Vous êtes sur la page 1sur 14

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

S.NO 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.

TITLE OF THE PAPER LOW COMPLEXITY FAULT DETECTION SCHEME FOR ADVANCED ENCRYPTION STANDARD COLLABORATIVE INFORMATION RETRIEVAL WITH N-GRAM EXTRACTION AND COLLABORATIVE USER RANKING RECENT TREND IN IT- HAPTIC TECHNOLOGY IN SURGICAL SIMULATION AND MEDICAL TRAINING. (A TOUCH REVOLUTION) I-TREESEARCH USING TOP-K APPROXIMATE SUBTREE MATCHING SEMANTIC WEB SERVICES-A SURVEY DELIVERING SCALABLE HIGH BANDWIDTH STORAGE FOR HIGH SPEED DATA TRANSFER DEFENCE TO UNSAFE COMPONENT LOADINGS JAMMING ATTACK PREVENTION IN WIRELESS NETWORK USING PACKET HIDING METHODS PREVENTION OF BLACK HOLE ATTACK AND CO-OPERATIVE BLACK HOLE ATTACK IN MANET AUTHENTICATION ON KEY MANAGEMENT FRAMEWORK WITH HYBRID MULTICASTING NETWORK EMPOWERED SERVICE DELEGATION WITH ATTRIBUTE ENCRYPTION FOR DISTRIBUTED CLOUD COMPUTING A SIMPLE METHOD FOR LYMPHOMA CLASSIFICATION USING PRINCIPAL COMPONENT ANALYSIS EFFICIENT RESOURCES PROVISIONING IN CLOUD SYSTEMS FOR COST BENEFITS DERIVING CAPACITY LIMITS OF DATA COLLECTION FOR RANDOM WIRELESS SENSOR NETWORKS DETECTING COMPROMISED MACHINERY BY MONITORING SOCIABLE COMMUNICATION AUTOMATED DETECTION OF CYBER SECURITY ATTACKS SECURE AUTHENTICATION USING BIOMETRIC CRYPTOSYSTEM DISTRIBUTED OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY ENHANCED MEASURES FOR PERSONALIZATION OF WEB SEARCH RESULT EVOLUTION OF ONTOLOGY BASED ON FREE TEXT DESCRIPTOR FOR WEB SERVICE AUTOMATION OF PUBLIC DISTRIBUTION SYSTEM USING RFID CARD AND BIOMETRIC FOR FASTER AND SAFER ACCESS
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47.

DATA MINING APPROACH TO DETECT SPAM ON FACEBOOK AUTHENTICATION BASED CLOUD STORAGE AND SECURE DATA FORWARDING NORMALIZED MEAN MEDIAN FILTER FOR HIGHLY CORRUPTED IMPULSE NOISE IMAGE EFFECTIVE OPTIMIZATION OF VIDEO TRANSMISSION IN WLAN CLOUD COMPUTING A GLOBAL THRESHOLD BASED APPROACH FOR DENDRITIC SPINE DETECTION SYMPATHETIC NODE LOCALIZABILITY OF WIRELESS AD HOC AND SENSOR NETWORKS A LOSSLESS COMPRESSION SCHEME FOR BAYER COLOR FILTER ARRAY IMAGES USING GENETIC ALGORITHM HOMOMORPHIC AUTHENTICATION WITH DYNAMIC AUDIT FOR CATCHING THE MODIFICATIONS OF DATA IN MULTI CLOUD STORAGE A SHORT-WAVE INFRARED NANOINJECTION IMAGER WITH 2500 A/W RESPONSIVITY AND LOW EXCESS NOISE DATA HIDING IN MPEG VIDEO FILES USING BLOCK SHUFFLING APPROACH PERCOLATION THEORY BASED 2-D NETWORK CONNECTIVITY IN VANETS INFORMATION LOSS REVELATION USING FAKE OBJECTS ADAPTIVE DEFENSE AGAINST VARIOUS ATTACKS IN DOS LIMITING NETWORK ARCHITECTURE A CRYPTOGRAPHIC APPROACH FOR EFFICIENT KEYWORD SEARCH SCHEME IN CLOUD COMPUTING DATA DREADGING FOR STREAMING DATA NUGGETS USING XQUERIES DIGITAL IMPLEMENTATION OF MULTILAYER PERCEPTRON NETWORK FOR PATTERN RECOGNITION COMPUTER AIDED DIAGNOSIS OF CANCER WITH MAMMOGRAM USING FUZZY CASE BASED REASONING OFFLINE HANDWRITTEN TAMIL CHARACTER RECOGNITION USING HMM MODEL SLOW FEATURE ANALYSIS: A NOVEL APPROACH TO HUMAN ACTION RECOGNITION ANALYSIS, FUTURE AND COMPARISON OF 4G TECHNOLOGY A HYBRID NETWORK FOR AUTOMATIC GREENHOUSE MANAGEMENT AUTOMATIC DETECTION OF FACIAL RECOGNITATION USING HAAR CLASSIFIER KEY MANAGEMENT SCHEME FOR VANET BASED ON VECTOR GROUP PERFORMANCE ANALYSIS AND DESIGN OF ENERGY EFFICIENT ARITHMETIC ADDERS BY PTL TECHNOLOGY AND ITS APPLICATION A DESIGN OF VIRUS DETECTION PROCESSOR FOR EMBEDDED NETWORK SECURITY
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75.

