1 | EICA001 | Sreenivasa Rao B | An Approach to Threat Modeling in Web Application Security Analysis |
2 | EICA002 | A.M.Ravishankkar | Efficient Pattern Matching Queries over Xml Document |
3 | EICA004 | Anoop Mishra | Determined the Issues of Cloud Computing |
4 | EICA006 | S.Suresh babu | SPATIAL LAYOUT PHOTO RETRIEVAL BASED ON K-MEANS CLUSTERING |
5 | EICA007 | VALAMPURI.U | DATA SECURITY AND PRIVACY IN HEALTH CARE |
6 | EICA008 | D.Subha sree | Multimedia Cloud Computing |
7 | EICA009 | D.Saravanan | DELEGATION-BASED IN ON-LINE AND OFF-LINE AUTHENTICATION OVER WIRELESS COMMUNICATION |
8 | EICA012 | Mr. S.THIRUPPATHI | IMPROVING QUALITY IN VOICE OVER INTERNET PROTOCOL (VOIP) ON MOBILE DEVICES IN PERVASIVE ENVIRONMENT |
9 | EICA013 | Ms.Sujata Tapkir | Impact of Mobility on Route Failure In MANET
|
10 | EICA014 | K.Anjaneyulu | Preemptive Routing Algorithm to reduce link breakage and routing overhead for Ad-hoc networks using PRM |
11 | EICA018 | N. Mageswari | ROUTE DIVERSITY BASED OPTIMAL PATH SELECTION USING RANDOM KEY GENERATION |
12 | EICA019 | K.Praveen | Defending Code Injection Attacks By Polymorphic Process |
13 | EICA021 | A.Diana | A LEVY ALPHA STABLE MODEL FOR ANOMALY DETECTION IN NETWORK TRAFFIC |
14 | EICA022 | ELAKKIYA PRABHA.T | NEURAL NETWORKS & FUZZY LOGIC |
15 | EICA024 | R Hariharan | Achieving Cloud Computing Storage Security through Third Party Data Assessment |
16 | EICA026 | T.Suseela | AN ARTIFICIAL LIFE APPROACHES AND SELF-HEALING ON
AUTONOMIC COMPUTING: SURVEY IN WEB |
17 | EICA027 | Komala Valli V | ENHANCED SECURITY THROUGH AGENT BASED NON-REPUDIATION PROTOCOL FOR MOBILE AGENTS |
18 | EICA028 | Ashik Ilahi. K | RELAY NODE SELECTION MECHANISM FOR CONTROL APPLICATIONS IN WIRELESS SENSOR NETWORKS |
19 | EICA029 | Aiswarya.S | AN OVERVIEW ON NETWORK SECURITY AND EFFICIENT MONITORING SCHEMES FOR WIRELESS SENSOR NETWORKS |
20 | EICA031 | K. Lakshmi narayanan 1 | A HIGH CAPACITY VIDEO STEGANOGRAPHY BASED ON INTEGER WAVELET TRANSFORM |
21 | EICA032 | T.SENTHUR SELVI | CONTENT BASED IMAGE RETRIEVAL
USING SPATIAL INFORMATION |
22 | EICA033 | Ierin Babu | A SECURE ENFORCING MECHANISM FOR
TRUSTED MOBILE AD HOC NETWORKS |
23 | EICA037 | N.Sathya | ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR STORAGE SECURITY IN CLOUD COMPUTING |
24 | EICA038 | Lakshmi Prasad.E , | Multiple task migration in mesh NoCs over virtual Point-To-Point connections |
25 | EICA041 | Nandini | A FRAMEWORK FOR ASSESSING THE CAPABILITY OF THE IT INDUSTRY |
26 | EICA043 | .I.Dhurgabai, | Wireless Sensor Network Lifetime Prolonging Self Organisable Cluster Based Energy Efficient and Aggregation Protocol |
27 | EICA044 | .I.Dhurgabai, | Enhancing reliability and lifetime maximization in duty cycled wireless sensor network based on forwarding procedure. |
28 | EICA047 | Jenisha .J, | A Novel Approach for Edge Adaptive Image Steganography using LSB Matching Revisited |
29 | EICA048 | S.Firthouse | Supporting Efficient and Dynamic Multicasting
Over Distributed Regions in Mobile Ad Hoc Networks |
30 | EICA049 | M. Buvaneswari | Authentication scheme for packet filtering to assuage
DoS impact |
31 | EICA053 | C.Hemalatha | A NEW DATA MINING BASED NETWORK INTRUSION DETECTION MODEL |
32 | EICA055 | Chandrashekhar Sanap | Design and implementation of secure web
