ISSUE NO - icaaet -2015 - Syed Ammal Engineering College

Transcription

ISSUE NO - icaaet -2015 - Syed Ammal Engineering College
SYED AMMAL ENGINEERING COLLEGE, RAMANATHAPURAM
INTERNATIONAL CONFERENCE ON ADVANCES IN APPLIED ENGINEERING AND TECHNOLOGY – 2015
List of Papers to be published in journal as Issue No: 2- Networking
Paper ID
Title of the Paper and Author(s)
ICAAET – 8
MULTI LABEL LEARNING BASED ALGORITHM ADAPTATION METHODS
P.K.A. Chitra,S. Appavu Alias Balamurugan and J.Arunadevi
ICAAET – 30
UNIQUE DYNAMIC KEY MANAGEMENT BASED NODE AUTHENTICATION FOR SECURE
COMMUNICATION IN MANET’S
Dr.G.Murugaboopathi Gurusamy, Dr.A.Sakthivel Arumugam
ICAAET – 31
ECC BASED CRYPTOR FOR ENCRYPTING INFORMATION ON E-MAIL
Sakthivel Arumugam, Murugaboopathi Gurusamy
ICAAET – 40
A CRITICAL REVIEW PAPER ON WARRANTY ANALYSIS FOR FLEET INDUSTRY USING
DATA MINING TECHNIQUES
R.Srinivasan,Dr.S.Manivannan and Dr.S.Prasanna Devi
ICAAET – 52
HIGH PERFORMANCE MULTICAST TURING MACHINE
P.Sundaravadivel , Dr. S. Senthamaraikannan, and B.Divagar
ICAAET – 57
OPTIMIZATION TECHNIQUE ON AUTOMATIC NETWORK SELECTION AND PRIORITY
SCHEDULING IN MULTI-HOP RELAY WIRELESS SYSTEMS
S. Kannadhasan and R. KarpagaPriya
ICAAET – 59
PASSWORD PROTECTION USING TWIN SERVER AUTHENTICATION SYSTEM AND
VIRTUAL PASSWORD SCHEME
B.James Arul Ajay, S.P Karthik and E.V.Manju
ICAAET – 82
A NOVEL AND EFFICIENT ANDROID BASED MOBILE AD-HOC SOCIAL NETWORKS MODEL
GeethaArun Prasad, Dr.B.MuthuKumar, and S.Dhayanandh
ICAAET – 90
SEMANTIC WEB TECHNOLOGIES IN CLOUD ENVIRONMENT
N. Veeranjaneyulu, VS Reddy Tripuram, SubbaraoPeram and Siva KoteswaraRaoChinnam
ICAAET – 99
ENHANCED ARTIFICIAL BEE COLONY ALGORITHM FOR EFFECTIVE FREQUENT
PATTERN MINING
D.Divya and Dr.S.Suriya
ICAAET – 103
WOV BASED MULTI OBJECTIVE TEST CASE PRIORITIZATION
R.UmaMaheswari and Dr.D.Jeya Mala
ICAAET – 105
AUGMENTING LI-FI BANDWIDTH USING OPTI SYSTEM TRANSDUCER
R. Poorni, M. Varalakshmi, A. Elangeswari and R. Rashmi
ICAAET – 107
IMPROVING SENSOR LIFETIME AND SECURITY BY USING COMBINATION ALGORITHMS
IN WIRELESS SENSOR NETWORKS
Lavanya R and Manikandan K
ICAAET – 111
FACE MATCHING AND BIO METRIC FINGER PRINT READING
R.Rashmi, M.SubashiniiAnd VimalSamsingh.R
ICAAET – 119
CROSS-LAYER BASED ENHANCED PRIVACY-PRESERVING SECUREROUTING PROTOCOL
FOR WIRELESS MESH NETWORKS
Dinesh. M, Navamani.T.M, Yogesh.P
ICAAET – 120
STORAGE OPTIMIZATION OF REPOSITORIES USING DATA MINING AND BIG DATA
Sathish Kumar PandianAnbalagan and G.Ramakrishnan
ICAAET – 122
LOCATION-AWARE AND SAFER CARDS: ENHANCING KERBEROS AUTHENTICATION
ALONG WITH ATTRIBUTE BASED ENCRYPTION
M.Preethi, Dr. J. Jagadeesan and V.Praveena
ICAAET – 134
AN OPTIMIZED DATA STORAGE APPROACH USING HADOOP FRAMEWORKS
G. Jayaram, M. NirupamaBhat, AkkineniRaghunath and N. Veeranjaneyulu
ICAAET – 135
PATTERN BASED ON THEIR APPEARANCE BY MINING ASSOCIATION RULES
J.Malarvizhi and Dr. S.ThabasuKannan
ICAAET – 141
SMART CARD BASED PASSWORD AUTHENTICATION USING KEY AGREEMENT
PROTOCOL
G.B. Karthika and D.Jagadish
ICAAET – 157
A NETWORK LIFETIME ENHANCEMENT METHOD USING RENDEZVOUS ALGORITHM IN
WIRELESS SENSOR NETWORKS
R.Mohankumar, Dr.A.V.Ramprasad, S.Anitha and N.Janakiraman
ICAAET – 159
ENHANCING ANDROID OPERATING SYSTEM SECURITY BY BLOCKING SYSTEM CALLS OF
MALICIOUS APPLICATIONS
Sabir Ali and AnuGarg
ICAAET – 161
CRITICAL DATA AGGREGATION AND DISSEMINATION IN VANETS USING COGNITIVE
AGENTS
T. GraceShalini and G.VinothChakkravarthy
ICAAET – 166
PERSONAL HEALTH RECORDS AS A SOCIAL NETWORK ENCRYPTED USING ATTRIBUTE
BASED ENCRYPTION
C. Kalaivani, J. V. Anchitaalagammai , D . Divya and S.Kavitha
ICAAET – 167
ANALYSIS ON ENHANCING THE EFFECTIVENESS AND EFFICIENCY OF
MULTIRESOLUTION WATERMARKING ALGORITHMS
R.Ganesh and Dr.S.ThabasuKannan
ICAAET – 176
VAP: KEYLOGGING RESISTANT QR CODE BASED STRONG AUTHENTICATION USING
SMART PHONES
B.Sindhumathi and R.Suganya
ICAAET – 178
STUDENT BUSPASS TRACKING SYSTEM USING RFID TECHNOLOGY IN CLOUD
COMPUTING
Balasubramanian. D, Rajeevrathan.J, JeyaPreetha.J and Mounica.M
ICAAET – 179
A SURVEY ON EXISTING ANDROID PERMISSION BASE MODEL
PankajLaheri and AnuGarg
ICAAET – 181
RESOURCE ALLOCATION FOR SURVIVABLE OPTICAL NETWORKS BASED ON
TOPOLOGICAL PARAMETERS
J.MariaNithya and D. Sheela
ICAAET – 182
ROUTING PROTOCOLS AND VARIOUS ATTACKS POSSIBLE IN MOBILE AD HOC
NETWORKS: A SURVEY
SatveerKaur and Hitesh Sharma
ICAAET – 185
SPEED LIMIT DETECTION OF VEHICLES USING VANET
A.Sathya and Dr. S. Ganesan
ICAAET – 187
DYNAMIC VIRTUAL MACHINE CONSOLIDATION WITH QUALITY OF SERVICE
CONSTRAINTS
Padma Priya .V and R.Ranjana
ICAAET – 193
IDENTIFICATION OF HIGH THROUGHPUT PATH IN WMNS USING NOVEL ROUTING
METRIC
Gurumekala T, Senthil Sivakumar M, Sundaram A and ArputhaRaj T
ICAAET – 197
ANALYZING SPAM MESSAGES AND DETECTING THE ZOMBIES USING SPAM COUNT AND
PERCENTAGE BASED DETECTION ALGORITHM
M.Manikandakumar, K.ManoSharmi and S.Shanthini Devi
ICAAET – 198
AN ENTERPRISE ONTOLOGY-BASED APPROACH FOR WEB SERVICE SELECTION
K.Kanniyarasu, T.Kiruthika, R.Reena and Dr. A. Grace Selvarani
ICAAET – 216
BIG DATA-A REVIEW
V. Shobana, and N.Kumar
ICAAET – 220
AN ENHANCED DISENGAGEMENT DETECTION IN ONLINE LEARNING USING QUASI
FRAMEWORK
P.V. Praveen Sundar and Dr. A.V. Senthil Kumar
ICAAET – 221
SELECTION OF COMMUNICATION TECHNOLOGY FOR SMART DISTRIBUTION GRID
SivrajP.andSasi K. Kottayil
ICAAET – 224
INLINE DEDUPLICATION APPROACH FOR SECURE FILE TRANSACTIONS IN HYBRID
CLOUD
AkhilTejaAmbadipudi, SaicharanVennamanani and R.Jebakumar
ICAAET – 250
ENHANCED FUZZY BASED CLUSTERING APPROACH FOR IMPROVING RELIABILITY OF
WSNS
Gurumekala T, SenthilSivakumar M, Sundaram A and ArputhaRaj T
ICAAET – 251
GPU PERFORMANCE SURVEY ON OPENCL AND CUDA USING SMITH WATERMAN
ALGORITHM
Azhar Ali, Balwant Ram
ICAAET – 256
TRUST MODEL AUTHENTICATE ANONYMOUS SECURE ROUTING FOR MANET
A.R.Bharathidasan and G.Premnath
ICAAET – 259
IDENTIFICATION OF HOLE AND HEALING PROCESS USING PACKET FORWARDING
ALGORITHM IN WIRELESS SENSOR NETWORK
N.Preethi,G.Pandiyan
ICAAET – 260
AN EFFICIENT LOAD BALANCING MECHANISM FOR SIP SERVER CLUSTERS
G.Karthiga and Dr.N.Lakshminarasimman
ICAAET – 262
MITIGATING SHOULDER SURFING ATTACK BY USING COLOR BASED PASSWORD ENTRY
METHOD
C.Abinayadevi, T.M.Devi, and C.Nambushanmugapriya
ICAAET – 266
MINING ANALYSIS ON ORDERING OF PAGES USING AGEDPAGE RANKING ALGORITHM
A.SudalaiEsakkiSutha, Prof. V. Vijayaganth, Prof. M. A. Gopi Saran and K.Anitha
ICAAET – 267
ENERGY EFFICIENT MULTI - HOP QUALITY PATH BASED DATA COLLECTION WITH
MOBILE SINK IN WSN
K. Anitha, Prof. M. A. Gopi Saran, Prof. V. Vijayaganth and A.SudalaiEsakkiSutha
ICAAET – 270
A MECHANICAL AGENDA FOR INTEGRATING NEWS INTO STASH TRAFFIC APPROACH
T. ArunaAzhagu, P. Velvizhi
ICAAET – 272
EFFICIENT TRUST AUTHORITY WITH ESTABLISHMENT OF CLUSTER HEADS IN DELAY
TOLERANT NETWORK
S. Mekala Devi and M.Gughan Raja
ICAAET – 275
IDENTIFYING THE STRUCTURAL PATTERNS IN PROTEINS USING FUZZY ASSOCIATION
RULE
Shivika Sharma, AvinashKaur, NishaSethi
ICAAET – 276
NEBULIZER AUTOMATION
B. Padmapriya, C. Nandhini and S. Pavithra
ICAAET – 278
FAULT DETECTION AND MITIGATION USING WSN IN DISTRIBUTED PUBLIC UTILITY
SERVICES
V.Karthiga, Dr.K.Sathiyasekar and M.Monisha
ICAAET – 279
SORTING BASED APPROACH ON PATH CONDITION FOR TEST CASE SELECTION BY
SYMBOLIC EXECUTION
AnuragShukla,Dr.Kumar Rajnish
ICAAET – 288
VEHICLE PLATOONING FOR DELAY-SENSITIVE SERVICES UNDER GREEN MANNER
D.IndiraPriyadharshini, P.Thirumurugan and S. Vengalakshmi
ICAAET – 296
SECURE DSR PROTOCOL FOR DETECTION AND EXCLUSION OF SELECTIVE BLACK HOLE
ATTACK IN MANET
D.Sabarish, C.Ranjan,i R Vijayakumar and R Sruthi
ICAAET – 300
XML SECURITY: TEMPORAL TOKEN PROFICIENCY ACCESS CONTROL PERFORMANCE
ENHANCEMENT
Maheep Gupta and Nitin Umesh
ICAAET – 302
A WEB SEARCH ENGINE BASED APPROACH FOR KNOWLEDGE BASED INFORMATION
RETRIEVAL
D. Praveena, D. Magdalin Diviya and C. Ranjini
ICAAET – 303
A FRAMEWORK FOR WEB CONTENT EXTRACTION AND NOISE DETECTIONUSING PAGE
SEGMENTATION WITH PATTERN MATCHING AND COMPOSITE TEXT DENSITY
SandeepKaur and AbhishekTyagi
ICAAET – 306
INTRUSION DETECTION FOR MANETs USING NAVIE BAYES CLASSIFIER
Sekar S, Latha B
ICAAET – 307
A REVIEW: MULTI-ROBOT COOPERATION METHOD FOR LOCALIZING ODOR SOURCES
BASED ON A NICHING FIREFLY ALGORITHM
NoktienlaAier and Monica Sood
ICAAET – 312
PERFORMANCE EVALUATION OF APRIORI ALGORITHM USING TRANSPOSE TECHNIQUE
ON THE BASIS OF TIME AND COMPLEXITY
Harkamalkaur and Roshansrivastava
ICAAET – 314
A HYBRID MODEL FOR RANKING UNCERTAIN DISTRIBUTED DATABASE
N.Lalithamani, Swathi Sand Deepika P A
ICAAET – 319
EFFICIENT ALGORITHM FOR ACCURATE DETECTION OF SYBIL ATTACK IN A WIRELESS
SENSOR NETWORK
K. Yuvashri,J.Dalfiah, Dr. A. BabuKaruppiah and R. Rajaraja
ICAAET – 320
DETECTION OF NODE CLONING IN WIRELESS SENSOR NETWORKS BY USING CYCLIC
CLONE DETECTION ALGORITHM WITH ENCRYPTION (CCDAE).
