Download Content - Conferences

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
National Conference on
Innovative Trends in
Information Technology
8th February 2014
Organized by
The Department of Computer Science,
Applications & Technology,
KG College of Arts and Science
Technically Co-Sponsored by
National Conference on Innovative Trends in Information Technology (NCITIT - 2014)
Copyright © 2014 by Bonfring
All rights reserved. Authorized reprint of the edition published by Bonfring. No part of this book may be reproduced in any
form without the written permission of the publisher.
Limits of Liability/Disclaimer of Warranty: The authors are solely responsible for the contents of the paper in this volume. The
publishers or editors do not take any responsibility for the same in any manner. Errors, if any, are purely unintentional and
readers are required to communicate such errors to the editors or publishers to avoid discrepancies in future. No warranty
may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable
for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or
other professional services. If professional assistance is required, the services of a competent professional person should be
sought. Further, reader should be aware that internet website listed in this work may have changed or disappeared between
when this was written and when it is read.
Bonfring also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in
electronic books.
ISBN 978-93-83459-01-8
Bonfring
292/2, 5th Street Extension, Gandhipuram,
Coimbatore-641 012.
Tamilnadu, India.
E-mail: [email protected]
Website: www.bonfring.org
Preface
The NCITIT 2014 (National Conference on Innovative Trends in Information Technology) has
aimed to provide a platform to discuss Computer Science Foundation on Computer Security, Data
Mining, E-Commerce, RFID
Applications,
Fingerprint/Hand/Biometrics
Recognitions
and
Technologies, Foundations of High-performance Computing, OTP, and Key Management Issues,
IDS/Firewall, Anti-Spam mail, Anti-virus issues, Mobile Computing for E-Commerce, Network
Security Applications, Neural Networks and Biomedical Simulations, Quality of Services and
Communication Protocols, Quantum Computing, Coding, and Error Controls, Satellite and Optical
Communication Systems, Theory of Parallel Processing and Distributed Computing, Virtual Visions,
Artificial Intelligence, Cloud computing, Green computing & Virtual Simulations, Wireless Access
Security, etc.
The success of NCITIT is reflected in the received papers from authors from several colleges
which allows for an effective idea and experience exchange.
It is our immense pride and pleasure that such a conference is being organized by KGCAS. We
believe that this Conference would open many new doors of invention and would have a positive
effect upon the whole society. It is the humble wish of the conference organizers that the proficient
discussion among the researchers, students and educators continues further after the event and
that the companionships and collaborations forged will linger and prosper for many years to come.
The accepted papers of NCITIT are published in this Book.
Finally, it is appropriate that we record our thanks to our fellow faculty members for their work
in securing a substantial input of papers from both students and faculty members and in
encouraging participation from those areas. We are also indebted our Management without their
support and encouragement, the conference could not have been the success that it was. We also
acknowledge the authors themselves, without whose expert input there would have been no
conference.
We wish each of you successful deliberations, stimulating discussions, new friendships and all
enjoyment that this conference offered. While this is a truly remarkable Conference, there is more
yet to come. We look forward to seeing all of you in KGCAS.
The Secretary
Contents
Title/Author
Paper ID
NCITIT01
A New Clustering Approach Based on Selecting Feature Subset for High
Dimensional Data through the Propositional Foil Rules
Page No.
