Academia.eduAcademia.edu

Outline

Full Proceedings IJCSIS Vol 14 Special Issue CIC 2016 Final.pdf

Abstract

It is our great pleasure to present the CIC 2016 Special Issue (Volume 14 Track 1, 2, 3, 4, 5, 6) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 6818 times and the number is quickly increasing. This statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing & indexing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others. On behalf of IJCSIS community and the sponsors, we congratulate the authors, the reviewers and thank the committees of International Conference On Advances In Computational Intelligence In Communication (CIC 2016) for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status. “We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 14, Special Issue CIC 2016 Edition ISSN 1947-5500 © IJCSIS, USA.

References (1,388)

  1. V.N.M. Aradhya and M. S. Pavithra, "A comprehensive of transforms, Gabor filter and k-means clustering for text detection in images and video", Applied Computing and Informatics, 2014
  2. P. Angelov, P. S-Tehran, C. Clarke, "AURORA: autonomous real-time on-board video analytics", Neural Comput & Applica, 2016
  3. A.B. Ayed, M. B. Halima, and A. M. Alimi, "MapReduce Based Text Detection in Big Data Natural Scene Videos", Procedia Computer Science, Vol. 53, pp.216-223, 2015.
  4. A. Aryanfar, R. Yaakob, A. A. Halin, N. Sulaiman, K. A. Kasmiran, and L. Mohammadpour, "Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification", Procedia Computer Science, Vol. 62, pp.585-592, 2015.
  5. P. Vollucci, B. Le, J. Lai, W. Cai, Y. Ye, G. Necula, and D. Wroblewski, "Online Video Data Analytics", 2015
  6. T. Xu, W. Xiang, Q. Guo, and L. Mo, "Mining cloud 3D video data for interactive video services", Mobile Networks and Applications, Vol. 20, No. 3, pp. 320-327, 2015.
  7. C.H.E. N. Qing, Y. Chen, D. Liu, C. Shi, Y. Wu, and H. Qu, "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", 2015.
  8. B. Mao, J.He, J. Cao, S.W. Bigger, and T. Vasiljevic, "A framework for food traceability information extraction based on a video surveillance system", Procedia Computer Science, Vol. 55, pp.1285-1292, 2015.
  9. Y.B. Kim, S. J. Kang, Sang Hyeok Lee, Jang Young Jung, Hyeong Ryeol Kam, Jung Lee, Young Sun Kim, Joonsoo Lee, and Chang Hun Kim. "Efficiently detecting outlying behavior in video-game players." PeerJ 3 (2015): e1502.
  10. M. Shao, and Y.Fu, "Deeply Self-Taught Multi-View Video Analytics Machine for Situation Awareness", AFA Cyber Workshop, White Paper, 2015
  11. Y. Cong, J. Yuan, Y. Tang, "Video Anomaly Search in Crowded Scenes via Spatio-temporal Motion Context", IEEE Transactions on Information Forensics and Security, vol.8, Iss.10, 2013
  12. Y. Li and A. Ngom, "The non-negative matrix factorization toolbox for biological datamining", Source Code for Biology and Medicine, Vol.8, Iss.10, 2013.
  13. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  14. A.Nag,S.Biswas,D.Sarkar, P. P. Sarkar, "A Novel Technique for Image Steganography Based on Huffman Encoding". International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010.
  15. Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt. "Digital Image Steganography: SurSurvey and Analysis of Current Methods". ELSEVIER Journal on Signal Processing 90 (2010) 7727-752.
  16. Gonzalez, R.C. and Woods, R.E., Digital Image Processing using MA TLAB, Pearson Education,Tndia,2006.
  17. Alkhrais Habes, "4 least Significant Bits Information Hiding Implementation and Analysis", ICGST Int. Conf. on Graphics, Vision and Image Processing (GVIP-05), Cairo, Egypt, 2005.
  18. Neil F. Jhonson, Sushil Jajodia. "Exploring Steganography: Seeing the Unseen". IEEE paper of REFERENCES
  19. Christof Paar and Jan Pelzl," Understanding Cryptography: A Textbook for Students and Practitioners," Springer, 2010,pp.1-24
  20. Darrel Hankerson , Alfred J. Menezes and Scott Vanstone," Guide to Elliptic Curve Cryptography," Spinger,2004
  21. Chris Solomon and Toby Breckon,"Fundamentals of Digital Image Processing," Wiley,2010, pp1-18
  22. I. Ozturk and I. Sogukpinar,"Analysis and comparison of image encryption algorithm,"Journal of transactions on engineering, computing and technology, pp.38, Dec 2004.
  23. Rinki Pakshwar, Vijay Kumar Trivedi and Vineet Richhariya,"A Survey On Different Image Encryption and Decryption Techniques," International Journal of Computer Science and Information Technologies, pp.113-116, April 2013.
  24. G.Zhi-Hong, H.Fangjun, and G.Wenjie, "Chaos-base, Image Encryption Algorithm,"Elsevier, pp. 153-157, Oct 2005.
  25. Norman D. Jorstad, "Cryptographic Algorithm Metrics,"Institute for Defense Analyses Science and Technology Division-Jan 1997.
  26. Li. Shujun and X. Zheng,"Cryptanalysis of a chaotic image encryption method,"IEEE International Symposium on Circuits and Systems, ISCAS, May 2002.
  27. Moncef Amara and Amar Siad,"Elliptic Curve Cryptography and its applications ",Systems, Signal Processing and their Applications (WOSSPA),pp 247-250,May 2011.
  28. Kamlesh Gupta and Sanjay Silakari,"Performance Analysis for Image Encryption Using ECC",Computational Intelligence and Communication Networks (CICN),pp 79-82,Nov 2010
  29. Guiliang Zhu ,Weiping Wang ,Xiaoqiang Zhang and Mengmeng Wang ,"Digital Image Encryption Algorithm Based on Pixels",IEEE 2010.
  30. Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh,"Image Encryption using Elliptic Curve Cryptography"Eleventh International Multi-Conference on Information Processing,pp 472-481,2015.
  31. Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari and Hamida Almangush,"A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm," International Journal of Computer Applications, pp.38-45, March 2012.
  32. Rogelio Hasimoto-Beltran and Ashfaq Khichari,"Pixel Level Interleaving scheme for Robust Image Communication," Scalable and Parallel Algorithm Labs, University of Delaware, Newark, Oct 1998.
  33. Frank Dellaert and Robert Collins, "Fast Image-Based Tracking by Selective Pixel Integration,"Computer Science Department and Robotics Institute Carnegie Mellon University,Pittsburgh,Sep 1999
  34. Hanpinitsak and C. Charoenlarpnopparut,"2D Interleaver Design for Image Transmission over Severe Burst-Error Environment," International Journal of Future Computer and Communication, pp.308- 312, Aug 2013.
  35. Shengyong Guan, Fuqiang Yao and Chang Wen Chen,"A novel interleaver for image communications with theoretical analysis of characteristics," Communications, Circuits and Systems and West Sino Expositions,IEEE 2002 International Conference (Volume:1), July 2002.
  36. Satoru Yoneyama and Go Murasawa, "Digital Image Correlation," Encyclopedia of Life Support Systems, Digit Imaging. 2008 Sep.
  37. Du-Yih Tsai, Yongbum Lee and Eri Matsuyama,"Information Entropy Measure for Evaluation of Image Quality", 2008 Sep.
  38. X. Chen, T. Yang, and J. Xu, "Cross-view gait recognition based on human walking trajectory", in Journal of Visual Communication and Image Representation, vol. 25, no. 8, pp. 1842-1855, 2014.
  39. G. B. Huang, H. Zhou, X. Ding and R. Zhang, "Extreme learning machine for regression and multiclass classification", in IEEE Transactions on Systems, Man, and Cybernetics, vol. 42, no. 2, pp. 513- 529, 2012.
  40. Z. Zhang, X. Liang, A. Ganesh and Y. Ma, "Tilt: transform invariant low-rank textures", in Computer Vision-ACCV Springer, pp. 314- 328,2010.
  41. W. Kusakunniran, Q. Wu, H. Li and J. Zhang, "Multiple views gait recognition using view transformation model based on optimized gait energy image", in IEEE 12th International Conference on Computer Vision, pp. 1058-1064,2009.
  42. Y. Li and Y. Guo, "Gait recognition method based on lower leg under 45 degree viewing angle of video", in International Journal of Future Generation Communication and Networking, vol. 6, no. 4, pp. 147- 156,2013.
  43. W. Kusakunniran, Q. Wu, J. Zhang and H. Li, "Gait recognition under various viewing angles based on correlated motion regression", in IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 6, pp. 966-980,2012.
  44. S. D. Choudhury and T. Tjahjadi, "Robust view-invariant multi-scale gait recognition", in Pattern Recognition, vol. 48, no. 3, pp. 798- 811,2015.
  45. W. Zeng and C. Wang, "View-invariant gait recognition via deterministic learning", in Neurocomputing, vol. 175, pp. 324-335,2016.
  46. S. Sivapalan, D. Chen, S. Denman, S. Sridharan and C. Fookes, "3d ellipsoid fitting for multi-view gait recognition", in IEEE 8th International Conference on Advanced Video and Signal-Based Surveillance, pp. 355-360,2011.
  47. M. Shinzaki, Y. Iwashita, R. Kurazume and K. Ogawara, "Gait-based person identification method using shadow biometrics for robustness to changes in the walking direction", in IEEE Winter Conference on Applications of Computer Vision, pp. 670-677,2015.
  48. Z. Liu, Z. Zhang, Q. Wu and Y. Wang, "Enhancing person re- identification by integrating gait biometric", in Neurocomputing, vol. 168, pp.1144-1156,2015.
  49. I. M. Burhan and M. J. Nordin, "Multiview gait recognition using enhanced gait energy image and radon transform techniques", in Asian Journal of Applied Sciences, vol. 8, no. 2, pp. 138-148,2015.
  50. W. Zeng, C. Wang and F. Yang, "Silhouette-based gait recognition via deterministic learning", in Pattern Recognition, vol. 47, no. 11, pp.3568- 3584,2014.
  51. W. Lu, W. Zong, W. Xing and E. Bao, "Gait recognition based on joint distribution of motion angles", in Journal of Visual Languages & Computing, vol. 25, no. 6, pp. 754-763,2014.
  52. I. J. Cox, M. L. Miller, J. A. Bloom, and C. Honsinger, Digital watermarking vol. 53, 2002.
  53. M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing. 2002 Jun;11(6):585-95.
  54. N. Yadav, K. Singh, "An efficient robust watermarking scheme for varying sized blocks," Turkish Journal of Electrical Engineering & Computer Sciences. 2016 Jul 1;24(4).
  55. N. Muhammad, and N. Bibi, "Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain," IET Image Processing. 2015 Jun 17;9(9):795-803.
  56. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking. Signal processing," 1998 May 28;66(3):357-72.
  57. S. D. Lin, and C. F. Chen, "A robust DCT-based watermarking for copyright protection," IEEE Transactions on Consumer Electronics. 2000 Aug 1;46(3):415-21.
  58. V. Solachidis, and L. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE transactions on image processing. 2001 Nov;10(11):1741-53.
  59. A. Poljicak, L. Mandic, and D. Agic, "Discrete Fourier transform-based watermarking method with an optimal implementation radius," Journal of Electronic Imaging. 2011 Jul 1;20(3):033008.
  60. R. Liu, and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE transactions on multimedia. 2002 Mar;4(1):121-8.
  61. C. C. Lai, "A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm," Digital Signal Processing. 2011 Jul 31;21(4):522-7.
  62. C. C. Lai, and C. C. Tsai, "Digital image watermarking using discrete wavelet transform and singular value decomposition," IEEE Transactions on instrumentation and measurement. 2010 Nov;59(11):3060-3.
  63. J. Guo, and P. Zheng, and J. Huang, "Secure watermarking scheme against watermark attacks in the encrypted domain," Journal of Visual Communication and Image Representation. 2015 Jul 31;30:125-35.
  64. J. Varghese, S. Subash, O. B. Hussain, K. Nallaperumal, M. R. Saady, and M. S. Khan, "An improved digital image watermarking scheme using the discrete Fourier transform and singular value decomposition," Turkish Journal of Electrical Engineering & Computer Sciences. 2015
  65. O. Jane, and E. ELBAŞI, "A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition," Turkish Journal of Electrical Engineering & Computer Sciences. 2014 Sep 3;22(5):1354-66.
  66. J. M Shieh, D. C. Lou, and M. C. Chang, "A semi-blind digital watermarking scheme based on singular value decomposition," Computer Standards & Interfaces. 2006 Apr 30;28(4):428-40.
  67. G. Bhatnagar, and Q. J. Wu, "A new logo watermarking based on redundant fractional wavelet transform," Mathematical and Computer Modelling. 2013 Jul 31;58(1):204-18.
  68. M. Ali, C. W. Ahn, and P. Siarry, "Differential evolution algorithm for the selection of optimal scaling factors in image watermarking," Engineering Applications of Artificial Intelligence. 2014 May 31;31:15-26.
  69. R. H. Laskar, M. Choudhury, K. Chakraborty, and S. Chakraborty, "A joint DWT-DCT based robust digital watermarking algorithm for ownership verification of digital images," In Computer networks and intelligent computing 2011 (pp. 482-491). Springer Berlin Heidelberg.
  70. A. Hore, and D. Ziou, "Image quality metrics: PSNR vs. SSIM," InPattern recognition (icpr), 2010 20th international conference on 2010 Aug 23 (pp. 2366- 2369). IEEE.
  71. Z. Wang, A. C. Bovik, H. R. Sheikh, E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE transactions on image processing. 2004 Apr; 13(4):600-12.
  72. REFERENCES
  73. E.R.McVeigh, R.M.Henkelman, and M.J.Bronskill, , "Noise and filtration in magnetic resonance imaging," Medical Physics, vol. 12, no.5. pp. 586-591. 1985.
  74. R.C. Gonzalez and R.E. Woods, Digital Image Processing. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall; 2002.
  75. Marpe,D.,Cycon,H.L.,Zander,G.,Barthel,K.-U,"Context-based denoising of images using iterative wavelet thresholding", Proceedings of SPIE on Visual Communications and Image Processing, vol. 4671, pp. 907-914 .2002.
  76. Buades, A., Coll, B., Morel, J.M.," A review of image denoising methods, with a new one", Multiscale Modelling and Simulation. vol.4, no.2, pp.490-530, 2005.
  77. Wenxuan, S., Jie, L., Minyuan, W," An image denoising method based on multiscale wavelet thresholding and bilateral filtering", Wuhan University Journal of Natural Sciences. vol.15, no.2, pp.148-152, 2010.
  78. Ashish Khare and Uma Shanker Tiwary, "Daubechies complex wavelet transform based technique for denoising of medical images", International journal of image and graphics, vol.07, no.04, pp.663-687, Oct.2007.
  79. Ghazel, M.,"Adaptive Fractal and Wavelet Image Denoising", PhDthesis,DepartmentofElectrical&ComputerEngineering,University of Waterloo, Ontario, Canada .2004.
  80. Lahcene Mitiche, Amel Baha Houde, Adamon-Mitiche and Hilal Naimi," Medical image denoising using Dual tree complex thresholding wavelet transform", Proceedings of IEEE conference on applied electrical and computing technologies, Jordon, pp.1-5, 3-5 Dec 2013.
  81. Ming Zhang and Bahadir K. Gunturk, "Multi resolution Bilateral Filtering for lmage Denoising," IEEE Transactions on lmage Processing, vol. 17, no. 12, pp.2324-2333, December 2008.
  82. Sudipta Roy, Nidul Sinha & Asoke K. Sen, "A New Hybrid Image Denoising Method," International Journal of Information Technology and Knowledge Management, vol 2, no. 2, pp. 491-497.July-December 2010.
  83. R.D. da Silva, R. Minetto, W.R. Schwartz, H. Pedrini,"Adaptive edge- preserving image denoising using wavelet transforms", Pattern Analysis and Applications, vol.16, pp.567-580, 2013.
  84. S. G. Chang, B. Yu, and M. Vetterli, "Adaptive wavelet thresholding for image denoising and compression," IEEE Transactions on Image Processing, vol. 9, no. 9,pp. 1532-1546, Sep. 2000.
  85. Elad, M.; Aharon, M. "Image denoising via learned dictionaries and sparse representation", Proceedings of IEEE Computer Vision and Pattern Recognition, June 2006.
  86. Tomasi C, Manduchi R.," Bilateral filtering for gray and color images",Proceedings of the International Conference on Computer Vision,pp.839-846,1998.
  87. Srinivasan KS, Ebenezer D, "A new fast and efficient decision-based algorithm for removal of high-density impulse noises", IEEE Signal Processing Letters.Vol.14, issue-4, pp.189-192, 2007.
  88. C. Toledo, L. de Oliveira, R. Dutra da Silva, H. Pedrini,"Image denoising based on genetic algorithm", IEEE Congress on Evolutionary Computation, pp.1294-1301, 2013.
  89. S. Kockanat, N. Karaboga, T. Koza,"Image denoising with 2-D FIR filter by using artificial bee colony algorithm", International Symposium on Innovations in Intelligent Systems and Applications, pp.1-4, 2012.
  90. Jonatas Lopes de Paiva, Claudio F.M.Toledo and Helio Pedrini," An approach based on hybrid genetic algorithm applied to image denoising problem", Applied Soft Computing, vol.46, pp.778-791,October 2015.
  91. K. Dabov, A. Foi, V. Katkovnik and K. Egiazarian,"Image denoising with block-matching and 3D filtering", SPIE Electronic Imaging: Algorithms and Systems, vol. 6064 , 2006
  92. S. Ghael, E.P. Ghael, A.M. Sayeed, R.G. Baraniuk,"Improved wavelet denoising via empirical wiener filtering",Proceedings of SPIE, San Diego, CA, USA, vol. 3169 , pp. 389-399,1997.
  93. M.J. Black, G. Sapiro, D.H. Marimont, D. Heeger,"Robust anisotropic diffusion",IEEE Transactions on Image Processing, vol.7,no.3, pp. 421- 432,1998.
  94. Abhijit Chandra and Sudipta Chattopadhyay,"A new strategy of image denoising using multiplier-less FIR filter designed with the aid of differential evolution algorithm", Multimedia Tools and Applications, vol.75,pp.1079-1098, November 2014.
  95. A.K.Bhandari, D.Kumar, A.Kumar and G.K.Singh,"Optimal sub-band adaptive thresholding based edge preserved satellite image denoising using adaptive differential evolution algorithm", Neurocomputing, vol.174, pp.698-721, October 2015.
  96. Jing Tian, Weiyu Yu and Lihong Ma,"Ant shirnk: Ant colony optimization for image shrinkage", Pattern Recognition Letters, vol.31, pp.1751-1758, 2010.
  97. Parthasarathy Subashini, Marimuthu Krishnaveni, Bernadetta Kwintiana Ane and Dieter Roller, "Wavelet Based Image Denoising Using Ant Colony Optimization Technique for Identifying Ice Classes in SAR Imagery", Proceedings of international conference on soft computing models in industrial and environmental applications-Advances in intelligent systems and computing series, Ostrava, Czech Republic, vol.188, pp.399-407, 5-7 Sept.2012.
  98. Boudjelaba K, Ros F, Chikouche D,"An advanced genetic algorithm for designing 2-D FIR filters", Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Canada, pp 60- 65, 23-26 Aug. 2011.
  99. Sujoy Paul and Bitan Bandyopadhyay, " A Novel Approach for Image Compression Based on Multi-Level Image Thresholding Using Shannon REFERENCES
  100. Moreno, S., & Bidelman, G. M. (2014). Examining neural plasticity and cognitive benefit through the unique lens of musical training. Hearing research,308, 84-97.
  101. Müller, Matthias M., et al. "Processing of affective pictures modulates right-hemispheric gamma band EEG activity." Clinical Neurophysiology 110.11 (1999): 1913-1920.
  102. Koelstra, Sander, et al. "Deap: A database for emotion analysis; using physiological signals." Affective Computing, IEEE Transactions on 3.1 (2012): 18-31.
  103. Oświęcimka, Paweł, et al. "Effect of detrending on multifractal characteristics."arXiv preprint arXiv:1212.0354 (2012).
  104. Maity, Akash Kumar, et al. "Multifractal Detrended Fluctuation Analysis of alpha and theta EEG rhythms with musical stimuli." Chaos, Solitons & Fractals81 (2015): 52-67.
  105. Ihlen EAF. Introduction to Multifractal Detrended Fluctuation Analysis in Matlab. Frontiers in Physiology. 2012;3:141. doi:10.3389/fphys.2012.00141.
  106. Shang, P., Lu, Y., & Kamae, S. (2008). Detecting long-range correlations of traffic time series with multifractal detrended fluctuation analysis. Chaos, Solitons & Fractals, 36(1), 82-90.
  107. Lan, Tong-Han, et al. "Detrended fluctuation analysis as a statistical method to study ion single channel signal." Cell biology international 32.2 (2008): 247-252.
  108. Balkwill, L-L., & Thompson, W. F. (1999). A cross-cultural investigation of the perception of emotion in music: Psychophysical and cultural cues. Music Perception, 17, 43-64.
  109. Barber, S. (1996). Adagio for strings [Recorded by New Zealand Symphony Orchestra/James Sedares]. On Capricorn: The Samuel Barber Collection [CD].
  110. Baron-Cohen, S., Burt, L., Smith-Laittan, F., Harrison, J., & Bolton, P. (1996). Synaesthesia: Prevalence and familiality. Perception, 25, 1073-1079.
  111. Boyatzis, C. J., & Varghese, R. (1994). Children's emotional associations with colors. The Journal of Genetic Psychology, 155, 77-85.
  112. Calkins, M. W. (1893). A statistical study of pseudo-chromesthesia and of mental-forms. The American Journal of Psychology, 5, 439-464.
  113. Cimbalo, R. S., Beck, K. L., & Sendziak, D. S. (1978). Emotionally toned pictures and color selection for children and college students. The Journal of Genetic Psychology, 133, 303-304.
  114. Clark, D. M., & Teasdale, J. D. (1985). Constraints on the effects of mood on memory. Journal of Personality and Social Psychology, 48, 1595- 1608.
  115. Collins, M. (1929). A case of synaesthesia. Journal of General Psychology, 2, 12-27. Collier, G. L. (1996). Affective synesthesia: Extracting emotion space from simple perceptual stimuli. Motivation and Emotion, 20, 1- 32.
  116. Cutsforth, T. D. (1925). The role of emotion in a synaesthetic subject. The American Journal of Psychology, 36, 527-543.
  117. R. Stiefelhagen, "Tracking focus of attention in meetings," in Proc. 4th IEEE International Conference on Multimodal Interfaces, IEEE Computer Society, 2002, pp. 273.
  118. L. Dong, H. Di, L. Tao, G. Xu, and P. Oliver, "Visual focus of attention recognition in the ambient kitchen," in Proceedings of the Asian Conference on Computer Vision, 2009, pp. 548-559.
  119. RACA Mirko, "Camera-based estimation of student's attention in class," Ph.D. dissertation, École Polytechnique Fédérale De Lausanne, Switzerland, 2015.
  120. P. Barber and D. Legge, "Information Acquisition," in Perception and Information Methuen, London, 1976.
  121. A. J. Glenstrup and T. Engell-Nielsen. (1995). Eye controlled media:Present and future state. [Online] Available: http://www.diku.dk/users/panic/eyegaze/
  122. P. P. Maglio, T. Matlock, C. S. Campbell, S. Zhai, and B. A. Smith, "Gaze and speech in attentive user interfaces," in Proceedings of the International Conference on Multimodal Interfaces, vol. 1948, LNCS- Springer, 2000.
  123. M. Argyle and M. Cook, "Gaze and Mutual Gaze," Cambridge University Press, 1976.
  124. G. Garau, S. Ba, H. Bourlard, J. Odobez, "Investigating the use of visual focus of attention for audio-visual speaker diarisation," in the Proceedings of the 17th ACM international conference on Multimedia, ACM, 2009, pp. 681-684
  125. R. Stiefelhagen, J. Yang and A. Waibel, "Estimating focus of attention based on gaze and sound," In Proc. 2001 Workshop on Perceptive User Interfaces, ACM, 2001, pp. 1-9.
  126. J.-G. Wang and E. Sung, "Study on eye gaze estimation," IEEE Transactions on Systems, Man, and Cybernetics, Part B, Cybernetics, vol. 32, pp. 332-350, 2002.
  127. C. Morimoto and M. Mimica, "Eye gaze tracking techniques for interactive applications," Computer Vision and Image Understanding, vol. 98, pp. 4-24, 2005.
  128. F.Y. Yang, C.Y. Chang, W.R. Chien, Y.T. Chien and Y.H. Tseng, "Tracking learners' visual attention during a multimedia presentation in a real classroom," Computers & Education, vol. 62, pp. 208-220, 2013.
  129. A.V. Maltese, J.A. Danish, R.M. Bouldin, J.A. Harsh and B. Bryan, "What are students doing during lecture? Evidence from new technologies to capture student activity," International Journal Of Research & Method in Education, vol. 39 , no. 2, pp. 208-226, 2016
  130. H. Ghafarpour, "Classroom conversation analysis and critical reflective practice: Self-evaluation of teacher talk framework in focus," RELC Journal, 2016
  131. E. Murphy-Chutorian and M.M. Trivedi, "Head pose estimation in computer vision: A survey," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 4, pp. 607-626, 2009.
  132. G. Garau, S. Ba, H. Bourlard and J.M. Odobez, "Investigating the use of visual focus of attention for audio-visual speaker diarisation," in Proc. 17th ACM international conference on Multimedia, ACM, 2009, pp. 681-684.
  133. S.O. Ba and J.M. Odobez, "Recognizing visual focus of attention from head pose in natural meetings," IEEE Trans. Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 39, no. 1, pp.16-33, 2009.
  134. M. Voit and R. Stiefelhagen, "Tracking head pose and focus of attention with multiple far-field cameras," in Proc. IEEE Conference on Multimodal Interfaces (ICMI), 2006, pp. 281-286.
  135. A. Abbas, M. I. Khalil, S.Abdel-Hay, H. M. Fahmy, "Expression and Illumination Invariant Preprocessing Technique for Face Recognition", Computer and System Engineering Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt, IEEE, pp. 59-64, 2008.
  136. Abhijith Punnappurath and Ambasamudram Narayanan Rajagopalan, "Face Recognition Across Non-Uniform Motion Blur, Illumination, and Pose", IEEE Transactions On Image Processing, Vol. 13, No. 7, pp. 2067-2082, Jul. 2015.
  137. Abusham. E, Ngo.D, and Teoh. A, "Fusion of Locally Linear Embedding and Principal Component Analysis for Face Recognition (FLLEPCA)", In Third International Conference on Advances in Pattern Recognition, ICAPR 2005, Bath, UK, August, 2005.
  138. Ali Moeini and Hossein Moeini, "Real-World and Rapid Face Recognition Toward Pose and Expression Variations via Feature Library Matrix", IEEE Transactions On Information Forensics And Security, vol. 10, no. 5, May 2015.
  139. Andrew Wagner, John Wright, Arvind Ganesh, Zihan Zhou, Hossein Mobahi, and Yi Ma, "Towards a Practical Face Recognition System: Robust Alignment and Illumination by Sparse Representation".
  140. AnubhaPearline.S, Hemalatha.M, "Face Recognition Under Varying Blur in an Unconstrained Environment", IJRET: International Journal of Research in Engineering and Technology eISSN: 2179-1103 | pISSN: 2181-7168, Volume: 05 Issue: 04, Apr-2016.
  141. Bellhumer. P. N, Hespanha.J, and Kriegman.D, "Eigenfaces vs. fisherfaces: Recognition using class specific linear projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, Special Issue on Face Recognition, vol. 19, no. 19, pp.711-712, Jul. 1997.
  142. Chao-Kuei Hsieh, Shang-Hong Lai, and Yung-Chang Chen, "Expression-Invariant Face Recognition with Constrained Optical Flow Warping", IEEE Transactions On Multimedia, vol. 11, no. 4., June, 2009.
  143. A.W. Galli, G.T.Heydt, P.F. Ribeiro, "Exploring the Power of Wavelet Analysis", IEEE, Oct. 1996.
  144. Hemprasad Y. Patil, Ashwin G. Kothari and Kishor M. Bhurchandi, "Expression Invariant Face Recognition using Contourlet Transform", Image Processing Theory, Tools and Applications, IEEE, 2014.
  145. Hua-Chun, and Z. Yu-Jin., "Expression-independent face recognition based on higher-order singular value decomposition", International Conference on Machine Learning and Cybernetics, proceedings, Kunming-China, July 2008.
  146. Kong Rui, Zhang Bing, "An Effective New Algorithm for Face Recognition", International Conference on Computer Science and Intelligent Communication, (CSIC), pp. no. 390-393, 2015.
  147. Michael J. Jones and Paul Viola, "Fast Multi-view Face Detection", Mitsubishi Electric Research Laboratories, 2003.
  148. Michael J. Lyons, Julien Budynek, & Shigeru Akamatsu, "Coding Facial Expressions with Gabor Wavelets", 3rd IEEE International Conference on Automatic Face and Gesture Recognition, pp. 120-114, Apr.,1998.
