K.V.N. Kavitha
1306
247.
CS144
Fabric quality testing using image processing. 1311
Agilandeswari.V, Anuja.J, Elizhabeth Dona George, Prasath.R
248.
CS146
Implementation of Edge Detection Using FPGA and Model Based Approach
1315
Sofia Nayak, Prof. Shashank Pujari, Dr.P.K. Das
249.
CS147
Pedestrian Detection and Tracking through Hierarchical Clustering.
Selva Raj K, R. Poovendran
250.
CS148
Effective optimization of video transmission in WLAN.
Nagesh V
1325
1321
251.
CS149
Improved accuracy performance of air for remote sensing application using
multisensor. 1330
Sathiyanarayanan R, R. Poovendran
252.
CS152
Improved Subjective and Objective Image Quality Assessment of Jpeg Image.
1334
Chitresh Bhargava, Nidhi Verma
253.
CS153
Design and Implementation of FIR Filters Using On-Board ADC-DAC & FPGA
1341
Prangya Paramita Muduli, Amruta Panda, Rasmita Badhai, Yougajyoty Sahoo, Prof.
Sashank Shekhar Pujari, Sofia Nayak
254.
CS155
Smart Shopping Cart with Automatic Billing System through RFID and ZigBee.
1347
P. Chandrasekar, T. Sangeetha
Development and Analysis of Microstrip Antenna for Wireless Local Area
Network (IEEE 802.11y). 1351
Neelamegam.D, Rajesh.V
VHDL Implementation of IEEE 754 Floating Point Unit. 1356
Anjana Sasidharan, P. Nagarajan
255.
CS157
256.
CS158
257.
CS160
258.
CS165
259.
CS200
Wavelet-based Watermarking for Copy Rights Protection.
H.E. Suryavanshi, Amit Mishra, Shiv K. Sahu, M.L. Mali
260.
CS201
Image Inpainting Techniques for Removal of Object.
Mahesh Mahajan, Praveen Bhanodia
261.
CS202
Secured Elliptic Curve Cryptosystems for Scan Based VLSI Architecture. 1379
K.P. Sridhar, Raguram.M,B. Prakash, S.Koushighan, S. saravanan
262.
CS203
263.
CS204
264.
CS205
265.
CS208
Detection of Exudates in Human Fundus Image with a Comparitive Study on
Methods for the Optic Disk Detection. 1384
Ravi.D, Karthik Soman
Design of Combinational Logic circuits for Low power Reversible Logic circuits
in Quantum Cellular Automata. 1389
Vivek Anand J, A. Kamaraj
Face Image Retrieval using Wavelet Transform and Dimensionality Reduction
Methods. 1395
Linu Kunjumon, D. Abraham Chandy
Embedded Robotic Design for the Space Manipulation and its Applications. 1401
M. Shanmugham
266.
CS209
267.
CS210
268.
CS212
Classification of Stress of Automobile Drivers using Radial Basis Function
Kernel Support Vector Machine. 1361
Sathiya.A,Karthik Soman, Suganthi N
A Drawing Robotic hand based on inverse kinematics. 1366
Shubham Agarwal, Sarvesh S.,S. Rawat, V. Sumathi
1371
1375
Evaluation of BER and Capacity for Ultra Wide Band communication
Receivers. 1406
S. Saranya Pauline, C. Veera lakshmi
Robust Video Watermarking Algorithms based on Svd Transform. 1411
Y. Raghavender Rao, Nikhil Prathapani,
Dr. E. Nagabhooshanam
Recognition of Elephants in Infrared Images using Mean-Shift Segmentation.
1416
Suseethra.S, Abraham Chandy D, Siva Mangai N.M.
269.
CS215
Performance Optimization of Cognitive Radio With Wideband Spectrum
Sensing. 1422
E. Saraniya, B. Lakshmi Priya
270.
CS216
Edge detection in the medical Mr brain image based on fuzzy logic technique
1427
J. Dinesh Kumar, V. Mohan
271.
CS217
272.
CS224
273.
CS229
A CPW Fed Octagonal Patch UWB Antenna with WiMAX Band-Notched
Characteristics. 1435
Abhishek Kumar, T. Shanmuganantham
A Biometric Encryption using face recognition system for watch list. 1440
Valarmathi.R, Sridevi Sathiya Priya.S, Siva Mangai N.M, Karthigai Kumar P.
