SUBJECT CATEGORY : Computer Science Engg., Information Technology, Electronic and Telecommunication Engineering, Electrical Engineering

Volume 3, Special Issue 1, January 2013 (ISSN 2250 – 2459 (Online), An ISO 9001:2008 Certified Journal)

International Conference on Information Systems and Computing (ICISC-2013), INDIA

Organized by

Sri Sai Ram Engineering College, An ISO 9001:2008 Certified & NBA Accredited Engineering Institute, Chennai, INDIA

Convenor: Dr. T. Sheela, HOD,  Department of Information Technology.

S.No.

Title of Paper

Page No.
1.

A Broker-Based Web Service Architecture for Service Registration and Discovery with QoS

Authors: Dr. T.Rajendran

1-13
2.

Remote Data Integrity in Cloud Security Services

Author: P.Dhanalakshmi, V.Ramesh

14-18
3.

Profit Maximization for SaaS Using SLA Based Spot Pricing in Cloud Computing

Authors: N. Ani Brown Mary

19-25
4.

Survey on Web Page Visual Summarization

Authors: A. Porselvi, S. Gunasundari

26-32
5.

Analysing Multicast Routing Protocols with Different Mobility Models

Authors: K.Kavitha, K. Selvakumar

33-39
6.

Bluetooth Controlled Automated Train Stopping System (BCATS)

Authors: Sathish Kumar P A, Aravindh S, Rakesh R

40-47
7.

Security Analysis and Implementation of OPASS Authentication(Suspended)

Author: G.Kanmani, A.Srivani

48-53
8.

A Recent Secure Intrusion Detection System For MANETS

Authors : U. Sharmila Begam, Dr. G. Murugaboopathi

54-62
9.

Reliable And Efficient Distributed Code Dissemination In Wireless Sensor Networks

Authors: P.Suganya, G.Murugaboopathi

63-68
10.

A Survey On Multimodal Content Based Video Retrieval

Authors: Tamizharasan.C, Dr.S.Chandrakala

69-65
11.

Contact Dissemination Based Collaborative Watchdog Approach To Improve Selfish Node Detection in MANETS

Authors: M. Annie Sharmila, Dr. G. Murugaboopathi

77-84
12.

Effective Multi Keyword Search Over P2P Network Using Optimized Bloom Filter Settings

Authors: G.Jayalakshmi, M.Vijayalakshmi

85-93
13.

A Novel Multicast Beneficiary in IEEE 802.16J Wimax Relay Networks

Authors : K. Saranya, Dr. M. A. Dorairangaswamy

94-99
14.

Data Security And Storage In Cloud Computing

Authors: J.Bhuvaneswari, R.Vaishnavi

100-101
15.

Performance Enhancement of Land Mobile Satellite System

Authors: R. Nandhini, J.Zarina Yasmin, C. Arunachalaperumal

102-106
16.

Requirement Elicitation Based Collborative Filtering Using Social Networks

Authors: P.Deepika, P.S.Smitha

107-110
17.

Data Leakage Detection Using Cloud Computing

Authors: V. Shobana, M. Shanmugasundaram

111-115
18.

Network Security: Atm Pin Unlocking and Avoid Skimming By UAN Technique

Authors: A. Sabari Rajeswaran

116-120
19.

Secured Consistent Network for Coping Up With Fabrication Attack In MANET

Authors: P T Tharani, K Muthupriya, C Timotta

121-128
20.

Software Refactoring with Appropriate Resolution Order of Code Smells

Authors: B.Maheswari, T. Subashini

129-133
21.

An Adaptive EADR Approach to Purge the Routing Attacks in DSR

Authors: Nivedha.E, S.Usha

134-137
22.

Service Oriented Architecture Design for Web Based Home Banking Systems With Cloud Based Service

Authors: A.Appandairaj, Dr. S.Murugappan

138-143
23.

Accurate Estimation Of Reverberation Time And DRR Using Maximum Likelihood Estimator

Authors: Jayashree. R, Manju Krishna, M.Vanitha lakshmi

144-148
24.

Hybrid Machine Translation System For English To Tamil Text

Authors: J. Sangeetha, S. Jothilakshmi, Sheena. S. Rajan

149-153
25.

Cyclic Group Protocol: An Improved Protocol for Multicast Video Transmission in MANET

Authors: Ramya Krishnan.V, Suresh Anand.M

154-159
26.

Visual Resemblance Based Content Descent for Multiset Query Records using Novel Segmentation Algorithm

Authors: S. Ishwarya, S. Grace Mary

160-164
27.

DRRD: Dynamism Resilient Resource Detection Scheme For Distributed Environment

Authors : M. Vidhya Kumari, R. Asmetha Jeyarani

165-169
28.

Text to Speech Synthesis System for Tamil

Authors: J.Sangeetha, S. Jothilakshmi, S.Sindhuja, V.Ramalingam

170-175
29.

Ihoneycol: A Collaborative Technique for Mitigation Of DDoS Attack

Authors: M.Buvaneswari, Ms.T.Subha

176-179
30.

