HB-2014

Home >> Special Issue

International Conference on Humming Bird (2014)

S.No. Title & Authors Page Downloads
1. Locality Repulsion Projection and Minutia Extraction Based Similarity Measure for Face Recognition
Agnel AnushyaP., RamyaP
01-05 pdf
2. A Modified Teaching Learning Based Optimal Smooth Ordering for Image Enhancement
Ahila.C, N.A.Vidya Mol
06-11 pdf
3. Local Fuzzy Clustering for Accurate and Noise-Robust Multi-modal Medical Image Segmentation
Aji R , Ramya P
12-16 pdf
4. Adaptive Gabor Wavelet and Zernike Moment Based Hashing for Image Authentication
Akshara Anand.S.D S.Gayathri
17-22 pdf
5. An Efficient Active Content Reconstruction Based on Adaptive Pixel Permutation
K.K.Amutha , N.A.Vidya Mol
23-29 pdf
6. Active Shape Model Based Recognition Of Facial Expression
AncyRija V , Gayathri. S
30-33 pdf
7. Dark image enhancement through channel division using spectral decomposition method
S A Angel Leonie , Jemimah Simon
34-38 pdf
8. Exemplar-Based Image Inpainting by Laplacian Approximation Method Using Spatiogram
G.Anto Silviya ,V.R.Bhuma
39-44 pdf
9. Adaptive Fingerprint Image Enhancement with Minutiae Extraction
Arul Stella , A. Ajin Mol
45-51 pdf
10. An Efficient Reformulated Model for Transformation of String
Asha Achenkunju, V.R. Bhuma
52-57 pdf
11. Spoofing Detection in Wireless Networks
S.Manikandan,C.Murugesh
58-62 pdf
12. Visual and Motion Saliency Using Unsupervised Block Based Approach for Video Object Extraction
A.Carolin Delviya, Mrs.N.Mymoon Zuviria
63-69 pdf
13. To Improve Reliability of Message Passing In MPI Libraries Using Flow Checker
N.Kanagavalli, S.Krishanth
70-76 pdf
Part 2
1. Distributed Information Sharing Using Privacy Preserving Information Brokering
Praisy Nalamisha.N, PG Scholar, S.Agnes Joshy, Assistant Professor
01-03 pdf
2. Unregulated Content Filtering In Online Social Network Using Firewall
M.Priya, G.Prince Devaraj
04-07 pdf
3. Effective Satellite Stream Monitoring and Controller In Aircraft Using Packet Capture.
R.Saranya, G.Prince Devaraj
08-11 pdf
4. Cloud audit service outsourcing by using KAC for data storage security
Ms.A.Christy Sharmila, Mr.T.Darney Tressiline M.E.
12-18 pdf
5. Key Management and Group Key Agreement For Fast Transmission To Remote Groups
T.Suruthi, T.Anto Theepak
19-22 pdf
6. Segmentation of Remote Sensing Image Analysis Using Neural Network
Ms.P.P.N Vijila, Ms.R.Femi M.E
23-28 pdf
7. Detection of Digital Image Splicing Using Luminance
P.Sabeena Burvin, J.Monica Esther
29-33 pdf
8. An Energy-efficient Distributed Self-organized Clustering Based Splitting and Merging in Wireless Sensor Networks
Mrs.J.Monisha, Mrs.M.MuthuSelvi
34-40 pdf
9. Secure Data Retrieval over Graph Structured Data in Cloud
Ms.Jelba.J, Dr.V.Kavitha
41-44 pdf
10. Highly secured and effective keyword search over encrypted cloud data
Michael Shabi Nathan. S, Dr.V.Kavitha
45-49 pdf
11. Analysis of Automobile Drivers Stress By Using Physiological Signals
M. Anin Manjusha, Professor Mrs. Josephin Shermila.P
50-53 pdf