A Low Profile Beveled Dipole Antenna With Via Holes For UWB Applications
1445
A. Nandhakumar, N.Mahendran
274.
CS230
275.
CS238
276.
CS240
277.
CS241
278.
CS242
279.
CS243
280.
CS258
281.
CS264
282.
CS267
283.
CS268
284.
CS269
285.
CS270
A Hardware-Efficient H.264/AVC Motion Estimation Using
Computation Aware Algorithm. 1451
S. Senthamizharasi, S.Sureshkrishna
Readout Method for Pathogen Detection using Biosensor. 1456
P. Sangeetha, Dr. A. Vimala Juliet
Adaptive
Hardware Implementation For Sending Concealed Data in Video by using
Wavelets. 1462
E. Venkatesan, V.P. Kolanchinathan
Combinational circuit design using Nanomagnetic logic. 1469
J. Jelin Feena, Prof.S. Manickavasagam
Robust Time-Varying Fading Channel Estimation with risk sensitive Filter
under Parameter and Process Noise Uncertainty. 1475
K.Rajendra Prasad, M. Srinivasan, T. Satya Savithri
Performance Analysis of 1 bit Full Adder Using GDI Logic. 1482
Shoba Mohan, Nakkeeran Rangaswamy
Improving the Conspicuity of Lung Nodules by use of "Virtual Dual-Energy"
Radiography. 1486
S. Manju Priyanka, R.I. Minu
Data hiding in gray scale images using integer wavelet transform. 1492
S. Uma Maheswari, D. Jude Hemanth
Metamaterial CPW- fed planar antenna for WLAN Applications. 1497
R. Jasmine Banu, R. Rajkumar, C. Elavarasi,
P. Thiruvalar Sevan
Speech enhancement using minimum mean square error filter and spectral
subtraction filter. 1501
N.Subathra, Kirubagari B, Palanivel S
Efficient Frequency Band Reallocation using Uniform Transmultiplexers with
FPGA implementation. 1507
C. Pavithra, R. Ajin
An Efficient Scheme for PAPR Reduction in Alamouti MIMO-OFDM Systems.
1512
G.S. Siva Priya, B. Senthil
286.
CS272
287.
CS274
288.
CS275
A Study of Reflected Micro Wave Behaviour on Multidisciplinary Fabricated
Surface & its Relation with RCS. 1517
Prasanna Puttaswamy, Pramod Srivatsa Krishna,
Dr. Bindu Anil Thomas
Design of CPW-fed Dual-folded Slot patch Antenna for 4.9 GHz Public Safety
Spectrum. 1522
P. Prasanna Kumar, Rammoorthyraju K
Stability Analysis of Linear Discrete Time System with Time Varying Delay
and Actuator Saturation. 1526
Nitesh Kumar Soni, Richa Negi
Optimization of Laser Satellite Communication System through Link Budget
Prediction. 1533
Dhanya Devarajan, Dr. Sakuntala S Pillai
Performance Improvement of Q-OFDMA Systems Using Low Complexity
Approach. 1540
T. Anusuya, S. Bharathi
Multi Radio clustering protocol for mobile networks. 1545
M. Hema Kumar, G. Nagalalli
289.
CS278
290.
CS279
291.
CS283
292.
CS284
Integrity Verification of Medical Images using Blind Forensic Method.
S. Govarthini, M. Vadivel
293.
CS285
294.
CS286
Reducing Energy Consumption using Data Encoding Techniques in Network on
Chip. 1558
S. Senthamil, P.Saravana Kumar
A Novel Microstrip Slot Antenna for Permittivity Measurement. 1563
Beulah Jackson, T.Jayanthy
295.
CS287
296.
CS288
297.
CS289
298.
CS290
299.
CS291
300.
CS293
Interworking of WLAN-LTE for next generation Wireless Networks.
G. Vijayalakshmy, G. Sivaradje
301.
CS294
Implementation of a low power LDPC decoder using bit serial architecture
1552
Highly Birefringent Photonic Crystal Fiber with Negative Dispersion and its
Propagation. 1567
Chandrani Paul, Naikatmana Pani, Pranaw Kumar, Amlan Datta
Visual and tag based social image search based on hypergraph ranking
method. 1573
K. Manjula, Palanivelraja
Efficient Channel Sensing Schemes for Multiuser in Mutichannel Cognitive
Radio networks. 1579
R. Mahalakshmi, R. Vijayakarthika
Contrast Enhancement Using Discrete Wavelet Transform And Adaptive
Transfer Function. 1585
Brintha S.P., Edwin Lawrence.S, Premnath S.P
A Novel image zero-watermarking scheme based on DWT-BN-SVD. 1589
Y. Raghavender Rao, Dr.E. Nagabhooshanam
1595
1601
M. Revathy, R. Saravanan
302.
