SUBJECT CATEGORY : Computer Science Engg., Information Technology, Electronic and Telecommunication Engineering, Electrical Engineering

Volume 5, Special Issue 2, May 2015 ( ISSN 2250 – 2459 (Online)

International Conference on Advances in Computer and Communication Engineering (ACCE-2015)

An ISO 9001:2008 Certified Journal

S.No.

Title of Paper

Page No.
1.

High Dynamic Range Image Compression Using Hierarchy Approach

Authors: Chandana k v, Dr .Vivek M

1-4
2.

Skew Types Mitigating Techniques to Increase the Performance of MapReduce Applications

Authors: Vinutha J, Chandramma R

5-11
3.

Challenges in Designing Interface chip for Wearable Healthcare System

Authors: Chandrakant S. Ragit, Dr .Sanjay Badjate

12-16
4.

Increasing Efficiency Of Mobile Sink WSN Using Global Best Positioning Mechanism

Authors: Arpitha Vasudev, G. Fazal Mahemood

17-21
5.

Neural Network Based Technique for USD Exchange Rate Forecasting in R

Author: Bhargavi K

22-25
6.

A Novel Low Cost Efficient 2-Dimensional Palmprint Biometric Authentication System

Authors: Sendil Kumar. S, Brindha. M

26-29
7.

AIDI: Adaptive Image Denoising IP-Core Based on FPGA for Real Time Application

Authors: Honnambika M, Latha K, Shishir K

30-40
8.

Efficient CBIR Technique Using Color, Texture and Shape Features in Sketches

Authors: K. Sumana, Anargha Remesh

41-44
9.

Dynamic Range Enhancement of Images using Scalable Pyramids

Authors: Swetha S, Dr .Vivek M

45-49
10.

An Enhancement of Reliable Reactive Protocol for Secure Packet Transmission

Authors: Sparshakala V.S., Rajesh K.S.

50-58
11.

Blur Analysis and Removal in Underwater Images using Optical Priors

Authors: Lathamani K.M., Vivek Maik

59-65
12.

Logic Implementation of S-Box

Authors: Sandhya.N , Dr. Aswatha Kumar M.

66-68
13.

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

Authors: Abhirupa Chatterjee, Divya. R. Krishnan, P. Kalamani

69-74
14.

A Service Level Agreement based Implementation of Security in Distributed Storage System

Authors: Shruthi Shetty J, Manjunath Kotari

75-78
15.

Robust Iris Recognition using DU-Fusion

Authors: Sudha D, K N Narasimha Murthy

79-83
16.

Intelligent Agents and Autonomous Cars

Authors: Sumarani.H, Chiranth B O, Yogitha Lakshmi K S

84-88
17.

A Survey on Malicious Node Detection in Mobile Access WSN under Byzantine Attacks

Authors: Dinesh K. R, Kavitha Bai, A. Rosline Mary

89-94
18.

A Cached Middleware to Improve I/O Performance using POSIX Interface

Authors: Jesna fathima, Dr Ambareesh S

95-100
19.

Identification of Facial Gestures and Audio Visual Interactions Using Ensemble Matrix of Multi Classifiers

Authors: Deepa S, Mamatha C R, Rashmi R

101-108
20.

A Secure Approach Using Fingerprint for Online Voting

Authors: Mukesh Kumar, Vidhya S, Sonika Somaiah, Spandana N.V.

109-114
21.

Generating Visual Abstract of Topological Areas using Neighborhood given Images- A Survey

Authors: Priya C, Supriya R, Jayashree L K

115-121
22.

Li-Fi (Light Fidelity)

Authors: Sangeethasagar. H. J, Subha. N, Vinaya. S, Yamuna. M

122-125
23.

Privacy Preserving Publishing of Social Network Data Privacy and Big Data Mining

Authors: Suma Reddy, Shilpa G V

126-135
24.

A Comprehensive Survey on Big Data Issues and Alternative Approaches to Hadoop MapReduce

Authors: Gauri S. Rapate, Nandita Yambem

136-142
25.

Efficient Routing Protocol with Trust Management for Wireless Sensor Network

Authors: Shilpa N, Dr. S. Ambareesh

143-148
26.

Detection of Bots and Bot Master in P2P Network

Authors: Jyothi Belgoankar, Kantharaju H.C.

149-154