Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
2014 International Conference on Information Communication and Embedded Systems (ICICES 2014) Chennai, India 27-28 February 2014 Pages 1-808 IEEE Catalog Number: ISBN: 1/3 CFP1474U-POD 978-1-4799-3698-4 TABLE OF CONTENTS S. No ID 1. IT001 2. IT005 3. IT008 4. IT009 5. IT010 6. IT011 7. IT020 8. IT024 9. IT028 10. IT029 11. IT030 12. IT032 13. IT131 14. IT139 15. IT141 16. IT142 17. IT143 18. IT146 INFORMATION TECHNOLOGY Managing Performance Of Web Based Application Through Agile Approach And Improving ROI 1 B.Vani, B.Surya, R.Deepalakshmi A Novel way of Accessing PL/SQL functions and providing Dynamic Adaptability using Aspect Oriented Programming 5 BangaruBabuKuravadi, Ravi Teja Myla, ShaliniAlajangi Automated Diagnosis Of Glaucoma Using Haralick Texture Features 11 S. Simonthomas, N.Thulasi, P.Ashraf Multioriented Video Scene Based Image Dehazing Using Artificial Bee Colony Optimization 17 S.Chitra, M.ArockiaIrudayaraja Dynamic Placement Of Virtualized Resources For Data Centers In Cloud 21 S.Usmin, M.ArockiaIrudayaraja, U.Muthaiah Envisage And Authoring A Video With Sketch And Text Gloss SSG 27 R.Selvi, K.Satheesh Secure Multicloud Storage With Policy Based Access Control And Cooperative Provable Data Possession 31 Vishnupriya.S, P.Saranya, Rajasri Interfirewall Optimization Across Administrative Domains For Enabling Privacy Preserving And Security 37 Arunadevi, Pon.Arivanandham Implementing Secure Data Access Control For Multi-Authority Cloud Storage System Using Ciphertext Policy-Attribute Based Encryption 42 S.Vijaya Lekshmi, M.P.Revathi Biosecure-Cloud Ancestry Detector: Persuading Species Analysis And Ancestral Detector Based On Solitary Score 48 T. Prasath, B.RubaDevi Implementation of ElGamal Elliptic Curve Cryptography Over Prime Field Using C 54 DebabratBoruah, MonjulSaikia Applications and Requirement for Color Bit Depth Scalability Paper's 61 Aravind Kumar. S Implementing HMAC In Expedite Message Authentication Protocol For Vanet 67 V. Vijayabharathi, P.D.Sheba Kezia Malarchelvi An Efficient Mobile Commerce Explorer For Mobile User’s Behavior Pattern Mining And Prediction 72 S. Nagalakshmi, R. Sumathi Improving Habitability of NLI for Querying Ontologies with Feedback 79 Arivarasan S Monitoring Qos Parameters Of Composed Web Services 85 Karthikeyan. J, Suresh Kumar.M A Survey Of Jamming Attack Prevention Techniques In Wireless Networks 91 S. Sowmya, P.D. Sheba KeziaMalarchelvi Grid Architecture For Scheduling And Load Balancing – An Assessment 95 B.Priya 19. IT147 20. IT150 21. IT151 22. IT152 23. IT153 24. IT 160 25. IT170 26. IT171 27. IT172 28. IT176 29. IT181 30. IT182 31. IT183 32. IT185 33. IT186 34. IT187 35. IT188 36. IT189 37. IT190 38. IT191 39. IT196 40. IT197 SBBSCS: Sha Based Biometric Smartcard Security 102 GerlyEldose, Kovendan.V Detecting Misbehavior Node In Wifi Networks By Co-Ordinated Sampling Of Network Monitoring 109 M.Shanthi, S.Suresh Information Extraction Based On Probing Algorithm With Bayesian Approach 113 Dannie Davidson, I.Jeena Jacob, K.G.srinivasagam A Survey On Hand Gesture Recognition For Simple Mouse Control 117 R.Suriya, V.Vijayachamundeeswari Document Grouping With Concept Based Discriminative Analysis And Feature Partition 122 S Kajapriya, K.N.Vimal Shankar Complete Study On Distributed Denial Of Service Attacks In The Presence Of Clock Drift 126 C.Kavitha Contextual Image Search with Keyword and Image Input 132 Shiyamala.M, Kalaiarasi.G MC2 For Enhancing The Lifetime Of A Cellular Device 137 R.Baskarane, P.Archana, A.Priyadarshini, P.Hemalatha On The Concert Of Predictable Broadcast Reckon (Pbr) For Wireless Mesh Networks Used In Vanets 142 Vigneshkanna.B, Manikandan.M Systematic Approach for validating Java-MongoDB Schema 148 GokulPrabagaren Data Security And Privacy Using Data Partition And Centric Key Management In Cloud 152 Sendhil Kumar K.S, Krunal Patel, Navneet Singh, Kushang Parikh, Jaisankar N. A Fuzzy ERM for Extracting and Modeling Uncertain Spatial Expressions in Text 157 Kanagavali, K.Raja Efficient And Secure Techniques For Protecting Data In The Cloud 164 R.Jeena, S.Saravana Kumar, S. KavinHari Hara Sudhan An Object Based Software Tool For Software Measurement 169 G.Santhoshini Securely Detecting An Intruders In Manets System 174 G.Indumathi, S.Sakthivel Reconfigurable Hardware for Patient Monitoring Systems 179 PavanKoundinya, Vinod S, Karthik Reddy B M, DeepashreeDevaraj, Mallikarjuna M Soft Computing Based Estimation Of Software Development Effort 185 S Saraswathi, N Kannan Data Mining Techniques For Crm 191 R Senkamalavalli, T.Bhuvaneshwari Supervision Of Network Through Software Defined Networking 194 K. Venkatraman, V. Parthasarathy, S.Senthil Kumaar, M.Jayalakshmi Efficient Data Delivery In Mobility Aware Zigbee Wireless Networks 201 Prinslin.L, V.Janani Application Specific Optimization of Coarse-Grained Reconfigurable Architecture by Dynamic Context Compression 206 S.Priyadharsini, A.Srilalitha User search goals using classified average precision inference 214 T.Chellathamizhan, S.Bhuvaneswari, Enhancing Logo Matching and Recognition using local features 218 C.Kalaiyarasi, S.Karthikeyan Optimized Cluster Validation Technique for Unsupervised Techniques 224 R.krishnamoorthy, S. Sreedhar Kumar A Neural Network based framework for Apache YARN 230 Nivash J.P, Ebin Deni Raj, L.D. Dhinesh Babu, M.Nirmala Effective Categorization of Text in Practical Design 236 M.Sambath,S.Ravi, K.Ramesh Kumar 41. IT198 42. IT218 43. IT219 44. IT221 45. IT300 Handovers In Wimax Technology 241 C. Suganya, A.Sumithra, S.Karthik, J. Rajeevrathan 46. IT302 47. IT303 48. IT307 49. IT308 50. IT309 51. IT311 52. IT313 53. IT317 54. IT324 Enhancing Sample Classification For Microarray Datasets Using Genetic Algorithm 247 P.Aarthi, E.Gothai A Survey And Vital Analysis Of Various State Of The Art Solutions For Web Application Security 250 Anna Thankachan, R.Ramakrishnan, M.Kalaiarasi Exclusive Technique For Stocking And Probing Data Table Integration Using The Internet 258 T.Divya, M.Nithya Performance analysis of static images and solution for dynamic tracking in private cloud 263 R.Priyadarshini, LathaTamilselvan, Kanimozhi.S Hybrid Routing Scheme Of Multi Agent Ant Based System In MANET Combination Of Proactive And Reactive 269 H.Vignesh Ramamoorthy, H.Karthikeyini Adaptation in Clustering Algorithm by Algorithm Output Granularity for Mobile Data Stream Mining 276 Rahul Wasule, R.A. Fadnavis A Performance Analysis of MapReduce Applications on Big Data in Cloud based Hadoop 280 ParthGohil, DweepnaGarg, BakulPanchal Data Fusion In Ontology Based Data Integration 286 K.Saranya, M.S.Hema, S.Chandramathi Intelligence Inference Semantic Caching And Query Processing 292 P.Mohankumar, J.Vaideeswaran 55. IT 330 Page Ranking Algorithms Used In Web Mining M.Sangeetha, K.Suresh Joseph 297 56. IT336 A Survey on Closed Sequential Pattern Mining V. Purushothama Raju, G.P.Saradhi Varma 304 57. IT339 58. IT340 An Efficient, Dynamic, Privacy Preserving Public Auditing Method On Untrusted Cloud Storage 310 R. Navajothi, S. Jean