2014 International Conference on Computer and Communications Technologies (ICCCT 2014) Hyderabad, India December 2014

Size: px
Start display at page:

Download "2014 International Conference on Computer and Communications Technologies (ICCCT 2014) Hyderabad, India December 2014"

Transcription

1 2014 International Conference on Computer and Communications Technologies (ICCCT 2014) Hyderabad, India December 2014 IEEE Catalog Number: ISBN: CFP1492Y-POD

2 TABLE OF CONTENTS HYBRID VIRTUAL NETWORK EMBEDDING WITH K-CORE DECOMPOSITION USING PATH SPLITTING... 1 Neha Mishra, C. P. Gupta SURFACE DEFECT CLASSIFICATION OF STEEL STRIP BASED ON MACHINE VISION... 7 Deepak Kumar Himmat Singhka, Nirbhar Neogi, Dusmanta Mohanta A NOVEL BINARY CONTENT ADDRESSABLE MEMORY DESIGN USING REVERSIBLE LOGIC S. Dinesh Kumar, S. K. Noor Mahammad EFFICIENT ARCHITECTURE AND IMPLEMENTATION OF PHY WLAN RECEIVER ON RECONFIGURABLE PLATFORMS D. Keerthi Priya, M. Vani Devi REAL TIME SIMULATION SYSTEM FOR AEROSPACE INTERCEPTORS M. V. K. S. Prasad, Amrita Singh, M. Gangadhar, L. Sobhan Kumar A LIMELIGHT ON ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS WITH NODE MOBILITY M. V. Ramana Rao, T. Adilakshmi R&D PLAN-INFORMATICS IN THE ERA OF BIG DATA K. Shreedhar, Devi Prasad Bhukya, Shubham Hariom AN APPROACH FOR OPTIMIZATION OF RESOURCE MANAGEMENT IN HADOOP R. Sandeep Raj, G. Prabhakar Raju LOAD BALANCED FUZZY CONTROL BASED ADAPTIVE GATEWAY DISCOVERY IN INTEGRATED INTERNET MANET Rafi U. Zaman, Khaleel Ur Rahman Khan, A. Venugopal Reddy DIAGNOSIS OF HEART DISEASE PATIENTS USING FUZZY CLASSIFICATION TECHNIQUE V. Krishnaiah, M. Srinivas, G. Narsimha, N. Subhash Chandra A COMBINED PTS & SLM APPROACH WITH DUMMY SIGNAL INSERTION FOR PAPR REDUCTION IN OFDM SYSTEMS Thota Sravanti, N. Vasantha ENERGY EFFICIENT HYBRID CLUSTERING PROTOCOL FOR MULTILEVEL HETEROGENEOUS WIRELESS SENSOR NETWORK R. K. Yadav, Varun Kumar, Rahul Kumar MOMENT PRESERVING TECHNIQUE FOR COLOR FEATURE EXTRACTION IN CONTENT BASED IMAGE RETRIEVAL Vinayak Gajanan Kottawar, A. M. Rajurkar COMPUTATIONAL APPROACH TO IDENTIFY THE ACID RAIN PATTERNS BY ADOPTING SATELLITE IMAGERY & DATA MINING TECHNIQUE Naveen Dondapati, Buddha Reddy Polepelli, Imtiyaz Ahmed, Chandrakanth Mathsa TRANSLATION APPROACHES IN CROSS LANGUAGE INFORMATION RETRIEVAL B. N. V. Narasimha Raju, M. S. V. S. Bhadri Raju, K. V. V. Satyanarayana SECURITY ASSESSMENT OF COMPUTER NETWORKS AN ETHICAL HACKER S PERSPECTIVE Gatta Sambasiva Rao, P. Naveen Kumar, P. Swetha, G. Bhanukiran AN EMPIRICAL EXPERIMENTAL EVALUATION ON IMBALANCED DATA SETS WITH VARIED IMBALANCE RATIO Mohammad Imran, Ali Mirza Mahmood, Ahmed Abdul Moiz Qyser AUTOMATED UPDATES MAILING SYSTEM FOR AN ORGANIZATION:USING NAMED- ENTITY RECOGNITION AND TREE BASED INDEXING DATABASE Sreenivasulu Sadineni, Bindhu Madhavi Kilaru, Eshwar Aluguri IDENTIFICATION AND CLASSIFICATION OF EMERGING GENRES IN WEBPAGES K. Pranitha Kumari, A. Venugopal Reddy SECURITY ANALYSIS OF 'A NOVEL COPYRIGHT PROTECTION SCHEME USING VISUAL CRYPTOGRAPHY' B. Surekha, P. Ravi Babu, G. N. Swamy A SINGLE SIGN ON BASED SECURE REMOTE USER AUTHENTICATION SCHEME FOR MULTI-SERVER ENVIRONMENTS Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj

3 DNA FOR INFORMATION SECURITY: A SURVEY ON DNA COMPUTING AND A PSEUDO DNA METHOD BASED ON CENTRAL DOGMA OF MOLECULAR BIOLOGY C. S. Sreeja, Mohammed Misbahuddin, N. P. Mohammed Hashim SECURING INFORMATION BY PERFORMING FORENSIC AND NETWORK ANALYSIS ON HOSTED VIRTUALIZATION Nenavath Srinivas Naik, Kethavath Prem Kumar, D. Vasumathi EFFECTS OF CHANNEL CONDITIONS ON THE PERFORMANCE OF ASR OVER GSM NETWORKS USING FULL RATE SPEECH CODEC M. Ram Reddy, S. Alivelu Mangamma, P. Laxminarayana, A. V. Ramana, P. Gangadhar CONFORMAL FINITE DIFFERENCE TIME DOMAIN TECHNIQUE USING EFFICIENT OVERLAPPING GRID METHOD TO ANALYZE CURVED STRUCTURES N. K. Murthy, Thogaru Abhishek Reddy, Chandra Sekhar Paidimarry PERFORMANCE ANALYSIS OF DIFFERENT SOFTWARE RELIABILITY PREDICTION METHODS Syed Mohsin Saif, Mudasir M. Kirmani, Abdul Wahid EARLY DETECTION OF ISCHEMIA FROM ECG BY WAVELET ANALYSIS N. Vasudha, N. Sundararajan COMPARISON OF THE SCOPE OF NEGATION IN ONLINE NEWS ARTICLES S. Padmaja, S. Sameen Fatima, Sasidhar Bandu, B. Sowmya DESIGN AND IMPLEMENTATION OF AREA AND DELAY OPTIMIZED CARRY TREE ADDERS USING FPGA Kartheek Boddireddy, Boya Pradeep Kumar, Chandra Sekhar Paidimarry RELIABLE NODE BASED ROUTING FOR EFFICIENT THROUGHPUT IN MOBILE ADHOC NETWORK T. Shekar Reddy, Y. Rama Devi COMPARISON BETWEEN FILE CARVING FROM DISK DRIVE AND DISK IMAGE IN OPEN SOURCE ENVIRONMENT Abdullah Aljumah, Mohammad Yousuf Uddin, Mohammad Gulam Ahamad BYTE ROTATION ENCRYPTION ALGORITHM THROUGH PARALLEL PROCESSING AND MULTI-CORE UTILIZATION G. Thirumaleswari, Ch. Suneetha, G. Chaitanya Bharathi COOPERATIVE SENSING THROUGHPUT ANALYSIS OVER FADING CHANNELS BASED ON HARD DECISION Sesham Srinu, Amit Kumar Mishra, Shiba Farooq NOVEL CRYPTOGRAPHIC ALGORITHM BASED FUSION OF MULITMODAL BIOMETRICS AUTHENTICATION SYSTEM Ujwalla Gawande, Kamal O. Hajari, Yogesh G. Golhar A MODEL FOR TRUST ENHANCEMENT IN CLOUD COMPUTING B. K. S. P. Kumar Raju, G. Geethakumari ANALYSIS OF VARIOUS RF-INTERFERENCE EFFECTS IN GPS L1 C/A CODE RECEIVER IN TRACKING MODE Rondla Prasad, G. Shanmukh, Rajesh Karvande MOBILE APPLICATION TESTING ON SMART DEVICES USING MTAAS FRAMEWORK IN CLOUD A. Malini, N. Venkatesh, K. Sundarakantham, S. Mercyshalinie HIGH DIMENSIONAL DATASETS USING HADOOP MAHOUT MACHINE LEARNING ALGORITHMS Asadi Srinivasulua, Ch. D. V. Subbaraob, Y. Jeevan Kumar PERFORMANCE ANALYSIS OF CSA USING BEC AND FZF LOGIC WITH OPTIMIZED FULL ADDER CELL Shivendra Pandey, Afshan Khan, Jyotirmoy Pathak, Rajkumar Sarma INVERSE RATE MONOTONIC TECHNIQUE FOR REDUCED ENERGY CONSUMPTION OF WEAKLY HARD REAL TIME SYSTEMS Smriti Agrawal, Ankita Jain, Isha Wali, Talwinder Kaur PORTING AND SYSTEMATIC TESTING OF AN EMBEDDED RTOS - PORTING MICROC/OS- II TO A POWERPC BASED AVIONICS PLATFORM Anil K. Vishwakarma, K. V. Suresh, U. K. Singh COMBINED CENSORING AND WEIGHTED FUSION BASED SPECTRUM SENSING WITH IMPROVED ENERGY DETECTOR Srinivas Nallagonda, Mahendar Gajula, Sanjay Dhar Roy, Sumit Kundu

