Registered Papers

3
Improved Ant Colony Optimization Technique for Mobile Adhoc Networks
Mano Yadav1, Vinay Rishiwal2 and K. V. Arya3, 1ITS Engineering College, India, 2MJP Rohilkhand University, India and 3ABV-IIITM, India
9
A Performance Comparison Study of Two Positionbased Routing Protocols and their Improved Versions for Mobile Ad hoc Networks
Natarajan Meghanathan, Jackson State University, USA
13
Privacy Preservation in Na�ve Bayes Classification using Trusted Third Party Computation over Distributed Progressive Databases
Keshavamurthy B.N, and Durga Toshniwal, Indian Institute of Technology, India
14
Speech Transaction for Blinds Usingspeech-Text-Speech Conversions
Kanisha Johnny1 and G.Balakrishanan2, 1Anna university - Trichirappalli, India and 2Indra Ganesan College of Engg, India
16
Floating-Point Adder in Techology driven High-Level Synthesis
M.Joseph1, Narasimha B Bhat2, and K.Chandra Sekaran3,1Mother Terasa College of Engineering and Technology, India, 2Manipal Dot Net Pvt Ltd, India, 3National Institute of Technology,India
17
Differential Artificial Bee Colony for Dynamic Environment
Syed Raziuddin1, Syed Abdul Sattar1, Rajya Lakshmi2 and Moin Parvez1, 1Royal Institute of Technology and Science, India and 2Gitam Institute of Technology, India
22
FAM2BP: Transformation Framework of UML Behavioral Elements into BPMN Design Element
Jayeeta Chanda1, Ananya Kanjilal1, Sabnam Sengupta1 and Swapan Bhattacharya2, 1B.P. Poddar Institute of Management & Technology, India and 2National Institute of Technology - Durgapur, India
24
Towards a Software Component Quality Model
Nitin Upadhyay1, Bharat M. Despande1 and Vishnu P. Agrawal2, 1BITS-Pilani, India and 2Thapar University, India
25
Colour image encryption scheme based on permutation and substitution techniques
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University, India, 2Sir Padampat Singhania University, India
29
An Intelligent System for Web Usage Data Preprocessing
V.V.R. Maheswara Rao1, V. Valli Kumari1 and K.V.S.V.N Raju2, 1Shri Vishnu Engineering College for Women, India and 2Andhra University, India
31
Discovery & High Availability of Services in Grid Environment with Load Balancing
Rohit Vashishtha, Ankit Gupta, Piyush Gupta, Shakti Mishra, D.S. Kushwaha and A.K.Misra, Motilal Nehru National Institute of Technology, India
32
Physiologically Based Speech Synthesis Using Digital Waveguide Model.
Patil A.R. and Vandana T.Chavan, D.K.T.E.�s Textile & Engineering institute, India
34
Bayes Theorem and Information Gain based Feature Selection for Maximizing the Performance of Classifiers
Subramanian Appavu, Ramasamy Rajaram, M.Nagammai, N.Priyanga and S.Priyanka, Thiagarajar College of Engineering, India
36
Improving the Performance of Color Image Watermarking Using Contourlet Transform
Dinesh Kumar1 and Vijay Kumar2, 1GJUS&T, India and 2JCDMCOE, india
37
A Comparative Study of Machine Learning Algorithms as Expert Systems in Medical Diagnosis (Asthma)
B.D.C.N.Prasad1, P.E.S.N.krishna Prasad2 and Y Sagar3, 1V.R.Siddartha Engineering College, India, 2Sri Prakash College of Engineering, India and 3St. Peters Engineering College, India
38
Stabilization of Large Scale Linear Discrete-Time Systems by Reduced Order Controllers
Sundarapandian Vaidyanathan and Kavitha Madhavan, Vel Tech Dr. RR & Dr. SR Technical University, India
39
Hybrid Synchronization of Hyperchaotic Qi and L�u Systems by Nonlinear Control
Sundarapandian Vaidyanathan and Suresh Rasappan, Vel Tech Dr. RR & Dr. SR Technical University, India
40
A Review of Dynamic Web Service Composition Techniques
Demian Antony D�Mello1 and Ananthanarayana V. S.2, 1St. Joseph Engineering College, India, 2National Institute of technology, India
41
Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets
Dorswamy1, Hemanth K S1, Channabasayya M Vastrad2 andNagaraju S3, 1 Mangalore University, India, 2PDIT, Hospet and 3 Bahubali College of Engineering, Karnataka, India
43
Output Regulation of Arneodo-Coullet Chaotic System
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
45
A High-speed, Low-power, Low-latency Pipelined ROM-less DDFS
Indranil Hatai, Indian Institute of Technology - Kharagpur, India
46
A Mathematical Modeling of Exceptions in Healthcare Workflow
Sumagna Patnaik, J.B. Institute of Engineering and Technology, India
