2014 International Conference on Computer and Communications Technologies (ICCCT 2014) Hyderabad, India December 2014
|
|
- Albert Boyd
- 6 years ago
- Views:
Transcription
1 2014 International Conference on Computer and Communications Technologies (ICCCT 2014) Hyderabad, India December 2014 IEEE Catalog Number: ISBN: CFP1492Y-POD
2 TABLE OF CONTENTS HYBRID VIRTUAL NETWORK EMBEDDING WITH K-CORE DECOMPOSITION USING PATH SPLITTING... 1 Neha Mishra, C. P. Gupta SURFACE DEFECT CLASSIFICATION OF STEEL STRIP BASED ON MACHINE VISION... 7 Deepak Kumar Himmat Singhka, Nirbhar Neogi, Dusmanta Mohanta A NOVEL BINARY CONTENT ADDRESSABLE MEMORY DESIGN USING REVERSIBLE LOGIC S. Dinesh Kumar, S. K. Noor Mahammad EFFICIENT ARCHITECTURE AND IMPLEMENTATION OF PHY WLAN RECEIVER ON RECONFIGURABLE PLATFORMS D. Keerthi Priya, M. Vani Devi REAL TIME SIMULATION SYSTEM FOR AEROSPACE INTERCEPTORS M. V. K. S. Prasad, Amrita Singh, M. Gangadhar, L. Sobhan Kumar A LIMELIGHT ON ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS WITH NODE MOBILITY M. V. Ramana Rao, T. Adilakshmi R&D PLAN-INFORMATICS IN THE ERA OF BIG DATA K. Shreedhar, Devi Prasad Bhukya, Shubham Hariom AN APPROACH FOR OPTIMIZATION OF RESOURCE MANAGEMENT IN HADOOP R. Sandeep Raj, G. Prabhakar Raju LOAD BALANCED FUZZY CONTROL BASED ADAPTIVE GATEWAY DISCOVERY IN INTEGRATED INTERNET MANET Rafi U. Zaman, Khaleel Ur Rahman Khan, A. Venugopal Reddy DIAGNOSIS OF HEART DISEASE PATIENTS USING FUZZY CLASSIFICATION TECHNIQUE V. Krishnaiah, M. Srinivas, G. Narsimha, N. Subhash Chandra A COMBINED PTS & SLM APPROACH WITH DUMMY SIGNAL INSERTION FOR PAPR REDUCTION IN OFDM SYSTEMS Thota Sravanti, N. Vasantha ENERGY EFFICIENT HYBRID CLUSTERING PROTOCOL FOR MULTILEVEL HETEROGENEOUS WIRELESS SENSOR NETWORK R. K. Yadav, Varun Kumar, Rahul Kumar MOMENT PRESERVING TECHNIQUE FOR COLOR FEATURE EXTRACTION IN CONTENT BASED IMAGE RETRIEVAL Vinayak Gajanan Kottawar, A. M. Rajurkar COMPUTATIONAL APPROACH TO IDENTIFY THE ACID RAIN PATTERNS BY ADOPTING SATELLITE IMAGERY & DATA MINING TECHNIQUE Naveen Dondapati, Buddha Reddy Polepelli, Imtiyaz Ahmed, Chandrakanth Mathsa TRANSLATION APPROACHES IN CROSS LANGUAGE INFORMATION RETRIEVAL B. N. V. Narasimha Raju, M. S. V. S. Bhadri Raju, K. V. V. Satyanarayana SECURITY ASSESSMENT OF COMPUTER NETWORKS AN ETHICAL HACKER S PERSPECTIVE Gatta Sambasiva Rao, P. Naveen Kumar, P. Swetha, G. Bhanukiran AN EMPIRICAL EXPERIMENTAL EVALUATION ON IMBALANCED DATA SETS WITH VARIED IMBALANCE RATIO Mohammad Imran, Ali Mirza Mahmood, Ahmed Abdul Moiz Qyser AUTOMATED UPDATES MAILING SYSTEM FOR AN ORGANIZATION:USING NAMED- ENTITY RECOGNITION AND TREE BASED INDEXING DATABASE Sreenivasulu Sadineni, Bindhu Madhavi Kilaru, Eshwar Aluguri IDENTIFICATION AND CLASSIFICATION OF EMERGING GENRES IN WEBPAGES K. Pranitha Kumari, A. Venugopal Reddy SECURITY ANALYSIS OF 'A NOVEL COPYRIGHT PROTECTION SCHEME USING VISUAL CRYPTOGRAPHY' B. Surekha, P. Ravi Babu, G. N. Swamy A SINGLE SIGN ON BASED SECURE REMOTE USER AUTHENTICATION SCHEME FOR MULTI-SERVER ENVIRONMENTS Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj
3 DNA FOR INFORMATION SECURITY: A SURVEY ON DNA COMPUTING AND A PSEUDO DNA METHOD BASED ON CENTRAL DOGMA OF MOLECULAR BIOLOGY C. S. Sreeja, Mohammed Misbahuddin, N. P. Mohammed Hashim SECURING INFORMATION BY PERFORMING FORENSIC AND NETWORK ANALYSIS ON HOSTED VIRTUALIZATION Nenavath Srinivas Naik, Kethavath Prem Kumar, D. Vasumathi EFFECTS OF CHANNEL CONDITIONS ON THE PERFORMANCE OF ASR OVER GSM NETWORKS USING FULL RATE SPEECH CODEC M. Ram Reddy, S. Alivelu Mangamma, P. Laxminarayana, A. V. Ramana, P. Gangadhar CONFORMAL FINITE DIFFERENCE TIME DOMAIN TECHNIQUE USING EFFICIENT OVERLAPPING GRID METHOD TO ANALYZE CURVED STRUCTURES N. K. Murthy, Thogaru Abhishek Reddy, Chandra Sekhar Paidimarry PERFORMANCE ANALYSIS OF DIFFERENT SOFTWARE RELIABILITY PREDICTION METHODS Syed Mohsin Saif, Mudasir M. Kirmani, Abdul Wahid EARLY DETECTION OF ISCHEMIA FROM ECG BY WAVELET ANALYSIS N. Vasudha, N. Sundararajan COMPARISON OF THE SCOPE OF NEGATION IN ONLINE NEWS ARTICLES S. Padmaja, S. Sameen Fatima, Sasidhar Bandu, B. Sowmya DESIGN AND IMPLEMENTATION OF AREA AND DELAY OPTIMIZED CARRY TREE ADDERS USING FPGA Kartheek Boddireddy, Boya Pradeep Kumar, Chandra Sekhar Paidimarry RELIABLE NODE BASED ROUTING FOR EFFICIENT THROUGHPUT IN MOBILE ADHOC NETWORK T. Shekar Reddy, Y. Rama Devi COMPARISON BETWEEN FILE CARVING FROM DISK DRIVE AND DISK IMAGE IN OPEN SOURCE ENVIRONMENT Abdullah Aljumah, Mohammad Yousuf Uddin, Mohammad Gulam Ahamad BYTE ROTATION ENCRYPTION ALGORITHM THROUGH PARALLEL PROCESSING AND MULTI-CORE UTILIZATION G. Thirumaleswari, Ch. Suneetha, G. Chaitanya Bharathi COOPERATIVE SENSING THROUGHPUT ANALYSIS OVER FADING CHANNELS BASED ON HARD DECISION Sesham Srinu, Amit Kumar Mishra, Shiba Farooq NOVEL CRYPTOGRAPHIC ALGORITHM BASED FUSION OF MULITMODAL BIOMETRICS AUTHENTICATION SYSTEM Ujwalla Gawande, Kamal O. Hajari, Yogesh G. Golhar A MODEL FOR TRUST ENHANCEMENT IN CLOUD COMPUTING B. K. S. P. Kumar Raju, G. Geethakumari ANALYSIS OF VARIOUS RF-INTERFERENCE EFFECTS IN GPS L1 C/A CODE RECEIVER IN TRACKING MODE Rondla Prasad, G. Shanmukh, Rajesh Karvande MOBILE APPLICATION TESTING ON SMART DEVICES USING MTAAS FRAMEWORK IN CLOUD A. Malini, N. Venkatesh, K. Sundarakantham, S. Mercyshalinie HIGH DIMENSIONAL DATASETS USING HADOOP MAHOUT MACHINE LEARNING ALGORITHMS Asadi Srinivasulua, Ch. D. V. Subbaraob, Y. Jeevan Kumar PERFORMANCE ANALYSIS OF CSA USING BEC AND FZF LOGIC WITH OPTIMIZED FULL ADDER CELL Shivendra Pandey, Afshan Khan, Jyotirmoy Pathak, Rajkumar Sarma INVERSE RATE MONOTONIC TECHNIQUE FOR REDUCED ENERGY CONSUMPTION OF WEAKLY HARD REAL TIME SYSTEMS Smriti Agrawal, Ankita Jain, Isha Wali, Talwinder Kaur PORTING AND SYSTEMATIC TESTING OF AN EMBEDDED RTOS - PORTING MICROC/OS- II TO A POWERPC BASED AVIONICS PLATFORM Anil K. Vishwakarma, K. V. Suresh, U. K. Singh COMBINED CENSORING AND WEIGHTED FUSION BASED SPECTRUM SENSING WITH IMPROVED ENERGY DETECTOR Srinivas Nallagonda, Mahendar Gajula, Sanjay Dhar Roy, Sumit Kundu