Adrien Fenelon A novelty approach of symmetric encryption algorithm 316 Kishore Dasari, S. Satish Kumar, V.Srikanth, B. Veramallu, K Srinivasulu 59. IT342 Clustering An Advanced Grammatical Evolution Approach for Intrusion Detection on multicast routing in MANET 320 A.Fidalcastro, E.Baburaj 60. IT344 Comparative Analysis Of Wi-Fi And Wimax D. Roselin Selvarani, T.N.Ravi 324 61. IT400 A Survey On Video Distribution Services In Cloud Computing P.Sobiya, M.Gomathinayagam, K.Ramar 62. IT402 63. IT406 64. IT407 65. IT408 66. IT409 67. IT410 68. IT411 69. IT413 70. IT414 71. IT415 72. IT416 73. IT419 74. IT420 75. IT421 76. IT423 77. IT424 78. IT425 79. IT434 80. IT437 81. IT439 Depletion of Vampire Attacks in Medium Access Control Level using Interior Gateway Routing Protocol 338 R.Abirami, G.Premalatha Face Detection Based On Skin Color Model And Connected Component With Template Matching 343 M.Mahadevi, C.P.Sumathi An Acknowledgement Based Secure Data Transmission In MANETS 347 J.K.Harika, C.Jayakumar Overview of Data backup and Disaster Recovery in Cloud 352 S. Suguna, A. Suhasini HHCS: Hybrid Hierarchical Cluster Based Secure Routing Protocol For Wireless Sensor Networks 359 C. Deepa, B.Latha Creation Of Zonal Map From Point Data Using Morphological Opening By Skeletonization 365 D.Priya, G.Singaravel A Novel Approach for Edge Adaptive Steganography on LSB Insertion Technique 369 P.U.Deshmukh, T.M.Pattewar Overview Of Mobile Agent Security Issues- Solutions 373 S. SobithaAhila, K.L.Shanmuganathan Analyzing The Effect Of Bagged Ensemble Approach For Software Fault Prediction In Class Level And Package Level Metrics 379 Shanthini. A, Chandrasekaran RM Traffic Sign Detection and Recognition Using OpenCV 384 P. Shopa, N. Sumitha, P.S.K Patra Equipped Search Results Using Machine Learning From Web Databases 390 G. Abinaya, B.Jaishanthi Secure Data Transfer In Manet Using Hybrid Cryptosystem 396 Sivaranjani S, Rajashree Nepotism Responsive Of Data Mining For Prejudice Inimitability 401 C. BalaSaravanan,,R. Sugumar Broadcast Scheduling And Link Scheduling In Ih-Mac For Wireless Sensor Networks 404 R.Sivasuriya, T.A.Ananth Quota Based Routing Protocol In Disruption Tolerant Networks 410 Clarabelle Joanna.D, Sathyavathi.R Nature Inspired Preemptive Task Scheduling For Load Balancing In Cloud Datacenter 414 G.Shobana, M.Geetha, R.C.Suganthee An Enhanced Model For Effective Navigation Of A Website Using Clustering Technique 420 S.Renuka, P.Jayanthi Profit Maximization in Cloud Computing 426 R.Raju, M.Kalaiarasi, S.Santhana Krishnan An Efficient Hardware Multichannel Data Acquisition and Processing (DAQP) System usingARM 431 A Sundhari, Sam Mathews M, Vijayashanthi N Bandwidth shared acknowledgment (BSA)-A secure intrusion detection and 331 82. IT440 83. IT441 84. IT445 85. IT446 86. IT447 87. IT 448 88. IT449 89. IT455 90. IT 456 91. IT459 92. IT460 93. IT464 94. IT465 95. IT 468 96. IT 472 97. IT475 98. IT478 99. IT482 100. IT 483 101. IT 484 102. IT486 multi path routing for MANETs 437 P.Selvi grija, J.Premkumar Software Cost Estimation By Analogy Using Feed Forward Neural Network 443 Manikavelan, R.Ponnusamy Multi Interface Multi Channel and Improved AODV Routing Protocol 448 AditiMandape, DeeptiTheng Asymmetric Encryption To Secure Multi-Proprietor Data Sharing For Active Members In Cloud 452 A. Bala Suresh, J.ShinyDuela Probabilistic Ontology for Social Background Verification - A Belief Fusion Use Case 457 SuvarnaKadam, MadhuriA.Potey A Micropartitioning Technique For Massive Data Analysis Using Mapreduce 464 Mohanapriya, P.Natesan A New Decision Based Unsymmetric Trimmed Median Filter using Euclidean Distance Measure for Removal of High Density Salt and Pepper Noise from Images 469 K. Chithra, Santhanam Spammer Detection And Tagging Based User Generated Video Search System - A Survey 474 Lavanya Ramprasad, G.Amudha Energy Aware Scheduling of Real-Time and Non Real-Time Tasks on Cloud Processors 479 Chandan H K S, Sonika Syn Flooding Attack - Identification And Analysis 484 K.Geetha, N.Sreenath Text Extraction from Images using Gamma Correction Method and different Text Extraction Methods – A Comparative Analysis 490 G.Gayathri Devi, C.P.Sumathi Survey On Various Mechanisms For Secure And Efficient Vanet Communication 495 Saranya.S, Vijayalaksmi.V, Sathya.M, Selvaroopini.C Enforcing Adaptive User Modeling using Ontology 500 Rajashrisadafule, Madhuri A. Potey, P. K.Sinha A Multi-Level Artificial Bee Colony Method 505 Reza Akbari A Survey of Reactive Routing Protocols in MANET 512 Daxesh N. Patel, Sejal B. Patel, Hemangi R. Kothadiya, Pinakin D. Jethwa, Rutvij H. Jhaveri Connotative Features Based Affective Movie Recommendation System 518 A. P. Bhagat, N. G. Meshram Text Processing In Information Retrieval System Using Vector Space Model Premalatha.R, Srinivasan Handling Big Data With Hadoop Toolkit R.Devakunchari 525 N/A 531 M.R.M.Veeramanickam, N.Radhika Dynamic & Hybrid Honeypot Model for Scalable Network Monitoring 536 Ankit D. Patel, KartikChawda Tracking Control for a Class of Uncertain Nonlinear Systems using Legendre Neural Network 541 A.Kulkarni, V.Gupta A New Scalable Reactive Location Based Ad Hoc Routing Protocol for VANETs 547 K.Rajesh, R.VimalKarthick, G.S.Raj A Study On Educational Games Application Model In E-Learning Cloud System 103. IT490 104. IT492 105. IT 494 106. IT497 107. IT499 108. IT505 109. IT508 110. IT510 111. IT513 112. IT514 113. IT520 114. IT522 115. IT523 116. IT524 117. IT526 118. IT528 119. IT531 120. IT534 121. IT545 122. IT547 123. IT 548 124. IT549 125. IT550 Survey of Handover decision for next generation 552 PoojaTinkhede, PiyushIngole Fuzzy Logic Based Compromised Node Detection and Revocation in Clustered Wireless Sensor Networks 557 S. Raj Anand, R. Geetha, E. Kannan Algorithm for the construction of Rectilinear Steiner Minimum Tree by identifying the clusters of points 563 Vani V, G.R.Prasad A New Approach for Grid Load Balancing among Heterogeneous Resources with Bandwidth Consideration 567 Deepak Kumar Patel, Debashreet Das, C. R. Tripathy Community Mining in Co-authorship Network 573 Umadevi V Prediction of Heart Disease Using Multilayer Perceptron Neural Network 578 Jayshri S. Sonawane, Dharmaraj R. Patil An Evolutional Approach For Record Deduplication And Improving Accuracy Level In Large Repositories 583 Revathy, R.Suresh Analysis Of Critical Aspects To 587 Attract Online Contents D.Kanimozhi, Rajadurai Comfortable Perception Mining in Videos using Fuzzy Logic 593 Jeeva S, Saranya V A Survey on Localization of Wireless Sensor Nodes 599 JerilKuriakose, Amruth V, SwathyNandhini N Overview of Sequential and Parallel SAT solvers 605 Mahesh M. Doijade, Dinesh B. Kulkarni Flanking Stencil Method for the Detection of Impact Craters 609 Krishnan. R., AndheDharani Secure File Access Solution For Public Cloud Storage 615 P.Bharathi, S.Rajashree An Empirical Study of Test Cases in Software Testing 620 Navnath Shete, AvinashJadhav Profit And Energy Aware Scheduling In Cloud Computing Using Task Consolidation 625 A.Bharathi, R.S.Mohana, A.UshaPriya Heterogeneous clustering 631 