HMM Based Real Time Facial Expression Recognition

Authors: A. Punitha, M. Kalaiselvi Geetha

180-185
31.

Overview of Data Aggregation Based Routing Protocols in Wireless Sensor Networks

Authors: V. Akila, Dr. T. Sheela

186-191
32.

A Review on Continuous Authentication Using Multimodal Biometrics

Authors: S.Sudarvizhi, S.Sumathi

192-196
33.

Performance Analysis of Different Adaptive Modulation Techniques in MIMO Systems on Basis of BER Performance

Authors: J.R.Jenifer, S.P.Premnath, C.Arunachalaperumal

197-201
34.

Vision Based Tracking System

Authors: R. Raaghavee, R. Sowmya, S. Pavithra, Mrs. Dilectin Hepzibah

202-208
35.

Adaptive Defense Strategy: Immunizing Shared Channel Network From DOS Attacks

Authors: Arshey.M, C.Balakrishnan

209-214
36.

An Effective Packet Filtering Mechanism for Reducing Complexity

Authors: Vijay Venkat Raaj. S, Kavitha. M

215-219
37.

Balancing Blocks for Distributed File System in Clouds By Using Load Rebalancing Algorithm

Authors: T.Sakthisri, S.Pallavi

220-223
38.

A Comparative Study of The Performance of Precoded MIMO Using Trellis And STBC

Authors: S. Dhilip Kumar, Dr. C. Arun

224-228
39.

Performance Enhancement Of MIMO Systems Using Antenna Selection Algorithm

Authors: S. P. Premnath, J. R. Jenifer, C. Arunachalaperumal

229-233
40.

A Quantitative Real-Time Analysis Of Object Tracking Algo-rithm For Surveillance Applications

Authors: J. Arunnehru, M. Kalaiselvi Geetha

234-240
41.

Multi Dimensionalised Aggregation in Horizontal Dataset Using Analysis Services

Authors: S. Aiswarya, S. Ramadevi

241-244
42.

Real Time Object Identification for Automated Video Surveillance System

Authors: L.Menaka, Dr. M.Kalaiselvi Geetha, M.Chitra

245-255
43.

Routing for Mesh-of-Tree in Multicluster Systems Based on Communication Networks

Authors: T. Preethija, G. Abija, T. Prabhu

256-259
44.

Efficient Design of EDDR Circuit for Advanced Video Coding/H.264

Authors: Rini Franklin. F, Prakash. P

260-265
45.

Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Using OPR

Authors: J.Johnsi, G.Abija

266-271
46.

An Efficient Bandwidth Utilization Mech-Anism For Consistent Routing In Wireless Mesh Networks

Authors: Anand Swaroop. R, Snehalatha. N

271-277
47.

Gabor Featured Statistical Modeling in Face Recognition with Chaotic Database

Authors: C. MageshKumar, G. Ragul , R.Thiyagarajan

278-284
48.

Detecting Selfish Routing and Misbehavior of Malicious Node In Disruption Tolerant Networks

Authors: Aarthy D.K., C.Balakrishnan

285-290
49.

Resisting Password Based Systems from Online Guessing Attacks

Authors: J. Jayavasanthi Mabel, C. Balakrishnan

291-296
50.

Performance Enhancement By Using Optimum Beamforming Algorithm in Cognitive Network

Authors: Bino. J, Adiline Macriga. G

297-301
51.

A Neighbor Coverage Based Probabilistic Rebroadcast for Reducing Routing Overhead In Mobile Ad Hoc Networks

Authors: V.Deeban Chakravarthy, V.Divya Renga

302-308
52.

Comparative Study on Performance of Various Channels Modelling in MIMO Systems

Authors: Zarina Yasmin J SAEC, Arunachalaperumal C SAEC

309-313
53.

Detection of E-Mail Senders With SMTP Extension

Authors: S.Vikash Koushik, G.Aparna, B.Thenkalvi

314-318
54.

An Exploration of Graph Based Approaches in Data Stream Mining

Authors: D. Aarthi, R. Sneghapriya, P. Pavithra, N. Poornima

319-327
55.

The Relationship between IPv7 and the Turing Machine

Authors: Justin Sophia. I, Dr. N. Rama

328-331
56.

Relation Extraction for Tourism Domain

Authors: P.Shanthi Bala, Dr.G.Aghila and Jayanthi

332-337
57.

Detection of Accuracy for Intrusion Detection System Using Neural Network Classifier

Authors: S. Devaraju, S. Ramakrishnan

338-345
58.

Intrusion Detection in Multitier Web Applications

Authors: Shenbagalakshmi Gunasekaran, K.Muneeswaran

346-351
59.

Detecting Interest Level Patterns of Human Interaction Using Tree Based Mining

Authors: Sahaya Sachithananthi Yesuraj, C. Balasubramanian

352-357
60.

An Automatic Language Identification Using Audio Features

Authors: Santhi.S, Raja Sekar

358-364
61.

PDIR: Pre-Deployed Infrastructure Routing For Secure Ad Hoc Networks

Authors: Sridevi.N, Amirthasaravanan.A, Divya.S

365-370
62.

