National Conference on Innovation in Computers (NCIC 13) - 22/02/2013.  
 

CONTENTS

 

SNO

                                                                                                                                                                                              

TITLE/ AUTHOR  NAME                                                                                                                                                                                                            

1

A Simple Approach For Lymphoma Pattern Recognition Using Svm

MetildaD, Kalaivani I

2

Optimizing Medical Data Quality Framework In A Distributed Medical Environment

Jayapradha K, Lakshmanan L

3

Personal Authentication Based On Iris Texture Analysis

Gayathri A, Madhu Rani M,

4

Rsse Secure And Efficient Ranked  Keyword  Search  Over  Outsourced  Cloud  Data

Karthic P,  Babu C

5

A Multiparty Adaptive Cryptography Based On Rule Mining Techniques

R. Vinitha, U. Ravindran,

6

Implementing Hybrid Protocol In Manets Using Dawn Technique

Siva Kumar A, Gnanasekar J N

7

Improving Energy Efficiency In Wireless Sensor Network Using Mlcd

Treesa Mary Franco, Dr.A.Kathirvel

8

Mining And Building User Interest-Centric Folksonomies: The Case Of Social Tagging

FirdhouseJahan

9

Way Finder Using Wi-Fi Triangulation In Smartphones

D.Divya, J.Sapna

10

Enhancing The Security Of Manet Using Immune Agent

M. Vijayanand , Dr. C. Jayakumar

11

A Study On The Integration Of Internet And Manets Protocols

K.Chokkanathan, D.Saravanan

12

Secure Authentication System Using Video Surveillance

G.Nithya,  S.TamilSelvan

ix

13

The Data Security Framework With Mobile Sinks In Wireless Sensor Networks

A.Senthil Kumar, Dr. K.A.Parthasarathi

14

Preventing Inter Vehicular Accidents and Distraction Related Accidents Using Android Based Smart Phones And On Board Devices Ii

Aishwarya,  Dharani

15

Contention-Based Delay Optimization Mac Protocol For Wireless Sensor Networks

D. Stephy ,  V. Sujatha

16

Reliable And Power Relaxation Multipath Routing Protocol For Wireless Sensor Networks

A.Vignesh, M.SenthamizhSelvan

17

Data Confidentiality And Fine-Grained Access Control In Cloud Computing Environment Using Attribute Based Proxy Re-Encryption

R. Shanthi

18

Automatic Detection Of Rheumatoid Arthritis Using Irregular Shapes Of Lymphocytes

K. Shanthi, M. Arivukarasi,

19

Towards Mobile & Biometric Authentication For Controlled Web Services

G.Preethi, S.V.Priya

20

An Efficient Local Synchronization Based Algorithm For Distributed Peer To Peer Neteork.

AbishaAjith,   D.Saravanan

21

High Resolution Framework for Motion Layer Decomposition

MathiSangari, D.Prema

22

Reducing Shoulder Surfing By Using Gaze- Based Password Entry

C.RasithaWincy, P.Nivetha

23

Banking With Cloud - An Application Of Cloud Computing

J.Mounika Reddy, S.SaiSirisha

x

24

Application Of Shuffled Frog-Leaping Algorithm On Clustering

Dharmpal  Kumar, S. Ravishankar

25

Obstruction Of Undesired Traffic By Filtering Source Prefixes On the Internet

Dhanya P J, M S Gayathri

26

Intelligent Software Assistant For Human Action Recognition Using Slow Feature Analysis

L. BerwinRubia , K. Manimala

27

Video Based Real-Time Pedestrian Detection

R. Selvi, M. Girubanandhini

28

Forum Maintenance And Multimedia Sharing In P2p Networks

Silpa S,  Anand T

29

Swarm Intelligence For Assignment Problem

A.Anitha, M.Saranya

30

Discrete Data Embedding And Extracting In An Encrypted Image

V.Kavitha, S.Poonkodi

31

Efficient Image Retrieval System Using Sketches

B.Rajalingam

32

Mitigating Malicious Control Packet Floods In Ad Hoc Networks

M.Thenaruvi, Princemary

33

Preventing And Mitigating Selective JammingAttackUsing ShcsMethod

E.Vanitha, Dr. N.Sundararajalu

34

Design & Implementation Of Teacher Student Interaction System Using Zigbee&Rfid

N.Tamilarasan, N.Ponmudiselvan

35

Fault Tolerant Based Adaptive Protection Mechanism For Network Attack In Manet

Athira Krishna, Shiva R

 

xi

36

Collective Data Stealing With Load Balancing And Multicast For Grid Applications

S.Madhumathi, R.Jayapriya

37

Auditing Based On Multi-Level Intrusion Detection System In Cloud Computing

S.Ramesh

38

Content-Aware Dark Image Enhancement Through Channel Division

S.Premkumar, Dr.K.A.Parthasarathy

39

Current Research Issues In Vanets

R.Vetriselvi

40

A Hybrid Cooperative Quantum-Behaved Pso Algorithm for Image Segmentation Using Multilevel Thresholding Merging

