Top Banner
Paper Registration Status - ICCA2012 - Pondicherry, India Saturday, January 14, 2012 6:59:21 PM ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights 14 Web-Biometrics: User Verification via Web Interaction(With a Head Tracking Mouse Usage) Manju Panneerselvam Bio-genetic Computing Systems 57 1 23 Private Key Generation (PKG) Based Node ID Assignment in Structured P2P Systems M Jegatha Information Security Systems 341 0 23 Private Key Generation (PKG) Based Node ID Assignment in Structured P2P Systems R Venkadeshan Information Security Systems 13 0 29 The place of information technology as a well of opportunities for poverty alleviation Afolashade Kuyoro Computer Applications 32 0 34 Impact Of De-Authentication Attack On Wireless Intrusion Detection Systems S Divya Information Security Systems 24 0 38 Euler Number, Symmetry and Histogram Based Hierarchical Approach for English OCR Mahesh Goyani Computational Intelligence 29 0 41 Simulation of AODV Routing Protocol Ashish Chaurasia Information Communication 34 0 52 Grid Computing - High Level Computing to Access Internet Ajit Nataraj C High Performance Computing 89 0 52 Grid Computing - High Level Computing to Access Internet R Dinesh High Performance Computing 151 0 Page 1 of 36 1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
36
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: auth_regn

Paper Registration Status - ICCA2012 - Pondicherry, India Saturday, January 14, 2012

6:59:21 PM

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

14 Web-Biometrics: User

Verification via Web

Interaction(With a Head Tracking

Mouse Usage)

Manju Panneerselvam Bio-genetic

Computing Systems

57 1

23 Private Key Generation (PKG)

Based Node ID Assignment in

Structured P2P Systems

M Jegatha Information Security

Systems

341 0

23 Private Key Generation (PKG)

Based Node ID Assignment in

Structured P2P Systems

R Venkadeshan Information Security

Systems

13 0

29 The place of information

technology as a well of

opportunities for poverty

alleviation

Afolashade Kuyoro Computer

Applications

32 0

34 Impact Of De-Authentication

Attack On Wireless Intrusion

Detection Systems

S Divya Information Security

Systems

24 0

38 Euler Number, Symmetry and

Histogram Based Hierarchical

Approach for English OCR

Mahesh Goyani Computational

Intelligence

29 0

41 Simulation of AODV Routing

Protocol

Ashish Chaurasia Information

Communication

34 0

52 Grid Computing - High Level

Computing to Access Internet

Ajit Nataraj C High Performance

Computing

89 0

52 Grid Computing - High Level

Computing to Access Internet

R Dinesh High Performance

Computing

151 0

Page 1 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 2: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

53 A Mechanism For Skew

Detection Of Online Bangla

Handwritten Words

Arnab Guchhait Human Computer

Interaction

98 0

53 A Mechanism For Skew

Detection Of Online Bangla

Handwritten Words

Rajib Ghosh Human Computer

Interaction

102 0

55 Nanotechnology- The New

Upgrade For Computers

Ramyasree Asokan High Performance

Computing

453

61 Authentication of Bluetooth

Using Biometrics

Mohankumar N Information Security

Systems

64 2

61 Authentication of Bluetooth

Using Biometrics

Madhusudhanan Information Security

Systems

65 2

62 Gaussian Kernel based

Intuitionistic Fuzzy C-Means

Clustering Algorithm in

Segmentation of Noisy Digital

Images

Prabhjot Kaur Sidhu Automated Systems 119 0

67 Scalable, Robust, Efficient

Location Database Architecture

Based on the Location-

Independent PTNs

Kaptan Singh Knowledge

Engineering

384 0

70 LOA-BRO-FAI Analysis in Grid

Computing Using SYL's

Algorithm

Sylvia Grace J Cloud Computing 108 0

71 The Grass root in Technical

communication

Prashanth G K Digital Computing

Systems

92 0

75 Gesture Based Communication G S L K Chand Human Computer

Interaction

103 0

Page 2 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 3: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

77 MPPC: Mobile Phone for

Physically Challenged with

Smart Interaction

Vigneshkumar

Saravanasundaram

Human Computer

Interaction

154 0

77 MPPC: Mobile Phone for

Physically Challenged with

Smart Interaction

M. U. Arumugam Pillai Human Computer

Interaction

153 0

77 MPPC: Mobile Phone for

Physically Challenged with

Smart Interaction

P. Yogeswaaran Selvam Human Computer

Interaction

350 0

79 A fuzzy Approach for mining

Time Series Data

Sadiq Hussain Bio-genetic

Computing Systems

101 1

81 Checkpoints for Cabs Using

Cellular Quad Band Module with

GPS

Pughazendi N Electronic Data

Systems

112 0

81 Checkpoints for Cabs Using

Cellular Quad Band Module with

GPS

Srivatsan Sundaravaradan Electronic Data

Systems

164 0

84 Web Application Testing Using

Inheritance Method

C D Rajaganapathy, T R

Srinivasan, S Gopikrishnan

Software

Engineering Systems

-- 0

91 Introducing the Internal File

System for the DATABASE

Packages

Priyanka Kulshrestha Digital Computing

Systems

160 0

95 An FPGA Based Framework

forExploitation of multi node

Architecture

Yasodai Ayyasamy Digital Computing

Systems

152 2

97 Incorporating 3D Features in

Internet TV: A Proposal

Akin Cellatoglu Computer

Applications

705 0

Page 3 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 4: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

97 Incorporating 3D Features in

Internet TV: A Proposal

Balasubramanian

Karuppanan

Computer

Applications

143 0

98 Improving the Performance of

Speech Recognition Using

Genetic Algorithm Based On

Artificial Neural Network

Narendran Sivasubramanian Signal Processing

Systems

189 1

105 Fuzzy Logic in Digital Image

Processing

Prashanth G K Computational

Intelligence

174 0

106 Understanding the Digital

Forensics: A Review

Shipra Maurya Digital Computing

System

158 0

108 Establishing Relationship

Between Customer Relationship

Management & E-Business

Ankur Shrivastav Electronic Data

Systems

155 0

108 Establishing Relationship

Between Customer Relationship

Management & E-Business

Rohit Joshi Electronic Data

Systems

134 0

110 VoIP Call Quality Optimization

through Cloud Computing

Srivatsan Sankaran Cloud Computing 150 1

110 VoIP Call Quality Optimization

through Cloud Computing

Sriram Madapusi Vasudevan Cloud Computing 149 1

111 Applying Database Independent

Technique To Discover

Interoperability Problem

Shefali Verma Knowledge

Engineering

231 1

111 Applying Database Independent

Technique To Discover

Interoperability Problem

Sachin Yadav Knowledge

Engineering

163 1

113 Security In Wireless Sensor

Networks

Rachid Haboub Information Security

Systems

162 0

Page 4 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 5: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

