Escolar Documentos
Profissional Documentos
Cultura Documentos
ICCA ID 14 Paper Title Web-Biometrics: User Verification via Web Interaction(With a Head Tracking Mouse Usage) Private Key Generation (PKG) Based Node ID Assignment in Structured P2P Systems Private Key Generation (PKG) Based Node ID Assignment in Structured P2P Systems The place of information technology as a well of opportunities for poverty alleviation Impact Of De-Authentication Attack On Wireless Intrusion Detection Systems Euler Number, Symmetry and Histogram Based Hierarchical Approach for English OCR Simulation of AODV Routing Protocol Grid Computing - High Level Computing to Access Internet Grid Computing - High Level Computing to Access Internet Author Name Manju Panneerselvam Track Bio-genetic Computing Systems eReg ID 57 CRC
23
M Jegatha
341
23
R Venkadeshan
13
29
Afolashade Kuyoro
32
34
S Divya
Information Security Systems Computational Intelligence Information Communication High Performance Computing High Performance Computing
24
38
Mahesh Goyani
29
41 52 52
34 89 151
0 0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 1 of 36
ICCA ID 53
Paper Title A Mechanism For Skew Detection Of Online Bangla Handwritten Words A Mechanism For Skew Detection Of Online Bangla Handwritten Words Nanotechnology- The New Upgrade For Computers Authentication of Bluetooth Using Biometrics Authentication of Bluetooth Using Biometrics Gaussian Kernel based Intuitionistic Fuzzy C-Means Clustering Algorithm in Segmentation of Noisy Digital Images Scalable, Robust, Efficient Location Database Architecture Based on the LocationIndependent PTNs LOA-BRO-FAI Analysis in Grid Computing Using SYL's Algorithm The Grass root in Technical communication Gesture Based Communication
Track Human Computer Interaction Human Computer Interaction High Performance Computing Information Security Systems Information Security Systems Automated Systems
eReg ID 98
CRC
Reprint 0
Copyrights
53
Rajib Ghosh
102
55 61 61 62
453 64 65 119 2 2 0
67
Kaptan Singh
Knowledge Engineering
384
70
Sylvia Grace J
Cloud Computing
108
71 75
Prashanth G K G S L K Chand
92 103
0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 2 of 36
ICCA ID 77
Paper Title MPPC: Mobile Phone for Physically Challenged with Smart Interaction MPPC: Mobile Phone for Physically Challenged with Smart Interaction MPPC: Mobile Phone for Physically Challenged with Smart Interaction A fuzzy Approach for mining Time Series Data Checkpoints for Cabs Using Cellular Quad Band Module with GPS Checkpoints for Cabs Using Cellular Quad Band Module with GPS Web Application Testing Using Inheritance Method Introducing the Internal File System for the DATABASE Packages An FPGA Based Framework forExploitation of multi node Architecture Incorporating 3D Features in Internet TV: A Proposal
Track Human Computer Interaction Human Computer Interaction Human Computer Interaction Bio-genetic Computing Systems Electronic Data Systems Electronic Data Systems Software Engineering Systems Digital Computing Systems Digital Computing Systems Computer Applications
eReg ID 154
CRC
Reprint 0
Copyrights
77
153
77
P. Yogeswaaran Selvam
350
79 81
101 112
1 0
81
Srivatsan Sundaravaradan
164
84 91
-160
0 0
95
Yasodai Ayyasamy
152
97
Akin Cellatoglu
705
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 3 of 36
ICCA ID 97 98
Paper Title Incorporating 3D Features in Internet TV: A Proposal Improving the Performance of Speech Recognition Using Genetic Algorithm Based On Artificial Neural Network Fuzzy Logic in Digital Image Processing Understanding the Digital Forensics: A Review Establishing Relationship Between Customer Relationship Management & E-Business Establishing Relationship Between Customer Relationship Management & E-Business VoIP Call Quality Optimization through Cloud Computing VoIP Call Quality Optimization through Cloud Computing Applying Database Independent Technique To Discover Interoperability Problem Applying Database Independent Technique To Discover Interoperability Problem Security In Wireless Sensor Networks
CRC
Reprint 0 1
Copyrights
Computational Intelligence Digital Computing System Electronic Data Systems Electronic Data Systems Cloud Computing Cloud Computing Knowledge Engineering Knowledge Engineering Information Security Systems
0 0 0
108
Rohit Joshi
134
1 1 1
111
Sachin Yadav
163
113
Rachid Haboub
162
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 4 of 36
