You are on page 1of 13

ARTCom 2012 Accepted Full Paper

Paper ID 12 13 15 16 27 29 30 Paper Title High-Throughput VLSI Architecture for FFT Computation Design of FIR filter Using 2 n +1 Modulo Adder with Enhanced Circular Carry Generation Unit Hybrid Covert Channel an Obliterate for Information Hiding New Bridgeless DCM Sepic PFC Rectifier With Low Conduction and Switching Losses Author S.Sreenath Kashyap Shaik Mohammed Naveed Rajeshwari Goudar, Pournima More C.Sreekala ,T.Senthil Kumar, T.Yamuna,

Cooperative Swarm based Evolutionary Approach to find Bighnaraj Naik, Sarita Mahapatra, optimal cluster centroids in Cluster Analysis Bharat Kumar Padhi Phase unwrapping for data estimation of Gaussian Minimum Shift Keying (GMSK) Modulated Signal BER Analysis of QPSK Modulation Techniques in a MIMO Rayleigh Fading Channel by Minimum Mean Square Error Equalization Pradeep Kumar Govindaiah , Sravani Pasupuleti Sabuj Sarkar, Mohammad Shaifur Rahman

31 39

A Novel FPGA based implementation for MIMO- OFDM Ipsit Dash System An efficient info-gain algorithm for finding frequent sequential traversal patterns from web logs based on dynamic weight constraint Vijay prakash ,Rahul Moriwal

51 53 56 58 63 67 68

Character identification for Number plate recognition T.Senthil Kumar , using Eigenfeature Regularisation and Extraction Method Dr.S.N.Sivanandam Highly Adaptive Fault Tolerant Multipath Routing (AFTMR) Protocol for MANET Multipath Global Rerouting For Fault Tolerant Overlay Network (FTON) In Labeled Optical Burst-Switching Content Based Image Retrieval Using Semi Supervised Biased Discriminant Algorithm K.VANAJA ,Dr. R. UMARANI Marimuthu.G, Karthik.S, Kaliaperumal.G D.Binu, Dr.P Malathi

Multiple Blur Images Restoration A Parallel Computing Sudha Tiwari, Naazish Rahim, Approach Sandeep Sahu Automatic Agricultural Leaves Recognition System Social Networks Analysis: Trends , Techniques And Future Prospects Meenakshi, Durga Puja , Mukesh Saraswat, K. V. Arya Pooja Wadhwa, Dr. M.P.S Bhatia

71 72 73 76 77

Extraction of pitch, duration and formant frequencies for A. A. Khulage, Prof. B. V. Pathak. emotion recognition system Designing a fully integrated low noise Tunable-Q Active Inductor for RF applications A Framework for Web Services Composition Hopfield neural network with dual neuron approach to correcting corrupted data Analysis of Different Current Control Techniques for Grid Connected Inverter System RFID- Damage Recovery In Real Time Wireless Environment A Novel Approach to Design Highly Speed Efficient Arithmetic Logic Unit Improved Agile Software Development Activities -A New Proposal Optimized and Secure Address Allocation Scheme in MANET An Efficient Risk Analysis In Requirement Engineering Using Modified Goal Risk Model Measuring Defect Potentials and Minimizing the Difficulty of SQA by Automated Techniques PSO-Based PI-PD Tuning for Stable and Unstable FOPTD Processes Performance Evaluation of Topology based Routing Protocols for VANETs in Urban Scenarios Comparison of DAC Architectures of SAR ADCs FPGA Implementation Of Multiprocessor Core Architecture For Embedded Concurrent Computing A Secure approach of Eavesdropper detection in Quantum Key Distribution VHDL Implementation Of RSSI Based Mobile Client Node Localization Using WLAN Infrastructure Low Power Full Adder Circuit using Gate Diffusion Input (GDI) MUX Energy Efficiency Improvement of Cluster Routing Protocol for Wireless Sensor Network through Simplification M. Ikram Malek , Ms.Suman Saini Yogini Marathe, Dr. Rajesh Ingle Shantanu Jana, Dr. Nibaran Das N.Madhu Kumar , B.Vasanth Reddy , B.R.Narendra , B.Chitti Babu , M. THURAI PANDIAN Abhishek Gupta, Utsav Malviya, Vinod Kapse R.BALASUBRAMANIAM Anju Shukla, A.K.Vatsa K.Venkatesh Sharma, Dr P V Kumar H.K.Gundu Rao , L. Manjunatha Rao , N.Rajasekhar Reddy Naveen K Vastrakar, Swapnil Nema, Prabin K Padhy Bhavana R, Khushboo Gupta , Dr. Shylaja.B.S Srinivas Boina , Roy Paily Dr.M.Kamaraju, N.Sambamurthy Akash Shrivastava , Akanchha Srivastava, Atul Verma Kavita B Malagatti, Praveen Kumar H V, Uday Kumar L Naik Sujatha Hiremath , Dr. Deepali Koppad Keerti Naregal, Anand Gudnavar

