auth_regn
TRANSCRIPT
Paper Registration Status - ICCA2012 - Pondicherry, India Saturday, January 14, 2012
6:59:21 PM
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
14 Web-Biometrics: User
Verification via Web
Interaction(With a Head Tracking
Mouse Usage)
Manju Panneerselvam Bio-genetic
Computing Systems
57 1
23 Private Key Generation (PKG)
Based Node ID Assignment in
Structured P2P Systems
M Jegatha Information Security
Systems
341 0
23 Private Key Generation (PKG)
Based Node ID Assignment in
Structured P2P Systems
R Venkadeshan Information Security
Systems
13 0
29 The place of information
technology as a well of
opportunities for poverty
alleviation
Afolashade Kuyoro Computer
Applications
32 0
34 Impact Of De-Authentication
Attack On Wireless Intrusion
Detection Systems
S Divya Information Security
Systems
24 0
38 Euler Number, Symmetry and
Histogram Based Hierarchical
Approach for English OCR
Mahesh Goyani Computational
Intelligence
29 0
41 Simulation of AODV Routing
Protocol
Ashish Chaurasia Information
Communication
34 0
52 Grid Computing - High Level
Computing to Access Internet
Ajit Nataraj C High Performance
Computing
89 0
52 Grid Computing - High Level
Computing to Access Internet
R Dinesh High Performance
Computing
151 0
Page 1 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
53 A Mechanism For Skew
Detection Of Online Bangla
Handwritten Words
Arnab Guchhait Human Computer
Interaction
98 0
53 A Mechanism For Skew
Detection Of Online Bangla
Handwritten Words
Rajib Ghosh Human Computer
Interaction
102 0
55 Nanotechnology- The New
Upgrade For Computers
Ramyasree Asokan High Performance
Computing
453
61 Authentication of Bluetooth
Using Biometrics
Mohankumar N Information Security
Systems
64 2
61 Authentication of Bluetooth
Using Biometrics
Madhusudhanan Information Security
Systems
65 2
62 Gaussian Kernel based
Intuitionistic Fuzzy C-Means
Clustering Algorithm in
Segmentation of Noisy Digital
Images
Prabhjot Kaur Sidhu Automated Systems 119 0
67 Scalable, Robust, Efficient
Location Database Architecture
Based on the Location-
Independent PTNs
Kaptan Singh Knowledge
Engineering
384 0
70 LOA-BRO-FAI Analysis in Grid
Computing Using SYL's
Algorithm
Sylvia Grace J Cloud Computing 108 0
71 The Grass root in Technical
communication
Prashanth G K Digital Computing
Systems
92 0
75 Gesture Based Communication G S L K Chand Human Computer
Interaction
103 0
Page 2 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
77 MPPC: Mobile Phone for
Physically Challenged with
Smart Interaction
Vigneshkumar
Saravanasundaram
Human Computer
Interaction
154 0
77 MPPC: Mobile Phone for
Physically Challenged with
Smart Interaction
M. U. Arumugam Pillai Human Computer
Interaction
153 0
77 MPPC: Mobile Phone for
Physically Challenged with
Smart Interaction
P. Yogeswaaran Selvam Human Computer
Interaction
350 0
79 A fuzzy Approach for mining
Time Series Data
Sadiq Hussain Bio-genetic
Computing Systems
101 1
81 Checkpoints for Cabs Using
Cellular Quad Band Module with
GPS
Pughazendi N Electronic Data
Systems
112 0
81 Checkpoints for Cabs Using
Cellular Quad Band Module with
GPS
Srivatsan Sundaravaradan Electronic Data
Systems
164 0
84 Web Application Testing Using
Inheritance Method
C D Rajaganapathy, T R
Srinivasan, S Gopikrishnan
Software
Engineering Systems
-- 0
91 Introducing the Internal File
System for the DATABASE
Packages
Priyanka Kulshrestha Digital Computing
Systems
160 0
95 An FPGA Based Framework
forExploitation of multi node
Architecture
Yasodai Ayyasamy Digital Computing
Systems
152 2
97 Incorporating 3D Features in
Internet TV: A Proposal
Akin Cellatoglu Computer
Applications
705 0
Page 3 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
97 Incorporating 3D Features in
Internet TV: A Proposal
Balasubramanian
Karuppanan
Computer
Applications
143 0
98 Improving the Performance of
Speech Recognition Using
Genetic Algorithm Based On
Artificial Neural Network
Narendran Sivasubramanian Signal Processing
Systems
189 1
105 Fuzzy Logic in Digital Image
Processing
Prashanth G K Computational
Intelligence
174 0
106 Understanding the Digital
Forensics: A Review
Shipra Maurya Digital Computing
System
158 0
108 Establishing Relationship
Between Customer Relationship
Management & E-Business
Ankur Shrivastav Electronic Data
Systems
155 0
108 Establishing Relationship
Between Customer Relationship
Management & E-Business
Rohit Joshi Electronic Data
Systems
134 0
110 VoIP Call Quality Optimization
through Cloud Computing
Srivatsan Sankaran Cloud Computing 150 1
110 VoIP Call Quality Optimization
through Cloud Computing
Sriram Madapusi Vasudevan Cloud Computing 149 1
111 Applying Database Independent
Technique To Discover
Interoperability Problem
Shefali Verma Knowledge
Engineering
231 1
111 Applying Database Independent
Technique To Discover
Interoperability Problem
Sachin Yadav Knowledge
Engineering
163 1
113 Security In Wireless Sensor
Networks
Rachid Haboub Information Security
Systems
162 0
Page 4 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
114 K-CCNF And SAT Complexity Kanak Chandra Bora Computer
Applications
172 1
114 K-CCNF And SAT Complexity Bichitra Kalita Computer
Applications
193 1
115 Management and flexible
transaction of uncertain data in
XML database
Umesh Dwivedi Knowledge
Engineering
563 0
115 Management and flexible
transaction of uncertain data in
XML database
Firoz Ahamad Knowledge
Engineering
631 0
116 ATM Card Theft Identification
and Remote Information Systems