  149. Mutelo.R.M, W. L.Woo.W.L, and S. S. Dlay, "Discriminant analysis of the two-dimensional Gabor features for face recognition", Computer Vision, IET,2(2): 19-49, 2008.
  150. Patel.V.M, Wu.T, Biswas.S, Phillips.P.J, and Chellappa.R, "Dictionary-based face recognition under variable lighting and pose", IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 954-965, June, 2012. 17. Paul Viola And Michael J. Jones, "Robust Real-Time Face Detection", International Journal of Computer Vision , vol. 57, no. 2, pp. 97-154, 2004.
  151. Pradeep Nagesh and Baoxin Li, Dept. of Computer Science & Engineering, Arizona State University, Tempe, AZ 85287, USA, "A Compressive Sensing Approach for Expression-Invariant Face Recognition", pp. no. 1518-1514, 2009.
  152. Ronen Basri and David W. Jacobs, "Lambertian Reflectance and Linear Subspaces", IEEE Transactions On Pattern Analysis And Machine Intelligence, vol. 14, no. 2, February 2003.
  153. Tai.Y.W, Tan.P, and Brown M. S., "Richardson-Lucy deblurring for scenes under a projective motion path", IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 8, pp. 1003-1018, Aug. 2011.
  154. Vageeswaran.P, Mitra.K, and Chellappa.R (), "Blur and illumination robust face recognition via set-theoretic characterization", IEEE Transactions On Image Processing, vol. 22, no. 4, pp. 962-972, Apr., 2013.
  155. Viola.P and Jones.M, "Rapid Object Detection using a Boosted Cascade of Simple Features", in Proceeding of Computer Vision and Pattern Recognition, , pp. 511-518, 2001.
  156. Yan.H, Wang.P, Chen.W.D, Liu.J, "Face Recognition Based on Gabor Wavelet Transform and Modular 2DPCA", College of Computer Science Chongqing University of Technology Chongqing, China.
  157. Das, S., Kundu, M.K.: "Effective management of medical information through a novel blind watermarking technique", J. Med. Syst., 2012, 36, (5), pp. 3339-3351.
  158. Li, X.W., Kim, S.T.: 'Optical 3D watermark based digital image watermarking for telemedicine', Opt. Lasers Eng., 2013, 51, (12), pp. 1310-1320.
  159. Deng, X., Chen, Z., Zeng, F., Zhang, Y., Mao, Y.: "Authentication and recovery of medical diagnostic image using dual reversible digital watermarking", J. Nanosci. Nano technol., 2013, 13, (3), pp. 2099-2107.
  160. N. Ray, Russell Greiner, Albert Murtha, "Using Symmetry to Detect Abnormalies inBrain MRI," Computer Society of India Communications, vol.31 no. 19, pp. 7-10, January 2008.
  161. N. Moon, E. Bulitt, K. Leemput and G. Gerig, " Model-based brain and tumor segmentation", Proceedings of ICPR, vol. 1, pp. 528-531, Quebec, 2002.
  162. G. Ulutas, M. Ulutas and V. V. Nabiyev, "Secret image sharing with reversible capabilities," Int. J. Internet Technology and Secured Transactions, Vol. 4, no. 1, pp.1-11, 2012.
  163. K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, and L M Patnaik, "Authentication of Secret Information in Image Steganography," IEEE conference TENCON ,pp.
  164. Linjie Guo, Jiangqun Ni and Yun Qing Shi," Uniform Embedding for Efficient JPEG Steganography", IEEE transactions on information forensics and security, vol. 9, no. 5, may 2014.
  165. Ki-Hyun Jung, Kee-Young Yoo , "Improved Exploiting Modification Direction Method by Modulus Operation", International Journal of Signal Processing, Image Processing and Pattern Vol. 2, No.1, March, 2009
  166. Yaobin mao, guanrong chen, shiguo lian," A novel fast image encryption scheme based on 3-d chaotic baker maps", International Journal of bifurcation and chaos in applied sciences and engineering, volume 14, issue 10, October 2002.
  167. T. yang, c. w. wu, and l. o. chua, "cryptography based on chaotic systems," IEEE trans. circuits syst. I, vol. 44, pp. 469-472, may 1997.
  168. Zhong-ping jiang ,"a note on chaotic secure communication systems", IEEE transactions on circuits and systems-I: fundamental theory and applications, vol. 49, no. 1, January 2002.
  169. Vallathan, Balachandran, Jayanthi: "Provisioning of enhanced medical data security and quality for Telemedicine applications", International Conference on Recent Trends in Engineering and Material Sciences 17- 19 March 2016.
  170. Jianping Fan, Guihua Zeng , Mathurin Body , Mohand-Said Hacid," Seeded region growing: an extensive and comparative study", Pattern Recognition Letters 26 (2005) pp.1139-1156.
  171. Andr´e Bleau and L. Joshua Leon," Watershed-Based Segmentation and Region Merging", Computer Vision and Image Understanding, pp.317- 370, 2000.
  172. Monika Xess, S. Akila Agnes, "Analysis of Image Segmentation Methods Based on Performance Evaluation Parameters", International Journal of Computational Engineering Research, Vol, 04, Issue, 3.
  173. Jayalaxmi S. Gonal, Vinayadatt V. Kohir ," Automatic Detection and Segmentation of Brain Tumors using Binary Morphological Level Sets with Bounding Box," Proceedings of 2013 3rd International Conference on Computer Engineering and Bioinformatics (ICCEB 2013), November 23-24, 2013 pp. 37 -43.
  174. Tseng, Belle L and Dimitris Anastassiou. "Compatible Video Coding of Stereoscopic Sequences using MPEG-2's Scalability and Interlaced Structure", International Workshop on HDTV, Vol. 94, 1994.
  175. Hewage et al, "Comparison of Stereo Video Coding Support in MPEG-4 MAC, H. 264/AVC and H. 264/SVC", Proc. of IET Visual Information Engineering-VIE07, 2007
  176. Merkle, H Brust, K Dix, K Muller and Wiegand, "Stereo Video Compression for Mobile 3D Services", IEEE 3D TV Conference: The True Vision-Capture, Transmission and Display of 3D Video, 2009
  177. Balasko, Hrvoje. "Comparison of Compression Algorithms for High Definition and Super High Definition Video Signals", 2009
  178. Vetro A, Tourapis, A M, Muller and Chen, "3D-TV Content Storage and Transmission", IEEE Transactions on Broadcasting, Vol. 57, No.2, pp. 384-394, 2011.
  179. Merkle, Wang Y, Muller, Smolic and Wiegand, "Video Plus Depth Compression for Mobile 3D Services", Proc. IEEE 3DTV Conference, Germany, 2009.
  180. Jin, L., Boev, A., Gotchev, A., & Egiazarian, "3D-DCT based Multi- Scale Full Reference Quality Metric for Stereoscopic Video", Technical Article.
  181. Zund F, Pritch Y, Sorkine-Hornung A, Mangold S, and Gross T, "Content-Aware Compression using Saliency-Driven Image Retargeting", IEEE International Conference on Image Processing , pp. 1845-1849, 2013.
  182. Schwarz H, Marpe D and Wiegand, "Overview of the scalable video coding extension of the H. 264/AVC standard", IEEE Transactions on circuits and systems for video technology, Vol. 17, No. 9, pp.1103-1120, 2007.
  183. Stockhammer, Thomas, Miska M. Hannuksela, and Thomas Wiegand. "H. 264/AVC in Wireless Environments", IEEE transactions on circuits and systems for video technology, Vol. 13, No. 7, pp. 657-673, 2003
  184. Kovacs, Peter Tamas, et al, "Overview of the Applicability of H. 264/MVC for Real-Time Light-Field Applications", 3DTV-Conference: The True Vision-Capture, Transmission and Display of 3D Video (3DTV-CON), 2014.
  185. Mamatha R B, Keshaveni N, "Compartive Sutdy of video Compression Techiques h.264/AVC", International Journal of Advanced Research in Comptuer Science and Sofware Engineering, Vol. 4, Issue 11, 2014.
  186. Aman Jassal, "H.265/HEVC Video Transmission over 4G Cellular Networks", The University of British Columbia, 2016
  187. Wenger, Stephan. "H. 264/avc over ip." IEEE Transactions on Circuits and Systems for Video Technolog, Vol. 13, No. 7, pp. 645-656, 2003.
  188. Stockhammer, Thomas, Miska M. Hannuksela, and Thomas Wiegand. "H. 264/AVC in Wireless Environments", ." IEEE Transactions on Circuits and Systems for Video Technolog, Vol. 13, No. 7, pp. 657-673, 2003
  189. Micallef, Brian W., Carl J. Debono, and Reuben A. Farrugia. "Error Concealment Techniques for H. 264/MVC Encoded Sequences." IEEE Proc. of Int. Conf. of Electrotechnical and Computer Science (ERK), Portoroz, Slovenia, 2010
  190. Kordelas, Athanasios, Tasos Dagiuklas, and Ilias Politis. "On the performance of H. 264/MVC over lossy IP-based networks." Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European. IEEE, 2012.
  191. Micallef, Brian W., and Carl J. Debono. "An Analysis on the Effect of Transmission Errors in Real-Time H. 264-MVC Bit-Streams", 15th IEEE Mediterranean Electrotechnical Conference(IEEE MELECON), 2010.
  192. Liu Yanwei et al, "A Novel Rate Control Technique for Multiview Video Plus Depth based 3D Video Coding", IEEE Transactions on Broadcasting, Vol. 57, No. 2, pp. 562-571, 2011
  193. Mor Liu Zhao, et al. "Experimental evaluation of H. 264/Multiview Video Coding over IP Networks", arXiv preprint alg-geom/9705028, 1997.
  194. Seo Kwang-deok, et al, "A practical RTP packetization scheme for SVC video transport over IP networks," Etri Journal, Vol. 32, No.2, pp. 281- 291, 2010.
  195. Y K Wang, R Even, T kristensen, Tandberg, R Jesup,"RFC-6148: RTP Payload Format for H.264 Video".
  196. Y K Wang, T Schier1, R. Skupin and P Yue, "RTP Payload Format for MVC Video", Retrived from http://datatracker.ietf.org/drafts/current/
  197. Teruhiko Suzuki, Miska M Hannuksela, Ying Chen, Shinobu Hattori, "Study Text of Working Draft 5 of ISO/IEC 14496-10:2012/DAM 2 MVC extensions for inclusion of depth maps", 2012
  198. Wenger, Y K Wang, Schier, RTP Payload format for Scalable Video Coding, Internet Engineering Task Force, 2011, REFERENCES
  199. S. G. Koolagudi, S. Maity, V. A. Kumar, S. Chakrabarti, and K. S. Rao, IITKGP-SESC : Speech Database for Emotion Analysis. Communications in Computer and Information Science, JIIT University, Noida, India: Springer, issn: 1865- 0929 ed., August 17-19 2009.
  200. T. L. Nwe, S. W. Foo, and L. C. D. Silva, "Speech emotion recognition using hidden Markov models," Speech Communication, vol. 41, pp. 603-623, Nov. 2003.
  201. Shiva Prasad K.M.,Anil Kumar C., M.B.Manjunatha., KodandaRamaiah G N., Various front end tools for digital speech Processing, in IEEE pg 905-911, 2015, Print ISBN: 978- 9-3805-4415-1.
  202. S. McGilloway, R. Cowie, E. Douglas-Cowie, S. Gielen, M. Westerdijk, and S. Stroeve, "Approaching automatic recognition of emotion from voice: A rough benchmark," (Belfast), 2000.
  203. F. Dellaert, T. Polzin, and A. Waibel, "Recognising emotions in speech," ICSLP 96, Oct. 1996.
  204. D. Ververidis, C. Kotropoulos, and I. Pitas, "Automatic emotional speech classification," pp. I593-I596, ICASSP 2004, IEEE, 2004.
  205. A. Iida, N. Campbell, F. Higuchi, and M. Yasumura, "A corpus based speech synthesis system with emotion," Speech Communication, vol. 40, pp. 161-187, Apr. 2003.
  206. C. Gobl and A. Chasaide, "The role of voice quality in communicating emotion, mood and attitude," Speech Communication, vol. 40, pp. 189-212, 2003.
  207. K. S. Rao, R. Reddy, S. Maity, and S. G. Koolagudi, "Characterization of emotions using the dynamics of prosodic features," in International Conference on Speech Prosody, (Chicago, USA), May 2010.
  208. K. S. Rao, S. R. M. Prasanna, and T. V. Sagar, "Emotion recognition using multilevel prosodic information," in Workshop on Image and Signal Processing (WISP-2007), (Guwahati, India), IIT Guwahati, Guwahati, December 2007.
  209. S. R. M. Prasanna, B. V. S. Reddy, and P. Krishnamoorthy, "Vowel onset point detection using source, spectral peaks, and modulation spectrum energies," IEEE Trans.
  210. Audio, Speech, and Language Processing, vol. 17, pp. 556-565, May 2009.
  211. L. R. Rabiner and B. H. Juang, Fundamentals of Speech Recognition. Englewood Cli s, New Jersy: Prentice-Hall, 1993.
  212. T. Pao and Y. Chen, J. Yeh,Y. Chang. Emotion recognition and evaluation of mandarin speech using weighted D-KNN classification. Int. Innov. Comput. Info. Control. 4, 1695- 1709(2008).
  213. H. Altunand, G. Pollat., Boosting selection of speech related features to improve performance of multi-class SVMs in emotion detection.Expert Syst. Appl. 36, 1897-8203(2009).
  214. M. L. Yang. Emotion recognition from speech single using new harmonyfeature. Single Process. 90, 1415- 1423(2010).
  215. L. He and M. Lech, N.C. Maddage, N.B.Allen. Study of empirical mode decomposition and spectral analysis for stress and emotion classification in natural speech.BiomedSignal Process Control. 6, 139-146 (2011).
  216. B. Schuller and G. Rigoll, M. Lang. Speech emotion recognizing combining acoustic features and linguistic information in a hybrid support vector machine-belief network architecture, in proceeding of the ICASSP, 1, 397-401(2004) REFERENCES
  217. Anil Kumar C., Shiva Prasad K.M., M.B.Manjunatha., KodandaRamaiah G N., Basic Acoustic Features Analysis of Vowels And C-V-C of Indian English Language, in ITSI-TEEE,vol -3 Issue-1, pages 20-23 (2015).
  218. Shiva Prasad K.M.,Anil Kumar C., M.B.Manjunatha., KodandaRamaiah G N., Gender based Acoustic Features and Spectrogram analysis for kannada Phonetics, in ITSI-TEEE,vol -3 Issue-1, pages 16-19 (2015).
  219. Shiva Prasad K.M., Anil Kumar C., KodandaRamaiah G N., M.B.Manjunatha., Speaker based vocal tract shape estimation for kannada vowels, in IEEE pg 1-6 2015, DOI: 10.1109/EESCO.2015.7253942.
  220. Shiva Prasad K.M., Anil Kumar C., M.B.Manjunatha., KodandaRamaiah G N., Various front end tools for digital speech Processing, in IEEE pg 905-911, 2015, Print ISBN: 978-9-3805-4415-1.
  221. Anil Kumar C., Shiva Prasad K.M., M.B.Manjunatha., KodandaRamaiah G N., Vocal Tract shape estimation of Vowels & C-V-V- C for diversified Indian English Speakers, in IEEE pg 1-7 2015, DOI: 10.1109/EESCO.2015.7253941.
  222. G.N.Kodandaramaiah,Dr.M.N.Giriprasad and Dr.M.Mukundarao. 'Implementation of LPC based vocal tract shape estimation for vowels' The Technology world quarterly journal march-April 2010. Volume V issues ISSN 2180-1614 pp 97-102 .
  223. M. S. Shah and P. C. Pandey, "Estimation of vocal tract shape for VCV syllables for a speech training aid," in Proc. 27th Int. Conf. IEEE Engg. Med. Biol. Soc., 2005, pp. 6642-6645.
  224. Mehrdad khodai-joopaari,Frantz Clermont,Michael barlow,speaker variability on a continuum of spectral sub-bands from 297-speakers'non- contemporaneous cepstra of japans vowels, proceeding of the 10th Australian intl conference on speech scicence and technology, 2004.
  225. Gautam Vallabha & Betty Tuller, "CHOICE OF FILTER ORDER IN LPC ANALYSIS OF VOWELS", From Sound to Sense: June 11 -June 13, 2004 at MIT.
  226. Stephen A. Zahorian, A. Matthew Zimmer, and Fansheng Meng, "Vowel Classification for Computer-Based Visual Feedback for Speech Training for the Hearing Impaired", Department of Electrical and Computer Engineering, Old Dominion University Norfolk, Virginia 23529, USA.
  227. Powen Ru, Taishih Chi, and Shihab Shamma, "The synergy between speech production and perception", J. Acoust. Soc. Am. , January 2003 J. Makhoul, "Linear Prediction: A Tutorial Review," Proc. IEEE, Vol. 63,pp 561-580,1975.
  228. Thomas F. Quatieri, Discrete-time Speech Signal Processing, Principles and Practice, Pearson Education, 2002. REFERENCES
  229. Y. Y.Schechner, S. G.Narasimhan and Shree K.Nayar, "Instant Dehazing of Images Using Polarization", In Proc.CVPR, 2001.
  230. S.G. Narasimhan and Shree K.Nayar, "Interactive (De)Weathering of an Image using Physical Models", IEEE workshop on Color and Photometric Method in Computer Vision,2003.
  231. S.Shwartz, E. Namer and Y. Schechner, "Blind Haze Separation", In Proc.CVPR, 2006.
  232. Robby T. Tan, "Visibility in Bad Weather from a Single Image", Computer Vision and Pattern Recognition, 2008.
  233. Z. Xu, X. Liu and Na Ji, " Fog Removal from Color Images using Contrast Limited Adaptive Histogram Equalization", In Proc. CVPR, 2009.
  234. K. He, J. Sun and X. Tang, Single image haze removal using dark channel Prior, IEEE Trans. Pattern Anal. Mach. Intell. Vol. 33, pp. 23412353, 2010.
  235. Y.Shuai, Rui Liu and W. He,"Image Haze Removal of Wiener Filtering Based on Dark Channel Prior",In Proc.CVPR,2012
  236. Tripathi A. K., and S. Mukhopadhyay, "Single image fog removal using bilateral filter", Signal Processing, Computing and Control IS-PCC,International Conference on IEEE, 2012.
  237. T.H Kil, S.H.Lee and N.I. Cho, "A dehazing algorithm using Dark Channel Prior and Contrast Enhancement", In Proc.CVPR,2013.
  238. Q.Zhu, J. Mai and Ling Shao,"A fast single image haze removal algorithm using Color Attenuation Prior", IEEE transactions on Image Processing,2015.
  239. S.G. Narasimhan and S.K. Nayar," Vision and the atmosphere",IJCV, 48(3):233254, August 2002.
  240. S.G. Narasimhan and S.K. Nayar," Contrast restoration of weather degraded images", PAMI, 25(6), June 2003.
  241. J. P. Oakley, and B. L. Satherley, "Improving image quality in poor visibility conditions using a physical model for contrast degradation", IEEE Trans. I m g . Proc. 7, pp. 167-179(1998).
  242. K. Tan and J. P. Oakley, "Enhancement of color images in poor visibility conditions", Proc. KIP pp. 788-791 (2000).
  243. P. Pencipowski, "A low cost vehicle-mounted enhanced vision system comprised of a laser illuminator and range- gated camera", Proc. SPIE 2736 Enhanced and synthetic vision, pp. 222-227 (1996).
  244. B. T. Sweet and C. Tiana, "Image processing and fusion for landing guidance", Proc. SPIE 2736 Enhanced and synthetic vision, pp. 84-95 (1996).
  245. S. M. Pizer etc., "Adaptive Histogram Equalization and Its Variations", Computer vision, graphics, and image processing, 1987, pp. 335-368.
  246. Y. Schechner and N. Napel, "Clear underwater vision", CVPR,2004.
  247. Chia-Hung Yeh, Li-Wei Kang, Ming-Sui Lee and Cheng- Yang Lin, "Haze effect removal from image via haze density estimation in optical model",OSA,2013.
  248. S Geman and D Geman, "Stochastic Relation, Gibbs distribution and Bayesian restoration of Images", IEEE PAM1;V-6, N0.6,7421-741.
  249. https://en.wikipedia.org/wiki/Wiener_filter Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  250. OA Dobre, A Abdi, Y Bar-Ness, W Su, Survey of automatic modulation classification techniques: classical approaches and new trends. IET Communications 1(2), 137-156 (2007).
  251. W Wei, JM Mendel, Maximum-likelihood classification for digital amplitude-phase modulations. IEEE Transactions on Communications 48(2), 189-193 (2000).
  252. V. Choqueuse, S. Azou, K. Yao, L. Collin, and G. Burel, "Blind modulation recognition for MIMO systems," MTA Rev., vol. 19, no. 2, pp. 183-196, Jun. 2009.
  253. OA Dobre, F Hameed, Likelihood-based algorithms for linear digital modulation classification in fading CHANNELS. Proceedings of the Canadian Conference on Electrical and Computer Engineering (CCECE '06), 2006, Ottawa, Canada, 1347-1350
  254. A Ebrahimzadeh, A Ranjbar, Intelligent digital signal-type identification. Engineering Applications of Artificial Intelligence 21(4), 569-577 (2008).
  255. Y Zhao, G Ren, Z Zhong, Modulation recognition of SDR receivers based on WNN. Proceedings of the 63rd IEEE Vehicular Technology Conference (VTC '06), May 2006, 2140-2143.
  256. MLD Wong, AK Nandi, Automatic digital modulation recognition using artificial neural network and genetic algorithm. Signal Processing 84(2), 351-365 (2004).
  257. K. Hassan, I. Dayoub,W. Hamouda, C. Nzeza, and M. Berbineau, "Blind Digital Modulation Identification for Spatially-Correlated MIMO systems," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 683-693, Feb. 2012.
  258. AK Nandi, EE Azzouz, Algorithms for automatic modulation recognition of communication signals. IEEE Transactions on Communications 46(4), 431-436 (1998).
  259. A Swami, BM Sadler, Hierarchical digital modulation classification using cumulants. IEEE Transactions on Communications 48(3), 416- 429 (2000).
  260. OA Dobre, Y Bar-Ness, W Su, Robust QAM modulation classification algorithm using cyclic cumulants. Proceedings of the IEEE Wireless Communications and Networking Conference -2004, 745-748.
  261. M. Muhlhaus, M. Oner, O. Dobre, H. Jakel, and F. Jondral, "A novel algorithm for MIMO signal classification using higher-order cumulants," in Proc. IEEE Radio Wireless Symp. (RWS), Jan. 2013, pp. 7-9.
  262. M. Muhlhaus, M. Oner, O. Dobre, and F. Jondral, "A low complexity modulation classification algorithm for MIMO systems," IEEE Commun. Lett., vol. 17, no. 10, pp. 1881-1884, Oct. 2013.
  263. BG Mobasseri, Digital modulation classification using constellation shape. Signal Processing 80(2), 251-277 (2000).
  264. P Prakasam, M Madheswaran, Modulation identification algorithm for adaptive demodulator in software defined radios using wavelet transform. International Journal of Signal Processing 5(1), 74-81 (2009)
  265. K Maliatsos, S Vassaki, P Constantinou, Interclass and intraclass modulation recognition using the wavelet transform. Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007.
  266. Y. T. Chan, Wavelet Basics, Kluwer Academic Publishers, 1995.
  267. Y.C. Lin and C.-C. Jay Kuo, "Modulation classification using wavelet transform," in Proceedings SPIE, vol. 2303, pp. 260-271.
  268. K.C. Ho, W. Prokopiw and Y.T. Chan, "Identification of M-ary PSK and FSK signals by the wavelet transform," in Proceedings IEEE Military Communications Conf., pp. 886-890, California, November 1995.
  269. M. Venkata Subbarao, N.Sayedu Khasim, Jagadeesh Thati and M.H.H.Sastry, " A Novel Technique for Time-Frequency Analysis of Digitally Modulated Signals", International Journal of Signal Processing, Image Processing and Pattern Recognition(IJSIP), Volume 6, Issue 2, pp. 1-14, April 2013.
  270. M. Venkata Subbarao, N.Sayedu Khasim and Jagadeesh Thati, "Analysis of Non-Stationary Power Quality Signals" Elixir Online Journal on Electrical Engineering, Vol 53, pp. 11815-11818, December 2012. AUTHORS PROFILE REFERENCES
  271. A. Boukerche et al., Vehicular Ad Hoc Networks: A New Challenge for ..., Comput. Commun,2008. DOI:10.1016/j.comcom.2007.12.004.
  272. Irith Ben-Arroyo Hartman, Daniel Keren et al., Theory and Practice in Large Carpooling Problems, 5th International Conference on Ambient Systems, Networks and Technologies, Procedia Computer Science 32, pp. 339 -347, 2014.
  273. Jizhe Xia, Kevin M. Curtin, et al., A New Model for a Carpool Matching Service, PLOS ONE, DOI:10.1371/journal.pone.0129257 June 30, 2015.
  274. Chan ND, Shaheen SA, Ridesharing in North America: Past, Present, and Future. Transport Reviews, 32(1), pp.93-112, 2012. DOI: 10.1080/01441647.2011.621557
  275. Ferguson E, The rise and fall of the American carpool: 1970- 1990. Transportation, 24(4), pp.349-376, (1997a).. DOI: 10.1023/A:1004928012320
  276. Shewmake S, Can Carpooling Clear the Road and Clean the Air? Evidence from the Literature on the Impact of HOV Lanes on VMT and Air Pollution. Journal of Planning Literature, 27(4), pp.363-374, 2012.
  277. Cassidy MJ, Jang K, Daganzo CF, The smoothing effect of carpool lanes on freeway bottlenecks. Transportation Research Part A: Policy and Practice, 44(2), pp.65-75, 2010. DOI: 10.1016/j.tra.2009.11. 002
  278. Small KA, Winston C, Yan J, Baum-Snow N, Gómez-Ibáñez JA, Differentiated Road Pricing, Express Lanes, and Carpools: Exploiting Heterogeneous Preferences in Policy Design [with Comments]. Brookings-Wharton Papers on Urban Affairs, pp.53-96, 2006. DOI: 10.2307/25067428
  279. Poole RW, Balaker T, Virtual exclusive busways: improving urban transit while relieving congestion. Los Angeles, CA: Reason Foundation, 2005.
  280. Rasheed Hussain and Heekuck Oh, Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks, J Inf Process Syst, Vol.10, No.1, pp.103~118, March 2014.
  281. Agatz NA, Erera AL, Savelsbergh MW, Wang X, Dynamic ride-sharing: A simulation study in metro Atlanta. Transportation Research Part B: Methodological, 45(9), pp.1450-1464, 2011.
  282. G. Yan, W. Yang, D. B. Rawat and S. Olariu, "Smart Parking: A Secure and Intelligent Parking System," in Intelligent Transportation Systems Magazine, IEEE, vol. 3, pp.18-30, 2011.
  283. Alhammad, Abdulmalik, Siewe, Francois, An InfoStation- Based Context-Aware On-Street Parking System, IEEE, 2013.
  284. H. Moustafa and Y. Zhang, Vehicular Networks: Techniques, Standards, and Applications. Boston, MA, USA: Auerbach Publications, 2009.
  285. R. Panayappan, J. M. Trivedi, A. Studer and A. Perrig, "VANET-based approach for parking space availability," in Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, Montreal, Quebec, Canada, pp. 75-76, 2007.
  286. J. B. Kenney, "Dedicated Short-Range Communications (DSRC) Standards in the United States," in Proceedings of the IEEE, vol. 99, pp.1162-1182, 2011.
  287. Tullio Giuffrè, Sabato Marco Siniscalch, Giovanni Tesoriere, A novel architecture of Parking management for Smart Cities, SIIV -5th International Congress -Sustainability of Road Infrastructures, Procedia -Social and Behavioral Sciences 53, pp.16 -28, 2012.
  288. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 [22] Jesús Friginal, Sébastien Gambs et al., Towards privacy- driven design of a dynamic carpooling system, Pervasive and Mobile Computing 14, pp.71-82, 2014.
  289. Wenhui Xin, Shunying Zhu, Hong Wang, Yongfei Yan, Jining Xiong, Analyzing early market potential and strategies for carpooling in China: a case study of wuhan, in: International Conference on Management and Service Science, 2009, MASS '09, pp.1-4, 2009.
  290. Christian Artigues, Yves Deswarte, Jérémie Guiochet,et. al., AMORES: an architecture for mobiquitous resilient systems, in: Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience, ARMOR'12, ACM, pp. 7:1-7:6, 2012.
  291. Mahmud, S A, Khan, G M, Rahman, M, Zafar, H, A Survey of Intelligent Car Parking System, Journal of Applied Research and Technology, 2013.
  292. Amit Kumar Tyagi, N. Sreenath, Preserving Location Privacy in Location Based Services against Sybil Attacks, IJSIA Vol.9, No.12 (2015), pp.189-210, December, 2015.
  293. Amit Kumar Tyagi, N. Sreenath, A Comparative Study on Privacy Preserving Techniques for Location Based Services, BJMCS, July, 2015 10(4): pp.1-25, 2015.
  294. Amit Kumar Tyagi, N.Sreenath, Never Trust Anyone: Trust- Privacy Trade-Offs in Vehicular Ad hoc Network, BJMCS 2016.