RanganathDonkena, Vigneswaran T, VijayaRaju M
ICAAET – 324
FAT: ISOLATION PRESERVING FOR EFFECTIVE DATA DEPOT USING PUBLIC AUDITING
P.Maheswari,andS.Deepalakshmi
ICAAET – 325
CLASS COMPLEXITY AND DEVELOPMENT TIME: A STUDY
Kumar Rajnish and Ruchika Singh
ICAAET – 326
SMART AIR POLLUTION MONITORING SYSTEM FOR INDUSTRIES USING IOT
TECHNIQUES
M. Sarathkumar,J.Rajeevrathan, R. Perumalraja and D. Anandhavalli
ICAAET – 330
A RELIABLE SIGNATURES USING EXPLICIT USER REQUEST FOR WEB IMAGE AND URLS
CLASSIFICATION
B.Prabha and B. John Samuel
ICAAET – 332
SMS: SPARKY MULTI SERVICE LOAD STABILIZING IN CLOUD EMPORIUM USING
GENETIC ALGORITHM
S.V.Muthulakshmi and A.Kanmani
ICAAET – 334
A SCHEME FOR SECURED TRANSACTION USING RFID SYSTEM SUBSTANTIATION
NivethaRadha Krishnan, AnandBabu M.H and Dhivya R
ICAAET – 338
A SURVEY PROCESS OF ATTACKS ON IRIS BASED RECOGNITION FOR BIOMETRIC
AuthenticationN.Lalithamani and Sujitha.R
ICAAET – 339
STRATEGIZE FRAMEWORK FOR CONTESTING PLAN WITH DATA MINING TECHNIQUE
Jaskirat Singh, ShevetaVashisht and Jatinder Singh
ICAAET – 340
IMPLEMENTATION OF KNN APPROACH TO EVALUATE CLUSTERING OF UNCERTAIN
DATA
SumanBhaka and Priya.S
ICAAET – 345
ENHANCEMENT IN ASYMMETRIC CLUSTERING TO REDUCE NOISE AND IMPROVE
ACCURACY FOR DATA CLUSTERING
Jatinder Singh, ShevetaVashisht and Jaskirat Singh
ICAAET – 349
SECURE VANET COMMUNICATION USING AUTHENTICATION PROTOCOL
Fathima Bee
ICAAET – 350
MEASURE OF INTERNAL STRUCTURAL COMPLEXITY OF ER-DIAGRAM THROUGH
SOFTWARE METRICS
Dr. Kumar Rajnish and Mohit Sharma
ICAAET – 352
APPLICATIONS OF DATA MINING TECHNIQUES IN ACADEMIC LIBRARIES
K.G. Nandha Kumar and Dr. T. Christopher
ICAAET – 360
SECURE DATA HIDING IN ENCRYPTED H.264/AVC VIDEO STREAMS BY QUANTIZATION
AND FMO TECHNIQUES
M.Suganya and S.Shanthini Devi
ICAAET – 364
CUSTOMIZATION ANDVISUALIZATIONOF DBSCAN ALGORITHM FOR
DEMOGRAPHICANALYSIS
Bipin Nair B J, Arjun K P and Bharath P Kundapur
ICAAET – 365
A STATE OF THE ART SURVEY OF DATA MINING TECHNIQUES FOR SOFTWARE
ENGINEERING DATA
MeghnaSoni, Harshpreet Singh and NishaSethi
ICAAET – 367
A NEW APPROACH TO CONSTRUCT THE AFFINITY GRAPH OF SPECTRAL CLUSTERING
USING EUCLIDEAN DISTANCE
GurpinderKaur and AbhishekTyagi
ICAAET – 381
SEMANTIC ONTOLOGY MAPPING USING EXTREME LEARNING MACHINE WITH
DIMENSIONALITY REDUCTION
Sangeetha B, Dr. Vidhyapriya R and Therumalpathy S P
ICAAET – 384
SECURE ONLINE TRANSACTIONS USING ACTIVE CONTENT FINGERPRINT EMBEDDED
IMAGES
G. Gajalakshmi and R. Gayathri.
ICAAET – 387
USING DATA MINING TECHNIQUE TO PREDICT CRIMINAL BEHAVIOR OF JUVENILES
Garima Sharma and ShevetaVashisht
ICAAET – 388
OBJECT IDENTIFICATION AND CONTROL FOR VISUALLY CHALLENGED PEOPLE
Sikha O. K., A D NavinKrithish,Pragadesh V,L Vignesh and M AnirudhSrinivas
ICAAET – 389
EMBEDDED ZERO TREE WAVELET (EZW) ALGORITHM BASED IMAGE
TRANSFORMATION FOR EASY OPTIMIZATION WITH HALIDE LANGUAGE
Dr.T. Karthikeyan and C.Thirumoorthi
ICAAET – 390
A PROFICIENT INDEXING IN GRAPH DATABASES USING FEATURE - BASED METRIC
APPROACH
K. Ishwarya, G.Sharmila and Dr.M.K.Kavitha Devi
ICAAET – 392
ANT COLONY OPTIMIZATION BASED ATTRIBUTE REDUCTION FOR DISEASE
DIAGNOSTIC SYSTEM
D. Asir Antony Gnana Singh,P.Surenther, E. and JebamalarLeavline
ICAAET – 396
BUILDING A SECURE SYSTEM FOR WIRELESS MEDICAL SENSOR NETWORKS USING
BLOWFISH ALGORITHM
S.Mariammal and R.Srikkanthan
ICAAET – 401
SEGCRYPT: AN ENCRYPTION TECHNIQUE TO SEGREGATE AND PRESERVE PRIVACY OF
SENSITIVE DATA IN EHRS IN CLOUDSTORAGE
M.P.Revathi and Dr. P.D. Shea KeziaMalarchelvi
ICAAET – 402
DETECTION OF BLACK HOLE USING TIME DIFFERENCE AND NEIGHBORHOOD NODES
K.Lalramhluni and AdityaBakshi
ICAAET – 405
RETINAL BLOOD VESSEL SEGMENTATION AND MEASUREMENT OF VESSEL DIAMETERS
K.Lekshmi, Dr.K.Rubasoundar, J.LakshmiPriya,S.Monika , S.Amritha and J.RajeshKannan
ICAAET – 407
ENTROPY OPTIMIZED CONTRAST ENHANCEMENT FRAMEWORK FOR GRAY LEVEL
IMAGES
Madheswari K, Venkateswaran N
ICAAET – 408
TRANSFORM BASED A-PRIORI CLASSIFICATION OF X-RAY IMAGES FOR CONTENT BASED
IMAGE RETRIEVAL
Karthikeyan Mand Priya.S
ICAAET – 409
A SURVEY OF REGRESSION TESTING ALGORITHMS FOR PRIORITIZATION OF VERSION
CONTROL
Parkavi G
ICAAET – 412
APPROXIMATE DIRECTIONAL ROUTING PROTOCOL
Sathya Sathiskumar, Palanisamy V
ICAAET – 415
ANALYSING THE PERFORMANCE OF ADABOOST ALGORITHM IN TEXTON BASED MULTICLASS OBJECT SEGMENTATION AND RECOGNITION
K.Lekshmi, Dr.K.Rubasoundar, D.S.JananiShree,L.Elakkiya, S.Divya and J.RajeshKannan
ICAAET – 417
OPTIMIZING GARBAGE AND RECYCLING COLLECTION PROBLEM USING GLOWWORM
SWARM OPTIMIZATION
Anita Sharma and Monica Sood
ICAAET – 418
DESIGN AND EVALUATION OF NEW ALGORITHM BASED ON CHAOTIC CRYPTOGRAPHY
Praveen Pandey and Gulshan Kumar
ICAAET – 419
IMAGE ENCRYPTION ALGORITHM BASED ON MODIFIED AES
SumitSidhu and Ravishanker
ICAAET – 421
IMPROVING WIRELESS SECURITY WITH ENHANCEMENT IN WPA2 PROTOCOL
SumanRawat and Md. Ataullah
ICAAET – 422
INCREASING THE SECURITY OF WIRELESS NETWORK AGAINST SPOOFED ATTACKS
Aarthi Joshi and Md.Ataullah
ICAAET – 427
E-LEARNING APPLICATION USING GESTURE RECOGNITION
AmritMurali, Niteesh AC and R. Jebakumarr
ICAAET – 430
A SURVEY ON MACHINE TRANSLITERATION SYSTEMS
DebashisSen and Kamal Deep Garg
ICAAET – 435
AN EFFICIENT CAUSAL FRAMEWORK FOR PROCURING KNOWLEDGE FROM POTENTIAL
EMR
G. Angayarkanni and Dr. N. Karthikeyan