78 79 80 81 83 87 95 96 97 98 101 104 105 106

109 111

Media Streaming Using Multiple Description Coding in Overlay Networks Solving Multi-Objective Task Scheduling for Heterogeneous Distributed Systems using Firefly Algorithm Efficient and compact power supply for robotic application Mixture of Gaussian Mixture Models for Robust Skin Color Based Segmentation Effects of Migration Operators on BBO Evolution for Yagi-Uda Antenna Design Optimization Parallel Strategy for Exploring the Solution Space of Sorting by Reversals Design and Implementation of Luenberger Observer for Flow Control Application Trust Based Robust Position Estimation in Wireless Sensor Networks

Sachin Yadav, Shailendra Mishra, Ranjeeta Yadav R. Eswari, S. Nickolas

113 116 117 121 124 129 131 135 140 141 143

K.Deepa, R.Jeyanthi, Dr.M.Vijaya kumar Noor A. I., Mokhtar M. H., Rafigul Z. K., Pramod K. M. Satvir Singh , Gagan Sachdeva Amritanjali , G. Sahoo Mihir Veera , Jimmy Xavier, Deepti Khimani Nandhini T , Nirmala M B , A S Manjunath

An improved methodology for Fragment Re-allocation in Dr. D.I. George Amalarethinam, Peer-to-Peer Distributed Databases C. Balakrishnan, A. Charles TIBAS A Highly Secure Authentication Scheme using Ephin M, N A Vasanthi Text and Integrated Biometrics Technique Application of Newton Raphson Algorithm for Optimizing TCP Performance Wide Band Microstrip Antenna with Dual Ultra BandNotched Characteristics Using SRR An Analysis Of Control Packets, Packet Delivery Ratio & Residual Energy In Power Aware Dynamic Source Routing In Mobile ADHOC Networks (MANETs) J.Vijipriya, Dipak Kulkarni, Jyoti Varavdeka Shabir A.Sofi, Inhas Ashraf, Faheem ud din, Adil Ayub, Roohie Naaz Mir,

145 147 149 150

Feature Based Image Registration Using Steerable Filters Mahesh , and Harris Algorithm Subramanyam M .V Cryptanalysis of Knapsack Cipher using Tabu Search Fast Color Image Quantization Based On Bacterial Foraging Optimization Malay Kule , Lalmohan Karmakar Pallavi Yarde, Neetu Gupta

Design and Implementation of LVCMOS GPIO in 180nm Varun S Karadesai , Jaideep Technology Chauhan, Rohini H, Sanjay Eligar, R.M.Banakar Modeling Software Failures Using Neural Network Performance Improvement of Contrast Based Image Fusion in Wavelet Domain Kiran Khatter, Arvind Kalia Pallavi Bute , Rupali Sagar

