networkingtechnologies (icccnt 2013) · 2013fourthinternational conference oncomputing,...
TRANSCRIPT
2013 Fourth International
Conference on Computing,Communications and
Networking Technologies
(ICCCNT 2013)
Tiruchengode, India
4 - 6 July 2013
Pages 1489-2231
IEEE Catalog Number: CFP1352J-POD
ISBN: 978-1-4799-3927-5
3/3
TABLE OF CONTENTS
A Survey on Trust & Trust-Based Schemes In VANETs 1
M. Kavilha, Shrikant S. Tangade
Enhancing QoS Parameters of Group Mobility Model in WiMAX Networks for Military Applications 7
Shalini Easwaramoorthy, T. V. P. Sundararajan
An Efficient Feature Selection Paradigm Using PCA-CFS-Shapley Values Ensemble Applied to Small
Medical Data Sets 15S. Sasikala, S. Appavu Balamurugan, S. Geetha
Comprehensive Study on MANETs Network Layer Attacks 20
Gaurav Garg, Sakshi Kaushal, Akashdeep Sharma
Fusion Fingerprint Minutiae Matching System for Personal Identification 28
Pratixa I. Mislry, ChiragN. Paunwala
VHDL Implementation of UART with BIST Capability 34
Nitin Patel, Naresh Pale!
Challenges & Approaches in Multi-label Image Annotation 39
A. Kalaivani, S. Chitrakal
Objective Assesment of Different Segmentation Algorithm for Underwater Images 47
Jay C. Acharya, Sohil A. Gadhiya, Kapil S. Raviya
Efficient QR Decomposition Algorithm for LTE Standard 54
K. Kalyani, D. Sellalhambi, S. Rajaram
Concentration Control ofCSTR Through Fractional Order PID Controller by Using Soft Techniques 59
Abhishek Singh, Veena Sharma
Surveyon Privacy Preserving Updates on Unidentified Database 65
E. Gokulakannan, K. VenkalachalapathyA Survey on Scalable Image Indexing and Searching 70
S. Suchitra, S. Chitrakala
Low Power Analysis of MAC Using Modified Booth Algorithm 75T. S. UdhayaSwiya, A. Alii Rani
Effectiveness of RTS/CTS in IEEE 802.11 Wireless Adhoc Network in Light of Order DependentCapture 80
Kulsum I. Patel, Mayur M. Vegad
Packet Hiding Using Cryptography with Advanced Key Management against Counter JammingAttacks in Wireless Sensor Networks 86
S. swaminathan, S. suganya, K. Ambika
Improved Power Control for Femtocells in the Presence of Channel Uncertainty 90
5. Gokila, P. Padmaloshani, S. Nirmala
A Novel Asymmetric Coplanar Strip Fed Antenna for Dual Band Application 96K. A. Ansal, T. Shanmugantham
Ontology Based Clustering Algorithm for Information Retrieval 100
Nadana T. Ravishankar, R. Shriram
A Novel Approach for USB2.0 Validation on System on Chip 104
Maneesh Kumar Pandey, Shwetank Shekhar, Joginder Singh, GauravKumar Agarwal, Nitin Saxena
Intrusion Detection System Using Stream Data Mining and Drift Detection Method 108
Manish Kumar, M. Hanumanthappa
Performance Improvement of RMSA Using Different Substrates 113
SurajRabindranath, M. Utkala Prakash, D. Chetana, Mahesh M. Gadag
Security for Wireless Sensor Networks in Military Operations 118
Rajat Gupta, Pallavi Singh ,Kaushal Sultania, Archil Gupta
Fractional Order Controller for Trajectory Tracking of a Two Degree of Freedom Robot
Manipulator 124Amala Preyadarchanc, Srinivasan Alavandar
Result Evaluation of Transaction and Occurrences Based on Density and Zonal Minimum Support 128
PreetiKhare, Hitesh GuptaIssues ofMANET Routing Protocols on 4G Network 134
Shamurailatpam Susanta, Khomdram Barun, Robert Hijam, Rashree Rajkumari
Automatic Generation of Emotions for Social Networking Websites using Text Mining 142
Tejasvini Patil, Sachin Patil
Voltage Intensity Based Non-Invasive Blood Glucose Monitoring 148
K. A. Unnikrishna Menon, Deepak Hemachandran, Abishek Thekkeyil Kunnath
Entanglement Distillation Using Various Quantum Channels 153
Akash Vcrma, Abhinav Pandey. Sankel Nandan, P. K. Panigrahi
NextGen Data Persistence Pattern in Healthcare: Polyglot Persistence 159Srikrishna Prasad, M. S. Nunifar Sha
Classification Based Survey ofImage Registration Methods 167Kralika Sharma, Ajay Goyal
Performance of Secured Zone Routing Protocol due to the Effect ofMalicious Nodes in MANETs 174
Dilli Ravilla, Chandra Shekar Reddy Putta
Enhanced Fast Emergency Path Schema (EFEP-S) to Redcue Packet Loss During MultipleIndependent Link Failure in OSPF Routing 182
V. Janani, R. Chandrasekar
Analysis of Two Novel Chaotic Systems with a Hyperbolic Sinusoidal Nonlinearity and their AdaptiveChaos Synchronization 187
Sundarapandian VaidyanathanRS Scheduled Multiple Mobile Sinks in WSNS with Delay Constrained Approach 195
M. Sudha, J. Sundararajan, K. Kavilha
Classification of Selected Medicinal Plant Leaves Using Texture Analysis 202T. Sathwik. R. Yasaswini, Roshini Venkatesh, A. Copal
A Review on Illumination Techniques in Augmented Reality 208Divya Kamboj, Wankui Liu, Neelika Gupta
Depth - Based Segmentation- a Review 217Neelika Gupta, Weipeng Xu, Divya Kamboj
Classification of Electrooculograph Signals: Comparing Conventional Lassifiers Using CBFS Feature
Election Algorithm 2265. Mala, K. Latha
Removal of Black Hole Attack in AODV Routing Protocol of MANET 233Ketan S. Chavda, Ashish V. Nimavat
Realization of Reconfigurable FLC on ADSP-BF537 Processor 238P. Maji, S. K. Patra, K. K. Mahapalra, J. Govindarajan, J. J. Patel
Integrating MAPD in Mobility Architecture using MIPv6 242R. Venkadesh, V. Nehru, K. Rajan
Active Controller Design for the GPS ofFour-Wing Chaotic Systems 247Sundarapandian Vaidyanathan, Sarasu Pakiriswamy
Enhancing TCP Performance in Multihop Ad Hoc Networks 255Minakshee Patil. Ashwini Patil
Interpretation of User Intention Via Textual and Visual Resemblance 261Chailali Pawar, Sachin Patil
Agent Based Tool for Topologically Sorting Badsmells and Refactoring by Analyzing Complexities inSource Code
267S. Ayshwaryu Lakshmi, S. A. Sahaaya Arul Mary, S. Shamnuga Vadivu
Verification and Validation of MapReduce Program Model for Parallel K-Means Algorithm on
Hadoop Cluster274
Amresh Kumar, M. Kiran, B. R. Prat hapA Methodology for Ranking Cloud System Vulnerabilities 282
Patrick Kamongi, Srujan Kotikela, Mahadevan Gomalhisankaran, Krishna Kavi
