Powered by ALL INDIA ASSOCIATION FOR INNOVATIVE ENGINEERS
ISSN 23499842(Online), Volume 1, Special Issue 2(ICITET'15), March 2015
International Conference on Innovative Trends in Engineering and Technology
Title and Authors
Download
1
Automatic extraction of social interference system using big data analysis with emergency alert, M.Sharmila Afireen, K.Rajesh kambattan
2
A highly reconfigurable fft architecture for 3G/4G technologies, P.Nathiya, G.Mohankumar
3
A high-speed low-complexity modified radix – 25 fft processor for high rate UWB applications, Nizamudhin R, V.Sarada
4
A new vlsi architecture of efficient radix based modified booth multiplier with reduced complexity, Karthick .K, Mr. S. Bharath
5
A Novel Encoding Method for DSRC Application to Obtain Efficient Performance, S.Devika, S.Lavanya
6
A scrutiny of association rule mining algorithms, M. Madhankumar, Dr. C. Sureshganadhas
7
A skyline query based effective assess over incomplete independent databases Mrs.J.Sridevi, Mr.A.Sairam, Dr.C.Suresh Gnana Dhas
8
A study on low resolution androgenic hair patterns for criminal and victim identification, Mrs.B.Nithiya, A.Leela Mary, N.Priyanka
9
Accident avoidence based on predecessor and successor vehicle speed with privacy preserving navigation using chord algorithm, C. Arokia mary, A.M. Arulraj
10
An efficient approach for reduced power consumption and diagnosis of faulty power switches using a random test pattern generation, S. Sathiyapriya, S.Lavanya
11
An FGPA implementation of a synchronized bi-lateral filter for image processing, Manoj kumar.D, Mrs. Kasthuri bha .J.K
12
An optimized placement and routing algorithm for configurable element in FPGA using error propagation analysis, J.Tamizhilakkiya, Shana Varghese
13
Analysis of delay locked loop used in dram interface for high speed in MHz range of frequency, Narayanlal anand, K.Suganthi
Product Aspect Ranking Using Probabilistic Aspect Ranking Algorithm
S. BharathiKannamma, R. Hanitha, H. Manochitra, D. Loganayaki
49
Providing source privacy in wireless sensor network using message authentication scheme based on elliptic curve cryptography,
Selvarajan J, Arrvind M, Hemakumar B, Jagadeesan M, Dr. D Jayashree, B.Udaya
50
Replication of selfishnode overmanet based on one to one optimization Mahendran.K
51
Reversible data hiding using AES algorithm, Mohanapriya.s, Pradeepa.A , Sindhu.S, Gnanavel.R
52
Reversible water marking algorithm based on embedding pixel, Mrs.K.Subha, D.Gomathi, V.T.Harshini
53
Robust scan flip flop technique for secured advanced encryption standard D. Umesh, K.Ramesh
54
Robust scan technique for secured aes against differential cryptanalysis based side channel attack, A.Tamilarasan, Mr.A.Anbarasan
55
Scalable and secure sharing of records in cloud computing using attribute-based encryption, Mrs.M.Sreemaa, K.Somakrishnan, E.Shabiulla
56
Secure way of data transmission over wireless sensor networks
Amal M John, Suresh B, Vasanth J, Vijay Chandhar S.S , Geetha M, Saranya A
57
Security and privacy preserving data sharing using anonymous identity assignment(AIDA), B Tulasi, N.Pavithra Sahari, M Geetha, O. Pandithurai
58
Security of obfuscated sensitive data with adversary knowledge in network environment using MD5 algorithm, Bhagat sushil S, Surendra Bharathi V D, Vasantha Kumar V, Udaya B
59
Stable throughput in cognitive radio networks using perfect sensing technique S.Kumaran, R.Dayana
60
Underwater wireless optical communication using monte carlo simulation M.R.Dinesh Kumar, Mrs.C.Manjula
61
User authentication and vehicle control using ARM controller S. Dhivyaprabhandhan, A. Suvarnamma
62