A NOVEL HIERARCHICAL ACCESS CONTROL APPROACH IN CLOUD COMPUTING IMPLEMETATION OF TURBO CODED WIRELESS SYSTEM AND STBC BASED SPATIAL DIVERSITY FOR WSN CLOUD COMPUTING THEFT IDENTIFICATION DURING DATA TRANSFER IN IT SECTOR A DIFFERENTIATED QUALITYOF SERVICE BASED SCHEDULING ALGORITHM FOR REAL TIME TRAFFIC AN EFFICIENT WAY OF SIMILARITY SEARCH DATA PRESERVATION USING ASCENT PLUGNE METHOD DUAL PROTECTING MECHANISM FOR MULTITIER WEB APPLICATION A NOVEL CHANNEL ADAPTIVE ROUTING WITH HANDOVER IN MANETS A RANKING BASED APPROACH FOR HANDLING SENSITIVE DATA A NOVEL ON-DEMAND CO-OPERATIVE OPPORTUNISTIC ROUTING SCHEME FOR CLUSTER BASED MANET ANDROID MOBILES TO STOP THE PASSWORD STEALING ATTACKS RIHT: A NOVEL HYBRID IP TRACEBACK SCHEME EFFECTIVE ADAPTIVE PREDICTION SCHEME FOR WORKLOADS IN GRID ENVIRONMENT ASSURING DATA AVAILABILITY ALL TIME IN CLOUD USING ERASURE CODE TECHNIQUE AN EFFECTIVE METHOD TO COMPOSE RULES USING RULE ONTOLOGY IN REPEATED RULE ACQUISITION FROM SIMILAR WEB SITES FUZZY LOGIC BASED SCALABLE PACKET CLASSIFICATION ON FPGA ENHANCED CLOUD STORAGE SECURITY WITH AVP MECHANISM DETECTING SESSION HIJACKS IN WIRELESS NETWORKS ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS PACKET DATA REDUNDANCY ELIMINATION IN DATA AGGREGATION EFFICIENT AND EFFECTIVE DATA MINING WITH BLOOMCAST AND RANKING OF DATA BY STEMMING ALGORITHM IN UNSTRUCTURED P2P NETWORKS BEHAVIOURAL BASED SECURED USER AUTHENTICATION USING IMAGE CAPTCHA SUPERVISED CLUSTERING ALGORITHM FOR GENE DATA CLASSIFICATION INDIAN LICENSE PLATE RECOGNITION BASED ON OPTICAL CHARACTER RECOGNITON ANALYSIS AND COMPENSATION FOR NONLINEAR INTERFERENCE OF MULTICARRIER MODULATION OVER SATELLITE LINK CLOUD INFORMATION ACCOUNTABILITY FRAMEWORK RISK FACTOR ASSESSMENT FOR HEART DISEASE USING DATA MINING TECHNIQUES A NOVEL CORRELATION PRESERVING INDEXING METHOD FOR DOCUMENT CLUSTERING IN CORRELATION SIMILARITY MEASURE SPACE
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

ANALYSIS AND COMPENSATION FOR NONLINEAR INTERFERENCE OF 76. MULTICARRIER MODULATION OVER SATELLITE LINK RISK FACTOR ASSESSMENT FOR HEART DISEASE USING DATA MINING 77. TECHNIQUES 78. RFID AND ZIGBEE BASED MANUFACTURE MONITORING SYSTEM A MACHINE DOCTOR THAT DIAGNOSING OPHTHALMOLOGY 79. PROBLEMS USING NEURAL NETWORKS EMPOWERED SERVICE DELEGATION WITH ATTRIBUTE ENCRYPTION 80. FOR DISTRIBUTED CLOUD COMPUTING A NOVEL CORRELATION PRESERVING INDEXING METHOD FOR 81. DOCUMENT CLUSTERING IN CORRELATION SIMILARITY MEASURE SPACE ROBUST FUZZY SCHEDULING IN OFDMA NETWORKS FOR RESOURCE 82. ALLOCATION RTOS BASED MONITOR THE INDUSTRIAL ENVIRONMENT AND 83. EMBEDDED SYSTEM INTEGRATED IN A WSN TOP-K RESPONSES USING KEYWORD SEARCH OVER RELATIONAL 84. DATABASES THROUGH TUPLE UNITS 85. IMAGE STEGANOGRAPHY USING ADAPTIVE LSB ENCODING A TREE BASED MINING APPROACH FOR DETECTING INTERACTION 86. PATTERNS EMBEDDED SYSTEM BASED OILWELL HEALTH MONITORING AND 87. CONTROLING USING SENSOR NETWORK A WEIGHTED PERIODICAL PATTERN MINING AND PREDICTION FOR 88. PERSONAL MOBILE COMMERCE A JOINT SENTIMENT TOPIC DETECTION FROM TEXT USING SEMI89. SUPERVISED TACTIC A SURVEY ON TRANSACTION MAPPING ALGORITHM FOR MINING 90. FREQUENTLY OCCURRING DATASETS DIGITAL IMAGE FORGERY DETECTION AND ESTIMATION THROUGH 91. EXPLORING IMAGE MANIPULATIONS OPASS: A USER AUTHENTICATION PROTOCOL RESISTANT TO PREVENT 92. ATTACK AND DETECT PHISHING WEBSITE ENERGY EFFICIENT SENSORY DATA COLLECTION AND RECONCILING 93. FROM DAMAGED NETWORK 94. FEATURES EXTRACTION AND VERIFICATION OF SIGNATURE IMAGE 95. AIRBORNE INTERNET 96. BRAIN TUMOR DETECTION AND AUTOMATIC SEGMENTATION CLASSIFICATION MODEL FOR EARLY DISEASE DIAGNOSIS USING 97. DATA MINING WIDE RANGE REPUTATION BASED ANNOUNCEMENT SCHEME FOR 98. VANETS AGENT TRUST FOR EFFECTIVE COMMUNICATION IN INTELLIGENT 99. TRANSPORTATION SYSTEM 100. CRITICAL EVENT DETECTION AND MONITORING USING NOVEL SLEEP
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. 117. 118. 119. 120. 121. 122. 123.

