FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
Seesion Details Summary
Track | Session | Venue | Topic | Time |
1 | 1 | Training Hall 1 | Data Mining & Warehousing | 11.30 AM - 01.30 PM |
2 | 2 | Training Hall 2 | Wireless Communications | 11.30 AM - 01.30 PM |
3 | 3 | MCA LAB - 1 | Network Security | 11.30 AM - 01.30 PM |
4 | 4 | MCA Conference HALL | Computer Networks | 11.30 AM - 01.30 PM |
5 | 5 | MCA Lab - 2 | Artificial Intelligence | 11.30 AM - 01.30 PM |
1 | 6 | Training Hall 1 | Image Processing | 02.30 PM - 04.30 PM |
2 | 7 | Training Hall 2 | Wireless Communications | 02.30 PM - 04.30 PM |
3 | 8 | MCA LAB - 1 | Network Security | 02.30 PM - 04.30 PM |
4 | 9 | MCA Conference HALL | Computer Networks | 02.30 PM - 04.30 PM |
5 | 10 | MCA Lab - 2 | Artificial Intelligence | 02.30 PM - 04.30 PM |
Detailed Session wise - Paper ID details
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: Training Hall 1 DATE:10TH FEB 2012 TIME: 11.30am - 01.30pm
DATA MINING AND
WAREHOUSING
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA053 |
A NEW DATA MINING BASED NETWORK INTRUSION DETECTION MODEL |
C.HEMALATHA |
2 |
EICA158 |
CREDIT CARD FRAUD DETECTION USING ROUGH SETS AND ARTIFICIAL
NEURAL NETWORK |
1NIKITA GUPTA |
3 |
EICA175 |
INDEXING AND RANKING IN SPATIAL DATABASE |
S.KRISHNAVENI
|
4 |
EICA267 |
DESIGN OF DATALOGGER FOR DIVERSE ENVIRONMENTAL MONITORING |
V.MADA SAMY |
5 |
EICA253 |
PROTECTING DATABASE FROM MALICIOUS MODIFICATIONS USING JTAM |
P.ASHOKKUMAR |
6 |
EICA254 |
A COLUMN-DECOUPLED 9T CELL FOR LOW POWER DIFFERENTIAL AND
DOMINO-BASED SRAM DESIGN |
ALAAUDEEN K M |
7 |
EICA279 |
DATA MINING AND WAREHOUSING |
SANGEETHA.K.V |
8 |
EICA188 |
DATA DYNAMICS FOR STORAGE SECURITY AND PUBLIC AUDITABILITY IN
CLOUD COMPUTING |
KAYALVIZHI.S |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: Training Hall 1 DATE:10TH FEB 2012 TIME: 02.30pm - 04.30pm
IMAGE PROCESSING
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA113 |
EFFECTIVE NOISE REDUCTION TECHNIQUES FOR DESPECKLING ULTRASOUND
MEDICAL IMAGES |
S.SUGANYA DEVI
|
2 |
EICA118 |
NAVIGATION PATTERN BASED RELEVANCE FEEDBACK FOR CONTENT BASED
IMAGE RETRIEVAL |
AHATHIYA. P |
3 |
EICA150 |
BTC WITH K MEANS CLASSIFIER USING COLOR IMAGE CLUSTERING |
S.SAMATHAL |
4 |
EICA218 |
HAND WRITTEN SIGNATURE EMBEDDING IN PHOTOGRAPHS– AN
AUTHENTICATION MECHANISM FOR INTERNET BASED TRANSACTIONS |
RAJKUMAR.S |
5 |
EICA221 |
HYBRID WATERMARKING SCHEME FOR DIGITAL IMAGES |
PARTHIBAN.V |
6 |
EICA202 |
SPARSE REPRESENTATION FOR IMAGE SIMILARITY ASSESSMENT USING SIFT
ALGORITHM |
PRIYADHARSHNI.C |
7 |
EICA233 |
REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGE |
S.M.MAHALAKSHMIPREETHI |
8 |
