ISSN 23499842(Online), Volume 1, Special Issue 2(ICITET'15), March 2015

International Conference on Innovative Trends in Engineering and Technology

 

Title and Authors

Download

1

 Automatic extraction of social interference system  using big data analysis with   emergency alert,
M.Sharmila Afireen, K.Rajesh kambattan

ijitet
2

A highly reconfigurable fft architecture for 3G/4G technologies,
P.Nathiya, G.Mohankumar

ijitet
3

A high-speed low-complexity modified radix – 25 fft processor for high rate UWB applications,
Nizamudhin R, V.Sarada

ijitet
4

A new vlsi architecture of efficient radix based modified booth multiplier with reduced complexity,
Karthick .K, Mr. S. Bharath

ijitet
5

A Novel Encoding Method for DSRC Application to Obtain Efficient Performance,

S.Devika, S.Lavanya

ijitet
6

A scrutiny of association rule mining algorithms,
M. Madhankumar, Dr. C. Sureshganadhas

ijitet
7

A skyline query based effective assess over incomplete independent databases
Mrs.J.Sridevi, Mr.A.Sairam, Dr.C.Suresh Gnana Dhas

ijitet
8

A study on low resolution androgenic hair patterns  for criminal and victim identification,
Mrs.B.Nithiya, A.Leela Mary, N.Priyanka

ijitet
9

Accident avoidence based on predecessor and successor vehicle speed with privacy preserving navigation using chord algorithm,
C. Arokia mary, A.M. Arulraj

ijitet
10

An efficient approach for reduced power consumption and diagnosis of faulty power switches using a random test pattern generation,
S. Sathiyapriya, S.Lavanya

ijitet
11

An FGPA implementation of a synchronized bi-lateral filter for image processing,
Manoj kumar.D, Mrs. Kasthuri bha .J.K

ijitet
12

An optimized placement and routing algorithm for configurable element in FPGA using error propagation analysis,
J.Tamizhilakkiya, Shana Varghese

ijitet
13

Analysis of delay locked loop used in dram interface for high speed in MHz range of frequency,
Narayanlal anand, K.Suganthi

ijitet
14

Autonomous e-agricultural robot,
A.Saravanan, Ancy vinobha.G, Anisha banu.A, Dyanandhi.G

ijitet
15

Brain controlled and environmental auto-adjustment smart home network,
S.Pradeep, V.Padmajothi

ijitet
16

Ciphertext-policy attribute-based encryption for secure mobile applications in cloud,
S. Angel leola sruthi, A.Umamageswari

ijitet
17

Code security by confusing logic flow using self modifying code,
Mr.P.Ashok kumar, Mr R.Manikandan

ijitet
18

Compressed domain data hiding approach on encrypted images using PPM
Miss. A. Premalatha, Mr. N. Sivanesan

ijitet
19

Data monitoring and Data logging for Reclaimer using Wireless Mesh Network, A
Priyadarshini, R Vaishnavi, Dr.R. Sabitha

ijitet
20

Decentralised disruption tolerant military network for retrieval of data,
Parthiban V, Praveen Kumar J,Ramprasanth R, Sriram k, Saravanan A, Lalitha   

ijitet
21

Design of hybrid system (wind and light) using reflector for isolated areas,
A.saravanan, Kalpana S, K.Vinodha, D.Nivedha

ijitet
22

Design of low power memories by mitigating clock driven,
S.Nandhini, S.Vijayaraghavan

ijitet
23

Design of nocs to avoid deadlock problem in on-chip buses,
N.Priyadharshini, S.Kalaiselvy

ijitet
24

Detection of camera based attacks on mobile phones  using lightweight defense  application,
M. Revathi, R. Roja, S. Sowmiya

ijitet
25

Detection of multiple cell upsets in memory for enhanced protection,
E. Lavanya, J. Dhanapathi

ijitet
26

Dual watermarking system based medical data protection for telemedicine, application,
Miss. V.J.Muthulakshmi,  Mr. N. Sivanesan

ijitet
27

Duplication avoidance mechanism for storing data in hybrid cloud,
Chandra kala G , Priyanka P, Sowmya C M, Paul Jasmine Rani L,Saravanan A

ijitet
28

Dynamic data and policy based access control scheme for relational data,
Mrs.N.M.Indumathi, Mrs.M.Mohanasundari

ijitet
29

Edge detection using quad tree mechanism for CT, CR & MRI,
 S.Arthi, V.Dhivya, Mr. S. Sundar rajan,

ijitet
30

Efficient execution of jobs in grid environment,
M.Fathimajelina,G Gayathri, G.Arun kumar