4 CYBER SECURITY: THE STATE OF THE PRACTICE IN PUBLIC SECTOR COMPANIES IN INDIA T. R. Srinivas, G. Vivek MULTI LEVEL HUFFMAN TEST DATA COMPRESSION WITH MULTIPLE SCAN CHAIN METHOD Srikanth Immareddy, Sravan Kumar Talusani A NOVEL APPROACH TO IDENTIFY UNOBVIOUS ENTITIES FROM REAL TIME AND OFFLINE VIDEO STREAMING Nitin V. Pujari, Manu Kothari PERSONALIZED COLLABORATIVE FILTERING RECOMMENDER SYSTEM USING DOMAIN KNOWLEDGE M. Venu Gopalachari, P. Sammulal REDUCTION OF THE ORDER OF ANTI-ALIASING FILTERS IN EMBEDDED AVIONICS DATA ACQUISITION J. V. Satyanarayana, A. G. Ramakrishnan CONTEXT BASED BEHAVIOURAL VERIFICATION OF COMPOSED WEB SERVICES MODELED IN FINITE STATE MACHINES Deepak Chenthati, Avula Damodaram, Hrushikesha Mohanty DESIGN AND IMPLEMENTATION OF INTELLIGENT EMPLOYEE AUTHENTICATION SYSTEM[IEAS] G. Prabhakara Rao, Suresh Chandra Patidar, P. Balaji, P. Arumugam, S. A. V. Satyamurty ENHANCED TEST CASE DESIGN MECHANISM FOR REGRESSION & IMPACT TESTING Himanshu Joshi, Hearsh Varma, Ravi Teja Surapaneni WIRELESS DATA ACQUISITION SYSTEM FOR VITAL SIGN MONITORING OF NEONATES O. M. Sumathi, Mudigonda Malini, Tula Vikram COMPARATIVE APPROACH FOR RANGE ENHANCING ENERGY HARVESTER (REACH) MOTE PASSIVE WAKE-UP RADIOS FOR WIRELESS NETWORKS N. Shyam Sunder Sagar, P. Chandrasekar Reddy DISTRIBUTED REAL TIME MODELLING OF AN AEROSPACE VEHICLE B. Srinivasa Rao, S. K. Satnami, M. V. K. S. Prasad, D. V. V. S. Narayana CACHE BASED EVALUATION OF ICEBERG QUERIES Vuppu. Shankar, C. V. Guru Rao MINING VRSEC STUDENT LEARNING BEHAVIOUR IN MOODLE SYSTEM USING DATAMINING TECHNIQUES Suneetha Manne, Mounika Kakarla, Sandeep Yelisetti, Sameen Fatima SCALABLE LOAD BALANCING USING VIRTUALIZATION BASED ON APPROXIMATION Mohammed A. Saifullah, M. A. Maluk Mohammed RARE ASSOCIATION RULE MINING FOR DATA STREAM Sunitha Vanamala, L. Padma Sree DETECTION OF DISTORTED 2-D IRIS DATA USING MULTI-LAYERED COUNTER PROPAGATION NEURAL NETWORK Swati Pandey, Rajeev Gupta WEIGHTED RANKED QUERIES FOR SECURE SEARCH IN COST- EFFECTIVE CLOUDS V. Anand, Ahmed Abdul Moiz Qyser MINING OF NEGATIVE ASSOCIATION RULES USING IMPROVED FREQUENT PATTERN TREE E. Bala Krishna, B. Rama, A. Nagaraju USER WEB USAGE MINING FOR NAVIGATION IMPROVISATION USING SEMANTIC RELATED FREQUENT PATTERNS N. P. Jilhedar, S. K. Shirgave AUTOMATIC SEMANTIC CLASSIFICATION AND CATEGORIZATION OF WEB SERVICES IN DIGITAL ENVIRONMENT V. V. Sawant, V. R. Ghorpade EXTRACTION OF HIGH UTILITY RARE ITEMSETS FROM TRANSACTIONAL DATABASES S. A. R. Niha, Uma N. Dulhare GPU IMPLEMENTATION OF BELIEF PROPAGATION METHOD FOR IMAGE RESTORATION USING OPENCL P. Ravibabu, K. Srinivasa Rao, Mallesham Dasari EUTROPHICATION ASSESSMENT OF A SHALLOW LAKE USING GIS G. Shiva Kumar, P. Rajasekhar, P. Lakshmi Sruthi, Feza Karaer
5 REAL-TIME EMBEDDED SOFTWARE DESIGN FOR ONBOARD COMPUTER OF ANTI- BALLISTIC MISSILE SYSTEM Hemant Kumar Rathore, Mahender Katukuri, D. L. Seshagiri Rao, B. H. V. S. Narayana Murthy THE LIFE OF QUANTUM CRYPTOGRAPHY IN VIEW OF AN NUCLEAR WEAPON USED IN A REGION B. Sujatha, G. Srinivasa Rao, S. Nagaprasad Author Index
