The Second International Conference on Computational Science, Engineering
and Information Technology (CCSEIT-2012)


Venue: Avinashilingam University, October 26~28, Coimbatore, India.

  • Home
  • Submission
  • Committee
  • Accepted
  • Workshops
  • Invited Talk

Accepted Paper


13
Global Chaos Synchronization of Arneodo Chaotic System via Backstepping Controller Design
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
19
Host based Attack Detection using System Calls
Jestin Joy1 and Anita John2, 1Federal Institute of Science and Technology, India and 2Rajagiri School of Engineering and Technology, India
25
Harmony-based Feature Selection to Improve the Nearest Neighbor Classification
Ali Adeli1, Mehrnoosh Sinaee2, Javad Zomorodian3 and Mehdi Neshat4, 1Bojnurd Darolfonoun Technical College, Iran, 2University of Applied Science & Technology, Iran, 3Shiraz Bahonar Technical College, Iran and 4Islamic Azad University, Iran
28
CMMI Based Software Metrics to Evaluate OOAD
Meena Sharma1 and Rajeev G Vishwakarma2, 1Devi Ahilya University, India and 2Rajiv Gandhi Technical University, India
29
Cloud Algebra for Cloud Database Management System
Mansaf Alam, Jamia Millia Islamia, India
30
Fusion of Gray Scale Images Using Self Organizing Feature Maps
Anna Saro Vijendran and G.Paramasivam, SNR Sons College, India
31
Implementation of Biometrics based Security System with Integrated Techniques
S.Jeyanthi, N.Uma Maheswari and R.Venkatesh, PSNA College of Engg & Tech, India
32
Parallelization of Pollard's Rho Integer Factorization Algorithm
Harish G, Anjan K Koundinya, Srinath N. K, Punith Kumar G, Pramod Y. V, Raghavendra Kumar G.E, Sandeep R., Archit Shukla and Madan Acharya, R.V College of Engineering, India
33
Hybrid Network Intrusion Detection System Using Expert Rule Based Approach
A.S.Aneetha, T.S. Indhu and S.Bose, Anna University - Chennai, India
34
Preprocessing of Web Log File : A Survey
V.A. Losarwar1 and M.S. Joshi2, 1P.E.S College of Engineering, India and 2Govt. College of Engineering and Research, India
36
A Novel Approach for Dynamic Leader Election and Key Based Security in MANET Clusters for the Secured Data Distribution
Arifa Azeez and Preetha K G, Rajagiri School of Engineering & Technology, India
43
A Statistical Approach to the Relative Performance Analysis of Sorting Algorithms
Niraj Kumar Singh and Soubhik Chakraborty, Birla Institute of Technology, India
46
Secure Multipoint Relay based Routing in MANET
Himadri Nath Saha1, Debika Bhattacharyya1 and P.K.Banerjee2, 1IEM, India and 2JU, India
47
Discretization in Gene expression Data Analysis: A selected survey
Priyakshi Mahanta1, Hasin Afzal Ahmed1, Dhruba K. Bhattacharyya1 and Jugal K.Kalita2, 1Tezpur University, India and 2University of Colorado, USA
48
Low Profile Printed Antenna Array for LTE/WWAN with Low SAR
T.Thomas1, Y.V.B.Reddy1, A.M.Prasad2 and K.Veeraswamy1, 1QISCET, India and 2JNTUK, India
49
Network Module Extraction with Positive and Negative Co-regulation
Tahleen Rahman and Dhruba Bhattacharyya, Tezpur University, India
50
A Framework for the Description, Discovery and Composition of RESTful Semantic Web Services
Davis John and Rajasree M. S, College of Engineering, India
51
Enhancement of job Allocation in Private Cloud by Distributed processing
Soumen Kanrar, Vehere Interactive Pvt Ltd, India
53
A Framework for Response-awaiting-service migration in Ubiquitous Computing
Irene Antony Tharayil and Rajasree M.S, College of Engineering, India
57
