Accepted Papers
1 |
Study of Receiver Initiated Multicast in Grid Environment R. Abilash Joseph,M. Malleswaran and A. Radhakrishnan, Anna University of Technology Tirunelveli, India |
2 |
A Texture Based Analysis and Classification of
Mammogram Images using FOS S.Deepa1 and V.Subbiah Bharathi2, 1Sathyabama University, India and 2DMI College of Engineering, India |
3 |
Zero Knowledge Protocol to design Security Model for threats in WSN Bhushan Bhamare, Gajendra Bakshi, Ashish Sonawane, Radheya Afre and Manoj Jhade, k.k.wagh institute of engg research & education center nashik, India |
4 |
Power Quality Improvement using custom Power Devices in
PSCAD/EMTDC Bhavya Kanchanapalli and Madhu Valavala, Vishnu Institute of Technology Bhimavaram, India |
5 |
Finding the Credit Card Forgery M.Kanimozhi, M.Iswarya, J.Divya and T.Subha, Sri SaiRam Engineering College, India |
6 |
Erase Efficient Buffer Management Algorithm for Flash memory Deepali Diwase and Prajakta Shinde, Pune Institute of Computer Technology, India |
8 |
Cross Layer Optimization For Wireless Network (Wimax) S.P.Karthik, Anna University - Chennai, India |
9 |
Effective Resource Allocation Technique For Wireless Cellular Systems Banda Sreenivas1, S. Ramesh Babu2, S.Prabhakar3 And D.Karunakar Reddy4, 1Jyothishmathi Institute of Technology & Science, India, 2Nigama Engineering College Sambhayapally, Karimnagar,India3RRSCET,Hyderabad, India and 4JNTU-Hyderabad |
10 |
Implementation Of Peer To Peer Systems In Spatial Sharing Data S Sravana Kumar, R Ranjitha Sharon and Liz Sarah Mathews, Panimalar Institute of Technology, India |
12 |
An Efficient method for face Recognition using
Principal Component Analysis Gunjan Dashore and. V.Cyril Raj,Dr. M.G.R. Educational & Research Institute, India |
14 |
Partition Table Generator for Cloud OS Perla Ravi Theja, Govinda K and P.Swarnalatha,VIT, India |
17 |
A Comparative Analysis Of Power Efficient
Flip-Flops Kavita Khare,Priyanka Sharma and Ganesh Lakshmana Kumar Moganti, MANIT, India |
18 |
Low Voltage-Power-Area FGMOS Neural
Classifier Circuit for VLSI Analog BIST Kavita Khare,Priyanka Sharma and Ganesh Lakshmana Kumar Moganti, MANIT, India |
19 |
Detection Techniques Of Selective Forwarding Attacks In Wireless Sensor Networks : A Survey Preeti Sharma, sbs college of engineering & technology, India |
21 |
Trust Oriented Security Framework for
Ad hoc Network Amandeep Verma1 and Manpreet Singh Gujral2, 1Punjabi University Regional Centre, India and 2Punjabi University, India |
24 |
Task Scheduling using ACO-BP Neural Network in Computational Grids K R Remesh Babu and P Mathiyalagan, P S G College of Technology Coimbatore, India |
25 |
Predicting The Unknown Values From The Spatial Objects Using Mathametical Models And Finding The Relationships With Spatial Arm R.Parvathi1 and S.Palaniammal2, 1VIT University- Chennai Campus, India and 2VLB Janakiammal College of Engg. and Tech, India |
26 |
Increase The Performance Of Gsm Security
Protocol By Using Symmetric And Asymmetric
Key Cryptography Tumpa Roy1, Anant Saraswat1 and Kamlesh Dutta2, 1G.L.N.A. Institute of Technology, Mathura,India and 2National Institute of Technology Hamirpur, India |
28 |
An Energy Efficient Extended LEACH (EEE LEACH) Meenakshi Sharma and Kalpana Sharma, SMIT, India |
29 |
Internet Traffic Classification For Academic Institutions Using Machine Learning SunilAgrawal1, Jaspreet Kaur1 and B.S.Sohi2,1Panjab University, India and 2Chandigarh Group of Colleges, India |
30 |
Dynamic Network Anomaly Intrusion Detection Using
Modified Som Aneetha.A.S., Revathi.S. and Bose.S, Anna University - chennai, India |
31 |
A Review on Integration of MANET with Internet Using
Mobile Gateway Harpreet Kaur Sandhu and Roopali Garg, UIET, Panjab University, India |