CS295
An Experimental Analysis to Study the Characteristic Features of Gas Sensor
1605
Marcia.S, MeenuPriya R, Bhuvaneswari P.T.V, Saraswathi Priyadharshini A.
303.
CS296
Multivariate linear regression based activity recognition and classification
1610
Gayathri S, Saraswathi Priyadharshini A., Bhuvaneswari P.T.V
304.
CS297
EEG signal with feature extraction using SVM and ICA classifiers.
H. Kareemullah, Dr.P. Nirmal Kumar
1616
305.
CS299
Power-Efficient High Throughput Turbo Decoder Architecture For WSN.
N. Nanthini, P. Saravana Kumar
306.
CS301
307.
CS302
Video Frames Text Detection Through Bayesian Classification And Boundary
Growing Method. 1629
A. Nancy, D. Jayapriya
Imbedded spiral antenna for endoscope. 1635
Anila P. George, M. Sujatha
308.
CS304
Optimization of dynamic power and speed by trade off filter performance
K. Anandan, N.S. Yogaananth
1623
1640
309.
CS306
310.
CS307
311.
CS308
312.
CS311
313.
CS313
314.
CS314
315.
CS315
316.
CS317
317.
CS318
318.
CS320
An Efficient Hardware Multichannel Data Acquisition and Processing (DAQP)
System using ARM. 1645
M. Rubini, C. Rajasekaran
Mitigation of Process Variation in MOSFET-Based Narrowband LNA. 1651
D. Suresh, N. Vinodh Kumar, K.K.Nagarajan,
R. Srinivasan
Proportional Equal Throughput Scheduler- A Very Fair Scheduling Approach in
LTE Downlink. 1657
Sudheep. S, Rebekka. B
Improvements on construction of quasi cyclic irregular non binary LDPC
codes. 1663
M. Arulmozhi, M.Anbuselvi
Comparative Study of Octagonal Ring Photonic Crystal Fiber with GeO2 Doped
Structure. 1668
Aparna A. Nair, S.K. Sudheer, M. Jayaraju
A 1V Second Order Delta Sigma ADC in 130nm CMOS. 1674
K. Lokesh Krishna, D. Reena,T. Ramashri
SEU study of 4T, 6T, 7T, 8T, 10T MOSFET based SRAM using TCAD
Simulation. 1679
Y.V. Bhuvaneshwari, Nama Prem Sai, N. Vinodh Kumar, C. Thiruvenkatesan, R.
Srinivasan
Optimum Gate Voltage search for Junctionless Tunnel FET using TCAD
Simulations. 1686
J. Vadivukkarasi, N. Vinodh Kumar, K.K. Nagarajan,
R. Srinivasan
Frequency Independent Phase Shifter Circuit. 1692
Supritam Bhattacharjee, Sayan Mukhopadhyay, Souradeep Dutta, Subhankar
Bandyapadhyay, Arijit Mallick
An automated diagnosis system using wavelet based SFTA Texture Features.
1696
Saraswathi D, Sharmila G, Srinivasan E
319.
CS322
Antenna Azimuth Position Control using Quantitative Feedback Theory (QFT)
1701
Suresh Kumar Sahoo, Dr. B.K. Roy
320.
CS324
Microstrip Circular Patch Antenna Using With And Without Sorting Vias.
R. Subbulakshmi, P.T. Sivagurunathan
1707
321.
CS330
322.
CS331
323.
CS333
324.
CS334
325.
CS335
Near point monitoring of the ionosphere using dual frequency GPS data over
the Hyderabad region: a Kalman filter approach. 1711
K. Venugopal Reddy, P. Hari Deepak, K. Srividhya,
L. Visweswara Rao, Dr. V.B.S Srilatha Indira Dutt
Estimation of shielding effectiveness of perforated rectangular enclosure using
transmission line method for normal incidence and angle of incidence. 1716
V. Gopi, G. Kameswari, V. Bharat Kumar,
P.V.Y. Jayasree
Automatic Optic Disc Detection in Digital Fundus Images Using Image
Processing Techniques. 1721
Snehal B. Akhade, V.U. Deshmukh, S.B Deosarkar
Design and Implementation of Algorithm for Video 1726
Compression.
