Вы находитесь на странице: 1из 6

NATIONAL CONFERENCE ON RESEARCH TRENDS IN COMPUTER SCIENCE AND TECHNOLOGY

Department of Computer Science and Engineering CMR College of Engineering and Technology
Medchal,Hyderbad,A.P,India-501401. www.ncrtcst.org (27th & 28th January, 2012)

Final list of papers for Presentation


S.No

Paper ID

NCRTCST278

2 3

NCRTCST146 NCRTCST167

NCRTCST173

Title of the Paper Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme An Elastic Scheduling Algorithm For Resource CoAllocation Based on System Generated Predictions With Priority C&R Tree based Air Target Classification using Kinematics SMS Text Compression through IDBE (Intelligent Dictionary based Encoding) for Effective Mobile Storage Utilization Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks Facial Expression Recognition System Using Facial Characteristic Points And ID3 A Novel Automated Technique for Ferrous Materials Classification Implementation of MHMIP and comparing the Performance with MIP and DHMIP in mobile networks CMA Channel Equalization through an Adaptive MMSE Equalizer based RLS algorithm DATABASE AND DATA MINING IN SOCIAL NETWORKING

Authors

Journal

P.C. Jha, Vikram Bali

IJCCT

Surendran.R, Dr.B.Parvatha Varthini Manish Garg, Upasna Singh Parul Bhanarkar, Nikhil Jha K. Vishnu Vardhan, Mr. G. Ravi Kumar, Mrs. B.Rajani, Y.sarada Devi Shubhrata Gupta, Keshri Verma, Nazil Perveen

IJCCT

IJCCT IJCCT
IJCCT

5 6 7

NCRTCST181 NCRTCST199 NCRTCST211

IJCCT

8 9

NCRTCST244 NCRTCST264

N. V. S. Shankar, B. Mahesh Krishna, Dr. IJCCT M.M.M.Sarcar Sahul Ahamad.N, J.Sirisha Devi ,P.Soujanya , IJCCT K.Kavitha Tara Saikumar, B. Smitha, P.S.Murthy IJCCT

10

Muktar Yakub Saheb, Mr.Mahesh S. Darak, Mr. IJCCT Pravin More

NCRTCST238

11

NCRTCST183

12 13 14 15 16 17

NCRTCST179 NCRTCST134 NCRTCST144 NCRTCST117 NCRTCST198 NCRTCST200

Spectral Minutiae Fingerprint Recognition System Modeling and Simulation of a Single Phase Matrix Converter with Reduce Switch Count as a Buck/Boost Rectifier with Close Loop Control Automated Assessment of Short One-LINE Free-Text Responses with identifying word ordering An Efficient Authentication Protocol For Security In Mobile Ad Hoc Networks Simulation of DSDV Protocol Efficient method of pitch estimation for Speech signal using MATLAB Embedded Smart Car Security System on Face Detection A case for using Grid Framework for Indian Rural HealthCare to meet the Millennium Development Goals (MDGs) Performance & Analysis of Fuzzy Logic Controller Based Induction Motor Drive System Using Simulink Preemptive Routing & Intrusion Detection for MANETs Research on Data Mining using Neural Networks Intelligent Software Agent applied to Digital Forensic and its Usefulness Application of Data Mining using Bayesian belief Network to Classify Quality of Web Services Impact of Duo-Mining in Knowledge Discovery Process Clustering Algorithms For High Dimensional Data A Survey Of Issues And Existing Approaches Analysis and Determination of Asymptotic Behavior Range for Popular Sorting Algorithms Regression Test Suite Reduction using an Hybrid Technique Based on BCO And Genetic Algorithm A Trenchant Analysis of Relationships in Object Oriented Domain Paradigms

S.Shanawaz Basha, N.Musrat Sultana RM.Anusuya ,R.Saravana kumar Er. Navjeet Kaur, Er. Kiran Jyoti Abdul Shabbir, Anasuri Sunil Kumar Neelam Chauhan , Paramjeet Singh G.Gandhimathi , Dr.S. Jayakumar VIKRAM KULKARNI, VISWAPRAKASH BABU P.Vishvapathi, S.Ramachandram , A.Govardhan Meenu Gupta , Reena Kamboj, Rinku Dhiman