Paper Title K-CCNF And SAT Complexity K-CCNF And SAT Complexity Management and flexible transaction of uncertain data in XML database Management and flexible transaction of uncertain data in XML database ATM Card Theft Identification and Remote Information Systems An Overview of Corner Detection Algorithm Computing Schedule Variance using Non Ratio Scale Properties Enhancement of Optical Character Recognition Output and Testing using Graphical User Interface Enhancement of Optical Character Recognition Output and Testing using Graphical User Interface Enhancement of Optical Character Recognition Output and Testing using Graphical User Interface
Track Computer Applications Computer Applications Knowledge Engineering Knowledge Engineering Information Security Systems Will be classified! Computational Mathematics Computer Applications
CRC
Reprint 1 1 0
Copyrights
115
Firoz Ahamad
631
121
Pavithra Rajendran
219
121
Janani Rajasekaran
Computer Applications
217
121
Nandhini Ramesh
Computer Applications
218
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 5 of 36
ICCA ID 122
Paper Title An approach that will enable processing of Clusters in mining with a comparison of basic and concurrent involving distribution Future Human Computer Interaction Quantum Dot-Cellular Automata to Significantly Reduce the Size of Super Computers Bluetooth Controlled Automated Train Stopping System (BCATS) Bluetooth Controlled Automated Train Stopping System (BCATS) Computer Simulation of DLA in Electrodeposition of Dendritic Patterns Programmatic Testing of a Technology Product Programmatic Testing of a Technology Product Programmatic Testing of a Technology Product Implementation of the DES Framework On SOA
eReg ID 204
CRC
Reprint 0
Copyrights
128 132
Satishkumar P. A. Karthikeyan Damodaran, Arun Kumar A, Jaideep H Lakhani, Dheepak V Syed Akthar Aasif
197 234
2 2
133
Automated Systems
269
133
Mohammed Shaffi
Automated Systems
248
135
Computer Applications Computer Applications Computer Applications Computer Applications Software Engineering Systems
Manual
0 0 0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 6 of 36
Paper Title Data Set Privacy For Organizations: A Review Role of Cybernetics in Management of Urban Disasters Mind Controller (Brain Hacking) A Survey On Efficient Approaches For Securing The Private Data In Cloud Computing Secure and Lightweight model for m-Payment System based on Hash Chain in Mobile Network Stochastic Segregation of Steering Scheduling Performance in Multi Server Queueing Network Cloud Computing Strategy:A Paradigm Shift in Information Technology Cloud Computing Strategy:A Paradigm Shift in Information Technology Cloud Computing Strategy:A Paradigm Shift in Information Technology Binary Audio Cryptography Scheme
Author Name Pankaj Kumar Sharma Nirmita Mehrotra A Sunil Sai Randeep Kaur Chhabra
Track Knowledge Engineering Will be classified! Human Computer Interaction Cloud Computing
CRC
Reprint 0
Copyrights
1 0
157
Chitra Kiran N
284
163
K. Sivaselvan
259
167
Sivaraman Eswaran
Cloud Computing
326
167
Hemalatha Raguram
Cloud Computing
319
167
Manickachezian Rajakannu
Cloud Computing
370
168
Pradnya Khobragade
300
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 7 of 36
ICCA ID 170
Paper Title On A Graph Theory Based Approach For Improved Computer Vision-II Design Of Parallel Vector/Scalar Floating Point Coprocessor For Reconfigurable Architecture Implementation Details of Various Job Scheduling Heuristics Approaches for Cloud Computing Environment Implementation Details of Various Job Scheduling Heuristics Approaches for Cloud Computing Environment Implementation Details of Various Job Scheduling Heuristics Approaches for Cloud Computing Environment Algorithms in Simulated Parallel Condition A Performance Analysis Algorithms in Simulated Parallel Condition A Performance Analysis An Analysis of Multilevel Cascade H-Bridge 21-Level Inverter Implemented in Matlab/ Simulink Software
eReg ID 301
CRC
Reprint 0
Copyrights
173
358
174
Paritosh Sardare
475
174
Nikita Bais
Cloud Computing
463
174
Sachin Solanki
Cloud Computing
462
179
824
179
Gagandeep Singh
257
201
Venkateshkumar M
374
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 8 of 36
ICCA ID 206
Paper Title High Performance asynchronous AC Motor Drive Using Fuzzy Logic Controller Reduction of Total Harmonic Distortion in a Single Phase UPS Inverter by using Neural Network Controller Hybrid Genetic Algorithm for Optimization of Bloom Filter in Spam Filtering Agent Oriented Software Engineering Methodologies: A Review Agent Oriented Software Engineering Methodologies: A Review Indexing and Retrieval of Multimedia Data In Cooperative Work Environment Stochastic Dynamics of Markov Chains using Circulation Theory Bit-Pattern Representation for Design Pattern Identification Bit-Pattern Representation for Design Pattern Identification Name Alias Detection based on UI approach and Graph mining method
eReg ID 279
CRC
Reprint
Copyrights
207
Deva Das G
Will be classified!