EICA280 |
SKELETAL GRAPH BASED TOPOLOGICAL FEATURE EXTRACTION OF AN OBJECT
|
Dr. KANIMOZHI J.K |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: Training Hall 2 DATE: 10TH FEB 2012 TIME: 11.30am - 01.30pm
WIRELESS COMMUNICATIONS
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA009 |
DELEGATION-BASED IN ON-LINE AND OFF-LINE AUTHENTICATION OVER
WIRELESS COMMUNICATION |
D.SARAVANAN |
2 |
EICA029 |
AN OVERVIEW ON NETWORK SECURITY AND EFFICIENT MONITORING SCHEMES
FOR WIRELESS SENSOR NETWORKS |
AISWARYA.S |
3 |
EICA043 |
WIRELESS SENSOR NETWORK LIFETIME PROLONGING SELF ORGANISABLE
CLUSTER BASED ENERGY EFFICIENT AND AGGREGATION PROTOCOL |
I.DHURGABAI, |
4 |
EICA087 |
MODELING ADVANCED BOTNET AND |
ANITHA LAKSHMI V. |
5 |
EICA093 |
A COMPARATIVE ANALYSIS OF GENERAL DEFECT PRONENESS IN THE
COMPETING SOFTWARE SYSTEMS |
AISHWARYA DEVI.R |
6 |
EICA117 |
LEAST BANDWIDTH ALLOCATION FOR PERIODIC STREAMS WIRELESS NETWORK
SYSTEM |
ELUMALAI.S.V |
7 |
EICA161 |
FAST AND EFFICIENT DISTRIBUTED DETECTION OF MOBILE NODE REPLICA
ATTACKS IN WIRELESS SENSOR NETWORK |
S.LAKABHASANEE |
8 |
EICA176 |
DESIGN OF ERROR CORRECTION AND ALLUSION IN TURBO DECODER FOR WIRELESS
APPLICATION |
SHIVASHANKARI |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: Training Hall 2 DATE:10TH FEB 2012 TIME: 02.30pm - 04.30pm
WIRELESS COMMUNICATIONS
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA183 |
AUTONOMOUSLY RECONFIGURING FAILURES IN WIRELESS MESH NETWORKS |
A.JENSILIN MARY, |
2 |
EICA191 |
SECURE ENCRYPTED - DATA ROUTING PROTOCOL FOR WIRELESS SENSOR
NETWORKS |
S.LAKSHMI |
3 |
EICA212 |
SECURE DATA DELIVERY IN WIRELESS SENSOR NETWORK USING COLLABORATIVE RANDOMIZED DISPERSIVE
ROUTES |
K.SABARINATHAN |
4 |
EICA223 |
GREEN NETWORKING |
K.SUDHA |
5 |
EICA234 |
IMPLEMENTING A COOPERATIVE MAC
PROTOCOL FOR WIRELESS LANS |
M.MAHALAKSHMI |
6 |
EICA247 |
ENERGY BASED MULTIPATH ROUTING PROTOCOLS FOR WIRELESS SENSOR
NETWORKS |
E.RAM KUMAR |
7 |
EICA268 |
EXPLOITING RESOURCE OVERLOADING USING UTILITY ACCRUAL APPROACH
FOR PARALLEL DATA PROCESSING IN CLOUD |
MRS.R.SIVA MALAR |
8 |
EICA275 |
DEPLOYMENT OF MULTICLOUD FOR SOLVING LOOSELY COUPLED
APPLICATIONS USING COST OPTIMIZING TECHNIQUE |
M.SINDHU |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: MCA Lab - 1 DATE:10TH FEB
2012
TIME: 11.30am - 01.30pm
NETWORK SECURITY
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA021 |
A LEVY ALPHA STABLE MODEL
FOR ANOMALY DETECTION IN NETWORK TRAFFIC |
A.DIANA |
2 |
EICA107 |
DETECTION AND PREVENTION OF CODE INJECTION ATTACKS USING
MONITORING MECHANISM |
RAICHAL.S |
3 |
EICA265 |
A NEW SECURE MULTICAST GROUP KEY MANAGEMENT USING GRAY CODE |
K.SEETHALAKSHMI |
4 |
EICA243 |
