MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering

Size: px
Start display at page:

Download "MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering"

Transcription

1 MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and List of conference papers presented by faculties during the year - S.No. Date Level Name of the Journal/Conference Title of the Paper Author(s) CODECLAVE9.2 - Government College of,salem-11 CSCT - Einstein College of, Tirunelveli NCEIT'10 - College of, Tirunelveli 4. NCAC'10 - Kalasalingam 5. NACIPAN'10 - College, Kovilpatti 6. NC on Emerging IT's 7. NC on Advances in Computing 8. Jul ,10-Jul Int. Conf. on Computers, Communication and Intelligence, ICCCI, 10, Velammal College of Conference on Advances and Emerging Trends in Computing Technologies, SRM, Chennai IISM 10, RVS college of, Coimbatore IC on Intelligent Design and Analysis of Products, Systems and Aerial Image Segmentation for Obscure Images Using Markov-Gauss Mixture Model Ways to Improve VOIP Performance in Multiple Co-located IEEE Wireless LAN Techniques to Boost VOIP Strength in Multiple Co-located IEEE Wireless LAN Facial Verification based on localized Kernel Eigen spaces Copy Protection of Images by Blind Reversible visible Watermarking Techniques to boost VOIP strength in multiple co-located IEEE wireless LAN Face verification based on localized kernel eigen spaces Denial of Service: New metrics and their measurement Photo retrieval system using Adaptive LSB substitution steganography scheme Hidden Visible Watermarking in images and videos. Extracting Facial Global and Local Features for Recognition using Multi-resolution

2 ,10-Jul 03,04-Sep Computation (IDAPSC-10) at Sri Krishna College of and Technology, Coimbatore IC on Intelligent Design and Analysis of Products, Systems and Computation (IDAPSC-10) at Sri Krishna College of and Technology, Coimbatore IC & Exhibition on Biometric Technology (ICEBT ) at PSG College of Technology, Peelamedu, Coimbatore ICCC'10, SRM, Chennai ,10-Jul 04-May 04-May IIIT- - Erode Sengunthar College,Erode NACIPAN'10 - College, Kovilpatti NCRCD'10 - Velammal College,Madurai Conference on Advances and Emerging Trends in Computing Technologies at SRM (Chennai) Conference on Computational Systems and Communication Technology at Einstein College of (Tirunelveli) conference on Intelligent Design and Analysis of Products, Systems and Computation (IDAPSC-10) NCICN- - Easwari College,Chennai NCICN- - Easwari College,Chennai Transforms Iris Recognition Based on Accurate Iris Segmentation using Multi-resolution Transforms Multimodal Biometrics for Face and Fingerprint Recognition using Multi- Resolution Transforms Object Removal in Video Using Exemplar based Image In painting Video In painting without Ghost Shadow Artifacts Video in painting under Different Camera Motions with Reduced Ghost Shadows Content Authentication for Digital Videos Overlay Text Extraction from Video Scenes A new framework for Overlay Text Extraction from Video Scenes Extracting facial global and local features for recognition using multi resolution transforms. The Efficient Technique for the storage reduction in routing table Policy Based Load Delegation in Service Grid Environments Mrs. G.Ananthi