Efficient Strategy for Co-Ordinated Multirobot Exploration
Sonali Patel, Anupam Shukla and Ritu Tiwari, Indian Institute of Information Technology and Management, India
59
A High-Level Fortran Interface to Parallel Matrix Algebra
Martin Roderus, Alexei Matveev and Hans-Joachim Bungartz, Technische Universitat Munchen, Germany
64
Trust based Secure Multipath OLSR Routing Protocol in MANET using Fuzzy Theory
S.Geetha and G.Geetha Ramani, Anna University-Tiruchirappalli, India
66
Elicitation of Security Requirements for E-Health System by applying Model Oriented Security Requirements Engineering (MOSRE) Framework
P.Salini and S.Kanmani, Pondicherry Engineering College, India
74
Efficient Feature Fusion, Selection and Classification Technique for Plant Leaf Image Retrieval System
N.Valliammal and S.N.Geethalakshmi, Avinashilingam Institute for Home Science and Higher Education for Women, India
75
Fault Tolerance - Case Study
Abbas Mohammed1, Roshan Kavuri2 and Niraj Upadhyaya2, 1VIF College of Engg & Tech, India and 2JB Institute of Engg & Tech, India
83
Enhancing the Security of Digital Video Watermarking using Watermark Encryption
Ujan Mukhopadhyay, Souptik Sinha, Poulomi Ghosh, Rilok Ghosh, Dipak Kr.Kole and Aruna Chakroborty, St. Thomas College of Engineering and Technology, India
85
On Watson-Crick Automata
K.G. Subramanian1, S. Hemalatha2 and Ibrahim Venkat1, 1Universiti Sains Malaysia, Malaysia and 2S.D.N.B. Vaishnav College, Chennai
99
Efficient Content-based Indexing of Sequential data with Bitmaps
Ritambhra Korpal, University of Pune, India
103
Some New Properties of Lists and a Framework of a List Theoretic Relation Model
B.K.Tripathy1 and S.S.Gantayat2, 1VIT University, India and 2GMR Institute of Technology, India
104
Exploring Routing with Multiple Quality of Service Parameters in High-Speed Networks
Monika Jena1 and Ajay Rana2, 1Amity School of Computer Sciences, India and 2Amity University, India
105
A Special Purpose Integer Factorization Algorithm
Porkodi Chinniah1, Nagarathnam Muthusam2 and Arumuganathan Ramalingam1, 1PSG College of Technology, India and 2Carnegie Mellon University, USA
108
W-PAC: An Efficient Weighted Partitioning Around Cluster Head Mechanism for Ad Hoc Network
S.Thirumurugan1 and E.Geroge Dharma Prakash Raj2, 1JJ College of Engineering & Technology and 2Bharathidasan University, India
112
A Re-Usability Approach to Ontology Construction
Ayesha Banu1, Syeda Sameen Fatima2 and Khaleel Ur Rahman Khan3, 1Kakatiya University, India, 2Osmania University, India and 3ACE Engineering College, India
113
A DDoS Attack Detection Mechanism Based on Protocol Specific Traffic Features
Hirak Jyoti Kashyap and D K Bhattacharyya, Tezpur University, India
114
Geographic Routing Used in MANET for Black Hole Detection
M. Shobana, R.Saranyadevi and S.Karthik, SNS College of Technology, India
115
Finite State Machine Optimization in FPGAs
R.uma and P. Dhavachelvan, Pondicherry University, India
116
Low Frequency Keyword and Keyphrase Extraction from Meeting Transcripts with Sentiment Classification using Unsupervised Framework
J.I.Sheeba and K.Vivekanandan, Pondicherry Engineering College, India
117
An MRA Based Image Fusion Method for Sanctuary Based on NC
Sangeeta Gupta, Sujoy Bhattacharya and S Hemanth Chowdary, Padmasri Dr B V Raju Institute of Technology, India
118
A Novel Color Image Steganography using Discrete Wavelet Transform
Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, Manipal University, India