MAGADH UNIVERSITY, BODH GAYA A. N. COLLEGE, PATNA DEPARTMENT OF BUSINESS ADMINISTRATION (mba) Electoral Roll for election of Students' Union- 2018
1 Name : Manish Pathak Krishn Chandra Path Roll : 01 21/06/1996 2 Name : Roll : Shruti Shreya Yugal Kishore Pd Sinha 02-06-1995 7 Name : Deepak Kumar. Manoj Kumar Roll : 07 17/07/1994 8 Name : Roll : Sneha
More informationNPTEL Online Courses(NOC) Certified List Period: Jan-Apr 2016, Academic Year :
NPTEL Online Courses(NOC) Certified List Period: Jan-Apr 2016, Academic Year :2015-16 S.No Name Email Id Course Name 1 A.SRAVANI sravani.a25@gmail.com Design and Analysis of Algorithms 2 CH VENKATA LAKSHMI
More informationTS EAMCET - III Category wise Toppers in Medical & Medical Mobile : Mobile : Mobile :
Category BC-A Hall Ticket No. 97801359 MITTAPALLY ALEKYA M KRISHNA RAO Rank 7 2-9 MAINROAD MARLAPADU,VEMSUR KHAMMAM Pin 507164 95.31 Mobile 7799277489 150 Hall Ticket No. 99707091 Rank SHIVANI BOGIMI SHYAM
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationCSE News Bulletin Department of Computer Science & Engineering Ibrahimbagh
Vasavi College Of Engineering (Autonomous) CSE News Bulletin Department of Computer Science & Engineering Ibrahimbagh -500031 Inside This Issue 1. Professional Bodies 2. Achievements Student IE Chapter
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationIntroduction to SPCOM Group (Signal Processing, Communication & IIT Kanpur. Abhishek Gupta, EE
Introduction to SPCOM Group (Signal Processing, Communication & Networks) @ IIT Kanpur Abhishek Gupta, EE SPCOM Research Areas NET Comm. Networks Optical Networks Signal Proc. in Networks Network Localization
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationEnhancing Fine Grained Technique for Maintaining Data Privacy
10, Issue 1 (2018) 1-6 Journal of Advanced Research in Computing and Applications Journal homepage: www.akademiabaru.com/arca.html ISSN: 2462-1927 Enhancing Fine Grained Technique for Maintaining Data
More informationDistributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud
Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many
More informationPRA - EXAMINATION Held in the month of May-2015 Result
Page 1 of 7 GTotal % 1 SANGITA KUMARI 16201210401 131520100004 46 36 52 45 79 258 -- Fail 2 RAJESH PRIYEDARSI 16201310179 141340100022 47 62 74 54 84 321 64.20 Ist Div 3 SURAJ KUMAR JHA 16201310209 141370100002
More informationIndian Silicon Technologies 2013
SI.No Topics IEEE YEAR 1. An RFID Based Solution for Real-Time Patient Surveillance and data Processing Bio- Metric System using FPGA 2. Real-time Binary Shape Matching System Based on FPGA 3. An Optimized
More informationABSTRACT I. INTRODUCTION II. METHODS AND MATERIAL
2016 IJSRST Volume 2 Issue 4 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology A Paper on Multisite Framework for Web page Recommendation Using Incremental Mining Mr.
More informationEradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data
Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using
More informationA THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONSAND ROBOTICS ISSN 2320-7345 A THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES 1 Neha, 2 Anil Saroliya, 3 Varun Sharma 1,
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationFrequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management
Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Kranti Patil 1, Jayashree Fegade 2, Diksha Chiramade 3, Srujan Patil 4, Pradnya A. Vikhar 5 1,2,3,4,5 KCES
More informationA Survey on Fusion Techniques for Multimodal Biometric Identification
A Survey on Fusion Techniques for Multimodal Biometric Identification S.R.Soruba Sree 1, Dr. N.Radha 2 Research Scholar, Department of Computer Science, P.S.G.R. Krishnammal College for Women, Coimbatore,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Discovery
More informationFurther Details Contact: A. Vinay , , #301, 303 & 304,3rdFloor, AVR Buildings, Opp to SV Music College, Balaji
S.No TITLES DOMAIN DIGITAL 1 Image Haze Removal via Reference Retrieval and Scene Prior 2 Segmentation of Optic Disc from Fundus images 3 Active Contour Segmentation of Polyps in Capsule Endoscopic Images
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN
1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique
More informationISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationAnalysis of Extended Performance for clustering of Satellite Images Using Bigdata Platform Spark
Analysis of Extended Performance for clustering of Satellite Images Using Bigdata Platform Spark PL.Marichamy 1, M.Phil Research Scholar, Department of Computer Application, Alagappa University, Karaikudi,
More informationSaint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.
Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor
More informationWebpage: Volume 3, Issue VII, July 2015 ISSN
Independent Component Analysis (ICA) Based Face Recognition System S.Narmatha 1, K.Mahesh 2 1 Research Scholar, 2 Associate Professor 1,2 Department of Computer Science and Engineering, Alagappa University,
More informationALLOTMENT OF TOPICS FOR TERM PAPER WRITING
Course: BCA ALLOTMENT OF TOPICS FOR TERM PAPER WRITING Appendix A Year: 2 nd Group: BCA-41 Semester: 4 th S. No. 1 2 3 4 5 6 7 8 9 10 11 University Roll No. 16065106001 16065106002 Name of Students Aayushi
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationIGNOU REGIONAL CENTRE-ALIGARH APPROVAL STATUS OF BCA/MCA SYNOPSIS
IGNOU REGIONAL CENTRE-ALIGARH APPROVAL STATUS OF BCA/MCA SYNOPSIS BCA SYNOPSIS (CS76) STATUS S.N. ENROLL. PROG. NAME SC TITLE OF THE PROJECT Approval Status 1 111413805 BCA AMIR KHAN 2713 BANKING Not 2
More informationInternational Journal of Advance Engineering and Research Development. Survey of Web Usage Mining Techniques for Web-based Recommendations
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Survey
More informationDevelopment of an Hybrid Adaptive Neuro Fuzzy Controller for Surface Roughness (SR) prediction of Mild Steel during Turning
Development of an Hybrid Adaptive Neuro Fuzzy Controller for Surface Roughness () prediction of Mild Steel during Turning ABSTRACT Ashwani Kharola Institute of Technology Management (ITM) Defence Research
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationHybrid Face Recognition and Classification System for Real Time Environment
Hybrid Face Recognition and Classification System for Real Time Environment Dr.Matheel E. Abdulmunem Department of Computer Science University of Technology, Baghdad, Iraq. Fatima B. Ibrahim Department
More information2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme
2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat
More informationECS289: Scalable Machine Learning
ECS289: Scalable Machine Learning Cho-Jui Hsieh UC Davis Sept 22, 2016 Course Information Website: http://www.stat.ucdavis.edu/~chohsieh/teaching/ ECS289G_Fall2016/main.html My office: Mathematical Sciences
More informationCATEGORIZATION OF THE DOCUMENTS BY USING MACHINE LEARNING
CATEGORIZATION OF THE DOCUMENTS BY USING MACHINE LEARNING Amol Jagtap ME Computer Engineering, AISSMS COE Pune, India Email: 1 amol.jagtap55@gmail.com Abstract Machine learning is a scientific discipline
More informationPerformance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs
Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Nafiza Mann Department of Computer Science and Engineering RIMT-IET, Mandi-Gobindgarh, Punjab, India Abhilash Sharma Department
More informationVolume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article
More informationEmbedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationIEEE Project Titles
www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud
More informationCyber-Physical Chain (CPChain) Light Paper
Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain
More informationCODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities
Sensor networks CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities New class of devices having the potential to revolutionize the capture, processing and communication of critical
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationTHE ENGLISH AND FOREIGN LANGUAGES UNIVERSITY HYDERABAD
EFLU/CoE/BAS/2017 19 May 2017 The following B.A (Hons.) in Spanish students of the Semester IV (2015 batch) are promoted/provisionally promoted to Semester V on the basis of examinations conducted in April
More informationSkew angle Detection and correction using Radon Transform
Skew Angle Detection and Correction using Radon Transform 1 Jinal Patel 1, Anup Shah 2, Dr. Hetal Patel 3 1 P.G. Student, Electronics & Communication Engineering Dept., ADIT, New Vallabh Vidyanagar-388121,
More informationOptimization using Ant Colony Algorithm
Optimization using Ant Colony Algorithm Er. Priya Batta 1, Er. Geetika Sharmai 2, Er. Deepshikha 3 1Faculty, Department of Computer Science, Chandigarh University,Gharaun,Mohali,Punjab 2Faculty, Department
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationIEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic
3118 IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic J.Jaslin deva gifty Department of ECE, Dr. Mahalingam College
More informationSocial Behavior Prediction Through Reality Mining
Social Behavior Prediction Through Reality Mining Charlie Dagli, William Campbell, Clifford Weinstein Human Language Technology Group MIT Lincoln Laboratory This work was sponsored by the DDR&E / RRTO
More informationtransactions-audio-speech- and-language- processing/ieeeacm web/tcbb pl/recentissue.jsp?
CÍM ISSN WEBOLDAL GYAKORISÁG https://www.computer.org/ Computer (New York) 1558-0814 portal/web/computingnow/ computer Monthly https://signalprocessingso ciety.org/publicationsresources/ieeeacm- IEEE -
More informationANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY
ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY A. Veeramuthu Department of Information Technology, Sathyabama University, Chennai India E-Mail: aveeramuthu@gmail.com ABSTRACT Generally,
More informationTable Of Contents: xix Foreword to Second Edition
Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data
More informationKUVEMPU UNIVERSITY, SHIVAMOGGA
Page No. : 1 / 10 1 DS170001 Student Name : PRAKASH G MADIVAL Father's Name : GANGADHAR BALINDR [KAN] ENG PHY MAT CHM ES I KAN ENG PHY MAT CHM IC 2 DS170002 Student Name : BANUPRIYA N B Father's Name :
More informationYMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD
YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD DEPARTMENT OF COMPUTER ENGINEERING List of Ph.D. Students Enrolled in the University for the year: - 2010-2011 S. No. Name of the student Title/ Topic
More informationA Survey on Security in Palmprint Recognition: A Biometric Trait
A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationA Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid
A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication
More informationProposal for Scrambled Method based on NTRU
Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,
More informationFingerprint Identification System Based On Neural Network
Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationA STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES
A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationAssociate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Scheduling
More informationMODAInnovations Complete Academic Project Solutions
MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In
More informationPerformance Analysis of Data Mining Classification Techniques
Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal
More informationBMS INSTITUTE OF TECHNOLOGY AND MANAGEMENT Yelahanka,Bangalore-64 DEPARTMENT OF TELECOMMUNICATION ENGINEERING
Open day Project exhibition report: Date: 16.5.2017 The project exhibition of final year Telecommunication engineering and projects based on project based learning (PBL) of 2 nd, 4 th and 6 th semester
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationINTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH
INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH VIKAS SANNADY 1, POONAM GUPTA 2 1Asst.Professor, Department of Computer Science, GTBCPTE, Bilaspur, chhattisgarh, India 2Asst.Professor,
More informationTechnologies from A to Z, What would YOU like to SEE?
