September 23~25, 2011, Tirunelveli, Tamil Nadu, India
Registered papers
2 |
An Energy Efficient Clustering Protocol Using Minimum Spanning Tree for Wireless Sensor Networks B.Baranidharan and B.Shanthi, SASTRA University, India |
17 |
Load Balancing in Distributed Systems Using Network Transferable Computer Vijayakumar G.Dhas and V.Lavanya, Anna University - Chennai, India |
18 |
DOA estimation for Rectangular linear array antenna in Frequency non selective slow fading MIMO channels A.V. Meenakshi, Periyar Maniammai University, India |
19 |
Agro-Electronics M.Mithra Kiran1 and Bondili Kohitha Bai2, 1SBIT, India and 2ASET, India |
20 |
Vector Quantization Based Face Recognition Using Integrated Adaptive Fuzzy Clustering Elizabeth B Varghese and M Wilscy, University of Kerala, India |
28 |
Transformation of Active Reference Graph into Passive Reference Graph for Distributed Garbage Collection B.Seetha Lakshmi, C.D.Balapriya and R.Soniya, KLN College of Information Technology, India |
29 |
Face Recognition using Fuzzy Neural Network Classifier Dhanya S Pankaj and M Wilscy, University of Kerala, India |
31 |
Impulse Noise Removal from Gray scale Images using Fuzzy Genetic Algorithm Anisha K K and M Wilscy, University of Kerala, India |
40 |
A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT) Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani, India |
41 |
Infrared Source Tracking Robot with Computer Interface Bondili Kohitha Bai , Ankita mittal and Sanchita mittal, ASET, India |
45 |
An Evolutionary Algorithm based Performance Analysis of Multiprocessor Computers through Energy and Schedule Length Model Paulraj Ranjith kumar1 and Sankaran Palani2, 1K.S.Rangasamy college of Technology, India and 2Sudharsan Engineering College, India |
48 |
A Novel Technique for Removal of Random Valued Impulse Noise using All Neighbor Directional Weighted Pixels (ANDWP) J.K. Mandal and Somnath Mukhopadhyay, Kalyani University, India |
50 |
Critical Aware Community Based Parallel Service Composition Model for Pervasive Computing Environment P. Kumaran and R.Shriram, B.S.Abdur Rahman University, India |
55 |
Staggered Checkpointing and Recovery in Cluster based Mobile Ad hoc Networks Parmeet Kaur Jaggi1 and Awadhesh Kumar Singh2, 1Jaypee Institute of Information Technology, India and 2National Institute of Technology-Kurukshetra, India |
56 |
An O(1/n) Protocol for Supporting Distributed Mutual Exclusion in Vehicular Ad Hoc Networks Bharti Sharma1, Rabinder Singh Bhatia2 and Awadhesh Kumar Singh2, 1DIMT, India and 2NIT-Kurukshetra, India |
64 |
Reliability Estimation of Mobile Agents for Service Discovery in MANET Roshni Neogy, Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India |
65 |
Mobile Agent Security in MANET using Reputation Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India |
69 |
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India |
71 |
LPC VOCODER using Instants of Significant Excitation and Pole focusing Saranya A and Sripriya N, Sri Sivasubramania Nadar College of Engineering, India |
75 |
Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks Emi Mathews and Ciby Mathew, University of Paderborn, Germany |
86 |
An Enhanced DSR Caching Scheme Based on Cross Layer Information Gaurav Bhatia and Vivek Kumar, Gurukul Kangri Vishwavidyalya, India |
88 |
The Design and Performance of a Checkpointing Scheme for Mobile Ad Hoc Networks Ruchi Tuli1 and Parveen Kumar2,1Yanbu University College, India and 2Meerut Institute of Engineering & Technology, India |
104 |
A Reliable Distributed Grid Scheduler for Mixed Tasks Ram Mohan Rao Kovvur1, Ramachandram S2, Vijayakumar Kadappa1 and Govardhan A3, 1Vasavi College of Engineering, India, 2Osmania University, India and 3JNTUH, India |
107 |
Performance Evaluation of Weighted Associative classifier in Health Care Data Mining and Building Fuzzy Weighted Associative classifier Sunita Soni, BIT, India |
114 |
A Parallel AES Encryption Algorithm Based on PCA Debasis Das and Rajiv Misra, Indian Institute of Technology, India |
116 |
Maintaining Shortest Path Tree in Dynamic Digraphs having Negative Edge-weights Atul Kumar Rai and Suneeta Agarwal, Motilal Nehru National Institute of Technology,India |
120 |
Comparison of MAC Layer Performance of Reactive and Proactive Protocols for different Mobility Conditions in WSN Manjusha Pandey and Shekhar Verma, Indian Institute of Information Technology, India |
121 |
