Você está na página 1de 36

Paper Registration Status - ICCA2012 - Pondicherry, India

ICCA ID 14 Paper Title Web-Biometrics: User Verification via Web Interaction(With a Head Tracking Mouse Usage) Private Key Generation (PKG) Based Node ID Assignment in Structured P2P Systems Private Key Generation (PKG) Based Node ID Assignment in Structured P2P Systems The place of information technology as a well of opportunities for poverty alleviation Impact Of De-Authentication Attack On Wireless Intrusion Detection Systems Euler Number, Symmetry and Histogram Based Hierarchical Approach for English OCR Simulation of AODV Routing Protocol Grid Computing - High Level Computing to Access Internet Grid Computing - High Level Computing to Access Internet Author Name Manju Panneerselvam Track Bio-genetic Computing Systems eReg ID 57 CRC

Saturday, January 14, 2012 6:59:21 PM Reprint 1 Copyrights

23

M Jegatha

Information Security Systems Information Security Systems Computer Applications

341

23

R Venkadeshan

13

29

Afolashade Kuyoro

32

34

S Divya

Information Security Systems Computational Intelligence Information Communication High Performance Computing High Performance Computing

24

38

Mahesh Goyani

29

41 52 52

Ashish Chaurasia Ajit Nataraj C R Dinesh

34 89 151

0 0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 1 of 36

ICCA ID 53

Paper Title A Mechanism For Skew Detection Of Online Bangla Handwritten Words A Mechanism For Skew Detection Of Online Bangla Handwritten Words Nanotechnology- The New Upgrade For Computers Authentication of Bluetooth Using Biometrics Authentication of Bluetooth Using Biometrics Gaussian Kernel based Intuitionistic Fuzzy C-Means Clustering Algorithm in Segmentation of Noisy Digital Images Scalable, Robust, Efficient Location Database Architecture Based on the LocationIndependent PTNs LOA-BRO-FAI Analysis in Grid Computing Using SYL's Algorithm The Grass root in Technical communication Gesture Based Communication

Author Name Arnab Guchhait

Track Human Computer Interaction Human Computer Interaction High Performance Computing Information Security Systems Information Security Systems Automated Systems

eReg ID 98

CRC

Reprint 0

Copyrights

53

Rajib Ghosh

102

55 61 61 62

Ramyasree Asokan Mohankumar N Madhusudhanan Prabhjot Kaur Sidhu

453 64 65 119 2 2 0

67

Kaptan Singh

Knowledge Engineering

384

70

Sylvia Grace J

Cloud Computing

108

71 75

Prashanth G K G S L K Chand

Digital Computing Systems Human Computer Interaction

92 103

0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 2 of 36

ICCA ID 77

Paper Title MPPC: Mobile Phone for Physically Challenged with Smart Interaction MPPC: Mobile Phone for Physically Challenged with Smart Interaction MPPC: Mobile Phone for Physically Challenged with Smart Interaction A fuzzy Approach for mining Time Series Data Checkpoints for Cabs Using Cellular Quad Band Module with GPS Checkpoints for Cabs Using Cellular Quad Band Module with GPS Web Application Testing Using Inheritance Method Introducing the Internal File System for the DATABASE Packages An FPGA Based Framework forExploitation of multi node Architecture Incorporating 3D Features in Internet TV: A Proposal

Author Name Vigneshkumar Saravanasundaram M. U. Arumugam Pillai

Track Human Computer Interaction Human Computer Interaction Human Computer Interaction Bio-genetic Computing Systems Electronic Data Systems Electronic Data Systems Software Engineering Systems Digital Computing Systems Digital Computing Systems Computer Applications

eReg ID 154

CRC

Reprint 0

Copyrights

77

153

77

P. Yogeswaaran Selvam

350

79 81

Sadiq Hussain Pughazendi N

101 112

1 0

81

Srivatsan Sundaravaradan

164

84 91

C D Rajaganapathy, T R Srinivasan, S Gopikrishnan Priyanka Kulshrestha

-160

0 0

95

Yasodai Ayyasamy

152

97

Akin Cellatoglu

705

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 3 of 36

ICCA ID 97 98

Paper Title Incorporating 3D Features in Internet TV: A Proposal Improving the Performance of Speech Recognition Using Genetic Algorithm Based On Artificial Neural Network Fuzzy Logic in Digital Image Processing Understanding the Digital Forensics: A Review Establishing Relationship Between Customer Relationship Management & E-Business Establishing Relationship Between Customer Relationship Management & E-Business VoIP Call Quality Optimization through Cloud Computing VoIP Call Quality Optimization through Cloud Computing Applying Database Independent Technique To Discover Interoperability Problem Applying Database Independent Technique To Discover Interoperability Problem Security In Wireless Sensor Networks

Author Name Balasubramanian Karuppanan Narendran Sivasubramanian

Track Computer Applications Signal Processing Systems

eReg ID 143 189

CRC

Reprint 0 1

Copyrights

105 106 108

Prashanth G K Shipra Maurya Ankur Shrivastav

Computational Intelligence Digital Computing System Electronic Data Systems Electronic Data Systems Cloud Computing Cloud Computing Knowledge Engineering Knowledge Engineering Information Security Systems

174 158 155

0 0 0

108

Rohit Joshi

134

110 110 111

Srivatsan Sankaran Sriram Madapusi Vasudevan Shefali Verma

150 149 231

1 1 1

111

Sachin Yadav

163

113

Rachid Haboub

162

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 4 of 36

ICCA ID 114 114 115

Paper Title K-CCNF And SAT Complexity K-CCNF And SAT Complexity Management and flexible transaction of uncertain data in XML database Management and flexible transaction of uncertain data in XML database ATM Card Theft Identification and Remote Information Systems An Overview of Corner Detection Algorithm Computing Schedule Variance using Non Ratio Scale Properties Enhancement of Optical Character Recognition Output and Testing using Graphical User Interface Enhancement of Optical Character Recognition Output and Testing using Graphical User Interface Enhancement of Optical Character Recognition Output and Testing using Graphical User Interface

