Courtesy

Technically Sponsored by

Accepted Papers
5
An Evaluation of Software Estimation Techniques, their Results and Behavior Based on 4 Data Sets
Syed Ali Abbas1, Xiaofang Liao1, Zaki Hassan Kazmi2 and Wajid Abbasi2,1Chongqing University, China and 2 University of Azad Jammu & Kashmir, India.
9
RFID-Based Navigation Services on Smartphones
Hassan Karimi and Konstantinos Pelechrinis, University of Pittsburgh, US.
10
Prediction of malignancy in suspected thyroid tumour patients by three different methods of classification in data mining techniques 
Saeedeh Pourahmad, Mohsen Azad and Sharam Paydar Shiraz University of Medical Sciences, Iran.
13
Need of Programming Models, Tools and Algorithms for New Generation HPC (EXASCALE System)
Abbas Mohammed1 and Niraj Upadhayaya2,1VIFCET, India and 2 JBIT College of Engineering & Technology, India.
14
Fool proof public distribution system
Sivaramarajalu R V, Vignesh S and Venkatakrishnan, M P St.Joseph's College of Engineering, India.
15
Adaptive Wavelet Packet Basis Selection for Zero Tree Image Coding
Pandian Ramanathan,Sathyabama University, India.
16
A New Hybrid Approach CrypSteg of Data Hiding in Images using Cryptography and Steganography
Pria Bharti and Roopali Soni, OCT, India
18
Creating Context Aware and Adaptable Web Services within a Security Framework
Richard Millham, Durban University of Technology, South Africa
22
An Improved Dynamically Reconfigurable Pipelined Adaptive Viterbi Decoder for High Throughput
Nitin Sonar1,Faris Al-Naimy1 and R. R. Mudholkar2, 1Ibra College of Technology, Oman and 2 Shivaji University, India.
24
Comparative Study and Performance Enhancement of Scaled out Cloud Architecture of Amazon Web Services
D.S. Chauhan1 and Manjeet Gupta2,1UTU,India and 2 JMIT, India.
27
An Active Research Directions in Wireless Sensor Networks
Vikash Singh and Kalpana Sharma,Sikkim Manipal Institute of Technology, India.
28
A Synchronized Distributed Denial of Service Prevention System
Metasebia Alemante1 and Mulugata Libsie2,1ZTE University, Ethiopia and 2Addis Ababa University, Ethiopia.
29
A Review on Soft Computing Technique in Intrusion Detection System
Noor Suhana Sulaiman1, Rohani Abu Bakar2 and Norrozila Sulaiman2,1TATiUC, Malaysia and 2UMP, Malaysia.
30
An Adaptive Threshold Selection Technique in Video Compression by Using FHW and Evolutionary Programming
Hanumanthu Rajasekhar and Bhima Prabhakara Rao, JNTUK, India.
35
The Potential of Cloud Computing as an Alternative Technology for SMES in South Africa
Mpho Mohlameane and Nkqubela Ruxwana Tshwane University of Technology, South Africa.
37
Solution for Ubiquitous Network Physical Access Management and Monitoring
Phan Xuan Tan, Ha Quoc Trung and Nguyen Manh Cuong, Hanoi University of Science and Technology, Viet Nam.
38
Privacy-Preserving Data Mining Technology
Mohnish Patel1, Ruchi Gupta2 and Rishi Kant Malviya1, 1NIRT, India and 2BIST, India.
39
Developing Multithreaded Database Application Using Java Tools and Oracle Database Management System in Intranet Environment
Raied Salman, Stratford University, US.
42
Performance Evaluation of WIMAX Communication System using Labview
Syed Abdul Rehman Rizvi, Syed Zeeshan Yousuf, Abdul Aziz, Muhammad Akeel, Hunzila Nasir and Iftkhar-Ul Hassan,The Islamia University of Bahawalpur, Pakistan.
44
Park’s Vector Approach to detect an inter turn stator fault in a doubly fed induction machine by a neural network
Amel Ourici and Ahmed Ouari, University Badji Mokhtar Annaba, Algeria.
45
Energy Constraint in the MMSN (Mobile Multimedia Sensor Networks)
F.Chabane and M.Derdour, University of Tebessa
46
mBlog: Mobile Content Management System
Njuguna Simon Mwangi and Ephantus Kinyanjui karari, Kimathi University College of Technology, Kenya
47
Secure Adaptive Traffic Lights System for VANETs 
Kishore Biradar1, Radhika M. Pai2, Manohara Pai M.M2 and Joseph Mouzna2, 1Manipal University, Manipal and 2ESIGELEC, France
48
Game Theoretical Approach to Modeling Intrusion Detection in Mobile Adhoc Networks
Balasubramanian Paramasivan and Mohaideen Pitchai,National Engineering College, India.
49
A TTP Based Efficient Non-Repudiation Scheme for Storage Clouds
Wenqi Ma, Qingbo Wu and Yusong Tan, National University of Defense Technology, China.
50
Projector Calibration Using Passive Stereo and Triangulation
Yousef B. Mahdy, Khaled F. Hussain and Mostafa A. Abdel-Majid, Assiut University, Egypt
51
Distributed Traffic by Load-Balancing Approach for AOMDV in Ad-hoc Networks
Mahamed Abdelmadjid Allali1, Zoulikha Mekkakia Maaza2, Ali Kies2, Redouane Belbachir2 1University Hassiba Ben Bouali of Chlef, Algeria and 2University of Sciences and Technology of Oran, Algeria