Fourth National Conference on Emerging Issues in Computer Applications for Computational Science and Technologies

List of Selected Papers - SET I (* For remaining Papers Received, Review is in progress. Selection Intimation will be given on 28-01-2012) Acceptance Intimation
1 EICA001 Sreenivasa Rao B An Approach to Threat Modeling in Web Application Security Analysis
2 EICA002 A.M.Ravishankkar Efficient Pattern Matching Queries over Xml Document
3 EICA004 Anoop Mishra Determined the Issues of Cloud Computing
4 EICA006 S.Suresh babu SPATIAL LAYOUT PHOTO RETRIEVAL BASED ON K-MEANS CLUSTERING
5 EICA007 VALAMPURI.U DATA SECURITY AND PRIVACY IN HEALTH CARE
6 EICA008 D.Subha sree Multimedia Cloud Computing
7 EICA009 D.Saravanan DELEGATION-BASED IN ON-LINE AND OFF-LINE AUTHENTICATION OVER WIRELESS COMMUNICATION
8 EICA012 Mr. S.THIRUPPATHI IMPROVING QUALITY IN VOICE OVER INTERNET PROTOCOL (VOIP) ON MOBILE DEVICES IN PERVASIVE ENVIRONMENT
9 EICA013 Ms.Sujata Tapkir Impact of Mobility on Route Failure In MANET
10 EICA014 K.Anjaneyulu Preemptive Routing Algorithm to reduce link breakage and routing overhead for Ad-hoc networks using PRM
11 EICA018 N. Mageswari ROUTE DIVERSITY BASED OPTIMAL PATH SELECTION USING RANDOM KEY GENERATION
12 EICA019 K.Praveen Defending Code Injection Attacks By Polymorphic Process
13 EICA021 A.Diana A LEVY ALPHA STABLE MODEL FOR ANOMALY DETECTION IN NETWORK TRAFFIC
14 EICA022 ELAKKIYA PRABHA.T NEURAL NETWORKS & FUZZY LOGIC
15 EICA024 R Hariharan Achieving Cloud Computing Storage Security through Third Party Data Assessment
16 EICA026 T.Suseela AN ARTIFICIAL LIFE APPROACHES AND SELF-HEALING ON
AUTONOMIC COMPUTING: SURVEY IN WEB
17 EICA027 Komala Valli V ENHANCED SECURITY THROUGH AGENT BASED NON-REPUDIATION PROTOCOL FOR MOBILE AGENTS
18 EICA028 Ashik Ilahi. K RELAY NODE SELECTION MECHANISM FOR CONTROL APPLICATIONS IN WIRELESS SENSOR NETWORKS
19 EICA029 Aiswarya.S AN OVERVIEW ON NETWORK SECURITY AND EFFICIENT MONITORING SCHEMES FOR WIRELESS SENSOR NETWORKS
20 EICA031 K. Lakshmi narayanan 1 A HIGH CAPACITY VIDEO STEGANOGRAPHY BASED ON INTEGER WAVELET TRANSFORM
21 EICA032 T.SENTHUR SELVI CONTENT BASED IMAGE RETRIEVAL
USING SPATIAL INFORMATION
22 EICA033 Ierin Babu A SECURE ENFORCING MECHANISM FOR
TRUSTED MOBILE AD HOC NETWORKS
23 EICA037 N.Sathya ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING
24 EICA038 Lakshmi Prasad.E , Multiple task migration in mesh NoCs over virtual Point-To-Point connections
25 EICA041 Nandini A FRAMEWORK FOR ASSESSING THE CAPABILITY OF THE IT INDUSTRY
26 EICA043 .I.Dhurgabai, Wireless Sensor Network Lifetime Prolonging Self Organisable Cluster Based Energy Efficient and Aggregation Protocol
27 EICA044 .I.Dhurgabai, Enhancing reliability and lifetime maximization in duty cycled wireless sensor network based on forwarding procedure.