49
An Intelligent Automatic Story Generation System by Revising Proppian�s System
A. Jaya and G.V. Uma, Anna University Chennai, India
53
A cross-layer Frame Work for Adaptive Video Streaming Over IEEE 802.11 Wireless Networks
Vijaykumar M, Santhosha Rao and Kumara shama, Manipal University, India
57
FIFO Optimization for Energy-Performance Trade-Off in Mesh-of-Tree based Network-on-Chip
Santanu Kundu, T. V. Ramaswamy and Santanu Chattopadhyay, Indian Institute of Technology, India
58
Outliers Detection as Network Intrusion Detection System Using Multi Layered Framework
Devarakonda Nagaraju1, Pamidi Srinivasulu2, V Valli Kumari3 and A Govardhan4, 1Acharya Nagarjuna University, India, 2V R Siddhartha Engineering College, India, 3Andhra University, India and 1J N T U College of engineering, India
59
A New Routing Protocol For Mobile Ad hoc Networks
S.Rajeswari and Y.Venkataramani, Saranathan college of Engineering, India
60
Remote-Memory based Network Swap for Performance Improvement
Nirbhay Chandorkar, Rajesh Kalmady, Phool Chand, Anup Bhattacharjee and B.S. Jagadeesh, Bhabha Atomic Research Centre, India
61
Design and Implementation of Novel Distributed Memory File System
Urvashi Karnani, Rajesh Kalmady, Phool Chand, Anup Bhattacharjee and B.S. Jagadeesh, Bhabha Atomic Research Centre, India
62
Service Discovery Protocol For Ad Hoc Networks
Mohamed Hashem1, Mohamed Amin2 and Haitham Elwahsh3, 1Ain Shams University, Egypt, 2Minoufiya University, Egypt and 3King Saud University, Saudi Arabia
63
A Genetic Algorithm with Entropy Based Probabilistic Initialization and Memory for Automated Rule Mining
Saroj, Kapila, Dinesh Kumar, and Kanika, Guru Jambheshwar University of Science and Technology, India
65
Certificate Path Verification in Peer-to-Peer Public Key Infrastructures by Constructing DFS Spanning Tree
Ajay Rao, Balachandra and Prema K V, Manipal Institute of Technology, India
66
Mobile Database Cache Replacement Policies : LRU and PPRRP
Hariram Chavan1 and Suneeta Sane2, 1Mumbai University, India, 2V. J. T. I, India
67
Collaborative Alert in a Reputation System to Alleviate Colluding Packet Droppers in Mobile Ad Hoc Networks
Gopalakrishnan. K and Rhymend Uthariaraj. V, Anna University Chennai, India
68
A new defense scheme against DDoS attack in Mobile Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India
69
Spelling Corrector for Indian Languages
K.V.N.Sunitha and A.Sharada, G.Narayanamma Institute of Technology and Science, India
70
An Intelligent Network for offline Signature Verification using Chain Code
Minal Tomar and Pratibha Singh, Institute of Engineering and Technology, India
71
Hierarchical Clustering of Projected Data Streams using Cluster Validity Index
Bharat Pardeshi and Durga Toshniwal , Indian Institute of Technology Roorkee, India
72
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP
Antu Annam Thomas and M. Wilscy, University of Kerala, India
75
A Novel Deadlock-free Shortest-path Dimension Order Routing Algorithm for Mesh-of-Tree based Network-on-Chip Architecture
Kanchan Manna, Santanu Chattopadhyay and Indranil Sen Gupta, Indian Institute of Technology - Kharagpur, India
77
2-D DOA estimation of coherent wideband signals using L-shaped sensor array
P.Palanisamy and Swetha.P.M, National Institute of Technology, India
78
Voltage Collapse Based Critical Bus Ranking Using Composite Index
Shobha Shankar1 and T. Ananthapadmanabha2, 1Vidyavardhaka College of Engineering, India, 2The National Institute of Engineering, India
79
Efficient Substitution-Diffusion Based Image Cipher Using Modified Chaotic Map
Shatheesh Sam.I and Bhuvaneswaran.R.S, Ramanujan Computing Centre, India
80
Logical Modeling & Veri cation of a Strength based Multi-Agent Argumentation Scheme using NuSMV
Shravan Shetty, Shashi Kiran H.S, Murali Babu Namala and Sanjay Singh, Manipal Institute of Technology, India
82
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic
Aravinthan Parthibarajan1, Gopalakrishnan Narayanamurthy2, Arun Parthibarajan 2 and Vigneshwaran Narayanamurthy3, 1DMI College of Engg, India, 2SSN College of Engg, India, 3Jaya Engg. College, India
84
Key Frame Detection Based Semantic Event Detection And Classification Using Heirarchical Approach For Cricket Sport Video Indexing.