ICAAET – 436
AN ADVANCED CLASSIFICATION AND OPTIMIZATION SCHEDULER FOR HADOOP
SYSTEM
AnimeshJha and Parminder Singh
ICAAET – 437
A NOVEL APPROACH FOR CUSTOMIZED TRAVEL PACKAGE RECOMMENDATION USING
COLLABORATIVE FILTERING SureshKumar,VaralakshmiAnishya
ICAAET – 439
VEHICULAR AD-HOC NETWORKS BASED INTELLIGENT TRAFFIC SIGNAL CONTROL
V.Vinolia and V.Vinciya
ICAAET – 441
A NOVEL APPROACH FOR GLAUCOMA DISEASE USING AUTOMATED CLASSIFICATION
METHOD
M.Kirthikavathi, S.Veluchamy
ICAAET – 442
BREAST MASSES CLASSIFICATION BASED ON BPN USING SCILAB
A.Yogapriya, S.Sindhuja Mr. S. Mahesh Anand and .S.A.Priyanka
ICAAET – 444
GAME BASED LEARNING PLATFORM FOR INDIAN K-12 MATHEMATICS
Sivaranjani K, Vidya M, V. SmrithiRekha
ICAAET – 451
A DOUBLETON PATTERN MINING APPROACH FOR DISCOVERING COLOSSAL PATTERNS
FROM BIOLOGICAL DATASETS
K.Prasanna , Dr. M.Seetha and Vinint Kumar Gunjan
ICAAET – 455
SENTIMENT ANALYSIS OF SOCIAL ISSUES AND SENTIMENT SCORE CALCULATION OF
NEGATIVE PREFIXES
Shailendra Kumar Singh and Dr.Sanchita Paul
ICAAET – 461
A SECURE MECHANISM FOR ANONYMOUS AUTHENTICATION IN CLOUD COMPUTING
S.Stalin Rubitha and T.B.Sivakumar
ICAAET – 462
A SECUREAND AUDITING MECHANISM FOR CAAS
M.Vasanthi, G.SaravanaKumar, B.Palanichelvam and R.Dhivya
ICAAET – 463
AUXILIARY ATTRIBUTE BASED TEXT DATA MINING
N. Ramya and K. Rajesh
ICAAET – 467
A HYBRID ALGORITHM FOR EFFECTIVE LOAD BALANCING IN CLOUD
KripaSekaran, N.Sujaudeen and M.Arunachalam
ICAAET – 468
ANFIS BASED RAIN PREDICTION IN LOW RAINFALL REGION
Supreet and KewalKrishan
ICAAET – 473
SENTIMENT ANALYSIS OF STATIC AND DYNAMIC DATA SETS
Aiswarya Lakshmi S, Saranya S, Sourab S, Vaishali V, Vignesh T and Vijay Krishna Menon
ICAAET – 479
IMPROVING TCP PERFORMANCE IN MANET USING SIGNAL STRENGTHENING AND
SCALABLE TCP
Arun S, Geethu R Krishnan and Remya Nair T
ICAAET – 480
COMPARATIVE STUDY OF MOBILE AD HOC NETWORK ROUTING PROTOCOLS
AtulSatyajit, Sarath Kumar Sand RajalakshmiPrithviraj
ICAAET – 481
MULTI-CLASS SENTIMENT ANALYSIS
GopikaP.Gopinath, Anjaly Raj and Nitha L
ICAAET – 483
CLOUD-BASED MULTIMEDIA SENSOR NETWORKS WITH SECURE SERVICES
ARCHITECTURE
E.Parthasarath and S.Pavithra
ICAAET – 484
IMPROVE NETWORK ANALYSIS USING SPOON & SIMBET ROUTING IN DISCONNECTED
MANETS
Yuvaraj M, Insozhan N
ICAAET – 487
UBIQUITOUS LIFE CARE SYSTEM BASED ON SECURED WIRELESS SENSOR NETWORKS
K.Rajesh and S.Deepalakshmi
ICAAET – 488
DETECTION AND CLASSIFICATION OF FUNGAL DISEASE IN FRUITS USING IMAGE
PROCESSING TECHNIQUES
Pushpa B R, Thripulla K H and Meghana T K,
ICAAET – 494
A QOS BASED EQGOR PROTOCOL FOR WSN AND VANET
Rama Kalangiam S and Arun Samuel T S
ICAAET – 497
ENERGY DEFENDING KEY PREDISTRIBUTION SCHEME USING EIGENVALUE CONCEPT
FOR SECURE WIRELESS SENSOR NETWORKS
N.Tharanika, M.Satheesh Kumar and A.Selvaraj
ICAAET – 498
I2RED: INTEGRATED IRED BASED CONGESTION CONTROL FOR DATA TRANSMISSION IN
SENSOR CLOUD NETWORKS
J.AliceAnandhi, M.Satheesh Kumar and S.Ramesh
ICAAET – 499
A REVIEW ON IMAGE FORGERY AND ITS DETECTION
ArunAnoop M
ICAAET – 500
PERFORMANCE ANALYSIS OF ENERGY OPTIMIZATION THROUGH SLEEP SCHEDULING
WITH QOS CONSIDERATION IN LTE-A NETWORKS
P.Vaishnavi and .S.Geetha
ICAAET – 501
AN IMPROVED PERFORMANCE OF URBAN TRAFFIC INFORMATION COLLECTION
METHOD BASED ON WIRELESS SENSOR NETWORKS
T Bagavathi
ICAAET – 503
AUTHENTICATION VIA CONTINUOUS VERIFICATION WITH KEYSTROKE DYNAMICS
K.Sarojini Devi and A. Gowri Shankar,
ICAAET – 504
RECOGNIZING POLARITY OF ARTICLES USING SENTIMENT ANALYSIS THROUGH
MACHINE LEARNING TECHNIQUES
RavitejaParishapogu, Sumathy Subramanian and MythiliThirugnanam
ICAAET – 505
SOFTWARE DEFINED LTE VEHICULAR NETWORK
R.Hemajanani, Dr. R.Perumalraja and S.Chowmya
ICAAET – 506
A NOVEL HYBRID ALGORITHM FOR OUTLIER DETECTION USING WEKA INTERFACE
R.DelshiHowsalya Devi and Dr.M.Indra Devi
ICAAET – 507
TRANSPORTATION SENTIMENT ANALYSIS FOR SAFETY ENHANCEMENT
M. Athilakshmi and B. Palanichelvam and G.Saravanakumar
ICAAET – 508
THE CORRECT LOCATION AND SIZING OF DISTRIBUTED GENERATORS TO STRENGTHEN
INTENTIONAL ISLANDING PRACTISE USING ANT SEARCH ALGORITHM AND PSO
R.M. Sasiraja , Dr.V.Sureshkumar and T.Kannan
ICAAET – 511
MEDICAL DATA MINING METHOD TO PREDICT RISK FACTORS OF HEART ATTACK AND
RAISE EARLY WARNING TO PATIENTS
M. Ilayaraja and Dr. T. Meyyappann
ICAAET – 512
ECC BASED IMAGE ENCRYPTION SCHEME WITH AID OF OPTIMIZATION TECHNIQUE
USING DIFFERENTIAL EVOLUTION ALGORITHM
K. Shankar and Dr. P. Eswaran
ICAAET – 515
RESEARCH CHALLENGES OF IEEE 802.15.6 STANDARD FOR WIRELESS BODY AREA
NETWORKS
M. Ambigavathi andDr.D.Sridharan
ICAAET – 517
COMPARISON OF THREE ASSOCIATION RULE MINING ALGORITHMS USING CLOUDSIM
Mandeepkaur
ICAAET – 518
EFFICIENT MULTI-STEP AHEAD ALGORITHM FOR STOCK MARKET PREDICTION
Akriti and Miss Manveer
ICAAET – 520
PROTECTING WIMAX ENTITIES AGAINST ROGUE BASE STATION AND DDOS ATTACK
D. Stella Gnana Ruby and R. Arasa Kumar
ICAAET – 522
A BLOCK CIPHER BASED CRYPTOGRAPHIC ALGORITHM TO ENHANCE THE DATA
SECURITY
Mahalakshmi.J and Dr.K.Kuppusamy
ICAAET – 525
RULE SETS DRIVEN SOFTWARE COST ESTIMATION MODELS BASED ON DECISION
MAKING METHODS
PeramSubbaRao, Dr.K.VenkataRao and Dr.P.SureshVarma
ICAAET – 526
RECKONING TRUST IN E-COMMERCE BY MINING PRODUCT REVIEWS
S.SirinSeema, M.Maheswari, Dr.S.Selvakumar and Dr. S.Geetha