276
211
Arulanand Natarajan
Computer Applications Software Engineering Systems Software Engineering Systems Digital Computing System Computational Mathematics Software Engineering Systems Software Engineering Systems Knowledge Engineering
627
212
Devshri Roy
851
212
346
215
Pranita Ambre
274
4 0 0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 9 of 36
ICCA ID 222
Paper Title Name Alias Detection based on UI approach and Graph mining method Name Alias Detection based on UI approach and Graph mining method A Smart Book Reader RECONOS: Re-Configurable & Extensible OS Architecture Calculating the Cohesion and Coupling for Class Diagram through Slicing Techniques An Insight on Vulnerability Patch Management in Enterprise Environment Robust Modelling for Steganography Using Genetic Algorithm and Visual Cryptography for Mitigating RS Analysis Analysis of soft computing in Neural Network An ID-based Directed Ring Signature Scheme using Bilinear Pairings over Elliptic Curves An ID-based Directed Ring Signature Scheme using Bilinear Pairings over Elliptic Curves
Track Knowledge Engineering Knowledge Engineering Digital Computing System Open Source Systems Software Engineering Systems Information Security Systems Computer Applications
eReg ID 770
CRC
Reprint 0
Copyrights
222
Madhuri Wakode
831
0 0 0
233
Rakesh Kumar G L
295
234
Akanksha Jain
304
241 242
323 455
1 4
242
K A Ajmath
398
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 10 of 36
ICCA ID 242
Paper Title An ID-based Directed Ring Signature Scheme using Bilinear Pairings over Elliptic Curves Distance based Data aggregation for Energy Efficiency in Wireless Sensor Networks A QoS based conceptual analysis in Requirement Engineering for Service-Based Systems A QoS based conceptual analysis in Requirement Engineering for Service-Based Systems A 3D Stacked Mesh NOC for Reliable Inter-Layer Communication and Congestion Reduction Mobile Operating System: A comparative analysis Mobile Operating System: A Comprative Analysis Improved Stereo Disparity Computation based on Adaptive weight and Segmentation Improved Stereo Disparity Computation based on Adaptive weight and Segmentation
eReg ID 342
CRC
Reprint 4
Copyrights
243
Kusma S M, P I Basarkod, Computational Veena K N, B P Vijaya Kumar Intelligence Priyaradhikadevi T Software Engineering Systems
Manual
249
447
249
Rajalakshmi Ganesh
328
251
Karthigeyan K A
Information Communication
518
0 0 0
253
Rachna Verma
Automated Systems
320
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 11 of 36
ICCA ID 255
Paper Title SVD based Image Watermarking Technique Implemented for Different Images Fractal Estimation Using Extended Triangularisation and Box Counting Algorithm For Any Geo-Referenced Point Data in GIS Review Paper on Software Testing Review Paper on Software Testing Review Paper on Software Testing Goggle, NOT Google Goggle, NOT Google A Hybrid Genetic Algorithm for the Job Shop Scheduling Problem A Hybrid Genetic Algorithm for the Job Shop Scheduling Problem Low-Low Average Algorithm for Scheduling Request-demanding Cloud Workflows Involving Overheads Design of DAODV MANET Routing protocol
eReg ID 375
CRC
Reprint
Copyrights
256
Sridhar Ramachandran
Will be classified!
776
Saumya Rawat Ruchi Sharma Ratika Gupta Alok Panchal Abhishek Joshi Tandra Pal Sudipta Mondal Rajagopal Palson Kennedy
Software Engineering Systems Software Engineering Systems Software Engineering Systems Human Computer Interaction Human Computer Interaction Computational Intelligence Computational Intelligence Cloud Computing
0 0 0 1 1 0 0 0
263
P Shiekabdul Khader
Information Communication
1115
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 12 of 36
Paper Title Design of DAODV MANET Routing protocol An Intelligent Location Prediction System for Banking Loans Using Bayes Approach Simulation of Spread Spectrum Modulation Techniques Solar tracking fuzzy control system using AVR Microcontroller Solar tracking fuzzy control system using AVR Microcontroller Novel Approach for Discovery of Frequently Occurring Sequences Novel Approach for Discovery of Frequently Occurring Sequences Novel Approach for Discovery of Frequently Occurring Sequences Modeling Impact of Varying Data Rates for Various Spread Spectrum Techniques on Load in WLAN Ad-Hoc Mode An ANN Based Movie Business Prediction Method using a Subset of Training Data
Track Information Communication Computational Intelligence Signal Processing Systems Embedded Control Systems Embedded Control Systems Knowledge Engineering Knowledge Engineering Knowledge Engineering Information Communication
CRC
Reprint 2 0
Copyrights
273 274
335 382
0 0
274
Bharati Sonawane
376
275
Emmanuel M
886
275
Anupama Phakatkar
891
275
Vibhavari Kamble
866
276
Rajan Vohra
344
282
Nirmalya Chowdhury
Computational Intelligence
716
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 13 of 36
ICCA ID 282
