Accepted Paper
13 |
Global Chaos Synchronization of Arneodo Chaotic System via Backstepping Controller Design Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India |
19 |
Host based Attack Detection using System Calls Jestin Joy1 and Anita John2, 1Federal Institute of Science and Technology, India and 2Rajagiri School of Engineering and Technology, India |
25 |
Harmony-based Feature Selection to Improve the Nearest Neighbor Classification Ali Adeli1, Mehrnoosh Sinaee2, Javad Zomorodian3 and Mehdi Neshat4, 1Bojnurd Darolfonoun Technical College, Iran, 2University of Applied Science & Technology, Iran, 3Shiraz Bahonar Technical College, Iran and 4Islamic Azad University, Iran |
28 |
CMMI Based Software Metrics to Evaluate OOAD Meena Sharma1 and Rajeev G Vishwakarma2, 1Devi Ahilya University, India and 2Rajiv Gandhi Technical University, India |
29 |
Cloud Algebra for Cloud Database Management System Mansaf Alam, Jamia Millia Islamia, India |
30 |
Fusion of Gray Scale Images Using Self Organizing Feature Maps Anna Saro Vijendran and G.Paramasivam, SNR Sons College, India |
31 |
Implementation of Biometrics based Security System with Integrated Techniques S.Jeyanthi, N.Uma Maheswari and R.Venkatesh, PSNA College of Engg & Tech, India |
32 |
Parallelization of Pollard's Rho Integer Factorization Algorithm Harish G, Anjan K Koundinya, Srinath N. K, Punith Kumar G, Pramod Y. V, Raghavendra Kumar G.E, Sandeep R., Archit Shukla and Madan Acharya, R.V College of Engineering, India |
33 |
Hybrid Network Intrusion Detection System Using Expert Rule Based Approach A.S.Aneetha, T.S. Indhu and S.Bose, Anna University - Chennai, India |
34 |
Preprocessing of Web Log File : A Survey V.A. Losarwar1 and M.S. Joshi2, 1P.E.S College of Engineering, India and 2Govt. College of Engineering and Research, India |
36 |
A Novel Approach for Dynamic Leader Election and Key Based Security in MANET Clusters for the Secured Data Distribution Arifa Azeez and Preetha K G, Rajagiri School of Engineering & Technology, India |
43 |
A Statistical Approach to the Relative Performance Analysis of Sorting Algorithms Niraj Kumar Singh and Soubhik Chakraborty, Birla Institute of Technology, India |
46 |
Secure Multipoint Relay based Routing in MANET Himadri Nath Saha1, Debika Bhattacharyya1 and P.K.Banerjee2, 1IEM, India and 2JU, India |
47 |
Discretization in Gene expression Data Analysis: A selected survey Priyakshi Mahanta1, Hasin Afzal Ahmed1, Dhruba K. Bhattacharyya1 and Jugal K.Kalita2, 1Tezpur University, India and 2University of Colorado, USA |
48 |
Low Profile Printed Antenna Array for LTE/WWAN with Low SAR T.Thomas1, Y.V.B.Reddy1, A.M.Prasad2 and K.Veeraswamy1, 1QISCET, India and 2JNTUK, India |
49 |
Network Module Extraction with Positive and Negative Co-regulation Tahleen Rahman and Dhruba Bhattacharyya, Tezpur University, India |
50 |
A Framework for the Description, Discovery and Composition of RESTful Semantic Web Services Davis John and Rajasree M. S, College of Engineering, India |
51 |
Enhancement of job Allocation in Private Cloud by Distributed processing Soumen Kanrar, Vehere Interactive Pvt Ltd, India |
53 |
A Framework for Response-awaiting-service migration in Ubiquitous Computing Irene Antony Tharayil and Rajasree M.S, College of Engineering, India |
57 |
Efficient Strategy for Co-Ordinated Multirobot Exploration Sonali Patel, Anupam Shukla and Ritu Tiwari, Indian Institute of Information Technology and Management, India |
59 |