  295. Zhichao Zhu et.al, APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services, INFOCOM, Proceedings IEEE, 2011. DOI:10.1109/INFCOM.2011.5934991
  296. Amit Kumar Tyagi, N.Sreenath "Providing Trust Enabled Services in Vehicular Cloud Computing (extended version)", ICIA, ACM, 25-26 August, Pondicherry, India, 2016. DOI: http://dx.doi.org/10.1145/2980258.2980263.
  297. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., &Cayirci, E. A survey on sensor networks. IEEE Communications Magazine, vol. 40, no.8, pp.102-114, 2002.
  298. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. A survey on the IETFprotocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, vol .20, no.6, pp. 91-98, 2013.
  299. Acampora, G., Cook, D. J., Rashidi, P., & Vasilakos, A. V. A survey on ambient intelligence in healthcare. Proceedings of the IEEE, vol.101, no.12, pp.2470-2494, 2013.
  300. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, vol.19, no.2, pp. 161-173, 2013.
  301. Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., & Leung, V. C. Body area networks: A survey. Mobile Networks and Applications, vol.16, no.2, pp.171-193, 2011.
  302. Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. Delay tolerant networks: Protocols and applications. Florida: CRC Press, 2011.
  303. Wei, G., Ling, Y., Guo, B., Xiao, B., & Vasilakos, A. V. Prediction- based data aggregation in wireless sensor networks: Combining grey model and Kalman filter. Computer Communications, vol. 34, no.6, pp.793-802, 2011.
  304. Li, M., Li, Z., & Vasilakos, A. V. A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE, vol.101, no.12, pp.2538-2557, 2013.
  305. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. Retrust: Attack- resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, vol.16, no.4, pp.623-632, 2012.
  306. Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. A biologybased algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, vol.11, no.3, 417-430, 2014.
  307. Liu, L., Song, Y., Zhang, H., Ma, H., & Vasilakos, A. Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, vol. 64, no.3, pp.819-832, 2013.
  308. Sengupta, S., Das, S., Nasir, M., Vasilakos, A. V., & Pedrycz, W. An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol.42, no.6, pp. 1093-1102, 2012.
  309. Xiong, N., Cao, M., Vasilakos, A. V., Yang, L. T., & Yang, F. An energy-efficient scheme in next-generation sensor networks. International Journal of Communication Systems, vol.23, no. (9-10), pp.1189-1200, 2010.
  310. Thiago de Almeida Oliveira and Eduardo Paciencia Godoy, Zigbee Wireless Dynamic Sensor Networks: Feasibility Analysis and Implementation Guide, IEEE Sensors Journal, vol. 16, no.11, June 2016.
  311. N. Vlajic, D. Stevanoic, and G. Spanogiannopoulos, "Strategies for improving performance of IEEE 802.15.4/Zigbee WSN's with path- constrained mobile sink(s)," Computer Communication., vol. 34, no. 6, pp.743-757, May 2011.
  312. N.A. Pantazis, S.A. Nikolidakis, D.D. Vergados, Energy-Efficient Routing Protocols in WSN: A Survey, IEEE Communications Surveys & Tutorials, vol 15,No 2, second quarter 2013,1553-877 X/13 (C) 2013 IEEE, pg no 551-588, 2013.
  313. M.J. Handy, M. Haase, D. Timmermann, Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection, Proceedings of 4thInternational Workshop on Mobile and Wireless Communications Network, USA, Vol. 1, pp. 368-372, 2002.
  314. Payal Khurana Batra, Krishna Kant, LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks, Wireless Networks, vol.22, no.49-60, 2016.
  315. Salim EL KHEDIRI, Nejah NASRI, Anne WEI, Abdennaceur KACHOURI, A new Approach for Clustering in Wireless Sensor Networks Based on LEACH, Procedia Computer Science vol.32, pp.1180-1185, 2014.
  316. YUE Xiao-kui, YUAN Jian-ping, "Neural Network-based GPS/INS Integrated System for Spacecraft Attitude Determination", CHINESE JOURNAL OF AERONAUTICS, Vol.19 No. 3. August 2006, page no 234 -238.
  317. Yang Cheng¤ and John L. Crassidis, "Particle Filtering for Sequential Spacecraft Attitude Estimation", American Institute of Aeronautics and Astronautics, page no. 1 -18.
  318. Andrew G Dempster, "Satellite Navigation: New Signals, New Challenges", School of Surveying and Spatial Information Systems, University of New South Wales, Sydney 2052.
  319. Arulampalam, Maskell, Gordon, Clapp: A Tutorial on Particle Filters for on-line Non-linear / NonGaussian Bayesian Tracking, IEEE Transactions on Signal Processing, Vol. 50, 2002
  320. "Kalman and Particle filters" H. R. B. Orlande1, M. J. Colaço1, G. S. Dulikravich, F. L. V. Vianna, W. B. da Silva, H. M. da Fonseca and O. Fudym, page no 1 -39.
  321. "Particle Filters for Positioning, Navigation, and Tracking" Fredrik Gunnarsson, Niclas Bergman, Urban Forssell, Jonas Jansson, Rickard, Per-Johan, Final version for IEEE Transactions on Signal Processing. Special issue on Monte Carlo methods for statistical signal processing.
  322. A Novel Data Fusion Approach in an Integrated GPS/INS System Using Adaptive Fuzzy Particle Filter, Ali Asadian and Behzad Moshiri University of Tehran, Tehran, Ali Khaki Sedigh, University of K.N.T,Tehran, Iran
  323. S. Arulampalam ,S. Maskell ,N. Gordon and T. Clapp, "A tutorial on particle filters for on-line non-linear/non-gaussian bayesian tracking". IEEE Trans. Sig. Proc., vol 50, no 2, February 2002, pp. 174-188.
  324. "Sequential monte carlo methods for multiple target tracking and data fusion," , C. Hue, J. P. Le Cadre and P. Pérez, IEEE Trans. Sig. Proc., vol 50, no 2, February 2002, pp. 309-325.
  325. "Mathematical Modeling and Stabilization of Large Flexible Spacecraft Subject To Orbital Perturbation", S. S. LIM and N. U. AHMED, Canada, (Received December 1988; accepted, for publication March 1989), page no 1487 -1504, volume no 12.
  326. A. Asadian, B. Moshiri and A. Khaki Sedigh, "Nonlinear optimization in an integrated GPS/INS system in critical situations using particle filters", in Proc ICEE2005 Conf., Zanjan, Iran, May 2005, pp. 93-99.
  327. "A Practical Method for Implementing an Attitude and Heading Reference System", Rodrigo Munguía and Antoni Grau, Received 24 Jun 2013; Accepted 29 Jan 2014, DOI: 10.5772/58463, International Journal of Advanced Robotic Systems.
  328. "Integration of INS and GPS system using Particle Filter based on Particle Swarm Optimization", Meriem JGOUTA and Benayad NSIRI, International Journal Of Circuits, Systems And Signal Processing, Volume 9, 2015, ISSN: 1998-4464, page no 461 -466.
  329. GPS/INS Integration: A Performance Sensitivity Analysis, Wang Jin-ling, Lee H K, Rizos C, School of Surveying and Spatial Information Systems, The University of New South Wales, Sydney, Australia.
  330. "Rao-Blackwellized Particle Filtering for 6-DOF Estimation of Attitude and Position via GPS and Inertial Sensors", Paul Vernaza and Daniel D. Lee, GRASP Lab, University of Pennsylvania, Philadelphia, PA 19104.
  331. "A Survey of Nonlinear Attitude Estimation Methods", John L. Crassidis * and Yang Cheng ‡, University at Buffalo, State University of New York, Amherst, F. Landis Markley †, NASA Goddard Space Flight Center, Greenbelt. AUTHORS PROFILE
  332. R. Vijayanandh, Author: Completed BE in Aeronautical Engineering from Rajalaskhmi Engineering College, Chennai. Completed his M.E in Avionics from Madras Institute of Technology, Chennai. He has three years of teaching and research experience in Kumaraguru College of Technology, Coimbatore.
  333. G. Raj Kumar, Co-Author: Completed his BE in Aeronautical Engineering from Park College of Engineering and Technology, Coimbatore. Completed his M.E in Aeronautical Engineering from Dhanalakshmi Srinivasan College of Engineering and Technology, Chennai. He has three years of teaching and research experience in Kumaraguru College of Technology, Coimbatore.
  334. M. Senthil Kumar, Co-Author: Completed his B.Tech in Mechanical Engineering from Pondicherry Engineering College, Pondicherry Completed his M.E in Aeronautical Engineering from Park College of Engineering and Technology, Coimbatore. Pursuing his PhD from Coimbatore Institute of Technology, Anna University-Chennai. He has ten years of teaching and research experience in Kumaraguru College of Technology, Coimbatore.
  335. S. Samyuktha, Co-Author: Pursuing her Under Graduate degree in Aeronautical engineering from Kumaraguru College of Technology, Coimbatore, Tamil Nadu REFERENCES
  336. Sergey Andreev, Mikhail Gerasimenko, Olga Galinina, Yevgeni Koucheryavy, Nageen Himayat, Shu-Ping Yeh, and Shilpa Talwar, "Intelligent Access Network Selection in Converged Multi-Radio Heterogeneous Networks", IEEE Wireless Communications, Vol. 21, No. 6, pp. 86-96, December 2014.
  337. Paolo Bellavista, Antonio Corradi, and Luca Foschini, "IMS-Based Presence Service with Enhanced Scalability and Guaranteed QoS for Interdomain Enterprise Mobility", IEEE Wireless Communications, pp:16-23, June 2009.
  338. Olabisi E. Falowo and H. Anthony Chan, "Radio Resource Management in Heterogeneous Cellular Networks", Cellular Networks -Positioning, Performance Analysis, Reliability, ISBN: 978-953-307-246-3, 2011.
  339. Tom Mmbasu Walingo and Fambirai Takawira, "Performance Analysis of a Connection Admission Scheme for Future Networks" IEEE Transactions on Wireless Communications, vol. 14, no. 4, April 2015.
  340. Wen Juan, Sheng Min, Zhang Yan, Wang Xijun and Li Yuzhou, "Traffic Characteristics Based Dynamic Radio Resource Management in Heterogeneous Wireless Networks", Selected Papers From IEEE/CIC ICCC2013, January 2014.
  341. Jignesh S. Panchal, Roy D. Yates, and Milind M. Buddhikot, "Mobile Network Resource Sharing Options: Performance Comparisons",IEEE Transactions On Wireless Communications, Vol. 12, No. 9, September 2013.
  342. Eng Hwee Ong, Jamil Y. Khan and Kaushik Mahata," Radio Resource Management of Composite Wireless Networks:Predictive and Reactive Approaches", IEEE Transactions on Mobile Computing, Vol. 11, No. 5, May 2012.
  343. Muhammad Ismail and Weihua Zhuang, "A Distributed Multi-Service ResourceAllocation Algorithm in Heterogeneous WirelessAccess Medium", IEEE Journal On Selected Areas In Communications, Vol. 30, No. 2, pp. 425-432, 2012.
  344. R.Shyam Sundar and S.Nanda Kumar, "Performance Improvement of Heterogeneous Wireless Networks using Modified Newton Method", International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.3, May 2012.
  345. S. Kokila and G.Sivaradje, "Active Resource Allocation Design for QoS Improvement in Wireless Broadband Interworking Networks" ,Proceedings of International Conference on Communication and Security, ICCS 2016, 17 th -19 th March 2016, Puducherry.
  346. Swati Juneja, Abhinav Juneja and Mohit Juneja, "Comparison of 3GPP LTE and 3GPP2 UMB", Special Issue of IJCCT Vol.1, Issue 2, 2010.
  347. Sourangsu Banerji,and Rahul Singha Chowdhury, " Wi-Fi & WiMAX: A Comparative Study", Indian Journal of Engineering, Vol.2, Issue. 5, 2013.
  348. Hechmi Khlifi and Jean-Charles Grégoire, "IMS Application Servers Roles, Requirements, and Implementation Technologies", IEEE Internet Computing, pp,40-52, 2008.
  349. Miguel Lo´pez-Benı´tez, and Javier Gozalvez, "Common Radio Resource Management Algorithms for Multimedia Heterogeneous Wireless Networks", IEEE Transactions on Mobile Computing, vol. 10, no. 9, pp. 1201-1213, September 2011.
  350. S. Kokila received Bachelor of Technology in 2010 and Masters of Technology in Electronics and Communication Engineering (ECE) in 2012 from Pondicherry Engineering College, Puducherry, India. She is currently pursuing her Ph.D. in the field of Wireless communication, in Department of ECE, Pondicherry Engineering College. She is currently doing her research in the area of convergence of Wireless Networks. Her area of interest is wireless communication and interworking. G. Sivaradje received B.E degree from University of Madras in 1991 and M.Tech in 1996 in Electronics and Communication Engineering and Ph.D degree from Pondicherry University in 2006. He has 16 years in teaching and 4 years of industrial experience. He is currently working as Associate Professor in the Department of Electronics and Communication Engineering, Pondicherry Engineering College, Puducherry. He has 25 Publications in reputed International and National Journals and published research papers more than 60 in International and National Conferences. His areas of interest are Wireless Networking and Image Processing REFERENCES
  351. D. Koutsonikolas, S. M. Das, and Y. C. Hu, "Path planning of mobile landmarks for localization in wireless sensor networks, "Computer Communication, vol. 30, no. 13, pp. 2577-2592, September 2007.
  352. Javad Rezazadeh, Marjan Moradi, Abdul Samad Ismail,Eryk Dutkiewicz. "Superior path planning Mechanism for mobile Beacon assisted localization in wireless sensor networks," IEEE sensors journal, vol.14, No.9, pp.3052-3063, September 2014.
  353. Chao-Tsun Chang,Chih-Yung Chang,Chih-Yu Lin , "Anchor guiding mechanism for beacon assisted localization in wireless sensor networks " IEEE sensors Journal , vol.12,no.5,May 2012.
  354. M. Sichitiu and V. Ramadurai, "Localization of wireless sensor networks with a mobile beacon," in Proc. IEEE International Conference Mobile on Ad-Hoc Sensor Systems, pp. 174-183, October 2004.
  355. R. Huang and G. Zaruba, "Static path planning for mobile beacons to localize sensor networks," in Proc. 5th Annual IEEE International Conference Pervasive .Computer Communication Workshops, pp. 323-330. Mar. 2007.
  356. G. Mao, B. Fidan, and B. D. O. Anderson, "Wireless sensor network localization techniques," Computer Networks, vol. 51, no. 10, pp. 2529-2553,Jul. 2007.
  357. Z. Hu, D. Gu, Z. Song, and H. Li, "Localization in wireless sensor networks using a mobile anchor node," in Proc. IEEE/ASME International Conference on Advanced Intelligent Mechatronics, pp. 602-607, July 2008.
  358. C.H.Ou and W.L. He, Path planning algorithm for mobile anchor-based localization in wireless sensor networks," IEEE Sensors Journal, vol. 13, no. 2, pp. 466-475, Feb. 2013.
  359. Z. Guoet al., "Perpendicular intersection: Locating wireless sensors with mobile beacon," IEEE Transactions on VehicularTechnology, vol. 59, no. 7,pp. 3501-3509, Sep. 2010.
  360. H. Li, J. Wang, X. Li, and H. Ma, "Real-time path planning of mobile anchor node in localization for wireless sensor networks," in Proc. International Conference on Information and Automation ICIA, pp. 384-389, June 2008.
  361. Jiuqiang Xu,Wei Liu, Fenggao Lang,Yuanyuan Zhang,Chenglong Wang, "Distance Measurement Model Based on RSSI in WSN," Wireless Sensor Network,pp.606- 611,February 2010. REFERENCES
  362. Jothilakshmi P, Narasimman R, Praveen B, Vigneswaran R.K, "Design of and Development Quad-Band H Shaped Microstrip Patch Antenna for WiFi and LTE Application", WSEAS Transactions on Communications, Vol. 13, pp. 234-241, 2014
  363. AmelBoufrioua, "Dual band semi circular disk patch antenna loadedwithLshapedslot", SAI, CDKP, ICAITA, NecoM, SEAS, CMCA, ASUC, Signal, & IT-CSCP , pp.189-195, 2014
  364. Islam.M.T, Misran.NandShakib.M.N, "Broadband E-H shaped Microstrip Patch Antenna for Wireless Systems", Progress In Electromagnetics Research, Vol. 98, pp.163-173, 2009.
  365. Laxmishrivastava, Ram mohanmudgal, "Microstrip V slot Patch Antenna using an H Slot Defected Ground Structure", International Journal of Technology Enhancements and Emerging Research ,Vol. 2, No 2, pp. 21-24, 2014.
  366. Agarwal, Sumit Deeptisaxena, Srivastava, Sweta,῾῾Low Cost E- Shaped Microstrip Patch Antenna Array for WLAN", International Journal for Advanced Research in Electrical & Electronics &Instrumenataions Engineering, Vol. 3, No 4, pp. 8831-8838,2014.
  367. Anjali gupta, ChandanB.S.Rai, "Design and Simulation of Hexagon with a Diamond Slot Microstrip Patch Antenna",Progress in Science and EngineeringResearchJournal,Vol.02,No.03,pp.072-076, 2014.
  368. Ashutosh kumar singh, Stuti Sriva Stave, Vinod kumar sing, and Zakirali, "Duo triangular shaped microstrip patch antenna analysis for WiMAX lower band application", International Conference on Computational Intelligence: Modeling Techniques and Applications ICCI: MTA, vol. 10, pp.554-563, 2013.
  369. Amit Sharma Rajni Sharma, Rajpati Yadav, "Design and Simulation of Rectangular Slotted Patch Antenna with Air Gap", International Journal of Advanced Research Slotted Patch Antenna with Air Gap, Vol. 2, No 1, pp. 82-85, 2014.
  370. P.K Singhal, Shiva chauhan, "Enhancement of bandwidth of rectangular patch antenna using multiple slots in the ground plane", International Journal of Electronics and Communication Engineering, Vol. 1, No 2, pp. 30-33, 2014.
  371. Muhammad ishfaq and Rajasheharyarkhan,"A Compact Microstrip Patch Antenna for LTE Applications", Signal Processing &Wave Propagation, pp.3, 2013.
  372. Devang V. Katrodiya, Jishnu N. Peshavaria, &Vivek Ramamoorthy, "Design of Microstrip Patch Antenna Array for Wireless Applications", Vol. 6, No. 2, pp. 61-64, 2015.
  373. Ali Mohamed Goma, Mohamed Ali Solima, Taha Elsayed Tah, Wael Elsayed Swelam, "Wearable Dual-Band Dielectric Patch Antenna for LTE and WLAN", Electromagenetic Analysis and Applications, Vol.4, No.7, pp. 305-309, 2012.
  374. Ghanshyam Singh, Mithilesh Kumar, "Frequency Reconfigurable Microstrip Circular Patch Antenna for Wireless Devices", International Journal of Scientific & Engineering Research, Vol. 3, No. 11, pp. 1-6, 2012.
  375. GauravDwivedi, MayankMehra, Sumit Kumar Manjhi, Dr. D. K. Raguvanshi,"Review on Microstrip Antenna to Enhance the Bandwidth", IJECEAR, Vol. 2, No. 2, 2014.
  376. LaxmiShrivastava, RammohanMudgal, "Microstrip V Slot Patch Antenna Using.An H -Slot Defected Ground Structure (DGS)", IJTEEE, Vol. 2, No. 2, pp. 21-24, 2014.
  377. Nornikman . H, Kean. O.T, Hisham. A. B, Abidin A. A. M. Z, Yik S.W, Azlishah. O. M, "Design Coplanar Waveguide-fed Circular Patch Antenna with Edge Couple Split Ring Resonator Structure for dual-band Application", Australian Journal of Basic and Applied Sciences, vol. 8, no. 4, pp. 262-269, 2014.
  378. J. Pieter Jacobs, Johan Joubert & Johann W. Odendaal, "Conductor- Backed CPW-Fed Broadside Linear Slot Antenna Array on Two- Layer Dielectric Substrate", Centre for Electromagnetism, PP.1-3.
  379. Amir jahangiri, Dariush Mirshekar -Syahkal, A Mehta,"A Beam Steerable Star Patch Antenna with Conductor Backed Coplanar Waveguide Feed Network", Conference: ISAP, 2011.
  380. P.Rossi,A.Liscidini,M.Brandolini and F.Svelto, "A variable gain RF front end based on the voltage -voltage feedback LNA for multi standard applications", in IEEE J Solid -State circuits ,2005.40:690.
  381. W.B Kuhn,F.W.Stephenson and A.Elshabini-Riad, "A 200 MHz CMOS Q enhanced LC band pass filter" in IEEE Journal of Solid -State circuits ,1996,Volume 31, pp.1112-1122.
  382. Thanachyanont A, "Low voltage low power high -Q CMOS RF band pass filter" in Electron Letters, 2002, 38:615.
  383. Xiao H Schumann R, "A 5.4 GHz high Q tunable active inductors band pass filters in standard digital CMOS technology" in Analog Integrated Circuits and Signal Processing,2007,51:1.
  384. Thanachyanont A, "CMOS transistor -only active inductor for IF/RF applications" in IEEE International Conference on Industry Technology, 2002, 2:1209.
  385. M.M.Reja,I.M.Filanovsky and K.Moez, "Wide tunable CMOS active inductor" in Electron Letters, 2008, 44:1461.
  386. J.Manjula, and S.Malarvizhi, "Performance analysis of a low power low noise tunable band pass filter for multi band RF front end" in Journal of Semiconductors, 2014, Vol.35, No.3.
  387. Siavash Heydarzadeh, Massoud Dousti, "A 1.8V RF CMOS Active Inductor with 0.18um CMOS Technology" in World Academy of Science, Engineering and Technology, Vol:6 2012-09-26. (2012) REFERENCES
  388. J.D.Kraus, Antenna, Tata Mc-Hill, pp. 1-25. New Delhi 2002.
  389. M. T. Ali, T. A. Rahman, M. N. Md Tan, R. Saul eu, "A Planar Antenna Array with Separated Fee dLine Using Air Gap Technique", Proceeding Progress in Electromagnetics Research Symposium.
  390. W. He, R. Jin and J. Geng, "E-Shape patch with wideband and circular polarization for millimetre r- wave communication", IEEE Transactions on Antennas and Propagation, pp. 893-895, 2008.
  391. M.T Ali, N.Nordin, NorsuzilaYa'acob and M. N. MdTan "Design of Wideband Microstrip Patch An tennaUsingL-ProbeFed at 2.6 GHz", International Conference on Computer and Communication Engineering ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia.
  392. M. T. Islam, Mengu Cho, M. Samsuzzaman, and S. Kibria"Compact Antenna for Small Satellite Applications" ,IEEE Antennas & Propagation Magazine, vol ,57, No.2 April,2015.
  393. J.Anguera, C. Puente, C. Borja, G. Font, and J. Sol er" A systematic method to design single-patch broad band microstrip patch antennas", Microwave and Optical Technology Letters, vol.31, no.3, pp.185- 188, NovM 2001.
  394. Anupama. M and Dr.Bachala Sathyanarayana, "Survey of Cluster based routing protocols in Mobile Ad hoc Networks", International Journal of Computer Theory and Engineering, Vol.3,No.6,pp.806-815,2011.
  395. Faith Celik, Ahmet Zengin and Sinan Tuncel, "A Survey on swarm intelligence based routing protocols in wireless sensor networks", International Journal of the Physical Sciences,Vol.5,pp.2118-2126,2010.
  396. Lee.S.-J, C. Chiang and M. Gerla, "On-Demand Multicast Routing Protocol," In Proceedings of IEEE WCNC'99,New Orleans, LA, September 1999, pp. 1298-1304.
  397. Rajeshwar Singh, Dharmendra K Singh and Lalan Kumar, "Performance Evaluation of ACO based on demand routing algorithm for mobile ad hoc networks", International Journal of Engineering Science and Technology,Vol.3,No.3,pp-1809-1815,2011.
  398. Royer.E and C Perkins, "Multicast Operation of the Ad-Hoc On- Demand Distance Vector Routing Protocol," In Proceedings Of the 5thIinternational Conference on Mobile Computing and Networking (MobiCom99), pp 207-208, Seattle, WA, USA, August 1999.
  399. Sabari.A and Duraisamy.K, "Ant based Adaptive Multicast Routing Protocol for Mobile Adhoc Networks", International Journal of Computer Science and Information Security,Vol.6,No.2,2009.
  400. Venkata Ramana.V and Rama Mohan Reddy.A , "Secure routing in MANETs : a bio-inspired approach with honey bees", International Journal of Wireless and Mobile Computing, Vol.8,No.1,2015.
  401. Xiao-Min Hu and Jun Zhang, "Minimum Cost Multicast Routing using Ant Colony Optimization Algorithm ", Mathematical Problems in Engineering,Volume 2013,2013.
  402. Younes.A, "An Ant Algorithm for Solving QoS Multicast Routing Problem" , International Journal of Computer Science and Security,Vol.5,No.1,2011.
  403. Yuanyuan Yang and Min Yang, "A Service Centric Multicast Architecture and Routing Protocol", IEEE Transactions on Parallel and Distributed Systems, Vol.19,No.1,2008.
  404. Zulfiqar Ali and Waseem Shahzad, "Analysis of Routing Protocols in ADHOC and Sensor Wireless Networks Based on Swarm Intelligence", International Journal of Networks and Communications,Vol.3,No.1,pp-1- 11,2013.
  405. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey", Journal on Computer Networks, vol.38, pp 393-422, 2002.
  406. Raja, P. And Dananjayan, P. (2016) 'Game theory-based efficient energy consumption routing protocol to enhance the lifetime of WSN', Int. J. Information and Communication Technology, Vol. 8, No. 4, pp.357-370.
  407. Madhumita Panda, "Security in Wireless Sensor Networks using Cryptographic Techniques", American Journal of Engineering Research vol 3(1), pp 50-56, 2014.
  408. Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges", proceedings of International conference on Advanced Communications Technology, Korea, pp 1043-1048, 2006.
  409. G. Padmavathi and D. Shanmugapriya, "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks", International Journal of Computer Science and Information Security, vol 4(1-2), pp 25-31, 2009.
  410. David Boyle and Thomas Newe, "Securing Wireless Sensor Networks: Security Architectures", Journal of Networks, vol 3(1), pp 65-77, 2008.
  411. Khawla Naji Shnaikat and Ayman Ahmed AlQudah, "Key Management Techniques in Wireless Sensor Networks", International Journal of Network Security and Its Applications, vol 6(1), pp 49-63, 2014.
  412. Swapna B Sasi, Dila Dixon and Jesmy Wilson, "A General Comparison of Symmetric and Asymmetric Cryptosystems for WSNs and an Overview of Location Based Encryption Technique for Improving Security", International organization of Scientific Research Journal of Engineering, vol 4(3), pp 1-4, 2014.
  413. Enjian Bai, Xueqin Jiang, "A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Networks", vol. 11(3), pp 1514 -1523, 2013.
  414. Ali Hassan Sodhro, Ye Li , Madad Ali Shah, "Novel Key Storage and Management Solution for the Security of Wireless Sensor Networks", vol. 11(6), pp 3383-3390, 2013.
  415. W. Jia, H. Zhu, Z. Cao, X. Dong, and C. Xiao.Human, "Factor-aware privacy-preserving aggregation in smart grid", IEEE Systems Journal, vol. 8(2), pp 598-607, 2014.
  416. T. Kwon and J. Hong, "Secure and efficient broadcast authentication in wireless sensor networks", IEEE Transactions on Wireless Communications, vol. 59(8), pp 1120-1133, 2010.
  417. L. D. Xu, W. He, and S. Li, "Internet of things in industries: A survey", IEEE Transactions on Industrial Informatics, vol. 10(4), pp 2233-2243, 2014.
  418. C. Fan, S. Huang, and Y. Lai. "Privacy enhanced data aggregation scheme against internal attackers in smart grid", IEEE Transactions on Industrial Informatics, vol. 10(1), pp 666-675, 2014.
  419. L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks", Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, pp 41-47, 2002.
  420. F. Anjum, "Location dependent key management in sensor networks without using deployment knowledge", Wireless Network, vol.16(6), pp 1587-1600, 2010.
  421. Jaewoo Choi, Jihyun Bang, LeeHyung Kim, Mirim Ahn, and Taekyoung Kwon, "Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks", IEEE Systems Journal, vol. 99, pp 1-9, 2015.
  422. Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, and Mohsen Guizani, "An efficient distributed trust model for wireless sensor networks", IEEE Transactions on Parallel Distributed Systems, vol 26(5), pp 1228-1237, . 2015.
  423. W. Gao, G. Zhang, W. Chen, and Y. Li, "A trust model based on subjective logic", in Proceedings of 4th International Conference on Internet Computer Science and Engineering, Australia, pp 272-276, 2009.
  424. M. Chen, Y. Zhou, and L, Tang, "Ray projection method and its applications based on Grey Prediction", Chinese J. Statist. Decision, vol.1, pp 13-19, 2007.
  425. H. S. Lim, Y. S. Moon, and E. Bertino, "Provenance based trustworthiness assessment in sensor networks", Proceedings of 7th International Workshop on Data Management of Sensor Network, New York, pp 2-7, 2010.