01-04
S. Kulandai Teresa and G. Arul Geetha
NCITIT02
MANET
05-06
P. Priya and A. Mercy Gnana Rani
NCITIT03
Detecting Credit Card Fraud by Decision Tree and Genetic Algorithm
07-09
M. Manjula and R. Deepa
NCITIT04
Measurement-Based Design of Roadside Content Delivery Systems
10-13
K. Gowthami
NCITIT05
Time and Cost Optimization Algorithm for Scheduling Multiple Workflows
in Hybrid Clouds
14-20
K. Ranjithprabhu
NCITIT06
Self-Organising Trust Model Using Peer-To-Peer Systems
21-22
G. Brindha
NCITIT07
Dynamic Forensics Model based on Ontology and Context Information
24-26
B. Tharika and S. Vidhya
NCITIT08
A Study on Phishing and Anti-Phishing Techniques
27-29
M. Usha and P. Deepika
NCITIT09
Mobile Adhoc Networks
30-32
N. GopikaaRani and K. Kamalam
NCITIT10
Mobile Ad hoc Networks: Key Management
33-36
D. Sasirega and S. Banupriya
NCITIT11
Comparative Study of MANET Protocol Types
37-38
D. Thuthi Sarabai and R. Krissna Priya
NCITIT12
Enhanced Security in Secure Socket Layer for Banking
39-40
A. Sheela Rini and M. Usha
NCITIT13
Analysis of DOS Attack in SMS/MMS
41-46
S. Vidhya, K. Kanimozhi and V. Jayalakshmi
NCITIT14
Image Encryption Techniques: A Critical Comparison
47-51
K. Kamalam and S. Saranya
NCITIT15
Energy Saving and Routing Protocols in Sensor Networks
52-54
M. Sindhya and A. Nithya
NCITIT16
Analytical Study for Self-Organizing Map-Based Color Image Segmentation
with K-Means, Fuzzy C-Means, Modified Fuzzy C-Means Clustering
K. Saranya
55-60
NCITIT17
Decision Tree Classification Using ID3 Algorithm in Data Mining
61-63
K. Umavathy and M. Usha
NCITIT18
Grid Computing: The Study of Unicore
64-66
R. Anandhi Lakshmi
NCITIT19
Packet Sniffing
67-69
K. Rubini
NCITIT20
Rough-Neighborhood DBSCAN Clustering:Performance Analysis
70-74
G. Menaka and J. Devika
NCITIT21
Protecting Data URL Using Business Logic Component
75-77
K. Amuthan
NCITIT22
A Survey on Mobile Ad hoc Network Using Weighted Clustering Algorithm
(WCA)
78-80
M. Mayilvaganan and S. Dhivya
NCITIT23
Rainfall Forecasting Analysis using EM Algorithm and SIMPLE k-means
Algorithm in Data Mining
81-83
M. Mayilvaganan and N. Mohanapriya
NCITIT24
Analysis Diabetes Mellitus on Prognosis, Complications and Side Effects
using Data Mining
84-86
M. Mayilvaganan and T. Sivaranjani
NCITIT25
Picture Password: A Visual Login Technique for Mobile Devices
87-90
K. Pavithra
NCITIT26
An Analysis for what Social Networking
91-93
M. Nachammai and S. Malathi
NCITIT27
A Study on Clustering Algorithms with Neural Networks
94-96
R. Pradheepa and S. Srimathi
NCITIT28
A Novel Based Frame Work for Content Based Image Retrieval with Colour
Models
97-100
M. Rajalakshmi and C. Tharani
NCITIT29
Classification of Malware Based on Data Mining Approach
101-105
L. Hermi Godlin and M. Kalaivani
NCITIT30
Efficient Sentiment Analysis and Opinion Mining for Unsupervised Reviews
(Comparison Work)
106-109
R. Pradheepa and L. Shanmugam
NCITIT31
Comparative Analysis of Clustering In Spatial Data Mining
110-112
A.P. Caroline Hirudhaya and G. Kiruba
NCITIT32
Wireless Sensor Network Design for Structural Health Monitoring and
Applications to Wreck Detection
113-115
S. Kaniyappan and A. Balasubramanian
NCITIT33
Cloud Computing
K. Nagasathya and M. Rajsree
116-117
NCITIT34
Cloud Computing
118-120
P.P. Reshma and T.U. Sanjana
NCITIT35
Grid Computing
121-124
V. Priya and M. Pavithra
NCITIT36
Green Computing
125-128
S. Deepa and M. Agathurpriyadharsini
NCITIT37
Nanotechnology
129-133
K. Saranyadevi and S. Priyadharshini
NCITIT38
Introduction to Green Computing
134-136
K.V. Manju Priyadharshini and E. Priyadarshini
NCITIT39
SWAM Robotic
137-139
S. Shivaranjani and T. Sindhuja
NCITIT40
Computer Network
140-143
S.V. Aishwarya and S. Ramya
NCITIT41
Cyber Crime
144-146
D. Suganya and S. Bhuvaneswari
NCITIT42
Mobile Voting Based on Biometrics
147-148
M. Nikesh and B. Sriram