114 K-CCNF And SAT Complexity Kanak Chandra Bora Computer

Applications

172 1

114 K-CCNF And SAT Complexity Bichitra Kalita Computer

Applications

193 1

115 Management and flexible

transaction of uncertain data in

XML database

Umesh Dwivedi Knowledge

Engineering

563 0

115 Management and flexible

transaction of uncertain data in

XML database

Firoz Ahamad Knowledge

Engineering

631 0

116 ATM Card Theft Identification

and Remote Information Systems

Surya Natarajan Information Security

Systems

176 0

117 An Overview of Corner

Detection Algorithm

Ligendra Kumar Verma Will be classified! 798

120 Computing Schedule Variance

using Non – Ratio Scale

Properties

Srinivasa Gopal Computational

Mathematics

243 0

121 Enhancement of Optical

Character Recognition Output

and Testing using Graphical User

Interface

Pavithra Rajendran Computer

Applications

219 0

121 Enhancement of Optical

Character Recognition Output

and Testing using Graphical User

Interface

Janani Rajasekaran Computer

Applications

217 0

121 Enhancement of Optical

Character Recognition Output

and Testing using Graphical User

Interface

Nandhini Ramesh Computer

Applications

218 0

Page 5 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 6: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

122 An approach that will enable

processing of Clusters in mining

with a comparison of basic and

concurrent involving distribution

Umapavan Kumar Computer

Applications

204 0

128 Future Human Computer

Interaction

Satishkumar P. A. Human Computer

Interaction

197 2

132 Quantum Dot-Cellular Automata

to Significantly Reduce the Size

of Super Computers

Karthikeyan Damodaran,

Arun Kumar A, Jaideep H

Lakhani, Dheepak V

High Performance

Computation

234 2

133 Bluetooth Controlled Automated

Train Stopping System (BCATS)

Syed Akthar Aasif Automated Systems 269 0

133 Bluetooth Controlled Automated

Train Stopping System (BCATS)

Mohammed Shaffi Automated Systems 248 0

135 Computer Simulation of DLA in

Electrodeposition of Dendritic

Patterns

Anwar Pasha Deshmukh Computer

Applications

Manual 0

137 Programmatic Testing of a

Technology Product

Amol Khanapurkar Computer

Applications

635 0

137 Programmatic Testing of a

Technology Product

Suresh Malan Computer

Applications

215 0

137 Programmatic Testing of a

Technology Product

Chetan Phalak Computer

Applications

224 0

138 Implementation of the DES

Framework On SOA

Ashish Avasthi Software

Engineering Systems

256 0

Page 6 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 7: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

141 Data Set Privacy For

Organizations: A Review

Pankaj Kumar Sharma Knowledge

Engineering

210 0

143 Role of Cybernetics in

Management of Urban Disasters

Nirmita Mehrotra Will be classified! 195

145 Mind Controller (Brain Hacking) A Sunil Sai Human Computer

Interaction

220 1

153 A Survey On Efficient

Approaches For Securing The

Private Data In Cloud Computing

Randeep Kaur Chhabra Cloud Computing 322 0

157 Secure and Lightweight model

for m-Payment System based on

Hash Chain in Mobile Network

Chitra Kiran N Electronic Data

Systems

284 0

163 Stochastic Segregation of Steering

Scheduling Performance in Multi

Server Queueing Network

K. Sivaselvan Computational

Mathematics

259 0

167 Cloud Computing Strategy:A

Paradigm Shift in Information

Technology

Sivaraman Eswaran Cloud Computing 326 0

167 Cloud Computing Strategy:A

Paradigm Shift in Information

Technology

Hemalatha Raguram Cloud Computing 319 0

167 Cloud Computing Strategy:A

Paradigm Shift in Information

Technology

Manickachezian Rajakannu Cloud Computing 370 0

168 Binary Audio Cryptography

Scheme

Pradnya Khobragade Information Security

Systems

300 0

Page 7 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 8: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

170 On A Graph Theory Based

Approach For Improved

Computer Vision-II

Venkataraman

Yegnanarayanan

Signal Processing

Systems

301 0

173 Design Of Parallel Vector/Scalar

Floating Point Coprocessor For

Reconfigurable Architecture

Manikandan E Digital Computing

Systems

358 0

174 Implementation Details of

Various Job Scheduling

Heuristics Approaches for Cloud

Computing Environment

Paritosh Sardare Cloud Computing 475 0

174 Implementation Details of

Various Job Scheduling

Heuristics Approaches for Cloud

Computing Environment

Nikita Bais Cloud Computing 463 0

174 Implementation Details of

Various Job Scheduling

Heuristics Approaches for Cloud

Computing Environment

Sachin Solanki Cloud Computing 462 0

179 Algorithms in Simulated Parallel

Condition – A Performance

Analysis

Chhailadeep Kaur Kahlon Computer

Applications

824 0

179 Algorithms in Simulated Parallel

Condition – A Performance

Analysis

Gagandeep Singh Computer

Applications

257 0

201 An Analysis of Multilevel

Cascade H-Bridge 21-Level

Inverter Implemented in Matlab/

Simulink Software

Venkateshkumar M Automated System 374 1

Page 8 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 9: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