Stochastic Analysis of Data Collection Using Mobile Sink with Fixed and Variable Trajectories 288S. Pushpavalli, K. Indra Gandhi
Separation and Recognition of Overlapped Latent Images 2935. Jeyamhi, N. Uma Maheswari, R. Venkatesh
Real Time Speaker Recognition of Letter 'ZHA' in Tamil Language 299A. Srinivasan
Performance Analysis of Montgomery Multiplier for Public Key Cryptosystem 304Sandeep Kakdc. G. Somulu, Pravin Zode
Implementation of Xenserver to Ensuring Business Continuity Through Power ofVisualization forCloud Computing 309
N. Stualinprasannah, S. SuriyaStochastic Analysis of Data Collection Using Mobile Sink with Fixed and Variable Trajectories 315
5. Pushpavalli, K. Indra Gandhi
Ensemble Based Optimal Classification Model for Pre-diagnosis ofLung Cancer 320K. Balachandran, R. Anitha
URED: Upper Threshold RED an Efficient Congestion Control Algorithm 327
Chandni M. Patel
A Novel Approach for Image Enhancement by Using Contrast Limited Adaptive HistogramEqualization Method 332
5. Muniyappan, A. Allirani, S. Saraswathi
Data Security in Cloud Using RSA 338
Pachipala Yellamma, Challa Narasimham, Velagapudi sreenivas
Viper Snake Intelligent Algorithm Using Missile Tracking and Attacking System 344
M. Venkateswaran, M. Backialakshmi
Protection of Depth-image-based Rendering 3D Images Using Blind Watermarking 349
K. A. Arun, Jeno P. Poul
Evaluation Performance Study of Firefly Algorithm, Particle Swarm Optimization and Artificial Bee
Colony Algorithm for Non-Linear Mathematical Optimization Functions 355
Siddharth Agarwal, Amrit Pal Singh, Nit in Anand
Wireless Embedded Device (PIC) Based on MiWi Technology for Monitoring PhysiologicalParameters 363
Nurul S. Hidaya, P. Jenopaul
Comparison of Data Mining Classification Algorithms for Breast Cancer Prediction 369
Chintan Shah, Anjali G. Jivani
Mining Hidden Communities in Social Networks Using KD-Tree and Improved KD-Tree 373
Renuga R. Devi, M. Hemalatha
Characterization of an Optical Communication System Utilizing Dispersion Compensating Fiber and
Nonlinear Optical Effects 380
K. Miziya, S. K. Sudheer, Alina C. Kuriakose
An Effective Numbering and Classification System for Dental Panoramic Radiographs 386
Vijayakumari Pushparaj, Ulaganathan Gurunathan, BanumalhiArumugam, Abhinaya Baskaran, Alamelu
Valliappan
Design and Implementation of a BIST Embedded High Speed RS-422 Utilized UART over FPGA 394
Shumit Saha, Ashikur Rahman, Amit Thakur
Improving Dynamic Data Integrity Verification in Cloud Computing 399
Trushna S. Khatvi, G. B. Jelhava
Energy Aware Optimal Cluster Head Selection in Wireless Sensor Networks 405
M. Natarajan, R. Arthi, K. Murugan
Bio-inspired Algorithm for Optimizing the Localization of Wireless Sensor Networks 409
A. Tamizharasi, R. Arthi, K. Murugan
Image Encryption Using Separable Reversible Data Hiding Scheme 414
M. Smitha, V. E. Jayanthi, Ajitha Merlin
Multi-tenant SaaS Cloud 420
Gurudatt Kulkarni, Rupali Shelke, Rajnikant Palwe, PrasadKhatawkar, SadanandBhuse, Hemant Bankar
Low Cost Real Time Vehicle Tracking System 424
Rohit Minni, Rajat Gupta
Information Gradien Based Content Search Architecture for Mobile Opportunistic Network 429
Suvadip Batabyal, Parama Bhaumik
Multi Pattern Matching Technique on Fragmented and Out-of-Order Packet Streams for Intrusion
Detection System 437
Manish Kumar, M. Hanumanthappa
An Efficient Web Recommender System Based on Approach of Mining Frequent Sequential Pattern
from Customized Web Log Preprocessing 443
Manisha Valera, Uttam Chauhan
Deployment ofFemtocell and Antenna in Commercial 449
Lavina Balraj, R. Kavitha
Second Order Twisting Sliding Mode Control of Multi-agent Network with Input Disturbance 454
Udayan B. Kamble, Jayalkshmi O. Chandle, V. S. Lahire, R. D. Langde
Improve the Performance of LRU Page Replacement Algorithm using Augmentation of Data
Structure 460
C. C. Kavar, S. S. Parmar
Data Mining Based CIDS: Cloud Intrusion Detection System for Masquerade Attacks [DCIDSM] 465
Jain P. Pratik, Madhu B. R.
Incremental PSVM for Underwater Target Classification with Incorporation of New Classes 470
Poonam Panchal, Sarath Gopi, R. Pradeepa
Low-Power and Area-Efficient Carry Select Adder Using Modified BEC-1 Converter 476
L. Mugilvannan, S. Ramasamy
TEST PATTERN GENERATION FOR BENCHMARK CIRCUITS using LFSR 481
Chengani Vinod Chandra, S. Ramasamy
Sine/cos Generator for Direct Digital Frequency Synthesizer Using Pipelined Cordic Processor 487
P. Saravanan. S. Ramasamy
Reliable OSPM Schema for Secure Transaction Using Mobile Agent in Micropayment System 493
Chitra N. Kiran, G. Narendra Kumar
Evaluation of Tumor Segmentation 499
Sonam Bansal, Ajay Miltal
Hand Gesture to Speech Conversion Using Matlab 503
R. R. Itkarkar, Anil V. Nandi
Adoption of Business Intelligence: In Hotel Industry 507
M. Daryaei, M. Shirzad, V. Kumar
Optimization of Migration Downtime of Virtual Machines in Cloud 513
J. Arpulharaj Johnson
Bandwidth Map-TCP Friendly Rate Control Algorithm for Improving QoS in StreamingApplications 518
K. Suresh KumarReddy, D. Rajaveerappa, S. Khadeeja Banu
Shot Boundary Detection Using Color Correlogram and Gauge-SURF Descriptors 524
C. R. Deepak, Umesh R. Babu, Khande Bharath Kumar, C. M. Rahul Krishnan
Enhancement of Coarse- Grained Parallel Genetic Algorithm for Shortest Path Routing 529
L. Venkatesan, P. Sivakumar
Reputation-Based Mechanism to Mitigate Misbehavior in Mobile Ad Hoc Networks 535
P. Mani, P. Kamalakkannan
Performance Evaluation of Encryption Techniques and Uploading of Encrypted Data in Cloud 540
V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma
Virtual World for Education and Entertainment 546
Ravinsingh Jain, Srikanl Iyengar, Ananyaa Arora
An Algorithm to Enhance Security in RSA 552
Rohil Minni, Kaushal Sullania, Saurabh Mishra, Durai Raj Vincent
Mitigating Distributed Denial OfService Attacks In Multiparty Applications In The Presence Of
Clock Drifts 556
P. Malalhi
Framework for Enhanced Joint Connectivity and Coverage Using Random Based Distribution in