  426. 3GPP TS 25.304, User Equipment (UE) procedures in idle mode and procedures for cell reselection in connected mode, TS 25.304, 3 rd Generation Partnership Project (3GPP) (Sep. 2005).
  427. Medium Access Control (MAC) protocol specification, TS 36.321,3rd Generation Partnership Project (3GPP) Sep. 2008.
  428. S.-R. Yang, S.-Y. Yan, H.-N. Hung, Modeling UMTS power saving with bursty packet data traffic, IEEE Transactions on Mobile Computing, Vol.6, no.12, pp.1398-1409, 2007.
  429. C. Bontu, E. Illidge, Drx mechanism for power saving in LTE, IEEE Communications Magazine, Vol. 47,no.6,pp. 48-55, 2009.
  430. Y. Mihov, K. Kassev, B. Tsankov, Analysis and performance evaluation of the drx mechanism for power saving in LTE, Proceedings in: IEEE 26 th Convention of Electrical and Electronics Engineers in Israel (IEEEI), Israel, pp. 520-0524,2010.
  431. L. Zhou, H. Xu, H. Tian, Y. Gao, L. Du, L. Chen, Performance analysis of power saving mechanism with adjustable drx cycles in 3GPP LTE, Proceedings in: IEEE Vehicular Technology Conference (VTC-Fall), Calgary BC, pp. 1-5, Sept. 2008.
  432. E. Liu, J. Zhang, W. Ren, Adaptive DRX scheme for beyond 3G mobile handsets, Proceedings in: IEEE Global Telecommunications Conference (GLOBECOM), Houston, USA, pp. 1-5, Dec. 2011.
  433. J.Wigard, T. Kolding, L. Dalsgaard, C. Coletti, On the user performance of lte ue power savings schemes with discontinuous reception in LTE, Proceedings in: IEEE International Conference on Communications Workshops, Dresden, pp.1-5, Jul. 2009.
  434. M. Polignano, D. Vinella, D. Laselva, J. Wigard, T. Sorensens, Power savings and QoS impact for VoIP application with DRX/DTX feature in LTE, Proceedings in: IEEE Vehicular Technology Conference (VTC- Spring), pp. 1-5, 2011
  435. S. Jha, A. Ko, R. Vannithamby, Optimization of discontinuous reception (drx) for mobile internet applications over LTE, Proceedings in: IEEE Vehicular Technology Conference (VTC-Fall),Quebec City, pp 1-5, Sept.2012.
  436. S. Jin, D. Qiao, Numerical analysis of the power saving in 3GGP LTE advanced wireless networks, IEEE Transactions on Vehicular Technology , Vol.61, no.4,pp. 1779-1785, 2012.
  437. K.T.V. Kumar, R. Vassoudevan, P.Samundiswary, Performance evaluation for LTE using 4 state Discontinuous Reception (DRX) mechanism with On Time to Short Cycle (OTSC) ratio, Proceedings in: IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies, Kumarakoil, India, pp. 451-456, Dec. 2015.
  438. Scott A.Fowler, Abdelhamid Mellouk, Naomi Yamada, LTE-Advanced DRX Mechanism for Power Saving, Wiley Publishers,ISBN:978-1- 84821-532. REFERENCES
  439. Amit Kumar Tyagi, N.Sreenath et. al.," Providing Privacy Preserved Location and Trust Enabled Services for Location Based Services", International Conference on Soft Computing, Intelligent Systems and Applications, 8-9 April, Bangalore, India, 2016.
  440. Irshad Ahmed Sumra, Halabi Bin Hasbullah, Using et.al, The Grades Mechanism to differentiate the Behavior of Attacker Users and Normal Users in Vehicular Adhoc Network (VANET), ITEE journal, Volume 3, Issue 4 August 2014.
  441. B.Balacheff,L. Chen,S.Pearson, et.al., "Trusted Computing Platform: TCPA technology in context", Prentice Hall PTR, Upper saddle river, NJ, 2003.
  442. Irshad Ahmed Sumra et.al, Trust Levels in Peer-to-Peer (P2P) Vehicular Network, International Journal of Information Technology and Electrical Engineering, Volume 3, Issue 5 October 2014.
  443. Irith Ben-Arroyo Hartman, Daniel Keren et.al., Theory and Practice in Large Carpooling Problems, The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014), Procedia Computer Science 32 ( 2014 ) 339 -347.
  444. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  445. Blerim Cici, Athina Markopoulou et. al., Assessing the Potential of Ride-Sharing Using Mobile and Social Data: A Tale of Four Cities, ACM, 2014.
  446. Amit Kumar Tyagi, N. Sreenath, Providing together Security, Location Privacy and Trust for moving objects, IJHIT Vol.2, No.3 (2016), pp. 221-240, March, 2016.
  447. Amit Kumar Tyagi, N. Sreenath, A Comparative Study on Privacy Preserving Techniques for Location Based Services, BJMCS, July, 2015 10(4): 1-25, 2015.
  448. G. Guette, C. Bryce, "Using TPMS to Secure Vehicular Ad hoc Networks (VANETs)", in: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, 2008, pp. 106-116.
  449. Amit Kumar Tyagi, N. Sreenath, Future Challenging Issues in Location Based Services, IJCA, March, (0975 -8887) Volume 114 -No. 5, 2015.
  450. F. Stumpf, L. Fischer and C.Eckert," Trust, Security and Privacy in VANETs Multilayered Security Architecture for C2C- Communication", Automotive Security, pp. 55-70, Wolfsburg, Germany, VDI-Verlag, 2007.
  451. H.-S. J. Tsao and D. Lin, "Spatial and temporal factors in estimating the potential of ride-sharing for demand reduction." California PATH Research Report, UCBITS-PRR-99-2, 1999.
  452. N. Bicocchi and M. Mamei, "Investigating ride sharing opportunities through mobility data analysis," Pervasive and Mobile Computing, 2014.
  453. E. Cho, S. Myers, and J. Leskovec, "Friendship and mobility: user movement in location-based social networks," in Proc. of SIGKDD, ACM, 2011.
  454. N. Eagle, A. Pentland, and D. Lazer, "Inferring friendship network structure by using mobile phone data," Proceedings of the National Academy of Sciences , vol. 106, no. 36, pp. 15274- 15278, 2009.
  455. Amit Kumar Tyagi, N. Sreenath, Providing Safe, Secure and Trusted Communication among Vehicular Ad hoc Networks' Users: A Vision Paper, International Journal of Information Technology and Electrical Engineering, Volume 5, Issue 1 February 2016.
  456. Amit Kumar Tyagi, N.Sreenath "Providing Trust Enabled Services in Vehicular Cloud Computing (extended version)", ICIA, ACM, 25-26 August, Pondicherry, India, 2016. DOI: http://dx.doi.org/10.1145/2980258.2980263.
  457. Amit Kumar Tyagi, N. Sreenath, Hiding location privacy in location based services, International Journal of Information Technology and Electrical Engineering, Volume 5, Issue 4 August 2016.
  458. D. R. Jahagirdar and R D. Stewart, "Non-Leaky Conductor Backed Coplanar Wave Guide-Fed Rectangular Microstrip Patch Antenna", IEEE Microwave and Guided-Wave Letters. 3, 115-117, 1998.
  459. N. Herscovici, "New considerations in the design of microstrip antennas", IEEE Transactions on Antennas and Propagation, AP-46, 6, 807-812, 1998.
  460. S. S. Pattnaik, G. Lazzi, and O. P. Gandhi, "On the Use of Wide-Band High-Gain Microstrip Antenna for Mobile Telephones", IEEE Antennas and Propagation Magazine 40, 1, 88-90, 1998.
  461. S. S. Pattnaik, D. C. Panda, and S. Devi, "Radiation Resistance of Coax-Fed Rectangular Microstrip Patch Antenna Using Artificial Neural Networks", Microwave and Optical Technology Letters.15, 51-53, 2002.
  462. Constantine A. Balanis, "Antenna Theory Analysis And Design", 3rd edition, John Wiley & Sons, Inc., Publication, New Jersey, 2005.
  463. Prof. Mahesh M. Gadag, Mr. Dundesh S. Kamshetty, Mr. Suresh L. Yogi "Design of Different Feeding Techniques of Rectangular Microstrip Antenna for 2.4GHz RFID Applications Using IE3D", Proc. of the Intl. Conf. on Advances in Computer, Electronics and Electrical Engineering , 2012.
  464. Gurdeep Singh and Jaget Singh, "Comparative Analysis of Microstrip Patch Antenna with Different Feeding Techniques", International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT) Proceedings published in International Journal of Computer Applications (IJCA), 2012.
  465. Priyali Verma, Kirti Sharma, and Anand Sharma, "I-Slot loaded Microstrip Antenna for C-band and X-band Application", International Conference for Convergence of Technology, 2014.
  466. J. Nourinia, P. Rezai, A. Valizade, and B. Mohammadi, "Design of omnidirectional Triple Band Bent-Fork Shaped Microstrip Monopole Antenna for Multiband Applications", Iranian Conference on Electrical Engineering (ICEE), 2015.
  467. H. Ochiai and H. Imai, "Performance of the deliberate clipping with adaptive symbol selection for strictly band-limited OFDM systems," IEEE Journal on Selected Areas in Communications, vol. 18, no. 11, pp. 2270-2277, Nov. 2000
  468. R. O'Neill and L. B. Lopes, "Envelope variations and spectral splatter in clipped multicarrier signals," in Proceeding of IEEE Personal Indoor and Mobile Radio Communication (PIMRC) , Toronto, Canada, Sept. 1995.
  469. G. L. Ren, H. Zhang, and Y. L. Chang, "A complementary clipping transform technique for the reduction of peak-to-average power ratio of OFDM system," IEEE Transportation. Consumer Electronics, vol. 49, no. 4, pp. 922-926, Nov. 2003.
  470. S. M. Ju and S. H. Leung, "Clipping on COFDM with phase on demand," IEEE Communications Letters, vol. 7, no. 2, pp. 49-51, Feb. 2003.
  471. Ashish K. Thakre and Snehal B. Meshram, "Peak-to-Average Power Ratio Reduction in OFDM system using Block Coding technique", International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, Issue 1, January 2013.
  472. Jyh-Horng Wen ,Gwo-Ruey Lee , Chih-Chung Kung and Cheng-Ying Yang, "Coding Schemes Applied to Peak-to-Average Power Ratio (PAPR) Reduction in OFDM Systems," International Conference on Wireless Communications and Mobile Computing", 6-8 Aug. 2008.
  473. V. Tarokh and H. Jafarkhani, "On the computation and reduction of the peak-to-average power ratio in multicarrier communications," IEEE Transaction on Communications, vol. 48, no. 1, pp. 37-44, Jan. 2000.
  474. H. Nikookar and K. S. Lidsheim, "Random phase updating algorithm for OFDM transmission with low PAPR," IEEE Transaction on Broadcasting, vol. 48, no. 2, pp. 123-128, Jun. 2002
  475. Guangliang Ren , Huining Zhang , Yilin Chang and Hui Zhang, "A Self Companding Transform to Reduce Peak-to-Average Power Ratio in OFDM Based WLANs," International Conference on Communications, Circuits and Systems Proceedings, 2006.
  476. S. S. Yoo, S. Yoon, S. Y. Kim, and I. Song, "A novel PAPR reduction scheme for OFDM systems: Selective mapping of partial tones (SMOPT)," IEEE Transaction. Consumer Electronics, vol. 52, no. 1, pp. 40-43, Feb. 2006.
  477. M. Niranjan and S. Srikanth, "Adaptive active constellation extension for PAPR reduction in OFDM systems", International Conference on Recent Trends in Information Technology (ICRTIT), 3-5 June 2011.
  478. A. Mobasher and A. K. Khandani, "Integer-based constellation-shaping method for PAPR reduction in OFDM systems," IEEE Transaction. Communications, vol. 54, no. 1, pp. 119-127, Jan. 2006.
  479. S. H. Han and J. H. Lee, "PAPR reduction of OFDM signals using a reduced complexity PTS technique," IEEE Signal Processing Letters, vol. 11, no. 11, pp. 887-890, Nov. 2004.
  480. Somayeh Mohammady , Nasri Sulaiman , Pooria Varahram , Roslina Mohd Sidek and Mohd Nizar Hamidon, "Performance investigation between DSI-SLM and DSI-PTS schemes in OFDM signals," International Symposium on Telecommunication Technologies (ISTT), 26-28 Nov. 2012.
  481. L. Yang, R. S. Chen, Y. M. Siu, and K. K. Soo, "PAPR reduction of an OFDM signal by use of PTS with low computational complexity," IEEE Transaction. Broadcasting, vol. 52, no. 1, pp. 83-86, March. 2006.
  482. L. Yang, R. S. Chen, Y. M. Siu, and K. K. Soo, "PAPR reduction of an OFDM signal by use of PTS with low computational complexity," IEEE Transaction. Broadcasting, vol. 52, no. 1, pp. 83-86, March. 2006.
  483. V. Sudha , Bhukya Anilkumar and D. Sriramkumar, "Low-complexity modified SLM method for PAPR reduction in OFDM systems," 2nd International Conference on Electronics and Communication Systems (ICECS), 26-27 Feb. 2015.
  484. X. and Li and L. J. C. Jr., "Effects of Clipping and Filtering on the Performance of OFDM," IEEE Communication. Lett, vol. 2, no. 5, pp. 131-133, 1998.
  485. H. Ochiai and H. Imai, "Performance analysis of deliberately clipped OFDM signals,", IEEE Transaction. Communication., vol. 50, no. 1, pp. 89-101, 2002.
  486. M. Lampe and H. Rohling, "Reducing out-of-band emissions due to nonlinearities in OFDM systems," 49th IEEE Vehicular Technology Conference, 16-20 May 1999.
  487. C. Lee ,H. T. Dinh, D. Niyato, and Pang, "A Survey of Mob Computer., volume13, no.18, pp. 1587-1611 Dec. 2013.
  488. S.Dey and S.Wang , "Adaptive mobile cloud computing to enable rich mobile multimedia applications," IEEE Trans. Multimedia, vol. 15, no. 4, pp. 870-883, Jun. 2013.
  489. C. Zhu, L.Wang ,L. Shu, T. Hara, S. Nishio and L. T. Yang, "A survey on communication and data management issues in mobile sensor networks," Wireless Communication. Mobile Computer, vol. 14, no. 1, pp. 19- 36, Jan. 2014.
  490. Alamri, W.S.Ansari, M. S. Hossain, M. M. Hassan, A. Alelaiwi, and M. A. Hossain, "A survey on sensor- cloud: Architecture, applications, and approaches," Int. J. Distribution. Sensor Net. vol. 2013, pp. 1-18, 2013.
  491. Zhu, X. Liu, H. Wang, L. Shu, L. T. Yang, and Leung,"A novel sensory data processing framework to integrate sensor networks with the mobile cloud," IEEE Syst. vol. PP, no.9.pp. 1-12, Jan. 2014.
  492. Z. Yan, P. Zhang, and H. Sun, "A novel architecture based on cloud comp for wireless sensor network," in Proc. 2nd
  493. Int.Conf. Computer. Scien. Electron. Eng., 2013, pp. 472- 475.
  494. X. Han, E. L. Loyd, X. G. Cao, and C.-C. Shen, "Fault- tolerant relay node placement in heterogeneous wireless sensor net," IEEE Trans. Mobile Computing., vol. 9, no. 5, pp. 643-656, May 2010.
  495. A. Gupta, Krause, R. Rajagopal, and C. Guestrin, "Simultaneous optimization of sensor placements and balanced schedules," IEEE Trans.Autom. Control, vol. 56, no. 10, pp. 2390-2405, Oct. 2011.
  496. D. Yang, X. Fang ,S. Misra, G. Xue, and J. Zhang, "Two- tiered constrained relay node placement in wireless sensor networks: Computational complexity and efficient approximations," IEEE Trans. Mobile Comput., vol. 11, no. 8, pp. 1399-1411, Aug. 2012.
  497. H. Liu, Y.-W. Leung, X. Chu and R. Du, "Minimum-cost sensor placement for required lifetime in wireless sensor- target surveillance networks," IEEE Trans. Parallel Distribution. System, vol. 24, no. 9, pp. 1783-1796, Sep. 2012.
  498. Chen Wang, Yong Ding, and Li Xiao, 'An Adaptive Partitioning Scheme for Sleep Scheduling and Topology Control in Wireless Sensor Networks'' IEEE Trans on Parallel and distributive system, vol. 20, no. 9, September 2009.
  499. Yanwei Wu, Xiang-Yang Li, Member, Yun Hao Liu, Senior Member, and Wei Lou on ''Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation'' IEEE Transaction on parallel and distributed system, vol.21, no. 2, February 2010.
  500. Ezhan, Karasan and Tarik Yardibi, ''A distributed activity scheduling algorithm for wireless sensor network with partial coverage''Published online:1 Springer Science Business Media, LLC 2008, August 2008. Li-Hsing Yen, Yang-Min, Cheng ''Range-Based Sleep Scheduling (RBSS) for Wireless Sensor Networks" Published online: 11 Springer Science+Business Media, LLC. June2008.
  501. Soumyadip Sengupta, , Md.Nasir, Athanasios ,Swagatam Das, V.Vasilakos, and Witold Pedrycz''An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks'' IEEE Transaction, on System, Man, and Cybernetics, vol.42, No.6, November 2012.
  502. N.Mahendran, and Dr.S.Shankar,"Performance Evaluation of Scheduling Schemes in Wireless Sensor Networks", International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 31 PP: 23326- 23330, 2015.
  503. N.Mahendran,and Dr.S.Shankar, "Performance Evaluation of Scheduling Schemes in Wireless Sensor Networks", International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 10, Number 31 (2015), PP: 23326-23330.
  504. Priya R and Mahendran N. Sleep scheduling with load balancing in sensor-cloud based on mobile user location. Indian journal of engineering, 2016, 13(32), 177-183.
  505. I. Mohomed, P. Stuedi and D. Terry, "Wherestore: Location-based data storage for mobile devices interacting with the cloud," inProc. 1st ACM Workshop Mob. Cloud Computing. Serv.: Soc. Netw.Beyond, 2010, pp. 1-8.
  506. Victor C. M. Leung and Chunsheng Zhu "Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integrated with Mobile Cloud Computing'' IEEE transactions on comp, vol. 64, no. 7, July 2015.
  507. Hai Yan, Zhijie Jerry Shi, and Jun-Hong Cui" Depth Based Routing for Underwater Sensor Networks" Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet Year of Publication: 2008 .
  508. Raja Jurdak" Wireless Ad Hoc and Sensor networks" Springer ISBN 978-0-387-39022-2 (2007)
  509. Zheng Guo, Gioele Colombi, Bing Wang, Jun-Hong Cui, Dario Maggiorini, Gian Paolo Rossi "Adaptive Routing in Underwater Delay/Disruption Tolerant Sensor Networks" wireless on demand network system and services 2008.fifth annual conference..23-25 Jan. 2008.
  510. Muhammad Ayaz, Imran Baig, Azween Abdullah, Ibrahima Faye, A survey on routing techniques in underwater wireless sensor networks, 1084-8045/$ -see front matter & 2011 Elsevier Ltd., doi:10.1016/j.jnca.2011.06.009
  511. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  512. Ian F. Akyildiz, Dario Pompili, Tommaso Melodia, State of the Art in Protocol Research for Underwater Acoustic Sensor Networks, WUWNet06, September 25, 2006, Los Angeles, California, USA, ACM 1-59593-484-7/06/0009 ...$5.00.
  513. Ian F. Akyildiz , Dario Pompili, Tommaso Melodia, "Underwater acoustic sensor networks: research challenges" Broadband and Wireless Networking Laboratory, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA, Ad Hoc Networks 3 (2005) 257-279, Elsevier Ltd., July 2005
  514. E.M. Sozer, M. Stojanovic, J.G. Proakis, Underwater acoustic networks, IEEE Journal of Oceanic Engineering 25 (1) (2000) 72-83.
  515. A. Quazi, W. Konrad, Underwater acoustic communication, IEEE Communications Magazine 20 (2) (1982) 24-30.
  516. M. Stojanovic, Acoustic (underwater) communications, in:J.G. Proakis (Ed.), Encyclopedia of Telecommunications,Wiley, New York, 2003.
  517. J.G. Proakis, J.A. Rice, E.M. Sozer, M. Stojanovic, Shallow water acoustic networks, in: J.G. Proakis (Ed.), Encyclopedia of Telecommunications, John Wiley and Sons, 2003.
  518. N.N. Soreide, C.E. Woody, S.M. Holt, Overview of ocean based buoys and drifters: Present applications and future needs, in: 16th International Conference on Interactive Information and Processing Systems (IIPS) for Meteorology, Oceanography, and Hydrology, January 2004.
  519. Heidemann, J., Wills, W. Y. J., Syed, A., and Yuan, L. (2006). 'Research challenges and applications for underwater networking', in Wireless Communications and Networking Conference 2006, Las Vegas, NV, Vol. 1, April 2006, pp. 228-235.
  520. Chang Su1, Xiaoming Liu1, P.R.China Vector-based low-delay forwarding protocol for underwater wireless sensor networks, 2010 International Conference on Multimedia Information Networking and Security,978-0-7695-4258-4/10 $26.00,2010 IEEE DOI 10.1109/MINES.2010.46.
  521. Nicolas Nicolaout, Jun-Hong Cui, KDario Maggiorini, Improving the Robustness of Location-Based Routing for Underwvater Sensor Networks,1-4244-0635-8/07/$20.00, 2007 IEEE.
  522. Liu Guangzong, , Li Zhibin, Depth-Based Multi-hop Routing Protocol for Underwater Sensor Network, In 2010 2nd International Conference on Industrial Mechatronics and Automation,978-1-4244- 7656-5/10/$26.00,2011 IEEE
  523. Muhammad Ayaz, Azween Abdullah, Hop-by-Hop Dynamic Addressing Based (H 2 -DAB) Routing Protocol for Underwater Wireless Sensor Networks,978-0-7695-3922-5/09 $26.00,2009 IEEE,DOI 10.1109/ICIMT 2009.70
  524. Sarath Gopi, G. Kannan, Deepthi Chander, U. B. Desai and S. N. Merchant, PULRP: Path Unaware Layered Routing Protocol for Underwater Sensor Networks,978-1-4244-2075-9/08/$25.00 2008 ,IEEE.
  525. Zheng Guo, Gioele Colombit, Bing Wang, Jun-Hong Cui, Dario Maggiorinit, Gian Paolo Rossit,Adaptive Routing in Underwater Delay/Disruption Tolerant Sensor Networks, 979-1-4244-1959- 3/08/$25.00,2008 IEEE.
  526. Mari Carmen Domingo, Rui Prior, Design and Analysis of a GPS- free Routing Protocol for Underwater Wireless Networks in Deep Water, In 2007 International Conference on sensor Technologies and applications,0-7695-2988-7/07 $25.00 2007.40.
  527. Uichin Lee, Paul Wang, Youngtae Noh, Luiz F. M. Vieira, Mario Gerla, Jun-Hong Cui, Pressure Routing for Underwater Sensor Networks, 978-1-4244-5837-0/10/$26.00 ©2010 IEEE.
  528. Qiwu Wu, Xianwei Zhou, Jianping Wang, Zhizhong Yin, Lingzhi Jiang, A low-cost delay-constrained routing and wavelength assignment algorithm in WDM networks with sparse wavelength conversions.
  529. Jonathan Schrauwen, Jeroen Van Lysebettens, Tom Claes, Katrien De Vos, , Peter Bienstman, , Dries Van Thourhout, and Roel Baets, Focused-Ion-Beam Fabrication of Slots in SiliconWaveguides and Ring Resonators, IEEE PHOTONICS TECHNOLOGY LETTERS, VOL. 20, NO. 23, DECEMBER 1, 2008. Aman Sharma et al, International Journal of Computer Science & Communication Networks,Vol 2(1), 74-82 82
  530. J. M. Jornet, M. Stojanovic, and M. Zorzi, "Focused beam routingprotocol for underwater acoustic networks," in Proceedings of the third ACM international workshop on Underwater Networks, ser.
  531. WuWNeT '08. New York, NY, USA: ACM, 2008, pp. 75-82.
  532. Y.-S. Chen, T.-Y. Juang, Y.-W. Lin, and I.-C. Tsai, "A low propagationdelay multi-path routing protocol for underwater sensor networks,"Journal of Internet Technology, 2010.
  533. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  534. Alexandros G.Fragkiadakis , Elias Z.Tragos , Ioannis G.Askoxylakis, "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks", IEEE communications surveys & tutorials, vol 15, no.1, pp 428-445, 2013 .
  535. Shaxun Chen,Kai Zeng,P.Mohapatra, "Hearing is believing: Detecting Wireless microphone emulation attacks in white space",IEEE transactions on mobile computing,vol.12,no.3. 2013.
  536. Wassim El-Hajj,Haridar Safa,Mohsen Guizani, "Survey on security issues in Cognitive Radio Networks", Journal of Internet Technology ,Volume 12, No.2. 2011.
  537. Ruiliang Chen, Jung-Min Park and Jeffrey H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks" , IEEE Journal on Selected Areas in Communications, Vol.26, No.1, 2008, pp.25-37, 2008.
  538. Husheng Li & Zhu Han, , " Dogfight in spectrum : Combating PUEA in Cognitive radio systems-Known Channel Statistics", IEEE Transactions on Wireless Communications, Vol 9, Issue 11 , pp 3566-3577,2010.
  539. Wen-Long Chin, Chun-Shen,Wei-Che & Chun-Wei , "Channel based detection of primary user emulation attacks in cognitive radios", IEEE Vehicular Technology Conference 2012.
  540. C. Mathur and P. Subbalakshmi, 2007 "Digital signatures for centralized DSA networks," in Proc. 1st IEEE Workshop on Cognitive Radio Networks, , pp. 1037-1041.
  541. Z. Jin, S. Anand, and K. Subbalakshmi,2009 "Mitigating primary user emulation attacks in dynamic spectrum access networks using hypoth-esis testing," in Proc. ACM sigmobile Computing and Communication Review, pp. 74-85.
  542. Nam Tuan Nguyen,Rong Zheng,Zhu Han,2012 " On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification", IEEE transaction on signal processing,vol.60,no.3.
  543. Trong Nghia Le; Wen-Long Chin; Wei-Che Kao,2015 "Cross-Layer Design for Primary User Emulation Attacks Detection in Mobile Cognitive Radio Networks ",IEEE Journals & Magazines, Vol 19,Issue 5, pp 799-802.
  544. Rong Yu; Yan Zhang; Yi Liu; Stein Gjessing; Mohsen Guizani,2015 "Securing cognitive radio networks against primary user emulation attacks", IEEE Journals & Magazines, Vol 29,Issue 4, pp 68-74.
  545. Di Pu; Alexander M. Wyglinski,2014 "Primary-User Emulation Detection Using Database-Assisted Frequency-Domain Action Recognition, IEEE Transactions on Vehicular Technology,Vol 63,Issue 9,pp 4372-4382
  546. Ahmed Alahmadi; Mai Abdelhakim; Jian Ren; Tongtong Li,2014 "Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard" IEEE Transactions on Information Forensics and Security,Vol 9,Issue 5,pp 772-781.
  547. Yaman Sharaf-Dabbagh & Walid Saad, 2015 "Transfer learning for device fingerprinting with application to cognitive radio networks",IEEE 26 th International Symposium on personal ,indoor communication.
  548. CHUNSHENG XIN, M.SONG,2014 "DETECTION OF PUE ATTACKS IN COGNITIVE RADIO NETWORKS BASED ON SIGNAL ACTIVITY PATTERN",IEEE TRANSACTIONS ON MOBILE COMPUTING ,VOL:13, ISSUE 5 ,PP 1022-1034.
  549. Xinyu Wang; Min Jia; Qing Guo; Xuemai Gu,2015 "A trust-value based cooperative spectrum sensing algorithm for mobile secondary users", IEEE International Conference on Communication Workshop (ICCW),pp 1635-1639.
  550. Olga León, Juan Hernández-Serrano and Miguel,2010 "Securing Cognitive Radio Networks, International Journal of Communication Systems", Vol.23, No.5, 2010, pp.633-652.
  551. PEI Qingqi,LI Hongning,MA Jianfeng,FAN Kefeng, 2011 " Defense against objective Function attacks in cognitive radio networks",Chinese journal of electronics, Vol.20,No.4,pp 138-142.
  552. Feten Slimenia,Bart Scheersb, Zied Chtouroua,Vincent Le Nirb, Rabah Attiac, 2015 "Cognitive Radio Jamming Mitigation using Markov Decision Process and Reinforcement Learning",Elsevier,AWICT.
  553. Sangeeta Singh, Aditya Trivedi, 2012, " Anti-jamming in cognitive radio Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 networks using reinforcement learning algorithms", Ninth International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1-5 (IEEE).
  554. jebamalarleavline Epiphany,M.Dineah,Asir Antony,2015, "Jamming attack detection technique in cognitive radio networks",International Journal of Applied Engineering research,Vol.10,No.55,pp 1967-1971.
  555. Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood,2005 " The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks", Proceedings of ACM mobihoc, pp.46-57
  556. V.Balogun, axel krings, "Mitigating constant jamming in cognitive radio networks using hybrid fec code", ieee 28th international conference on advanced information networking and applications,pp 704-711,2014.