206 High Performance asynchronous

AC Motor Drive Using Fuzzy

Logic Controller

Devadas G Will be classified! 279

207 Reduction of Total Harmonic

Distortion in a Single Phase UPS

Inverter by using Neural

Network Controller

Deva Das G Will be classified! 276

211 Hybrid Genetic Algorithm for

Optimization of Bloom Filter in

Spam Filtering

Arulanand Natarajan Computer

Applications

627 5

212 Agent Oriented Software

Engineering Methodologies: A

Review

Devshri Roy Software

Engineering Systems

851 0

212 Agent Oriented Software

Engineering Methodologies: A

Review

Abhishek Singh Rathore Software

Engineering Systems

346 0

215 Indexing and Retrieval of

Multimedia Data In Cooperative

Work Environment

Pranita Ambre Digital Computing

System

274 0

216 Stochastic Dynamics of Markov

Chains using Circulation Theory

Govindan Padma Computational

Mathematics

345 4

220 Bit-Pattern Representation for

Design Pattern Identification

Anil Patil Software

Engineering Systems

884 0

220 Bit-Pattern Representation for

Design Pattern Identification

Pravin Game Software

Engineering Systems

884 0

222 Name Alias Detection based on

UI approach and Graph mining

method

Shweta Dharmadhikari Knowledge

Engineering

885 0

Page 9 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 10: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

222 Name Alias Detection based on

UI approach and Graph mining

method

Sumitra Jakhete Knowledge

Engineering

770 0

222 Name Alias Detection based on

UI approach and Graph mining

method

Madhuri Wakode Knowledge

Engineering

831 0

223 A Smart Book Reader Faroke Mohamed N Digital Computing

System

287 0

225 RECONOS: Re-Configurable &

Extensible OS Architecture

Pratik Gohil Open Source Systems 285 0

226 Calculating the Cohesion and

Coupling for Class Diagram

through Slicing Techniques

Akhilesh Kumar Software

Engineering Systems

282 0

233 An Insight on Vulnerability Patch

Management in Enterprise

Environment

Rakesh Kumar G L Information Security

Systems

295 0

234 Robust Modelling for

Steganography Using Genetic

Algorithm and Visual

Cryptography for Mitigating RS

Analysis

Akanksha Jain Computer

Applications

304 0

241 Analysis of soft computing in

Neural Network

Premalatha M Computer

Applications

323 1

242 An ID-based Directed Ring

Signature Scheme using Bilinear

Pairings over Elliptic Curves

Umaprasada Rao Bodasingi Information Security

Systems

455 4

242 An ID-based Directed Ring

Signature Scheme using Bilinear

Pairings over Elliptic Curves

K A Ajmath Information Security

Systems

398 4

Page 10 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 11: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

242 An ID-based Directed Ring

Signature Scheme using Bilinear

Pairings over Elliptic Curves

Vasudeva Reddy Punugu Information Security

Systems

342 4

243 Distance based Data aggregation

for Energy Efficiency in Wireless

Sensor Networks

Kusma S M, P I Basarkod,

Veena K N, B P Vijaya Kumar

Computational

Intelligence

Manual 1

249 A QoS based conceptual analysis

in Requirement Engineering for

Service-Based Systems

Priyaradhikadevi T Software

Engineering Systems

447 3

249 A QoS based conceptual analysis

in Requirement Engineering for

Service-Based Systems

Rajalakshmi Ganesh Software

Engineering Systems

328 0

251 A 3D Stacked Mesh NOC for

Reliable Inter-Layer

Communication and Congestion

Reduction

Karthigeyan K A Information

Communication

518 0

252 Mobile Operating System: A

comparative analysis

Rashmi Prajapati Information

Communication

395 0

252 Mobile Operating System: A

Comprative Analysis

Ruchira Shukla Information

Communication

318 0

253 Improved Stereo Disparity

Computation based on Adaptive

weight and Segmentation

Arvind Verma Automated Systems 643 0

253 Improved Stereo Disparity

Computation based on Adaptive

weight and Segmentation

Rachna Verma Automated Systems 320 0

Page 11 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 12: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

255 SVD based Image Watermarking

Technique Implemented for

Different Images

B Chitra Will be classified! 375

256 Fractal Estimation Using

Extended Triangularisation and

Box Counting Algorithm For Any

Geo-Referenced Point Data in GIS

Sridhar Ramachandran Will be classified! 776

257 Review Paper on Software Testing Saumya Rawat Software

Engineering Systems

402 0

257 Review Paper on Software Testing Ruchi Sharma Software

Engineering Systems

403 0

257 Review Paper on Software Testing Ratika Gupta Software

Engineering Systems

309 0

258 Goggle, NOT Google Alok Panchal Human Computer

Interaction

655 1

258 Goggle, NOT Google Abhishek Joshi Human Computer

Interaction

566 1

261 A Hybrid Genetic Algorithm for

the Job Shop Scheduling Problem

Tandra Pal Computational

Intelligence

380 0

261 A Hybrid Genetic Algorithm for

the Job Shop Scheduling Problem

Sudipta Mondal Computational

Intelligence

327 0

262 Low-Low Average Algorithm for

Scheduling Request-demanding

Cloud Workflows Involving

Overheads

Rajagopal Palson Kennedy Cloud Computing 767 0

263 Design of DAODV MANET

Routing protocol

P Shiekabdul Khader Information

Communication

1115 2

Page 12 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 13: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

263 Design of DAODV MANET

Routing protocol

Ilanchezhiapandian

Gurusamy

Information

Communication

856 2

265 An Intelligent Location

Prediction System for Banking

Loans Using Bayes Approach

Singaravelu Rajaprakash Computational

Intelligence

772 0

273 Simulation of Spread Spectrum

Modulation Techniques

Trima Piedade Fernandes e

Fizardo

Signal Processing

Systems

335 0

274 Solar tracking fuzzy control

system using AVR

Microcontroller

Rajendra Kokate Embedded Control

Systems

382 0

274 Solar tracking fuzzy control

system using AVR

Microcontroller

Bharati Sonawane Embedded Control

Systems

376 0

275 Novel Approach for Discovery of

Frequently Occurring Sequences

Emmanuel M Knowledge

Engineering

886 0

275 Novel Approach for Discovery of

Frequently Occurring Sequences

Anupama Phakatkar Knowledge

Engineering

891 0

275 Novel Approach for Discovery of

Frequently Occurring Sequences

Vibhavari Kamble Knowledge

Engineering

866 0

276 Modeling Impact of Varying

Data Rates for Various Spread

Spectrum Techniques on Load in

WLAN Ad-Hoc Mode

Rajan Vohra Information

Communication

344 0

282 An ANN Based Movie Business

Prediction Method using a Subset

of Training Data

Nirmalya Chowdhury Computational

Intelligence

716 0

Page 13 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 14: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

