Registered Papers

1
Comparison Of Wilkinson Power Divider And Gysel Power Divider Using Ads For The Frequency Range Of 3 Ghz
S.Banu, A.Vishwapriya, R.Yogamathi, A.V.Meenakshi and SPK.Babu, Periyar Maniammai University, India
2
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
Y. Rama Krishna1, PESN Krishna Prasad1, P.V. Subbaiah2 and B. Prabhakara Rao3, 1Prasad V. Potluri Siddhartha Institute of Technology, India, 2Amrita Sai Institute of Science & Technology, India and 3JNT University Kakinada, India
17
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model
Md. Mahmudul Hasan1, Most. Tajmary Mahfuz and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University Mohakhali, Bangladesh
20
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering college, India
25
Enhanced Secure Routing Model for MANET
Vinay Kumar Pandey1, Harvir Singh1 and Sanjay Kumar2, 1UTU Dehradun, India and 2BenpourTechnologies(P)Ltd, India
29
A Novel Chaos Based Modulation Scheme (CS-QCSK) With Improved BER Performance
K.Thilagam and K.Jayanthi, Pondicherry Engineering College, India
38
Alternatives to Redistribution Communities in Inter-Domain Traffic Engineering
Vivekanandan Mahadevan, SRM University, India
53
MIPV6 Protocols: A Survey and Comparative Analysis
K Vasu, Sudipta Mahapatra and CS Kumar, IIT Kharagpur, India
68
Model for Intrusion Detection System
Neha Rani, Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering College, India
131
Multifocus Image Fusion Using Multiresolution Approach With Bilateral Gradient Based Sharpness Criterion
G Geetha, S.Raja Mohammad and Y.S.S.R. Murthy, Sri Vishnu Engineering College for Women, India