Detecting Routing Misbehavior and Enhancing The Security in Disruption Tolerant Network

Authors: Gunasundari.S, Vinothkumar.G

371-377
63.

Peer To Peer Node Groupings Based On Content Using Game Theoretic Strategy In Inter-Networks

Authors: P.Kanaga, N.Mohan praphu

378-382
64.

Intelligent Agents for Intrusion Detection System (IAIDS)

Authors: M. Rajesh Kanna, D. Hemapriya, C. Divya

383-387
65.

Towards Fault Handling In B2B Collaboration Using Orchestration Based Web Services Composition

Authors: U. Arul, Dr. S. Prakash

388-394
66.

To Detect and Recover The Authorized CLI-ENT By Using Adaptive Algorithm

Authors: Anburaj. S, Kavitha. M

395-399
67.

A Real Time Embedded System of Vein Used For Authentication in Teller Machine

Authors: P.Harsha, R.Kanimozhi, C.Subashini

400-405
68.

Efficient Lossless Compression Using H.264/AVC Intra Coding and PWSIP Prediction

Authors: S.Kanimozhi, S.Sanjeeve Kumar

406-410
69.

A Novel Approach to Noise Reduction for Impulse and Gaussian Noise

Authors: P.Krishnapriya, S. Sanjeeve Kumar

411-414
70.

An Abdomen Image Segmentation Using Inte-Grated Graph Cut and Oriented Active AP-Pearance Model

Authors: S.Brindha, Mrs.G.Vijaya

415-420
71.

SIMULATION OF VIRTUAL SYNCHRONY IN A DISTRIBUTED ENVIRONMENT

Authors: Arun.G, Dr. Jasmine K.S, Dr. Sumithradevi K.A

421-426
72.

Self Organising Mesh Radio Based Solution For Smart Metering Communication

Authors: R.Rajeswari, N.Magadevi

427-431
73.

Embedding of Executable File in Encrypted Image Using LSB Mechanism

Authors: P.Sathish Kumar, C.BalaKrishnan

432-438
74.

Labview Based Dimension Detection and Seggregation Of Good And Faulty Crank Pins

Authors: U. Sabura Banu, M. Padma Usha, M. Ramamoorthy b

439-443
75.

Soft Error Mitigation for Embedded System Using Depth Packet Inspection

Authors: C.Amutha, T.Jackulin, Mrs.M.Ramya, C.Subashini

444-448
76.

Test Case Generation from UML Models – A Survey

Authors: S. Shanmuga Priya, Dr. P. D. Sheba

449-459
77.

Human Network Communication

Authors: Gopinath Chakrabortty, Saran Kumar, Umanandhini

460-463
78.

Image Retrieval System Based on Feature Computation – An Integrated Approach

Author: A. Hariram

464-467
79.

Providing A Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-Encryption Scheme

Authors: S.Poonkodi, V.Kavitha, K.Suresh

468-472
80.

A Stride Towards Developing A Distributed System For The Identification of Top-L Inner Product Elements

Authors: S.Veena, Dr.P.Rangarajan

473-476
81.

Impact of Video Recommendation System And Filtering Technique on Dissemination of Polluted Content

Authors: R. Shiva Ranjani, T. Sheela

477-481
82.

2D To 3D Conversion for Images Using Hough Transform

Authors: Sneha. K, T. Sheela

482-486
83.

An Intelligent Controlled System for Safety Transportation

Authors: S.Siddharth, S.Vivek, K. Surya Chandra Prakash, S.kalaiselvan

487-489
84.

Intelligent Compression of Medical Images Based on Multi ROI

Authors: Lavanya. M, M. SureshKumar

490-493
85.

Privacy Preservation of Confidential Database Using Anonymization

Authors: J. Jesmitha, R. Seethalakshmi

494-489
86.

Safe Navigation System Using Ultrasonic and Zigbee Technology

Authors: B.Himalaya, T.Gowthami

499-503
87.

Scrutinizing Grid Resources and Forecasting Based on Machine Learning in A Hooked-Up System

Authors: Amudha Bharathi. B, Aishwarya. R

504-507
88.

Query Prediction and Suggestion for Mobile Phones

Authors: P.J.Sinijoy, M. Ananthi

508-511
89.

Secure Framework for Data Sharing in Cloud Computing Environment

Authors: Nilutpal Bose, G. Manimala

512-517
90.

Microbial Fuel Cells Powered Adaptive Wireless Sensor Network for Wastewater Treatment Plants

Authors: M. Meenalakshmi, K. Lakshmi Joshitha

518-522
91.

Achieving QoS in Wireless Networks Using Q CSMA/ CA Algorithm

Authors: M. Megala, M.usha

523-530
92.

A Survey on Opinion Mining and Sentiment Polarity Classification

Author: Sindhu C, Dr. S. ChandraKala

531-539
93.

Signal Degradation Due to Vias in Multilayer PCBs

Authors: R. Azhagumurugan, Dr. P. Indumathi

540-542
94.

An Effective Geocache Collection in Mobile Networks Using Boomerang Protocol

Authors: S. Melba, N.S. Usha

543-547