Surya Natarajan Information Security
Systems
176 0
117 An Overview of Corner
Detection Algorithm
Ligendra Kumar Verma Will be classified! 798
120 Computing Schedule Variance
using Non – Ratio Scale
Properties
Srinivasa Gopal Computational
Mathematics
243 0
121 Enhancement of Optical
Character Recognition Output
and Testing using Graphical User
Interface
Pavithra Rajendran Computer
Applications
219 0
121 Enhancement of Optical
Character Recognition Output
and Testing using Graphical User
Interface
Janani Rajasekaran Computer
Applications
217 0
121 Enhancement of Optical
Character Recognition Output
and Testing using Graphical User
Interface
Nandhini Ramesh Computer
Applications
218 0
Page 5 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
122 An approach that will enable
processing of Clusters in mining
with a comparison of basic and
concurrent involving distribution
Umapavan Kumar Computer
Applications
204 0
128 Future Human Computer
Interaction
Satishkumar P. A. Human Computer
Interaction
197 2
132 Quantum Dot-Cellular Automata
to Significantly Reduce the Size
of Super Computers
Karthikeyan Damodaran,
Arun Kumar A, Jaideep H
Lakhani, Dheepak V
High Performance
Computation
234 2
133 Bluetooth Controlled Automated
Train Stopping System (BCATS)
Syed Akthar Aasif Automated Systems 269 0
133 Bluetooth Controlled Automated
Train Stopping System (BCATS)
Mohammed Shaffi Automated Systems 248 0
135 Computer Simulation of DLA in
Electrodeposition of Dendritic
Patterns
Anwar Pasha Deshmukh Computer
Applications
Manual 0
137 Programmatic Testing of a
Technology Product
Amol Khanapurkar Computer
Applications
635 0
137 Programmatic Testing of a
Technology Product
Suresh Malan Computer
Applications
215 0
137 Programmatic Testing of a
Technology Product
Chetan Phalak Computer
Applications
224 0
138 Implementation of the DES
Framework On SOA
Ashish Avasthi Software
Engineering Systems
256 0
Page 6 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
141 Data Set Privacy For
Organizations: A Review
Pankaj Kumar Sharma Knowledge
Engineering
210 0
143 Role of Cybernetics in
Management of Urban Disasters
Nirmita Mehrotra Will be classified! 195
145 Mind Controller (Brain Hacking) A Sunil Sai Human Computer
Interaction
220 1
153 A Survey On Efficient
Approaches For Securing The
Private Data In Cloud Computing
Randeep Kaur Chhabra Cloud Computing 322 0
157 Secure and Lightweight model
for m-Payment System based on
Hash Chain in Mobile Network
Chitra Kiran N Electronic Data
Systems
284 0
163 Stochastic Segregation of Steering
Scheduling Performance in Multi
Server Queueing Network
K. Sivaselvan Computational
Mathematics
259 0
167 Cloud Computing Strategy:A
Paradigm Shift in Information
Technology
Sivaraman Eswaran Cloud Computing 326 0
167 Cloud Computing Strategy:A
Paradigm Shift in Information
Technology
Hemalatha Raguram Cloud Computing 319 0
167 Cloud Computing Strategy:A
Paradigm Shift in Information
Technology
Manickachezian Rajakannu Cloud Computing 370 0
168 Binary Audio Cryptography
Scheme
Pradnya Khobragade Information Security
Systems
300 0
Page 7 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
170 On A Graph Theory Based
Approach For Improved
Computer Vision-II
Venkataraman
Yegnanarayanan
Signal Processing
Systems
301 0
173 Design Of Parallel Vector/Scalar
Floating Point Coprocessor For
Reconfigurable Architecture
Manikandan E Digital Computing
Systems
358 0
174 Implementation Details of
Various Job Scheduling
Heuristics Approaches for Cloud
Computing Environment
Paritosh Sardare Cloud Computing 475 0
174 Implementation Details of
Various Job Scheduling
Heuristics Approaches for Cloud
Computing Environment
Nikita Bais Cloud Computing 463 0
174 Implementation Details of
Various Job Scheduling
Heuristics Approaches for Cloud
Computing Environment
Sachin Solanki Cloud Computing 462 0
179 Algorithms in Simulated Parallel
Condition – A Performance
Analysis
Chhailadeep Kaur Kahlon Computer
Applications
824 0
179 Algorithms in Simulated Parallel
Condition – A Performance
Analysis
Gagandeep Singh Computer
Applications
257 0
201 An Analysis of Multilevel
Cascade H-Bridge 21-Level
Inverter Implemented in Matlab/
Simulink Software
Venkateshkumar M Automated System 374 1
Page 8 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
206 High Performance asynchronous
AC Motor Drive Using Fuzzy
Logic Controller
Devadas G Will be classified! 279
207 Reduction of Total Harmonic
Distortion in a Single Phase UPS
Inverter by using Neural
Network Controller
Deva Das G Will be classified! 276
211 Hybrid Genetic Algorithm for
Optimization of Bloom Filter in
Spam Filtering
Arulanand Natarajan Computer
Applications
627 5
212 Agent Oriented Software
Engineering Methodologies: A
Review
Devshri Roy Software
Engineering Systems
851 0
212 Agent Oriented Software
Engineering Methodologies: A
Review
Abhishek Singh Rathore Software
Engineering Systems
346 0
215 Indexing and Retrieval of
Multimedia Data In Cooperative
Work Environment
Pranita Ambre Digital Computing
System
274 0
216 Stochastic Dynamics of Markov
Chains using Circulation Theory
Govindan Padma Computational
Mathematics
345 4
220 Bit-Pattern Representation for
Design Pattern Identification
Anil Patil Software
Engineering Systems
884 0
220 Bit-Pattern Representation for
Design Pattern Identification
Pravin Game Software
Engineering Systems
884 0
222 Name Alias Detection based on
UI approach and Graph mining
method
Shweta Dharmadhikari Knowledge
Engineering
885 0