Mahesh M Goyani and Shreyash K. Dutta, S P University, India
89
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System
Katheeja Parveen M, B.S. Abdur Rahman University, India
95
Multiplexer Based Circuit Synthesis with Area-Power Trade-off
Sambhu Nath Pradhan1 and Santanu Chattopadhyay2, 1NIT-Agartala, India and 2IIT-Kharagpur, India
97
Hierarchical Context Representation and Heuristic Based Context Selection in a Pervasive Environment
Vanathi.B and Rhymend Uthariaraj.V, Anna University Chennai, India
98
Uncovering the Main Research Themes of Software Validation
Tsung-Teng Chen1 and Wen-Hsiu Hsieh2,1 Institute of Information Management, Taiwan,2 National Taipei University,Taiwan
99
An Approach towards Lightweight, Reference Based, Tree Structured Time Synchronization Scheme in WSN
Surendra Rahamatkar1 and Ajay Agarwal2, 1Nagpur Inst. of Technology, India, 2Krishna Inst. of Engg. & Technology, India
110
Face Recognition using Multi-exemplar Discriminative Power Analysis
Ganesh Bhat1 and K. K. Achary2, 1 Canara Engineering Collage,India, 2Mangalore University,India
112
Non Local Means Image Denoising for Color Images using PCA
P.A Shyjila and M Wilscy University of Kerala, India
114
Cluster Based Mobility Considered Routing Protocol for Mobile Ad hoc Networks
Soumya Brata Saha1, Rituparna Chaki2, 1JIS College of Engineering, India, 2West Bengal University of Technology, India
115
An Model for Delegation That is based upon both Authentication and Authorization
Coimbatore Chandersekaran1 and William R. Simpson2,1USAF CIO Office, USA2Institute for Defense Analysis, USA
117
Identification of Encryption Algorithm using Decision Tree
R.Manjula and R.Anitha, PSG College of Technology, India
118
An Analytical Model for Sparse and Dense Vehicular Ad hoc Networks
Sara Najafzadeh, Norafida Ithnin and Ramin Karimi, University Technology Malaysia
120
A Novel Data Mining Approach for Performance Improvement of EBGM based Face Recognition Engine to handle large database
Soma Mitra, Suparna Parua, Apurba Das and Debasis Mazumdar, CDAC, India
122
Chest X-Ray Analysis for Computer-Aid Diagnostic
Kim Le, University of Canberra, Australia
124
An Automatic Evolution of Rules to Identify Students Multiple Intelligence
Kunjal Mankad1, Priti Srinivas Sajja2 and Rajendra Akerkar3, 1Institute of Science and Technology for Advanced Studies and Research(ISTAR), India, 2Sardar Patel university, India,3Western Norway Research Institute
126
RODD: An Effective Reference-based Outlier Detection Approach for Large Datasets
M H Bhuyan1, D K Bhattacharyya1 and J K Kalita2, 1 Tezpur University, India, 2University of Colorado, USA
127
Empirical Measurements on the Convergence Nature of Differential Evolution Variants
G.Jeyakumar and C.Shanmugavelayutham, Amrita School of Engineering, India
128
Collecting the Inter Component Interactions in Multithreaded Environment
Arun Mishra, Alok Chaurasia, Pratik Bhadkoliya and Arun K. Misra, MNNIT, India
132
On the Benefit of Quantification in AOP Systems-A Quantitative and a Qualitative Assessment.
Kotrappa Sirbi1 and Prakash Jayanth Kulkarni2, 1K L E�s College of Engineering & Technology, India, 2Walchand College of Engineering, India
133
A Comprehensive View of Software Product Line
Sami OUALI, Naoufel KRAIEM and Henda BEN GHEZALA,Compus of Manouba,tunisia
137
A Novel Mechanism for Detection of Distributed Denial of Service Attacks
Jaydip Sen, Tata Consultancy Services, India
141
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET
Ahmed M. Abd El-Haleem,Ihab A. Ali, Ibrahim I. Ibrahim, and Abdel Rahman H. El-Sawy, Helwan University, Egypt
142
Steganography Using Version Control System
Vaishali Tidake, KBT College of Engineering , India
143
Design Pattern Mining Using State Space Representation of graph matching
Manjari Gupta, Rajwant Singh Rao, Akshara Pande and A.K. Tripathi, Banaras Hindu University, India
145
Min Max Threshold Range (MMTR) Approach In Palmprint Recognition
Jyoti Malik1, G. Sainarayanan2 and Ratna Dahiya 1, 1National Institute of Technology, India, 2 ICT Academy, India
146
Expert System for Sentence Recognition
Bipul Pandey , Anupam Shukla and Ritu Tiwari, ABV-Indain Institute of Information Technology and Management, India
148
MST-based Cluster Initialization for K-means
Damodar Reddy, Devender Mishra and Prasanta K. Jana, Indian School of Mines, India
149
Integration Testing of Multiple Embedded Processing Components
Hara Gopal Mani Pakala1,Raju KVSVN2,Ibrahim Khan3,1 Vignana Bgarathi Institute of Technology, India, 2AUCE, India,3RGUKT,India
150
Geometry and Skin Color Based Hybrid Approach for Face Tracking in Colour Environment
Mahesh M Goyani, Gitam Shikkenawis and Brijesh Joshi, S P University, India
151
Performance Analysis of Block and Non Block Based Approach of Invisible Image Watermarking Using SVD in DCT Domain
Mahesh M Goyani1 and Gunvantsinh Gohil2, 1 Sardar patel University, India,2Gujarat University, India
152
MIMO Ad Hoc Networks-Mutual Information and Channel Capacity
Swati Chowdhuri1, Arun Kumar Mondal2 and P.K.Baneerjee3, 1Secom College of Engineering, India, 2Guru Nanak Institute of Technology, India and 3Jadavpur University, India
153
Optimization of Mutimedia Packet Scheduling In AD HOC Networks Using Multiobective Genetic Algoritham
R.Muthu Selvi and R.Rajaram, Thiagarajar College of Engineering, India
161
A Novel Topographic Feature Extraction Method for Indian Character Images
Soumen Bag and Gaurav Harit, Indian Institute of Technology, India
163
Comprehensive Framework to Human Recognition using Palmprint and Speech Signal
Mahesh P.K. and M.N. ShanmukhaSwamy, Mysore University, India
164
Inclusion/Exclusion Protocol for RFID Tags
Selwyn Piramuthu, University of Florida, USA
166
A Survey On Hand Gesture Recognition in context of soft Computing
Ankit chaudary and jagdish L.Raheja, CEERI, India
167
Handwritten Numeral Recognition using Modified BP ANN Structure
Amit Choudhary1,Rahul Rishi2 and Savita Ahlawat3,1Maharaja Surajmal Institute, India,2TITS, India,3Maharaja Surajmal Institute of Technology, India
171
Efficient Density Based Outlier Handling Technique in Data Mining
KRISHNA GOPAL SHARMA1, ANANT RAM1 and YASHPAL SINGH2, 1G.L.A Institute of Technology and Management, India and 2Bundelkhand Institute of Engineering and Technology, India