  557. W. Wang, H. Li, Y. Sun, and Z. Han,2009, "Attack-proof collaborative spectrum sensing in cognitive radio networks," in Proc. CISS, pp. 130-134.
  558. A. Rawat, P. Anand, H. Chen, and P. Varshney, "Countering byzantine attacks in cognitive radio networks," in Proc. ICASSP, 2010, pp. 3098- 3101.
  559. R. Chen, j. Park, & K. Bian,"Robust Distributed Spectrum Sensing in Cognitive Radio Networks," in Proc. Milcom, 2008, pp.1876-1884.
  560. Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan, Adaptive trust management mechanism for cognitive radio networks, in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (trustcom), 2012, pp. 826-831 (IEEE).
  561. Chowdhury S. Hyder; Brendan Grebur; Li Xiao; Max Ellison,2014 "ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks", IEEE Transactions on Mobile Computing,Vol.13,No.8, pp 1707-1719
  562. Abbas Ali Sharifi; Mir Javad Musevi Niya,2016 "Defense Against SSDF Attack in Cognitive Radio Networks: Attack-Aware Collaborative Spectrum Sensing Approach", IEEE Journals & Magazines, Vol.20,No.1,pp 93-96
  563. Ji Wang; Ing-Ray Chen; Jeffrey J. P. Tsai; Ding-Chau Wang,2016 "Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks", IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR 2016). PP 1-6.
  564. Shikhamoni Nath; Ningrinla Marchang; Amar Taggu,2015 "Mitigating SSDF attack using k-medoids clustering in Cognitive Radio Networks", IEE wimob Conference, pp 275-282.
  565. Yongjia Huo; Ying Wang; Wenxuan Lin; Ruijin Sun,2015 "Three-layer Bayesian model based spectrum sensing to detect malicious attacks in cognitive radio networks",ICCW,pp 1640-1645.
  566. SAUD ALTHUNIBAT; BIRABWA DENISE; FABRIZIO GRANELLI,2014 "IDENTIFICATION AND PUNISHMENT POLICIES FOR SPECTRUM SENSING DATA FALSIFICATION ATTACKERS USING DELIVERY-BASED ASSESSMENT", IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,NO.99
  567. Nansui Hu,Yu-Dong Yao,Joseph Mitola,2012 " MAB attack and countermeasures in a CRN",IEEE transactions on wireless communications,Vol.11,No.3,pp 898-902.
  568. Selfish Misbehavior Detection in 802.11 Based Wireless Networks: An Adaptive Approach Based on Markov Decision Process Jin Tang and Yu Cheng 2013 Proceedings IEEE INFOCOM
  569. Chris Karlof and David Wagner, Secure Routing in Wireless Networks: Attacks and Countermeasures, Ad Hoc Networks, Vol.1, 2003, pp.293- 315.
  570. Kaigui Bian & Jung-Min Park,2008 " MAC-Layer Misbehaviors in Multi-Hop CRN".
  571. K. Ezirim; E. Troja; S. Sengupta,2013 "Sustenance against RL- Based Sybil Attacks in Cognitive Radio networksusing Dynamic Reputation System",MILCOM IEEE Conf.
  572. D. Hlavacek, J.M. Chang,2014 "A layered approach to cognitive radio network security: A survey",Elsevier Computer Networks.
  573. Y. Tan; K. Hong; S. Sengupta; K. P. Subbalakshmi,2011 "Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense",IEEE Conf.
  574. Juan Hernandez-Serrano, Olga León and Miguel Soriano, 2011 " Modeling the Lion Attack in Cognitive Radio Networks, EURASIP Journal on Wireless Communications and Networking", Article ID 242304, 10 pages.
  575. J Chris Karlof and David Wagner, 2003 "Secure Routing in wireless sensor networks: attacks and countermeasures", adhoc network, Vol .2, Pg.No. 293-315
  576. J. Bellardo and S. Savage,2003, "802.11 denial-of-service attacks: real vulnerabilities and practical solutions," Proc. Of USENIX Security Symposium, San Antonio.
  577. M. Raya, J.P. Hubaux and I. Aad,2004, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," Proc. Of mobisys.
  578. M. Cagalj, S. Ganeriwal, I. Aad, and J.-P. Hubaux, "On selfish behavior in CSMA/CA networks," Proc. Of IEEE INFOCOM,2005 Vol. 4, pp. No. 2513 -2524.
  579. S.Anamalamudi , Mingulu Jin,2014, "Energy-Efficient Hybrid CCC- Based MAC Protocol for Cognitive Radio Ad Hoc Networks", IEEE Systems Journal, Vol.10 (1), pp.no.358-369.
  580. Liangping Ma, chienchung Shen, Bo Ryu, 2007, "Single radio adaptive channel algorithm for spectrum agile wireless ad hoc networks", Second IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. No. 547-558
  581. Seyed Morteza Mirhoseni Nezhadal, Reza Berangi, Mahmood Fathy, 2012 "Common control channel saturation detection and enhancement in cognitive radio networks", International Journal issue.3.
  582. T. Goff, J. Moronski, D. Phatak, and V. Gupta, 2000,"freezetcp: a true end to-end tcp enhancement mechanism for mobile environments," Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1537-1545.
  583. O. Leon, J. Hern ´ andez-Serrano, and M. Soriano, 2009, "A new ´ cross- layer attack to TCP in cognitive radio networks," Proceedings of the 2nd International Workshop on Cross Layer Design , pp. 1-5.
  584. AUTHORS PROFILE Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  585. J-H. Cho, A. Swami and I-R. Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks," IEEE Communications Surveys & Tutorials, Vol. 13, No. 4, Fourth Quarter 2011.
  586. L. Capra, "Toward a Human Trust Model for Mobile Ad-hoc Networks," Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge,UK.
  587. H. Li and M. Singhal, "Trust Management in Distributed Systems," Computers, vol. 40, no.2, Feb. 2007pp.45-53.
  588. X.LiZ, JiaP.Zheng R, Zhang H.Wing, "Based On Demand Multipath Routing In Mobile Ad-Hoc Networks", IET Information security 2010.
  589. L. Tamilselvan and V. Sankaranarayanan, "Prevention of co-operative black hole attack in MANET," Journal of Networks, Vol. 3 Number 5 pp.13-20,May2008.
  590. H. Deng, W. Li, and D. P. Agarwal, "Routing Security in Wireless Ad Hoc Networks," University of Cincinnati, IEEE Communications magazine.
  591. S. Lee, B. Han, and M. Shin, "Robust Routing in Wireless Ad Hoc Networks," International Conference on Parallel Processing Workshops (ICPPW'02)1530-2016/02©2002IEEE.
  592. L. Tamilselvan and V Sankaranarayanan, "Prevention of Black hole Attack in MANET," The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (Aus Wireless 2007)0-7695-2842-2/07©2007IEEE.
  593. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks," 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA.
  594. H. Weerasinghe and H. Fu, "Preventing cooperative black hole attacks in mobile ad-hoc networks: simulation, implementation and evaluation," International Journal of Software Engineering and Its Applications, Vol. 2, No. 3 (2008) pp.39-54.
  595. A. Abdul-Rahman and S. Hailes, "A Distributed Trust Model," Proc. New Security Paradigms Workshop,ACMPress,1997,pp.48-60.
  596. X. REFERENCES
  597. J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, "A performance comparison of multi- hop wireless ad hoc network routing protocols," in Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom98), October 25-30, 1998, Dallas, Texas, USA. Copyright © 1998 ACM.
  598. "Trust Based on Demand Routing (TSDRP) Protocol for MANETS", Fourth International Conference on Advanced Computing and CommunicationTechnologies,2014.
  599. ZhiguoWan, KuiRen Ming Gu, "USOR: An Unobservable Secure on Demand Routing Protocol for Mobile Ad-Hoc etworks", IEEE Transactions On Wireless Communication, May 2012.
  600. "Light Weight Trust Based Routing Protocol for Mobile Ad Hoc Networks", IET Information Security, 2012. [16] "AODV: The A-SAODV secure routing prototype", IEEE communication magazine, Feb 2008.
  601. Michalenogueria, lima aldriluiz das santos guy pujolle, "On the Survey of Survivability of Mobile ad- Hoc Networks", IEEE Communications Survey &Tutorials,Feb2008.
  602. Yan Linsay sun University of Rhodeisland, Zhu Han Boise State University, K.J. Ray Liu University of Mary land security in mobile ad-hoc and sensor networks, "Defence of Trust Management Vulnerabilities In Distributed Networks", IEEE Magazines,Feb2008.
  603. Zheng Yan, Peng Zhang Teemupekka Virtanen, "Trust Evaluation Based Security Solution In Ad-Hoc Networks". [20] Hang mei Deng wei li dharma P.Agarwal, "Routing security in wireless ad-hoc networks", IEEE Communication Magazine.
  604. Rajaram, Dr. Palanisami, "A Trust Based Cross Layer Security Protocol for Mobile Ad-Hoc Networks", International Journal of Computer Science And InformationSecurity,2009.
  605. Karim, Gene tsudik, Computer Science department, "ALARM: Anonymous Location Aided Routing in Suspicious MANETS", IEEE transactions onMobileComputing,2010.
  606. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  607. Stevenson, C. R., Chouinard, G., Lei, Z., Hu, W., Shellhammer, S. J., and Caldwell, W. IEEE 802.22: The first cognitive radio wireless regional area network standard. IEEE communications magazine, vol. 47, no. 1, pp. 130-138, 2009.
  608. Cordeiro, C., Challapali, K., Birru, D., and Shankar, S. IEEE 802.22: the first worldwide wireless standard based on cognitive radios. Proceedings of First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 328-337, 2005.
  609. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., and Mohanty, S. A survey on spectrum management in cognitive radio networks. IEEE Communications magazine, vol. 46, no. 4, pp. 40-48, 2008.
  610. Alshamrani, A., Shen, X. S., and Xie, L. L. A cooperative MAC with efficient spectrum sensing algorithm for distributed opportunistic spectrum networks. Journal of Communications, vol. 4, no. 10, pp. 728-740, 2009.
  611. Khambekar, N., Dong, L., and Chaudhary, V. Utilizing OFDM guard interval for spectrum sensing. Proceedings of IEEE Wireless Communications and Networking Conference, pp. 38-42, 2007.
  612. Li, Y., Zhang, R., Cao, B., You, X., and Daneshmand, A. A distributed cooperative MAC for cognitive radio Ad- hoc networks. Proceedings of IEEE Symposium on Computers and Communications, pp. 1038-1043, 2011.
  613. Pan, W. T. A new fruit fly optimization algorithm: taking the financial distress model as an example. Knowledge- Based Systems, vol. 26, pp. 69-74, 2012.
  614. Unnikrishnan, J., and Veeravalli, V. V. Cooperative sensing for primary detection in cognitive radio. IEEE Journal of selected topics in signal processing, vol. 2, no. 1, pp. 18-27, 2008.
  615. Jain, Sonal, and Sandeep K. Raghuwanshi. "Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol." Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on. IEEE, 2014.
  616. K. Ganesh Reddy, P. Santhi Thilagam(2014), "Reputation based Cross- layer Intrusion Detection System for Wormhole Related Attacks in Wireless Mesh Networks" Security and Communication Networks -Journal-Wiley, doi: 10.1002/sec.955.
  617. Ahmed, Mariwan, and Muhammad Awais Hussain. "Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks." Electronics, Communication and Instrumentation (ICECI), 2014 International Conference on. IEEE, 2014.
  618. Marti, Sergio, et al. "Mitigating routing misbehavior in mobile ad hoc networks." Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000.
  619. Wei, Chen, et al. "A new solution for resisting gray hole attack in mobile ad-hoc networks." Communications and Networking in China, 2007.
  620. CHINACOM'07. Second International Conference on. IEEE, 2007.
  621. Tamilselvan, Latha, and V. Sankaranarayanan. "Prevention of blackhole attack in MANET." Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on. IEEE, 2007.
  622. Sun, Bo, et al. "Detecting black-hole attack in mobile ad hoc networks."Personal Mobile Communications Conference, 2003. 5 th European (Conf. Publ. No. 492). IET, 2003.
  623. Awerbuch, Baruch, et al. "An on-demand secure routing protocol resilient to byzantine failures." Proceedings of the 1st ACM workshop on Wireless security. ACM, 2002.
  624. Yi, Ping, et al. "Cross-layer Detection for Blackhole Attack in Wireless Network." Journal of Computational Information Systems 8.10 (2012): 4101- 4109.
  625. K. Ganesh Reddy, P. Santhi Thilagam, and Nageswara Rao (2012). "Cross-layer IDS for Rushing attack in Wireless Mesh Networks". In Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT '12). ACM, New York, Page no:396-400.
  626. K. Ganesh Reddy, P. Santhi Thilagam (2012). "Taxonomy of Network Layer Attacks in Wireless Mesh Network." Advances in Computer Science, Engineering \& Applications. Springer, Advances in intelligent systems and computing Volume no:167, Page no:927-935.
  627. Kanthe, Ashok M., Dina Simunic, and Ramjee Prasad. "A Mechanism for Gray hole Attack Detection in Mobile Ad-Hoc Networks." International Journal of Computer Applications 53.16 (2012).
  628. Wonjun Lee; Eunkyo Kim; Joongheon Kim; Inkyu Lee; Choonhwa Lee 'Movement-Aware Vertical Handoff of WLAN and Mobile WiMAX for Seamless Ubiquitous Access" IEEE Transactions on Consumer Electronics (Volume:53 , Issue: 4 ) Page(s): 1268 -1275 ISSN :0098- 3063
  629. M. Ruggieri; F. Graziosi; F. Santucci 'A model of the handover dwell time in mobile cellular systems" Universal Personal Communications. 1995. Record., 1995 Fourth IEEE International Conference Pages: 364 -368.
  630. I. F. Akyildiz, J. McNair, J. S. M. Ho, H. Uzunalioglu, and W. Wang, "Mobility Management in Next-generation Wireless Systems", Proceedings of the IEEE, 87 (8): 1374-1384, August 1999.
  631. Zia Nadir, and Muhammad Idrees Ahmad "Pathloss Determination Using Okumura-Hata Model And Cubic Regression For Missing Data For Oman" from the Proceedings of the International Multi Conference of Engineers and Computer Scientist 2010 Vol II IMECS March 2010
  632. Honk Kong.
  633. Taehoon Kim; Sang-wook Han; Youngnam Han, "A QoS-aware vertical handoff algorithm based on service history information", IEEE Communications Letters, pp. 527-529, 2010.
  634. K. Savitha and Dr. C. Chandrasekar, "Vertical Handover Decision Schemes Using SAW and WPM for Network Selection in Heterogeneous Wireless Networks", Global Journal of Computer Science and Technology ,Volume 11, Issue 9, pp. 19-24, May 2011.
  635. Debabrata Sarddar, Shubhajeet Chatterjee, Ramesh Jana, Shaik Sahil Babu, Hari Narayan Khan, Utpal Biswas and M.K.Naskar, " Minimization of Handoff Latency by Distance Measurement Method", International Journal of Computer Science issues (IJCSI) Vol. 08, Issue 02, pp. 283-289, March 2011, ISSN(Online): 1694-0814.
  636. Dong Ma; Maode Ma "A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks", IEEE Transactions on Parallel and Distributed Systems, pp. 598-606, 2012
  637. The 8th International Conference on INFOrmatics and Systems (INFOS2012) -14-16 May Cloud and Mobile Computing Track Speed Estimation and Travel Direction-Detection using Handover in GSM Stability Analysis and Experimental Results in Egypt Roads Mohamed H. Abdel Meniem", Ahmed M. Hamad"; Eman Shaaban"
  638. Jae-In Choi; Won-Kyeong Seo; Jae-Choong Nam; In-Soo Park; You-Ze Cho Handover decision algorithm based on available data volume inhierarchi cal macro/femto-cell networks" Communications and Electronics (ICCE), 2012 Fourth International Conference Pages: 145 -149.
  639. Shubhajeet Chatterjee; Debabrata Sarddar; Joydeep Saha; Soumyanil Banerjee; Arijit Mondal; Mrinal K. Naskar "An improved mobility management technique for IEEE 802.11 based WLAN by predicting the direction of the mobile node " Computing and Communication Systems (NCCCS), 2012 National Conference 2012 Pages: 1 -5,.
  640. R. Hussain, S. A. Malik, S. Abrar, R. A. Riaz, H. Ahmed, and S. A. Khan. 'Vertical Handover Necessity Estimation Based on a New Dwell Time Prediction Model for Minimizing Unnecessary Handovers to a WLAN Cell', Wireless Personal Communications, Vol. 71, No. 2, pp. 1217-1230, July 2013.
  641. Qiu Xiaona; Liao Qing "A Vertical Handoff Decision Algorithm Based on the Movement- Aware of Mobile Nodes" P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 NinthInternational Conference Pages: 54 - 61.
  642. A. Mahmood, H. Zen, A. K. Othman, and S. A. Siddiqui, 'A Novel Travelling Time Estimation Mechanism for Minimizing Unnecessary Handovers from Cellular Networks to WLANs', Proceedings of IEEE International Conference on Information Technology & Electronic Commerce, pp. 38-42, December 2014.
  643. Power control in CDMA from 'Wireless communication and networking' by Vijay Garg page page 356-361
  644. M. Yadollahi V.T. Vakili, M. Ghaseminajm and A. Jafarian, "Reducing Processing Delay and Ping Pong Impact of Multi Attribute Decision Making Handover for Heterogeneous Wireless Networks " TELSIKS 2015 Serbia 12th international conference Pages: 365 -368.
  645. An Optimized Travelling Time Estimation Mechanism for Minimizing Handover Failures from Cellular Networks to WLANs Mahmood, A., Zen, H., Othman, A. K., Siddiqui, S. A. 2015 International Conference on Estimation, Detection and Information Fusion (ICEDlF 2015) Pg No: 28 -33 AUTHORS PROFILE T Senthi Kumar: received B.E in E.C.E from Cellege of Engineering - Guindy, Chennai and then joined in BSNL and now working as Sub Divisional Engineer . Now doing MS by research in College of Engineering Guiindy. Specialist in Optical Fiber System Mobile communication.
  646. M.A. Bhagyaveni received B.E. in ECE from GCT, Coimbatore, M.E. in Optical Communication and Ph.D. from CEG, Chennai, India. She is currently working as Professor in Department of ECE, Anna University, Chennai, India. Her main research interests include Wireless Communication, Digital Communication, Ad hoc/Sensor networks and Grid Computing. She has published more than 40 papers in National/International Conferences and Journals.
  647. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  648. Raju Barskar, Meenu Chawla," Vehicular Ad hoc Networks and its Applications in Diversified Fields," International Journal of Computer Applications (0975 -8887) Volume 123 -No.10, August 2015
  649. F. D. da Cunha, A. Boukerche, L. Villas, V. Aline, and A. A. F. Loureiro, "Data communication in VANETs: a survey, challenges and applications," Research Report RR-8498, Version 2, INRIA, 2014,
  650. Research and Innovative Technology Administration (RITA) -U.S. Department of Transportation (US DOT), "About ITS," 2013.
  651. H. Hartenstein and K. P. Laberteaux, VANET: Vehicular Applications and Inter-Networking Technologies, H. Hartenstein and K. P. Laberteaux, Eds. Chichester, UK: John Wiley & Sons, Ltd, Jan. 2010.
  652. N. Cenerario, T. Delot, and S. Ilarri, "A Content-Based Dissemination Protocol for VANETs: Exploiting the Encounter Probability," IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 771-782, Sep. 2011.
  653. R.S.Uppal, Shubhla Puri ," Performance and Evaluation of IEEE 802.11e using QUALNET", (IJCSE, ISSN : 0975-3397 Vol. 3 No. 3 Mar 2011).
  654. Priyanka Shrivastava, Sayir Ashai, Aditya Jaroli & Sagar Gohil ," Vehicle-to-Road-Side-Unit Communication Using Wimax", International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue4, July-August 2012, pp.1653-1655.
  655. A. K. Pathan, Security of Self-Organizing Networks, First Edition, Taylor & Francis Group, 2011.
  656. Masoud Zarifneshat and PejmanKhadivi," Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models," Journal of Network and Computer Applications, Vol 36, 2013, pp. 1078-1090.
  657. REFERENCES
  658. V.B.S.Srilatha Indira Dutt, G.Sasi Bhushana Rao, S.Swapna Rani,Swarna Ravindra Babu Rajkumar Goswami and Ch.Usha Kumari, Investigation of GDOP for Precise user Position Computation with all Satellites in view and Optimum four Satellite Configurations, J. Ind. Geophys. Union (July 2009) Vol.13, No.3, pp.139-148.
  659. Chih-Hung Wu,Ya-Wei Ho,Li-Wun Chen,You-Dong Haung, Discovering approximate expressions of GPS geometric dilution of precision using genetic programming, Advances in Engineering Software,2012,pp.332-340.
  660. M.Saraf, K.Mohammadi, M.R Mosavi, Classifying the Geometric Dilution of Precision of GPS Satellites utilizing Bayesian detection Theory, Computers and Electrical Engineering,2011,pp.1009-1018.
  661. Nuria Blanco-Delgado and Fernando D. Nunes, "Satellite Selection Method for Multi-Constellation GNSS Using Convex Geometry", IEEE Transactions On Vehicular Technology, Vol. 59, No. 9, pp. 4289 -4297, November 2010.
  662. Lu Zhang, Zhongliang Deng, and Lei Yang, "An Improved Satellite Selection Algorithm Based On Fuzzy Comprehensive Evaluation Method And The Entropy Method For Determining The Weight Of Evaluation Indicators", Proceedings of IEEE IC-BNMT2011, pp. 652 -655, 2011.
  663. Quaddusa Sultana, Dhiraj Sunehra, A.D Sharma, P.V.D Somasekhar Rao, Comparative analysis of the techniques for estimation of GPS DOP over Indian Region, IETE Journal of Research,Vol.55,pp.28-34.
  664. M. R. Mosavi and M. Sorkhi, "An Efficient Method for Optimum Selection of GPS Satellites Set using Recurrent Neural Network", IEEE/ASME International Conference on Advanced Intelligent Mechatronics, pp. 245 -249, 2009.
  665. KaiBorre, Dennis M.Akos, Nicolaj Bertelsen, Peter Rinder, Soren Holdt Jensen, A Software Defined GPS and Galileo Receiver, published by Birkhäuser Bostonin 2007, ISBN-10 978-0-8176-4390- 4.
  666. Min Liu, Marc-Antoine Fortin and René Jr. Landry, A Recursive Quasi-optimal Fast Satellite Selection Method for GNSS Receivers,
  667. Bo Wan, Shunting Wang, Ling juan Miao, Jun Shen, An Improved Satellite Selection Method in Attitude Determination Using Global Positioning System (GPS), Recent Patents on Space Technology,2009, 1, 6-11.
  668. YU Xiaolei, SUN Youngrong ,LIU Jianye ,MIAO Jianfeng, Fast Algorithm of selecting satellites for Multiple Satellites Integrated Navigation System, World Congress on Computer Science and Information Engineering,2008,PP.121-125.
  669. R. Zelinski, "A microphone array with adaptive post-filtering for noise reduction in reverberant rooms," ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing.
  670. I. A. McCowan and H. Bourlard, "Microphone array post-filter based on noise field coherence, "IEEE Transactions on Speech and Audio Processing, vol. 11, no. 6, pp. 709-716, Nov. 2003.
  671. L. Griffiths and C. Jim, "An alternative approach to linearly constrained adaptive beam forming," IEEE Transactions on Antennas and Propagation, vol. 30, no. 1, pp. 27-34, Jan. 1982.
  672. I. Cohen and B. Berdugo, "Speech enhancement for non-stationary noise environments," Signal Processing, vol. 81, no. 11, pp. 2403-2418, Nov. 2001.
  673. L R. La Bouquin-Jeannes, A. A. Azirani, and G. Faucon, "Enhancement of speech degraded by coherent and incoherent noise using a cross- spectral estimator," IEEE Transactions on Speech and Audio Processing, vol. 5, no. 5, pp. 484-487, 1997.
  674. N. Yousefian and P. Loizou, "A dual-microphone speech enhancement algorithm based on the coherence function," IEEE Transactions on Audio, Speech, and Language Processing, 2011.
  675. C. Paleologu, J. Benesty, and S. Ciochina, "Study of the general Kalman filter for echo cancellation," IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no. 8, pp. 1539-1549, Aug. 2013.
  676. W. Nabi, N. Aloui, and A. Cherif, "Speech enhancement in dual- microphone mobile phones using Kalman filter," Applied Acoustics, vol. 109, pp. 1-4, Aug. 2016.
  677. N. Yousefian, A. Akbari, and M. Rahmani, "Using power level difference for near field dual-microphone speech enhancement," Applied Acoustics, vol. 70, no. 11-12, pp. 1412-1421, Dec. 2009.
  678. ITU P.862. Perceptual evaluation of speech quality (PESQ) and objective method for end-to-end speech quality assessment of narrowband telephone networks and speech codecs. ITU-T Recommendation P. 862, 2000.
  679. Mohammad Ilyas and Imad Mahgoub, "Hand Book of Sensor Networks: Compact Wireless and Wired Sensing Systems", CRC Press, Washington, 2005.
  680. Ivan Stojmenovic, "Hand Book of Sensor Network Algorithms and Architectures", John Wiley and Sons, New Jersey, 2005.
  681. Kazem Sohraby, Daniel Minoli and Taieb Znati, "Wireless Sensor Networks Technology, Protocols and Applications", John Wiley and Sons, New Jersey, 2007.
  682. Jamal N. Al-Karaki and Ahmed E. Kamal, "Routing techniques in wireless sensor networks: A survey", IEEE Wireless Communications, vol.11, no.6, pp.6-28, December 2004.
  683. Satyajeet R Shinge and S.S.Sambare, "Survey of different clustering algorithms used to increase the lifetime of wireless sensor networks", International Journal of Computer Applications, vol.108, No.10, pp-15-18, 2014.
  684. Xue Wang, Liang Ding and Sheng Wang, "Trust evaluation sensing for wireless sensor networks", IEEE Transaction on Instrumentation and Measurement, vol.60, no.6, June 2011.
  685. P.Samundiswary and P.Dananjayan,Performance Analysis of Trust Based AODV for Wireless Sensor Networks, International Journal of Computer Applications, Vol.2, No.12, pp.6-13, 2010.
  686. Jiang-tao Wang, Zhi-gang Chen, Xiao-heng Deng, "A Trustworthy Energy-Efficient Routing Algorithm Based on Game-Theory for WSN", Proceedings of IET International Communication Conference on Wireless mobile and Computing, pp.192-196, 2009.
  687. Shaik SahilBabu, Arnab Raha and MrinalKantiNaskar, "Trustworthy Route formation algorithm for WSNs", International Journal of Computer Applications, vol. 27, no. 5, pp. 35-39, August 2011
  688. D. Sathian, R. Baskaran and P.Dhavachelvan, "Lifetime enhancement by cluster head cooperative trustworthy energy efficient MIMO routing algorithm based on game theory for WSN", Proceedings of IEEE Interntional conference on computing communications & networking technologies, pp. 1-5, 2012
  689. SelcukOkdem, DervisKaraboga and CelalOzturk, "An Application of Wireless Sensor Network Routing based on Artificial Bee Colony Algorithm", Proceedings of IEEE Congress of Evolutionary Computation, New Orleans, pp. 326-330, June 2011.
  690. Zhenhua Zheng, Hua Wang and Lin Yao, "An Artificial Bee Colony Optimization algorithm for multicast routing", 14th International Conference on Advanced Communication Technology, PyeongChang, pp. 168-172, February 2012
  691. Fahad S. Abu_Mouti and Mohamed E. El-Hawary, "Overview of Artificial Bee Colony (ABC) Algorithm and Its Applications", IEEE International Systems Conference, Vancouver, pp.1-6, March 2012
  692. DervisKaraboga, SelcukOkdem and CelalOzturk, "Cluster based wireless sensor network routing using artificial bee colony algorithm", Journal of Wireless Networks, Springer, vol. 18, No. 7, pp.847-860, October 2012
  693. Adamou Abba Ari, Blaise Omer Yenke, Nabila Labraoui, IrepranDamakoa and AbdelhakGueroui, "A power efficient cluster- based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach", Journal of Network and Computer Applications, col. 69, pp. 77-97, July 2016
  694. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  695. Yao,"Segmentation of breast cancer mass in mammograms and detection using magnetic resonance imaging" ,nanyang technological university, Singapore.
  696. Quinghua huang, et.al, "Automatic segmentation of breast lesions for interaction in ultrasonic computer aided diagnosis",information sciences 2014.
  697. Armen et.al, "Segmentation of breast region in digital mammograms and detection of masses", Institute for informatics and automation problems of NAS of RA, Yerevan , Armenia.
  698. D. West ,P. Mangiameli, R. Rampal V. West, "Ensemble strategies for a medical diagnosis decision support system: A breast cancer diagnosis application",Eur.J.Oper.Res.162(2005) 532-551.
  699. Haowen Yu and George Rumbe, "Comparative Study of Classification Techniques on Breast Cancer FNA Biopsy Data", a direct path to intelligent tools.
  700. K.Drukker, et.al, "Computerized lesion detection on breast ultrasound" Medical Physics 29(7) (2002) 1438-1446
  701. Xizhaoli,SimonWilliams,Murk.J. bottem, "A texture and region dependent breast cancer risk assessment from screening mammogram", Pattern recognition letters 36(2014) 117-124.