3 ,24-Apr 17,18-Mar 04,05-Mar 25-Feb 18,19-Feb 27,28-Feb Computer Technol - St.Xavier s Catholic College of IIST - Sun College of IIST - Sun College of ICCOS 11 - Karunya,Coimbatore NC-EVENT - Sathyabama NC-EVENT - Sathyabama NC-EVENT - Sathyabama ICAMA- - Kalasalingam NETACS - Ponjesly College of Catch'11 - Einstein College of NC-EVENT - Sathyabama NC-EVENT - Sathyabama NC-EVENT - Sathyabama NC-EVENT - Sathyabama NC-EVENT - Sathyabama NC-EVENT - Sathyabama Improving quality of images in Print-Scan Channel Feedback based scheduling for Two-stage switch Scheduling variable size packets for input and output queued switches Enhanced Design for Multicast Authentication Improved Technique for Multicast Authentication Contention and Reservation Based Load Balanced Switch Maximum Weighted Lag Scheduling Algorithm for input Queued Switches Gene Expression Data Miningby Hybrid Fuzzy Methods Interpolation Technique for Digital Image Watermarking Multi-bitplane Compression technique for Microarray images Hybrid Fuzzy Rule based Data Mining Secure Data Replication & Consistency Service in DataGrid A Novel Algorithm for Segmenting Human Body parts using Deformable Triangulation Design of Multichannel Scheduler with Packet Concatenation for Wireless Backhaul Links Face Recognition Using Multi Resolution Transforms Balancing the load in Wireless Mesh Network by using Efficient load Aware Routing Scheme Ms.P.Golda Jeyasheeli Ms.P.Golda Jeyasheeli

4 ,24-Mar 41. Mar Mar 27 Jan 23 Mar 23 Mar 09-Apr 09-Apr 11 May NC-EVENT - Sathyabama Computer Technol - St.Xavier s Catholic College of IC on Knowledge and Networking (KEN 11) at Karunya, Coimbatore IntelligentComputing andautomationintruvision 2k11 - Kamaraj College of Engg & Tech, Virudhunagar Emerging Trends in VLSI Embedded and NANO Technologies at Sathyabama Computer Technology, St.Xavier s Catholic College of, Nagercoil Computer Technology, St.Xavier s Catholic College of, Nagercoil ICVCI - SAINTGITS College of,kottayam ICVCI - SAINTGITS College of,kottayam NC-EVENT - Sathyabama NC-EVENT - Sathyabama NC on Recent Trends in Instrumentation and Control, Jayaram College of IIST - Sun College of A Digital Contract Signing Protocol with ABUSE-Freeness Shape based detection and retrieval Improved Image re sampling detection Technique Blind Detection of Digital Image Forgery A non-generative approach for face verification across aging Face Recognition Under Expressions Variations Object Segmentation and Classification using Multiple Shape Models Expressive Face Recognition Using Optical Flow Approach Object Segmentation and Classification Using Multiple Shape Models from an Image Sequence Object Segmentation and Classification with multiple shape models An Efficient Scheme to Recognize Face under Expression Variation Object Categorization using Probabilistic Grammar Markov Models by Unsupervised Learning SURAP-A Secure Ultralight weight and Authentication Protocol Ms.P.Golda Jeyasheeli Mrs.M.S.Bhuvaneswari

5 Feb 18,19-Feb Mar 17,18-Mar 17-Mar 13 to 15- Jan Mar 3-5 Jun 23,24-Mar NETACS - Ponjesly College of Catch'11 - Einstein College of IC on Emerging Trends in Electrical and Computer Technology NC-EVENT - Sathyabama IIST - Sun College of NC-EVENT - Sathyabama ICCOS 11 - Karunya,Coimbatore NC-EVENT - Sathyabama IntelligentComputing andautomationintruvision 2k11 - Kamaraj College of Engg & Tech, Virudhunagar NC-EVENT - Sathyabama icost -Computer Engg - Bapusaheb Shivajirao Deore College of and Polytechnic, Dhule(M.S ) Automatic extraction of human object and posture recognition for video surveillance system IC on Recent Trends in Information Technology(ICRTIT ), MIT Chennai Computer Technol - St.Xavier s Catholic College of Security Against BOTNET Authenticated Group key Generation and Distribution based on Secret Sharing Scheme Improved User Authentication in Wireless Sensor Networks Packet Loss Deduction and Reduction Based on runtime performance Scheduling Algorithms for buffered combined input and output queued switch Scheduling for Buffered Crossbar Switch Generation of True Quality Image Thumbnails An Efficient Method to Generate quality image thumbnails Relay Deployment Framework for conserving Power in Mobile Ad-hoc Networks Distributed Multicast Routing Mobile Adhoc Networks Distributed Maximum Residual Multicast Routing for Mobile Ad-hoc Networks Automatic extraction of human object and posture recognition for video surveillance system Evaluation of Imbalanced Datasets using Fuzzy Support Vector Machine-Class Imbalance Learning (FSVM-CIL) Shape based detection and retrieval Mrs.M.S.Bhuvaneswari Mrs.M.S.Bhuvaneswari Mr.K.Thirumoorthy Mr.M.Arun Mrs.R.Beaulah Jeyavathana Mrs.R.Beaulah Jeyavathana Mr.C. Mr.C. Mr.C. Mrs. S.Amutha Mr. B.Lakshmanan Mrs. S. Priyadharsini