172
Exergaming � New Age Gaming for Health Rehabilitation and Education
Ankit Kamal, Pune Institute of Computer Technology, India
173
Authenticating and Securing Mobile Applications Using Microlog
Siddharth Gupta and Sunil Kumar Singh, Bharti Vidyapeeth College of Engineering, India
174
Overcoming Social Issues in Requirements Engineering
Selvakumar Ramachandran, Sandhyarani Dodda and LavanyaSantapoor, Blekinge Institute of Technology, Sweden
175
Functional Based Testing In Web Services Integrated Software Applications
Selvakumar Ramachandran, LavanyaSantapoor and Haritha Rayudu, Blekinge Institute of Technology, Sweden
177
Assisting Programmers Resolving Vulnerabilities in Java Web Applications
Pranjal Bathia, Bharath Reddy Beerelli and Marc-Andre Laverdi�re, TCS Innovation Labs, India
180
An Iterative Method For Multimodal Biometric Face Recognition Using Speech Signal
Nageshkumar M and M.N.ShanmukhaSwamy, University of Mysore, India
183
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment
Malarvizhi Nandagopal and V. Rhymend Uthariaraj, Anna University, India
184
Adoption of Cloud Computing in e-governance
Sachidananda Patnaik, Berhampur University, India
189
Estimating Strength of a DDoS Attack using Multiple Regression Analysis
B. B. Gupta, R. C. Joshi and Manoj Misra, Indian Institute of Technology, India
190
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching
Khushboo Hemnani, Dushyant Chawda and Bhupendra Verma, T.I.T Bhopal, India
191
Non-Replicated Dynamic Fragment Allocation In Distributed Database Systems
Nilarun Mukherjee, Bengal Institute of Technology, India
192
A Novel Image Encryption Algorithm Using two Chaotic Maps for Medical Application
G.A.Sathishkumar 1,.K.Bhoopathy bagan 2, N.Sriraam 3, Venkatachalam 1 and R.Vignesh 1,1Sri Venkateswara College of Engineering, 2 Madras Institute of Technology, 3 SSN College of Engineering.
193
Quality Analysis of a Chaotic Hopping Based Cipher Image
G.A.Sathishkumar1 and K.Boopathy bagan2,1Sri Venkateswara College of Engineering, India, 2Madras Institute of Technology, India
196
A Sementic Approach To Design An Intelligent Self Organized Search Engine For Extacting Information Relating to Educational Resources
B.Saleena1, S.K.Srivatsa2 and Centhil Kumar3, 1VIT University, India, 2St.Joseph College of Engineering - Chennai, India and 3B.S.Abdur Rahman University, India

Accepted Papers

2
Efficient Secret Image Sharing Scheme
Vinay Rishiwal1 and Mano Yadav2, 1MJP Rohilkhand University, India and 2ITS Engineering College, India
3
Improved Ant Colony Optimization Technique for Mobile Adhoc Networks
Mano Yadav1, Vinay Rishiwal2 and K. V. Arya3, 1ITS Engineering College, India, 2MJP Rohilkhand University, India and 3ABV-IIITM, India
5
An Efficient Compressor for Biological Sequences
Ashutosh Gupta1, Suneeta Agarwal2, 1MJP rohilkhand University, India, 2MNNIT, India
6
A Decision Model for Estimating the Effort of Software Projects Byextending FPA by a Markov Chain Monte Carlo Simulation Approach
Foad Marzoughi, Mohammad Mehdi Farhangian, Ali Marzoughi and Alex Sim Tze Hiang, UTM, Malaysia
8
A New Resource scheduling method in grid systems based on Hierarchical Stochastic Petri net
M. Shojafar1, S. Barzegar1 and M.R. Meibody2, 1Islamic Azad University, Iran and 2Amirkabir University, Iran
9
A Performance Comparison Study of Two Positionbased Routing Protocols and their Improved Versions for Mobile Ad hoc Networks
Natarajan Meghanathan, Jackson State University, USA
11
Enhanced of Two-Factor User Authentication in Wireless Sensor Networks
Vollu Srinivasa Rao and C.Shoba Bindu, JNTUACEA, India
12
Geometric Active Contour Detection using Gradient Vector Flow and Shape-Based Image Segmentation
K.N.Narasimha Murthy1, YS Kumaraswamy2, 1Anna University, India, 2Dayanadasagar College of Engineering, India
13
Privacy Preservation in Na�ve Bayes Classification using Trusted Third Party Computation over Distributed Progressive Databases
Keshavamurthy B.N, Mitesh Sharma and Durga Toshniwal, Indian Institute of Technology, India
14
Speech Transaction for Blinds Usingspeech-Text-Speech Conversions
Kanisha Johnny1 and G.Balakrishanan2, 1Anna university - Trichirappalli, India and 2Indra Ganesan College of Engg, India
16
Floating-Point Adder in Techology driven High-Level Synthesis
M.Joseph1, Narasimha B Bhat2, and K.Chandra Sekaran3,1Mother Terasa College of Engineering and Technology, India, 2Manipal Dot Net Pvt Ltd, India, 3National Institute of Technology,India
17
Differential Artificial Bee Colony for Dynamic Environment
Syed Raziuddin1, Syed Abdul Sattar1, Rajya Lakshmi2 and Moin Parvez1, 1Royal Institute of Technology and Science, India and 2Gitam Institute of Technology, India
20
Digital Signal Controller TMS320LF2407 in Speed Control of PMDC Motor using PI algorithm
N.S.Patil1, N. S. Nehe2, 1N.D.M.V.P.S�s college of Engg India, 2Pravara Rural Engineering College, India
22
FAM2BP: Transformation Framework of UML Behavioral Elements into BPMN Design Element
Jayeeta Chanda1, Ananya Kanjilal1, Sabnam Sengupta1 and Swapan Bhattacharya2, 1B.P. Poddar Institute of Management & Technology, India and 2National Institute of Technology - Durgapur, India
24
Towards a Software Component Quality Model
Nitin Upadhyay1, Bharat M. Despande1 and Vishnu P. Agrawal2, 1BITS-Pilani, India and 2Thapar University, India
25
Colour image encryption scheme based on permutation and substitution techniques
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University, India, 2Sir Padampat Singhania University, India
27
Value Addtion to A Software Via Reduction of Testingcosts And Verification of an Object Oriented Program
AJAY KUMAR TIWARI1 and Satbir Jain2, 1MAIT, India and 2NSIT, India
28
One-Reporting Queries
Saladi Rahul and K.S.Rajan, IIIT-Hyderabad, India
29
An Intelligent System for Web Usage Data Preprocessing
V.V.R. Maheswara Rao1, V. Valli Kumari1 and K.V.S.V.N Raju2, 1Shri Vishnu Engineering College for Women, India and 2Andhra University, India
31
Discovery & High Availability of Services in Grid Environment with Load Balancing
Rohit Vashishtha, Ankit Gupta, Piyush Gupta, Shakti Mishra, D.S. Kushwaha and A.K.Misra, Motilal Nehru National Institute of Technology, India
32
Physiologically Based Speech Synthesis Using Digital Waveguide Model.