122
Continuous Speech Recognition System for Tamil Language Using Monophone-based Hidden Markov Model
Radha.V, Vimala.C and Krishnaveni.M, Avinashilingam Institute for Home Science and Higher Education for Women, India
126
Statistical Normalization Techniques for the Prediction of COD Level for an Anaerobic Wastewater Treatment Plant
R.Vijayabhanu and V.Radha, Avinashilingam Institute for Home Science and Higher Education for Women, India
127
Performance Enhancement for Variable Block Optimization in FGPA Synthesis Process
R.uma and P. Dhavachelvan, Pondicherry University, India
128
Binarization in Magnetic Resonance Images (MRI) of Human Head Scans with Intensity Inhomogeneity
K.Somasundaram and T.Genish, Gandhigram Rural Institute, India
130
Survey of Caching And Replica Placement Algorithm for Content Distribution In Peer-To-Peer Overlay Networks
Anna saro vijendran and S.Thavamani, S.N.R SONS COLLEGE, India
137
Detecting Epileptic Seizures Using Electroencephalogram: A Novel Technique for Seizure Classification using Fast Walsh-Hadamard Transform and Hybrid Extreme Learning Machine
G.Geetha and S.N.Geethalakshmi, Avinashilingam Institute for Home Science and Higher Education for Women Deemed University, India
140
A Multi-dimensional Recommendation Algorithm Based on Bipartite Network Projection
Xiangyun Xiong, Yuchen Fu and Zhaoqing Liu, Soochow University, China
141
Swarm Optimization and Flexible Neural Tree for Microarray Data Classification
Aruchamy Rajini1 and Vasantha kalyani David2, 1Hindusthan College of Arts & Science, India and 2Avinashilingam Deemed University, India
142
Graphical method to Find Optimal Cluster Centroid for Two-variable Linear Functions of Concept-drift Categorical Data
K.Reddy Madhavi1, A.Vinaya Babu2, A.Anand Rao1 and S.Viswanadha Raju1, 1JNTUA, India and 2JNTUH, India
144
Optimized Feature Extraction and Actionable Knowledge Discovery for Customer Relationship Management (CRM)
P.Senthil Vadivu1 and Vasantha Kalyani David2, 1Hindusthan College Of Arts and Science, India and 2Avinashilingam Deemed University, India
146
An Enhanced Secure Preserving for Pre-Processed Data using DMI and PCRBAC Algorithm
Ramya.R.S, Priyadarshini.S and S.Karthik, SNS College of Technology, India
147
An Efficient Digital Mammogram Image Classification using DTCWT and SVM
S.Deepa1 and V.Subbiah Bharathi2, 1Sathyabama University, India and 2DMI College of Engineering, India
148
Agent Based Memory Management Framework for a Multi processor environment
K.R.Sarath Chandran, Aiswarya S, Kavitha R and Suganthi Krishnavathi T, SSN College of Engineering, India
150
Survey of cyber crime activities and preventive measures
Ramesh P and Maheshwari D, RVS College of Arts and Science, India
151
Automatic Brain Portion Segmentation from T1-weighted and T2-weighted of Coronal MRI Head Scans using Bond Number and Block Truncation Method
K. Somasundaram and K. Ezhilarasan, Gandhigram Rural Institute (Deemed University), India
153
Text Classification using Symbolic Similarity Measure
B S Harish1, S Manjunath2 and D S Guru3, 1S J College of Engineering, India, 2JSS College of Arts, Commerce and Science, India and 3University of Mysore, India
156
Business Workflow Growth Rate Analysis Using Cellular Automata
M. Thirumaran, Dhavachelvan. P, Aishwarya.D and Naga Venkata Kiran. G, Pondicherry Engineering College, India
159
Synthesis Optimization by Redesigning FPGA Architecture for Area-Speed optimization
R.uma and P. Dhavachelvan, Pondicherry University, India