Browser for mobile with IMEI number by using java and J2ME |
33 | EICA056 | Unnikrishnan K N | An improvisation of throughput in Wireless Networks through effective Congestion Control |
34 | EICA058 | Sameer Darekar(1), | Multi Tracking System using GPS and GSM |
35 | EICA059 | Mr. Abhishek A. Gulhane | Noise Reduction and Color Recovery of Grayscale Image by Random Function
Selection Approximation Technique (RFSAT). |
36 | EICA060 | Gowdhami.D | DESIGN AND IMPLEMENTATION OF HISTOGRAM SPECIFICATION IN DIGITAL IMAGE SEGMENTATION AND ENHANCEMENT |
37 | EICA061 | Sangeetha.S | Implementation of Background Subtraction Algorithm on Still and Moving Sequences |
38 | EICA062 | Kulandai Josephine Julina J | Ontology Based Decision Support Systems in Health Care Using Enriched SNOMED CT |
39 | EICA064 | Brajesh Kashyap | DDOS ATTACK PREVENTION TECHNIQUES |
40 | EICA067 | Muthamizh.A | STATISTICAL CHANNEL ALLOCATION FOR COGNITIVE RADIO AD-HOC NETWORK |
41 | EICA069 | R.Kanimozhi | Modern Application of Biomedical Instrumentations
(Medi chip and Neuro chip) |
42 | EICA070 | D.HEMAPRIYA, | COUNTER-FITTING THE DATA LEAKAGE
UNDER DATA ENGINEERING |
43 | EICA072 | Anwar Basha.H1 | An Information Agent System for Cloud Computing Based Location Tracking |
44 | EICA073 | E. Saravana Kumar | Fault Tolerance Mechanism in Computational Grid |
45 | EICA075 | Ganesh P | Protection of Privacy in Distributed Databases Using Clustering |
46 | EICA076 | T.Indhuja1 | An Efficient Scheme For Adaptive Mobile Gateway Management In Integrated VANET-UMTS Network |
47 | EICA078 | K.GANESHKUMAR | EFFICIENT ARM FOR DIFFERENT NETWORK DATA COLLECTION |
48 | EICA079 | Sushil Rashinkar | E-WATERMARKING AND FINGERPRINTING |
49 | EICA080 | K. Latha | Content-Based Image Retrieval – Performance Issues |
50 | EICA082 | S.Shanmuga Priya | THE SECURITY ISSUES IN CLOUD COMPUTING |
51 | EICA083 | N. Sugavaneswaran | OPTIMIZATION OF SERVICE REQUEST USING PROFIT-DRIVEN SCHEDULING ALGORITHM IN CLOUD COMPUTING |
52 | EICA085 | R.Maheshwari | Secure On-Demand Multicast Routing Protocol for
Wireless Mesh Networks |
53 | EICA086 | Imran Javeed. | Power optimization of EPC Class-1 Gen-2
RFID Sensory Tags |
54 | EICA087 | Anitha Lakshmi V. | Modeling Advanced Botnet and
Detecting Botmasters |
55 | EICA088 | 1Mahip M.Bartere | An Efficient Technique using Text & Content Base Image Mining Technique forImage Retrieval
Image Retrieval |
56 | EICA089 | Mr. Mayur S. Burange | Fuzzy Model for Human Face Expression Recognition |
57 | EICA090 | Mr. Umesh V. Nikam | Design and Development of an Algorithm for Color Conversion of Gray Scale Image With
Respect To Color Reference Image |
58 | EICA092 | Sherril Sophie Maria Vincent | Improving CA-AOMDV Protocol Against Blackhole Attacks
|
59 | EICA093 | Aishwarya Devi.R | A Comparative Analysis of General Defect Proneness in the Competing Software systems |
60 | EICA100 | Ms. R.RAGAVI | A SYSTEMATIC CLASSIFICATION OF CHEATING IN ONLINE GAMES |
61 | EICA102 | R.Poornima | ELECTRONIC EXECUTION AND COMMUNICATION SYSTEM FOR RAILWAY APPLICATIONS |
62 | EICA105 | T.KUMARI | IMPLEMENTING KOHNEN NEURAL NETWORK TO SIMULATE HUMAN USING COGNITIVE SCIENCE
|
63 | EICA106 | P.Thirumaraiselvan | LATENCY FOR VERTICAL HANDOFF DECISION IN
HETEROGENEOUS NETWORKS |
64 | EICA107 | Raichal.S | Detection and Prevention of Code Injection Attacks using Monitoring mechanism |
