You are on page 1of 14

National Conference on

Recent Trends in Computer Science and Applications

NCRTCSA-2016

EDITOR
Dr.S.Malathi

Organized by

Department of Computer Science


Rabiammal Ahamed Maideen College For women, Tiruvarur
(Affiliated to Bharathidasan University-Tiruchirapalli)

SELP Publications - 2016

i
National conference on Recent Trends in Computer Science and Applications
NCRTCSA-2016

SELP PUBLICATIONS, TIRUCHIRAPPALLI.

Copyright ©2016 the publisher, the editors and the authors.

All rights reserved.

This book contains information obtained from authentic and highly regarded sources. The
printed material is quoted with permissions, and sources are indicated. Reasonable efforts
have been made to publish reliable data and information, but the author and the publisher
cannot assume responsibility for the validity of all materials or for the consequences of their
use.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in


any form or by any means electronic, mechanical, photocopying, Recording, or otherwise
without the prior written permission of the copyright holder.

ISBN: 978-93-80509-83-9

Published by SELP publications, Tiruchirappalli.

ii
iii
iv
About Conference

The objective of the conference is to provide a national level platform for researchers,
academicians, professionals and students to share their research ideas, experience and to offer
suggestions of sustainable development in computer science.
This Conference proceedings Recent Trends in Computer Science and Applications focuses
on the Current Trends and Issues in Artificial Intelligences and Robotics, Big-Data, Cloud
Computing, Cyber Crime and Cyber Law, Data Mining, Genetic Algorithms along with
general and opinion articles discussed in National Conference (NCRTCSA-2016) held at
Rabiammal Ahamed Maideen College for Women, Tiruvarur. This book will be of great
interest and useful for academicians, students and budding researchers in the field of
Computer Science Intelligence.

v
Preface

Computer science is an expanding research field driven by emerging application domains and
improving hardware and software that eliminate old bottlenecks even as they create new
challenges and opportunities for CS research. Accordingly, the number of research papers
published in CS conferences and journals has been increasing rapidly for the past two
decades. With growing emphasis on externally funded research in most universities, scientific
research is increasingly influenced by funding opportunities. Although many funded
programs are developed in close collaboration with leading researchers, we aim here to
identify more precisely relationships between funding and publications related to new topics
The Department of Computer Science, Rabiammal Ahamed Maideen College for women,
Tiruvarur, Tamilnadu, India organized two days National Conference on Recent Trends in
Computer Science and Applications (NCRTCSA-2016).The Response was overwhelming
and about 150 papers for SELP conference proceedings publication.
The Department of Computer Science expresses it sincere thanks to our secretary
Mr.S.M.Miskeen and Mr.Feroze Sha, M.Com., and Mrs.Fejila Feroze, B.Arch., Trust
members of our management for motivating us on this tremendous task.
Dr.A.Valliammai, M.A., M.Phil, Ph.D., D.F.G.M., M.H.R.M., M.B.A., PGDEAS., Principal of the
college has offered us suggestions every now and then to do the work successfully. We thank
her sincerely.
The Department of Computer Science expresses it sincere thanks to the organizing
Committee and appreciation for all the help and assistance rendered by various organizations
and institutions.
Editor

© SELP Publications 2016.