ICAAET – 528
ANALYSIS OF TRANSFER CHARACTERISTICS OF UWB ANTENNA FOR WBAN
Sherin.X, Selvathi
ICAAET – 529
SECURE MINING OF ASSOCIATION RULES USING APRIORI ALGORITHM
Sangeetha KV, SangeethaSanthosh and Nitha Deepak
ICAAET – 530
DETECTION OF CREDIT CARD FRAUDS USING HIDDEN MARKOV MODEL WITH
IMPROVED K-MEANS CLUSTERING ALGORITHM
Keerthi A, Remya and M S, Nitha L
ICAAET – 533
OPTIMIZATION OF SPARSE DICTIONARY MODEL FOR MULTIMODAL IMAGE
SUMMARIZATION USING FIREFLY ALGORITHM
T. Kanimozhi and Dr.K. Latha
ICAAET – 534
CLUSTERING UNCERTAIN DATA BASED ON PROBABILITY DISTRIBUTION SIMILARITY
S.Sathiya and A.G.Vadivelan
ICAAET – 537
CONCEPT TERM AND QOS BASED SELECTION OF WEB SERVICE
R.S.Raj Kumar, Dr. A.GraceSelvarani and M.Karthigha
ICAAET – 542
INFORMATION SECURITY THREATS AND MITIGATION- A RELOOK
Ms.M.Kumudha and Ms.H.NoorulShajithaBanu
ICAAET – 543
PERFORMANCE EVALUATION OF SEQUENTIAL PATTERN MINING ALGORITHMS
R.Dhivyapriya, N.Monisha and P.Subathra
ICAAET – 546
AN IMPROVED METHOD FOR PRINCIPAL COMPONENT ANALYSIS ON EXTREMELY
LARGE DIMENSIONAL DATA USING ROBUST MEASURES OF SCALE THAT QUANTIFY
HIGH DEGREE OF OUTLIERS
Namitha R, Neethumol and M.S, RanjidhaRajan
ICAAET – 552
IMPROVED ENCRYPTION LAYERED ARCHITECTURE FOR CLOUD STORAGE TO
INCREASE CONFIDENTIALITY AND REDUCE SPACE COMPLEXITY
M.Muruganadam and S.Praveen Kumar
ICAAET – 558
AN IMPROVED EMBEDDING SCHEME IN COMPRESSED DOMAIN IMAGE
STEGANOGRAPHY
MeeraM and Malathi P
ICAAET – 559
CONTEXT AWARE INFORMATION FOR LOCALIZATION
AdwitiyaMukhopadhyay, Subeesh K S and Stibin Mathew
ICAAET – 560
IMPROVING SOFTWARE COST ESTIMATION USING PROTOTYPE SELECTION
Babitha V K, Gayathri P. Nair and Deepa G
ICAAET – 564
AN EFFICIENT TASK SCHEDULING ALGORITHM FOR VM PLACEMENT IN CLOUD
COMPUTING ENVIRONMENT
SandeepKaur and Ramandeep Singh
ICAAET – 567
ENHANCING THE SECURITY OF DICOM CONTENT USING MODIFIED VIGENERE CIPHER
P.Subhasri and Dr. A. Padmapriya
ICAAET – 568
PERFORMANCE ANALYSIS OF ACTIVE LEARNING IN IMAGE CLASSIFICATION
E.Shehnaz and Dr.D.Venkataraman
ICAAET – 570
NETWORK RECONFIGURATION OF DISTRIBUTION SYSTEM IN THE PRESENCE OF
HARMONIC LOAD USING EXPERT SYSTEM APPROACH
R.Iswarya and R.M.Sasiraja
ICAAET – 571
JAMMING ATTACK DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORKS
E. JebamalarLeavline, M.Dinesh and D. Asir Antony Gnana Singh
ICAAET – 572
PREVENTING CLOUD INTEGRATION CHALLENGES USING IPAAS
ShilpaManilal and Theertha V.S
ICAAET – 574
EFFICIENT DETECTION OF SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK USING
PARAMETERS ESTIMATION TECHNIQUES
Mr.G.Pradeepkumar, Mr. P.Omprakash and S.Manimala
ICAAET – 578
EFFECTIVE ASSOCIATION RULE MINING ALONG WITH FILTER BASED FEATURE
SELECTION
AnjanaRaghavan, Surumi P.M. and Gaina K.G.
ICAAET – 581
A NOVEL TECHNIQUE TO DETECT & PREVENT BLACK & GRAY HOLE ATTACKS IN
MANET USING TVRI APPROACH
Manan Arora, Sami Anand
ICAAET – 582
SEVERITY DETECTION OF TUBERCULOSIS USING NEURAL NETWORK
H.S. Makkar, J. Singh and S. Sankar Ganesh
ICAAET – 583
AN EFFICIENT TECHNIQUE OF EFFORT ESTIMATION FOR AGILE SOFTWARE
DEVELOPMENT SYSTEM
Shivali Chopra, RupinderKaur and MohitArora
ICAAET – 586
A RULE BASED APPROACH ON WORD SENSE DISAMBIGUATION
SooryaPrasanth, Aiswarya G and Arun Kumar N
ICAAET – 590
ANALYZING HEALTHCARE USING WIRELESS SENSORS AND BIG DATA
P.Harini and S.Satheeshkumar
ICAAET – 592
ENHANCING THE STEMMING ALGORITHM IN TEXT MINING
Anil Kumar Soni, Avinash Kumar, Robin PrakashMathur
ICAAET – 598
CREDIT CARD NETWORK SECURITY WITH ECC & TOKENIZATION
Daniya Dennis, Reshma K B and Nima S Nair
ICAAET – 599
NEURAL NETWORK ADAPTIVE PARTICLE SWARM OPTIMISATION FOR POWER LOSS
MINIMISATION IN DISTRIBUTION SYSTEMS USING OPTIMAL LOAD RESPONSE
AnandhaKumaran N S
ICAAET – 600
PREVENTION OF MAN-IN-THE-MIDDLE PHISHING ATTACK USING PAIR BASED
AUTHENTICATION
DilnaPriyaCorreya , DivyaGopinath and Nima S
ICAAET – 603
A PERSPECTIVE EVALUATION OF THE FACETS AFFECTING THE ACCURACY OF
RECOMMENDATION ENGINES
Nitha L
ICAAET – 606
PREVENTION OF BLACK HOLE ATTACK IN MANETS USING ENHANCED AODV PROTOCOL
Liya A. R, Sabana N. K and Leena V
ICAAET – 608
DESIGN AND DEVELOPMENT OF BIOMETRIC RECOGNITION AND MATCHING SYSTEM
M.Dinesh.and .SankerGanesh.S
ICAAET – 609
ADVANCED RULE BASED INFORMATION EXTRACTION FOR ELECTRONIC HEALTH
RECORD
L. Sathish Kumar and Dr. A. Padmapriya
ICAAET – 613
BIG DATA INITIATIVE: ANALYZING, ESTIMATING THE SCARCITY OF FOOD AND
DETERMINING THE DISEASES
Reshma B Nair and Dr D Venkataraman
ICAAET – 616
USING DEMPSTER SHAFER THEORY TO EVALUATE THE PERFORMANCE OF SECURITIES
AND SECTOR WISE INDICES
KomalWalia and VirratDevaser
ICAAET – 622
ADAPTIVE VM CONSOLIDATION TECHNIQUE FOR POWER OPTIMIZATION IN CLOUD
COMPUTING
RenuChaudhary, Parminder Singh
ICAAET – 625
STOCK PRICE PREDICTION FOR A SECTORIAL LEADER IN NSE USING NEURAL
NETWORK
Pankaj Kumar Sood and VirratDevaser
ICAAET – 626
INTEGRATION OF ROLLING HORIZON AND PARTIAL UTILITY-DRIVEN (IRHPUD)
TECHNIQUES FOR SCHEDULING CLOUDLETS
S.Saroja and P.ImmaculateJansi Rani
ICAAET – 627
DETECTION AND PREVENTION OF CODE INJECTION ATTACK BY INHERITANCE ON
OBJECT ORIENTED DATABASE SYSTEMS
Hardeep Singh Damesha, RoshanSrivastava
ICAAET – 630
GENDER SPEECH RECOGNITION AND RETRIEVING USING FUZZY LOGIC AND NEURAL
NETWORK TECHNIQUE
M.Sivasanka and A.Nagavaratharajan.