151 155

157 166 172 175

UIDEA: UI Design as Ethnographic UI Architecture Protecting Wi-Fi Networks from Rogue Access Points Simulation-Based Performance Evaluation of Queuing Mechanisms for AODV Routing Protocol in MANET DISASTER RECOVERY PLANNING USING FAULT TOLERANT MECHANISM IN VIRTUALIZATION ENVIRONMENT Dual Transformation Bimodal Biometrics Based on Feature Level Fusion BIST Based Pattern Generation for Low Power VLSI Architecture A Dynamic Rate Limiting Mechanism for Flooding Based Distibuted Denial of Service Attack ECG Arrhythmia Classification using Multilayered Perceptron and Radial Basis Function Neural Network An Efficient Scheme for Anonymous Authentication using Identity Based Group Signature Signal To Interference Ratio (SIR) Analysis and Interference Cancellation In MIMO OFDM Systems With Carrier Frequency and Timing Offsets Lung Nodule Segmentation of Lung CT Images with Rotation Invariant Local Binary Pattern over MATITK

M.Sunil kumar, A.Rama Mohan Reddy Pranit S. Thakur , Prof. V. B. Patil Madhulika, Rajesh Kumar Chakrawarti , S.Anthoniraj, Dr. S.Saraswathi, M.Anandraj Ramachandra A C, Abhilash S K, K B Raja, Venugopal K R, L M Patnaik Praveen J , M.N. Shanmukhaswamy Rachana Yogesh Patil , Dr. Lata Ragha Hari Mohan Rai , Anurag Trivedi S.Kuzhalvaimozhi , Dr.G.Raghavendra Rao N.Sreekanth, Dr M.N.GiriPrasad

176

177 178 179 180 182

185 519 520 523 525 532

Gagan Deep, Lakhwinder Kaur, Savita Gupta

Implementation of Self controlled Arbiter for High Speed Kaushik Mukherjee, A.Ch. Sudhir Communication in on-chip using Xilinx Tools A Lifting based 3-d Wavelet Transform VLSI Architecture by (9,7) filters Design and Implimentation of a Switching Matrix for Efficient Data Conversion Niladri Ghosh, K.Pradeep Vinaik Devika Varadpande, Dr. A.M.Dighe,Prasanna Palsodkar

Designing a Direct Digital Synthesizer using Numerically Rohitha Maddela,A.Ch.Sudhir Controlled Oscillator Performance Analysis of Fuzzy MCDM and Game Theory Approaches for Vertical Handoff Decision Making Leakage Current Loss Minimized Word Line Booster Circuit for Ultra Low Power Systems Design, Implementation and Analysis of Flash ADC Architecture with Differential Amplifier as Comparator Using Custom Design Approach K. Radhika,Dr. A. Venugopal Reddy Suchitra Suresh, Shifiludeen A Kalam, Deepu S Kumar Channakka Lakkannavar, Shrikanth K. Shirakol,Kalmeshwar N. Hosur

534 536

537 541 542 546 560

How Influential are You: Detecting Influential Bloggers in a Blogging Community Multilevel Cryptography Scheduler

Imrul Kayes Prof. Chaitali Chandankhede, Prof. B. N. Jagdale, Dr. J. W. Bakal

Segmentation of Online Handwritten Word by Estimating Rajib Ghosh the Busy Zone of the Image Link Stability Analysis in VANETs Using Topology based Protocol Selected Mapping, Clipping and Differential Scaling for Reducing PAPR in OFDM system Design and Simulation of MEMS Based-Humidity Sensor LWT based Encrypted Payload Steganography Scatter : A Generic Clustering Algorithm for Load Balancing & Efficient Intra Cluster Communication in Wireless Sensor Networks An Improved Design for the IIR Digital Fractional order differential Filter using Indirect Discretization Approach Sushil kr. Trisal, Ajay Koul ,Amit Bindal B.Soma sekhar, A.Mallikarjuna Prasad, K.Muralikrishna, T.Ravibabu Sujata Naduvinamani, Vaishali Mungurwadi ,Kiran Y Bendigeri H S Manjunatha Reddy, N Sathisha, S Deepa, K B Raja Shimul Bhowmik, Amartya Sen , Sanghita Bhattacharya Jay kumar Pandey ,Mausmi Verma

