Registered Paper
2 |
Extraction of Urban Road Network by performing
Edge Aided Classification in Remote Sensing D.Murugan1 and Salhin S. Singaravelan2, 1Manonmaniam Sundaranar Uninversity, India and 2P.S.R. Engineering College, India. |
22 |
Hybrid Chaos Synchronization of Liu and Lu Systems
by Active Nonlinear Control V. Sundarapandian, Vel Tech Dr. RR & Dr. SR Technical University, India |
28 |
Securing Search Engine And Web Servers: A Detailed Analysis Keerthiram Murugesan and Mukesh Singhal, University Of Kentucky, Lexington |
50 |
Sea Object Detection Using Shape and Hybrid
Color -Texture Classification S. Suresh Kumar and M. Uma Selvi, Vivekanandha College of Technology for Women, India |
57 |
The NS-2 simulator based Implementation and Performance Analyses of Manycast QoS Routing Algorithm J.Rajeswara Rao, S.Chittibabu and K.Sri Rama Krishna, V.R Siddhartha Engineering College, India |
63 |
Multi-Layer Logon Verification System: A case study of Indian Banks Mohammad Asim, University of Hail, KSA |
67 |
Image Compression Using Two Dimensional Spherical
Coder in Wavelet Lifting
S.Panimalar, R.Anisha and M.Gomathi,Manonmaniam Sundaranar University,India |
69 |
An Efficient Visible Watermarking for Copyright Protection Using Discrete Wavelet Transform R.Anisha, S.Panimala and M.Gomathi, Manonmaniam Sundaranar University, India |
83 |
Evolving Test Patterns for Use Case Maps Pg Sapna1, Hrushikesha Mohanty2 & Arunkumar Balakrishnan1, 1Coimbatore Institute of Technology, India and 2University of Hyderabad, India |
88 |
A Novel Approach For Compression of Encrypted Grayscale Images Using Huffman coding S.Saravana Kumar and S.Panimalar, Manonmaniam Sundaranar University, India |
92 |
Global Chaos Synchronization of Hyperchaotic Pang
and Wang Systems by Active Nonlinear Control Sundarapandian Vaidyanathan1 and Karthikeyan Rajagopal2, 1R & D Centre, Vel Tech Dr. RR & Dr. SR Technical University, India and 2Singhania University, India |
93 |
Mining Web Path Traversals based on generation of FP Tree with Utility E Poovammal and Pillai Cigithand, SRM University, India |
95 |
Evaluating Degree of Dependency from Domain Knowledge using Fuzzy Inference System Vibha Gaur and Anuja Soni, University of Delhi, India |
96 |
The goal of Securing Mobile Ad-Hoc Network Najiya Sultana and S.S.Sarangdevat, Rajasthan Vidhyapith University, India |
97 |
Novel Methodologies: Preventing Man-in-the-middle P Bharath Bhushan Petlu1, A N L Kumar1, Devaki P2 and Muralidhara Rao1, 1Swarnandhra College of Engineering and TEchnology, India and 2Swarnandhra Institute of Engineering and Technology, India |
  | |
99 |
Multi-Domain Meta Search Engine with an Intelligent Interface for Efficient Information Retrieval on the Web Minnie D 1 and Srinivasan S 2, 1Madras Christian College, India and 2Anna University of Technology Madurai, India. |
102 |
Improved Video Watermarking
Using Nested Watermark, Wavelets And Geometric Warping T.Jayamalar and V. Radha, Avinashilingam University for Women, India |
105 |
Robust Fault Tolerant AOMDV Routing Mechanism in MANET Jayalakhsmi Vaithiyanathan1, Geetha Sadayan2, Muthu Chitra Govindhan2, 1Dravidian University, India and 2Anna University of Technoloy, India |
115 |
ZKIP and Formal System S.Samundeeswari and M.Thiyagarajan, School of Computing / SASTRA, India |
117 |
Personalized Web Based Collaborative Learning in Web 3.0- A Technical Analysis S.Padma1 and Ananthi Seshasaayee2, 1Bharathiar University, India and 2Quaid-e-Millath Govt. College for women, India |
118 |
Rule Acquisition in Data Mining Using a Self Adaptive Genetic Algorithm K.Indira, S. Kanmani, Gaurav Sethia.D, Kumaran.S and Prabhakar.J, Pondicherry Engineering College, India |
131 |
Dynamic Multi Dimensional Matchmaking Model for
Resource Allocation in Grid Environment Japhynth Jacob1, Elijah Blessing Rajsingh2 and Isaac Balasingh Jesudason1, 1St.Mother Theresa Engineering College and 2KSCST, Karunya University, India |
138 |
A Comparative Study of CSO and PSO Trained Artificial Neural Network for Stock Market Prediction Suresh Chittineni, Kaligotla Abhilash, Vabbilisetty Mounica, Suresh Satapathy and P.V.G.D.Prasad Reddy, Anil Neerukonda Institute of Technology and Sciences, India and Andhra University, India |
  | |
144 |
Scaled Conjugate Gradient Algorithm in Neural Network Based Approach for Handwritten Text Recognition Haradhan Chel, Aurpan Majumder and Debasis Nandi, National Institute of Technology, India |
147 |
A linear framework for identification of ship and
its velocity estimation using SAR images P.Subashini and M.Krishnaveni, Avinashilingam Deemed University for Women, India |
152 |
Creational Patterns to Create Decorator Pattern
Objects in Web Application Vijay K Kerji, PDA College of Engineering, Gulbarga, India |
154 |
Scalable Geographic Based Multicasting (SGBM) Protocol H.Venkateswaran and A.John Prakash, Anna University Chennai, India |
156 |
Median Adjusted Constrained PDF based Histogram
Equalization for Image Contrast Enhancement Shanmugavadivu. P1, Balasubramanian. K2 and Somasundaram. K3,1Gandhigram Rural Institute Deemed University and 2PSNA College of Engineering and Technology, India |
158 |
Isolated Word Recognition System using Back Propagation Network for Tamil Spoken Language V.Radha and Vimala.C and M.Krishnaveni ,Avinashilingam Deemed University for Women, India. |
165 |
Enhanced Hybrid Compression Models for Compound Images D. Maheswari and V.Radha, Avinashilingam Deemed University for Women Coimbatore, India |
170 |
Index Based Ordered Broadcast with Status (IOBS) Algorithm for Consistent Data Broadcast K.Chitra1, K.Senthamarai Kannan2 and S.Abirami3, 1Govt. Arts & Science college for women, India, 2Manonmaniam Sundaranar University, India and 3Thiagarajar college(Autonomous), India |
173 |
Elements of Cloud Computing: A Perspective on Service Oriented Enterprises (SOEs) R. Suchithra1, R.Selvarani 2 and Dhinaharan Nagamalai 3, 1Master of Computer Applications Department, Jain University, 2Computer Science and Engineering Department, MSRIT Bangalore, India and 3Wireilla Net solutions,Victoria,Australia |
175 |
Capturing High-Level Semantics of Images in Web documents using Strength Matrix P.Sumathy1, P.Shanmugavadivu1, A.Vadivel2, 1Gandhigram Rural Institute,2National Institute of Technology, India. |
177 |