WSN 562
Deepak S. Sakkari, T. G. Basavaraju
An Improved Motion Detection and Tracking of Active Blob for Video Surveillance 569Michael Kamaraj, Balakrishnan
Evolving Profligate and Conspicuous Web Applications Using Reverse AJAX_ICCNT 576Rachit Mohan Garg, Mohpreel Singh
Performance Analysis of Branch-and-Bound Approach with Various Model-Selection ClusteringTechniques for Image Data Point 581
C. S. Sasireka, P. Raviraj
Evaluating MANET Routing Protocols Under Multimedia Traffic 590
Ajinkya D. Kadam, Sharad S. WaghDetection of Brain Tumor Using Neural Network 595
V. Amsaveni, N. Albert Singh
Optimization of Encryption Technique Using Evolutionary Algorithm for Protecting Multimedia
Contents in P2P System 600Ramesh Shahabadkar, Ramachandra V. Pujeri
Behavior Recognition in Surveillance Video Using Temporal Features 606J. Arunnehru, M. Kalaiselvi Geetha
Gear Tooth Fault Detection by Autoregressive Modelling 611Ncela K. Nikhar. Sanika S. Patankar, Jayant V. Kulkarni
Robust and Cost-Effective Security Algorithm for Pre-Stage and Post-Stage of Data Aggregation 617M. A. Bharathi, B. P. Vijaya Kumar, D. H. Manjaiah
Addition of Polydimethylsiloxane in FOS Technology for Sustainable Sensing 623M. H. B. Afzal
Architecture Design of Illumination Change Progressive Motion Estimation Algorithm 629Madhwi Bamankar, P. Muralidhar, C. B. Ramarao
Energy Efficient Spinal Scheduling On Mobile Sensors 633M. Sudha, J. Sundararajan, R. Priya
Modified Full Search Block Matching Algorithm 638
Madhuri Bamankar, P. Muralidhar, C. B. Ramarao
Classification and Retrieval of Natural Scenes 642R. Raja, S. Mansoor Roomi, D. Dharmalakshmi
Identifying Trusted Routing Path in WSNS Through TARF 650
S. ANITHA, A. NITHYA
Automatic Registration of Images with Simulated Rotation and Translation Estimation UsingHAIRIS 655
K. Priyadharshini
Intrusion Detection System on MAC Layer for Attack Prevention in MANET 663
Tapan P. Gondaliya, Maninder Singh
Efficient Method for Controlling Electric Power by Automated Monitoring System using FPGA 668
R. Kannan, Suresh T. R. Kumar
Smooth Query Processing In Spatial Database 672
Tukaram Gawali, R. B. Wagh
Separation and Localisation of Heart Sound Artefacts from Respiratory Data by Adaptive Selection
of Eigen Triples in Singular Spectrum Analysis 677
Shinto Sebastian, S. Rathnakara
A Novel Algorithm for Fingerprint Identification Using Ellipse Method 682
M. J. Asha
Finite Time Consensus for Leader Following Multi-agent System with Distributed Observer Design 686
V. S. Lahire. J. O. Chandle, V. D. Dhaigude, A. A. Suste
High Performance Distributed Computing 692
Sneha Kumari
Double Image Encryption Using Double Pixel Scrambling and Linear Canonical Transform 696
Narendra Khatri, Navneet Agrawal
Detecting Anomalies in WLAN using Discrimination Algorithm 701
P. Kavitha, M. Usha
High Performance Low Power Dual Edge Triggered Static D Flip-Flop 707
Gagandeep Singh, Gurmohan Singh, Vemu Sulochna
Hybrid Fuzzy Classifier Based on Feature-wise Membership Given by Artificial Neural Network 712
U. V. Kulkarni. S. V. Shinde
RESTful Web Service Integration Using Android Platform 718
Mohammed Husain Bohara, Madhuresh Mishra, Sanjay ChaudharyA Remote Experimentation Using Virtual Laboratory 724
Chandrashekhar Gode, M. S. Madankar
Enhanced Fault Tolerance Using EMRC in Wireless Communication 730
Sadanand Patil, Ketki Khante
Domain Specific Modeling Framework for Agent Development 735
P. FelcyJudith, E. Kirubakaran
Review : Performance Evolution of different Detection Techniques in V-BLAST 740
Pratik P. Jariwala, Pranav Lapsiwala
Performance Evaluation and Comparison of Routing Protocols in MANETS 745
Tejashree S. Khanvilkar, K. P. Patil
Enhanced Ant Clustering Algorithm (EACA) For Distributed Databases 749
K. Sumangala
Design and Analysis of I-shaped MIMO Antenna for Wireless Applications 753
A. VISHWAPRIYA, S. BANU, R. YOGAMATTHI
Performance Evaluation of Color Image Segmentation Using K Means Clustering and Watershed
Technique 758
Sugandhi Vij, Sandeep Sharma, Chelan Marwaha
Towards a Cross Layer Framework for Improving the QoS of Delay Sensitive HeterogeneousWMSNs 762
S. Sridevi, M. Usha
Bandwidth Enhancement of Microstrip Patch Antenna Using Different Structures of Dielectric
Resonator 767
Harshil N. Prajapali, Jayesh C. PrajapatiEmbedded VoIP Communication System with Graphical User Interface Features 774
G. S. Divya, P. C. Srikanth
A Dynamic Hybrid Approach for Wormhole Detection and Prevention 780
Ankit Mehto, Hitesh Gupta
Cloud Resource Provisioning for Amazon EC2 784
Vidya K. Bhise, Ajit S. Mali
A Comparative Performance Evaluation ofEvolutionary Algorithms for Optimal Design ofThree-
phase Induction Motor 791
Soumya Ranjan, Sudhansu Kumar Mishra, Subhendu ku. Behera
Simple Pendulum Analysis - a Vision Based Approach 796
R. Kavitha, Umesh R. Babu. C. R. Deepak
Anti-Synchronization of Rabinovich Systems using Active and Adaptive Controllers 801
Sundarapandian Vaidyanathan, Karlhikeyan Rajagopal
Test Power Minimization of VLSI Circuits: A Survey 807
Senlhil G. Kumar. K. Paramasivam
Effective Dictionary Based Data Compression and Pattern Searching in Dictionary Based
Compressed Data 813
Pooja Jain, Anuragjain, Chelan Agrawal
LMP-DSR: Load Balanced Multi-Path Dynamic Source Routing Protocol for Mobile Ad-HOC
Network 819
Lokesh Kumar Malviya, Damodar Tiwari
Brain Computing Interface For Wheel Chair Control 823
Naveen R. S., Anitha Julian
Role of Signal Processing for Estimating the Wall Thickness for TWI System 828
Sandeep Kaushal, Dharmendra Singh
Fuzzy Based Clustering Method on Yeast Dataset with Different Fuzzification Methods 835
P. Ashok, G. M. Kadhar, E. Elayaraja, V. Vadivel
Tumour Detection in Brain MRI Using Improved Segmentation Algorithm 841
Praveen E. Kumar, Manoj V. Kumar, M. G. Sumithra
A Novel and Efficient Key Sharing Technique for Web Applications 848
P. M. Durai Raj Vincent, E. Salhiyamoorthy