A High-Level Fortran Interface to Parallel Matrix Algebra Martin Roderus, Alexei Matveev and Hans-Joachim Bungartz, Technische Universitat Munchen, Germany |
64 |
Trust based Secure Multipath OLSR Routing Protocol in MANET using Fuzzy Theory S.Geetha and G.Geetha Ramani, Anna University-Tiruchirappalli, India |
66 |
Elicitation of Security Requirements for E-Health System by applying Model Oriented Security Requirements Engineering (MOSRE) Framework P.Salini and S.Kanmani, Pondicherry Engineering College, India |
74 |
Efficient Feature Fusion, Selection and Classification Technique for Plant Leaf Image Retrieval System N.Valliammal and S.N.Geethalakshmi, Avinashilingam Institute for Home Science and Higher Education for Women, India |
75 |
Fault Tolerance - Case Study Abbas Mohammed1, Roshan Kavuri2 and Niraj Upadhyaya2, 1VIF College of Engg & Tech, India and 2JB Institute of Engg & Tech, India |
83 |
Enhancing the Security of Digital Video Watermarking using Watermark Encryption Ujan Mukhopadhyay, Souptik Sinha, Poulomi Ghosh, Rilok Ghosh, Dipak Kr.Kole and Aruna Chakroborty, St. Thomas College of Engineering and Technology, India |
85 |
On Watson-Crick Automata K.G. Subramanian1, S. Hemalatha2 and Ibrahim Venkat1, 1Universiti Sains Malaysia, Malaysia and 2S.D.N.B. Vaishnav College, Chennai |
99 |
Efficient Content-based Indexing of Sequential data with Bitmaps Ritambhra Korpal, University of Pune, India |
103 |
Some New Properties of Lists and a Framework of a List Theoretic Relation Model B.K.Tripathy1 and S.S.Gantayat2, 1VIT University, India and 2GMR Institute of Technology, India |
104 |
Exploring Routing with Multiple Quality of Service Parameters in High-Speed Networks Monika Jena1 and Ajay Rana2, 1Amity School of Computer Sciences, India and 2Amity University, India |
105 |
A Special Purpose Integer Factorization Algorithm Porkodi Chinniah1, Nagarathnam Muthusam2 and Arumuganathan Ramalingam1, 1PSG College of Technology, India and 2Carnegie Mellon University, USA |
108 |
W-PAC: An Efficient Weighted Partitioning Around Cluster Head Mechanism for Ad Hoc Network S.Thirumurugan1 and E.Geroge Dharma Prakash Raj2, 1JJ College of Engineering & Technology and 2Bharathidasan University, India |
112 |
A Re-Usability Approach to Ontology Construction Ayesha Banu1, Syeda Sameen Fatima2 and Khaleel Ur Rahman Khan3, 1Kakatiya University, India, 2Osmania University, India and 3ACE Engineering College, India |
113 |
A DDoS Attack Detection Mechanism Based on Protocol Specific Traffic Features Hirak Jyoti Kashyap and D K Bhattacharyya, Tezpur University, India |
114 |
Geographic Routing Used in MANET for Black Hole Detection M. Shobana, R.Saranyadevi and S.Karthik, SNS College of Technology, India |
115 |
Finite State Machine Optimization in FPGAs
R.uma and P. Dhavachelvan, Pondicherry University, India |
116 |
Low Frequency Keyword and Keyphrase Extraction from Meeting Transcripts with Sentiment Classification using Unsupervised Framework J.I.Sheeba and K.Vivekanandan, Pondicherry Engineering College, India |
117 |
An MRA Based Image Fusion Method for Sanctuary Based on NC Sangeeta Gupta, Sujoy Bhattacharya and S Hemanth Chowdary, Padmasri Dr B V Raju Institute of Technology, India |
118 |
A Novel Color Image Steganography using Discrete Wavelet Transform Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, Manipal University, India |
122 |
Continuous Speech Recognition System for Tamil Language Using Monophone-based Hidden Markov Model Radha.V, Vimala.C and Krishnaveni.M, Avinashilingam Institute for Home Science and Higher Education for Women, India |