282 An ANN Based Movie Business

Prediction Method using a Subset

of Training Data

Debaditya Barman Computational

Intelligence

633 0

283 Vertical Handover Decision

Schemes in Heterogeneous

Wireless Networks

Archana Sreejith Information

Communication

622 0

286 Brain Computer Interface An

Innovative And Emerging

Engineering Technique Of

Speechless Thought Recognition

Gaurav Londhe Will be classified! 379

287 Finger Vein Biometric

Verification and Authentication:

An Overview

Sumit Kumar Bio-genetic

Computing Systems

394 0

287 Finger Vein Biometric

Verification and Authentication:

An Overview

Shilpi Munshi Bio-genetic

Computing Systems

474 0

287 Finger Vein Biometric

Verification and Authentication:

An Overview

Roop Kanwar Singh Bio-genetic

Computing Systems

476 0

289 A Survey of Optimization of

Resource Scheduling in Cloud

Computing

Bindu K R Cloud Computing 759 0

295 Modified Approach to Fuzzy

Entropy Clustering Method with

Adjustable Membership

Characteristics for Image

Segmentation

Pandiyarajan R Computational

Mathematics

377 3

298 Location Hiding Techniques for

Securing Distributed File System

Snehal Chaudhary Information Security

Systems

390 1

Page 14 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 15: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

298 Location Hiding Techniques for

Securing Distributed File System

Rajesh Ingle Information Security

Systems

730 1

300 Regression Analysis using Log

Data

Anup Jawanjal Knowledge

Engineering

877 0

302 An Algorithm for Dynamic

Search in Unstructured Peer-to-

Peer Overlay Network

Ashish Poste Information

Communication

876 0

303 Information hiding method based

on Steganography and Image

Morphing

Bhushan Zope Signal Processing

Systems

692 0

305 Evaluation Of Intrusion

Detection Technology In Grid

And Cloud Computing

Karthick Ramachandran S Cloud Computing 293 1

306 Study of Grammar tree Using L

System

Vinay Mishra Will be classified! 427

307 Edge Detection Techniques for

Finger-Knuckle Print Biometrics

Mahesh Kumar Bio-genetic

Computing Systems

392 1

307 Edge Detection Techniques for

Finger-Knuckle Print Biometrics

Jasmine R.L Bio-genetic

Computing Systems

360 1

308 CAPTCHA Generated

Monitoring Method for

Precluding Attacks On Servers

Nityanandam Natarajan Information Security

Systems

624 1

308 CAPTCHA Generated

Monitoring Method for

Precluding Attacks On Servers

Bama Ramadoss Information Security

Systems

623 1

314 Mobile Disaster Management

System Using Android

Technology

Deepti Shelar Information

Communication

418 0

Page 15 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 16: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

315 Empirical Validation of Quality

Characteristics of Academic

Websites

Ritu Shrivastava Software

Engineering Systems

439 0

316 Autonomous Network

Reconfiguration of WMN Using

ARS

Mohanram S Embedded Control

Systems

440 0

321 Analysis of Analog Multiplier Arun Katara Digital Computing

Systems

407 0

326 Visual & Web Usage Mining

Based On Extended Server Logs

Dipti Zambre Knowledge

Engineering

673 0

327 Opinion Mining : Extracting and

Analyzing Customers Opinion

Chandrashekhar Badgujar Knowledge

Engineering

677 0

328 Parallel Association Rule for

Data Mining in Multidimensional

Databases

C D Rajaganapathy, T R

Srinivasan, S Gopikrishnan

Knowledge

Engineering

-- 0

330 Universally Compatible DSP

Based Wire Feeder Controller for

MIG Welding System

Paramasivam Shunmugam Digital Computing

System

611 0

330 Universally Compatible DSP

Based Wire Feeder Controller for

MIG Welding System

Thiruvenkadam

Madhulingam

Digital Computing

System

610 0

330 Universally Compatible DSP

Based Wire Feeder Controller for

MIG Welding System

Srinivasan Kesavan Digital Computing

System

494 0

331 Handover Techniques for 4G

Networks

Piyali Dutta Information

Communication

419 0

Page 16 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 17: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

332 Node Localization in Wireless

Sensor Networks using Mobile

Anchor

Harshada Barde Digital Computing

Systems

420 0

333 Comparison of Image

Compression through Neural

Network And Wavelets

Kavita Pateriya Computational

Intelligence

408 0

334 Role of K-Guru in Dynamic

Game Analysis

Kalai Selvi, G V Uma Computer

Applications

428 0

335 Resource Aware Scheduling of

Slow Running Task in Data

Parallel Computing

Kalyani Waghmare High Performance

Computing

879 0

335 Resource Aware Scheduling of

Slow Running Task in Data

Parallel Computing

Bhushan Kandalkar High Performance

Computing

870 0

335 Resource Aware Scheduling of

Slow Running Task in Data

Parallel Computing

Shyam Deshmukh High Performance

Computing

883 0

336 Exploiting the Bit Error Diversity

for Efficient Error Detection in

Multihop Wireless Network

Yanthungbeni Humtsoe Information

Communication

865 0

337 Face Recognition using Fusion of

Thermal and Visual Images

S Vijay Ananth Computational

Intelligence

849 0

337 Face Recognition using Fusion of

Thermal and Visual Images

Thangadurai N Computational

Intelligence

848 0

338 Cloud Computing is an

application of Green

Computing - a new Horizon of

Energy Efficiency and Beyond

Asoke Nath Cloud Computing 829 0

Page 17 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 18: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

