Sei sulla pagina 1di 6

ARTCom 2009 - List of Accepted papers under Poster Paper category

Paper Paper Title Corresponding Author


ID Name
2 Applying Web 2.0 Services to Assist the Employment of Potharaju S R P Saradhi
Individuals with Mental Disabilities
16 Morphological Analysis of Handwritten Signature Image Debnath Bhattacharyya
20 Info Cardio Advanced Medical Image Analysis and automation Raju Jagadeesh Kannan
of Angioplasty using GIIM, IISM with CBR & RBR Intelligence
29 Automatic Seizure Detection Using Higher Order Moments Mohamed Bedeeuzzaman.V
30 Modeling of performance prediction in a Distributed Database S. Jagannatha
System Using SPE Approach
46 Hybrid Scenario Based Performance Study of MANET Routing Koushik Majumder
Protocols
48 Effect of intensity Modulated Optical illumination on the Y B.K.Mishra
parameters of the GaAs MESFET
49 Design of Analog to Digital Converter Using CMOS Logic P.Iyappan
54 A comparative study of similarity between Nucleotide Sequence Siddhartha Satapathy
of a DNA molecule and Irrational Number
56 A Novel Approach for Multimodal Biometric Score Fusion using Raghavendra.R
Gaussian Mixture Model and Monte Carlo Method
60 Load Balancing in Multi ECU Configuration Rajeshwari Hegde
62 Implementation Low Power Parallel Multiplier K.Ramanaidu
1001 Electricity Load Forecasting in Real Time Markets using SVM S. K. Aggarwal
and LSE based models
1002 DATA PREPARATION TECHNIQUES FOR WEB USAGE V. Sathiyamoorthi
MINING IN WORLD WIDE WEB
1004 A Novel algorithm of Competitor Mining with the Web A. Satyanarayana
1006 FPGA Based Design of a High Speed 32-Bit Floating-Point FFT Mr. Bhushan. V. Patil
Processor with Performance Comparison with traditional FFT
processor
1011 Super Resolution methods to achieve high quality imaging Mr. Bhushan. V. Patil
1013 Video Watermarking using ACA a New Way To Watermark Gurpreet Singh
1019 Role of Video Watermarking in E-commerce and E-governence Gurpreet Singh
Using ACA a new approach
1022 Development of dynamic clustering based handoff scheme N.S.V.Shet
1023 Delta Compression Effect on Smart Card Fingerprint Pavan Shrivastava
Verification System
1024 ACA A NEW WAY OF VIDEO WATERMARKING Gurpreet Singh
1031 MATHEMATICAL MODELING OF NEURO-CONTROLLED Himanshu Shekhar
BIONIC ARM
1041 Automated Regression Suite for Testing Web Services Ashok Kumar. S
1043 Himglancer : A Software Application for Tourism Industry Shruti Jain
1044 NONLINEAR HEURISTIC MODELING OF BIOMEDICAL Kiran.V
SIGNALS
1045 Codeword Based Bi-Server Sheryl Kennedy
Authentication and Key Exchange
1047 IMAGE CLASSIFICATION IN CBIR SYSTEMS WITH R.Vijaya Arjunan
COLOUR
HISTOGRAM FEATURES
1048 Chaos theory in the light of Automatic Variable Key(AVK)and B.Bhuyan
studies thereof
1052 Adaptive Encoding Algorithm for Multispectral Images S.Deepa
1055 VOIP in PEER-TO-PEER using Session Initiation Protocol S. Akila Rajini
1057 Different types of Swarm Intelligence algorithm for routing T.M.Rangaswamy
1060 Tamil Numerals Identification Bremananth R