6 Mar 25,26-Feb IntelligentComputing andautomationintruvision 2k11 - Kamaraj College of Engg & Tech, Virudhunagar DRDO Sponsored- Conference on Innovations in Information Technology at Bannari Amman Institut of Technology Blind Detection of Digital Image Forgery Domain Driven Classification of Credit Card holder behaviour using Fuzzy Linear Programming Mrs. S. Priyadharsini Ms.S.Saranya

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering

MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering MEPCO SCHLENK ENGINEERING COLLEGE, SIVAKASI Department of Computer Science and Engineering Paper presentation by M.E. Students in Journal/ during the year 2010-2011 Name of & 1. Mar,2011 International

More information

FACULTY PROFILE. Designation Institution/Organization Period Nature of Duties

FACULTY PROFILE. Designation Institution/Organization Period Nature of Duties Name of the Staff Designation FACULTY PROFILE : D.VIJAYAKUMAR Date of joining in the college : 04-06-2010 E-mail Id : Assistant Professor (Sr.Grade) : dvk@nec.edu.in Mobile Number : 9994357984 Personal

More information

ARUNAI ENGINEERING COLLEGE

ARUNAI ENGINEERING COLLEGE S.No Module Description 1. Embedded system ISTE 2 3 4 5 6 ARUNAI ENGINEERING COLLEGE TIRUVANNAMALAI Department of Electronics & Communication Engineering WORKSHOPS Seminar on Robotic Control Application

More information

PHOTO. 6 months -Seleicon Electronics 19.6 YRS Number of Workshops. Publications: Conference Journal National & International

PHOTO. 6 months -Seleicon Electronics 19.6 YRS Number of Workshops. Publications: Conference Journal National & International Name: K.LAKSHMI JOSHITHA Designation: ASSISTANT PROFESSOR-GR I PHOTO Qualification: Area of specialization: Experience : (As On May2014) Number of workshop / FDP attended: M.E,(Ph.D) WIRELESS SENSOR NETWORKS

More information

PHOTO YRS Number of Workshops. Publications: Conference Journal National& International. Patents: National International

PHOTO YRS Number of Workshops. Publications: Conference Journal National& International. Patents: National International Name: K.LAKSHMI JOSHITHA Designation: ASSISTANT PROFESSOR-GR I PHOTO Qualification: Area of specialization: Experience : (As On May2014) Number of workshop / FDP attended: M.E,(Ph.D) WIRELESS SENSOR NETWORKS

More information

FACULTY PROFILE. Class /CGPA. I Class May Designation Institution/ Organisation Period. Sri Balaji Chockalingam college of Engg, Arni

FACULTY PROFILE. Class /CGPA. I Class May Designation Institution/ Organisation Period. Sri Balaji Chockalingam college of Engg, Arni Name of the Staff FACULTY PROFILE : Dr G.KANNAYERAM Official Address with E-mail Id : Asst Professor (Sr.Grade) EEE Department National K.R.Nagar g.kannayeram@gmail.com Mobile Number : 9443034130 1. Personal