B.S.Charulatha, PaulRodrigues, T.Chitralekha, Arun Rajaraman4 A Survey On Stochastic Vehicle Routing Problem 634 S. Sathyanarayanan, K. Suresh Joseph Codon Based Protein Synthesis For Breast Cancer Risk Prediction Through Parallel Computing 641 Vinu S, Murugaesan.G Hybrid Approach for Monitoring and Scheduling the Job in Heterogeneous system 646 S.Rajkumar, N.Rajkumar, V.G.Suresh Enabling Secure Outsourced Cloud Data 651 G.Sankareeswari, S.Selvi, R.VidhyaLakshmi Anomaly Extraction Using Association Rule with the Heterogeneous Detectors 657 MadhaviDharmadhikari, V. L. Kolhe Design of Emergency System for Intelligent Traffic System Using VANET 661 Ganesh S. Khekare Data Stream Mining Based Resilient Identity Fraudulent Detection 668 S.Sundareswari, V.Mareeswari 126. IT553 127. IT554 128. IT555 129. IT556 130. IT557 131. IT 559 132. IT564 133. IT566 134. IT567 135. IT569 136. IT 570 137. IT571 138. IT 573 139. IT574 140. IT576 141. IT 579 142. IT580 143. IT581 144. IT584 145. IT 587 146. IT588 147. IT589 148. IT590 Intrusion Detection System To Detect Malicious Misbehaviour Nodes In Manet 674 M.Vijay, R.Sujatha Enhancing Workflow Scheduling Through Promoting Resource Reliability And Fault Tolerance In Grid Environment 680 Sarayu.R, N.Krishnamoorthy Sentiment Classification Using Weakly Supervised Learning Techniques 687 P.Bharathi, PCD.Kalaivani Classification Of Colour Texture Using Shearlets 692 Vivek.C, Audhithan.S Adaptive Fuzzy C - Means For Human Activity Recognition 696 K.Nanthini, R.ManjulaDevi Offline Handwritten Writer Independent Tamil Character Recognition 701 S.Sangeetha Devi, T.Amitha An Efficient Localization for Wireless Sensor Network Using Nearest Neighbor Reference Method 707 Padma priya, S.Sridhar Analysis of Simulation of DDOS Attack in Cloud 712 S.Karthik, J.J.Shah Design of FPGA Based General Purpose Neural Network 717 Prashant D.Deotale, Lalit Dole Multimedia Questions and Answering using Web Data Mining 722 Bavarabaskar, Dheeraj Kumar Singh An Efficient Edge Detection Technique by Two Dimensional Rectangular Cellular Automata 726 Deepak Ranjan Nayak, Jahangir Mohammed Variants Of Travelling Salesman Problem: A Survey 730 K.Illavarasi, K.Suresh Joseph Developing Intellectual Patterns In Online Business To Customer Interaction With Dynamic Recommender System 737 Sharmila.A, Nalinipriya.G, Murugan.K A Scalable Approach For Efficient Multicast Data Transmission In Wireless Networks 742 A. R. Aswini, Prabaharan Dynamic Cluster Based Energy Controlled Routing In Wireless Sensor Networks 745 H. Shalma, Rajesh Reliable Data Delivery In Manets Using VDVH Framework 749 Priya.S, Gopinath.B Enhanced Acknowledgement Based Intrusion Detection For MANETS T.Archana, N.Rajkumar 755 760 T.Rajalakshmi, R.I.Minu Secured Authentication using Challenge-Response and Quick-Response Code for Android Mobiles 765 DhanashreePatil, Kishore The Secured OLSR Protocol For MANET 769 K.TamilSelvi Privacy Preserving Data Mining Techniques-Survey 775 Dhanalakshmi.M, Sivasankari.E Analysis of Security Issues and Their Solutions In Wireless LAN 781 Prashant Singh, Mayank Mishra, P N Barwal Performance Analysis Of Malicious Nodes in IEEE 802.15.4 Based Wireless Sensor Network 787 Improving Relevance Feedback For Content Based Medical Image Retrieval 149. IT595 150. IT596 151. IT597 152. IT599 153. IT602 154. IT603 155. IT607 156. IT613 157. IT 614 158. IT616 159. IT 617 160. IT619 161. IT620 162. IT623 163. IT624 164. IT627 165. IT629 166. IT 631 167. IT641 168. IT643 169. IT645 170. IT649 Krishan Kant Varshney, P. Samundiswary Spidernet: An Interaction Tool For Predicting Malicious Web Pages 792 S. Krishnaveni, K. Sathiyakumari Efficient And Contorlled Sharing Of Privacy Data In Social Networks 798 Th.Theepigaa, A.Bhuvaneshwari Crawling the page flipping links 804 R.Priya, S.Dhanalakshmi Learning Based Web Crawl Forum 809 K.Hemakumar, B.Prakash Globally Trusted Model For Assisting Peers Using Greedy Forwarding Technique 816 Gajalakshmi.G, S.Anbu Cluster-Based Mechanisms In Support Vector Machine To Integrate And Detect Spoofing 820 V. Thulasi, S.Anbu Weighted Voting Based Trust Management For Intrusion Tolerance In Heterogeneous Wireless Sensor Networks 824 P.Swaruba Wireless Data Transmission In Zigbee Using Indegree And Throughput Optimization 831 Ranjani.V, Sangeetha.S.K.B Resource Allocation In Next Generation Networks Using Game Theory 836 Revathy, M.Senthil An Efficient Query Processing Through Clickthroughs In Personalized Mobile Search Engines 840 T.J.Salma, N.Geetha Optimal Vehicular Routing And Driving Directions With Human Intelligence 844 Kalaivani.P, M.Senthil Data Integrity And Security In Cloud Environment Using Aes Algorithm 848 B.Thiyagarajan, Kamalakannan.R TCP Congestion Control with Delay Minimization in MANET 853 Hemant Kumar, Piyush Singh A Survey On Resource Allocation Strategies In Cloud Computing 859 V.P. Anuradha, D.Sumathi Sensitive Attribute Based Non-Homogeneous Anonymization For Privacy Preserving Data Mining 866 S.Sathishkumar, P.Usha, R.Shriram Location Update Suitable For Geographic Routing In Manets 871 B.Manimegalai, D.Geetha Online Banking in India: Attacks and Preventive Measures to Minimize Risk 874 Rajeshree Khande Distributed File Load Rebalancing Methodology For Map Reduce System 879 U.Saraswathi, S.Anbu, K.Anbazhagan Reliable Data Delivery For Emergency And Disaster Recovery In Wireless Mesh Network 882 R.Murugeswari, S.RadhaKrishnan Ascertaining Security In Online Reputation Systems Using Rate Auditing Tool (RAT) 888 Kalaivani, Dhivyalakshmi.D, Tamilarasi.V, Bhavani.P Uncertain Data Prediction On Dynamic Road Network 893 I.Sasikala, M.Ganesan, John.A Using Genetic Algorithm For Avoiding Redundant Matched Substring Within A Web Based Join Framework 897 171. IT 650 172. IT651 173. IT 656 174. IT658 175. IT659 176. IT660 177. IT663 178. IT664 179. IT665 180. IT666 181. IT 668 182. IT670 183. IT671 184. IT673 185. IT 676 186. IT 683 187. IT684 188. IT 685 189. IT686 Anandajothi.M, Thenmozhi.R Reduced Three Steps Logarithmic Search for Motion Estimation 902 Hussain Ahmed Choudhury, MonjulSaikia A Scalable Cloud Computing Deployment Framework For Efficient Mapreduce Operations Using Apache Yarn 907 EbinDeni Raj, Nivash J.P M.Nirmala, L.D DhineshBabu A Scalable Protocol Agnostic Backup Server 913 Meera Devi, ShrinidhiHudli, AjeetJha Meera Devi, Vandana S, SardarManoranjitham.R Survey On Recommendation And Visualization Techniques For Qos-Aware Web Services 918 J.C. Rosaline Christi, K.PremKumar Dynamic Downlink Resource Allocation for Wireless Networks with Inter-Cell Interference 924 P.Karthik, G.Kumaran Transposition Cryptography Algorithm using Tree Data Structure 929 Nikhil Agrawal, Manoj Kumar, M.A. Rizvi Social Data Analysis for Predicting Next Event 935 Deivaraghavi, Usharani Personalized Search Engines On Mining User Preferences Using Clickthrough Data 940 S .Preetha, Vimal Shankar K.N Squid-SMP: Design & Implementation of SquidProxy Server for Parallel Platform 945 Sachin H Malave Sentiment Classification Using Principal Component AnalysisBased Neural Network Model 951 G.Vinodhini, R.M.Chandrasekaran