Gain and Bandwidth Enhancement of Aperture Coupled Rectangular DRA 853
Sarila Singh, Rajveer S. Yaduvanshi
Performance Analysis of QoS Based Model for Wireless Network Communication 858
Beaulah David, P. RavirajInter-cell Interference Mitigation for Cell Edge Users 864
R. Rajesh, K. Muruganandam
Fusion Fingerprint Minutiae Matching System for Personal Identification 869
Pralixa I. Mistry, Chirag N. Paunwala
An Improved Location-aware Ant Colony Optimization Based Routing Algorithm for MANETs 875
Ajit R. Bandgar, Sandeep A. Thorat
Cross Layer Approach to Detect Malicious Node in MANET 881
Vidya N. Patil, Sandeep A. Thorat
Design and Implementation of Data Acquisition and Control System for Multi-Wavelength DayglowPhotometer 887
K. Miziya, K. G.Gopchandran, P. Pradeepkumar, C. Vineeth, T. K. Panlh, P. G. Anumod
A New Energy Efficient Routing Algorithm for Network Lifetime Maximization in Wireless Sensor
Network 894Dhaval J. Rana, Nirav M. Raja
A Load Balancing Algorithm For Private Cloud Storage 901
B. Prabavathy, K. Priya, Chitra Babu
Rational Unified Process for Service Oriented Application in Extreme Programming 907
G. Sivanageswara Rao, V. Phani Krishna, K. Rajasekhar rao
Handling Concurrency Control Problem in Web Service Compositions 913
Shyam S. Sundar, R. Kanchana
Hybrid Technique for User's Web Page Access Prediction Based on Markov Model 918
Priyanka S. Panchal, Urmi D. Agravat
Chaos Synchronization of Coplitts Oscillator Via Backstepping Control 926
Sundarapandian Vaidyanathan, Suresh Rasappan
Quantitative Analysis and Fracture Detection of Pelvic Bone X- Ray Images 931
R. Vijayakumar, G. Gireesh
A Survey on Energy Efficient Routing Protocols in Wireless Sensor Network 938
Savita Lonare. Gayatri Wahane
Modeling and Optimization of Extraction- Transformation-loading (ETL) Processes in Data
Warehouse: an Overview 943Nitin Anand. Manoj Kumar
DWT-SVD Based Reversible Watermarking Algorithm for Embedding the Secret Data in Medical
Images 948
Praveen E. Kumar, Remya Elizabeth Philip, Sunil P. Kumar, M. G. Sumilhra
A Novel Approach for Heart Beat Counting of Daphnia Pulex 9555. Mansoor Roomi, B. Ananta Narayanan, S. Rohini
Network Architecture and Security Issues in Campus Networks 961
MohammedNadirBin Ali, M. LutfarRahman, SyedAkhter Hossain
An Efficient Framework for Resource Allocation in Cloud Computing 970
Aman Kumar, Emmanuel S. Pilli, R. C. Joshi
Blackhole Attack Detection and Prevention by Real Time Monitoring 976
Durgesh Kshirsagar
FPGA Implementation ofHilbert Transform Via Radix-Pipilined FFT22
Processor 981
Archna Rani, Ram Mohan Verma, Saurabh Jaiswal
A Novel Technique for Medical Image Fusion Using Improved Contourlet Transformation with
Modified DFBs 985
Jaspreet kaur, Shefaly Sharma, Shipra GuptaDetection and Tracking of Moving Objects by Fuzzy textures 990
S. Mohamed Mansoor Roomi, S. Ann karpaga
Security Framework for VANET for Privacy Preservation 995
V. S. Chelan, N. S. Benni, C. Bhushan
An Automatic Contrast Enhancement Method Based on Stochastic Resonance 1001
G. Maragatham, S. Mansoor Roomi
Security and Design ofa Cryptoprocessor for Pairings Over BN Curves on FPGA Platform 1008
Sanihi Maria Joy, V. M. Senthil kumar
A Hybrid Method Based on Genetic Algorithm, Self-organised Feature Map, and Support Vector
Machine for Better Network Anomaly Detection 1013
S. Anil, R. Remya
Design a Peer to Peer Overlay Protocol for Mobility Management of Mobile Nodes Using Bluetooth
Media 1018
Abdollah Mohammadi, BehzadAkbari
Design and Fpga Implementation of Binary Squarer Using Vedic Mathematics 1024
L. Sriraman, K. Saravana Kumar, T. N. Prabakar
Bistate Speckle Removal Filter Based on Noise Variance 1029
P. Vasuki, S. MohamedMansoorRoomi
Improved Modified Fast Haar Wavelet Transformation [MFHWT] Based Visible Watermarking 1036
Shefaly Sharma, Jaspreet Kaur, Shipra Gupta
Robust Self Tuning ofFuzzy Sliding Mode Control 1041
G. V. Lakhekar, V. D. Saundarmal
On Hybridizing Fuzzy Min Max Neural Network and Firefly Algorithm for Automated Heart Disease
Diagnosis 1048
B. R. Rajakumar, Aloysius George
Nucleotide Transfigurations Using Playback Conversion 1053
Balamurugan Kathiresan, G. M. Karthik
A Neural Network Approach for Disease Forecasting in Grapes Using Weather Parameters 1058
S. Sannakki, V. S. Rajpurohit, F. Sumira, H. Venkatesh
A Efficient Key Strategy For Prolonging Network Lifetime in Wireless Network 1063
Neha Gupta, Anurag Jain, Harsh Kumar Singh
Diagnosis and Classification of Grape Leaf Diseases using Neural Networks 1067
Sanjeev S. Sannakki, Vijay S. Rajpurohit, V. B. Nargund, Pallavi Kulkarni
An Enhanced Virtual Carrier Mechanism for MANET With Multi Rate Traffic Subdomains 1072
M. Abdul Gafur, Niraj Upadhayaya, SyedAbdul Sattar
Active Key Management Scheme to Avoid Clone Attack in Wireless Sensor Network 1077
P. Thiruvannamalai Sivasankar, M. Ramakrishnan
An Approach to Detect Malicious Activities in SCADA Systems 1081
T. C. Pramod, N. R. Sunitha
RFID Based Health Assistance & Monitoring System through a Handmounted Embedded Device 1088
Divyesh Dixit, Ankit Kalbande, K. M. Bhurchandi
Technique for Detection of Cooperative Black Hole Attack in MANET 1097
Gayatri Wahane, Savita Lonare
Coherent BPSK Demodulator Using Costas Loop and Early-Late Gate Synchronizer 1105
P. Shachi, Rahul Mishra, Ravi KumarJatoth
Robust Detection & Tracking of Object by Particle Filter Using Color Information 1111
Ashveani Kumar, Sudhanshu kumarmishra, Pranjnaparimita Dash
Performace and Energy Efficient Greedy Forwarding Method for Sensor Networks 1117
Shradha P. Dugam, S. P. Pingal
Reduced Order Linear Functional Observers for Large Scale Linear Discrete-Time Control Systems 1122
Sundarapandian Vaidyanathan, Kavitha Madhavan
Distributed Trust & Time Management Strategy in VANETs 1129
M. Kavitha, Shrikant S.Tangade, SunilKumar S. Manvi
HEFT Based Workflow Scheduling Algorithm for Cost Optimization Within Deadline in HybridClouds H35