SCHEDULING IN WSN CONVOLUTION PARTIAL TRANSMITS SEQUENCE SCHEME FOR IMPROVING THE ENERGY EFFICIENCY OF A TRANSMITTED SIGNAL SECURE TRANSACTION IN ONLINE BANKING SYSTEM USING IB-MRSA THE EYE MOUSE IS THE EQUIVALENT OF THE CONVENTIONAL COMPUTER MOUSE THREE-PORT SERIES-RESONANT DCDC CONVERTER TO INTERFACE RENEWABLE ENERGY SOURCES WITH BIDIRECTIONAL LOAD AND ENERGY MOBILE DATA GATHERING USING PPS IN WIRELESS SENSOR NETWORK BRAIN TUMOR DETECTION AND IDENTIFICATION USING IMAGE PROCESSING AND SOFT COMPUTING A SECURE DATA FORWARDING IN THE CLOUD STORAGE SYSTEM BASED ON PROXY RE-ENCRYPTION IMPROVING PERFORMANCE OF VIDEO TRANSMISSION QUALITY USING ENCRYPTION AND RESOURCE ALLOCATION METHOD ADAPTIVE COUNTERMEASURE TO PREVENT DOS ATTACKS USING AN ADAPTIVE SENSITIVE AUTHORIZATION AN EFFICIENT CLUSTERING ALGORITHM FOR SPAM FILTERING FAST PERCEPTUAL VIDEO ENCRYPTION USING RANDOM PERMUTATION ON MODIFIED DCT CO-EFFICIENTS A NOVEL CHANNEL ADAPTIVE ROUTING WITH HANDOVER IN MANETS SENSING ENVIRONMENTAL AND DISASTER USING CLOUD COMPUTING INFRASTRUCTURE A MULTI-RESOLUTION FAST FILTER BANK USING CYCLOSTATIONARY FEATURE DETECTION FOR SPECTRUM SENSING IN MILITARY RADIO RECEIVER IMPROVING EFFICIENCY IN MULTICASTING PROTOCOL FOR AD HOC NETWORKS RESILIENT AUTHENTICATED EXECUTION OF CRITICAL APPLICATIONS IN CORRUPTED ENVIRONMENT USING VMM IMPLEMENTATION OF EFFICIENT LIFTING BASED MULTI LEVEL 2-D DWT EVALUATION OF DATA TRANSFERRING IN MULTICORE SYSTEM MEMBERSHIP MANAGEMENT IN LARGE SCALE RELIABLE STORAGE SYSTEM ADAPTIVE IMAGE SEGMENTATION BASED ON HUMAN VISUAL ATTENTION MOUSE ACTIVITY BY FACIAL EXPRESSIONS USING ENSEMBLE METHOD SERVER BASED ADVANCED VANET COMMUNICATION AND APPLICATION AUTHORITY DETECTION AND COMMUNICATIONS INTO DIVERSE
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148.