Page 9 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
222 Name Alias Detection based on
UI approach and Graph mining
method
Sumitra Jakhete Knowledge
Engineering
770 0
222 Name Alias Detection based on
UI approach and Graph mining
method
Madhuri Wakode Knowledge
Engineering
831 0
223 A Smart Book Reader Faroke Mohamed N Digital Computing
System
287 0
225 RECONOS: Re-Configurable &
Extensible OS Architecture
Pratik Gohil Open Source Systems 285 0
226 Calculating the Cohesion and
Coupling for Class Diagram
through Slicing Techniques
Akhilesh Kumar Software
Engineering Systems
282 0
233 An Insight on Vulnerability Patch
Management in Enterprise
Environment
Rakesh Kumar G L Information Security
Systems
295 0
234 Robust Modelling for
Steganography Using Genetic
Algorithm and Visual
Cryptography for Mitigating RS
Analysis
Akanksha Jain Computer
Applications
304 0
241 Analysis of soft computing in
Neural Network
Premalatha M Computer
Applications
323 1
242 An ID-based Directed Ring
Signature Scheme using Bilinear
Pairings over Elliptic Curves
Umaprasada Rao Bodasingi Information Security
Systems
455 4
242 An ID-based Directed Ring
Signature Scheme using Bilinear
Pairings over Elliptic Curves
K A Ajmath Information Security
Systems
398 4
Page 10 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
242 An ID-based Directed Ring
Signature Scheme using Bilinear
Pairings over Elliptic Curves
Vasudeva Reddy Punugu Information Security
Systems
342 4
243 Distance based Data aggregation
for Energy Efficiency in Wireless
Sensor Networks
Kusma S M, P I Basarkod,
Veena K N, B P Vijaya Kumar
Computational
Intelligence
Manual 1
249 A QoS based conceptual analysis
in Requirement Engineering for
Service-Based Systems
Priyaradhikadevi T Software
Engineering Systems
447 3
249 A QoS based conceptual analysis
in Requirement Engineering for
Service-Based Systems
Rajalakshmi Ganesh Software
Engineering Systems
328 0
251 A 3D Stacked Mesh NOC for
Reliable Inter-Layer
Communication and Congestion
Reduction
Karthigeyan K A Information
Communication
518 0
252 Mobile Operating System: A
comparative analysis
Rashmi Prajapati Information
Communication
395 0
252 Mobile Operating System: A
Comprative Analysis
Ruchira Shukla Information
Communication
318 0
253 Improved Stereo Disparity
Computation based on Adaptive
weight and Segmentation
Arvind Verma Automated Systems 643 0
253 Improved Stereo Disparity
Computation based on Adaptive
weight and Segmentation
Rachna Verma Automated Systems 320 0
Page 11 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
255 SVD based Image Watermarking
Technique Implemented for
Different Images
B Chitra Will be classified! 375
256 Fractal Estimation Using
Extended Triangularisation and
Box Counting Algorithm For Any
Geo-Referenced Point Data in GIS
Sridhar Ramachandran Will be classified! 776
257 Review Paper on Software Testing Saumya Rawat Software
Engineering Systems
402 0
257 Review Paper on Software Testing Ruchi Sharma Software
Engineering Systems
403 0
257 Review Paper on Software Testing Ratika Gupta Software
Engineering Systems
309 0
258 Goggle, NOT Google Alok Panchal Human Computer
Interaction
655 1
258 Goggle, NOT Google Abhishek Joshi Human Computer
Interaction
566 1
261 A Hybrid Genetic Algorithm for
the Job Shop Scheduling Problem
Tandra Pal Computational
Intelligence
380 0
261 A Hybrid Genetic Algorithm for
the Job Shop Scheduling Problem
Sudipta Mondal Computational
Intelligence
327 0
262 Low-Low Average Algorithm for
Scheduling Request-demanding
Cloud Workflows Involving
Overheads
Rajagopal Palson Kennedy Cloud Computing 767 0
263 Design of DAODV MANET
Routing protocol
P Shiekabdul Khader Information
Communication
1115 2
Page 12 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
263 Design of DAODV MANET
Routing protocol
Ilanchezhiapandian
Gurusamy
Information
Communication
856 2
265 An Intelligent Location
Prediction System for Banking
Loans Using Bayes Approach
Singaravelu Rajaprakash Computational
Intelligence
772 0
273 Simulation of Spread Spectrum
Modulation Techniques
Trima Piedade Fernandes e
Fizardo
Signal Processing
Systems
335 0
274 Solar tracking fuzzy control
system using AVR
Microcontroller
Rajendra Kokate Embedded Control
Systems
382 0
274 Solar tracking fuzzy control
system using AVR
Microcontroller
Bharati Sonawane Embedded Control
Systems
376 0
275 Novel Approach for Discovery of
Frequently Occurring Sequences
Emmanuel M Knowledge
Engineering
886 0
275 Novel Approach for Discovery of
Frequently Occurring Sequences
Anupama Phakatkar Knowledge
Engineering
891 0
275 Novel Approach for Discovery of
Frequently Occurring Sequences
Vibhavari Kamble Knowledge
Engineering
866 0
276 Modeling Impact of Varying
Data Rates for Various Spread
Spectrum Techniques on Load in
WLAN Ad-Hoc Mode
Rajan Vohra Information
Communication
344 0
282 An ANN Based Movie Business
Prediction Method using a Subset
of Training Data
Nirmalya Chowdhury Computational
Intelligence
716 0
Page 13 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
282 An ANN Based Movie Business
Prediction Method using a Subset
of Training Data
Debaditya Barman Computational
Intelligence
633 0
283 Vertical Handover Decision
Schemes in Heterogeneous
Wireless Networks
Archana Sreejith Information
Communication
622 0
286 Brain Computer Interface An
Innovative And Emerging
Engineering Technique Of
Speechless Thought Recognition
Gaurav Londhe Will be classified! 379
287 Finger Vein Biometric
Verification and Authentication:
An Overview