Patil A.R. and Vandana T.Chavan, D.K.T.E.�s Textile & Engineering institute, India
33
The Impact of Mobility and Node Density on MANET Routing Protocols
S. Deepa1 and Kadhar Nawaz2, 1SRN Adarsh College, India and 2Sona College of Technology, India
34
Bayes Theorem and Information Gain based Feature Selection for Maximizing the Performance of Classifiers
Subramanian Appavu, Ramasamy Rajaram, M.Nagammai, N.Priyanga and S.Priyanka, Thiagarajar College of Engineering, India
36
Improving the Performance of Color Image Watermarking Using Contourlet Transform
Dinesh Kumar1 and Vijay Kumar2, 1GJUS&T, India and 2JCDMCOE, india
37
A Comparative Study of Machine Learning Algorithms as Expert Systems in Medical Diagnosis (Asthma)
B.D.C.N.Prasad1, P.E.S.N.krishna Prasad2 and Y Sagar3, 1V.R.Siddartha Engineering College, India, 2Sri Prakash College of Engineering, India and 3St. Peters Engineering College, India
38
Stabilization of Large Scale Linear Discrete-Time Systems by Reduced Order Controllers
Sundarapandian Vaidyanathan and Kavitha Madhavan, Vel Tech Dr. RR & Dr. SR Technical University, India
39
Hybrid Synchronization of Hyperchaotic Qi and L�u Systems by Nonlinear Control
Sundarapandian Vaidyanathan and Suresh Rasappan, Vel Tech Dr. RR & Dr. SR Technical University, India
40
A Review of Dynamic Web Service Composition Techniques
Demian Antony D�Mello1 and Ananthanarayana V. S.2, 1St. Joseph Engineering College, India, 2National Institute of technology, India
41
Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets
Dorswamy1, Hemanth K S1, Channabasayya M Vastrad2 and Nagaraju S3, 1 Mangalore University, India, 2PDIT, Hospet and 3 Bahubali College of Engineering, Karnataka, India
43
Output Regulation of Arneodo-Coullet Chaotic System
Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
45
A High-speed, Low-power, Low-latency Pipelined ROM-less DDFS
Indranil Hatai, Indian Institute of Technology - Kharagpur, India
46
A Mathematical Modeling of Exceptions in Healthcare Workflow
Sumagna Patnaik, J.B. Institute of Engineering and Technology, India
48
Providing Confidentiality for Data Aggregation in Wireless Sensor Networks
M.K.Sandhya and K.Murugan, Anna University Chennai, India
49
An Intelligent Automatic Story Generation System by Revising Proppian�s System
A. Jaya and G.V. Uma, Anna University Chennai, India
53
A cross-layer Frame Work for Adaptive Video Streaming Over IEEE 802.11 Wireless Networks
Vijaykumar M, Santhosha Rao and Kumara shama, Manipal University, India
57
FIFO Optimization for Energy-Performance Trade-Off in Mesh-of-Tree based Network-on-Chip
Santanu Kundu, T. V. Ramaswamy and Santanu Chattopadhyay, Indian Institute of Technology, India
58
Outliers Detection as Network Intrusion Detection System Using Multi Layered Framework
Devarakonda Nagaraju1, Pamidi Srinivasulu2, V Valli Kumari3 and A Govardhan4, 1Acharya Nagarjuna University, India, 2V R Siddhartha Engineering College, India, 3Andhra University, India and 1J N T U College of engineering, India
59
A New Routing Protocol For Mobile Ad hoc Networks
S.Rajeswari and Y.Venkataramani, Saranathan college of Engineering, India
60
Remote-Memory based Network Swap for Performance Improvement
Nirbhay Chandorkar, Rajesh Kalmady, Phool Chand, Anup Bhattacharjee and B.S. Jagadeesh, Bhabha Atomic Research Centre, India
61
Design and Implementation of Novel Distributed Memory File System
Urvashi Karnani, Rajesh Kalmady, Phool Chand, Anup Bhattacharjee and B.S. Jagadeesh, Bhabha Atomic Research Centre, India
62
Secure Service Discovery Protocol For Ad Hoc Networks
Mohamed Hashem1, Mohamed Amin2 and Haitham Elwahsh3, 1Ain Shams University, Egypt, 2Minoufiya University, Egypt and 3King Saud University, Saudi Arabia
63
A Genetic Algorithm with Entropy Based Probabilistic Initialization and Memory for Automated Rule Mining
Saroj, Kapila, Dinesh Kumar, and Kanika, Guru Jambheshwar University of Science and Technology, India
64
Testing Techniques, Modes and Capabilities in Agile projects
Sowmya Karunakaran, HCL Technologies - Chennai, India
65
Certificate Path Verification in Peer-to-Peer Public Key Infrastructures by Constructing DFS Spanning Tree
Ajay Rao, Balachandra and Prema K V, Manipal Institute of Technology, India
66
Mobile Database Cache Replacement Policies : LRU and PPRRP
Hariram Chavan1 and Suneeta Sane2, 1Mumbai University, India, 2V. J. T. I, India
67
Collaborative Alert in a Reputation System to Alleviate Colluding Packet Droppers in Mobile Ad Hoc Networks
Gopalakrishnan. K and Rhymend Uthariaraj. V, Anna University Chennai, India
68
A new defense scheme against DDoS attack in Mobile Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India