SERVICE-ORIENTED SYSTEMS PREVENTING INSIDER THREATS RELATED TO CLOUD COMPUTING PACKET CONCEALING METHODS FOR BLOCKING FUSSY JAMMING ATTACKS AN ENHANCED SERVICE COMPOSITION USING SEMANTIC BASED AUTOMATED SERVICE DISCOVERY SECURE AND ROBUST IRIS RECOGNITION USING POSSIBILISTIC FUZZY MATCHING ON LOCAL FEATURES ENSURING AUTHENTICATION OF CLOUD INFORMATION USING JAR ACRN: ADAPTIVE CONTROL CHANNEL FOR ADHOC COGNITIVE RADIO NETWORKS IMPROVEMENT OF SOURCE AND MESSAGE AUTHENTICATION USING TAM PROTOCOL FOR ADHOC NETWORKS MINING WEB GRAPHS FOR SOCIAL RECOMMENDATIONS DESIGN AND IMPLEMENTATION OF TRUST- AWARE ROUTING FRAMEWORK FOR WSN MVEE DEFENCE AGAINST CODE INJECTION ATTACKS FORENSIC HASH COMPONENT FOR IMAGE REGISTRATION AND TAMPERING DETECTION USING SIFT FEATURE RECORD LINKAGE AND DE-DUPLICATION USING FEBRL BASED INDEXING PROVIDING SECURE AND SCALABLE ACCESS CONTROL OF OUTSOURCED DATA IN CLOUD COMPUTING DESIGN AND IMPLEMENTATION OF MICROSTRIP LINE STEPPED IMPEDANCE LOW PASS FILTER CLASSIFICATION OF CHROMOSOMES USING FEED FORWARD BACK PROPAGATION ALGORITHM DATA MASKING IN MPEG VIDEO FILES WITH MESSAGE EXTRACTION ACCURACY ENABLING CLOUD COMPUTING SECURITY FROM SINGLE TO MULTI CLOUDS K.A MOHAMED RIYAZUDEEN TOUCH SCREEN TECHNOLOGY DESIGN AND IMPLEMENTATION OF BI-QUAD ANTENNA WITH PARABOLIC REFLECTOR FOR ENHANCING THE COVERAGE AREA OF A WI-FI ACCESS POINT MACHINE LEARNING APPROACH FOR MEDICAL LANGUAGE PROCESSING CRYPTOGRAPHY A NETWORK SECURITY MEASURE DETECTION OF OCCUPIED & AVAILABLE SPACES IN THE CAR PARKING SYSTEM USING HAAR-LIKE FEATURES TEXTURE CLASSIFICATION BASED ON NEURAL NETWORK REMOTE ACCESS & DISPLAY FOR CLIENT LEVERAGING MOBILE COMPUTING INTELLIGENT TECHNIQUE BASED MULTICONSTRAINED QOS
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

149. 150. 151. 152. 153. 154. 155. 156. 157. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174.

ROUTING FOR MANETS UNCERTAINTY-BASED SAMPLE SELECTION IN CLOUD COMPUTING USING FUZZY DECISION TREE INDUCTION VEHICULAR NETWORK FOR INTELLIGENT TRAFFIC SYSTEM TO AVOID ACCIDENTS USING HYBRID SCALABILITY PROTOCOL DYNAMIC LOAD MONITORING AND RESOURCE ALLOCATION IN CLOUD ENVIRONMENT GRID COMPUTING AN EFFICIENT MINING FOR HIGH UTILITY PATTERN FROM WEB LOG DATA USING UP CATALOG BLOOD VESSEL SEGMENTATION ON DIGITAL FUNDUS IMAGES COMMUNITY ANOMALY DETECTION SYSTEM IN COLLABORATIVE INFORMATION SYSTEMS DLA: DYNAMIC LEARNING ALGORITHM FOR ANOMALY DETECTIONIN MOBILE AD HOC NETWORKS (MANET) IMPROVED UNSUPERVISED SEGMENTATION ALGORITHM FOR TISSUE PATHOLOGY CLUSTERING BASED DICTIONARY GENERATION FOR DIABETIC RETINOPATHY DETECTION CANCER DISCOVERY USING CLUSTER ENSEMBLE APPROACH 3-D VOLUME RECONSTRUCTION FOR MEDICAL APPLICATON EFFICIENT APPROACH TO PATENT SEARCH PARADIGM SLM : SECURE LEADER MODEL FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK MULTIKEYWORD SEARCHING IN PEER- TO-PEER NETWORK USING GOSSIP ALGORITHM COMBINED WITH QUERY RATING TECHNIQUES A NOVEL BASED CLOUD COMPUTING SECURITY MANAGEMENT FRAMEWORK E-SECURE:PRESERVING SECURITY THROUGH THREE-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS A DYNAMIC DATA REPLICATION IN CLOUD TO INCREASE SYSTEM AVAILABILITY AGENT BASED NETWORK SNIFFER INTRUSION DETECTION ANDROID AND WIRELESS BASED ROBOTIC VEHICLE CONTROL IMPLEMENTATION OF A VISIBLE WATERMARKING IN A SECURE STILL DIGITAL CAMERA USING VLSI DESIGN COMPARISON OF CONVENTIONAL MODEL BASED TECHNIQUES WITH MODEL PREDICTIVE CONTROL METHOD FOR TWO-TANK SYSTEM REFINING ANOMALISTIC MALICIOUS ATTACKS IN SOVEREIGN SETUP STEPHEN A DYNAMIC LOAD BALANCING SCHEME FOR ENERGY EFFICIENT RESOURCE UTILIZATION IN CLOUD COMPUTING ANALYSIS OF ION CHANNELS AND BIO-MOLECULES USING NANOELECTRONIC MOSFETS AN IMPLEMENTATION OF SEMI-SUPERVISED LEARNING FROM
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

175. 176. 177. 178. 179. 180. 181. 182. 183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194. 195. 196. 197.

198.