Manipulating Objects through Hand Gesture Recognition in Virtual Environment Siddharth Swarup Rautaray and Anupam Agrawal, Indian Institute of Information Technology Allahabad, India |
122 |
Greedy Heuristic Based Energy Efficient Routing in Wireless Sensor Network Sourabh Jain, Praveen Kaushik and Jyoti Singhai, Maulana Azad National Institute of Technology, Bhopal |
123 |
Algorithms for Efficient Web Service Selection with Different Constraints Theresa Jose and Kavya Johny, Viswajyothi College of Engineering and Technology, India |
130 |
Efficient Id-Based Signature Scheme From Bilinear Map Rajeev Anand Sahu and Sahadeo Padhye, MNNIT, India |
131 |
Sleep Scheduler Protocol for Network Reliability in Wireless Sensor Networks Harsh Kumar Singh and Jyoti Bharti, MANIT, India |
134 |
Multi Label Spatial Classification using Spatial Associative Rule Mining and Evolutionary Algorithms J.Arunadevi1 and V.Rajamani2, 1Thiagarajar School of Management, India and 2Indra Ganesan College of Engineering, India |
147 |
Mobility and Battery Power Prediction based Job Scheduling in Mobile Grid Environment Stephen Vaithiya S and Mary Saira Bhanu S, National Institute of Technology, India |
159 |
Cell Range and Capability Analysis of WiMAX and LTE Network Sandeep Singh Sengar, Motilal Nehru National Institute of Technology, India |
163 |
A Parallel Task Assignment using Heuristic Graph Matching R.Mohan1 and Amitava Gupta2, 1National Institute of Technology, India and 2Jadavapur University, India |
168 |
Automatic Caricature Generation Using Text Based Input Kahkasha I. Siddavatam1 and Irfan A Siddavatam2, 1TPCT’s Terna Engineering College, India and 2K.J. Somaiya College of Engineering, India |
170 |
A Novel and Efficient Technique to Generate Secured Biometric Key Using Cryptography Mahesh.P.K. and Anjan Gudigar, M.I.T.E, India |
171 |
Rootkit Detection Mechanism: A Survey Jestin Joy and Anita John, Rajagiri School of Engineering & Technology, India |
175 |
Efficiency Enhanced Association Rule Mining Technique Abhishek Agrawal1, Urjita Thakar1, Rishi Soni2 and Brijesh Kumar Chaurasia2, 1SGSITS, India and 2ITM , India |
176 |
An Improved Approach Towards Network Forensic Investigation of HTTP and FTP Protocols Manesh T, Brijith B and Mahendra Prathap Singh, National Institute of Technology - Karnataka, India |
179 |
Indexing and Retrieval of Medical Images Using CBIR Approach Ankita Chandrakar, A.S Thoke, and Bikesh Kumar Singh, National Institute of Technology - Raipur (C.G), India |
180 |
Personal Assistant Mobile Application using Cognitive Approach Rohan Sourav Saboo, Rohit Agarwal, Vijaya Kumar B P and Kiran Kumari Patil, REVA Institute of Technology and Management Bangalore, India |
182 |
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc Networks Yuvraj Singh and Sanjay Kumar Jena, National Intitute of Technology Rourkela, India |
188 |
Fidelity Index Based On Demand(FBOD) Secure Routing In Mobile Ad hoc Network Himadri Nath Saha1, Debika Bhattacharyya1 and P. K.Banerjee2, 1Institute of Engineering and Management, India and 2Jadavpur university,India |
191 |
TDMA based Low Energy consuming MAC Protocol for Wireless Sensor Networks in Environmental Monitoring Applications R. Rathna1, A. Siva Subramanian2, 1Sathyabama University, India and 2St.Joseph's college of Engineering, India |
193 |
Extending Temporal and Event Based Data Modeling for RFID Databases Sapan Tyagi1, M Ayoub Khan2 and A Q Ansari3, 1Institute of Management Studies - UP, India and 2Ministry of Communications and IT, India and 3Jamia Millia Islamia, India |
196 |
Performance Analysis of Mammographic Image Enhancement Techniques for Early Detection of Breast Cancer Shailaja Singh, Anamika Yadav and Bikesh Kumar Singh, N.I.T - Raipur, India |
197 |
Extremely Opportunistic Routing with Expected Transmission Count to improve QoS in Hybrid Wireless Networks Sumathy S, R Saravanan, M Vijay Kumar and C Vinay Kumar, VIT University, India |
204 |
Integrating Grid environment with Private cloud and storage cluster and provision for dynamic clustering and VO Kailash Selvaraj1 and Saswati Mukherjee2, 1Centre for Development of Advanced Computing (CDAC), India and 2 College of Engineering, India |
205 |
An Overview and Comparative Study of Segmentation Techniques for Extraction of Tongue Region for Computerized Tongue Diagnosis Bikesh Kumar Singh, A.S. Thoke and Keshri Verma, National Institute of Technology - Raipur (C.G), India |
208 |