12. Secure Data Access Over Wide Area Network Using Vanet Protocol
T.Ambikapathi, Ms. Sreema
54-60 pdf
13. Multi clustering approach for fast hyperspectral endmember extraction using k-means
Shobana G , Muthuvel A
61-65 pdf
14. Multi-Biometric Cryptosystem on Fusion Level Distinctiveness
M.Sindhu, N.Radhakrishnan
66-69 pdf
15. SFM: An Energy Efficient Algorithm based on Reducing Control Messages in Wireless Sensor Networks
M.Christina Ranjitham, Mrs.M.Thiruchelvi
70-75 pdf
Part 3
1. Privacy-Preserving Back Propagation Neural Network Learning In Signature Scheme
Mrs.S.Blessy
01-05 pdf
2. 3D Ear Recognition System Using Neural Network Based Self Organizing Maps
M.Sathish Babu
06-12 pdf
3. Hidden Data Procession for Multiple Applications in Wireless Sensor Networks
JanarishSaju C, Sharon NishaM
13-19 pdf
4. An IHS-Based Fusion for Vegetation Enhancement in IKONOS Imagery
A.Vakeswari, S.Brintha Rajakumari
20-24 pdf
5. Enhancing Downloading Time By Using Content Distribution Algorithm
VILSA V S
25-29 pdf
6. Multiscale Gradients based directional demosaicing
A. Jasmine ,John Peter.K
30-36 pdf
7. Optimal Sparse Representation Based Robust Image Inpaintin
S.SherinNelcy , VidyaMol N.A
37-41 pdf
8. Misbehaviour Detection in Wireless Networks Of Selfish Individuals
An Sharmi.M, Mr.A.Arul Rex
42-48 pdf
9. A new metric based on Motifs for Animal Recogn
D.Samson
49-52 pdf
10. A Generic Approach to detect the forgeries in Color images using ELM method
J.Angel Sajani, Mr.A.Muthumari M.E
53-60 pdf
11. Color Sensitive Adaptive Gamma Correction for Image Color and Contrast Enhancement
Asha M, Jemimah Simon
61-66 pdf
12. A Study On Mechanical And Machinability Characteristics Of Hybrid Metal Matrix Composite
V.L. Kingston, Mr. John Prabhakar, Dr. N. Senthilkumar
67-70 pdf
13. Segmentation Of Pulmonary Lobes Using Marker Based Watershed Algorithm
Linda.A, Ms.B. SuganyaJeyamalar M.E.
71-75 pdf
Part 4
1. Latent Fingerprint Enhancement Via Orientation Field Reconstruction And Fingerprint Alteration
Aswathi Prathap , Siva Pradeepa.S
01-06 pdf
2. Adaptive Kalman filter with GLBP feature for low resolution face tracking
Berin Selva Bennetlin s.k. , F.Tephila John
07-12 pdf
3. Recognition of Face Expression using Color Space
Brruna A , Siva Pradeepa S
13-17 pdf
4. Digital Image Forgery detection using color Illumination and Decision Tree Classification
Chitra Ganesan , V.R. Bhuma
18-23 pdf
6. Image Enhancement for Non-uniform Illumination Images using PDE
Jenish Sherin.B.T, Jemimah Simon
30-35 pdf
7. An Enhanced Novel Approach For Distributed Document Clustering
J.E. Johny Livinston, S. Siva Pradeepa
36-40 pdf
8. Robust Face Recognition and Tagging in Visual Surveillance System
Kavitha MS, Siva Pradeepa S
41-46 pdf
9. Histogram Analysis of Doubly Compressed JPEG Images for Forgery Detection
Krishna Sobhan , V R Bhuma
47-51 pdf
10. Efficient Document Image Binarization for Degraded Document Images using MDBUTMF and BiTA
Leena.L.R , Gayathri. S
52-57 pdf
11. Feature Extraction Based On Recognition of Surgically Altered Face Images
Lizy A., Gayathri S.
