Registered Papers

1 Mobile-Cloud: A Framework of Cloud Computing for Mobile Application
Jibitesh Mishra1, Sanjit Kumar Dash1 and Sweta Dash2, 1College of Engineering & Technology Bhubaneswar, India and 2Synergy Institute of Engineering and Technology, India
6 A Novel Statistical Fusion Rule for Image Fusion in Non Subsampled Contourlet Transform Domain
Manu V T and Philomina Simon, University of Kerala, India
13 Maximizing Lifetime of Wireless Sensor Network through Extended LEACH Algorithm
Indrajit Bhattacharya1, Saurav Ghosh2 and Suparna Kundu2, 1Kalyani Govt. Engineering College, India and 2A.K.C.S.I.T., University of Calcutta, India
22 Intersection area based geocasting protocol (IBGP) for Vehicular Ad hoc Networks
Sanjoy Das and D. K. lobiyal, Jawaharlal Nehru University, India
25 Survey on H.264 Standard
R. Vani1 and M. Sangeetha2, 1Anna University of Technology, India and 2Karpaga Vinayaga College of Engineering and Technology, India
29 Self-Configurable Processor Schedule Window Algorithm
A.Prasanth Rao1, A.Govardhan1 and P.V.V Prasad Rao2, 1JNTUH-Hyderabad, India and 2IIIT Gouchibowli, India
34 An Authenticated BSS Methodology for Data Security Using Steganography
Ravi Kumar. B1, Murti. P. R. K1 and Hemanth Kumar. B2, 1University of Hyderabad, India and 2R.V.R.& J.C. College of Engineering, India
36 A Real Time Multivariate Robust Regression Based Flood Prediction Model using Polynomial Approximation for Wireless Sensor Network Based Flood Forecasting Systems
Victor Seal1, Arnab Raha1, Shovan Maity1, Souvik Kr. Mitra1, Amitava Mukherjee2 and Mrinal Kanti Naskar1, 1Jadavpur University, India and 2IBM India Private limited, India
46 AODV Enhancement Based on the Minimization of Route-Request Packets
Puja Rani and G. P. Biswas, ISM, India
47 Key Management for Group based Mobile Ad hoc Networks
Kamal Kumar Chauhan and Amit Kumar Singh Sanger, Hindustan College of Science and Technology,, India
53 Optimal clustering in zone based protocol of Wireless Sensor Network
S. Taruna, Jain Kusum Lata and Purohit G.N, Banasthali University, India
54 Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network
K.Ramesh1 and K.Somasundaram2, 1Nandha Engineering College, India and 2Arupadai Veedu Institute of Technology, India
58 IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks
Raghav. V. Sampangi1, Saurabh Dey2, Shalini. R. Urs2 and Srinivas Sampalli1, 1Dalhousie University, Canada and 2International School of Information Management, India
59 A study on various Deployment Schemes for Wireless Sensor Networks
G Sanjiv Rao1, V Valli Kumari2, 1Sri Sai Aditya Institute of Science and Technology, India and 2Andhra University, India
60 Spanning tree based Reliable Data Transmission in LEACH
Neeranjan Chitare1 , Rashmi M.1, Shalini R. Urs1 and Srinivas Sampalli2, 1International School of Information Management, India and 2Dalhousie University, Canada
61 Image Deblurring using Bayesian Framework
Sitara K and Remya S, University of Kerala, India
62 Taxonomy and Control Measures of SPAM and SPIM
Kamini Simi Bajaj and Josef Pieprzyk, Macquarie University, Australia