Paper Title An ANN Based Movie Business Prediction Method using a Subset of Training Data Vertical Handover Decision Schemes in Heterogeneous Wireless Networks Brain Computer Interface An Innovative And Emerging Engineering Technique Of Speechless Thought Recognition Finger Vein Biometric Verification and Authentication: An Overview Finger Vein Biometric Verification and Authentication: An Overview Finger Vein Biometric Verification and Authentication: An Overview A Survey of Optimization of Resource Scheduling in Cloud Computing Modified Approach to Fuzzy Entropy Clustering Method with Adjustable Membership Characteristics for Image Segmentation Location Hiding Techniques for Securing Distributed File System
eReg ID 633
CRC
Reprint 0
Copyrights
283
Archana Sreejith
622
286
Gaurav Londhe
379
287
Sumit Kumar
Bio-genetic Computing Systems Bio-genetic Computing Systems Bio-genetic Computing Systems Cloud Computing
394
287
Shilpi Munshi
474
287
476
289
Bindu K R
759
295
Pandiyarajan R
Computational Mathematics
377
298
Snehal Chaudhary
390
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 14 of 36
Paper Title Location Hiding Techniques for Securing Distributed File System Regression Analysis using Log Data An Algorithm for Dynamic Search in Unstructured Peer-toPeer Overlay Network Information hiding method based on Steganography and Image Morphing Evaluation Of Intrusion Detection Technology In Grid And Cloud Computing Study of Grammar tree Using L System Edge Detection Techniques for Finger-Knuckle Print Biometrics Edge Detection Techniques for Finger-Knuckle Print Biometrics CAPTCHA Generated Monitoring Method for Precluding Attacks On Servers CAPTCHA Generated Monitoring Method for Precluding Attacks On Servers Mobile Disaster Management System Using Android Technology
Track Information Security Systems Knowledge Engineering Information Communication Signal Processing Systems Cloud Computing
CRC
Reprint 1 0 0
Copyrights
303
Bhushan Zope
692
305
Karthick Ramachandran S
293
Will be classified! Bio-genetic Computing Systems Bio-genetic Computing Systems Information Security Systems Information Security Systems Information Communication
308
Bama Ramadoss
623
314
Deepti Shelar
418
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 15 of 36
ICCA ID 315
Paper Title Empirical Validation of Quality Characteristics of Academic Websites Autonomous Network Reconfiguration of WMN Using ARS Analysis of Analog Multiplier Visual & Web Usage Mining Based On Extended Server Logs Opinion Mining : Extracting and Analyzing Customers Opinion Parallel Association Rule for Data Mining in Multidimensional Databases Universally Compatible DSP Based Wire Feeder Controller for MIG Welding System Universally Compatible DSP Based Wire Feeder Controller for MIG Welding System Universally Compatible DSP Based Wire Feeder Controller for MIG Welding System Handover Techniques for 4G Networks
Track Software Engineering Systems Embedded Control Systems Digital Computing Systems Knowledge Engineering Knowledge Engineering Knowledge Engineering Digital Computing System Digital Computing System Digital Computing System Information Communication
eReg ID 439
CRC
Reprint 0
Copyrights
316
Mohanram S
440
Arun Katara Dipti Zambre Chandrashekhar Badgujar C D Rajaganapathy, T R Srinivasan, S Gopikrishnan Paramasivam Shunmugam
0 0 0 0
330
611
330
610
330
494
331
Piyali Dutta
419
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 16 of 36
ICCA ID 332
Paper Title Node Localization in Wireless Sensor Networks using Mobile Anchor Comparison of Image Compression through Neural Network And Wavelets Role of K-Guru in Dynamic Game Analysis Resource Aware Scheduling of Slow Running Task in Data Parallel Computing Resource Aware Scheduling of Slow Running Task in Data Parallel Computing Resource Aware Scheduling of Slow Running Task in Data Parallel Computing Exploiting the Bit Error Diversity for Efficient Error Detection in Multihop Wireless Network Face Recognition using Fusion of Thermal and Visual Images Face Recognition using Fusion of Thermal and Visual Images Cloud Computing is an application of Green Computing - a new Horizon of Energy Efficiency and Beyond
Track Digital Computing Systems Computational Intelligence Computer Applications High Performance Computing High Performance Computing High Performance Computing Information Communication
eReg ID 420
CRC
Reprint 0
Copyrights
333
Kavita Pateriya
408
334 335
428 879
0 0
335
Bhushan Kandalkar
870
335
Shyam Deshmukh
883
336
Yanthungbeni Humtsoe
865
0 0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 17 of 36
ICCA ID 338
Paper Title Cloud Computing is an application of Green Computing - a new Horizon of Energy Efficiency and beyond Design & Development of Digital Frequency Multiplier A Visual Interfacing for Analyzing Three Graph Base Image Segmentation Algorithms Design and Implementation of Sensor Network Using Can Bus Ontology Based Question Answering for A Study of Congestion Aware Adaptive Routing Protocols in MANET A Study of Congestion Aware Adaptive Routing Protocols in MANET SMS length expansion and security approach in a mobile device Multy-level Intrusion Detection System in Cloud Computing Bayesian aspect of Silloughty estimation in multiview segmentation