Sumit Kumar Bio-genetic
Computing Systems
394 0
287 Finger Vein Biometric
Verification and Authentication:
An Overview
Shilpi Munshi Bio-genetic
Computing Systems
474 0
287 Finger Vein Biometric
Verification and Authentication:
An Overview
Roop Kanwar Singh Bio-genetic
Computing Systems
476 0
289 A Survey of Optimization of
Resource Scheduling in Cloud
Computing
Bindu K R Cloud Computing 759 0
295 Modified Approach to Fuzzy
Entropy Clustering Method with
Adjustable Membership
Characteristics for Image
Segmentation
Pandiyarajan R Computational
Mathematics
377 3
298 Location Hiding Techniques for
Securing Distributed File System
Snehal Chaudhary Information Security
Systems
390 1
Page 14 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
298 Location Hiding Techniques for
Securing Distributed File System
Rajesh Ingle Information Security
Systems
730 1
300 Regression Analysis using Log
Data
Anup Jawanjal Knowledge
Engineering
877 0
302 An Algorithm for Dynamic
Search in Unstructured Peer-to-
Peer Overlay Network
Ashish Poste Information
Communication
876 0
303 Information hiding method based
on Steganography and Image
Morphing
Bhushan Zope Signal Processing
Systems
692 0
305 Evaluation Of Intrusion
Detection Technology In Grid
And Cloud Computing
Karthick Ramachandran S Cloud Computing 293 1
306 Study of Grammar tree Using L
System
Vinay Mishra Will be classified! 427
307 Edge Detection Techniques for
Finger-Knuckle Print Biometrics
Mahesh Kumar Bio-genetic
Computing Systems
392 1
307 Edge Detection Techniques for
Finger-Knuckle Print Biometrics
Jasmine R.L Bio-genetic
Computing Systems
360 1
308 CAPTCHA Generated
Monitoring Method for
Precluding Attacks On Servers
Nityanandam Natarajan Information Security
Systems
624 1
308 CAPTCHA Generated
Monitoring Method for
Precluding Attacks On Servers
Bama Ramadoss Information Security
Systems
623 1
314 Mobile Disaster Management
System Using Android
Technology
Deepti Shelar Information
Communication
418 0
Page 15 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
315 Empirical Validation of Quality
Characteristics of Academic
Websites
Ritu Shrivastava Software
Engineering Systems
439 0
316 Autonomous Network
Reconfiguration of WMN Using
ARS
Mohanram S Embedded Control
Systems
440 0
321 Analysis of Analog Multiplier Arun Katara Digital Computing
Systems
407 0
326 Visual & Web Usage Mining
Based On Extended Server Logs
Dipti Zambre Knowledge
Engineering
673 0
327 Opinion Mining : Extracting and
Analyzing Customers Opinion
Chandrashekhar Badgujar Knowledge
Engineering
677 0
328 Parallel Association Rule for
Data Mining in Multidimensional
Databases
C D Rajaganapathy, T R
Srinivasan, S Gopikrishnan
Knowledge
Engineering
-- 0
330 Universally Compatible DSP
Based Wire Feeder Controller for
MIG Welding System
Paramasivam Shunmugam Digital Computing
System
611 0
330 Universally Compatible DSP
Based Wire Feeder Controller for
MIG Welding System
Thiruvenkadam
Madhulingam
Digital Computing
System
610 0
330 Universally Compatible DSP
Based Wire Feeder Controller for
MIG Welding System
Srinivasan Kesavan Digital Computing
System
494 0
331 Handover Techniques for 4G
Networks
Piyali Dutta Information
Communication
419 0
Page 16 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
332 Node Localization in Wireless
Sensor Networks using Mobile
Anchor
Harshada Barde Digital Computing
Systems
420 0
333 Comparison of Image
Compression through Neural
Network And Wavelets
Kavita Pateriya Computational
Intelligence
408 0
334 Role of K-Guru in Dynamic
Game Analysis
Kalai Selvi, G V Uma Computer
Applications
428 0
335 Resource Aware Scheduling of
Slow Running Task in Data
Parallel Computing
Kalyani Waghmare High Performance
Computing
879 0
335 Resource Aware Scheduling of
Slow Running Task in Data
Parallel Computing
Bhushan Kandalkar High Performance
Computing
870 0
335 Resource Aware Scheduling of
Slow Running Task in Data
Parallel Computing
Shyam Deshmukh High Performance
Computing
883 0
336 Exploiting the Bit Error Diversity
for Efficient Error Detection in
Multihop Wireless Network
Yanthungbeni Humtsoe Information
Communication
865 0
337 Face Recognition using Fusion of
Thermal and Visual Images
S Vijay Ananth Computational
Intelligence
849 0
337 Face Recognition using Fusion of
Thermal and Visual Images
Thangadurai N Computational
Intelligence
848 0
338 Cloud Computing is an
application of Green
Computing - a new Horizon of
Energy Efficiency and Beyond
Asoke Nath Cloud Computing 829 0
Page 17 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
338 Cloud Computing is an
application of Green
Computing - a new Horizon of
Energy Efficiency and beyond
Shalabh Agarwal Cloud Computing 509 0
340 Design & Development of Digital
Frequency Multiplier
Sandip Ramteke Electronic Data
Systems
656 0
341 A Visual Interfacing for
Analyzing Three Graph Base
Image Segmentation Algorithms
Yeshwanth Deodhe Computer
Applications
768 0
342 Design and Implementation of
Sensor Network Using Can Bus
Rajesh Deshmukh Digital Computing
System
769 0
344 Ontology Based Question
Answering for
Arijit De Human Computer
Interaction
519 0
345 A Study of Congestion Aware
Adaptive Routing Protocols in
MANET
Shrikant Kokate Information
Communication
409 0
345 A Study of Congestion Aware
Adaptive Routing Protocols in
MANET
Shitalkumar Jain Information
Communication
594 0
346 SMS length expansion and
security approach in a mobile
device
Deepak Manglani Information
Communication
411 0
351 Multy-level Intrusion Detection