Megha S. Gaoture, Mrs.Trupti H. Nagrare
DSP Based Digital Controller for High Voltage SMPS. 1731
Pankaj A Bhoite, Ruch Patel, Vijay Sah
326.
CS336
327.
CS339
328.
CS340
329.
CS341
330.
CS342
331.
CS343
332.
CS345
Joint Source Channel Coding Strategies in Rayleigh Channels for Wireless
Systems. 1736
K. Mahalakshmi, B. Sreedevi
Forefinger Direction Based Haptic Robot Control for Physically Challenged
Using MEMS Sensor. 1741
Varalakshmi B.D., Thriveni J, Abhilasha Pachauri, Venugopal K.R, Patnaik L.M
Biological Effects of Microwave. 1747
Suruchi Kumari, S. Raghavan
Development of Novel Double Eye Structured Dual Band Antenna for 802.16d (
Fixed Wi-MAX). 1753
Ari Narayanan. M., S. Oudayacoumar, A. Karthik
Evaluation and Performance Analysis of Graph Theoretical Methods for Image
Segmentation. 1758
S.D. Kapade, S.M Khairnar, B.S Chaudhari
Power optimized high level synthesis of Multiply-and-accumulate (MAC) based
digital filter architectures under SNR constraints. 1765
N. Alivelu Manga, Dr. M. Madhavi Latha
Nonspecific-User Hand Gesture Recognition By Using MEMS Accelerometer.
1772
Jayaraman D, Vanitha K
333.
CS346
Soft Computing Based Segmentation of Anomalies on Abdomen CT Images
1778
S.N. Kumar, Dr. A.Lenin Fred
334.
CS349
Energy-Efficient Cooperative Beamforming for Secure Data Transfer.
Abinaya K, A.L. Karthika
1783
335.
CS351
CPW-Fed Square Patch Compact Antenna For C and X Band Applications.
1788
336.
CS353
C. Elavarasi, R. RajKumar, R. Jasmine Banu,
P. Thiruvalar Selvan
Representing a image using a Haar-wavelet Transformation for Human Parts
Detection. 1792
Gomathi S, T. Santhanam
337.
CS354
Comparative study of Radon based low resolution palmprint image matching.
1799
Jitendra Chaudhari, Pradeep M Patil, Y.P. Kosta
338.
CS356
Asynchronous Fine-Grain Power-Gated Logic.
Karthikeyan G, Manickavasagam S.
1803
339.
CS357
Reversible Data Hiding In Image Encryption With Efficient Compression And
Enhanced Security. 1809
B. Elang Kavin, B. Latha
340.
CS358
341.
CS359
A Novel CPW Bandpass Filter Based on Negative Indexed Materials for Wi-Max
Application. 1814
U.Surrendar, G Brenie Sekar
SURE Regularization for Diffuse Optical Tomography. 1819
K.Uma Maheswari, S. Sathyamoorthy
342.
CS360
Microstrip Circular Antenna Array Design for Radar Applications.
Angeline M. Flashy, A. Vijaya Shanthi
343.
CS362
Design of an UWB Antenna With Truncated Ground Plane.
Niranjana Devi K, Priya M
344.
CS363
Adaptive reliable cooperative data Trasmission technique for wireless body
area network. 1833
Meena Priya Dharshini P, M. Tamilarasi
1824
1829
MISR Architectures To Remove Unknown Values 1837
in Output Response Compaction.
Aruna S.R. , K.S. Neelukumari
A voice-input voice-output communication assists in favor of people with
harsh verbal communication destruction. 1841
M. Babu, Mr.V.Dhilip Kumar
Balanced PV Cascaded Multilevel Grid-Connected 1847
Inverters under Level-Shifted PWMs with Fuzzy
Controller.
E. Prem Kumar, Dr. S. Rajkumar
An Efficient Adaptive Fusion Scheme for Cooperative Spectrum Sensing in
Cognitive Radios over Fading Channels. 1851
G. Loganathan, G. Padmavathi, S. Shanmugavel
Design of an ECG acquisition device for the nonlinear analysis of Heart Rate
Variability (HRV). 1856
Sindhu.G, Dr. Sankar.P
Adaptive Traffic Management with VANET in V to I Communication Using
Greedy Forwarding Algorithm. 1862
R. Yugapriya, P.Dhivya,M.M Dhivya,Mr.S.Kirubakaran
An Efficient Architecture for the Adaptive Filter Using Delayed LMS
Algorithm. 1867
P. Priya, Dr.P. Babu
Transaction clues based video summarization using by speeded up robust
features. 1873
N. Brindha, Dr.T.Amitha
345.