Author Name Kanak Chandra Bora Bichitra Kalita Umesh Dwivedi

Track Computer Applications Computer Applications Knowledge Engineering Knowledge Engineering Information Security Systems Will be classified! Computational Mathematics Computer Applications

eReg ID 172 193 563

CRC

Reprint 1 1 0

Copyrights

115

Firoz Ahamad

631

116 117 120

Surya Natarajan Ligendra Kumar Verma Srinivasa Gopal

176 798 243

121

Pavithra Rajendran

219

121

Janani Rajasekaran

Computer Applications

217

121

Nandhini Ramesh

Computer Applications

218

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 5 of 36

ICCA ID 122

Paper Title An approach that will enable processing of Clusters in mining with a comparison of basic and concurrent involving distribution Future Human Computer Interaction Quantum Dot-Cellular Automata to Significantly Reduce the Size of Super Computers Bluetooth Controlled Automated Train Stopping System (BCATS) Bluetooth Controlled Automated Train Stopping System (BCATS) Computer Simulation of DLA in Electrodeposition of Dendritic Patterns Programmatic Testing of a Technology Product Programmatic Testing of a Technology Product Programmatic Testing of a Technology Product Implementation of the DES Framework On SOA

Author Name Umapavan Kumar

Track Computer Applications

eReg ID 204

CRC

Reprint 0

Copyrights

128 132

Satishkumar P. A. Karthikeyan Damodaran, Arun Kumar A, Jaideep H Lakhani, Dheepak V Syed Akthar Aasif

Human Computer Interaction High Performance Computation

197 234

2 2

133

Automated Systems

269

133

Mohammed Shaffi

Automated Systems

248

135

Anwar Pasha Deshmukh

Computer Applications Computer Applications Computer Applications Computer Applications Software Engineering Systems

Manual

137 137 137 138

Amol Khanapurkar Suresh Malan Chetan Phalak Ashish Avasthi

635 215 224 256

0 0 0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 6 of 36

ICCA ID 141 143 145 153

Paper Title Data Set Privacy For Organizations: A Review Role of Cybernetics in Management of Urban Disasters Mind Controller (Brain Hacking) A Survey On Efficient Approaches For Securing The Private Data In Cloud Computing Secure and Lightweight model for m-Payment System based on Hash Chain in Mobile Network Stochastic Segregation of Steering Scheduling Performance in Multi Server Queueing Network Cloud Computing Strategy:A Paradigm Shift in Information Technology Cloud Computing Strategy:A Paradigm Shift in Information Technology Cloud Computing Strategy:A Paradigm Shift in Information Technology Binary Audio Cryptography Scheme

Author Name Pankaj Kumar Sharma Nirmita Mehrotra A Sunil Sai Randeep Kaur Chhabra

Track Knowledge Engineering Will be classified! Human Computer Interaction Cloud Computing

eReg ID 210 195 220 322

CRC

Reprint 0

Copyrights

1 0

157

Chitra Kiran N

Electronic Data Systems Computational Mathematics

284

163

K. Sivaselvan

259

167

Sivaraman Eswaran

Cloud Computing

326

167

Hemalatha Raguram

Cloud Computing

319

167

Manickachezian Rajakannu

Cloud Computing

370

168

Pradnya Khobragade

Information Security Systems

300

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 7 of 36

ICCA ID 170

Paper Title On A Graph Theory Based Approach For Improved Computer Vision-II Design Of Parallel Vector/Scalar Floating Point Coprocessor For Reconfigurable Architecture Implementation Details of Various Job Scheduling Heuristics Approaches for Cloud Computing Environment Implementation Details of Various Job Scheduling Heuristics Approaches for Cloud Computing Environment Implementation Details of Various Job Scheduling Heuristics Approaches for Cloud Computing Environment Algorithms in Simulated Parallel Condition A Performance Analysis Algorithms in Simulated Parallel Condition A Performance Analysis An Analysis of Multilevel Cascade H-Bridge 21-Level Inverter Implemented in Matlab/ Simulink Software

Author Name Venkataraman Yegnanarayanan Manikandan E

Track Signal Processing Systems Digital Computing Systems Cloud Computing

eReg ID 301

CRC

Reprint 0

Copyrights

173

358

174

Paritosh Sardare

475

174

Nikita Bais

Cloud Computing

463

174

Sachin Solanki

Cloud Computing

462

179

Chhailadeep Kaur Kahlon

Computer Applications Computer Applications Automated System

824

179

Gagandeep Singh

257

201

Venkateshkumar M

374

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 8 of 36

ICCA ID 206

Paper Title High Performance asynchronous AC Motor Drive Using Fuzzy Logic Controller Reduction of Total Harmonic Distortion in a Single Phase UPS Inverter by using Neural Network Controller Hybrid Genetic Algorithm for Optimization of Bloom Filter in Spam Filtering Agent Oriented Software Engineering Methodologies: A Review Agent Oriented Software Engineering Methodologies: A Review Indexing and Retrieval of Multimedia Data In Cooperative Work Environment Stochastic Dynamics of Markov Chains using Circulation Theory Bit-Pattern Representation for Design Pattern Identification Bit-Pattern Representation for Design Pattern Identification Name Alias Detection based on UI approach and Graph mining method

Author Name Devadas G

Track Will be classified!

eReg ID 279

CRC

Reprint

Copyrights

207

Deva Das G

Will be classified!