eReg ID 509
CRC
Reprint 0
Copyrights
340 341
Electronic Data Systems Computer Applications Digital Computing System Human Computer Interaction Information Communication Information Communication Information Communication Cloud Computing Signal Processing Systems
656 768
0 0
0 0 0
345
Shitalkumar Jain
594
346
Deepak Manglani
411
351 356
S V Narwane Sabna A B
483 433
0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 18 of 36
ICCA ID 358
Paper Title Dimensionality Reduction Techniques for Face Image Retrieval: A Review Closeness: A New Privacy Measure for Data Publishing Use of Multiple Concentric Layer Criteria in Detection of Masses from Mammograms: A Review Mobile Charger without Using External Power Supply Taxonomies, Challenges And Approaches To Automatic Web Query Classification E-Learning Model for Quality of Education Enhancement in Universities E-Learning Model for Quality of Education Enhancement in Universities Bayesian MAP Model for Edge Preserving Image Restoration: A Survey Predicting Data from Unauthorized User to a Authorized User Using Fake Objects
eReg ID 469
CRC
Reprint 0
Copyrights
360 365
414 517 0
366 368
Will be classified! Knowledge Engineering Computer Applications Computer Applications Knowledge Engineering Information Security Systems
715 460 0
369
Kumar Krishnan
585
369
Naseem Akthar
747
370
Greeshma T.R
432
375
Deepika Manoharan
452
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 19 of 36
ICCA ID 380
Paper Title E-commerce Security: The Need, Use and Efficiency of Encryption Methods for Secure E-commerce websites Human Age Classification using 2-D Gabor Wavelet and Neural Network Design and Implementation of Low Power and Area Efficient adder and Vedic Multiplier for FFT Performance Enchancement of DWT Processing using GPGPU Performance Enchancement of DWT Processing using GPGPU Performance Enchancement of DWT Processing using GPGPU Early detection of Cancer using Bioinformatics Virtual Integrated Test Team for Telecommunication Ventures Virtual Integrated Test Team for Telecommunication Ventures Mobile Learning for Senior Citizens Mobile Learning for Senior Citizens
eReg ID 532
CRC
Reprint 0
Copyrights
381
Jayant Jagtap
445
382
D Jaganathan
443
Phani Tejaswi K Thara Nair A V V Prasad Chandrasekhar Uddagiri Sumithra Devi K A Manju Geogy P F Xavier Patrick Kishore P Sagaya Aurelia
High Performance Computation High Performance Computation High Performance Computation Bio-Genetic Computing Software Engineering Systems Software Engineering Systems Electronic Data Systems Electronic Data Systems
0 0 0 0 0 0 0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 20 of 36
Paper Title Mobile Learning for Senior Citizens Effect of Topology on Routing Performance in partially Mobile Ad-hoc Networks Effect of Topology on Routing Performance in partially Mobile Ad-hoc Networks Opinion Mining For Decision Making In Medical Decision Support System - A Survey Grid Resource Management Based On Agent Grouping Low Power Compressed CGRA Architecture Based Processor Design A Novel Approach Towards Legal Information Retrieval Establishing the Relationship between Customer Relationship Management and E- Business A Study on SC-FDMA Advance Access Scheme for 4G Optimized Implementation of Reduced Size LUT in Built in SelfTesting
Track Electronic Data Systems Information Communication Information Communication Knowledge Engineering Embedded Control Systems Signal Processing Systems Will be classified! Management
CRC
Reprint 0 0
Copyrights
393
Nibedita Shial
937
394
A. Ananda Shankar
587
397 399
576 709
0 0
400 402
473 471 0
403 406
472 726
0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 21 of 36
ICCA ID 407
Paper Title Segmentation of Pulmonary Nodule in Computed Tomography Scan for Lung Disorder Prediction Segmentation of Pulmonary Nodule in Computed Tomography Scan for Lung Disorder Prediction Towards Agile Project Management Towards Agile Project Management The recent Advances and future Trends In Wireless Biotelemetry System Design Issues of Bus Arbitration Schemes in Shared Bus Multiprocessor(MPSoC) An Context Aware Document Clustering Using Data Fusion An Efficient Method for Video Shot Segmentation and Classification Resource allocation in P2P system using Bit Torrent Transportation Vehicle Information System Using Wireless Technology
eReg ID 651
CRC
Reprint 0
Copyrights
407
Vilas Alagdeve
Computer Applications
649
Software Engineering Systems Software Engineering Systems Electronic Data Systems Electronic Data Systems Electronic Data Systems Computer Applications High Performance Computing Will be classified!