126 |
Statistical Normalization Techniques for the Prediction of COD Level for an Anaerobic Wastewater Treatment Plant
R.Vijayabhanu and V.Radha, Avinashilingam Institute for Home Science and Higher Education for Women, India |
127 |
Performance Enhancement for Variable Block Optimization in FGPA Synthesis Process R.uma and P. Dhavachelvan, Pondicherry University, India |
128 |
Binarization in Magnetic Resonance Images (MRI) of Human Head Scans with Intensity Inhomogeneity K.Somasundaram and T.Genish, Gandhigram Rural Institute, India |
130 |
Survey of Caching And Replica Placement Algorithm for Content Distribution In Peer-To-Peer Overlay Networks Anna saro vijendran and S.Thavamani, S.N.R SONS COLLEGE, India |
137 |
Detecting Epileptic Seizures Using Electroencephalogram: A Novel Technique for Seizure Classification using Fast Walsh-Hadamard Transform and Hybrid Extreme Learning Machine G.Geetha and S.N.Geethalakshmi, Avinashilingam Institute for Home Science and Higher Education for Women Deemed University, India |
140 |
A Multi-dimensional Recommendation Algorithm Based on Bipartite Network Projection Xiangyun Xiong, Yuchen Fu and Zhaoqing Liu, Soochow University, China |
141 |
Swarm Optimization and Flexible Neural Tree for Microarray Data Classification Aruchamy Rajini1 and Vasantha kalyani David2, 1Hindusthan College of Arts & Science, India and 2Avinashilingam Deemed University, India |
142 |
Graphical method to Find Optimal Cluster Centroid for Two-variable Linear Functions of Concept-drift Categorical Data K.Reddy Madhavi1, A.Vinaya Babu2, A.Anand Rao1 and S.Viswanadha Raju1, 1JNTUA, India and 2JNTUH, India |
144 |
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer Relationship Management (CRM) P.Senthil Vadivu1 and Vasantha Kalyani David2, 1Hindusthan College Of Arts and Science, India and 2Avinashilingam Deemed University, India |
146 |
An Enhanced Secure Preserving for Pre-Processed Data using DMI and PCRBAC Algorithm Ramya.R.S, Priyadarshini.S and S.Karthik, SNS College of Technology, India |
147 |
An Efficient Digital Mammogram Image Classification using DTCWT and SVM S.Deepa1 and V.Subbiah Bharathi2, 1Sathyabama University, India and 2DMI College of Engineering, India |
148 |
Agent Based Memory Management Framework for a Multi processor environment K.R.Sarath Chandran, Aiswarya S, Kavitha R and Suganthi Krishnavathi T, SSN College of Engineering, India |
150 |
Survey of cyber crime activities and preventive measures Ramesh P and Maheshwari D, RVS College of Arts and Science, India |
151 |
Automatic Brain Portion Segmentation from T1-weighted and T2-weighted of Coronal MRI Head Scans using Bond Number and Block Truncation Method K. Somasundaram and K. Ezhilarasan, Gandhigram Rural Institute (Deemed University), India |
153 |
Text Classification using Symbolic Similarity Measure B S Harish1, S Manjunath2 and D S Guru3, 1S J College of Engineering, India, 2JSS College of Arts, Commerce and Science, India and 3University of Mysore, India |
156 |
Business Workflow Growth Rate Analysis Using Cellular Automata M. Thirumaran, Dhavachelvan. P, Aishwarya.D and Naga Venkata Kiran. G, Pondicherry Engineering College, India |
159 |
Synthesis Optimization by Redesigning FPGA Architecture for Area-Speed optimization R.uma and P. Dhavachelvan, Pondicherry University, India |
160 |