Efficient Broadcasting in Parallel Networks using Network Coding NitinRakesh1 and VipinTyagi2, 1Jaypee University of Information Technology, India and 2Jaypee University of Engineering and Technology, India |
210 |
A Fast Adaptive Replication Placement for Multiple Failures in Distributed System Sanjay Bansal1, Sanjeev Sharma2 and Ishita Trivedi2, 1Chameli Devi School of Engineering, India and 2RGPV, India |
212 |
A distributed Algorithm for power-efficient Data
gathering in randomly-distributed Wireless Sensor Networks Antonella Di Stefano and Giovanni Morana, DIEEI, Italy |
216 |
Optimization of Dynamic Channel Allocation Scheme for Cellular Networks using Genetic Algorithim Jeshuran Pandian, Prithvin Murugiah, Narendran Rajagopalan and C.Mala, National Institute of Technology -Tiruchirapalli, India |
217 |
Mobile Computing with Cloud Ishwarya Chandrasekaran, Alcatel Lucent Technologies Pvt. Ltd, India |
219 |
Implementation of AAA Sever for PMIPv6 in NS-2 Nitesh M Tarbani, B R Chandavarkar, NITK Surathkal, India |
220 |
Cloud Based Application Development for Mobile Devices for Accessing LBS Keerthi S. Shetty and Sanjay Singh, Manipal University, India |
225 |
B-SPECS: An Optic Based Recognition Tool for Blind S.Cyril Naves, Sri Sairam Institute of Technology, India |
229 |
Parameter-Free Minimum Spanning Tree (PFMST) Based Clustering Algorithm Valli Kumari.V1, Ramakrishnam Raju. BHVS2, 1Andhra University and 2SRKR Engineering College, India |
231 |
The State of Software Metrics to Forecast the Variety of Elements in Software Development Process S. Arun Kumar, and T. Arun Kumar, VIT University, India |
233 |
A Recent Survey on DDoS Attacks and Defense Mechanisms A. Srivastava1, B.B.Gupta12, A. Tyagi1, A. Sharma1, A. Mishra1, 1Graphic Era University, India and 2Indian Institute of Technology - Roorkee, India |
237 |
A Simulation of Performance of Commit Protocols in Distributed Environment Kahkashan Tabassum1 and Damodaram Avula2, 1Muffakham Jah College of Engineering and Technology, India and 2Jawaharlal Nehru Technological University, India |
238 |
Analysis of Feature Recognition of Neural Network Method in the String Recognition Amit Kumar Gupta1 and Yash Pal Singh2, 1KIET, India and 2BIET, India |
239 |
CSPR: Column only Sparse Matrix Representation for Performance Improvement on GPU Architecture B. Neelima and Prakash S. Raghavendra, NITK surathkal, India |
Accepted Papers
2 |
An Energy Efficient Clustering Protocol Using Minimum Spanning Tree for Wireless Sensor Networks B.Baranidharan and B.Shanthi, SASTRA University, India |
3 |
A Comparative Study of Available Protocols during Privacy Preservation in Secure Multiparty Computation Zulfa Shaikh1 and Poonam Garg2, 1Acropolis Institute of Technology and Research, India and 2Institute of Management Technology, India |
4 |
Spherical Modal Analysis of a Lens based Antenna for Mobile Broadband Systems M.Riyaz Pasha,GPCET, India |
5 |
Ontology Based Reasoning System to Validate and Elicit Requirementsn Subini Therese Babu and G. V Uma, Anna University - Chennai, India |
6 |
Comparing the Discriminative power of three Object- Oriented Cohesion metrics Kausalya.K.J, Anna University - Chennai, India |
7 |
Generation of Dual Refactoring Suggestion P.Jordina, Anna University - Chennai, India |
8 |
Feature Oriented Approach for Remodularization J.Rakesh and D.Shiloah Elizabeth, Anna University - Chennai, India |
10 |
Dynamic Scheduling Scheme for Linearly Extensible Multiprocessor Systems Abdus Samad, M.Qasim Rafiq SMIEEE and Omar Farooq, Aligarh Muslim University, India |
15 |
Time optimizing in Economical Grid Using Adaptive Stochastic Petri Net Based on Learning Automata Mohammad Shojafar1, Siamak Barzegar1 and Mohammad Reza Meybodi2, 1Qazvin Islamic Azad University, Iran and 2Amirkabir University Tech, Iran |
16 |
An Approach to Transform C++ code into Java Pluggins by Extracting Business Rules Ati Jain1, Swapnil Soner2, Deepak Punjabi1 and Aishwarya Holkar1, 1Swami Vivekanand College of Engineering, India and 2Truba College of Technology, India |
17 |
Load Balancing in Distributed Systems Using Network Transferable Computer Vijayakumar G.Dhas and V.Lavanya, Anna University - Chennai, India |
18 |
DOA estimation for Rectangular linear array antenna in Frequency non selective slow fading MIMO channels A.V. Meenakshi, Periyar Maniammai University, India |
19 |
Agro-Electronics M.Mithra Kiran1 and Bondili Kohitha Bai2, 1SBIT, India and 2ASET, India |
20 |
