The First International Conference on Information Technology Convergence and Services (ITCS 2012)

Venue : Royal Orchid Central,
January 3 ~ 4, 2012, Bangalore, India.

 

                      Home | Paper Submission | Program Committee | Accepted Papers | Workshops | Contact Us | AIRCC Home

Menu

Registered Papers

11
Design and Simulation of Circularly Polarized Pentagonal-Shaped Microstrip patch Antenna at RFID Frequency 2.4 GHz
Bondili Kohitha Bai,Bhupendra singh and vinod shokeen, Amity University, India
12
Adaptive And Dynamic Wireless Routers With Smart Antenna For Power Management
S.Venkata Krishnan,R.Sriram and N.Senthil Kumar,Sri Sairam Engineering College, India
13
Mobility Aware Routing Protocol In Ad-Hoc Network
Suman Halder, Partha Pratim Meta and Sukla Banerjee ,RCC Institute of Information Technology,India
17
Design of a Scheme for Secure Rouitng in MobileAdhoc Networks
Sesha Bhargavi Velagaleti1, Dr.M.Seetha1, Dr.S.Viswanadha Raju2 GNITS, Shaikpet, India1, JNTUK, India2
18
Pentagonal Shape Microstrip Patch Antenna in Wireless Capsule Endoscopy System.
Bondili Kohitha Bai, and Anita Thakur , Amity University, India
22
Iimprovement of CRF Based Manipuri POS Tagger by Using Reduplicated MWE (RMWE)
Kishorjit Nongmeikapam1, Lairenlakpam Nonglenjaoba1, Yumnam Nirmal1, and Sivaji Bandhyopadhyay2, MIT, Manipur University, India1, Jadavpur University, India2
24
Innovative Field of Cryptography : DNA Cryptography
Er.Ranu Soni1, Er.Vishakha Soni2and Er.Sandeep Kumar3, LNCT India1, PCST India2, PCST India3
27
A Novel Method For Petri Net Modeling
Chen-xi SHAO,1Er-hui ZHOU,2Zhen-zhong SHAO,3Wei-hua WANG 4 and Xue-feng WU5,1University of Science and Technology of China,2Information Center of Hospital 152 of PLA,China,3Anhui Province Key Laboratory of Software in Computing and Communication,china ,4Jianghuai Automobile Co. Ltd.,China, and 5Liwei Automobile Oil-pump Co, Ltd,China
38
Dependable Web Services Security Architectures
D.Shravani1,P.Suresh Varma2 and B.Padmaja Rani3,1Rayalaseema University,India,2Adikavi Nannaya University,India and 3JNTU CEH,India
42
Kernel Fuzzy Adaptive Threshold Algorithm on Level set method for Image Segmentation
Tara.Saikumar1, B.K.Anoop2, Ch.Narshima Chary1 and B. Smitha1, CMR Technical Campus, Hyderabad, India.1, CIT, India.2, KITS, India.3,
44
Frequent Subgraph Mining Algorithms -A Survey And Framework For Classification
K.Lakshmi1 and T. Meyyappan2,1Sir M.Visvesvaraya Institute of Technology,and 2Alagappa University,India
48
Mdav2k: A Variable-Size Microaggregation Technique For Privacy Preservation
S. K. Chettri1,and B. Borah1,1Saint Mary’s College, India and 2Tezpur University,India
50
A Survey On Web Pre-Fetching Techniques
Greeshma G. Vijayan and Jayasudha J. S,SCT College of Engineering, India
66
Application of Autonomic Computing Principles in Virtualized Environment
Anala M R and Dr.Shobha G
67
Assessment of Systolic And Diastolic Cycle Duration From Speech Analysis In The State of Anger And Fear
Nivedita Deshpande1, KavitaThakur1, and A.S.Zadgaonkar2 1Pt. Ravishankar University , 2Dr. C.V. Raman UniversityIndia
68
Dwt-Svd Based Secured Image Watermarking For Copyright Protection Using Visual Cryptography
Sushila Kamble ,Vikas Maheshkar , Suneeta Agarwal and Vinay K Srivastava ,MNNIT, India
71
A Comparative Study of Incentive MechanismsUsed In Peer-to-Peer System
Guruprasad Khataniar, Sankhapani Bharali and Archana Khataniar
72
Application Of Genetic Algorithm In Designing A Security Model For Mobile Adhoc Network
Kumar Nikhil, Swati Agarwal and Pankaj ,Sharma ABES Engineering College,India

