SYED AMMAL ENGINEERING COLLEGE, RAMANATHAPURAM INTERNATIONAL CONFERENCE ON ADVANCES IN APPLIED ENGINEERING AND TECHNOLOGY – 2015 List of Papers to be published in journal as Issue No: 2- Networking Paper ID Title of the Paper and Author(s) ICAAET – 8 MULTI LABEL LEARNING BASED ALGORITHM ADAPTATION METHODS P.K.A. Chitra,S. Appavu Alias Balamurugan and J.Arunadevi ICAAET – 30 UNIQUE DYNAMIC KEY MANAGEMENT BASED NODE AUTHENTICATION FOR SECURE COMMUNICATION IN MANET’S Dr.G.Murugaboopathi Gurusamy, Dr.A.Sakthivel Arumugam ICAAET – 31 ECC BASED CRYPTOR FOR ENCRYPTING INFORMATION ON E-MAIL Sakthivel Arumugam, Murugaboopathi Gurusamy ICAAET – 40 A CRITICAL REVIEW PAPER ON WARRANTY ANALYSIS FOR FLEET INDUSTRY USING DATA MINING TECHNIQUES R.Srinivasan,Dr.S.Manivannan and Dr.S.Prasanna Devi ICAAET – 52 HIGH PERFORMANCE MULTICAST TURING MACHINE P.Sundaravadivel , Dr. S. Senthamaraikannan, and B.Divagar ICAAET – 57 OPTIMIZATION TECHNIQUE ON AUTOMATIC NETWORK SELECTION AND PRIORITY SCHEDULING IN MULTI-HOP RELAY WIRELESS SYSTEMS S. Kannadhasan and R. KarpagaPriya ICAAET – 59 PASSWORD PROTECTION USING TWIN SERVER AUTHENTICATION SYSTEM AND VIRTUAL PASSWORD SCHEME B.James Arul Ajay, S.P Karthik and E.V.Manju ICAAET – 82 A NOVEL AND EFFICIENT ANDROID BASED MOBILE AD-HOC SOCIAL NETWORKS MODEL GeethaArun Prasad, Dr.B.MuthuKumar, and S.Dhayanandh ICAAET – 90 SEMANTIC WEB TECHNOLOGIES IN CLOUD ENVIRONMENT N. Veeranjaneyulu, VS Reddy Tripuram, SubbaraoPeram and Siva KoteswaraRaoChinnam ICAAET – 99 ENHANCED ARTIFICIAL BEE COLONY ALGORITHM FOR EFFECTIVE FREQUENT PATTERN MINING D.Divya and Dr.S.Suriya ICAAET – 103 WOV BASED MULTI OBJECTIVE TEST CASE PRIORITIZATION R.UmaMaheswari and Dr.D.Jeya Mala ICAAET – 105 AUGMENTING LI-FI BANDWIDTH USING OPTI SYSTEM TRANSDUCER R. Poorni, M. Varalakshmi, A. Elangeswari and R. Rashmi ICAAET – 107 IMPROVING SENSOR LIFETIME AND SECURITY BY USING COMBINATION ALGORITHMS IN WIRELESS SENSOR NETWORKS Lavanya R and Manikandan K ICAAET – 111 FACE MATCHING AND BIO METRIC FINGER PRINT READING R.Rashmi, M.SubashiniiAnd VimalSamsingh.R ICAAET – 119 CROSS-LAYER BASED ENHANCED PRIVACY-PRESERVING SECUREROUTING PROTOCOL FOR WIRELESS MESH NETWORKS Dinesh. M, Navamani.T.M, Yogesh.P ICAAET – 120 STORAGE OPTIMIZATION OF REPOSITORIES USING DATA MINING AND BIG DATA Sathish Kumar PandianAnbalagan and G.Ramakrishnan ICAAET – 122 LOCATION-AWARE AND SAFER CARDS: ENHANCING KERBEROS AUTHENTICATION ALONG WITH ATTRIBUTE BASED ENCRYPTION M.Preethi, Dr. J. Jagadeesan and V.Praveena ICAAET – 134 AN OPTIMIZED DATA STORAGE APPROACH USING HADOOP FRAMEWORKS G. Jayaram, M. NirupamaBhat, AkkineniRaghunath and N. Veeranjaneyulu ICAAET – 135 PATTERN BASED ON THEIR APPEARANCE BY MINING ASSOCIATION RULES J.Malarvizhi and Dr. S.ThabasuKannan ICAAET – 141 SMART CARD BASED PASSWORD AUTHENTICATION USING KEY AGREEMENT PROTOCOL G.B. Karthika and D.Jagadish ICAAET – 157 A NETWORK LIFETIME ENHANCEMENT METHOD USING RENDEZVOUS ALGORITHM IN WIRELESS SENSOR NETWORKS R.Mohankumar, Dr.A.V.Ramprasad, S.Anitha and N.Janakiraman ICAAET – 159 ENHANCING ANDROID OPERATING SYSTEM SECURITY BY BLOCKING SYSTEM CALLS OF MALICIOUS APPLICATIONS Sabir Ali and AnuGarg ICAAET – 161 CRITICAL DATA AGGREGATION AND DISSEMINATION IN VANETS USING COGNITIVE AGENTS T. GraceShalini and G.VinothChakkravarthy ICAAET – 166 PERSONAL HEALTH RECORDS AS A SOCIAL NETWORK ENCRYPTED USING ATTRIBUTE BASED ENCRYPTION C. Kalaivani, J. V. Anchitaalagammai , D . Divya and S.Kavitha ICAAET – 167 ANALYSIS ON ENHANCING THE EFFECTIVENESS AND EFFICIENCY OF MULTIRESOLUTION WATERMARKING ALGORITHMS R.Ganesh and Dr.S.ThabasuKannan ICAAET – 176 VAP: KEYLOGGING RESISTANT QR CODE BASED STRONG AUTHENTICATION USING SMART PHONES B.Sindhumathi and R.Suganya ICAAET – 178 STUDENT BUSPASS TRACKING SYSTEM USING RFID TECHNOLOGY IN CLOUD COMPUTING Balasubramanian. D, Rajeevrathan.J, JeyaPreetha.J and Mounica.M ICAAET – 179 A SURVEY ON EXISTING ANDROID PERMISSION BASE MODEL PankajLaheri and AnuGarg ICAAET – 181 RESOURCE ALLOCATION FOR SURVIVABLE OPTICAL NETWORKS BASED ON TOPOLOGICAL PARAMETERS J.MariaNithya and D. Sheela ICAAET – 182 ROUTING PROTOCOLS AND VARIOUS ATTACKS POSSIBLE IN MOBILE AD HOC NETWORKS: A SURVEY SatveerKaur and Hitesh Sharma ICAAET – 185 SPEED LIMIT DETECTION OF VEHICLES USING VANET A.Sathya and Dr. S. Ganesan ICAAET – 187 DYNAMIC VIRTUAL MACHINE CONSOLIDATION WITH QUALITY OF SERVICE CONSTRAINTS Padma Priya .V and R.Ranjana ICAAET – 193 IDENTIFICATION OF HIGH THROUGHPUT PATH IN WMNS USING NOVEL ROUTING METRIC Gurumekala T, Senthil Sivakumar M, Sundaram A and ArputhaRaj T ICAAET – 197 ANALYZING SPAM MESSAGES AND DETECTING THE ZOMBIES USING SPAM COUNT AND PERCENTAGE BASED DETECTION ALGORITHM M.Manikandakumar, K.ManoSharmi and S.Shanthini Devi ICAAET – 198 AN ENTERPRISE ONTOLOGY-BASED APPROACH FOR WEB SERVICE SELECTION K.Kanniyarasu, T.Kiruthika, R.Reena and Dr. A. Grace Selvarani ICAAET – 216 BIG DATA-A REVIEW V. Shobana, and N.Kumar ICAAET – 220 AN ENHANCED DISENGAGEMENT DETECTION IN ONLINE LEARNING USING QUASI FRAMEWORK P.V. Praveen Sundar and Dr. A.V. Senthil Kumar ICAAET – 221 SELECTION OF COMMUNICATION TECHNOLOGY FOR SMART DISTRIBUTION GRID SivrajP.andSasi K. Kottayil ICAAET – 224 INLINE DEDUPLICATION APPROACH FOR SECURE FILE TRANSACTIONS IN HYBRID CLOUD AkhilTejaAmbadipudi, SaicharanVennamanani and R.Jebakumar ICAAET – 250 ENHANCED FUZZY BASED CLUSTERING APPROACH FOR IMPROVING RELIABILITY OF WSNS Gurumekala T, SenthilSivakumar M, Sundaram A and ArputhaRaj T ICAAET – 251 GPU PERFORMANCE SURVEY ON OPENCL AND CUDA USING SMITH WATERMAN ALGORITHM Azhar Ali, Balwant Ram ICAAET – 256 TRUST MODEL AUTHENTICATE ANONYMOUS SECURE ROUTING FOR MANET A.R.Bharathidasan and G.Premnath ICAAET – 259 IDENTIFICATION OF HOLE AND HEALING PROCESS USING PACKET FORWARDING ALGORITHM IN WIRELESS SENSOR NETWORK N.Preethi,G.Pandiyan ICAAET – 260 AN EFFICIENT LOAD BALANCING MECHANISM FOR SIP SERVER CLUSTERS G.Karthiga and Dr.N.Lakshminarasimman ICAAET – 262 MITIGATING