28 EICA047 Jenisha .J, A Novel Approach for Edge Adaptive Image Steganography using LSB Matching Revisited
29 EICA048 S.Firthouse Supporting Efficient and Dynamic Multicasting
Over Distributed Regions in Mobile Ad Hoc Networks
30 EICA049 M. Buvaneswari Authentication scheme for packet filtering to assuage
DoS impact
31 EICA053 C.Hemalatha A NEW DATA MINING BASED NETWORK INTRUSION DETECTION MODEL
32 EICA055 Chandrashekhar Sanap Design and implementation of secure web
Browser for mobile with IMEI number by using java and J2ME
33 EICA056 Unnikrishnan K N An improvisation of throughput in Wireless Networks through effective Congestion Control
34 EICA058 Sameer Darekar(1), Multi Tracking System using GPS and GSM
35 EICA059 Mr. Abhishek A. Gulhane Noise Reduction and Color Recovery of Grayscale Image by Random Function
Selection Approximation Technique (RFSAT).
36 EICA060 Gowdhami.D DESIGN AND IMPLEMENTATION OF HISTOGRAM SPECIFICATION IN DIGITAL IMAGE SEGMENTATION AND ENHANCEMENT
37 EICA061 Sangeetha.S Implementation of Background Subtraction Algorithm on Still and Moving Sequences
38 EICA062 Kulandai Josephine Julina J Ontology Based Decision Support Systems in Health Care Using Enriched SNOMED CT
39 EICA064 Brajesh Kashyap DDOS ATTACK PREVENTION TECHNIQUES
40 EICA067 Muthamizh.A STATISTICAL CHANNEL ALLOCATION FOR COGNITIVE RADIO AD-HOC NETWORK
41 EICA069 R.Kanimozhi Modern Application of Biomedical Instrumentations
(Medi chip and Neuro chip)
42 EICA070 D.HEMAPRIYA, COUNTER-FITTING THE DATA LEAKAGE
UNDER DATA ENGINEERING
43 EICA072 Anwar Basha.H1 An Information Agent System for Cloud Computing Based Location Tracking
44 EICA073 E. Saravana Kumar Fault Tolerance Mechanism in Computational Grid
45 EICA075 Ganesh P Protection of Privacy in Distributed Databases Using Clustering
46 EICA076 T.Indhuja1 An Efficient Scheme For Adaptive Mobile Gateway Management In Integrated VANET-UMTS Network
47 EICA078 K.GANESHKUMAR EFFICIENT ARM FOR DIFFERENT NETWORK DATA COLLECTION
48 EICA079 Sushil Rashinkar E-WATERMARKING AND FINGERPRINTING
49 EICA080 K. Latha Content-Based Image Retrieval – Performance Issues
50 EICA082 S.Shanmuga Priya THE SECURITY ISSUES IN CLOUD COMPUTING
51 EICA083 N. Sugavaneswaran OPTIMIZATION OF SERVICE REQUEST USING PROFIT-DRIVEN SCHEDULING ALGORITHM IN CLOUD COMPUTING
52 EICA085 R.Maheshwari Secure On-Demand Multicast Routing Protocol for
Wireless Mesh Networks
53 EICA086 Imran Javeed. Power optimization of EPC Class-1 Gen-2
RFID Sensory Tags
54 EICA087 Anitha Lakshmi V. Modeling Advanced Botnet and
Detecting Botmasters
55 EICA088 1Mahip M.Bartere An Efficient Technique using Text & Content Base Image Mining Technique forImage Retrieval
Image Retrieval
56 EICA089 Mr. Mayur S. Burange Fuzzy Model for Human Face Expression Recognition
57 EICA090 Mr. Umesh V. Nikam Design and Development of an Algorithm for Color Conversion of Gray Scale Image With
Respect To Color Reference Image
58 EICA092 Sherril Sophie Maria Vincent Improving CA-AOMDV Protocol Against Blackhole Attacks
59 EICA093 Aishwarya Devi.R A Comparative Analysis of General Defect Proneness in the Competing Software systems
60 EICA100 Ms. R.RAGAVI A SYSTEMATIC CLASSIFICATION OF CHEATING IN ONLINE GAMES
61 EICA102 R.Poornima ELECTRONIC EXECUTION AND COMMUNICATION SYSTEM FOR RAILWAY APPLICATIONS