Multiagent Based Open Source For Supply Chain Management Using JADE 956 Rolls John, S.Balakrsihnan Multi-Application Environment Using Concealed Data Aggregation In Wireless Sensor Network 962 R.Sowmya, P.Vijayaraghavan Real Time Recognition Of Traffic Light And Their Signal Count-Down Timings 967 D.VishnuPriya, M.BalaSubramanium, S.Sathya Multidimensional Image Registered Scanner Using Mdpso (Multi-Objective Discrete Particle Swarm Optimization) 973 V. Rishiganesh, Vishwanathan An Optimized Bandwidth Allocation Scheme In Relay Node For Concentrated WSNS 979 P.Bharathi, E.Kodhai Providing Security and Integrity for Data Stored In Cloud Storage 984 Sujitkumar V. Chaudhari, Chandrashekhar S. Pawar, Pankaj R. Patil IRMA-Improvisation of Image Retrieval with Markov chain based on Annotation 989 G. Nandha kumar, V.Saranya Blackhole and Grayhole Attacks in MANET 996 Ankit D. Patel, KartikChawda An Optimal Centroid Based Actionable 3d Subspace Clustering 1002 V.Atchaya, R.Vanitha 190. IT689 Semantics Based Access Management Framework For Securing Data In Cloud 191. IT693 Auxilia.M, K.Raja Performance Analysis Of Modified OLSR Protocol For MANET Using ESPR Algorithm 1012 1007 192. IT694 193. IT696 194. IT699 195. IT701 196. IT703 197. IT710 198. IT711 199. IT713 200. IT716 201. IT718 202. IT725 203. IT728 204. IT732 205. IT735 206. IT739 207. IT743 208. IT745 209. IT746 210. IT748 211. IT845 K.Prabu, A.Subramani A Secured Event Log Storage Management System In Cloud Computing 1017 D.Esther Grace Vinitha, J.Shiny Duela Rfid Sensors For Food Safety Centre By Identifying The Physical Factors That Affecting The Food 1022 M.S.Saravanan, N.Thirumoorthy, Jeyanta Kumar Singh Privacy Conserving And Secure Distribution Of Personal Health Information Using Cloud 1028 Kamalakannan.E, Aravind.K.S Preferences Extraction and Ranking Functions in Mobile Search 1032 P. Anandajayam, D. Ashok Kumar Moving Object Detection, Classification and its Parametric Evaluation 1037 R.Raj Bharath, G.Dhivya Efficient Mining And Recommendation Of Sparse Data Through Collaborative Filtering Technique In Medical Transcriptions 1043 P. Hema, N. Sowriraja Pillai Probe Packet Based Congestion Free Service Discovery Architecture For Manet 1048 S Pariselvam, R.M.S. Parvathi, D. Franklin Thomas Antony Sharp Effective Cooperative Diversity Technique For High Throughput In Mimo Adhoc Networks 1053 B. Durgadevi, P. Sivakumar Pose Invariant Face Recognition Using Hmm And Svm Using Pca For Dimensionality Reduction 1058 R. Indumathi,N. Palanivel A Robust Trust Aware Secure Intrusion Detection In Manet 1064 M. Jegannath, P. Sivakumar Object removal strategy using 1070 Spatiogramic Technique K. Seetharaman, N.Palanivel, K.Maruthavanan Steganography Technique to Secure Patient Confidential information using ECG Signal 1074 V. Sankari, K. Nandhini Acquaint based grid clustering algorithm for Underwater wireless sensor network 1081 V.Sundarameena, D.Priyatharisini Model Based Essential Interactions Cluster Mining In Multivariate Time 1085 V.Saravanan, S.Chitra Diagnosing Hepatitis B Using Artificial Neural Network Based Expert System 1091 C.Mahesh, K.Kiruthika, M.Dhilsathfathima Intrusion Detection In Mobile Ad Hoc Networks Using Machine Learning Approach 1098 T.Poongothai, K.Duraisamy A perspective of Fault Tolerance for XOR in Neural Network 1103 Farhana Kausur, Mohammed Ameen Ulla Dynamic Detection of Node Replication Attacks using X-RED in Wireless Sensor Networks 1107 Abinaya, C.Geetha On Field Performance Analysis of IEEE 802.11p and WAVE Protocol Stack for V2V & V2I Communication 1111 Srikanth Building Secure Network Using Polynomial Key Pre Distribution 1117 R. Parthiban,V. Vaishnavi 212. IT850 213. IT851 214. IT856 215. IT876 216. IT896 217. IT888 218. IT900 219. IT1303 Foreground Object Motion Detection By Background Subtraction And Signalling Using GSM 1123 S.Priyadharshini, S.Dhanalakshmi Discover Information And Knowledge From Websites Using An Visualization Framework 1129 K.Santhi, P.Ramya Greedy perimeter stateless routing in MANET’s 1135 G.Sujatha, N.Sridivya Creating Ontology Based User Profile for 1142 Searching Web Information P.Jayakumar, P.Shobana Secure Localization of Multiple Spoofing Attackers 1148 M.Vijayalakshmi, S.Banumathi e-Learning Management System Using WebServices 1155 N.Partheeban, N.SankarRam A Framework for Fast IP Rerouting 1162 Vimal Kumar Pal, Sneha M. Ramteke Various Job Scheduling Algorithms in Cloud Computing: A Survey 1168 Yash P. Dave, Avani S. Shelat, Dhara S. Patel, Rutvij H. Jhaveri 220. IT1315 Enforcing Secure and Privacy in Information Brokering System K.Gunasekaran, M.Indumathi, D.Saravanan 1173 221. IT1318 Speech to Text and Accelerometer based Smart Phone Interaction System 1180 Monali P. Admane, Ratnaprabha Jasutkar 222. IT1323 223. IT1324 224. IT1325 225. IT1326 226. IT 1359 227. IT2015 228. IT2016 229. IT3001 230. IT3002 231. IT3003 232. IT3004 233. IT3005 Analysing The Effect Of Cluster Strategies In Multicast Traffic Using TAM Protocol For Ad-Hoc Networks 1184 S Deepakraj, R.Thamilselvan Implementation Of Multimodal Biometric Authentication Using Soft Computing Techniques 1189 K.Gunasekaran, P.Mahalakshmi Prevention Of Sybil Attack And Priority Batch Verification In Vanets 1195 P.Vinoth kumar, Maheswari Modified AES Based Algorithm for MPEG Video Encryption 1200 PoojaDeshmukh, VaishaliKolhe Design and Implementation of Three Phase Commit Protocol (3PC) Directory Structure through Remote Procedure Call (RPC) Application 1205 Nitesh Kumar, Ashish Kumar, SoumyajitGiri Production Inventory Model For Two Levels Of Production With Defective Items And Shortages 1210 Shivashankari Stronger Authentication for Password using Virtual Password and Secret Little Functions 1217 V. Saranya, P. Umadevi User Preferred Data Enquiry System Using Mobile Communications 1223 J.Allen Shanny, K.Sudharson Enhanced Techniques To Strengthening DTN Against Flood Attacks 1228 D.S.Delphin Hepsiba, S.Prabhu Power Draining Prevention In Ad-Hoc SensorNetworks Using Sensor Network EncryptionProtocol 1232 E.Mariyappan, C.Balakrishnan A Partial Inference Control Based Data 1237 Disclosure with Effective Cost in Cloud T.Pavithra, G.Umarani Srikanth An Efficient Data Security System For Group Data Sharing In Cloud System Environment 1242 S.Simla Mercy, G.Umarani Srikanth 234. IT3006 1246 Parallel Computing Based Intelligent Web Service for Healthcare Platform S.Srinivasan, S.Muthukumarasamy, N.Sivagamy COMMUNICATION Microstrip antenna based on durer pentagon fractal patch for multiband wireless applications. 1251 Jacob Abraham, Aju John K.K, Thomaskutty Mathew Lossy Image Compression using Multiwavelet Transform Coding. 1256 K. Rajakumar, T. Arivoli 235. CS113 236. CS114 237. CS116 238. CS117 239. CS118 Data Hiding Technique By Using RGB-LSB Mechanism. Vinit K. Agham, Tareek M. Pattewar 240. CS122 241. CS123 DT-CWT: Feature level Image Fusion based on Dual-Tree Complex Wavelet Transform. 1276 Saleem Malik.S, S.P. Prashanth Kumar, Maruthi G.B. Medical Image Tracking of Fluorescent Cells Using Otsu Model. 