4 CYBER SECURITY: THE STATE OF THE PRACTICE IN PUBLIC SECTOR COMPANIES IN INDIA T. R. Srinivas, G. Vivek MULTI LEVEL HUFFMAN TEST DATA COMPRESSION WITH MULTIPLE SCAN CHAIN METHOD Srikanth Immareddy, Sravan Kumar Talusani A NOVEL APPROACH TO IDENTIFY UNOBVIOUS ENTITIES FROM REAL TIME AND OFFLINE VIDEO STREAMING Nitin V. Pujari, Manu Kothari PERSONALIZED COLLABORATIVE FILTERING RECOMMENDER SYSTEM USING DOMAIN KNOWLEDGE M. Venu Gopalachari, P. Sammulal REDUCTION OF THE ORDER OF ANTI-ALIASING FILTERS IN EMBEDDED AVIONICS DATA ACQUISITION J. V. Satyanarayana, A. G. Ramakrishnan CONTEXT BASED BEHAVIOURAL VERIFICATION OF COMPOSED WEB SERVICES MODELED IN FINITE STATE MACHINES Deepak Chenthati, Avula Damodaram, Hrushikesha Mohanty DESIGN AND IMPLEMENTATION OF INTELLIGENT EMPLOYEE AUTHENTICATION SYSTEM[IEAS] G. Prabhakara Rao, Suresh Chandra Patidar, P. Balaji, P. Arumugam, S. A. V. Satyamurty ENHANCED TEST CASE DESIGN MECHANISM FOR REGRESSION & IMPACT TESTING Himanshu Joshi, Hearsh Varma, Ravi Teja Surapaneni WIRELESS DATA ACQUISITION SYSTEM FOR VITAL SIGN MONITORING OF NEONATES O. M. Sumathi, Mudigonda Malini, Tula Vikram COMPARATIVE APPROACH FOR RANGE ENHANCING ENERGY HARVESTER (REACH) MOTE PASSIVE WAKE-UP RADIOS FOR WIRELESS NETWORKS N. Shyam Sunder Sagar, P. Chandrasekar Reddy DISTRIBUTED REAL TIME MODELLING OF AN AEROSPACE VEHICLE B. Srinivasa Rao, S. K. Satnami, M. V. K. S. Prasad, D. V. V. S. Narayana CACHE BASED EVALUATION OF ICEBERG QUERIES Vuppu. Shankar, C. V. Guru Rao MINING VRSEC STUDENT LEARNING BEHAVIOUR IN MOODLE SYSTEM USING DATAMINING TECHNIQUES Suneetha Manne, Mounika Kakarla, Sandeep Yelisetti, Sameen Fatima SCALABLE LOAD BALANCING USING VIRTUALIZATION BASED ON APPROXIMATION Mohammed A. Saifullah, M. A. Maluk Mohammed RARE ASSOCIATION RULE MINING FOR DATA STREAM Sunitha Vanamala, L. Padma Sree DETECTION OF DISTORTED 2-D IRIS DATA USING MULTI-LAYERED COUNTER PROPAGATION NEURAL NETWORK Swati Pandey, Rajeev Gupta WEIGHTED RANKED QUERIES FOR SECURE SEARCH IN COST- EFFECTIVE CLOUDS V. Anand, Ahmed Abdul Moiz Qyser MINING OF NEGATIVE ASSOCIATION RULES USING IMPROVED FREQUENT PATTERN TREE E. Bala Krishna, B. Rama, A. Nagaraju USER WEB USAGE MINING FOR NAVIGATION IMPROVISATION USING SEMANTIC RELATED FREQUENT PATTERNS N. P. Jilhedar, S. K. Shirgave AUTOMATIC SEMANTIC CLASSIFICATION AND CATEGORIZATION OF WEB SERVICES IN DIGITAL ENVIRONMENT V. V. Sawant, V. R. Ghorpade EXTRACTION OF HIGH UTILITY RARE ITEMSETS FROM TRANSACTIONAL DATABASES S. A. R. Niha, Uma N. Dulhare GPU IMPLEMENTATION OF BELIEF PROPAGATION METHOD FOR IMAGE RESTORATION USING OPENCL P. Ravibabu, K. Srinivasa Rao, Mallesham Dasari EUTROPHICATION ASSESSMENT OF A SHALLOW LAKE USING GIS G. Shiva Kumar, P. Rajasekhar, P. Lakshmi Sruthi, Feza Karaer