338 Cloud Computing is an

application of Green

Computing - a new Horizon of

Energy Efficiency and beyond

Shalabh Agarwal Cloud Computing 509 0

340 Design & Development of Digital

Frequency Multiplier

Sandip Ramteke Electronic Data

Systems

656 0

341 A Visual Interfacing for

Analyzing Three Graph Base

Image Segmentation Algorithms

Yeshwanth Deodhe Computer

Applications

768 0

342 Design and Implementation of

Sensor Network Using Can Bus

Rajesh Deshmukh Digital Computing

System

769 0

344 Ontology Based Question

Answering for

Arijit De Human Computer

Interaction

519 0

345 A Study of Congestion Aware

Adaptive Routing Protocols in

MANET

Shrikant Kokate Information

Communication

409 0

345 A Study of Congestion Aware

Adaptive Routing Protocols in

MANET

Shitalkumar Jain Information

Communication

594 0

346 SMS length expansion and

security approach in a mobile

device

Deepak Manglani Information

Communication

411 0

351 Multy-level Intrusion Detection

System in Cloud Computing

S V Narwane Cloud Computing 483 0

356 Bayesian aspect of Silloughty

estimation in multiview

segmentation

Sabna A B Signal Processing

Systems

433 0

Page 18 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 19: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

358 Dimensionality Reduction

Techniques for Face Image

Retrieval: A Review

Fousiya K K Signal Processing

Systems

469 0

360 Closeness: A New Privacy

Measure for Data Publishing

Harishbabu Kalidasu Will be classified! 414

365 Use of Multiple Concentric Layer

Criteria in Detection of Masses

from Mammograms: A Review

Sasinas Alias Haritha Z A Automated Systems 517 0

366 Mobile Charger without Using

External Power Supply

Dinesh Auti Will be classified! 715

368 Taxonomies, Challenges And

Approaches To Automatic Web

Query Classification

Mohammad Shahid Knowledge

Engineering

460 0

369 E-Learning Model for Quality of

Education Enhancement in

Universities

Kumar Krishnan Computer

Applications

585 2

369 E-Learning Model for Quality of

Education Enhancement in

Universities

Naseem Akthar Computer

Applications

747 2

370 Bayesian MAP Model for Edge

Preserving Image Restoration: A

Survey

Greeshma T.R Knowledge

Engineering

432 0

375 Predicting Data from

Unauthorized User to a

Authorized User Using Fake

Objects

Deepika Manoharan Information Security

Systems

452 0

Page 19 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 20: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

380 E-commerce Security: The Need,

Use and Efficiency of Encryption

Methods for Secure E-commerce

websites

Kishore Bhamidipati Information Security

Systems

532 0

381 Human Age Classification using

2-D Gabor Wavelet and Neural

Network

Jayant Jagtap Signal Processing

Systems

445 0

382 Design and Implementation of

Low Power and Area Efficient

adder and Vedic Multiplier for

FFT

D Jaganathan Embedded Control

Systems

443 0

385 Performance Enchancement of

DWT Processing using GPGPU

Phani Tejaswi K High Performance

Computation

444 0

385 Performance Enchancement of

DWT Processing using GPGPU

Thara Nair High Performance

Computation

681 0

385 Performance Enchancement of

DWT Processing using GPGPU

A V V Prasad High Performance

Computation

682 0

386 Early detection of Cancer using

Bioinformatics

Chandrasekhar Uddagiri Bio-Genetic

Computing

674 0

390 Virtual Integrated Test Team for

Telecommunication Ventures

Sumithra Devi K A Software

Engineering Systems

665 0

390 Virtual Integrated Test Team for

Telecommunication Ventures

Manju Geogy Software

Engineering Systems

451 0

391 Mobile Learning for Senior

Citizens

P F Xavier Patrick Kishore Electronic Data

Systems

465 0

391 Mobile Learning for Senior

Citizens

P Sagaya Aurelia Electronic Data

Systems

449 0

Page 20 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 21: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

391 Mobile Learning for Senior

Citizens

Khamis Faraj Alarabi Electronic Data

Systems

466 0

393 Effect of Topology on Routing

Performance in partially Mobile

Ad-hoc Networks

Ningrinla Marchang Information

Communication

936 0

393 Effect of Topology on Routing

Performance in partially Mobile

Ad-hoc Networks

Nibedita Shial Information

Communication

937 0

394 Opinion Mining For Decision

Making In Medical Decision

Support System - A Survey

A. Ananda Shankar Knowledge

Engineering

587 0

397 Grid Resource Management

Based On Agent Grouping

Arun Prakash Embedded Control

Systems

576 0

399 Low Power Compressed CGRA

Architecture Based Processor

Design

Kishore S Signal Processing

Systems

709 0

400 A Novel Approach Towards

Legal Information Retrieval

Deshnidhi Yadav Will be classified! 473

402 Establishing the Relationship

between Customer Relationship

Management and E- Business

Manu Chopra Management 471 0

403 A Study on SC-FDMA Advance

Access Scheme for 4G

Chandra Shekhar Information

Communication

472 0

406 Optimized Implementation of

Reduced Size LUT in Built in Self-

Testing

A Ajith Kumar Embedded Control

Systems

726 0

Page 21 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 22: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

407 Segmentation of Pulmonary

Nodule in Computed

Tomography Scan for Lung

Disorder Prediction

Mahesh Pawar Computer

Applications

651 0

407 Segmentation of Pulmonary

Nodule in Computed

Tomography Scan for Lung

Disorder Prediction

Vilas Alagdeve Computer

Applications

649 0

408 Towards Agile Project

Management

Nitin Uikey Software

Engineering Systems

482 0

408 Towards Agile Project

Management

Ugrasen Suman Software

Engineering Systems

724 0

410 The recent Advances and future

Trends In Wireless Biotelemetry

System

Madhupriya Senapati Electronic Data

Systems

679 0

411 Design Issues of Bus Arbitration

Schemes in Shared Bus

Multiprocessor(MPSoC)

Neeta Doifode Electronic Data

Systems

657 0

413 An Context Aware Document

Clustering Using Data Fusion

Venkatesh Kumar Electronic Data

Systems

663 0

416 An Efficient Method for Video

Shot Segmentation and

Classification

V Vijayakumar Computer

Applications

468 0

417 Resource allocation in P2P

system using Bit Torrent

Thamaraiselvi

Krishnamoorthy

High Performance

Computing

294 0

418 Transportation Vehicle

Information System Using

Wireless Technology

Sushma Lute Will be classified! 671

Page 22 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 23: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