Vector Quantization Based Face Recognition Using Integrated Adaptive Fuzzy Clustering Elizabeth B Varghese and M Wilscy, University of Kerala, India |
27 |
Analysis of Energy Efficient MAC Protocols in Wireless Sensor Networks Nesasudha.M1 and Valamathi.M.L2, 1Karunya University, India and 2GCT, India |
28 |
Transformation of Active Reference Graph into Passive Reference Graph for Distributed Garbage Collection B.Seetha Lakshmi, C.D.Balapriya and R.Soniya, KLN College of Information Technology, India |
29 |
Face Recognition using Fuzzy Neural Network Classifier Dhanya S Pankaj and M Wilscy, University of Kerala, India |
31 |
Impulse Noise Removal from Gray scale Images using Fuzzy Genetic Algorithm Anisha K K and M Wilscy, University of Kerala, India |
33 |
An Efficient Intrusion Detection System K.Maheswari1 and D.Sivakumar2, 1Dhanalakshmi Srinivasan Engineering College, India and 2Adhiparasakthi Engineering College, India |
34 |
Survey on Key Pre Distribution for Security in Wireless Sensor Networks T P Rani1 and C Jaya Kumar2, 1Sri Sairam engineering college, India and 2R.M.K Engineering College, India |
35 |
A Framework for Managing Persistence in Distributed Systems Dhananjeyan Balaretnaraja1 and Shahani Weerawarana2, 1Creative Search Technologies, Sri Lanka and 2University of Moratuwa, Sri Lanka |
40 |
A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT) Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, India and 2University of Kalyani, India |
41 |
Infrared Source Tracking Robot with Computer Interface Bondili Kohitha Bai , Ankita mittal and Sanchita mittal, ASET, India |
42 |
A novel technique for Cache Invalidation in IVANETS Anurag Singh, Narottam Chand and Lalit Kr Awasthi, NIT- Hamirpur, India |
43 |
An Effective Cost Management System over Broker - Cloud Communication Paradigm Gaurav Raj, Lovely Professional University, India |
45 |
An Evolutionary Algorithm based Performance Analysis of Multiprocessor Computers through Energy and Schedule Length Model Paulraj Ranjith kumar1 and Sankaran Palani2, 1K.S.Rangasamy college of Technology, India and 2Sudharsan Engineering College, India |
46 |
Improved watershed segmentation for Apple fruit grading P.Deepa and S.N. Geethalakshmi, Avinashilingam Deemed University for Women, India |
47 |
Design of unified channel encoder blocks for IEEE 802.11a and 802.16a physical layers Devashish Raval1, Nilesh Ranpura2, Ekata Mehul3, Rachana Jani1 and Zuber Saiyed2, 1Charotar Institute of Technology, Changa, India, 2Sardar Vallabhbhai National Institute of Technology, India and 3eInfochips Pvt. Ltd., India |
48 |
A Novel Technique for Removal of Random Valued Impulse Noise using All Neighbor Directional Weighted Pixels (ANDWP) J.K. Mandal and Somnath Mukhopadhyay, Kalyani University, India |
50 |
Critical Aware Community Based Parallel Service Composition Model for Pervasive Computing Environment P. Kumaran and R.Shriram, B.S.Abdur Rahman University, India |
53 |
Policy based Load Delegation in Computational Service Grid Environment K.Muneeswaran1 and B.Selvakumar2, 1Mepco Schlenk Engineering College, India and 2Kamaraj College of Engineering and Technology, India |
55 |
Staggered Checkpointing and Recovery in Cluster based Mobile Ad hoc Networks Parmeet Kaur Jaggi1 and Awadhesh Kumar Singh2, 1Jaypee Institute of Information Technology, India and 2National Institute of Technology-Kurukshetra, India |
56 |
An O(1/n) Protocol for Supporting Distributed Mutual Exclusion in Vehicular Ad Hoc Networks Bharti Sharma1, Rabinder Singh Bhatia2 and Awadhesh Kumar Singh2, 1DIMT, India and 2NIT-Kurukshetra, India |
59 |
Developing and Simulation of an Advanced Job Scheduling System for Cloud Computing Service Providers and Users Ramendu Bikash Guin, Sayan Chakrabarti, Chinmoy Tarafdar, Sourav Mandal and Sourav Banerjee, Kalyani Government Engineering College, India |
61 |
Fault Tolerant Distributed Routing For Irregular Mesh Architecture of Network on Chip Sudha S and Janani S, Anna University - Chennai, India |
62 |
Path Based Multicasting With Fault Tolerance And Load Distribution For Mesh Architecture Of Networks on Chip Sudha S and Kartika P B, Anna University - Chennai, India |
63 |
A New Approach to Steganography Moumita Deb, Soumik Mukherjee, Pratik Kumar Agarwal and Abhinava Roy, RCC Institute of Information Technology, India |
64 |
Reliability Estimation of Mobile Agents for Service Discovery in MANET Roshni Neogy, Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India |