5 REAL-TIME EMBEDDED SOFTWARE DESIGN FOR ONBOARD COMPUTER OF ANTI- BALLISTIC MISSILE SYSTEM Hemant Kumar Rathore, Mahender Katukuri, D. L. Seshagiri Rao, B. H. V. S. Narayana Murthy THE LIFE OF QUANTUM CRYPTOGRAPHY IN VIEW OF AN NUCLEAR WEAPON USED IN A REGION B. Sujatha, G. Srinivasa Rao, S. Nagaprasad Author Index

MAGADH UNIVERSITY, BODH GAYA A. N. COLLEGE, PATNA DEPARTMENT OF BUSINESS ADMINISTRATION (mba) Electoral Roll for election of Students' Union- 2018

MAGADH UNIVERSITY, BODH GAYA A. N. COLLEGE, PATNA DEPARTMENT OF BUSINESS ADMINISTRATION (mba) Electoral Roll for election of Students' Union- 2018 1 Name : Manish Pathak Krishn Chandra Path Roll : 01 21/06/1996 2 Name : Roll : Shruti Shreya Yugal Kishore Pd Sinha 02-06-1995 7 Name : Deepak Kumar. Manoj Kumar Roll : 07 17/07/1994 8 Name : Roll : Sneha

More information

NPTEL Online Courses(NOC) Certified List Period: Jan-Apr 2016, Academic Year :

NPTEL Online Courses(NOC) Certified List Period: Jan-Apr 2016, Academic Year : NPTEL Online Courses(NOC) Certified List Period: Jan-Apr 2016, Academic Year :2015-16 S.No Name Email Id Course Name 1 A.SRAVANI sravani.a25@gmail.com Design and Analysis of Algorithms 2 CH VENKATA LAKSHMI

More information

TS EAMCET - III Category wise Toppers in Medical & Medical Mobile : Mobile : Mobile :

TS EAMCET - III Category wise Toppers in Medical & Medical Mobile : Mobile : Mobile : Category BC-A Hall Ticket No. 97801359 MITTAPALLY ALEKYA M KRISHNA RAO Rank 7 2-9 MAINROAD MARLAPADU,VEMSUR KHAMMAM Pin 507164 95.31 Mobile 7799277489 150 Hall Ticket No. 99707091 Rank SHIVANI BOGIMI SHYAM

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

CSE News Bulletin Department of Computer Science & Engineering Ibrahimbagh

CSE News Bulletin Department of Computer Science & Engineering Ibrahimbagh Vasavi College Of Engineering (Autonomous) CSE News Bulletin Department of Computer Science & Engineering Ibrahimbagh -500031 Inside This Issue 1. Professional Bodies 2. Achievements Student IE Chapter