System in Cloud Computing
S V Narwane Cloud Computing 483 0
356 Bayesian aspect of Silloughty
estimation in multiview
segmentation
Sabna A B Signal Processing
Systems
433 0
Page 18 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
358 Dimensionality Reduction
Techniques for Face Image
Retrieval: A Review
Fousiya K K Signal Processing
Systems
469 0
360 Closeness: A New Privacy
Measure for Data Publishing
Harishbabu Kalidasu Will be classified! 414
365 Use of Multiple Concentric Layer
Criteria in Detection of Masses
from Mammograms: A Review
Sasinas Alias Haritha Z A Automated Systems 517 0
366 Mobile Charger without Using
External Power Supply
Dinesh Auti Will be classified! 715
368 Taxonomies, Challenges And
Approaches To Automatic Web
Query Classification
Mohammad Shahid Knowledge
Engineering
460 0
369 E-Learning Model for Quality of
Education Enhancement in
Universities
Kumar Krishnan Computer
Applications
585 2
369 E-Learning Model for Quality of
Education Enhancement in
Universities
Naseem Akthar Computer
Applications
747 2
370 Bayesian MAP Model for Edge
Preserving Image Restoration: A
Survey
Greeshma T.R Knowledge
Engineering
432 0
375 Predicting Data from
Unauthorized User to a
Authorized User Using Fake
Objects
Deepika Manoharan Information Security
Systems
452 0
Page 19 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
380 E-commerce Security: The Need,
Use and Efficiency of Encryption
Methods for Secure E-commerce
websites
Kishore Bhamidipati Information Security
Systems
532 0
381 Human Age Classification using
2-D Gabor Wavelet and Neural
Network
Jayant Jagtap Signal Processing
Systems
445 0
382 Design and Implementation of
Low Power and Area Efficient
adder and Vedic Multiplier for
FFT
D Jaganathan Embedded Control
Systems
443 0
385 Performance Enchancement of
DWT Processing using GPGPU
Phani Tejaswi K High Performance
Computation
444 0
385 Performance Enchancement of
DWT Processing using GPGPU
Thara Nair High Performance
Computation
681 0
385 Performance Enchancement of
DWT Processing using GPGPU
A V V Prasad High Performance
Computation
682 0
386 Early detection of Cancer using
Bioinformatics
Chandrasekhar Uddagiri Bio-Genetic
Computing
674 0
390 Virtual Integrated Test Team for
Telecommunication Ventures
Sumithra Devi K A Software
Engineering Systems
665 0
390 Virtual Integrated Test Team for
Telecommunication Ventures
Manju Geogy Software
Engineering Systems
451 0
391 Mobile Learning for Senior
Citizens
P F Xavier Patrick Kishore Electronic Data
Systems
465 0
391 Mobile Learning for Senior
Citizens
P Sagaya Aurelia Electronic Data
Systems
449 0
Page 20 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
391 Mobile Learning for Senior
Citizens
Khamis Faraj Alarabi Electronic Data
Systems
466 0
393 Effect of Topology on Routing
Performance in partially Mobile
Ad-hoc Networks
Ningrinla Marchang Information
Communication
936 0
393 Effect of Topology on Routing
Performance in partially Mobile
Ad-hoc Networks
Nibedita Shial Information
Communication
937 0
394 Opinion Mining For Decision
Making In Medical Decision
Support System - A Survey
A. Ananda Shankar Knowledge
Engineering
587 0
397 Grid Resource Management
Based On Agent Grouping
Arun Prakash Embedded Control
Systems
576 0
399 Low Power Compressed CGRA
Architecture Based Processor
Design
Kishore S Signal Processing
Systems
709 0
400 A Novel Approach Towards
Legal Information Retrieval
Deshnidhi Yadav Will be classified! 473
402 Establishing the Relationship
between Customer Relationship
Management and E- Business
Manu Chopra Management 471 0
403 A Study on SC-FDMA Advance
Access Scheme for 4G
Chandra Shekhar Information
Communication
472 0
406 Optimized Implementation of
Reduced Size LUT in Built in Self-
Testing
A Ajith Kumar Embedded Control
Systems
726 0
Page 21 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
407 Segmentation of Pulmonary
Nodule in Computed
Tomography Scan for Lung
Disorder Prediction
Mahesh Pawar Computer
Applications
651 0
407 Segmentation of Pulmonary
Nodule in Computed
Tomography Scan for Lung
Disorder Prediction
Vilas Alagdeve Computer
Applications
649 0
408 Towards Agile Project
Management
Nitin Uikey Software
Engineering Systems
482 0
408 Towards Agile Project
Management
Ugrasen Suman Software
Engineering Systems
724 0
410 The recent Advances and future
Trends In Wireless Biotelemetry
System
Madhupriya Senapati Electronic Data
Systems
679 0
411 Design Issues of Bus Arbitration
Schemes in Shared Bus
Multiprocessor(MPSoC)
Neeta Doifode Electronic Data
Systems
657 0
413 An Context Aware Document
Clustering Using Data Fusion
Venkatesh Kumar Electronic Data
Systems
663 0
416 An Efficient Method for Video
Shot Segmentation and
Classification
V Vijayakumar Computer
Applications
468 0
417 Resource allocation in P2P
system using Bit Torrent
Thamaraiselvi
Krishnamoorthy
High Performance
Computing
294 0
418 Transportation Vehicle
Information System Using
Wireless Technology
Sushma Lute Will be classified! 671
Page 22 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
419 Mathematical Heuristics for Feed
Forward Artificial Neural
Network Design
Aakash Goel Signal Processing
Systems
456 0
419 Mathematical Heuristics for Feed
Forward Artificial Neural
Network Design
Vandit Bhatia Signal Processing
Systems
578 0
423 A Modified Cluster Based Co-
Operative Spectrum Sensing
Algorithm Using Dempster
Shafer Theory
Aliasger Gabuji Information
Communication
564 0
423 A Modified Cluster Based Co-
