Escolar Documentos
Profissional Documentos
Cultura Documentos
CSE002
CSE003
S.Afrin Banu
Reusable Key Management Techinque For Secured Broadcast Services A Wireless Sensor based Grid Healthcare Monitoring System
CSE004
CSE005
Prevention for Effective Jammer Attack in 6 CSE006 Mr.Ajesh.F, Mr.Aravind SwamiNathan Wireless Sensor Networks
Page 1
CSE007
N.V.Ajin, P.Renuka
Volume Estimation of Thyroid Gland from Ultra Sound Images to diagonise its Pathological Effects
CSE008
R.Angelin
Texture Classification Using Regression Model based on Multiresolution Analysis Facial Recognition using Modified Principle Component Analysis Algorithm A Novel Design for High Speed and Low Power Full Adder Dynamic Approach of Using RPCM In Wireless Networks Synchronized Pseudo Random Key Generation in Wireless Sensor Networks Cryptanalysis of an edge crypt Encryption method Developing Sensor Movement Scheduling Algorithm for Achieving Near-Optimal Target Detection Performance Effective Stegnography using Edge Adaptive Scheme An algorithm for unbalanced portioning of a Swarm of Autonomous Mobile Robots Page 2
CSE009
10
CSE010
11
CSE011
Dr. A.Kathirvel Anuja Alexander, Ms. Venifa Mini. G S.Anusha, Mr.B.Bhubaneshwar Archana aravind, Mrs.K.P.Sampoomam
12 13 14
CSE012 CSE013
CSE014
15 16
CSE015 CSE016
17
CSE017
An effective Cancer Classification using Expressions of Very Few Genes using Support Vector Machines Performance Analysis of Heart Rate Turbulance Detection Secure Time Based Encryption and Keying for Wireless Sensor Networks In-Depth Packet inspection using Frequent Gram Generation Nonparametric Discriminant Analysis and Multiclassifier Integration for Face Recognition Enhanced Digital Watermarking Algorithm for Directionally Selective and Shift invariant analysis Avoidance of Spoof Attacks Using Multibiometric CryptoSystems Analysis on the performance of CART & Simple CART Algorithm for Cardio Vascular Risk Factors and Active Heart Health Diagnosis Develop a Tracing Tool via Output Tracing and Callstack-Sensitive Slicing A Novel Approach to Energy-Efficient ACO Routing in MANET Grain Quality Identification Using Genetic Algorithm and SVD Face Detection using Active Testing Approach Page 3
18
CSE018
19
CSE019
P.J.Auslin Pajila Babin Raisa.B., Mr.Y.R.Packia Dhas K.Beema,Dr.S.Ravi B.Binitha,G.Kharmega Sundararaj R.Benzi, T.Anto Theepak
20
CSE020
21
CSE021
22
CSE022
23
CSE023
24
CSE024
Binu John
25 26 27 28
29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
CSE029 CSE030 CSE031 CSE032 CSE033 CSE034 CSE035 CSE036 CSE037 CSE038 CSE039 CSE040 CSE041 CSE042 CSE043 CSE044 CSE045
46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
CSE046 CSE047 CSE048 CSE049 CSE050 CSE051 CSE052 CSE053 CSE054 CSE055 CSE056 CSE057 CSE058 CSE059 CSE060 CSE061 CSE062
63 64 65 66 67
Kamya E., R.Tamilarasi N.Kanagavalli, Dr.A.Kannan R.Kesavan, Dr.V.Thulasibai Krishna Priya SRI, R.Ganesan Kshitija Pol, Sudhir Sawarkar
68 69 70 71 72 73 74 75 76 77 78
CSE068 CSE069 CSE070 CSE071 CSE072 CSE073 CSE074 CSE075 CSE076 CSE077 CSE078
Lakshmi P.J., R.Suji Pramila R.Lakshmi Priya L.R.Priya, Dr. B.Shankaragomathi S.R. Chougule, Prof.Mrs.M.A.Shah M.Madlin Ahsa, P.J.Devananth S.Muthukumar, M.A. Maffina P.Ganesh kumar, D.Mahibha S.P.Manimozhi, P.Indirapriya R.Mary Lydia Meera Boban, P.Senthilkumar Merlin Gethsy D., Jaya Thamarai Gladeys F.
