International Conference on Information Systems and Computing (ICISC-2013), INDIA
Sri Sai Ram Engineering College, An ISO 9001:2008 Certified & NBA Accredited Engineering Institute, Chennai, INDIA
Convenor: Dr. T. Sheela, HOD, Department of Information Technology.
S.No. |
Title of Paper |
Page No. |
1. |
A Broker-Based Web Service Architecture for Service Registration and Discovery with QoS
Authors: Dr. T.Rajendran |
1-13 |
2. |
Remote Data Integrity in Cloud Security Services
Author: P.Dhanalakshmi, V.Ramesh |
14-18 |
3. |
Profit Maximization for SaaS Using SLA Based Spot Pricing in Cloud Computing
Authors: N. Ani Brown Mary |
19-25 |
4. |
Survey on Web Page Visual Summarization
Authors: A. Porselvi, S. Gunasundari
|
26-32 |
5. |
Analysing Multicast Routing Protocols with Different Mobility Models
Authors: K.Kavitha, K. Selvakumar |
33-39 |
6. |
Bluetooth Controlled Automated Train Stopping System (BCATS)
Authors: Sathish Kumar P A, Aravindh S, Rakesh R |
40-47 |
7. |
Security Analysis and Implementation of OPASS Authentication(Suspended)
Author: G.Kanmani, A.Srivani
|
48-53 |
8. |
A Recent Secure Intrusion Detection System For MANETS
Authors : U. Sharmila Begam, Dr. G. Murugaboopathi |
54-62 |
9. |
Reliable And Efficient Distributed Code Dissemination In Wireless Sensor Networks
Authors: P.Suganya, G.Murugaboopathi |
63-68 |
10. |
A Survey On Multimodal Content Based Video Retrieval
Authors: Tamizharasan.C, Dr.S.Chandrakala |
69-65 |
11. |
Contact Dissemination Based Collaborative Watchdog Approach To Improve Selfish Node Detection in MANETS
Authors: M. Annie Sharmila, Dr. G. Murugaboopathi
|
77-84 |
12. |
Effective Multi Keyword Search Over P2P Network Using Optimized Bloom Filter Settings
Authors: G.Jayalakshmi, M.Vijayalakshmi
|
85-93 |
13. |
A Novel Multicast Beneficiary in IEEE 802.16J Wimax Relay Networks
Authors : K. Saranya, Dr. M. A. Dorairangaswamy
|
94-99 |
14. |
Data Security And Storage In Cloud Computing
Authors: J.Bhuvaneswari, R.Vaishnavi |
100-101 |
15. |
Performance Enhancement of Land Mobile Satellite System
Authors: R. Nandhini, J.Zarina Yasmin, C. Arunachalaperumal |
102-106 |
16. |
Requirement Elicitation Based Collborative Filtering Using Social Networks
Authors: P.Deepika, P.S.Smitha |
107-110 |
17. |
Data Leakage Detection Using Cloud Computing
Authors: V. Shobana, M. Shanmugasundaram |
111-115 |
18. |
Network Security: Atm Pin Unlocking and Avoid Skimming By UAN Technique
Authors: A. Sabari Rajeswaran |
116-120 |
19. |
Secured Consistent Network for Coping Up With Fabrication Attack In MANET
Authors: P T Tharani, K Muthupriya, C Timotta |
121-128 |
20. |
Software Refactoring with Appropriate Resolution Order of Code Smells
Authors: B.Maheswari, T. Subashini |
129-133 |
21. |
An Adaptive EADR Approach to Purge the Routing Attacks in DSR
Authors: Nivedha.E, S.Usha |
134-137 |
22. |
Service Oriented Architecture Design for Web Based Home Banking Systems With Cloud Based Service
Authors: A.Appandairaj, Dr. S.Murugappan |
138-143 |
23. |
Accurate Estimation Of Reverberation Time And DRR Using Maximum Likelihood Estimator
Authors: Jayashree. R, Manju Krishna, M.Vanitha lakshmi |