Accepted Papers

1
Machine Learning Based Intrusion Detection Systems By Using RSC
Sanoop Mallissery1 Shahana Sathar2,1Manipal University, India,2ASE, india
2
Optimization of Task Execution Period Using Evolutionary Algorithm
Rahul Vishwakarma1, Satyanand Vishwakarma2, Amitabh Banerjee3, Tushar Kanti Dey4 and Muzammil Rahman5, Tata Consultancy Service, India1, National Institute of Technology , India2, HCL Technologies India3, I.I.T Roorkee, India4 Northumbria University, United Kingdom5
3
An Novel Approach For Content Aggregation In Mobile Devices
W.Aisha Banu, P.Sheik Abdu Khader, Khader and R. Shriram, B.S.Abdur Rahman University,India
7
Performance Improvement of Classification Using Boosting Approach on Noisy Data
Vimal B. Vaghela1, Nilesh Modi2 and Kalpesh Vandra3,1L.D. College of Engineering,India2S V Campus - Kadi,India3CCET,India
8
Test Execution Effort Estimation (TEEE) Model in Extreme Programming
Muhammad Danyal Ashraf and Naeem U. Janjua,SZABIST,Pakistan
10
Chasing The Mirage : The PLC of AnElectronic Waste
SP Victor,S Suresh Kumar and Shri Sanjeev S, St Xaviers College,India
11
Design and Simulation of Circularly Polarized Pentagonal-Shaped Microstrip patch Antenna at RFID Frequency 2.4 GHz
Bondili Kohitha Bai,Bhupendra singh and vinod shokeen, Amity University, India
12
Adaptive And Dynamic Wireless Routers With Smart Antenna For Power Management
S.Venkata Krishnan,R.Sriram and N.Senthil Kumar,Sri Sairam Engineering College, India
13
Mobility Aware Routing Protocol In Ad-Hoc Network
Suman Halder, Partha Pratim Meta and Sukla Banerjee ,RCC Institute of Information Technology,India
14
Multicast Multi-path Power Efficient Routing in MANET
M.Raghavendra Rao and K.Eswar, St.Anns College of Engg. & Technology, India
15
Detecting The Source Of Tcp Syn Flood Attack Using Ip Trace Back
Hemapriyadharshini, A.Rajeswari and Jeevaakatiravan,Anna University of Technology, India
17
Design of a Scheme for Secure Rouitng in MobileAdhoc Networks
Sesha Bhargavi Velagaleti1, Dr.M.Seetha1, Dr.S.Viswanadha Raju2 GNITS, Shaikpet, India1, JNTUK, India2
18
Pentagonal Shape Microstrip Patch Antenna in Wireless Capsule Endoscopy System.
Bondili Kohitha Bai, and Anita Thakur , Amity University, India
19
A Hybrid Reputation Model Through FederationOf Peers Having Analogous Function
Sreenu.G and Dhanya P M, RSET,India
20
Computer Aided Breast Cancer Diagnosis Systems From Sonomammogram: A Review
Soumi Ganguly , College of Engineering and Management Kolaghat, India
21
Data Security Analysis and Security Extension for Smart Cards Using Java Card
Manali Dubal1, Dr. Mahesh TR2, Pinaki A. Ghosh3 and C.R Chauhan4, Sinhgad College of Engineering & Technology, India1, Adhiyamaan College of Engg, India2, Atmiya Institute of Technology, India3, Parul Institute of Engineering & Technology, India4
22
Iimprovement of CRF Based Manipuri POS Tagger by Using Reduplicated MWE (RMWE)
Kishorjit Nongmeikapam1, Lairenlakpam Nonglenjaoba1, Yumnam Nirmal1, and Sivaji Bandhyopadhyay2, MIT, Manipur University, India1, Jadavpur University, India2
23
Distortion Free Relational Database Watermarking Using Patch Work Method
Arun R, Praveen K, and Divya Chandra Bose, Amrita VishwaVidhyapeetham, Ettimadai, India
24
Innovative Field of Cryptography : DNA Cryptography
Er.Ranu Soni1, Er.Vishakha Soni2and Er.Sandeep Kumar3, LNCT India1, PCST India2, PCST India3
25
Wireless and Mobile Computing Automated System 3-in-1 Solutions for SMART & TABLET DEVICES
26
Composite Mail Server
Akash Vyas, Kamble Sushma, Urkude Shweta and Hadap Vaibhav, University of Pune,India
27
A Novel Method For Petri Net Modeling