MICROARRAY SAMPLE CLASSIFICATION ARDUINO BASED AUTOMATIC CONTROL FOR LABORATORY STERILIZATION PROCESS DISTRIBUTED SECURE DATA FORWARDING IN CLOUD STORAGE SYSTEM COMMUNITY ANOMALY DETECTION SCHEME IN COLLABORATIVE INFORMATION SYSTEMS AN EFFICIENT PRIVACY PRESERVING SCHEME FOR SOURCE-SINK LOCATION IN WIRELESS SENSOR NETWORK OPTIMAL CSI FEEDBACK WITH WATER FILLING PRECODER IN A MIMO SYSTEM MEMS SHUNT SWITCH FOR RECONFIGURABLE ANTENNA APPLICATIONS ENHANCE THE SECURITY TO MITIGATE ONLINE PASSWORD GUESSING FREQUENT ITEMSETS MINING ON LARGE UNCERTAIN DATABASES: USING RULE MINING ALGORITHM ENERGY EFFICIENT IN IMPROVED EDF FOR MULTI-CORE SYSTEM DEEP PACKET INSPECTION WITH BIT-REDUCED DFA FOR CLOUD SYSTEM EFFICIENT RFID STREAM ON STATIC AND DYNAMIC READER USING DATA INFERENCE AND DATA COMPRESSION ENHANCING SECURITY AND PRIVACY IN DECENTRALIZED KP-ABE WITH KEY REVOCATION FPGA IMPLEMENTATION OF ROBOTIC ARM HAVING THREE LINK MANIPULATOR PREDICTING EARTHQUAKES THROUGH DATA MINING SECURE COMMUNICATION BY QUANTUM PROTOCOL OPTIMAL BIASED SYSTEM TO IMPROVE SNR LICENSE PLATE LOCALIZATION FROM LOCAL IMAGES PRIVACY PROTECTING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD HUMAN ACTION RECOGNITION IN DYNAMIC BACKGROUND USING DYNAMIC PROTOTYPE TREE DESIGN OF ENERGY OPTIMIZATION ALGORITHM FOR THE WIRELESS SENSOR NETWORKS VLSI DESIGN OF MIMO OFDM FOR THE FUTURE WIRELESS COMMUNICATION EVOLUTION OF ONTOLOGY BASED ON FREE TEXT DESCRIPTOR FOR WEB SERVICE ANOMALY DETECTION IN MULTI-TIER WEB APPLICATIONS WITH ENHANCED KEY GENERATION IN DOUBLE GUARD ARCHITECTURE FAST AND ACCURATE MULTITASK SALIENCY DETECTION BY CONSIDERING THE FEATURES OF COLOUR, TEXTURE, ORIENTATION AND LUMINANCE
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

199. 200. 201. 202. 203. 204. 205. 206. 207. 208. 209. 210. 211. 212. 213. 214. 215. 216. 217. 218. 219. 220. 221. 222. 223.

CLUSTERED TECHNIQUES OVER BIOLOGICAL SEQUENCE PREDICTED USING BIMAX A TWIN PRECISION MULTIPLIER BASED MULTI-RESOLUTION FAST FILTER BANK FOR SPECTRUM SENSING IN MILITARY RADIO RECEIVERS A FULLY AUTOMATIC SEMENTATIONOF LIVER AND HEPATIC TUMOR FROM 3-D CT ABDOMINAL IMAGES PRE-COMPUTATION ARCHITECTURE WITH T-ALGORITHM FOR VITERBI DECODER DESIGN INTERACTIVE IMAGE SEGMENTATION USING DYNAMIC BAYESIAN NETWORK IMPLEMENTING SCALING ONLINE SOCIAL NETWORKS USING SOCIAL PARTITIONING AND REPLICATION A STUDY ON UPCOMING TRENDS IN ELDERLY HOME MONITORING SYSTEM PERFORMANCE ASSESSMENT OF CLUSTER NODES WITH DYNAMIC PRIORITY SCHEDULING IN PRIVATE CLOUD ENVIRONMENT FIELD PROGRAMMABLE GATE ARRAY BASED ADAPTIVE NEUROMORPHIC CHIP FOR OLFACTORY SYSTEM INFORMATION SECURITY USING CHAOTIC MIXING IN DIGITAL STEGANOGRAPHY BIOMETRIC IDENTIFICATION OF PERIOCULAR REGIONS USING TEXTURE FEATURE AN EFFICIENT REFINING OF CBMIR THROUGH SUPERVISED LEARNING APPROACH PERFORMANCE ENHANCEMENT OF EZ-SOURCE INVERTER USING INDUCTION MOTOR DESIGN OF SOC WIRE BASED ON NOC ARCHITECTURE DOMOTATION USING HYBRID PROTOCOLS INVISIBILITY TECHNOLOGY REPLACES MAGIC NEIGHBORING NODE INTRUSION DETECTION SECURITY FOR MANET ROUTING BRAIN CONTROLLED CAR FOR DISABLED USING ARTIFICIAL INTELLENG DEVELOPMENT OF REPLICA FREE REPOSITORIES USING PARTICLE SWARM OPTIMIZATION ALGORITHM NONINVASIVE LOAD DELEGATION MODEL IN GRID ENVIRONMENT A NOVEL CLUSTERING METHOD BASED ON HACO AND FAPSO FOR CONTINUOUS DOMAIN ONTOLOGY EXTRACTION FROM WIKIPEDIA ADAPTIVELY PIPELINED PARALLEL LINEAR PHASE MIXED DIGITAL FIR FILTER POWER OPTIMIZATION IN MULTITHRESHOLD CMOS DIGITAL JEWELLERY MADE POSSIBLE USING WIRELESS COMMUNICATIONS
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

