Академический Документы
Профессиональный Документы
Культура Документы
Department of Computer Science and Engineering CMR College of Engineering and Technology
Medchal,Hyderbad,A.P,India-501401. www.ncrtcst.org (27th & 28th January, 2012)
Paper ID
NCRTCST278
2 3
NCRTCST146 NCRTCST167
NCRTCST173
Title of the Paper Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme An Elastic Scheduling Algorithm For Resource CoAllocation Based on System Generated Predictions With Priority C&R Tree based Air Target Classification using Kinematics SMS Text Compression through IDBE (Intelligent Dictionary based Encoding) for Effective Mobile Storage Utilization Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks Facial Expression Recognition System Using Facial Characteristic Points And ID3 A Novel Automated Technique for Ferrous Materials Classification Implementation of MHMIP and comparing the Performance with MIP and DHMIP in mobile networks CMA Channel Equalization through an Adaptive MMSE Equalizer based RLS algorithm DATABASE AND DATA MINING IN SOCIAL NETWORKING
Authors
Journal
IJCCT
Surendran.R, Dr.B.Parvatha Varthini Manish Garg, Upasna Singh Parul Bhanarkar, Nikhil Jha K. Vishnu Vardhan, Mr. G. Ravi Kumar, Mrs. B.Rajani, Y.sarada Devi Shubhrata Gupta, Keshri Verma, Nazil Perveen
IJCCT
IJCCT IJCCT
IJCCT
5 6 7
IJCCT
8 9
NCRTCST244 NCRTCST264
N. V. S. Shankar, B. Mahesh Krishna, Dr. IJCCT M.M.M.Sarcar Sahul Ahamad.N, J.Sirisha Devi ,P.Soujanya , IJCCT K.Kavitha Tara Saikumar, B. Smitha, P.S.Murthy IJCCT
10
NCRTCST238
11
NCRTCST183
12 13 14 15 16 17
Spectral Minutiae Fingerprint Recognition System Modeling and Simulation of a Single Phase Matrix Converter with Reduce Switch Count as a Buck/Boost Rectifier with Close Loop Control Automated Assessment of Short One-LINE Free-Text Responses with identifying word ordering An Efficient Authentication Protocol For Security In Mobile Ad Hoc Networks Simulation of DSDV Protocol Efficient method of pitch estimation for Speech signal using MATLAB Embedded Smart Car Security System on Face Detection A case for using Grid Framework for Indian Rural HealthCare to meet the Millennium Development Goals (MDGs) Performance & Analysis of Fuzzy Logic Controller Based Induction Motor Drive System Using Simulink Preemptive Routing & Intrusion Detection for MANETs Research on Data Mining using Neural Networks Intelligent Software Agent applied to Digital Forensic and its Usefulness Application of Data Mining using Bayesian belief Network to Classify Quality of Web Services Impact of Duo-Mining in Knowledge Discovery Process Clustering Algorithms For High Dimensional Data A Survey Of Issues And Existing Approaches Analysis and Determination of Asymptotic Behavior Range for Popular Sorting Algorithms Regression Test Suite Reduction using an Hybrid Technique Based on BCO And Genetic Algorithm A Trenchant Analysis of Relationships in Object Oriented Domain Paradigms
S.Shanawaz Basha, N.Musrat Sultana RM.Anusuya ,R.Saravana kumar Er. Navjeet Kaur, Er. Kiran Jyoti Abdul Shabbir, Anasuri Sunil Kumar Neelam Chauhan , Paramjeet Singh G.Gandhimathi , Dr.S. Jayakumar VIKRAM KULKARNI, VISWAPRAKASH BABU P.Vishvapathi, S.Ramachandram , A.Govardhan Meenu Gupta , Reena Kamboj, Rinku Dhiman