1063 Implementing Intrusion Detection System for Multicore G.Rajeswari


Processor
1070 “Location based network surveillance system for shops and J. R. Gaydhane
malls”
1072 STUDIES ON THE SUITABILITY OF RAPTOR CODES IN S. Markkandan
MOBILE
WI-MAX ENVIRONMENT
1074 Empirical analysis of Energy Consumption in MAC Layer for M. Ramakrishnan
Wireless Sensor Networks
1080 SPECIAL FIR AND IIR BI NOTCH FILTERS Rohini Deshpande
1082 V2V WIRELESS COMMUNICATION PROTOCOL FOR K.V.N.Kavitha
REAR-END COLLISION AVOIDANCE ON HIGHWAYS
WITH STRINGENT PROPAGATION DELAY
1083 ISI AND SELF-NOISE REDUCTION USING SYMBOL-RATE K.V.N.Kavitha
ADAPTIVE RECEIVER WITH IN A DETECTION GUIDED
RAKE RECEIVER
1084 Application of Neural Networks in Estimating Temperature- Rubalya Valantina.S
Dependent Liquid Viscosity of Oil
1090 Comparison of complex wavelet transform methods in image J.Prabha
analysis
1091 An Efficient Algorithm for Designing a BIST Test Pattern Soumya.A
Generator
63 Maximizing the Efficiency of Ketan D. Shah
Parallel Apriori Algorithm
68 Grayscale Image Classification using Supervised Chromosome Debnath Bhattacharyya
Clustering
69 A Novel Dynamic Current Boosting Technique for Elimination Ashutosh Mehra
of Slewing and Enhancement of Settling time of CMOS
Amplifiers (Area-E)
71 Improved Implementation of CRL and SCRL Gates for Ultra- Anu Gupta
Low Power
76 Resource Failure Impact on Job Execution in Grid P. K. Suri
88 Adjacency Matrix based Objects Representation for S Saravanakumar
Human Identification in Images
89 Classifying Digital Mammogram Masses using Univariate B.Surendiran
ANOVA Discriminant Analysis
91 Low Voltage, Low Power Folding Amplifier for Folding & Shruti Oza
Interpolating ADC
96 VHDL Implementation of FFT/IFFT Blocks for OFDM Balwinder Singh
97 Performance Analysis Of Fast Adders Using VHDL Balwinder Singh
101 Modeling of Machining Parameters by Regression Analysis and Nabeel Ahmed
Response Surface Methodology and Multi objective
Optimization using Non-dominated Sorting Genetic Algorithm-II
1098 BLIND CHANNEL EQUALIZATION USING CMA Ram Babu. T
ALGORITHM
1100 An approach towards determining the nodes in dynamic network S.Santra
1107 TEXTURE BASED APPROACH FOR CLOUD Chethan H K
CLASSIFICATION USING SVM
1116 Design of Variable Fractional Delay Filter Using DFT D. Upadhyay
Interpolation
104 A New Approach to Hindi Text Steganography by shifting S. Changder
‘Matra’
105 3-L Security for ATM System using GSM Modem and Dynamic Praveen S Challagidad
Key
113 A Method of Metadata Encoging for Distributed Video Analytics Mohammed Ibrahim M
115 Energy Aware Routing Protocol Strategy for Effective Fault V.R.Sarma Dhulipala
Tolerance in Wireless Sensor Networks
122 Performance Evaluation of Information Theoretic Image Fusion Arathi T
metrics over Quantitative Metrics
124 An Intriguing Property of Scaling Function in Wavelet Theory Soman K. P.
and its Verification Using Daubechies-Lagarias Algorithm
133 RBIDS- IDS WITH BIOMETRIC AUTHENTICATION AND S.Gilbert Nancy
TRACE BACK SCHEME FOR ENHANCED SECURITY
136 Design of Adaptive Fuzzy Controller for a Robot gripper Sudha K.R.
138 Intelligent Agent Based Talent Evaluation Engine using a Dr.R.Lakshmipathi
Knowledge Base
141 An Innovative Bio Inspired PSO Algorithm to Enhance Power R.Shivakumar
System Oscillations Damping
147 Scan Based Fault Injection Dhiman Saha
151 A Watermarking Algorithm Based on Contourlet Transform and Silja M S
Nonnegative Matrix Factorization
152 Wavelet Assignment Graph kernel for Drug Virtual Screening Soumya.T.Soman
154 Multicast Routing with Multiple QoS Constraints Based on Antariksha Bhaduri
Artificial Immune Networks
155 University Time Table Scheduling using Genetic Artificial Antariksha Bhaduri