65 | EICA108 | Chandhana.S.D | Defending against Sybil Attacks in
Anonymizing Networks |
66 | EICA110 | K.Nithyananthan | Combinational Circuit Design Using Genetic Algorithms |
67 | EICA113 | S.Suganya Devi | Effective Noise Reduction Techniques for Despeckling Ultrasound Medical Images |
68 | EICA114 | Madhuramya.R | A NEW PRIVACY MEASURE FOR DATA PUBLISHING
|
69 | EICA115 | Senthilkumar L | Performance Analysis of VoIP Codecs for H323 |
70 | EICA116 | Ganeshan.B | SADEC APPROACH FOR DETECT THE ATTACKS IN WIRELESS AD HOC NETWORK |
71 | EICA117 | Elumalai.S.V | LEAST BANDWIDTH ALLOCATION FOR PERIODIC STREAMS WIRELESS NETWORK SYSTEM |
72 | EICA118 | Ahathiya. P | Navigation Pattern based Relevance Feedback for Content Based Image Retrieval |
73 | EICA123 | G.SUKUMAR | IMPLEMENTATION OF IMAGE PROCESSING FOR THE
ISOLATION OF DEAD CHICKENS IN THE POULTRY |
74 | EICA124 | D.Sasikala | INTEGRATION GAIN OF TWO-APPROXIMATION IN HETEROGENEOUS WIFI / WIMAX NETWORKS |
75 | EICA126 | A.MATHU MATHI | DTMF CONTROLLED AC MOTOR |
76 | EICA128 | P. Thirumarai selvan | VLSI IMPLEMENTATION OF BLIND WATERMARKING USING LSB ALGORITHM |
77 | EICA132 | V.C.Sindhuja | Quality of Service in Mobile Distributed System Based On Opportunistic Networks |
78 | EICA136 | R.SANTHANA BHARATHI | Iterative Reconstruction of an Encrypted Image
using LOCO-I Algorithm |
79 | EICA137 | S.Balasubramanian | Localization Scheme For Minimizing Error In Wireless Sensor Networks Using Monte Carlo Localization Algorithm |
80 | EICA139 | R.karthikeyan1 | protecting of fishermen on Indian maritime boundaries |
81 | EICA141 | R.Buvaneshwari | Healthcare Information Using Machine Learning Approach |
82 | EICA142 | S.Ramya, | Design of Linearization Enhancement of RF Power Amplifier for Communication Applications |
83 | EICA144 | Indu. M. T | A New Active Learning Technique Using Furthest Nearest Neighbour Criterion for k-NN and SVM Classifiers |
84 | EICA146 | . Akila.G | Top-k Spatial Preference Query On
Road Network |
85 | EICA150 | S.Samathal | BTC with K Means Classifier Using Color Image Clustering |
86 | EICA151 | Mrs.Archana P.Jane, | Recognition of Similar Shaped Handwritten Marathi Characters Using Artificial Neural
Network |
87 | EICA152 | K.S.Ramesh | SWITCHING ACTIVITY REDUCTION USING SCAN SHIFT
OPERATION |
88 | EICA153 | Anju Vijayrania | APPLICATION OF DHT PROTOCOL IN IP CLOAKING |
89 | EICA154 | A.SARANYA, | LESSEN THE TRAFFIC CONGESTION USING ANTNET ROUTING |
90 | EICA155 | Ramya .N, | FPGA implementation of high performance face
detection using MCT and Adaboost algorithm |
91 | EICA156 | C.JanciRani1 | Healthcare System Monitoring and Management |
92 | EICA158 | 1Nikita Gupta | Credit Card Fraud Detection using Rough Sets and Artificial Neural Network |
93 | EICA159 | S.Thangarani | STRAB: SENSING AND TRACING BACK ATTACKERS AGAINST ENCRYPTED PROTOCOLS |
94 | EICA160 | Ms.Janani.S.P | Automatised Toll Gate System Using Passive RFID And GSM Technology |
95 | EICA161 | S.Lakabhasanee | FAST AND EFFICIENT DISTRIBUTED DETECTION OF MOBILE NODE REPLICA ATTACKS IN WIRELESS SENSOR NETWORK |
96 | EICA162 | A.Karthikeyani | DESIGN OF SENSOR MODULE FOR BETTER ENERGY SAVING |
97 | EICA163 | P.X.Britto | Energy Efficient Routing in Wireless Sensor Networks using I-SPIN |