1282 P.Radhikala, G. Thiyagarajan 242. CS130 Secure and Lossless Data Hiding by Histogram Shifting and Scan Paths using Integer Wavelet Transform. 1286 A. Vinothini, L. Anju 243. CS131 Patch Based Image Restoration Using Adaptive Bilateral Filtering. Ammu G, K. Sakthidasan, Dr. V. Nagarajan 244. CS136 Heartbeat Rate Monitoring System by Pulse Technique Using HB Sensor. 1296 Narinder Pal Singh, Jatin Arora, Amandeep Singh, Gagandeep, Gurvinder Singh, Sarvesh S.S. Rawat 245. CS137 Next generation auto theft prevention and tracking system for land vehicles. MUX-Based Design of DPLL for Wireless Communication. 1262 Sabyasachi Bhattacharyya, Ripunjoy Sarma, Kaustubh Bhattacharyya, Roushan Saikia, Ragib Nasir Ahmed ASIC Implementation of High Speed Pipelined DDR SDRAM Controller. 1266 Satish Reddy. N, Ganesh Chokkakula, Bhumarapu Devendra, K. Sivasankaran 1271 1291 1301 Bavya R, Mohanamurali R 246. CS142 An Electronic Walking Stick For Blinds. Shashank Chaurasia, K.V.N. Kavitha 1306 247. CS144 Fabric quality testing using image processing. 1311 Agilandeswari.V, Anuja.J, Elizhabeth Dona George, Prasath.R 248. CS146 Implementation of Edge Detection Using FPGA and Model Based Approach 1315 Sofia Nayak, Prof. Shashank Pujari, Dr.P.K. Das 249. CS147 Pedestrian Detection and Tracking through Hierarchical Clustering. Selva Raj K, R. Poovendran 250. CS148 Effective optimization of video transmission in WLAN. Nagesh V 1325 1321 251. CS149 Improved accuracy performance of air for remote sensing application using multisensor. 1330 Sathiyanarayanan R, R. Poovendran 252. CS152 Improved Subjective and Objective Image Quality Assessment of Jpeg Image. 1334 Chitresh Bhargava, Nidhi Verma 253. CS153 Design and Implementation of FIR Filters Using On-Board ADC-DAC & FPGA 1341 Prangya Paramita Muduli, Amruta Panda, Rasmita Badhai, Yougajyoty Sahoo, Prof. Sashank Shekhar Pujari, Sofia Nayak 254. CS155 Smart Shopping Cart with Automatic Billing System through RFID and ZigBee. 1347 P. Chandrasekar, T. Sangeetha Development and Analysis of Microstrip Antenna for Wireless Local Area Network (IEEE 802.11y). 1351 Neelamegam.D, Rajesh.V VHDL Implementation of IEEE 754 Floating Point Unit. 1356 Anjana Sasidharan, P. Nagarajan 255. CS157 256. CS158 257. CS160 258. CS165 259. CS200 Wavelet-based Watermarking for Copy Rights Protection. H.E. Suryavanshi, Amit Mishra, Shiv K. Sahu, M.L. Mali 260. CS201 Image Inpainting Techniques for Removal of Object. Mahesh Mahajan, Praveen Bhanodia 261. CS202 Secured Elliptic Curve Cryptosystems for Scan Based VLSI Architecture. 1379 K.P. Sridhar, Raguram.M,B. Prakash, S.Koushighan, S. saravanan 262. CS203 263. CS204 264. CS205 265. CS208 Detection of Exudates in Human Fundus Image with a Comparitive Study on Methods for the Optic Disk Detection. 1384 Ravi.D, Karthik Soman Design of Combinational Logic circuits for Low power Reversible Logic circuits in Quantum Cellular Automata. 1389 Vivek Anand J, A. Kamaraj Face Image Retrieval using Wavelet Transform and Dimensionality Reduction Methods. 1395 Linu Kunjumon, D. Abraham Chandy Embedded Robotic Design for the Space Manipulation and its Applications. 1401 M. Shanmugham 266. CS209 267. CS210 268. CS212 Classification of Stress of Automobile Drivers using Radial Basis Function Kernel Support Vector Machine. 1361 Sathiya.A,Karthik Soman, Suganthi N A Drawing Robotic hand based on inverse kinematics. 1366 Shubham Agarwal, Sarvesh S.,S. Rawat, V. Sumathi 1371 1375 Evaluation of BER and Capacity for Ultra Wide Band communication Receivers. 1406 S. Saranya Pauline, C. Veera lakshmi Robust Video Watermarking Algorithms based on Svd Transform. 1411 Y. Raghavender Rao, Nikhil Prathapani, Dr. E. Nagabhooshanam Recognition of Elephants in Infrared Images using Mean-Shift Segmentation. 1416 Suseethra.S, Abraham Chandy D, Siva Mangai N.M. 269. CS215 Performance Optimization of Cognitive Radio With Wideband Spectrum Sensing. 1422 E. Saraniya, B. Lakshmi Priya 270. CS216 Edge detection in the medical Mr brain image based on fuzzy logic technique 1427 J. Dinesh Kumar, V. Mohan 271. CS217 272. CS224 273. CS229 A CPW Fed Octagonal Patch UWB Antenna with WiMAX Band-Notched Characteristics. 1435 Abhishek Kumar, T. Shanmuganantham A Biometric Encryption using face recognition system for watch list. 1440 Valarmathi.R, Sridevi Sathiya Priya.S, Siva Mangai N.M, Karthigai Kumar P. A Low Profile Beveled Dipole Antenna With Via Holes For UWB Applications 1445 A. Nandhakumar, N.Mahendran 274. CS230 275. CS238 276. CS240 277. CS241 278. CS242 279. CS243 280. CS258 281. CS264 282. CS267 283. CS268 284. CS269 285. CS270 A Hardware-Efficient H.264/AVC Motion Estimation Using Computation Aware Algorithm. 1451 S. Senthamizharasi, S.Sureshkrishna Readout Method for Pathogen Detection using Biosensor. 1456 P. Sangeetha, Dr. A. Vimala Juliet Adaptive Hardware Implementation For Sending Concealed Data in Video by using Wavelets. 1462 E. Venkatesan, V.P. Kolanchinathan Combinational circuit design using Nanomagnetic logic. 1469 J. Jelin Feena, Prof.S. Manickavasagam Robust Time-Varying Fading Channel Estimation with risk sensitive Filter under Parameter and Process Noise Uncertainty. 1475 K.Rajendra Prasad, M. Srinivasan, T. Satya Savithri Performance Analysis of 1 bit Full Adder Using GDI Logic. 1482 Shoba Mohan, Nakkeeran Rangaswamy Improving the Conspicuity of Lung Nodules by use of "Virtual Dual-Energy" Radiography. 1486 S. Manju Priyanka, R.I. Minu Data hiding in gray scale images using integer wavelet transform. 1492 S. Uma Maheswari, D. Jude Hemanth Metamaterial CPW- fed planar antenna for WLAN Applications. 1497 R. Jasmine Banu, R. Rajkumar, C. Elavarasi, P. Thiruvalar Sevan Speech enhancement using minimum mean square error filter and spectral subtraction filter. 1501 N.Subathra, Kirubagari B, Palanivel S Efficient Frequency Band Reallocation using Uniform Transmultiplexers with FPGA implementation. 1507 C. Pavithra, R. Ajin An Efficient Scheme for PAPR Reduction in Alamouti MIMO-OFDM Systems. 1512 G.S. Siva Priya, B. Senthil 286. CS272 287. CS274 288. CS275 A Study of Reflected Micro Wave Behaviour on Multidisciplinary Fabricated Surface & its Relation with RCS. 1517 Prasanna Puttaswamy, Pramod Srivatsa Krishna, Dr. Bindu Anil Thomas Design of CPW-fed Dual-folded Slot patch Antenna for 4.9 GHz Public Safety Spectrum. 1522 P. Prasanna Kumar, Rammoorthyraju K Stability Analysis of Linear Discrete Time System with Time Varying Delay and Actuator Saturation. 1526 Nitesh Kumar Soni, Richa Negi Optimization of Laser Satellite Communication System through Link Budget Prediction. 1533 Dhanya Devarajan, Dr. Sakuntala S Pillai Performance Improvement of Q-OFDMA Systems Using Low Complexity Approach. 1540 T. Anusuya, S. Bharathi Multi Radio clustering protocol for mobile networks. 1545 M. Hema Kumar, G. Nagalalli 289. CS278 290. CS279 291. CS283 292. CS284 Integrity Verification of Medical Images using Blind Forensic Method. S. Govarthini, M. Vadivel 293. CS285 294. CS286 Reducing Energy Consumption using Data Encoding Techniques in Network on Chip. 1558 S. Senthamil, P.Saravana Kumar A Novel Microstrip Slot Antenna for Permittivity Measurement. 