276

211

Arulanand Natarajan

Computer Applications Software Engineering Systems Software Engineering Systems Digital Computing System Computational Mathematics Software Engineering Systems Software Engineering Systems Knowledge Engineering

627

212

Devshri Roy

851

212

Abhishek Singh Rathore

346

215

Pranita Ambre

274

216 220 220 222

Govindan Padma Anil Patil Pravin Game Shweta Dharmadhikari

345 884 884 885

4 0 0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 9 of 36

ICCA ID 222

Paper Title Name Alias Detection based on UI approach and Graph mining method Name Alias Detection based on UI approach and Graph mining method A Smart Book Reader RECONOS: Re-Configurable & Extensible OS Architecture Calculating the Cohesion and Coupling for Class Diagram through Slicing Techniques An Insight on Vulnerability Patch Management in Enterprise Environment Robust Modelling for Steganography Using Genetic Algorithm and Visual Cryptography for Mitigating RS Analysis Analysis of soft computing in Neural Network An ID-based Directed Ring Signature Scheme using Bilinear Pairings over Elliptic Curves An ID-based Directed Ring Signature Scheme using Bilinear Pairings over Elliptic Curves

Author Name Sumitra Jakhete

Track Knowledge Engineering Knowledge Engineering Digital Computing System Open Source Systems Software Engineering Systems Information Security Systems Computer Applications

eReg ID 770

CRC

Reprint 0

Copyrights

222

Madhuri Wakode

831

223 225 226

Faroke Mohamed N Pratik Gohil Akhilesh Kumar

287 285 282

0 0 0

233

Rakesh Kumar G L

295

234

Akanksha Jain

304

241 242

Premalatha M Umaprasada Rao Bodasingi

Computer Applications Information Security Systems Information Security Systems

323 455

1 4

242

K A Ajmath

398

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 10 of 36

ICCA ID 242

Paper Title An ID-based Directed Ring Signature Scheme using Bilinear Pairings over Elliptic Curves Distance based Data aggregation for Energy Efficiency in Wireless Sensor Networks A QoS based conceptual analysis in Requirement Engineering for Service-Based Systems A QoS based conceptual analysis in Requirement Engineering for Service-Based Systems A 3D Stacked Mesh NOC for Reliable Inter-Layer Communication and Congestion Reduction Mobile Operating System: A comparative analysis Mobile Operating System: A Comprative Analysis Improved Stereo Disparity Computation based on Adaptive weight and Segmentation Improved Stereo Disparity Computation based on Adaptive weight and Segmentation

Author Name Vasudeva Reddy Punugu

Track Information Security Systems

eReg ID 342

CRC

Reprint 4

Copyrights

243

Kusma S M, P I Basarkod, Computational Veena K N, B P Vijaya Kumar Intelligence Priyaradhikadevi T Software Engineering Systems

Manual

249

447

249

Rajalakshmi Ganesh

Software Engineering Systems

328

251

Karthigeyan K A

Information Communication

518

252 252 253

Rashmi Prajapati Ruchira Shukla Arvind Verma

Information Communication Information Communication Automated Systems

395 318 643

0 0 0

253

Rachna Verma

Automated Systems

320

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 11 of 36

ICCA ID 255

Paper Title SVD based Image Watermarking Technique Implemented for Different Images Fractal Estimation Using Extended Triangularisation and Box Counting Algorithm For Any Geo-Referenced Point Data in GIS Review Paper on Software Testing Review Paper on Software Testing Review Paper on Software Testing Goggle, NOT Google Goggle, NOT Google A Hybrid Genetic Algorithm for the Job Shop Scheduling Problem A Hybrid Genetic Algorithm for the Job Shop Scheduling Problem Low-Low Average Algorithm for Scheduling Request-demanding Cloud Workflows Involving Overheads Design of DAODV MANET Routing protocol

Author Name B Chitra

Track Will be classified!

eReg ID 375

CRC

Reprint

Copyrights

256

Sridhar Ramachandran

Will be classified!

776

257 257 257 258 258 261 261 262

Saumya Rawat Ruchi Sharma Ratika Gupta Alok Panchal Abhishek Joshi Tandra Pal Sudipta Mondal Rajagopal Palson Kennedy

Software Engineering Systems Software Engineering Systems Software Engineering Systems Human Computer Interaction Human Computer Interaction Computational Intelligence Computational Intelligence Cloud Computing

402 403 309 655 566 380 327 767

0 0 0 1 1 0 0 0

263

P Shiekabdul Khader

Information Communication

1115

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 12 of 36

ICCA ID 263 265

Paper Title Design of DAODV MANET Routing protocol An Intelligent Location Prediction System for Banking Loans Using Bayes Approach Simulation of Spread Spectrum Modulation Techniques Solar tracking fuzzy control system using AVR Microcontroller Solar tracking fuzzy control system using AVR Microcontroller Novel Approach for Discovery of Frequently Occurring Sequences Novel Approach for Discovery of Frequently Occurring Sequences Novel Approach for Discovery of Frequently Occurring Sequences Modeling Impact of Varying Data Rates for Various Spread Spectrum Techniques on Load in WLAN Ad-Hoc Mode An ANN Based Movie Business Prediction Method using a Subset of Training Data

Author Name Ilanchezhiapandian Gurusamy Singaravelu Rajaprakash

Track Information Communication Computational Intelligence Signal Processing Systems Embedded Control Systems Embedded Control Systems Knowledge Engineering Knowledge Engineering Knowledge Engineering Information Communication

eReg ID 856 772

CRC

Reprint 2 0

Copyrights

273 274

Trima Piedade Fernandes e Fizardo Rajendra Kokate

335 382

0 0

274

Bharati Sonawane

376

275

Emmanuel M

886

275

Anupama Phakatkar

891

275

Vibhavari Kamble

866

276

Rajan Vohra

344

282

Nirmalya Chowdhury

Computational Intelligence

716

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 13 of 36

ICCA ID 282

Paper Title An ANN Based Movie Business Prediction Method using a Subset of Training Data Vertical Handover Decision Schemes in Heterogeneous Wireless Networks Brain Computer Interface An Innovative And Emerging Engineering Technique Of Speechless Thought Recognition Finger Vein Biometric Verification and Authentication: An Overview Finger Vein Biometric Verification and Authentication: An Overview Finger Vein Biometric Verification and Authentication: An Overview A Survey of Optimization of Resource Scheduling in Cloud Computing Modified Approach to Fuzzy Entropy Clustering Method with Adjustable Membership Characteristics for Image Segmentation Location Hiding Techniques for Securing Distributed File System