Multiple Access Scheme using MSE-OFDM with Pseudo Random Cyclic Prefix Biswajit Datta 1 Anupam Karmakar2 and Anupam Karmakar3, 1College of Engineering and Management, Kolaghat, India, 2 University of Calcutta, Kolkata, India and 3Jadavpur University, West Bengal, India |
  | 179 |
A Clustering Approach for Semantic Service Discovery Chellammal Surianarayanan and Gopinath Ganapathy, Bharathidasan University Khajamalai campus, India |
185 |
Leaf And Flower Recognition Using
Preferential Image Segmentation Algorithm N.Valliammal, Avinashilingam Deemed University for Women, India |
189 |
Analysis of Next Hop Selection for Geocasting in
VANET Sanjoy Das and D. K lobiyal, Jawaharlal Nehru University, India |
191 |
Multi Objective Genetic Approach for Solving Vehicle Routing Problem with Time Window Padmabati Chand and J. R. Mohanty, KIIT University, Bhubaneswar, Odisha, India |
192 |
Application of Modified NSGA-II Algorithm to Reactive Power Optimization S. Ramesh 1,S. Kannan 2 and S. Baskar 3,1Arulmigu Kalasalingam College of Engineering, Krishnankoil, India,2Kalasalingam University, Anand Nagar, Krishnankoil, India,3Thiagarajar College of Engineering, Madurai, India |
  | |
198 |
A Revised TESOR Algorithm for Perfect Routing Joe Prathap P. M. and Brindha G. R, SASTRA University, India |
  | |
200 |
An Accomplishment of New level Register File
Management for Montgomery Algorithm in Elliptic curve M.Prabu1 and R.Shanmugalakshmi2, 1Anna University Coimbatore, India and 2Government College of Technology, India |
  | |
201 |
Modified Partial Differential Equation based Adaptive Two- Stage Median Filter for Images Corrupted with High Density
Fixed-Value Impulse Noise Shanmugavadivu P and Eliahim Jeevaraj P S, Gandhigram Rural Institute-Deemed University, India |
  | |
206 |
Enhanced Classification Performance using
Computational Intelligence Indrajit Mandal and N.Sairam, Sastra University, India |
  | |
208 |
Modeling the evolving Access control policies K.Shantha Kumari and T.Chithralekha, Pondicherry University, India |
  | |
211 |
Fault Diagnosis of Pneumatic valve using
PCA and ANN techniques P. Subbaraj1 and B. Kannapiran2, 1Theni Kammavar Sangam College of Technology, India and 2Arulmigu Kalasalingam college of Engineering, India |
  | |
216 |
A Generalized classification approach for
Indian sign language datasets using instance
based classifiers Ms.M.Krishnaveni and V.Radha, Avinashilingam Deemed University for Women, India |
242 |
Agent based Adaptive learning system R. Gowri, T.T. Sampath Kumar and S.Balaji, Sri Manakula Vinayagar Engineering College, India |
243 |
Real time audio Streaming over low data rate
Wireless system Radhika M and Rama Naidu K, Jawaharlal Nehru Technological University, India |
245 |
Analysis of Surface Absorption Rate on Human Head at Expose 900MHz Gaurav R Joshi and Kalpesh H Wandrah , CCET, Wadhwan, India |
246 |
GPGPU Implementation of Parallel Memetic Algorithm for VLSI Floorplanning Problem Subbaraj Potti 1, SivaKumar Pothiraj 2,1Theni Kammavar Sangam College of Technology, Theni and 2Arulmigu Kalasalingam College of Engineering, Krishnankoil, Tamil Nadu, India. |
247 |
Improving Cloud Security through Virtualization Loganayagi B and Sujatha S, Anna University of Technology Tiruchirappalli (Main Campus), India |
252 |
Selection of Software Testing Technique: A Multi Criteria Decision Making Approach Monisha Victor1 and Nitin Upadhyay2,1BITS Pilani and 2K. K. Birla Goa Campus, India |
258 |
A Hybrid Evolutionary Algorithm for the Pagenumber Problem Dharna Satsangi, Kamal Srivastava and Gursaran, Dayalbagh Educational Institute, Agra, India. |
260 |
Trust-enhanced Recommendation of Friends in Web Based Social Networks Using Genetic Algorithms to Learn User Preferences Vinti Agarwal and Kamal K. Bharadwaj, Jawaharlal Nehru University, India. |
261 |
Modeling and Verication of Server Aided
Verication Protocol using NuSMV Vikram Saralaya, Kishore J K, Sateesh Reddy, and Sanjay Singh, Manipal University,India. |
262 |
Modeling and Verication of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier Punit Mundra, Madhavi Sharma, Shobhit Shukla, and Sanjay Singh, Manipal Institute of Technology, Manipal University, Manipal, India |
275 |
A New Bluetooth Security Architecture Mintu Philip and Asha Das, Toc H Institute of Science and Technology, Kerala, India |
281 |
A New Trace Backing Algorithm for Maximizing Streaming Data Join G. Hemalatha, Karunya University, Coimbatore, India |
282 |
A Comparative Analysis Of Demand Assignment Multiple Access Protocols For Wireless Atm Networks C Shanmuganathan 1, P Raviraj 2,1St.Peters College of Engg.& Tech, India and 2SKP Engineering College, India. |
285 |
Perceptual Linear Predictive
Cepstral Coefficient For Malayalam
Isolated Digital Recognition Cini Kurian, Cochin University of Science & Technology, India |
289 |
Agent Based Modeling of Individual Voting Preferences
with Social Influence Swati Basak and Neelam Modanwal, Banaras Hindu University, India |
292 |
Texture analysis of brain MRI and classification with BPN for the diagnosis of dementia T.R.Sivapriya1, V.Saravanan2 and Ranjit Jeba Thangaiah3, 1Lady Doak College, Madurai, India, 2Dr.N.G.P. Institute of Technology, Coimbatore, India and 3Karunya University, Coimbatore, India. |
  | |
293 |
A host based kernel level rootkit detection
mechanism using clustering technique Anita John and Jestin Joy,Rajagiri School of Engineering & Technology, India |
295 |
Fuzzy Clustering for Effective Customer Relationship Management in Telecom Industry
Gayathri Asokan and Mohanavalli S,Sri Sivasubramaniya Nadar College of Engineering, India |
300 |
Dematerialized Deposits using XSI NVKD Ramesh Gorrila, V. Radha, Surabhi Upender and Vijay Kumar Bandiki, Institute for Development and Research in Banking Technology, Hyderabad, India |
302 |
Classifying Gender from Faces using Independent Components Sunita Kumari and Banshidhar Majhi, National Institute of Technology, India. |
303 |
Fast Solution Algorithms for the Simple Motif Problem Tarek El Falah1,2, Thierry Lecroq2, and Mourad Elloumi1, 1 LITIS, Tunsia and 2University of Rouen, France. |
  | |
305 |
Secure Web Services Negotiation Vakul Mohanty and Chittaranjan Hota, Birla Institute of Technology and Sciences Pilani, India |
306 |