0 0 0
411
Neeta Doifode
657
413 416
663 468
0 0
417 418
294 671
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 22 of 36
ICCA ID 419
Paper Title Mathematical Heuristics for Feed Forward Artificial Neural Network Design Mathematical Heuristics for Feed Forward Artificial Neural Network Design A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory Image Resolution Enhancement Based On Edge Directional Interpolation in Duel TreeComplex Wavelet Transform Can Human Computer Interaction (HCI) bridge the Digital Divide? A Case of Akash in India
eReg ID 456
CRC
Reprint 0
Copyrights
419
Vandit Bhatia
578
423
Aliasger Gabuji
564
423
G. Pawan Kumar
Information Communication
641
423
Anju Kulkarni
Information Communication
639
423
Nikhil Agarwal
Information Communication
504
425
Suresh L, D Loganathan
499
430
Shilpa Tripathi
748
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 23 of 36
ICCA ID 431 431 431 432 432 433 433 433 434
Paper Title Security Enhanced Instant Messaging Security Enhanced Instant Messaging Security Enhanced Instant Messaging Protocol Design For Advanced Security In Wireless Networks Protocol Design For Advanced Security In Wireless Networks One Time Password: A Secure Authentication Scheme One Time Password: A Secure Authentication Scheme One Time Password: A Secure Authentication Scheme Optimized Design variants of a self-powering CMOS Optoelectronic VLSI Circuit Optimized Design variants of a self-powering CMOS Optoelectronic VLSI Circuit Iris Recognition using DWT with Optimized Decomposition Levels A Review of Wireless Security Protocols: WEP, WPA and WPA2
Author Name Mukul Manmohan Meghwal Raghuveer Singh Dhaka Arvind Dhaka Raghuveer Singh Dhaka Arvind Dhaka Raghuveer Singh Dhaka Arvind Dhaka Mukul Manmohan Meghwal Swaminathan S
Track Information Security Systems Information Security Systems Information Security Systems Information Communication Information Communication Information Security Systems Information Security Systems Information Security Systems Embedded Control Systems Embedded Control Systems Bio-genetic Computing Systems Information Security Systems
eReg ID 786 783 550 551 781 784 780 552 735
CRC
Reprint 0 0 0 1 1 1 1 1 0
Copyrights
434
737
436
516
437
553
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 24 of 36
ICCA ID 437
Paper Title A Review of Wireless Security Protocols: WEP, WPA and WPA2 A Review of Wireless Security Protocols: WEP, WPA and WPA2 Application Of Graph Theory In Computer Science(Implementing Greedy Algorithm For map Coloring in GSM mobile Network Fabric Defect Detection Using Statistical Texture Analysis A Novel Ranking Algorithms for Ordering Web Search Results UML Designing and Comparative Performance of Various Computer Networks Performance & Evaluation of DSS Using OLAP Techniques In The Data Warehouse A Nascent Approach for Symmetric Key Encryption Using Double DES Survey Of Digital Image Steganography In DWT Domain Survey Of Digital Image Steganography In DWT Domain
Track Information Security Systems Information Security Systems Signal Processing Systems
eReg ID 785
CRC
Reprint 0
Copyrights
437
Arvind Dhaka
782
438
Mahadevi Namose
522
Computer Applications Knowledge Engineering Software Engineering Systems Knowledge Engineering Digital Computing Systems Computer Applications Computer Applications
0 0 0
447
Renu Yadav
491
448
Praful Saxena
496
449 449
567 --
0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 25 of 36
ICCA ID 451
Paper Title A Comparison of Fuzzy Clustering Techniques for Image Segmentation Target Geo-Localization System by Geo-Referencing Mini Aerial Vehicle Video Mosaics Analysis of 4x4 crossbar switch for Network Processor Key Frame Extraction Based On Block Based Histogram Difference and Edge Matching Rate Key Frame Extraction Based On Block Based Histogram Difference and Edge Matching Rate Autonomous Navigation of Unmanned Aerial Vehicle Using Image Flow Algorithm Development and Evaluation of a Document Clustering Engine Analysis of Bent Ground plane on MIMO Antenna Comparative Study Of Algorithms For Extraction Of Blood Vessels From Retinal color Images Survey of Security Issues in Mobile Ad-hoc Network
eReg ID 658
CRC
Reprint
Copyrights
453
Mahadeeswara Yadav
Automated Systems
745
454 456
659 488 1
456
Bremananth Ramachandran
Computer Applications
845
457
Annaiyan Arun
Automated Systems
746
473
Praful Pardhi
Will be classified!