K.Vignesh, T.Nishanandhini

41

Secure Mobile Database Retrieval System Based On Synchronization Technique

P.Pallavan ,  P.B.EdwinPrabhakar,

42

Providing Data Integrity And Spatial Avoidance For Tpa By Generating And Storing Token Based Method

E.M.Mariasalomi , A.Gowthami

43

View-Invariant Action Recognition Using A Discriminative Model

P.Vijayaprabakaran    ,  K.Saranya

44

Performance Of Routing, Scheduling &Traffic Management in AdHoc  n/w’s.

B.Vimala, M.Anand

45

Combinatorial Approach For Preventing Sql Injection Attacks

M. KarthickSelvam, A. Rameez Raja

46

Self-Determining Detection Of Distributed Denial Of  Service  Attacks

Jismy K Jose, M. Subramaniam

 

xii

47

Delay Performance Of Multihop Wireless Sensor Netwoks With Mobile Sinks

Aswathy M.V,  Sreekantha  Kumar V.P

48

Improving Throughput and Fairness By Channel Assignment Based on power control

MerinThambi,  G.Prithivirajan

49

Clustered-Based Mobile Sequential Access Patterns In Mobile Environment

E.Nandakumar

50

Improved Distributed Clustering Protocol For Wireless Sensor Network

S.D.Nandakumar, G.Suresh

51

Ensuring Data Storage Security In Cloud Computing Using Merkle Hash Tree

P.Anupriya, V.S.Nivetha

52

Automating Enhanced Security Information Management

C.Vignesh, S.Ragothaman

53

Risk-Free Route Discovery Technique In Manets

Soundaravalli D

54

Testing Framework For Web Services – An Ontology Approach

Madhuram R   ,           Kavitha N

55

Implementation Of Atm Security Using Finger-Vein Recognition

Srinivasan.S, Vishnupriya.R

56

Cluster Based Secure Location Verification System For Wireless Sensor Networks

S.Velmurugan, Dr.K.A.Parthasarathy

57

Data Hiding In Encrypted Images Using  Steganography

D.Manobala ,V.Sivakumar

58

Road Networks Anonymizer Using Nap

N.Mohanavelu, C.Sakthivel

 

 

xiii

59

Inter Vehicle Ad-Hoc Communication Protocol For Acquiring Local Traffic Information

Sathish.K, Vishnupriya.R

60

An Efficient And Adaptive Decentralized File Replication Algorithm in P2p File Sharing System

I. Mary Linda

61

Catch-Up Mechanism In Vanet

Anu Joseph, G. Prithivirajan

62

Traffic Information Dissemination In VanetUsing Ieee-802.11

Karthika.V, Selvasankari.T

63

Xml Query Response Using Tree Based Association Rule

ManjuPrecillah.M, Jayanthi S

64

Tracking Of Non Cooperative Target To Prevent The Gang Injection Of False Data Attacks In Wireless Sensor Networks

Geethu K Mohan

65

A Invasive Wireless Sensor Network Approach

For Monitoring Vital Signs.

S.Gopinathan, C.Venkatesan

66

Enabling Continuous Communication In Vanets In  A Sparse Traffic

Rose V Pattani, Cloudin S

67

Intrusion Detection System In Cloud Computing

IrinSaji P

68

Twin Clouds: For Secure Cloud Computing

Gokul Raj .R, AymenSafee.A

69

Analysis Of Risk In Software Engineering And Management

Sakthivel.C, Dhanasekaran.S

70

Graphical Password Authentication System Using  Click Points Mechanism

Manikandan N.K,  RamaprakashAlapati

xiv

71

Analysis Of Node-Isolation Attack Against Olsr Based Manet

N.Ramya,  M.Uma

72

Secured Communication In Mobile Phones

Lia Meena Kurian, D.Saravanan

73

Slicing: An Approach for Preserving High Dimensional Data

C.P.Rajesh, D.Arthy, G.Karthika, A.MajithaBanu

74

A Delegation Solution For Universal Identity Management in soa

S.Devipriya

 

 

 

 

 

 

 

 
     

Valuable Visitor No: click counter                 For any inquiry please email to : ace.ac.in@gmail.com, contact@ace.ac.in

Copyright (c) 2016-17 Aksheyaa College of Engineering.         Powered by Dept of CSE.         Updated On: 26-07-2017  09:30 AM