564 567 570

573 574 579

Edge Detection Algorithm Based On AIVHE For Retinal Arati J.Vyavahare, Dr. R.C Thool Images EEG Classification for Different Emotional States While Bharti W. Gawali, Shashibala Rao, Watching Movie Clips. Priyanka Abhang, Pramod Rokade, S.C. Mehrotra Segmentation Of Brain Tumor Images using Region Growing Algorithm Based on CLAHE And SIFT An Efficient Parallel MultiplierAccumulator Based on Radix-4 Modified Booth Algorithm using SpuriousPower Suppression Technique A.J.Vyavahare ,Dr. R.C Thool , Anjali W. Pise S.V.Krishna Rao, T.Sunil Kumar, T.Pradeep

580 589

Accepted Short Paper


Paper ID 2 Paper Title A Method to Improve the Performance of endairA for MANETs Web-based Distribution and Protection of Textual Documents using Cryptography and Natural Language Watermarking Author M. Ranjith Kumar, Atul Negi, Vijender Busi Reddy, S.Venkataraman Prutha Date , Pranjali Bhanap Soniya Advant

11

Broadband Mobile Communication in MIMO-OFDM With FPGA Implementation Using 200MHz Transmitter And Receiver Using i-MAT Antenna Technology.

B.Tejeshwar

17

Comparative study of Two Stage High Gain CMOS Anita M. Vishwakarma Operational Amplifiers in 180nm technology using gm-Id methodology Design, Analysis and Implementation of Modified KAnwiti Jain, Anand Rajavat, Mean Algorithm for Large Dataset to Increase Scalability Rupali Bhartiya and Efficiency Detection of Fast Flux Network Based Social Bot Using Analysis Based Techniques Amit Kumar Tyagi

18

20 21 22 24 26 34 45 46 47 49

Detecting HTTP Botnet Using Artificial Immune System Amit Kumar Tyagi (AIS) Image Retrieval With Relevance Feedback In Clusters Using K-Means Simulation of Intelligent Hoard Systems Using ARM Processor For Aircrafts Framework for Open Domain Question Answering using Dynamic Concept Relational Ontology Competitive Analysis Of Digital Image Watermarking Techniques Bone Mark Analysis Using Image Processing LMS Algorithm Implementation In FPGA For Noise Reduction And Echo Cancellation Revisiting Security Vulnerabilities: Web Applications Perspective Cross-Layer Based QoS Routing (CLBQR) Protocol Analysis based on Data Flow for 802.16 WiMAX Networks A Novel Approach To Implement Disk Security Using Partial Disk Encryption Simulation and Implementation Novel Hybrid Blind Method of Image Security Punjabi Speech Recognition Using HTK A Comparative Experimental Study of Image compression algorithm based on vector Quantization Subhashree K V ,Sushma R Muttanna Kadal H K, Dr. G V Jayaramaiah,Shivaputra,Chetan S G. Sureshkumar, G. Zayaraz Anand Bora, Nikhil Dalshania, Aditya Bhongle K.K. Senapati, Sandip Mal C.V. Niras ,Yinan Kong R. Kumar A.Maheswara Rao, S.Varadarajan, M.N.Giri Prasad Anurag Sharma , Smitha ML , Tarun T Arya , Minal Moharir Anil C. Suthar, Chiragkumar B. Patel, Gopal R. Kulkarni Mohit Dua, R.K.Aggarwal, Virender Kadyan, Shelza Dua Mithlesh Kumari

50 55 59 69 74 75

Endurance Group Membership Management on Multicast R. Velumani, Dr. K. Duraiswamy Routing Protocol for Mobile Ad-Hoc Networks Achieving Integrity and Confidentiality in Cloud Data Krunal Suthar ,Arun jhapate