160
A Survey of Techniques for Human Detection in Static Images
T.Santhanam1, C.P.Sumathi2 and S.Gomathi2, 1Dwaraka Doss Goverdhan Doss Vaishnav College, India and 2Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for women, India
163
Design of 9-Transistor Single Bit Full Adder
Manoj Kumar, Guru Jambheshwar University of Science & Technology, India
164
An application of PCA to rank problem parts
K. M. George, Oklahoma State University, USA
166
Image Fusion using Bi-Dimensional Empirical Mode decomposition for Salt and Pepper Noise Removal in Digital Images
M.PremaKumar1 and P.Rajesh Kumar2, 1Sri Vishnu Engineering College for Women, India and 2Andhra University, India
167
Modeling & Verification of Sliding Window Protocol with Data Loss and Intruder Detection using NuSMV
Aditya Sinha, Ajay RY and Sanjay Singh, Manipal University, India
168
A Study on Human Gait Analysis
Saman Shahid, Anup Nandy, Soumik Mondal, Maksud Ahmed, Pavan Chakraborty and G C Nandi, Indian Institute of Information Technology Allahabad Robotics & AI Lab, India
170
Formal Verification of the Extensible Authentication Protocol using SPIN
Manu S.Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India
173
Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization
Sangita Roy1, Avinash Kumar Singh2, Jyotirmayee Parida3 and Ashok Singh Sairam1, 1Indian Institute of Technology - Patna, India, 2Indian Institute of Information Technology, India and 3Modern Institute of Technology and Management, India
174
Next Generation Biometric Security System An approach for Mobile Device Security
Sujithra M and Padmavathi G, Avinashilingam Institute for Home Science and Higher Avinashilingam Institute for Home Science and Higher Education for Women, India
179
Multimodal Pattern-Oriented Software Architecture for Self-Configuration and Self-Healing in Autonomic Computing Systems
Vishnuvardhan Mannava1 and T. Ramesh2,1K L University,India and 2National Institute of Technology,Warangal,India
180
Information Gain Clustering Through Prototype - Embedded Genetic K-Mean Algorithm (IGCPGKA) A Novel Heuristic Approach for Personalisation of Cold Start Problem
Mohd Abdul Hameed1, S. Ramachandram1 and Omar Al Jadaan2, 1Osmania University, India and 2Medical and Health Sciences University, UAE
181
Cross-Layer IDS for Rushing Attack in Wireless Mesh Networks
K. Ganesh Reddy, P. Santhi Thilagam and Bommena Nageswara Rao, NITK, India
182
A Service Configuration and Composition Design Pattern for Autonomic Computing Systems using Service Oriented Architecture
Vishnuvardhan Mannava1 and T. Ramesh2,1K L University,India and 2National Institute of Technology,Warangal,India
190
Storing XML Rules in Relational Storage of XML DTD
A. A. Abd El-Aziz and A. Kannan, Anna University, India
196
A Fuzzy based Trustworthy Route Selection Method using LSRP in Wireless Sensor Networks (FTRSP)
Arnab Raha1, Arpita Chakraborty2, Shovan Maity1, Mrinal Kanti Naskar1 and Anupam Karmakar3, 1Jadavpur University, India, 2WBUT, India and 3University of Calcutta, India
198
Context Similarity Measure Using Fuzzy Formal Concept Analysis
K.Selvi and R.M. Suresh, Sathyabama University, India
199
K-Means with Bi-dimensional Empirical Mode Decomposition for Segmentation of Microarray Image
J.Harikiran, M.Phanendra, N.N.Swamy, P.V.Lakshmi and R.Kiran Kumar, GITAM, India
200
An Efficient Hybrid Algorithm to Evolve and Awale Player
Randle Oluwarotimi Abayomi, Tshwane University of Technology, South Africa