69
Spelling Corrector for Indian Languages
K.V.N.Sunitha and A.Sharada, G.Narayanamma Institute of Technology and Science, India
70
An Intelligent Network for offline Signature Verification using Chain Code
Minal Tomar and Pratibha Singh, Institute of Engineering and Technology, India
71
Hierarchical Clustering of Projected Data Streams using Cluster Validity Index
Bharat Pardeshi and Durga Toshniwal , Indian Institute of Technology Roorkee, India
72
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP
Antu Annam Thomas and M. Wilscy, University of Kerala, India
75
A Novel Deadlock-free Shortest-path Dimension Order Routing Algorithm for Mesh-of-Tree based Network-on-Chip Architecture
Kanchan Manna, Santanu Chattopadhyay and Indranil Sen Gupta, Indian Institute of Technology - Kharagpur, India
77
2-D DOA estimation of coherent wideband signals using L-shaped sensor array
P.Palanisamy and Swetha.P.M, National Institute of Technology, India
78
Voltage Collapse Based Critical Bus Ranking Using Composite Index
Shobha Shankar1 and T. Ananthapadmanabha2, 1Vidyavardhaka College of Engineering, India, 2The National Institute of Engineering, India
79
Efficient Substitution-Diffusion Based Image Cipher Using Modified Chaotic Map
Shatheesh Sam.I and Bhuvaneswaran.R.S, Ramanujan Computing Centre, India
80
Logical Modeling & Veri cation of a Strength based Multi-Agent Argumentation Scheme using NuSMV
Shravan Shetty, Shashi Kiran H.S, Murali Babu Namala and Sanjay Singh, Manipal Institute of Technology, India
82
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic
Aravinthan Parthibarajan1, Gopalakrishnan Narayanamurthy2, Arun Parthibarajan 2 and Vigneshwaran Narayanamurthy3, 1DMI College of Engg, India, 2SSN College of Engg, India, 3Jaya Engg. College, India
84
Key Frame Detection Based Semantic Event Detection And Classification Using Heirarchical Approach For Cricket Sport Video Indexing.
Mahesh M Goyani and Shreyash K. Dutta, S P University, India
88
Optimum Architectures for Modulo 2n-1 Addition with Two Level Half Adders
Said Afkhmi Mayan, Islamic Azad University Tabriz, Iran
89
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System
Katheeja Parveen M, B.S. Abdur Rahman University, India
92
Power Minimization Using Stack Forcing Technique
Roopa J and S.Kendaganna Swamy, VTU, India
93
A New Cluster Computing Model
K.Raghava Rao1, M. Nagabhushanm Rao2, Mula Mahender1 and Ruth Ramya1, 1KL University, India and 1Dr. B. V. Raju Engg. College, India
95
Multiplexer Based Circuit Synthesis with Area-Power Trade-off
Sambhu Nath Pradhan1 and Santanu Chattopadhyay2, 1NIT-Agartala, India and 2IIT-Kharagpur, India
97
Hierarchical Context Representation and Heuristic Based Context Selection in a Pervasive Environment
Vanathi.B and Rhymend Uthariaraj.V, Anna University Chennai, India
98
Uncovering the Main Research Themes of Software Validation
Tsung-Teng Chen1 and Wen-Hsiu Hsieh2,1 Institute of Information Management, Taiwan,2 National Taipei University,Taiwan
99
An Approach towards Lightweight, Reference Based, Tree Structured Time Synchronization Scheme in WSN
Surendra Rahamatkar1 and Ajay Agarwal2, 1Nagpur Inst. of Technology, India, 2Krishna Inst. of Engg. & Technology, India
108
White Matter Hyperintensity Segmentation using Multiple Stage FCM
Dancy Kurian1, R.S. Jayasree2, M. Wilscy1 and A.K.Gupta2, 1University of Kerala, India and 2Sree Chitra Tirunal Institute of Medical Sciences & Technology, India
109
UML and UML based Tool for Ontology Engineering
Nitin Singh Rajput, DAIICT, India
110
Face Recognition using Multi-exemplar Discriminative Power Analysis
Ganesh Bhat1 and K. K. Achary2, 1 Canara Engineering Collage,India, 2Mangalore University,India
112
Non Local Means Image Denoising for Color Images using PCA
P.A Shyjila and M Wilscy University of Kerala, India
113
Radio Network Design for Dismounted Soldiers
Bhupendra Suman1, S C Sharma1 and L C Mangal2, 1Indian Institute of Technology - Roorkee, India and 2Defence Electronics Application Lab Dehradun, India
114
Cluster Based Mobility Considered Routing Protocol for Mobile Ad hoc Networks
Suparna DasGupta1, Soumya Brata Saha1, Rituparna Chaki2, 1JIS College of Engineering, India, 2West Bengal University of Technology, India
115
An Model for Delegation That is based upon both Authentication and Authorization
Coimbatore Chandersekaran1 and William R. Simpson2,1USAF CIO Office, USA2Institute for Defense Analysis, USA
116
Focused web crawler with Revisit policy
Swati Mali and B.B. Meshram, VJTI - Mumbai, India
117
Identification of Encryption Algorithm using Decision Tree
R.Manjula and R.Anitha, PSG College of Technology, India
