|
|
Registered Papers |
11 |
Design and Simulation of Circularly Polarized Pentagonal-Shaped Microstrip patch Antenna at RFID Frequency 2.4 GHz
Bondili Kohitha Bai,Bhupendra singh and vinod shokeen, Amity University, India |
12 |
Adaptive And Dynamic Wireless Routers With Smart Antenna For Power Management
S.Venkata Krishnan,R.Sriram and N.Senthil Kumar,Sri Sairam Engineering College, India |
13 |
Mobility Aware Routing Protocol In Ad-Hoc Network
Suman Halder, Partha Pratim Meta and Sukla Banerjee ,RCC Institute of Information Technology,India |
17 |
Design of a Scheme for Secure Rouitng in MobileAdhoc Networks
Sesha Bhargavi Velagaleti1, Dr.M.Seetha1, Dr.S.Viswanadha Raju2
GNITS, Shaikpet, India1, JNTUK, India2 |
18 |
Pentagonal Shape Microstrip Patch Antenna in Wireless Capsule Endoscopy System.
Bondili Kohitha Bai, and Anita Thakur
, Amity University, India |
22 |
Iimprovement of CRF Based Manipuri POS Tagger by Using Reduplicated MWE (RMWE)
Kishorjit Nongmeikapam1, Lairenlakpam Nonglenjaoba1, Yumnam Nirmal1, and
Sivaji Bandhyopadhyay2,
MIT, Manipur University, India1, Jadavpur University, India2 |
24 |
Innovative Field of Cryptography : DNA Cryptography
Er.Ranu Soni1, Er.Vishakha Soni2and Er.Sandeep Kumar3,
LNCT India1, PCST India2, PCST India3 |
27 |
A Novel Method For Petri Net Modeling
Chen-xi SHAO,1Er-hui ZHOU,2Zhen-zhong SHAO,3Wei-hua WANG 4 and Xue-feng WU5,1University of Science and Technology of China,2Information Center of Hospital 152 of PLA,China,3Anhui Province Key Laboratory of Software in Computing and Communication,china ,4Jianghuai Automobile Co. Ltd.,China, and 5Liwei Automobile Oil-pump Co, Ltd,China |
38 |
Dependable Web Services Security Architectures
D.Shravani1,P.Suresh Varma2 and B.Padmaja Rani3,1Rayalaseema University,India,2Adikavi Nannaya University,India and 3JNTU CEH,India |
42 |
Kernel Fuzzy Adaptive Threshold Algorithm on Level set method for Image Segmentation
Tara.Saikumar1, B.K.Anoop2, Ch.Narshima Chary1 and B. Smitha1,
CMR Technical Campus, Hyderabad, India.1, CIT, India.2, KITS, India.3, |
44 |
Frequent Subgraph Mining Algorithms -A Survey And Framework For Classification
K.Lakshmi1 and T. Meyyappan2,1Sir M.Visvesvaraya Institute of Technology,and 2Alagappa University,India
|
48 |
Mdav2k: A Variable-Size Microaggregation Technique For Privacy Preservation
S. K. Chettri1,and B. Borah1,1Saint Mary’s College, India and 2Tezpur University,India
|
50 |
A Survey On Web Pre-Fetching Techniques
Greeshma G. Vijayan and Jayasudha J. S,SCT College of Engineering, India
|
66 |
Application of Autonomic Computing Principles in Virtualized
Environment
Anala M R and Dr.Shobha G |
67 |
Assessment of Systolic And Diastolic Cycle Duration From Speech Analysis In The State of Anger And Fear
Nivedita Deshpande1, KavitaThakur1, and A.S.Zadgaonkar2
1Pt. Ravishankar University , 2Dr. C.V. Raman UniversityIndia |
68 |
Dwt-Svd Based Secured Image Watermarking For Copyright Protection Using Visual Cryptography
Sushila Kamble ,Vikas Maheshkar , Suneeta Agarwal and Vinay K Srivastava ,MNNIT, India |
71 |
A Comparative Study of Incentive MechanismsUsed In Peer-to-Peer System
Guruprasad Khataniar, Sankhapani Bharali and Archana Khataniar |
72 |
Application Of Genetic Algorithm In Designing A Security Model For Mobile Adhoc Network
Kumar Nikhil, Swati Agarwal and Pankaj ,Sharma ABES Engineering College,India |
|
Accepted Papers |
1 |
Machine Learning Based Intrusion Detection Systems By Using RSC
Sanoop Mallissery1 Shahana Sathar2,1Manipal University, India,2ASE, india |
2 |
Optimization of Task Execution Period Using Evolutionary Algorithm