Storage Using Cryptographic Techniques 88 89 Mining Data Streams using Option Trees Identification of Optimal Cluster Centroid for Unconstrained Nonlinear Multivariable Functions Study and Analysis of Various Frequency Offset Correction Schemes in Orthogonal Frequency Division Multiplexing (OFDM) based Long Term Evaluation (LTE) systems A review on Low power Display Techniques based on LCD systems with Back-light as LED. B. Reshma Yusuf, Dr. P. Chenna Reddy K. Reddy Madhavi , A. Vinaya Babu , A. Ananda Rao , S. Viswanadha Raju K.Vinoth Babu , Dr. G. Ramachandra Reddy

90

99 103 108 110 123 126 128

Mustafa Surti

Analysis and Evaluation of Keystroke Duration of Users Dwijen Rudrapal , Smita Das Typing as a Distinctive Measure of Recognition Appraisal of Rotation Invariant Object Matching with Rotation Estimation Performance Analysis of Proactive, Reactive and Hybrid MANET Routing Protocols on IEEE 802.11 Standard Hierarchal Model to Pr event DOS Attack in Mobile Agent Enhanced Round Robin Algorithm to improve Processor Utilization DMODL -Distributed Multi-hop On-Demand Localization Using Virtual Anchor Nodes in Wireless Sensor Networks Query Suggestion For LONG Tail Queries By Content And Key Words Matching KRB: Kernel Microreboot Mechanism An Efficient Checkpointing Algorithm Using SelfAdjusted Hypercube Structure in Mobile Ad Hoc Network Automatic Respiratory Disease Classification using Genetic Algorithm on an Embedded Platform Chirag I Patel, Sanjay Garg Anjali, Dr. Maninder Singh Mayank Aggarwal,Nipur, Pallavi Murghai Siddharth Tyagi Roopa C.M , R Sumathi

130 132 142

Anand Prasad Gupta , Dr. Sunita Yadav Nickolas Savarimuthu and Arish Pitchai Dr. Ajay Khunteta , Pooja Sharma Lakshmi Nandakumar, Jagadeesh Kumar P

146 148

Self Adaptive Finite Element Refinement of Single Sided Manpreet S. Manna, Sugandha Linear Induction Motor Singh, Sanjay Marwaha Dynamic Web Service Recommendations Based On Model- Based Collaborative Filtering Methods And Genetic Algorithm Vadivelou G, Ilavarasan E

156

158 159 162 163 167 168 171

Computer Aided Partitioning for Design of Parallel Testable VLSI Systems A Survey on User-Interface Architectures and ADLs

Deepa Jose, Dr.P.Nirmal Kumar M.Sunil kumar, A.Ramamohanreddy

Performance Evaluation of OFCDM Signal Transmission Ashish Verma , Srashti Vyas through Communication Channel Analysis of Security Vulnerabilities for Web based Application J.Pradeep Kumar , Dr.T.Ravi , K.V.Nagendra

N-gram Based Malicious Code Ddetection Using Support Soumya santhosh, Shreeja R Vector Machine Learning Approach Automatic Irrigation System Improving Scalability Issues in Collaborative Filtering based on Collaborative Tagging using Genre Interestingness Measure Evolutionary Algorithm based Feature Extraction for Enhanced Recommendations An EGNOS assisted GPS based Pedestrian Navigation System Visual Cryptography for MMBS of Wireless Images for ATM Banking V. Ranadheer Reddy, Naga Sai Niharika Ch latha Banda , Kamal K. Bharadwaj Deepa Anand Karthick Nanmaran, William A. Mackaness S.Koteswari , Dr.P.John Paul ,S.Indrani