Nitish Chopra, Sarbjeet SinghNeuro-fuzzy Classifier Based on the Gaussian Membership Function 1141
U. V. Kulkarni, S. V. Shinde
Exploiting GNU Radio and USRP: An Economical Test Bed for Real Time Communication Systems 1148
M. Abirami, V. Hariharan, M. B. Srulhi, R. Gandhiraj, K. P. Soman
Optimized Data Analysis in Cloud Using BigData Analytics Techniques 1154
5. Ramamoorlhy, S. Rajalakshmi
Very High Resolution Image Registration Based on Two Step Harris-Laplace Detector and SIFT
Descriptor 1159
Kralika Sharma, Ajay Goyal
Traffic Analysis using Discrete Wavelet Transform and Bayesian Regression 1164T. Nishidha, P. Janardhanan
Energy Efficient Clustering Scheme Based On Grid Optimization Using Genetic Algorithm for
Wireless Sensor Networks 1174
Gagandeep Kumar, Jaget Singh
Improving Tcp Performance in Wireless Network During Vertical Handoff from WiFi to WiMAX 1179K. Abirami, S. Solhya Priya, K. Murugan
User-centric Trust Based Identity As a Service for Federated Cloud Environment 1183E. Samlinson, M. Usha
Multi-level and Multi-key Trust in PPDM 1188A. V. Sriharsha, C. Parlhasaralhy
Fuzzy Rule Based Data Forwarding for Energy Efficient Wireless Sensor Networks in IndustrialControl System 1193
S. Jisha, Sangeelha Jama]
Design and Implementation of an Automatic Beverages Vending Machine and its Performance E
valuation Using Xilinx ISE and Cadence 1199V. V. S. Vijay Krishna, A. Monisha, S. Sadulla, J. Pralhiba
Real-time Implementation and Performance Analysis ofan Intelligent Fuzzy Logic Controller forLevel Process 1205
P. Manikandan, M. Geetha, T. K. Vijaya, K. S. Elamurugan, V. Silambarasan
LEACH-SCH: An Innovative Routing Protocol for Wireless Sensor Network 1211Ankit Solanki, Nileen B. Palel
Obsolescence Risk Optimization Using Fuzzy Logic and Genetic Algorithm 1216Amir Kouhpayehzadeh Esfahani, BehzadDarbeheshty. Sedigheh Kouhpayehzadeh Esfahani, AH Akbar Niknafs
Hybrid Association-classification Algorithm for Anomaly Extraction 1221Gaurav shelke, AnuragJain, Shubha dubey
Stand-alone Photovoltaic / Wind Energy Hybrid Generation System with MPPT for Rural
Applications 1226R. Karlhikeyan, P. Mahalakshmi, N. GowriShankar
Minimization of Position Uncertainty Using 3-D Stereo Imaging Technique for the Real-Time
Positioning ofa Handheld Breast Tissue Anomaly Detection Probe 1232ParvindK. Grewal. K. S. Viswanath. Farid Golnaraghi
Implementation ofVoice Based Wheelchair For Differently Abled 1238M. BALA KUMARAN, A. Pravin Renold
Evacuation Map Generation Using Maze Routing 1244Arushi Jain
A Faster Genetic Algorithm to Solve Knapsack Problem Employing Fuzzy Technique 1250Shalini Mahalo, Sanjay Biswas
Analysis of Sentiment on Newspaper Quotations: A Preliminary Experiment 1257S. Padmaja, Sameen S. Fatima, Sasidhar Bandu
EMP (Electro-Magnetic Pulse) Weapon Technology along with EMP Shielding & Detection
Methodology 1262
Viren Pereira, G. R. Kunkolienkar
FPGA Implementation of Reliable and Energy Efficient Architecture for a LTE Uplink System 1267
G. Indumathi, Allin Joe
High Efficiency Biquad Infinite Impulse Response Filter Using Charge Recovery Logic Family 1274
K. Chinnusamy, K. Duraiswamy, K. Surya
OFDM Transceiver Design Using C 1280
Indira Bahaddur, C. L. Triveni, P. C. Srikanth
Automatic Verification of Test Oracles In Functional Testing 1284
T. R. Monisha, A. Chamundeswari
Generating Test Cases for Q-Learning Algorithm 1288
Lavanya Kumaresan, A. Chamundeswari
An Enhanced Method for Privacy Preservation in Data Publishing 1295
Christy Thomas, Diya Thomas
Pell's RSA Key Generation and its Security Analysis 1300
Chandra T. segar, R. Vijayaragavan
Design of Impulse Distributed Waveform Generator 1305
S. Janaki, Siva Yellampalli
OFDM Transceiver Design Using C 1311
Indira Bahaddur, C. L. Triveni, P. C. Srikanlh
Novel Defense Mechanism against Data Flooding Attacks in Ad Ho. Network 1315
Indira Bahaddur, C. L. Triveni, P. C. Srikanth
Recent Computing Techniques of ECG 1320
G. Chandra Mohan, SwapnaDevi
Double Threshold Energy Aware Load Balancing In Cloud Computing 1324
Jayant Adhikari, Sulabha Patil
Performance Evaluation ofVirtual Machine (VM) Scheduling Policies in Cloud Computing:(Spaceshared & Timeshared) 1330
Sumit Khurana, Khyati Marwah
Multicasting ofVideo Stream Over Wimax Network 1335
A Chandra, P. Saravanaselvi, P. Latha
A Survey on Attacks, Security and Trust Management Solutions in VANETs 1340
Shrikant S. Tangade, Sunilkumar S. Manvi
Detection of Lung Cancer Nodules Using Automatic Region Growing Method 1346
S. SHAIK PAR VEEN, C. KAVITHA
Automated Static Data Flow Analysis 1352
IshwariAghav, Vishal Tathe, Aashay Zajriya, M. Emmanuel
Taguchi's Loss Function Based Measurement ofMobile Ad-Hoc Network Parameters under AODV
Routing Protocol 1356
Vinod Mahor, Sandeep Raghuwanshi
Network Device Driver for RTL8139C 1363
G. N. Chandan, H. C. Praveen, K. N. Muralidhara
A Novel Boundary Approach for Shape Representation and Classification 1369
L. Sumalatha, B. Sujatha, P. Sreekanth
Improving the Efficiency ofRetrieved Result Through Transparent Proxy Cache Server 1373
S. Kalarani, G. V. Uma
Automated Stock Price Prediction and Trading Framework for Nifty Intraday Trading 1381
AparnaAnant Bhal, Sowmya S. Kamaih
Blur Estimation Using Polynomial Curve Fitting Algorithm for Image Restoration Using Blind
Deconvolution 1387
Smita S. Patil, Pramod M. Kanjalkar, Jayant V. Kulkarni
A Comparative Study of Various Object Oriented Testing Techniques 1392
Prashanl Vats, Sushila Madan, Anjana Gosain
An Approach to Improve Apriori Algorithm Based On Association rule Mining 1400
Chanchal Yadav, Shuliang Wang, Manoj Kumar
An Enhanced Security Algorithm for Wireless Application Using RSA and Genetic Approach 1407
G. Prema, S. Natarajan
Resource Aware Scheduling in Hadoop for Heterogeneous Workloads Based on Load Estimation 1412
Sutariya B. Kapil, Sowmya S. Kamath
Hardware Software Co-simulation ofDual Image Encryption Using Latin Square Image 1417
Naveen Kumar, Sharath Kumar, H. T. Panduranga