A Survey of Techniques for Human Detection in Static Images T.Santhanam1, C.P.Sumathi2 and S.Gomathi2, 1Dwaraka Doss Goverdhan Doss Vaishnav College, India and 2Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for women, India |
163 |
Design of 9-Transistor Single Bit Full Adder Manoj Kumar, Guru Jambheshwar University of Science & Technology, India |
164 |
An application of PCA to rank problem parts K. M. George, Oklahoma State University, USA |
166 |
Image Fusion using Bi-Dimensional Empirical Mode decomposition for Salt and Pepper Noise Removal in Digital Images M.PremaKumar1 and P.Rajesh Kumar2, 1Sri Vishnu Engineering College for Women, India and 2Andhra University, India |
167 |
Modeling & Verification of Sliding Window Protocol with Data Loss and Intruder Detection using NuSMV Aditya Sinha, Ajay RY and Sanjay Singh, Manipal University, India |
168 |
A Study on Human Gait Analysis Saman Shahid, Anup Nandy, Soumik Mondal, Maksud Ahmed, Pavan Chakraborty and G C Nandi, Indian Institute of Information Technology Allahabad Robotics & AI Lab, India |
170 |
Formal Verification of the Extensible Authentication Protocol using SPIN Manu S.Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India |
173 |
Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization Sangita Roy1, Avinash Kumar Singh2, Jyotirmayee Parida3 and Ashok Singh Sairam1, 1Indian Institute of Technology - Patna, India, 2Indian Institute of Information Technology, India and 3Modern Institute of Technology and Management, India |
174 |
Next Generation Biometric Security System An approach for Mobile Device Security Sujithra M and Padmavathi G, Avinashilingam Institute for Home Science and Higher Avinashilingam Institute for Home Science and Higher Education for Women, India |
179 |
Multimodal Pattern-Oriented Software Architecture for Self-Configuration and Self-Healing in Autonomic Computing Systems Vishnuvardhan Mannava1 and T. Ramesh2,1K L University,India and 2National Institute of Technology,Warangal,India |
180 |
Information Gain Clustering Through Prototype - Embedded Genetic K-Mean Algorithm (IGCPGKA) A Novel Heuristic Approach for Personalisation of Cold Start Problem Mohd Abdul Hameed1, S. Ramachandram1 and Omar Al Jadaan2, 1Osmania University, India and 2Medical and Health Sciences University, UAE |
181 |
Cross-Layer IDS for Rushing Attack in Wireless Mesh Networks K. Ganesh Reddy, P. Santhi Thilagam and Bommena Nageswara Rao, NITK, India |
182 |
A Service Configuration and Composition Design Pattern for Autonomic Computing Systems using Service Oriented Architecture Vishnuvardhan Mannava1 and T. Ramesh2,1K L University,India and 2National Institute of Technology,Warangal,India |
190 |
Storing XML Rules in Relational Storage of XML DTD A. A. Abd El-Aziz and A. Kannan, Anna University, India |
196 |
A Fuzzy based Trustworthy Route Selection Method using LSRP in Wireless Sensor Networks (FTRSP) Arnab Raha1, Arpita Chakraborty2, Shovan Maity1, Mrinal Kanti Naskar1 and Anupam Karmakar3, 1Jadavpur University, India, 2WBUT, India and 3University of Calcutta, India |
198 |
Context Similarity Measure Using Fuzzy Formal Concept Analysis K.Selvi and R.M. Suresh, Sathyabama University, India |
199 |
K-Means with Bi-dimensional Empirical Mode Decomposition for Segmentation of Microarray Image J.Harikiran, M.Phanendra, N.N.Swamy, P.V.Lakshmi and R.Kiran Kumar, GITAM, India |
200 |
An Efficient Hybrid Algorithm to Evolve and Awale Player Randle Oluwarotimi Abayomi, Tshwane University of Technology, South Africa |
211 |