A Recommender System for Rural and Urban learners Charles. S, Arockiam. L, Arul Kumar.V and P.Cijo, St Josephs College, Tiruchirappalli, India. |
308 |
Study of Organizational Factors affecting Usability of Online Helps with Programming Languages Nilesh Dhannaseth, Ganesh Bhutkar, Vishwakarma Institute of Technoogy, India. |
318 |
Finding Reliable Path for Peer to Peer Application in Mobile Environment Jayashree.D, Yogesh.P, Anna University, India. |
319 |
Text Mining for Interpreting Gene K.Prabavathy 1 and Sumathirajesh 2, 1 PSG College of Arts and Science, India and 2Chikkanna Govt. Arts College, India. |
320 |
Improved Input-delayed Dynamic Neural Network for GPS/INS Integration M.Malleswaran, A.Saravanaselvan, and V.Vaidehi, Anna University of Technology, India |
323 |
Application of Artificial neural network for the prediction of groundwater level in hard rock region M.Kavitha Mayilvaganan and K.B.Naidu,Sathyabama University, Chennai, India. |
326 |
Energy Effcient and Fault Tolerant GPSR in Ad Hoc Wireless Network Jyotsana Jaiswal and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India. |
329 |
AN IDE For Developing Mobile Applications For Smart Phones Sakila Banu Ali, Nisar Hundewale, Garva Taif University, Saudi Arabia. |
330 |
Function Approximation using SVM with FCM and slope based partition Amera Almas and Nisar Hundewale, Taif University, Saudi Arabia |
332 |
A PIC-Controller Based Doubly Fed Induction Generator (DFIG) for Wind Energy Conversion Systems K. Sureshkumar, P. Vijaya kumar and R. Dhandayuthabani, Velammal Engineering college, India. |
334 |
Packet Scheduling Scheme with enhanced Quality of Service for Mobile WiMAX V. Sampath Kumar, C.Kalyana Chakravarthy and V. R. L. Priyanka, M.V.G.R.College of Engineering, India. |
335 |
Physical Layer Authentication in Wired and Wireless Communication Systems Chandra Mouli and Sanjay Singh,Manipal Institute of Technology, Manipal University, Manipal, India. |
341 |
Cloud SaaS: Models and Transformation Ritu Sharma and Manu Sood, Himachal Pradesh University Summer Hill, Himachal Pradesh, India |
344 |
Future Robotics Memory Management System S.Vijaykumar1, S.G.Saravanakumar 2 and K.Venkata Lakshmi 3, 1 Thiagarajar School of management, India 2Sastra University, India and 3 Periyar Maniammai University, India. |
351 |
Impact of outliers on Anonymized Categorical Data Venkata Ramana. K, Valli Kumari. V and Raju KVSVN, Andhra University Visakhapatnam, Andhra Pradesh, India. |
352 |
Privacy in Mobile Ad Hoc Networks Jhansi Vazram. B1, Valli Kumari. V2, Murthy J.V.R3 ,1 Narasaraopeta Engg. College, India, 2Andhra University, India, and 3J N T University, India. |
355 |
Prototype based Performance Prediction of Web Services Ch Ram Mohan Reddy1, D Evangelin Geetha2, KG Srinivasa2, T V Suresh Kumar2 and K Rajani Kanth2, 1B M S College of Engineering, India and 2M S Ramaiah Institute of Technology, India |
Accepted Paper
2 |
Extraction of Urban Road Network by performing
Edge Aided Classification in Remote Sensing D.Murugan1 and Salhin S. Singaravelan2, 1Manonmaniam Sundaranar Uninversity, India and 2P.S.R. Engineering College, India. |
5 |
e-Tendering: Making e-business Alive Ishan Mishra, Salhin Iqbal and Yasir Anwar, Yeshwantrao Chavan College of Engg, India |
6 |
Evaluating The Effectiveness Of
Personalized Web Search Using Semantic Web C.I.Arthi and A.Suresh, Sudharsan Engineering College, India |
10 |
Cloud Based Virtual Tamil Operating System Rajadevi R, Saran Kumar N M and Savitha C, Kongu Engineering College, India |
13 |
Time series modeling on web Analytics Mohammad Amin Omidvar1, Vahid Reza Mirabi2 and Narjes Shokry2, 1 Iran Islamic Azad University E-campus and 2 Islamic Azad University Central branch (Tehran), Iran |
14 |
Run-time Estimation based Grid Scheduling using Multilevel Feedback Queue for the Computational Grid Environment Rajkumar Rajavel, Adhiyamaan College of Engineering, Hosur, India. |
15 |
Palmprint Authentication by Phase Congruency
Features Jyoti Malik1, G. Sainarayanan2 and Ratna Dahiya1, 1National Institute of Technology, India and 2ICT Academy of Tamil Nadu, India |
17 |
Integral Multipath Routing in MPLS
(Multiprotocol Label Switching) Tarun Awasthi1, Tulika Awasthi1 and Abhishek Mishra2, 1 MIPS Kanpur, India and 2MMMEC Gorakhpur, India |
22 |
Hybrid Chaos Synchronization of Liu and Lu Systems
by Active Nonlinear Control V. Sundarapandian, Vel Tech Dr. RR & Dr. SR Technical University, India |
28 |
Securing Search Engine And Web Servers: A Detailed Analysis Keerthiram Murugesan and Mukesh Singhal, University Of Kentucky, Lexington |
31 |
An Advanced Multi Feature Based Gait Recognition SSaeid Fazli and Hadis Askarifar, Zanjan University, Iran |
32 |
GAIT Recognition Using SVM and LDA Saeid Fazli, Hadis Askarifar and Mahmoud Joz Tavassoli, Zanjan University, Iran |
33 |
Automated Sorting Of Iranian Pistachio Nuts Using Computer Vision And Particle Swarm Optimization Saeid Fazli 1, Jafar Ghezelbash 2, Saeid Minaei3, Mojtaba Moradi4, 1Zanjan University, Iran, 2Urmia University, Iran, 3Trbiat Modares University, Iran and 4Semnan University, Iran |
34 |
A LAN protocol for efficient file transfer on
Linux based system Ajit Ambekar ,Pravin Dilpak and Pravinkumar Malviya, V.J.T.I /Computer Technology, India |
35 |
Improved GOGAC Segmentation Method
for Microarray Image Segmentation Ramgopal Kashyap and Ganesh Wayal, R.K.D.F.I.S.T., India |
41 |
Application of IDSFLA and ISFLA Approaches for TNEP Problem Considering the Loss and Uncertainty in load growth Saeid Jalilzadeh 1, Ali Kimiyaghalam2, Ahmad Ashouri1, 1University of Zanjan, Iran, 2Islamic Azad Univercity, Iran |
43 |
PID Design for AVR System by PSO and Imperialist Competitive Algorithms Saeed Jalilzadeh, Saeed Behzadpoor and Mohammad Hashemil, Zanjan University, Iran |
46 |
Simulation of Synchronous Condenser with PSCAD and optimization it with Chaos and Frog-Leaping algorithms Saeid Jalilzadeh, Mohsen Rezaie and Majid Kazemi, Zanjan University, Iran |
47 |
Load Frequency Stabilization In Two-Area Interconnected System Using CES And SSSC With PSO Optimization Saeid Jalilzadeh 1, Reza noorozian1, Javad Gholinezhad2 and Peyman Farhang1, 1Zanjan University, Iran and 2Islamic Azad University, Iran |
49 |
Cluster Optimization for Improved Web Usage Mining using Ant Nestmate Approach S. Prabakaran and Anna Alphy, SRM University, India |