18 19 20 21
22
N.Sandeep Chaitanya ,V.Ramesh, K. Vijaya Kumar, IJCCT S.Siva Skandha ,G. Ravi Kumar K. Amarendra, , K.V. Lakshmi, K.V. Ramani IJCSI Inikpi O. Ademu, Dr Chris O. Imafidon,Dr David S. IJCSI Preston M.Swami Das, Ramakanta Mohanty, D.Vijayalakshmi, IJCSI A.Govardhan Aditi Chawla, DeeptiSachdeva IJCSI
NCRTCST138
23 24
NCRTCST221 NCRTCST172
25
NCRTCST225
B.Hari Babu, Dr.N.Subash Chandra, Dr. T. Venu IJCSI Gopal Omar Khan Durrani, Shreelakshmi V, Sushma Shetty, IJCSI Vinutha D C IJCSI Dr.Bharti Suri, Isha Mangal,Varun Srivastava Ajeet K. Jain, Seravana Kumar IJCSI
26 27 28
29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
NCRTCST272 NCRTCST186 NCRTCST205 NCRTCST224 NCRTCST223 NCRTCST227 NCRTCST160 NCRTCST125 NCRTCST102 NCRTCST277 NCRTCST170 NCRTCST240 NCRTCST118 NCRTCST158 NCRTCST147
Multiplexed Chat Application Basic Model of Multicast Authentication Based On Batch Signature-MABS Cross-Layer System for Cluster Based Data Access in MANETS A Study: Analysis of Music Features for Musical Instrument Recognition and Music Similarity Search Pattern Recognition Algorithms for Cluster Identification Problem Frequent Item sets Used in Mining of Train Delays
IJCSI
Hilda C.P, M.Grace Vennice, Rajani Badi, P.V. IJCSI Shalini Anand Nayyar IJCSI J. Sirisha Devi , Y. Srinivas, N. Murali Krishna3 Depa Pratima , Nivedita Nimmakanti , Dayakar Reddy D.kishore babu,Y.Naga Satish,GLNVS Kumar Udayasri.B, Sushmitha.N, Padmavathi.S Jayeeta Majumder, Gargi Saha Navjeet Kaur, Kiran Jyoti Rajesh K.S, Veena A kumar, CH Dayakar Reddy G.Sanjay Gandhi, SSV Apparao Pulagam Sowjanya, Vijay Kumar Koppula, Kishore Gaddam, P.Shruthi Sneha Lata Mandal, Vivek Dubey Prof.B.H.Barhate K.V.Ramana, k.Anantha Lakshmi, D.Anusha M.Kishore, B.Srinivas, Dr.JayaDev Gyani Prabhakar Telgarapu, B.Jagadeshwar Rao, J.venkata suman, k.chiranjeevi Prof. S. P. Shinde, Prof. V. P. Deshmukh M.Grace Vennice, , M.Swapna, Mohammed Ali, T.Dharma Reddy B.Shwetha, S.Ajay Kumar, TVS Prasad Gupta Kanike Vijay Kumar, Prof K.Suresh Reddy IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI
A Lime Light on the Emerging Trends of Web Mining ANALYSIS OF SQL INJECTION ATTACK Automated Assessment of Short One-LINE Free-Text Responses in Computer Science Building a Bilingual Corpus based on Hybrid Approach for Malayalam-English Machine Translation Implementation of RED Algorithm to Detect Malicious Packet Losses Comparative Study of Text Line Segmentation Algorithms on Low Quality Documents implementation and evaluation of diabetes management system using clustering Technique Software Inspection improves Quality of Software Product Secure E-Tendering using Identity Based Encryption from Bilinear Pairings A COMBINED TWO STEP APPROACH FOR DETECTING INPUT VALIDATION ATTACKS AGAINST WEB APPLICATIONS A Novel Traffic Tracking System Based on division of Video into Frames and Processing WebBased Education in Schools: A Paradigm shift in India A Hybrid Method Of Hiding The Text Information Using Stegnography Flaws in Endair-A Secure Routing Protocol for MANETS Compressed Sensing for Image Compression using Wavelet Packet Analysis