Author Name Debaditya Barman

Track Computational Intelligence Information Communication Will be classified!

eReg ID 633

CRC

Reprint 0

Copyrights

283

Archana Sreejith

622

286

Gaurav Londhe

379

287

Sumit Kumar

Bio-genetic Computing Systems Bio-genetic Computing Systems Bio-genetic Computing Systems Cloud Computing

394

287

Shilpi Munshi

474

287

Roop Kanwar Singh

476

289

Bindu K R

759

295

Pandiyarajan R

Computational Mathematics

377

298

Snehal Chaudhary

Information Security Systems

390

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 14 of 36

ICCA ID 298 300 302

Paper Title Location Hiding Techniques for Securing Distributed File System Regression Analysis using Log Data An Algorithm for Dynamic Search in Unstructured Peer-toPeer Overlay Network Information hiding method based on Steganography and Image Morphing Evaluation Of Intrusion Detection Technology In Grid And Cloud Computing Study of Grammar tree Using L System Edge Detection Techniques for Finger-Knuckle Print Biometrics Edge Detection Techniques for Finger-Knuckle Print Biometrics CAPTCHA Generated Monitoring Method for Precluding Attacks On Servers CAPTCHA Generated Monitoring Method for Precluding Attacks On Servers Mobile Disaster Management System Using Android Technology

Author Name Rajesh Ingle Anup Jawanjal Ashish Poste

Track Information Security Systems Knowledge Engineering Information Communication Signal Processing Systems Cloud Computing

eReg ID 730 877 876

CRC

Reprint 1 0 0

Copyrights

303

Bhushan Zope

692

305

Karthick Ramachandran S

293

306 307 307 308

Vinay Mishra Mahesh Kumar Jasmine R.L Nityanandam Natarajan

Will be classified! Bio-genetic Computing Systems Bio-genetic Computing Systems Information Security Systems Information Security Systems Information Communication

427 392 360 624 1 1 1

308

Bama Ramadoss

623

314

Deepti Shelar

418

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 15 of 36

ICCA ID 315

Paper Title Empirical Validation of Quality Characteristics of Academic Websites Autonomous Network Reconfiguration of WMN Using ARS Analysis of Analog Multiplier Visual & Web Usage Mining Based On Extended Server Logs Opinion Mining : Extracting and Analyzing Customers Opinion Parallel Association Rule for Data Mining in Multidimensional Databases Universally Compatible DSP Based Wire Feeder Controller for MIG Welding System Universally Compatible DSP Based Wire Feeder Controller for MIG Welding System Universally Compatible DSP Based Wire Feeder Controller for MIG Welding System Handover Techniques for 4G Networks

Author Name Ritu Shrivastava

Track Software Engineering Systems Embedded Control Systems Digital Computing Systems Knowledge Engineering Knowledge Engineering Knowledge Engineering Digital Computing System Digital Computing System Digital Computing System Information Communication

eReg ID 439

CRC

Reprint 0

Copyrights

316

Mohanram S

440

321 326 327 328

Arun Katara Dipti Zambre Chandrashekhar Badgujar C D Rajaganapathy, T R Srinivasan, S Gopikrishnan Paramasivam Shunmugam

407 673 677 --

0 0 0 0

330

611

330

Thiruvenkadam Madhulingam Srinivasan Kesavan

610

330

494

331

Piyali Dutta

419

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 16 of 36

ICCA ID 332

Paper Title Node Localization in Wireless Sensor Networks using Mobile Anchor Comparison of Image Compression through Neural Network And Wavelets Role of K-Guru in Dynamic Game Analysis Resource Aware Scheduling of Slow Running Task in Data Parallel Computing Resource Aware Scheduling of Slow Running Task in Data Parallel Computing Resource Aware Scheduling of Slow Running Task in Data Parallel Computing Exploiting the Bit Error Diversity for Efficient Error Detection in Multihop Wireless Network Face Recognition using Fusion of Thermal and Visual Images Face Recognition using Fusion of Thermal and Visual Images Cloud Computing is an application of Green Computing - a new Horizon of Energy Efficiency and Beyond

Author Name Harshada Barde

Track Digital Computing Systems Computational Intelligence Computer Applications High Performance Computing High Performance Computing High Performance Computing Information Communication

eReg ID 420

CRC

Reprint 0

Copyrights

333

Kavita Pateriya

408

334 335

Kalai Selvi, G V Uma Kalyani Waghmare

428 879

0 0

335

Bhushan Kandalkar

870

335

Shyam Deshmukh

883

336

Yanthungbeni Humtsoe

865

337 337 338

S Vijay Ananth Thangadurai N Asoke Nath

Computational Intelligence Computational Intelligence Cloud Computing

849 848 829

0 0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 17 of 36

ICCA ID 338

Paper Title Cloud Computing is an application of Green Computing - a new Horizon of Energy Efficiency and beyond Design & Development of Digital Frequency Multiplier A Visual Interfacing for Analyzing Three Graph Base Image Segmentation Algorithms Design and Implementation of Sensor Network Using Can Bus Ontology Based Question Answering for A Study of Congestion Aware Adaptive Routing Protocols in MANET A Study of Congestion Aware Adaptive Routing Protocols in MANET SMS length expansion and security approach in a mobile device Multy-level Intrusion Detection System in Cloud Computing Bayesian aspect of Silloughty estimation in multiview segmentation

Author Name Shalabh Agarwal

Track Cloud Computing

eReg ID 509

CRC

Reprint 0

Copyrights

340 341

Sandip Ramteke Yeshwanth Deodhe

Electronic Data Systems Computer Applications Digital Computing System Human Computer Interaction Information Communication Information Communication Information Communication Cloud Computing Signal Processing Systems