SHOULDER SURFING ATTACK BY USING COLOR BASED PASSWORD ENTRY METHOD C.Abinayadevi, T.M.Devi, and C.Nambushanmugapriya ICAAET – 266 MINING ANALYSIS ON ORDERING OF PAGES USING AGEDPAGE RANKING ALGORITHM A.SudalaiEsakkiSutha, Prof. V. Vijayaganth, Prof. M. A. Gopi Saran and K.Anitha ICAAET – 267 ENERGY EFFICIENT MULTI - HOP QUALITY PATH BASED DATA COLLECTION WITH MOBILE SINK IN WSN K. Anitha, Prof. M. A. Gopi Saran, Prof. V. Vijayaganth and A.SudalaiEsakkiSutha ICAAET – 270 A MECHANICAL AGENDA FOR INTEGRATING NEWS INTO STASH TRAFFIC APPROACH T. ArunaAzhagu, P. Velvizhi ICAAET – 272 EFFICIENT TRUST AUTHORITY WITH ESTABLISHMENT OF CLUSTER HEADS IN DELAY TOLERANT NETWORK S. Mekala Devi and M.Gughan Raja ICAAET – 275 IDENTIFYING THE STRUCTURAL PATTERNS IN PROTEINS USING FUZZY ASSOCIATION RULE Shivika Sharma, AvinashKaur, NishaSethi ICAAET – 276 NEBULIZER AUTOMATION B. Padmapriya, C. Nandhini and S. Pavithra ICAAET – 278 FAULT DETECTION AND MITIGATION USING WSN IN DISTRIBUTED PUBLIC UTILITY SERVICES V.Karthiga, Dr.K.Sathiyasekar and M.Monisha ICAAET – 279 SORTING BASED APPROACH ON PATH CONDITION FOR TEST CASE SELECTION BY SYMBOLIC EXECUTION AnuragShukla,Dr.Kumar Rajnish ICAAET – 288 VEHICLE PLATOONING FOR DELAY-SENSITIVE SERVICES UNDER GREEN MANNER D.IndiraPriyadharshini, P.Thirumurugan and S. Vengalakshmi ICAAET – 296 SECURE DSR PROTOCOL FOR DETECTION AND EXCLUSION OF SELECTIVE BLACK HOLE ATTACK IN MANET D.Sabarish, C.Ranjan,i R Vijayakumar and R Sruthi ICAAET – 300 XML SECURITY: TEMPORAL TOKEN PROFICIENCY ACCESS CONTROL PERFORMANCE ENHANCEMENT Maheep Gupta and Nitin Umesh ICAAET – 302 A WEB SEARCH ENGINE BASED APPROACH FOR KNOWLEDGE BASED INFORMATION RETRIEVAL D. Praveena, D. Magdalin Diviya and C. Ranjini ICAAET – 303 A FRAMEWORK FOR WEB CONTENT EXTRACTION AND NOISE DETECTIONUSING PAGE SEGMENTATION WITH PATTERN MATCHING AND COMPOSITE TEXT DENSITY SandeepKaur and AbhishekTyagi ICAAET – 306 INTRUSION DETECTION FOR MANETs USING NAVIE BAYES CLASSIFIER Sekar S, Latha B ICAAET – 307 A REVIEW: MULTI-ROBOT COOPERATION METHOD FOR LOCALIZING ODOR SOURCES BASED ON A NICHING FIREFLY ALGORITHM NoktienlaAier and Monica Sood ICAAET – 312 PERFORMANCE EVALUATION OF APRIORI ALGORITHM USING TRANSPOSE TECHNIQUE ON THE BASIS OF TIME AND COMPLEXITY Harkamalkaur and Roshansrivastava ICAAET – 314 A HYBRID MODEL FOR RANKING UNCERTAIN DISTRIBUTED DATABASE N.Lalithamani, Swathi Sand Deepika P A ICAAET – 319 EFFICIENT ALGORITHM FOR ACCURATE DETECTION OF SYBIL ATTACK IN A WIRELESS SENSOR NETWORK K. Yuvashri,J.Dalfiah, Dr. A. BabuKaruppiah and R. Rajaraja ICAAET – 320 DETECTION OF NODE CLONING IN WIRELESS SENSOR NETWORKS BY USING CYCLIC CLONE DETECTION ALGORITHM WITH ENCRYPTION (CCDAE). RanganathDonkena, Vigneswaran T, VijayaRaju M ICAAET – 324 FAT: ISOLATION PRESERVING FOR EFFECTIVE DATA DEPOT USING PUBLIC AUDITING P.Maheswari,andS.Deepalakshmi ICAAET – 325 CLASS COMPLEXITY AND DEVELOPMENT TIME: A STUDY Kumar Rajnish and Ruchika Singh ICAAET – 326 SMART AIR POLLUTION MONITORING SYSTEM FOR INDUSTRIES USING IOT TECHNIQUES M. Sarathkumar,J.Rajeevrathan, R. Perumalraja and D. Anandhavalli ICAAET – 330 A RELIABLE SIGNATURES USING EXPLICIT USER REQUEST FOR WEB IMAGE AND URLS CLASSIFICATION B.Prabha and B. John Samuel ICAAET – 332 SMS: SPARKY MULTI SERVICE LOAD STABILIZING IN CLOUD EMPORIUM USING GENETIC ALGORITHM S.V.Muthulakshmi and A.Kanmani ICAAET – 334 A SCHEME FOR SECURED TRANSACTION USING RFID SYSTEM SUBSTANTIATION NivethaRadha Krishnan, AnandBabu M.H and Dhivya R ICAAET – 338 A SURVEY PROCESS OF ATTACKS ON IRIS BASED RECOGNITION FOR BIOMETRIC AuthenticationN.Lalithamani and Sujitha.R ICAAET – 339 STRATEGIZE FRAMEWORK FOR CONTESTING PLAN WITH DATA MINING TECHNIQUE Jaskirat Singh, ShevetaVashisht and Jatinder Singh ICAAET – 340 IMPLEMENTATION OF KNN APPROACH TO EVALUATE CLUSTERING OF UNCERTAIN DATA SumanBhaka and Priya.S ICAAET – 345 ENHANCEMENT IN ASYMMETRIC CLUSTERING TO REDUCE NOISE AND IMPROVE ACCURACY FOR DATA CLUSTERING Jatinder Singh, ShevetaVashisht and Jaskirat Singh ICAAET – 349 SECURE VANET COMMUNICATION USING AUTHENTICATION PROTOCOL Fathima Bee ICAAET – 350 MEASURE OF INTERNAL STRUCTURAL COMPLEXITY OF ER-DIAGRAM THROUGH SOFTWARE METRICS Dr. Kumar Rajnish and Mohit Sharma ICAAET – 352 APPLICATIONS OF DATA MINING TECHNIQUES IN ACADEMIC LIBRARIES K.G. Nandha Kumar and Dr. T. Christopher ICAAET – 360 SECURE DATA HIDING IN ENCRYPTED H.264/AVC VIDEO STREAMS BY QUANTIZATION AND FMO TECHNIQUES M.Suganya and S.Shanthini Devi ICAAET – 364 CUSTOMIZATION ANDVISUALIZATIONOF DBSCAN ALGORITHM FOR DEMOGRAPHICANALYSIS Bipin Nair B J, Arjun K P and Bharath P Kundapur ICAAET – 365 A STATE OF THE ART SURVEY OF DATA MINING TECHNIQUES FOR SOFTWARE ENGINEERING DATA MeghnaSoni, Harshpreet Singh and NishaSethi ICAAET – 367 A NEW APPROACH TO CONSTRUCT THE AFFINITY GRAPH OF SPECTRAL CLUSTERING USING EUCLIDEAN DISTANCE GurpinderKaur and AbhishekTyagi ICAAET – 381 SEMANTIC ONTOLOGY MAPPING USING EXTREME LEARNING MACHINE WITH DIMENSIONALITY REDUCTION Sangeetha B, Dr. Vidhyapriya R and Therumalpathy S P ICAAET – 384 SECURE ONLINE TRANSACTIONS USING ACTIVE CONTENT FINGERPRINT EMBEDDED IMAGES G. Gajalakshmi and R. Gayathri. ICAAET – 387 USING DATA MINING TECHNIQUE TO PREDICT CRIMINAL BEHAVIOR OF JUVENILES Garima Sharma and ShevetaVashisht ICAAET – 388 OBJECT IDENTIFICATION AND CONTROL FOR VISUALLY CHALLENGED PEOPLE Sikha O. K., A D NavinKrithish,Pragadesh V,L Vignesh and M AnirudhSrinivas ICAAET – 389 EMBEDDED ZERO TREE WAVELET (EZW) ALGORITHM BASED IMAGE TRANSFORMATION FOR EASY OPTIMIZATION WITH HALIDE LANGUAGE Dr.T. Karthikeyan and C.Thirumoorthi ICAAET – 390 A PROFICIENT INDEXING IN GRAPH DATABASES USING FEATURE - BASED METRIC APPROACH K. Ishwarya, G.Sharmila and Dr.M.K.Kavitha Devi ICAAET – 392 ANT COLONY OPTIMIZATION BASED ATTRIBUTE REDUCTION FOR DISEASE DIAGNOSTIC SYSTEM D. Asir Antony Gnana Singh,P.Surenther, E. and JebamalarLeavline ICAAET – 396 BUILDING A SECURE SYSTEM FOR WIRELESS MEDICAL SENSOR NETWORKS