CS364
346.
CS365
347.
CS366
348.
CS369
349.
CS370
350.
CS373
351.
CS375
352.
CS378
353.
CS380
354.
CS381
355.
CS383
356.
CS384
357.
CS386
358.
CS387
359.
CS389
Non-Intrusive Bit Swapping Pattern Generator for BIST Testing of LUTs.
G.Devi Prasanna, P. Abinaya, J. Poornimasre
360.
CS390
361.
CS393
Content based image retrieval using color and texture feature extraction in
android. 1916
Vel Murugan M, P.Jeyanthi
Vision System for Automatic Counting of Silkworm Eggs. 1923
Amruta Pandit, Jyoti Rangole,Rajveer Shastri, Shankar Deosarkar
A Novel Decentralized Trust Evaluation Model For Secure Mobile Healthcare
Systems. 1879
Sahaana.V, Sakthipreetha.A, R.Sukanesh
Anonymous location aided secure routing protocol. 1884
V. Manjuladevi, R. Jennie Bharathi
Design and Study of Modified Parallel FIR Filter 1890
Using Fast FIR Algorithm and Symmetric Convolution.
D. Ashok Kumar, Dr.P.Samundiswary &
Maroju SaiKumar
A Simple Fuzzy Method to Remove Mixed Gaussian-Impulsive Noise from
Colour Images. 1896
Arivarasi.A, S. Manickavasagam
Non-subsampled Contourlet Based Deformable Model For Medical Image
Segmentation. 1900
Hiren Mewada, Supraya Patnaik
Comparative study of similarity measures for launch vehicle telemetry data. 1905
Manusubramanian S, Sumitra S, Jishy Samuel
1912
Increasing the Speed and Reducing A sensing delay of Content Addressable
Memory. 1928
N. Pavithra, E. Shalini, C. Ganesh Babu
Design and simulation of Nano scale MOSFET for next generation VLSI
circuits. 1934
E. Subhasri, Sanjoy Deb
iii-v MOSFET as advance low dimensional transistor. 1938
P.Deepika, Sanjoy Deb
362.
CS394
363.
CS395
364.
CS397
365.
CS500
An Improved Content Based Image Retrieval using Three Region Color,
Straight-Line and Outline Signatures of the Image. 1942
L. Jayanthi, K. Lakshmi
366.
CS666
367.
CS777
368.
CS130
1
Reconstruction of Images with Exemplar Based Image In painting and Patch
Propagation. 1948
Manoj S. Ishi, Lokesh Singh, Manish Agrawal
A Brief Study of Image Segmentation using Thresholding Technique on a Noisy
Image. 1953
V. Sivakumar, V. Murugesh
A Modified Sierpinski Gasket Triangular Multiband Fractal Antenna for
Cognitive Radio. 1959
A. Rajshree, S. Sivasundarapandian,C.D. Suriyakala
369.
CS130
3
Authenticated Secure Bio-metric Based Access to the Bank Safety Lockers.
370.
CS130
7
371.
CS130
9
372.
CS131
2
373.
CS131
4
374.
CS131
5
High speed Low power Multiple Bit Subtractor Circuit Design Using High
performance domino Logic. 1972
Ms.S. Sivasankari, J. Ajayan & D. Sivaranjani
Kernel methods and machine learning techniques for man-made object
classification in SAR images. 1978
P. Deepthi Jordhana, K. Soundararajan
An Implementation of 1- bit low power full adder based on multiplexer and
pass transistor logic. 1984
Rajesh Parihar, Nidhi Tiwari, Aditya Mandloi,
Dr. Binod Kumar
Rogue Access Point Detection Methods: A Review. 1987
Sweta Anmulwar, Shalvi Srivastava, Vinodh Kumar, Shrinivas P. Mahajan, Anil
Kumar Gupta
FPGA based low complexity multi-purpose reconfigurable image processor. 1993
V. Balaji, R. Krishnaveni
375.
CS131
7
Analysis of RSSI in Diverse Field.
T. Vimala,Dr. Uma Rajaram
376.
CS131
9
Enhancing Content Based Image Retrieval by using Sketches.