Chen-xi SHAO,1Er-hui ZHOU,2Zhen-zhong SHAO,3Wei-hua WANG 4 and Xue-feng WU5,1University of Science and Technology of China,2Information Center of Hospital 152 of PLA,China,3Anhui Province Key Laboratory of Software in Computing and Communication,china ,4Jianghuai Automobile Co. Ltd.,China, and 5Liwei Automobile Oil-pump Co, Ltd,China
29
Recognition Of Spoken Digits: A Comparative Study Of Discrete Wavelet Transforms And Wavelet Packet Decomposition With Artificial Neural Networks Classifier
Sonia Sunny,David Peter S and K.Poulose Jacob, Cochin University of Science & Technology,India
32
Improve Performance Of Enterprise Infromation Portal
Ahmed m.lamey, hamdy m.mousa and Arabi Keshk,Menofya University,Egypt
34
Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
Hossein Jadidoleslamy, University of Guilan,Iran
36
Profound Survey on Cross Language Information Retrieval Methods (CLIR)
P.Pradeep Kumar,B.Ashwin Kumar and A.Kartheek Kumar Reddy,JNTUH,India
37
Lobar Fissure Extraction In Isotropic CtLung Images - An Application To Cancer Identification
T.Manikandan1and 2N. Bharathi,1Rajalakshmi Engineering College,India and2Velammal Engineering College,India
38
Dependable Web Services Security Architectures
D.Shravani1,P.Suresh Varma2 and B.Padmaja Rani3,1Rayalaseema University,India,2Adikavi Nannaya University,India and 3JNTU CEH,India
41
Stereo Vision and its Algorithms Used in Fields of Artificial Intelligence
Sahil Thakare, Kalyani Jaisingpure, Rupesh Arbal, and Makarand R. Shahade, Yavatmal (MS) INDIA
42
Kernel Fuzzy Adaptive Threshold Algorithm on Level set method for Image Segmentation
Tara.Saikumar1, B.K.Anoop2, Ch.Narshima Chary1 and B. Smitha1, CMR Technical Campus, Hyderabad, India.1, CIT, India.2, KITS, India.3,
44
Frequent Subgraph Mining Algorithms -A Survey And Framework For Classification
K.Lakshmi1 and T. Meyyappan2,1Sir M.Visvesvaraya Institute of Technology,and 2Alagappa University,India
47
Probabilistic model for Intrusion Detection in Wireless Sensor Network
Maduri Chopde1,Kimi Ramteke1 and Satish Kamble2,1PICT, India and 2PVGCOET,India
48
Mdav2k: A Variable-Size Microaggregation Technique For Privacy Preservation
S. K. Chettri1,and B. Borah1,1Saint Mary’s College, India and 2Tezpur University,India
49
Study Of Cloud Computing Architectures
Swapna H and Jayasudha J.S,1Sree Chitra Thirunal College of Engineering, India
50
A Survey On Web Pre-Fetching Techniques
Greeshma G. Vijayan and Jayasudha J. S,SCT College of Engineering, India
51
Robust Skin Tone Based Image Steganography Using Integer Wavelets
Smitha K K and Subu Surendran, SCT College of Engineering, India
57
Comparison Between Pixel Based And Block Based Watermarking
Rashmi S Nair and Rejimol Robinson R R, Kerala university, India
62
Survey of Various Watermarking Techniques for Providing Authentication and Integrity
Rashmi S Nair, Kerala university,India
66
Application of Autonomic Computing Principles in Virtualized Environment
Anala M R and Dr.Shobha G
67
Assessment of Systolic And Diastolic Cycle Duration From Speech Analysis In The State of Anger And Fear
Nivedita Deshpande1, KavitaThakur1, and A.S.Zadgaonkar2 1Pt. Ravishankar University , 2Dr. C.V. Raman UniversityIndia
68
Dwt-Svd Based Secured Image Watermarking For Copyright Protection Using Visual Cryptography
Sushila Kamble ,Vikas Maheshkar , Suneeta Agarwal and Vinay K Srivastava ,MNNIT, India
70
A Survey On Web Pre-Fetching And WebCaching Techniques In A MobileEnvironment
Greeshma G. Vijayan and Jayasudha J. S,SCT College of Engineering, India
71
A Comparative Study of Incentive MechanismsUsed In Peer-to-Peer System
Guruprasad Khataniar, Sankhapani Bharali and Archana Khataniar
72
Application Of Genetic Algorithm In Designing A Security Model For Mobile Adhoc Network
Kumar Nikhil, Swati Agarwal and Pankaj ,Sharma ABES Engineering College,India

 





Courtesy



Technically
Sponsored by




Copyright (c) www.airccse.org