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

KCG College of Technology, Chennai

KCG College of Technology, Chennai , Chennai-600 097 faculty member : S SANKAR Department : COMPUTER SCIENCE AND ENGINEERING Present Designation : ASSOCIATE PROFESSOR Residential Address : B22, SHANTINIKETAN ALTAIR APARTMENT KELAMBAKKAM,

More information

Image Processing (IP)

Image Processing (IP) Image Processing Pattern Recognition Computer Vision Xiaojun Qi Utah State University Image Processing (IP) Manipulate and analyze digital images (pictorial information) by computer. Applications: The

More information

Multimodal Biometric Watermarking Techniques: A Review

Multimodal Biometric Watermarking Techniques: A Review Multimodal Biometric Watermarking Techniques: A Review C.Karthikeyan 1, D.Selvamani 2 Assistant professor, Dept. of ECE, Einstein Engineering College, Tirunelveli, Tamilnadu, India 1 PG Student, Dept.

More information

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005

The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005 The Challenges of Measuring Wireless Networks David Kotz Dartmouth College August 2005 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you

More information

Video signal Processing Power Electronics & Drives. Anna University - Pursuing % Anna, Chennai

Video signal Processing Power Electronics & Drives. Anna University - Pursuing % Anna, Chennai K.S.R COLLEGE OF ENGINEERING, TIRUCHENGODE 63725 (An Autonomous Institution, Affiliated to Anna University, Chennai) DEPARTMENT OF EEE FACULTY PROFILE 0. Name : J.Thiyagarajan 02. Designation : Assistant.Professor

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25 Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop

More information

Unsupervised image segmentation using contourlet domain hidden Markov trees model p. 32

Unsupervised image segmentation using contourlet domain hidden Markov trees model p. 32 Localization scale selection for scale-space segmentation p. 1 Image segmentation for the application of the Neugebauer colour prediction model on inkjet printed ceramic tiles FCM with spatial and multiresolution

More information

Velammal Engineering College Department of Computer Science and Engineering

Velammal Engineering College Department of Computer Science and Engineering Velammal Engineering College Department of Computer Science and Engineering Name & Photo : Prof.B.Rajalakshmi Designation: Qualification : Area of Specialization : Teaching Experience : Vice Principal

More information

Professional Excellence Summary

Professional Excellence Summary Mr. J.SANTHOSH B.E.,M.E., (Ph.D).,MISTE Assistant Professor Department of Computer Science & Engineering K.S.R. College of Engineering (Autonomous) Tiruchengode - 637 215, Namakkal District, TamilNadu.

More information

BIOMETRIC PRINTER SECURITY SYSTEM

BIOMETRIC PRINTER SECURITY SYSTEM BIOMETRIC PRINTER SECURITY SYSTEM A.S.Karthiga 1, k.saravanakumar 2, R.Aravind 3, M.Karthi 4, S.P.Dwarakesh M.E., 5, 1,2,3,4 UG Scholar, Dept. of EEE, 5 Assistant professor of EEE, Erode Sengunthar Engineering

More information

Department of Computer Science and Engineering. Qualification : UG(Specialization) B.Tech (Information Technology) International 06

Department of Computer Science and Engineering. Qualification : UG(Specialization) B.Tech (Information Technology) International 06 SriramE ng ineeringcollege Department of Computer Science and Engineering Ms. N. BELINA Name & Photo : Designation: Assistant Professor Qualification : UG(Specialization) B.Tech (Information Technology)

More information

RMK ENGINEERING COLLEGE INDIVIDUAL FACULTY DATA SHEET

RMK ENGINEERING COLLEGE INDIVIDUAL FACULTY DATA SHEET RMK ENGINEERING COLLEGE INDIVIDUAL FACULTY DATA SHEET Name of the College: Name of the Department: Name of the faculty member: Present Designation: RMK ENGINEERING COLLEGE CSE S. Selvi AssociateProfessor

