Home | About KLNCE | About WINGS | Schedule | Call for Papers | Date to Remember | Paper Review | Committee | Sponsership | Contact Us

Technical Sessions
08.04.2011 AN   Session I  - Image Processing

Chair Person : Dr. A.V. Ramprasad, Prof. & Head / ECE
Co-Chair Person : Prof. A. Kannan, Prof. / MCA
Venue : IBM CoE

Sl. No

Title of the paper

Name of the Authors(s)

Name of the Institution

1.

Comparison Of Bilateral And Switching Bilateral Filter

K.Dhanalakshmi  M.Maha lakashmi

Kalasalingam University
Krishnankoil Srivilliputtur

2.

Automatic Gait Recognition Using EIGEN Subspaces

V. Punitha, P.N.V.R.Srividhya
Juhi

Vickram College of Engineering, Enathi

3.

Implementation of Object Recognition In Real-Time Environment Using Multicore Processor

A.NithyaKalyani Sudhakar Gummadi

Kalasalingam University
Krishnankoil
Srivilliputtur

4.

Optimizing The Customer Segmentations For Improving Personalization

K.Shanmuga Priya,
J.S. Kanchana,

Sethu Institute of Technology, Virudhunagar District

K.L.N College of Engineering, Sivaganga District

5.

Highly Secure And Reliable User Identification Based On Finger Vein Patterns

A.Ushapriya
M.Subramani

K.S.Rangasamy College of Technology, K.S.R.Kalvi Nagar,                                                              Tiruchengode

 

08.04.2011  AN Session II – Networks and Network Security

Chair Person : Dr. S. Kalyani , Prof. / EEE
Co-Chair Person : Ms. D. Thangamari, AP / CSE
Venue : PG Conference Hall

Sl.No

Title of the Paper

Name of the Author(s)

Name of the Institution

1.

Key-Management Security Over SCADA Communication Network Using Timestamp

M. Arun Anoop
G. SeethaLakshmi

Kalasalingam University Krishnankoil,

2.

Tracer And Checker Model
Against Malicious Mobile Agent

V. Arun
K.Shanmuganathan

Dhaanish Ahmed College of Engineering, Chennai, India

RMK Engineering College, Kavaraipettai, India.

3.

Measuring The Semantic Similarity Distance

G. Bharat Ram
G. Vadivu

SRM University, kanttankulathu,
Kanchipuram

4.

Transparent Optical Networks With Time Division Multiplexing

K.Muthukumaran
Deepthy Venketachalam
M. Sadashaya

Vickram College of Engineering, Enathi

5.

Chaotic Map Based Image Encryption Algorithm Using          S Box

P.Geetha
 J.L Mazher Iqbal

Rajalakshmi Engineering College, Chennai

6.

Cancellation & Equalization of Interferences  using RLS Volterra Filter  with ACI Compensation                                    

R.Karthick

V.Sethupathi

Sri Sairam  Engineering College,Chennai
Bharathidasan College of Engg&Tech,Trichy.

7.

Comparative Study On Cloud Technologies: HADOOP/ MAPREDUCE AND DRYADLINQ/DRYAD

S.Balamanohari
R.Sasikala

K.S.Rangasamy College of Technology, K.S.R.Kalvi Nagar,                                                              Tiruchengode

 

09.04.2011  FN    Session III - Networks and Network Security

Chair Person : Ms. S. Naganandhni Sujatha, ASP / MCA
Co-Chair Person : Ms. J.S. Kanchana, ASP / IT
Venue : PG Conference Hall

Sl.No

Title Of The Paper

Name Of The Author(S)

Name of the Institution

1.

P2P Reputation Management Using Distributed Identities And Decentralized Recommendation Chains

V.Padmavathi
B.Saranya
T.Bakyalakshmi

A.V.C College of Engineering, Mayiladudurai

2.

To Combat Blackhole Attack In DSR Based On Association Between Nodes

K.A. Priya Nandhini
A. Revathy

K.S.R.College of Technology,
Tiruchengode.