173 174 181 183

SKIN CANCER DETECTION AND CLASSIFICATION Y.K JAIN , MEGHA JAIN USING WAVELET TRANSFORM AND PROBABILISTIC NEURAL NETWORK A Fuzzy based Detection Technique for Jamming Attacks C Balarengadurai, Dr S in IEEE 802.15.4 Low Rate Wireless Personal Area Saraswathi Network Voice for the Voiceless and Secret talk Review of XY Routing Algorithm for Network-On-Chip Architecture K.Rajeswari, E.Jeevitha, R.Stephy Graph Shubhangi D Chawade , Mahendra A Gaikwad , Rajendra M Patrikar

186

509 514

515 516

Design and Implementation of Lossy Compression for an Asha G H,Shashi Kiran, Neethu J Encrypted Image Simulation and Hardware design of an Active Input Current Waveshaping with Zero Switching Losses for Three-Phase Circuit Using Power Diode Recursive Algorithm for Zero Skew Sub-tree for Clock Gating method CDCD-5 An Improved Mobile Forensics Model Shrinivas Reddy ,Mahadevi Biradar C.Ashok Kumar, Dr.B.K. Madhavi, Dr.K.Lal Kishore Dr. Pratosh Bansal, Vinit Shah

533 548

549 550 553 556 561

Pro-active & Reactive Protocol Analysis using Ns2 and Association Rule Mining Technique Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application An Efficient Routing Protocol For Better Energy Efficiency and Avoidance of Voids In Sensor Networks New Approach for Fingerprint Detection Based on Singular Points

Vinay Yadav ,Divakar Singh Ajab Maheshwari, Dr. Pratosh Bansal Lakshmi Praveen ,Dharun V.S, Navya Vipin Bintu Alias ,Ginto Johnson ,Anoop Thomas

Missing Value Estimation of Microarray Gene Expression Aurpan Majumder, Mrityunjay Data Using Gene Ontology Based Fuzzy Clustering Sarkar Algorithm Isolated Handwritten Bangla Character Recognition using Sourjya Dutta ,Sandipan Banerjee 1D Discrete Wavelet Transform Agent Based Aggregation of Cloud Services- A Research Dr. Nandini Sidnal, Sreedevi R. Agenda Nagarmunoli Automatic Detection of Acute Lymphoblastic Leukemia based on HSI color space Arati J.Vyavahare, Dr. R.C Thoo l

562 568 578 582

North-East Indian Face Database: Its Design and Aspects K. Saha, R. Debnath, M.K. Bhowmik, D. Bhattacharjee, M. Nasipuri High Speed Low Power VLSI Architecture for SPST adder using Modified Carry Look Ahead Adder Narayan V S, Pratima S M, Prof.Saroja V S, Dr. R M Banakar

588

Accepted Poster Paper


Paper ID 1 5 6 7 9 Paper Title Sharon: Tension Free Mobile, Incorporated with Health Care System Author Dhiraj Kumar, Raju Dubey, Bagesh Kumar, T.Shantha Kumar

An Autoranging Data converter Implementation in FPGA Sreekumari B., Jiju K, Jithin Krishnan Function Optimization using Real Coded Genetic Algorithm Optimization of Autonomous Reconfiguration System in Wireless Mesh Networks A Reduced Complexity LDPC Decoding Algorithm Using Dynamic Bit Node Selection VIKASH GUPTA , DEEPAK KOURAV Vibha, Umang Gupta , Kriti Aggarwal Suvarna Hudgi , Siddarama Patil

10 14 23 28 33 35 37

Soap Based Security Interactions Of Webservices In Heterogeneous Platforms Using JASYPT IPTV and Cloud Computing based Education Program S Band LNA Design For Deep Space Mission