More information

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects

Promise for the Best Projects SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS. in various Domains Latest Projects NCCT SOFTWARE PROJECTS JAVA * J2EE * J2ME IEEE PROJECTS in various Domains Latest Projects #109, 2 nd Floor, Bombay Flats, Nungambakkam High Road Nungambakkam High Road, Chennai 600034 Above IOB, Next

More information

Name: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing)

Name: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Name: S.Brindha Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Assistant Professor Grade I Area of specialization: B.E(ECE), M.E( &Networking) Ph.D(Pursuing) Radio over Fiber Networks Experience

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1358-RameshV CURRICULUM VITAE

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1358-RameshV CURRICULUM VITAE CURRICULUM VITAE RAMESH V Email: prof.rameshv@gmail.com Mobile: +91 9600222371 3/138, Pillaiyar Koil Street, Devipattanam 627757, Sivagiri-T.K, Tirunelveli-Dist, Tamilnadu, India. Objective Looking for

More information

Gait analysis for person recognition using principal component analysis and support vector machines

Gait analysis for person recognition using principal component analysis and support vector machines Gait analysis for person recognition using principal component analysis and support vector machines O V Strukova 1, LV Shiripova 1 and E V Myasnikov 1 1 Samara National Research University, Moskovskoe

More information

Activities of the IEEE Computer Society, Madras Chapter (IEEE Madras Section, Region 10) during the year 2008

Activities of the IEEE Computer Society, Madras Chapter (IEEE Madras Section, Region 10) during the year 2008 Activities of the IEEE Computer Society, Madras Chapter (IEEE Madras Section, Region 10) during the year 2008 IEEE Computer Society, Madras Chapter is pleased report that a total of 44 events were organized

More information

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Nandini P 1 Nagaraj M.Lutimath 2 1 PG Scholar, Dept. of CSE Sri Venkateshwara College, VTU, Belgaum,

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

Earthquake Waveform Recognition Olivia Grubert and Bridget Vuong Department of Computer Science, Stanford University

Earthquake Waveform Recognition Olivia Grubert and Bridget Vuong Department of Computer Science, Stanford University Earthquake Waveform Recognition Olivia Grubert and Bridget Vuong Department of Computer Science, Stanford University Abstract When people think of applying machine learning to earthquake data, most seek

More information

We offer following projects in JAVA/J2EE/JEE,.NET and Open Source solutions

We offer following projects in JAVA/J2EE/JEE,.NET and Open Source solutions We offer following projects in JAVA/J2EE/JEE,.NET and Open Source solutions 1. EFFICIENT ROUTING IN INTERMITTENTLY CONNECTED MOBILE NETWORKS 2. ON GUARANTEED SMOOTH SWITCHING FOR BUFFERED CROSSBAR SWITCHES

More information

Research Papers Published in Refereed International Journals

Research Papers Published in Refereed International Journals List of Publications [38] Research Papers Published in Refereed International Journals 1. H S Guruprasad, H D Maheshappa, Dynamic Load Sharing Policy in Distributed VoD using agents, International Journal

More information

Vol. 2 Issue III, March 2014

Vol. 2 Issue III, March 2014 Literature survey of network reconstruction, reconfiguration & QOS optimization approach in case of link failure in existing SSA protocol in Mobile Ad-Hoc Network Vikas Deswal (Student), M.Tech (CSE),

More information

Webpage: Volume 3, Issue VII, July 2015 ISSN

Webpage:   Volume 3, Issue VII, July 2015 ISSN Independent Component Analysis (ICA) Based Face Recognition System S.Narmatha 1, K.Mahesh 2 1 Research Scholar, 2 Associate Professor 1,2 Department of Computer Science and Engineering, Alagappa University,

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Sathyamangalam, 2 ( PG Scholar,Department of Computer Science and Engineering,Bannari Amman Institute of Technology, Sathyamangalam,