IJCCT IJCCT IJCCT IJCCT IJCCT IJCCT IJCCT IJCCT IJCCT

18 19 20 21

NCRTCST188 NCRTCST169 NCRTCST300 NCRTCST201

22

N.Sandeep Chaitanya ,V.Ramesh, K. Vijaya Kumar, IJCCT S.Siva Skandha ,G. Ravi Kumar K. Amarendra, , K.V. Lakshmi, K.V. Ramani IJCSI Inikpi O. Ademu, Dr Chris O. Imafidon,Dr David S. IJCSI Preston M.Swami Das, Ramakanta Mohanty, D.Vijayalakshmi, IJCSI A.Govardhan Aditi Chawla, DeeptiSachdeva IJCSI

NCRTCST138

23 24

NCRTCST221 NCRTCST172

25

NCRTCST225

B.Hari Babu, Dr.N.Subash Chandra, Dr. T. Venu IJCSI Gopal Omar Khan Durrani, Shreelakshmi V, Sushma Shetty, IJCSI Vinutha D C IJCSI Dr.Bharti Suri, Isha Mangal,Varun Srivastava Ajeet K. Jain, Seravana Kumar IJCSI

26 27 28

NCRTCST229 NCRTCST234 NCRTCST263

29 30 31 32 33 34 35 36 37 38 39 40 41 42 43

NCRTCST272 NCRTCST186 NCRTCST205 NCRTCST224 NCRTCST223 NCRTCST227 NCRTCST160 NCRTCST125 NCRTCST102 NCRTCST277 NCRTCST170 NCRTCST240 NCRTCST118 NCRTCST158 NCRTCST147

Multiplexed Chat Application Basic Model of Multicast Authentication Based On Batch Signature-MABS Cross-Layer System for Cluster Based Data Access in MANETS A Study: Analysis of Music Features for Musical Instrument Recognition and Music Similarity Search Pattern Recognition Algorithms for Cluster Identification Problem Frequent Item sets Used in Mining of Train Delays

A.Vivekanand, B.Sivaiah,V.A.Narayana, D.Komali,SK.Khaja Shareef

IJCSI

Hilda C.P, M.Grace Vennice, Rajani Badi, P.V. IJCSI Shalini Anand Nayyar IJCSI J. Sirisha Devi , Y. Srinivas, N. Murali Krishna3 Depa Pratima , Nivedita Nimmakanti , Dayakar Reddy D.kishore babu,Y.Naga Satish,GLNVS Kumar Udayasri.B, Sushmitha.N, Padmavathi.S Jayeeta Majumder, Gargi Saha Navjeet Kaur, Kiran Jyoti Rajesh K.S, Veena A kumar, CH Dayakar Reddy G.Sanjay Gandhi, SSV Apparao Pulagam Sowjanya, Vijay Kumar Koppula, Kishore Gaddam, P.Shruthi Sneha Lata Mandal, Vivek Dubey Prof.B.H.Barhate K.V.Ramana, k.Anantha Lakshmi, D.Anusha M.Kishore, B.Srinivas, Dr.JayaDev Gyani Prabhakar Telgarapu, B.Jagadeshwar Rao, J.venkata suman, k.chiranjeevi Prof. S. P. Shinde, Prof. V. P. Deshmukh M.Grace Vennice, , M.Swapna, Mohammed Ali, T.Dharma Reddy B.Shwetha, S.Ajay Kumar, TVS Prasad Gupta Kanike Vijay Kumar, Prof K.Suresh Reddy IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI

A Lime Light on the Emerging Trends of Web Mining ANALYSIS OF SQL INJECTION ATTACK Automated Assessment of Short One-LINE Free-Text Responses in Computer Science Building a Bilingual Corpus based on Hybrid Approach for Malayalam-English Machine Translation Implementation of RED Algorithm to Detect Malicious Packet Losses Comparative Study of Text Line Segmentation Algorithms on Low Quality Documents implementation and evaluation of diabetes management system using clustering Technique Software Inspection improves Quality of Software Product Secure E-Tendering using Identity Based Encryption from Bilinear Pairings A COMBINED TWO STEP APPROACH FOR DETECTING INPUT VALIDATION ATTACKS AGAINST WEB APPLICATIONS A Novel Traffic Tracking System Based on division of Video into Frames and Processing WebBased Education in Schools: A Paradigm shift in India A Hybrid Method Of Hiding The Text Information Using Stegnography Flaws in Endair-A Secure Routing Protocol for MANETS Compressed Sensing for Image Compression using Wavelet Packet Analysis