Accepted Papers

1 Mobile-Cloud: A framework of Cloud Computing for Mobile Application
Jibitesh Mishra1, Sanjit Kumar Dash1 and Sweta Dash2, 1College of Engineering and Technology, India and 2Synergy Institute of Engineering and Technology, India
2 A Novel way of protecting the shared key by using secret sharing and embedding using pseudo random numbers
Devaki P and G Raghavendra Rao, The National Institute of Engineering, India
3 The Effect of Design Pattern on Aspect Oriented Software Quality ľAn Empirical Evaluation
Kotrappa Sirbi1 and Prakash Kulkarni2, 1K L E S's CET Belgaum, India and 2Walchand College Of Engineering, India
6 BERA Novel Statistical Fusion Rule for Image Fusion in Non Subsampled Contourlet Transform Domain
Manu V T and Philomina Simon,
7 An Approach for Extracting Design Parameters for Class Diagram from C++ code
Ati Jain1, Swapnil Soner2 and Kshitij Pathak3, 1Swami Vivekanand College, India, 2TCET, India and 3MIT Ujjain, India
8 End -to- End Network Security via high-speed Quantum Key Distribution and Testing
Kishore Kumar, Santhosh Kumar, Srinivas Regula and Shyam Sundar Hanmandla, JNTUH, India
11 A Cryptosystem for XML documents
Abd El-Aziz Ahmed, Anna UNI, Egypt
12 Studies on Research issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) Networks
Satish Kumar, Kalignar Karuananidhi instittue of technology, India
13 Maximizing Lifetime of Wireless Sensor Network through Extended LEACH Algorithm
Suparna Kundu1, Indrajit Bhattacharya2 and Sourav Ghosh1, 1A.K.C.S.I.T., University of Calcutta, India and 2Kalyani Govt. Engineering College, Kalyani, India
19 Distributed Fault Tolerance Routing In Wireless Sensor Networks
Prasenjit Chanak, Bengal Engineering and Science University, India
22 Intersection area based geocasting protocol (IBGP) for Vehicular Ad hoc Networks
Sanjoy Das and D. K Lobiyal, Jawaharlal Nehru University, India
23 Optimization of task execution period using evolutionary algorithm
Rahul Vishwakarma, TCS, India
25 Survey on H.264 Standard
R. Vani1 and M. Sangeetha2, 1Anna University of Technology, India and 2Karpaga Vinayaga College of Engg. and technology, India
28 Using Cloud Intrusion Tolerance Framework for Securing Cloud Data Storage
Vishal M. Karande and Alwyn R. Pais, NITK-Surathkal, India
29 Self-Configurable Processor Window Schedule Algorithm
Adiraju Prashanth Rao1, A Govardhan2 and P.V.V Prasad Rao3, 1Padmasri Dr. B.V. Raju Institute of Technology, India, 2JNTUH, India and 3SETU Software Systems Pvt,Ltd, India
36 A Real Time Multivariate Robust Regression Based Flood Prediction Model using Polynomial Approximation for Wireless Sensor Network Based Flood Forecasting Systems
Arnab Raha1, Victor Seal1, Shovan Maity1, Souvik Kr. Mitra1, Amitava Mukherjee2 and Mrinal Kanti Naskar1, 1Jadavpur University, India and 2IBM India Private limited, India
40 Survey On Scheduling And Allocation In High Level Synthesis
M. Chinnadurai1 and M. Joseph2, 1E.G.S. Pillay Engineering College and 2Mother Teresa College of Engineering & Technology, India
43 VLSI Circuit Partitioning: A Genetic Algorithmic Approrach
Sayantan Ghatak and Satrajit Ghosh, Acharya Prafulla Chandra. College, India
46 AODV Enhancement based on the Minimization of Route-Request Packets
Puja Rani and G.P. Biswas, ISM, India
47 Key Management for Group based Mobile Ad hoc Networks
Amit Sanger1 and Kamal Kumar Chauhan2, 1Hindustan College of Science and Technology Mathura, India and 2Anand Engineering College, India
48 An Architectural Framework for Secure Composite Web Services
J G R Sathiaseelan1 and S. Albert Rabara2, 1Bishop Heber College, India and 2St.Joseph College, India
51 Mobile Agent's Security Requirements and Issues
G Geetha1, C Jayakumar2 and P Sudha1, 1Jce, India and 2RMK Engineering college, India
52 Hierarchical Cluster Based Query-Driven Routing Protocol for Wireless Sensor Networks
Soumyabrata Saha, JIS College of Engineering, India
53 Optimal clustering in zone based protocol of Wireless Sensor Network
Taruna S, Kusumlata Jain and G.N Purohit, Banasthali University, India
54 Optimized FZ-LEACH Using Exponential Weighted Moving Average for Wireless Sensor Network
K.Ramesh1 and K.Somasundaram2, 1Nandha Engineering College, India and 2Arupadai Veedu Institute of Technology, India
55 Modular form of Rough Decision Models
Ahmed Taisser Shawky, Hesham A. Hefny and Ashraf Hassan A. Elwahab, University of Cairo, Egypt
58 IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks
Raghav Sampangi1, Saurabh Dey2, Shalini Urs2 and Srinivas Sampalli1, 1Dalhousie University, Canada and 2International School for Information Management, India
59 A study on various Deployment Schemes for Wireless Sensor Networks
Sanjiv Rao, Sri Sai Aditya Institute of Science and Technology, India
60 Spanning tree based Reliable Data Transmission in LEACH
Neeranjan Chitare1, M Rashmi1, Shalini Urs1 and Srinivas Sampalli2, 1International School for Information Management, India and 2Dalhousie University, Canada
61 Image Deblurring using Bayesian Framework
Sitara K and Remya S, Kerala University, India
62 Taxonomy and Control Measures of SPAM and SPIM
Kamini Simi Bajaj and Josef Pieprzyk, Macquarie University, Australia