224. INTELLIGENT CAR SYSTEM FOR ACCIDENT PREVENTIONUSING ARM-7 AN ONTOLOGY BASED APPROACH FOR ACTIVITY RECOGNITION FROM 225. SMART HOMES 226. CROP CLASSIFICATION USING MODIS IMAGERY DATA MINING OF SOCIAL MEDIA SPECIFIC STRINGS FOR RAPID 227. FORENSIC INVESTIGATION BRAIN TUMOR DETECTION AND IDENTIFICATION USING IMAGE 228. PROCESSING AND SOFT COMPUTING CIPHERTEXT-POLICY ATTRIBUTE SET BASED ENCRYPTION FOR 229. SECURE CLOUD COMPUTING MEDICAL IMAGE ANALYSIS USING MORPHIC CLUSTERING 230. ALGORITHM AN AUTHENTICATED AND SECURE COMMUNICATION FOR 231. DISTRIBUTED CLUSTERS VIA MESSAGE PASSING INTERFACE PERFORMANCE ANALYSIS OF COGNITIVE RADIO WITH SVD AND 232. WATER FILLING TECHNIQUES BRAIN CONTROLLED CAR FOR DISABLED USING ARTIFICIAL 233. INTELLIGENCE ABE BASED EXTENDABLE SHARING OF PERSONAL HEALTH RECORD 234. IN CLOUD VIRTUAL REALITY-CONFUSING THE BRAIN TO REDUCE PAIN FOR 235. PATIENTS 236. REVERSE SKYLINE QUERY PROCESSING FOR UNCERTAIN DATA 237. MAPPING RESOURCE USING NETWORKED CLOUD THROUGH ILS AN EFFICIENT PROTECTION FOR MULTITIER WEB APPLICATION USING 238. DOUBLE GUARD SYSTEM INTELLIGENT SYSTEM ON WATER QUALITY MONITORING AND 239. PURIFICATION IN WATER TANK SELFCARE EMERGENCY DETECTION AND MEDICAL ASSISTANCE 240. USING ANT COLONY ALGORITHM SECURITY USING KERBEROS FOR STORAGE CLOUD WITH HIGH 241. VOLUME OF DATA FORWARDING 242. GPRS DRIVING WAP ON THE ROAD TO 3G SIGNIFICANT ANALYSIS OF TERMS IN BOOTSTRAPPING ONTOLOGY 243. FOR WEB SERVICES 244. ENHANCED PRIVACY ID WITH REVOCATION CAPABILITIES 245. CLOUD COMPUTING USING SMS IN MOBILE PHONE FOR HOME APPLIANCES CONTROLLING 246. THROUGH PC PARALLEL PORT INTERFACING REFINEMENT IN COGNITIVE RADIO NETWORK FOR SPECTRUM 247. HANDOFF 248. I-DRIVE - AN INTELLIGENT DRIVING SYSTEM AUTHENTICATION ON KEY MANAGEMENT FRAMEWORK WITH 249. HYBRID MULTICASTING NETWORKS 250. AUTHORITY DETECTION AND COMMUNICATIONS INTO DIVERSE
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

251. 252. 253. 254. 255. 256. 257. 258. 259. 260. 261. 262. 263. 264. 265. 266. 267. 268. 269. 270. 271. 272. 273. 274. 275. 276. 277. 278. 279.

SERVICE-ORIENTED SYSTEMS ADAPTIVE MULTIPLE REGION SEGMENTATION BASED ON OUTDOOR OBJECT DETECTION IMPLEMENTING SCALING ONLINE SOCIAL NETWORKS USING SOCIAL PARTITIONING AND REPLICATION EFFICIENT FORWARDING PROTOCOL TO TOLERATE SELFISH BEHAVIOR IN SOCIAL MOBILE NETWORK IMAGE PROCESSING MATHEMATICAL MORPHOLOGY BASED FEATURE EXTRACTION FOR REMOTELY SENSED IMAGE TRAFFIC PATTERN MULTIPLE KEY GENERATION USING ELLIPTIC CURVE CRYPTOGRAPHY FUSION ALGORITHM FOR BIOMETRIC SOURCE A NONLINE OF SIGHTS PROVIDES IN VANET USING THE MOBILE TOWERS TECHNOLOGY VOICE CALLS OVER WI-FI PRIVACY PRESERVING ON DEMAND ROUTING USING USOR FOR MANET ENERGY CONSUMPTION IN SENSOR NETWORK USING CONTINUOUS NEIGHBOR DISCOVERY SASY USER NAME AND PASSWORD CLOUD AN EFFICIENT DATA AUDITING IN CLOUD COMPUTING NATURE AGENT BASED ADAPTIVE ENERGY EFFICIENT MOBILITY PATTERN AWARE ALGORITHM FOR MANET RESCUE ROBOT FOR LIFE SAVING OPERATION FUZZY NETWORK PROFILING FOR INTRUSION DETECTION A SECURE CLOUD STORAGE SERVICES BASED ON A SEPARATE ENCRYPTION AND DECRYPTION HIGH EFFICENCY VIDEO CODEC USING CDSA A FLASH TRIE ARCHITECTURE LOOKUP FOR IPV6 PROTOCOL CHANNEL ESTIMATION ALGORITHMS USING LSE FOR OFDM-IDMA STATELESS MULTICAST PROTOCOL FOR ADHOC NETWORKS FRAUD DETECTION IN SOCIAL SECURITY AND SOCIAL WELFARE DATA MINING MOTIF MINING IN SEQUENTIAL DATA SETS USING FLAME AN APPROACH FOR ANOMALY BASED DETECTION AND PREVENTIONS OF STATE VIOLATIONS IN WEBAPPLICATION VULNERABILITIES RESOURCE PROVISIONING COST OF CLOUD COMPUTING BY ADAPTIVE RESERVATION TECHNIQUES REMOTE LOGIN ATTACK RESISTANT WITH CRYPTOGRAPHY SUPPORT SECURE ROUTING PROTOCOL IN MOBILE ADHOC NETWORKS CORMAN: A NOVEL COOPERATIVE OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKS PREDICTING THE USEFULNESS AND IMPACT OF REVIEW FOR MOVIE DOMAIN HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