Accepted Papers

1
Comparison Of Wilkinson Power Divider And Gysel Power Divider Using Ads For The Frequency Range Of 3 Ghz
S.Banu, A.Vishwapriya, R.Yogamathi, A.V.Meenakshi and SPK.Babu, Periyar Maniammai University, India
2
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
Y. Rama Krishna1, PESN Krishna Prasad1, P.V. Subbaiah2 and B. Prabhakara Rao3, 1Prasad V. Potluri Siddhartha Institute of Technology, India, 2Amrita Sai Institute of Science & Technology, India and 3JNT University Kakinada, India
8
PC-LEM: A Hybrid Algorithm of PCA and LEM for Face Recognition System
Govind Kumar Jha, Krishna Gopal Sharma, Himanshu Sharma and Neeraj Kumar, G.L.A University Mathura, India
10
OAn Ontological Trust Service for Ad hoc Networks
Amandeep Verma1 and Manpreet Singh Gujral2, 1Punjabi University Regional Centre for IT & Mgmt., Mohali, India and 2Punjabi University Patiala, India
12
Improvement of QoS Assurance in MANET by QSIG-AODV: A QoS Based Signaling and on Demand Routing Algorithm
Govind Kumar Jha, K G Sharma, Himanshu Sharma and Neeraj Kumar, G.L.A University Mathura, India
17
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model
Md. Mahmudul Hasan1, Most. Tajmary Mahfuz and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University Mohakhali, Bangladesh
18
GridPeerTrust: Reputation-Based Grid Resource Management
Damandeep Kaur and Jyotsna SenGupta, Punjabi University Patiala, India
20
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering college, India
22
A Dynamic Load Balancing Algorithm for Heterogeneous Distributed System
Neeraj Kumar1, K. G. Sharma2 and Govind Kumar Jha2, 1Nalanda Engg. College, India and 2GLA University Mathura, India
25
Enhanced Secure Routing Model for MANET
Vinay Kumar Pandey1, Harvir Singh1 and Sanjay Kumar2, 1UTU Dehradun, India and 2BenpourTechnologies(P)Ltd, India
29
A Novel Chaos Based Modulation Scheme (CS-QCSK) With Improved BER Performance
K.Thilagam and K.Jayanthi, Pondicherry Engineering College, India
31
Fusion of Mutliple Probabilistic Secured Models for Proficient Decision Making
J.Indumathi, Anna University Chennai, India
33
Protecting The Secrecy and Integrity of Secret Image using Threshold Secret Sharing and Radon Transformation
P Devaki and G Raghavendra Rao, The National Institute of Engineering Mysore, India
36
Pervasive Telemedicine System with Data Mining Technique for Elderly People
Vimal Upadhyay1, Sonali Agarwal1 and Naveen Goswami2, 1Indian Institute of Information Technology Allahabad, India and 2SMEC Neemrana, India
37
Tit for Tat Methodology for DoS Attack using Intrusion Detection System
M. Navaneetha Krishnan, GCE Salem, India
38
Alternatives to Redistribution Communities in Inter-Domain Traffic Engineering
Vivekanandan Mahadevan, SRM University, India
41
A Survey on Target Tracking Techniques in Wireless Sensor Networks
K. Ramya, K. Praveen Kumar and V. Srinivas Rao, VR Siddhartha Engineering College, India
47
A Constraint Based Relay Node Deployment In Heterogeneous Wireless Sensor Networks For Lifetime Maximization
Suganthi K, Vinayaga Sundaram B, Sivaviknesh S, Joy Arun Raj M.A and Prasana Kumar M.D, MIT Anna University, India
49
DVFH - VFH*: Reliable Obstacle Avoidance for Mobile Robot Navigation Coupled with A*Algorithm through Fuzzy Logic and Knowledge Based Systems
A.Richard William, S.Srivadhana and Vinoth Bharadhwaj, Jayalakshmi Institute of Technology, India
53
MIPV6 Protocols: A Survey and Comparative Analysis
K Vasu, Sudipta Mahapatra and CS Kumar, IIT Kharagpur, India
63
A Design Pattern for Invocation and Composition of Web Services with an amalgamation of Java Aspect Component Framework and Service Oriented Architecture for Autonomic Computing Systems
Vishnuvardhan Mannava1 and T.Ramesh2, 1K L University, India and 2National Institute of Technology Warangal, India
68
Model for Intrusion Detection System
Neha Rani, Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering College, India
69
Aspects of Cloud Solution using Service Oriented Architecture (SOA)
Rajashri Hiremath and R Selvarani, MSRIT Bangalore, India
73
Energy Aware Path Establishment and Maintenance for Sensor Network with parameters as used in Agricultural Field
Smitha N. Pai1, K.C.Shet2 and Mruthyunjaya H.S1, 1Manipal University, India and 2N.I.T.K Suratkal, India
84
A hybrid approach for GPS/INS integration using Kalman filter and IDNN
M.Malleswaran, Subbulakshmi.V and Jannathul Firdous.R, Anna University Tirunelveli, India
90
Simulation of Intelligent Hoard Systems Using ARM Processor For Aircrafts
Muttanna Kadal HK, G V Jayaramaiah, Shivaputra and Chetan S, Dr.Ambedkar Institute of Technology Bangalore, India
101
Using Ontology for Measuring Semantic Similarity for Question Answering System
M.Ramprasath1 and Shanumugasundharam HariHaran2, 1J.J.college of engineering and Technology, India and 2TRP engineering college, India
105
Integral Multipath Routing in MPLS (Multiprotocol Label Switching)
Tarun Awathi1 and Tulika Awasthi2, 1Maharana Institute of Professional Studies, India and 2TCS, India
106
Location Privacy against Traffic Analysis Attacks Through Mobile Sinks using Trust Value Computing
Nithya Joy and Biju Paul, Rajagiri School of Engineering & Technology, India
107
Recap the visited Pages in SVGM Search Engine using Chronicle Plug-in
Saranya V, Sri Vidya College of Engineering and Technology, India
110
An efficient detection of flooding attacks to Internet Threat Monitors (ITM) Using Entropy variations under Low Traffic
K Munivara Prasad1, A Rama Mohan Reddy2 and M Ganesh Karthik1, 1Sree Vidyanikethan Engg College, India and 2SVUC,A V University, India
116
Dynamic Defense Against DDoS SYN Flooding Attacks
Ayyamuthukumar.D1, Kannan.M1 and Anurekha.R2, 1K.S. Rangasamy College of Technology, India and 2Institute of Road and Transport Technology Erode, India
117
Digital Certificate for User Equipment Authentication and Key Agreement for LTE - A
M. Prasad and R. Manoharan, Pondicherry Engineering College, India
121
An Improved Authentication Mechanism using IPV6 in Mobile RFID Environment
M.Sandhya and T.R.Rangaswamy, B.S.Abdur Rahman University, India
124
A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in Mobile Ad Hoc Network
V. Karthik Raju and K. Vinay Kumar, NIT Surathkal, India
126
A new method for Comparing the Security of Routing Protocols in Mobile Ad Hoc Networks
Zeinab Shariat1 and Ali Movaghar2, 1Islamic Azad University of Boumehen, Iran and 2Sharif University of Technology, India
131
Multifocus Image Fusion Using Multiresolution Approach With Bilateral Gradient Based Sharpness Criterion
G Geetha, S.Raja Mohammad and Y.S.S.R. Murthy, Sri Vishnu Engineering College for Women, India
138
Robust Learning Automata Like Solution for Random Early Detection
Lija Mohan, Mahatma Gandhi University, India
140
UDAY-QIPRS Algorithm for IEEE 802.16e Networks
Uday Prakash Pethakamsetty, JNTUH CEH, India