USING BLOWFISH ALGORITHM S.Mariammal and R.Srikkanthan ICAAET – 401 SEGCRYPT: AN ENCRYPTION TECHNIQUE TO SEGREGATE AND PRESERVE PRIVACY OF SENSITIVE DATA IN EHRS IN CLOUDSTORAGE M.P.Revathi and Dr. P.D. Shea KeziaMalarchelvi ICAAET – 402 DETECTION OF BLACK HOLE USING TIME DIFFERENCE AND NEIGHBORHOOD NODES K.Lalramhluni and AdityaBakshi ICAAET – 405 RETINAL BLOOD VESSEL SEGMENTATION AND MEASUREMENT OF VESSEL DIAMETERS K.Lekshmi, Dr.K.Rubasoundar, J.LakshmiPriya,S.Monika , S.Amritha and J.RajeshKannan ICAAET – 407 ENTROPY OPTIMIZED CONTRAST ENHANCEMENT FRAMEWORK FOR GRAY LEVEL IMAGES Madheswari K, Venkateswaran N ICAAET – 408 TRANSFORM BASED A-PRIORI CLASSIFICATION OF X-RAY IMAGES FOR CONTENT BASED IMAGE RETRIEVAL Karthikeyan Mand Priya.S ICAAET – 409 A SURVEY OF REGRESSION TESTING ALGORITHMS FOR PRIORITIZATION OF VERSION CONTROL Parkavi G ICAAET – 412 APPROXIMATE DIRECTIONAL ROUTING PROTOCOL Sathya Sathiskumar, Palanisamy V ICAAET – 415 ANALYSING THE PERFORMANCE OF ADABOOST ALGORITHM IN TEXTON BASED MULTICLASS OBJECT SEGMENTATION AND RECOGNITION K.Lekshmi, Dr.K.Rubasoundar, D.S.JananiShree,L.Elakkiya, S.Divya and J.RajeshKannan ICAAET – 417 OPTIMIZING GARBAGE AND RECYCLING COLLECTION PROBLEM USING GLOWWORM SWARM OPTIMIZATION Anita Sharma and Monica Sood ICAAET – 418 DESIGN AND EVALUATION OF NEW ALGORITHM BASED ON CHAOTIC CRYPTOGRAPHY Praveen Pandey and Gulshan Kumar ICAAET – 419 IMAGE ENCRYPTION ALGORITHM BASED ON MODIFIED AES SumitSidhu and Ravishanker ICAAET – 421 IMPROVING WIRELESS SECURITY WITH ENHANCEMENT IN WPA2 PROTOCOL SumanRawat and Md. Ataullah ICAAET – 422 INCREASING THE SECURITY OF WIRELESS NETWORK AGAINST SPOOFED ATTACKS Aarthi Joshi and Md.Ataullah ICAAET – 427 E-LEARNING APPLICATION USING GESTURE RECOGNITION AmritMurali, Niteesh AC and R. Jebakumarr ICAAET – 430 A SURVEY ON MACHINE TRANSLITERATION SYSTEMS DebashisSen and Kamal Deep Garg ICAAET – 435 AN EFFICIENT CAUSAL FRAMEWORK FOR PROCURING KNOWLEDGE FROM POTENTIAL EMR G. Angayarkanni and Dr. N. Karthikeyan ICAAET – 436 AN ADVANCED CLASSIFICATION AND OPTIMIZATION SCHEDULER FOR HADOOP SYSTEM AnimeshJha and Parminder Singh ICAAET – 437 A NOVEL APPROACH FOR CUSTOMIZED TRAVEL PACKAGE RECOMMENDATION USING COLLABORATIVE FILTERING SureshKumar,VaralakshmiAnishya ICAAET – 439 VEHICULAR AD-HOC NETWORKS BASED INTELLIGENT TRAFFIC SIGNAL CONTROL V.Vinolia and V.Vinciya ICAAET – 441 A NOVEL APPROACH FOR GLAUCOMA DISEASE USING AUTOMATED CLASSIFICATION METHOD M.Kirthikavathi, S.Veluchamy ICAAET – 442 BREAST MASSES CLASSIFICATION BASED ON BPN USING SCILAB A.Yogapriya, S.Sindhuja Mr. S. Mahesh Anand and .S.A.Priyanka ICAAET – 444 GAME BASED LEARNING PLATFORM FOR INDIAN K-12 MATHEMATICS Sivaranjani K, Vidya M, V. SmrithiRekha ICAAET – 451 A DOUBLETON PATTERN MINING APPROACH FOR DISCOVERING COLOSSAL PATTERNS FROM BIOLOGICAL DATASETS K.Prasanna , Dr. M.Seetha and Vinint Kumar Gunjan ICAAET – 455 SENTIMENT ANALYSIS OF SOCIAL ISSUES AND SENTIMENT SCORE CALCULATION OF NEGATIVE PREFIXES Shailendra Kumar Singh and Dr.Sanchita Paul ICAAET – 461 A SECURE MECHANISM FOR ANONYMOUS AUTHENTICATION IN CLOUD COMPUTING S.Stalin Rubitha and T.B.Sivakumar ICAAET – 462 A SECUREAND AUDITING MECHANISM FOR CAAS M.Vasanthi, G.SaravanaKumar, B.Palanichelvam and R.Dhivya ICAAET – 463 AUXILIARY ATTRIBUTE BASED TEXT DATA MINING N. Ramya and K. Rajesh ICAAET – 467 A HYBRID ALGORITHM FOR EFFECTIVE LOAD BALANCING IN CLOUD KripaSekaran, N.Sujaudeen and M.Arunachalam ICAAET – 468 ANFIS BASED RAIN PREDICTION IN LOW RAINFALL REGION Supreet and KewalKrishan ICAAET – 473 SENTIMENT ANALYSIS OF STATIC AND DYNAMIC DATA SETS Aiswarya Lakshmi S, Saranya S, Sourab S, Vaishali V, Vignesh T and Vijay Krishna Menon ICAAET – 479 IMPROVING TCP PERFORMANCE IN MANET USING SIGNAL STRENGTHENING AND SCALABLE TCP Arun S, Geethu R Krishnan and Remya Nair T ICAAET – 480 COMPARATIVE STUDY OF MOBILE AD HOC NETWORK ROUTING PROTOCOLS AtulSatyajit, Sarath Kumar Sand RajalakshmiPrithviraj ICAAET – 481 MULTI-CLASS SENTIMENT ANALYSIS GopikaP.Gopinath, Anjaly Raj and Nitha L ICAAET – 483 CLOUD-BASED MULTIMEDIA SENSOR NETWORKS WITH SECURE SERVICES ARCHITECTURE E.Parthasarath and S.Pavithra ICAAET – 484 IMPROVE NETWORK ANALYSIS USING SPOON & SIMBET ROUTING IN DISCONNECTED MANETS Yuvaraj M, Insozhan N ICAAET – 487 UBIQUITOUS LIFE CARE SYSTEM BASED ON SECURED WIRELESS SENSOR NETWORKS K.Rajesh and S.Deepalakshmi ICAAET – 488 DETECTION AND CLASSIFICATION OF FUNGAL DISEASE IN FRUITS USING IMAGE PROCESSING TECHNIQUES Pushpa B R, Thripulla K H and Meghana T K, ICAAET – 494 A QOS BASED EQGOR PROTOCOL FOR WSN AND VANET Rama Kalangiam S and Arun Samuel T S ICAAET – 497 ENERGY DEFENDING KEY PREDISTRIBUTION SCHEME USING EIGENVALUE CONCEPT FOR SECURE WIRELESS SENSOR NETWORKS N.Tharanika, M.Satheesh Kumar and A.Selvaraj ICAAET – 498 I2RED: INTEGRATED IRED BASED CONGESTION CONTROL FOR DATA TRANSMISSION IN SENSOR CLOUD NETWORKS J.AliceAnandhi, M.Satheesh Kumar and S.Ramesh ICAAET – 499 A REVIEW ON IMAGE FORGERY AND ITS DETECTION ArunAnoop M ICAAET – 500 PERFORMANCE ANALYSIS OF ENERGY OPTIMIZATION THROUGH SLEEP SCHEDULING WITH QOS CONSIDERATION IN LTE-A NETWORKS P.Vaishnavi and .S.Geetha ICAAET – 501 AN IMPROVED PERFORMANCE OF URBAN TRAFFIC INFORMATION COLLECTION METHOD BASED ON WIRELESS SENSOR NETWORKS T Bagavathi ICAAET – 503 AUTHENTICATION VIA CONTINUOUS VERIFICATION WITH KEYSTROKE DYNAMICS K.Sarojini Devi and A. Gowri Shankar, ICAAET – 504 RECOGNIZING POLARITY OF ARTICLES USING SENTIMENT ANALYSIS THROUGH MACHINE LEARNING TECHNIQUES RavitejaParishapogu, Sumathy Subramanian and MythiliThirugnanam ICAAET – 505 SOFTWARE DEFINED LTE VEHICULAR NETWORK R.Hemajanani, Dr. R.Perumalraja and S.Chowmya ICAAET – 506 A NOVEL HYBRID ALGORITHM FOR OUTLIER DETECTION USING WEKA INTERFACE R.DelshiHowsalya Devi and Dr.M.Indra Devi ICAAET – 507 TRANSPORTATION SENTIMENT ANALYSIS FOR SAFETY ENHANCEMENT M. Athilakshmi and B. Palanichelvam and G.Saravanakumar ICAAET – 508 THE CORRECT LOCATION AND SIZING OF