vi
CONTENTS

1 COMPARATIVE ANALYSIS OF AES AND DES SECURITY ALGORITHMS - 1


Dr.K.KUPPUSAMY, M.R.NAGARAJAN

2 MOBILE WALLET - Mrs. AKILA ARUNACHALAM 4

3 ANALYSING DDOS ATTACK PREVENTION METHODS USING PPM, PANA AND 7


IDPF - Dr.S.MALATHI

4 AVOIDING UNNECESSARY ELEMENTS IN PUBLIC NETWORK THROUGH 11


DISTRIBUTING KEYWORD - T.JAMUNA RANI, Dr. M. PRABAKARAN

5 EFFICIENT SPATIAL KEYWORD QUERIES ON ROAD NETWORKS USING QUERY 15


OPTIMIZATION - R. VANITHA Dr. M. PRABAKARAN

6 CENTRALIZED AND DISTRIBUTED MOBILITY MANAGEMENT SCHEMES IN 19


NESTED MOBILE NETWORKS -V.SANGEETHA, Dr.P.CALUWEL NEWTON

7 AN ANALYSIS OF DISEASE INFERENCE USING MACHINE LEARNING CONCEPT - 22


S. GAYATRI, Dr. M. PRABAKARAN

8 AN EFFICIENT GROUP KEY TRANSFER PROTOCOL FOR HARING INFORMATION 27


IN WIRELESS SENSOR NETWORKS USING IDENTITY BASED CRYPTOGRAPHY
SUBASH PRIANGA, P. SURIYA, K. VIDHYA , S. MANIKANDAN

9 LATENT FINGERPRINT ENHANCEMENT VIA MULTI-SCALE PATCH BASED 32


SPARSE REPRESENTATION - R. VIVEK P. SELVAKUMAR

10 BACKWARD PATH GROWTH FOR EFFICIENT MOBILE SEQUENTIAL 37


RECOMMENDATION - L. NATARAJAN - Dr. M. PRABAKARAN

11 MAP-BASED MULTI COPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING 42


K.RAJA, C.ARULANANTHAN, Dr.M.SABIBULLAH

12 OBJECTIVE QUALITY ASSESSMENT AND COMPRESSION FOR HIG H DYNAMIC 44


RANGE IMAGE TONE MAPPING - P. SUGANYA P. SELVAKUMAR

13 CLUSTERING THE DATA IN BIG DATA FOR ENERGY SAVING USING BALANCED 49
PARTITION - V. MALATHI , Dr. M. PRABAKARAN

14 STUDY OF IRIS RECOGNITION-J.REJINAMARY ,Dr.S.SELVAMUTHUKUMARAN 54

15 CRIME DETECTING USING DATA MINING TECHNIQUES 57


S. THAIYALNAYAKI, Dr. J. CHOCKALINGAM

16 STUDY OF FACE RECOGNITION - N.REVATHI, Dr.S.SELVAMUTHUKUMARAN 60

17 CREDIT CARD FRAUD DETECTION METHOD - G.PRIYADHARSHINI 63

18 ADVANCED CLOUD PRIVACY THREAT MODELING - M. UMA MAHESWARI 66

vii
19 BLUE EYES TECHNOLOGY - S.VIGNESH , K.MATHIKUMAR 72

20 FUNCTIONS OF 5 PEN PC TECHNOLOGY - K.VIMALA , D.ARCHANA 75

21 ANALYSING WEB CRAWLING ALGORITHMS - S. RAMYA 78

22 ANALYSIS OF ON-SITE WEB ANALYTICAL COOKIES-P. ANGAIYARKKARASI 82

23 AN ENERGY PREDICTABLE ROUTING ALGORITHM BASED ON ROUTING 86


PROTOCOLS -R.GNANAKUMARAN Dr.K.SUBRAMANIAN

24 WIRELESS SENSOR NETWORK SECURITY SERVICES AND ANALYSIS 90


G.ANURADHA & T.KALAIVANI

25 SECURE WIRELESS SENSOR NETWORK FOR HEALTH CARE MONITORING 94