NCITIT43
Nanotechnology-An End for Cancer
149-152
L. Priyanga and P. Nivedha
NCITIT44
For the Diagnosis and Treatment of Cancer
153-155
M. Jayapriya and S. Narmatha
NCITIT45
Neural Networks in Data Mining
156-158
S. Lakshmanakumar and S. Asha
NCITIT46
Green Computing
159-161
A. Maria Anto Marshell and Saravana Kumar
NCITIT47
Data Mining
162-164
V. Vishnupriya and K. Priya Dharshini
NCITIT48
Cloud Computing Security Issues in Infrastructure as a Service
165-169
S. Poornima
NCITIT49
Detection of False Alarm over MANET using Collaborative Watchdog
Approach
170-173
S. Sherlin and J. Suganya
NCITIT50
Mining High-Speed Data Streams
174-183
N. Kalaiselvi and V. Kalarani
NCITIT51
Implementation of Mask Skeletonization and Finger Points Extraction Using
Neural Network
A. Prakash and Dr.N. Sasirekha
184-188
NCITIT52
Denial of Service Attacks and Intrusion Detection in Wireless Networks
189-192
V. Subha and P. Selvi
NCITIT53
Major Reasons for Bugs in Software Applications
193-195
K. Soundarraj, T. Parthasarathi and A.Ganeshan
NCITIT54
Non-Convex System Using Stochastic Squalor Algorithm in Wireless
Network Virtualization
196-199
G. Suganya and D. Thuthi Sarabai
NCITIT55
Face Recognition and Verification Using Photometric Stereo with AntiSpoofing Method
200-203
M. Ramya
NCITIT56
An Emergent Line of Attack for the Video Object Segmentation of Birds in a
Video Frame Using Color Space and K-Means Clustering Algorithm
204-206
D. Napoleon and K. Ragul
NCITIT57
Query Grouping Approach for Information Retrieval and Identifying User
Web Browsing Patterns
207-209
M. Sivasankari and M. Sasikala
NCITIT58
Reducing Traffic in Mobile Nodes over WIFI Networks
210-213
M. Vinod Kumar and Caroline Hirudhaya
NCITIT59
Survey of Decision-Tree Method for Structured Continuous-Label
Classification
214-216
J. Jenifer and G. Mohana Lakshmi
NCITIT60
Google Balloon
217-120
G. Nandhini
NCITIT61
A Study on RSA Algorithm Using Public-Key Encryption
221-225
K. Soundarraj, T. Parthasarathi and S.V. Manikandan
NCITIT62
Text Mining in Biomedicine Using Ontology
226-228
T. Sowkarthika and M. Subha
NCITIT63
Ethical Hacking and Cyber Security
229-235
P. Dinesh
NCITIT64
Ethical Hacking
236-238
D. Kingsly
NCITIT65
Data Mining Techniques and its Applications using in Bioinformatics
239-241
S. Kavi Priya and Dr.V. Narayani
NCITIT66
Color Image Processing
242-244
T. Ganesh Babu and G. Srinivas Kishan
NCITIT67
Cloud Computing and its Applications
245-250
V. Vishnu
NCITIT68
Image Processing
B. Angupriya and R. Meena
251-255
NCITIT69
Cloud Computing
256-259
D. Soundarya and G. Deepika
NCITIT70
Advance Cipher with Rail Fence Implementation for Dynamic Routing
260-261
P. Lokana
NCITIT71
Network Congestion Arbitration and Prediction Using Neural Networks
262-266
Caroline and A.Mugunthan
NCITIT72
A Customizable Multi-Agent System for Distributed Data Mining
267-270
S. Aswanandini
NCITIT73
A Novel Intrusion-Detection Approach Based on Fuzzy- Probabilistic Model
271-275
A.P. Christopher Arokiaraj
NCITIT74
Subspace Clustering for High Dimensional Data Using Genetic Algorithms
276-281
G. Sangeetha and M. Usha
NCITIT75
Advanced Networks in Wireless Using 4G Technologies
282-286
G. Priyadarshini and D. Vijayashree
NCITIT76
Efficient Clustering and Reduction of Name Ambiguity for Digital Journals
Search and Retrieval
287-289
R. Mathavi and T.S. Prabhu
NCITIT77
A Study and Analysis of Density Based Clustering Algorithms for Mining
Large Spatial Databases
290-295
S. Mekala
NCITIT78
The Puzzle Based Defence Startergy against Flooding Attacks
296-297
G. Gayathri Devi
NCITIT79
Study on Neural Networks through Mining
298-302
N. Jaya Prakash and N. Sriram
NCITIT80
Routing Protocols in Wireless Sensor Networks
303-306
Kamalam and A.R. Jothimani
NCITIT81
Web Mining for Web Image Retrieval
N. Kamaraj and M.K. Prakash
307-309
Related documents