50 |
Sea Object Detection Using Shape and Hybrid
Color -Texture Classification S. Suresh Kumar and M. Uma Selvi, Vivekanandha College of Technology for Women, India |
57 |
The NS-2 simulator based Implementation and Performance Analyses of Manycast QoS Routing Algorithm J.Rajeswara Rao, S.Chittibabu and K.Sri Rama Krishna, V.R Siddhartha Engineering College, India |
63 |
Multi-Layer Logon Verification System: A case study of Indian Banks Mohammad Asim, University of Hail, KSA |
67 |
Image Compression Using Two Dimensional Spherical
Coder in Wavelet Lifting
S.Panimalar, R.Anisha and M.Gomathi,Manonmaniam Sundaranar University,India |
69 |
An Efficient Visible Watermarking for Copyright Protection Using Discrete Wavelet Transform R.Anisha, S.Panimala and M.Gomathi, Manonmaniam Sundaranar University, India |
70 |
A New Approach for Protecting
Confidential Numeric Attributes in
Micro Data S.Vijayarani1 and A. Tamilarasi2, 1School of Computer Science and Engineering, Bharathiar University, India,2Kongu Engineering College, India |
71 |
Towards Learner Model Sharing Among
Heterogeneous E-Learning Environments R. Sunitha, R. Shyamala and G. Aghila, Pondicherry University, India |
72 |
Evaluation of Efficacy of Different Chelator Drugs Used in Arsenic
Toxicity Sayan Mukherjee and Durjoy Majumder, West Bengal State University, India |
73 |
Information theoretic approach towards the
understanding of HLA gene regulation in leukemia Durjoy Majumder1 and Abhik Mukherjee2, 1West Bengal State University and 2Bengal Engineering & Science University, India |
74 |
The effect of RED queue management scheme on
TCP performance Mohammed A. Mikki and Maaly A. Hassan, The Islamic University of Gaza, Palestine |
76 |
Application of Shuffled Frog Leaping Algorithm FOR Optimal Design of Measurement-Type Current Transformer Vahid Rashtch, Majid Kazemi and Sasan Beheshti, Zanjan University, Iran |
77 |
Application Of Imperialist Competitive
Algorithm For Parameter Identification Of
Transformer R-L-C-M Model Vahid Rashtchi1, Saeed Behzadpoor1, Mohammad Hashem1 and Ebrahim rahimpour2, 1Zanjan University, Iran and 2Bad Honnef, Germany |
78 |
Application Of Binary Particle Swarm Optimization Algorithm For Locating Of Fault Indicators In Distribution Networks Vahid Rashtchi1, Ahmad Ashouri2 and Amir Bagheri1, 1Zanjan Univesity, Iran and 2Islamic Azad Univesity, Iran |
79 |
Transformer Model Reduction of Lumped Parameters Models using Imperialist Competitive Algorithm Vahid Rashtchi and Hamid Shahrouzi, zanjan university, Iran |
83 |
Evolving Test Patterns for Use Case Maps Pg Sapna1, Hrushikesha Mohanty2 & Arunkumar Balakrishnan1, 1Coimbatore Institute of Technology, India and 2University of Hyderabad, India |
84 |
Coping The Capture Effect In Rfid Tag Identification By Using General Binary Tree Protocol Sateesh.k,Fayaz Ahamad.Sk,Sri Rama Krishna.K and Kantikiran .M, VR Siddhartha Engineering College, India |
85 |
A Novel Rule Based Approach for Microarray
Data Classification P. Ganesh Kumar, V.Ammu and T.Aruldoss Albert Victoire, Anna University of Technology, India |
86 |
Keyword Fetcher and Optimizer for ROI Maximization Vikram Kotnis1, Deepak Kshirsagar2, NikhilKumar Jadhav2 and Pradeep Chaudhari2, 1Amura Marketing Technologies Pvt Ltd, Pune and 2College of Engineering, Pune |
87 |
Reputation System For Securing P2P Networks Against
Challenges S. Umamaheswari1 and V. Leela2,1AMC Engineering College, India and 2PES Institute of Technology, India |
88 |
A Novel Approach For Compression of Encrypted Grayscale Images Using
Huffman coding S.Saravana Kumar and S.Panimalar, Manonmaniam Sundaranar University, India |
89 |
An Innovative Approach for
Dynamic Load Balancing in Grid Computing Nitin K.Bhil1, Nikita L.Vikhar1 and Dhanashree M. Shirkey2, 1Dr.Sau Kamaltai Gawai Institute of Engineering and Technology,India and 2Government Polytechnic ( An Autonomous Institute ), India |
  | |
90 |
Automated Retinal Blood Vessel Segmentation and
Lesion Detection Merlin Gethsy. D, Francis Xavier Engineering College, India |
91 |
Linear Transmit Precoding for Prediction Error corrected channel V.Kejalakshmi1 and S.Arivazhagan2, 1K.L.N. College of Engineering Pottapalayam, India and 2Mepco Schlenk Engineering College, India |
92 |
Global Chaos Synchronization of Hyperchaotic Pang
and Wang Systems by Active Nonlinear Control Sundarapandian Vaidyanathan1 and Karthikeyan Rajagopal2, 1R & D Centre, Vel Tech Dr. RR & Dr. SR Technical University, India and 2Singhania University, India |
93 |
Mining Web Path Traversals based on generation of FP Tree with Utility E Poovammal and Pillai Cigithand, SRM University, India |
95 |
Evaluating Degree of Dependency from Domain Knowledge using Fuzzy Inference System Vibha Gaur and Anuja Soni, University of Delhi, India |
96 |
The goal of Securing Mobile Ad-Hoc Network Najiya Sultana and S.S.Sarangdevat, Rajasthan Vidhyapith University, India |
97 |
Novel Methodologies: Preventing Man-in-the-middle P Bharath Bhushan Petlu1, A N L Kumar1, Devaki P2 and Muralidhara Rao1, 1Swarnandhra College of Engineering and TEchnology, India and 2Swarnandhra Institute of Engineering and Technology, India |
  | |
99 |
Multi-Domain Meta Search Engine with an Intelligent Interface for Efficient Information Retrieval on the Web Minnie D 1 and Srinivasan S 2, 1Madras Christian College, India and 2Anna University of Technology Madurai, India. |
102 |
Improved Video Watermarking
Using Nested Watermark,
Wavelets And Geometric Warping T.Jayamalar and V. Radha, Avinashilingam University for Women, India |
103 |
Image Retrieval System based on Hybrid Technique Lidiya Xavier and Thusnavis Bella Mary. I, Karunya University Coimbatore, India |
105 |
Robust Fault Tolerant AOMDV Routing Mechanism in MANET Jayalakhsmi Vaithiyanathan1, Geetha Sadayan2, Muthu Chitra Govindhan2, 1Dravidian University, India and 2Anna University of Technoloy, India |
107 |
Wavelet De-noising for vehicle License Plate Images Ch.Jaya Lakshmi and A.Jhansi Rani, V.R.Siddhatha Engg.College, India |
110 |
Rough Sets Analysis in real-world Examination Timetabling Problem Instances J. Joshua Thomas, Ahamad Tajudin Khader and Bahari Belaton, University Sains Malaysia |
113 |
Various Techniques in Intrusion Detection: A Survey Dheeraj Pal and Bhavesh Gohil, Sardar Vallabhbhai National Institute of Technology, India |