44 45 46 47 48 49
50 51 52 53 54 55 56 57 58 59 60
NCRTCST276 NCRTCST235 NCRTCST257 NCRTCST203 NCRTCST191 NCRTCST207 NCRTCST178 NCRTCST162 NCRTCST157 NCRTCST268 NCRTCST266 NCRTCST112
Mechanism to Mitigate Application layer DDoS Attack With a Light weight Trust approach A Novel Steganographic Algorithm and Hashing To Improve Authentication Using Mobile Phones Trends of IT Industry In Indian Economy an Analysis Role of Web Services in migration of Legacy System to Service-Oriented Architecture Improving Software Modularity Using AOP Design and simulation of hybrid SET CMOS based sequential circuit Requisite for Web Usage Mining A Survey Image Edge Detection Face Recognition based on PCA Algorithm Model Based Software Development: Issues & Challenges Consumer contactless transactions using ARM9 Processor A Layered Optimization Approach for Efficient MPEG Video Transmission Over Wireless Networks Concise study of Progressive Documentation and its adaptation to Agile Software Testing Color and Texture Features for Image Indexing and Retrieval An efficient approach to calculate the power of discrete power spectrum A Review of the software testing process in SDLC Identification of Brain Tumors in 2 D MRI Using Automatic Seeded Region Growing Method A Sophisticated Study on Best Practices of Agile Software Testing A new approach to Image steganography
M.Jhansi, Radha, .B Simmi G.Sumalatha, P.Madhuravani N.Swapna, N.Sujatha Dr. Vinay Goyal, Amit Jain B.Vasundhara, KV.Chalapathi Anindya Jana, Rajat Suvra, J. K. Sing, Subir Kumar Sarkar Prof Sindhu P Menon, Nagaratna P Hedge K.Vikram, Niraj Upashyaya, kavuri Roshan, A. Govardhan Taranpreet Singh Ruprah N Md Jubair Basha, Salman Abdul Moiz, Mohammed Rizwanullah Abdul Shubhani Shaik,B.Venkateswara Rao Vijayalaksmi M, Linganagouda Kulkarni
IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI
61 62
NCRTCST114 NCRTCST115
IJECCE
Roshni Kanth, Madhu B K, Lokesha Narendra Gali, B.Venkateswara Rao, Abdul Shubani Sheik Nirmal Singh, Mamata Katiyar Kum. ar Nikhil, Swati Agarwal Swati Tiwari, Ashish Bansal, Rupali Sagar Harish R, Madhu, Lokesha
IJECCE
63 64
NCRTCST121 NCRTCST135
IJECCE IJECCE
65 66
NCRTCST136 NCRTCST148
IJECCE IJECCE
67 68
NCRTCST151
IJECCE
IJECCE
NCRTCST154
69 70
NCRTCST156 NCRTCST163
Action of Images Created by Random Windows and Sequential Windows Image Cropping techniques Design Distributed Database Strategies for SQMD Architecture ARMoteGame-A Wireless Device for Augmented Reality 3D Game Environment Modeling and control of Non linear systems Analysis and Design of Controller for Two Area Deregulated AGC System A Survey on the Cross and Multilingual Information Retrieval Customer behaviour Analysis using CBA (Data Mining Approach) Exerting Modern Techniques for Data Leakage Problems Detection FPGA Design & Implementation of Hybrid Cellular Automation with Binary Synchronization The New Vision of Go Programming Language Hardware Implementation of MAC Unit Implementation of ATM Security by Using Fingerprint recognition and GSM Image Inpainting Using Texture Synthesis Improving Performance in Wireless Sensor Networks Using MEMS Technology ISP Security for DDoS Attacks Information completely distributed in wireless networks Spread Spectrum System with DoS Attack Properties in wireless sensor networks