Sathyamangalam, 2 ( PG Scholar,Department of Computer Science and Engineering,Bannari Amman Institute of Technology, Sathyamangalam, IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 8, Issue 5 (Jan. - Feb. 2013), PP 70-74 Performance Analysis Of Web Page Prediction With Markov Model, Association

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Brunswic. Welcome. Network video Surveillance. Biometric Identification (Face Detection) Biometric Identification (Finger Print)

Brunswic. Welcome. Network video Surveillance. Biometric Identification (Face Detection) Biometric Identification (Finger Print) Welcome Brunswic Welcome to Brunswic Total solution Provider in video surveillance security system, Biometric Identification,Professional Sensing solution for IP system and LPR Technology. Brunswic is

More information

Publications: Conference Journal National International National International. Patents: National International

Publications: Conference Journal National International National International. Patents: National International Name: Dr J.RAJA Designation: Qualification: Professor B.E., M.E., Ph.D., Area of specialization: Digital Communication Experience : Industrial Experience Teaching Experience Nil 23years Number of workshop

More information

The Essential Guide to Video Processing

The Essential Guide to Video Processing The Essential Guide to Video Processing Second Edition EDITOR Al Bovik Department of Electrical and Computer Engineering The University of Texas at Austin Austin, Texas AMSTERDAM BOSTON HEIDELBERG LONDON

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

SriramEngineeringCollege Department of Computer Science and Engineering

SriramEngineeringCollege Department of Computer Science and Engineering SriramEngineeringCollege Department of Computer Science and Engineering Dr. D. HEMANAND Name & Pho : Designation: Assistant Professor Qualification : UG(Specialization) B.E (Electronics & Communication

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

Smart Door Lock Opening In Cars Using Face Recognition

Smart Door Lock Opening In Cars Using Face Recognition Smart Door Lock Opening In Cars Using Face Recognition 1 Vinil Kumar.V, 1 Divya.N, 2 Mr. K.S.Vairavel 1 PG Scholar, M.E (Embedded System), Bannari Amman Institute of Technology, Sathyamangalam, India 1

More information

Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc Networks *T.Kumanan,**Dr.K. Duraiswamy

Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc Networks *T.Kumanan,**Dr.K. Duraiswamy Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc Networks *T.Kumanan,**Dr.K. Duraiswamy *Meenkashi College of Engineering, K.K.Nagar, Chennai 78. **K.S.R. College

More information

FACE RECOGNITION USING FUZZY NEURAL NETWORK

FACE RECOGNITION USING FUZZY NEURAL NETWORK FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,

More information

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015-2016 JAVA IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 JAVA Project Titles Domain Lang/Year 1 JPJ1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 JPJ1502 A

More information

Name & Photo: Ms.G.Manimala. Qualification : B.E., M.E.,(Ph.D) Area of Specialisation : Cloud Computing, Internet of Things & Big Data

Name & Photo: Ms.G.Manimala. Qualification : B.E., M.E.,(Ph.D) Area of Specialisation : Cloud Computing, Internet of Things & Big Data Name & Photo: Ms.G.Manimala Designation: Qualification : Associate Professor B.E., M.E.,(Ph.D) Area of Specialisation : Experience : No. of Workshop / Conferences / FDP attended : Cloud Computing, Internet

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Dr. Enrique Cabello Pardos July

Dr. Enrique Cabello Pardos July Dr. Enrique Cabello Pardos July 20 2011 Dr. Enrique Cabello Pardos July 20 2011 ONCE UPON A TIME, AT THE LABORATORY Research Center Contract Make it possible. (as fast as possible) Use the best equipment.