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Introduction to SPCOM Group (Signal Processing, Communication & IIT Kanpur. Abhishek Gupta, EE

Introduction to SPCOM Group (Signal Processing, Communication & IIT Kanpur. Abhishek Gupta, EE Introduction to SPCOM Group (Signal Processing, Communication & Networks) @ IIT Kanpur Abhishek Gupta, EE SPCOM Research Areas NET Comm. Networks Optical Networks Signal Proc. in Networks Network Localization

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Enhancing Fine Grained Technique for Maintaining Data Privacy

Enhancing Fine Grained Technique for Maintaining Data Privacy 10, Issue 1 (2018) 1-6 Journal of Advanced Research in Computing and Applications Journal homepage: www.akademiabaru.com/arca.html ISSN: 2462-1927 Enhancing Fine Grained Technique for Maintaining Data

More information

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many

More information

PRA - EXAMINATION Held in the month of May-2015 Result

PRA - EXAMINATION Held in the month of May-2015 Result Page 1 of 7 GTotal % 1 SANGITA KUMARI 16201210401 131520100004 46 36 52 45 79 258 -- Fail 2 RAJESH PRIYEDARSI 16201310179 141340100022 47 62 74 54 84 321 64.20 Ist Div 3 SURAJ KUMAR JHA 16201310209 141370100002

More information

Indian Silicon Technologies 2013

Indian Silicon Technologies 2013 SI.No Topics IEEE YEAR 1. An RFID Based Solution for Real-Time Patient Surveillance and data Processing Bio- Metric System using FPGA 2. Real-time Binary Shape Matching System Based on FPGA 3. An Optimized

More information

ABSTRACT I. INTRODUCTION II. METHODS AND MATERIAL

ABSTRACT I. INTRODUCTION II. METHODS AND MATERIAL 2016 IJSRST Volume 2 Issue 4 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology A Paper on Multisite Framework for Web page Recommendation Using Incremental Mining Mr.

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

A THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES

A THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONSAND ROBOTICS ISSN 2320-7345 A THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES 1 Neha, 2 Anil Saroliya, 3 Varun Sharma 1,

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management

Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Kranti Patil 1, Jayashree Fegade 2, Diksha Chiramade 3, Srujan Patil 4, Pradnya A. Vikhar 5 1,2,3,4,5 KCES

More information

A Survey on Fusion Techniques for Multimodal Biometric Identification

A Survey on Fusion Techniques for Multimodal Biometric Identification A Survey on Fusion Techniques for Multimodal Biometric Identification S.R.Soruba Sree 1, Dr. N.Radha 2 Research Scholar, Department of Computer Science, P.S.G.R. Krishnammal College for Women, Coimbatore,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Discovery

More information

Further Details Contact: A. Vinay , , #301, 303 & 304,3rdFloor, AVR Buildings, Opp to SV Music College, Balaji

Further Details Contact: A. Vinay , , #301, 303 & 304,3rdFloor, AVR Buildings, Opp to SV Music College, Balaji S.No TITLES DOMAIN DIGITAL 1 Image Haze Removal via Reference Retrieval and Scene Prior 2 Segmentation of Optic Disc from Fundus images 3 Active Contour Segmentation of Polyps in Capsule Endoscopic Images

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Analysis of Extended Performance for clustering of Satellite Images Using Bigdata Platform Spark

Analysis of Extended Performance for clustering of Satellite Images Using Bigdata Platform Spark Analysis of Extended Performance for clustering of Satellite Images Using Bigdata Platform Spark PL.Marichamy 1, M.Phil Research Scholar, Department of Computer Application, Alagappa University, Karaikudi,

More information

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Saint Petersburg Electrotechnical University LETI (ETU LETI) , Saint Petersburg, Russian FederationProfessoraPopova str. Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor

More information

Webpage: Volume 3, Issue VII, July 2015 ISSN

Webpage:   Volume 3, Issue VII, July 2015 ISSN Independent Component Analysis (ICA) Based Face Recognition System S.Narmatha 1, K.Mahesh 2 1 Research Scholar, 2 Associate Professor 1,2 Department of Computer Science and Engineering, Alagappa University,