Prasad P. Mahale, Rakesh K. Bhujade, Amit Mishra, Shiv Kumar
377.
CS132
0
An Analysis for MC- DS CDMA using optimized coding technique.
Vedasundaravinayagam P, Sivaraju .U, Jenath M
378.
CS132
3
379.
CS132
9
Content based image retrieval and segmentation of medical image database
with fuzzy values. 2011
S. Pradeep,L. Malliga
VisKey- An Implementation for Hiding Information. 2018
Reshma R, Aishwarya G.M.
1965
Srivatsan Sridharan
1999
2002
2006
380.
CS133
0
Programmable synaptic memory with spiking neural network in VLSI.
V. Sivakumar, M. Malathi, Elango B
2025
381.
CS201
4
Reliable data delivery for highly dynamic mobile adhoc networks.
Vimala S, Narenoer Malishetty, Srivasta S.K
382.
CS201
5
An efficient automatic speech emotion recognition for tamil language based
on DWT and MFCC using stability-plasticity dilemma neural network. 2039
C. Sunitha Ram, Dr. R. Ponnusamy
383.
CS201
6
Efficient channel adaptive mimo detection scheme with switching strategy.
384.
CS300
1
385.
CS300
2
A survey of backpressure based scheduling algorithms for delay tolerant
networks. 2050
J. Dhivya, M. Vanitha Lakshmi
Peak to average power ratio reduction of OFDM system. 2055
T. Gayathri, K. Bavithra
386.
CS300
3
Adaptive spatial modulation using candidate reduction technique.
G.S. Gnana Jeni, C. Arunachala Perumal, Dr. C.Arun
387.
CS300
4
Intelligent beamforming to improve the spectral efficiency in MIMO systems
388.
CS300
5
389.
CS300
6
Design of wideband printed slot antenna with polarization diversity using
hybrid feeding techniques. 2068
T. Pushpa, M. Vanitha Lakshmi
Advancement in Caesar Cipher by randomization and delta formation. 2072
A. Rajan, D. Balakumaran
390.
CS300
7
The performance comparison of different variants of spatial modulation.
B.Revathi, C. Arunachala Perumal, P. Poonguzhali, Dr.C.Arun
391.
CS300
8
Segmentation and compression of
telemedicine application. 2081
S. Sathiya Lakshmi, M. Vanitha Lakshmi
2030
2045
S.A. Yuvaraj, Dr.L.C. Siddanna Gowd
2060
2064
A. Nithya, C. Arunachala Perumal, Dr. C.Arun
medical
image
using
2076
MSPIHT
in
EMBEDDED SYSTEMS
392.
ES003
393.
ES107
394.
ES112
395.
ES113
396.
ES116
397.
ES118
398.
ES119
399.
ES123
Single Photon Transistror 2086
Banuchandar J, Uthirapathi D
EARMP:A Unified Application Specific MAC Protocol for Wireless Sensor 2091
Networks
C.Venkataramanan, S.M.Girirajkumar
Fuzzy Based Energy Management System for a Polygeneration Microgrid 2096
Nimitha Rose Peter, M.Ramesh Babu
Optimal Wakeups Clustering for Highly-Efficient Operation of WSNs Periodic
Applications 2103
Carlo Brandolese, Luigi Rucco, William Fornaciari
Implementing of High Throughput Group-Based MAC for WLANs 2110
E. Porkodi , J. Gobinath, M.Vinoth Kumar.
Design and Analysis of New Multilevel Inverter Topology with Induction Motor
Load 2116
S. Nithya, CR Balamurugan, SP Natarajan
Modeling and Controlling of BLDC Motor Based Fuzzy Logic 2121
M.S.EvangelinBlessy, M.Murugan
Approximate Analysis Of Transient Heat Conduction In The Rotor Of An
Induction Motor During Star-Delta starting 2127
400.
ES125
401.
ES126
402.
ES128
403.
ES129
404.
ES132
405.
ES136
406.
ES138
407.
ES146
408.
ES147
409.
ES149
410.
ES154
411.
ES155
412.
ES158
413.
ES159
414.
ES163
415.
ES165
416.
ES166
417.
ES168
418.
ES169
419.