Immune Network
157 Watermarking Embedded Technique Soman K P
159 A Novel Hybrid Security Model for E-Commerce Channel Ganesan R
161 CLOSED LOOP CONTROLLED FM-ZCS-QUASI K.Narasimha Rao
RESONANT CONVERTER FED DC SERVO DRIVE
163 E-XTRACT: A Tool for Extraction, Analysis and Classification Sandeep K. Singh
of Events from Textual Requirements
182 Image Fusion Using Support Value Transform (SVT) Sulochana.S
and Curvelets
184 Berkeley Wavelet Transform Based Image watermarking Remya Ravindran.P
189 Mobile Device Interface to access Computational Grid Rupak Nagarajan
192 Efficient 3D Representation of Video Sequence Soman k.p
194 An Agent Based Architecture for Telemedicine System-A Ms.Deepti Lather
Conceptual Approach
196 Modeling of ALFA Programs Using PVS Theorem Prover Shimmi Asokan
197 POLYPHASE MATRIX FACTORIZATION- A SIMPLIFIED D. Bharath Bhushan
EXPLANATION
198 Mathematical Modeling of Gerotor Type Lubrication Oil Pump Mr. Narendra A. Shedge
1158 An Improved Power Flow Analysis Technique In Wind Farm D. P. Kadam
System
1160 Synthesis and Modeling of Spiral Inductor at 90nm Technology Neeraj Kr. Shukla
1164 Comparison of Queuing Disciplines for Differentiated Services T.Velmurugan
using OPNET
1165 PERFORMANCE STUDY OF AD HOC NETWORK P.Jhansi
ROUTING PROTOCOLS
1166 Fast Output Sampling Controller for Hyperthermia Systems D.Jeraldin Auxillia
1168 Continues K-means computation over moving objects by Talari Swapna
designing different threshold dissemination protocols
1172 Detecting and Preventing IP-spoofed DDoS Attacks by M.Nagaratna
Encrypted Marking based Detection And Filtering (EMDAF)
1179 Fuzzy Based Framework for Professional College Rankings N.Narayanan Prasanth
1180 GROUP AWARE SEMANTIC MATCHMAKER FOR GRID Bindu K. R.
RESOURCE DISCOVERY
1181 Application Management in Grid Environment B. Arthi
1183 Hardware and Software Co-design for Robot Arm Position Mrs. Urmila Meshram
Control Using VHDL & FPGA
1187 An Approach for Eliciting Software Requirements and its Mohd. Sadiq
Prioritization using Analytic Hierarchy Process
1188 A comparative study of different Hybrid Neural Networks based Rashid Ali
Intrusion Detection Systems
1192 Master Token Resource Management Algorithm for Distributed ABHIJEET U.GOLE
System Time Sharing Strategy
1194 Metrics of Package Reusability for Enhancing the Activities of R. Kamalraj
Software Project Management
1195 Elliptic Curve Point Multiplication Midhun Paul
1201 Need of Image Compression for Position Explorer Engine based Ms. Pallavi Yarde
on Cell Phone
1202 Novel Algorithms for Object Tracking in Wireless and Mobile Saghar Izadpanah
Networks
1205 A Model for the Development of a Mutation Testing Cum Test T.Mythili
Case Generation Tool
1218 Mixed Media for Distributed Requirements Engineering D. Nithya
1220 Steganography and Covert Communications in Open Systems Jiju A. Mathew
Environment
1223 FPGA Design and Implementation Issues of Artificial Neural Vikas Gupta
Network Based PID Controllers
225 Secure Web Based Single Sign-On (SSO) framework using Rajesh Kumar Singh
Identity Based Encryption System
229 Morphological Analyzer for Agglutinative Languages Dhanalakshmi V
Using Machine Learning Approaches
230 Chunker For Tamil Dhanalakshmi V
237 VLSI ARCHITECTUR IMPLEMENTAION OF TSLE AND M.Srinivas Rao
MSLA CALCULATOR FOR FOURPHASE PULSE
COMPRESSION SEQUENCES
243 Quantum mechanical modeling and molecular dynamic Premkumar P
simulation of Ruthenium (Ru) Polypyridyl
complexes to study feasibility of artificial photosynthesis.
254 Extended Bipolar Echo Kernel for Audio Watermarking Shine K. P.
256 Performance Indicators in a 802.11 WLAN Deployment Ajay Kumar Gupta

