Program
List of Accepted Papers:
1570171621 | RosyRecommends: Collaborative Filter Analysis of Listening Behavior Using User Similarity Metrics Based on Timbral Clusters |
1570107871 |
Using PRUSS for Real-Time Applications on Beaglebone Black |
1570144173 |
Shape Representation and Classification Based on Discrete Cosine Transformation and IDSC |
1570138821 |
Integrated Energy Management Framework - Aatral |
1570138813 |
Face Recognition Based Person Specific Identification for Video Surveillance Applications |
1570143817 |
Impedance Cardiography Used For Diagnosis of Diseases |
1570133461 |
Attribute Reduction on Continuous Data in Rough Set Theory using Ant Colony Optimization Metaheuristic |
1570144609 |
Gabor Filter Based Face Recognition Using Non-frontal Face Images |
1570109221 |
Session Based Storage finding in Video on Demand System |
1570144003 |
Building Web Personalization System with Time-Driven Web Usage Mining |
1570116479 |
MoveFree: A ubiquitous system to provide women safety |
1570095385 |
Smart Mom: An architecture to monitor children at home |
1570144441 |
CODES: A COllaborative DEtection Strategy for SSDF Attacks in Cognitive Radio Networks |
1570139061 |
Subtracted Bit Representation and Frame number reduction using Adjacent Pixel Correlation for Video Compression |
1570120557 |
Integrating AI Techniques In SDLC: Design Phase Perspective |
1570144421 |
Gabor Moments based Shot Boundary Detection |
1570144015 |
Distributed Binary Decision-Based Collaborative Spectrum Sensing in Infrastructure-less Cognitive Radio Network |
1570119793 |
Malware Detection in Android files based on Multiple levels of Learning and Diverse Data Sources |
1570130545 |
Architecting Solutions for Scalable Databases in Cloud |
1570129269 |
CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filtering |
1570136621 |
Multi-view Ensemble Learning: A Supervised Feature Set Partitioning for High Dimensional Data Classification |
1570144415 |
A Multi-Objective Initial Virtual Machine Allocation in Clouds using Divided KD Tree |
1570144977 |
A Discrete Wavelet Transform based Adaptive Steganography for Digital Images |
1570114797 |
Design and Implementation of Wireless Robot for Floor Cleaning Application |
1570128819 |
Fuzzy based Estimation of Received Signal Strength in a Wireless Sensor Network |
1570138189 |
Shadow detection and removal from real images:State of art |
1570145229 |
Optimal Time Dependent Pricing Model for Smart Cloud with Cost Based Scheduling |
1570143259 |
Detecting Overlapping Communities in LBSNs with Enhanced Location Privacy |
1570144193 |
Classification and Prediction of Breast Cancer Data derived Using Natural Language Processing |
1570128707 |
Improving the Accuracy of Document Similarity Approach using Word Sense Disambiguation |
1570143053 |
Entropy based content filtering for Mobile Web Page Adaptation |
1570146611 |
Fast Modular Artificial Neural Network for the Classification of Breast Cancer data |
1570144285 |
Information Risk Analysis in a Distributed MOOC Based Software System Using an Optimized Artificial Neural Network |
1570144907 |
Image Scrambling using Kekre's Walsh Sequency and Non Sinusoidal Transforms in Different Color Spaces |
1570130941 |
A Distributed Cooperative Approach to Detect Gray Hole Attack in MANETs |
1570144901 |
An Efficient Deblurring Algorithm on Foggy Images using Curvelet Transforms |
1570146419 |
Applying Image Processing for Detecting On-Shelf Availability and Product Positioning in Retail Stores |
1570137819 |
Seeded Watershed Segmentation Based Proteomics for 2D-Gel Electrophoresis Images |
1570132591 |
User Intervention Based Segmentation of Myocardium from Cardiac Cine MRI Images |
1570144789 |
A Novel Data Mining Approach for Detecting Spam Emails using Robust Chi-Square Features |
1570137617 |
Performance based energy efficient techniques for VM allocation in Cloud environment |
1570144111 |
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services |
1570122123 |
Off-line Handwritten Modi Numerals Recognition using Chain Code |
1570116355 |
Primary User Authentication in Cognitive Radio Network using Signal Properties |
1570137713 |
Secure Session Key Sharing Using Public Key Cryptography |
1570128789 |
Privacy and Personalization Perceptions of the Indian Demographic with respect to Online Searches |
1570133665 |
Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost |
1570144777 |
Automatic Generation of Templates using Ontology |
1570144473 |
Design of Dependable Task Scheduling Algorithm in Cloud Environment |
1570145797 |
Maximizing Fault Tolerance and Minimizing Delay in Virtual Network Embedding using NSGA-II |
1570127411 |
Correlation based Feature Selection for Diagnosis of Acute Lymphoblastic Leukemia |
1570146319 |
Experimental evaluation of Multipath TCP with MPI |
1570144343 |
Comparative Study of Pitch Contour for Mentally Impaired |
1570146627 |
A computational approach of Data Smoothening and Prediction of Diabetes Dataset |
1570144847 |
Learning to Grade Short Answers using Supervised Machine Learning Techniques |
1570139305 |
High performance SIFT features clustering of VHR satellite images for disaster management |
1570144333 |
Anomalies in Landsat Imagery and Imputation |
1570146373 |
Comparative study of visual attention models with human eye gaze in remote sensing images |
1570138955 |
An Analogy of F0 Estimation Algorithms Using Sustained Vowel |
