Sunteți pe pagina 1din 5

Contents

Message iii
Preface ix
Fuzzy Set Theory
1. Trust management multiple-broker framework in GRID environment 1
Dhaya.C
2. Implementation of Fuzzy ABS for Automotive Applications 5
Kishore kumar .A, Geetha P, Sabetha.P, Karnan.M

Intelligent Databases
3. Clustering Large Databases via Compression Techniques 8
Ashish Sambare, Dhote C. A
4. Optimized record retrival in RDBMS using SQL 12
Mercy H, Mrs. Ajitha
5. Efficient multifeature query processing using clustering technique 13
Sam Mahesh, M.S Gayathri
6. Net based query processing 18
Sangeetha. P, Salai Aaviyaamma M.B.A
7. Natural language interfaces to Relational Database Management Systems 21
Sreenivasulu.M
8. Data Mining tools in Medical Decision Support Systems 26
Suguna N., Dr. Thanuskodi.K
9. Design and Implementation of User Satsification Metrices for Web Databases 30
Pramod Kumar Ghadei, Kingsly Stephen.R
10. Apriori algorithm for web usage mining 34
Hannah Inbarani H, Thangavel. K
11. Soft Computing Approaches on Materialized View in Data Warehousing 41
Ashish Sambare, Dhote C A
12. Intellegent databases 46
Sarojini Y., Mishmala S

Image, Speech and Multimedia


13. Decision Rule Based Image Fusion Using Wavelet Transform 51
Jesy Margent.S ,Mary Amirtha.G
14. Color and Texture based Image Retrieval method using Clustering 55
Jayalakshmi.K
15. Implementation of lossless compression of color images on wavelet transform 60
Kavitha Mary. A. R, Amritha
16. Hybrid method for preprocessing in Ultrasonic images using adaptive filters 64
Thanushkodi .K, Jaya.J, Karnan.M, Sivakumar.R
17. A Technological Approach of color image segmentation 67
Kishore kumar .A,ParimalaDevi.J , Murali Krishna .V,Karnan.M
18. Enhancement and segmentation techniques for Texture Image 71
Siva Kumar R, Karnan M, Anand C.
19. Retinex Image Enhancement 74
Geetha .K, Karnan M., Siva Kumar R.
20. Low Complexity Fractal-Based Image Compression Technique 77
Anto Kumar.R.P, Ben George E

vii
21. A Survey on Prostate Medical Images and comparative analysis 81
Manavalin .R, Thangavel .K, Lawerence Aroquiarag .I
22. Texture Analysis - A New Structural Approach 88
C.Umarani S. Radhakrishnan

Neural Network
23. An Intelligent System based approach towards File Compaction 92
Soumen Paul, Subhabrata Barman, Apratim Mitra
24. Visual Feedback for Speech User Interface 93
Muthanantha murugavel A.S
25. Neural networks - a perspective 97
Mishmala S., Sarajoni Y

Rtos and Embedded Systems


26. Replay debugging of embedded Real Time System 101
Anuradha B, Prabakar.R, Pavithra.D, Nasia Banu.M
27. A New Approach for Cluster design using Real-Time Operating system 107
Kishore kumar .A,Geetha.P ,Sarojini.Y,Karnan.M

Cryptography, Biometrics
28. Fingerprint Classification Using Orientation Field Flow Curves 112
Anto Kumar R.P,Ben George E
29. Multibiometrics based multimedia content protection 118
Narain Ponraj D, Nizanth. S
30. Human Gait Recognition 122
R.Sivakumar, M.Karnan, Syed Farook.K, Satheesh Kumar.D,Anand.C
31. Human Identification Using Dental Radiographs 127
Vikash A.
32. An Introduction to Biometric Recognition 131
Pavithra .D, Anuradha .B, Nasia Banu .M
33. Iris Recognition 136
Satheesh Kumar.D, Syed Farook. K, Karnan .M, Sivakumar .R

Software Techniques
34. Design and Development of Ontology for Software Design 141
Mohan.S, Balamurugan.C.R
35. Bitmap Indexing For XML Authorization 146
Geeta A sumant , Dipali Kasat
36. Mobile based enterprise management using GPRS with J2ME 148
Kalaivani.J, Menaka.S
37. Spam Detection and Filtering Using Collaborative technique 152
Prathusha Lakshmi.B
38. Web Page Categorization using the Hyperlinks 156
SelvaKuberan .K,IndiraDevi .M
39. A Proposed Framework for Service Oriented e-Governance 159
Nagarjuna .K, Chithralekha .T
40. A Technological Approach of Information Retrival For Space Minimum 165
Application
Sarojini .Y, Srivdhya .S, Shanmuga Priya .S, Manoj Kumar .A