44 45 46 47 48 49

NCRTCST182 NCRTCST174 NCRTCST197 NCRTCST185 NCRTCST210 NCRTCST258

50 51 52 53 54 55 56 57 58 59 60

NCRTCST276 NCRTCST235 NCRTCST257 NCRTCST203 NCRTCST191 NCRTCST207 NCRTCST178 NCRTCST162 NCRTCST157 NCRTCST268 NCRTCST266 NCRTCST112

Mechanism to Mitigate Application layer DDoS Attack With a Light weight Trust approach A Novel Steganographic Algorithm and Hashing To Improve Authentication Using Mobile Phones Trends of IT Industry In Indian Economy an Analysis Role of Web Services in migration of Legacy System to Service-Oriented Architecture Improving Software Modularity Using AOP Design and simulation of hybrid SET CMOS based sequential circuit Requisite for Web Usage Mining A Survey Image Edge Detection Face Recognition based on PCA Algorithm Model Based Software Development: Issues & Challenges Consumer contactless transactions using ARM9 Processor A Layered Optimization Approach for Efficient MPEG Video Transmission Over Wireless Networks Concise study of Progressive Documentation and its adaptation to Agile Software Testing Color and Texture Features for Image Indexing and Retrieval An efficient approach to calculate the power of discrete power spectrum A Review of the software testing process in SDLC Identification of Brain Tumors in 2 D MRI Using Automatic Seeded Region Growing Method A Sophisticated Study on Best Practices of Agile Software Testing A new approach to Image steganography

M.Jhansi, Radha, .B Simmi G.Sumalatha, P.Madhuravani N.Swapna, N.Sujatha Dr. Vinay Goyal, Amit Jain B.Vasundhara, KV.Chalapathi Anindya Jana, Rajat Suvra, J. K. Sing, Subir Kumar Sarkar Prof Sindhu P Menon, Nagaratna P Hedge K.Vikram, Niraj Upashyaya, kavuri Roshan, A. Govardhan Taranpreet Singh Ruprah N Md Jubair Basha, Salman Abdul Moiz, Mohammed Rizwanullah Abdul Shubhani Shaik,B.Venkateswara Rao Vijayalaksmi M, Linganagouda Kulkarni

IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI IJCSI

61 62
NCRTCST114 NCRTCST115

IJECCE

Roshni Kanth, Madhu B K, Lokesha Narendra Gali, B.Venkateswara Rao, Abdul Shubani Sheik Nirmal Singh, Mamata Katiyar Kum. ar Nikhil, Swati Agarwal Swati Tiwari, Ashish Bansal, Rupali Sagar Harish R, Madhu, Lokesha

IJECCE

63 64
NCRTCST121 NCRTCST135

IJECCE IJECCE

65 66
NCRTCST136 NCRTCST148

IJECCE IJECCE

67 68
NCRTCST151

IJECCE

STVS Kumar, SS Panda, MSRS Prasad

IJECCE

NCRTCST154

69 70
NCRTCST156 NCRTCST163

Action of Images Created by Random Windows and Sequential Windows Image Cropping techniques Design Distributed Database Strategies for SQMD Architecture ARMoteGame-A Wireless Device for Augmented Reality 3D Game Environment Modeling and control of Non linear systems Analysis and Design of Controller for Two Area Deregulated AGC System A Survey on the Cross and Multilingual Information Retrieval Customer behaviour Analysis using CBA (Data Mining Approach) Exerting Modern Techniques for Data Leakage Problems Detection FPGA Design & Implementation of Hybrid Cellular Automation with Binary Synchronization The New Vision of Go Programming Language Hardware Implementation of MAC Unit Implementation of ATM Security by Using Fingerprint recognition and GSM Image Inpainting Using Texture Synthesis Improving Performance in Wireless Sensor Networks Using MEMS Technology ISP Security for DDoS Attacks Information completely distributed in wireless networks Spread Spectrum System with DoS Attack Properties in wireless sensor networks

Kajal R Gurnani
IJECCE

Shailesh R. Thakare, Dr. C.A. Dhawale, Ajay B.Gadicha M Ashok Kumar K.S.S.Anjana, M.Sridhar K.S.S.Anjana, M.Sridhar N Swapna, Padmaja Rani, B. Kiran Kumar