DISTRIBUTED GENERATORS TO STRENGTHEN INTENTIONAL ISLANDING PRACTISE USING ANT SEARCH ALGORITHM AND PSO R.M. Sasiraja , Dr.V.Sureshkumar and T.Kannan ICAAET – 511 MEDICAL DATA MINING METHOD TO PREDICT RISK FACTORS OF HEART ATTACK AND RAISE EARLY WARNING TO PATIENTS M. Ilayaraja and Dr. T. Meyyappann ICAAET – 512 ECC BASED IMAGE ENCRYPTION SCHEME WITH AID OF OPTIMIZATION TECHNIQUE USING DIFFERENTIAL EVOLUTION ALGORITHM K. Shankar and Dr. P. Eswaran ICAAET – 515 RESEARCH CHALLENGES OF IEEE 802.15.6 STANDARD FOR WIRELESS BODY AREA NETWORKS M. Ambigavathi andDr.D.Sridharan ICAAET – 517 COMPARISON OF THREE ASSOCIATION RULE MINING ALGORITHMS USING CLOUDSIM Mandeepkaur ICAAET – 518 EFFICIENT MULTI-STEP AHEAD ALGORITHM FOR STOCK MARKET PREDICTION Akriti and Miss Manveer ICAAET – 520 PROTECTING WIMAX ENTITIES AGAINST ROGUE BASE STATION AND DDOS ATTACK D. Stella Gnana Ruby and R. Arasa Kumar ICAAET – 522 A BLOCK CIPHER BASED CRYPTOGRAPHIC ALGORITHM TO ENHANCE THE DATA SECURITY Mahalakshmi.J and Dr.K.Kuppusamy ICAAET – 525 RULE SETS DRIVEN SOFTWARE COST ESTIMATION MODELS BASED ON DECISION MAKING METHODS PeramSubbaRao, Dr.K.VenkataRao and Dr.P.SureshVarma ICAAET – 526 RECKONING TRUST IN E-COMMERCE BY MINING PRODUCT REVIEWS S.SirinSeema, M.Maheswari, Dr.S.Selvakumar and Dr. S.Geetha ICAAET – 528 ANALYSIS OF TRANSFER CHARACTERISTICS OF UWB ANTENNA FOR WBAN Sherin.X, Selvathi ICAAET – 529 SECURE MINING OF ASSOCIATION RULES USING APRIORI ALGORITHM Sangeetha KV, SangeethaSanthosh and Nitha Deepak ICAAET – 530 DETECTION OF CREDIT CARD FRAUDS USING HIDDEN MARKOV MODEL WITH IMPROVED K-MEANS CLUSTERING ALGORITHM Keerthi A, Remya and M S, Nitha L ICAAET – 533 OPTIMIZATION OF SPARSE DICTIONARY MODEL FOR MULTIMODAL IMAGE SUMMARIZATION USING FIREFLY ALGORITHM T. Kanimozhi and Dr.K. Latha ICAAET – 534 CLUSTERING UNCERTAIN DATA BASED ON PROBABILITY DISTRIBUTION SIMILARITY S.Sathiya and A.G.Vadivelan ICAAET – 537 CONCEPT TERM AND QOS BASED SELECTION OF WEB SERVICE R.S.Raj Kumar, Dr. A.GraceSelvarani and M.Karthigha ICAAET – 542 INFORMATION SECURITY THREATS AND MITIGATION- A RELOOK Ms.M.Kumudha and Ms.H.NoorulShajithaBanu ICAAET – 543 PERFORMANCE EVALUATION OF SEQUENTIAL PATTERN MINING ALGORITHMS R.Dhivyapriya, N.Monisha and P.Subathra ICAAET – 546 AN IMPROVED METHOD FOR PRINCIPAL COMPONENT ANALYSIS ON EXTREMELY LARGE DIMENSIONAL DATA USING ROBUST MEASURES OF SCALE THAT QUANTIFY HIGH DEGREE OF OUTLIERS Namitha R, Neethumol and M.S, RanjidhaRajan ICAAET – 552 IMPROVED ENCRYPTION LAYERED ARCHITECTURE FOR CLOUD STORAGE TO INCREASE CONFIDENTIALITY AND REDUCE SPACE COMPLEXITY M.Muruganadam and S.Praveen Kumar ICAAET – 558 AN IMPROVED EMBEDDING SCHEME IN COMPRESSED DOMAIN IMAGE STEGANOGRAPHY MeeraM and Malathi P ICAAET – 559 CONTEXT AWARE INFORMATION FOR LOCALIZATION AdwitiyaMukhopadhyay, Subeesh K S and Stibin Mathew ICAAET – 560 IMPROVING SOFTWARE COST ESTIMATION USING PROTOTYPE SELECTION Babitha V K, Gayathri P. Nair and Deepa G ICAAET – 564 AN EFFICIENT TASK SCHEDULING ALGORITHM FOR VM PLACEMENT IN CLOUD COMPUTING ENVIRONMENT SandeepKaur and Ramandeep Singh ICAAET – 567 ENHANCING THE SECURITY OF DICOM CONTENT USING MODIFIED VIGENERE CIPHER P.Subhasri and Dr. A. Padmapriya ICAAET – 568 PERFORMANCE ANALYSIS OF ACTIVE LEARNING IN IMAGE CLASSIFICATION E.Shehnaz and Dr.D.Venkataraman ICAAET – 570 NETWORK RECONFIGURATION OF DISTRIBUTION SYSTEM IN THE PRESENCE OF HARMONIC LOAD USING EXPERT SYSTEM APPROACH R.Iswarya and R.M.Sasiraja ICAAET – 571 JAMMING ATTACK DETECTION TECHNIQUE IN COGNITIVE RADIO NETWORKS E. JebamalarLeavline, M.Dinesh and D. Asir Antony Gnana Singh ICAAET – 572 PREVENTING CLOUD INTEGRATION CHALLENGES USING IPAAS ShilpaManilal and Theertha V.S ICAAET – 574 EFFICIENT DETECTION OF SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK USING PARAMETERS ESTIMATION TECHNIQUES Mr.G.Pradeepkumar, Mr. P.Omprakash and S.Manimala ICAAET – 578 EFFECTIVE ASSOCIATION RULE MINING ALONG WITH FILTER BASED FEATURE SELECTION AnjanaRaghavan, Surumi P.M. and Gaina K.G. ICAAET – 581 A NOVEL TECHNIQUE TO DETECT & PREVENT BLACK & GRAY HOLE ATTACKS IN MANET USING TVRI APPROACH Manan Arora, Sami Anand ICAAET – 582 SEVERITY DETECTION OF TUBERCULOSIS USING NEURAL NETWORK H.S. Makkar, J. Singh and S. Sankar Ganesh ICAAET – 583 AN EFFICIENT TECHNIQUE OF EFFORT ESTIMATION FOR AGILE SOFTWARE DEVELOPMENT SYSTEM Shivali Chopra, RupinderKaur and MohitArora ICAAET – 586 A RULE BASED APPROACH ON WORD SENSE DISAMBIGUATION SooryaPrasanth, Aiswarya G and Arun Kumar N ICAAET – 590 ANALYZING HEALTHCARE USING WIRELESS SENSORS AND BIG DATA P.Harini and S.Satheeshkumar ICAAET – 592 ENHANCING THE STEMMING ALGORITHM IN TEXT MINING Anil Kumar Soni, Avinash Kumar, Robin PrakashMathur ICAAET – 598 CREDIT CARD NETWORK SECURITY WITH ECC & TOKENIZATION Daniya Dennis, Reshma K B and Nima S Nair ICAAET – 599 NEURAL NETWORK ADAPTIVE PARTICLE SWARM OPTIMISATION FOR POWER LOSS MINIMISATION IN DISTRIBUTION SYSTEMS USING OPTIMAL LOAD RESPONSE AnandhaKumaran N S ICAAET – 600 PREVENTION OF MAN-IN-THE-MIDDLE PHISHING ATTACK USING PAIR BASED AUTHENTICATION DilnaPriyaCorreya , DivyaGopinath and Nima S ICAAET – 603 A PERSPECTIVE EVALUATION OF THE FACETS AFFECTING THE ACCURACY OF RECOMMENDATION ENGINES Nitha L ICAAET – 606 PREVENTION OF BLACK HOLE ATTACK IN MANETS USING ENHANCED AODV PROTOCOL Liya A. R, Sabana N. K and Leena V ICAAET – 608 DESIGN AND DEVELOPMENT OF BIOMETRIC RECOGNITION AND MATCHING SYSTEM M.Dinesh.and .SankerGanesh.S ICAAET – 609 ADVANCED RULE BASED INFORMATION EXTRACTION FOR ELECTRONIC HEALTH RECORD L. Sathish Kumar and Dr. A. Padmapriya ICAAET – 613 BIG DATA INITIATIVE: ANALYZING, ESTIMATING THE SCARCITY OF FOOD AND DETERMINING THE DISEASES Reshma B Nair and Dr D Venkataraman ICAAET – 616 USING DEMPSTER SHAFER THEORY TO EVALUATE THE PERFORMANCE OF SECURITIES AND SECTOR WISE INDICES KomalWalia and VirratDevaser ICAAET – 622 ADAPTIVE VM CONSOLIDATION TECHNIQUE FOR POWER OPTIMIZATION IN CLOUD COMPUTING RenuChaudhary, Parminder