ijitet
31

Energy efficient task allocation using mutant particle swarm,
optimization in WSN, R.Dayana, S.Kumaran

ijitet
32

Energy Saver Application On Android By Providing Voice Alert,
R.Soundarya, R.Sudha, R.Vedha

ijitet
33

Enhanced hiding in encrypted video using paillier techniques,
D.Anbuselvi,  N.Indhu,  Angelin Buelah

ijitet
34

File searching in opportunistic networks based on interest casting
C.Muthusangari, S.Princy sophia Rani

ijitet
35

Finger vein based driver authentication and alertness system using GSM
Naveen M, Sudarvizhi.S

ijitet
36

Highly decomposed cordic based low complexity dct architecture for image processing applications,
D. Sathiyapragasam, V.Anandkumar

ijitet
37

Illuminance control of a led lighting network using back propagated neural network
A.P. Jaya Muruga raja, V.Meenakshi

ijitet
38

Image binaryzation and lossless compression of ancient documents using SPIHT algorithm,
Bhavani. S, Thumilvannan P.S,

ijitet
39

Implementation of dll to reduced jitter in dram,
A. Loganathan, R. Ramesh

ijitet
40

Implementation of trace buffer signal state detection of FPGA,
S. Suriyapriya, P. Sathiya

ijitet
41

Improve of Delay Locked Loop for Image Texture sorting Method,
R.Radha, A.Saravanan

ijitet
42

Low complexity multiple bit error correcting parallel hamming decoder
V. Veeraragavendiran, T. Pushkala

ijitet
43

Low power clock tree synthesis using clustering algorithm,
P.Selvan, U.Ragavendran

ijitet
44

Multimedia messaging service (MMS) based anti-theft application
R. Archana, E.G. Bhuvaneshwari, T. Hemavatha

ijitet
45

Multiple defects diagnosis using fault element graph,
A. Manickam, V.Anandkumar

ijitet
46

Natural visual secret sharing scheme for sharing multiple forms of images in a network,
D.Pavithra, M.Ferni Ukrit

ijitet
47

Problems arrangements using genetic algorithms solution method,
D.Sangeetha, D.Shobana, K.Sowmia, O.Sandhya

ijitet
48

Product Aspect Ranking Using Probabilistic Aspect Ranking Algorithm

S. BharathiKannamma, R. Hanitha, H. Manochitra, D. Loganayaki

ijitet
49

Providing source privacy in wireless sensor network using message authentication scheme based on elliptic curve cryptography,
Selvarajan J, Arrvind M, Hemakumar B, Jagadeesan M, Dr. D Jayashree, B.Udaya

ijitet
50

Replication of selfishnode overmanet based on one to one optimization
Mahendran.K

ijitet
51

Reversible data hiding using AES algorithm,
Mohanapriya.s, Pradeepa.A , Sindhu.S, Gnanavel.R

ijitet
52

Reversible water marking algorithm based on embedding pixel,
Mrs.K.Subha, D.Gomathi, V.T.Harshini

ijitet
53

Robust scan flip flop technique for secured advanced encryption standard
D. Umesh, K.Ramesh

ijitet
54

Robust scan technique for secured aes against differential cryptanalysis based side channel attack,
A.Tamilarasan, Mr.A.Anbarasan

ijitet
55

Scalable and secure sharing of  records in cloud computing using attribute-based encryption,
Mrs.M.Sreemaa, K.Somakrishnan, E.Shabiulla

ijitet
56

Secure way of data transmission over wireless sensor networks

Amal M John, Suresh B, Vasanth J, Vijay Chandhar S.S , Geetha M, Saranya A

ijitet
57

Security and privacy preserving data sharing using anonymous identity assignment(AIDA),
B Tulasi, N.Pavithra Sahari, M Geetha, O. Pandithurai

ijitet
58

Security of obfuscated sensitive data with adversary knowledge in network environment using MD5 algorithm,
Bhagat sushil S, Surendra Bharathi V D, Vasantha Kumar V, Udaya B

ijitet
59

Stable throughput in cognitive radio networks using perfect sensing technique
S.Kumaran, R.Dayana

ijitet
60

Underwater wireless optical communication using monte carlo simulation
M.R.Dinesh Kumar, Mrs.C.Manjula

ijitet
61

User authentication and vehicle control using ARM controller
S. Dhivyaprabhandhan, A. Suvarnamma

ijitet
62

VLSI implementation of high performance distributed arithmetic (DA) based adaptive filter with fast convergence factor,
G. Parthiban, P.Sathiya

ijitet