More information

ALLOTMENT OF TOPICS FOR TERM PAPER WRITING

ALLOTMENT OF TOPICS FOR TERM PAPER WRITING Course: BCA ALLOTMENT OF TOPICS FOR TERM PAPER WRITING Appendix A Year: 2 nd Group: BCA-41 Semester: 4 th S. No. 1 2 3 4 5 6 7 8 9 10 11 University Roll No. 16065106001 16065106002 Name of Students Aayushi

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

IGNOU REGIONAL CENTRE-ALIGARH APPROVAL STATUS OF BCA/MCA SYNOPSIS

IGNOU REGIONAL CENTRE-ALIGARH APPROVAL STATUS OF BCA/MCA SYNOPSIS IGNOU REGIONAL CENTRE-ALIGARH APPROVAL STATUS OF BCA/MCA SYNOPSIS BCA SYNOPSIS (CS76) STATUS S.N. ENROLL. PROG. NAME SC TITLE OF THE PROJECT Approval Status 1 111413805 BCA AMIR KHAN 2713 BANKING Not 2

More information

International Journal of Advance Engineering and Research Development. Survey of Web Usage Mining Techniques for Web-based Recommendations

International Journal of Advance Engineering and Research Development. Survey of Web Usage Mining Techniques for Web-based Recommendations Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Survey

More information

Development of an Hybrid Adaptive Neuro Fuzzy Controller for Surface Roughness (SR) prediction of Mild Steel during Turning

Development of an Hybrid Adaptive Neuro Fuzzy Controller for Surface Roughness (SR) prediction of Mild Steel during Turning Development of an Hybrid Adaptive Neuro Fuzzy Controller for Surface Roughness () prediction of Mild Steel during Turning ABSTRACT Ashwani Kharola Institute of Technology Management (ITM) Defence Research

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Hybrid Face Recognition and Classification System for Real Time Environment

Hybrid Face Recognition and Classification System for Real Time Environment Hybrid Face Recognition and Classification System for Real Time Environment Dr.Matheel E. Abdulmunem Department of Computer Science University of Technology, Baghdad, Iraq. Fatima B. Ibrahim Department

More information

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme 2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat

More information

ECS289: Scalable Machine Learning

ECS289: Scalable Machine Learning ECS289: Scalable Machine Learning Cho-Jui Hsieh UC Davis Sept 22, 2016 Course Information Website: http://www.stat.ucdavis.edu/~chohsieh/teaching/ ECS289G_Fall2016/main.html My office: Mathematical Sciences

More information

CATEGORIZATION OF THE DOCUMENTS BY USING MACHINE LEARNING

CATEGORIZATION OF THE DOCUMENTS BY USING MACHINE LEARNING CATEGORIZATION OF THE DOCUMENTS BY USING MACHINE LEARNING Amol Jagtap ME Computer Engineering, AISSMS COE Pune, India Email: 1 amol.jagtap55@gmail.com Abstract Machine learning is a scientific discipline

More information

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Nafiza Mann Department of Computer Science and Engineering RIMT-IET, Mandi-Gobindgarh, Punjab, India Abhilash Sharma Department

More information

Volume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies

Volume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

IEEE Project Titles

IEEE Project Titles www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities

CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities Sensor networks CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities New class of devices having the potential to revolutionize the capture, processing and communication of critical

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

THE ENGLISH AND FOREIGN LANGUAGES UNIVERSITY HYDERABAD

THE ENGLISH AND FOREIGN LANGUAGES UNIVERSITY HYDERABAD EFLU/CoE/BAS/2017 19 May 2017 The following B.A (Hons.) in Spanish students of the Semester IV (2015 batch) are promoted/provisionally promoted to Semester V on the basis of examinations conducted in April

More information

Skew angle Detection and correction using Radon Transform

Skew angle Detection and correction using Radon Transform Skew Angle Detection and Correction using Radon Transform 1 Jinal Patel 1, Anup Shah 2, Dr. Hetal Patel 3 1 P.G. Student, Electronics & Communication Engineering Dept., ADIT, New Vallabh Vidyanagar-388121,