Singh ICAAET – 625 STOCK PRICE PREDICTION FOR A SECTORIAL LEADER IN NSE USING NEURAL NETWORK Pankaj Kumar Sood and VirratDevaser ICAAET – 626 INTEGRATION OF ROLLING HORIZON AND PARTIAL UTILITY-DRIVEN (IRHPUD) TECHNIQUES FOR SCHEDULING CLOUDLETS S.Saroja and P.ImmaculateJansi Rani ICAAET – 627 DETECTION AND PREVENTION OF CODE INJECTION ATTACK BY INHERITANCE ON OBJECT ORIENTED DATABASE SYSTEMS Hardeep Singh Damesha, RoshanSrivastava ICAAET – 630 GENDER SPEECH RECOGNITION AND RETRIEVING USING FUZZY LOGIC AND NEURAL NETWORK TECHNIQUE M.Sivasanka and A.Nagavaratharajan. ICAAET – 636 DYNAMIC QUERY FORMS FOR HETEROGENEOUS DATABASE QUERIES Dinesh J, Balakrishnan G ICAAET – 637 TO AVERT VIRTUAL SIDE CHANNEL ATTACK USING KAMAN PROTOCOL IN CLOUD ENVIRONMENT HardeepKaur, ManjitKaur ICAAET – 640 A HADOOP BASED ARCHITECTURE USING RECURSIVE EXPECTATION MAXIMIZATION ALGORITHM FOR EFFECTIVE AND FOOLPROOF TRAFFIC ANOMALY DETECTION AND REPORTING AthulSai, SiniSalim, P.K. Binu and R.C. Jisha ICAAET – 645 A STUDY ON INPAINTING AND GAP FILLING ALGORITHMS FOR REMOVING CLOUDS IN SATELLITE IMAGES Mrs.S.Maheshwari and Dr.P.Krishnapriya ICAAET – 652 SYSTEM FILTERING MESSAGES USING OLP WITH FEEDBACK FROM USER M. H. AnandBabu, M. Jeyashree, K. Meenaloshini ICAAET – 653 PREVENTION AND DETECTION OF SQL INJECTION ATTACKS USING ADAVNCED VERSION OF AHO-CORASICK ALGORITHM NitikaWalia, RoshanSrivastava ICAAET – 658 A CRYPTOGRAPHIC ALGORITHM FOR REDUCED AREA COST Preethi E, Kripadevi D ICAAET – 661 A COMPLETIVE STUDY OF AUTOMATIC TEST DATA GENERATION FOR DATA FLOW TESTING USING GA, PSO & BPSO Sumit Kumar, Dr. Dilip Kumar Yadav, Dr Danish Ali Khan, SapnaVarshney ICAAET – 662 NSGA II FOR THE OPTIMIZATION OF DG PLACEMENT AND SIZING TO BENEFIT BOTH DG OWNER AND DISCO’S R.Sakthipriya and K.Muthulakshmi ICAAET – 663 A COMPARATIVE ANALYSIS OF SORTING ALGORITHMS ON THE BASIS OF A DISTANCE CRITERION Sneha John, Aswathy S and R Nandakumar ICAAET – 664 LISTING PAST, CURRENT, AND UPCOMING RESEARCH IN UBIQUITOUS COMPUTING – A REVIEW S.HasanHussain, Dr. S. Geetha and Dr.M. AmuthaPrabakar ICAAET – 665 COMPARATIVE STUDY OF HASH TREE AND HASH GROUP BITMAP INDEX Amitha Elizabeth T J, Lakshmi Vinod, RanjidhaRajan ICAAET – 668 AUTOMATIC DATA EXTRACTION IN DEEP WEB USING BOOTSTRAPPING APPROACH C Chinnumolshivic, G Pavai and Dr. T.V. Geetha ICAAET – 671 RARS-PAM: RESOURCE AWARE RECOMMENDATION SYSTEM WITH PARALLEL AUTHORIZED MAPREDUCE TASK IN HADOOP RaveathulFarzaana.M.Y and Dr. K. Latha ICAAET – 674 FIREWALL DESIGN FOR SOFTWARE DEFINED NETWORK ARCHITECTURE VIA OPENDAY LIGHT CONTROLLER Praveen Raj. R. C and Anandavalli. D ICAAET – 677 PREVENTION OF ROUTE REQUEST FLOODING USING END TO END DELAY Remya VR RoseMary PX and Sumesh S ICAAET – 681 HYBRID APPROACH FOR ANOMALY DETECTION Donna Alex, ShilpaManilalGaina K.G ICAAET – 682 WORMHOLE ATTACK DETECTION ALGORITHM IN WIRELESS NETWORK CODING SCHEMES G.Pradeepkumar, P.Omprakash and A.Malathy ICAAET – 686 SWIFT SHOPPING IN SMART CITIES S. Gowtham Raj, J. Rajeevrathan, S. Senthil Kumar and V.Rajaramanan ICAAET – 689 CRITICAL GREEDY BASED OPTIMIZED SCHEDULING OF SCIENTIFIC WORKFLOWS IN CLOUD COMPUTING J. Angela JennifaSujana, Dr. T. Revathi, G. Karthiga and R. Venitta Raj ICAAET – 692 DISTRIBUTED EVOLUTIONARY FUZZY K-MEANS WITH AUTOMATIC CENTER CALCULATION AND SELECTION OF K CLUSTERS USING GAUSSIAN FIREFLY ALGORITHM FOR DISTRIBUTED DATASETS Divya.P, Ranjani.C, Kalaiarasu.M and Dr.Radhakrishnan.R ICAAET – 697 VARIOUS SCHEDULING METHOD FOR IMPROVING DATA DELIVERY EFFICIENCY IN VEHICULAR AD-HOC NETWORKS Selvi R, Jeethalakshmi P.S ICAAET – 698 A STUDY ON VARIOUS INDEXING TECHNIQUES IN SUBGRAPH SEARCH Sharmila G, Ishwarya K, Kavitha Devi M.K ICAAET – 702 AN INNOVATIVE DNA CRYPTOGRAPHY ALGORITHM INSPIRED BLOCK CIPHER ALGORITHM Ginny and Dr. G. Sahoo ICAAET – 703 EFFICIENT METHODS FOR DISTINCTION PRECLUSION IN DATA MINING Dr. P. Sivakumar, M. Prakash and Dr. G. Singaravel ICAAET – 704 CLOSED LOOP PERFORMANCE INVESTIGATION OF CHOPPED FED DC MOTOR USING VARIOUS CONTROLLER M.Abinaya,P.NedumalPugazhenthi,S.Selvaperumal,G.Prabhakar and P.Gnanaskandaparthiban ICAAET – 705 PROACTIVE FAULT TOLERANCE MECHANISM IN CLOUD LOAD BALANCING AthiraRajan T, Swetha Lakshmi S and Mahesh A S ICAAET – 707 GPS AND GSM TOLL COLLECTION SYSTEM (GGTCS) FOR INDIAN TOLL BOOTHS D.Venkataraman, SiddarthHarinarayanan, NandinaVinay, VamsiTallam, Surya Teja Reddy ICAAET – 709 USING ENHANCED AADMA ASSOCIATION RULE MINING ALGORITHM ON AUTOMOBILE DATASET GurpreetBatra, Alpana Vijay Rajoriya ICAAET – 710 DEVELOPMENT OF EFFICIENT RESOURCE ALLOCATION ALGORITHM FOR WIMAX RELAY NETWORKS M.Uma Devi and M.Raja Lakshmi ICAAET – 713 IMPLEMENTATION OF NEURAL BASED SELF TUNING FUZZY LOGIC CONTROLLER IN NON LINEAR SYSTEM GayathriAnbalagan ICAAET – 717 DESIGN OF ROBOT CELL FOR GEAR MANUFACTURING PROCESS MirjiSairajGururajand A. ArockiaSelvakumar ICAAET – 721 A SECURED DATA HIDING IN VIDEO FRAMES BY USING SMVQ Priyanga C, Raja Lakshmi M ICAAET – 722 AN INTELLIGENT ANOMALY DETECTION FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORK P.Vigneshwaranand Dr.R.Dhanasekaran FROM SAFER K ICAAET – 725 AN IMPROVED NETWORK INDEPENDENT TWO-STEP AUTHENTICATION SCHEME USING TLS Sandeep Singh and Ravishanker ICAAET – 730 INTELLIGENT INTRUSION DETECTION SYSTEM IN BORDER REGIONS USING IMAGE ANALYSIS AND NEURAL NETWORKS mr. k. vivek raja and ms.k.padmapriya ICAAET – 733 FEATURE EXTRACTION IN SPATIAL DOMAIN FOR EFFECTIVE CBVR N.Sivakumar and G.Annapoorani ICAAET – 735 X.509 BASED CERTIFICATE AUTHORITY WITH ASYMMETRIC PUBLIC KEY CRYPTOGRAPHIC ALGORITHM FOR MOBILE AD-HOC NETWORKS P. Gowthamarayathirumal and Dr. C. Chandrasekar ICAAET – 739 DISASTER ALERT NOTIFICATION AND RESCUE MANAGEMENT THROUGH SMART PHONES USING GPS M Gughan Raja, B John Samuel and Dr N Kirubanandasarathy ICAAET – 740 PRIORITIZATION OF ASSOCIATION RULES USING MULTIDIMENSIONAL GENETIC ALGORITHM Dr. R.M.Vidhyavathi ICAAET – 746 A HISTOGRAM TECHNIQUE TO CONSTRUCT MEMBERSHIP