Special Issue
September 2017

Contents

  Preface
 
   
  Title
Pages
   
1. HYBRID DATA APPROACH FOR SELECTING EFFECTIVE TEST CASES DURING THE REGRESSION TESTING
    M. Mohan and Tarun Shrimali
1 – 24
      Abstract Abstract (158 kB)   Abstract Full paper (426 kB)
             
             
2. PERFORMANCE EVALUTION OF VIDEO SURVEILLANCE USING METE, MELT AND NIDC TECHNIQUE
    M.Anto Bennet, R.Srinath, D Abirami, S.Thilagavathi, S Soundarya and R.Yuvarani
25 – 45
      Abstract Abstract (159 kB)   Abstract Full paper (893 kB)
             
             
3. EFFICIENT APPROACHES FOR DESIGNING THE LOGICAL REVERSIBILITY OF COMPUTATION
   

M Anto Bennet, T.Mari Selvi, S.Mohana Priya ,S.Monica and R.Kanimozhi

46 – 61
      Abstract Abstract (156 kB)   Abstract Full paper (893 kB)
             
             
4. AN ANTI-EMULATION STRUCTURE FOR INTERNET DESPOSITORY USING SECURED IMAGE VALIDATION SCHEME
    Anupriyan K, Santhosh kumar and Nagaraj N
62 – 68
      Abstract Abstract (157 kB)   Abstract Full paper (296 kB)
           
           
5. ANDROID BASED HOME AUTOMATION AND ENERGY CONSERVATION
   

M.Anto Bennet, B.Thamilvalluvan, C.A.Hema Priya, B.Bhavani and M.Shalini

69 – 86

      Abstract Abstract (159 kB)   Abstract Full paper (688 kB)
           
           
6. DESIGN AND IMPLEMENTATION OF DUAL-BAND CIRCULARLY POLARIZED ANTENNAS USING STACKED PATCHES
    S Sankaranarayanan, M.Anto Bennet, B.Deepa, A.Banu and S.Gayathri

87 – 100

      Abstract Abstract (159 kB)   Abstract Full paper (1199 kB)
           
           
7. A MEMORY EFFICIENT HARDWARE BASED PATTERN MATCHING AND PROTEIN ALIGNMENT SCHEMES FOR HIGHLY COMPLEX DATABASES
   

M.AntoBennet,S.Sankaranarayanan,M.Deepika, N.Nanthini, S.Bhuvaneshwari and M.Priyanka

101 – 122
      Abstract Abstract (160 kB)   Abstract Full paper (711 kB)
           
             
8. INSTANCE VEHICLE MONITORING AND TRACKING WITH INTERNET OF THINGS USING ARDUINO
    Dhanalakshmi and A.Ezil Sam Leni
123 – 135
      Abstract Abstract (197 kB)   Abstract Full paper (700 kB)
             
             
9. DETECTING IP BASED ATTACK ON CLOUD SERVER USING PASSIVE IP TRACEBACK
    Divakar V and Vijayarangam S
136 – 146
      Abstract Abstract (158 kB)   Abstract Full paper (410 kB)
             
             
10. DETECTION AND REMOVAL OF DUST PARTICLES IN PIPELINES USING 3-D MEMS
    B.Thamilvalluvan, M.Anto Bennet, K.Gokulakrishnan, S.Harrison, R.Shanmugam and B.Mangaram
147 – 162
      Abstract Abstract (156 kB)   Abstract Full paper (495 kB)
             
             
11. DYNAMIC FACE RECOGNITION AND TRACKING SYSTEM USING MACHINE LEARNING IN MATLAB AND BIGDATA
    P.J Leo Evenss, Jennings Mcenroe .S, A.Prabhu Chakkaravarthy
163 – 173
      Abstract Abstract (156 kB)   Abstract Full paper (495 kB)
             
             
12. WIRELESS ZIGBEE NETWORK CLUSTER - CAPACITY CALCULATION AND SECURE DATA CONVEYANCE USING INDEGREE
    R.Elankavi, R.Kalaiprasath, R.Udayakumar
174 – 185
      Abstract Abstract (158 kB)   Abstract Full paper (469 kB)
             
             
13. DESIGN OF NFC READER FOR ENHANCEMENT OF MOBILE PAYMENTS
   

Chakravarthy.P, Thamizhoviya.K, Kavitha.S and Meena.S

186 – 197
      Abstract Abstract (157 kB)   Abstract Full paper (425 kB)
             