1563 Beulah Jackson, T.Jayanthy 295. CS287 296. CS288 297. CS289 298. CS290 299. CS291 300. CS293 Interworking of WLAN-LTE for next generation Wireless Networks. G. Vijayalakshmy, G. Sivaradje 301. CS294 Implementation of a low power LDPC decoder using bit serial architecture 1552 Highly Birefringent Photonic Crystal Fiber with Negative Dispersion and its Propagation. 1567 Chandrani Paul, Naikatmana Pani, Pranaw Kumar, Amlan Datta Visual and tag based social image search based on hypergraph ranking method. 1573 K. Manjula, Palanivelraja Efficient Channel Sensing Schemes for Multiuser in Mutichannel Cognitive Radio networks. 1579 R. Mahalakshmi, R. Vijayakarthika Contrast Enhancement Using Discrete Wavelet Transform And Adaptive Transfer Function. 1585 Brintha S.P., Edwin Lawrence.S, Premnath S.P A Novel image zero-watermarking scheme based on DWT-BN-SVD. 1589 Y. Raghavender Rao, Dr.E. Nagabhooshanam 1595 1601 M. Revathy, R. Saravanan 302. CS295 An Experimental Analysis to Study the Characteristic Features of Gas Sensor 1605 Marcia.S, MeenuPriya R, Bhuvaneswari P.T.V, Saraswathi Priyadharshini A. 303. CS296 Multivariate linear regression based activity recognition and classification 1610 Gayathri S, Saraswathi Priyadharshini A., Bhuvaneswari P.T.V 304. CS297 EEG signal with feature extraction using SVM and ICA classifiers. H. Kareemullah, Dr.P. Nirmal Kumar 1616 305. CS299 Power-Efficient High Throughput Turbo Decoder Architecture For WSN. N. Nanthini, P. Saravana Kumar 306. CS301 307. CS302 Video Frames Text Detection Through Bayesian Classification And Boundary Growing Method. 1629 A. Nancy, D. Jayapriya Imbedded spiral antenna for endoscope. 1635 Anila P. George, M. Sujatha 308. CS304 Optimization of dynamic power and speed by trade off filter performance K. Anandan, N.S. Yogaananth 1623 1640 309. CS306 310. CS307 311. CS308 312. CS311 313. CS313 314. CS314 315. CS315 316. CS317 317. CS318 318. CS320 An Efficient Hardware Multichannel Data Acquisition and Processing (DAQP) System using ARM. 1645 M. Rubini, C. Rajasekaran Mitigation of Process Variation in MOSFET-Based Narrowband LNA. 1651 D. Suresh, N. Vinodh Kumar, K.K.Nagarajan, R. Srinivasan Proportional Equal Throughput Scheduler- A Very Fair Scheduling Approach in LTE Downlink. 1657 Sudheep. S, Rebekka. B Improvements on construction of quasi cyclic irregular non binary LDPC codes. 1663 M. Arulmozhi, M.Anbuselvi Comparative Study of Octagonal Ring Photonic Crystal Fiber with GeO2 Doped Structure. 1668 Aparna A. Nair, S.K. Sudheer, M. Jayaraju A 1V Second Order Delta Sigma ADC in 130nm CMOS. 1674 K. Lokesh Krishna, D. Reena,T. Ramashri SEU study of 4T, 6T, 7T, 8T, 10T MOSFET based SRAM using TCAD Simulation. 1679 Y.V. Bhuvaneshwari, Nama Prem Sai, N. Vinodh Kumar, C. Thiruvenkatesan, R. Srinivasan Optimum Gate Voltage search for Junctionless Tunnel FET using TCAD Simulations. 1686 J. Vadivukkarasi, N. Vinodh Kumar, K.K. Nagarajan, R. Srinivasan Frequency Independent Phase Shifter Circuit. 1692 Supritam Bhattacharjee, Sayan Mukhopadhyay, Souradeep Dutta, Subhankar Bandyapadhyay, Arijit Mallick An automated diagnosis system using wavelet based SFTA Texture Features. 1696 Saraswathi D, Sharmila G, Srinivasan E 319. CS322 Antenna Azimuth Position Control using Quantitative Feedback Theory (QFT) 1701 Suresh Kumar Sahoo, Dr. B.K. Roy 320. CS324 Microstrip Circular Patch Antenna Using With And Without Sorting Vias. R. Subbulakshmi, P.T. Sivagurunathan 1707 321. CS330 322. CS331 323. CS333 324. CS334 325. CS335 Near point monitoring of the ionosphere using dual frequency GPS data over the Hyderabad region: a Kalman filter approach. 1711 K. Venugopal Reddy, P. Hari Deepak, K. Srividhya, L. Visweswara Rao, Dr. V.B.S Srilatha Indira Dutt Estimation of shielding effectiveness of perforated rectangular enclosure using transmission line method for normal incidence and angle of incidence. 1716 V. Gopi, G. Kameswari, V. Bharat Kumar, P.V.Y. Jayasree Automatic Optic Disc Detection in Digital Fundus Images Using Image Processing Techniques. 1721 Snehal B. Akhade, V.U. Deshmukh, S.B Deosarkar Design and Implementation of Algorithm for Video 1726 Compression. Megha S. Gaoture, Mrs.Trupti H. Nagrare DSP Based Digital Controller for High Voltage SMPS. 1731 Pankaj A Bhoite, Ruch Patel, Vijay Sah 326. CS336 327. CS339 328. CS340 329. CS341 330. CS342 331. CS343 332. CS345 Joint Source Channel Coding Strategies in Rayleigh Channels for Wireless Systems. 1736 K. Mahalakshmi, B. Sreedevi Forefinger Direction Based Haptic Robot Control for Physically Challenged Using MEMS Sensor. 1741 Varalakshmi B.D., Thriveni J, Abhilasha Pachauri, Venugopal K.R, Patnaik L.M Biological Effects of Microwave. 1747 Suruchi Kumari, S. Raghavan Development of Novel Double Eye Structured Dual Band Antenna for 802.16d ( Fixed Wi-MAX). 1753 Ari Narayanan. M., S. Oudayacoumar, A. Karthik Evaluation and Performance Analysis of Graph Theoretical Methods for Image Segmentation. 1758 S.D. Kapade, S.M Khairnar, B.S Chaudhari Power optimized high level synthesis of Multiply-and-accumulate (MAC) based digital filter architectures under SNR constraints. 1765 N. Alivelu Manga, Dr. M. Madhavi Latha Nonspecific-User Hand Gesture Recognition By Using MEMS Accelerometer. 1772 Jayaraman D, Vanitha K 333. CS346 Soft Computing Based Segmentation of Anomalies on Abdomen CT Images 1778 S.N. Kumar, Dr. A.Lenin Fred 334. CS349 Energy-Efficient Cooperative Beamforming for Secure Data Transfer. Abinaya K, A.L. Karthika 1783 335. CS351 CPW-Fed Square Patch Compact Antenna For C and X Band Applications. 1788 336. CS353 C. Elavarasi, R. RajKumar, R. Jasmine Banu, P. Thiruvalar Selvan Representing a image using a Haar-wavelet Transformation for Human Parts Detection. 1792 Gomathi S, T. Santhanam 337. CS354 Comparative study of Radon based low resolution palmprint image matching. 1799 Jitendra Chaudhari, Pradeep M Patil, Y.P. Kosta 338. CS356 Asynchronous Fine-Grain Power-Gated Logic. Karthikeyan G, Manickavasagam S. 1803 339. CS357 Reversible Data Hiding In Image Encryption With Efficient Compression And Enhanced Security. 1809 B. Elang Kavin, B. Latha 340. CS358 341. CS359 A Novel CPW Bandpass Filter Based on Negative Indexed Materials for Wi-Max Application. 1814 U.Surrendar, G Brenie Sekar SURE Regularization for Diffuse Optical Tomography. 1819 K.Uma Maheswari, S. Sathyamoorthy 342. CS360 Microstrip Circular Antenna Array Design for Radar Applications. Angeline M. Flashy, A. Vijaya Shanthi 343. CS362 Design of an UWB Antenna With Truncated Ground Plane. Niranjana Devi K, Priya M 344. CS363 Adaptive reliable cooperative data Trasmission technique for wireless body area network. 1833 Meena Priya Dharshini P, M. Tamilarasi 1824 1829 MISR Architectures To Remove Unknown Values 1837 in Output Response Compaction. Aruna S.R. , K.S. Neelukumari A voice-input voice-output communication assists in favor of people with harsh verbal communication destruction. 1841 M. Babu, Mr.V.Dhilip Kumar Balanced PV Cascaded Multilevel Grid-Connected 1847 Inverters under Level-Shifted PWMs with Fuzzy Controller. E. Prem Kumar, Dr. S. Rajkumar An Efficient Adaptive Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radios over Fading Channels. 