211
Privacy Preserving k-medoids Clustering: An Approach towards Securing Data in Mobile Cloud Architecture
Sanjit Kumar Dash1, Debi Pr. Mishra1, Ranjith Mishra1 and Sweta Dash2, 1College of Engineering & Technology, India and 2Synergy Institute of Engg & Technology, India
220
An Efficient Secure Code Approach Based on Indexed Table Quasi Group Encryption with Hadamard and Number Theoretic Transformation for Software Protection
Sasirekha N and Hemalatha M, Karpagam University, India
223
Format Based Photo Forgery Image Detection
S.Murali1, Govindraj B. Chittapur2 and H.S. Prabhakara1, 1MIT, India, 2Basaveshwar Engineering College, India
224
Comparative & Evaluative QA System in Tourism Domain
Pinaki Bhaskar, Bidhan Chandra Pal and Sivaji Bandyopadhyay,Jadavpur University,India
228
Ontological Student Profile
Ayesha Ameen1, Khaleel Ur Rahman Khan2 and B.Padmaja Rani3, 1Deccan College of Engineering and Technology, India, 2ACE Engineering College, India and 3JNTU, India
229
Cancer data investigation using variable precision rough set with flexible classification
Sanjiban Sekhar Roy, Anupam Gupta, Anvesha Sinha and Rohit Ramesh, VIT University, India
230
K-Level Based Transmission Range Scheme to Alleviate Energy Hole Problem in WSN
K.Thanigaivelu and K.Murugan, Anna University, India
231
Recent Frequent Itemsets Mining Over Data Streams
Pramod S1 and O.P.Vyas2, 1Christian College of Engineering, India and 2IIIT-Allahabad, India
235
Risk chain prediction metrics for predicting fault proneness in Object Oriented Systems
N.Rajasekhar Reddy, Surya Bahadur and K.R.K Sateesh, Madanapalli Institute of Technology and Science, India
236
Edge Detection by combined Canny Filter with Scale Multiplication & Ant Colony Optimization
Manish T I1, D Murugan2 and Ganesh Kumar T2, 1MET'S School of Engineering, India and 2Manonmaniam Sundaranar University, India
237
Performance of Detecting Defects in Textile Fabric using Gabor Wavelet with Statistical and Morphological Filters
Anitha.S and V.Radha, Avinashilingam Institute for Home Science and Higher Education for Women, India
238
Structure Based Drug Design Studies on Urokinase Plasminogen Activator Inhibitors using AutoDock
M. Naresh Babu1, R. Bhramarambha2 and Allam Appa Rao1, 1C R Rao Advanced Institute of Mathematics, Statistics and Computer Science, 2GITAM University
241
A Comparative Study of Two Formal Specification Query Processing in Mobile Environment
Marfa M 1,Subu Surendran1,Sabu M Thampi2 ,SCT College of Engineering Trivandrum, Kerala, India. 1,Indian Institute of Information Technology and Management- Kerala Technopark, Trivandrum, India. 2
242
A M2MC Based Approach for Mapping Two ADL Models
Sai Bharath Kadati1, K. K. Baseer1, A. Rama Mohan Reddy2 and C. Shoba Bindu3, 1SVEC, India, 2Sri Venkateswara University, India and 3Jawaharlal Nehru Technological University, India
244
Real Time Recognition Of Pedestrian and Vehicles From Video
Gokul S, G Santhosh Kumar and Sreeraj M, Cochin University of Science and Technology, India
245
A Comparative Study of Two Formal Specification Languages: Z-Notation & B-Method
Arvinder Kaur, Samridhi Gulati and Sarita Singh, Guru Gobind Singh Indraprastha University, India
247
Polymorphic Worms Detection Using Extended PolyTree
A.Uzma Jabrooth and B.Parvathavarthini, St. Joseph’s College of Engineering, India
252
Efficient Method for Feature Extraction on Video Preocessing
R.Revathi and M.Hemalatha, Karpagam University, India
255