Operative Spectrum Sensing
Algorithm Using Dempster
Shafer Theory
G. Pawan Kumar Information
Communication
641 0
423 A Modified Cluster Based Co-
Operative Spectrum Sensing
Algorithm Using Dempster
Shafer Theory
Anju Kulkarni Information
Communication
639 0
423 A Modified Cluster Based Co-
Operative Spectrum Sensing
Algorithm Using Dempster
Shafer Theory
Nikhil Agarwal Information
Communication
504 0
425 Image Resolution Enhancement
Based On Edge Directional
Interpolation in Duel Tree-
Complex Wavelet Transform
Suresh L, D Loganathan Signal Processing
Systems
499 0
430 Can Human Computer
Interaction (HCI) bridge the
Digital Divide? A Case of ‘Akash’
in India
Shilpa Tripathi Human Computer
Interaction
748 0
Page 23 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
431 Security Enhanced Instant
Messaging
Mukul Manmohan Meghwal Information Security
Systems
786 0
431 Security Enhanced Instant
Messaging
Raghuveer Singh Dhaka Information Security
Systems
783 0
431 Security Enhanced Instant
Messaging
Arvind Dhaka Information Security
Systems
550 0
432 Protocol Design For Advanced
Security In Wireless Networks
Raghuveer Singh Dhaka Information
Communication
551 1
432 Protocol Design For Advanced
Security In Wireless Networks
Arvind Dhaka Information
Communication
781 1
433 One Time Password: A Secure
Authentication Scheme
Raghuveer Singh Dhaka Information Security
Systems
784 1
433 One Time Password: A Secure
Authentication Scheme
Arvind Dhaka Information Security
Systems
780 1
433 One Time Password: A Secure
Authentication Scheme
Mukul Manmohan Meghwal Information Security
Systems
552 1
434 Optimized Design variants of a
self-powering CMOS
Optoelectronic VLSI Circuit
Swaminathan S Embedded Control
Systems
735 0
434 Optimized Design variants of a
self-powering CMOS
Optoelectronic VLSI Circuit
Swarrnna Karthik
Parthasarathy
Embedded Control
Systems
737 0
436 Iris Recognition using DWT with
Optimized Decomposition Levels
Sambita Dalal Bio-genetic
Computing Systems
516 1
437 A Review of Wireless Security
Protocols: WEP, WPA and WPA-
2
Raghuveer Singh Dhaka Information Security
Systems
553 0
Page 24 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
437 A Review of Wireless Security
Protocols: WEP, WPA and WPA-
2
Mukul Manmohan Meghwal Information Security
Systems
785 0
437 A Review of Wireless Security
Protocols: WEP, WPA and WPA-
2
Arvind Dhaka Information Security
Systems
782 0
438 Application Of Graph Theory In
Computer Science(Implementing
Greedy Algorithm For map
Coloring in GSM mobile Network
Mahadevi Namose Signal Processing
Systems
522 1
439 Fabric Defect Detection Using
Statistical Texture Analysis
S Padmavathi Computer
Applications
487 0
444 A Novel Ranking Algorithms for
Ordering Web Search Results
Gaurav Agarwal Knowledge
Engineering
493 0
445 UML Designing and
Comparative Performance of
Various Computer Networks
Neeraj Verma Software
Engineering Systems
490 0
447 Performance & Evaluation of DSS
Using OLAP Techniques In The
Data Warehouse
Renu Yadav Knowledge
Engineering
491 0
448 A Nascent Approach for
Symmetric Key Encryption Using
Double DES
Praful Saxena Digital Computing
Systems
496 0
449 Survey Of Digital Image
Steganography In DWT Domain
Ilavendhan Anandaraj Computer
Applications
567 0
449 Survey Of Digital Image
Steganography In DWT Domain
D Loganathan Computer
Applications
-- 0
Page 25 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
451 A Comparison of Fuzzy
Clustering Techniques for Image
Segmentation
Prasad Sangare Will be classified! 658
453 Target Geo-Localization System
by Geo-Referencing Mini Aerial
Vehicle Video Mosaics
Mahadeeswara Yadav Automated Systems 745 0
454 Analysis of 4x4 crossbar switch
for Network Processor
Prashant Wanjari Will be classified! 659
456 Key Frame Extraction Based On
Block Based Histogram
Difference and Edge Matching
Rate
Vigneswaran Selvaraj Computer
Applications
488 1
456 Key Frame Extraction Based On
Block Based Histogram
Difference and Edge Matching
Rate
Bremananth Ramachandran Computer
Applications
845 1
457 Autonomous Navigation of
Unmanned Aerial Vehicle Using
Image Flow Algorithm
Annaiyan Arun Automated Systems 746 0
461 Development and Evaluation of a
Document Clustering Engine
Monali Kulkarni Knowledge
Engineering
492 0
468 Analysis of Bent Ground plane
on MIMO Antenna
Bhushan Kalamkar Will be classified! 620
470 Comparative Study Of
Algorithms For Extraction Of
Blood Vessels From Retinal color
Images
Sapana Dhanvijay Will be classified! 732
473 Survey of Security Issues in
Mobile Ad-hoc Network
Praful Pardhi Will be classified! 513
Page 26 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
475 An Approach For Disease –
Treatment In Medline Using
Semantic Relations
Menaka Ponmalai Signal Processing
Systems
959 0
478 FOSS - A facilitator in teaching Harshad Gune Open Source Systems 738 0
478 FOSS - A facilitator in teaching Akshay Rashinkar Open Source Systems 840 0
479 Design of Fuzzy Logic Scheme
for Speed control of Induction
Motor
Gannavarapu Akhilesh Automated Systems 479 0
480 A Distributed Process System
Architecture for Biological Data
Analysis
Kyoung-Soon Hwang, Chan-
Hee Lee, Keon- Myung Lee
Computer
Applications
621 0
481 SSO Use Case in Cloud
Computing for Securacy to
Worldwide Users
Karunanithi D Cloud Computing 628 0
481 SSO Use Case in Cloud
Computing for Securacy to
Worldwide Users
Kiruthika Balu Cloud Computing 630 0
482 PAPR Reduction Technique in
MIMO-OFDM Based Wireless
Communication
Debasis Surya Narayan Das Signal Processing