Global Optimization for 3-D Reconstruction of Coronary Artery Trees from Angiographic ImageSequence 1422
Mahima Goyal, Jian Yang, Arun Prakash Agrawal. RuoxiuXiao
Capacity and SINR Improvement Through Inter-cell Interference Management in LTE Femtocell
Networks 1427
Anand Bhikhubhai Patel. Sukant K. Chhotamy, Niteen B. Patel
Secure Energy Management System Using Embedded Fuzzy Controller 1432
Deepiga Ravi, A. S. Dharani, S. Sandhya, Kanthalakshmi
CH-MAC: Congestion Control Hybrid MAC for Wireless Sensor Network 1438
B. Priya. S. Solai Manohar
A system to Filter Unsolicited Texts from Social Learning Networks 1444
Sunil Yadav. S. Das, D. Rudrapal
Design of Free Space Optical Communication Link with Mach-Zehnder Optical Modulator for LongDistance I449
Nitin Garg, Sanjeev Kumar
A Time Space Cryptography Hashing Solution for Prevention Jellyfish Reordering Attack in Wireless
Adhoc Networks 1454
Hera/P. Patel, M. B. Chaudhari
Introduction To Fibre-Optic Sensing System And Practical Applications In Water Quality
Management 1460
M. H. B. Afzal
An Artificial Immune System with Local Feature Selection Classifier for Spam Filtering 1469
Mayank Kalbhor, Shailendra Shrivastava, Babita Ujjainiya
DIP: Detection of Invalid Packets in Vehicular Ad-hoc Networks (VANETs) 1476
M. Maheswari. R. Muthumeenakshi, C. Chinthamani. K. Murugan
Automated Techniques and Tools for Program Analysis : Survey 1482Kulkarni A. Ashi.ih, Jagannath Aghav
Signed Fixed-point Multiplier for DSP Using Vertically and Crosswise Algorithm 1489
M. Ashwalh, B. S. Premananda
Earth Moon Communication Incorporated Internet Webpage Based Control for Robots 1495C. Abilash, B. Lakshminath
Analysis of Required Resources for a Node Using Queue System in an Ad hoc Network 1500
Vahid Haghighaldoosl, Siavash Khorsandi
Querying RDF and OWL Data Source Using SPARQL 1507Naveen Kumar, Suresh Kumar
Optimized - Block Based Trace Cache 1553P.Sreeram, Pradeep.K. Mukherjee
A Hybrid-Token and Textual Based Approach to Find Similar Code Segments 1518Akshat Agrawal, Sumil Kumar Yadav
Cross Layer Awareness Optimization Between Physical Layer and MAC Layer of Wireless
Infrastructure Based Network Using Bio Inspired Algorithm 1522Vinay Verma, Savila Shiwani
RFID Based Student Monitoring and Attendance Tracking System 1525SA1KR1SHNA CHATRATI, SUMANTHNAIDU, CHRAGHAVA PRASAD
Location Awareness of the Cloud Storage with Trust Management Using Common DeploymentModel 1530
C. Saravanakumar, C. Arun
VM Level Load Balancing in Cloud Environment 1535M. Ajil. G. Vidya
FPGA Implementation for Generation of Six Phase Pulse Compression Sequences 1540M. K. Verma. B. S. Premananda
Implementing a Power Aw are QoS Constraints Routing Protocol in MANETs 1545Shivashankar, G. Varaprasad, H. N. Suresh, G. Devaraju
On the Combined Beamforming with Space-Time-Frequency Code in MIMO-OFDM Systems 1552Neeraj Shrivastava. Aditya Trivedi
A Novel Capacitive RF MEMS Switch Design for Low Voltage Applications 1557Tejinder Singh. Navjot Khaira, Jitendra Sengar
Calculations of the Impact on Atmospheric Turbulence Conditions on Free Space OpticalCommunication Links Using Gamma-Gamma Model 1563
Tejinder Singh
Vibration Analysis of Electrical Rotating Machines Using FFT: a Method of Predictive Maintenance 15685. 5. Palil. J. A. Gaikwad
An Efficient Test Pattern Generator for High Fault Coverage in Built-In-Self-Test Applications 1574
P. Moorthy, S. Saranya Bharathy
Design of Low Power Multiple Output Power Supply for Embedded Systems 1578
Umesh Goyal, Neelam Rup Prakash
Comparative Performance Analysis of Extended Kalman Filter and Neural Observer for State
Estimation of Continuous Stirred Tank Reactor 1583
M. Geetha, Jovitha Jerome, Arun P. Kumar, Karthik Anadhan
NFC in Industrial Applications for Monitoring Plant Information 1590
Ramakrishnan Ramanathan, Jahanzaib Imtiaz
A Novel Approach for Task Scheduling in Cloud 1594
R. Vijayalakshmi, Soma Pralhibha
Analysis of Block Matching Motion Estimation Algorithms 1599
P. Muralidhar, C. B.Rama Rao
A QoS Based Network Selection Scheme for 4G Systems with Preplanner for Emergency Services 1603
Jeeva Susan Jacob, K. G. Preetha
Anonymous Privacy-preserving Routing in Location Based Dynamic Ad-hoc Networks 1607
K. Vinoth Kumar, N. Senthil Kumaresan
Microstrip Patch Antenna Array for Rainfall Radar 1613
Samruddha Thakur, S. S. Narkhede, Tapas Bhuiya
A Weighted Seeds Affinity Propagation Clustering for Efficient Document Mining 1617
Preeti Kashyap, Shailendra Kumar Shrivastava, Babita Ujjainiya
Traffic Aware Dynamic Speed Sensitive CAC for IMS Based UMTS-WiMAX-WLAN OverlayNetworks 1624
V. Bharathi, L. Nithyanandan
Performance of the MIMO MC-CDMA System with Beamforming 1630
N. Tamilarasan, L. Nithyanandan
Performance Evaluation of a Fuzzy Processor 1635
M. Jothi, N. B. Balamurugan, R. Harikumar
An Innovative Approach for Scheduling of Tasks in Cloud Environment 1641
Shivani Dubey, Vismay Jain, Shailendra Shrivastava
A Nonlinear Sea Clutter Analysis Using Chaotic System 1649
Rina Anna Simon, P. B. Vinod Kumar
Set Reconciliation in Multi-Node Environment 1654
Aravind Selvan
Real-Time Implementation and Performance Analysis ofState Estimation based Model Predictive
Controller for CSTR Plant 1658
M. Geetha, R. Naveen, Jovitha Jerome, Suriya V. Kumar
A 4b 40 Gbps 140 mW 2.2 mm 0.13 urn Pipelined ADC for I-UWB Receiver 1664
K. Lokesh Krishna, D. Srihari, D. Reena, T. Ramashri
A UPnP Extension for Multilevel Security in Pervasive Systems 1670
P. Prabu Rajkumar, A. Aswathy Nair
A Cross Layer Routing Metric for Gateway Aware Routing in Wireless Mesh Network 1679
D. G. Narayan, Kumar Sugnani, Abhishek Raichur, M. Uma
A Novel Neural Network Based Current Injection Technique for Torque Ripple Reduction in
BLDCM 1685
J. Vandhana, T. Sreekumar, Anish Benny
Layout Design and Simulation of Fault Tolerant Triple Modular Redundant ALU System 1690
Sudipta Ghosh, Jitendra Singh Sengar