419 Mathematical Heuristics for Feed

Forward Artificial Neural

Network Design

Aakash Goel Signal Processing

Systems

456 0

419 Mathematical Heuristics for Feed

Forward Artificial Neural

Network Design

Vandit Bhatia Signal Processing

Systems

578 0

423 A Modified Cluster Based Co-

Operative Spectrum Sensing

Algorithm Using Dempster

Shafer Theory

Aliasger Gabuji Information

Communication

564 0

423 A Modified Cluster Based Co-

Operative Spectrum Sensing

Algorithm Using Dempster

Shafer Theory

G. Pawan Kumar Information

Communication

641 0

423 A Modified Cluster Based Co-

Operative Spectrum Sensing

Algorithm Using Dempster

Shafer Theory

Anju Kulkarni Information

Communication

639 0

423 A Modified Cluster Based Co-

Operative Spectrum Sensing

Algorithm Using Dempster

Shafer Theory

Nikhil Agarwal Information

Communication

504 0

425 Image Resolution Enhancement

Based On Edge Directional

Interpolation in Duel Tree-

Complex Wavelet Transform

Suresh L, D Loganathan Signal Processing

Systems

499 0

430 Can Human Computer

Interaction (HCI) bridge the

Digital Divide? A Case of ‘Akash’

in India

Shilpa Tripathi Human Computer

Interaction

748 0

Page 23 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 24: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

431 Security Enhanced Instant

Messaging

Mukul Manmohan Meghwal Information Security

Systems

786 0

431 Security Enhanced Instant

Messaging

Raghuveer Singh Dhaka Information Security

Systems

783 0

431 Security Enhanced Instant

Messaging

Arvind Dhaka Information Security

Systems

550 0

432 Protocol Design For Advanced

Security In Wireless Networks

Raghuveer Singh Dhaka Information

Communication

551 1

432 Protocol Design For Advanced

Security In Wireless Networks

Arvind Dhaka Information

Communication

781 1

433 One Time Password: A Secure

Authentication Scheme

Raghuveer Singh Dhaka Information Security

Systems

784 1

433 One Time Password: A Secure

Authentication Scheme

Arvind Dhaka Information Security

Systems

780 1

433 One Time Password: A Secure

Authentication Scheme

Mukul Manmohan Meghwal Information Security

Systems

552 1

434 Optimized Design variants of a

self-powering CMOS

Optoelectronic VLSI Circuit

Swaminathan S Embedded Control

Systems

735 0

434 Optimized Design variants of a

self-powering CMOS

Optoelectronic VLSI Circuit

Swarrnna Karthik

Parthasarathy

Embedded Control

Systems

737 0

436 Iris Recognition using DWT with

Optimized Decomposition Levels

Sambita Dalal Bio-genetic

Computing Systems

516 1

437 A Review of Wireless Security

Protocols: WEP, WPA and WPA-

2

Raghuveer Singh Dhaka Information Security

Systems

553 0

Page 24 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 25: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

437 A Review of Wireless Security

Protocols: WEP, WPA and WPA-

2

Mukul Manmohan Meghwal Information Security

Systems

785 0

437 A Review of Wireless Security

Protocols: WEP, WPA and WPA-

2

Arvind Dhaka Information Security

Systems

782 0

438 Application Of Graph Theory In

Computer Science(Implementing

Greedy Algorithm For map

Coloring in GSM mobile Network

Mahadevi Namose Signal Processing

Systems

522 1

439 Fabric Defect Detection Using

Statistical Texture Analysis

S Padmavathi Computer

Applications

487 0

444 A Novel Ranking Algorithms for

Ordering Web Search Results

Gaurav Agarwal Knowledge

Engineering

493 0

445 UML Designing and

Comparative Performance of

Various Computer Networks

Neeraj Verma Software

Engineering Systems

490 0

447 Performance & Evaluation of DSS

Using OLAP Techniques In The

Data Warehouse

Renu Yadav Knowledge

Engineering

491 0

448 A Nascent Approach for

Symmetric Key Encryption Using

Double DES

Praful Saxena Digital Computing

Systems

496 0

449 Survey Of Digital Image

Steganography In DWT Domain

Ilavendhan Anandaraj Computer

Applications

567 0

449 Survey Of Digital Image

Steganography In DWT Domain

D Loganathan Computer

Applications

-- 0

Page 25 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 26: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

451 A Comparison of Fuzzy

Clustering Techniques for Image

Segmentation

Prasad Sangare Will be classified! 658

453 Target Geo-Localization System

by Geo-Referencing Mini Aerial

Vehicle Video Mosaics

Mahadeeswara Yadav Automated Systems 745 0

454 Analysis of 4x4 crossbar switch

for Network Processor

Prashant Wanjari Will be classified! 659

456 Key Frame Extraction Based On

Block Based Histogram

Difference and Edge Matching

Rate

Vigneswaran Selvaraj Computer

Applications

488 1

456 Key Frame Extraction Based On

Block Based Histogram

Difference and Edge Matching

Rate

Bremananth Ramachandran Computer

Applications

845 1

457 Autonomous Navigation of

Unmanned Aerial Vehicle Using

Image Flow Algorithm

Annaiyan Arun Automated Systems 746 0

461 Development and Evaluation of a

Document Clustering Engine

Monali Kulkarni Knowledge

Engineering

492 0

468 Analysis of Bent Ground plane

on MIMO Antenna

Bhushan Kalamkar Will be classified! 620

470 Comparative Study Of

Algorithms For Extraction Of

Blood Vessels From Retinal color

Images

Sapana Dhanvijay Will be classified! 732

473 Survey of Security Issues in

Mobile Ad-hoc Network

Praful Pardhi Will be classified! 513

Page 26 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 27: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