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

Video Surveillance for Effective Object Detection with Alarm Triggering

Video Surveillance for Effective Object Detection with Alarm Triggering IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 21-25 Video Surveillance for Effective Object Detection with Alarm

More information

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai

More information

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important

More information

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

PCA and KPCA algorithms for Face Recognition A Survey

PCA and KPCA algorithms for Face Recognition A Survey PCA and KPCA algorithms for Face Recognition A Survey Surabhi M. Dhokai 1, Vaishali B.Vala 2,Vatsal H. Shah 3 1 Department of Information Technology, BVM Engineering College, surabhidhokai@gmail.com 2

More information

View Invariant Movement Recognition by using Adaptive Neural Fuzzy Inference System

View Invariant Movement Recognition by using Adaptive Neural Fuzzy Inference System View Invariant Movement Recognition by using Adaptive Neural Fuzzy Inference System V. Anitha #1, K.S.Ravichandran *2, B. Santhi #3 School of Computing, SASTRA University, Thanjavur-613402, India 1 anithavijay28@gmail.com

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Professor, Department of Computer Technology, Madras Institute of Technology, Anna University, Chennai from July-2013.

Professor, Department of Computer Technology, Madras Institute of Technology, Anna University, Chennai from July-2013. Cellphone : 9841667886 e-mail ID : anandh@annauniv.edu Address : 4/360, TF/D, Block A, Sri Jayendra Colony, Kandan Chavady, Chennai - 600 096 Present Position, Madras Institute of Technology, Anna University,

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

Screen Fingerprints: A Novel Modality for Active Authentication

Screen Fingerprints: A Novel Modality for Active Authentication Security: DArPA Screen Fingerprints: A Novel Modality for Active Authentication Vishal M. Patel, University of Maryland, College Park Tom Yeh, University of Colorado, Boulder Mohammed E. Fathy and Yangmuzi

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks

Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks Implementing Crytoptographic Technique in Cluster Based Environment for Secure Mobile Adhoc Networks Kiruba Priyadharshini.P 1, L.R.Priya 2, Dr.Ruba Soundar.K 3 1, 2, 3 Department of Communication Systems,

More information

Computer Vision Systems. Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune

Computer Vision Systems. Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune Improving Performance for Computer Vision Systems Dr. Aditya Abhyankar Dean, Faculty of Technology Professor, Department of Technology University of Pune, Pune Homography based Hybrid Mixture Model for

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Dr. G. Nagarajan B.E., M.Tech., Ph. D., MISTE, MIEEE PROFESSOR

Dr. G. Nagarajan B.E., M.Tech., Ph. D., MISTE, MIEEE PROFESSOR Dr. G. Nagarajan B.E., M.Tech., Ph. D., MISTE, MIEEE PROFESSOR Name & Designation: Dr.G.NAGARAJAN Professor / Dept. of ECE (Formerly HOD/ECE from Oct 2012 to Apr 2016) Pondicherry Engineering College Pondicherry-605

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

Paper publications: A.Y

Paper publications: A.Y Paper s: A.Y 2017-18 a. Faculty Name: Dr. Mrs. Neeta Deshpande 6. 7. Dr. Mrs. Neeta A. Deshapande C0 Classification over Encrepated rational Data Double Faced Data Hiding in images &^ Videos using RIT

More information

COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE

COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE Volume 7 No. 22 207, 7-75 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Level of Fusion

More information

Video De-interlacing with Scene Change Detection Based on 3D Wavelet Transform

Video De-interlacing with Scene Change Detection Based on 3D Wavelet Transform Video De-interlacing with Scene Change Detection Based on 3D Wavelet Transform M. Nancy Regina 1, S. Caroline 2 PG Scholar, ECE, St. Xavier s Catholic College of Engineering, Nagercoil, India 1 Assistant

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Digital Vision Face recognition

Digital Vision Face recognition Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication

More information

Dan Lobb CRISC Lisa Gable CISM Katie Friebus

Dan Lobb CRISC Lisa Gable CISM Katie Friebus Dan Lobb CRISC Lisa Gable CISM Katie Friebus AGENDA Meet the speakers Compliance between QSA visits - Dan Lobb Transitioning from PCI DSS 3.1-3.2 - Katie Friebus Tips for Managing a PCI Compliance Program

