default search action
ICIA 2016: Pondicherry, India
- V. Akila, N. Sivakumar, K. Saruladha, G. Zayaraz, E. Ilavarasan:
Proceedings of the International Conference on Informatics and Analytics, ICIA 2016, Pondicherry, India, August 25-26, 2016. ACM 2016, ISBN 978-1-4503-4756-3 - K. Sujatha, R. S. Ponmagal, Thiagarajan Godhavari:
Automation of Solar System for Maximum Power Point Tracking using IoT. 1:1-1:8 - T. Neelima Chowdary, P. Prudhvi Raj, Ch. Anupama, D. Haritha:
Location & User Profile based Mobile Application Access. 2:1-2:8 - Amit Kumar Tyagi, Niladhuri Sreenath:
Providing Trust Enabled Services in Vehicular Cloud Computing. 3:1-3:10 - R. Bala, N. P. Gopalan:
Security Enhancement using a modified AES algorithm. 4:1-4:5 - B. Umamageswari, R. Kalpana:
Web Data Extraction from Retailers' Site using Semantic Density and Case Based Reasoning. 5:1-5:5 - S. Urmela, Malaiyappan Nandhini:
Appraisal of homogeneous techniques in Distributed Data Mining: classifier approach. 6:1-6:6 - Vanita Jain, Shriya Gupta, Tanuj Ahuja:
Monitoring the odd-even car rationing scheme phase 2.0 in Delhi. 7:1-7:14 - J. I. Sheeba, S. Pradeep Devaneyan:
Recommendation of Keywords using Swarm Intelligence Techniques. 8:1-8:5 - Vaithianathan Geetha:
Smart Sensing based Societal Applications in Public Cloud Environment. 9:1-9:6 - V. Uma, L. M. Nikhila, Gnanasekaran Aghila:
RaTeR: Search Plugin supporting Temporal Operators based Information Retrieval. 10:1-10:6 - Upendra Kumar, Samir Kumar Pandey:
Dynamic Model on DDoS Attack in Computer Network. 11:1-11:5 - D. Puttegowda, M. C. Padma:
Human Motion Detection and Recognising their Actions from the Video Streams. 12:1-12:5 - Kshitij Tayal, Vadlamani Ravi:
Particle Swarm Optimization Trained Class Association Rule Mining: Application to Phishing Detection. 13:1-13:8 - K. Uma Pavan Kumar, S. Saraswathi:
FSA and NLP based Un-supervised non template Web data extraction in the construction Of Dynamic Ontology. 14:1-14:8 - Neenu George, K. Chandrasekaran, A. Binu:
Optimization-Aware Scheduling in Cloud Computing. 15:1-15:5 - A. Samson, N. P. Gopalan:
Software Defined Networking: Identification of Pathways for Security Threats. 16:1-16:6 - Gutha Jaya Krishna, Vadlamani Ravi:
Outlier Detection using Evolutionary Computing. 17:1-17:6 - Soumen Kanrar:
Dimension Compactness in Speaker Identification. 18:1-18:6 - Balaji Chandrasekaran, Ramadoss Balakrishnan:
Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment. 19:1-19:4 - Ramgopal Kashyap, Pratima Gautam:
Fast Level Set Method for Segmentation of Medical Images. 20:1-20:7 - S. Balamurugan, S. Saraswathi:
A Comprehensive Survey on Workflow Scheduling Algorithms in Various Environments. 21:1-21:6 - Pranjal S. Bogawar, Kishor K. Bhoyar:
Soft Computing Approaches to Classification of Emails for Sentiment Analysis. 22:1-22:7 - L. Swetha, G. Muneeswari:
A Survey on Wearable Computers: Human Computer Interface. 23:1-23:5 - Suganya Viswanathan, Baskaran Ramachandran, Deivamani Mallayya:
Navigation Framework for Autonomous Mobile Robots. 24:1-24:6 - B. Sathiya, T. V. Geetha:
Semantic Querying based Concept Hierarchy Construction for Ontology Learning. 25:1-25:6 - V. Priya, K. Umamaheswari:
Ensemble based Parallel k means using Map Reduce for Aspect Based Summarization. 26:1-26:9 - Bharati Ainapure, Deven Shah, A. Ananda Rao:
Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment. 27:1-27:6 - Vijay Kumar Sharma, Namita Mittal:
Exploring Bilingual Word Vectors for Hindi-English Cross-Language Information Retrieval. 28:1-28:4 - Mithlesh Arya, Namita Mittal, Girdhari Singh:
Cervical Cancer Detection Using Segmentation on Pap smear Images. 29:1-29:5 - Shomona Gracia Jacob, R. Athilakshmi:
Extraction of Protein Sequence features for Prediction of Neuro-degenerative Brain Disorders: Pioneering the CGAP database. 30:1-30:4 - Anurag, Deepak Arora, Upendra Kumar:
Protecting Sensitive Warehouse Data through UML based Modeling. 31:1-31:6 - Harsha Gwalani, Namita Mittal, Ankit Vidyarthi:
Classification of brain tumours Using Genetic Algorithms as a Feature Selection Method (GAFS). 32:1-32:5 - Sk. Kamaruddin, Vadlamani Ravi:
Credit Card Fraud Detection using Big Data Analytics: Use of PSOAANN based One-Class Classification. 33:1-33:8 - R. Sathya Bama Krishna, M. Aramudhan:
Unsupervised Spectral Sparse Regression Feature Selection using Social Media Datasets. 34:1-34:5 - Bhukya Krishna Priya, Amit D. Joshi, N. Ramasubramanian:
A Survey on Performance of On-Chip Cache for Multi-core Architectures. 35:1-35:7 - Manoj Kumar, Manikandan, Malaya Kumar Nath:
Detection of Microaneurysms and Exudates from Color Fundus Images by using SBGFRLS Algorithm. 36:1-36:6 - Sannasy Muthurajkumar, Muthuswamy Vijayalakshmi, Arputharaj Kannan:
Resource Allocation Between Temporal Cloud Database and User Using Access Control. 37:1-37:4 - Pavan Kumar Mishra, Sudhakar Pandey:
A Method for Mode Selection in a dynamic network for Device-to-Device Communication for 5G. 38:1-38:6 - Jayalatchumy Dhanpal, Thambidurai Perumal, Udhayakumaran:
Efficient Graph Clustering Algorithm and its use in Prediction of Students Performance. 39:1-39:5 - Vaishali P. Patel, Ashish Tiwari, Amit Patel:
Variable strategy ensemble artificial bee colony algorithm for automatic data clustering. 40:1-40:10 - Reena, Raman Kumar:
Effect of Randomization for Privacy Preservation on Classification Tasks. 41:1-41:5 - G. Preethi, N. P. Gopalan:
Integrity Verification For Outsourced XML Database In Cloud Storage. 42:1-42:5 - N. Poonguzhali, M. Ezhilarasan:
A Hybrid Template Protection Technique for Fingerprint Biometric Authentication System. 43:1-43:6 - Leena Mary Francis, K. C. Visalatchi, N. Sreenath:
End to End Text Recognition from Natural Scene. 44:1-44:5 - K. Kanagaraj, S. Swamynathan:
A Study on Performance of Dominant Scheduling Algorithms on Standard Workflow Systems in Cloud. 45:1-45:6 - D. Jagadiswary, D. Saraswady:
Multimodal Biometric Fusion Using Image Encryption Algorithm. 46:1-46:5 - Aniruddha Kanhe, Gnanasekaran Aghila:
DCT based Audio Steganography in Voiced and Un-voiced Frames. 47:1-47:4 - R. Hema, T. V. Geetha:
Mining Chemical Information in Various Forms: A Review. 48:1-48:9 - Salil Dabholkar, Yuvraj Patadia, Prajyoti Dsilva:
Automatic Document Summarization using Sentiment Analysis. 49:1-49:6 - K. Chitra, V. Prasanna Venkatesan:
Spatial Domain Watermarking Technique: An Introspective Study. 50:1-50:6 - M. Auxilia, K. Raja:
Knowledge Based Security Model for Banking in Cloud. 51:1-51:6 - M. Thirumaran, R. Padmanaban, J. Nandhini:
Security Validation Using Linear Bounded Automata in Web Service Environment. 52:1-52:9 - Yasir Hamid, M. Sugumaran, Ludovic Journaux:
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis. 53:1-53:6 - Ningombam Anandshree Singh, Khundrakpam Johnson Singh, Tanmay De:
Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection. 54:1-54:9 - K. Senthil Kumar, K. Venkatalakshmi, K. Karthikeyan, A. Jasiya Jabeen:
Experimental Study of Optimization Algorithms for Breast Cancer Recognition by Means of Ultrasound Images. 55:1-55:8 - P. V. Sabiq, D. Saraswady:
Performance Evaluation of Analysis Filter Bank Based Spectrum Sensing in Multipath Fading Channel. 56:1-56:6 - M. Chitra, S. Siva Sathya:
Bidirectional Data Dissemination in Vehicular Ad Hoc Networks using Epidemic Spreading Model. 57:1-57:8 - Sandeep U. Mane, Ketaki H. Pangu:
Disease Diagnosis Using Pattern Matching Algorithm from DNA Sequencing: a Sequential and GPGPU based Approach. 58:1-58:5 - V. Balaji, K. S. Kuppusamy:
Accessibility Evaluation of Indian Railway Websites. 59:1-59:6 - S. Janardhanam, K. Venkatalakshmi:
Optimized color image watermarking using improved firefly algorithm. 60:1-60:8 - Ebin Deni Raj, L. D. Dhinesh Babu, Ezendu Ariwa:
A Fuzzy Approach to Centrality and Prestige in Online Social Networks. 61:1-61:6 - Valliyammai Chinnaiah, K. Bharathwajan:
An Efficient Management of Resources in Cloud using Supervised Learning. 62:1-62:6 - S. Geetha, J. Madhusudanan, M. Krishnamoorthy, V. Prasanna Venkatesan:
Design of Emotions context based Smart ATM Environment. 63:1-63:6 - S. Kalaivanan, R. Kalpana:
Non Uniform Area Coverage (NUAC) for an agricultural robot based on grid decomposition. 64:1-64:5 - Vaishali P. Patel, Ashish Tiwari, Amit Patel:
A comprehensive survey on hybridization of artificial bee colony with particle swarm optimization algorithm and ABC applications to data clustering. 65:1-65:9 - R. Preeth, R. Mohan, Ashwini Kumar Badal:
Self Localization and Routing in densely deployed wireless networks using LAS Algorithm. 66:1-66:6 - Padmashree Desai, Jagadeesh Pujari, Anita Kinnikar:
An Image Retrieval using combined approach Wavelets and Local Binary Pattern. 67:1-67:6 - G. Sumathi, Sendhilkumar Selvaraju, G. S. Mahalakshmi:
Hybrid Recommendation System using Particle Swarm Optimization and User Access Based Ranking. 68:1-68:9 - B. S. Rashmi, H. S. Nagendraswamy:
Abrupt Shot Detection in Video using Weighted Edge Information. 69:1-69:5 - T. Sudhakar, V. Natarajan, A. Kannathal:
Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks. 70:1-70:5 - Radhakrishnan Maivizhi, Sendhilkumar Selvaraju, G. S. Mahalakshmi:
A Survey of Tools for Community Detection and Mining in Social Networks. 71:1-71:8 - A. Sivagnana Ganesan, T. Chithralekha:
A Survey on Survey of Migration of Legacy Systems. 72:1-72:10 - B. Priayoheswari, Kanagasabai Kulothungan, Arputharaj Kannan:
Beta Reputation and Direct Trust Model for Secure Communication in Wireless Sensor Networks. 73:1-73:5 - S. Tiroumalmouroughane, P. Thambidurai:
Automatic Policy Based Web Service Integration Using Ontology. 74:1-74:7 - Sanjoy Mondal, Saurav Ghosh, Utpal Biswas:
A Dominating Set Based Data Gathering in Wireless Sensor Network using Fuzzy Logic and ACO. 75:1-75:8 - P. J. Arathy, Vrinda V. Nair:
Analysis of Spoofing Detection using Video Subsection Processing. 76:1-76:6 - K. Kamala Kannan, R. Baskaran:
Fault Tolerant Event Subscription Model for Smart Communities. 77:1-77:6 - D. Natarajasivan, M. Govindarajan:
Location Based Context Aware user Interface Recommendation System. 78:1-78:6 - Vadisala Jyothi, V. Valli Kumari:
Privacy Preserving in Dynamic Social Networks. 79:1-79:8 - Sangeetha Muthuraman, V. Prasanna Venkatesan:
Design of QOS based Web Service Selection/Composition Hyper-Heuristic Model. 80:1-80:10 - Irom Lalit Meitei, Khundrakpam Johnson Singh, Tanmay De:
Detection of DDoS DNS Amplification Attack Using Classification Algorithm. 81:1-81:6 - Sangeetha Muthuraman, V. Prasanna Venkatesan:
Qualitative and Quantitative Review of QOS based Web Services Selection and Composition Techniques. 82:1-82:12 - K. P. Sanal Kumar, R. Bhavani:
Analysis of SVM and kNN Classifiers For Egocentric Activity Recognition. 83:1-83:5 - S. Sankari, Sundan Bose:
A Detailed Survey on Recent Trends in Secure XML Labeling Schemes. 84:1-84:6 - Ashutosh Upadhyay, Mayank Dave:
Fuzzy-BPN Based Improved Technique for Color Image Watermarking. 85:1-85:10 - Justine Raju Thomas, Santosh Kumar Bharti, Korra Sathya Babu:
Automatic Keyword Extraction for Text Summarization in e-Newspapers. 86:1-86:8 - Gunikhan Sonowal, K. S. Kuppusamy:
MASPHID: A Model to Assist Screen Reader Users for Detecting Phishing Sites Using Aural and Visual Similarity Measures. 87:1-87:6 - G. S. Tamizharasi, B. Balamurugan, R. Manjula:
Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing. 88:1-88:4 - Candy Lalrempuii, Namita Mittal:
Sentiment Classification of Crisis Related Tweets using Segmentation. 89:1-89:6 - Dipankar Deb, Nabendu Chaki:
A Framework towards Generating Effective Business Process Model by Goal based Pruning. 90:1-90:4 - T. Hema, K. S. Easwarakumar:
On Higher Dimensional Window Query: Revisited using BITS-Tree. 91:1-91:6 - Naveen Kumar, S. Siva Sathya:
COPMOC: Co-location Pattern Mining Using Map Overlay and Clustering Techniques. 92:1-92:8 - G. Manju, T. V. Geetha:
Academic Tweet Classification with Spreading activation based Label propagation algorithm using Tweet centric features. 93:1-93:9 - Adrija Bhattacharya, Sankhayan Choudhury:
An Efficient Service Selection Approach through a Goodness Measure of the Participating QoS. 94:1-94:6 - Sreejit Panicker, Smita Selot, Manisha Sharma:
Fusion of Structural and Textural Facial Features for Generating Efficient Age Classifiers. 95:1-95:6 - Thompson Stephan, K. Suresh Joseph:
PSO assisted OLSR Routing for Cognitive Radio Vehicular Sensor Networks. 96:1-96:8 - Tanistha Nayak, Tirtharaj Dash, D. Chandrasekhar Rao, Prabhat K. Sahu:
Evolutionary Neural Networks versus Adaptive Resonance Theory Net for Breast Cancer Diagnosis. 97:1-97:6 - Udaya Dayanandan, K. Vivekanandan:
An Empirical Evaluation model for Software Architecture Maintainability for Object oriented Design. 98:1-98:4 - P. Pavan Kumar, Ch. Satyanarayana, A. Ananda Rao, P. Radhika Raju:
Task Reprocessing on Real-Time Multicore Systems. 99:1-99:6 - Vimalkumar Kumaresan, Ramachandran Baskaran:
AEGEUS: An online partition skew mitigation algorithm for mapreduce. 100:1-100:8 - C. N. Umadevi, N. P. Gopalan:
Fully Homomorphic Symmetric Key Encryption with Smith Normal Form for Privacy Preserving Cloud Processing. 101:1-101:5 - Somya Gupta, Namita Mittal, Alok Kumar:
Rake-Pmi Automated Keyphrase Extraction: An unsupervised approach for automated extraction of keyphrases. 102:1-102:6 - G. Santhi:
An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETs. 103:1-103:5 - Jayaraj Jayabharathy, R. Kavitha Kumar, J. Kanimozhi:
Integrated Framework for Speech Categorization based on Clustering in Dynamic Environment. 104:1-104:6 - Karthi Govindharaju, M. Ezhilarasan:
Securing Biometric Template using a Hybrid Scheme. 105:1-105:5 - P. Maragathavalli, S. Kanmani:
Incorporating Equivalence Partitioning on Classification Trees for Test Suite Size Reduction. 106:1-106:8 - N. K. Sakthivel, N. P. Gopalan, S. Subasree:
A Comparative Study and Analysis of DNA Sequence Classifiers for Predicting Human Diseases. 107:1-107:5 - S. Subasree, N. P. Gopalan, N. K. Sakthivel:
A Comparative Study and Analysis of Data Mining Classifiers for Microarray based Cancer Pattern Diagnostics. 108:1-108:5 - A. Kannaki VasanthaAzhagu, J. M. Gnanasekar:
Cloud Computing Overview, Security Threats and Solutions-A Survey. 109:1-109:6 - Radha Senthilkumar, R. Deepika, R. Saranya, M. Deepak Govind:
Generating Adaptive Partially Ordered Sequential Rules. 110:1-110:8 - S. Karthika, Sundan Bose:
IBeH: Naïve Community Detection Methodology for Dark Social Network. 111:1-111:4 - Naima Vahab, K. V. Neethu, R. Binu, Sinoy Mathew, Lokanath Khamari:
An NLP based Information Extraction System for Patents. 112:1-112:3 - Ashwini Kinnikar, Moula Husain, S. M. Meena:
Face Recognition Using Gabor Filter And Convolutional Neural Network. 113:1-113:4 - A. Christiyana Arulselvi, Sendhilkumar Selvaraju, G. S. Mahalakshmi:
Provenance based Trust computation for Recommendation in Social Network. 114:1-114:7 - Loganathan Jayakumar, Thamarai Pugazhendhi Latchoumi, S. Janakiraman, Latha Parthiban:
A Novel Multi-Criteria Channel Decision in Co-operative Cognitive Radio Network Using E-TOPSIS. 115:1-115:6 - Thamarai Pugazhendhi Latchoumi, Loganathan Jayakumar, Latha Parthiban, S. Janakiraman:
OFS Method for Selecting Active Features using Clustering Techniques. 116:1-116:4 - Munuswamy Selvi, Rajasekar Logambigai, Sannasi Ganapathy, L. Sai Ramesh, Harichandran Khanna Nehemiah, Kannan Arputharaj:
Fuzzy Temporal Approach for Energy Efficient Routing in WSN. 117:1-117:5 - Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.:
A Survey on Denial of Service Attacks and Preclusions. 118:1-118:10 - R. Padmanaban, M. Thirumaran, K. Suganya, R. Vishnu Priya:
AOSE Methodologies and Comparison of Object Oriented and Agent Oriented Software Testing. 119:1-119:16 - A. Vinay, Vinay S. Shekhar, Vasudha S. Shekar, S. Natarajan, K. N. Balasubramanya Murthy:
A Sparse and Inlier Based SIFT and SURF Features for Automated Face Recognition. 120:1-120:8 - Sonia Prasad, Shubham Jaiswal, N. S. V. Shet, P. Sarwesh:
Energy Aware Routing Protocol for Resource Constrained Wireless Sensor Networks. 121:1-121:7 - K. Venkatachalapathy, A. Vijay Vasanth, T. Sowmia, V. Ohmprakash:
Cache Routing and Cache Optimization Technique to Improve Time-to-Live Quality of Nodes in the Mobile Ad-HOC Network (MANET) Using Proactive Routing Protocol. 122:1-122:5 - S. Gunasekaran, L. Sai Ramesh, S. Sabena, K. Selvakumar, Sannasi Ganapathy, Arputharaj Kannan:
Dynamic Scheduling Algorithm for Reducing Start Time in Hadoop. 123:1-123:4 - K. Venkatachalapathy, T. Kamaleshwar, D. Sundaranarayana, V. Ohm Prakash:
An Effective Framework with N-Client Transfer Dataset for Weather Prediction Using Data Mining Techniques. 124:1-124:6 - N. Hema, K. G. Srinivasa, Saravanan Chidambaram, Sandeep Saraswat, Sujoy Saraswati, Ranganath Ramachandra, Jayashree B. Huttanagoudar:
Performance Analysis of Java Virtual Machine for Machine Learning Workloads using Apache Spark. 125:1-125:7 - Stephan Punitha, Ravi Subban, M. Anusouya Devi, Jothimani Vaishnavi:
Computer Aided Mammography Techniques for Detection and Classification of Breast Cancers. 126:1-126:8 - T. Megala, Moganti Kashyap, K. Vivekanandan:
Clonal Selection Algorithm with Adaptive Lévy Mutation Operator. 127:1-127:5 - M. Thirumaran, N. Sivakumar, P. Banupriya, T. Bhargavi:
Self-Regulating Interactive Voice Response System Using Backpatching Technique. 128:1-128:8 - Rajeswari Sridhar, S. R. Surya Dev, V. Sankar, K. Sivakumar:
Automatic Tamil Lyric Generation based on neuro-linguistics. 129:1-129:9 - K. Kouser, B. S. Rashmi, Lalitha Rangarajan:
Entropy Based Feature Selection for Lacunarity Analysis of Position Specific Motif Matrices of Promoter Sequences. 130:1-130:6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.