144-148 |
24. |
Hybrid Machine Translation System For English To Tamil Text
Authors: J. Sangeetha, S. Jothilakshmi, Sheena. S. Rajan |
149-153 |
25. |
Cyclic Group Protocol: An Improved Protocol for Multicast Video Transmission in MANET
Authors: Ramya Krishnan.V, Suresh Anand.M |
154-159 |
26. |
Visual Resemblance Based Content Descent for Multiset Query Records using Novel Segmentation Algorithm
Authors: S. Ishwarya, S. Grace Mary |
160-164 |
27. |
DRRD: Dynamism Resilient Resource Detection Scheme For Distributed Environment
Authors : M. Vidhya Kumari, R. Asmetha Jeyarani |
165-169 |
28. |
Text to Speech Synthesis System for Tamil
Authors: J.Sangeetha, S. Jothilakshmi, S.Sindhuja, V.Ramalingam |
170-175 |
29. |
Ihoneycol: A Collaborative Technique for Mitigation Of DDoS Attack
Authors: M.Buvaneswari, Ms.T.Subha |
176-179 |
30. |
HMM Based Real Time Facial Expression Recognition
Authors: A. Punitha, M. Kalaiselvi Geetha |
180-185 |
31. |
Overview of Data Aggregation Based Routing Protocols in Wireless Sensor Networks
Authors: V. Akila, Dr. T. Sheela |
186-191 |
32. |
A Review on Continuous Authentication Using Multimodal Biometrics
Authors: S.Sudarvizhi, S.Sumathi |
192-196 |
33. |
Performance Analysis of Different Adaptive Modulation Techniques in MIMO Systems on Basis of BER Performance
Authors: J.R.Jenifer, S.P.Premnath, C.Arunachalaperumal |
197-201 |
34. |
Vision Based Tracking System
Authors: R. Raaghavee, R. Sowmya, S. Pavithra, Mrs. Dilectin Hepzibah |
202-208 |
35. |
Adaptive Defense Strategy: Immunizing Shared Channel Network From DOS Attacks
Authors: Arshey.M, C.Balakrishnan |
209-214 |
36. |
An Effective Packet Filtering Mechanism for Reducing Complexity
Authors: Vijay Venkat Raaj. S, Kavitha. M |
215-219 |
37. |
Balancing Blocks for Distributed File System in Clouds By Using Load Rebalancing Algorithm
Authors: T.Sakthisri, S.Pallavi |
220-223 |
38. |
A Comparative Study of The Performance of Precoded MIMO Using Trellis And STBC
Authors: S. Dhilip Kumar, Dr. C. Arun |
224-228 |
39. |
Performance Enhancement Of MIMO Systems Using Antenna Selection Algorithm
Authors: S. P. Premnath, J. R. Jenifer, C. Arunachalaperumal |
229-233 |
40. |
A Quantitative Real-Time Analysis Of Object Tracking Algo-rithm For Surveillance Applications
Authors: J. Arunnehru, M. Kalaiselvi Geetha |
234-240 |
41. |
Multi Dimensionalised Aggregation in Horizontal Dataset Using Analysis Services
Authors: S. Aiswarya, S. Ramadevi |
241-244 |
42. |
Real Time Object Identification for Automated Video Surveillance System
Authors: L.Menaka, Dr. M.Kalaiselvi Geetha, M.Chitra |
245-255 |
43. |
Routing for Mesh-of-Tree in Multicluster Systems Based on Communication Networks
Authors: T. Preethija, G. Abija, T. Prabhu |
256-259 |
44. |
Efficient Design of EDDR Circuit for Advanced Video Coding/H.264
Authors: Rini Franklin. F, Prakash. P |
260-265 |
45. |
Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Using OPR
Authors: J.Johnsi, G.Abija |
266-271 |
46. |
An Efficient Bandwidth Utilization Mech-Anism For Consistent Routing In Wireless Mesh Networks
Authors: Anand Swaroop. R, Snehalatha. N |
271-277 |
47. |