280. 281. 282. 283. 284. 285. 286. 287. 288. 289. 290. 291. 292. 293. 294. 295. 296. 297. 298. 299. 300. 301. 302. 303. 304.

FLEXIBLE AND ACCESS CONTROL IN CLOUD COMPUTING SECURED MULTIMEDIA COMMUNICATION USING ADVANCED STANDARD ENCRYPTION ALGORITHM IN MPGEG 4 -VIDEO A NOVEL APPROACH FOR DOCUMENT RETRIEVAL USING HAC BASED ON MVS MEASURE A SCORE BASED TRUSTWORTHY DECLARATION SCHEME FOR VANETS DIAGNOSIS AND CLASSIFICATION OF STAGES IN ALZHEIMERS DISEASE USING DECISION TREE CLASSIFIER MULTICAST AUTHENTICATION PROTOCOL FOR MANET AN EFFICIENT APPROACH TO DETECT EXUDATES AND MICROANEURYSMS IN COLOR FUNDUS IMAGES USING GUASSIAN NETWORKS FOG INSENSITIVE ONLINE ADAPTIVE WAVELET SVM CLASSIFIER BASED WILD FIRE DETECTION FLAME AND FIRE EDGE DETECTION AND PARAMETER MONITORING WITH AN AUTOADAPTIVE BASED ALGORITHM A CROSS-LAYER IMPLEMENTATION AND EFFICIENCY IMPROVEMENT USING CL-DNA PRIVACY PROTECTION IN MOBILE AD-HOC NETWORK BOUNDARY DETECTION IN ULTRASOUND IMAGES DENOISING OF ULTRASOUND IMAGE USING IMPROVED OSRAD A NOVEL CONTEXT BASED REVERSIBLE WATERMARKING AN INNOVATIVE APPROACH IN CLUSTERING WIRELESS SENSOR NETWORKS USING FUZZY-LOGIC AND ENERGY EFFICIENT HIERARCHY HISTOGRAM SPECIFICATION METHOD FOR BRIGHTNESS PRESERVING CONTRAST ENHANCEMENT TOWARDS EFFICIENT DATA STORAGE IN CLOUD USING TORNADO CODES AN ADAPTIVE SCORING JOB SCHEDULING FOR CLOUD DATA CENTERS A NEW ADAPTIVE EDGE SENSING DEMOSAICING ALGORITHM A NOVEL ALGORITHM FOR MINING FREQUENT ITEMSETS WITH ITS QUANTITY AN ENHANCED DIGITAL SIGNATURE BASED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK SEGMENTATION AND RECOGNITION OF UNSTRUCTURED BACKGROUND OBJECTS USING PERCEPTUAL ORGANIZATION DEVELOPING A REPUTATION BASED TRUST MODEL FOR MULTI AGENT SYSTEM IDENTIFYING MALICIOUS PACKET LOSS IN DISRUPTION TOLERANT NETWORK MEASURABLE PLANNING OF INTELIGENCES IN STREAMIN DATA WAREHOUSES IMPLEMENTING TRUST NEGOTIATIONS IN MULTISESSION
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

305. 306. 307. 308. 309. 310. 311. 312. 313. 314. 315. 316. 317. 318. 319. 320. 321. 322. 323. 324. 325. 326. 327. 328. 329. 330.