114 |
Knowledge Based Approach for
Alignment Problems S.Samundeeswari and M.Thiyagarajan, School of Computing / SASTRA, India |
115 |
ZKIP and Formal System S.Samundeeswari and M.Thiyagarajan, School of Computing / SASTRA, India |
116 |
Data Preserving For Data Publishing Selection : A Survey Vinit kumar and Bhavesh Gohil, Sardar Vallabhbhai National Institute of Technology, India |
117 |
Personalized Web Based Collaborative Learning in Web 3.0- A Technical Analysis S.Padma1 and Ananthi Seshasaayee2, 1Bharathiar University, India and 2Quaid-e-Millath Govt. College for women, India |
118 |
Rule Acquisition in Data Mining Using a Self Adaptive Genetic Algorithm K.Indira, S. Kanmani, Gaurav Sethia.D, Kumaran.S and Prabhakar.J, Pondicherry Engineering College, India |
119 |
Enhancing the Security in Hybrid Cryptosystem Using
Elliptic Curve Based New Signcryption Scheme D Pradeep and T.T. Selvarathy, Einstein College of Engineering, India |
128 |
A Novel way of Invoking Agent Services using Aspect Oriented Programming via Web Service Integration Gateway Vishnuvardhan Mannava1, T. Ramesh 2, 1KL University, India and 2National Institute of Technology, India |
129 |
Intelligent Cloud Brokerage System Santhosh Peddi1, Indrani Swetha Tadikonda2, 1University of Hyderabad, India and 2ADP Private Limited, India |
130 |
Innovative Method for Source Coder Identification of Digital Images Ms.Jaishree and A. Itkelwar, Yeshwantrao Chavan College of Engineering, India |
131 |
Dynamic Multi Dimensional Matchmaking Model for
Resource Allocation in Grid Environment Japhynth Jacob1, Elijah Blessing Rajsingh2 and Isaac Balasingh Jesudason1, 1St.Mother Theresa Engineering College and 2KSCST, Karunya University, India |
132 |
Web-based Learning in Knowledge Mining A.Nithya Rani1, Antony Selvdoss Davamani 2, 1C.M.S College of Science and Commerce, India and 2NGM College (AUTONOMOUS ) Pollachi, India |
133 |
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network using Restructured Artificial Bee Colony System Chandra Mohan B and Baskaran R, Anna University, India. |
134 |
Ant Colony Optimization based Congestion Control Algorithm for MPLS Network S.Rajagopalan1, E.R.Naganathan2 and P.Herbert Raj 3, 1Alagappa University, India, 2Velammal Engineering College, India and 3Brunei |
138 |
A Comparative Study of CSO and PSO Trained Artificial Neural Network for Stock Market Prediction Suresh Chittineni, Kaligotla Abhilash, Vabbilisetty Mounica, Suresh Satapathy and P.V.G.D.Prasad Reddy, Anil Neerukonda Institute of Technology and Sciences, India and Andhra University, India |
  | |
139 |
The FIRMER-Square Contour Algorithm Rangeet Mitra1,Sumit Kumar2,Santosh Kumar2, 1Kalinga Institute of Industrial Technology, India and 2Indian Institute of Technology, Guwahat |
140 |
Message Encoding in Nucleotides Rahul Vishwakarma, Rohit Kumar and Satyanand Vishwakarma,Tata Consultancy Services, India |
144 |
Scaled Conjugate Gradient Algorithm in Neural Network Based Approach for Handwritten Text Recognition Haradhan Chel, Aurpan Majumder and Debasis Nandi, National Institute of Technology, India |
145 |
Detecting Phising Webpages With Visual Similarity
Assessment Based On Earth MoverS Distance K.Sureshkumar and N.Revathy, Karpagam College of Engineering, India |
147 |
A linear framework for identification of ship and
its velocity estimation using SAR images P.Subashini and M.Krishnaveni, Avinashilingam Deemed University for Women, India |
148 |
Extreme Programming Embraced and its Usage in Education Ashwin Tumma1 and Harshada Kshirsagar2, 1College of Engineering Pune, India and 2Bharati Vidyapeeths College of Engineering, India |
152 |
Creational Patterns to Create Decorator Pattern
Objects in Web Application Vijay K Kerji, PDA College of Engineering, Gulbarga, India |
153 |
Virtual Modem for STB Network Nidhi Agarwal, Inderprastha Engineering College, India |
154 |
Scalable Geographic Based Multicasting (SGBM) Protocol H.Venkateswaran and A.John Prakash, Anna University Chennai, India |
155 |
Discovering Web Services by Tags Ansa Lawrence, Ditty Varghese and Sushant Ratnaparkhi, Don Bosco Institute of Technology, India |
156 |
Median Adjusted Constrained PDF based Histogram
Equalization for Image Contrast Enhancement Shanmugavadivu. P1, Balasubramanian. K2 and Somasundaram. K3,1Gandhigram Rural Institute Deemed University and 2PSNA College of Engineering and Technology, India |
157 |
SQL Query Based Data Synchronization in Heterogeneous Database Environment Iqbal Hossain and Muhammad Masroor Ali,Bangladesh University of Engineering and Technology, Bangladesh. |
158 |
Isolated Word Recognition System using Back Propagation Network for Tamil Spoken Language V.Radha and Vimala.C and M.Krishnaveni ,Avinashilingam Deemed University for Women, India. |
159 |
Novel Method for Content Aware Image Retargetingfor Mobile Devices G.Annalakshmi1 and S. Muthukumar2, 1Kamaraj College Of Engineering &Technology, India and 2Manonmanium Sundarnar University, India |
161 |
Enhancement of BARTERCAST using
Reinforcement Learning to effectively manage
Freeriders Sreenu.G and Dhanya P.M, Rajagiri School of Engineering and Technology, India. |
162 |
E-Shop Modelling Using Business Process Modelling Notation Sajjad Rehmatullah and Tabassam Nawaz, University of Engineering and Technology, Taxila, Pakistan |
163 |
A Review On Clustering Methods For The First International Conference On Computer Science, Engineering And Rmation Technology(Cseit-2011) T. Soni Madhulatha, Alluri Institute of Management Sciences, India. |
165 |
Enhanced Hybrid Compression Models for Compound Images D. Maheswari and V.Radha, Avinashilingam Deemed University for Women Coimbatore, India |
167 |
E-Governance in Public Transportation: U.P.S.R.T.C. - A Case Study Ajay Kumar Bharti and Sanjay K. Dwivedi, Babasaheb Bhimrao Ambedkar University, India |
168 |
Testing Resilience of Router against Denial of Service Attacks Vishal M. Karande 1, Sandeep N. Narayanan1, Alwyn R. Pais 1 and N. Balakrishnan2, 1NITK-Surathkal, India and 2SERC.IISc. Bangalore, India |
169 |
A Framework for Intrusion Tolerance in Cloud Computing Vishal M. Karande and Alwyn R. Pai, NITK-Surathkal, India |
170 |