More information

Optimization using Ant Colony Algorithm

Optimization using Ant Colony Algorithm Optimization using Ant Colony Algorithm Er. Priya Batta 1, Er. Geetika Sharmai 2, Er. Deepshikha 3 1Faculty, Department of Computer Science, Chandigarh University,Gharaun,Mohali,Punjab 2Faculty, Department

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic

IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic 3118 IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic J.Jaslin deva gifty Department of ECE, Dr. Mahalingam College

More information

Social Behavior Prediction Through Reality Mining

Social Behavior Prediction Through Reality Mining Social Behavior Prediction Through Reality Mining Charlie Dagli, William Campbell, Clifford Weinstein Human Language Technology Group MIT Lincoln Laboratory This work was sponsored by the DDR&E / RRTO

More information

transactions-audio-speech- and-language- processing/ieeeacm web/tcbb pl/recentissue.jsp?

transactions-audio-speech- and-language- processing/ieeeacm web/tcbb pl/recentissue.jsp? CÍM ISSN WEBOLDAL GYAKORISÁG https://www.computer.org/ Computer (New York) 1558-0814 portal/web/computingnow/ computer Monthly https://signalprocessingso ciety.org/publicationsresources/ieeeacm- IEEE -

More information

ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY

ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY A. Veeramuthu Department of Information Technology, Sathyabama University, Chennai India E-Mail: aveeramuthu@gmail.com ABSTRACT Generally,

More information

Table Of Contents: xix Foreword to Second Edition

Table Of Contents: xix Foreword to Second Edition Data Mining : Concepts and Techniques Table Of Contents: Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments xxxi About the Authors xxxv Chapter 1 Introduction 1 (38) 1.1 Why Data

More information

KUVEMPU UNIVERSITY, SHIVAMOGGA

KUVEMPU UNIVERSITY, SHIVAMOGGA Page No. : 1 / 10 1 DS170001 Student Name : PRAKASH G MADIVAL Father's Name : GANGADHAR BALINDR [KAN] ENG PHY MAT CHM ES I KAN ENG PHY MAT CHM IC 2 DS170002 Student Name : BANUPRIYA N B Father's Name :

More information

YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD

YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD DEPARTMENT OF COMPUTER ENGINEERING List of Ph.D. Students Enrolled in the University for the year: - 2010-2011 S. No. Name of the student Title/ Topic

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication

More information

Proposal for Scrambled Method based on NTRU

Proposal for Scrambled Method based on NTRU Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,

More information

Fingerprint Identification System Based On Neural Network

Fingerprint Identification System Based On Neural Network Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES

A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Associate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India

Associate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Scheduling

More information

MODAInnovations Complete Academic Project Solutions

MODAInnovations Complete Academic Project Solutions MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

BMS INSTITUTE OF TECHNOLOGY AND MANAGEMENT Yelahanka,Bangalore-64 DEPARTMENT OF TELECOMMUNICATION ENGINEERING

BMS INSTITUTE OF TECHNOLOGY AND MANAGEMENT Yelahanka,Bangalore-64 DEPARTMENT OF TELECOMMUNICATION ENGINEERING Open day Project exhibition report: Date: 16.5.2017 The project exhibition of final year Telecommunication engineering and projects based on project based learning (PBL) of 2 nd, 4 th and 6 th semester

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH VIKAS SANNADY 1, POONAM GUPTA 2 1Asst.Professor, Department of Computer Science, GTBCPTE, Bilaspur, chhattisgarh, India 2Asst.Professor,

More information

Technologies from A to Z, What would YOU like to SEE?

Technologies from A to Z, What would YOU like to SEE? A Access Control & Physical Security Accreditation/Certification Acoustics Acquisition Management Aeronautical Engineering Aerospace Repair Equipment Air Traffic Control Airborne C2 Systems Amplifiers

More information

Examining Routing Methods and the Role of Neural Network in Wireless Sensor Networks.

Examining Routing Methods and the Role of Neural Network in Wireless Sensor Networks. IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. III (Jul.-Aug. 2016), PP 95-101 www.iosrjournals.org Examining Routing Methods and the Role

More information

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai

COMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.

