CONFERENCE DATE: Date: 10th April, 2016 Venue: Chennai, India |
High Level Semantic Image Retrieval Algorithm For Corel Database | |||||||||||
Page(s): | 1-5 | ||||||||||
Author | Jenney Ann Varghese, Thusnavis Bella Mary.I | ||||||||||
|
Mapping Multi-Tier Architecture Into Cloud Environment Using Slicing and Virtualization | |||||||||||
Page(s): | 6-10 | ||||||||||
Author | Sheshadhri.R, Nithiya | ||||||||||
|
A Dual Band-Notched Antenna Using T-Stub and C-Stubs For UWB Communication | |||||||||||
Page(s): | 11-13 | ||||||||||
Author | Drishti Gandhi, Nishant Soni, Niraj Kumar | ||||||||||
|
Implementing IoT in SHS Using Multi-Reader RFID | |||||||||||
Page(s): | 14-18 | ||||||||||
Author | S. Porselvi, G.Sekar | ||||||||||
|
Security in Cloud Computing | |||||||||||
Page(s): | 19-23 | ||||||||||
Author | Tanu Singh | ||||||||||
|
Path Planning Strategy and Detection of Intruder in VANET Using Real Time Transportation System | |||||||||||
Page(s): | 24-27 | ||||||||||
Author | S.Sumathi, U.Balabharathy, K.N.Manojkumar, Vishall Jayaraman | ||||||||||
|
Enhancing Search Efficiency Over Encrypted Data in Cloud | |||||||||||
Page(s): | 28-30 | ||||||||||
Author | Hemavathi S, Harish Sundar, Aravind Suresh, Srikrishna S | ||||||||||
|
Microwave Based Sensors For Crack Detection | |||||||||||
Page(s): | 31-35 | ||||||||||
Author | Konark Goel, Piyush Gupta, Usha Kiran K | ||||||||||
|
Emission Characteristics of Cerium Oxide Nanoparticle Blended Emulsified Biodiesel | |||||||||||
Page(s): | 36-39 | ||||||||||
Author | Joshua Marcus Paul, Gowdham .D | ||||||||||
|
A Fuzzy Programming Approach to Inventory Control Problem | |||||||||||
Page(s): | 40-43 | ||||||||||
Author | Neha Kumari, A.P.Burnwal | ||||||||||
|
Domotics Using Internet of Things | |||||||||||
Page(s): | 44-47 | ||||||||||
Author | Nishant Horo, Prabaharan .R, Prem .G, J. Antony Masila Victoria | ||||||||||
|
Optimal Tuning of Facts Controllers For Power System Stability Enhancement | |||||||||||
Page(s): | 48-54 | ||||||||||
Author | E.Kirankumar, V.C.Veera Reddy, P.Hema Chandu | ||||||||||
|
Bluetooth Based Automation System With Secured Access | |||||||||||
Page(s): | 55-59 | ||||||||||
Author | Pranjay Popli, Soumya Samirana, V Sumathi | ||||||||||
|
Modeling Customer Satisfaction For Product Development Using Social Media | |||||||||||
Page(s): | 60-62 | ||||||||||
Author | Vikas Kumar, B.Bharathi, Vaibhav Kalind | ||||||||||
|
A Survey on Human Computer Interaction For Accessing Cursor of Computer With the Help of Electrooculogram Signal | |||||||||||
Page(s): | 63-65 | ||||||||||
Author | Juhi R. Bobade, Muktra D. Khirwadkar | ||||||||||
|
Is Internet Neutrality a Form of Internet Censorship | |||||||||||
Page(s): | 66-68 | ||||||||||
Author | Nand Kumar Singh, Ajay Kumar Yadav | ||||||||||
|
Compact Multi Band Stub Loaded Slot Antenna For Wireless Applications | |||||||||||
Page(s): | 69-72 | ||||||||||
Author | S.Vikram, M.C.Vigneshwaran, R.Pratik, A.Pramath | ||||||||||
|
Wireless Motor Control Using GSM Technology For Industrial Application | |||||||||||
Page(s): | 73-75 | ||||||||||
Author | Shreya S Kudalkar, H.G. Virani | ||||||||||
|
An 8-bit Pipeline ADC Scaled Down From 180nm to 90nmat 250MHz Nyquist Frequency to Obtain 6B ENOB and 40.4dB SNDR | |||||||||||
Page(s): | 76-80 | ||||||||||
Author | Aesha S. Zala | ||||||||||
|
Design, Synthesis and Biological Evolution of Trimethoxyphenyl Cinnamide Derivatives as Anti-Cancer Agents | |||||||||||
Page(s): | 81-83 | ||||||||||
Author | Bajee Shaik, Jeevak Sopanrao Kapure, Ahmed Kamal | ||||||||||
|
Energy Control Center (ECC) For DERs Using Multi-Agent System By Soft Computing Technique | |||||||||||
Page(s): | 84-91 | ||||||||||
Author | V.Sravani, K.Dharanisree | ||||||||||
|
Automated Billing System Using Li-Fi (Light Fidelity) Technology | |||||||||||
Page(s): | 92-96 | ||||||||||
Author | T.P.Rani, B.Anees, N.Geetha Priya, S.Mahalakshmi | ||||||||||
|
Numerical Simulation of Airfoil Vibration | |||||||||||
Page(s): | 97-102 | ||||||||||
Author | Mahender Reddy Anumula, A. Daniel Antony | ||||||||||
|
Autonomous Staircase Climbing Robot | |||||||||||
Page(s): | 103-108 | ||||||||||
Author | Tejaswini, Narendra Kumar | ||||||||||
|
OTP Based Secure Authentication | |||||||||||
Page(s): | 109-111 | ||||||||||
Author | Mukesh Mehta, Aditya A. Belhe, Prince Raj Singh, Maqsood Choudhary, Smita Chopade | ||||||||||
|
Potent Statistics Distribution With Multi-User Modification in Public Integrity Auditing | |||||||||||
Page(s): | 112-114 | ||||||||||
Author | S.Meera, Suresh.D, Sachin.K, Senthilvel.A | ||||||||||
|
Autonomous Path Planning and the Navigation of A UAV in a Constrained Environment | |||||||||||
Page(s): | 115-118 | ||||||||||
Author | N.Ramasamy, S.Sivasubramanian, S.Sathish, S.Lakshmi | ||||||||||
|
A Review on Text Mining in Cloud Using Feature Selection Techniques | |||||||||||
Page(s): | 119-123 | ||||||||||
Author | B.Balavinothini, N.Gnanambigai | ||||||||||
|
Eradication of False Voting | |||||||||||
Page(s): | 124-129 | ||||||||||
Author | Aravind. S, bharath. S, chitrarasan. K, Fazil. K, kathikeyan. B | ||||||||||
|
Efficient Recommendation System Using Machine Learning | |||||||||||
Page(s): | 130-135 | ||||||||||
Author | Kailash Nathan, Dhyan Selvam, Abhay Krishnan | ||||||||||
|
Optimized Privacy �Preserving Authentication and Protection of Network by Using Dove Protocol | |||||||||||
Page(s): | 136-138 | ||||||||||
Author | Anand, Gunalan, Vamshi, Siddarth | ||||||||||
|
Authorized Node Recognition and Acceptance For Data Exchange and Vice Versa in Sensor Networks Deployed in Single and Multi-Network Schemas | |||||||||||
Page(s): | 139-142 | ||||||||||
Author | Kawser Mohiuddin, K. P. Yadav | ||||||||||
|