AN EFFICIENT LEADER ELECTION MECHANISM FOR INTRUSION DETECTION
IN MANET |
SHANMUGA VADIVU.G |
5 |
EICA251 |
EFFICIENT REMOVAL OF IMPULSE
NOISE USING VARIABLE THRESHOLD
VALUE |
S.SIVASAKTHI |
6 |
EICA210 |
SECURE CLUSTER HEAD ELECTION FOR INTRUSION |
V.SIVARANJANI |
7 |
EICA214 |
BLOCKING HACKING USERS IN
ANONYMIZING NETWORK USING BLACKLISTING |
A.JENIFER |
8 |
EICA194 |
REDUCE DELAYS IN END TO END DVB-RCS SATELLITE NETWORKS |
HADI MOHAMMADI |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: MCA Lab - 1 DATE: 10TH FEB
2012
TIME: 02.30pm - 04.30pm
NETWORK SECURITY
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA200 |
A SURVEYING ON ROAD SAFETY USING VEHICULAR COMMUNICATION
NETWORKS |
R. MANEENDHAR |
2 |
EICA207 |
IMPROVED ENERGY EFFICIENT ADCC FOR HOME AUTOMATION NETWORKS IN
HIGH VOLUME SENSED DATA |
J.YASODHA |
3 |
EICA155 |
FPGA IMPLEMENTATION OF HIGH PERFORMANCE FACE |
RAMYA .N, |
4 |
EICA272 |
ENSURING DATA INTEGERITY IN CLOUD COMPUTING |
POORNIMA.G |
5 |
EICA273 |
IMPROVING THE PERFORMANCE OF MANY-TASKS SCIENTIFIC COMPUTING BY
USING DATA AWARE SCHEDULING |
JOTHI P. |
6 |
EICA274 |
JOB SCHEDULING USING NEURAL NETWORK IN CLOUD COMPUTING |
K.DINESH |
7 |
EICA277 |
ORGANIZATIONAL SECURITY THROUGH CLOUD PRIVACY |
RANJANI BALU |
8 |
EICA278 |
TWO FACTOR AUTHENTICATION ON CLOUD |
J.GULZAR BEGAM |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: MCA
Conference Hall DATE: 10TH FEB
2012
TIME: 11.30am - 01.30pm
COMPUTER NETWORKS
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA001 |
AN APPROACH TO THREAT MODELING IN WEB APPLICATION SECURITY
ANALYSIS |
SREENIVASA RAO B |
2 |
EICA012 |
IMPROVING QUALITY IN VOICE OVER INTERNET PROTOCOL (VOIP) ON
MOBILE DEVICES IN PERVASIVE ENVIRONMENT |
MR. S.THIRUPPATHI |
3 |
EICA014 |
PREEMPTIVE ROUTING ALGORITHM TO REDUCE LINK BREAKAGE AND ROUTING
OVERHEAD FOR AD-HOC NETWORKS USING PRM |
K.ANJANEYULU |
4 |
EICA022 |
NEURAL NETWORKS & FUZZY LOGIC |
ELAKKIYA PRABHA.T |
5 |
EICA031 |
A HIGH CAPACITY VIDEO STEGANOGRAPHY BASED ON INTEGER WAVELET
TRANSFORM |
K. LAKSHMI NARAYANAN 1 |
6 |
EICA038 |
MULTIPLE TASK MIGRATION IN MESH NOCS OVER VIRTUAL POINT-TO-POINT CONNECTIONS |
LAKSHMI PRASAD.E , |
7 |
EICA076 |
AN EFFICIENT SCHEME FOR ADAPTIVE MOBILE GATEWAY MANAGEMENT IN
INTEGRATED VANET-UMTS NETWORK |
T.INDHUJA1 |
8 |
EICA078 |
EFFICIENT ARM FOR DIFFERENT NETWORK DATA COLLECTION |
K.GANESHKUMAR |
9 |
EICA199 |
A SECURE MIGRATION PROCESS FOR MOBILE AGENTS FORM ONE HOST TO
ANOTHER HOST |
PREETI SHARMA |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: MCA
Conference Hall DATE: 10TH FEB
2012
TIME: 02.30pm - 04.30pm
COMPUTER NETWORKS
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA092 |