65 |
Mobile Agent Security in MANET using Reputation Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India |
66 |
Architecture for Dynamic Service Integration Using Business Logic Analyzer Thirumaran.M1,Dhavachelvan.P2,Aranganayagi.G1 and Seenuvasan.K1, 1Pondicherry Engineering College, India and 2Pondicherry University, India |
68 |
Semantic Information Extraction in University Domain Sandhiya Devi, Swathi, Tamizhamudhu and Swamynathan, College of Engineering, India |
69 |
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India |
71 |
LPC VOCODER using Instants of Significant Excitation and Pole focusing Saranya A and Sripriya N, Sri Sivasubramania Nadar College of Engineering, India |
75 |
Connectivity of Autonomous Agents Using Ad-hoc Mobile Router Networks Emi Mathews and Ciby Mathew, University of Paderborn, Germany |
77 |
COAR- Combining Arc flag and Reach based method for Shortest path computation R. Kalpana1, P. Thambidurai2 and C. Thangalatha legaz1, 1Pondicherry Engineering College, India and 2Perunthalaivar Kamarajar Institute of Engineering & Technology, India |
78 |
SWSM-A study of finding similarities in Web Service using Metrics D.Chandramohan, Pondicherry University, India |
84 |
Deployment of Biometric Security Infrastructure for Securing E-Services in Semantic Web Akhilesh Dwivedi, Ambedkar Institute of Technology, New Delhi |
86 |
An Enhanced DSR Caching Scheme Based on Cross Layer Information Gaurav Bhatia and Vivek Kumar, Gurukul Kangri Vishwavidyalya, India |
88 |
The Design and Performance of a Checkpointing Scheme for Mobile Ad Hoc Networks Ruchi Tuli1 and Parveen Kumar2,1Yanbu University College, India and 2Meerut Institute of Engineering & Technology, India |
90 |
An Efficient Construction of Extended Visual Sharing Scheme using Error Diffusion Arul Mary.S and Balaganesh.N, Mepco Schlenk Engineering College, India |
91 |
Innovative Framework for Data Structure using Design Pattern Ruchi Mittal, Ipsita Bhattacharya and MPS Bhatia, Netaji Subhas Institute of Technology, India |
92 |
An Interactive Image Segmentation Using Multiple User Input's Swathika.P and Vanitha Sivagami.S, Mepco Schlenk Engineering College, India |
96 |
Model Based Hybrid Approach to Prevent SQL Injection Attack in PHP Kunal Sadalkar, Radhesh Mohandas and Alwyn R. Pais,National Institute of Technology-Karnataka, India |
97 |
Image Retrieval Using Salient Object Detection S. Saroja and K.Muneeswaran, Mepco Schlenk Engineering College, India |
98 |
A Robust Technique for Facial Expression Recognition K.Dhanalakshmi and Vamitha Sivagami, Mepco Schlenk Engineering College, India |
99 |
Biometric Privacy by Visual Cryptography in Reversible Style Rahna. P. Muhammed, Viswajyothi College of Engineering and Technology, India |
102 |
Server Side Solution for Prevention Against Temporal DoS Attack and Phishing Attack on ONLINE Banking Systems Aman Rayamajhi and Alwyn Roshan Pais, National Institute of Technology - Karnataka, India |
104 |
A Reliable Distributed Grid Scheduler for Mixed Tasks Ram Mohan Rao Kovvur1, Ramachandram S2, Vijayakumar Kadappa1 and Govardhan A3, 1Vasavi College of Engineering, India, 2Osmania University, India and 3JNTUH, India |
106 |
Detecting Botent by Analyzing Traffic Content for IRC Commands Roshan Mathew, Viswajyothi College of Engineering and Technology, India |
107 |
Performance Evaluation of Weighted Associative classifier in Health Care Data Mining and Building Fuzzy Weighted Associative classifier Sunita Soni, BIT, India |
109 |
Anonymity and Verfiability in Multi-attribute Reverse Auction T. R. Srinath, Mahendra Pratap Singh and Alwyn R. Pais, National Institute of Technology - Karnataka, India |
110 |
An Improved Multichannel Scheduler with Packet Concatenation for High Speed Wireless Backhaul Links Nimmy George, Viswajyothi College of Engineering and Technology, India |
112 |
Realization of Physical Hybrid ARQ Indicator Channel for LTE using FPGA S.Syed Ameer Abbas1, R.Lakshumi Praba12, 1Mepco Schlenk Engineering College,India and2Thiagarajar College of Engineering, India > |
113 |
Detecting and estimating alterations done in digital images S. Devi Mahalakshmi, K. Vijayalakshmi and S. Priyadharsini, Mepco Schlenk Engineering College, India |
114 |
A Parallel AES Encryption Algorithm Based on PCA Debasis Das and Rajiv Misra, Indian Institute of Technology, India |
116 |