ICAAET – 636
DYNAMIC QUERY FORMS FOR HETEROGENEOUS DATABASE QUERIES
Dinesh J, Balakrishnan G
ICAAET – 637
TO AVERT VIRTUAL SIDE CHANNEL ATTACK USING KAMAN PROTOCOL IN CLOUD
ENVIRONMENT
HardeepKaur, ManjitKaur
ICAAET – 640
A HADOOP BASED ARCHITECTURE USING RECURSIVE EXPECTATION MAXIMIZATION
ALGORITHM FOR EFFECTIVE AND FOOLPROOF TRAFFIC ANOMALY DETECTION AND
REPORTING
AthulSai, SiniSalim, P.K. Binu and R.C. Jisha
ICAAET – 645
A STUDY ON INPAINTING AND GAP FILLING ALGORITHMS FOR REMOVING CLOUDS IN
SATELLITE IMAGES
Mrs.S.Maheshwari and Dr.P.Krishnapriya
ICAAET – 652
SYSTEM FILTERING MESSAGES USING OLP WITH FEEDBACK FROM USER
M. H. AnandBabu, M. Jeyashree, K. Meenaloshini
ICAAET – 653
PREVENTION AND DETECTION OF SQL INJECTION ATTACKS USING ADAVNCED VERSION
OF AHO-CORASICK ALGORITHM
NitikaWalia, RoshanSrivastava
ICAAET – 658
A CRYPTOGRAPHIC ALGORITHM FOR REDUCED AREA COST
Preethi E, Kripadevi D
ICAAET – 661
A COMPLETIVE STUDY OF AUTOMATIC TEST DATA GENERATION FOR DATA FLOW
TESTING USING GA, PSO & BPSO
Sumit Kumar, Dr. Dilip Kumar Yadav, Dr Danish Ali Khan, SapnaVarshney
ICAAET – 662
NSGA II FOR THE OPTIMIZATION OF DG PLACEMENT AND SIZING TO BENEFIT BOTH DG
OWNER AND DISCO’S
R.Sakthipriya and K.Muthulakshmi
ICAAET – 663
A COMPARATIVE ANALYSIS OF SORTING ALGORITHMS ON THE BASIS OF A DISTANCE
CRITERION
Sneha John, Aswathy S and R Nandakumar
ICAAET – 664
LISTING PAST, CURRENT, AND UPCOMING RESEARCH IN UBIQUITOUS COMPUTING – A
REVIEW
S.HasanHussain, Dr. S. Geetha and Dr.M. AmuthaPrabakar
ICAAET – 665
COMPARATIVE STUDY OF HASH TREE AND HASH GROUP BITMAP INDEX
Amitha Elizabeth T J, Lakshmi Vinod, RanjidhaRajan
ICAAET – 668
AUTOMATIC DATA EXTRACTION IN DEEP WEB USING BOOTSTRAPPING APPROACH
C Chinnumolshivic, G Pavai and Dr. T.V. Geetha
ICAAET – 671
RARS-PAM: RESOURCE AWARE RECOMMENDATION SYSTEM WITH PARALLEL
AUTHORIZED MAPREDUCE TASK IN HADOOP
RaveathulFarzaana.M.Y and Dr. K. Latha
ICAAET – 674
FIREWALL DESIGN FOR SOFTWARE DEFINED NETWORK ARCHITECTURE VIA OPENDAY
LIGHT CONTROLLER
Praveen Raj. R. C and Anandavalli. D
ICAAET – 677
PREVENTION OF ROUTE REQUEST FLOODING USING END TO END DELAY
Remya VR RoseMary PX and Sumesh S
ICAAET – 681
HYBRID APPROACH FOR ANOMALY DETECTION
Donna Alex, ShilpaManilalGaina K.G
ICAAET – 682
WORMHOLE ATTACK DETECTION ALGORITHM IN WIRELESS NETWORK CODING
SCHEMES
G.Pradeepkumar, P.Omprakash and A.Malathy
ICAAET – 686
SWIFT SHOPPING IN SMART CITIES
S. Gowtham Raj, J. Rajeevrathan, S. Senthil Kumar and V.Rajaramanan
ICAAET – 689
CRITICAL GREEDY BASED OPTIMIZED SCHEDULING OF SCIENTIFIC WORKFLOWS IN
CLOUD COMPUTING
J. Angela JennifaSujana, Dr. T. Revathi, G. Karthiga and R. Venitta Raj
ICAAET – 692
DISTRIBUTED EVOLUTIONARY FUZZY K-MEANS WITH AUTOMATIC CENTER
CALCULATION AND SELECTION OF K CLUSTERS USING GAUSSIAN FIREFLY ALGORITHM
FOR DISTRIBUTED DATASETS
Divya.P, Ranjani.C, Kalaiarasu.M and Dr.Radhakrishnan.R
ICAAET – 697
VARIOUS SCHEDULING METHOD FOR IMPROVING DATA DELIVERY EFFICIENCY IN
VEHICULAR AD-HOC NETWORKS
Selvi R, Jeethalakshmi P.S
ICAAET – 698
A STUDY ON VARIOUS INDEXING TECHNIQUES IN SUBGRAPH SEARCH
Sharmila G, Ishwarya K, Kavitha Devi M.K
ICAAET – 702
AN INNOVATIVE DNA CRYPTOGRAPHY ALGORITHM INSPIRED
BLOCK CIPHER ALGORITHM
Ginny and Dr. G. Sahoo
ICAAET – 703
EFFICIENT METHODS FOR DISTINCTION PRECLUSION IN DATA MINING
Dr. P. Sivakumar, M. Prakash and Dr. G. Singaravel
ICAAET – 704
CLOSED LOOP PERFORMANCE INVESTIGATION OF CHOPPED FED DC MOTOR USING
VARIOUS CONTROLLER
M.Abinaya,P.NedumalPugazhenthi,S.Selvaperumal,G.Prabhakar and P.Gnanaskandaparthiban
ICAAET – 705
PROACTIVE FAULT TOLERANCE MECHANISM IN CLOUD LOAD BALANCING
AthiraRajan T, Swetha Lakshmi S and Mahesh A S
ICAAET – 707
GPS AND GSM TOLL COLLECTION SYSTEM (GGTCS) FOR INDIAN TOLL BOOTHS
D.Venkataraman, SiddarthHarinarayanan, NandinaVinay, VamsiTallam, Surya Teja Reddy
ICAAET – 709
USING ENHANCED AADMA ASSOCIATION RULE MINING ALGORITHM ON AUTOMOBILE
DATASET
GurpreetBatra, Alpana Vijay Rajoriya
ICAAET – 710
DEVELOPMENT OF EFFICIENT RESOURCE ALLOCATION ALGORITHM FOR WIMAX
RELAY NETWORKS
M.Uma Devi and M.Raja Lakshmi
ICAAET – 713
IMPLEMENTATION OF NEURAL BASED SELF TUNING FUZZY LOGIC CONTROLLER IN
NON LINEAR SYSTEM
GayathriAnbalagan
ICAAET – 717
DESIGN OF ROBOT CELL FOR GEAR MANUFACTURING PROCESS
MirjiSairajGururajand A. ArockiaSelvakumar
ICAAET – 721
A SECURED DATA HIDING IN VIDEO FRAMES BY USING SMVQ
Priyanga C, Raja Lakshmi M
ICAAET – 722
AN INTELLIGENT ANOMALY DETECTION FOR MULTICAST ROUTING IN MOBILE AD HOC
NETWORK
P.Vigneshwaranand Dr.R.Dhanasekaran
FROM SAFER K
ICAAET – 725
AN IMPROVED NETWORK INDEPENDENT TWO-STEP AUTHENTICATION SCHEME USING
TLS
Sandeep Singh and Ravishanker
ICAAET – 730
INTELLIGENT INTRUSION DETECTION SYSTEM IN BORDER REGIONS USING IMAGE
ANALYSIS AND NEURAL NETWORKS
mr. k. vivek raja and ms.k.padmapriya
ICAAET – 733
FEATURE EXTRACTION IN SPATIAL DOMAIN FOR EFFECTIVE CBVR
N.Sivakumar and G.Annapoorani
ICAAET – 735
X.509 BASED CERTIFICATE AUTHORITY WITH ASYMMETRIC PUBLIC KEY
CRYPTOGRAPHIC ALGORITHM FOR MOBILE AD-HOC NETWORKS
P. Gowthamarayathirumal and Dr. C. Chandrasekar
ICAAET – 739
DISASTER ALERT NOTIFICATION AND RESCUE MANAGEMENT THROUGH SMART
PHONES USING GPS
M Gughan Raja, B John Samuel and Dr N Kirubanandasarathy
ICAAET – 740
PRIORITIZATION OF ASSOCIATION RULES USING MULTIDIMENSIONAL GENETIC
ALGORITHM
Dr. R.M.Vidhyavathi
ICAAET – 746
A HISTOGRAM TECHNIQUE TO CONSTRUCT MEMBERSHIP FUNCTION OF NUMERIC
DATA
HarikeshBahadurYadav, Dilip Kumar Yadav
ICAAET – 752
ENHANCED BIOMETRICS SECURITY SYSTEM IN SMART PHONE APPLICATION WITH
ENERGY CONSUMPTION
InfantaPrincy S and Karthikeyan N
ICAAET – 754
ROLE BASED ACCESS CONTROL POLICY IN SECURE SHARING HEALTHCARE DATA
USING MULTI CLOUD
T. B Sivakumar, Dr. S. Geetha and Dr. M. AmuthaPrabakar
ICAAET – 755