32 |
Prolonging Network Lifetime in Wireless Sensor Networks Deepti Garg and Roopali Garg, UIET, Panjab University, India |
33 |
Ingress Filtering at Edge Network to Protect
VPN Service from DoS Attack S.Saraswathi and P.Yogesh, Anna University - chennai, India |
35 |
Analyzing Reviews Retrieved From Rss Feeds Using
Opinion Mining Madhura Barve, Snehal Chaudhari and Shantanu Nanoty,Pune University, India |
36 |
Malware Analysis & its Application to Digital Forensic Gursimran Kaur and Bharti Nagpal,Ambedkar Institute of Advanced Communication Technology and Research, India |
37 |
Study Of Effect Of Variations In Slot Dimensions On Fractal Patch Antenna Performance Monika and B.S.Dhaliwal, Guru Nanak Dev Engg. College, India |
38 |
QoS Issues In Underwater Sensor Networks Vivekanand Jha ,Preeti Gupta and Urvashi Ahuja,Guru Gobind Singh Indraprastha University, India |
40 |
Analytical study of Hexapod miRNAs using Phylogenetic methods A.K. Mishra and H.Chandrasekharan,Indian Agricultural Research Institute, India |
41 |
Information Security through Image Watermarking
using Least Significant Bit Algorithm Puneet Kr Sharma and Rajni, SBSCET, India |
42 |
An Emerging Trend Of Feature Extraction
Method In Video Processing R.Revathi and Hemalatha.M, Karpagam University, India |
43 |
Developing a set of Signatures for Signature based Intrusion Detection System using Genetic Algorithm- An Artificial Intelligence approach Mayank Kumar Goyal and Alok Aggarwal, JIIT University, India |
44 |
A Modified Directional Weighted Cascaded-Mask Median Filter For Removal Of Random Impulse Noise J.K. Mandal and Aparna Sarkar, University of Kalyani, India |
45 |
Steganography Using Adaptive Pixel Value Differencing(Apvd) Of Gray Images Through Exclusion Of Overflow/Undflow J.K. Mandal and Debashis Das, University of Kalyani, India |
50 |
Aircraft Simulator Designing based on Object Oriented Methodologies Rahul Kosarwal1 and Anshul Kosarwal2, 1Medicaps Institute of Technology & Management Indore, India and 2Acropolis Institute of Technology and Research Indore, India |
51 |
Chess Game As A Tool For Authentication
Scheme
Sandeep Kumar Pandey, Akash Varma, Ashish Vishwakarama and Rabindra Singh,Institute of Technology and Management, Gorakhpur, India |
52 |
Comparison of High Level Design Based Class Cohesion
Metrics Rupinder Kaur and Puneet Jai Kaur, Panjab University, India |
53 |
Energy Optimisation Schemes For
Wireless Sensor Network Vivekanand Jha ,Elisha Chauhan,Harshpreet Kaur and Neeharika Taneja, Indira Gandhi Institute of technology GGSIPU, India |
55 |
A Survey on Tamil Handwritten Character
Recognition using OCR techniques M. Antony Robert Raj and S.Abirami, Anna University - chennai, India |
56 |
Object-Oriented Database Model For
Effective Mining Of Advanced Engineering
Materials Data Sets Doreswamy, Manohar M G and Hemanth K S, Mangalore University, India |
60 |
Application Of Genetic Algorithm In Linear And Nonlinear Euqtion Of: Survey Mhetre Punam and Potdar B.S, Gharda Institute of Technology, India |
61 |
A Smart device to identify Leakages in water pipeline Abbas Badami1 and Fenil Shah2, 1Vivekanand Education Society’s Institute of technology, India and 2Ramrao Adik Institute of Technology, India |
67 |
Towards A Flexible Model Driven Software Architecture Dalila Guessoum and Djamel Bennouar , University Saad Dahleb, Algeria |
68 |
Impact Of Error Filters On Shares In
Halftone Visual Cryptography Sunil Agrawal and Anshul Sharma, Panjab University, India |
69 |
Combining Jpeg Steganography And Substitution Encryption For Secure Data Communication Shamim Ahmed Laskar and Kattamanchi Hemachandran, Assam University, India |
70 |