  702. Bo Liu, H.D.Cheng,Jian hua Huang,Jiawei Tian,Xianglong Tang,Jiafeng Liu. "Fully automatic and segmentation-robust classification of breast tumors based on local texture analysis of ultra sound images" Pattern recognition 43(2010) 280-398.
  703. Shapiro,Linda G.& Stock man, George C.(2002)."Computer vision", Prentice hall .ISBN 0-13-030796-3.
  704. H.D.Cheng, Juan shan, Wen ju, Yanhui guo,Ling zhang, "Automated breast cancer detection and classification using using ultra sound images:a survey", Pattern recognition 43(2010) 299-317.
  705. Bongjin Jun ,Daijan Kim,"Robust face detection using gradient patterns and evidence accumulation" pattern recognition 45(2012) 3304-3316.
  706. Swanson,G.M.(1992),"Breast cancer in 1990's" journal of American medical women's association,v.47,p.140 -148 .
  707. Prof.Samir Kumar et.al, "Pre-proccessing of mammogram images", International journal of engineering science and technology ,vol.2(11),2010,6753-6758.
  708. Bo Yang,Songcan Chen, "A Comparitive study on local binary pattern based face recognition: LBP histogram versus LBP image" Neuro computing volume 120,23 November 2013,pages 365- 379. [15] Kemal polat, Salih Gunes "Breast cancer diagnosis using least square support vector machine" Digital signal processing 17 (2007) 694-701.
  709. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  710. Mirele Savegnago Mialich, Juliana Maria Faccioli Sicchieri and Alceu Afonso Jordao Junior, "Analysis of Body Composition: A Critical Review of the Use of Bioelectrical Impedance Analysis," International Journal of Clinical Nutrition, Vol. 2, pp. 1-10, 2014.
  711. S. Grimnes and orjan G martinsen, "Bioimpedance and Bioelectricity Basics," Third edition, Academic press, UK, 2015.
  712. Yanovski. S.Z, Hubbard V.S, Heymsfield S.B and Lukaski H.C, "Bioelectrical Impedance Analysis in Body Composition Measurement: National Institutes of Health Technology Assessment Conference Statement," The American Journal of Clinical Nutrition, Vol. 64, pp. 524S-532S, 1996.
  713. Lukaski H.C, Bolonchuk W.W, Hall C.B and Siders W.A, "Validation of Tetra polar Bioelectrical Impedance Method to Assess Human Body Composition,"Journal of Applied Physiology, Vol. 60, pp. 1327-1332, 1986.
  714. Zhu F, Schneditz D, Wang E and Levin, N.W, "Dynamics of Segmental Extracellular Volumes During Changes in Body Position by Bioimpedance Analysis," Journal of Applied Physiology, Vol. 85, pp. 497-504, 1998.
  715. Zhu F, Kuhlmann M, Kotanko P, Seibert E, Leonard E and Levin N, "A Method for the Estimation of Hydration State During Hemodialysis using a Calf Bioimpedance Technique," Physiological Measurement, Vol. 29, pp. S503-S516, 2008.
  716. Nuñez C, Gallagher D, Visser M, Pi-Sunyer F.X, Wang Z and Heymsfield S.B, "Bioimpedance Analysis: Evaluation of Leg-to-Leg System Based on Pressure Contact Footpad Electrodes," Medicine & Science in Sports & Exercise, Vol. 29, pp. 524-531, 1997.
  717. Kyle U.G, Bosaeus I, De Lorenzo A.D, Deurenberg P, Elia M, Gómez J.M, Heitmann B.L, Kent-Smith L, Melchior J.C and Pirlich M, "Bioelectrical Impedance Analysis- Part I: Review of Principles and Methods," Clinical Nutrition, Vol. 23, pp. 1226- 1243. 2004.
  718. Kyle U.G, Bosaeus I, De Lorenzo A.D, Deurenberg P, Elia M, Gómez J.M, Heitmann B.L, Kent-Smith L, Melchior J.C and Pirlich M, "Bioelectrical Impedance Analysis-Part II: Utilization in Clinical Practice," Clinical Nutrition, Vol. 23, pp. 1430-1453. 2004.
  719. P. Klassen, M. Mazariegos, P. Deurenberg, N. W. Solomons, and P. Furst, "Hydrational Status Assessed by Bioelectrical Impedance Spectroscopy and Dilution Method in Patients with Classical Dengue Fever," Annals of the New York Academy of Sciences, vol. 904, pp. 163-170, 2000.
  720. D. H. Libraty, T. P. Endy, S. Kalayanarooj, W. Chansiriwongs, A. Nisalak, S. Green, F. A. Ennis, and A. L. Rothman, "Assessment of Body Fluid REFERENCES
  721. Ruba, T. (2015). Identification and segmentation of exudates using SVM classifier.
  722. Malay kishore Dutta, M. K., Srivastava, K., Ganguly, S., & Ganguly, S. (2015). Exudates Detection in Digital Fundus Image Using Edge based Method and Strategic Thresholding, 748-752
  723. Pavle Prentaˇsi´c_, Sven Lonˇcari´c,.Detection of Exudates in Fundus Photographs using Convolutional Neural Networks
  724. Alireza Osareh, Bita Shadgar Richard Markham, A Computational- Intelligence-Based Approach for Detection of Exudates in DiabeticRetinopathy Images.
  725. G. Mahendran, R. Dhanasekaran. Investigation of the severity level of diabetic retinopathy using supervised classifier algorithms.
  726. Rubini, S. S., & Kunthavai, A. (2015). Diabetic Retinopathy Detection Based on Eigenvalues of the Hessian Matrix. Procedia - Procedia Computer Science, 47, 311-318.
  727. Mane, V. M., & Kawadiwale, R. B. (2015). Detection of Red Lesions in Diabetic Retinopathy Affected Fundus Images Preprocessing B . Extraction of Retinal Blood Vessels, 56-60.
  728. B´alint Antal. An Ensemble-Based System for Microaneurysm Detection and Diabetic Retinopathy Grading.
  729. Tjandrasa, H., Putra, R. E., Wijaya, A. Y., & Arieshanti, I. (2013). Classification of Non-Proliferative Diabetic Retinopathy Based on Hard Exudates Using Soft Margin SVM, 376-380.
  730. Arunmani, G., Ravivarma, P., & Rajasekar, E. (2015). A Novel Approach for Automated Detection of Exudates Using Retinal Image Processing ( JlxJ-CJI, 139-143.
  731. Adarsh, P., & Jeyakumari, D. (2013). Multiclass SVM-Based Automated Diagnosis of Diabetic Retinopathy, 206-210.
  732. Zhang, X., & Chutatape, O. (2005). A SVM Approach for Detection of Hemorrhages in Background Diabetic Retinopathy, 2435-2440.
  733. Akram, M. U., Khalid, S., & Khan, S. A. (2013). Identification and classification of microaneurysms for early detection of diabetic retinopathy. Pattern Recognition, 46(1), 107-116.
  734. Zhang, B., Wu, X., You, J., Li, Q., & Karray, F. (2010). Detection of microaneurysms using multi-scale correlation coefficients. Pattern Recognition, 43(6), 2237-2248. http://doi.org/10.1016/j.patcog.2009.12.017Lasso, W., Popular, U., Popular, U., & Torres, C. (1946). Image segmentation blood vessel of retinal using conventional filters , Gabor transform and skeletonization,
  735. Saleh, M. D., & Eswaran, C. (2012). An automated decision- support system for non-proliferative diabetic retinopathy disease based on MAs and HAs detection. Computer Methods and Programs in Biomedicine, 108(1), 186-196. http://doi.org/10.1016/j.cmpb.2012.03.004
  736. Walter, T., Klein, J.-C., Massin, P., & Erginay, A. (2002). A contribution of image processing to the diagnosis of diabetic retinopathy--detection of exudates in color fundus images of the human retina. IEEE Transactions on Medical Imaging, 21(10), 1236-1243. http://doi.org/10.1109/TMI.2002.806290
  737. Kuri, S. K. (2015a). Automatic Diabetic Retinopathy Detection Using Gabor Filter with Local Entropy Thresholding
  738. Ganguly, S., & Ganguly, S. (2014). An Adaptive Threshold Based Algorithm for Detection of Red Lesions of Diabetic Retinopathy in a Fundus Image, 91-94.
  739. Geetharamani, R., & Dhanapackiam, C. (2014). Automatic Localization and Segmentation of Optic Disc in Retinal Fundus Images through Image Processing Techniques.
  740. Chakraborty, S., Mukherjee, A., Chatterjee, D., Maji, P., Acharjee, S., & Dey, N. (2014). Segmentation in Digital Retinal Images, (2004). http://doi.org/10.1109/ICIT.2014.51
  741. Ding, S., & Ma, W. (2014). An Accurate Approach for Microaneurysm Detection in Digital Fundus Images, 1846-1851. http://doi.org/10.1109/ICPR.2014.32
  742. Nayak, J., & Bhat, P. S. (2008). Automated Identification of Diabetic Retinopathy Stages Using Digital Fundus Images, 107- 115.
  743. Seoud, L., Hurtut, T., Chelbi, J., Cheriet, F., & Langlois, J. M. P. (2015). Red Lesion Detection using Dynamic Shape Features for Diabetic Retinopathy Screening.
  744. Md. Jahiruzzaman, A. B. M. Aowlad Hossain, Detection and Classification of Diabetic Retinopathy Using K-Means Clustering and Fuzzy Logic.
  745. M. UsmanAkram , ShehzadKhalid, Detection and classification of retinal lesions for grading of diabetic retinopathy.
  746. Cemel kose. (2011). Simple methods for segmentation and measurement of diabetic retinopathy lesions in retinal fundus images ˘ S, 7, 274-293.
  747. Harangi, B., & Hajdu, A. (2014). Detection of Exudates in Fundus Images Using a Markovian Segmentation Model, 130-133.
  748. Welikala, R. A., Fraz, M. M., Dehmeshki, J., Hoppe, A., Tah, V., Mann, S., Barman, S. A. (2015). Computerized Medical Imaging and Graphics Genetic algorithm based feature selection combined with dual classification for the automated detection of proliferative diabetic retinopathy. Computerized Medical Imaging and Graphics, 43, 64-77
  749. Gadriye, D., & Khandale, G. (2014). Neural Network Based method for the Diagnosis of Diabetic Retinopathy, 1-5.
  750. References
  751. B.LakshmiPriya, S.JoshiAdaikalamarie and K.Jayanthi, "Multi -temporal Fusion of Abdominal CT Images for Effective Liver Cancer Diagnosis" in Proc. IEEE Int. Conf. on Wireless Commn, Signal Processing and Networking, 2016, pp. 1496 -1501.
  752. T. Saitoh, Y. Tamura, and T. Kaneko, "Automatic segmentation of liver region based on extracted blood vessels," Syst. Comput. Jpn., vol. 35, pp. 633-641, May 2004.
  753. L. Soler, H. Delingette, G. Malandain, J. Montagnat, N. Ayache, C. Koehl, O. Dourthe, B. Malassagne, M. Smith, D. Mutter, and J. Marescaux, "Fully automatic anatomical, pathological, and functional segmentation from CT scans for hepatic surgery," Comput.-Aided Surg., vol. 6, pp. 131-142, 2001.
  754. J. Gao, A. Kosaka, and A. Kak, "A deformable model for automatic CT liver extraction," Acad. Radiol., vol. 12, pp. 1178-1189, Sep. 2005.
  755. S. Pan and B. M. Dawant, "Automatic 3D segmentation of the liver from abdominal CT images: A level-set approach," in Proc. SPIE Med. Imaging, 2001, vol. 4332, pp. 128-138.
  756. Hamid Hassanpour, Najmeh Samadiani, S.M. Mahdi Salehi, "Using morphological transforms to enhance the contrast of medical images" The Egyptian J. of Radiology and Nuclear Medicine, vol.46 pp. 481 -489, 2015.
  757. T. Chaira, An improved medical image enhancement scheme using Type II fuzzy set, Appl. Soft Comput. J. (2014)
  758. M. Sundaram, K. Ramar, N. Arumugam, G. Prabin," Histogram Modified Local Contrast Enhancement for mammogram images" Appl. Soft Comput. J.(2011).
  759. Y. Yang, Z. Su and L. Sun, "Medical image enhancement algorithm based on wavelet transform", Electronics Letters, vol. 46 No. 2, 2010.
  760. Suvadip Mukherjee and Scott T. Acton, "Region Based Segmentation in Presence of Intensity Inhomogeneity Using Legendre Polynomials," IEEE Transactions on Signal Processing Letters, vol.22, no. 3, pp. 298-302, Mar. 201.
  761. P.S. Karvelisand D.I.Fotiadis, "A Region Based Decorrelation Stretching Method: Application To Multispectral Chromosome Image Classification," in Proc. IEEE Int.Conf. on Image Processing, 2008, pp. 1456-1459.
  762. N.A.Campell, "The Decorrelation Stretch Transformation" , Int. J.Remote Sensing, Vol.17 pp. 1939-1949.
  763. R. Bhattacharjee and M. Chakraborty, "Exudates, Retinal and Statistical Features Detection from Diabetic Retinopathy and Normal Fundus Images: An Automated Comparative Approach," in Proc NCCCS. 2012, pp. 1-6.
  764. Syrris, S. Ferri, D. Ehrlich and M. Pesaresi, "Image Enhancement and Feature Extraction Basedon Low- Resolution Satellite Data," IEEE J. of Applied Earth Obs. and Remote Sensing, vol. 8, pp. 1986 -1995.
  765. References
  766. M. Sezgin, B. Sankur, Survey over image thresholding techniques and quantitative performance evaluation, Journal of Electronic Imaging 13 (1) (2004) 146-168.
  767. D. Cremers, M. Rousson, R. Deriche., A review of statistical approaches to level set segmentation: integrating color, texture, motion and shape, International Journal of Computer Vision 72 (2007) 195-215.
  768. D.L. Pham, C. Xu, J.L. Prince, A survey of current methods in medical image segmentation, In Annual Review of Biomedical Engineering 2 (2000) 315-338.
  769. J.A. Noble, D. Boukerroui, Ultrasound image segmentation: a survey, IEEE Transactions on Medical Imaging 25 (8) (2006) 987- 1010.
  770. Peng, B., Zhang, L., & Zhang, D. (2013). A survey of graph theoretical approaches to image segmentation. Pattern Recognition, 46(3), 1020-1038.
  771. Basavaprasad B, Hegadi RS (2014) A survey on traditional and graph theoretical techniques for image segmentation. IJCA Proc Natl Conf Recent Adv Inf Technnol (NCRAIT) (1):38-46
  772. Foggia P, Percannella G, Sansone C, Vento M: A graph-based clustering method and its applications. In Proceedings of the 2nd International Conference on Advances in Brain, Vision and Artificial Intelligence. Springer-Verlag, Berlin, Heidelberg; 2007:277-287.
  773. O. J. Morris , M. de , J. Lee and A.G. Constantinides "A unified method for segmentation and edge detection using graph theory", Proc. ICASSP, pp.2051 -2054,Tokyo,1986 .
  774. Boykov, Y. and Funka-Lea, G. (2006). Graph cuts and efficient N-D image segmentation. International Journal of Computer Vision, 70(2), 109-131.
  775. Oliver, A., Freixenet, J., Marti, J., Perez, E., Pont, J., Denton, E. R., & Zwiggelaar, R. (2010). A review of automatic mass detection and segmentation in mammographic images. Medical Image Analysis, 14(2), 87-110.
  776. Dengler, J., Behrens, S., & Desaga, J. F. (1993). Segmentation of microcalcifications in mammograms. Medical Imaging, IEEE Transactions on,12(4), 634-642.
  777. Gavrielides, M. A., Lo, J. Y., Vargas-Voracek, R., & Floyd Jr, C. E. (2000). Segmentation of suspicious clustered microcalcifications in mammograms. Medical Physics, 27(1), 13-22.
  778. Cordella, L. P., Percannella, G., Sansone, C., & Vento, M. (2005, June). A graph-theoretical clustering method for detecting clusters of micro-calcifications in mammographic images. In Computer-Based Medical Systems, 2005. Proceedings. 18th IEEE Symposium on (pp. 15-20). IEEE.
  779. Huang, Q. H., Lee, S. Y., Liu, L. Z., Lu, M. H., Jin, L. W., & Li, A. H. (2012). A robust graph-based segmentation method for breast tumors in ultrasound images. Ultrasonics, 52(2), 266-275.
  780. Chu, Y., Li, L., & Clark, R. A. (2002, May). Graph-based region growing for mass-segmentation in digital mammography. In Medical Imaging 2002 (pp. 1690-1697). International Society for Optics and Photonics.
  781. Janakiraman, T. N., & Mouli, P. C. (2010). Image segmentation using euler graphs. Int. J. Comput. Commun. Control, 5(3), 314-324.
  782. Y. J. Zhang, ''A survey on evaluation methods for image segmentation,'' Pattern Recogn. 29, 1335-1346 (1996).
  783. Calderero, Felipe, and Ferran Marques. "General region merging approaches based on information theory statistical measures." Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on. IEEE, 2008.
  784. Bondy, John Adrian, and Uppaluri Siva Ramachandra Murty. Graph theory with applications. Vol. 290. London: Macmillan, 1976.
  785. L. Euler. Solutio problematis ad geometriam situs pertinentis. Comment. Academiae Sci. I. Petropolitanae, 8:128-140, 1736.
  786. J Suckling et al (1994), "The Mammographic Image Analysis Society Digital Mammogram Database", Exerpta Medica. International Congress Series 1069 pp 375-378.
  787. "Atherosclerosis," National Health Service [www.nhs.uk].
  788. NHS England. Available from: www.nhs.uk/Conditions/ Atherosclerosis. .
  789. P. Durrington, "Dyslipidaemia," Lancet, vol. 362, no. 9385, pp. 717-731, 2003.
  790. R. Carmena, P. Duriez, and J.-C. Fruchart, "Atherogenic lipoprotein particles in atherosclerosis.," Circulation, vol. 109, no. 23 Suppl 1, pp. III2-7, 2004.
  791. "High Blood Cholesterol: What You Need to Know," United States Department of Health and Human Services. National Heart, Lung, and Blood Institute [www.nhlbi.nih.gov] . National Institutes of Health. NHLBI.
  792. A. Lonappan, "Novel method of detecting cholesterol using microwaves," Microw. Opt. Technol. Lett., vol. 54, no. 5, pp. 1212-1215, 2012.
  793. A. Wisitsoraat, P. Sritongkham, C. Karuwan, D. Phokharatkul, T. Maturos, and A. Tuantranont, "Fast cholesterol detection using flow injection microfluidic device with functionalized carbon nanotubes based electrochemical sensor," Biosens. Bioelectron., vol. 26, no. 4, pp. 1514-1520, 2010.
  794. N. Haq, A. Garton, and M. D. Fox, "IR spectroscopic detection of whole blood cholesterol," in Annual international conference of the IEEE Engineering In Medicine And Biology Society, 1991, vol. 13, no. 4, pp. 1562-1563.
  795. V. Oncescu, M. Mancuso, and D. Erickson, "Cholesterol testing on a smartphone," Lab on a Chip, vol. 14, no. 4, pp. 759-763, 2014.
  796. F. L. Urbano, "Ocular Signs of Hyperlipidemia," Hosp. Physician, no. November, pp. 51-54, 2001.
  797. H. Shiigi, H. Matsumoto, I. Ota, and T. Nagaoka, "Detection of Skin Cholesterol by a Molecularly Imprinted Electrode," . J. Flow Inject. Anal, vol. 25, no. 1, pp. 81-84, 2008.
  798. R. A. Ramlee and S. Ranjit, "Using iris recognition algorithm, detecting cholesterol presence," in Proceedings -2009 International Conference on Information Management and Engineering, ICIME 2009, 2009, pp. 714-717.
  799. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  800. N. R. Shanker, A. Ezhil, and S. Archana, "Non- invasive method of detection of cholesterol using image processing," Int. J. Med. Eng. Informatics. Inderscience Enterp. Ltd., vol. 04, no. 03, pp. 223- 230, 2012.
  801. M. S. Mohktar, F. Ibrahim, and N. A. Ismail, "Non- Invasive Approach To Predict the Cholesterol Level in Blood Using Bioimpedance and Neural Network Techniques," Biomed. Eng. Appl. Basis Commun., vol. 25, no. 06, p. 1350046(1-7), 2013.
  802. M. Milanič, A. Bjorgan, M. Larsson, P. Marraccini, T. Strömberg, and L. L. Randeberg, " Hyperspectral imaging for detection of cholesterol in human skin," SPIE BiOS, vol. 9332, p. 93320W-93320W-12, 2015.
  803. M. Moosavi, A. Sareshtedar, S. Zarei-Ghanavati, M. Zarei-Ghanavati, and N. Ramezanfar, "Risk factors for senile corneal arcus in patients with acute myocardial infarction.," J. Ophthalmic Vis. Res., vol. 5, no. 4, pp. 228-31, 2010.
  804. L. A. Zech and J. M. Hoeg, "Correlating corneal arcus with atherosclerosis in familial hypercholesterolemia.," Lipids Health Dis., vol. 7, , 2008.
  805. S.V. Mahesh Kumar and R. Gunasundari, "Diagnosis of Corneal Arcus Using Statistical Feature Extraction and Support Vector Machine," in Artificial Intelligence and Evolutionary Computations in Engineering Systems, Advances in Intelligent Systems and Computing, Springer, 2016, pp. 481-492.
  806. H. Proença, L.A. Alexandre, " Iris segmentation methodology for non-cooperative recognition," in IEEE Proceedings of Vision, Image and Signal Processing, 2006, pp. 199-205.
  807. Niladri B.Puhan , N.sudha ,Anirudh Sivaraman Kaushalram , "Efficient segmentation technique for noisy frontal view iris images using Fourier spectral density," SIViP (2011) ,Springer, pp.105-119.
  808. R.P. Wildes , "Iris recognition: An emerging biometric technology," in IEEE proceedings, vol. 85, no. 9. Sep. 1997, pp. 1348-1363.
  809. REFERENCES
  810. Vicent J. Ribas, AlfredoVellido, Juan Carlos Ruiz- Rodríguez,JordiRello." Severe sepsis mortalityprediction with logistic regression over latent factors", Expert Systems with Applications,July 2012.
  811. Jeremy D. Scheff, Panteleimon D. Mavroudis, Panagiota T. Foteinou, Gary An, Steve E. Calvano, John Doyle, Thomas E. Dick f, Stephen F. Lowry, YoramVodovotz, Ioannis P. Androulakis," A multiscale modeling approach to inflammation: A case study in human endotoxemia", Journal of Computational Physics,August 2013.
  812. A.S. Fialho,F. Cismondi,S.M. Vieira, S.R. Reti, J.M.C. Sousa, S.N. Finkelstein,"Data mining using clinical physiology at discharge to predict ICU readmissions", Expert Systems with Applications, May 2012.
  813. R. A. Lukaszewski, A. M. Yates,M. C. Jackson,K. Swingler,J. M. Scherer,A. J. Simpson,P. Sadler,P. McQuillan,R. W. Titball,T. J. G. Brooks,and M. J. Pearce,"Presymptomatic Prediction of Sepsis in Intensive Care Unit Patients ", Clinical and VaccineImmunology, July 2008, pp. 1089-1094.
  814. Dr. K. Usha Rani ,"Analysis of heart disease dataset using neural network approach", International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.1,No.5,September 2011.
  815. Yasunari Yokota ,Yoko Kawamura,NaokiMatsumaru, and KunihiroShirai, "Monitoring of Premonitories Septic Shock in Heart-Rate variability" ,Proceedings of the IEEE- EMBS International conference on bio medical and health informatics(BHI 2012), 27 Jan 2012.
  816. QeetharaKadhim Al-Shayea," Artificial Neural Networks in Medical Diagnosis",IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
  817. Christophe Barbier, Yann Loubi_res, Christophe Schmit, Jan Hayon, Jean-Louis Ric_me, Fran_oisJardin, Antoine Vieillard-Baron." Respiratory changes in inferior vena cava diameter are helpful in predicting fluid responsiveness in ventilated septic patients",Intensive Care Med (2004).
  818. Guoqiang
  819. Peter Zhang,"Neural network for classification:A survey", IEEE transaction on systems, man and cybertics, application and reviews, VOL. 30, NO. 4, NOVEMBER 2000.
  820. R. Brause1, F. Hamker2, J. Paetz, "Septic shock diagnosis by neural networks and rule based systems" , In: L.C. Jain (ed.), Computational Intelligence Techniques in Medical Diagnosis and Prognosis, Springer Verlag, New York 2001, pp. 323
  821. S. Ansari I. Shafi J. Ahmad S. Ismail Shah,"Neural network-based approach for the noninvasive diagnosis and classification of hepatotropic viral disease",IET Communications,28thFebruary 2011.
  822. Igodan Charles Efosa1 and Akwukwuma V.V.N,"knnowledge-based inference system for sepsis", International Journal of Computational Science and Information Technology (IJCSITY) Vol.1, No.3, August 2013.
  823. David M Linton,Dangilon,"Advances in noninvasive cardiac output monitoring", Annals of cardiac anesthesia,2002.
  824. Marianne Catanho,MriduSinha,VarshaVijayan," Model of aortic blood flowusing Windkessel model ", BENG 221 -Mathematical Methods in Bioengineering ,October 25, 2012.
  825. Tatsuya Arai, Kichang Lee, and Richard J. Cohen," Cardiac Output and Stroke Volume Estimation Using a Hybrid of Three Windkessel Models", 32nd Annual International Conference of the IEEE EMBS Buenos Aires, Argentina, August 31 September 4, 2010.
  826. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  827. J.Gnitecki and Z.Moussavi,"Separating heart sounds from lung sounds accurate diagnosis of respiratory disease depends on understanding noises,"IEEE Eng, Medical.Biol.Mag. vol.26, no.1, pp.20-29, Jan. /Feb.2007.
  828. S.Charleston, M.R.Azimi-Sadjadi, and R. Gonzalez- Camarena,"Interference cancellation in respiratory sounds via a multiresolution joint time-delay and signal- estimation scheme," IEEE Tran. Biomedical. Eng.,, vol. 44, no. 10,pp,1006-1019 Oct.1997.
  829. A.Sovijarvi,L.Malmberg,G.Charbonneau,J.Vanderschoot, F.Dalmasso,C.Sacco,M.Rossi, and J.Earis, "Characteristics of breath sound and adventitious respiratory sounds," Eur:Respiratory,Rev.J.,pp.591- 596,2000.
  830. Sovijärvi ARA, Dalmasso F, Vanderschoot J, MalmbergLP, Righini G, Stoneman SAT. Definition of terms for applications of respiratory sounds. Eur Respir Rev 2000:10, 597-610.
  831. M.Bahaura,"Pattern recognition methods applied to respiratory sounds classification in to normal and wheeze classes," comput. Biol.Med, vol.39, pp.824-843, 2009.
  832. S.A.Taplidou and L.J.Hadjilenontiadis," Wheeze detection based on time-frequency analysis of breath sounds, Comput.Biol.Med" vol.37, pp.1073-1083, 2007.
  833. L.Rdudin, S.Osher, and E.Fatemi,"Nonlinear total variation based noise removal algorithms," Phys.D: Elsevier Science, vol.60, no.1-4, pp.259-268.1992.
  834. Mehmet Hakan Durak, Kemal Ozkan,"Denoising speech signal using common vector approach", SIU, IEEE- june2015.
  835. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  836. World Health Organization, Chagas disease (American trypanosomiasis), Fact Sheet 340, WHO, 2010, http://www.who.int/mediacentre/factsheets/fs340/en/.
  837. C. Ponce, E. Ponce, E. Vinelli et al., Validation of a rapid and reliable test for diagnosis of Chagas' disease by detection of Trypanosoma cruzi- specific antibodies in blood of donors and patients in Central America, Journal of Clinical Microbiology, vol. 43, no. 10, pp. 5065- 5068, 2005.
  838. R. Soberanis-Mukul, V. Uc-Cetina, C. Brito-Loeza and H. Ruiz-Piña, An automatic algorithm for the detection of Trypanosoma cruzi parasites in blood sample images, Computer Methods and Programs in Biomedicine, vol. 112, no. 3, pp. 633-639, 2013.
  839. Víctor Uc-Cetina, Carlos Brito-Loeza and Hugo Ruiz-Piña, Chagas parasite detection in blood images using AdaBoost, Computational and Mathematical Methods in Medicine, vol. 2015, Article ID 139681, 13 pages, 2015.
  840. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  841. V.P. Fazan and J.J. Lachat, Qualitative and quantitative morphology of the vagus nerve in experimental Chagas' disease in rats: a light microscopy study, The American Journal of Tropical Medicine and Hygiene, vol.57, no.6, pp.672-677, 1997.
  842. V. Rajinikanth and M.S. Couceiro, RGB histogram based color image segmentation using firefly algorithm, Procedia Computer Science, vol. 46, pp. 1449-1457, 2015.
  843. V. Rajinikanth, N. Sri Madhava Raja and K. Latha, Optimal multilevel image thresholding: an analysis with PSO and BFO algorithms, Aust. J. Basic Appl. Sci., vol.8, no.9, pp. 443-454, 2014.