Contriving of a Novel BIST (Built In Self-Test) Digital Combinational Lock 1697
Jitendra Singh Sengar, Sudipta Ghosh, S. Raj Shekhar, Praveen Verma, Rajat Sharma
Cross Refferal Validation for Sim Card Validation Using One Time Token and Image Split/merge 1702
G. L. Bharath, S. N. Charan, Madhuri Gangadhara, D. R. Manasa, Arveti Ka\ya, T. N. Srikanth, S. Prabhudeva
Heart Diseases Diagnosis Using Neural Network 1707
Ankeela R. Patel, Maulin M. Joshi
Unifying Clone Analysis and Refactoring Activity Advancement Towards C# Applications 1712
S. Sarala, M. Deepika
Copy Move Image Forgery Detection Using Mutual Information 1717
Somnath Chakraborty
Real Time Visual SLAM Using Cloud Computing 1721
Kumar Ayush, Navin KumarAgarwal
Real-Time Harmonic Minimization of Multilevel Inverters Used in Photovoltaic Systems 1728
Jibin George, Anish Benny
Moving and Immovable Object in Video Processing Using Intuitionistic Fuzzy Logic 1734
R. Revalhi, M. Hemalalha
Ant Clustering Based Text Detection in Natural Scene Images 1740
Pooja Tomer, Ajay Goyal
Network on Chip Design and Implementation on FPGA with Advanced Hardware and Networking
Functionalities 1747
V. Veeraprathap, M. Nagaraja, M. Z. Kurian
Fuzzy Logic Controller Based Maximum Power Point Tracking of Photovoltaic System Using Boost
Converter ^ 753
Shilpa Srcekumar, Anish Benny
MLP for Prediction ofArea and Rice Production of Upper Brahmaputra Valley Zone of Assam 1759
Raju PrasadPaswan, Shahin Ara Begum
Modified Ant Colony Optimization Algorithm with Uniform Mutation using Self-Adaptive Approach
for Travelling Salesman Problem 1768
Ramlakhan Singh Jadon, Unmukh Datta
Bioinformatics: Protein Structure Prediction 1772
Chandrayani N. Rokde, Manali Kshirsagar
Globular Topology of Large Scale WSN for Efficient Load Balancing Using Multiple Sink Node 1776
S. Prabhavathi, A. Ananda Rao. A. Subramanyam
An Approach for Semantic Query Expansion Based on Maximum Entropy-hidden Markov Model 1782
R. Jothilakshmi, N. Shanlhi, R. Babisaraswathi
Design of RF Power Delivery System for Wireless BCI Devices 1787
M. Durairaj, M. Ramakrishnan
A Technical Insight on Software Architectures Deployed in e-Governance: A Study 1792
L. Manjunalha Rao, S. Rama Krishna
Secure Authentication Model for Online Health Monitoring System 1798
Srivatsan Sridharan, Gorthy Ravi Kiran
A Privacy-preserving Storage Security for Spatial Data in Dynamics Cloud Environment 1803
S. Saklhivel, B. Dhiyanesh
Automation of the Gate Scanning Mechanism ofthe Multi-Wavelength Dayglow Photometer Using
LabVIEW 1809
K. Miziya, K. G. Gopchandran, P. Pradeepkumar, C. Vineeth, T. K.Panth, P. G. Anumod
Fault Tolerant Control ofWind Energy Conversion System - Fuzzy Approach 1817
AthulyaJustin, S. Reshma
Combined Curvelet Transform and Multispinning Algorithm for Despeckling of SAR Images 1823
R. Sivaranjani, S. MohamedMansoor Roomi, D. Kalaiyarasi
QoS Realization for Routing Protocol on VANETs using Combinatorial Optimization 1829
Uday Mane, S. A. Kulkarni
Comparison ofGradient Operator Based Pseudocolored Enhanced Medical Images 1834
Rajbahadur Singh Raghuvanshi, Ashutosh Dalar
Automatic Road Extraction Using High Resolution Satellite Images Based on Level Set and Mean
Shift Methods 1839
M. Revalhi, M. Sharmila
Energy Efficient LEACH by Enhancing the Data Update Procedure of Cluster Head 1846
Prabhal Rajan, V. Geetha
Designing a Secure Architecture Against Wormhole Attacks in Wireless Sensor Networks 1849
Rohit S. Jigalur, Suresha, C. Bhushan
A Secure Message Authentication Scheme for VANET Using ECDSA 1855
Kalkundri Ravi, S. A. Kulkarni
Human Agent Knowledge Transfer Applied To Web Security 1861
Chinmay C. Kulkarni, S. A. Kulkarni
On the Approximate Equalities of Multigranular Rough Sets and Approximate Reasoning 1865B. K. Tripathy, Anirban Milra
2D-Discrete Walsh WaveletTransform for Image Compression with Arithmetic Coding 1872
Sunil Malviya, Neelesh Gupta, Vibhanshu Shirvastava
Diagnosis of Melanomas by Check-list Method 1876
Apoorva Raikar, S. P. Sangani, K. D. Hanabaratti
FBFET: Fuzzy Based Fingerprint Enhancement Technique Based on Adaptive Thresholding 1882M. Selvi, Aloysius George
N-gram Based Algorithm for Distinguishing Between Hindi and Sanskrit Texts 1887C. Sreejith, M. Indu, P. C. Reghu Raj
Low Power and High Speed Computation Using Hybridized Multiplier 1891
Uvaraj Subramaniam, Srinivasan Aiavandar
Attacks Resistant Hybrid Watermarking Scheme 1895
Sandeep Pachauri, Neelesh Mehra, Madhu ShandilyaExploration of Security Parameters to Evaluate SaaS 1900
Ankit Banka, Anshul Saravgi, Mangal Sain, Hoon Jae Lee,
Reduced Order Modeling of Uncertain Systems by Pole Clustering Technique using Genetic
Algorithm 1906V. G. Pralheep, K. Ramesh, K. Venkatachalam
Vulnerability Analysis on Virtualized Environment using FPVA 1913
LakshmanJayaraju, Dinesh Naik, Biju R. Mohan
Secure Multicast Transmission 1918
W. R. Salem Jeyaseelan, Shanmugasundaram Hariharan
Parallel Implementation of3D Modelling of Indoor Environment Using Microsoft Kinect Sensor 1921Pawar Manojkumar, G. Ram Mohana Reddy
A Survey on Wireless LAN Internal Roaming Protocols 1927
Amit Kumar, Prabhat Kumar, M. P. Singh
Multimodal Based Fuzzy Vault Using Iris Retina and Fingervein 1933
Geetika, Manavjeel Kaur
Design ofFractal Antenna for Multiband Applications 1938R. Yogamathi, S. Bami, A. Vishwapriya
The Need of Awareness in Cyber Security with a Case Study 1943
Goverdhan Reddy Jidiga, P. Sammulal
Wavelet and Fast Discrete Curvelet Transform for Medical Application 1950
Anjali A. Pure, Neelesh Gupta, Meha Shrivastava
Performance Analysis of Circular Patch Antenna for Breast Cancer Detection 1955S. Banu, A. Vishwapriya, R. Yogamathi
A Novel algorithm for Optimization ofAssociation Rule with Karnagh Map and Genetic Algorithm 1962
Priyanka Mandrai, Raju Barskar
An Approach for Mining Heterogeneous Data for Cross-Media Retrieval 1969
K. Madhu Pavan, V. S. Ananthanarayana
Directivity Enhancement of Circularly Polarized Microstrip Antenna Using Split Ring FSS