Maintaining Shortest Path Tree in Dynamic Digraphs having Negative Edge-weights Atul Kumar Rai and Suneeta Agarwal, Motilal Nehru National Institute of Technology,India |
117 |
Run-time Estimation based Grid Scheduling using Multilevel Feedback Queue for the Computational Grid Environment Rajkumar Rajavel, Adhiyamaan College of Engineering, India |
118 |
Achieving Service Level Agreement in Cloud Environment using Hierarchical Scheduling Mala and Rajkumar Rajavel, Anna University - Chennai, India |
120 |
Comparison of MAC Layer Performance of Reactive and Proactive Protocols for different Mobility Conditions in WSN Manjusha Pandey and Shekhar Verma, Indian Institute of Information Technology, India |
121 |
Manipulating Objects through Hand Gesture Recognition in Virtual Environment Siddharth Swarup Rautaray and Anupam Agrawal, Indian Institute of Information Technology Allahabad, India |
122 |
Greedy Heuristic Based Energy Efficient Routing in Wireless Sensor Network Sourabh Jain, Praveen Kaushik and Jyoti Singhai, Maulana Azad National Institute of Technology, Bhopal |
123 |
Algorithms for Efficient Web Service Selection with Different Constraints Theresa Jose and Kavya Johny, Viswajyothi College of Engineering and Technology, India |
124 |
Edge detection Using Two dimensional Steerable Filters S.Anand and H.Abirami, Mepco Schlenk Engineering College, India |
125 |
Improving SMS banking security using cryptography Manoj V, Bramhe1 and Satish R.Devane2, 1St. Vincent Pallotti College of Engg. And Technology, India and 2Ramrao Adik Institute of Technology, India |
128 |
Performance evaluation of Block Truncation Coding with EBTC Aditya Kumar and Pardeep Singh, National Institute of Technology - Hamirpur, India |
130 |
Efficient Id-Based Signature Scheme From Bilinear Map Rajeev Anand Sahu and Sahadeo Padhye, MNNIT, India |
131 |
Sleep Scheduler Protocol for Network Reliability in Wireless Sensor Networks Harsh Kumar Singh and Jyoti Bharti, MANIT, India |
133 |
Software Metric Framework for Multilingual Information Retrieval (MLIR) System Performance Assessment Raju Korra, Pothula Sujatha and Madarapu Naresh Kumar, Pondicherry University, India |
134 |
Multi Label Spatial Classification using Spatial Associative Rule Mining and Evolutionary Algorithms J.Arunadevi1 and V.Rajamani2, 1Thiagarajar School of Management, India and 2Indra Ganesan College of Engineering, India |
136 |
Automated Transliteration process Using Particle Swarm Optimization Algorithm V. Narasimhulu, P. Sujatha and Raju Korra, Pondicherry Central University, India |
138 |
MAMT- A Modern approach for the control unit of Implicit Manual Transmission Ashwin C S, Dinesh Kumar J, Gugan L, Harihar M V, Kousik M and Vijay Krishnan K, Sri Sai Ram Engineering College, India |
140 |
Monitoring And Control System Based On Zigbee Uma Maheswari.K.P.N, Anna University, India |
141 |
Data Flow and Impact Analysis Based Test Case Prioritization A.Askarunisa, P.Ponmani, B.Shangamithra, Thiagarajar College of Engineering, India |
143 |
UDDI and SAML based framework for Secure Semantic Web Services Anil Sharma and Suresh Kumar, Ambedkar Institute of Technology, India |
147 |
Mobility and Battery Power Prediction based Job Scheduling in Mobile Grid Environment Stephen Vaithiya S and Mary Saira Bhanu S, National Institute of Technology, India |
150 |
A Comparative study of Distributed Denial of Service Attacks, Intrusion Tolerance and mitigation Techniques Anupama Mishra1 and B. Gupta1,2, 1Graphic Era University, India and 2Indian Institute of Technology - Roorkee, India |
154 |
Modeling access control requirements through Features K.Shantha Kumari and T.Chithralekha, Pondicherry University, India |
156 |
Estimation of Reliability and Scalability in Ad-Hoc Multicast Routing Protocol for Sender Network Yashpal Singh1, Vishal Nagar2 and D.C Dhubkarya2, 1BIET Jhansi and 2CSE Jhansi, India |
157 |
A mesh Based Multicast Routing Protocol for Network Sender Vishal Nagar1, Yash Pal Singh2, D.C. Dhubkarya2, 1CSE Jhansi and 2BIET Jhansi, India |
159 |
Cell Range and Capability Analysis of WiMAX and LTE Network Sandeep Singh Sengar, Motilal Nehru National Institute of Technology, India |
160 |
Wavelet And Wavelet Packet Transform For Denoising Underwater Signals Affected By Wind Driven Ambient Noise K.Mathan Raj1, S.Sakthivel Murugan1 and V.Natarajan2, 1SSN College of Engineering, India and 2MIT Campus, Anna University, India |
161 |
