The Fourth International Workshop on Computer Networks &
Communications (CoNeCo-2012)
Venue: Avinashilingam University, October 26~28, Coimbatore, India.
The Fourth International Workshop on Computer Networks &
Communications (CoNeCo-2012)
Venue: Avinashilingam University, October 26~28, Coimbatore, India.
1 |
Comparison Of Wilkinson Power Divider And Gysel Power Divider Using Ads For The Frequency Range Of 3 Ghz S.Banu, A.Vishwapriya, R.Yogamathi, A.V.Meenakshi and SPK.Babu, Periyar Maniammai University, India |
2 |
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas Y. Rama Krishna1, PESN Krishna Prasad1, P.V. Subbaiah2 and B. Prabhakara Rao3, 1Prasad V. Potluri Siddhartha Institute of Technology, India, 2Amrita Sai Institute of Science & Technology, India and 3JNT University Kakinada, India |
17 |
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model Md. Mahmudul Hasan1, Most. Tajmary Mahfuz and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University Mohakhali, Bangladesh |
20 |
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering college, India |
25 |
Enhanced Secure Routing Model for MANET Vinay Kumar Pandey1, Harvir Singh1 and Sanjay Kumar2, 1UTU Dehradun, India and 2BenpourTechnologies(P)Ltd, India |
29 |
A Novel Chaos Based Modulation Scheme (CS-QCSK) With Improved BER Performance K.Thilagam and K.Jayanthi, Pondicherry Engineering College, India |
38 |
Alternatives to Redistribution Communities in Inter-Domain Traffic Engineering Vivekanandan Mahadevan, SRM University, India |
53 |
MIPV6 Protocols: A Survey and Comparative Analysis K Vasu, Sudipta Mahapatra and CS Kumar, IIT Kharagpur, India |
68 |
Model for Intrusion Detection System Neha Rani, Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering College, India |
131 |
Multifocus Image Fusion Using Multiresolution Approach With Bilateral Gradient Based Sharpness Criterion G Geetha, S.Raja Mohammad and Y.S.S.R. Murthy, Sri Vishnu Engineering College for Women, India |
1 |
Comparison Of Wilkinson Power Divider And Gysel Power Divider Using Ads For The Frequency Range Of 3 Ghz S.Banu, A.Vishwapriya, R.Yogamathi, A.V.Meenakshi and SPK.Babu, Periyar Maniammai University, India |
2 |
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas Y. Rama Krishna1, PESN Krishna Prasad1, P.V. Subbaiah2 and B. Prabhakara Rao3, 1Prasad V. Potluri Siddhartha Institute of Technology, India, 2Amrita Sai Institute of Science & Technology, India and 3JNT University Kakinada, India |
8 |
PC-LEM: A Hybrid Algorithm of PCA and LEM for Face Recognition System Govind Kumar Jha, Krishna Gopal Sharma, Himanshu Sharma and Neeraj Kumar, G.L.A University Mathura, India |
10 |
OAn Ontological Trust Service for Ad hoc Networks Amandeep Verma1 and Manpreet Singh Gujral2, 1Punjabi University Regional Centre for IT & Mgmt., Mohali, India and 2Punjabi University Patiala, India |
12 |
Improvement of QoS Assurance in MANET by QSIG-AODV: A QoS Based Signaling and on Demand Routing Algorithm Govind Kumar Jha, K G Sharma, Himanshu Sharma and Neeraj Kumar, G.L.A University Mathura, India |
17 |
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using M/M/n/n+q/N Traffic Model Md. Mahmudul Hasan1, Most. Tajmary Mahfuz and Mohamed Ruhul Amin2, 1Daffodil International University, Bangladesh and 2East West University Mohakhali, Bangladesh |
18 |
GridPeerTrust: Reputation-Based Grid Resource Management Damandeep Kaur and Jyotsna SenGupta, Punjabi University Patiala, India |
20 |
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering college, India |
22 |
A Dynamic Load Balancing Algorithm for Heterogeneous Distributed System Neeraj Kumar1, K. G. Sharma2 and Govind Kumar Jha2, 1Nalanda Engg. College, India and 2GLA University Mathura, India |
25 |
Enhanced Secure Routing Model for MANET Vinay Kumar Pandey1, Harvir Singh1 and Sanjay Kumar2, 1UTU Dehradun, India and 2BenpourTechnologies(P)Ltd, India |
29 |
A Novel Chaos Based Modulation Scheme (CS-QCSK) With Improved BER Performance K.Thilagam and K.Jayanthi, Pondicherry Engineering College, India |
31 |
Fusion of Mutliple Probabilistic Secured Models for Proficient Decision Making J.Indumathi, Anna University Chennai, India |
33 |
Protecting The Secrecy and Integrity of Secret Image using Threshold Secret Sharing and Radon Transformation
P Devaki and G Raghavendra Rao, The National Institute of Engineering Mysore, India |
36 |
Pervasive Telemedicine System with Data Mining Technique for Elderly People Vimal Upadhyay1, Sonali Agarwal1 and Naveen Goswami2, 1Indian Institute of Information Technology Allahabad, India and 2SMEC Neemrana, India |