G.SIVAGAMI, R.ELAKKIYA

26 WAVELET DENOISING TECHNIQUE WITH CLASSIFIED REGULARIZATION FOR 97


IMPULSE NOISE REMOVAL PROCESS - S. SAVITHA P. SELVAKUMAR

27 COMPARISON ON SCALING PLATFORMS FOR BIG DATA ANALYTICS 101


R. DURGADEVI

28 CHALLENGES OPPORTUNITIES WITH BIG DATA - A. NARAYANAN 104

29 THE BRAIN TUMOR DISEASE DETECTION IN MRI WEIGHTED IMAGES 106


S.GOUSIKA , S.MAKILA

30 A HOLISTIC E-JOURNEY WITH ENERGY AWARE DATA CENTER MANAGAMENT 110


AND SMART BUILDING CREATION IN GREEN CLOUDS
SOWBARNIKA , BARATHWAJ

31 COMPUTATIONAL STUDY OF STATIC AND DYNAMIC MEMORY ALLOCATION 113


N.MALARVIZHI

32 STUDY AND ANALYSIS OF NETWORK SECURITY - T. MANIVANNAN 118

33 ARTIFICIAL INTELLIGENCE AND ROBOTICS – R.SRIRAM, K.PRAKASH 123

34 CHARACTER RECOGNITION USING NEURAL NETWORKS 125


J .REVATHI , P.SANDHIYA

35 SCAFFOLD BIG DATA ANOTAMY USING MOBILE AGENT 128


PRABAVATHI.K , SWATHI .T

36 TECHNOLOGIES OF CLOUD COMPUTING - M.DEEPIKA , K.NANCYFEMINA 132

37 CYBER STALKING AND ITS LAW - M.MOHAMED SALIH, J.PARAMESVARAN 134

38 MULTIMEDIA AND GRAPHICS - MATHIYAZHAGAN.V , VEERAPPAN.G 136

39 OVERVIEW ON CYBER CRIME AND CYBER LAW 140


M.RAJKUMAR , B.MUTHUKUMAR

viii
40 GRADIENT HISTOGRAM THRESHOLD IMPLEMENTATION FOR IMAGE 144
SEGMENTATION - Mrs.J.VANITHA, Mrs. S.VISALATCHY

41 SURVEY PAPER ON SECURITY FOR DATA STORAGE AND BACKUPS IN CLOUD 148
COMPUTING - P.ANUSUYA, K.RENUGADEVI, S.MOHANAPRIYA

42 SECURITY ISSUES IN MOBILE COMPUTING - K.KAVITHA , R.PARKAVI 150

43 A COMPARATIVE STUDY OF CLASSIFICATION TECHNIQUES ANALYSIS IN DATA 154


MINING ALGORITHMS - Dr.J.SHARMILA

44 PORTRAYAL OF DATA MINING TOOLS – A PROPORTIONAL SURVEY - R.SUDHA 160

45 IDENTIFYING THE DIFFICULTIES OF OBJECT - ORIENTED DEVELOPMENT 164


S.SUGANYA

46 AN IMPROVED MEDIUM ACCESS CONTROL PROTOCOL FOR REALTIME 169


APPLICATIONS IN WLANS - S.JEYAPRABHA

47 SURVEY ON SEMANTICWEB MINING STRATEGY AND REMONSTRATION OF E- 174


COMMERCE IN OSN - B.DURGA DEVI, V.SARANYA

48 DYNAMIC SCHEDULING AND RESOURCE ALLOCATION IN PROXY-BASED 178


MULTI-CLOUD ENVIRONMENT - G.MALINI

49 HSA BASED MPSOC FOR ENHANCING THE ONLINE FILE STORAGE IN CLOUD 182
COMPUTING - P.ANANTHI

50 CONTROLLING ATM THEFT USING BIOMETRIC AUTHENTICATIONS 185


P.INDHUJA

51 ANALYSIS OF WIRELESS SENSOR NETWORK TECHNIQUES - P. VENNILA 188

52 CYBER SECURITY THREATS IN ONLINE BANKING - R.SRIRANJANI 191