118
An Analytical Model for Sparse and Dense Vehicular Ad hoc Networks
Sara Najafzadeh, Norafida Ithnin and Ramin Karimi, University Technology Malaysia
119
A Review of Scheduling in Vehicular Delay Tolerant Networks
Ramin karimi, Norafida Ithnin and Sara Najafzadeh, University Technology Malaysia
120
A Novel Data Mining Approach for Performance Improvement of EBGM based Face Recognition Engine to handle large database
Soma Mitra, Suparna Parua, Apurba Das and Debasis Mazumdar, CDAC, India
122
Chest X-Ray Analysis for Computer-Aid Diagnostic
Kim Le, University of Canberra, Australia
123
Blind Video Tamper Detection Based on a Novel Information Fusion Approach
Girija Chetty1, Matthew Gordon2 and Kerry Shia2, 1University of Canberra, Australia and 2Video Analytice Pty. Ltd.,
124
An Automatic Evolution of Rules to Identify Students Multiple Intelligence
Kunjal Mankad1, Priti Srinivas Sajja2 and Rajendra Akerkar3, 1Institute of Science and Technology for Advanced Studies and Research(ISTAR), India, 2Sardar Patel university, India,3Western Norway Research Institute
125
Multiclass Microarray Gene Expression Classification Based On Information Fusion in Correlation Subspace
Girija Chetty1 and Nisha Krishnan2, 1University of Canberra, Australia and 2Axion BioTech Pty. Ltd.
126
RODD: An Effective Reference-based Outlier Detection Approach for Large Datasets
M H Bhuyan1, D K Bhattacharyya1 and J K Kalita2, 1 Tezpur University, India, 2University of Colorado, USA
127
Empirical Measurements on the Convergence Nature of Differential Evolution Variants
G.Jeyakumar and C.Shanmugavelayutham, Amrita School of Engineering, India
128
Collecting the Inter Component Interactions in Multithreaded Environment
Arun Mishra, Alok Chaurasia, Pratik Bhadkoliya and Arun K. Misra, MNNIT, India
132
On the Benefit of Quantification in AOP Systems-A Quantitative and a Qualitative Assessment.
Kotrappa Sirbi1 and Prakash Jayanth Kulkarni2, 1K L E�s College of Engineering & Technology, India, 2Walchand College of Engineering, India
133
A Comprehensive View of Software Product Line
Sami OUALI, Naoufel KRAIEM and Henda BEN GHEZALA,Compus of Manouba,tunisia
134
Fuzzy Neural Petri Net Based Method for Knowledge Representation of Microarray Gene Expression Level
Raed I. Hamed, JMI, India
135
A Proposed Method for Increase Security in SCADA Systems
Mohammad Reza Pushideh and Javad Haddadnia, Tarbiat moallem university of Sabzevar, Iran
137
A Novel Mechanism for Detection of Distributed Denial of Service Attacks
Jaydip Sen, Tata Consultancy Services, India
138
Integration of RIA towards Flexible Web based GUI.
Zeeshan Ahmed1 and Vasil Popov2, 1University of Wuerzburg, Germany, 2Technical University Sofia ,Bulgaria
141
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET
Ahmed M. Abd El-Haleem,Ihab A. Ali, Ibrahim I. Ibrahim, and Abdel Rahman H. El-Sawy, Helwan University, Egypt
142
Steganography Using Version Control System
Vaishali Tidake, KBT College of Engineering , India
143
Design Pattern Mining Using State Space Representation of graph matching
Manjari Gupta, Rajwant Singh Rao, Akshara Pande and A.K. Tripathi, Banaras Hindu University, India
144
Palmprint Recognition by Harris Corner Detector and Match by Correlation
Jyoti Malik1, G. Sainarayanan2 and Ratna Dahiya1, 1National Institute of Technology - Kurukshetra, India and 2ICT Academy of Tamil Nadu - Chennai, India
145
Min Max Threshold Range (MMTR) Approach In Palmprint Recognition
Jyoti Malik1, G. Sainarayanan2 and Ratna Dahiya 1, 1National Institute of Technology, India, 2 ICT Academy, India
146
Expert System for Sentence Recognition
Bipul Pandey , Anupam Shukla and Ritu Tiwari, ABV-Indain Institute of Information Technology and Management, India
148
MST-based Cluster Initialization for K-means
Damodar Reddy, Devender Mishra and Prasanta K. Jana, Indian School of Mines, India
149
Integration Testing of Multiple Embedded Processing Components
Hara Gopal Mani Pakala1,Raju KVSVN2,Ibrahim Khan3,1 Vignana Bgarathi Institute of Technology, India, 2AUCE, India,3RGUKT,India
150
Geometry and Skin Color Based Hybrid Approach for Face Tracking in Colour Environment
Mahesh M Goyani, Gitam Shikkenawis and Brijesh Joshi, S P University, India
151
Performance Analysis of Block and Non Block Based Approach of Invisible Image Watermarking Using SVD in DCT Domain
Mahesh M Goyani1 and Gunvantsinh Gohil2, 1 Sardar patel University, India,2Gujarat University, India
152
MIMO Ad Hoc Networks-Mutual Information and Channel Capacity
Swati Chowdhuri1, Arun Kumar Mondal2 and P.K.Baneerjee3, 1Secom College of Engineering, India, 2Guru Nanak Institute of Technology, India and 3Jadavpur University, India