             
14. HYBRID POWER HARVESTER USING ENGINE SOURCE
    A.Ahmed Meeran Mydeen, Kelwin Inasu, M.Venkatesh and C.Suthesh
198 – 211
      Abstract Abstract (157 kB)   Abstract Full paper (384 kB)
           
           
15. A LIFI BASED DATA TRANSMISSION FOR ANTI COLLISION SYSTEM
   

Lokesh S, Priya N, Divyakanni K and Karthika S

212 – 224

      Abstract Abstract (157 kB)   Abstract Full paper (529 kB)
           
           
16. DESIGN OF LOW COMPLEXITY ACCUMULATOR USING FINFET FOR VARIOUS TECHNOLOGIES
    N.Sathya, M.Anto Bennet,M.Mageswari,M.Priya and M.Kayalvizhi

225 – 235

      Abstract Abstract (156 kB)   Abstract Full paper (343 kB)
           
           
17. HARDWARE IMPLEMENTATION OF UWB RADAR FOR DETECTION OF TRAPPED VICTIMS IN COMPLEX ENVIRONMENT
   

M.Anto Bennet, J.Narmatha, B.Pavithra, P.Suvetha and A.Sandhyalakshmi

236 – 258
      Abstract Abstract (200 kB)   Abstract Full paper (725 kB)
           
             
18. GSM BASED SOLDIER TRACKING SYSTEM AND MONITORING USING WIRELESS COMMUNICATION
    P. Chakravarth , S. Natarajan and M. Anto Bennet.
259 – 270
      Abstract Abstract (156 kB)   Abstract Full paper (584 kB)
             
             
19. MULTI_LEVEL SECURE FROM WEB INTRUSION AND QUERY ATTACKS ON WEB DATABASE
    Nirmala Kumari R and Mala V
271 – 283
      Abstract Abstract (158 kB)   Abstract Full paper (368 kB)
             
             
20. DESIGN OF LOW POWER CARRY SKIP ADDER USING DTCMOS
    T.R.Dinesh Kumar, K.Mohana Sundaram, Aruna.R, Meena.B, M.Mohanapriya
284 – 294
      Abstract Abstract (157 kB)   Abstract Full paper (326 kB)
             
             
21. DESIGN OF SRAM ARCHITECTURE WITH LOW POWER WITHOUT AFFECTING SPEED USING FINFET
    S.Mohammed Sulaiman,B.Jaison, M.Vijay, V.Pandi Selvam and P.Anandakumar
295 – 310
      Abstract Abstract (156 kB)   Abstract Full paper (577 kB)
             
             
22. LEARNING TO RANK AND CLASSIFICATION OF BUG REPORTS USING SVM AND FEATURE EVALUATION
    S.Rajeswari, S. Sharavanan, R.Vijai and RM. Balajee
311 – 329
      Abstract Abstract (234 kB)   Abstract Full paper (687 kB)
             
             
23. PERFORMANCE AND ANALYSIS OF AUTOMATIC LICENSE PLATE LOCALIZATION AND RECOGNITION FROM VIDEO SEQUENCES
   

B.Thamilvalluvan, Priyanka Paree Alphonse, D.R.Thendralarasi and K.Sujithra

330 – 343
      Abstract Abstract (156 kB)   Abstract Full paper (425 kB)
             
             
24. DESIGN OF LOW LEAKAGE CURRENT AVERAGE POWER CMOS CURRENT COMPARATOR USING SVL TECHNIQUE WITH PSEUDO NMOS AND TRANSMISSION GATE LOGICS
    T.R.Dinesh Kumar, K.Mohana Sundaram, M.Pooja, A.P. Kokila and K.Anusuya
344 – 357
      Abstract Abstract (157 kB)   Abstract Full paper (778 kB)
           
           
25. PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOL ALGORITHM
   

B.Sathyasri, E.N.Ganesh1, P.Senthil Kumar1, S.Rathna, R.Jaishree Bai and G.Nalini

358 – 373

      Abstract Abstract (157 kB)   Abstract Full paper (521 kB)
           
           
26. SPECIFIC ABSORPTION RATE ASSESSMENT ON HUMAN HEAD DUE TO RADIATIONS BY MOBILE PHONE ANTENNA
    J.Surekha Poomathi, C.Kalpana and S.Sariga Priya

374 – 394

      Abstract Abstract (157 kB)   Abstract Full paper (833 kB)
           