475 An Approach For Disease –

Treatment In Medline Using

Semantic Relations

Menaka Ponmalai Signal Processing

Systems

959 0

478 FOSS - A facilitator in teaching Harshad Gune Open Source Systems 738 0

478 FOSS - A facilitator in teaching Akshay Rashinkar Open Source Systems 840 0

479 Design of Fuzzy Logic Scheme

for Speed control of Induction

Motor

Gannavarapu Akhilesh Automated Systems 479 0

480 A Distributed Process System

Architecture for Biological Data

Analysis

Kyoung-Soon Hwang, Chan-

Hee Lee, Keon- Myung Lee

Computer

Applications

621 0

481 SSO Use Case in Cloud

Computing for Securacy to

Worldwide Users

Karunanithi D Cloud Computing 628 0

481 SSO Use Case in Cloud

Computing for Securacy to

Worldwide Users

Kiruthika Balu Cloud Computing 630 0

482 PAPR Reduction Technique in

MIMO-OFDM Based Wireless

Communication

Debasis Surya Narayan Das Signal Processing

Systems

481 0

482 PAPR Reduction Technique in

MIMO-OFDM Based Wireless

Communication

Arun Kumar Ray Signal Processing

Systems

794 0

482 PAPR Reduction Technique in

MIMO-OFDM Based Wireless

Communication

Mihir Narayan Mohanty Signal Processing

Systems

806 0

Page 27 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 28: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

483 Hierarchical Energy Efficient

Protocol for LLC in Wireless

Sensor Networks

Gandhimathi K Software

Engineering Systems

755 1

483 Hierarchical Energy Efficient

Protocol for LLC in Wireless

Sensor Networks

Vinothini Murugan Software

Engineering Systems

648 1

485 Survey of Reactive Routing

Protocols in Mobile Adhoc

Networks

Jayalakshmi V Information

Communication

645 0

486 Real time wind speed analysis

and prediction of wind power

generation using Artificial

Neural Network (ANN)

R Ponnusamy Automated Systems -- 1

486 Real time wind speed analysis

and prediction of wind power

generation using Artificial

Neural Network (ANN)

P Sardar Maran Automated Systems 503 1

487 Certain Optimization Methods

for Design Space Compression of

Arithmetic Circuits

Georgina Binoy Joseph Computer

Applications

863 1

487 Certain Optimization Methods

for Design Space Compression of

Arithmetic Circuits

Ranganathan Vijayaraghavan Computer

Applications

581 1

490 Spontaneous Sorting Clock for

Providing Judgments to Civil

Cases

Annapoorani Venkatesan Will be classified! 514

491 Strong Secure Communication

Technique: Steganography With

Hybrid Cryptography

Smita Bansod Information Security

Systems

442 0

Page 28 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 29: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

493 Discrimination between Airway

Diseases with Similar Symptoms

the Lung Diseases

Sheetal Ukunde Will be classified! 664

494 Node Classification for Energy

Efficient and Reliable

Hierarchical WSN Protocol

Sang-ho Lee Information

Communication

700 0

494 Node Classification for Energy

Efficient and Reliable

Hierarchical WSN Protocol

Ning Sun Information

Communication

588 0

496 A Comprehensive Approach Of

Access Control For E-Commerce

Using Mobile Agents

Vishwanath Panchagnula Will be classified! 788

497 A Data Mining Approach for

Mobility Prediction Using

Wireless Traces

Ananthi J Information

Communication

601 0

497 A Data Mining Approach for

Mobility Prediction Using

Wireless Traces

Ranganathan Vijayaraghavan Information

Communication

862 0

497 A Data Mining Approach for

Mobility Prediction Using

Wireless Traces

Menaka R Information

Communication

861 0

500 Search Based Optimization for

Test Data Generation Using

Genetic Approaches

Kuppuraj Swaminathan Software

Engineering Systems

754 0

500 Search Based Optimization for

Test Data Generation Using

Genetic Approaches

Priya Sudharsan Software

Engineering Systems

614 0

Page 29 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 30: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

502 StegGen:An Optimized

Steganographic Tool Based on GA

Murugeswari K Digital Computing

System

734 0

504 Success and Failure Factors of e-

Government project

implementation in Yemen: An

explore Study

Mahdi Abdullah M. Alsebaei Management 762 0

506 Software designing for shrinkage

testing station DIL 402C

Piotr Kuźmiński, Marek

Hebda

Software

Engineering Systems

Manual 0

512 Efficient Data Storage and

Security Using Data Grid

G Manimala Information Security

Systems

637 1

520 Knowledge Management

Strategies for Implementation of

Green Technologies

Sonali Shirpurkar Badkas Knowledge

Engineering

642 0

522 A Design Model of Banking

Website in Perspective of

Behavioral Feasibility Study

Saravanan C Management 640 0

522 A Design Model of Banking

Website in Perspective of

Behavioral Feasibility Study

Vinay R Management 689 0

525 Component Weight Assignment

Algorithm With SVM : Mining

Reviews For Social And

Economic Support

T Kohilakanagalakshmi Knowledge

Engineering

570 0

525 Component Weight Assignment

Algorithm with SVM: Mining

Reviews for Social and Economic

Support

Tina Esther Trueman Knowledge

Engineering

634 0

Page 30 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 31: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

527 Band Limited Linear Predictive

Coding Vocoder in Digital

Hearing Aids

Sharmina Bharwani Will be classified! 744

528 Thresholding Techniques for

Skull Stripping the MRI Brain

Images

Mahesh Pawar Signal Processing

Systems

721 0

528 Thresholding Techniques for

Skull Stripping the MRI Brain

Images

Vijendra Meshram Signal Processing

Systems

720 0

530 A Correlative Analysis of

Methodologies Involved In

Ontology Construction for E-

Learning

Suresh R M Knowledge

Engineering

666 0

530 A Correlative Analysis of

Methodologies Involved In

Ontology Construction for E-

Learning

Rebecca Amulya D Knowledge

Engineering

779 0

535 Auscultation and Separation of

Heart Sound from Respiratory

Sound Using Lab-View

Yogesh Gaidhane Computer

Applications

546 0

535 Auscultation and Separation of

Heart Sound from Respiratory

Sound Using Lab-View

Zahir Quazi Computer

Applications

931 0

539 Comparative Study between

Traditional and Heuristic

Approach on Close-degree

Concept Lattice for better

Attribute Reduction

Ravindra Gupta Will be classified! 714

Page 31 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 32: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

