CONFERENCE DATE: Chennai,20th Oct. |
SVM BASED DETERMINING ATTACKERS AND LOCALIZING ADVERSARIES IN WIRELESS NET WORKS | |||||||||||
Page(s): | 1-5 | ||||||||||
Author | S.VELMURUGAN,N.PRAVEEN | ||||||||||
|
IMPLEMENTING COBS ZPE IN C# | |||||||||||
Page(s): | 6-10 | ||||||||||
Author | KEERAT SINGH | ||||||||||
|
E ? STREET: LED POWERED INTELLIGENT STREET LIGHTING SYSTEM WITH AUTOMATIC BRIGHTNESS ADJUSTMENT BASED ON CLIMATIC CONDITIONS AND VEHICLE MOVEMENTS | |||||||||||
Page(s): | 11-16 | ||||||||||
Author | M.ARCHANA | ||||||||||
|
SMART DUST FOR TACTICAL BORDER SURVEILLANCE TO DETECT, CLASSIFY AND TRACK ENEMY INTRUSION USING ACOUSTIC-MAGNETIC-THERMAL-VIBRATION SIGNATURES | |||||||||||
Page(s): | 17-22 | ||||||||||
Author | KISHORE KUMAR S | ||||||||||
|
ONLINE HAND WRITTEN CHARACTER RECOGNITION USING DIGITAL PEN FOR STATIC AUTHENTICATION | |||||||||||
Page(s): | 23-27 | ||||||||||
Author | RENUKA R,SUGANYA V & ARUNKUMAR B | ||||||||||
|
EFFICIENT COMMUNICATION INFRASTRUCTURES FOR SMART GRIDS | |||||||||||
Page(s): | 28-34 | ||||||||||
Author | SUGANYA V, RENUKA R, SAKTHIVEL S | ||||||||||
|
A PROPOSED STRATEGY FOR CAPACITOR ALLOCATION IN RADIAL DISTRIBUTION FEEDERS | |||||||||||
Page(s): | 35-39 | ||||||||||
Author | P.DIVYA, PROF & G.V.SIVA KRISHNA RAO | ||||||||||
|
COMPUTATIONAL INVESTIGATION OF FLOW WITHIN C-D RECTANGULAR SUPERSONIC NOZZLE AND IMPULSE TURBINE. | |||||||||||
Page(s): | 40-46 | ||||||||||
Author | K AJAY & L SUJATHA | ||||||||||
|
THE TALKING GLOVE | |||||||||||
Page(s): | 54-58 | ||||||||||
Author | BALJIT SINGH BHAYANA, POOJA JAMDADE & DAKSHATA KHATATE | ||||||||||
|
THERMAL MANAGEMENT AND OPTIMAL VOLTAGE ASSESSMENT OF DIFFERENT COMPONENTS OF A HEV | |||||||||||
Page(s): | 59-62 | ||||||||||
Author | ER. VARUN PUNDHIR, ASST. PROF. MANISHA GUPTA | ||||||||||
|
ENVISIONED NGN ARCHITECTURE WITH DEPLOYMENT RELATED ISSUES & CORE TECHNOLOGY SERVICES IN NGN PLATFORM | |||||||||||
Page(s): | 63-66 | ||||||||||
Author | SALAVADI ANANDA KUMAR, (PHD) & K.E.SREENIVASA MURTHY | ||||||||||
|
EFFICIENT IN REVOKING CERTIFICATES OF MALICIOUS NODES IN MANET | |||||||||||
Page(s): | 67-70 | ||||||||||
Author | E.K NEENA & C. BALAKRISHNAN | ||||||||||
|
AN EFFICIENT TRACKING OF HUMAN MOBILITY AND EVENTS BASED ON WPS USING ANDROID TECHNOLOGY | |||||||||||
Page(s): | 71-75 | ||||||||||
Author | P. PADMAVATHY & C. BALAKRISHNAN | ||||||||||
|
A SURVEY ON DETECTION TECHNIQUES OF MALICIOUS SOFTWARE OR MALWARE | |||||||||||
Page(s): | 76-78 | ||||||||||
Author | PANKAJ DEOSKAR, ANJU SINGH, DIVAKAR SINGH | ||||||||||
|
A SECURED ELECTRONIC TOLL COLLECTION SYSTEM BASED ON AMBIENT BACKSCATTER RF SIGNAL | |||||||||||
Page(s): | 79-83 | ||||||||||
Author | SHILPI AGRAWAL, CHETNA, V.V AMRUTHA & MAHESWARI.R | ||||||||||
|
BIOMETRIC SKELETONIZED SIGNATURE AUTHENTICATION USING THERMAL IMAGES | |||||||||||
Page(s): | 84-89 | ||||||||||
Author | MS.P.VIPITH & MRS.R.VALARMATHI | ||||||||||
|
TEMPORAL CHANGE PATTERN DISCOVERY IN THE PRESENCE OF A GENERALIZATION HIERARCHY BASED ON FP-GROWTH | |||||||||||
Page(s): | 90-96 | ||||||||||
Author | LEKHA C. WARRIER, ARIFA AZEEZ | ||||||||||
|
DC-DC BOOST CONVERTER FOR HIGH POWER APPLICATIONS | |||||||||||
Page(s): | 97-103 | ||||||||||
Author | KHADIRA SAFAR & D.MEHER MADHU | ||||||||||
|
DC-DC BOOST CONVERTER FOR HIGH POWER APPLICATIONS | |||||||||||
Page(s): | 104-108 | ||||||||||
Author | KHADIRA SAFAR & D.MEHER MADHU | ||||||||||
|