258 Conductor Backed H shaped Antenna fed by CPW for Ultra wide Akkala Subbarao
band Applications
263 Analysis of Timing Error Aperture Jitter on the Performance of Miss. Poornima Raikwar
Sigma Delta ADC for Software Radio Mobile Receivers
265 Real-time Early Infectious Outbreak Detection Systems Using Belal Chowdhury
Emerging Technologies
268 Context Aware Computing in Wireless Sensor Networks An Kirankumar.B.Balavalad
Article
270 Color Image Segmentation using Clonal Selection-based Antariksha Bhaduri
Shuffled Frog Leaping Algorithm
271 Designing A New Preprocessing Layer on Spatial Data Mining H. K. Kalita
Techniques
272 Load Balancing Towards ECU Integration Rajeshwari Hegde

274 Modeling and Analysis of DC Traction System under Light of Satyadhar Joshi
Current Developments in HPC and Virtual Reality
277 Research on Information Security Value Judgment of Sensor and Hu Ruo
Its Delivery Target Selection
278 Resolution on Solving Semantic Conflict During the Hu Ruo
Interoperability of the Sensor Integrated Security Information
279 Security against LSB Encoding deployed for Information hiding Mamta Juneja
in 24-bit Color images
286 ANALYSIS OF PARMANENT MAGNET LINEAR Manpreet Singh Manna
INDUCTION MOTOR (PMLIM) USING FINITE ELEMENT
METHOD
1231 A Novel Time and Energy Efficient Cubing Circuit using Vedic Ramalatha M
Mathematics for Finite Field Arithmetic
1233 A Novel Approach for Enhancing Performance of Secure V. Vasudevan
Multicasting in Wireless Environments
1234 Analysing the Data Variation of QOS in Mobile adhoc networks A. Boomarani Malany
1235 Design and Implementation of an efficient Two-level Scheduler Dr. SUDHA
for SADHASIVAM
Cloud Computing Environment
1236 Multi-Focus Image Fusion of Digital Images Anjali Malviya

1239 Approach of Neural Network to Diagnose Breast Cancer with Mr. Vaibhav Narayan
Classification Tree and MRE Chunekar

1242 Congestion Control Anonymous Gossip Protocol for Ad-Hoc Ms. Smita A Kawade
Wireless Network
1252 OPTIMISATION OF STATIC POWER ,LEAKAGE POWER ANINDYA GHOSH
AND DELAY OF FULL ADDER CIRCUIT USING DUAL
THRESHOLD MOSFET BASED DESIGN AND TSPICE
SIMULATION
1255 ES Approach In Hybrid Channel Allocation In Wireless Mobile Sunitha R.Landge
network
1256 Fault Tolerance in FPGA Architecture Using Hardware M.Naseer
Controller-A Design Approach
1268 Application Metaheuristic Technique for Solving VLSI Global Hameem Shanavas .I
Routing Problem
1274 MainlobeWidth Reduction Using LFM and NLFM D.Elizbath Rani

1278 Security Analysis of Hardened Retina Based Fuzzy Vault V. S. Meenakshi

1279 Fault–Tolerant Master-Workers framework for MapReduce Sanjay H A


Applications
1293 Performance Efficient Enhanced OMCT Algorithm for Secure D. Suganya Devi
Multicast Key Distribution for Mobile Adhoc Networks
1298 A Real World System for Detection and Tracking P.H.S.T.MURTHY

1310 Personalized Tag Recommendations to Enhance User’s Ravish Sharma


Perception

Potrebbero piacerti anche