VLSI implementation of high performance distributed arithmetic (DA) based adaptive filter with fast convergence factor, G. Parthiban, P.Sathiya
ISSN 23499842(Online), Volume 1, Special Issue 2(ICITET'15), March 2015
International Conference on Innovative Trends in Engineering and Technology
Title and Authors
Download
Automatic extraction of social interference system using big data analysis with emergency alert,
M.Sharmila Afireen, K.Rajesh kambattan
A highly reconfigurable fft architecture for 3G/4G technologies,
P.Nathiya, G.Mohankumar
A high-speed low-complexity modified radix – 25 fft processor for high rate UWB applications,
Nizamudhin R, V.Sarada
A new vlsi architecture of efficient radix based modified booth multiplier with reduced complexity,
Karthick .K, Mr. S. Bharath
A Novel Encoding Method for DSRC Application to Obtain Efficient Performance,
S.Devika, S.Lavanya
A scrutiny of association rule mining algorithms,
M. Madhankumar, Dr. C. Sureshganadhas
A skyline query based effective assess over incomplete independent databases
Mrs.J.Sridevi, Mr.A.Sairam, Dr.C.Suresh Gnana Dhas
A study on low resolution androgenic hair patterns for criminal and victim identification,
Mrs.B.Nithiya, A.Leela Mary, N.Priyanka
Accident avoidence based on predecessor and successor vehicle speed with privacy preserving navigation using chord algorithm,
C. Arokia mary, A.M. Arulraj
An efficient approach for reduced power consumption and diagnosis of faulty power switches using a random test pattern generation,
S. Sathiyapriya, S.Lavanya
An FGPA implementation of a synchronized bi-lateral filter for image processing,
Manoj kumar.D, Mrs. Kasthuri bha .J.K
An optimized placement and routing algorithm for configurable element in FPGA using error propagation analysis,
J.Tamizhilakkiya, Shana Varghese
Analysis of delay locked loop used in dram interface for high speed in MHz range of frequency,
Narayanlal anand, K.Suganthi
Autonomous e-agricultural robot,
A.Saravanan, Ancy vinobha.G, Anisha banu.A, Dyanandhi.G
Brain controlled and environmental auto-adjustment smart home network,
S.Pradeep, V.Padmajothi
Ciphertext-policy attribute-based encryption for secure mobile applications in cloud,
S. Angel leola sruthi, A.Umamageswari
Code security by confusing logic flow using self modifying code,
Mr.P.Ashok kumar, Mr R.Manikandan
Compressed domain data hiding approach on encrypted images using PPM
Miss. A. Premalatha, Mr. N. Sivanesan
Data monitoring and Data logging for Reclaimer using Wireless Mesh Network, A
Priyadarshini, R Vaishnavi, Dr.R. Sabitha
Decentralised disruption tolerant military network for retrieval of data,
Parthiban V, Praveen Kumar J,Ramprasanth R, Sriram k, Saravanan A, Lalitha
Design of hybrid system (wind and light) using reflector for isolated areas,
A.saravanan, Kalpana S, K.Vinodha, D.Nivedha
Design of low power memories by mitigating clock driven,
S.Nandhini, S.Vijayaraghavan
Design of nocs to avoid deadlock problem in on-chip buses,
N.Priyadharshini, S.Kalaiselvy
Detection of camera based attacks on mobile phones using lightweight defense application,
M. Revathi, R. Roja, S. Sowmiya
Detection of multiple cell upsets in memory for enhanced protection,
E. Lavanya, J. Dhanapathi
Dual watermarking system based medical data protection for telemedicine, application,
Miss. V.J.Muthulakshmi, Mr. N. Sivanesan
Duplication avoidance mechanism for storing data in hybrid cloud,
Chandra kala G , Priyanka P, Sowmya C M, Paul Jasmine Rani L,Saravanan A
Dynamic data and policy based access control scheme for relational data,
Mrs.N.M.Indumathi, Mrs.M.Mohanasundari
Edge detection using quad tree mechanism for CT, CR & MRI,
S.Arthi, V.Dhivya, Mr. S. Sundar rajan,