Kajal R Gurnani
IJECCE
Shailesh R. Thakare, Dr. C.A. Dhawale, Ajay B.Gadicha M Ashok Kumar K.S.S.Anjana, M.Sridhar K.S.S.Anjana, M.Sridhar N Swapna, Padmaja Rani, B. Kiran Kumar
IJECCE
71 72
NCRTCST164 NCRTCST165
73
NCRTCST184
74 75
NCRTCST192 NCRTCST194
IJECCE
IJECCE
76
NCRTCST212
IJECCE
77
NCRTCST216
SHAIK. CHARY
FAZEELATH
JAHAN,
S.NARASIMHA IJECCE
78 79
NCRTCST217 NCRTCST220
80 81
NCRTCST228 NCRTCST237
Pratap Kumar Dakua, Anamika Sinha, Shivdhari & Gourab PENNAM KRISHNAMURTHY, MR. M. MADDHUSUDHAN REDDDY M Prasad, G.Mary Prakash Kumari, P B V Raja Rao L.Mohan, B.Ranjitha, Syed Atiya Begum
IJECCE
82 83
NCRTCST256 NCRTCST265
84 85
NCRTCST330
B.Mallikarjuna Reddy, K.R.N. kiran Kumar Chandrashekhar B, A.Vivekanand, B.Rajani, Y.Sharada Devi Ch.V.V.Satyanarayana, G.Sanjiv Rao, B.Mallikarjuna Reddy
IJECCE IJECCE
NCRTCST-12 Proccedings
NCRTCST180
86 87
NCRTCST281 NCRTCST252
Mining Association Rules for Web Log Data (Web Usage Mining) Android Based Processor Performance Analyser Understanding the Performance of an Optimal Approach for Design of FIR Filter Analysis and Design of Controller for Two Area Thermal-Hydro-Gas AGC System Intensity of Salient Motion Features for Video Quality Assessment And Estimate The Parameters Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Mobile IP Networks Approaches High Mobility Management for Performance Evaluation Architecture and Algorithm for an Cooperative Cache wireless p2p Networks Techniques for resilience of Denial of service Attacks in Mobile Ad Hoc Networks High-Speed Data Stream Mining using VFDT
Sumit Kumar Gopichauhann, P.Pavan Kumar, 3P.R.Vijaya Kumar M.Mukkaranna , PHK.Prasad P Ramesh Naik , B.Siva Reddy
88 89
NCRTCST218 NCRTCST233
90 91 92 93 94
NCRTCST153 NCRTCST119 NCRTCST260 NCRTCST177
IJECCE
K.Valli Madhavi, R.Tamilkodi, R.BalaDinakar R. Sujitha Rani R. Vedasri, , N.Sandeep Chaitanya Syed Atiya Begum, L.Mohan, B.Ranjitha Ch.S.K.V.R.Naidu, Devanam Priya, Sudam Sekhar Panda K.SUBASHINI,G.SUBBALAXMI
NCRTCST140
95
NCRTCST255
96 97
NCRTCST189
Tracing Sources of DDoS Attacks in IP Networks Using Machine Learning Automatic Defence System
QUERY OPTIMIZATION USING THE TECHNIQUE OF PROGRESSIVE PARAMETRIC
The Conference will be started at 9.30A.M on 27th Jan12 in CMRCET Auditorium. Detailed program schedule will be distributed at registration counter on 27th Jan12. Each paper will be given maximum of 10 minutes of time for presentation. Parallel tracks will be arranged for presentation. Authors are requested to come prepared with 10-15 slides for presentation. Selected papers will be published in IJCCT/IJCSI/IJECCE after the presentation in the conference. 1)IJCCT :International Journal of Computer & Communication Technology (ISSN(O): 2231 0371) ISSN(P): 0975 7449). 2)IJCSI: International Journal of Computer Science and Informatics ISSN (P): 2231 5292. 3)IJECCE : International Journal of Electronics Communication and Computer Engineering( ISSN(O) : 2249 - 071X )