Index Based Ordered Broadcast with Status (IOBS) Algorithm for Consistent Data Broadcast K.Chitra1, K.Senthamarai Kannan2 and S.Abirami3, 1Govt. Arts & Science college for women, India, 2Manonmaniam Sundaranar University, India and 3Thiagarajar college(Autonomous), India |
172 |
A Trust Based Metric for Hybrid Gateway
Selection Scheme in Integrating MANET
with Internet R.Manoharan and S.Mohanalakshmie, Pondicherry Engineering College, India |
173 |
Elements of Cloud Computing: A Perspective on Service Oriented Enterprises (SOEs) R. Suchithra1, R.Selvarani 2 and Dhinaharann Nagamalai 3, 1Master of Computer Applications Department, Jain University, 2Computer Science and Engineering Department, MSRIT Bangalore, India and 3Wireilla Net solutions,Victoria,Australia |
175 |
Capturing High-Level Semantics of Images in Web documents using Strength Matrix P.Sumathy1, P.Shanmugavadivu1, A.Vadivel2, 1Gandhigram Rural Institute,2National Institute of Technology, India. |
176 |
Detecting & Defeating Split Personality Malware Kalpa Vishnani, Alwyn R. Pais and Radhesh Mohandas, National Institute of Technology Karnataka, India. |
177 |
Multiple Access Scheme using MSE-OFDM with Pseudo Random Cyclic Prefix Biswajit Datta 1 Anupam Karmakar2 and Anupam Karmakar3, 1College of Engineering and Management, Kolaghat, India, 2 University of Calcutta, Kolkata, India and 3Jadavpur University, West Bengal, India |
  | 179 |
A Clustering Approach for Semantic Service Discovery Chellammal Surianarayanan and Gopinath Ganapathy, Bharathidasan University Khajamalai campus, India |
180 |
Performance Analysis Of Interleaved CDMA Systems Selvakumar.G1 and Thangapandi.T2,1Kumaraguru College of Technology and2National College of Engineering, India |
181 |
Automatic Tracing of Optic Disc Boundary
from Digital Fundus Images Using
Template-Based Method J.Annie Bromy Cruz and Vinolia Anandan, Anna University of Technology, Tirunelveli, India |
185 |
Leaf And Flower Recognition Using
Preferential Image Segmentation
Algorithm N.Valliammal, Avinashilingam Deemed University for Women, India |
186 |
Food Recommendation System for Diabetic Patients Ananthi.A, Anna University, Chennai, India |
187 |
Increasing Robustness and Security in Integrated Services Digital Networks (ISDN) in Data Networking using SDNEA Algorithm Deepam Kanjani and Ashutosh Chaturvedi, Sharda University, Greater Noida, India |
189 |
Analysis of Next Hop Selection for Geocasting in
VANET Sanjoy Das and D. K lobiyal, Jawaharlal Nehru University, India |
190 |
Analysis of Associative Memory Neural Network for GPS/INS Data Fusion Angel Deborah S and Malleswaran M |
191 |
Multi Objective Genetic Approach for Solving Vehicle Routing Problem with Time Window Padmabati Chand and J. R. Mohanty, KIIT University, Bhubaneswar, Odisha, India |
192 |
Application of Modified NSGA-II Algorithm to Reactive Power Optimization S. Ramesh 1,S. Kannan 2 and S. Baskar 3,1Arulmigu Kalasalingam College of Engineering, Krishnankoil, India,2Kalasalingam University, Anand Nagar, Krishnankoil, India,3Thiagarajar College of Engineering, Madurai, India |
  | |
193 |
Mobile Location Estimation Using
Fuzzy-Based IMM and Data Fusion Mary Anita.J and M.Malleswaran, Anna University of Technology Tirunelveli, India |
194 |
An Efficient Hybrid Algorithm for Ranking Web
Services Manoharan.R, Archana.A and Siddhika Nitin Cowlagi, Pondicherry Engineering College, India |
197 |
Induction of Fuzzy Decision Trees Based on Fuzzy Rough SetTechniques |
198 |
A Revised TESOR Algorithm for Perfect Routing Joe Prathap P. M. and Brindha G. R, SASTRA University, India |
  | |
200 |
An Accomplishment of New level Register File
Management for Montgomery Algorithm in Elliptic curve M.Prabu1 and R.Shanmugalakshmi2, 1Anna University Coimbatore, India and 2Government College of Technology, India |
  | |
201 |
Modified Partial Differential Equation based Adaptive Two- Stage Median Filter for Images Corrupted with High Density
Fixed-Value Impulse Noise Shanmugavadivu P and Eliahim Jeevaraj P S, Gandhigram Rural Institute-Deemed University, India |
  | |
205 |
Cloud Computing for Business continuity K.Geetha |
  | |
206 |
Enhanced Classification Performance using
Computational Intelligence Indrajit Mandal and N.Sairam, Sastra University, India |
  | |
207 |
BB84 Protocol in Quantum Cryptography Based Secure Group Email
Communication V.Anusuya Devi and T.Sampradeepraj, National Engineering College, India |
  | |
208 |
Modeling the evolving Access control policies K.Shantha Kumari and T.Chithralekha, Pondicherry University, India |
  | |
211 |
Fault Diagnosis of Pneumatic valve using
PCA and ANN techniques P. Subbaraj1 and B. Kannapiran2, 1Theni Kammavar Sangam College of Technology, India and 2Arulmigu Kalasalingam college of Engineering, India |
  | |
216 |
A Generalized classification approach for
Indian sign language datasets using instance
based classifiers Ms.M.Krishnaveni and V.Radha, Avinashilingam Deemed University for Women, India |
224 |
Skill Based Automatic Off-Task Detection in Advanced Intelligent Tutoring Systems Pughalveni.R, Pechiammal.C and Venkateshvararao.N, Kings Engineering College, Sriperumbudur, Chennai, India |
227 |
Stegnography-Vectorised And Scaling Approach
For Data Hiding A.Brundha, Sri Ramakrishna Engineering College, India |
229 |
Improvement over Additive Complexity in Divide and Conquer approach of Matrix
Multiplication V Lakshitha Raj, Pratyusha S, Tasleem Fathima J and N. Guruprasad, PES Institute of Technology, India |
230 |
A Hybrid Approach To Statistical Analysis Of Lung Cancer Recurrence Shweta Srivastava and Manisha Rathi,Jaypee Institute of Information Technology, India |
233 |
Enhanced Scheme To Reduce Rendezvous Time Delay P.Vinothkumar, Madras Institute of Technology, Chennai, India |
242 |
Agent based Adaptive learning system R. Gowri, T.T. Sampath Kumar and S.Balaji, Sri Manakula Vinayagar Engineering College, India |
243 |
Real time audio Streaming over low data rate
Wireless system Radhika M and Rama Naidu K, Jawaharlal Nehru Technological University, India |
245 |
Analysis of Surface Absorption Rate on Human Head at Expose 900MHz Gaurav R Joshi and Kalpesh H Wandrah , CCET, Wadhwan, India |
246 |
GPGPU Implementation of Parallel Memetic Algorithm for VLSI Floorplanning Problem Subbaraj Potti 1, SivaKumar Pothiraj 2,1Theni Kammavar Sangam College of Technology, Theni and 2Arulmigu Kalasalingam College of Engineering, Krishnankoil, Tamil Nadu, India. |