Gabor Featured Statistical Modeling in Face Recognition with Chaotic Database
Authors: C. MageshKumar, G. Ragul , R.Thiyagarajan |
278-284 |
48. |
Detecting Selfish Routing and Misbehavior of Malicious Node In Disruption Tolerant Networks
Authors: Aarthy D.K., C.Balakrishnan |
285-290 |
49. |
Resisting Password Based Systems from Online Guessing Attacks
Authors: J. Jayavasanthi Mabel, C. Balakrishnan |
291-296 |
50. |
Performance Enhancement By Using Optimum Beamforming Algorithm in Cognitive Network
Authors: Bino. J, Adiline Macriga. G |
297-301 |
51. |
A Neighbor Coverage Based Probabilistic Rebroadcast for Reducing Routing Overhead In Mobile Ad Hoc Networks
Authors: V.Deeban Chakravarthy, V.Divya Renga |
302-308 |
52. |
Comparative Study on Performance of Various Channels Modelling in MIMO Systems
Authors: Zarina Yasmin J SAEC, Arunachalaperumal C SAEC |
309-313 |
53. |
Detection of E-Mail Senders With SMTP Extension
Authors: S.Vikash Koushik, G.Aparna, B.Thenkalvi |
314-318 |
54. |
An Exploration of Graph Based Approaches in Data Stream Mining
Authors: D. Aarthi, R. Sneghapriya, P. Pavithra, N. Poornima |
319-327 |
55. |
The Relationship between IPv7 and the Turing Machine
Authors: Justin Sophia. I, Dr. N. Rama |
328-331 |
56. |
Relation Extraction for Tourism Domain
Authors: P.Shanthi Bala, Dr.G.Aghila and Jayanthi |
332-337 |
57. |
Detection of Accuracy for Intrusion Detection System Using Neural Network Classifier
Authors: S. Devaraju, S. Ramakrishnan |
338-345 |
58. |
Intrusion Detection in Multitier Web Applications
Authors: Shenbagalakshmi Gunasekaran, K.Muneeswaran |
346-351 |
59. |
Detecting Interest Level Patterns of Human Interaction Using Tree Based Mining
Authors: Sahaya Sachithananthi Yesuraj, C. Balasubramanian |
352-357 |
60. |
An Automatic Language Identification Using Audio Features
Authors: Santhi.S, Raja Sekar |
358-364 |
61. |
PDIR: Pre-Deployed Infrastructure Routing For Secure Ad Hoc Networks
Authors: Sridevi.N, Amirthasaravanan.A, Divya.S |
365-370 |
62. |
Detecting Routing Misbehavior and Enhancing The Security in Disruption Tolerant Network
Authors: Gunasundari.S, Vinothkumar.G |
371-377 |
63. |
Peer To Peer Node Groupings Based On Content Using Game Theoretic Strategy In Inter-Networks
Authors: P.Kanaga, N.Mohan praphu |
378-382 |
64. |
Intelligent Agents for Intrusion Detection System (IAIDS)
Authors: M. Rajesh Kanna, D. Hemapriya, C. Divya |
383-387 |
65. |
Towards Fault Handling In B2B Collaboration Using Orchestration Based Web Services Composition
Authors: U. Arul, Dr. S. Prakash |
388-394 |
66. |
To Detect and Recover The Authorized CLI-ENT By Using Adaptive Algorithm
Authors: Anburaj. S, Kavitha. M |
395-399 |
67. |
A Real Time Embedded System of Vein Used For Authentication in Teller Machine
Authors: P.Harsha, R.Kanimozhi, C.Subashini |
400-405 |
68. |
Efficient Lossless Compression Using H.264/AVC Intra Coding and PWSIP Prediction
Authors: S.Kanimozhi, S.Sanjeeve Kumar |
406-410 |
69. |
A Novel Approach to Noise Reduction for Impulse and Gaussian Noise
Authors: P.Krishnapriya, S. Sanjeeve Kumar |
411-414 |
70. |