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

An Efficient Face Recognition under Varying Image Conditions

An Efficient Face Recognition under Varying Image Conditions An Efficient Face Recognition under Varying Image Conditions C.Kanimozhi,V.Nirmala Abstract Performance of the face verification system depends on many conditions. One of the most problematic is varying

More information

An Effective Approach in Face Recognition using Image Processing Concepts

An Effective Approach in Face Recognition using Image Processing Concepts An Effective Approach in Face Recognition using Image Processing Concepts K. Ganapathi Babu 1, M.A.Rama Prasad 2 1 Pursuing M.Tech in CSE at VLITS,Vadlamudi Guntur Dist., A.P., India 2 Asst.Prof, Department

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

I. INTRODUCTION. Figure-1 Basic block of text analysis

I. INTRODUCTION. Figure-1 Basic block of text analysis ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,

More information

Syllabus for Ph.D Entrance Test, RGPV. Common for CSE/IT/CA

Syllabus for Ph.D Entrance Test, RGPV. Common for CSE/IT/CA Syllabus for Ph.D Entrance Test, RGPV. Common for CSE/IT/CA Algorithms: Algorithms and complexity; Combinatorics and graph theory; Geometric Algorithms, Parallel and Distributed Algorithms, Randomized

More information

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer

More information

Faster, Better, and Cheaper? Building the SD-WAN Business Case

Faster, Better, and Cheaper? Building the SD-WAN Business Case Faster, Better, and Cheaper? Building the SD-WAN Business Case John Burke CIO & Principal Research Analyst Nemertes Research john@nemertes.com @burkejohne #FutureWAN Agenda ±About Nemertes ±The Current

More information

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE CLOUD COMPUTING WEB-SERVICES BASED DATABASE: SQL, MY-SQL, ORACLE JAVA - PROJECT TOPICS IEEE 2015 BASED 1 A Hybrid Cloud Approach for Secure Authorized Deduplication JCC1501 2 A Secure and Dynamic Multi-keyword

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen?

Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen? Neue Verfahren der Bildverarbeitung auch zur Erfassung von Schäden in Abwasserkanälen? Fraunhofer HHI 13.07.2017 1 Fraunhofer-Gesellschaft Fraunhofer is Europe s largest organization for applied research.

More information

Face Liveness Detection Using Euler Method Based On Diffusion Speed Calculation

Face Liveness Detection Using Euler Method Based On Diffusion Speed Calculation Face Liveness Detection Using Euler Method Based On Diffusion Speed Calculation 1 Ms. Nishigandha S. Bondare, 2 Mr. P.S.Mohod 1 M.Tech Student, Department of CSE, G.H.Raisoni College of Engineering, Nagpur,

More information

CS 525M Mobile and Ubiquitous Computing TagSense: A Smartphone based Approach to Automatic Image Tagging

CS 525M Mobile and Ubiquitous Computing TagSense: A Smartphone based Approach to Automatic Image Tagging CS 525M Mobile and Ubiquitous Computing TagSense: A Smartphone based Approach to Automatic Image Tagging Joseph True Computer Science Dept. Worcester Polytechnic Institute (WPI) Introduction/motivation:

More information

An Image based method for Rendering Overlay Text Detection and Extraction Using Transition Map and Inpaint

An Image based method for Rendering Overlay Text Detection and Extraction Using Transition Map and Inpaint An Image based method for Rendering Overlay Text Detection and Extraction Using Transition Map and Inpaint Mohamed Shajahan H College of Engineering and Information Technology University of Business and

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 5, Sep Oct 2017 RESEARCH ARTICLE OPEN ACCESS Iris and Palmprint Decision Fusion to Enhance Human Ali M Mayya [1], Mariam Saii [2] PhD student [1], Professor Assistance [2] Computer Engineering Tishreen University Syria

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information