656 768

0 0

342 344 345

Rajesh Deshmukh Arijit De Shrikant Kokate

769 519 409

0 0 0

345

Shitalkumar Jain

594

346

Deepak Manglani

411

351 356

S V Narwane Sabna A B

483 433

0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 18 of 36

ICCA ID 358

Paper Title Dimensionality Reduction Techniques for Face Image Retrieval: A Review Closeness: A New Privacy Measure for Data Publishing Use of Multiple Concentric Layer Criteria in Detection of Masses from Mammograms: A Review Mobile Charger without Using External Power Supply Taxonomies, Challenges And Approaches To Automatic Web Query Classification E-Learning Model for Quality of Education Enhancement in Universities E-Learning Model for Quality of Education Enhancement in Universities Bayesian MAP Model for Edge Preserving Image Restoration: A Survey Predicting Data from Unauthorized User to a Authorized User Using Fake Objects

Author Name Fousiya K K

Track Signal Processing Systems Will be classified! Automated Systems

eReg ID 469

CRC

Reprint 0

Copyrights

360 365

Harishbabu Kalidasu Sasinas Alias Haritha Z A

414 517 0

366 368

Dinesh Auti Mohammad Shahid

Will be classified! Knowledge Engineering Computer Applications Computer Applications Knowledge Engineering Information Security Systems

715 460 0

369

Kumar Krishnan

585

369

Naseem Akthar

747

370

Greeshma T.R

432

375

Deepika Manoharan

452

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 19 of 36

ICCA ID 380

Paper Title E-commerce Security: The Need, Use and Efficiency of Encryption Methods for Secure E-commerce websites Human Age Classification using 2-D Gabor Wavelet and Neural Network Design and Implementation of Low Power and Area Efficient adder and Vedic Multiplier for FFT Performance Enchancement of DWT Processing using GPGPU Performance Enchancement of DWT Processing using GPGPU Performance Enchancement of DWT Processing using GPGPU Early detection of Cancer using Bioinformatics Virtual Integrated Test Team for Telecommunication Ventures Virtual Integrated Test Team for Telecommunication Ventures Mobile Learning for Senior Citizens Mobile Learning for Senior Citizens

Author Name Kishore Bhamidipati

Track Information Security Systems

eReg ID 532

CRC

Reprint 0

Copyrights

381

Jayant Jagtap

Signal Processing Systems Embedded Control Systems

445

382

D Jaganathan

443

385 385 385 386 390 390 391 391

Phani Tejaswi K Thara Nair A V V Prasad Chandrasekhar Uddagiri Sumithra Devi K A Manju Geogy P F Xavier Patrick Kishore P Sagaya Aurelia

High Performance Computation High Performance Computation High Performance Computation Bio-Genetic Computing Software Engineering Systems Software Engineering Systems Electronic Data Systems Electronic Data Systems

444 681 682 674 665 451 465 449

0 0 0 0 0 0 0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 20 of 36

ICCA ID 391 393

Paper Title Mobile Learning for Senior Citizens Effect of Topology on Routing Performance in partially Mobile Ad-hoc Networks Effect of Topology on Routing Performance in partially Mobile Ad-hoc Networks Opinion Mining For Decision Making In Medical Decision Support System - A Survey Grid Resource Management Based On Agent Grouping Low Power Compressed CGRA Architecture Based Processor Design A Novel Approach Towards Legal Information Retrieval Establishing the Relationship between Customer Relationship Management and E- Business A Study on SC-FDMA Advance Access Scheme for 4G Optimized Implementation of Reduced Size LUT in Built in SelfTesting

Author Name Khamis Faraj Alarabi Ningrinla Marchang

Track Electronic Data Systems Information Communication Information Communication Knowledge Engineering Embedded Control Systems Signal Processing Systems Will be classified! Management

eReg ID 466 936

CRC

Reprint 0 0

Copyrights

393

Nibedita Shial

937

394

A. Ananda Shankar

587

397 399

Arun Prakash Kishore S

576 709

0 0

400 402

Deshnidhi Yadav Manu Chopra

473 471 0

403 406

Chandra Shekhar A Ajith Kumar

Information Communication Embedded Control Systems

472 726

0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 21 of 36

ICCA ID 407

Paper Title Segmentation of Pulmonary Nodule in Computed Tomography Scan for Lung Disorder Prediction Segmentation of Pulmonary Nodule in Computed Tomography Scan for Lung Disorder Prediction Towards Agile Project Management Towards Agile Project Management The recent Advances and future Trends In Wireless Biotelemetry System Design Issues of Bus Arbitration Schemes in Shared Bus Multiprocessor(MPSoC) An Context Aware Document Clustering Using Data Fusion An Efficient Method for Video Shot Segmentation and Classification Resource allocation in P2P system using Bit Torrent Transportation Vehicle Information System Using Wireless Technology

Author Name Mahesh Pawar

Track Computer Applications

eReg ID 651

CRC

Reprint 0

Copyrights

407

Vilas Alagdeve

Computer Applications

649

408 408 410

Nitin Uikey Ugrasen Suman Madhupriya Senapati

Software Engineering Systems Software Engineering Systems Electronic Data Systems Electronic Data Systems Electronic Data Systems Computer Applications High Performance Computing Will be classified!