Synthesis of Modified LMS Adaptive Algorithm using Verilog HDL for denoising Underwater Acoustic Signals Affected by Ambient Noise S.Kiruba Veni1, S.Sakthivel Murugan1 and V.Natarajan2, 1SSN College of Engineering, India and 2MIT Campus, Anna University, India |
163 |
A Parallel Task Assignment using Heuristic Graph Matching R.Mohan1 and Amitava Gupta2, 1National Institute of Technology, India and 2Jadavapur University, India |
167 |
Context Dependent Speech Recognition Using VITERBI Algorithm V.Swarna Priya and B. Amutha, SRM University, India |
168 |
Automatic Caricature Generation Using Text Based Input Kahkasha I. Siddavatam1 and Irfan A Siddavatam2, 1TPCT’s Terna Engineering College, India and 2K.J. Somaiya College of Engineering, India |
169 |
Cooperative WLAN Infrastructure for Enterprise Environment Ashwin iDalvi1, PamuKumar Swamy2 and B.B. Meshramh1, 1VJTI, India and 2NewTech Computer Services, India |
170 |
A Novel and Efficient Technique to Generate Secured Biometric Key Using Cryptography Mahesh.P.K. and Anjan Gudigar, M.I.T.E, India |
171 |
Rootkit Detection Mechanism: A Survey Jestin Joy and Anita John, Rajagiri School of Engineering & Technology, India |
175 |
Efficiency Enhanced Association Rule Mining Technique Abhishek Agrawal1, Urjita Thakar1, Rishi Soni2 and Brijesh Kumar Chaurasia2, 1SGSITS, India and 2ITM , India |
176 |
An Improved Approach Towards Network Forensic Investigation of HTTP and FTP Protocols Manesh T, Brijith B and Mahendra Prathap Singh, National Institute of Technology - Karnataka, India |
179 |
Indexing and Retrieval of Medical Images Using CBIR Approach Ankita Chandrakar, A.S Thoke, and Bikesh Kumar Singh, National Institute of Technology - Raipur (C.G), India |
180 |
Personal Assistant Mobile Application using Cognitive Approach Rohan Sourav Saboo, Rohit Agarwal, Vijaya Kumar B P and Kiran Kumari Patil, REVA Institute of Technology and Management Bangalore, India |
182 |
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc Networks Yuvraj Singh and Sanjay Kumar Jena, National Intitute of Technology Rourkela, India |
185 |
The Idiosyncrasies of Context-Dependent Parallelization Waseem Ahmed, P. A. College of Engineering, India |
187 |
A Modified Trust Based Dynamic Source RoutingProtocol for Detection of routing attacks in Wireless Sensor Networks Nimmy George, Viswajyothi College of Engineering and Technology India |
188 |
Fidelity Index Based On Demand(FBOD) Secure Routing In Mobile Ad hoc Network Himadri Nath Saha1, Debika Bhattacharyya1 and P. K.Banerjee2, 1Institute of Engineering and Management, India and 2Jadavpur university,India |
190 |
Per-site Security Configuration Konda Bharath Kumar and Mahendra Pratap Singh, National Institute of Technology - Karnataka, India |
191 |
TDMA based Low Energy consuming MAC Protocol for Wireless Sensor Networks in Environmental Monitoring Applications R. Rathna1, A. Siva Subramanian2, 1Sathyabama University, India and 2St.Joseph's college of Engineering, India |
193 |
Extending Temporal and Event Based Data Modeling for RFID Databases Sapan Tyagi1, M Ayoub Khan2 and A Q Ansari3, 1Institute of Management Studies - UP, India and 2Ministry of Communications and IT, India and 3Jamia Millia Islamia, India |
194 |
Comparative Study Of Current Approaches To Data Integration Jaya Bhushan, Shweta Rana, Indu and Shilpi Sharma, Amity University, India |
195 |
Differential Evolutionary Algorithm For Optimization Of Pid Controller Parameters Applied To Electromagnetic Levitation System Santoshi Mukherjee and Subrata Banerjee, National Institute of Technology - Durgapur, India |
196 |
Performance Analysis of Mammographic Image Enhancement Techniques for Early Detection of Breast Cancer Shailaja Singh, Anamika Yadav and Bikesh Kumar Singh, N.I.T - Raipur, India |
197 |
Extremely Opportunistic Routing with Expected Transmission Count to improve QoS in Hybrid Wireless Networks Sumathy S, R Saravanan, M Vijay Kumar and C Vinay Kumar, VIT University, India |
199 |
Opinion Mining Jaya Bhushan, Shweta Rana and Indu, Amity University, India |
204 |
Integrating Grid environment with Private cloud and storage cluster and provision for dynamic clustering and VO Kailash Selvaraj1 and Saswati Mukherjee2, 1Centre for Development of Advanced Computing (CDAC), India and 2 College of Engineering, India |
205 |
An Overview and Comparative Study of Segmentation Techniques for Extraction of Tongue Region for Computerized Tongue Diagnosis Bikesh Kumar Singh, A.S. Thoke and Keshri Verma, National Institute of Technology - Raipur (C.G), India |