513
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 26 of 36
ICCA ID 475
Paper Title An Approach For Disease Treatment In Medline Using Semantic Relations FOSS - A facilitator in teaching FOSS - A facilitator in teaching Design of Fuzzy Logic Scheme for Speed control of Induction Motor A Distributed Process System Architecture for Biological Data Analysis SSO Use Case in Cloud Computing for Securacy to Worldwide Users SSO Use Case in Cloud Computing for Securacy to Worldwide Users PAPR Reduction Technique in MIMO-OFDM Based Wireless Communication PAPR Reduction Technique in MIMO-OFDM Based Wireless Communication PAPR Reduction Technique in MIMO-OFDM Based Wireless Communication
Track Signal Processing Systems Open Source Systems Open Source Systems Automated Systems
eReg ID 959
CRC
Reprint 0
Copyrights
0 0 0
480
621
481
628
481
Kiruthika Balu
Cloud Computing
630
482
481
482
794
482
806
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 27 of 36
ICCA ID 483
Paper Title Hierarchical Energy Efficient Protocol for LLC in Wireless Sensor Networks Hierarchical Energy Efficient Protocol for LLC in Wireless Sensor Networks Survey of Reactive Routing Protocols in Mobile Adhoc Networks Real time wind speed analysis and prediction of wind power generation using Artificial Neural Network (ANN) Real time wind speed analysis and prediction of wind power generation using Artificial Neural Network (ANN) Certain Optimization Methods for Design Space Compression of Arithmetic Circuits Certain Optimization Methods for Design Space Compression of Arithmetic Circuits Spontaneous Sorting Clock for Providing Judgments to Civil Cases Strong Secure Communication Technique: Steganography With Hybrid Cryptography
Track Software Engineering Systems Software Engineering Systems Information Communication Automated Systems
eReg ID 755
CRC
Reprint 1
Copyrights
483
Vinothini Murugan
648
485
Jayalakshmi V
645
486
R Ponnusamy
--
486
P Sardar Maran
Automated Systems
503
487
863
487
Ranganathan Vijayaraghavan
581
490
Annapoorani Venkatesan
514
491
Smita Bansod
442
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 28 of 36
ICCA ID 493
Paper Title Discrimination between Airway Diseases with Similar Symptoms the Lung Diseases Node Classification for Energy Efficient and Reliable Hierarchical WSN Protocol Node Classification for Energy Efficient and Reliable Hierarchical WSN Protocol A Comprehensive Approach Of Access Control For E-Commerce Using Mobile Agents A Data Mining Approach for Mobility Prediction Using Wireless Traces A Data Mining Approach for Mobility Prediction Using Wireless Traces A Data Mining Approach for Mobility Prediction Using Wireless Traces Search Based Optimization for Test Data Generation Using Genetic Approaches Search Based Optimization for Test Data Generation Using Genetic Approaches
eReg ID 664
CRC
Reprint
Copyrights
494
Sang-ho Lee
700
494
Ning Sun
588
496
Vishwanath Panchagnula
788
497
Ananthi J
Information Communication Information Communication Information Communication Software Engineering Systems Software Engineering Systems
601
497
Ranganathan Vijayaraghavan
862
497
Menaka R
861
500
Kuppuraj Swaminathan
754
500
Priya Sudharsan
614
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 29 of 36
ICCA ID 502
Paper Title StegGen:An Optimized Steganographic Tool Based on GA Success and Failure Factors of eGovernment project implementation in Yemen: An explore Study Software designing for shrinkage testing station DIL 402C Efficient Data Storage and Security Using Data Grid Knowledge Management Strategies for Implementation of Green Technologies A Design Model of Banking Website in Perspective of Behavioral Feasibility Study A Design Model of Banking Website in Perspective of Behavioral Feasibility Study Component Weight Assignment Algorithm With SVM : Mining Reviews For Social And Economic Support Component Weight Assignment Algorithm with SVM: Mining Reviews for Social and Economic Support
eReg ID 734
CRC
Reprint 0
Copyrights
504
762
506
Manual
512 520
637 642
1 0
522
Saravanan C
640
522
Vinay R
Management
689
525
T Kohilakanagalakshmi
Knowledge Engineering
570
525
Knowledge Engineering
634
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 30 of 36
ICCA ID 527
Paper Title Band Limited Linear Predictive Coding Vocoder in Digital Hearing Aids Thresholding Techniques for Skull Stripping the MRI Brain Images Thresholding Techniques for Skull Stripping the MRI Brain Images A Correlative Analysis of Methodologies Involved In Ontology Construction for ELearning A Correlative Analysis of Methodologies Involved In Ontology Construction for ELearning Auscultation and Separation of Heart Sound from Respiratory Sound Using Lab-View Auscultation and Separation of Heart Sound from Respiratory Sound Using Lab-View Comparative Study between Traditional and Heuristic Approach on Close-degree Concept Lattice for better Attribute Reduction
eReg ID 744
CRC
Reprint
Copyrights
528
Mahesh Pawar
721
528
Vijendra Meshram
720
530
Suresh R M
666
530
Rebecca Amulya D
Knowledge Engineering
779
535
Yogesh Gaidhane
546
535
Zahir Quazi
931
539
Ravindra Gupta
714
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 31 of 36
ICCA ID 543
Paper Title A Newfangled Approach to Semantic Search for E-Tourism Domain Application of UML Design Documents with Design Metrics and OCL Specification for Critical Component Identification Ranking of Documents in Semantic Web using Particle Optimization Ranking of Documents in Semantic Web using Particle Optimization Ranking of Documents in Semantic Web using Particle Optimization Analysis of Computational Errors in Digital Signal Processing with Voltage Scaling A Combinatorial Approach for Design of Fuzzy Based Intrusion Detection System A Combinatorial Approach for Design of Fuzzy Based Intrusion Detection System Implementation of Differentiator Using PFG
eReg ID 688
CRC
Reprint
Copyrights
545
A. Jalila
Will be classified!