Privacy Preserving k-medoids Clustering: An Approach towards Securing Data in Mobile Cloud Architecture Sanjit Kumar Dash1, Debi Pr. Mishra1, Ranjith Mishra1 and Sweta Dash2, 1College of Engineering & Technology, India and 2Synergy Institute of Engg & Technology, India |
220 |
An Efficient Secure Code Approach Based on Indexed Table Quasi Group Encryption with Hadamard and Number Theoretic Transformation for Software Protection Sasirekha N and Hemalatha M, Karpagam University, India |
223 |
Format Based Photo Forgery Image Detection S.Murali1, Govindraj B. Chittapur2 and H.S. Prabhakara1, 1MIT, India, 2Basaveshwar Engineering College, India |
224 |
Comparative & Evaluative QA System in Tourism Domain Pinaki Bhaskar, Bidhan Chandra Pal and Sivaji Bandyopadhyay,Jadavpur University,India |
228 |
Ontological Student Profile Ayesha Ameen1, Khaleel Ur Rahman Khan2 and B.Padmaja Rani3, 1Deccan College of Engineering and Technology, India, 2ACE Engineering College, India and 3JNTU, India |
229 |
Cancer data investigation using variable precision rough set with flexible classification Sanjiban Sekhar Roy, Anupam Gupta, Anvesha Sinha and Rohit Ramesh, VIT University, India |
230 |
K-Level Based Transmission Range Scheme to Alleviate Energy Hole Problem in WSN K.Thanigaivelu and K.Murugan, Anna University, India |
231 |
Recent Frequent Itemsets Mining Over Data Streams Pramod S1 and O.P.Vyas2, 1Christian College of Engineering, India and 2IIIT-Allahabad, India |
235 |
Risk chain prediction metrics for predicting fault proneness in Object Oriented Systems N.Rajasekhar Reddy, Surya Bahadur and K.R.K Sateesh, Madanapalli Institute of Technology and Science, India |
236 |
Edge Detection by combined Canny Filter with Scale Multiplication & Ant Colony Optimization Manish T I1, D Murugan2 and Ganesh Kumar T2, 1MET'S School of Engineering, India and 2Manonmaniam Sundaranar University, India |
237 |
Performance of Detecting Defects in Textile Fabric using Gabor Wavelet with Statistical and Morphological Filters Anitha.S and V.Radha, Avinashilingam Institute for Home Science and Higher Education for Women, India |
238 |
Structure Based Drug Design Studies on Urokinase Plasminogen Activator Inhibitors using AutoDock M. Naresh Babu1, R. Bhramarambha2 and Allam Appa Rao1, 1C R Rao Advanced Institute of Mathematics, Statistics and Computer Science, 2GITAM University |
241 |
A Comparative Study of Two Formal Specification Query Processing in Mobile Environment Marfa M 1,Subu Surendran1,Sabu M Thampi2 ,SCT College of Engineering Trivandrum, Kerala, India. 1,Indian Institute of Information Technology and Management- Kerala Technopark, Trivandrum, India. 2 |
242 |
A M2MC Based Approach for Mapping Two ADL Models Sai Bharath Kadati1, K. K. Baseer1, A. Rama Mohan Reddy2 and C. Shoba Bindu3, 1SVEC, India, 2Sri Venkateswara University, India and 3Jawaharlal Nehru Technological University, India |
244 |
Real Time Recognition Of Pedestrian and Vehicles From Video Gokul S, G Santhosh Kumar and Sreeraj M, Cochin University of Science and Technology, India |
245 |
A Comparative Study of Two Formal Specification Languages: Z-Notation & B-Method Arvinder Kaur, Samridhi Gulati and Sarita Singh, Guru Gobind Singh Indraprastha University, India |
247 |
Polymorphic Worms Detection Using Extended PolyTree A.Uzma Jabrooth and B.Parvathavarthini, St. Joseph’s College of Engineering, India |
252 |
Efficient Method for Feature Extraction on Video Preocessing R.Revathi and M.Hemalatha, Karpagam University, India |
255 |