FUNCTION OF NUMERIC DATA HarikeshBahadurYadav, Dilip Kumar Yadav ICAAET – 752 ENHANCED BIOMETRICS SECURITY SYSTEM IN SMART PHONE APPLICATION WITH ENERGY CONSUMPTION InfantaPrincy S and Karthikeyan N ICAAET – 754 ROLE BASED ACCESS CONTROL POLICY IN SECURE SHARING HEALTHCARE DATA USING MULTI CLOUD T. B Sivakumar, Dr. S. Geetha and Dr. M. AmuthaPrabakar ICAAET – 755 DESIGNING A COST EFFICIENT ACOUSTIC MODEM FOR UNDERWATER COMMUNICATION Niveditha R, Senthil Kumar S, Rajeevrathan J, Perumalraja R ICAAET – 756 DDOS ATTACKS RECENT TRENDS AND SECURITY ISSUES Sreekanth .S and A.S. Mahesh ICAAET – 761 A SOFT COMPUTING BASED ANALYSIS ON MOISTURE CONTROL IN PAPER INDUSTRY Senthil Kumar M, Prabhakar G, Sangeetha B ICAAET – 762 CLUSTERING BASED FEATURE SUBSET SELECTION THROUGH MST FOR IDENTIFYING MOST REPRESENTATIVE FEATURE SUBSET Vandana Babu Talakayala, Nagabhushanam Dasari, Shariff Mohammad ICAAET – 765 AN IMPROVED PSO-BASED TEST DATA GENERATOR FOR DATA FLOW COVERAGE SapnaVarshney, Monica Mehrotra ICAAET – 771 COMPARISON OF DEGREE BASED AND LEACH CLUSTERING TECHNIQUE IN WSN Mounica.M, Kamalesh.S and Ganesh kumar.P ICAAET – 773 INTEGRATED KNOWLEDGE BASED WEB-PAGE RECOMMENDATION SYSTEM Zulaiha and Dr.T.Raghuveera ICAAET – 774 AN OPTIMIZED APPROACH FOR PROTECTING LARGE SCALE DATA PRIVACY S. Kavitha, E. Sivaraman and P. Raja Vadhana ICAAET – 776 ENHANCED SOCIAL TRUST COMPUTATION FOR ENRICHED TRUST BASED RECOMMENDER SYSTEM K.T.Senthilkumar and Dr.R.Ponnusamy ICAAET – 781 MODIFIED ANT AND BEE ROUTING PROTOCOL FOR INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORK T.M. Jeya Kumari and Mr.S. Ilankumaran ICAAET – 785 A BAYESIAN APPROACH OF SOFTWARE RISK ASSESSMENT Chandan Kumar, DilipKumarYadav ICAAET – 789 ENHANCED LUNG NODULE DETECTION USING COMPUTER AIDED DIAGNOSIS SYSTEM Kuppusamy G ICAAET – 792 FREQUENT PATTERN MINING FROM WEB USAGE DATA D.Gandhimathi and Dr.N.Anbazhagan ICAAET – 793 ENHANCING NETWORK SECURITY WITH VIJANA ENCIPHERMENT TECHNIQUE M.Janaki and Dr.M.GanagaDurga ICAAET – 794 THE DYNAMICS OF A DISCRETE-TIME RATIO-DEPENDENT PREY-PREDATOR MODEL INCORPORATING PREY REFUGE AND HARVESTING ON PREY Dr. (Sr.) Elizabeth Sebastian and Preethi Victor ICAAET – 799 DETECTING PRIMARY USER EMULATION ATTACKS IN COGNITIVE RADIO NETWORKS A.UmaMaheswari and Dr.K.Latha ICAAET – 801 AUTOMATED TOLLGATE PAYING SYSTEM WITH RFID USING CLOUD COMPUTING Rajeevrathan J, Senthil Kumar S, Dhivya R, Mounica M, Sumithra A ICAAET – 803 ENCRYPTION ON PREDICTION OF MEDICALDATA FOR CVD DISEASE IN CLOUD ENVIRONMENT Balasuramaniyan, A.Jeyasaravanan ICAAET – 804 ZONE BASED CONSOLIDATED ROUTES IN MULTICAST ROUTING UNDER MOBILE ADHOC NETWORKS R.Shankar and Dr. E.Ilavarasan ICAAET – 806 TRUST BASED ASSOCIATION ESTIMATION TECHNIQUE ON AODV PROTOCOL AGAINST PACKET DROPPERS IN MANET R. Anandhajothi, AL. Jeeva and Dr. V. Palanisamy ICAAET – 808 SECURING COGNITIVE RADIO NETWORKS FROM PRIMARY USER EMULATION ATTACK. S.Saranya and R.GracelinSheeba ICAAET – 810 PREVENTION AND DETECTION OF DDoS ATTACKS IN WSN USING A NEIGHBOR TABLE APPROACH SiddhantChawla, NitinUmesh ICAAET – 813 A HYBRID K-MEAN ALGORITHM TO IMPROVE CLUSTER QUALITY IN DATA MINING MandeepKaur, RajdeepKaur ICAAET – 816 A COMPARISON OF MULTIBAND RECTANGULAR PATCH ANTENNA WITH ASYMMETRICAL SLOTTED LINES USING RF TOOLS S.C.Sivaprakash, A.Abuthaahir, K.M. Sivaprasath, B.S.Vijayram and Dr.A.Sivanantharaja ICAAET – 821 EXPERIMENTAL INVESTIGATION ON DYNAMIC BEHAVIOUR OF COIR/SISAL HYBRID REINFORCED COMPOSITES FOR 30% WEIGHT OF FIBER LOADING Mr.S.Balu, Mr.M.G.Sabariraj and Dr. P.S.Sampath ICAAET – 822 CARP-AODV: CONGESTION AWARE AODV ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK M. Senthil,S.Nivedha andK. Siddharth ICAAET – 823 PERFORMANCE COMPARISON BETWEEN STATIC AND DYNAMIC NETWORK ENVIRONMENT USING NETWORK SIMULATOR-2 V.Sameswari and Dr.E.Ramaraj ICAAET – 828 CLOUD RESOURCE MANAGEMENT SYSTEM USING SNMP HanifaArfi, Yaseer A. Ahmad and Dr. S. K. Sahana ICAAET – 829 VISUALIZATION OF NEAREST NEIGHBORS IN WEB SERVICES D.Vijayadurga, S.Ramesh and M.Seema ICAAET – 838 CONTINUOUS MONITORING AND ALERTING SYSTEM FOR ICU PATIENTS USING WIRELESS SENSOR NETWORK S.JenifaYasmin ICAAET – 841 ENERGY EFFICIENT MULTICAST AND UNICAST APPROACH FOR REKEYING IN IPV6 G. VinothChakkaravarthy, P. Ambigaand T. Grace Shalini ICAAET – 843 DESIGN AND IMPLEMENTATION OF IDENTITY BASED SIGNATURE FOR E-MAIL AUTHENTICAION Sathish A, DhandapaniSamiappan ICAAET – 845 A SURVEY OF PERFORMANCE IMPROVEMENT TECHNIQUES FOR HADOOP AkshaySood, Ravinder Singh ICAAET – 848 SEGMENTATION OF IMMUNE CELLS BASED ON TOGGLE OPERATOR AND COUNTING CiyamalaKushbu, ShaikMajeeth ICAAET – 850 EFFICIENT ROUTING PROTOCOL IMPLEMENTATION FOR MULTIPLE PRIMARYSECONDARY USERS IN COGNITIVE RADIO NETWORKS T.Radhadevi and T.R.P.Monisha ICAAET – 853 ENHANCING THE CLUSTERING TECHNIQUE FOR UNCERTAIN DATA MINING Avinash Kumar, Chandra BhushanSah, Robin PrakashMathur ICAAET – 873 AN EFFICIENT VANET SYSTEM FOR PRIORITY BASED, ACCIDENT AVOIDANCE AND SHORTEST PATH NAVIGATION Nadheer Ahmed ICAAET – 881 AN ANALYSIS OF REGRESSION TESTING USING BLACK BOX METHODOLOGY Nidhula Sebastian, Surya T U and M. Soumya Krishnan ICAAET – 882 A COMPARISON BASED ANALYSIS OF EULER CIRCUIT FINDING ALGORITHMS Ligiya Joseph Simenthy, ReshmaBoban and M. Soumya Krishnan ICAAET – 884 SIMULATION MODEL TO AFFORD EFFECTIVE RESOURCE ROUTING AND ALLOCATION PROCEDURE FOR BIO-MEDICAL APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT Karthikeyan Nagarajan, Kanmani A ICAAET – 887 INTRUSION ANALYSIS FOR VULNERABLE NETWORK ENTITIES USING ARTIFICIAL NEURAL NETWORK P.Revathi and Dr. S. Srinivasan ICAAET – 893 HUMAN ACTION RECOGNITION USING SPATIO-TEMPORAL FEATURES n.nivetha and k.ushakingslydevi ICAAET – 899 MINING FREQUENT PATTERN IN MTC ENVIRONMENT USING TREE BASED ASSOCIATION RULE RagaventhiranJaganathan ICAAET – 900 EPSR: ENHANCED PROACTIVE SOURCE ROUTING PROTOCOL FOR EFFICIENT PROTOCOL IMPLEMENTATION IN MOBILE ADHOC NETWORKS