53 CDPD TECHNOLOGIES IN MOBILE COMPUTING - R. NISHASRI , R.PUNITHA 197

54 PLATFORMS FOR BUILDING AND DEPLOYING APPLICATIONS FOR CLOUD 203


COMPUTING - S.A.N.NUSRATH RUKAIYA , S.KIRUTHIKA

55 AN OVERVIEW OF CYBER CRIME - K.VANAJA , NAJILA FARVEEN 206

56 GI-FI TECHNOLOGY - R.VITHYA , B.SOUNDHARYA 208

57 SMART-QUILL PEN - K.M.MOHAMED PREM NASEER , S.SUNDAR 210

58 MOBILE COMPUTING TECHNOLOGY - A. S. NAJIHA PARVEEN , R. AKSHAYA 212

59 AN OVERVIEW OF GOOGLE GLASS - RUMANA , ANU PRIYA.P 217

60 ANALYSING SECURITY ISSUES IN CLOUD COMPUTING - V.SIVAPRIYA 219

61 ROBOTIC AUTOMATED EXTERNAL DEFIBRILLATOR AMBULANCE IN SMART 222


CITIES - I.NIVETHA

ix
62 WORKING PRINCIPLE AND APPLICATIONS OF HOLOGRAPHY - S.NANDHINI 226

63 APPLICATION OF DATA MINING IN HEALTHCARE 228


M.RAMALISHWARI, P.RAMYA

64 BENEFITS AND CHALLENGES OF BIG DATA IN SMART CITIES - R .UTHRA 231

65 APPLICATION OF ROBOTICS IN FUTURE- S.SAMYUKTHA , A.EZHILARASI 235

66 ISSUES IN DATA INTERGRATION OF DATA WAREHOUSING 238


A.HALINA FARVIN , A.ARTHIKA

67 ISSUES FACED BY SERVICE PROVIDER & CONSUMER IN CLOUD SECURITY 241


A.MUBEENA BEGAM

68 TECHNIQUES AND APPLICATIONS OF DATA MINING IN ORGANIZATIONS 244


M.NAJLA , A.FAHIMA JENIFAR

69 RAIN TECHNOLOGY - X. JOSEJANIFER 247

70 RECYCLING E-WASTE MANAGEMENT USING GREEN COMPUTING-V. ANUSUYA 250

71 AN EFFECTIVE METHOD TO CONTROL THE ROBOT USING HAND GESTURES 253


S.JAYASURIYA, M.SWARNALATHA

72 SECURITY ISSUES OF MOBILE COMPUTING-B.VIDHYALAKSHMI, V.VINODHINI 256

73 AN OVERVIEW OF BLUEJACKING TECHNOLOGY - R.ARCHANA , S.NIVETHA 259

74 CHALLENGES AND SOLUTIONS OF VANET SECURITY 262


D.AGALYA, B.ASWINI SOFIYA

75 A SURVEY ON CLOUD COMPUTING USING VIRTUALIZATION TECHNOLOGY 265


V.RAMYA, N.RAMYA, P.DIVYABHARATHI, K.KIRUTHIKA

76 SECURITY ISSUES AND ITS SOLUTIONS IN E-COMMERCE 267


A.BARAKATHNISHA , S.MADHUMATHI

77 A STUDY OF WIRELESS LAN BASED APPLICATION USING ANDROID 270


SMARTPHONE - J.P.KEERTHANA AND S.RAMYA

78 THE IMPACT OF SOCIAL MEDIA IN CHILDS, YOUNGSTERS AND FAMILIES 273


G.BOMMI, N.DURGADEVI

79 AN OVERVIEW OF DATA MINING APPLICATIONS IN HEALTHCARE SECTOR 277


S.ANITHA, J.PRAGADEESWARI

80 AN OVERVIEW OF WEB CONTENT MINING TECHNIQUES AND ITS TOOLS 279


V.PARKAVI , S.RAJALAKSHMI

81 AN OVERVIEW OF MOBILE AD HOC NETWORKS TECHNIQUES AND ITS 282