  844. N. Siva Balan, A. Sadeesh Kumar, N. Sri Madhava Raja and V. Rajinikanth, Optimal multilevel image thresholding to improve the visibility of plasmodium sp. in blood smear images, Advances in Intelligent Systems and Computing, vol. 397, pp. 563-571, 2015.
  845. V. Rajinikanth, N. Sri Madhava Raja and Suresh Chandra Satapathy, Robust color image multi-thresholding using between-class variance and cuckoo search algorithm, Advances in Intelligent Systems and Computing, vol. 433, pp. 379-386, 2016.
  846. B. Abhinaya and N. Sri Madhava Raja, Solving multi-level image thresholding problem-An analysis with cuckoo search algorithm, Advances in Intelligent Systems and Computing, vol. 339, pp. 177-186, 2015.
  847. X.S.Yang and S.Deb, Cuckoo search via Lévy flights. In: Proceedings of World Congress on Nature and Biologically Inspired Computing (NaBIC 2009), pp. 210-214. IEEE Publications, USA, 2009.
  848. X.S. Yang, Nature-inspired metaheuristic algorithms. Luniver Press, Frome, 2008.
  849. Z. Wang, A.C. Bovik, H.R. Sheikh and E.P. Simoncelli, Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600 -612, 2004.
  850. S. Grgic, M. Grgic and M. Mrak, Reliability of objective picture quality measures, Journal of Electrical Engineering, vol. 55, no. 1-2, pp. 3-10, 2004.
  851. K. Manickavasagam, S. Sutha and K, Kamalanand, An automated system based on 2 d empirical mode decomposition and k-means clustering for classification of Plasmodium species in thin blood smear images, BMC Infectious Diseases, vol.14, no.3, pp.1, 2014.
  852. K. Manickavasagam, S. Sutha and K. Kamalanand, Development of systems for classification of different plasmodium species in thin blood smear microscopic images, Journal of Advanced Microscopy Research, vol.9, no.2, pp. 86-92, 2014.
  853. R. Panda, S. Agrawal and S. Bhuyan, Edge magnitude based multilevel thresholding using Cuckoo search technique, Expert Systems with Applications, vol. 40, no.18, pp. 7617-7628, 2013.
  854. N.S.M. Raja, V. Rajinikanth and K. Latha, Otsu based optimal multilevel image thresholding using firefly algorithm, Modelling and Simulation in Engineering, vol. 2014, Article ID 794574, 2014.
  855. Lijin Wang and Yiwen Zhong, Cuckoo search algorithm with chaotic maps, Mathematical Problems in Engineering, vol. 2015, Article ID 715635, 14 pages, 2015.
  856. K. Ikeda, Multiple-valued stationary state and its instability of the transmitted light by a ring cavity system, Opt. Commun. Vol.30, pp.257- 261, 1979.
  857. K. Ikeda, H. Daido and O. Akimoto, Optical turbulence: Chaotic behavior of transmitted light from a ring cavity, Phys. Rev. Lett. Vol. 45, pp.709-712, 1980.
  858. S. Sarkar and S. Das, Multilevel image thresholding based on 2D histogram and maximum tsallis entropy -A differential evolution approach, IEEE Transactions on Image Processing, vol.22, no.12, pp.4788-4797, 2013.
  859. N.S.M. Raja, N. Kavitha and S.Ramakrishnan, Analysis of vasculature in human retinal images using particle swarm optimization based Tsallis multi-level thresholding and similarity measures, Lecture Notes in Computer Science, vol.7677, pp. 380-387, 2012.
  860. S. Paul and B. Bandyopadhyay, A novel approach for image compression based on multi-level image thresholding using Shannon Entropy and Differential Evolution, Students' Technology Symposium (TechSym), IEEE, pp. 56 -61, 2014.
  861. S. Sarkar, S. Das, S. Paul, S.Polley, R. Burman and S.S. Chaudhuri, Multi-level image segmentation based on fuzzy-Tsallis entropy and differential evolution, IEEE International Conference on Fuzzy Systems (FUZZ), pp.1-8, 2013.
  862. A.K. Bhandari, A. Kumar and G.K. Singh, Modified artificial bee colony based computationally efficient multilevel thresholding for satellite image segmentation using Kapur's, Otsu and Tsallis functions", Expert Systems with Applications, vol. 42, no. 3, pp. 1573-1601, 2015.
  863. S. Agrawal, R.Panda, S. Bhuyan, and B.K. Panigrahi, Tsallis entropy based optimal multilevel thresholding using cuckoo search algorithm, Swarm and Evolutionary Computation, vol.11, pp.16-30, 2013.
  864. I. Brajevic, M. Tuba and N. Bacanin, Multilevel image thresholding selection based on the cuckoo search algorithm, Proceedings of the 5th International Conference on Visualization, Imaging and Simulation (VIS '12), Sliema, Malta, pp. 217-222, 2012.
  865. P.K. Sahoo, J.N. Kapur and A.K.C. Wong, A new method for gray-level picture thresholding using the entropy of the histogram, Computer Vision Graphics ImageProcessing , vol.29, pp.273-285, 1985.
  866. D. Oliva, E. Cuevas, G. Pajares, D. Zaldivar and M. Perez-Cisneros, Multilevel thresholding segmentation based on harmony search optimization, Journal of Applied Mathematics, vol. 2013, Article ID 575414, 24 pages, 2013.
  867. B. Akay, A study on particle swarm optimization and artificial bee colony algorithms for multilevel thresholding, Applied Soft Computing, Vol.13, No.6, pp. 3066-3091, 2013.
  868. K. Suresh Manic, R. Krishna Priya and V. Rajinikanth, Image multithresholding based on Kapur/Tsallis entropy and firefly algorithm, Indian Journal of Science and Technology, vol.9, no.12, 89949, 2016.
  869. C. Tsallis, Possible generalization of Boltzmann-Gibbs statistics, Journal of Statistical Physics, Vol.52, No. 1-2, pp 479-487, 1988.
  870. C. Tsallis, Entropic nonextensivity: a possible measure of complexity, Chaos, Solitons & Fractals, vol.13, no.3, pp. 371-391, 2002. AUTHORS PROFILE V. Shanjita Lakshmi is currently doing B.E. in Electronics and Instrumentation Engineering, St. Joseph"s College of Engineering, Chennai 600 119, Tamilnadu, India. She is currently working in the field of classical and heuristic algorithm assisted medical image segmentation and analysis.
  871. Shiffani. G. Tebby is currently doing B.E. in Electronics and Instrumentation Engineering, St. Joseph"s College of Engineering, Chennai 600 119, Tamilnadu, India. She is currently working in the field of classical and heuristic algorithm assisted medical image segmentation and analysis.
  872. D. Shriranjani is an under graduate student in the department of Electronics and Instrumentation Engineering, St. Joseph"s College of Engineering, Chennai 600 119. Her research interest includes, heuristic algorithm and its engineering applications, medical image segmentation and analysis, and disease modelling.
  873. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  874. Hertzman A, "The blood supply of various skin areas as estimated by the photoelectric plethysmograph,"Am .J. Physiol,pp.124:328-340,1938.
  875. Takazawa K, Tanaka N, Fujita M, Matsuoka O, Saiki T, Aikawa M, " Assessment of vasocative agents and vascular aging by the second derivative of photoplethysmogram waveform," Journal of Hypertension.,pp. 365-70. 1998.
  876. E.D.Ü. Dean Cvetkovic "Wavelet transform feature extraction from human PPG, ECG, and EEG signal responses to ELF PEMF exposures: A pilot study," Elsiveir-Digital Signal Processing, vol. 18, pp. 861-874, 2008.
  877. C.J. Lin Z, "Advances in time-frequency analysis of biomedical signals," Crit Rev Biomed Eng, vol. 24, pp. 1-72, 1996.
  878. P S. Addison, James Walker, "Time-Frequency Analysisof Biosignals- A Wavelet Transform Overview," IEEE engineering in medicine and biology magazine, pp. 14-29,2009.
  879. MIMIC II database physionet archieve/mimc2wdb
  880. R.Polikar, "Fundamental concepts& an overview of the wavelet theory", Lowa State University, 1998.
  881. T.Baba, "Time-Frequency Analysis Using Short Time Fourier Transform," The Open Acoustics Journal, vol. 5, pp. 32-38, 2012.
  882. I.H.Huiying Liung, "A feature extraction algoithm based on wavelet packet decomposition for heart sound signals," IEEE conference, pp. 93- 96, 1998.
  883. P.Pan Fan, Li Shangwen ,Duan Wenfeng, "Feature extraction of photoplethysmography signal using wavelet approach," IEEE International Conference on Digital Signal Processing, pp. 283-286, 2015.
  884. M.Elgendi, "On the Analysis of Fingertip Photoplethysmogram Signals," Bentham science publishers, vol. 8, pp. 14-25, 2012.
  885. S. B. Mandeep Singh, "Automatic Feature Extraction in Acceleration Plethysmography," International Journal of Computer Science and Communications, vol. 5, pp. 1-9, 2009.
  886. S.H.L.Tsu-Hsun Fu, "Heart rate extraction from photoplethysmogram waveform using wavelet multiresolution analysis," Journal of medicine and Engineering, pp. 229-232, 2008.
  887. H.P.M. Wei-Jheng Lin, "A physiological information extraction method based on wearable PPG sensors with motion artifact removal," IEEE International Conference on Communications, pp. 1-6, 2016.
  888. G.L.J.Avendano Valencia L, Blanco Velasco M, Castellanos Dominguez G, "Feature extraction from parametric time-frequency representations for heart murmur detection," Annals of Biomedical Engineering, vol. 38, pp. 2716-2732, 2010.
  889. J.Juan D Martínez Vargas, Germán Castellanos Dominguez, "Time- frequency based feature selection for discrimination of non-stationary biosignals," EURASIP Journal on Advances in Signal Processing, 2012.
  890. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  891. "Global Status Report on noncommunicable disease 2014," Geneva: World Health Organization, Switzerland, 2014.
  892. Rupert, A., Payne, B. and Web,D., "Arterial Stiffness and Hypertension: Emerging Concepts," Hypertension, 55, pp. 9-14, 2010.
  893. Ring,E. F. J., and Ammer,K., "Infrared thermal imaging in medicine," in Physiological Measurement, IOP Publishing, pp. 33-46, 2012.
  894. Buddharaju, P., Ioannis, T. and Pavlidis,P., "Physiology-Based Face Recognition in the Thermal Infrared Spectrum," IEEE Transactions On Pattern Analysis And Machine Intelligence, 29(4), pp. 613-626, 2007.
  895. Garbey, M., Merla,A. and Pavlidis,I., "Estimation of blood flow speed and vessel location from thermal video," Proc. 2004 IEEE Computer Society Conf. Computer Vision and Pattern Recognition,1, pp. 356-363, 2004.
  896. Garbey,M., Sun,N., Arcangelo, M. and Ioannis, P., "Contact-Free Measurement of Cardiac Pulse Based on the Analysis of Thermal Imagery," IEEE Transactions On Biomedical Engineering, 54(8), pp. 1418-1426, 2007.
  897. Kenning,I., Kerand, I H., Luehr, D., and Margoli,S. K., "Hypertension Diagnosis and Treatment," Institute for Clinical Systems Improvement, 2014.
  898. Julius, S., Palatini, P., and Kjeldsen, SE., "Usefulness of Heart Rate to Predict Cardiac Events in Treated Patients With High-Risk Systemic Hypertension," Am J Cardiol,109, pp. 685-692, 2012.
  899. Bortel, V., Laurent., S., and BoutouyriePierre,Ch., "Expert consensus document on the measurement of aortic stiffness in daily practice using carotid-femoral pulse wave velocity," Journal of Hypertension,30(3), 2012.
  900. Matthew,R., Nelson.,R., Stepanek.,J., and Cevette, M., "Noninvasive Measurement of Central Vascular Pressures With Arterial Tonometry: Clinical Revival of the Pulse Pressure Waveform?," Mayo Clin Proc, 85(5), pp. 460-472, 2010.
  901. Wang,A ., An,N. , Xia,X. , Li, L., and Chen,G., "A Logistic Regression and Artificial Neural Network-based Approach for Chronic Disease Prediction: a Case Study of Hypertension," International Conference on Internet of Things (iThings 2014), Green Computing and Communications, 2014.
  902. Wang,A ., An,N. , Xia,X. , Li, L., and Chen,G., "A Logistic Regression and Artificial Neural Network-based Approach for Chronic Disease Prediction: a Case Study of Hypertension," International Conference on Internet of Things (iThings 2014), Green Computing and Communications, 2014.
  903. Kaur, A., and Bhardwaj,A., "Genetic Neuro-Fuzzy System for Hypertension Diagnosis," International Journal of Computer Science and Information Technologies, 5(4), pp. 4986-4989, 2014.
  904. Kurylyak,Y., Lamonaca, F., and Grima,D., "A Neural Network-based Method for Continuous Blood Pressure Estimation from a PPG Signal," in Instrumentation and Measurement Technology Conference, Minneapolis, 2013.
  905. Wu, T., Pang, G. and Yun, E., "Predicting Systolic Blood Pressure Using Machine Learning," Information and Automation for Sustainability, Colombo, 2014.
  906. Kenning,I., Kerand, I H., Luehr, D., and Margoli,S. K., "Hypertension Diagnosis and Treatment," Institute for Clinical Systems Improvement, 2014.
  907. Matthew,R., Nelson.,R., Stepanek.,J., and Cevette, M., "Noninvasive Measurement of Central Vascular Pressures With Arterial Tonometry: Clinical Revival of the Pulse Pressure Waveform?," Mayo Clin Proc, 85(5), pp. 460-472, 2010.
  908. Bortel, V., Laurent., S., and BoutouyriePierre,Ch., "Expert consensus document on the measurement of aortic stiffness in daily practice using carotid-femoral pulse wave velocity," Journal of Hypertension,30(3), 2012.
  909. Faxo,D. P., Fuste,V., Libby, P., Beckman, J. A., and Hiatt, W. R., "American Heart Association. Atherosclerotic VascularDisease Conference Writing Group III: Pathophysiology," Circulation, 109, pp. 2617-25, 2004.
  910. Rocha, S.V.D., Junior, G.B., Silva, A.C., Paiva, A.C.D., (2014), "Texture analysis of masses in digitized mammograms using Gleason and Menhinick Diversity Indexes," Braz. J. Biom. Eng., 30(1), pp.35-46.
  911. Leena Jasmine, J.S., Baskaran, S., Govardhan, A., (2011), "An Automated Mass Classification System in Digital Mammograms using Contourlet Transform and Support Vector Machine," International Journal of Computer Applications, 31, pp.54-61.
  912. Zhang, L., Zhang, W., (2014), "A comparison of different pattern recognition methods with entropy based feature reduction in early breast cancer classification," European Scientific Journal, February
  913. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 2014 /SPECIAL/ edition vol.3 ISSN: 1857 -7881 (Print) e -ISSN 1857-7431.
  914. Elfarra, B.K., Abuhaiba, I.S.I., (2013), "New Feature Extraction Method for Mammogram Computer Aided Diagnosis", Image Processing and Pattern Recognition, 6 (1), pp.13-36.
  915. Jankulovski, B., Kitanovski, I., Trojacanec, K., Dimitrovski, I., Loskovska, S., (2012), "Mammography image classification using texture features," The 9th Conference for Informatics and Information Technology (CIIT 2012), pp.129-132.
  916. Angeline S.P. Kirubha., Minnita Rachel., Micheal Anburajan., (2016) "Automated multimodal segmentation of an abnormal breast mass in mammogram", The Institution of Mechanical Engineers Proceeding: Journal of Engineering in Medicine, pp.1- 16., DOI: 10.1177/0954411916638380
  917. Pereira, R.R., Marques, P.M.A., Honda, M.O., Kinoshita, S.K., Engelmann, R., Muramatsu, C., Doi, K., (2007), "Usefulness of Texture Analysis for Computerized Classification of Breast Lesions on Mammograms," Journal of Digital Imaging, 20 (3), pp.248-255.
  918. Naveed, N., Jaffar, M.A., Shaikh, F.K., (2011), "Malignancy and Abnormality Detection of Mammograms using Classifier Ensembling," Mehran University research journal of engineering & technology, 30 (3), pp.499-510.
  919. Rocha, S.V.D., Junior, G.B., Silva, A.C., Paiva, A.C.D., (2014), "Texture analysis of masses in digitized mammograms using Gleason and Menhinick Diversity Indexes," Braz. J. Biom. Eng., 30(1), pp.35-46.
  920. Herwanto, Arymurthy, AM., (2013), "Association Technique based on Classification for Classifying Microcalcification and Mass in Mammogram," International Journal of Computer Science Issues, 10, pp.252-259.
  921. Abdalla, A.L.M., Dress, S., Zaki, N., (2011), "Detection of Masses in Digital Mammogram Using Second Order Statistics and Artificial Neural Network," International Journal of Computer Science & Information Technology, 3 (3), pp. 176-186. AUTHORS PROFILE Dr.
  922. S. P. Angeline Kirubha was born on 20 th June 1978 in Madurai, Tamilnadu, India. She is currently working as the Assistant professor (senior grade) in the Department of Biomedical Engineering, SRM University, kattankulathur, Chennai, Tamilnadu, India. She obtained her Master's Degree specialization in Biomedical Engineering from IIT, Madras (2005). She did her bachelor's degree in Instrumentation and Control Engineering at Sethu Institute of Technology, Virudhunagar District, Tamilnadu, India, affiliated to Madurai Kamaraj University (1999). Her area of interest includes biosignal processing, medical image processing and biomedical instrumentation. Her research area focuses on Evaluation of breast cancer using various imaging modalities. Dr.M.Anburajan has obtained his Ph.D degree in the broad area of 'Medical Physics' from Anna University, Chennai, Tamil Nadu, India in the year 1999. His Ph.D thesis entitled as REFERENCES
  923. Lazar, I., & Hajdu, A. (2013). Retinal microaneurysm detection through local rotating cross-section profile analysis. IEEE Transactions on Medical Imaging, 32(2), 400-407
  924. Cemel kose. (2011). Simple methods for segmentation and measurement of diabetic retinopathy lesions in retinal fundus images ˘ S, 7, 274-293.
  925. Chowriappa, P., Dua, S., Acharya, U. R., & Rama, M. M. (2013). Ensemble selection for feature-based classi fi cation of diabetic maculopathy images. Computers in Biology and Medicine, 43(12), 2156-2162.
  926. Narasimha-iyer, H., Can, A., Roysam, B., Stewart, C. V, Tanenbaum, H. L., Majerovics, A., & Singh, H. (2006). Robust Detection and Classification of Longitudinal Changes in Color Retinal Fundus Images for Monitoring Diabetic Retinopathy, 53(6), 1084-1098.
  927. Akram, M. U., Khalid, S., Tariq, A., Khan, S. A., & Azam, F. (2014). Detection and classi fi cation of retinal lesions for grading of diabetic retinopathy. Computers in Biology and Medicine, 45, 161-171.
  928. Sopharak, A., Uyyanonvara, B., & Barman, S. (2013). Computerized Medical Imaging and Graphics Simple hybrid method for fine microaneurysm detection from non-dilated diabetic retinopathy retinal images. Computerized Medical Imaging and Graphics, 37(5-6), 394- 402.
  929. Roychowdhury, S., Koozekanani, D. D., Kuchinka, S. N., & Keshab, K. (2015). Optic Disc Boundary and Vessel Origin Segmentation of Fundus Images, 2194(c), 1-12.
  930. Deepak, K. S., & Sivaswamy, J. (2012). Automatic assessment of macular edema from color retinal images. IEEE Transactions on Medical Imaging, 31(3), 766-776.
  931. Akram, M. U., Tariq, A., Khan, S. A., & Javed, M. Y. (2014). Automated detection of exudates and macula for grading of diabetic macular edema. Computer Methods and Programs in Biomedicine, 114(2), 141-152.
  932. Ahmad Fadzil, M. H., Izhar, L. I., & Nugroho, H. A. (2010). Determination of foveal avascular zone in diabetic retinopathy digital fundus images. Computers in Biology and Medicine, 40(7), 657-664.
  933. Reza, a. W., & Eswaran, C. (2011). A decision support system for automatic screening of non-proliferative diabetic retinopathy. Journal of Medical Systems, 35(1), 17-24.
  934. Zhang, X., Thibault, G., Decencière, E., Marcotegui, B., Laÿ, B., Danno, R., … Erginay, A. (2014). Exudate detection in color retinal images for mass screening of diabetic retinopathy. MEDICAL IMAGE ANALYSIS, 18(7), 1026-1043.
  935. Seoud, L., Hurtut, T., Chelbi, J., Cheriet, F., & Langlois, J. M. P. (2015). Red Lesion Detection using Dynamic Shape Features for Diabetic Retinopathy Screening, XX(XX), 1-11.
  936. Geetha Ramani, R. G., Lakshmi, B., & Jacob, S. G. (2012). Data Mining Method of Evaluating Classifier Prediction Accuracy in Retinal Data.
  937. Deb, S. (2014). An Expert System to Distinguish a Defective eye from a Normal eye, 155-158.
  938. Vallabha, D., Dorairaj, R., Namuduri, K., & Thompson, H. (2004). Automated Detection and Classi fi cation of Vascular Abnormalities in Diabetic Retinopathy, 1625-1629.
  939. Akram, U. M., & Khan, S. A. (2012). Automated Detection of Dark and Bright Lesions in Retinal Images for Early Detection of Diabetic Retinopathy. Journal of Medical Systems, 36(5), 3151-3162.
  940. Zahlmann, G., Kochner, B., Ugi, I., Schuhmann, D., Liesenfeld, B., Wegner, a., … Mertz, M. (2000). Hybrid fuzzy image processing for situation assessment. IEEE Engineering in Medicine and Biology Magazine, 19(1), 76-83.
  941. Ranamuka, N. G., & Meegama, R. G. N. (2013). Detection of hard exudates from diabetic retinopathy images using fuzzy logic, (November 2012), 121-130.
  942. Kirsali, P., Sambasivarao, K., & Badoni, P. (n.d.). An Automatic System for the Detection of Optic Disc and Pathologies in Retinal Images, 228-234.
  943. Zaki, W. M. D. W., Zulkifley, M. A., Hussain, A., Halim, W. H. W. A., Mustafa, N. B. A., & Ting, L. S. (2016). Diabetic retinopathy assessment: Towards an automated system. Biomedical Signal Processing and Control, 24, 72-82.
  944. Nayak, J., & Bhat, P. S. (2008). Automated Identification of Diabetic Retinopathy Stages Using Digital Fundus Images, 107-115.
  945. Yagmur, F. D., Karl, B., & Okatan, A. (2008). Automatic Recognition of Retinopathy Diseases by Using Wavelet Based Neural Network, 454-457.
  946. Kader, S., Aibinu, A. M., & Salami, M. J. E. (2012). A new method of vascular point detection using Artificial Neural Network, (December), 728-733.
  947. Deepa, M. (2012). Comparative Analysis on Supervised Classification Techniques for Segmentation and Detecting Abnormal Blood Vessels in Retinal Images, 180-185.
  948. Gandhi, M., Dhanasekaran, R., & Member, S. (2013). Diagnosis of Diabetic Retinopathy Using Morphological Process and SVM Classifier, 873-877.
  949. Awan, A. W. (2015). A Robust Algorithm For Segmentation Of Blood Vessels In The Presence Of Lesions In Retinal Fundus Images, 3-8.
  950. Gurudath, N., Celenk, M., & Riley, H. B. (n.d.). Machine Learning Identification of Diabetic Retinopathy from Fundus Images, 1-7.
  951. Zhang, X., & Chutatape, O. (2005). A SVM Approach for Detection of Hemorrhages in Background Diabetic Retinopathy, 2435-2440.
  952. K., & Joy, R. (2014). Computer -aided diabetic retinopathy detection using trace transforms on digital fundus images, 663-672.
  953. T.anzila Rahman, Mohammad Shorif Uddin, "Speckle Noise Reduction and Segmentation of Kidney Regions from Ultrasound Image", 978-1- 4799-0400-6/13, 2013 IEEE.
  954. Wan Mahani Hafizah, "Feature Extraction of Kidney Ultrasound Images based on Intensity Histogram and Gray Level Co-occurrence Matrix" 2012 sixth Asia Modeling Symposium, 978-0-7695-4730-5/12, 2012 IEEE.
  955. V. P. Gladis Pushpa Rathi, "Detection and Characterization of Brain Tumor Using Segmentation based on HSOM, Wavelet packet feature spaces and ANN", 978-1-4244-8679-3/11, 2011 IEEE.
  956. Norihiro Koizumi, "Robust Kidney Stone Tracking for a Non-invasive Ultrasound Theragnostic System -Servoing Performance and Safety Enhancement", 2011 IEEE International Conference on Robotics and Automation Shanghai International Conference Center May 9-13, 2011, Shanghai, China.
  957. K.Viswanath and R. Gunasundari, "Kidney stone detection from ultrasound images by Level Set Segmentation and multilayer perceptron ANN", Elsevier publisher, Proceedings of the international Conference on Communication and Comuting , IMCIET-ICCE-2014, pp.38-48, ISBN:978-93-5107-270-6.
  958. S. Osher and J. A. Sethian, "Fronts propagating with curvature dependent speed: Algorithms based on Hamilton-Jacobi formulations," J. Comput. Phys., vol. 79, no. 1, pp. 12-49, Nov. 1988.
  959. M. Stevenson, R. Weinter, and B. Widow, "Sensitivity of Feedforward Neural Networks to Weight Errors," IEEE Transactions on Neural Networks, Vol. 1, No. 2, pp 71- 80, 1990.
  960. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  961. N.Dheepa "Automatic seizure detection using higher order moments & ANN" IEEE-international conference
  962. on advance in Engineering science and management (ICAESM-2012) march 30,31,2012 with ISBN: 978-81- 909042-2-3, 2012 IEEE.
  963. Joge Martinez-carballido, "Metamyelocyte nucleus classification uses a set of morphologic templates", 2010 electronics, Robotics and Automatic Mechanics conference 978-0-7695-4204-1/10, 2010 IEE.
  964. K.Viswanath and R.Gunasundari, "Analysis of Kidney stone detection by reaction diffusion level set segmentation and Xilinx system generator". ICARCSET '15, March 06 -07, Unnao, India, 2015, Copyright 2015, ACM 978-1-4503-3441-9/15/03.
  965. Demetrius H. Bagly, Kelly A. Healy, "Ureteroscopic treatment of larger renal calculi (>2cm)", Arab Journal of Urology (2012) 10, 296-300 production and hosting by Elsevier.
  966. William G. Robertson, "Methods for diagnosing the risk factors of stone formation", Arab Journal of Urology (2012) 10, 296-300 production and hosting by Elsevier.
  967. Mohamed E. Abou El-Ghar, "Low-dose unenhanced computed tomography for diagnosing stone disease in obese patients". 2090-598X, 2012 Arab Association of Urolog, Production and hosting by Elsevier B.V, 10,279- 283.
  968. M. Riedmiller and H. Braun, "A direct adaptive method for faster backpropagation learning: The RPROP algorithm," in Proc. IEEE Int. Conf. Neural Netw., vol.
  969. K.Viswanath and R.Gunasundari, "Design and analysis performance of Kidney Stone Detection from Ultrasound Image by level Set Segmentation and ANN classification". IEEE digital explorer, pp: 407-414, 2014. ISBN No: 978-1-4799-3080-7/14/2014.
  970. Bernhard Hess, "Metabolic syndrome, obesity and kidney stone", 2090-598X, 2012 Arab Association of Urolog, Production and hosting by Elsevier B.V, 10,258-264.
  971. Hyun Wook Park, Todd Schoepflin, "Active Contour model with gradient directional information: Directional Snake", IEEE Transactions on circuits and systems for video technology, Vol.11, No.2, February 2001.
  972. Weidong Zhang, "Mesenteric Vasculature-Guided small Bowel Segmentation on 3-D CT", IEEE Transactions on Medical image, Vol. 32,No.11,Novenber 2013.
  973. Yan Nei Law and Hwee Huan, "A multiresolution Stochastic Level set method for Mumford-shah image segmentation", IEEE Transactions on image processing, Vol. 17,No.12, December 2013.
  974. R. Kimmel, "Fast edge integration," in Geometric Level Set Methods in Imaging, Vision and Graphics. New York: Springer-Verlag, 2003..
  975. Shijian Lu, Member, IEEE "Automated layer segmentation of optical coherence tomography images", IEEE Transactions on biomedical engineering, Vol.57, No. 10 October 2010.
  976. Thord Anderrson, Gunnar Lathen, "Modified Gradient search for level set based image segmentation". IEEE Transactions on image processing, Vol. 22,No.2, February 2013.
  977. Koushal Kumar "Artificial neural network for diagnosis of kidney stone disease". I.J. Information Technology and Computer Science, 2012,7,20-25.
  978. Linlin Shen and sen Jin " Three-Dimensional Gabor Wavelets for Pixels-Based Hyperspectral Imagery Classification", IEEE Transactions on Geoscience and remote sensing, Vol.49, No. 12. December 2011.
  979. Neil R. Owen "Use of acoustic scattering to monitor kidney stone fragmentation during shock wave lithotripsy", 2006 IEEE Ultrasonics Symposium, 1051- 0117/06.