IMPROVE DISPLAY QUALITY OF SYMMETRIC IMAGE SIZE FOR COMMON ADMISSION STRUCTURES IN VISUAL CRYPTOGRAPHY | |||||||||||
Page(s): | 109-114 | ||||||||||
Author | S.DEVASENA,S.SUDHA | ||||||||||
|
IMAGE RESIZING BY USING SALIENCY DETECTION WITH SELECTIVE DISSIMILARITIES TECHNIQUE | |||||||||||
Page(s): | 115-118 | ||||||||||
Author | S.GRACE RAJA MARY,MRS.D.KIRUBHA | ||||||||||
|
AN IMPROVED APPROACH FOR SEARCH RESULTS USING WEB MINING | |||||||||||
Page(s): | 119-123 | ||||||||||
Author | M. VASUKI & R.KANAGA SELVI | ||||||||||
|
EVALUATION OF TWIG PATTERN QUERIES FOR STREAMING XML DATA USING LINEAGE ENCODING | |||||||||||
Page(s): | 124-126 | ||||||||||
Author | S.NITHYA & B.LALITHA | ||||||||||
|
SUPERIOR QUALITY OF FEATURE SUBSET SELECTION USING FAST CLUSTERING | |||||||||||
Page(s): | 127-129 | ||||||||||
Author | J.DIVYA,B.LALITHA | ||||||||||
|
AVOID PACKET REPLICATION ATTACK BASED ON INTRUSION DETECTION AND DEFENSE MECHANISM OVER MANET | |||||||||||
Page(s): | 130-135 | ||||||||||
Author | RADHAKRISHNAN S.R , MUTHUKUMAR S , DR.RUBA SOUNDAR.K | ||||||||||
|
MEASURING DENIAL OF SERVICE ATTACKS USING EFFECTIVE METRICS IN WIRELESS NETWORKS | |||||||||||
Page(s): | 136-143 | ||||||||||
Author | MUTHUKUMAR.S, DR.RUBA SOUNDAR.K, K.MATHANKUMAR & V.RAMACHANDRAN | ||||||||||
|
A HEURISTIC OPTIMAL RESOURCE ALLOCATION OF VIRTUAL NETWORK EMBEDDING IN CLOUD COMPUTING | |||||||||||
Page(s): | 144-149 | ||||||||||
Author | MALINI.A & MUTHU RAGAVI.M | ||||||||||
|
IMPROVING THE PERFORMANCE OF VIDEO SURVEILLANCE USING DECISION MAKING FRAMEWORK | |||||||||||
Page(s): | 150-153 | ||||||||||
Author | D.KIRUBHA & DR.K.RAMAR | ||||||||||
|
ALGORITHM FOR IDENTIFYING RELEVANT FEATURES FOR HIGH DIMENSIONAL DATA | |||||||||||
Page(s): | 154-157 | ||||||||||
Author | AbinayaSangari,Mrs.Delsi Howsalya Devi | ||||||||||
|
FIELD ORIENTED CONTROL OF SENSORLESS PMSM USING SLIDING MODE OBSERVER AND SPACE VECTOR PWM | |||||||||||
Page(s): | 158-163 | ||||||||||
Author | REMITHA. K. MADHU & ANNA MATHEW | ||||||||||
|
NUMERICAL SIMULATION OF EXPLOSIVE FORMING OF RHA AND 4340 STEEL SHEETS | |||||||||||
Page(s): | 164-169 | ||||||||||
Author | MAHESHWARI RAHANGDALE, M. D. GOEL,R. K. MORCHHALE,ABHISHEK JAIN,A. K. SINGH | ||||||||||
|
STUDY OF MICROSTRUCTURE AND MECHANICAL PROPERTIES OF DISSIMILAR AL-CU FRICTION STIR WELDED LAP JOINT | |||||||||||
Page(s): | 170-173 | ||||||||||
Author | K.Elangovan, Kalaiselvan.J, Vigneshram S.K, Vinoth Kumar C, Vivek Ananthakrishnan | ||||||||||
|
KNW-CAPTCHA CREATION USING GIBBS RESAMPLING ALGORITHM | |||||||||||
Page(s): | 174-179 | ||||||||||
Author | J.LILLY EVANGALIAN ,EDITH S.SUDHA | ||||||||||
|
THERMAL IMAGING AS A BIO METRICS MOVES TOWARDS TO FACIAL SIGNATURE SUBSTANTIATION | |||||||||||
Page(s): | 180-184 | ||||||||||
Author | T.KANNIKA AMIRTHAVALLI,D.KIRUBHA | ||||||||||
|
A NOVEL GENERAL ARCHITECTURE DESIGN FOR DATA INTEGRITY ASSURANCE ON LIMITED LOCAL MEMORY | |||||||||||
Page(s): | 185-188 | ||||||||||
Author | PATHMA.PA & VINOLI.JA | ||||||||||
|
MEMORY BASED APPROACH TO MINE FREQUENT PATTERNS | |||||||||||
Page(s): | 189-192 | ||||||||||
Author | P. PUSHPALATHA & DR.N.V.E.S. MURHTY | ||||||||||
|
REVIEW ON PAPER OF VEDIC ADIABATIC MULTIPLIER | |||||||||||
Page(s): | 193-198 | ||||||||||
Author | VISHAK.KARANTH.K,KESHAV.KOWSHIK.D.S & ASHRITH.S.HARITH | ||||||||||
|
CONTENT BASED IMAGE RETRIEVAL ALGORITHM USING LOCAL TETRA TEXTURE FEATURES | |||||||||||
Page(s): | 208-211 | ||||||||||
Author | M. RISVANA FATHIMA, M. KAJA MOHAIDEEN, S. SAKKARAVARTHI | ||||||||||
|