Integrating Neuro-Fuzzy Systems To Develop Intelligent Planning Systems For Predicting Student’s Performance Urvashi Rahul Saxena, JSS Academy of Technical Education Noida,India |
71 |
Digital Image Steganalysis for Computer Forensic Investigation Bhoopesh Singh Bhati and Nanhay Singh, Ambedkar Institute of Advanced Communication Technology and Research, India |
72 |
Simulation of Random Waypoint Mobility
Model Using Coloured Petri Nets Supriya Agrahari and Suchismita Chinara, NIT Rourkela, India |
73 |
Monogenic Scale Space Based Region
Covariance Matrix Descriptor For Face
Recognition M. Sharmila Kumari1, B H Shekar2 and G Thippeswamy3, 1P A College of Engineering,India, 2Mangalore University and 3Sir MVIT, India |
74 |
Countermeasure For Node Compromise Attack In Wireless Sensor Networks Vijayaraghavan V1, Siva Prasad Katru2, Rajarathnam N1 and Antonio El Khoury3, 1Infosys Ltd, India , 2HP Labs, India and 3LAAS - CNRS, India |
75 |
Visual Attention Based Keyframes Extraction And Video Summarization S.Thiruchadai Pandeeswari1 , P.Geetha1 and SonyMohanan2, 1College of Engineering, India and 2Dhaanish Ahamad college of Engineering, India |
78 |
Simulator for Energy Efficient Clustering
in Mobile Ad Hoc Networks Amit Kumar, Dhirendra Srivastav and Suchismita Chinara, National Institute of Technology, India |
79 |
Utilization of Data mining Approaches for
Prediction of Life Threatening Diseases
Survivability Sudha.A and P.Gayathri, VIT University, India |
81 |
Manageable Traffic Flow Based On Predictive Data Analysis Dhara Patel1, Snoeji Varghese John2 and Fibinse Xavier 2, 1Nirma University Ahmedabad, India and 23Motorola Mobility Ind Pvt Ltd, India |
82 |
A Novel Steganography Technique for Gray and Colored Images Ankita Agarwal and A. K. Vatsa1, Shobhit University, India |
83 |
Efficient Duty Cycle and Traffic Handling in
Multihop WSN using ADB protocol J. V. Shiral and B. N. Mahajan, G.H.R.C.E, India |
84 |
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks Jayashree V. Shiral and. Bhushan N. Mahajan, G.H.R.C.E, India |
85 |
Risk Management through computer Systems A Survey Irshad ullah, GHSS Ouch, Pakistan |
86 |
Simulation Study of Comparative Performance of
AODV, OLSR, FSR & LAR, Routing Protocols in
MANET in Large Scale Scenarios Prave en Goya l, SKS Institute oSf KTSecIThSno, lInodgoy r&e Science, India |
88 |
Efficient information retrieval using hybrid factors based
caching system S.Kalarani1 and G.V.Uma2, 1st joseph’s Institute of Technology, India and 2Anna university - Chennai, India |
89 |
A Questionnaire-Based Data Quality Methodology Reza Vaziri and Mehran Mohsenzadeh, Azad University of Iran, Tehran |
91 |
Effective Analysis And Predicitve
Model Of Stroke Disease Using
Classification Methods Sudha.A and Gayathri.P, VIT University, India |
92 |
A VLSI Architecture For Wavelet Based Image
Compression Jayaraj U Kidav1, Ajeesh.P.A2, Drisya Vasudev2,Deepak.V.S.2 and Aiswarya menon2, 1DOEACC CENTRE Calicut, India and 2Vidya Academy Of Science And Technology, India |
97 |
Design And Devlopment Of Spiral Shaped Printed Antenna For C Band Satellite Communication Paresh vaddoriya1, Ved Vyas Dwivedi2, S.K.Hadia1 and T.K.Upadhyaya1, 1Charotar University, India2Noble Group of Institutes, India |
98 |
New Distances For Improving The Progressive
Alignmnt Algorithm Ahmed Mokaddem and Mourad Elloumi, Higher School of Sciences and Technologies of Tunis, Tunisia |
100 |
Trajectory Estimation And Control Of
Vehicle Using Neuro-Fuzzy Technique Boumediene Selma and Samira Chouraqui, University of Science and Technology "Mohamed Boudiaf" USTO, Algeria |
101 |
Trust Based Decision Making System on MANET Abhishek Vaish , Utkarsh Goel, Amita Siddarth, Jyoti Soni, Pooja Vishwakarma and Sourabh Prakash, Indian Institute Of Information Technology Allahabad, India |