37 |
Tit for Tat Methodology for DoS Attack using Intrusion Detection System M. Navaneetha Krishnan, GCE Salem, India |
38 |
Alternatives to Redistribution Communities in Inter-Domain Traffic Engineering Vivekanandan Mahadevan, SRM University, India |
41 |
A Survey on Target Tracking Techniques in Wireless Sensor Networks K. Ramya, K. Praveen Kumar and V. Srinivas Rao, VR Siddhartha Engineering College, India |
47 |
A Constraint Based Relay Node Deployment In Heterogeneous Wireless Sensor Networks For Lifetime Maximization Suganthi K, Vinayaga Sundaram B, Sivaviknesh S, Joy Arun Raj M.A and Prasana Kumar M.D, MIT Anna University, India |
49 |
DVFH - VFH*: Reliable Obstacle Avoidance for Mobile Robot Navigation Coupled with A*Algorithm through Fuzzy Logic and Knowledge Based Systems A.Richard William, S.Srivadhana and Vinoth Bharadhwaj, Jayalakshmi Institute of Technology, India |
53 |
MIPV6 Protocols: A Survey and Comparative Analysis K Vasu, Sudipta Mahapatra and CS Kumar, IIT Kharagpur, India |
63 |
A Design Pattern for Invocation and Composition of Web Services with an amalgamation of Java Aspect Component Framework and Service Oriented Architecture for Autonomic Computing Systems Vishnuvardhan Mannava1 and T.Ramesh2, 1K L University, India and 2National Institute of Technology Warangal, India |
68 |
Model for Intrusion Detection System Neha Rani, Pankaj Sharma and Ashok Kumar Sinha, ABES Engineering College, India |
69 |
Aspects of Cloud Solution using Service Oriented Architecture (SOA) Rajashri Hiremath and R Selvarani, MSRIT Bangalore, India |
73 |
Energy Aware Path Establishment and Maintenance for Sensor Network with parameters as used in Agricultural Field Smitha N. Pai1, K.C.Shet2 and Mruthyunjaya H.S1, 1Manipal University, India and 2N.I.T.K Suratkal, India |
84 |
A hybrid approach for GPS/INS integration using Kalman filter and IDNN M.Malleswaran, Subbulakshmi.V and Jannathul Firdous.R, Anna University Tirunelveli, India |
90 |
Simulation of Intelligent Hoard Systems Using ARM Processor For Aircrafts Muttanna Kadal HK, G V Jayaramaiah, Shivaputra and Chetan S, Dr.Ambedkar Institute of Technology Bangalore, India |
101 |
Using Ontology for Measuring Semantic Similarity for Question Answering System M.Ramprasath1 and Shanumugasundharam HariHaran2, 1J.J.college of engineering and Technology, India and 2TRP engineering college, India |
105 |
Integral Multipath Routing in MPLS (Multiprotocol Label Switching) Tarun Awathi1 and Tulika Awasthi2, 1Maharana Institute of Professional Studies, India and 2TCS, India |
106 |
Location Privacy against Traffic Analysis Attacks Through Mobile Sinks using Trust Value Computing Nithya Joy and Biju Paul, Rajagiri School of Engineering & Technology, India |
107 |
Recap the visited Pages in SVGM Search Engine using Chronicle Plug-in Saranya V, Sri Vidya College of Engineering and Technology, India |
110 |
An efficient detection of flooding attacks to Internet Threat Monitors (ITM) Using Entropy variations under Low Traffic K Munivara Prasad1, A Rama Mohan Reddy2 and M Ganesh Karthik1, 1Sree Vidyanikethan Engg College, India and 2SVUC,A V University, India |
116 |
Dynamic Defense Against DDoS SYN Flooding Attacks Ayyamuthukumar.D1, Kannan.M1 and Anurekha.R2, 1K.S. Rangasamy College of Technology, India and 2Institute of Road and Transport Technology Erode, India |
117 |
Digital Certificate for User Equipment Authentication and Key Agreement for LTE - A M. Prasad and R. Manoharan, Pondicherry Engineering College, India |
121 |
An Improved Authentication Mechanism using IPV6 in Mobile RFID Environment M.Sandhya and T.R.Rangaswamy, B.S.Abdur Rahman University, India |
124 |
A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in Mobile Ad Hoc Network V. Karthik Raju and K. Vinay Kumar, NIT Surathkal, India |
126 |
A new method for Comparing the Security of Routing Protocols in Mobile Ad Hoc Networks Zeinab Shariat1 and Ali Movaghar2, 1Islamic Azad University of Boumehen, Iran and 2Sharif University of Technology, India |
131 |
Multifocus Image Fusion Using Multiresolution Approach With Bilateral Gradient Based Sharpness Criterion G Geetha, S.Raja Mohammad and Y.S.S.R. Murthy, Sri Vishnu Engineering College for Women, India |
138 |
Robust Learning Automata Like Solution for Random Early Detection Lija Mohan, Mahatma Gandhi University, India |
140 |
UDAY-QIPRS Algorithm for IEEE 802.16e Networks Uday Prakash Pethakamsetty, JNTUH CEH, India |