3.

Halftoning & Quality Enhancement In Visual
Cryptography Using Efficient Method

T. Reina Sri
T.Parameswaran

Anna University of technology,Coimbatore

4.

Efficient LDPC Decoder Implementation For DVB-S2 System

S.Selvarani,
R.M.Senthilkumar
                                 

Sudharsan Engineering College,
Pudukkottai

5.

Secure Electronic Voting Using
Identity-Based Cryptography

Manivannan Doraipandian
C. Nishant Paul
P.Neelamegam

SASTRA University
Thanjavur

6.

Concept Based User Profiling Method From Search Engine Logs

K.Vanaja,
M.Kumaresan

Park College of Engineering and Technology,
Coimbatore

7.

Providing QOS With The Deficit Table Scheduler

Vani.S

Park College of Engineering and Technology,
Coimbatore

8.

Ferret Engine For Intranet Based System

R.Senthil kumar
R.Siranjeevi

Pandian Saraswathi Engineering College

 

09.04.2011  FN    Session IV - Data Mining

Chair Person : Dr. R. M. Satheesh Kumar, Prof. & Head / Auto.
Co-Chair Person : Mr. J. Sulthan Alikhan, AP / CSE
Venue : IBM CoE

 Sl.No

Title of the paper

Name of the Author(s)

Name of the Institution

1.

ETP – Mine Based Transitional Pattern Discovery In Transaction Database

S.Abinaya
R.Karthikeyan

PSNA College of Engineering and Technology, Dindigul

2.

Security Based Association Rule Mining

M.S Thanabal
M.Anees

PSNA College of Engineering and Technology,Dindigul

3.

Text Clustering Using K-Mode

M.John Basha
K.Dhana Lakshmi

PTR College of Engg. & Technology  Madurai

Velammal College of Engineering and Technology  Madurai,           

4.

Automated Management System Applying Ontology-Based Cloud Computing

M.Elayaperumal,
D. Shakthi Priya

Raja College of Engineering and Technology, Madurai

5.

Coverage Metric For Measuring The Effectiveness Of Test Case Prioritization Techniques Used For GUI Application

Ms. D. Thangamari ,
Ms. A.Askarunisa

K.L.N College of Engineering, Madurai, Tamilnadu, India.

Thiagarajar College of Engineering, Madurai, Tamilnadu, India.

 

09.04.2011 AN     Session V - Wireless Networks

Chair Person : Dr. J. K. Subhashini, Prof. / CSE
Co-Chair Person : Mr. R. Alagaeswaran, ASP / CSE
Venue : IBM CoE  

Sl.No

Title of the Paper

Name of the Author(s)

Name of the Institution

1.

Efficient Node Admission And Certificateless Secure Communication In Short-Lived MANETS

A.Ajitha

K.S.Rangasamy College of Technology, K.S.R.Kalvi Nagar, Tiruchengode

2.

An Improved Kangaroo Transaction Model Using Surrogate Objects For Distributed Mobile System

S Ravimaran,
M.Anbazhagan

M.A.M. College of Engineeing, Trichy

3.

An Effective Cache System To Minimize Network
Contention In Mobile Adhoc Networks

M.Bagirathy Nayagi
V.Kavitha

Anna University of Technology-Tirunelveli

.

Anomaly Detection Scheme On AODV Based Mobile Ad Hoc Network By Dynamic Training Method

M.Lakshmi Karthikeyeni
P.Ravikumaran

Kalasalingam University
Krishnankoil Srivilliputtur

5.

Two Factor User Authentication Using Smart Card Systems in Wireless Sensor Networks

R.Thangaduraipandian,
M.Arun

Mepco Schlenk Engineering College
Sivakasi

6.

Implementation of Zero- Knowledge Authentication Protocol based on Congruence for Wireless Sensor Networks

D.Manivannan
B.Vijayalakshmi
P.Neelamegam

 

SASTRA University
Thanjavur