Superstrate 1974
Meena Maurya, Swati Void, AshokMittal
Contrast Enhancement of Bi-histogram Equalization with Neighborhood Metrics 1979
K. Santhi, R. S. D. Wahida Banu
Segmentation of Thyroid Gland in Ultrasound Image Using Neural Network 1984
Hitesh Garg, AlkaJindal
Considerations in Autism Therapy Using Robotics 1989
Jaishankar Bharalharaj, S. Senthil Kumar
Dealing QAP& KSP with Green Heron Optimization Algorithm - A New Bio-Inspired Meta-heuristic 1994
Chiranjib Sur, Anupam Shukla
An Investigation on High-Gain Dual-Polarized Cavity Reflex Antenna Using Slotted-Patch FSS
Superstrate 2002
Karishma Sharma, Swati Vaid, AshokMittal
Implementation of Authenticated and Secure Online Voting System 2006
Srivatsan Sridharan
Innovative Pattern Based Morphological Method for Texture Segmentation 2013
M. Joseph Prakash, Saka Kezia, V. Vijaya Kumar, I. Santhi Prabha, P. Shkanth
Knowledging on Tamil Nadu Electricity Board (TNEB) and Electricity Load Demand Forecasting byGaussian Processes Using Real Time Data 2018
T. M. Usha, S. Appavu Balamurugan
A Swarm-based Hybrid Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in
Mobile Ad Hoc Networks 2026
S. K. Nivetha, R. Asokan, N. Senthilkumaran
Data Object Optimal Manipulation on Data Base Using Merging Algorithm(DOOMDUMA) 2034
Ekta Agrawal, Sreeja Nair
Modelling Of Cantilever Based MEMS RF Switch 2041
Chaitali Anil Muley, SyedA. Naveed
Real-time Implementation and Performance Analysis of Two Dimension PID Fuzzy Controller for
Continuous Stirred Tank Reactor 2046M. Geetha, P. Manikandan, P. Shanmugapriya, V. Silambarasan, R. Naveen
Solution of Firefly Algorithm for the Economic Themal Power Dispatch with Emission Constraint in
Various Generation Plants 2051
a:, thenmalar, a. allirani
A Battery-based Constant Current Source (Bb-CCS) for Biomedical Applications 2058
Tushar Kanti Bera, Manobjyoti Saikia, J. Nagaraju
Parallelization of AES Algorithm for Disk Encryption Using CBC and ICBC Modes 2063
Akshay Desai, Krishna Ankalgi, Harish Yamanur, Siddalingesh S. Navalgund
Improved Clustering Protocol for Energy Efficiency Algorithms in Wireless Sensor Networks 2070
K. Kalaiselvi, G. R. Suresh
Data Anonymization and Integrity Checking in Cloud Computing 2075
Reenu Sara George, S. Sabilha
A VLSIArchitecture for Arrhythmia Detection and Its Implementation on FPGA 2080
Catherine Glenitta Figueiredo, Tressa Michael
Optimizing the Performance of Database As a Service (daaS) Model- a Distributed Approach 2085
R. J. Thara, S. Shine, C. Sanu
SRTF: Secure Routing and Traffic Management Framework for WSNs 2090
C. Sanu, S. S. Deepa, R. J. Thara
Sentiment Analysis in Twitter Using Machine Learning Techniques 2098
M. S. Neelhu, R. Rajasree
Support Vector Machine Based Prognostic Analysis ofRenal Transplantations 2103
Aswathy Ravikumar, R. Saritha, S. S. Vinod Chandra
Computational Prediction of Continuous B-Cell Epitopes Using Random Forest Classifier 2109
K. V. Kavitha, R. Saritha, S. S. VinodChandra
A Comparison of Multiclass SVM and HMM Classifier for Wavelet Front End Robust Automatic
Speech Recognition 2114
Rajeswari, N. N. S. S. R. K. Prasad, V. Sathyanarayana
Getting Ready for BigData Testing: A Practitioner's Perception 2119
S. Nachiyappan. S. Justus
Deadlock Avoidance through Efficient Load Balancing to Control Disaster in Cloud Environment 2124
O. Mahitha, V. Suma
Content Based Retrieval of Geotagged Images Using Wavelet As Part of Digital Forensic 2130
Vijay Bagdi, Sulabha Patil, R. V. Dharskar
An Optimized Approach for Live VM Migration Using Log Records 2134
Anju Mohan, S. Shine
Performance of LMMSE Receivers in Broadband Communication Systems 2138
M. D. Kokate, T. R. Sontakke
Data Clustering Using Particle Swarm Optimization and Bee Algorithm 2144
C. A. Dhote, Anuradha D. Thakare, Shruti M. Chaudhari
Efficient and Secure Routing in Multi-hop Wireless Network Using a Micropayment Scheme 2149
Presty Kasmir, Sakhi S. Anand
QoS-Ring:a Token Ring Approach for QoS Provisioning in Ad-hoc Networks 2153
7". Narasimhan, S. S. Deepa
Improving the Denoising Performance of Perona Malik Filter Using Adaptive Edge Indicator 2158
T. Vasundhara, Meena Srinivasan
Defense Mechanism Against Selective Forwarding Attack in Wireless Sensor Networks 2163
P. C. Geethu, RameezA. Mohammed
Verifiable El-Gamal Re-encryption with Authenticity in Cloud 2167P. Renjith, S. Sahitha
A Hybrid Artificial Immune System for IDS Based On SVM and Belief Function 2172
Sandeep Singh, Jasvinder Pal Singh, Gaurav Shrivastva
PLC Modem for Home Automation Over Three Phase Powerline 2178
Nimmy Rose James, Able Eldhose, Deepthi Das Krishna
Performance Improvement of OFDM Using Hybrid PAPR Reduction Technique 2182
N. Annamalai Gokkul, A. AshokKumar, S. Hemant Kumar, M. Ramakrishnan
Comparison and Analysis of Combinational Circuits Using Different Logic Styles 2186
Shofia Ram, Rooha Razmid Ahamed
Modified MAC Unit for Low Power High Speed DSP Application Using Multipler with BypassingTechnique and Optimized Adders 2192
Teffi Francis, Tresa Joseph, Jobin K. Antony
Implementation of Radix 2 and Radix 22 FFT Algorithms on Spartan6 FPGA 2196Lakshmi Santhosh, Anoop Thomas
Transient Stability Improvement in Power System Using Unified Power Flow Controller (UPFC) 2200
F. Gopinath Balakrishnan, Suresh Kumar Sreedharan, Juvan Michael
A Study On Classification Techniques in Data Mining 2206
G. Kesavaraj, S. Sukumaran
Performance of Different Clustering Methods and Classification Algorithms for Prediction of
Warning Level in Aircraft Accidents: an Empirical Study 2213
A. B. Arockia Christopher, S. Appavu Balamurugan
An Efficient Query Processing with Approval of Data Reliability Using RBF Neural Networks with
Web Enabled Data Warehouse 2220
K. Soundararajan, S. Sureshkumar, P. Selvamani
A Representation for Human Gesture Recognition and Beyond 2226
Yiwen Wan, Wasana Santiteerakul, Guangchun Cheng, Bill Buckles, Ian Parberry
Author Index