247 |
Improving Cloud Security through Virtualization Loganayagi B and Sujatha S, Anna University of Technology Tiruchirappalli (Main Campus), India |
248 |
Expert System Design based on Wavelet Transform and Non-Linear Feature Selection Pritish Ranjan Pal and Gitartha Goswami, National Institute of Technology, India |
252 |
Selection of Software Testing Technique: A Multi Criteria Decision Making Approach Monisha Victor1 and Nitin Upadhyay2,1BITS Pilani and 2K. K. Birla Goa Campus, India |
253 |
Expert System Design based on Wavelet Transform and Non-Linear Feature Selection Pritish Ranjan Pal and Gitartha Goswami, National Institute of Technology, India |
254 |
The comparative analysis of EAP
Re-authentication
Protocol and EAP AKA Protocol R.NARMADHA1 and S.MALARKKAN2,1Sathyabama University and 2 Manakula Vinayagar Institute of Technology, India |
255 |
Enhancing Security of IEEE 802.11i Wireless Networks using software implementation of AES-CCMP with improved Nonlinear S-Box R.Velayutham1 and D.Manimegalai2,1Einstein College of Engineering, India and 2National Engineering College, India |
256 |
Design Paradigm and Risk Assessment of Hybrid Re-engineering with an approach for development of Re-engineering Metrics Sandhya Tarar, Shashank Sharma and Prateek Jain,Gautam Buddha University (State University), Greater Noida, India |
258 |
A Hybrid Evolutionary Algorithm for the Pagenumber Problem Dharna Satsangi, Kamal Srivastava and Gursaran, Dayalbagh Educational Institute, Agra, India. |
260 |
Trust-enhanced Recommendation of Friends in Web Based Social Networks Using Genetic Algorithms to Learn User Preferences Vinti Agarwal and Kamal K. Bharadwaj, Jawaharlal Nehru University, India. |
261 |
Modeling and Verication of Server Aided
Verication Protocol using NuSMV Vikram Saralaya, Kishore J K, Sateesh Reddy, and Sanjay Singh, Manipal University,India. |
262 |
Modeling and Verication of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier Punit Mundra, Madhavi Sharma, Shobhit Shukla, and Sanjay Singh, Manipal Institute of Technology, Manipal University, Manipal, India |
263 |
Secure Association Rule Mining for Distributed Level Hierarchy in Web Gulshan Shrivastava and Vishal Bhatnagar, Ambedkar Institute of Technology, India. |
264 |
Private and Secure Hyperlink Navigability
Assessment in
Web Mining Information System Kavita Sharma and Vishal Bhatnagar, Ambedkar Institute of Technology, India. |
265 |
An Efficient Novel Sequential Mining Technique Khushboo Hemnani, Setu Chaturvedi and Bhupendra Verma, T.I.T Bhopal, India |
266 |
Indexing of Documents using Light Weight Ontolog K.Saruladha, G.Aghila, P.Giridhar Reddy, M.Abinesh,N.Dhanigai Arasan and S.Sujesh, Pondicherry Engineering College, India. |
268 |
A Neural Network Based Approach For Recognition Human Motion Using Stationary Camera Rachana V. Modi and Tejas B. Mehta |
269 |
Overview of Implantable Antennas in the Recent Years S.Suganthi1,S.Raghavan2 and D.Kumar3,1Shri Angalamman College of Engineering and Technology,2National Institute of Technology and 3Periyar Maniammai University |
273 |
Performance evaluation of cache replacement Algorithms for Cluster Based Cross layer design for Cooperative Caching (CBCC) in Mobile-Ad Hoc Networks Madhavarao Boddu, Suresh Joseph k and Madarapu Naresh Kuma, Pondicherry University, India |
275 |
A New Bluetooth Security Architecture Mintu Philip and Asha Das, Toc H Institute of Science and Technology, Kerala, India |
277 |
Sensitive Multiple Object Motion Detection in Satellite Videos Using Iterated Training Algorithm Ferdin Joe J and B.Vijayakumar, Einstein College of Engineering, India |
278 |
SVM Based scheme for Predicting Number of Zombies in a DDoS Attack P. K. Agrawal1, B. B. Gupta2,3 and Satbir Jain1, 1Netaji Subhas Institute of Technology 2Graphic Era University and 3Indian Institute of Technology Roorkee, India |
281 |
A New Trace Backing Algorithm for Maximizing Streaming Data Join G. Hemalatha, Karunya University, Coimbatore, India |
282 |
A Comparative Analysis Of Demand Assignment Multiple Access Protocols For Wireless Atm Networks C Shanmuganathan 1, P Raviraj 2,1St.Peters College of Engg.& Tech, India and 2SKP Engineering College, India. |
283 |
Software Testing in a Game-Theorists Perspective Anand P Pai, ISRO Satellite Centre, India |
285 |
Perceptual Linear Predictive
Cepstral Coefficient For Malayalam
Isolated Digital Recognition Cini Kurian, Cochin University of Science & Technology, India |
289 |
Agent Based Modeling of Individual Voting Preferences
with Social Influence Swati Basak and Neelam Modanwal, Banaras Hindu University, India |
290 |
AModel Based Hybrid Approach to Prevent SQL
Injection Attack in PHP Kunal Sadalkar, Radhesh Mohandas and Alwyn R. Pais1, National Institute of Technology Karnataka, India |
292 |
Texture analysis of brain MRI and classification with BPN for the diagnosis of dementia T.R.Sivapriya1, V.Saravanan2 and Ranjit Jeba Thangaiah3, 1Lady Doak College, Madurai, India, 2Dr.N.G.P. Institute of Technology, Coimbatore, India and 3Karunya University, Coimbatore, India. |
  | |
293 |
A host based kernel level rootkit detection
mechanism using clustering technique Anita John and Jestin Joy,Rajagiri School of Engineering & Technology, India |
295 |
Fuzzy Clustering for Effective Customer Relationship Management in Telecom Industry
Gayathri Asokan and Mohanavalli S,Sri Sivasubramaniya Nadar College of Engineering, India |
299 |
A Novel Approach for the Prediction of Glucose Concentration in Type 1 Diabetes Ahead in Time through ARIMA and Differential Evolution S.Shanthi1 and D.Kumar2, 1JJ College of Engineering and Technology and 2Periyaar Maniammai University, India |
300 |
Dematerialized Deposits using XSI NVKD Ramesh Gorrila, V. Radha, Surabhi Upender and Vijay Kumar Bandiki, Institute for Development and Research in Banking Technology, Hyderabad, India |
301 |
E-Lending platform Vijay Kumar Bandiki1, V. Radha2,1University of Hyderabad, 2Institute for Development and Research in Banking Technology, India. |
302 |
Classifying Gender from Faces using Independent Components Sunita Kumari and Banshidhar Majhi, National Institute of Technology, India. |
303 |
Fast Solution Algorithms for the Simple Motif Problem Tarek El Falah1,2, Thierry Lecroq2, and Mourad Elloumi1, 1 LITIS, Tunsia and 2University of Rouen, France. |