Rahul Vishwakarma1, Satyanand Vishwakarma2, Amitabh Banerjee3, Tushar Kanti Dey4 and Muzammil Rahman5, Tata Consultancy Service, India1, National Institute of Technology , India2, HCL Technologies India3, I.I.T Roorkee, India4 Northumbria University, United Kingdom5
|
3 |
An Novel Approach For Content Aggregation In Mobile Devices
W.Aisha Banu, P.Sheik Abdu Khader, Khader and R. Shriram, B.S.Abdur Rahman University,India |
7 |
Performance Improvement of Classification Using Boosting Approach on Noisy Data
Vimal B. Vaghela1, Nilesh Modi2 and Kalpesh Vandra3,1L.D. College of Engineering,India2S V Campus - Kadi,India3CCET,India |
8 |
Test Execution Effort Estimation (TEEE) Model in Extreme Programming
Muhammad Danyal Ashraf and Naeem U. Janjua,SZABIST,Pakistan |
10 |
Chasing The Mirage : The PLC of AnElectronic Waste
SP Victor,S Suresh Kumar and Shri Sanjeev S, St Xaviers College,India |
11 |
Design and Simulation of Circularly Polarized Pentagonal-Shaped Microstrip patch Antenna at RFID Frequency 2.4 GHz
Bondili Kohitha Bai,Bhupendra singh and vinod shokeen, Amity University, India |
12 |
Adaptive And Dynamic Wireless Routers With Smart Antenna For Power Management
S.Venkata Krishnan,R.Sriram and N.Senthil Kumar,Sri Sairam Engineering College, India |
13 |
Mobility Aware Routing Protocol In Ad-Hoc Network
Suman Halder, Partha Pratim Meta and Sukla Banerjee ,RCC Institute of Information Technology,India |
14 |
Multicast Multi-path Power Efficient Routing in MANET
M.Raghavendra Rao and K.Eswar, St.Anns College of Engg. & Technology, India |
15 |
Detecting The Source Of Tcp Syn Flood
Attack Using Ip Trace Back
Hemapriyadharshini, A.Rajeswari and Jeevaakatiravan,Anna University of Technology, India |
17 |
Design of a Scheme for Secure Rouitng in MobileAdhoc Networks
Sesha Bhargavi Velagaleti1, Dr.M.Seetha1, Dr.S.Viswanadha Raju2
GNITS, Shaikpet, India1, JNTUK, India2 |
18 |
Pentagonal Shape Microstrip Patch Antenna in Wireless Capsule Endoscopy System.
Bondili Kohitha Bai, and Anita Thakur
, Amity University, India |
19 |
A Hybrid Reputation Model Through FederationOf Peers Having Analogous Function
Sreenu.G and Dhanya P M, RSET,India |
20 |
Computer Aided Breast Cancer Diagnosis Systems From Sonomammogram: A Review
Soumi Ganguly , College of Engineering and Management Kolaghat, India |
21 |
Data Security Analysis and Security Extension for Smart Cards Using Java Card
Manali Dubal1, Dr. Mahesh TR2, Pinaki A. Ghosh3 and C.R Chauhan4,
Sinhgad College of Engineering & Technology, India1, Adhiyamaan College of Engg, India2, Atmiya Institute of Technology, India3, Parul Institute of Engineering & Technology, India4 |
22 |
Iimprovement of CRF Based Manipuri POS Tagger by Using Reduplicated MWE (RMWE)
Kishorjit Nongmeikapam1, Lairenlakpam Nonglenjaoba1, Yumnam Nirmal1, and
Sivaji Bandhyopadhyay2,
MIT, Manipur University, India1, Jadavpur University, India2 |
23 |
Distortion Free Relational Database Watermarking Using Patch Work Method
Arun R, Praveen K, and Divya Chandra Bose,
Amrita VishwaVidhyapeetham, Ettimadai, India |
24 |
Innovative Field of Cryptography : DNA Cryptography
Er.Ranu Soni1, Er.Vishakha Soni2and Er.Sandeep Kumar3,
LNCT India1, PCST India2, PCST India3 |
25 |
Wireless and Mobile Computing Automated System
3-in-1 Solutions for SMART & TABLET DEVICES
|
26 |
Composite Mail Server
Akash Vyas, Kamble Sushma, Urkude Shweta and Hadap Vaibhav, University of Pune,India |
27 |
A Novel Method For Petri Net Modeling
Chen-xi SHAO,1Er-hui ZHOU,2Zhen-zhong SHAO,3Wei-hua WANG 4 and Xue-feng WU5,1University of Science and Technology of China,2Information Center of Hospital 152 of PLA,China,3Anhui Province Key Laboratory of Software in Computing and Communication,china ,4Jianghuai Automobile Co. Ltd.,China, and 5Liwei Automobile Oil-pump Co, Ltd,China |