TRANSACTIONS MOUSE ACTIVITY BY EYE EXPRESSIONS USING ENSEMBLE METHOD EFFICIENT AND SECURE AUTHENTICATION FOR MULTICAST TRAFFIC IN WIRELESS AD-HOC NETWORKS ENERGY EFFICIENT UTILIZATION USING LEARN ALGORITHM MULTIPLE SECURITY USING AES AND AUTHENTICATION WIDGET A REAL TIME VISION SYSTEM FOR DETECTING THE MOVING OBJECT USING AHBS MODEL TEST CASE PRIORITIZATION TECHNIQUE TO ASSIST REGRESSION TESTING BASED ON DEPENDENCY DETECTION DISTRIBUTED VIDEO STREAMING IN ANDROID SMARTPHONES IMPROVED THROUGHPUT EFFICIENT RC5 ALGORITHM USING NIOS II BASED SYSTEM A WEIGTHED-TRIPLE QUALITY FOR WORD FREQUENCY IN CATEGORICAL DATA CLUSTERING PREDICTION OF CODE FAULTS USING NAIVE BAYES AND SVM CLASSIFIER SCHEDULING FOR REAL TIME ANTILOCK BRAKING SYSTEM(ABS) STRUCTURED DATA EXTRACTION FROM THE DEEP WEB USING TAG AND VALUE SIMILARITY SECURED PAYMENT FOR OUTSOURCED COMPUTATION USING HOMOMORPHIC ENCRYPTION CONTENT BASED IMAGE RETRIEVAL TECHNIQUE USING DIFFERENT WAVELETS AND TEXTURE FEATURES FREQUENCY BASED CAMOUFLAGING WORM DETECTION INTEGRATION OF MULTIMEDIA MEDICAL DATA IN TO DISTRIBUTED M-HEALTH SYSTEMS POWER EFFICIENT MODULATION FOR WIRELESS BODY AREA NETWORK USING MULTIBAND UWB TECHNOLOGY EFFICIENT DISCOVERY OF SERVICES USING SEMANTIC BASED ONTOLOGY RISK AWARE SOLUTION FOR REDUCING MANET ROUTING ATTACKS HARVESTING IMAGE DATABASES FROM THE WEB TRUSTED APPLICATION CENTRIC AD HOC NETWORK SYSTEMS USING UWB COMMUNICATION TO ENHANCE PULSED-OFDM THROUGHPUT WITH APSK MODULATION AND LDPC CODES FOR WPAN SYSTEMS CLOSED COUNTER SEGMENTATION USING EDGE ALGORITHM IN ULTRASOUND IMAGE ADAPTIVE PREFIX MATCHING BASED EFFICIENT VIRUS DETECTION PROCESSOR COLOR IMAGE ENHANCEMENT USING REGULARIZER BASED APPROACH CLUSTER AND CLUSTERING BASED PACKET FORWARDING IN NONDETERMINISTIC DTN
Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

International Conference On Innovative Trends In Computing And Technology Icitct'13 March 2013

331. 332. 333. 334. 335. 336. 337. 338. 339. 340. 341. 342. 343. 344. 345. 346. 347. 348. 349. 350. 351.

DESIGN OF A MINIATURIZED SLOT MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS ENERGY EFFICIENT DYNAMIC NODE SELECTION BASED HYBRID ALGORITHM MULTIMODAL BIOMETRICS USING SPARSE APPROXIMATED NEAREST POINTS BETWEEN IMAGE SETS INDIAN LICENSE PLATE RECOGNITION BASED ON OPTICAL CHARACTER RECOGNITION AN EFFICIENT COLLABORATIVE WATCHDOG METHOD FOR DETECTING SELFISH NODE OVER MOBILE AD HOC NETWORK AUTOMATIC ROAD SIGN DETECTION BASED ON COLOR AND SHAPE ANALYSIS ROBUST DATA COLLECTION POINT DETECTION ALGORITHMS FOR WIRELESS SENSOR NETWORKS WITH A MOBILE BASE STATION ROBUST WHITE MATTER LESION SEGMENTATION IN MRI BRAIN IMAGE USING KFCM SCALABLE ACTIVE LEARNING FOR MULTICLASS IMAGE CLASSIFICATION USING SUPER SELF ORGANIZING MAPS BASED 3D OBJECT RECOGNITION A NOVEL CIPHER SECURITY MECHANISM FOR IEEE 802.11I ADAPTIVE DICTIONARY LEARNING BASED IMAGE SUPER RESOLUTION ENHANCEMENTS PREVENTING PHISHING PAGE BY THREE LEVEL FILTERING USING MULTIPURPOSE BROWSER SOCIETY SURVEILLANCE SYSTEM-A FORUM TO PORTRAY CITY NEEDS MOBILE TRANSLATION A MACHINE TRANSLATION SERVICE FOR HAND-HELD DEVICES ADAPTIVE PERFORMANCE FOR THE PREDICTION OF GRID RESOURCES ADVANCED SEMANTIC BASED FILE CONTAINER WITH INHERENT INDEXER Q-COMPOSITE PREDISTRIBUTION SCHEMES FOR AUTHENTICATION AND PAIRWISE KEY ESTABLISHMENT FRAMEWORK FOR MOBILE COMMERCE PATTERN MINING AND PREDICTION A NOVEL MULTI VIEWPOINT BASED CLUSTERING AND SIMILARITY MEASURE Secure And Authenticated Reversible Data Hiding In Encrypted Images An Unlinkable and Unobservable Secure Routing with Symmetric Approach for MANETS

Organized By, Department Of Computer Science And Engineering & Information technology The Rajaas Engineering College Vadakangulam

Vous aimerez peut-être aussi