207 |
Efficient Algorithm on Heterogeneous Computing System Sunita Bansal and Chittaranjan Hota, Birla Institute of Technology & Science, India |
208 |
Efficient Broadcasting in Parallel Networks using Network Coding NitinRakesh1 and VipinTyagi2, 1Jaypee University of Information Technology, India and 2Jaypee University of Engineering and Technology, India |
210 |
A Fast Adaptive Replication Placement for Multiple Failures in Distributed System Sanjay Bansal1, Sanjeev Sharma2 and Ishita Trivedi2, 1Chameli Devi School of Engineering, India and 2RGPV, India |
211 |
Performance Analysis of Cooperative Spectrum Sensing with Imperfect Channels Liza.J, K.Muthumeenakshi and Radha.S, SSN College of Engineering, India |
212 |
A distributed Algorithm for power-efficient Data
gathering in randomly-distributed Wireless Sensor Networks Antonella Di Stefano and Giovanni Morana, DIEEI, Italy |
214 |
Gateway Node-Based Greedy Routing Approach for Minimizing Point-to-Point Packet Delay in Vehicular Ad Hoc Networks Mohamed Abbas1, Sheik Abdul Khader1, and Munir Ahamed Rabbani2, 1B.S. Abdur Rahman Crescent Engineering College, India and 2Quassim University, Saudi Arabia |
215 |
Efficient Refinery Scheduling on Heterogeneous Computing System Sunita Bansal, Chittaranjan Hota, Birla Institute of Technology & Science, India |
216 |
Optimization of Dynamic Channel Allocation Scheme for Cellular Networks using Genetic Algorithim Jeshuran Pandian, Prithvin Murugiah, Narendran Rajagopalan and C.Mala, National Institute of Technology -Tiruchirapalli, India |
217 |
Mobile Computing with Cloud Ishwarya Chandrasekaran, Alcatel Lucent Technologies Pvt. Ltd, India |
218 |
An OS Integrity Measurement System Based on Computer Epidemiology K Venugopal Dasarathy, Saumya Hegde, Radhesh Mohandas, NITK Surathkal, India |
219 |
Implementation of AAA Sever for PMIPv6 in NS-2 Nitesh M Tarbani, B R Chandavarkar, NITK Surathkal, India |
220 |
Cloud Based Application Development for Mobile Devices for Accessing LBS Keerthi S. Shetty and Sanjay Singh, Manipal University, India |
221 |
Group-Key Management Model for Worldwide Wireless Mesh Networks Saurav Ghosh1, Subir Bhadra2 and Indrajit Bhattacharya2, 1University of Calcutta, India and 2West.Bengal Univ. of Tech, India |
222 |
Preventing Illegal De-authentication Attack in IEEE 802.11i Using Confirmation Message Ahmed O. Abu Elkhair and Ahmed A. Hassouna, Islamic University of Gaza, Palestine |
223 |
A Novel Adaptive Re-Configuration Design Pattern for Autonomic Compiliance Systems Using AOP Vishnuvardhan Mannava1 and T. Ramesh2, 1K.L University, India and 2National Institute of Technology - Warangal, India |
225 |
B-SPECS: An Optic Based Recognition Tool for Blind S.Cyril Naves, Sri Sairam Institute of Technology, India |
229 |
Parameter-Free Minimum Spanning Tree (PFMST) Based Clustering Algorithm Valli Kumari.V1, Ramakrishnam Raju. BHVS2, 1Andhra University and 2SRKR Engineering College, India |
231 |
The State of Software Metrics to Forecast the Variety of Elements in Software Development Process S. Arun Kumar, and T. Arun Kumar, VIT University, India |
233 |
A Recent Survey on DDoS Attacks and Defense Mechanisms A. Srivastava1, B.B.Gupta12, A. Tyagi1, A. Sharma1, A. Mishra1, 1Graphic Era University, India and 2Indian Institute of Technology - Roorkee, India |
234 |
Load Balancing in the Macro Pipeline Multiprocessor System using Processing Element Stealing Technique Olakanmi O. Oladayo and Fakolujo O.Alade, University of Ibadan, Nigeria |
235 |
Evaluation and Benchmarking Criteria for Automatic Parallelization Compilers & Tools Abhishek D. Kamble1, Aditi Athavale2, Priti Ranadive2 and D. B. Kulkarni1, 1Walchand College of Engg., India and 2KPIT Cummins Infosystems Ltd, India |
237 |
A Simulation of Performance of Commit Protocols in Distributed Environment Kahkashan Tabassum1 and Damodaram Avula2, 1Muffakham Jah College of Engineering and Technology, India and 2Jawaharlal Nehru Technological University, India |
238 |
Analysis of Feature Recognition of Neural Network Method in the String Recognition Amit Kumar Gupta1 and Yash Pal Singh2, 1KIET, India and 2BIET, India |
239 |
CSPR: Column only Sparse Matrix Representation for Performance Improvement on GPU Architecture B. Neelima and Prakash S. Raghavendra, NITK surathkal, India |
242 |
A Spectral Efficient Fractional Frequency Reuse Scheme for OFDMA Systems V. H. S. Prasad and K. Rama Naidu, JNTUCEA, India |