           
27. CLUSTER HEAD ELECTION MECHANISM-BASED ON FUZZY LOGIC (CHEF) WITH TDMA IN WSN
   

G.Vijayalakshmi , P.Shenbagavalli, M.Vijayalakshmi and S.Saranya

395 – 413
      Abstract Abstract (157 kB)   Abstract Full paper (833 kB)
           
             
28. AN INTELLIGENCE SUPER MART BILLLING SYSTEM
    S.Mekala1,M.Thanagaraj, M.Chandranath and K.K.Vasanta Kumaran
414 – 425
      Abstract Abstract (201 kB)   Abstract Full paper (449 kB)
             
             
29. SECURE ROUTE DISCOVERY FOR DYNAMIC SOURCE ROUTING IN MANETs
    G.Vijayalakshmi , P.Shenbagavalli, M.Vijayalakshmi and S.Saranya
426 – 445
      Abstract Abstract (156 kB)   Abstract Full paper (710 kB)
             
             
30. A WEARABLE MULTIPARAMETER MEDICAL MONITORING AND ALERT SYSTEM WITH FIRST AID
    M. Manimaraboopathy, S .Vijayalakshmi, D .Hemavathy and A .Priya
446 – 458
      Abstract Abstract (156 kB)   Abstract Full paper (441 kB)
             
             
31. PATROL INSPECTION AND TIME STUDY TO IMPROVE QUALITY
    R.Vijayan, P.Karthikeyan, J.Bharanichandar, R.Palanisamy and T.Thanka Geetha
459 – 470
      Abstract Abstract (156 kB)   Abstract Full paper (356 kB)
             
             
32. UNMANNED FIRE EXTINGUISHER USING QUADCOPTER
    M. Manimaraboopathy, H. S. Vivin Christopher, S. Vignesh and P. Tamil selvan
471 – 481
      Abstract Abstract (157 kB)   Abstract Full paper (461 kB)
             
             
33. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY
   

R.Kalaiprasath, R.Elankavi and R.Udayakumar

482 – 494
      Abstract Abstract (157 kB)   Abstract Full paper (440 kB)
             
             
34. TEMPORAL QUERY PROCESSIG USING SQL SERVER
    Mastan Vali Shaik and P Sujatha
495 – 505
      Abstract Abstract (157 kB)   Abstract Full paper (421 kB)
           
           
35. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY
   

Lakshmi Ravali,T.R.Sughapriya,J.Jenitta,K.Vaishnavi amd Priyanka Paree Alphonse

506 – 521

      Abstract Abstract (156 kB)   Abstract Full paper (530 kB)
           
           
36. PERFORMANCE AND ANALYSIS OF LOW POWER, AREAEFFICIENT AND HIGH SPEED CARRYFAST ADDER
    M.AntoBennet, S.Sankaranarayanan,V.BanuPriya, PJayaPretheena, S.Yamini, S.Supriya

522 – 538

      Abstract Abstract (306 kB)   Abstract Full paper (743 kB)
           
           
37. A MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED BASED ON HIERARCHICAL CLUSTERING INDEX
   

A. Indhuja, T.P.Udaya shankar, RM. Balajee Mastan Vali Shaik and P Sujatha

539 – 559
      Abstract Abstract (157 kB)   Abstract Full paper (537 kB)
           
             
38. DATA MINING WITH BIG DATA REVOLUTION HYBRID
    R.Elankavi, R.Kalaiprasath and R.Udayakumar
560 – 573
      Abstract Abstract (158 kB)   Abstract Full paper (344 kB)
             
             
39. MACHINE VISION BASED MISSING FASTENER DETECTION IN RAIL TRACK IMAGES USING SVM CLASSIFIER
    R. Manikandan , M. Balasubramanian and S. Palanivel
574 – 589
      Abstract Abstract (159 kB)   Abstract Full paper (990 kB)
             
             
40. AUTHENTICATION SCHEME FOR SESSION PASSWORDS USING COLOR AND IMAGE
    P. Saranya,, S. Sharavanan, R.Vijai and RM. Balajee
590 – 603
      Abstract Abstract (309 kB)   Abstract Full paper (666 kB)
             
             
41. A NEW APPROACH FOR CLOUD DATA SECURITY: FROM SINGLE TO CLOUD-OF-CLOUDS
    R.Kalaiprasath, R.Elankavi and R.Udayakumar
604 – 613
      Abstract Abstract (205 kB)   Abstract Full paper (547 kB)