Efficient execution of jobs in grid environment,
M.Fathimajelina,G Gayathri, G.Arun kumar
Energy efficient task allocation using mutant particle swarm,
optimization in WSN, R.Dayana, S.Kumaran
Energy Saver Application On Android By Providing Voice Alert,
R.Soundarya, R.Sudha, R.Vedha
Enhanced hiding in encrypted video using paillier techniques,
D.Anbuselvi, N.Indhu, Angelin Buelah
File searching in opportunistic networks based on interest casting
C.Muthusangari, S.Princy sophia Rani
Finger vein based driver authentication and alertness system using GSM
Naveen M, Sudarvizhi.S
Highly decomposed cordic based low complexity dct architecture for image processing applications,
D. Sathiyapragasam, V.Anandkumar
Illuminance control of a led lighting network using back propagated neural network
A.P. Jaya Muruga raja, V.Meenakshi
Image binaryzation and lossless compression of ancient documents using SPIHT algorithm,
Bhavani. S, Thumilvannan P.S,
Implementation of dll to reduced jitter in dram,
A. Loganathan, R. Ramesh
Implementation of trace buffer signal state detection of FPGA,
S. Suriyapriya, P. Sathiya
Improve of Delay Locked Loop for Image Texture sorting Method,
R.Radha, A.Saravanan
Low complexity multiple bit error correcting parallel hamming decoder
V. Veeraragavendiran, T. Pushkala
Low power clock tree synthesis using clustering algorithm,
P.Selvan, U.Ragavendran
Multimedia messaging service (MMS) based anti-theft application
R. Archana, E.G. Bhuvaneshwari, T. Hemavatha
Multiple defects diagnosis using fault element graph,
A. Manickam, V.Anandkumar
Natural visual secret sharing scheme for sharing multiple forms of images in a network,
D.Pavithra, M.Ferni Ukrit
Problems arrangements using genetic algorithms solution method,
D.Sangeetha, D.Shobana, K.Sowmia, O.Sandhya
Product Aspect Ranking Using Probabilistic Aspect Ranking Algorithm
S. BharathiKannamma, R. Hanitha, H. Manochitra, D. Loganayaki
Providing source privacy in wireless sensor network using message authentication scheme based on elliptic curve cryptography,
Selvarajan J, Arrvind M, Hemakumar B, Jagadeesan M, Dr. D Jayashree, B.Udaya
Replication of selfishnode overmanet based on one to one optimization
Mahendran.K
Reversible data hiding using AES algorithm,
Mohanapriya.s, Pradeepa.A , Sindhu.S, Gnanavel.R
Reversible water marking algorithm based on embedding pixel,
Mrs.K.Subha, D.Gomathi, V.T.Harshini
Robust scan flip flop technique for secured advanced encryption standard
D. Umesh, K.Ramesh
Robust scan technique for secured aes against differential cryptanalysis based side channel attack,
A.Tamilarasan, Mr.A.Anbarasan
Scalable and secure sharing of records in cloud computing using attribute-based encryption,
Mrs.M.Sreemaa, K.Somakrishnan, E.Shabiulla
Secure way of data transmission over wireless sensor networks
Amal M John, Suresh B, Vasanth J, Vijay Chandhar S.S , Geetha M, Saranya A
Security and privacy preserving data sharing using anonymous identity assignment(AIDA),
B Tulasi, N.Pavithra Sahari, M Geetha, O. Pandithurai
Security of obfuscated sensitive data with adversary knowledge in network environment using MD5 algorithm,
Bhagat sushil S, Surendra Bharathi V D, Vasantha Kumar V, Udaya B
Stable throughput in cognitive radio networks using perfect sensing technique
S.Kumaran, R.Dayana
Underwater wireless optical communication using monte carlo simulation
M.R.Dinesh Kumar, Mrs.C.Manjula
User authentication and vehicle control using ARM controller
S. Dhivyaprabhandhan, A. Suvarnamma
VLSI implementation of high performance distributed arithmetic (DA) based adaptive filter with fast convergence factor,
G. Parthiban, P.Sathiya