SECURITY ISSUES - M.SUBALAKSHMI , S.JAYASHREE

82 SEPERATION OF NEWS AND RESEARCH ARTICLES USING PATTERN TAXONOMY 286


S.HAJA BATHURU MUNTHAHA , M.HASS NUSHRATH FATHIMA

x
83 ARTIFICIAL NEURAL NETWORKS APPLICATIONS IN HEALTHCARE 289
A. AMINA BEEVI

84 AVOIDING WALL PENETRATION PROBLEM IN LI-FI TECHNOLOGY 292


M.ASHIKA RASOOL, J.KAMALA PRIYA

85 ENCRYPTING MESSAGE USING AES ALGORITHM ON ANDROID APPLICATIONS 296


M.NOORUL RISWANA, S.NOORULFAREETHA

86 IMAGE FUSION TECHNIQUES FOR MULTI SENSOR IMAGES 299


T.DHIVYA , G.NANDHINI

87 INDICATION OF MOBILE AD-HOC NETWORK USING ROUTING PROTOCOLS 302


U.NIGMATH NISHA , M.HAJARA

88 ANALYSING MOBILE, AD-HOC AND WIRELESS SENSOR IN NETWORK 305


SECURITY - V.VIDHYALAKSHIMI , N.SURYA

89 RFID AND WIRELESS SENSOR NETWORK APPLICATIONS 309


S.PRIYADHARSHINI , R.MAHALAKSHMI

90 ANALYSING 3G AND 4G NETWORKS- J.JAITHUN HANISHA , S.SUMAYA NASRIN 312

91 A ROUGH SET BASED KNOWLEDGE DISCOVERY: A CASE STUDY OF 316


DIABETES CHILDREN PATIENTS - S.RAJESWARI

92 MOBILE COMPUTING - A.RATHIGA , T.TAMILSELVI 320

93 PROXIMITY AWARE LOCAL RECODING ANONYMIZATION WITH MAPREDUCE 322


FOR SCALABLE BIG DATA PRIVACY PRESERVATION IN CLOUDS
N.BALAMEENAKSHI , S.GEETHALAKSHMI

94 IDENTIFYING UNAUTHORIZED USERS USING BRAIN FINGER 325


PRINTTECHNOLOGY - S.LAAKSHMIMONICA, R.PUSHPAVALLI

95 IP SPOOFING ATTACK- A. MOHAMED ARSATH., N. PRAVIN 327

96 ZIGBEE TECHNOLOGY P.KOWSALYA , L.KARTHIKA 330

97 E-BALL TECHNOLOGY - A.KARPAGAM , K.ATCHAYA 332

98 FACEBOOK THRIFT - NISHANTHINI .M , PAVITHRA .A 335

99 MOBILE COMPUTING - R.AMIRTHAGANESHAN , S. MAHESH 337

100 PERFORMANCE EVALUATION IN VIRTUAL ORGANIZATIONS USING 360 340


DEGREE DATA MINING AND OPINION MINING
B.MADHUMITHA , S.DHARINI ISWARYA

101 ANALYSING OF WIRELESS SECURITY PROTOCOLS USING WEP, WPA AND WPA2 343
K.Z.AAYSHA FATHIMA, R.SOORIYA

xi
102 SYSTEM ARCHITECTURE FOR 5G HETEROGENEOUS FLEXIBLE CLOUD 346
RADIO ACCESS NETWORKS - G.AARTHI

103 THE EMERGENCE OF BIG DATA TECHNOLOGY AND ANALYTICS 350


P. MEERABAI

104 A DETAILED STUDY ON ETHICAL HACKING - T.MANJULA, V.KEERTHANA 352

105 ARCHITECTURE OF WIRLESS SENSOR NETWORK AND ITS APPLICATIONS 355


M.KALAIVANI , R.PRAVEENA

106 A REVIEW OF SOFTWARE AS A SERVICE EFFICIENT IN CLOUD COMPUTING 358


T.SUBASHINI , S.VIDHYA

107 AN OVERVIEW OF BIG DATA - M.KEERTHANA , K.SUGANYA 360