482 724 679

0 0 0

411

Neeta Doifode

657

413 416

Venkatesh Kumar V Vijayakumar

663 468

0 0

417 418

Thamaraiselvi Krishnamoorthy Sushma Lute

294 671

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 22 of 36

ICCA ID 419

Paper Title Mathematical Heuristics for Feed Forward Artificial Neural Network Design Mathematical Heuristics for Feed Forward Artificial Neural Network Design A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory A Modified Cluster Based CoOperative Spectrum Sensing Algorithm Using Dempster Shafer Theory Image Resolution Enhancement Based On Edge Directional Interpolation in Duel TreeComplex Wavelet Transform Can Human Computer Interaction (HCI) bridge the Digital Divide? A Case of Akash in India

Author Name Aakash Goel

Track Signal Processing Systems Signal Processing Systems Information Communication

eReg ID 456

CRC

Reprint 0

Copyrights

419

Vandit Bhatia

578

423

Aliasger Gabuji

564

423

G. Pawan Kumar

Information Communication

641

423

Anju Kulkarni

Information Communication

639

423

Nikhil Agarwal

Information Communication

504

425

Suresh L, D Loganathan

Signal Processing Systems

499

430

Shilpa Tripathi

Human Computer Interaction

748

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 23 of 36

ICCA ID 431 431 431 432 432 433 433 433 434

Paper Title Security Enhanced Instant Messaging Security Enhanced Instant Messaging Security Enhanced Instant Messaging Protocol Design For Advanced Security In Wireless Networks Protocol Design For Advanced Security In Wireless Networks One Time Password: A Secure Authentication Scheme One Time Password: A Secure Authentication Scheme One Time Password: A Secure Authentication Scheme Optimized Design variants of a self-powering CMOS Optoelectronic VLSI Circuit Optimized Design variants of a self-powering CMOS Optoelectronic VLSI Circuit Iris Recognition using DWT with Optimized Decomposition Levels A Review of Wireless Security Protocols: WEP, WPA and WPA2

Author Name Mukul Manmohan Meghwal Raghuveer Singh Dhaka Arvind Dhaka Raghuveer Singh Dhaka Arvind Dhaka Raghuveer Singh Dhaka Arvind Dhaka Mukul Manmohan Meghwal Swaminathan S

Track Information Security Systems Information Security Systems Information Security Systems Information Communication Information Communication Information Security Systems Information Security Systems Information Security Systems Embedded Control Systems Embedded Control Systems Bio-genetic Computing Systems Information Security Systems

eReg ID 786 783 550 551 781 784 780 552 735

CRC

Reprint 0 0 0 1 1 1 1 1 0

Copyrights

434

Swarrnna Karthik Parthasarathy Sambita Dalal

737

436

516

437

Raghuveer Singh Dhaka

553

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 24 of 36

ICCA ID 437

Paper Title A Review of Wireless Security Protocols: WEP, WPA and WPA2 A Review of Wireless Security Protocols: WEP, WPA and WPA2 Application Of Graph Theory In Computer Science(Implementing Greedy Algorithm For map Coloring in GSM mobile Network Fabric Defect Detection Using Statistical Texture Analysis A Novel Ranking Algorithms for Ordering Web Search Results UML Designing and Comparative Performance of Various Computer Networks Performance & Evaluation of DSS Using OLAP Techniques In The Data Warehouse A Nascent Approach for Symmetric Key Encryption Using Double DES Survey Of Digital Image Steganography In DWT Domain Survey Of Digital Image Steganography In DWT Domain

Author Name Mukul Manmohan Meghwal

Track Information Security Systems Information Security Systems Signal Processing Systems

eReg ID 785

CRC

Reprint 0

Copyrights

437

Arvind Dhaka

782

438

Mahadevi Namose

522

439 444 445

S Padmavathi Gaurav Agarwal Neeraj Verma

Computer Applications Knowledge Engineering Software Engineering Systems Knowledge Engineering Digital Computing Systems Computer Applications Computer Applications

487 493 490

0 0 0

447

Renu Yadav

491

448

Praful Saxena

496

449 449

Ilavendhan Anandaraj D Loganathan

567 --

0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 25 of 36

ICCA ID 451

Paper Title A Comparison of Fuzzy Clustering Techniques for Image Segmentation Target Geo-Localization System by Geo-Referencing Mini Aerial Vehicle Video Mosaics Analysis of 4x4 crossbar switch for Network Processor Key Frame Extraction Based On Block Based Histogram Difference and Edge Matching Rate Key Frame Extraction Based On Block Based Histogram Difference and Edge Matching Rate Autonomous Navigation of Unmanned Aerial Vehicle Using Image Flow Algorithm Development and Evaluation of a Document Clustering Engine Analysis of Bent Ground plane on MIMO Antenna Comparative Study Of Algorithms For Extraction Of Blood Vessels From Retinal color Images Survey of Security Issues in Mobile Ad-hoc Network

Author Name Prasad Sangare

Track Will be classified!

eReg ID 658

CRC

Reprint

Copyrights

453

Mahadeeswara Yadav

Automated Systems

745

454 456

Prashant Wanjari Vigneswaran Selvaraj

Will be classified! Computer Applications

659 488 1

456

Bremananth Ramachandran

Computer Applications

845

457

Annaiyan Arun

Automated Systems

746

461 468 470

Monali Kulkarni Bhushan Kalamkar Sapana Dhanvijay

Knowledge Engineering Will be classified! Will be classified!

492 620 732

473

Praful Pardhi

Will be classified!

513

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 26 of 36

ICCA ID 475

Paper Title An Approach For Disease Treatment In Medline Using Semantic Relations FOSS - A facilitator in teaching FOSS - A facilitator in teaching Design of Fuzzy Logic Scheme for Speed control of Induction Motor A Distributed Process System Architecture for Biological Data Analysis SSO Use Case in Cloud Computing for Securacy to Worldwide Users SSO Use Case in Cloud Computing for Securacy to Worldwide Users PAPR Reduction Technique in MIMO-OFDM Based Wireless Communication PAPR Reduction Technique in MIMO-OFDM Based Wireless Communication PAPR Reduction Technique in MIMO-OFDM Based Wireless Communication