Systems
481 0
482 PAPR Reduction Technique in
MIMO-OFDM Based Wireless
Communication
Arun Kumar Ray Signal Processing
Systems
794 0
482 PAPR Reduction Technique in
MIMO-OFDM Based Wireless
Communication
Mihir Narayan Mohanty Signal Processing
Systems
806 0
Page 27 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
483 Hierarchical Energy Efficient
Protocol for LLC in Wireless
Sensor Networks
Gandhimathi K Software
Engineering Systems
755 1
483 Hierarchical Energy Efficient
Protocol for LLC in Wireless
Sensor Networks
Vinothini Murugan Software
Engineering Systems
648 1
485 Survey of Reactive Routing
Protocols in Mobile Adhoc
Networks
Jayalakshmi V Information
Communication
645 0
486 Real time wind speed analysis
and prediction of wind power
generation using Artificial
Neural Network (ANN)
R Ponnusamy Automated Systems -- 1
486 Real time wind speed analysis
and prediction of wind power
generation using Artificial
Neural Network (ANN)
P Sardar Maran Automated Systems 503 1
487 Certain Optimization Methods
for Design Space Compression of
Arithmetic Circuits
Georgina Binoy Joseph Computer
Applications
863 1
487 Certain Optimization Methods
for Design Space Compression of
Arithmetic Circuits
Ranganathan Vijayaraghavan Computer
Applications
581 1
490 Spontaneous Sorting Clock for
Providing Judgments to Civil
Cases
Annapoorani Venkatesan Will be classified! 514
491 Strong Secure Communication
Technique: Steganography With
Hybrid Cryptography
Smita Bansod Information Security
Systems
442 0
Page 28 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
493 Discrimination between Airway
Diseases with Similar Symptoms
the Lung Diseases
Sheetal Ukunde Will be classified! 664
494 Node Classification for Energy
Efficient and Reliable
Hierarchical WSN Protocol
Sang-ho Lee Information
Communication
700 0
494 Node Classification for Energy
Efficient and Reliable
Hierarchical WSN Protocol
Ning Sun Information
Communication
588 0
496 A Comprehensive Approach Of
Access Control For E-Commerce
Using Mobile Agents
Vishwanath Panchagnula Will be classified! 788
497 A Data Mining Approach for
Mobility Prediction Using
Wireless Traces
Ananthi J Information
Communication
601 0
497 A Data Mining Approach for
Mobility Prediction Using
Wireless Traces
Ranganathan Vijayaraghavan Information
Communication
862 0
497 A Data Mining Approach for
Mobility Prediction Using
Wireless Traces
Menaka R Information
Communication
861 0
500 Search Based Optimization for
Test Data Generation Using
Genetic Approaches
Kuppuraj Swaminathan Software
Engineering Systems
754 0
500 Search Based Optimization for
Test Data Generation Using
Genetic Approaches
Priya Sudharsan Software
Engineering Systems
614 0
Page 29 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
502 StegGen:An Optimized
Steganographic Tool Based on GA
Murugeswari K Digital Computing
System
734 0
504 Success and Failure Factors of e-
Government project
implementation in Yemen: An
explore Study
Mahdi Abdullah M. Alsebaei Management 762 0
506 Software designing for shrinkage
testing station DIL 402C
Piotr Kuźmiński, Marek
Hebda
Software
Engineering Systems
Manual 0
512 Efficient Data Storage and
Security Using Data Grid
G Manimala Information Security
Systems
637 1
520 Knowledge Management
Strategies for Implementation of
Green Technologies
Sonali Shirpurkar Badkas Knowledge
Engineering
642 0
522 A Design Model of Banking
Website in Perspective of
Behavioral Feasibility Study
Saravanan C Management 640 0
522 A Design Model of Banking
Website in Perspective of
Behavioral Feasibility Study
Vinay R Management 689 0
525 Component Weight Assignment
Algorithm With SVM : Mining
Reviews For Social And
Economic Support
T Kohilakanagalakshmi Knowledge
Engineering
570 0
525 Component Weight Assignment
Algorithm with SVM: Mining
Reviews for Social and Economic
Support
Tina Esther Trueman Knowledge
Engineering
634 0
Page 30 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
527 Band Limited Linear Predictive
Coding Vocoder in Digital
Hearing Aids
Sharmina Bharwani Will be classified! 744
528 Thresholding Techniques for
Skull Stripping the MRI Brain
Images
Mahesh Pawar Signal Processing
Systems
721 0
528 Thresholding Techniques for
Skull Stripping the MRI Brain
Images
Vijendra Meshram Signal Processing
Systems
720 0
530 A Correlative Analysis of
Methodologies Involved In
Ontology Construction for E-
Learning
Suresh R M Knowledge
Engineering
666 0
530 A Correlative Analysis of
Methodologies Involved In
Ontology Construction for E-
Learning
Rebecca Amulya D Knowledge
Engineering
779 0
535 Auscultation and Separation of
Heart Sound from Respiratory
Sound Using Lab-View
Yogesh Gaidhane Computer
Applications
546 0
535 Auscultation and Separation of
Heart Sound from Respiratory
Sound Using Lab-View
Zahir Quazi Computer
Applications
931 0
539 Comparative Study between
Traditional and Heuristic
Approach on Close-degree
Concept Lattice for better
Attribute Reduction
Ravindra Gupta Will be classified! 714
Page 31 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
543 A Newfangled Approach to
Semantic Search for E-Tourism
Domain
Palaniammal K Will be classified! 688
545 Application of UML Design
Documents with Design Metrics
and OCL Specification for
Critical Component Identification
A. Jalila Will be classified! 695
546 Ranking of Documents in
Semantic Web using Particle
Optimization
Sanjeeve Kumar Knowledge
Engineering
892
546 Ranking of Documents in
Semantic Web using Particle