A. Mahalakshmi and Dr. G. Ramesh ICAAET – 901 INTEGRATED APPROACH TO INFORMATION SECURITY USING STEGANOGRAPHY AND CRYPTOGRAPHIC HASH SahilMittu, Sami Anand, SumitMittu ICAAET – 902 A COMPLETE AUTOMATED ALGORITHM WITH A FUSION OF OPTIMIZATION AND CLUSTERING TECHNIQUES FOR TUMOR IDENTIFICATION IN MULTIMODAL MR BRAIN IMAGES Anitha. N, Vishnuvarthanan. G, PallikondaRajasekeran. MandArunprasath. T ICAAET – 906 A RIGID CONVEX HULL BASED TOPOLOGY CONTROL FOR WIRELESS SENSOR NETWORKS Saravanan Kandasamy and Pravin Renold.A ICAAET – 907 DESIGN OF GRAPHICAL USER INTERFACE FOR AUTOMATIC TEST EQUIPMENT (ATE) D.PhaniSashanka, CH.Priyanka ICAAET – 909 COMPRESSIVE SENSING OF K-MEANS CLUSTERING ALGORITHM IN WIRELESS SENSOR NETWORKS Malathi B, Saranya R, and Ramasamy K ICAAET – 910 ENHANCE THE INTER CLUSTER COMMUNICATION USING CP-ABE FOR MULTICAST SECURITY IN MANET M.Soniyagandhi, Mrs.k.LingadeviDr. K. Ramasamy ICAAET – 911 EXTENDED VMBUDDIES USING MAPREDUCE FOR MIGRATION OF MULTI TIER APPLICATIONS IN CLOUD COMPUTING Preetjot Singh, Avinash Kaur, Harshpreet T Singh ICAAET – 912 SECURITY ENHANCEMENT OF AODV PROTOCOL FOR MOBILE ADHOC NETWORK S. Soorya, Mr. G. Sivakumar.Dr.K.Ramasamy ICAAET – 914 SOFTWARE EFFORT ESTIMATION USING NON ALGORITHMIC APPROACHES: A REVIEW Sheena Thakur, NishaSethi, Harshpreet Singh ICAAET – 915 ENHANCEMENT OF NETWORK LIFE TIME USING DTMAODV-BP BASED MULTICAST ROUTING PROTOCOL Mr. S.Jebakumar gomer rajadurai, S.Chitra,Dr. K. Ramasamy and Dr. J. Veerappan ICAAET – 916 ATTACKER NODE DETECTION BY USING FREQUENCY BASED APPROACH P.Gowrilakshmi, Mr. N.R.Sathiskumar.Dr.K.Ramasamy ICAAET – 917 AUGMENTATION OF USABILITY AND SECURITY IN HYBRID GRAPHICAL PASSWORDS WITH EFFECTIVE HARD AI PROBLEM Petchiammal A, Venkateswari S ICAAET – 918 AN EFFICIENT MOBILITY CORRELATION FOR GROUP DETECTION IN VANET S.Mahalakshmi, N.Thenmoezhi and Dr.K.Ramasamy ICAAET – 919 AN ENHANCED SECURITY FOR AUDITING MULTIPLE TASKS IN CLOUD Veerapathiran Subramanian , Nivedhitha R, Udayarani R, Deepa R ICAAET – 923 SYBIL ATTACK DETECTION THROUGH DISTANCE CALCULATION IN VANET VaishaliAggarwal, Ravinder Singh ICAAET – 926 SECURE DATA TRANSMISSION FOR MILITARY ENVIRONMENT USING BLOWFISH ALGORITHM Gopu K, Jansi Rani N, Jothi Soruba Thaya A,Shiyamala ICAAET – 928 IMPLEMENTING MESSAGE INTEGRITY IN MOBILE PHONES (ANDROID PLATFORM) USING IDENTITY BASED ENCRYPTION Archana Devi R, Anu Mary Chacko and VinodPathari ICAAET – 929 INDIAN SIGN LANGUAGE RECOGNITION SYSTEM FOR ASYMMETRICAL HAND GESTURES Suchithra.M, Snehaa.S, GopikaNambiar, Arya.CandDiviyaBharrathi.L.B ICAAET – 930 AN EFFICIENT INTRUSION DETECTION SYSTEM WITH BOAT CLASSIFIER TO DETECT RARE AND FREQUENT MISUSE ATTACKS IN MANET Islabudeen. M, Kavitha Devi. M.K ICAAET – 934 TO OVERCOME THE INCAST CONGESTION AND ENHANCE THE SECURITY IN MANET UshaNatiya, Muthu Mari ICAAET – 935 "DACMACSAC” Algorithm for Securing Data in Object Oriented Databases Hardeep Singh Damesha, Veerpal Kaur Damesha ICAAET – 936 IMPROVING ENERGY-EFFICIENCY IN WSN USING SLEEP SCHEDULING TECHNIQUE Karthika G, Rajeswari A ICAAET – 940 OBJECT RECOGNITION USING ADABOOST BASED MULTIPLE INSTANCE PRUNING S. Kanagamalliga, Dr.S.Vasuki and P.Pathumarubini ICAAET – 944 TURN DOWN IN ENERGY UTILIZATION IN WIRELESS CELLULAR NETWORK KarpagamEswari, M.Vidhyaa M ICAAET – 945 SELADG: SECURE ENERGY EFFICIENT LOCATION AWARE DATA GATHERING APPROACH FOR WIRELESS SENSOR NETWORKS M. Roseline Juliana,Dr. S.Srinivasan ICAAET – 946 ASYMMETRIC MULTILEVEL INVERTER STRUCTURE WITH HYBRID PWM STRATEGY N. Prabaharan, Dr. K. Palanisamy and A. Rini Ann Jerin ICAAET – 947 REACTIVE ROUTING ENHANCEMENT USING LOCAL PATH DIVERSITY IN WIRELESS SENSORNETWORKS R.Rengalakshmi, Ms.P.Ganeshwari,Dr.K.Ramasamy ICAAET – 951 COMPARATIVE ANALYSIS OF DATA MINING ALGORITHMS FOR FREQUENT ITEM SET WITH ENHANCE TECHNIQUE Anil Kumar, Er. VarunSingla ICAAET – 952 RULE EXTRACTION IN SENTIMENT ANALYSIS UNDER BIG DATA ENVIRONMENT Jaskaran Singh, VarunSingla ICAAET – 953 A HYBRID TECHNIQUE TO DETECT FAKE ACCESS POINT IN WLAN RohitBhardwaj ICAAET – 955 REDUCE NETWORK INTERFERENCE FOR THE EFFICIENT USE OF SPECTRUM SHARING BY THREE-TIER FEMTOCELL NETWORK PriyaSubburaj, Udhaya R ICAAET – 957 METHODOLOGY TO REDUCE TRANSACTION IN CANDIDATE SET GENERATION THROUGH APRIORI ALGORITHM Dr. K.Kavitha ICAAET – 961 OPTIMUM PATH SELECTION AND LOW END TO END DELAY USING OSDRP IN CRNS J.shanthi, Mrs.A.R.Devi, Dr.K.Ramasamy ICAAET – 964 COHERENT TRANSLUCENT TESTING OF FIREWALL POLICIES Renuga Devi Ravichandran, Sathish Raja Paneerselvam ICAAET – 966 A NOVEL TECHNIQUE FOR UNICASTING TO IMPROVE THROUGHPUT, REDUCED ENERGY CONSUMPTION &PACKET LOSS IN MANET Dheeraj Sharma, RohitSethi ICAAET – 970 DETAILED EXAMINATION ON THE PERFORMANCE OF ENHANCED DECISION TREE ALGORITHM (EDTA) AND ITS COMPARISON WITH C4.5 ALGORITHM Sunakshi Sharma ICAAET – 976 SECURE DATA TRANSMISSION AND FILE SHARING IN CLOUD COMPUTING Maheswari G, Revathi E ICAAET – 980 BLIND WATERMARKING FOR THE IMAGES CAPTURED BY ANDROID MOBILES Vineeth M K, YazirArafath A B, Dhanya M Dhanalakshmy, Bagyammal T ICAAET – 983 LEADING TECHNIQUES FOR DETECTING DUPLICATE BUG REPORTS A SAMPLE SURVEY R. Nantha Kumar, N. G. Bhuvaneswariamma ICAAET – 984 DESIGN AND IMPLEMENTATION OF A LOOK UP TABLE BASED TCSC CONTROLLER FOR POWER SYSTEM STABILITY ENHANCEMENT Mamatha S, K C SindhuThampatty, Aarti N ICAAET – 985 SECURING INFORMATION TRANSFER IN ONLINE GAMING Jeevaanantham.V, Sasikumar.Gand N.Harini ICAAET – 989 REAR FORCE BASED ADAPTIVE ROUTING IN COMMUNICATION NETWORKS R Dhaya ICAAET – 994 AN ENHANCED APPROACH TO SSL SERVER LOAD MANAGEMENT BASED ON SERVER HEALTH Dipesh Gupta, Hardeep Singh ICAAET – 999 IMPROVING EFFICIENCY OF DEVICES IN IOT USING HYBRID PHOENIX SYSTEM HarneetKaur, Akhil Sharma ICAAET – 1002 DFRS: DIET FOOD RECOMMENDATION SYSTEM FOR DIABETIC PATIENTS BASED ON ONTOLOGY B. Raj Kumar, Dr. K. Latha ICAAET – 1010 VISUAL CRYPTOGRAPHIC SCHEMES FOR SECURE IMAGE SHARING Archana Devi R, SravanthiCh, Yasaswy