102 |
Covert Channel:Effective Mechanism for Secure
Communication Rajeshwari Goudar and Pournima More, University of Pune, India |
103 |
Dosage Planning For Diabetes Patients Using Intelligence System Bharathi.E, Anna university - Chennai, India |
104 |
Secured Grid Resource Management based on P2P Trust Models Damandeep Kaur and Jyotsna SenGupta, Punjabi University, India |
106 |
Forensic Computing Models: Technical Overview Gulshan Shrivastava, Akansha Dwivedi and Kavita Sharma, Dronacharya College of Engineering, India |
107 |
Modeling, Simulation And Analysis Of Lung Mechanics Using Labview A. Dinesh, P. Srinivas and V.Naga Prudhvi Raj, V.R. Siddhartha Engineering college, India |
108 |
Detection of Application Layer DDoS Attacks using
Information Theory Based Metrics S. Renuka Devi and P. Yogesh, Anna University - Chennai, India |
109 |
An Approach To Adaptive Test Suite
Optimization Narendra Kumar Rao. B and RamaMohan Reddy.A, Sree Vidyanikethan Engineering College, India |
110 |
A Novel Approach For Feature Extraction And
Selection On Mri Images For Brain Tumor
Classification V.P.Gladis Pushpa Rathi1 and S.Palani2, 1Sudharsan Engineering College Sathiyamangalam, India and 2Sudharsan Engineering College Sathiyamangalam, India |
112 |
Efficient Utilization Of Channels Using Dynamic Guard Channel Allocation With Channel Borrowing Strategy In Handoffs Alagu S and Meyyappan T, Alagappa University, India |
113 |
On-chip Communication on Diametrical 2D
Mesh Interconnection Architecture Prasun Ghosal and Tuhin Subhra Das, Bengal Engineering and Science University, India |
114 |
Farthest Pair Based Obstacle Aware Rectilinear
Minimum Steiner Routing in 3D ICs Prasun Ghosal, Satrajit Das, and Arindam Das, Bengal Engineering and Science University, India |
115 |
Performance Analysis Of Clustering Based
Image Segmentation And Optimization
Methods Jaskirat kaur, Sunil Agrawal and Renu Vig, UIET, Panjab University, India |
116 |
Tuning Of Cost-231 Hata Model For Radio Wave Propagation Predictions Chhaya Dalela1, M V S N Prasad2, P K Dalela3, 1JSS Academy of Technical Education, India, and 2National Physical Laboratory, India and 3C-DOT, India |
117 |
Statistical Machine Translation Using Moses Toolkit Rachana R. Athalekar, Shweta S. Porwal, Devashree S. Shinde and Yugesha R. Sapte, MMCOE, India |
118 |
An End-To-End Bidirectional Sorting Algorithm Eshan Kapur and Parveen Kumar, Lovely Professional University, India |
120 |
Neural Network Approach For
Eye Detection Vijayalaxmi, P.Sudhakara Rao and S Sreehari, VITS, India |
121 |
Current Trends and Future Aspects in Cross-
Layer Design for the Wireless Networks Sandeep Sharma, Rajesh Mishra and Karan Singh , Gautam Buddha University, India |
122 |
Designing of an Wireless Integrated System for short range real time
GIS Applications using IEEE 802.15.4 Pravin Wararkar1 and Nikita Chavan2, 1Rajiv Gandhi College Of Engineering & Research, India and 2G.H. Raisoni College Of Engineering, India |
123 |
Analysis Of Watermarking Techniques For Medical Images Preserving Roi Sonika C. Rathi and Vandana S. Inamdar, College of Engineering Pune, India |
124 |
Survey on Co-operative P2P Information Exchange in
Large P2P Networks S.Nithya and K.Palanivel, Pondicherry University, India |
125 |
A Novel Ant Colony Algorithm For
Multicast Routing In Wireless Ad Hoc
Networks Sunita Prasad1, Zaheeruddin2 and D. K. Lobiyal3, 1Centre for Development of Advanced Computing, India , 2Jamia Millia Islamia, India and 3Jawaharlal Nehru University, India |
126 |
Performance Enhancement Of Pragmatic General Multicast (Pgm)
Protocol Using Local Loss Recovery Strategy Shome,T and Gupta, S., Indira Gandhi Inst. of Technol, India |