DESIGNING A COST EFFICIENT ACOUSTIC MODEM FOR UNDERWATER
COMMUNICATION
Niveditha R, Senthil Kumar S, Rajeevrathan J, Perumalraja R
ICAAET – 756
DDOS ATTACKS RECENT TRENDS AND SECURITY ISSUES
Sreekanth .S and A.S. Mahesh
ICAAET – 761
A SOFT COMPUTING BASED ANALYSIS ON MOISTURE CONTROL IN PAPER INDUSTRY
Senthil Kumar M, Prabhakar G, Sangeetha B
ICAAET – 762
CLUSTERING BASED FEATURE SUBSET SELECTION THROUGH MST FOR IDENTIFYING
MOST REPRESENTATIVE FEATURE SUBSET
Vandana Babu Talakayala, Nagabhushanam Dasari, Shariff Mohammad
ICAAET – 765
AN IMPROVED PSO-BASED TEST DATA GENERATOR FOR DATA FLOW COVERAGE
SapnaVarshney, Monica Mehrotra
ICAAET – 771
COMPARISON OF DEGREE BASED AND LEACH CLUSTERING TECHNIQUE IN WSN
Mounica.M, Kamalesh.S and Ganesh kumar.P
ICAAET – 773
INTEGRATED KNOWLEDGE BASED WEB-PAGE RECOMMENDATION SYSTEM
Zulaiha and Dr.T.Raghuveera
ICAAET – 774
AN OPTIMIZED APPROACH FOR PROTECTING LARGE SCALE DATA PRIVACY
S. Kavitha, E. Sivaraman and P. Raja Vadhana
ICAAET – 776
ENHANCED SOCIAL TRUST COMPUTATION FOR ENRICHED TRUST BASED
RECOMMENDER SYSTEM
K.T.Senthilkumar and Dr.R.Ponnusamy
ICAAET – 781
MODIFIED ANT AND BEE ROUTING PROTOCOL FOR INTERMITTENTLY CONNECTED
MOBILE AD HOC NETWORK
T.M. Jeya Kumari and Mr.S. Ilankumaran
ICAAET – 785
A BAYESIAN APPROACH OF SOFTWARE RISK ASSESSMENT
Chandan Kumar, DilipKumarYadav
ICAAET – 789
ENHANCED LUNG NODULE DETECTION USING COMPUTER AIDED DIAGNOSIS SYSTEM
Kuppusamy G
ICAAET – 792
FREQUENT PATTERN MINING FROM WEB USAGE DATA
D.Gandhimathi and Dr.N.Anbazhagan
ICAAET – 793
ENHANCING NETWORK SECURITY WITH VIJANA ENCIPHERMENT TECHNIQUE
M.Janaki and Dr.M.GanagaDurga
ICAAET – 794
THE DYNAMICS OF A DISCRETE-TIME RATIO-DEPENDENT PREY-PREDATOR MODEL
INCORPORATING PREY REFUGE AND HARVESTING ON PREY
Dr. (Sr.) Elizabeth Sebastian and Preethi Victor
ICAAET – 799
DETECTING PRIMARY USER EMULATION ATTACKS IN COGNITIVE RADIO NETWORKS
A.UmaMaheswari and Dr.K.Latha
ICAAET – 801
AUTOMATED TOLLGATE PAYING SYSTEM WITH RFID USING CLOUD COMPUTING
Rajeevrathan J, Senthil Kumar S, Dhivya R, Mounica M, Sumithra A
ICAAET – 803
ENCRYPTION ON PREDICTION OF MEDICALDATA FOR CVD DISEASE IN CLOUD
ENVIRONMENT
Balasuramaniyan, A.Jeyasaravanan
ICAAET – 804
ZONE BASED CONSOLIDATED ROUTES IN MULTICAST ROUTING UNDER MOBILE ADHOC
NETWORKS
R.Shankar and Dr. E.Ilavarasan
ICAAET – 806
TRUST BASED ASSOCIATION ESTIMATION TECHNIQUE ON AODV PROTOCOL AGAINST
PACKET DROPPERS IN MANET
R. Anandhajothi, AL. Jeeva and Dr. V. Palanisamy
ICAAET – 808
SECURING COGNITIVE RADIO NETWORKS FROM PRIMARY USER EMULATION ATTACK.
S.Saranya and R.GracelinSheeba
ICAAET – 810
PREVENTION AND DETECTION OF DDoS ATTACKS IN WSN USING A NEIGHBOR TABLE
APPROACH
SiddhantChawla, NitinUmesh
ICAAET – 813
A HYBRID K-MEAN ALGORITHM TO IMPROVE CLUSTER QUALITY IN DATA MINING
MandeepKaur, RajdeepKaur
ICAAET – 816
A COMPARISON OF MULTIBAND RECTANGULAR PATCH ANTENNA WITH
ASYMMETRICAL SLOTTED LINES USING RF TOOLS
S.C.Sivaprakash, A.Abuthaahir, K.M. Sivaprasath, B.S.Vijayram and Dr.A.Sivanantharaja
ICAAET – 821
EXPERIMENTAL INVESTIGATION ON DYNAMIC BEHAVIOUR OF COIR/SISAL HYBRID
REINFORCED COMPOSITES FOR 30% WEIGHT OF FIBER LOADING
Mr.S.Balu, Mr.M.G.Sabariraj and Dr. P.S.Sampath
ICAAET – 822
CARP-AODV: CONGESTION AWARE AODV ROUTING PROTOCOL IN WIRELESS SENSOR
NETWORK
M. Senthil,S.Nivedha andK. Siddharth
ICAAET – 823
PERFORMANCE COMPARISON BETWEEN STATIC AND DYNAMIC NETWORK
ENVIRONMENT USING NETWORK SIMULATOR-2
V.Sameswari and Dr.E.Ramaraj
ICAAET – 828
CLOUD RESOURCE MANAGEMENT SYSTEM USING SNMP
HanifaArfi, Yaseer A. Ahmad and Dr. S. K. Sahana
ICAAET – 829
VISUALIZATION OF NEAREST NEIGHBORS IN WEB SERVICES
D.Vijayadurga, S.Ramesh and M.Seema
ICAAET – 838
CONTINUOUS MONITORING AND ALERTING SYSTEM FOR ICU PATIENTS USING
WIRELESS SENSOR NETWORK
S.JenifaYasmin
ICAAET – 841
ENERGY EFFICIENT MULTICAST AND UNICAST APPROACH FOR REKEYING IN IPV6
G. VinothChakkaravarthy, P. Ambigaand T. Grace Shalini
ICAAET – 843
DESIGN AND IMPLEMENTATION OF IDENTITY BASED SIGNATURE FOR E-MAIL
AUTHENTICAION
Sathish A, DhandapaniSamiappan
ICAAET – 845
A SURVEY OF PERFORMANCE IMPROVEMENT TECHNIQUES FOR HADOOP
AkshaySood, Ravinder Singh
ICAAET – 848
SEGMENTATION OF IMMUNE CELLS BASED ON TOGGLE OPERATOR AND COUNTING
CiyamalaKushbu, ShaikMajeeth
ICAAET – 850
EFFICIENT ROUTING PROTOCOL IMPLEMENTATION FOR MULTIPLE PRIMARYSECONDARY USERS IN COGNITIVE RADIO NETWORKS
T.Radhadevi and T.R.P.Monisha
ICAAET – 853
ENHANCING THE CLUSTERING TECHNIQUE FOR UNCERTAIN DATA MINING
Avinash Kumar, Chandra BhushanSah, Robin PrakashMathur
ICAAET – 873
AN EFFICIENT VANET SYSTEM FOR PRIORITY BASED, ACCIDENT AVOIDANCE AND
SHORTEST PATH NAVIGATION
Nadheer Ahmed
ICAAET – 881
AN ANALYSIS OF REGRESSION TESTING USING BLACK BOX METHODOLOGY
Nidhula Sebastian, Surya T U and M. Soumya Krishnan
ICAAET – 882
A COMPARISON BASED ANALYSIS OF EULER CIRCUIT FINDING ALGORITHMS
Ligiya Joseph Simenthy, ReshmaBoban and M. Soumya Krishnan
ICAAET – 884
SIMULATION MODEL TO AFFORD EFFECTIVE RESOURCE ROUTING AND ALLOCATION
PROCEDURE FOR BIO-MEDICAL APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT
Karthikeyan Nagarajan, Kanmani A
ICAAET – 887
INTRUSION ANALYSIS FOR VULNERABLE NETWORK ENTITIES USING ARTIFICIAL
NEURAL NETWORK
P.Revathi and Dr. S. Srinivasan
ICAAET – 893
HUMAN ACTION RECOGNITION USING SPATIO-TEMPORAL FEATURES
n.nivetha and k.ushakingslydevi
ICAAET – 899
MINING FREQUENT PATTERN IN MTC ENVIRONMENT USING TREE BASED ASSOCIATION
RULE
RagaventhiranJaganathan
ICAAET – 900
EPSR: ENHANCED PROACTIVE SOURCE ROUTING PROTOCOL FOR EFFICIENT
PROTOCOL IMPLEMENTATION IN MOBILE ADHOC NETWORKS
A. Mahalakshmi and Dr. G. Ramesh
ICAAET – 901
INTEGRATED APPROACH TO INFORMATION SECURITY USING STEGANOGRAPHY AND
CRYPTOGRAPHIC HASH
SahilMittu, Sami Anand, SumitMittu
ICAAET – 902
A COMPLETE AUTOMATED ALGORITHM WITH A FUSION OF OPTIMIZATION AND