29 |
Recognition Of Spoken Digits: A Comparative Study Of Discrete Wavelet Transforms And Wavelet Packet Decomposition With Artificial Neural Networks Classifier
Sonia Sunny,David Peter S and K.Poulose Jacob, Cochin University of Science & Technology,India |
32 |
Improve Performance Of Enterprise Infromation Portal
Ahmed m.lamey, hamdy m.mousa and Arabi Keshk,Menofya University,Egypt |
34 |
Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
Hossein Jadidoleslamy, University of Guilan,Iran |
36 |
Profound Survey on Cross Language Information Retrieval Methods (CLIR)
P.Pradeep Kumar,B.Ashwin Kumar and A.Kartheek Kumar Reddy,JNTUH,India |
37 |
Lobar Fissure Extraction In Isotropic CtLung Images - An Application To Cancer Identification
T.Manikandan1and 2N. Bharathi,1Rajalakshmi Engineering College,India and2Velammal Engineering College,India |
38 |
Dependable Web Services Security Architectures
D.Shravani1,P.Suresh Varma2 and B.Padmaja Rani3,1Rayalaseema University,India,2Adikavi Nannaya University,India and 3JNTU CEH,India |
41 |
Stereo Vision and its Algorithms Used in Fields of Artificial Intelligence
Sahil Thakare, Kalyani Jaisingpure, Rupesh Arbal, and Makarand R. Shahade,
Yavatmal (MS) INDIA |
42 |
Kernel Fuzzy Adaptive Threshold Algorithm on Level set method for Image Segmentation
Tara.Saikumar1, B.K.Anoop2, Ch.Narshima Chary1 and B. Smitha1,
CMR Technical Campus, Hyderabad, India.1, CIT, India.2, KITS, India.3, |
44 |
Frequent Subgraph Mining Algorithms -A Survey And Framework For Classification
K.Lakshmi1 and T. Meyyappan2,1Sir M.Visvesvaraya Institute of Technology,and 2Alagappa University,India
|
47 |
Probabilistic model for Intrusion Detection in Wireless Sensor Network
Maduri Chopde1,Kimi Ramteke1 and Satish Kamble2,1PICT, India and 2PVGCOET,India
|
48 |
Mdav2k: A Variable-Size Microaggregation Technique For Privacy Preservation
S. K. Chettri1,and B. Borah1,1Saint Mary’s College, India and 2Tezpur University,India
|
49 |
Study Of Cloud Computing Architectures
Swapna H and Jayasudha J.S,1Sree Chitra Thirunal College of Engineering, India
|
50 |
A Survey On Web Pre-Fetching Techniques
Greeshma G. Vijayan and Jayasudha J. S,SCT College of Engineering, India
|
51 |
Robust Skin Tone Based Image Steganography Using Integer Wavelets
Smitha K K and Subu Surendran,
SCT College of Engineering, India |
57 |
Comparison Between Pixel Based And Block Based Watermarking
Rashmi S Nair and Rejimol Robinson R R, Kerala university, India |
62 |
Survey of Various Watermarking Techniques for Providing Authentication and Integrity
Rashmi S Nair,
Kerala university,India |
66 |
Application of Autonomic Computing Principles in Virtualized
Environment
Anala M R and Dr.Shobha G |
67 |
Assessment of Systolic And Diastolic Cycle Duration From Speech Analysis In The State of Anger And Fear
Nivedita Deshpande1, KavitaThakur1, and A.S.Zadgaonkar2
1Pt. Ravishankar University , 2Dr. C.V. Raman UniversityIndia |
68 |
Dwt-Svd Based Secured Image Watermarking For Copyright Protection Using Visual Cryptography
Sushila Kamble ,Vikas Maheshkar , Suneeta Agarwal and Vinay K Srivastava ,MNNIT, India |
70 |
A Survey On Web Pre-Fetching And WebCaching Techniques In A MobileEnvironment
Greeshma G. Vijayan and Jayasudha J. S,SCT College of Engineering, India |
71 |
A Comparative Study of Incentive MechanismsUsed In Peer-to-Peer System
Guruprasad Khataniar, Sankhapani Bharali and Archana Khataniar |
72 |
Application Of Genetic Algorithm In Designing A Security Model For Mobile Adhoc Network
Kumar Nikhil, Swati Agarwal and Pankaj ,Sharma ABES Engineering College,India |
|

Courtesy
Technically
Sponsored by
 |
|
|
|