543 A Newfangled Approach to

Semantic Search for E-Tourism

Domain

Palaniammal K Will be classified! 688

545 Application of UML Design

Documents with Design Metrics

and OCL Specification for

Critical Component Identification

A. Jalila Will be classified! 695

546 Ranking of Documents in

Semantic Web using Particle

Optimization

Sanjeeve Kumar Knowledge

Engineering

892

546 Ranking of Documents in

Semantic Web using Particle

Optimization

Selvarani CM Knowledge

Engineering

992

546 Ranking of Documents in

Semantic Web using Particle

Optimization

Francis Densil Raj Knowledge

Engineering

733

549 Analysis of Computational Errors

in Digital Signal Processing with

Voltage Scaling

Vishwas Balpande Signal Processing

Systems

704 0

550 A Combinatorial Approach for

Design of Fuzzy Based Intrusion

Detection System

Bhuvaneswaran R S Computational

Intelligence

751 2

550 A Combinatorial Approach for

Design of Fuzzy Based Intrusion

Detection System

Vydeki Dharmar Computational

Intelligence

702 2

553 Implementation of Differentiator

Using PFG

Sonalee Suryawanshi Signal Processing

Systems

731 0

Page 32 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 33: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

554 SMPS With Linear PWM

Technique

Ishan Chintawar Electronic Data

System

706 0

555 Performance Analysis of Routing

Protocols in Mobile Adhoc

Netoworks

Th. Ibungomacha singh Information

Communication

727 0

556 Implementation of DS-SS Based

CDMA Transmitter and Receiver

Using Gold Code for FPGA

Kshama Dawile Electronic Data

Systems

743 0

557 An Improved Approach to F-

COCOMO using PI Membership

Function

Anupama Kaushik Software

Engineering Systems

774 0

559 APC-OMS Combined LUT for

Memory Based Computation

Eldho John Electronic Data

Systems

583 2

562 Gas Identification Using

Artificial Intelligence Tecnique

Poonam Agarkar Will be classified! 741

564 Extended Diffie-Hellman

Algorithm for Key Exchange and

Management

Akhil Kaushik Will be classified! 712

566 Literature Survey and Proposed

Concept on Performance Issue of

Multicasting Routing Protocol in

Wireless Sensor Network

Rahul Verma Information

Communication

699 0

566 Literature Survey and Proposed

Concept on Performance Issue of

Multicasting Routing Protocol in

Wireless Sensor Network

Akhilesh Waoo Information

Communication

835 0

Page 33 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 34: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

566 Literature Survey and Proposed

Concept on Performance Issue of

Multicasting Routing Protocol in

Wireless Sensor Network

Pushpinder Singh Patheja Information

Communication

836 0

567 Literature Survey on LEACH

Protocol in Wireless Sensor

Network

Aishwary Agrawal Digital Computing

Systems

698 0

568 Performance Analysis of Simple

Adaptive Median Filter In

Reducing Impulse Noise Level

from Digital Images

Vicky Ambule Will be classified! 740

569 Literature Survey and Proposed

model to Enhance Security of

Database

Naveen Kolhe Knowledge

Engineering

684 0

571 A Metrics Driven Approach to

Specify Usable Security in Web

Service Discovery

Marimuthu Govindaraj Will be classified! 728

574 A New Early Parsing Algorithm

for Lexicalized Tree Adjoining

Grammar

Sharafudheen Kambunkal Human Computer

Interaction

818 0

576 Designing A High-Performance

Scalable Framework Over Cloud

For Managing Online

Programming Contests

Amol khanapurkar, Mohit

Nanda, Ravi Ojha

Will be classified! Manual

577 Power Reduction Technique in

Testing Of VLSI Circuits

Arun Mohan Electronic Data

Systems

687 0

578 Self Test Technique for Two Fish

Algorithm

Rahul R Nair Computer

Applications

670 0

Page 34 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 35: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

580 An Intelligent Image Retrieval

based on Wavelet Transform and

Similarity Method

K Seetharaman Signal Processing

Systems

843 1

580 An Intelligent Image Retrieval

based on Wavelet Transform and

Similarity method

M Kamarasan Signal Processing

Systems

719 1

586 WEB 2.0 Shweta Gode Will be classified! 766

587 Issues and Challenges in a Cloud

Computing Environment

A. Murali M Rao Cloud Computing 753 0

592 Intrusion Detection System using

Outlier Detection and

Classification Techniques

Jaishankar N Will be classified! 834

592 Intrusion Detection System using

Outlier Detection and

Classification Techniques

Sumesh Manikandan Will be classified! 764

593 Extraction of Signal features from

Deaf-mute Voice Signal

Nirmala Devi J, K

Bomannaraja

Signal Processing

Systems

949 0

601 Securing IPv6 Signaling for

SCADA Wireless Sensor Network

Hoon Ko, Yvette Gelogo, Tai-

Hoon Kim

Information Security

Systems

Manual 1

602 Smart Grid in Cloud Computing

Infrastructure: Review

Byeong-Ho Kang,Yvette

Gelogo

Cloud Computing Manual 1

603 The Cohesive Countermeasure

Schemes for Securing Wireless

Sensor Networks against

Vulnerabilities and Attacks:

Review

Ronnie D. Caytiles, Tai-hoon

Kim, Dominik Slezak

Information

Communication

Manual 1

Page 35 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.

Page 36: auth_regn

ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights

608 A Robust Design of RTU Sensor

Nodes Communication for

SCADA System

Sabah Mohammed, Ronnie

D. Caytiles and Tai-hoon Kim

Information

Communication

Manual 1

609 Secured SCADA System in Smart

Grid Deployment

Yvette Gelogo, Tai-Hoon Kim Information

Communication

Manual 1

610 Advanced Congestion Adaptive

Routing Mechanisms in MANET

Geetam Tomar Will be classified! 872

611 New Improved Methodology in

Advanced Driver Assistance

System

Sanket Borhade Will be classified! 935

618 Tele-Operative Ophthalmoscope Bharath Kumar Will be classified! 1089 1

622 Green ICT and its Global Impact Vinita Maheshwari Will be classified! 1085

624 Achieving Competetive

Advantage Using Automated

Securities Validation

Raghu Nemani Will be classified! 1071

631 Analysis of Foreign Direct

Investment in Service Sector: A

Study With Reference To India

K Maran Management 1123

Page 36 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10

2. Only the registered authors name will be available in certificate and proceedings.