Author Name Menaka Ponmalai

Track Signal Processing Systems Open Source Systems Open Source Systems Automated Systems

eReg ID 959

CRC

Reprint 0

Copyrights

478 478 479

Harshad Gune Akshay Rashinkar Gannavarapu Akhilesh

738 840 479

0 0 0

480

Kyoung-Soon Hwang, ChanHee Lee, Keon- Myung Lee Karunanithi D

Computer Applications Cloud Computing

621

481

628

481

Kiruthika Balu

Cloud Computing

630

482

Debasis Surya Narayan Das

Signal Processing Systems Signal Processing Systems Signal Processing Systems

481

482

Arun Kumar Ray

794

482

Mihir Narayan Mohanty

806

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 27 of 36

ICCA ID 483

Paper Title Hierarchical Energy Efficient Protocol for LLC in Wireless Sensor Networks Hierarchical Energy Efficient Protocol for LLC in Wireless Sensor Networks Survey of Reactive Routing Protocols in Mobile Adhoc Networks Real time wind speed analysis and prediction of wind power generation using Artificial Neural Network (ANN) Real time wind speed analysis and prediction of wind power generation using Artificial Neural Network (ANN) Certain Optimization Methods for Design Space Compression of Arithmetic Circuits Certain Optimization Methods for Design Space Compression of Arithmetic Circuits Spontaneous Sorting Clock for Providing Judgments to Civil Cases Strong Secure Communication Technique: Steganography With Hybrid Cryptography

Author Name Gandhimathi K

Track Software Engineering Systems Software Engineering Systems Information Communication Automated Systems

eReg ID 755

CRC

Reprint 1

Copyrights

483

Vinothini Murugan

648

485

Jayalakshmi V

645

486

R Ponnusamy

--

486

P Sardar Maran

Automated Systems

503

487

Georgina Binoy Joseph

Computer Applications Computer Applications Will be classified!

863

487

Ranganathan Vijayaraghavan

581

490

Annapoorani Venkatesan

514

491

Smita Bansod

Information Security Systems

442

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 28 of 36

ICCA ID 493

Paper Title Discrimination between Airway Diseases with Similar Symptoms the Lung Diseases Node Classification for Energy Efficient and Reliable Hierarchical WSN Protocol Node Classification for Energy Efficient and Reliable Hierarchical WSN Protocol A Comprehensive Approach Of Access Control For E-Commerce Using Mobile Agents A Data Mining Approach for Mobility Prediction Using Wireless Traces A Data Mining Approach for Mobility Prediction Using Wireless Traces A Data Mining Approach for Mobility Prediction Using Wireless Traces Search Based Optimization for Test Data Generation Using Genetic Approaches Search Based Optimization for Test Data Generation Using Genetic Approaches

Author Name Sheetal Ukunde

Track Will be classified!

eReg ID 664

CRC

Reprint

Copyrights

494

Sang-ho Lee

Information Communication Information Communication Will be classified!

700

494

Ning Sun

588

496

Vishwanath Panchagnula

788

497

Ananthi J

Information Communication Information Communication Information Communication Software Engineering Systems Software Engineering Systems

601

497

Ranganathan Vijayaraghavan

862

497

Menaka R

861

500

Kuppuraj Swaminathan

754

500

Priya Sudharsan

614

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 29 of 36

ICCA ID 502

Paper Title StegGen:An Optimized Steganographic Tool Based on GA Success and Failure Factors of eGovernment project implementation in Yemen: An explore Study Software designing for shrinkage testing station DIL 402C Efficient Data Storage and Security Using Data Grid Knowledge Management Strategies for Implementation of Green Technologies A Design Model of Banking Website in Perspective of Behavioral Feasibility Study A Design Model of Banking Website in Perspective of Behavioral Feasibility Study Component Weight Assignment Algorithm With SVM : Mining Reviews For Social And Economic Support Component Weight Assignment Algorithm with SVM: Mining Reviews for Social and Economic Support

Author Name Murugeswari K

Track Digital Computing System Management

eReg ID 734

CRC

Reprint 0

Copyrights

504

Mahdi Abdullah M. Alsebaei

762

506

Piotr Kumiski, Marek Hebda G Manimala Sonali Shirpurkar Badkas

Software Engineering Systems Information Security Systems Knowledge Engineering Management

Manual

512 520

637 642

1 0

522

Saravanan C

640

522

Vinay R

Management

689

525

T Kohilakanagalakshmi

Knowledge Engineering

570

525

Tina Esther Trueman

Knowledge Engineering

634

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 30 of 36

ICCA ID 527

Paper Title Band Limited Linear Predictive Coding Vocoder in Digital Hearing Aids Thresholding Techniques for Skull Stripping the MRI Brain Images Thresholding Techniques for Skull Stripping the MRI Brain Images A Correlative Analysis of Methodologies Involved In Ontology Construction for ELearning A Correlative Analysis of Methodologies Involved In Ontology Construction for ELearning Auscultation and Separation of Heart Sound from Respiratory Sound Using Lab-View Auscultation and Separation of Heart Sound from Respiratory Sound Using Lab-View Comparative Study between Traditional and Heuristic Approach on Close-degree Concept Lattice for better Attribute Reduction

Author Name Sharmina Bharwani

Track Will be classified!

eReg ID 744

CRC

Reprint

Copyrights

528

Mahesh Pawar

Signal Processing Systems Signal Processing Systems Knowledge Engineering

721

528

Vijendra Meshram

720

530

Suresh R M

666

530

Rebecca Amulya D

Knowledge Engineering

779

535

Yogesh Gaidhane

Computer Applications Computer Applications Will be classified!

546

535

Zahir Quazi

931

539

Ravindra Gupta

714

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 31 of 36

ICCA ID 543

Paper Title A Newfangled Approach to Semantic Search for E-Tourism Domain Application of UML Design Documents with Design Metrics and OCL Specification for Critical Component Identification Ranking of Documents in Semantic Web using Particle Optimization Ranking of Documents in Semantic Web using Particle Optimization Ranking of Documents in Semantic Web using Particle Optimization Analysis of Computational Errors in Digital Signal Processing with Voltage Scaling A Combinatorial Approach for Design of Fuzzy Based Intrusion Detection System A Combinatorial Approach for Design of Fuzzy Based Intrusion Detection System Implementation of Differentiator Using PFG

Author Name Palaniammal K

Track Will be classified!

eReg ID 688

CRC

Reprint

Copyrights

545

A. Jalila

Will be classified!