A. Sudha,P. Gayathri K.V.Sriharsha Bhavana.G

Performance Evaluation of AntHocNet Routing algorithm T. Nishitha, P.Chenna Reddy for Ad hoc Networks Neural Network Based Smart Vision System for Driver Assistance in Extracting Traffic Signposts Reversible Watermarking: A Comparative Study Assessing And Defending The Known Potential Attacks Through SIP On Asterisk Server RAW Reconfigurable Architecture Using Wireless: A novel design for future generation Supercomputers Assessing And Defending The Known Potential Attacks On Router Analyzed Virtual Routing Protocol for Future Networks (MANET & topological network) Malware Simulation using JADE To Detect Clone Attacks in Wireless Sensor Networks Using Random Walk Protocol Classification of EEG Signals in BCI Insulin Chart Prediction for Diabetic Patients Using Hidden Markov Model (HMM) Remote Function Call Techniques Enriching the Knowledgebase Using Unification Techniques Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment Optimized Information Retrieval from the Web Development of BPEL Processes Adopting Dynamic Business Strategies Intrusion Detection of Selfish Nodes in MANETs Meeta Kumar, V.Y.Kulkarni, Jayshree Ghorpade, Rajni Bedi Nikhil Dalshania, Anand Bora, Abrar Chapalgaonkar Anjana V. Kumar, Priyanka Loya, Neeraja A. Marathe, A. R. Pais, N. Balakrishnan Vignesh Sankarraman, Vijay Raghavan, Srinath Sridhar Annfreeda Davis, B Nageshwara Rao, Santhosh B R, Alwyn R Pais,Prof. N. Balakrishnan N. KannaiyaRaja ,R. Viswanathan, J. Vignesh Kumar, T. V. Krishna Prasad Manish Jain Sheela.S, Manjunath.R.C, Sujatha.B.M Satyendra Nath Shukla , Ravindra Nath ,Renu Jain Ajay Bidari , Mahendra Pratap Singh Deepa Chaudhary, Praveen K.Yadaav, Rakesh K. Singh, Sudhanshu Mishra, Siddharth Krunal Suthar, Arun Jhapate, Hiren B. Patel, Dhiren Patel Nistha Goyal, Suneet Kumar V. Siva Madhuri Anup Parkash Singh, Maninder Singh

40 43

44

54 60 61 62 65 66

84 85 86 91

94 102 112 114

Comparative Analysis in Satellite Image Registration Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET Comparison of Different Algorithm for Face Recognition Comparative analysis using fast discrete Curvelet transform via wrapping and discrete Contour Transform for Facial feature extraction and Recognition A parallel Pipelined approach to Vedic Multiplier For FPGA Implementation Design of an Efficient Dual Signature Generation and Verification Scheme in SET Protocol Design of Reliability Protocol Using UDP Image Compression Using Artificial Neural Network Vulnerability Analysis Of Application In Virtual Environment

Reji R , Vidya R Ahmad Anzar, Prof. SC Gupta Taranpreet Singh N.G.Chitaliya , Prof.A.I.Trivedi

115

Piyush S. Kasat, Harish V.Dixit , Rahul Balwaik, Amutha Jeyakumar Sachin Tripathi, G.P.Biswas Sachin Tripathi, G.P.Biswas Anjana B , Shreeja R R.Anand, Dr.S.Saraswathi, R.Regan, T.Deenadayalan

119 120 125 133 134 136 137 139 144 152 169 170 187

Document Clustering Algorithm using Modified K-means Ranjana Agrawal, Madhura Phatak Script Identification From Handwritten Postal Envelopes For The First Stage Of Postal System Automation Design and Implementation of 8bitX8bit SRAM N-LINE Unmanned Rail Gate Control Design and Implementation Of Battle Bot Implementation Of Multi-Slave Interface For AXI Bus Comparative Study of Different Cache Models on SimpleScalar Architecture Exploring hidden parts of the Web: The Hidden Web Design and FPGA Implementation of High Performance Rotation Architectures, Based on the Radix 4 CORDIC Algorithm An Embedded Crypto-Biometric Authentication Scheme For ATM Banking Systems Hacking Prevention Using Positive Tainting Alwin Anuse , Vibha Vyas Rakesh H.M, Anil V Nandi , Halesh M.R V. Ranadheer Reddy , D.Meghanadh V. Ranadheer Reddy Anitha.H.T,Dr.Nataraj.K.R Himanshu Arora , Udit Bhatia , Shalvi Pandita Sonali Gupta, Komal kumar Bhatia J M Rudagi, Basavaraj B Patil, Srikant , S. Subharaman R.Ganesh, P.Chandrahassan