Optimization
Selvarani CM Knowledge
Engineering
992
546 Ranking of Documents in
Semantic Web using Particle
Optimization
Francis Densil Raj Knowledge
Engineering
733
549 Analysis of Computational Errors
in Digital Signal Processing with
Voltage Scaling
Vishwas Balpande Signal Processing
Systems
704 0
550 A Combinatorial Approach for
Design of Fuzzy Based Intrusion
Detection System
Bhuvaneswaran R S Computational
Intelligence
751 2
550 A Combinatorial Approach for
Design of Fuzzy Based Intrusion
Detection System
Vydeki Dharmar Computational
Intelligence
702 2
553 Implementation of Differentiator
Using PFG
Sonalee Suryawanshi Signal Processing
Systems
731 0
Page 32 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
554 SMPS With Linear PWM
Technique
Ishan Chintawar Electronic Data
System
706 0
555 Performance Analysis of Routing
Protocols in Mobile Adhoc
Netoworks
Th. Ibungomacha singh Information
Communication
727 0
556 Implementation of DS-SS Based
CDMA Transmitter and Receiver
Using Gold Code for FPGA
Kshama Dawile Electronic Data
Systems
743 0
557 An Improved Approach to F-
COCOMO using PI Membership
Function
Anupama Kaushik Software
Engineering Systems
774 0
559 APC-OMS Combined LUT for
Memory Based Computation
Eldho John Electronic Data
Systems
583 2
562 Gas Identification Using
Artificial Intelligence Tecnique
Poonam Agarkar Will be classified! 741
564 Extended Diffie-Hellman
Algorithm for Key Exchange and
Management
Akhil Kaushik Will be classified! 712
566 Literature Survey and Proposed
Concept on Performance Issue of
Multicasting Routing Protocol in
Wireless Sensor Network
Rahul Verma Information
Communication
699 0
566 Literature Survey and Proposed
Concept on Performance Issue of
Multicasting Routing Protocol in
Wireless Sensor Network
Akhilesh Waoo Information
Communication
835 0
Page 33 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
566 Literature Survey and Proposed
Concept on Performance Issue of
Multicasting Routing Protocol in
Wireless Sensor Network
Pushpinder Singh Patheja Information
Communication
836 0
567 Literature Survey on LEACH
Protocol in Wireless Sensor
Network
Aishwary Agrawal Digital Computing
Systems
698 0
568 Performance Analysis of Simple
Adaptive Median Filter In
Reducing Impulse Noise Level
from Digital Images
Vicky Ambule Will be classified! 740
569 Literature Survey and Proposed
model to Enhance Security of
Database
Naveen Kolhe Knowledge
Engineering
684 0
571 A Metrics Driven Approach to
Specify Usable Security in Web
Service Discovery
Marimuthu Govindaraj Will be classified! 728
574 A New Early Parsing Algorithm
for Lexicalized Tree Adjoining
Grammar
Sharafudheen Kambunkal Human Computer
Interaction
818 0
576 Designing A High-Performance
Scalable Framework Over Cloud
For Managing Online
Programming Contests
Amol khanapurkar, Mohit
Nanda, Ravi Ojha
Will be classified! Manual
577 Power Reduction Technique in
Testing Of VLSI Circuits
Arun Mohan Electronic Data
Systems
687 0
578 Self Test Technique for Two Fish
Algorithm
Rahul R Nair Computer
Applications
670 0
Page 34 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
580 An Intelligent Image Retrieval
based on Wavelet Transform and
Similarity Method
K Seetharaman Signal Processing
Systems
843 1
580 An Intelligent Image Retrieval
based on Wavelet Transform and
Similarity method
M Kamarasan Signal Processing
Systems
719 1
586 WEB 2.0 Shweta Gode Will be classified! 766
587 Issues and Challenges in a Cloud
Computing Environment
A. Murali M Rao Cloud Computing 753 0
592 Intrusion Detection System using
Outlier Detection and
Classification Techniques
Jaishankar N Will be classified! 834
592 Intrusion Detection System using
Outlier Detection and
Classification Techniques
Sumesh Manikandan Will be classified! 764
593 Extraction of Signal features from
Deaf-mute Voice Signal
Nirmala Devi J, K
Bomannaraja
Signal Processing
Systems
949 0
601 Securing IPv6 Signaling for
SCADA Wireless Sensor Network
Hoon Ko, Yvette Gelogo, Tai-
Hoon Kim
Information Security
Systems
Manual 1
602 Smart Grid in Cloud Computing
Infrastructure: Review
Byeong-Ho Kang,Yvette
Gelogo
Cloud Computing Manual 1
603 The Cohesive Countermeasure
Schemes for Securing Wireless
Sensor Networks against
Vulnerabilities and Attacks:
Review
Ronnie D. Caytiles, Tai-hoon
Kim, Dominik Slezak
Information
Communication
Manual 1
Page 35 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.
ICCA ID Paper Title Author Name Track eReg ID CRC Reprint Copyrights
608 A Robust Design of RTU Sensor
Nodes Communication for
SCADA System
Sabah Mohammed, Ronnie
D. Caytiles and Tai-hoon Kim
Information
Communication
Manual 1
609 Secured SCADA System in Smart
Grid Deployment
Yvette Gelogo, Tai-Hoon Kim Information
Communication
Manual 1
610 Advanced Congestion Adaptive
Routing Mechanisms in MANET
Geetam Tomar Will be classified! 872
611 New Improved Methodology in
Advanced Driver Assistance
System
Sanket Borhade Will be classified! 935
618 Tele-Operative Ophthalmoscope Bharath Kumar Will be classified! 1089 1
622 Green ICT and its Global Impact Vinita Maheshwari Will be classified! 1085
624 Achieving Competetive
Advantage Using Automated
Securities Validation
Raghu Nemani Will be classified! 1071
631 Analysis of Foreign Direct
Investment in Service Sector: A
Study With Reference To India
K Maran Management 1123
Page 36 of 361. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10
2. Only the registered authors name will be available in certificate and proceedings.