IMPROVING CA-AOMDV PROTOCOL AGAINST BLACKHOLE ATTACKS |
SHERRIL SOPHIE MARIA VINCENT |
2 |
EICA108 |
DEFENDING AGAINST SYBIL ATTACKS IN |
CHANDHANA.S.D |
3 |
EICA132 |
QUALITY OF SERVICE IN MOBILE DISTRIBUTED SYSTEM BASED ON
OPPORTUNISTIC NETWORKS |
V.C.SINDHUJA |
4 |
EICA136 |
ITERATIVE RECONSTRUCTION OF AN ENCRYPTED IMAGE |
R.SANTHANA BHARATHI |
5 |
EICA152 |
SWITCHING ACTIVITY REDUCTION USING SCAN SHIFT |
K.S.RAMESH |
6 |
EICA159 |
STRAB: SENSING AND TRACING BACK ATTACKERS AGAINST ENCRYPTED
PROTOCOLS |
S.THANGARANI |
7 |
EICA179 |
A REVIEW ON INTELLIGENT DEPLOYMENT OF NODES FOR IMPROVING THE
PERFORMANCE OF OVERLAY NETWORKS |
S.MUTHUSELVI1 |
8 |
EICA255 |
VLSI DESIGN OF SECURED CRYPTOSYSTEM |
G. GEETHA |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: MCA Lab - 2 DATE: 10TH FEB
2012
TIME: 11.30am - 01.30pm
ARTIFICIAL INTELLIGENCE
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA018 |
ROUTE DIVERSITY BASED OPTIMAL PATH SELECTION USING RANDOM KEY
GENERATION |
N. MAGESWARI |
2 |
EICA110 |
COMBINATIONAL CIRCUIT DESIGN USING GENETIC ALGORITHMS |
K.NITHYANANTHAN |
3 |
EICA139 |
PROTECTING OF FISHERMEN ON INDIAN MARITIME BOUNDARIES |
R.KARTHIKEYAN1 |
4 |
EICA146 |
TOP-K SPATIAL PREFERENCE QUERY ON |
AKILA.G |
5 |
EICA160 |
AUTOMATISED TOLL GATE SYSTEM USING PASSIVE RFID AND GSM
TECHNOLOGY |
MS.JANANI.S.P |
6 |
EICA162 |
DESIGN OF SENSOR MODULE FOR BETTER ENERGY SAVING |
A.KARTHIKEYANI |
7 |
EICA189 |
RELIABLE DETERMINATION OF ZOMBIES BASED ON ENTROPY
VARIATION |
G. ANITHA |
8 |
EICA192 |
A SURVEY OF ARTOOLKIT BASED AUGMENTED REALITY |
M.ASHOK KUMAR |
FOURTH NATIONAL CONFERENCE ON EMERGING ISSUES IN COMPUTER APPLICATIONS
FOR COMPUTATIONAL SCIENCE AND TECHNOLOGIES
NCEICA 2012
Department of Computer Applications
K.S.R College of Engineering, Tiruchengode-637215
VENUE: MCA Lab - 2 DATE: 10TH FEB
2012
TIME: 02.30pm - 04.30pm
ARTIFICIAL INTELLIGENCE
S.NO |
PAPER CODE |
TITLE OF THE PAPER |
AUTHOR |
1 |
EICA216 |
MOBILE BASED BUSINESS RULE ENGINE |
GEETANJALI KATARE |
2 |
EICA222 |
RETINAL BLOOD VESSEL SEGMENTATION USING GRAY-LEVEL AND MOMENT
INVARIANTS-BASED FEATURES |
R. JEGATHA |
3 |
EICA224 |
EFFICIENT BACKGROUND SUBTRACTION USING FUZZY C MEANS |
POORNIMA.S |
4 |
EICA252 |
A SURVEY ON SEQUENTIAL ELEMENTS FOR LOW POWER CLOCKING SYSTEM |
S.BHUVANA |
5 |
EICA264 |
DEVELOPMENT OF FUZZY BASED DETECTION OF LINK FAILURE IN OVERLAY
NETWORK |
S.NANDHINI |
6 |
EICA270 |
PERFORMANCE ANALYSIS OF AN ADAPTIVE MECHANISM FOR ACCESS CONTROL
IN VEHICULAR AD HOC NETWORKS |
A.MANIKANDAN |
7 |
EICA276 |
ADAPTIVE SAMPLING APPROACH FOR ENERGY CONSERVATION IN WSN USING
EMBEDDED SYSTEM |
MATHANGI.R |
8 |
EICA281 |
RECOGNIZING FACE USING GABOR FILTER WITH PERCEPTUAL FEATURES |
S.R.PRASANA |