ES170
Nirmal Kumar Bhattacharya, Dr.Debasis Sarkar
StatCom Control For Voltage Stability Improvement at a Fixed Speed Wind
Farm under Unbalanced Faults 2133
M. Vimalraj, B.Alex, M.Tamilarasi
High efficient power electronic inverter topology with SPWM technique for
single phase transformer less utility interactive photovoltaic system 2139
Abima Justus
A novel method of induction motor operating mechanism using neural
network 2145
S Sankar, D Ganesan, U Manojkumar
Reliable Soc Estimation For Battery Powered Embedded System 2150
B.Johnsema, K.Janakiraman
Distributed Power Generation for Isolated Loads Using Smart Grid Technology 2155
K.Vivekanandan, P.Prabu
Robust Encryption Algorithm Based Sht In Wireless Sensor Networks 2160
G. Uma, G.Sriram
Low-Power Folded Tree Architecture and Multi-Bit Flip-Flop Merging 2165
Technique for WSN Nodes
K Hemapriya, R Karthikeyan
Strategy of Sink Trail Protocol for Energy Efficient Data Gathering in Wireless
Sensor Network 2171
BhavnaPise, NekitaChavhan
Fast Transverse-RLS Algorithm Based Power System Harmonic Estimation
2177
S K Singh, A Nath, R Chakraborty, J Kalita, N Sinha, A K Goswami
Design and Analysis of Bi-stable MEMS Switch 2182
Joshitha C, B.S. Sreeja
Development of an Ultra-Low Power WSN Gateway for Outdoor Deployments
2186
Prateek Rajgarhia, Praveen James, Vivek Nainwal, Sowjanya P, Santosh Sam Koshy
Railway Fail-Safe Signalization and Interlocking Design Based On Automation
Petri Net 2193
BidhanMalakar, B.K. Roy
Real time hand gesture recognition using AVR microcontroller 2197
M.Shakunthaladevi, R.B.Revathi.
Fault indulgent in embedded memory using WCET Real Time Embedded
System 2203
D Divya, A Karthikeyan, G Panneerselvam
THD Reduction and Voltage Flicker Mitigation in Power System Base on
STATCOM 2209
Teja SreenuTadivaka, M.Srikanth, T.VijayMuni
Cluster-based mechanism for multiple spoofing attackers in WSN 2215
T. Meena, M. Nishanthy, E. Kamalanaban
Analysis of EMI terminal modeling of switched power converters 2220
M.Ananthi, Nerenjana J, R. Ramesh,M. Kavitha
Design and Development of Data Acquisition System for A Remote Furnace
using MSP430G2553 and Zigbee 2226
NaveenKumarUttarkar, ArunaKommu, RaghavendraRaoKanchi
Advanced Train Reservation And Passenger Intimation With Safety System 2231
B.T. Tharani Sri Sakthi, Jessen Joseph Leo , Ms.R.Monisha, Dr.S.M Ramesh
Recovery of Holes Problem in Wireless Sensor Networks 2236
PoojaChaturvedi, A. K. Daniel
420.
ES171
421.
ES172
422.
ES175
423.
ES176
424.
ES178
425.
ES185
426.
ES186
427.
ES188
428.
ES193
429.
ES195
430.
ES196
431.
ES197
432.
ES199
433.
ES200
434.
ES203
435.
ES204
436.
ES205
437.
ES206
438.
ES207
439.