108 APPLICATIONS OF BIG DATA IN VARIOUS FIELDS 363


G.SHANMUGAPRIYA , R.MEERA

109 ARTIFICIAL INTELLIGENCE AND ROBOTICS - M.PRATHIPA, M.PAVITHRA 365

110 CLOUD COMPUTING - S.AGALYA , S.JAYAMEENATCHI 369

111 REVIEW ON PASSIVE OPTICAL NETWORK AND ETHERNET 372


G.BHARATHI , J.NOORUL EHASAN

112 ANALYSIS OF UBIQUITOUS COMPUTING AND ITS APPLICATIONS 375


S.MANIKANDADEVI , T.ANANDABAIRAVI

113 DATA HIDING USING RC4 ALGORITHM 378


K.MUNIRA BEGUM , J.SHAMEERA BANU

114 3D PASSWORD - ABIRAMI.S , VAIDHEESHWARI.S 381

115 SOA WITH CLOUD COMPUTING IN BUSINESS APPLICATIONS 383


Mrs. A.HEMA , GANAPATHY

116 ANALYSIS OF CBIR USING HISTOGRAM - Mrs.C.MALLIKA, Ms.N.ILAKKIYA 387

117 MULTI CODE WORD RANKED PURSUIT OVER ENCRYPTED DATA USING TRSE IN 391
CLOUD COMPUTING - R.VAIDEKI

118 ANALYTICS IN EDUCATION USING BIG DATA 394


V.BHUVANESHWARI , V.GEETHA

119 IMPACT OF GRAPHICS AND MULTIMEDIA IN AN ENVIRONMENT 398


N.ABINAYA , R.BHAKIYALAKSHMI

120 NETWORK SECURITY: HISTORY, IMPORTANCE AND FUTURE 401


A.RANJITHA , P.DEEPIKA

121 WORKING PRINCIPLE AND APPLICATION OF LI-FI TECHNOLOGY 409


M.SUBASHINI , S.GEETHA

xii
122 OBJECT TRACKING AND DETECTING BASED ON ADAPTIVE BACKGROUND 411
SUBTRACTION - M.JAYAKANDAN

123 SCREENLESS DISPLAY - PARIMALA.N , BUVANESWARI.P 414

124 EYE-GAZE COMMUNICATION SYSTEM - A.YAMUNA, R. DEVIGA 416

125 5GWIRELESS TECHNOLOGY - A.GAYATHRI , V.GAYATHRI 419

126 MULTIMEDIA LEARNING SYSTEM -B.VINAYAGAPRIYA , T.VIVEGASREE 422

127 SIXTH SENSE TECHNOLOGY 425


M.AROCKIA PERIYANAYAGI STEFFI, P.MARTHAL MARIYAL

128 A STUDY OF WI-FI HACKERS AND ITS CHALLENGES AND SOLUTIONS 428
A. NOORUL JASMIN , B.MAHESWARI

129 NETWORK SECURITY IN MOBILE AD-HOC NETWORK 430


D.VIGNESH , P.MAMALAIVASAN

130 AN OVERVIEW OF VIRTUAL REALITY - S.SENTHAMIZH SELVI, R.RAATHIGA 433


131 SURVEY ON DATA SECURITY WITH OLAP AND OLTP TECHNOLOGIES 435
K.SINDHU, P.ANU PRIYA, G.ANUSUYA

132 SURVEY PAPER ON FINGERPRINT IDENTIFICATION USING BIOMETRIC 440


K.DIVYA, V.MAHALAKSHMI, S.VANMATHI

133 BRAIN TUMOR DETECTION USING SEGMENTATION AND THRESHOLD 443


OPERATIONS - R.CHRISTY, R.MENAKA, G.JAMES

134 CLOUD DATA VERACITY USING PASSWORD DIGITAL SIGNATURE 448


N. GULFARJAN , G. INDHUMATHI

135 A BREAKDOWN ON DATA GUARD OF CLOUD LOADING SERVICES 451


T.MADHUBALA, M.SURIYA, M.KALAIVANI

136 PHISHING WEBSITES REVEALING USING DATA MINING SORTING MODEL 454