CLUSTERING TECHNIQUES FOR TUMOR IDENTIFICATION IN MULTIMODAL MR BRAIN
IMAGES
Anitha. N, Vishnuvarthanan. G, PallikondaRajasekeran. MandArunprasath. T
ICAAET – 906
A RIGID CONVEX HULL BASED TOPOLOGY CONTROL FOR WIRELESS SENSOR
NETWORKS
Saravanan Kandasamy and Pravin Renold.A
ICAAET – 907
DESIGN OF GRAPHICAL USER INTERFACE FOR AUTOMATIC TEST EQUIPMENT (ATE)
D.PhaniSashanka, CH.Priyanka
ICAAET – 909
COMPRESSIVE SENSING OF K-MEANS CLUSTERING ALGORITHM IN WIRELESS SENSOR
NETWORKS
Malathi B, Saranya R, and Ramasamy K
ICAAET – 910
ENHANCE THE INTER CLUSTER COMMUNICATION USING CP-ABE FOR MULTICAST
SECURITY IN MANET
M.Soniyagandhi, Mrs.k.LingadeviDr. K. Ramasamy
ICAAET – 911
EXTENDED VMBUDDIES USING MAPREDUCE FOR MIGRATION OF MULTI TIER
APPLICATIONS IN CLOUD COMPUTING
Preetjot Singh, Avinash Kaur, Harshpreet T Singh
ICAAET – 912
SECURITY ENHANCEMENT OF AODV PROTOCOL FOR MOBILE ADHOC NETWORK
S. Soorya, Mr. G. Sivakumar.Dr.K.Ramasamy
ICAAET – 914
SOFTWARE EFFORT ESTIMATION USING NON ALGORITHMIC APPROACHES: A REVIEW
Sheena Thakur, NishaSethi, Harshpreet Singh
ICAAET – 915
ENHANCEMENT OF NETWORK LIFE TIME USING DTMAODV-BP BASED MULTICAST
ROUTING PROTOCOL
Mr. S.Jebakumar gomer rajadurai, S.Chitra,Dr. K. Ramasamy and Dr. J. Veerappan
ICAAET – 916
ATTACKER NODE DETECTION BY USING FREQUENCY BASED APPROACH
P.Gowrilakshmi, Mr. N.R.Sathiskumar.Dr.K.Ramasamy
ICAAET – 917
AUGMENTATION OF USABILITY AND SECURITY IN HYBRID GRAPHICAL PASSWORDS
WITH EFFECTIVE HARD AI PROBLEM
Petchiammal A, Venkateswari S
ICAAET – 918
AN EFFICIENT MOBILITY CORRELATION FOR GROUP DETECTION IN VANET
S.Mahalakshmi, N.Thenmoezhi and Dr.K.Ramasamy
ICAAET – 919
AN ENHANCED SECURITY FOR AUDITING MULTIPLE TASKS IN CLOUD
Veerapathiran Subramanian , Nivedhitha R, Udayarani R, Deepa R
ICAAET – 923
SYBIL ATTACK DETECTION THROUGH DISTANCE CALCULATION IN VANET
VaishaliAggarwal, Ravinder Singh
ICAAET – 926
SECURE DATA TRANSMISSION FOR MILITARY ENVIRONMENT USING BLOWFISH
ALGORITHM
Gopu K, Jansi Rani N, Jothi Soruba Thaya A,Shiyamala
ICAAET – 928
IMPLEMENTING MESSAGE INTEGRITY IN MOBILE PHONES (ANDROID PLATFORM)
USING IDENTITY BASED ENCRYPTION
Archana Devi R, Anu Mary Chacko and VinodPathari
ICAAET – 929
INDIAN SIGN LANGUAGE RECOGNITION SYSTEM FOR ASYMMETRICAL HAND GESTURES
Suchithra.M, Snehaa.S, GopikaNambiar, Arya.CandDiviyaBharrathi.L.B
ICAAET – 930
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH BOAT CLASSIFIER TO DETECT
RARE AND FREQUENT MISUSE ATTACKS IN MANET
Islabudeen. M, Kavitha Devi. M.K
ICAAET – 934
TO OVERCOME THE INCAST CONGESTION AND ENHANCE THE SECURITY IN MANET
UshaNatiya, Muthu Mari
ICAAET – 935
"DACMACSAC” Algorithm for Securing Data in Object Oriented Databases
Hardeep Singh Damesha, Veerpal Kaur Damesha
ICAAET – 936
IMPROVING ENERGY-EFFICIENCY IN WSN USING SLEEP SCHEDULING TECHNIQUE
Karthika G, Rajeswari A
ICAAET – 940
OBJECT RECOGNITION USING ADABOOST BASED MULTIPLE INSTANCE PRUNING
S. Kanagamalliga, Dr.S.Vasuki and P.Pathumarubini
ICAAET – 944
TURN DOWN IN ENERGY UTILIZATION IN WIRELESS CELLULAR NETWORK
KarpagamEswari, M.Vidhyaa M
ICAAET – 945
SELADG: SECURE ENERGY EFFICIENT LOCATION AWARE DATA GATHERING APPROACH
FOR WIRELESS SENSOR NETWORKS
M. Roseline Juliana,Dr. S.Srinivasan
ICAAET – 946
ASYMMETRIC MULTILEVEL INVERTER STRUCTURE WITH HYBRID PWM STRATEGY
N. Prabaharan, Dr. K. Palanisamy and A. Rini Ann Jerin
ICAAET – 947
REACTIVE ROUTING ENHANCEMENT USING LOCAL PATH DIVERSITY IN WIRELESS
SENSORNETWORKS
R.Rengalakshmi, Ms.P.Ganeshwari,Dr.K.Ramasamy
ICAAET – 951
COMPARATIVE ANALYSIS OF DATA MINING ALGORITHMS FOR FREQUENT ITEM SET
WITH ENHANCE TECHNIQUE
Anil Kumar, Er. VarunSingla
ICAAET – 952
RULE EXTRACTION IN SENTIMENT ANALYSIS UNDER BIG DATA ENVIRONMENT
Jaskaran Singh, VarunSingla
ICAAET – 953
A HYBRID TECHNIQUE TO DETECT FAKE ACCESS POINT IN WLAN
RohitBhardwaj
ICAAET – 955
REDUCE NETWORK INTERFERENCE FOR THE EFFICIENT USE OF SPECTRUM SHARING
BY THREE-TIER FEMTOCELL NETWORK
PriyaSubburaj, Udhaya R
ICAAET – 957
METHODOLOGY TO REDUCE TRANSACTION IN CANDIDATE SET GENERATION
THROUGH APRIORI ALGORITHM
Dr. K.Kavitha
ICAAET – 961
OPTIMUM PATH SELECTION AND LOW END TO END DELAY USING OSDRP IN CRNS
J.shanthi, Mrs.A.R.Devi, Dr.K.Ramasamy
ICAAET – 964
COHERENT TRANSLUCENT TESTING OF FIREWALL POLICIES
Renuga Devi Ravichandran, Sathish Raja Paneerselvam
ICAAET – 966
A NOVEL TECHNIQUE FOR UNICASTING TO IMPROVE THROUGHPUT, REDUCED ENERGY
CONSUMPTION &PACKET LOSS IN MANET
Dheeraj Sharma, RohitSethi
ICAAET – 970
DETAILED EXAMINATION ON THE PERFORMANCE OF ENHANCED DECISION TREE
ALGORITHM (EDTA) AND ITS COMPARISON WITH C4.5 ALGORITHM
Sunakshi Sharma
ICAAET – 976
SECURE DATA TRANSMISSION AND FILE SHARING IN CLOUD COMPUTING
Maheswari G, Revathi E
ICAAET – 980
BLIND WATERMARKING FOR THE IMAGES CAPTURED BY ANDROID MOBILES
Vineeth M K, YazirArafath A B, Dhanya M Dhanalakshmy, Bagyammal T
ICAAET – 983
LEADING TECHNIQUES FOR DETECTING DUPLICATE BUG REPORTS A SAMPLE SURVEY
R. Nantha Kumar, N. G. Bhuvaneswariamma
ICAAET – 984
DESIGN AND IMPLEMENTATION OF A LOOK UP TABLE BASED TCSC CONTROLLER FOR
POWER SYSTEM STABILITY ENHANCEMENT
Mamatha S, K C SindhuThampatty, Aarti N
ICAAET – 985
SECURING INFORMATION TRANSFER IN ONLINE GAMING
Jeevaanantham.V, Sasikumar.Gand N.Harini
ICAAET – 989
REAR FORCE BASED ADAPTIVE ROUTING IN COMMUNICATION NETWORKS
R Dhaya
ICAAET – 994
AN ENHANCED APPROACH TO SSL SERVER LOAD MANAGEMENT BASED ON SERVER
HEALTH
Dipesh Gupta, Hardeep Singh
ICAAET – 999
IMPROVING EFFICIENCY OF DEVICES IN IOT USING HYBRID PHOENIX SYSTEM
HarneetKaur, Akhil Sharma
ICAAET – 1002
DFRS: DIET FOOD RECOMMENDATION SYSTEM FOR DIABETIC PATIENTS BASED ON
ONTOLOGY
B. Raj Kumar, Dr. K. Latha
ICAAET – 1010
VISUAL CRYPTOGRAPHIC SCHEMES FOR SECURE IMAGE SHARING
Archana Devi R, SravanthiCh, Yasaswy A, Varsha A.