1570144327 |
Analog BIST for Capacitive MEMS Sensor using PLL |
1570147535 |
Secure E-ticketing System based on Mutual Authentication using RFID |
1570145727 |
Blending Concept Maps with Online Labs (OLabs): Case Study with Biological Science |
1570144613 |
Automatic Book Spine Extraction and Recognition for Library Inventory Management |
1570142015 |
Applications of Text Detection and its Challenges A Review |
1570139071 |
Discourse Translation from English to Telugu |
1570139639 |
Teaching Advanced Algebra to Engineering Majors: Dealing with the classroom challenges |
1570143833 |
Gaussian based a trous algorithm for multiresolution image fusion |
1570133917 |
Identifying Health Domain URLs using SVM |
1570146535 |
Distributed Multi Class SVM for Large Data Sets |
1570143747 |
Survey on Tag SNP selection methods using soft computing techniques |
1570146285 |
Is That Twitter Hashtag Worth Reading |
1570147741 |
Is Stack Overflow Overflowing With Questions and Tags |
1570144485 |
A Secure Image-Based Authentication Scheme Employing DNA Crypto and Steganography |
1570144371 |
Illumination Invariant Video Text Recognition using Contrast Limit Adaptive Histogram Equalization |
1570142617 |
Rainfall Prediction using Artificial Neural Network on Map-Reduce Framework |
1570112607 |
A Robust and Light Weight Authentication Framework for Hadoop File System in Cloud Computing Environment |
1570114659 |
A Secure and Light Weight Authentication and Key Establishment Framework for Wireless Mesh Network |
1570141247 |
A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem |
1570137507 |
Comparative Study of Personality Models in Software Engineering |
1570146309 |
SQAMPS: Secure quorum architecture for mobile presence services with end-to-end encryption |
1570132551 |
A Control Mechanism for Power Management of Electrical Devices Using Android Phone in a Zigbee Network |
1570144237 |
Physical to Virtual Migration of Ubuntu System on OpenStack Cloud |
1570145055 |
A Mobile Crowd Sensing Framework for Toll Plaza Delay Optimization |
1570144895 |
Detection of Stealth Process using Hooking |
1570144207 |
Graph Clustering for Large-Scale Text-Mining of Brain Imaging Studies |
1570144069 |
Content Based Audiobooks Indexing using Apache Hadoop Framework |
1570144889 |
Mathematics Tutoring Apps for Low-Cost Devices: an Ethnographic Study of Requirements |
1570138799 |
Copy-Move forgery detection based on Harris Corner points and BRISK |
1570143757 |
An Integrated Digital Image Analysis System for Detection, Recognition and Diagnosis of Disease in Wheat Leaves |
1570143899 |
Maestro Algorithm for Sentiment Evaluation |
1570140827 |
Fusion Mechanism for Multimodal Biometric System-Palmprint and Fingerprint |
1570133389 |
Integrating Apriori with paired k-means for Cluster fixed mixed data |
1570143791 |
MACO: Modified ACO for reducing travel time in VANETs |
1570144561 |
Robust and Adaptive Approach for Human Action Recognition Based on Weighted Enhanced Dynamic Time Warping |
1570138363 |
StegTrack: Tracking images with hidden content |
1570144427 |
Steganography using Cuckoo Optimized Wavelet Coefficients |
1570144005 |
Modeling Evolutionary Group Search Optimization Approach for Community Detection in Social Networks |
1570135083 |
A Theoretical Model for Big Data Analytics using Machine Learning Algorithms |
1570138843 |
An Efficient Low Power & High Performance in SOC |
1570135017 |
Prognosis and Disclosure of Functional Modules from Protein-Protein Interaction Network |
1570146293 |
Time and Energy Saving through Computation Offloading with Bandwidth Consideration for Mobile Cloud Computing |
1570138941 |
Effect of Spam Filter on SPOT Algorithm |
1570138899 |
Truthful Resource Allocation Detection Mechanism for Cloud Computing |
1570143939 |
Two Phase Static Analysis Technique for Android Malware Detection |
1570119823 |
Multi Layer Versus Functional Link Single Layer Neural Network for Solving Nonlinear Singular Initial Value Problems |
1570146343 |
An unsupervised approach for morphological segmentation of highly agglutinative Tamil language |
1570142055 |
Post Release Versions based Code Change Quality Metrics |
1570143993 |
A Routing Protocol for Detecting Holes in Wireless Sensor Networks with Multiple Sinks |
1570134691 |
Cognitive Radio for Smart Home Environment |
1570144731 |
A Web Metric Collection and Reporting System |
1570138965 |
Smart and Secure Monitoring of Industrial Environments using IoT |
1570147579 |
Analysis of behaviour of Synchronizer |
1570140321 |
Prioritization of Classes for Refactoring: A Step towards Improvement in Software Quality |
1570146359 |
Language Modelling and English Speech Prediction System to Aid People with Stuttering Disorder |
1570133659 |
Condition Monitoring in Roller Bearings using Cyclostationary Features |
1570149251 |
An Efficient Way to Determine the Chromatic Number of a Graph Directly from its Input Realizable Sequence |
1570144049 |
Identifying Effective Software Metrics for Categorical Defect Prediction Using Structural Equation Modeling |
1570076813 | Computing the Prestige of a journal: A Revised Multiple Linear Regression Approach |
1570139783 |
Study of performer of Promotion adopting hit phenomenon analysis based on the post on the Web using the Twitter |
1570173005 | Hallmarking Author Style From Short Texts By Multi-Classifier Using Enhanced Feature Set |