695

546

Sanjeeve Kumar

Knowledge Engineering Knowledge Engineering Knowledge Engineering Signal Processing Systems Computational Intelligence Computational Intelligence Signal Processing Systems

892

546

Selvarani CM

992

546

Francis Densil Raj

733

549

Vishwas Balpande

704

550

Bhuvaneswaran R S

751

550

Vydeki Dharmar

702

553

Sonalee Suryawanshi

731

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 32 of 36

ICCA ID 554 555

Paper Title SMPS With Linear PWM Technique Performance Analysis of Routing Protocols in Mobile Adhoc Netoworks Implementation of DS-SS Based CDMA Transmitter and Receiver Using Gold Code for FPGA An Improved Approach to FCOCOMO using PI Membership Function APC-OMS Combined LUT for Memory Based Computation Gas Identification Using Artificial Intelligence Tecnique Extended Diffie-Hellman Algorithm for Key Exchange and Management Literature Survey and Proposed Concept on Performance Issue of Multicasting Routing Protocol in Wireless Sensor Network Literature Survey and Proposed Concept on Performance Issue of Multicasting Routing Protocol in Wireless Sensor Network

Author Name Ishan Chintawar Th. Ibungomacha singh

Track Electronic Data System Information Communication Electronic Data Systems Software Engineering Systems Electronic Data Systems Will be classified! Will be classified!

eReg ID 706 727

CRC

Reprint 0 0

Copyrights

556

Kshama Dawile

743

557

Anupama Kaushik

774

559 562 564

Eldho John Poonam Agarkar Akhil Kaushik

583 741 712

566

Rahul Verma

Information Communication

699

566

Akhilesh Waoo

Information Communication

835

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 33 of 36

ICCA ID 566

Paper Title Literature Survey and Proposed Concept on Performance Issue of Multicasting Routing Protocol in Wireless Sensor Network Literature Survey on LEACH Protocol in Wireless Sensor Network Performance Analysis of Simple Adaptive Median Filter In Reducing Impulse Noise Level from Digital Images Literature Survey and Proposed model to Enhance Security of Database A Metrics Driven Approach to Specify Usable Security in Web Service Discovery A New Early Parsing Algorithm for Lexicalized Tree Adjoining Grammar Designing A High-Performance Scalable Framework Over Cloud For Managing Online Programming Contests Power Reduction Technique in Testing Of VLSI Circuits Self Test Technique for Two Fish Algorithm

Author Name Pushpinder Singh Patheja

Track Information Communication

eReg ID 836

CRC

Reprint 0

Copyrights

567

Aishwary Agrawal

Digital Computing Systems Will be classified!

698

568

Vicky Ambule

740

569

Naveen Kolhe

Knowledge Engineering Will be classified!

684

571

Marimuthu Govindaraj

728

574

Sharafudheen Kambunkal

Human Computer Interaction Will be classified!

818

576

Amol khanapurkar, Mohit Nanda, Ravi Ojha

Manual

577 578

Arun Mohan Rahul R Nair

Electronic Data Systems Computer Applications

687 670

0 0

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 34 of 36

ICCA ID 580

Paper Title An Intelligent Image Retrieval based on Wavelet Transform and Similarity Method An Intelligent Image Retrieval based on Wavelet Transform and Similarity method WEB 2.0 Issues and Challenges in a Cloud Computing Environment Intrusion Detection System using Outlier Detection and Classification Techniques Intrusion Detection System using Outlier Detection and Classification Techniques Extraction of Signal features from Deaf-mute Voice Signal Securing IPv6 Signaling for SCADA Wireless Sensor Network Smart Grid in Cloud Computing Infrastructure: Review The Cohesive Countermeasure Schemes for Securing Wireless Sensor Networks against Vulnerabilities and Attacks: Review

Author Name K Seetharaman

Track Signal Processing Systems Signal Processing Systems Will be classified! Cloud Computing Will be classified!

eReg ID 843

CRC

Reprint 1

Copyrights

580

M Kamarasan

719

586 587 592

Shweta Gode A. Murali M Rao Jaishankar N

766 753 834 0

592

Sumesh Manikandan

Will be classified!

764

593 601

Nirmala Devi J, K Bomannaraja Hoon Ko, Yvette Gelogo, TaiHoon Kim Byeong-Ho Kang,Yvette Gelogo Ronnie D. Caytiles, Tai-hoon Kim, Dominik Slezak

Signal Processing Systems Information Security Systems Cloud Computing Information Communication

949 Manual

0 1

602 603

Manual Manual

1 1

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 35 of 36

ICCA ID 608

Paper Title A Robust Design of RTU Sensor Nodes Communication for SCADA System Secured SCADA System in Smart Grid Deployment Advanced Congestion Adaptive Routing Mechanisms in MANET New Improved Methodology in Advanced Driver Assistance System Tele-Operative Ophthalmoscope Green ICT and its Global Impact Achieving Competetive Advantage Using Automated Securities Validation Analysis of Foreign Direct Investment in Service Sector: A Study With Reference To India

Author Name

Track

eReg ID Manual

CRC

Reprint 1

Copyrights

Sabah Mohammed, Ronnie Information D. Caytiles and Tai-hoon Kim Communication Yvette Gelogo, Tai-Hoon Kim Information Communication Geetam Tomar Sanket Borhade Will be classified! Will be classified!

609 610 611

Manual 872 935

618 622 624

Bharath Kumar Vinita Maheshwari Raghu Nemani

Will be classified! Will be classified! Will be classified!

1089 1085 1071

631

K Maran

Management

1123

1. Please check your name and Paper Title. No modifications or corrections will be accepted after December 10 2. Only the registered authors name will be available in certificate and proceedings.

Page 36 of 36

Você também pode gostar