504

505

Khushbu Chauhan,Khushbu Shah, Aastha Goyal, Sumedha Dethe

510

Dynamic Web Service Composition through Network Analysis with Backtracking Security In Wireless Networks: In The Case Of Jammers & Various Dos Attacks Automatic Road Network Extraction using High Resolution Satellite and Aerial Images The Application of PSO to Hybrid Active Power Filter Design for 3 Phase 4-Wire System with Variable Load Difference between Principal Component Analysis & Factor Analysis Low-power Full Adder array-based Multiplier with Domino Logic Power Analysis Of Power Gating Designs In Low Power VLSI Circuits Features Of Adaptive Test Suites Improved Genetic Algorithm for Intrusion Detection System A new algorithm for floorplanning using B*trees ACP Based Anonymous Secure Group Communication Automatic Leak Detection and Numbering System for Automobile Industry Configuration Issues and Efforts for Configuring Agile Approaches-Situation Based Method Engineering Development of Software modules for Signal Processor using Power PC (8640D Processor) Coordination of an STATCOM and ULTC Power Transformer with Capacitor Bank for voltage control Enhancement: a REVIEW Wireless Sensor Network Security Issues; Detection of HELLO flood Attack and Its Countermeasures High Speed Low Power VLSI Architecture for SPST Equipped Booth Multiplier using Modified Carry Look Ahead Adder A New Proposal For Audio Steganography In Wavelet Domain

K.Rajeswari, E.Jeevitha, R.Stephy Graph, M.Suresh Kumar Sayed.Mohommad Ali , K.S.Masthanvali Dhananjaya B , Asha G H , Shashi kiran B. Suresh Kumar, Dr. K. Ramesh Reddy,S.Archana Varun Gupta,Dilbag Singh M.B. Damle, Dr. S. S. Limaye Ravi Kumar M.N ,Ravi Kumar Narendra Kumar Rao. B ,RamaMohan Reddy.A, Indr Jeet Rajput,Dheeraj Pal B Srinath, Vaijainthi Alwan Nirmala C.G ,Hemalatha.N Rehan Ahmad, Prof. V.A.Kulkarni Rinky Dwivedi Ashwini Kodad, Rohith.S Prof. A. K. Kori, Ratnesh Singh

511 513 522

526 527 531 535 539 540 544 552 555 557 558

563 565

Sujata N. Naduvinamani, Kirankumar Y. Bendigeri Pratima S Mudhenagudi ,Narayan V Sugur ,Prof .Saroja V Siddama ,Dr.R.M.Banakar Jisna Antony,Sobin C. C

569

571 572 576

Black Hole Detection in Manet using MABR Protocol FPGA Implementation analysis of FIR Filter over MAC, DA FIR Cores

M.Shobana,R.Saranyadevi , Dr.S.Karthik Mausmi Verma

Comparision Of Level Set Algorithm & Hough Transform A.J.Vyavahare ,Dr. R.C Thool For Segmentation Of Medical Images Using Canny ,Dipali P.Pati l Operator Blot Blended Learning :Highly recommended and hypothesis for effective learning Resource Biased Routing (RBR) Algorithm for Energy Optimization in Wireless Sensor Networks A Survey on Routing Protocols in Bluetooth Network Non-Intrusive System for Fatigue Detection Through Image Processing R.Rajkumar , Dr.V. Sankaranarayanan ,S.Sharmila Lalit kumar Saraswat, Dr. Sachin Kumar Dr. Ajay Khunteta,Pooja Sharma Sachin Sehgal, Neha Sehgal,Mamta Katiyar

583 586 590 591

You might also like