58-62 pdf
12. Logo Matching and Recognition with Interest Points Using Context–Dependent Similarity
Nishanth.T.R ,Jemimah Simon
63-69 pdf
13. Image Segmentation Using FELICM Clustering Method
Ramya, Jemimah Simon
70-74 pdf
Part 5
1. Bicubic Based Joint DemosaicingandImage Down Sampling
Renuka T , John Peter K
01-06 pdf
2. FAST: A New Novel Feature Selection Algorithm for Large Datasets
RethinRaveendran ,Bhuma V.R
07-10 pdf
3. Edge-Strength Filter Based CFA Interpolation Using H-H Frequency Sub-band Channels
Shalika R.N , Nagarajan G
11-17 pdf
4. Reversible Watermarking Based on Optimal Dynamic Histogram Shifting
Shyja.T.V , N.A.Vidya Mol
18-23 pdf
5. Scheduling to Minimize Time Staleness and Execute Job using Max Benefit Algorithm
Simi M Cyril,S Gayathri
24-27 pdf
6. Feature Based Data Stream Classification (FBDC) and Novel Class Detection
Sminu N.R , Jemimah Simon
28-32 pdf
7. An Efficient Blind Source Separation Based on Adaptive Wavelet Filter and SFA
Subi C , Ramya P
33-38 pdf
8. Integrated Atlas Based Localisation Features in Lungs Images
Mr.N.Bensingh
39-44 pdf
9. Optic Disk Detection in Retinal Images – Evaluat
Mrs. R. Sharmiladevi, Mr. G. Sathish kumar
45-49 pdf
10. Design of Tri-Generation for a Hotel
Lakshmi Narasimhan S., Hussain Najmi, Setty Uday Kumar
50-54 pdf
11. Peak to Average Power Ratio Reduction in MIMO OFDM using QPSK based on Partial Transmit Sequence method
Aarathi Gokulan, J Friska
55-58 pdf
12. Design of Optimizing Adders for Low Power Digital Signal Processing
Mr. Akhil M S, Mr. N. Muthukumara
59-65 pdf
13. High Throughput in MANET Using relay algorithm and rebroadcast probability
Mr. Marvin Mark M, Mr. N. Muthukumaran
66-71 pdf
14. Intelligent Traffic System Using BAHG Protocol with Secured Intrusion Detection System
Rakesh Krishna SR, Dr.M. Irulappan Ph.D
72-78 pdf
Part 6
1. Secure Multiparty Computation and Privacy Preserving Data Sharing with Anonymous ID Assignment
Shiny. I.S , S. Gayathri
01-05 pdf
2. Optimal Parameter Tuning Based Multi-Scale Image Enhancement
S.Sonia,A.J. Adlin Deepika
06-11 pdf
3. Segmentation and Tracking Framework for Video Object by Using Threshold Decision and Diffusion
Uma Rani A , M.G Justin Raj
12-15 pdf
4. Comparable Entity Mining From Comparative Question Archive
Veena.G.R.Kumar, Jameemah Simon
16-20 pdf
5. A Self-Learning Approach to Edge-Adaptive Demosaicking Algorithm for CFA Images
Shiny.A,Nagarajan.G
21-28 pdf
6. Empowered Service Delegation With Attribute Encryption For Distributed Cloud Computing
S.Vidhya, R.Raja Ramya, N.kanagavalli
29-32 pdf
7. Multiscale Feature Extraction For Content Based Image Retrieval Using Gabor Local Tetra Pattern
R. Navani, Ms. Jiji S. Raj
33-38 pdf
8. Reliable Storage Services and Avoidance of Integrity Problems in Cloud Computing
T.Subetha, M.Rajasekar
39-42 pdf
9. Efficient And Advance Routing Logic For Network On Chip
Mr. N. Subhananthan, Mrs. C. G. Joy Merline M.E.