Performance Analysis of Decomposition Techniques in Multilevel Secure Relational Database Systems
Pooja Sapra, Suresh Kumar and R K Rathy, MRIU, India
258
Face Recognition Using Facial Symmetry
Avinash Kumar Singh and G. C. Nandi, IIT - Allahabad, India
261
Reduct Generation of Microarray Dataset Using Rough Set and Graph Theory for Unsupervised Learning
Asit Kumar Das11, Soumen Kumar Pati2 and Saikat Chakrabarty1, 1Bengal Engineering & Science University, India, 2St.Thomas College of Engineering and Technology, India
263
An ECC based Public Key Infrastructure usable for Mobile Applications
Sangram Ray and G. P. Biswas, Indian School of Mines, India
266
Complex-valued neural network using Simultaneous Perturbation with Dynamic Tunneling technique
M.Sornam and P.Thangavel, University of Madras, India
268
Stationary Wavelet Transform Based Audio Authentication Technique
Tanmay Bhattacharya1, Sirshendu Hore2, Nilanjan Dey1 and S. R. B Chaudhuri3, 1JIS College of Engineering, India, 2Hooghly Engineering & Technology College, India and 3Bengal Engineering and Science University, India
270
Perceptive Analysis of Query by Singing System through Query Excerption
Trisiladevi C. Nagavi1 and Nagappa U. Bhajantri2, 1S.J.College of Engineering, India and 2Government Engineering College, India
273
An Empirical Study on Various Text Classifiers
B S Harish, Ramya M Hegde, M Meghana and N Neeti, S J College of Engineering, India
274
Feature Based Classification of Dysfluent and Normal Speech
P.Mahesha and D.S.Vinod, S.J.College of Engineering, India
275
Web Opinion Mining for Social Networking Sites
Bishas Kaur, Aarpit Saxena and Sanjay Singh, Manipal University, India
277
An Extensive Empirical Study of Feature terms Selection for Text Summarization and Categorization
Suneetha Manne1 and S. Sameen Fatima2, 1VR Siddhartha Engineering College, India and 2Osmania University, India
278
Interoperability Issues in Web Services
Kalpana Johari1 and Arvinder Kaur2, 1Centre for Development of Advanced Computing, India and 2GGSIP University, India
282
Design and Development of a Desktop Monitoring System
Vikram Kumar Santhalia and Sanjay Singh, Manipal University, India
283
A New Deferred cleansing technique for Effective Warehousing of RFID
A.Anny Leema and Hemalatha.M, Karpagam University, India
291
A new approach of voice conversion based on the GMM model
Abdelkader Guerid and Amrane Houacine, USTHB, Algeria
295
Implementation of DES using Pipelining concept with Skew Core Key Scheduling in Secure Transmission of Images
Praveen.K, PrabaharanPoornachandran and Remya Ajai A S, Amrita Vishwa Vidyapeetham, India
298
Word Category Disambiguation for Malayalam: A Language Model Approach
Dinesh T, Jayan V and Bhadran V K, Centre for Development of Advanced Computing (C-DAC), India
301
Authenticity Check to provide Trusted Platform in MANET (ACTP)
Renu Dalal1, Manju Khari1 and Yudhvir Singh2, 1AIACTR, India and 2U.I.E.T M.D University, India
304
HTB Based Packet Scheduler for Cloud Computing
Soumya Antony, Simy Antony, Ajeena Beegom A S and Rajasree M S, College of Engineering, India
309
Online Handwritten Character Recognition for Malayalam
Amritha Sampath1, Tripti C1 and Govindaru V2, 1Rajagiri School of Engineering and Technology, India and 2Centre for Development of Imaging Technology, India
311
Improved K-Means Clustering Algorithm for Two Dimensional Data
Rupali Vij and Suresh Kumar, Manav Rachna International University, India
315
