International Conference on Advances in Computer and Communication Engineering (ACCE-2015)
S.No. |
Title of Paper |
Page No. |
1. |
High Dynamic Range Image Compression Using Hierarchy
Approach
Authors: Chandana k v, Dr .Vivek M |
1-4 |
2. |
Skew Types Mitigating Techniques to Increase the Performance of MapReduce Applications
Authors: Vinutha J, Chandramma R |
5-11 |
3. |
Challenges in Designing Interface chip for Wearable
Healthcare System
Authors: Chandrakant S. Ragit, Dr .Sanjay Badjate |
12-16 |
4. |
Increasing Efficiency Of Mobile Sink WSN Using Global Best
Positioning Mechanism
Authors: Arpitha Vasudev, G. Fazal Mahemood |
17-21 |
5. |
Neural Network Based Technique for USD Exchange Rate
Forecasting in R
Author: Bhargavi K |
22-25 |
6. |
A Novel Low Cost Efficient 2-Dimensional Palmprint
Biometric Authentication System
Authors: Sendil Kumar. S, Brindha. M |
26-29 |
7. |
AIDI: Adaptive Image Denoising IP-Core Based on FPGA for
Real Time Application
Authors: Honnambika M, Latha K, Shishir K |
30-40 |
8. |
Efficient CBIR Technique Using Color, Texture and Shape
Features in Sketches
Authors: K. Sumana, Anargha Remesh |
41-44 |
9. |
Dynamic Range Enhancement of Images using Scalable
Pyramids
Authors: Swetha S, Dr .Vivek M |
45-49 |
10. |
An Enhancement of Reliable Reactive Protocol for Secure
Packet Transmission
Authors: Sparshakala V.S., Rajesh K.S. |
50-58 |
11. |
Blur Analysis and Removal in Underwater Images using Optical
Priors
Authors: Lathamani K.M., Vivek Maik |
59-65 |
12. |
Logic Implementation of S-Box
Authors: Sandhya.N , Dr. Aswatha Kumar M. |
66-68 |
13. |
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose
Authors: Abhirupa Chatterjee, Divya. R. Krishnan, P. Kalamani |
69-74 |
14. |
A Service Level Agreement based Implementation of
Security in Distributed Storage System
Authors: Shruthi Shetty J, Manjunath Kotari |
75-78 |
15. |
Robust Iris Recognition using DU-Fusion
Authors: Sudha D, K N Narasimha Murthy |
79-83 |
16. |
Intelligent Agents and Autonomous Cars
Authors: Sumarani.H, Chiranth B O, Yogitha Lakshmi K S |
84-88 |
17. |
A Survey on Malicious Node Detection in Mobile Access WSN under Byzantine Attacks
Authors: Dinesh K. R, Kavitha Bai, A. Rosline Mary |
89-94 |
18. |
A Cached Middleware to Improve I/O Performance using POSIX Interface
Authors: Jesna fathima, Dr Ambareesh S |
95-100 |
19. |
Identification of Facial Gestures and Audio Visual Interactions
Using Ensemble Matrix of Multi Classifiers
Authors: Deepa S, Mamatha C R, Rashmi R |
101-108 |
20. |
A Secure Approach Using Fingerprint for Online Voting
Authors: Mukesh Kumar, Vidhya S, Sonika Somaiah, Spandana N.V. |
109-114 |
21. |
Generating Visual Abstract of Topological Areas using Neighborhood given Images- A Survey
Authors: Priya C, Supriya R, Jayashree L K |
115-121 |
22. |
Li-Fi (Light Fidelity)
Authors: Sangeethasagar. H. J, Subha. N, Vinaya. S, Yamuna. M |
122-125 |
23. |
Privacy Preserving Publishing of Social Network Data
Privacy and Big Data Mining
Authors: Suma Reddy, Shilpa G V |
126-135 |
24. |
A Comprehensive Survey on Big Data Issues and Alternative
Approaches to Hadoop MapReduce
Authors: Gauri S. Rapate, Nandita Yambem |
136-142 |
25. |
Efficient Routing Protocol with Trust Management for Wireless
Sensor Network
Authors: Shilpa N, Dr. S. Ambareesh |
143-148 |
26. |
Detection of Bots and Bot Master in P2P Network
Authors: Jyothi Belgoankar, Kantharaju H.C. |
149-154 |
27. |
Deliberation and Exertion of Wireless Body Area
Networks for Exclusive Health Care Supervision
Authors: Kumar Keshamoni, Dr. Manoj |
155-160 |