79 80
CSE079 CSE080
S. Kayalvili, M.Mugil Muthulakshmi C., T.Ramesh R.Muthusivagami, S.SujaPriyadharsani M.Sheerin Banu, K.Nagalakshmi Ms.V.S.Nagambika, Prof. C.RajaBhushanan Nancy Jeba Jingle Narendra Shekokar, Sathish Devane N.Naveenkumar, Dr. K.Batri Nimmy Lazer, S.Pavalarajan Mrs.Beshiba Wilson, Ms.Nisha O.S. S.Nithiyanantham, K.S.Gayathri D.Noble Raj, Mrs.C Sathish R.Pavithra, A.JayaChandran E.Pavithra, Mr.G.Sankar J.Prabula, Mrs.M.Muthuselvi Pradeeshkumar
81 82 83 84 85 86 87 88 89 90 91 92 93 94
CSE081 CSE082 CSE083 CSE084 CSE085 CSE086 CSE087 CSE088 CSE089 CSE090 CSE091 CSE092 CSE093 CSE094
95 96 97 98
Priyanka Sebastian, D.Vijayakumar Priyasangeetha B.J.Priya Suganya, C.Vimala Josphine R.G.Ragitha, Dr.VijayaSamundeswari N.Rajkumar, S.Vijayakumar
99
CSE099
100 101 102 103 104 105 106 107 108 109 110 111
CSE100 CSE101 CSE102 CSE103 CSE104 CSE105 CSE106 CSE107 CSE108 CSE109 CSE110 CSE111
T.Rajaprabu, B.Sivashankar Rajasree R.S., Ramesh K.Rajesh, D.Joseph pushparaj T.C.Ramesh, C.Sathish Rameshwari G., Rekha S R.Ganesan, M.Ramya J.Rathinaraja, P.Ganeshkumar V.Rena Cathrine, Harisree Rekha S., Dr.Kannan Balasubramanian Mrs.Renisha G.R. Shalom, Mrs.Arul Chandra K.S. Renjana Ramachandran, Suji Pramila C.P.Reshma Chand, J.Arul
122
CSE122
126 127
CSE126 CSE127
C.Sharmila, Prof.S.Allwin M.Shivakumar, R.Subalakshmi Shyam Jegadesh J., Prof.R.Mathusoothanan S.Kumar S.Shiny Felix, S.Manikandan C.Sindhu, Beaula Jayavanthanan
131
CSE131
Sivasubramaniyan N.A.P.
132
CSE132
Ms. Sonali P. Kadam , Dr. Shashank. Srikanth. V.P, Dheeba. J Sri meena.r Pallikonda rajasekaran.m.,
133
CSE133
134
CSE134
135
CSE135
N.Subha,Dr.V.Kavitha
136 137
CSE136 CSE137
Ms. K.sudha,
Mr. P.rajan
Ms.N.Suganya,
International Conference on Intelligent Science & Technology (SUN IIST-2011) Mrs.K.Jayashree Mrs.R.Suji Pramila Mrs.A.Anitha,Lecturer Mrs.T.Kavitha Ms.C.Gomathi Thara krishnan.r,
ON QOS AWARE PARTICLE SWARM TECHNIQUE DATA CONFIDENTIALITY IN WIRELESS BODY AREA NETWORKS Automatic Shot Detection for Surveillance Systems Face Recognition Using Hierarchical Ensemble of Global and Local Classifiers Throughput Utilization in Wireless Networks Using Scheduling Algorithms Denial Of Phishing By Combining Heuristic & Content Based Search Algorithm On the Security of Elliptic Curve Cryptography over RSA Cryptography Algorithm Secured Distributed Document Clustering in Structured Peer to Peer Networks Fingerprint Identification Using Minimum Spanning Tree Bayesian Learning and Modified Expectation Maximization Approach to Discover New Attributes Reliable face recognition under Uncontrolled lighting condition Page 11
138
CSE138
139
CSE139
140
CSE140
141
CSE141
S.Thiripurasundari, J.Preethi
142
CSE142
143
CSE143
144
CSE144
145
CSE145
S.Vanaselvam
146
CSE146
147
CSE147
148
CSE148
149
CSE149
150 151
CSE150 CSE151
152
CSE152
153
CSE153
154
CSE154
155
CSE155
156
CSE156
Sybill Guard : To defense Sybil attacks Improved reactive protocol with proactive route maintenance Lossless image compression using Burrowswheeler coder Page 12
157
CSE157
158
CSE158
A.H.R. Begum
A secure software implementation of Nonlinear AES S-Box with the enhancement of biometrics Encrypted Image compression using resolution progressive compression
Page 13