A Access Control & Physical Security Accreditation/Certification Acoustics Acquisition Management Aeronautical Engineering Aerospace Repair Equipment Air Traffic Control Airborne C2 Systems Amplifiers
More informationExamining Routing Methods and the Role of Neural Network in Wireless Sensor Networks.
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. III (Jul.-Aug. 2016), PP 95-101 www.iosrjournals.org Examining Routing Methods and the Role
More informationCOMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai
COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.
More informationLight Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 84-91 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Light Weight Cellular Automata Computations
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationElysium Technologies Private Limited::IEEE Final year Project
Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible
More informationAn Improved Document Clustering Approach Using Weighted K-Means Algorithm
An Improved Document Clustering Approach Using Weighted K-Means Algorithm 1 Megha Mandloi; 2 Abhay Kothari 1 Computer Science, AITR, Indore, M.P. Pin 453771, India 2 Computer Science, AITR, Indore, M.P.
More informationFaculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)
Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationIBBI/IPA-001/IP- P00915/ /11521 DATED:
LIST OF INSOLVENCY PROFESSIONALS (IP) EMPANELLED BY CANARA BANK SL. NO. NAME OF IP AND CONTACT DETAILS IBBI REGN LOCATION 1 BHAVI SHREYANS SHAH Email Id: ca.bhavishah@gmail.com Mob: 09099923833 P00915/2017-2018/11521
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DESIGN AND ANALYSIS OF LOAD BALANCING IN WSN USING CLUSTER BASED APPROACH: A SURVEY
More informationIteration Reduction K Means Clustering Algorithm
Iteration Reduction K Means Clustering Algorithm Kedar Sawant 1 and Snehal Bhogan 2 1 Department of Computer Engineering, Agnel Institute of Technology and Design, Assagao, Goa 403507, India 2 Department
More information(SCHEME OF EXAMINATIONS)
RESULT Prepared Date: 09/07/2018 Declared Date:09/07/2018 Page No.: 0001 (SCHEME OF EXAMINATIONS) Scheme of Programme Code: 128 Programme Name: BACHELOR OF TECHNOLOGY (ELECTRONICS AND COMMUNICATIONS ENGINEERING)
More informationName: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems
Name: Prof. Dr. Iftikhar Hussain Designation: Vice Chancellor Department: Industrial Engineering Specialization: Flexible Manufacturing Systems Email: iftikhar@uetpeshawar.edu.pk Area of Interest: Design,
More informationOptimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem To cite this article:
More informationCURVELET Based IMAGE DENOISING
CURVELET Based IMAGE DENOISING SREELEKSHMI A.N AND SREELEKSHMI M.S AMRITA VISWA VIDYAPEETHAM, AMRITA UNIVERSITY,ETTIMADAI sree.an1989@gmail.com Abstract In the proposed method second generation curvelet
More informationDesign of 2-D DWT VLSI Architecture for Image Processing
Design of 2-D DWT VLSI Architecture for Image Processing Betsy Jose 1 1 ME VLSI Design student Sri Ramakrishna Engineering College, Coimbatore B. Sathish Kumar 2 2 Assistant Professor, ECE Sri Ramakrishna
More informationCONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationA FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING
A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant
More informationComparative Study of Isomorphism Detection of Kinematic Chains
Comparative Study of Isomorphism Detection of Kinematic Chains Preetam Joshi 1, Vinayak Chimbre 2, Vinayak Kallannavar 3, Dr. Anil Shirahatti 4 1, 2 Students, Jain College of Engineering, Belagavi 3 Assistant
More informationAN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE
AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3
More informationA WAVELET BASED BIOMEDICAL IMAGE COMPRESSION WITH ROI CODING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.407
More information