695
546
Sanjeeve Kumar
Knowledge Engineering Knowledge Engineering Knowledge Engineering Signal Processing Systems Computational Intelligence Computational Intelligence Signal Processing Systems
892
546
Selvarani CM
992
546
733
549
Vishwas Balpande
704
550
Bhuvaneswaran R S
751
550
Vydeki Dharmar
702
553
Sonalee Suryawanshi
731
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 32 of 36
Paper Title SMPS With Linear PWM Technique Performance Analysis of Routing Protocols in Mobile Adhoc Netoworks Implementation of DS-SS Based CDMA Transmitter and Receiver Using Gold Code for FPGA An Improved Approach to FCOCOMO using PI Membership Function APC-OMS Combined LUT for Memory Based Computation Gas Identification Using Artificial Intelligence Tecnique Extended Diffie-Hellman Algorithm for Key Exchange and Management Literature Survey and Proposed Concept on Performance Issue of Multicasting Routing Protocol in Wireless Sensor Network Literature Survey and Proposed Concept on Performance Issue of Multicasting Routing Protocol in Wireless Sensor Network
Track Electronic Data System Information Communication Electronic Data Systems Software Engineering Systems Electronic Data Systems Will be classified! Will be classified!
CRC
Reprint 0 0
Copyrights
556
Kshama Dawile
743
557
Anupama Kaushik
774
566
Rahul Verma
Information Communication
699
566
Akhilesh Waoo
Information Communication
835
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 33 of 36
ICCA ID 566
Paper Title Literature Survey and Proposed Concept on Performance Issue of Multicasting Routing Protocol in Wireless Sensor Network Literature Survey on LEACH Protocol in Wireless Sensor Network Performance Analysis of Simple Adaptive Median Filter In Reducing Impulse Noise Level from Digital Images Literature Survey and Proposed model to Enhance Security of Database A Metrics Driven Approach to Specify Usable Security in Web Service Discovery A New Early Parsing Algorithm for Lexicalized Tree Adjoining Grammar Designing A High-Performance Scalable Framework Over Cloud For Managing Online Programming Contests Power Reduction Technique in Testing Of VLSI Circuits Self Test Technique for Two Fish Algorithm
eReg ID 836
CRC
Reprint 0
Copyrights
567
Aishwary Agrawal
698
568
Vicky Ambule
740
569
Naveen Kolhe
684
571
Marimuthu Govindaraj
728
574
Sharafudheen Kambunkal
818
576
Manual
577 578
687 670
0 0
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 34 of 36
ICCA ID 580
Paper Title An Intelligent Image Retrieval based on Wavelet Transform and Similarity Method An Intelligent Image Retrieval based on Wavelet Transform and Similarity method WEB 2.0 Issues and Challenges in a Cloud Computing Environment Intrusion Detection System using Outlier Detection and Classification Techniques Intrusion Detection System using Outlier Detection and Classification Techniques Extraction of Signal features from Deaf-mute Voice Signal Securing IPv6 Signaling for SCADA Wireless Sensor Network Smart Grid in Cloud Computing Infrastructure: Review The Cohesive Countermeasure Schemes for Securing Wireless Sensor Networks against Vulnerabilities and Attacks: Review
Track Signal Processing Systems Signal Processing Systems Will be classified! Cloud Computing Will be classified!
eReg ID 843
CRC
Reprint 1
Copyrights
580
M Kamarasan
719
592
Sumesh Manikandan
Will be classified!
764
593 601
Nirmala Devi J, K Bomannaraja Hoon Ko, Yvette Gelogo, TaiHoon Kim Byeong-Ho Kang,Yvette Gelogo Ronnie D. Caytiles, Tai-hoon Kim, Dominik Slezak
Signal Processing Systems Information Security Systems Cloud Computing Information Communication
949 Manual
0 1
602 603
Manual Manual
1 1
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 35 of 36
ICCA ID 608
Paper Title A Robust Design of RTU Sensor Nodes Communication for SCADA System Secured SCADA System in Smart Grid Deployment Advanced Congestion Adaptive Routing Mechanisms in MANET New Improved Methodology in Advanced Driver Assistance System Tele-Operative Ophthalmoscope Green ICT and its Global Impact Achieving Competetive Advantage Using Automated Securities Validation Analysis of Foreign Direct Investment in Service Sector: A Study With Reference To India
Author Name
Track
eReg ID Manual
CRC
Reprint 1
Copyrights
Sabah Mohammed, Ronnie Information D. Caytiles and Tai-hoon Kim Communication Yvette Gelogo, Tai-Hoon Kim Information Communication Geetam Tomar Sanket Borhade Will be classified! Will be classified!
631
K Maran
Management
1123
1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.
Page 36 of 36