More information

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 84-91 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Light Weight Cellular Automata Computations

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

Elysium Technologies Private Limited::IEEE Final year Project

Elysium Technologies Private Limited::IEEE Final year Project Elysium Technologies Private Limited::IEEE Final year Project - o n t e n t s Data mining Transactions Rule Representation, Interchange, and Reasoning in Distributed, Heterogeneous Environments Defeasible

More information

An Improved Document Clustering Approach Using Weighted K-Means Algorithm

An Improved Document Clustering Approach Using Weighted K-Means Algorithm An Improved Document Clustering Approach Using Weighted K-Means Algorithm 1 Megha Mandloi; 2 Abhay Kothari 1 Computer Science, AITR, Indore, M.P. Pin 453771, India 2 Computer Science, AITR, Indore, M.P.

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

IBBI/IPA-001/IP- P00915/ /11521 DATED:

IBBI/IPA-001/IP- P00915/ /11521 DATED: LIST OF INSOLVENCY PROFESSIONALS (IP) EMPANELLED BY CANARA BANK SL. NO. NAME OF IP AND CONTACT DETAILS IBBI REGN LOCATION 1 BHAVI SHREYANS SHAH Email Id: ca.bhavishah@gmail.com Mob: 09099923833 P00915/2017-2018/11521

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DESIGN AND ANALYSIS OF LOAD BALANCING IN WSN USING CLUSTER BASED APPROACH: A SURVEY

More information

Iteration Reduction K Means Clustering Algorithm

Iteration Reduction K Means Clustering Algorithm Iteration Reduction K Means Clustering Algorithm Kedar Sawant 1 and Snehal Bhogan 2 1 Department of Computer Engineering, Agnel Institute of Technology and Design, Assagao, Goa 403507, India 2 Department

More information

(SCHEME OF EXAMINATIONS)

(SCHEME OF EXAMINATIONS) RESULT Prepared Date: 09/07/2018 Declared Date:09/07/2018 Page No.: 0001 (SCHEME OF EXAMINATIONS) Scheme of Programme Code: 128 Programme Name: BACHELOR OF TECHNOLOGY (ELECTRONICS AND COMMUNICATIONS ENGINEERING)

More information

Name: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems

Name: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems Name: Prof. Dr. Iftikhar Hussain Designation: Vice Chancellor Department: Industrial Engineering Specialization: Flexible Manufacturing Systems Email: iftikhar@uetpeshawar.edu.pk Area of Interest: Design,

More information

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem To cite this article:

More information

CURVELET Based IMAGE DENOISING

CURVELET Based IMAGE DENOISING CURVELET Based IMAGE DENOISING SREELEKSHMI A.N AND SREELEKSHMI M.S AMRITA VISWA VIDYAPEETHAM, AMRITA UNIVERSITY,ETTIMADAI sree.an1989@gmail.com Abstract In the proposed method second generation curvelet

More information

Design of 2-D DWT VLSI Architecture for Image Processing

Design of 2-D DWT VLSI Architecture for Image Processing Design of 2-D DWT VLSI Architecture for Image Processing Betsy Jose 1 1 ME VLSI Design student Sri Ramakrishna Engineering College, Coimbatore B. Sathish Kumar 2 2 Assistant Professor, ECE Sri Ramakrishna

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING

A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING 1 B.KARTHIKEYAN, 2 G.MANIKANDAN, 3 V.VAITHIYANATHAN 1 Assistant Professor, School of Computing, SASTRA University, TamilNadu, India. 2 Assistant

More information

Comparative Study of Isomorphism Detection of Kinematic Chains

Comparative Study of Isomorphism Detection of Kinematic Chains Comparative Study of Isomorphism Detection of Kinematic Chains Preetam Joshi 1, Vinayak Chimbre 2, Vinayak Kallannavar 3, Dr. Anil Shirahatti 4 1, 2 Students, Jain College of Engineering, Belagavi 3 Assistant

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

A WAVELET BASED BIOMEDICAL IMAGE COMPRESSION WITH ROI CODING

A WAVELET BASED BIOMEDICAL IMAGE COMPRESSION WITH ROI CODING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.407

More information