Performance Analysis of Decomposition Techniques in Multilevel Secure Relational Database Systems Pooja Sapra, Suresh Kumar and R K Rathy, MRIU, India |
258 |
Face Recognition Using Facial Symmetry Avinash Kumar Singh and G. C. Nandi, IIT - Allahabad, India |
261 |
Reduct Generation of Microarray Dataset Using Rough Set and Graph Theory for Unsupervised Learning Asit Kumar Das11, Soumen Kumar Pati2 and Saikat Chakrabarty1, 1Bengal Engineering & Science University, India, 2St.Thomas College of Engineering and Technology, India |
263 |
An ECC based Public Key Infrastructure usable for Mobile Applications Sangram Ray and G. P. Biswas, Indian School of Mines, India |
266 |
Complex-valued neural network using Simultaneous Perturbation with Dynamic Tunneling technique M.Sornam and P.Thangavel, University of Madras, India |
268 |
Stationary Wavelet Transform Based Audio Authentication Technique Tanmay Bhattacharya1, Sirshendu Hore2, Nilanjan Dey1 and S. R. B Chaudhuri3, 1JIS College of Engineering, India, 2Hooghly Engineering & Technology College, India and 3Bengal Engineering and Science University, India |
270 |
Perceptive Analysis of Query by Singing System through Query Excerption Trisiladevi C. Nagavi1 and Nagappa U. Bhajantri2, 1S.J.College of Engineering, India and 2Government Engineering College, India |
273 |
An Empirical Study on Various Text Classifiers B S Harish, Ramya M Hegde, M Meghana and N Neeti, S J College of Engineering, India |
274 |
Feature Based Classification of Dysfluent and Normal Speech P.Mahesha and D.S.Vinod, S.J.College of Engineering, India |
275 |
Web Opinion Mining for Social Networking Sites Bishas Kaur, Aarpit Saxena and Sanjay Singh, Manipal University, India |
277 |
An Extensive Empirical Study of Feature terms Selection for Text Summarization and Categorization Suneetha Manne1 and S. Sameen Fatima2, 1VR Siddhartha Engineering College, India and 2Osmania University, India |
278 |
Interoperability Issues in Web Services Kalpana Johari1 and Arvinder Kaur2, 1Centre for Development of Advanced Computing, India and 2GGSIP University, India |
282 |
Design and Development of a Desktop Monitoring System Vikram Kumar Santhalia and Sanjay Singh, Manipal University, India |
283 |
A New Deferred cleansing technique for Effective Warehousing of RFID A.Anny Leema and Hemalatha.M, Karpagam University, India |
291 |
A new approach of voice conversion based on the GMM model Abdelkader Guerid and Amrane Houacine, USTHB, Algeria |
295 |
Implementation of DES using Pipelining concept with Skew Core Key Scheduling in Secure Transmission of Images Praveen.K, PrabaharanPoornachandran and Remya Ajai A S, Amrita Vishwa Vidyapeetham, India |
298 |
Word Category Disambiguation for Malayalam: A Language Model Approach Dinesh T, Jayan V and Bhadran V K, Centre for Development of Advanced Computing (C-DAC), India |
301 |
Authenticity Check to provide Trusted Platform in MANET (ACTP) Renu Dalal1, Manju Khari1 and Yudhvir Singh2, 1AIACTR, India and 2U.I.E.T M.D University, India |
304 |
HTB Based Packet Scheduler for Cloud Computing Soumya Antony, Simy Antony, Ajeena Beegom A S and Rajasree M S, College of Engineering, India |
309 |
Online Handwritten Character Recognition for Malayalam Amritha Sampath1, Tripti C1 and Govindaru V2, 1Rajagiri School of Engineering and Technology, India and 2Centre for Development of Imaging Technology, India |
311 |
Improved K-Means Clustering Algorithm for Two Dimensional Data Rupali Vij and Suresh Kumar, Manav Rachna International University, India |
