• Scope & Topics
  • Paper Submission
  • Program Committee
  • Accepted Paper
  • Workshops
  • Contact Us
  • AIRCC
  • Scope & Topics
  • Paper Submission
  • Program Committee
  • Accepted Paper
  • Workshops
  • Contact Us
  • AIRCC

Courtesy

Technically Sponsored by

Accepted Papers

1

Optimization of Handoff Performance Containing Relay within 3GPP Long Term Evolution (LTE) Networks
Vikrant chauhan, Ayush Kumar and Purnendu Chaturvedi,Jaypee Institute of Information Technology University, India.

5
New Algorithm for Sensitive Rule Hiding using Data Distortion Technique
Kasthuri S1 and Meyyappan T2. 1Swami Dayananda College of Arts and Science,India 2Alagappa University, India
7
A Novel Recommendation Framework Based on Resource Flow on User-Object Network.
Wang Heyu, Harbin Institute of Technology(Wei Hai),China.
10
Secured Text Message Transmission with Implementation of Concatenated CFB Cryptographic Algorithm
S.Saravanakumar, R.Senthil Kumar, B.S.Praviya Bharathi and H.Manju Priya. Panimalar Institute of Technology, Chennai.
11
Automatically Estimating Software Effort and Cost using Computing Intelligence Techniques
SJin-Cherng Lin , Han-Yuan Tzeng, and Yueh-Ting Lin Tatung University,Taiwan
12
Next Generation 4G WiMAX Networks - IEEE 802.16 Standard :
Shantanu Pathak and Shagun Batra. SRM University,India
16
.Medical Image Compression based on Contourlet Transform Preserving Region of Interest (ROI)
Sherin Jabbar and Shaiju Panchikkil MES Engineering College, India.
17
An Efficient Hand Gesture Recognition Technique For Human-Computer Interface Intelligent Systems
Elakkiya R1, Selvamani K1, Kanimozhi S2 and Kannan A1, 1Anna University, India. 2Ramco Systems, India.
18
Applying Analytics Beyond Education: A Data Mining Approach
Rashmita Jena and Chinmaya Sahu ,National Institute of Science and Technology,India
19
Efficient Traffic Controlled AODV Routing Protocol for Wireless Sensor Networks
A.Fiona Sharon and A.Mangaiyarkarasi, Thiagarajar College of Engineering, India
20
A Fuzzy Logic Based Channel Allocation Scheme for Cognitive Radio Networks
O. G. Dennis . Makerere University, Uganda.
22
Backpropagation Learning Algorithm Based on Levenberg Marquardt Algorithm
S.Sapna1, A.Tamilarasi2 and M.Pravin Kumar1 1 K.S.R College of Engineering, India. 2 Kongu Engineering College, India
23
Web Log Preprocessing based on Partial Ancestral Graph Technique for Session Construction
S. Chitra1 and .B. Kalpana2 1 Government Arts College,Coimbatore, India. 2 Avinashilingam Institute of Home Science and HigherEducation for Women,India
24
Advanced Techniques for Preventing Selective Jamming Attacks
Abhimanyu.V ,Muthu Hariharan.R.M and Vijayashankar.J SNS College of Technology,India.
25
Data aware Searching using Content Query Language
A.J.Khanapure Walchand Institute of Technology,India
26
Medical Image Compression Based on Contourlet Transform Preserving Region of Interest (ROI)
Sherin Jabbar and Shaiju Panchikkil MES Engineering College, India.
27
Data Forwarding in Opportunistic Networks using Mobile Traces
B.Poonguzharselvi and V.Vetriselvi Anna university Chennai,India
28
A Review on Wireless Network Security
Sandeep Sharma, Rajesh Mishra and Karan Singh Gautam Buddha University,India
29
A Registry Based Discovery Mechanism for E-Learning Web Services
Demian Antony D'Mello, Pramod Prabhu, Naveen Baliga, Nikhil Misquith and Flexon Fernandes St. Joseph Engineering College, India.
30
Top Down Approach to Find Maximal Frequent Item Set First using Subset Creation
Jnanamurthy HK , Vishesh HV ,Vishruth Jain and Preetham Kumar Manipal Institute of Technology, India.
31
Designing a Tool for Image Cataloguing in Live Forensics using Descriptor
Ms. Shubhangi T Patil and Ms. Nikita A Chavan GHRCE , India.
32
Need of Programming Models, Tools and Algorithms for New Generation HPC (EXASCALE System)
Abbas Mohammed1 and Niraj Updhyaya2 1VIFCET,India 2 JBIT, India
33
Designing of TCP Based Hybrid Covert Channel
Rajeshwari Goudar and Pournima More .University of Pune ,India
36
Enhanced Replica Selection Technique for Binding Replica Sites in Data Grids
Rafah M. Almuttairi 1, Mahdi S. Almahana1, Rajeev Wankar2, Atul Negi2, C. R. Rao2 1University of Babylon, Iraq. 2 University of Hyderabad , India.
38
Broadcasting Suppression: A Broadcasting Scheme for Vehicular Ad-Hoc Networks
Tejas Talele, Gauresh Pandit and Parimal Deshmukh. Pune University, India
39
The Unified Operation Structure for Symmetric-Key Algorithm
Kuo-Tsang Huang1 and Sung-Shiou Shen2 1Chang Gung University, Taiwan 2DE LIN Institute of Technology, Taiwan
40
Effectiveness Prediction of Memory Based Classifiers for the Classification of Multivariate Data Set
C. Lakshmi Devasena. Sphoorthy Engineering College, India
41
Creation of a Test Bed Environment for Core Java Applications using White Box Testing Approaches
Dhanamma Jagli and Priya R. L .V. E. S. Institute of Technology, India.
42
Models for the Specification of the Decision-Maker Needs to Discover Useful Knowledge in Databases
Rachid Chalal1, Fahima Nader1 and Nora Taibouni2. 1 LMCS Laboratory, Algeria 2 Department Studies & Development" of the Algerian national Company SONTRACH division "business"
43
Performance Analysis of Spatial Color Interpolation Algorithms
Vikas Gupta and Milind Mushrif Yeshwantrao. Chavan College of Engineering, India.
45
Rule Based Structured Data Extraction from HTML Web Pages using Semantic Web Technologies
A.M.Abirami 1, T.M.Aishwarya 1, K.S.Eswari 1 and A.Askarunisa 2 . 1Thiagarajar College of Engineering, India 2 Vickram College of Engg. ,India.
48
Evolution of Wireless Mobilecommunication Networks and Future Ofcellular Market in India
Arjun Kondur, Mayur Rao, Pavan Kumar B S and Rajeshwari Hegde. BMS College of Engineering, Bangalore, India
50
iHoneycol:A Distributed Collaborative Technique for Mitigation of DDOS Attack
M.Buvaneswari and .T.Subha. Srisairam engineering college ,India.
51
A Novel Approach for Energy Efficient Hierarchy based Routing in Wireless Sensor Networks
S.Karthikeyan1 and S.Jayashri2 . 1 Sathyabama university,India 2 Adhiparasakthi engineering college,India
52
A New Hybrid Approach CrypSteg of Data Hiding in Images using Cryptography and Steganography
Pria Bharti and Roopali Soni OCT , Bhopal, India .

Site Designed By NnN