viii
Networks
41. Secured Routing in Adhoc Networks 168
Jasper Jeba Prabhu.A, Leela S.
42. Enhancing network intrusion detection system with honey net 172
Ashish Sambare
43. Multi Agent Belief Networks in Rural Health Care 173
Rajesh.V, Balaji. V, Aravindan .C
44. Web Security through VPNS 177
Geetha Ramani. J
45. Improving secured communication in virtual private network with Elliptic 182
curve cryptography (ECC)
Anuradha.G
46. Networks Application performance improvement using TCP 184
Karthik B., Harihar Gopalan S, Perumal P., Somasundaram S
47. Virtual Server Technologies 188
Nasia Banu.M, pavithra. D, Anuradha. B
48. Security in wireless network using ECC 193
A. Francis Saviour Devaraj, Mr. Vivekanandan, Rev.Fr.Dr. Antonysamy S.J.
49. Hacker tracking system using HoneyPot 199
Karthik S., Kavitha T
50. Flat routing Techniques in Wireless Sensor Networks (WSN) 204
Nivetha G
51. Hierarchical Routing techniques in Wireless Sensor Networks (WSN) 206
Vimala Devi P, Violet Juli V
52. Location area planning in Cellular Networks 208
Pushparajesh.V,Dhivya . V.P
53. Exploring Peer to Peer network on information retrieval 216
Gururamasenthilvel P., Deepa R.
54. Efficient IP Lookup Algorithm for Reducing Lookup Latency 220
Sureh .S, Gayathri C.G, Saravanan .B
55. An Enhanced Two Server Password – Only Authenticated Key Exchange 226
Secure Against Dictionary Attacks
Pathima Nisha .R, Chandrashekar .N
56. An efficient System against Networks Scans and Attacks Using Protocol 231
Scrubbers
Annrose .J, Chandrashekar .N

Optimization Techniques
57. Optimization of makespan for Parallel Machine Scheduling 236
Senthil kumar.K.M., Thirunavukkarasu.V, Elangovan.K., Sakthivel.S

Differential And Difference Equation


58. An overview to Numerical Analysis of Heat Transfer during welding process 241
Shanmugha Sundaram.N, Murugan.N, Ashok Kumar.K, Suresh.S,Umashankar.G

Mobile Computing
59. Quality Service to Mobile Users Providing Common Infrastructure by 246
Replacement of Mobile Software
Angel Latha Mary.S, Vikasini R., Sandhya.G

ix
Soft Computing Applications
60. Reference Architecture : Survey Work 249
Ramesh. R., Prasanna Venkatesan .V
61. Studies on the adsorption behavior of 3 aminomethylpyridine at DME 256
Karthikaiselvi.D,
62. Analysis of finite capacity M/G/1/ VS queueing system with an exhaustive 259
service discipline
Lakshmi.P ,Kasturi Ramanath
63. A High-Efficiency Fully Digital Synchronous Buck Converter Power Delivery 267
System
Robin Abraham Prof. C N Marimuthu
64. Active Leakage Power Reduction for FPGAs 273
Alice K Paul, Prof. C N Marimuthu
65. Analysis of Different MCP-Based SNR-Scalable Video Coders 279
Angu.N.Saranya Devi, Mrs .G.Arthy
66. BOOLEAN EXPRESSION Method-Novel Technique for Test Generation in 285
Combinational Circuits
Binu K Mathew, Prof. C.N. Marimuthu
67. Compressed Diagnosis of Digital Circuits by Extended Deterministic 289
Manufacturing Test and Memory Diagnosis
S .Vijayakumar, R. Parthasarathi
68. Dcordic Based Digit-Pipelined DDFS System 294
Seena.K.K
69. Design of Wireless System Based on Space-Time Block Decoder 300
Sindu.K.P
70. A Hybrid Ant Colony Optimization –Genetic Algorithms Method for 306
Classification in Data Mining
P.Jaganathan, K.Thangavel, M. Karnan
71. JSCC Based Channel distortion model for JPEG images 307
K.Sathyabama, Mrs. G.Arthy
72. A Fast And Efficient Modified Spiht Algorithm For Image 311
Coders
J.Karthika, .R.Parthasarathy
73. Dynamically Reconfigurable RS Decoding Architecture Based on Multi- 317
Symbol- Sliced Processing Element
Sisira.T.P
74. Logical level testing And Defect Characterization of AOIGate for QCA 324
Implementation
A. Senthil Kumar C.N. Marimuthu
75. Detection of Data in JPEG Images Using Steganographic Techniques 330
Kanchana .A, Stanly Jayaprakash .J
76. Edge Router Based Defence Against DDoS Attacks 337
Manchula .A., Maheshwari K.G
77. E-Governance initiatives in India 343
Nagarjuna Karyemsetty T. Chithralekha
78. Back Propagation Network Classifier Hybrid with Ant Colony Optimization Algorithm 350
M.Karnan K.Thangavel R.Sivakumar B.Nandhini
79. Particle Swarm Optimization For Detection 353
Of The Microcalcifications On Mammograms
S.Induja, M.Karnan, K.Thangavel, K.Thanuskodi, K.Geetha,
80. Postcolonialism And Women: A Comparative Study Of 357
Arundhati Roy’s “ The God Of Small Things” And Anita Nair’s
“ Ladies Coupe – A Novel In Parts”

x
P. Vinitha francis

81. Individual Company Multi Criteria Inventory Problem


Geetharamani. G, Thangavel. K, Karnan.M, Siva Kumar.R, Siva Sakthi.S.
82. Serial Supply Chain Multi Criteria Inventory Problem
Geetharamani. G, Thangavel. K, Karnan.M, Siva Kumar. R., Sabareesaan.K.J
83. Achieving higher QOS by GPRS, WLAN Integration using
Ad Hoc Networks
A.Bagubali R.D.Karthikeyan
84. Simulation
Mohan, Y.K.
85 Radio Frequency Identification
Geetha Priya .M
86. Evolutionary Controller For Real Time Uncertain Nonlinear Systems
Dharmesh Shah, Prof. S.K.Shah

Invited Talk
87. Rough Clustering
Dr. K. Thangavel
88. Multi Criteria Optimization using combinations of Search algorithms
Dr. Suresh. R. K

xi

S-ar putea să vă placă și