315 |
Implementation of Least Significant Bit Steganography and Statistical Steganalysis V. Lokeswara Reddy1, A.Subramanyam2, P. Chenna Reddy3, 1K.S.R.M. College of Engg., India, 2AITS, India and 3JNTUCE, India |
319 |
Fast Novel Image Reconstruction Algorithm Using Adaptive R-Tree Based Segmentation and Linear Bivariate Splines Anshul Sood1, Monish Kaul2 and Rajesh Siddavatam1, 1Jaypee University of Information Technology, India and 2McAfee Software Pvt Ltd, India |
320 |
Correlation Power Analysis Attack of AES on FPGA Using Customized Communication Protocol N.Nalla Anandakumar and S.Dillibabu, Society for Electronic Transactions and Security, India |
329 |
Dynamic Prefix Caching of Videos with Lazy Update Gaurav Aggarwal, Gaurav Kumar and Divyashikha Sethia, Delhi Technological University, India |
332 |
Empirical Study of Software Quality Estimation InderpreetKaur and ArvinderKaur, Guru Gobind Singh Indraprastha University, India |
334 |
A Cross Layer Based Reliable Route Metric for Mobile Ad hoc Networks Gaurav Bhatia1 and Vivek Kumar2, 1Ibri College of Technology, Oman and 2Gurukul Kangri Vishwavidyalya, India |
335 |
Comparative Analysis of Black Hole Attack over Cloud Network under AODV and DSDV Kamaljit Kau1 and Gaurav Raj2, 1Guru Nanak Dev University, India and 2Lovely Professional University, India |
338 |
Delay-bounded Event Detection in Energy Harvesting Sensor Networks Yingchi Mao, Hohai University, China |
342 |
A New Methodology for Diagnosis of Appendicitis Using Sonographic Images in Image Mining R. Balu and T. Devi, Bharathiar University, India |
344 |
Decoding Robustness Performance Comparison for QR and Data Matrix Code Rishabh Kulshreshtha, Ayushi Kamboj and Sanjay Singh, Manipal University, India |
345 |
Virtualization of Virtual Memory Address Space Natarajan Meghanathan, Jackson State University, USA |
348 |
Estimation of Component Reusability by Identifying Quality Attributes of Component - A Fuzzy Approach Aman Jatain and Deepti Gaur, ITM University, India |
349 |
GPS Signal Generation for L1 Frequency using Model Based Design Tools Kota Solomon Raju1, Y.Pratap1,2, Virendra Patel1,2, S.M.M Naidu2, Amit Patwardhan2 and P.Bhanu Prasad1, 1(CEERI) / (CSIR), India and 2International Institute of Information Technology, India |
350 |
Secure Transmission of Authenticated Messages using New Encoding Scheme and Steganography Kalavathi Alla, G.Gowri Shankar and G.Bala Subrahmanyam, Vasireddy Venkatadri Institute of Technology, India |
351 |
A Fair Spectrum Sharing Approach in Cognitive Radio Networks Leila Yousefi, Islamic Azad University of Qazvin, Iran |
353 |
Secure Message Authentication using true random number generator based on Signcryption scheme using ECC Alka Aman and Rajeev G. Vishwakarma, Shri Vaishnav Institute of Technology & Science, India |
354 |
Secure Image Authentication by Distributed Source Coding Using LDPC Encoding Brajesh kumar and Anand Rajavat, Shri Vaishnav Institute of Technology & Science, India |
355 |
Design and Development of an Effective Ball Catching Robotic Arm with 3DOF Kartik Sharma and Gianetan Singh Sekhon, Punjabi University, India |
357 |
Improved Decision Tree Induction: Prioritized Height Balanced Tree with Entropy to find Hidden rules Mohd Mahmood Ali1, M.S. Qaseem2, Lakshmi Rajamani3 and A.Govardhan4, 1Muffakamjah College of Engg. & Technology, India, 2Nizam Institute of Engg. & Technology, India, 3Osmania University, India and 4Jawaharlal Nehru University, India |