ES300
Enhanced Lifetime Distributed Power Saving Algorithm in Wireless Sensor
Networks 2242
Ranjeet B. Kagade, Rachana A. Satao
Microcontroller Based Non Invasive Diagnosis of Knee Joint Diseases 2248
G Hari Krishnan, R Ananda Natarajan, Anima Nanda
An optimized routing approach in wireless sensor networks 2251
B.S. Pavithra, A.Asha
EHMBA: An Energy Efficient Hybrid MAC Multihop Broadcast Protocol for
Asynchronous Duty-Cycled Wireless Sensor Networks 2257
Nami Susan Kurian, B.Priya
Neural network based MPPT for high performance wind generator using DFIG 2263
J.Priyadarshini, J.Karthika
Reliable data transmission in wireless sensor network 2268
S. Sangeethapriya, R. Amutha
Data Aggregation in Wireless Sensor Networks 2274
S. Sahana, R. Amutha
Reactive power minimization and unity voltage transfer in a distorted AC
supply by using hybrid indirect matrix converter 2280
C.Raja,A. Prabha, S. Sivaranjani
Performance Analysis of Non-Integer Order PID Controller for Liquid Level
Control of Conical Tank System 2285
S. Janarthanan, KN Thirukkuralkani, S Vijayachitra
LabVIEW Implementation of Liquid Density Measurement Using Ultrasonic
Transducers 2290
BK Roy, Santhosh KV, Rahul Kumar Bharthi, Ravi kanthMani
Modelling Analysis Reference Point And Imparting Mechanism In Wireless
Sensor Network 2294
Gayathri Devi S, NandhaKumar R
Review on fault tolerance with minimal topology changes in WSAN 2299
Nisha M.Katre, Mangala S.Madankar
A Solution to Energy Hole Problem In Wireless Sensor Networks Using 2303
Witricity
Mahendrababu K, Lakshmi Joshitha K
A Monte Carlo-Rough Based Mixed- Integer Probabilistic Non-Linear Programming model for
predicting and minimizing unavailability of Power system components 2309
Akshat Dube, Prateek Saraf, Rajnish Dashora, Rohit Singh
Catch Me If You Can – A Proposal Mechanism Against the Cooperative Attacks in Cognitive
Radio Networks 2315
Hari Haran V, Jeyapiriya K
Musical Metronome with Tempo Detection, Synchronizer and Gesture 2320
Processing
Mahesha Padyana, Bindu A Thomas
A Compact Remote Switching With Efficient Monitoring For AC Plants 2325
Vivek.L, Syed muzammil.H
Analysis of torque ripple failure in electric drive for electric vehicle propulsion
system 2330
M.R.Dineshraj, V.Arunkumar
Comparative Analysis of LUT Design In FPGA 2334
Ayesha Firdous, B.Rajan
Design and Development of Sensor-Based Mini Projects for Embedded System
Laboratory Using ARM Cortex-M3( LPC1768 ) 2337
440. ES1301
441. ES1305
442. ES1306
443. ES1307
444. ES1310
445. ES1312
446. ES1313
447. ES1314
448. ES1317
449. ES1318
450. ES1320
451. ES1324
452. ES1330
453. ES1331
454. ES3001
Aruna Kommu, Naveen Kumar Uttarkar, Raghavendra Rao Kanchi
Design of Matrix Converter in Windmill for Frequency Stabilization 2343
S Vaishali, A. Jamna
Identification of Defect in Labels on Cigarette Packets Using LabVIEW 2350
AbahanSarkar, B K Roy
Synchronization of Lu and Bhalekar-Gejji Chaotic Systems using Sliding Mode
Control 2355
Jay Prakash Singh, PiyushPratap Singh, B K Roy
PI based Sliding Mode Control for Synchronization of Lu and BaoHyperchaotic
Systems 2360
PiyushPratap Singh, Jay Prakash Singh, B K Roy
Improving Wireless Sensor Network Lifespan By Efficient Routing Algorithm
And LZW Compression 2365
S.Prabu, R.Maheswari
Identifying Human And Tracking Using WSN with Webcam and GSM 2370
Ranjith Kumar A, J. Paranthaman
An Analytical Approach to Secured Routing Protocol Using Pre-Key
2375
Distribution in Clustered Wireless Sensor Networks
SS Kasirajan, RVK Manoj Kumar, SB Manoj, S Rajasoundaran, P Narayanasamy
Lung Tissue Detection And Classification Using Novel Intensity Features and
PNN 2380
M .Mohanam, T. Ramya
Accident Inference And Data Accquisition In Automobiles 2384
M.DhivyaSankari, M.Kiruthiga, B.T.Tharanisrisakthi
MPSoC based dynamic power management in wireless sensor networks 2388
G.Maryam Banu
Developing The Fabricated System Of Automatic Vehicle Identification Using
Rfid Based Poultry Traceability System 2394
G S Ajay Kumar Reddy, S.V. Jagadesh Chandra, B.Naresh Kumar Reddy
A Functional ARM movement tracking and monitoring system using 2400
Electogoniometer
Asley Zimoga S, Padmanaban L
Implementation of Hummingbird 1s Cryptographic Algorithm for Low Cost
RFID Tags using LabVIEW 2404
PVG Raj Pritha, N.Suresh
Design of Low Power and High Speed Modified Carry Select Adder for 16 bit
Vedic Multiplier 2408
Bhavani Prasad Y, Ganesh Chokkakula, Srikanth Reddy P, Samhitha NR
Fault –Tolerance of Reconfigurable Logic in Memory Using AGT 2414
C. Subashini, T. Mohanapriya, Uma Rajaram
Related documents