Implementation of Least Significant Bit Steganography and Statistical Steganalysis
V. Lokeswara Reddy1, A.Subramanyam2, P. Chenna Reddy3, 1K.S.R.M. College of Engg., India, 2AITS, India and 3JNTUCE, India
319
Fast Novel Image Reconstruction Algorithm Using Adaptive R-Tree Based Segmentation and Linear Bivariate Splines
Anshul Sood1, Monish Kaul2 and Rajesh Siddavatam1, 1Jaypee University of Information Technology, India and 2McAfee Software Pvt Ltd, India
320
Correlation Power Analysis Attack of AES on FPGA Using Customized Communication Protocol
N.Nalla Anandakumar and S.Dillibabu, Society for Electronic Transactions and Security, India
329
Dynamic Prefix Caching of Videos with Lazy Update
Gaurav Aggarwal, Gaurav Kumar and Divyashikha Sethia, Delhi Technological University, India
332
Empirical Study of Software Quality Estimation
InderpreetKaur and ArvinderKaur, Guru Gobind Singh Indraprastha University, India
334
A Cross Layer Based Reliable Route Metric for Mobile Ad hoc Networks
Gaurav Bhatia1 and Vivek Kumar2, 1Ibri College of Technology, Oman and 2Gurukul Kangri Vishwavidyalya, India
335
Comparative Analysis of Black Hole Attack over Cloud Network under AODV and DSDV
Kamaljit Kau1 and Gaurav Raj2, 1Guru Nanak Dev University, India and 2Lovely Professional University, India
338
Delay-bounded Event Detection in Energy Harvesting Sensor Networks
Yingchi Mao, Hohai University, China
342
A New Methodology for Diagnosis of Appendicitis Using Sonographic Images in Image Mining
R. Balu and T. Devi, Bharathiar University, India
344
Decoding Robustness Performance Comparison for QR and Data Matrix Code
Rishabh Kulshreshtha, Ayushi Kamboj and Sanjay Singh, Manipal University, India
345
Virtualization of Virtual Memory Address Space
Natarajan Meghanathan, Jackson State University, USA
348
Estimation of Component Reusability by Identifying Quality Attributes of Component - A Fuzzy Approach
Aman Jatain and Deepti Gaur, ITM University, India
349
GPS Signal Generation for L1 Frequency using Model Based Design Tools
Kota Solomon Raju1, Y.Pratap1,2, Virendra Patel1,2, S.M.M Naidu2, Amit Patwardhan2 and P.Bhanu Prasad1, 1(CEERI) / (CSIR), India and 2International Institute of Information Technology, India
350
Secure Transmission of Authenticated Messages using New Encoding Scheme and Steganography
Kalavathi Alla, G.Gowri Shankar and G.Bala Subrahmanyam, Vasireddy Venkatadri Institute of Technology, India
351
A Fair Spectrum Sharing Approach in Cognitive Radio Networks
Leila Yousefi, Islamic Azad University of Qazvin, Iran
353
Secure Message Authentication using true random number generator based on Signcryption scheme using ECC
Alka Aman and Rajeev G. Vishwakarma, Shri Vaishnav Institute of Technology & Science, India
354
Secure Image Authentication by Distributed Source Coding Using LDPC Encoding
Brajesh kumar and Anand Rajavat, Shri Vaishnav Institute of Technology & Science, India
355
Design and Development of an Effective Ball Catching Robotic Arm with 3DOF
Kartik Sharma and Gianetan Singh Sekhon, Punjabi University, India
357
Improved Decision Tree Induction: Prioritized Height Balanced Tree with Entropy to find Hidden rules
Mohd Mahmood Ali1, M.S. Qaseem2, Lakshmi Rajamani3 and A.Govardhan4, 1Muffakamjah College of Engg. & Technology, India, 2Nizam Institute of Engg. & Technology, India, 3Osmania University, India and 4Jawaharlal Nehru University, India














 

  • Home
  • Paper Submission
  • Program Committee
  • Accepted paper
  • Workshops
  • Contact Us