  | |
304 |
Server Side Solution for Prevention Against Temporal DoS Attack and Phishing Attack on ONLINE Banking Systems Aman Rayamajhi1 and Alwyn Roshan Pais1, National Institute of Technology Karnataka, India. |
305 |
Secure Web Services Negotiation Vakul Mohanty and Chittaranjan Hota, Birla Institute of Technology and Sciences Pilani, India |
306 |
A Recommender System for Rural and Urban learners Charles. S, Arockiam. L, Arul Kumar.V and P.Cijo, St Josephs College, Tiruchirappalli, India. |
308 |
Study of Organizational Factors affecting Usability of Online Helps with Programming Languages Nilesh Dhannaseth, Ganesh Bhutkar, Vishwakarma Institute of Technoogy, India. |
310 |
Improving Performance of Face Detection System Using GPU Devrari Kailash, Kumar K.Vinay, National Institute of Technology Karnataka Surathkal, India |
311 |
A New Information Content Based Measure for Multiple Ontology and Their Application to Information Retrieval and Ontology Mapping K.Saruladha, G.Aghila, A.Bhuvaneswary, Pondicherry Engineering College, Puducherry, India |
312 |
CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs Raviteja B.L, Annappa B and Mohit P.Tahiliani, National Institute of Technology Karnataka, Surathkal, India. |
314 |
Achieving the Service Level Agreement in Cloud Computing Environment using Hierarchical Scheduling Varalakshmi and Rajkumar Rajavel, Anna University, India. |
315 |
A Cognitive Approach For Runtime Service Integration Using Finite State Machine Thirumaran.M, Dhavachelvan.P, Aranganayagi.G and Karthikeyan.M, Pondicherry University, India. |
316 |
A VERSATILE SURVEY REGARDING A GENUINE WSN DESIGN Avik Modak1 and Anuran Roy Chowdhury2,1,2 Mckv Institute Of Engineering, Lilua, Howrah, India. |
317 |
A DKIM based architecture for combating good word attack in statistical spam filters K.Saruladha, K.Kashefa Kowser, M.Packiavathy, Pondicherry Engineering College, Puducherry, India . |
318 |
Finding Reliable Path for Peer to Peer Application in Mobile Environment Jayashree.D, Yogesh.P, Anna University, India. |
319 |
Text Mining for Interpreting Gene K.Prabavathy 1 and Sumathirajesh 2, 1 PSG College of Arts and Science, India and 2Chikkanna Govt. Arts College, India. |
320 |
Improved Input-delayed Dynamic Neural Network for GPS/INS Integration M.Malleswaran, A.Saravanaselvan, and V.Vaidehi, Anna University of Technology, India |
323 |
Application of Artificial neural network for the prediction of groundwater level in hard rock region M.Kavitha Mayilvaganan and K.B.Naidu,Sathyabama University, Chennai, India. |
325 |
Embedded Based Wireless Body Sensor (Mems) Networks For Remote Patient Monitoring Using Fontane S.Sreedevi and V.Gowri, S.A.Engineering College, India |
326 |
Energy Effcient and Fault Tolerant GPSR in Ad Hoc Wireless Network Jyotsana Jaiswal and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India. |
327 |
An Efficient Data Replication For Mobile Ad Hoc Networks R.Nandha Kumar and P.Ramesh, Anna University, India |
328 |
Performance analysis of System call intensive s/w application execution by server based microprocessors, AMD Opteron 2220 SE vs INTEL Xeon E5506: A study of system call intensive application execution performance Roshan Weerasuriya and Nalin Ranasinghe, University of Colombo, Sri Lanka |
329 |
AN IDE For Developing Mobile Applications For Smart Phones Sakila Banu Ali, Nisar Hundewale, Garva Taif University, Saudi Arabia. |
330 |
Function Approximation using SVM with FCM and slope based partition Amera Almas and Nisar Hundewale, Taif University, Saudi Arabia |
332 |
A PIC-Controller Based Doubly Fed Induction Generator (DFIG) for Wind Energy Conversion Systems K. Sureshkumar, P. Vijaya kumar and R. Dhandayuthabani, Velammal Engineering college, India. |
334 |
Packet Scheduling Scheme with enhanced Quality of Service for Mobile WiMAX V. Sampath Kumar, C.Kalyana Chakravarthy and V. R. L. Priyanka, M.V.G.R.College of Engineering, India. |
335 |
Physical Layer Authentication in Wired and Wireless Communication Systems Chandra Mouli and Sanjay Singh,Manipal Institute of Technology, Manipal University, Manipal, India. |
341 |
Cloud SaaS: Models and Transformation Ritu Sharma and Manu Sood, Himachal Pradesh University Summer Hill, Himachal Pradesh, India |
342 |
An Analytical Framework for Multi-Document Summarization Jayabharathy, Kanmani and Buvana, Pondicherry Engineering College Puducherry, India. |
344 |
Future Robotics Memory Management System S.Vijaykumar1, S.G.Saravanakumar 2 and K.Venkata Lakshmi 3, 1 Thiagarajar School of management, India 2Sastra University, India and 3 Periyar Maniammai University, India. |
345 |
An Enhanced Data Summarization for Privacy Preservation Incremental Data Mining V.Rajalakshmi1, G.S.Ananthamala2, 1 Sathyabama University, India and 2 St.Josephs College of Engineering, India |
347 |
Watermarking minutiae features in face image using RDWT and SVD Samira Lagzian, Mohsen Soryani and Mahmood Fathi, Iran University of Science and Technology, Iran |
350 |
A Conscious Semantic Web towards Security Attacks:A Survey Akhilesh Dwivedi and Suresh Kumar, Ambedkar Institute of Technology, India |
351 |
Impact of outliers on Anonymized Categorical Data Venkata Ramana. K, Valli Kumari. V and Raju KVSVN, Andhra University Visakhapatnam, Andhra Pradesh, India. |
352 |
Privacy in Mobile Ad Hoc Networks Jhansi Vazram. B1, Valli Kumari. V2, Murthy J.V.R3 ,1 Narasaraopeta Engg. College, India, 2Andhra University, India, and 3J N T University, India. |
353 |
A new face recognition method based on Curvelet Transform Samira Lagzian, Mohsen Soryani and Mahmood Fathi, Iran University of Science and Technology, Iran. |
355 |
Prototype based Performance Prediction of Web Services Ch Ram Mohan Reddy1, D Evangelin Geetha2, KG Srinivasa2, T V Suresh Kumar2 and K Rajani Kanth2, 1B M S College of Engineering, India and 2M S Ramaiah Institute of Technology, India |
  | |
356 |
A Novel Model for Web Service Business Logic Change Management Thirumaran.M, Dhavachelvan.P, Aranganayagi.G and Seenuvasan.K, Pondicherry Engineering College, India |
Important Dates
Paper Submission Deadline:
25 April, 2011
Paper Status Notification:
20 June, 2011
Camera-ready Due:
01 July, 2011
Conference :
Sep 23~25, 2011