IJECCE

71 72
NCRTCST164 NCRTCST165

IJECCE IJECCE IJECCE

73
NCRTCST184

74 75
NCRTCST192 NCRTCST194

IJECCE

K.V.Nagendra, C.Rajendra N.Sandhya , G.Haricharan Sharma, K.Bhima

IJECCE

76
NCRTCST212

IJECCE

77
NCRTCST216

SHAIK. CHARY

FAZEELATH

JAHAN,

S.NARASIMHA IJECCE

CH. Dayakar Reddy, Manish Kumar Shukla


IJECCE

78 79
NCRTCST217 NCRTCST220

80 81
NCRTCST228 NCRTCST237

Pratap Kumar Dakua, Anamika Sinha, Shivdhari & Gourab PENNAM KRISHNAMURTHY, MR. M. MADDHUSUDHAN REDDDY M Prasad, G.Mary Prakash Kumari, P B V Raja Rao L.Mohan, B.Ranjitha, Syed Atiya Begum

IJECCE

IJECCE IJECCE IJECCE

82 83
NCRTCST256 NCRTCST265

84 85
NCRTCST330

B.Mallikarjuna Reddy, K.R.N. kiran Kumar Chandrashekhar B, A.Vivekanand, B.Rajani, Y.Sharada Devi Ch.V.V.Satyanarayana, G.Sanjiv Rao, B.Mallikarjuna Reddy

IJECCE IJECCE

NCRTCST-12 Proccedings

NCRTCST180

86 87
NCRTCST281 NCRTCST252

Mining Association Rules for Web Log Data (Web Usage Mining) Android Based Processor Performance Analyser Understanding the Performance of an Optimal Approach for Design of FIR Filter Analysis and Design of Controller for Two Area Thermal-Hydro-Gas AGC System Intensity of Salient Motion Features for Video Quality Assessment And Estimate The Parameters Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Mobile IP Networks Approaches High Mobility Management for Performance Evaluation Architecture and Algorithm for an Cooperative Cache wireless p2p Networks Techniques for resilience of Denial of service Attacks in Mobile Ad Hoc Networks High-Speed Data Stream Mining using VFDT

L.Mohan, T. Venu Gopal, B.Ranjitha


IJECCE

Sumit Kumar Gopichauhann, P.Pavan Kumar, 3P.R.Vijaya Kumar M.Mukkaranna , PHK.Prasad P Ramesh Naik , B.Siva Reddy

IJECCE IJECCE IJECCE

88 89
NCRTCST218 NCRTCST233

90 91 92 93 94
NCRTCST153 NCRTCST119 NCRTCST260 NCRTCST177

IJECCE

K.Valli Madhavi, R.Tamilkodi, R.BalaDinakar R. Sujitha Rani R. Vedasri, , N.Sandeep Chaitanya Syed Atiya Begum, L.Mohan, B.Ranjitha Ch.S.K.V.R.Naidu, Devanam Priya, Sudam Sekhar Panda K.SUBASHINI,G.SUBBALAXMI

IJECCE IJECCE(Conditionally Accepted) IJECCE Conditionally Accepted) IJECCE Conditionally Accepted)

NCRTCST140

95
NCRTCST255

96 97
NCRTCST189

Tracing Sources of DDoS Attacks in IP Networks Using Machine Learning Automatic Defence System
QUERY OPTIMIZATION USING THE TECHNIQUE OF PROGRESSIVE PARAMETRIC

NCRTCST-2012 Proceedings only NCRTCST-12 Proceedings NCRTCST-12 Proceedings

Rambabu P, Akkisetty Sesha Giri, Kumar Jetti, Priya jain

The Conference will be started at 9.30A.M on 27th Jan12 in CMRCET Auditorium. Detailed program schedule will be distributed at registration counter on 27th Jan12. Each paper will be given maximum of 10 minutes of time for presentation. Parallel tracks will be arranged for presentation. Authors are requested to come prepared with 10-15 slides for presentation. Selected papers will be published in IJCCT/IJCSI/IJECCE after the presentation in the conference. 1)IJCCT :International Journal of Computer & Communication Technology (ISSN(O): 2231 0371) ISSN(P): 0975 7449). 2)IJCSI: International Journal of Computer Science and Informatics ISSN (P): 2231 5292. 3)IJECCE : International Journal of Electronics Communication and Computer Engineering( ISSN(O) : 2249 - 071X )

Вам также может понравиться