A, Varsha A. ICAAET – 1013 PERFORMANCE ANALYSIS OF SINGLE BL RAM USING POWER REDUCTION TECHNIQUES Lavanya R, Banukavitha V, Durgadevi M ICAAET – 1015 A TECHNICAL REVIEW ON OBESITY ANALYSIS USING CLASSIFICATION ALGORITHMS Suguna M, Sathees Kumar B ICAAET – 1016 A SURVEY ON HEART DISEASE PREDICTION USING DATA MINING TECHNIQUES Sharan Monica L,Sathees Kumar B ICAAET – 1020 ENSURING IMAGE INTEGRITY IN ANDROID Archana Devi R., AnugrahaRajagopal, Sowmya B.M., SowmyaSree M., Ravi TejaBandela ICAAET – 1022 A SURVEY ON LIVER DISORDER USING CLASSIFICATION TECHNIQUES IN DATA MINING Vahini R, Sathees Kumar B ICAAET – 1024 A SURVAY PAPER ON MODEL BASED TESTING APPROACHES AND THEIR CHALLENGES GurpreetKaur, AlpanaVijayRajoriya ICAAET – 1025 TO REDUCE PROCESSING TIME TO GENERATE FREQUENT ITEMSET USING LAPLACE EQUATION IN APRIORI ALGORITHM ShilpiSingla, Arun Malik ICAAET – 1026 IMPROVING FACE VERIFICATION RATE USING NEAR INFRARED AND VISIBLE IMAGE FUSION BASED ON DIFFERENTIAL EVOLUTION Rajesh Thakur, Baljit S. Saini ICAAET – 1027 UDDI ADVERTISEMENT CENTRIC SEMANTIC WEB SERVICE DISCOVERY SYSTEM S. Priya, Dr.A. Grace Selvarani ICAAET – 1028 AN ENERGY-SAVING ROUTING ALGORITHM FOR WIRELESS BODY SENSOR NETWORK USING DATA COMPRESSION TECHNIQUE KarthickK,Vijayakumar R ICAAET – 1033 TO INTENSIFY CLUSTER QUALITY BY ENHANCING K-MEANS CLUSTERING ALGORITHM IN DATA MINING Twinkle Garg, Arun Malik ICAAET – 1044 LOCALISATION AND RECOGNITION OF LICENSE PLATE SYMBOLS M. BadmaNagini, A. Siva Sankar ICAAET – 1045 FEATURE EXTRACTION AND CLASSIFICATION FRAMEWORK FOR FACE RECOGNITION SYSTEM E. JebamalarLeavline, H. Xavier Paul Rajan and D. Asir Antony Gnana Singh ICAAET – 1046 EVALUATION OF ONLINE REPUTATION SYSTEMS IN REAL TIME APPLICATION Lakshmi Vidyadharan, Karthigha M ICAAET – 1047 CLOUD MONITORING USING OBJECTS WITH IDENTIFIERS ValliyappanVaiyapuri ICAAET – 1050 IDENTICAL TWINS RECOGNITION BY UNIFYING THE FACIAL AND LIP FEATURES B.LakshmiPriya, Dr. M.Pushpa Rani ICAAET – 1051 IMPROVING THE PERFORMANCE OF E-MAIL SPAM CLASSIFICATION USING F-GSO ALGORITHM FOR FEATURE SELECTION D. KarthikaRenuka, Dr. P. Visalakshi, V. Sri Vinitha ICAAET – 1054 TO ENHANCE THE OTP GENERATION PROCESS FOR CLOUD DATA SECURITY USING DIFFIE-HELLMAN AND HMAC KomalpreetKaur, RohitSethi ICAAET – 1055 SUPERVISORY SERVICE FOR CLOUD INFRASTRUCTURE AND SERVICES SravyaNujella, PradeepKaranam ICAAET – 1059 A MODIFIED RADIO RESOURCE ALLOCATION AND GREEN OPERATION FOR MOBILE ACCESS NETWORK BASED ON RADIO OVER FIBER Uma C ICAAET – 1060 ANALYSIS OF VARIOUS AUTONOMOUS SINK RELOCATION MECHANISMS IN FLAT RANDOM DISTRIBUTED BASED ON NODE DENSITY FOR IMPROVING WIRELESS SENSOR NETWORK LIFETIME Pavatha P, Manikandan B ICAAET – 1063 FUZZY ANALYTIC NETWORK PROCESS BASED QUANTIFICATION OF COMPONENT SELECTION AND RANKING FOR COMPONENT BASED SOFTWARE ENGINEERING Megha Grover, Harshpreet Singh, Gurpreet Singh ICAAET – 1064 STEP VERIFICATION FOR DETECTION OF BLACK HOLE ATTACK IN MANET Neha, Sharma Manmohan ICAAET – 1069 RAPID DATA COLLECTION IN WIRELESS SENSOR NETWORKS Murugan C ICAAET – 1071 HOSPITAL MANAGEMENT SYSTEM USING NFC TECHNOLOGY Jeyapreetha J, MounicaMuruganandham, Bala Subramanian D, Suresh Babu P ICAAET – 1078 CO-OPERATIVE TRUST AWARE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS Deepika N.P, PravinRenold A ICAAET – 1079 PERFORMANCE EVALUATION IN ENERGY CONSUMPTION TO INCREASE NETWORK LIFE TIME IN MANET RupinderKaur, Pooja Devi ICAAET – 1080 PERFORMANCE ANALYSIS OF OBJECT BASED ACCOUNTABILITY FRAMEWORK IN CLOUD COMPUTING Pradeep Singh, Parminder Singh, Kiran Jyoti ICAAET – 1083 ACCELERATING THE PERFORMANCE OF SECRET SHARING ALGORITHM USING GPU Suchithra M, Sikha O K ICAAET – 1087 HUMAN SKULL AND FACE IDENTIFICATION USING SIFT TECHNIQUE M. Chitra Devi, Dr. M. Pushpa Rani ICAAET – 1088 IMAGE STEGANOGRAPHY BASED ON LSB MATCHING REVISITED USING SECRET SHARING APPLICATION Ajith V, Kanagaraj S, Malathi P ICAAET – 1091 PERFORMANCE ENHANCEMENT OF FAULT TOLERANT ROUTING ALGORITHM IN OPTICAL WDM NETWORKS Ramesh, Vijayakumari, SenthilSabarinath ICAAET – 1094 A REVIEW ON ENHANCED NODE PLACEMENT STRATEGY FOR COST OPTIMIZATION IN WMSN OVER ELEVATED TERRAIN MeresonglaAier, Rajeev Kumar Patial ICAAET – 1099 ENERGY EFFICIENT POWER SAVING PROTOCOLS FOR ADHOC NETWORKS USING HYPER QUORAM SYSTEM Kavitha S ICAAET – 1100 GAIT BIOMETRICS AS AN AUTHENTICATION IN SMARTPHONES ShashwatSagar, Mohinder Kumar ICAAET – 1105 BENEFITS OVER ENVIRONMENT USING INFRASTRUCTURE AS A SERVICE IN CLOUD COMPUTING AnuragShukla, SumitBabu, AvendraSahu ICAAET – 1106 SECURE TAG BASED IMAGE RETRIVAL USING TIR-AES ALGORITHM N.Suriya Devi, Dr. M.Pushpa Rani ICAAET – 1113 HUMAN ACTIVITY RECOGNITION USING CSI ANGLE & EUCLIDEAN DISTANCE FEATURE AvendraSahu, AnuragShukla, Vikesh Kumar ICAAET – 1114 DOCUMENT RANKING STRATEGY ENHANCEMENT USING PARAGRAPH RANKING Er. Yaseer Ali Ahmad and Dr. AbhijitMustafi ICAAET – 1115 IDENTIFYING THIRD-PARTY-INFLUENCED VULNERABILITIES IN POPULAR MASSIVELY MULTI-PLAYER ONLINE ROLE-PLAYING GAMES Hari Kumar, Ritwik M, Arjun Nair ICAAET – 1118 REAL-TIME DUPLICATE FILE DETECTION SYSTEM Yaseer Ali Ahmad, Dr. AbhijitMustafi ICAAET – 1120 CUSTOMER REVIEW SUMMARIZATION USING SUPERVISED LEARNING TECHNIQUES SwapnilVijayvargiya, DarvinderKaur ICAAET – 1122 RANKING OF BRAIN TUMOR THROUGH SYMPTOMS IN SEVERAL DISEASES Nikita, Yaseer Ali Ahmad, G. Sahoo ICAAET – 1123 ARC LENGTH AND RESIDUAL ENERGY BASED MULTI PATH SECURE ROUTING PROTOCOL(ALRMSR) FOR WIRELESS SENSOR NETWORKS Stella.K Stanley, Dr.E.N.GaneshNarasimhan ICAAET – 1125 FINEST ENERGY EFFICIENT DISPATCH FOR BIDIRECTINAL TRANSMISSION USING CLUSTERING TECHNIQUES R. Lavanaya, S. HasanHussain ICAAET – 1132 A NEW COMBINATIONAL APPROACH OF ANDROID AND BRACKETS TO MANAGE EMPLOYEES VIA GPS M.Dinakaran, G.Siva Shanmugam, V.Vijayarajan and R.Kannadasan ICAAET – 1133 A TRIANGULAR SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS M.Dinakaran, G.Siva Shanmugam, V.Vijayarajan and R.Kannadasan
© Copyright 2024