153
Optimization of Mutimedia Packet Scheduling In AD HOC Networks Using Multiobective Genetic Algoritham
R.Muthu Selvi and R.Rajaram, Thiagarajar College of Engineering, India
161
A Novel Topographic Feature Extraction Method for Indian Character Images
Soumen Bag and Gaurav Harit, Indian Institute of Technology, India
163
Comprehensive Framework to Human Recognition using Palmprint and Speech Signal
Mahesh P.K. and M.N. ShanmukhaSwamy, Mysore University, India
164
Inclusion/Exclusion Protocol for RFID Tags
Selwyn Piramuthu, University of Florida, USA
165
Energy Minimization for Dynamic Real Time System with Dynamic Voltage Scaling
Ranvijay1, Rama Shankar Yadav1 and Smriti Agrawal2, 1Motilal Nehru National Institute of Technology, India and 2Jaypee University of Information Technology, India
166
A Survey On Hand Gesture Recognition in context of soft Computing
Ankit chaudary and jagdish L.Raheja, CEERI, India
167
Handwritten Numeral Recognition using Modified BP ANN Structure
Amit Choudhary1,Rahul Rishi2 and Savita Ahlawat3,1Maharaja Surajmal Institute, India,2TITS, India,3Maharaja Surajmal Institute of Technology, India
171
Efficient Density Based Outlier Handling Technique in Data Mining
KRISHNA GOPAL SHARMA1, ANANT RAM1 and YASHPAL SINGH2, 1G.L.A Institute of Technology and Management, India and 2Bundelkhand Institute of Engineering and Technology, India
172
Exergaming � New Age Gaming for Health Rehabilitation and Education
Ankit Kamal, Pune Institute of Computer Technology, India
173
Authenticating and Securing Mobile Applications Using Microlog
Siddharth Gupta and Sunil Kumar Singh, Bharti Vidyapeeths College of Engineering, India
174
Overcoming Social Issues in Requirements Engineering
Selvakumar Ramachandran, Sandhyarani Dodda and LavanyaSantapoor, Blekinge Institute of Technology, Sweden
175
Functional Based Testing In Web Services Integrated Software Applications
Selvakumar Ramachandran, LavanyaSantapoor and Haritha Rayudu, Blekinge Institute of Technology, Sweden
176
Multiple Ontologies for Semantic Digital Library in Health Domain
Prakash C. Sukhwal and Minal Bhise, Dhirubhai Ambani Institute of ICT, India
177
Assisting Programmers Resolving Vulnerabilities in Java Web Applications
Pranjal Bathia, Bharath Reddy Beerelli and Marc-Andre Laverdi�re, TCS Innovation Labs, India
180
An Iterative Method For Multimodal Biometric Face Recognition Using Speech Signal
Nageshkumar M and M.N.ShanmukhaSwamy, University of Mysore, India
182
Application of Artificial Neural Network to Predict Sales in a Telecommunication Industry
Rafael Schardosin and Jo�o Valiati, PIPCA, Universidade do Vale do Rio dos Sinos, Brazil
183
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment
Malarvizhi Nandagopal and V. Rhymend Uthariaraj, Anna University, India
184
Adoption of Cloud Computing in e-governance
Sachidananda Patnaik, Berhampur University, India
187
Multisource Adaptive Data Distribution and Routing in Wireless Sensor Networks
Subhabrata Mukherjee1,Amrita Saha1, Mrinal K. Naskar2 and Amitava Mukherjee3,1IIT Bombay, India, 2 Jadavpur University, India,3 IBM India Pvt Ltd, India
188
A Morphological-Based License Plate Localization in Complex Scene
P.I. Reji and Kumar Parasuraman, MS Universitiy, India
189
Estimating Strength of a DDoS Attack using Multiple Regression Analysis
B. B. Gupta, R. C. Joshi and Manoj Misra, Indian Institute of Technology, India
190
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching
Khushboo Hemnani, Dushyant Chawda and Bhupendra Verma, T.I.T Bhopal, India
191
Non-Replicated Dynamic Fragment Allocation In Distributed Database Systems
Nilarun Mukherjee, Bengal Institute of Technology, India
192
A Novel Image Encryption Algorithm Using two Chaotic Maps for Medical Application
G.A.Sathishkumar 1,.K.Bhoopathy bagan 2, N.Sriraam 3, Venkatachalam 1 and R.Vignesh 1,1Sri Venkateswara College of Engineering, 2 Madras Institute of Technology, 3 SSN College of Engineering.
193
Quality Analysis of a Chaotic Hopping Based Cipher Image
G.A.Sathishkumar1 and K.Boopathy bagan2,1Sri Venkateswara College of Engineering, India, 2Madras Institute of Technology, India
196
A Sementic Approach To Design An Intelligent Self Organized Search Engine For Extacting Information Relating to Educational Resources
B.Saleena1, S.K.Srivatsa2 and Centhil Kumar3, 1VIT University, India, 2St.Joseph�s College of Engineering - Chennai, India and 3B.S.Abdur Rahman University, India
198
A Novel Symmetrical Encryption Algorithm With High Security Based On Key Updating
G. Ramesh1 and R. Umarani2, 1Thiruvalluvar College of Engineering & Technology, India and 2Sri Sarada college for women, India