1851 G. Loganathan, G. Padmavathi, S. Shanmugavel Design of an ECG acquisition device for the nonlinear analysis of Heart Rate Variability (HRV). 1856 Sindhu.G, Dr. Sankar.P Adaptive Traffic Management with VANET in V to I Communication Using Greedy Forwarding Algorithm. 1862 R. Yugapriya, P.Dhivya,M.M Dhivya,Mr.S.Kirubakaran An Efficient Architecture for the Adaptive Filter Using Delayed LMS Algorithm. 1867 P. Priya, Dr.P. Babu Transaction clues based video summarization using by speeded up robust features. 1873 N. Brindha, Dr.T.Amitha 345. CS364 346. CS365 347. CS366 348. CS369 349. CS370 350. CS373 351. CS375 352. CS378 353. CS380 354. CS381 355. CS383 356. CS384 357. CS386 358. CS387 359. CS389 Non-Intrusive Bit Swapping Pattern Generator for BIST Testing of LUTs. G.Devi Prasanna, P. Abinaya, J. Poornimasre 360. CS390 361. CS393 Content based image retrieval using color and texture feature extraction in android. 1916 Vel Murugan M, P.Jeyanthi Vision System for Automatic Counting of Silkworm Eggs. 1923 Amruta Pandit, Jyoti Rangole,Rajveer Shastri, Shankar Deosarkar A Novel Decentralized Trust Evaluation Model For Secure Mobile Healthcare Systems. 1879 Sahaana.V, Sakthipreetha.A, R.Sukanesh Anonymous location aided secure routing protocol. 1884 V. Manjuladevi, R. Jennie Bharathi Design and Study of Modified Parallel FIR Filter 1890 Using Fast FIR Algorithm and Symmetric Convolution. D. Ashok Kumar, Dr.P.Samundiswary & Maroju SaiKumar A Simple Fuzzy Method to Remove Mixed Gaussian-Impulsive Noise from Colour Images. 1896 Arivarasi.A, S. Manickavasagam Non-subsampled Contourlet Based Deformable Model For Medical Image Segmentation. 1900 Hiren Mewada, Supraya Patnaik Comparative study of similarity measures for launch vehicle telemetry data. 1905 Manusubramanian S, Sumitra S, Jishy Samuel 1912 Increasing the Speed and Reducing A sensing delay of Content Addressable Memory. 1928 N. Pavithra, E. Shalini, C. Ganesh Babu Design and simulation of Nano scale MOSFET for next generation VLSI circuits. 1934 E. Subhasri, Sanjoy Deb iii-v MOSFET as advance low dimensional transistor. 1938 P.Deepika, Sanjoy Deb 362. CS394 363. CS395 364. CS397 365. CS500 An Improved Content Based Image Retrieval using Three Region Color, Straight-Line and Outline Signatures of the Image. 1942 L. Jayanthi, K. Lakshmi 366. CS666 367. CS777 368. CS130 1 Reconstruction of Images with Exemplar Based Image In painting and Patch Propagation. 1948 Manoj S. Ishi, Lokesh Singh, Manish Agrawal A Brief Study of Image Segmentation using Thresholding Technique on a Noisy Image. 1953 V. Sivakumar, V. Murugesh A Modified Sierpinski Gasket Triangular Multiband Fractal Antenna for Cognitive Radio. 1959 A. Rajshree, S. Sivasundarapandian,C.D. Suriyakala 369. CS130 3 Authenticated Secure Bio-metric Based Access to the Bank Safety Lockers. 370. CS130 7 371. CS130 9 372. CS131 2 373. CS131 4 374. CS131 5 High speed Low power Multiple Bit Subtractor Circuit Design Using High performance domino Logic. 1972 Ms.S. Sivasankari, J. Ajayan & D. Sivaranjani Kernel methods and machine learning techniques for man-made object classification in SAR images. 1978 P. Deepthi Jordhana, K. Soundararajan An Implementation of 1- bit low power full adder based on multiplexer and pass transistor logic. 1984 Rajesh Parihar, Nidhi Tiwari, Aditya Mandloi, Dr. Binod Kumar Rogue Access Point Detection Methods: A Review. 1987 Sweta Anmulwar, Shalvi Srivastava, Vinodh Kumar, Shrinivas P. Mahajan, Anil Kumar Gupta FPGA based low complexity multi-purpose reconfigurable image processor. 1993 V. Balaji, R. Krishnaveni 375. CS131 7 Analysis of RSSI in Diverse Field. T. Vimala,Dr. Uma Rajaram 376. CS131 9 Enhancing Content Based Image Retrieval by using Sketches. Prasad P. Mahale, Rakesh K. Bhujade, Amit Mishra, Shiv Kumar 377. CS132 0 An Analysis for MC- DS CDMA using optimized coding technique. Vedasundaravinayagam P, Sivaraju .U, Jenath M 378. CS132 3 379. CS132 9 Content based image retrieval and segmentation of medical image database with fuzzy values. 2011 S. Pradeep,L. Malliga VisKey- An Implementation for Hiding Information. 2018 Reshma R, Aishwarya G.M. 1965 Srivatsan Sridharan 1999 2002 2006 380. CS133 0 Programmable synaptic memory with spiking neural network in VLSI. V. Sivakumar, M. Malathi, Elango B 2025 381. CS201 4 Reliable data delivery for highly dynamic mobile adhoc networks. Vimala S, Narenoer Malishetty, Srivasta S.K 382. CS201 5 An efficient automatic speech emotion recognition for tamil language based on DWT and MFCC using stability-plasticity dilemma neural network. 2039 C. Sunitha Ram, Dr. R. Ponnusamy 383. CS201 6 Efficient channel adaptive mimo detection scheme with switching strategy. 384. CS300 1 385. CS300 2 A survey of backpressure based scheduling algorithms for delay tolerant networks. 2050 J. Dhivya, M. Vanitha Lakshmi Peak to average power ratio reduction of OFDM system. 2055 T. Gayathri, K. Bavithra 386. CS300 3 Adaptive spatial modulation using candidate reduction technique. G.S. Gnana Jeni, C. Arunachala Perumal, Dr. C.Arun 387. CS300 4 Intelligent beamforming to improve the spectral efficiency in MIMO systems 388. CS300 5 389. CS300 6 Design of wideband printed slot antenna with polarization diversity using hybrid feeding techniques. 2068 T. Pushpa, M. Vanitha Lakshmi Advancement in Caesar Cipher by randomization and delta formation. 2072 A. Rajan, D. Balakumaran 390. CS300 7 The performance comparison of different variants of spatial modulation. B.Revathi, C. Arunachala Perumal, P. Poonguzhali, Dr.C.Arun 391. CS300 8 Segmentation and compression of telemedicine application. 2081 S. Sathiya Lakshmi, M. Vanitha Lakshmi 2030 2045 S.A. Yuvaraj, Dr.L.C. Siddanna Gowd 2060 2064 A. Nithya, C. Arunachala Perumal, Dr. C.Arun medical image using 2076 MSPIHT in EMBEDDED SYSTEMS 392. ES003 393. ES107 394. ES112 395. ES113 396. ES116 397. ES118 398. ES119 399. ES123 Single Photon Transistror 2086 Banuchandar J, Uthirapathi D EARMP:A Unified Application Specific MAC Protocol for Wireless Sensor 2091 Networks C.Venkataramanan, S.M.Girirajkumar Fuzzy Based Energy Management System for a Polygeneration Microgrid 2096 Nimitha Rose Peter, M.Ramesh Babu Optimal Wakeups Clustering for Highly-Efficient Operation of WSNs Periodic Applications 2103 Carlo Brandolese, Luigi Rucco, William Fornaciari Implementing of High Throughput Group-Based MAC for WLANs 2110 E. Porkodi , J. Gobinath, M.Vinoth Kumar. Design and Analysis of New Multilevel Inverter Topology with Induction Motor Load 2116 S. Nithya, CR Balamurugan, SP Natarajan Modeling and Controlling of BLDC Motor Based Fuzzy Logic 2121 M.S.EvangelinBlessy, M.Murugan Approximate Analysis Of Transient Heat Conduction In The Rotor Of An Induction Motor During Star-Delta starting 2127 400. ES125 401. ES126 402. ES128 403. ES129 404. ES132 405. ES136 406. ES138 407. ES146 408. ES147 409. ES149 410. ES154 411. ES155 412. ES158 413. ES159 414. ES163 415. ES165 416. ES166 417. ES168 418. ES169 419. ES170 Nirmal Kumar