ICAAET – 1013
PERFORMANCE ANALYSIS OF SINGLE BL RAM USING POWER REDUCTION TECHNIQUES
Lavanya R, Banukavitha V, Durgadevi M
ICAAET – 1015
A TECHNICAL REVIEW ON OBESITY ANALYSIS USING CLASSIFICATION ALGORITHMS
Suguna M, Sathees Kumar B
ICAAET – 1016
A SURVEY ON HEART DISEASE PREDICTION USING DATA MINING TECHNIQUES
Sharan Monica L,Sathees Kumar B
ICAAET – 1020
ENSURING IMAGE INTEGRITY IN ANDROID
Archana Devi R., AnugrahaRajagopal, Sowmya B.M., SowmyaSree M., Ravi TejaBandela
ICAAET – 1022
A SURVEY ON LIVER DISORDER USING CLASSIFICATION TECHNIQUES IN DATA MINING
Vahini R, Sathees Kumar B
ICAAET – 1024
A SURVAY PAPER ON MODEL BASED TESTING APPROACHES AND THEIR CHALLENGES
GurpreetKaur, AlpanaVijayRajoriya
ICAAET – 1025
TO REDUCE PROCESSING TIME TO GENERATE FREQUENT ITEMSET USING LAPLACE
EQUATION IN APRIORI ALGORITHM
ShilpiSingla, Arun Malik
ICAAET – 1026
IMPROVING FACE VERIFICATION RATE USING NEAR INFRARED AND VISIBLE IMAGE
FUSION BASED ON DIFFERENTIAL EVOLUTION
Rajesh Thakur, Baljit S. Saini
ICAAET – 1027
UDDI ADVERTISEMENT CENTRIC SEMANTIC WEB SERVICE DISCOVERY SYSTEM
S. Priya, Dr.A. Grace Selvarani
ICAAET – 1028
AN ENERGY-SAVING ROUTING ALGORITHM FOR WIRELESS BODY SENSOR NETWORK
USING DATA COMPRESSION TECHNIQUE
KarthickK,Vijayakumar R
ICAAET – 1033
TO INTENSIFY CLUSTER QUALITY BY ENHANCING K-MEANS CLUSTERING ALGORITHM
IN DATA MINING
Twinkle Garg, Arun Malik
ICAAET – 1044
LOCALISATION AND RECOGNITION OF LICENSE PLATE SYMBOLS
M. BadmaNagini, A. Siva Sankar
ICAAET – 1045
FEATURE EXTRACTION AND CLASSIFICATION FRAMEWORK FOR FACE RECOGNITION
SYSTEM
E. JebamalarLeavline, H. Xavier Paul Rajan and D. Asir Antony Gnana Singh
ICAAET – 1046
EVALUATION OF ONLINE REPUTATION SYSTEMS IN REAL TIME APPLICATION
Lakshmi Vidyadharan, Karthigha M
ICAAET – 1047
CLOUD MONITORING USING OBJECTS WITH IDENTIFIERS
ValliyappanVaiyapuri
ICAAET – 1050
IDENTICAL TWINS RECOGNITION BY UNIFYING THE FACIAL AND LIP FEATURES
B.LakshmiPriya, Dr. M.Pushpa Rani
ICAAET – 1051
IMPROVING THE PERFORMANCE OF E-MAIL SPAM CLASSIFICATION USING F-GSO
ALGORITHM FOR FEATURE SELECTION
D. KarthikaRenuka, Dr. P. Visalakshi, V. Sri Vinitha
ICAAET – 1054
TO ENHANCE THE OTP GENERATION PROCESS FOR CLOUD DATA SECURITY USING
DIFFIE-HELLMAN AND HMAC
KomalpreetKaur, RohitSethi
ICAAET – 1055
SUPERVISORY SERVICE FOR CLOUD INFRASTRUCTURE AND SERVICES
SravyaNujella, PradeepKaranam
ICAAET – 1059
A MODIFIED RADIO RESOURCE ALLOCATION AND GREEN OPERATION FOR MOBILE
ACCESS NETWORK BASED ON RADIO OVER FIBER
Uma C
ICAAET – 1060
ANALYSIS OF VARIOUS AUTONOMOUS SINK RELOCATION MECHANISMS IN FLAT
RANDOM DISTRIBUTED BASED ON NODE DENSITY FOR IMPROVING WIRELESS SENSOR
NETWORK LIFETIME
Pavatha P, Manikandan B
ICAAET – 1063
FUZZY ANALYTIC NETWORK PROCESS BASED QUANTIFICATION OF COMPONENT
SELECTION AND RANKING FOR COMPONENT BASED SOFTWARE ENGINEERING
Megha Grover, Harshpreet Singh, Gurpreet Singh
ICAAET – 1064
STEP VERIFICATION FOR DETECTION OF BLACK HOLE ATTACK IN MANET
Neha, Sharma Manmohan
ICAAET – 1069
RAPID DATA COLLECTION IN WIRELESS SENSOR NETWORKS
Murugan C
ICAAET – 1071
HOSPITAL MANAGEMENT SYSTEM USING NFC TECHNOLOGY
Jeyapreetha J, MounicaMuruganandham, Bala Subramanian D, Suresh Babu P
ICAAET – 1078
CO-OPERATIVE TRUST AWARE ROUTING PROTOCOL FOR WIRELESS SENSOR
NETWORKS
Deepika N.P, PravinRenold A
ICAAET – 1079
PERFORMANCE EVALUATION IN ENERGY CONSUMPTION TO INCREASE NETWORK LIFE
TIME IN MANET
RupinderKaur, Pooja Devi
ICAAET – 1080
PERFORMANCE ANALYSIS OF OBJECT BASED ACCOUNTABILITY FRAMEWORK IN
CLOUD COMPUTING
Pradeep Singh, Parminder Singh, Kiran Jyoti
ICAAET – 1083
ACCELERATING THE PERFORMANCE OF SECRET SHARING ALGORITHM USING GPU
Suchithra M, Sikha O K
ICAAET – 1087
HUMAN SKULL AND FACE IDENTIFICATION USING SIFT TECHNIQUE
M. Chitra Devi, Dr. M. Pushpa Rani
ICAAET – 1088
IMAGE STEGANOGRAPHY BASED ON LSB MATCHING REVISITED USING SECRET
SHARING APPLICATION
Ajith V, Kanagaraj S, Malathi P
ICAAET – 1091
PERFORMANCE ENHANCEMENT OF FAULT TOLERANT ROUTING ALGORITHM IN
OPTICAL WDM NETWORKS
Ramesh, Vijayakumari, SenthilSabarinath
ICAAET – 1094
A REVIEW ON ENHANCED NODE PLACEMENT STRATEGY FOR COST OPTIMIZATION IN
WMSN OVER ELEVATED TERRAIN
MeresonglaAier, Rajeev Kumar Patial
ICAAET – 1099
ENERGY EFFICIENT POWER SAVING PROTOCOLS FOR ADHOC NETWORKS USING HYPER
QUORAM SYSTEM
Kavitha S
ICAAET – 1100
GAIT BIOMETRICS AS AN AUTHENTICATION IN SMARTPHONES
ShashwatSagar, Mohinder Kumar
ICAAET – 1105
BENEFITS OVER ENVIRONMENT USING INFRASTRUCTURE AS A SERVICE IN CLOUD
COMPUTING
AnuragShukla, SumitBabu, AvendraSahu
ICAAET – 1106
SECURE TAG BASED IMAGE RETRIVAL USING TIR-AES ALGORITHM
N.Suriya Devi, Dr. M.Pushpa Rani
ICAAET – 1113
HUMAN ACTIVITY RECOGNITION USING CSI ANGLE & EUCLIDEAN DISTANCE FEATURE
AvendraSahu, AnuragShukla, Vikesh Kumar
ICAAET – 1114
DOCUMENT RANKING STRATEGY ENHANCEMENT USING PARAGRAPH RANKING
Er. Yaseer Ali Ahmad and Dr. AbhijitMustafi
ICAAET – 1115
IDENTIFYING THIRD-PARTY-INFLUENCED VULNERABILITIES IN POPULAR MASSIVELY
MULTI-PLAYER ONLINE ROLE-PLAYING GAMES
Hari Kumar, Ritwik M, Arjun Nair
ICAAET – 1118
REAL-TIME DUPLICATE FILE DETECTION SYSTEM
Yaseer Ali Ahmad, Dr. AbhijitMustafi
ICAAET – 1120
CUSTOMER REVIEW SUMMARIZATION USING SUPERVISED LEARNING TECHNIQUES
SwapnilVijayvargiya, DarvinderKaur
ICAAET – 1122
RANKING OF BRAIN TUMOR THROUGH SYMPTOMS IN SEVERAL DISEASES
Nikita, Yaseer Ali Ahmad, G. Sahoo
ICAAET – 1123
ARC LENGTH AND RESIDUAL ENERGY BASED MULTI PATH SECURE ROUTING
PROTOCOL(ALRMSR) FOR WIRELESS SENSOR NETWORKS
Stella.K Stanley, Dr.E.N.GaneshNarasimhan
ICAAET – 1125
FINEST ENERGY EFFICIENT DISPATCH FOR BIDIRECTINAL TRANSMISSION USING
CLUSTERING TECHNIQUES
R. Lavanaya, S. HasanHussain
ICAAET – 1132
A NEW COMBINATIONAL APPROACH OF ANDROID AND BRACKETS TO MANAGE
EMPLOYEES VIA GPS
M.Dinakaran, G.Siva Shanmugam, V.Vijayarajan and R.Kannadasan
ICAAET – 1133
A TRIANGULAR SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON
MULTIVARIATE CORRELATION ANALYSIS
M.Dinakaran, G.Siva Shanmugam, V.Vijayarajan and R.Kannadasan

Similar documents