An Abdomen Image Segmentation Using Inte-Grated Graph Cut and Oriented Active AP-Pearance Model
Authors: S.Brindha, Mrs.G.Vijaya |
415-420 |
71. |
SIMULATION OF VIRTUAL SYNCHRONY IN A DISTRIBUTED ENVIRONMENT
Authors: Arun.G, Dr. Jasmine K.S, Dr. Sumithradevi K.A |
421-426 |
72. |
Self Organising Mesh Radio Based Solution For Smart Metering Communication
Authors: R.Rajeswari, N.Magadevi |
427-431 |
73. |
Embedding of Executable File in Encrypted Image Using LSB Mechanism
Authors: P.Sathish Kumar, C.BalaKrishnan |
432-438 |
74. |
Labview Based Dimension Detection and Seggregation Of Good And Faulty Crank
Pins
Authors: U. Sabura Banu, M. Padma Usha, M. Ramamoorthy b |
439-443 |
75. |
Soft Error Mitigation for Embedded System Using Depth Packet Inspection
Authors: C.Amutha, T.Jackulin, Mrs.M.Ramya, C.Subashini |
444-448 |
76. |
Test Case Generation from UML Models – A Survey
Authors: S. Shanmuga Priya, Dr. P. D. Sheba |
449-459 |
77. |
Human Network Communication
Authors: Gopinath Chakrabortty, Saran Kumar, Umanandhini |
460-463 |
78. |
Image Retrieval System Based on Feature Computation – An Integrated Approach
Author: A. Hariram |
464-467 |
79. |
Providing A Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-Encryption Scheme
Authors: S.Poonkodi, V.Kavitha, K.Suresh |
468-472 |
80. |
A Stride Towards Developing A Distributed System For The Identification of Top-L Inner Product Elements
Authors: S.Veena, Dr.P.Rangarajan |
473-476 |
81. |
Impact of Video Recommendation System And Filtering Technique on Dissemination of Polluted Content
Authors: R. Shiva Ranjani, T. Sheela |
477-481 |
82. |
2D To 3D Conversion for Images Using Hough Transform
Authors: Sneha. K, T. Sheela |
482-486 |
83. |
An Intelligent Controlled System for Safety Transportation
Authors: S.Siddharth, S.Vivek, K. Surya Chandra Prakash, S.kalaiselvan |
487-489 |
84. |
Intelligent Compression of Medical Images Based on Multi ROI
Authors: Lavanya. M, M. SureshKumar |
490-493 |
85. |
Privacy Preservation of Confidential Database Using Anonymization
Authors: J. Jesmitha, R. Seethalakshmi |
494-489 |
86. |
Safe Navigation System Using Ultrasonic and Zigbee Technology
Authors: B.Himalaya, T.Gowthami |
499-503 |
87. |
Scrutinizing Grid Resources and Forecasting Based on Machine Learning in A Hooked-Up System
Authors: Amudha Bharathi. B, Aishwarya. R |
504-507 |
88. |
Query Prediction and Suggestion for Mobile Phones
Authors: P.J.Sinijoy, M. Ananthi |
508-511 |
89. |
Secure Framework for Data Sharing in Cloud Computing Environment
Authors: Nilutpal Bose, G. Manimala |
512-517 |
90. |
Microbial Fuel Cells Powered Adaptive Wireless Sensor Network for Wastewater Treatment Plants
Authors: M. Meenalakshmi, K. Lakshmi Joshitha |
518-522 |
91. |
Achieving QoS in Wireless Networks Using Q CSMA/ CA Algorithm
Authors: M. Megala, M.usha |
523-530 |
92. |
A Survey on Opinion Mining and Sentiment Polarity Classification
Author: Sindhu C, Dr. S. ChandraKala |
531-539 |
93. |
Signal Degradation Due to Vias in Multilayer PCBs
Authors: R. Azhagumurugan, Dr. P. Indumathi |
540-542 |
94. |
An Effective Geocache Collection in Mobile Networks Using Boomerang Protocol
Authors: S. Melba, N.S. Usha |
543-547 |