R.ABINAYA, V.DHANALAKSHMI, T. SHAKINA

137 APPLICATION OF DATA MINING – A SURVEY REPORT 456


S.THAIYALNAYAKI C.MEENA , R.GOKILA

138 AN EMPIRICAL (HSDPA) BANDWIDTHOVER TRANSMISSION RANGE IN VEHICLE 460


APPLICATION PERFORMANCE OF MOBILE BROADBAND ACCESS
R.CHITHRAI SELVI

139 USING CLOUD SERVICE TO SHARE FILES & DATA IN SECURE MANNER FOR 464
MOBILE APPLICATION - K.MEENA, P.NEETHISELVI

140 EFFORTS TO RECTIFY PROBLEMS IN GREEN COMPUTING 466


P.KAMALABHARATHI

141 IDENTIFICATION OF FAKE CURRENCY USING IMAGE PROCESSING 470


K.NITHINILA

xiii
142 SOCIAL NETWORKS PRIVACY DISPUTES THAT DISPUTESAFFECT YOUNG 472
SOCIETIES - S.M.U. NOORUL ZUVERIYA

143 ENHANCED CHAOTIC KEY BASED ALGORITHM FO IMAGE ENCRYPTION 475


N ABIYATH ROSE NISHA , M Y SHAFARIYA NASREEN

144 PREDICTION OF FAKE PROFILES ON FACEBOOK USING AUTOMATIC 478


DETECTION - N.S.SANGUIDA, G.RAMYA

145 INTERACTIVE VISUALIZATION TECHNIQUES FOR A VIRTUAL REALITY 481


A.SAFANA JASMIN ,T.AYESHA PARVEEN

146 TECHNOLOGIES AND APPLICATIONS OF BROADBAND WIRELESS ACCESS 485


MANIMEKALAI.G , ARUL MOZHI.T

147 ANALYSIS OF TWITTER DATA USING TOPSY - M.A.ABIRAMI , S.NASHEEFA 488

148 BASICS AND APPLICATIONS OF ARTIFICIAL NEURAL NETWORK 490


M.MOHANAPRIYA, SARAH MANSOOR ALI

149 WIRELESS SENSOR NETWORK FOR AIR POLLUTION NEAR INDUSTRIAL SECTOR 493
M.NUSARATH FASILA, K.VIDHYA

150 FUNCTIONALITIES, CLASSIFICATIONS AND ALGORITHMS IN DATA MINING 495


K.ARUL MARIE JOYCEE B.MAHALAKSHMI M.NIGITHADIWANI

151 AN OVERVIEW OF DATA MINING CONCEPTS 499


S. REVATHI, A. RAMYA, K. SOWMIYA

152 NETWORK MARKETING AND SECURITY IN ECOMMERCE 501


J.THAHSEEN REESHMAN , B.PAVITHRA

153 THE NEW AGE OF COMPUTER VIRUS AND THEIR DETECTION 504
N.BHUVANESHWARI, B.DHAARANI

154 ROLE OF WIRELESS SENSOR NETWORK IN DATA SECURITY 507


E.N.AAYISHAPARVEEN, K.LAKSHMIPRIYA

155 BUG TRACKING AND LOGGING TOOLS KIT – A REVIEW 511


T.PREETHI , L.MADHUMATHI

156 INFORMATION SHARING IN CORPORATE NETWORK USING CLOUD 514


K.ANUSHA , S.SANGEETHA

157 ANALYSIS OF CAR CRASH AND EMERGENCY ALERT SYSTEM 517


ZAINUL THARIFFAH , S.RAJESHWARI

158 AUTOMATED ROAD SYMBOL DETECTION USING IMAGE PROCESSING 520


A.MOHAMED RAFEEQ, S.SIVASAKTHI, V.NIVETHA

159 COMPREHENSIVE ANALYSIS OF BIG DATA CHALLENGES AND ITS ISSUES 523
G.SARANYA, J.P. KARTHIKA

xiv

You might also like