Bhattacharya, Dr.Debasis Sarkar StatCom Control For Voltage Stability Improvement at a Fixed Speed Wind Farm under Unbalanced Faults 2133 M. Vimalraj, B.Alex, M.Tamilarasi High efficient power electronic inverter topology with SPWM technique for single phase transformer less utility interactive photovoltaic system 2139 Abima Justus A novel method of induction motor operating mechanism using neural network 2145 S Sankar, D Ganesan, U Manojkumar Reliable Soc Estimation For Battery Powered Embedded System 2150 B.Johnsema, K.Janakiraman Distributed Power Generation for Isolated Loads Using Smart Grid Technology 2155 K.Vivekanandan, P.Prabu Robust Encryption Algorithm Based Sht In Wireless Sensor Networks 2160 G. Uma, G.Sriram Low-Power Folded Tree Architecture and Multi-Bit Flip-Flop Merging 2165 Technique for WSN Nodes K Hemapriya, R Karthikeyan Strategy of Sink Trail Protocol for Energy Efficient Data Gathering in Wireless Sensor Network 2171 BhavnaPise, NekitaChavhan Fast Transverse-RLS Algorithm Based Power System Harmonic Estimation 2177 S K Singh, A Nath, R Chakraborty, J Kalita, N Sinha, A K Goswami Design and Analysis of Bi-stable MEMS Switch 2182 Joshitha C, B.S. Sreeja Development of an Ultra-Low Power WSN Gateway for Outdoor Deployments 2186 Prateek Rajgarhia, Praveen James, Vivek Nainwal, Sowjanya P, Santosh Sam Koshy Railway Fail-Safe Signalization and Interlocking Design Based On Automation Petri Net 2193 BidhanMalakar, B.K. Roy Real time hand gesture recognition using AVR microcontroller 2197 M.Shakunthaladevi, R.B.Revathi. Fault indulgent in embedded memory using WCET Real Time Embedded System 2203 D Divya, A Karthikeyan, G Panneerselvam THD Reduction and Voltage Flicker Mitigation in Power System Base on STATCOM 2209 Teja SreenuTadivaka, M.Srikanth, T.VijayMuni Cluster-based mechanism for multiple spoofing attackers in WSN 2215 T. Meena, M. Nishanthy, E. Kamalanaban Analysis of EMI terminal modeling of switched power converters 2220 M.Ananthi, Nerenjana J, R. Ramesh,M. Kavitha Design and Development of Data Acquisition System for A Remote Furnace using MSP430G2553 and Zigbee 2226 NaveenKumarUttarkar, ArunaKommu, RaghavendraRaoKanchi Advanced Train Reservation And Passenger Intimation With Safety System 2231 B.T. Tharani Sri Sakthi, Jessen Joseph Leo , Ms.R.Monisha, Dr.S.M Ramesh Recovery of Holes Problem in Wireless Sensor Networks 2236 PoojaChaturvedi, A. K. Daniel 420. ES171 421. ES172 422. ES175 423. ES176 424. ES178 425. ES185 426. ES186 427. ES188 428. ES193 429. ES195 430. ES196 431. ES197 432. ES199 433. ES200 434. ES203 435. ES204 436. ES205 437. ES206 438. ES207 439. ES300 Enhanced Lifetime Distributed Power Saving Algorithm in Wireless Sensor Networks 2242 Ranjeet B. Kagade, Rachana A. Satao Microcontroller Based Non Invasive Diagnosis of Knee Joint Diseases 2248 G Hari Krishnan, R Ananda Natarajan, Anima Nanda An optimized routing approach in wireless sensor networks 2251 B.S. Pavithra, A.Asha EHMBA: An Energy Efficient Hybrid MAC Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks 2257 Nami Susan Kurian, B.Priya Neural network based MPPT for high performance wind generator using DFIG 2263 J.Priyadarshini, J.Karthika Reliable data transmission in wireless sensor network 2268 S. Sangeethapriya, R. Amutha Data Aggregation in Wireless Sensor Networks 2274 S. Sahana, R. Amutha Reactive power minimization and unity voltage transfer in a distorted AC supply by using hybrid indirect matrix converter 2280 C.Raja,A. Prabha, S. Sivaranjani Performance Analysis of Non-Integer Order PID Controller for Liquid Level Control of Conical Tank System 2285 S. Janarthanan, KN Thirukkuralkani, S Vijayachitra LabVIEW Implementation of Liquid Density Measurement Using Ultrasonic Transducers 2290 BK Roy, Santhosh KV, Rahul Kumar Bharthi, Ravi kanthMani Modelling Analysis Reference Point And Imparting Mechanism In Wireless Sensor Network 2294 Gayathri Devi S, NandhaKumar R Review on fault tolerance with minimal topology changes in WSAN 2299 Nisha M.Katre, Mangala S.Madankar A Solution to Energy Hole Problem In Wireless Sensor Networks Using 2303 Witricity Mahendrababu K, Lakshmi Joshitha K A Monte Carlo-Rough Based Mixed- Integer Probabilistic Non-Linear Programming model for predicting and minimizing unavailability of Power system components 2309 Akshat Dube, Prateek Saraf, Rajnish Dashora, Rohit Singh Catch Me If You Can – A Proposal Mechanism Against the Cooperative Attacks in Cognitive Radio Networks 2315 Hari Haran V, Jeyapiriya K Musical Metronome with Tempo Detection, Synchronizer and Gesture 2320 Processing Mahesha Padyana, Bindu A Thomas A Compact Remote Switching With Efficient Monitoring For AC Plants 2325 Vivek.L, Syed muzammil.H Analysis of torque ripple failure in electric drive for electric vehicle propulsion system 2330 M.R.Dineshraj, V.Arunkumar Comparative Analysis of LUT Design In FPGA 2334 Ayesha Firdous, B.Rajan Design and Development of Sensor-Based Mini Projects for Embedded System Laboratory Using ARM Cortex-M3( LPC1768 ) 2337 440. ES1301 441. ES1305 442. ES1306 443. ES1307 444. ES1310 445. ES1312 446. ES1313 447. ES1314 448. ES1317 449. ES1318 450. ES1320 451. ES1324 452. ES1330 453. ES1331 454. ES3001 Aruna Kommu, Naveen Kumar Uttarkar, Raghavendra Rao Kanchi Design of Matrix Converter in Windmill for Frequency Stabilization 2343 S Vaishali, A. Jamna Identification of Defect in Labels on Cigarette Packets Using LabVIEW 2350 AbahanSarkar, B K Roy Synchronization of Lu and Bhalekar-Gejji Chaotic Systems using Sliding Mode Control 2355 Jay Prakash Singh, PiyushPratap Singh, B K Roy PI based Sliding Mode Control for Synchronization of Lu and BaoHyperchaotic Systems 2360 PiyushPratap Singh, Jay Prakash Singh, B K Roy Improving Wireless Sensor Network Lifespan By Efficient Routing Algorithm And LZW Compression 2365 S.Prabu, R.Maheswari Identifying Human And Tracking Using WSN with Webcam and GSM 2370 Ranjith Kumar A, J. Paranthaman An Analytical Approach to Secured Routing Protocol Using Pre-Key 2375 Distribution in Clustered Wireless Sensor Networks SS Kasirajan, RVK Manoj Kumar, SB Manoj, S Rajasoundaran, P Narayanasamy Lung Tissue Detection And Classification Using Novel Intensity Features and PNN 2380 M .Mohanam, T. Ramya Accident Inference And Data Accquisition In Automobiles 2384 M.DhivyaSankari, M.Kiruthiga, B.T.Tharanisrisakthi MPSoC based dynamic power management in wireless sensor networks 2388 G.Maryam Banu Developing The Fabricated System Of Automatic Vehicle Identification Using Rfid Based Poultry Traceability System 2394 G S Ajay Kumar Reddy, S.V. Jagadesh Chandra, B.Naresh Kumar Reddy A Functional ARM movement tracking and monitoring system using 2400 Electogoniometer Asley Zimoga S, Padmanaban L Implementation of Hummingbird 1s Cryptographic Algorithm for Low Cost RFID Tags using LabVIEW 2404 PVG Raj Pritha, N.Suresh Design of Low Power and High Speed Modified Carry Select Adder for 16 bit Vedic Multiplier 2408 Bhavani Prasad Y, Ganesh Chokkakula, Srikanth Reddy P, Samhitha NR Fault –Tolerance of Reconfigurable Logic in Memory Using AGT 2414 C. Subashini, T. Mohanapriya, Uma Rajaram