62 EICA105 T.KUMARI IMPLEMENTING KOHNEN NEURAL NETWORK TO SIMULATE HUMAN USING COGNITIVE SCIENCE

63 EICA106 P.Thirumaraiselvan LATENCY FOR VERTICAL HANDOFF DECISION IN
HETEROGENEOUS NETWORKS
64 EICA107 Raichal.S Detection and Prevention of Code Injection Attacks using Monitoring mechanism
65 EICA108 Chandhana.S.D Defending against Sybil Attacks in
Anonymizing Networks
66 EICA110 K.Nithyananthan Combinational Circuit Design Using Genetic Algorithms
67 EICA113 S.Suganya Devi Effective Noise Reduction Techniques for Despeckling Ultrasound Medical Images
68 EICA114 Madhuramya.R A NEW PRIVACY MEASURE FOR DATA PUBLISHING

69 EICA115 Senthilkumar L Performance Analysis of VoIP Codecs for H323
70 EICA116 Ganeshan.B SADEC APPROACH FOR DETECT THE ATTACKS IN WIRELESS AD HOC NETWORK
71 EICA117 Elumalai.S.V LEAST BANDWIDTH ALLOCATION FOR PERIODIC STREAMS WIRELESS NETWORK SYSTEM
72 EICA118 Ahathiya. P Navigation Pattern based Relevance Feedback for Content Based Image Retrieval
73 EICA123 G.SUKUMAR IMPLEMENTATION OF IMAGE PROCESSING FOR THE
ISOLATION OF DEAD CHICKENS IN THE POULTRY
74 EICA124 D.Sasikala INTEGRATION GAIN OF TWO-APPROXIMATION IN HETEROGENEOUS WIFI / WIMAX NETWORKS
75 EICA126 A.MATHU MATHI DTMF CONTROLLED AC MOTOR
76 EICA128 P. Thirumarai selvan VLSI IMPLEMENTATION OF BLIND WATERMARKING USING LSB ALGORITHM
77 EICA132 V.C.Sindhuja Quality of Service in Mobile Distributed System Based On Opportunistic Networks
78 EICA136   R.SANTHANA BHARATHI Iterative Reconstruction of an Encrypted Image
using LOCO-I Algorithm
79 EICA137 S.Balasubramanian Localization Scheme For Minimizing Error In Wireless Sensor Networks Using Monte Carlo Localization Algorithm
80 EICA139 R.karthikeyan1 protecting of fishermen on Indian maritime boundaries
81 EICA141 R.Buvaneshwari Healthcare Information Using Machine Learning Approach
82 EICA142 S.Ramya, Design of Linearization Enhancement of RF Power Amplifier for Communication Applications
83 EICA144 Indu. M. T A New Active Learning Technique Using Furthest Nearest Neighbour Criterion for k-NN and SVM Classifiers
84 EICA146 . Akila.G Top-k Spatial Preference Query On
Road Network
85 EICA150 S.Samathal BTC with K Means Classifier Using Color Image Clustering
86 EICA151 Mrs.Archana P.Jane, Recognition of Similar Shaped Handwritten Marathi Characters Using Artificial Neural
Network
87 EICA152 K.S.Ramesh SWITCHING ACTIVITY REDUCTION USING SCAN SHIFT
OPERATION
88 EICA153 Anju Vijayrania APPLICATION OF DHT PROTOCOL IN IP CLOAKING
89 EICA154 A.SARANYA, LESSEN THE TRAFFIC CONGESTION USING ANTNET ROUTING
90 EICA155 Ramya .N, FPGA implementation of high performance face
detection using MCT and Adaboost algorithm
91 EICA156 C.JanciRani1 Healthcare System Monitoring and Management
92 EICA158 1Nikita Gupta Credit Card Fraud Detection using Rough Sets and Artificial Neural Network
93 EICA159 S.Thangarani STRAB: SENSING AND TRACING BACK ATTACKERS AGAINST ENCRYPTED PROTOCOLS
94 EICA160 Ms.Janani.S.P Automatised Toll Gate System Using Passive RFID And GSM Technology
95 EICA161 S.Lakabhasanee FAST AND EFFICIENT DISTRIBUTED DETECTION OF MOBILE NODE REPLICA ATTACKS IN WIRELESS SENSOR NETWORK
96 EICA162 A.Karthikeyani DESIGN OF SENSOR MODULE FOR BETTER ENERGY SAVING
97 EICA163 P.X.Britto Energy Efficient Routing in Wireless Sensor Networks using I-SPIN