43-48 pdf
10. An Efficient General Access Structure Based Multiple Secret Visual Cryptography
S.A.Ayswaria, Mrs.A.M.Asbel Shiny
49-53 pdf
11. Fuzzy Clustering With Spatial Information For Image Segmentation Using Kernel Metric
G.J.Abisha Shiji, Ms. Berakhah .F. Stanley
54-58 pdf
12. An Efficient Technique for Hyperspectral Endmember Extraction based on SE2PP
M.Cynthia, Mrs. Ablin.R
59-63 pdf
13. Private Data Transferring among 'N' Nodes in a group by Using Anonymous ID Assignment
M.Anisha Vergin, T.Anto Theepak
64-68 pdf
14. Fingerprint Matching For Privacy Protection
Dora Angel. M, Andrew Rayan.T
69-71 pdf
15. Dynamic Virtual Resource Management In Cloud Computing Environment
D.Golden Jemi, C.S Soumiya
72-78 pdf
Part 7
1. Towards Secrecy on Public Auditability for Secure Storage in Cloud Computing
Jency. D. J, D. Joseph Pushparaj
01-04 pdf
2. Image Denoising Using Multi Resolution Analysis (Mra) Transforms
T.Jones Daniel, Mrs. M. Caroline viola Stellamary
05-08 pdf
3. Remote Sensed Image Classification based on Spatial and Spectral Features using SVM
Mary Jasmine. E, Muthumari. A
09-14 pdf
4. Health Monitoring For Secrecy Conserving Using Cloud Computing
S.Mercy, Vannarpettai
15-18 pdf
5. Congestion Control for Avoiding Packet Loss in Data Centric Network
S.M.BaslinNixy, S.Agnes Joshy
19-22 pdf
6. Vehicle License Plate Detection Using Morphological Processing and Heuristics
K.Pitchammal, J. Monica Esther
23-26 pdf
7. Security and Privacy through Multiple Clouds in Cloud Computing
Arputha Nilasini.A, Anli Sherine.S.M
27-32 pdf
8. Robust Face Recognition of Variations in Blur and Illumination by Using LDA
Ms. K. Hema, Mr. J. Arun Prem Santh
33-38 pdf
9. A Novel Approach for Reducing Routing Overhead In MANET
A.Meenakshi, Mrs. J. Banmmathi M. E
39-43 pdf
10. A Review Study of Various Routing Protocols Based on Routing Information Update Mechanism of Mobile Ad Hoc Networks
Mrs. S. Gowsiga, Dr. P. Senthil Kumar
44-49 pdf
11. Intelligent Door Locking System
B. Anubala, M. Rahini, T. Bavithra
50-53 pdf
12. Difference Expansion Reversible Image Watermarking Schemes Using Integer Wavelet Transform Based Approach
Subhanya R.J, Anjani Dayanandh N
54-59 pdf
13. An Automatic Classification of Lung Tissue Using Density Based Approach
Mrs. M. Vinthu Kumari, Mrs. J. Vijila2 M. E.
60-63 pdf
14. Low Power Error Correcting Codes Using Majority Logic Decoding
A. Adline Priya, K.L. Nisha
64-68 pdf
15. Image Reconstruction Using Dual Tree Complex Wavelet Transform For Mosaic Video Sequences
C. P. Lillyashitha, Professor E. P. Kannan
69-72 pdf
16. Optical Character Recognition from Degraded Document Images
P.R.Nisha Beevi, Mr.S.Mohammed Nuhuman
73-78 pdf
Part 8
1. Adaptive Based Multiobjective Optimization Based Node Placement and Target Detection in Bistatic Radar Network
M. Amala Christy, Ms. N.Anushya
01-06 pdf
2. Detection of Node Replication Attacks in Mobile Sensor Networks Using Efficient Localized Detection Algorithm
Glory Rashmi. A, Mr.C.Murugesh
07-12 pdf
3. Survey Paper on the Performance Analysis of Routing Protocols in DTN
Mrs. J. Banumathi, Ms. P. Sneha Tharshini
13-18 pdf
4. Numerical and Categorical Attributes Data Clustering Using K-Modes and Fuzzy K-Modes
S.Sumathi and M.M.Gowthul Alam
19-24 pdf
5. Bio Medical Sensor Network for Patient Monitoring
R.Durga, T.Suresh
25-29 pdf
6. Energy Harvesting Capability of Air for Measurements Using Self-Powered Wireless Sensor Network
Y. Susan Florence, T. Blesslin Sheeba
30-34 pdf
7. Doppler Compensated Front – End Receiver Design for Underwater Acoustic Channels Using Mimo-Ofdm
J. Jenisha, Ms. N. Subhashini
35-40 pdf
8. Power Allocation for Hybrid Overlay/Underlay CRN
A. Joel Livin, R. Johncily
41-45 pdf
9. Hybrid Glucoma Screening Method Using Optic Disc Segmentation and True Vessel Extraction
J. Basline Jenuba, P. V. Deepa
46-48 pdf
10. A Survey on Cloud Computing and Cloud Security Issues
V. Abricksen
49-54 pdf
11. Secure Authentication Using Certificate Revocation List (Crl) and Message Signature in Vanet
R. Saranya, J. Hariharan
55-60 pdf
12. Optimal Implementation of Bi-Directional Strategy for AC/DC Converters Using A PWM Technique
Ervin Arul. A, Kathiravan. R, Balamurugan. T
61-65 pdf
Top