  980. Cyril Prasanna Raj P "Design and analog VLSI Implementation of Neural Network Architecture for signal Processing", European Journal of Scientific Research ISSN 1450-216X Vol.27 No.2 (2009),pp.199- 216.
  981. Xinjian Chen "FEM-Based 3-D tumor growth prediction for kidney tumor", IEEE Transactions on biomedical engineering, Vol.58, No.3, March 2011.
  982. P.R. Tamilselvi, "Computer aided diagnosis system for stone detection and early detection of kidney stones", Journal of Computer Science 7(2):250-254,2011 ISSN 1549-3636.
  983. Fujun Wang, "An Improved Adaptive Genetic Algorithm for Image Segmentation and Vision Alignment Used in Microelectronic Bonding", IEEE Transactions on Mechatronics, Vol.19, No.3, 1083-4435, June 2013.
  984. Xinjian Chen "FEM-Based 3-D tumor growth prediction for kidney tumor", IEEE Transactions on biomedical engineering, Vol.58, No.3, March 2011.
  985. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 K.Viswanath has received his B.Tech. Degree in Electronics and Communication Engineering from J.N.T. University, Hyderabad, Andhra Pradesh in 2006, M.Tech Degree in VLSI Design J.N.T.University, Anantapur, Andhra Pradesh in 2010 and Diploma in ECE from Sri Venkateswara Govt.. Polytechnic, Tirupathi, Andhra Pradesh in 2001.Currently pursuing Ph.D in Pondicherry Engineering College, Pondicherry University. He is working as Associate. Professor in Department of Electronics and Communication Engineering, R.L.Jalappa Institute of Technology, Bangalore and member of IEEE. His research interests include: Low power VLSI, Bio-Medical applications and Image Processing.
  986. A.Amirthasaravanan, Paul Rodrigues, R. Sudhesh,"Machine Driven nnd Effectual Web Service Discovery by Hybrid Algorithm", International Conference on Mathematics and its Applications 2014 (ICMAA 2014), India, Applied Mathematical Sciences, Vol.no. 9, pp.3213 - 3225.2015.
  987. Bartlett, P., R. Bartlett, "Chameleons: Everything about Selection, Care, Nutrition, Diseases, Breeding, and Behavior", Barron's Educational Series.1995.
  988. Bouyakoub Fayal M'hamed, Belkhir Abdelkader,"Context-Aware Web Service Discovery Based on A Quantitative Similarity Measure", IJMECS, vol.5, no.8, pp. 27-42.2013.
  989. N. Budhiraja and K. Marzullo,"Highly-Available Services Using the Primary-Backup Approach", In Second Workshopon the Management of Replicated Data, pp. 47- 50.1992.
  990. Chaiyakul S., Limapichat K., Dixit A., and Nantajeewarawat E,"A Framework for Semantic Web Service Discovery and Planning", in IEEE Conference on Cybernetics and Intelligent Systems, pp.5.2006.
  991. Chameleon facts (2005) retrieved from http://www.softschools.com/facts/animals/ chameleon_facts/77/.
  992. Chuanchang, L. Yong, P. and Junliang, C, "Web Services Description Ontology-based Service Discovery Mode". In WI 2006: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, China.2006.
  993. E. Dekel, O. Frenkel, G. Goft, and Y. Moatti, "Easy: Engineering High Availability QoS in wServices", In 22nd
  994. Dey, A.K., Salber, D. Abowd, G.D, "A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications", anchor article of a special issue on Context-Aware Computing. Human- Computer Interaction (HCI) Journal, Vol. 16 (2-4), pp. 97- 166.2001.
  995. Dey, A.K., "Understanding and Using Context", Personal and Ubiquitous Computing Journal, Vol. 5 (1), pp. 4-7.2001.
  996. R. Friedman,"Caching Web Services in Mobile Ad- Hoc Networks: Opportunities and Challenges", In Second ACM International Workshop on Principles of Mobile Computing, pp. 90-96.2002.
  997. Grimm, S,"Discovery: Identifying relevant services", In Andreas (Eds), The Semantic Web Services: Concepts, Technologies and Applications, Springer-Verlag, Germany.2007.
  998. Kennedy, J. Eberhart, R, "Particle Swarm Optimization", Proceedings of IEEE International Conference on Neural Networks. IV. pp. 1942-1948.1995.
  999. Le Berre, François and Bartlett, Richard D,"The Chameleon Handbook", Barron's Educational Series. 3rd Edition. ISBN 0764141422.2009.
  1000. Nebil Ben Mabrouk,"QoS-aware Service-Oriented Middleware for Pervasive Environments", PhD thesis, UNIVERSITÉ PARIS 6, Écoledoctoraleinformatique, télécommunications, électronique.2012.
  1001. T. Rajendran, P. Balasubramanie, "An Optimal Agent- Based Architecture for Dynamic Web Service Discovery with QoS", Second International conference on Computing, Communication and Networking Technologies, IEEEXplore.2010.
  1002. Rompothong. P and Senivongse. T,"A query federation of UDDI registries", In ISICT 2003: the proceedings of the first International Symposium on Information and Communication Technologies, Ireland.2003.
  1003. Sastry Duri , Alan Cole , Jonathan Munson , Jim Christensen, "An approach to providing a seamless end- user experience for location-aware applications" Proceedings of the 1st international workshop on Mobile commerce, pp.20-25.2001.
  1004. WengeRong, Kecheng Liu, "A Survey of Context Aware Web Service Discovery: From User's Perspective", Fifth IEEE International Symposium on Service Oriented System Engineering.2010. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1005. P Buitelaar, D Olejnik, M Sintek. "A protégé plug-in for ontology extraction from text based on linguistic analysis." European Semantic Web Symposium. Springer Berlin Heidelberg, 2004, PP. 31-44.
  1006. N Cullot, R Ghawi, K Yétongnon. "DB2OWL: A Tool for Automatic Database-to-Ontology Mapping." In SEBD, 2007, pp. 491-494.
  1007. M Gagnon. "Ontology-based integration of data sources." Information Fusion, 2007 10th International Conference on. IEEE, 2007, pp. 1-8.
  1008. O Glorio, J Pardillo, JN Mazon. "Dawara: An eclipse plugin for using i* on data warehouse requirement analysis." 2008 16th IEEE International Requirements Engineering Conference. IEEE, 2008, pp. 317-318.
  1009. M Golfarelli, D Maio, S Rizzi. "A methodological framework for data warehouse design." Proceedings of the 1st ACM international workshop on Data warehousing and OLAP. ACM, 1998, pp. 3-9.
  1010. WH Inmon. Building the data warehouse. John wiley & sons, 2005.
  1011. P Jovanovic, O Romero, A Simitsis. "Ore: An iterative approach to the design and evolution of multi-dimensional schemas." Proceedings of the fifteenth international workshop on Data warehousing and OLAP. ACM, 2012, pp. 1-8.
  1012. R Kimball, R Merz. The data webhouse toolkit. Wiley, 2000.
  1013. DL Moody, MAR Kortink. "From enterprise models to dimensional models: a methodology for data warehouse and data mart design." DMDW. 2000, p. 5
  1014. J Moreira, K Cordeiro, ML Campos. "OntoWarehousing- multidimensional design supported by a foundational ontology: a temporal perspective." International Conference on Data Warehousing and Knowledge Discovery. Springer International Publishing, 2014, pp. 35-44.
  1015. L Niedrite, D Solodovnikova, M Treimanis. "Goal-driven design of a data warehouse-based business process analysis system." Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases. 2007, pp. 243- 249.
  1016. NF Noy, MA Musen. "The PROMPT suite: interactive tools for ontology merging and mapping." International Journal of Human- Computer Studies, vol. 59, no. 6, pp. 983-1024, Dec. 2003.
  1017. JM Pérez, R Berlanga, MJ Aramburu, TB Pedersen. "Integrating data warehouses with web data: A survey." IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 7, pp.940-955, 2008.
  1018. O Romero, A Abelló. "A framework for multidimensional design of data warehouses from ontologies." Data & Knowledge Engineering, vol. 69, no. 11, pp. 1138-1157, 2010.
  1019. O Romero, A Simitsis, A Abelló. "GEM: requirement-driven generation of ETL and multidimensional conceptual designs." International Conference on Data Warehousing and Knowledge Discovery. Springer Berlin Heidelberg, pp. 80-95, 2011.
  1020. C Rosenkranz, R Holten, M Räkers and W Behrmann. "Supporting the design of data integration requirements during the development of data warehouses: a communication theory-based approach." European Journal of Information Systems (2016).
  1021. K Selma, B Ilyès, B Ladjel, S Eric, J Stéphane and B Michael, "Ontology-based structured web data warehouses for sustainable interoperability: requirement modeling, design methodology and tool." Computers in Industry, vol. 8, no. 63, pp. 799-812, 2012.
  1022. J Wang, JL Kourik. "Data Warehouse Snowflake Design and Performance Considerations in Business Analytics." Journal of Advances in Information Technology, vol. 6, no.4, 2015.
  1023. R Winter, B Strauch. "Information requirements engineering for data warehouse systems." Proceedings of the 2004 ACM symposium on Applied computing. ACM, pp. 1359-1365, 2004.
  1024. L Frias, A Queralt & A.O. Ramon. "EU-Rent car rentals specification, Technical University of Catalonia (UPC): Barcelon, pp.159, 2003.
  1025. Y Guo, Z Pan, J.Heflin. "LUBM: A benchmark for OWL knowledge base systems", Science, Services and Agents on the World Wide Web", vol. 3, no. 2, pp.158-182, 2005.
  1026. S. Lohr, "The age of big data," N. Y. Times, vol. 11, 2012.
  1027. S. Madden, "From Databases to Big Data.," IEEE Internet Comput., vol. 16, no. 3, 2012.
  1028. P. Zikopoulos, C. Eaton, and others, Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media, 2011.
  1029. A. McAfee, E. Brynjolfsson, T. H. Davenport, D. J. Patil, and D. Barton, "Big data," Manag. Revolut. Harv. Bus Rev, vol. 90, no. 10, pp. 61-67, 2012.
  1030. R. Appuswamy, C. Gkantsidis, D. Narayanan, O. Hodson, and A. Rowstron, "Scale-up vs Scale-out for Hadoop: Time to rethink?," in Proceedings of the 4th annual Symposium on Cloud Computing, 2013, p. 20.
  1031. A. S. Tanenbaum and M. Van Steen, Distributed systems. Prentice-Hall, 2007.
  1032. C. P. Chen and C.-Y. Zhang, "Data- intensive applications, challenges, techniques and technologies: A survey on Big Data," Inf. Sci., vol. 275, pp. 314-347, 2014.
  1033. T. B. Murdoch and A. S. Detsky, "The inevitable application of big data to health care," Jama, vol. 309, no. 13, pp. 1351- 1352, 2013.
  1034. I. Mashal, O. Alsaryrah, and T.-Y. Chung, "Performance evaluation of recommendation algorithms on Internet of Things services," Phys. Stat. Mech. Its Appl., vol. 451, pp. 646-656, 2016.
  1035. K. Shvachko, H. Kuang, S. Radia, and R. Chansler, "The hadoop distributed file system," in 2010 IEEE 26th symposium on mass storage systems and technologies (MSST), 2010, pp. 1-10.
  1036. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1037. J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, no. 1, pp. 107-113, 2008.
  1038. J. Y. Monteith, J. D. McGregor, and J. E. Ingram, "Hadoop and its Evolving Ecosystem.," in IWSECO@ ICSOB, 2013, pp. 57-68.
  1039. K. Ting and J. J. Cecho, Apache Sqoop Cookbook. O'Reilly Media, Inc., 2013.
  1040. S. Hoffman, Apache Flume: Distributed Log Collection for Hadoop. Packt Publishing Ltd, 2013.
  1041. S. Haloi, Apache ZooKeeper Essentials. Packt Publishing Ltd, 2015.
  1042. M. K. Islam and A. Srinivasan, Apache Oozie: The Workflow Scheduler for Hadoop. O'Reilly Media, Inc., 2015.
  1043. C. Olston, B. Reed, U. Srivastava, R. Kumar, and A. Tomkins, "Pig latin: a not- so-foreign language for data processing," in Proceedings of the 2008 ACM SIGMOD international conference on Management of data, 2008, pp. 1099-1110.
  1044. H. Bansal, S. Mehrotra, and S. Chauhan, Apache Hive cookbook. Packt Publ., 2016.
  1045. E. Alpaydin, Introduction to machine learning (adaptive computation and machine learning series). The MIT Press Cambridge, 2004.
  1046. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1047. Von Ahn, Luis, et al. CAPTCHA: Using hard AI problems for security. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg, 2003.
  1048. Kaur, Kiranjot, and Sunny Behal. "CAPTCHA and Its Techniques: A Review." Kiranjot Kaur et al,/(IJCSIT) International Journal of Computer Science and Information Technologies, pp. 6341 -6344, 2014.
  1049. Yan, Jeff, and Ahmad Salah El Ahmad. Breaking visual CAPTCHAs with naive pattern recognition algorithms. Proceedings of Computer Security Applications Conference, 2007.
  1050. Lv, Gang. Recognition of multi-fontstyle characters based on convolutional neural network. Proceedings of Fourth International Symposium on Computational Intelligence and Design, vol. 2, 2011.
  1051. Gaurav, Dinesh Dileep, and Renu Ramesh. A feature extraction technique based on character geometry for character recognition. arXiv preprint arXiv:1202.3884, 2012.
  1052. Rui, Chen, Yang Jing, Hu Rong-gui, and Huang Shu- guang. A novel LSTM-RNN decoding algorithm in CAPTCHA recognition. Proceedings of Third International Conference on Instrumentation, Measurement, Computer, Communication and Control, pp. 766-771, 2013.
  1053. Rusu, A., Thomas, A., and Govindaraju, V. Generation and use of handwritten CAPTCHAs. International Journal on Document Analysis and Recognition, vol. 13, no. 1, pp. 49-64, 2010.
  1054. Patel, C. I., Patel, R., and Patel, P. Handwritten Character Recognition using Neural Network. International Journal of Scientific and Engineering Research, vol. 2, no. 4, pp. 76-81, 2011.
  1055. Wang, S. (2011). A review of gradient-based and edge- based feature extraction methods for object detection. Proceedings of 11th IEEE International Conference on Computer and Information Technology, pp. 277-282, 2011.
  1056. Aggarwal, A., Rani, R., and Dhir, R. Handwritten Devanagari character recognition using Gradient features. International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 5, pp. 85-90, 2012.
  1057. Kala, R., Vazirani, H., Shukla, A., and Tiwari, R. Offline handwriting recognition using genetic algorithm. arXiv preprint arXiv:1004.3257, 2010. AUTHORS PROFILE Umadevi K S is Assistant Professor (Senior) at the networking division of School of computing sciences and engineering at Vellore Institute of Technology, Vellore. Along with vast teaching experience and mentoring , her research interests includes Personal area networks, Network virtualization, Wireless Sensor networks , Distributed computing and Protocol Engineering. Dharmendra Singh Chandel was a student of VIT University, Vellore. His interest is in computer networks and web designing. He was an active member of creation club at VIT University. Currently he is a trainee at Cisco Labs.
  1058. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1059. S. Banerjee, P. Mitra, K. Sugiyama. "Multi-document abstractive summarization using ILP based multi-sentence compression". InProceedings of the 24th International Conference on Artificial Intelligence, 2015, pp. 1208-1214.
  1060. R. Mihalcea, P. Tarau. "TextRank: Bringing order into texts". Association for Computational Linguistics.
  1061. L. Page, S. Brin, R. Motwani, T. Winograd. "The PageRank citation ranking: bringing order to the web".
  1062. N. Munot, S. S. Govilkar. "Comparative study of text summarization methods". International Journal of Computer Applications. 2014 Jan 1;102(12).
  1063. S. Sripada, V. G. Kasturi, G. K. Parai. "Multi-document extraction based Summarization". CS 224N, Final Project. 2005.
  1064. N. Chaudhary, S. Kapoor. "Key Phrase Extraction Based Multi- Document Summarization". International Journal of Engineering Trends and Technology (IJETT). 2014;13, pp.148-153.
  1065. T. H. Haveliwala. "Topic-sensitive pagerank". InProceedings of the 11th international conference on World Wide Web 2002 May 7, pp. 517-526.
  1066. S.Bird, "NLTK: the natural language toolkit". In Proceedings of the COLING/ACL on Interactive presentation sessions, 2006, 69-72.
  1067. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1068. C. B. Callaway, J. C. Lester. "Narrative prose generation". Artificial Intelligence. 2002 Aug 31;139(2), pp. 213-252.
  1069. S. Bird, R. Dale, B. J. Dorr, B. R. Gibson, M. Joseph, M.Y. Kan, D. Lee, B. Powley, D. R. Radev, Y.F Tan. "The ACL Anthology Reference Corpus: A Reference Dataset for Bibliographic Research in Computational Linguistics". InLREC, 2008.
  1070. M. F. Porter. "An algorithm for suffix stripping". Program. 1980 Mar 1,14(3), pp.130-137.
  1071. C. Jiang, F. Coenen, R. Sanderson, M. Zito. "Text classification using graph mining-based feature extraction". Knowledge-Based Systems. 2010 May 31, 23(4) pp. 302-308.
  1072. T. J. Cole, M. C. Bellizzi, K. M. Flegal, "Dietz WH. Establishing a standard definition for child overweight and obesity worldwide: international survey". Bmj. 2000 May 6;320(7244), pp.1240.
  1073. N. Jain, V. Srivastava. "Data Mining techniques: A survey paper". IJRET: International Journal of Research in Engineering and Technology. 2013 Nov, 2(11), pp.2319-1163.
  1074. U. Springer. "The market for tradable GHG permits under the Kyoto Protocol: a survey of model studies". Energy Economics. 2003 Sep 30, 25(5), pp.527-551.
  1075. N. Chaudhary, S. Kapoor. "Key Phrase Extraction Based Multi- Document Summarization". International Journal of Engineering Trends and Technology (IJETT). 2014;13, pp.148-153.
  1076. I. U. Vadim. "Survey paper variable structure systems with sliding modes". IEEE Transactions on Automatic control. 1977 Apr, 22(2), pp.212-222.
  1077. M. M. Solomon,J. Desrosiers. "Survey paper-time window constrained routing and scheduling problems". Transportation science. 1988 Feb, 22(1), pp.1-13.
  1078. D. A. Knoll, D. E. Keyes. "Jacobian-free Newton-Krylov methods: a survey of approaches and applications". Journal of Computational Physics. 2004 Jan 20,193(2), pp.357-397..
  1079. A. Islam, D. Inkpen. "Semantic text similarity using corpus-based word similarity and string similarity". ACM Transactions on Knowledge Discovery from Data (TKDD). 2008, Jul 1;2(2) pp.10.
  1080. J. Ellson, E. Gansner, L. Koutsofios, S. C. North, G. Woodhull. "Graphviz-open source graph drawing tools". InInternational Symposium on Graph Drawing 2001 Sep 23, pp. 483-484.
  1081. C. Strapparava and R. Mihalcea, "Learning to identify emotions in text," In Proceedings of the 2008 ACM Symposium on Applied Computing, pp. 1556-1560, March 2008.
  1082. C. O. Alm, D.Roth and R. Sproat, "Emotions from text: machine learning for text-based emotion prediction," In Proceedings of the conference on human language technology and empirical methods in natural language processing. Association for Computational Linguistics, pp. 579-586, October 2005.
  1083. C. D. Manning and H. Schütze, Foundations of Statistical Natural Language Processing, vol. 999.MIT Press: Cambridge, 1999.
  1084. C. H. Wu, Z. J. Chuang and Y. C. Lin, "Emotion recognition from text using semantic labels and separable mixture models," ACM Transactions on Asian Language information Processing (TALIP), vol.5(2), pp.165- 183, 2006
  1085. D. Ghazi, D. Inkpen and S. Szpakowicz, "Hierarchical versus flat classification of emotions in text," In Proceedings of the NAACL HLT 2010 workshop on computational approaches to analysis and generation of emotion in text, Association for Computational Linguistics. Association for Computational Linguistics, pp. 140-146, June 2010.
  1086. D. Das and S. Bandyopadhyay, "Word to sentence level emotion tagging for Bengali blogs," In Proceedings of the ACL-IJCNLP 2009 Conference Short Papers, Association for Computational Linguistics, pp. 149-152 20, August 2009.
  1087. P. Ekman, "An argument for basic emotions. Cognition & emotion," vol.6(3-4), pp.169-200,1992.
  1088. J. R. Bellegarda, "Emotion analysis using latent affective folding and embedding," In Proceedings of the NAACL HLT 2010 workshop on computational approaches to analysis and generation of emotion in text, Association for Computational Linguistics, pp. 1-9, June 2010.
  1089. J. Minato, D. B. Bracewell, F. Ren and S. Kuroiwa, S, "Japanese emotion corpus analysis and its use for automatic emotion word identification," Engineering Letters, vol.16(1), pp.172-177, 2008.
  1090. P. S. Sreeja and G. S. Mahalakshmi, "Applying vector space model for poetic emotion recognition," Advances in Natural and Applied Sciences, vol. 9(6 SE), pp.486-491, 2015.
  1091. P.S. Sreeja and G. S. Mahalakshmi, "Comparison of Probabilistic Corpus- Based Method and Vector Space Model for Emotion Recognition from Poems," Asian Journal of Information Technology, vol.15(5), pp.908- 915, 2016.
  1092. M. Ghosh, The Natya Shastra (English Translation), vol.1 (Chapters I- XXVII). The Royal Asiatic Society of Bengal: Calcutta, 1950.
  1093. V. REFERENCES
  1094. Adrian, P. and Zanintge, D. (1996) "Data Mining. Reading: Addison-Wesley".
  1095. Aggarwal, C.C. ( 003) ,"Towards Systematic Design of Distance Functions for Data Mining Applications", SIGKDD '03, August 24-27, Washington, DC, USA
  1096. Ahmad, A. and Dey, L. ( 007) ,"A K-mean clustering algorithm for mixed numeric and categorical data", Dataand Knowledge Engineering Elsevier Publication, vol. 63, pp 503-527.
  1097. Boris Milovic, Milan Milovic ( 0 ) , "Prediction and Decision Ma ing in Health Care using Data Mining", International Journal of Public Health Science (IJPHS) Vol. 1, No. 2, ISSN: 2252-8806, December 2012, pp.69- 78 .
  1098. Jiewei Han and Micheline Kamber ", Data Mining Concepts and Techniques", 2000 , Morgan Kaufmann Publishers 6. Fayyad, U., Piatetsky-Shapiro, G. and Smyth, P. ( 996), "The KDD process for extracting useful nowledge from volumes of data", Communications of The ACM, Vol. 39, pp. 27-34.
  1099. Frawley. W.J., Piatetsky-Shapiro, G. and Matheus, C. . ( 99 ) ,"Knowledge discovery in databases: an overview", AI Magazine, Fall., pp. 57-70.
  1100. Ganti, V., Gehr e, . and Rama rishnan, R. ( 999) ,"Mining very large databases", IEEE Computer, Vol.32, pp. 38-45.
  1101. Glymour, C., Madigan, D., Pregibon, D. and Smyth, P. ( 997), "Statistical themes and lessons for data mining", Data Mining and Knowledge Discovery, Vol.1, pp. 11-28.
  1102. Han, E.H., Karypis, G. and Kumar, V. (2000), "Scalable Parallel Data Mining for Association Rules", IEEETransactions on Knowledge and Data Engineering , Vol.12, pp. 337-352.
  1103. ohn G.H., Miller, P., and Kerber R. ( 999), "Stoc selection using rule induction" IEEE Expert11, October , pp. 52-58.
  1104. Jyoti Yadav and Monika Sharma(2013), "A Review of K- mean Algorithm". International Journal ofEngineering Trends and Technology (IJETT) -Volume 4 Issue 7-July, pp.2972-2976.
  1105. Huang, Z. ( 998) ,"Data Mining and Knowledge Discovery " , Vol. , No. 3, pp. 83-304.
  1106. Huang, W., Tsai, W. T. and Bhattacharya, S., Chen, X . P., Wang Y., and Sun J. ( 996) ,"Business rule extraction from legacy code", IEEE Proceedings of 20 th International Conference on Computer Software and Applications, PSAC'96, pp. 6-167.
  1107. Matheus, C.J., Chan, P.C., and Piatetsky-Shapiro, G. ( 993), "Systems for nowledge discovery in databases" , IEEE Transactions on Knowledge and Data Engineering 5, pp.903-913.
  1108. Ohm mar san, Van-nam hyung(004) , "An Alternative Extension Of K-means Categorical Data", Int. . Appl. Math. Computer. Science. Vol. 14, No.2, pp. 241-247.
  1109. Pra ash Mahindra ar and Dr. M. Hanumanthappa ( 0 3), "Data Mining In Healthcare: A Survey of Techniques and Algorithms with Its Limitations and Challenges", ournal of Engineering Research and Applications ISSN: 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.937-941
  1110. Xiag Ying Wang, onatham M.Garibaldi ( 005), "Simulated Annealing fuzzy clustering in Cancer diagnosis", Informatica, Vol. 29, pp.61-70.
  1111. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1112. Larranaga, P., and et al. (1999) Genetic algorithms for the Travelling Salesman Problem: A Review of Representations and Operators. Artificial Intelligence Review
  1113. Varunika Arya and et. al. "An optimal solution to multiple travelling salesperson problem using modified genetic algorithm", International Journal of Application or Innovation in Engineering & Management (IJAIEM), , January 2014 , Volume 3, Issue 1ISSN 2319 -4847
  1114. Juan S and et. Al., "Solving of School Bus Routing Problem by Ant Colony Optimization", scielo, ISSN 1794-1237
  1115. Desrosier, J, Ferland, J. A, Rousseau, J. M, Lapalme, G. and Chapleau, L, "An overview of a school busing system. In: Scientific management of transportation systems. Jaiswal, N. K. (ed.). Amsterdam: North- Holland, 1981. Pp. 235-243.
  1116. Fügenschuh, A, "Solving a school bus scheduling problem with integer programming". European Journal of Operational Research, 2009, vol. 193, No. 3, pp. 867-884.
  1117. R.Lakshmi and G. Kumaravelan, "Development of a Novel Gene Repair Operator for Genetic Algorithms for Permutation Problems", International Journal of Control Theory and Applications (IJCTA), March 2016, Vol. 9, Issue 3, ISSN : 09745572, pp. 117-126
  1118. R. Lakshmi and K. Vivekanandan, "Performance Analysis of Linkage Learning Techniques in Genetic Algorithms", International Journal of Research in Engineering and Technology, Volume 02, Issue: 12, Dec 2013, EISSN: 2319-1163, PISSN: 2321-7308.
  1119. Beasley.D, Bull, and Martin .R. (1993). An Overview of genetic algorithms: Part 1, Fundamentals, University Computing, vol. 2, pp. 58- 69, 1993.
  1120. R. Lakshmi and K. Vivekanandan, "Interference Induced Silencing in Travelling Salesperson Problem using Linkage Learning Genetic Algorithm", International Journal of Engineering & Science and Research (IJESR), Volume 3, Issue 3, March 2013, ISSN: 2277- 2685.
  1121. Milena Karova, "Genetic operators crossover and mutation in solving the TSP problem", 2005.
  1122. R. Lakshmi and K. Vivekanandan, "A Novel Hybrid Crossover Operator for Genetic Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 4, Issue 4, March 2014, ISSN: 2277 -128X.
  1123. Alfonsas Misevičius, Bronislovas Kilda, "Comparison of Crossover Operators for the Quadratic assignment problem", Journal of Information Technology and Control, 2005, Vol.34, ISSN: 1392 - 124x.
  1124. Alan Piszcz, Terence Soule, "A Survey of Mutation Techniques in Genetic Programming", ACM, 59593-186.
  1125. Nitasha Soni, Tapas Kumar, "Study of Various Mutation Operators in Genetic Algorithms", International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4519-4521, ISSN 0975 -9646
  1126. R. Lakshmi and K. Vivekanandan, "A Novel Methodology for Genetic Algorithms in Crossover Operation: Segment Replacement Operator", International Journal of Innovative Research & Developmentì, Jan 2014, Volume 2, Issue 14, ISSN: 2278 -0211
  1127. Victer Paul, P., and et al. (2013). Effective VE Population Initialization Technique for Permutation-Coded Genetic Algorithm. International Journal of Computer Science and Electronics Engineering (IJCSEE), Vol. 1, Issue 3, ISSN 2320- 401X; EISSN: 2320-4028.
  1128. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1129. K. Zvelebil: "The smile of Murugan": On Tamil literature of south India. Brill, 1973.
  1130. M. Aronoff, K. Fudeman: "What is morphology", vol. 8. John Wiley & Sons, 2011.
  1131. T. Ritchey: "General morphological analysis (gma)". In: Wicked problems-Social messes, pp. 7-18, 2011.
  1132. J. B. Antony, G. S. Mahalakshmi: "Named entity recognition for tamilbiomedical documents". In: Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on. pp. 1571- 1577, 2014.
  1133. P. Anandan, K. Saravanan, R. Parthasarathi, T. V. Geetha: "Morphological analyzer for tamil". In: International Conference on Natural language Processing , 2002.
  1134. J. B. Antony, G. S. Mahalakshmi: "Content-based information retrieval by named entity recognition and verb semantic role labelling". Journal of universal computer science, 21, pp. 1830-1848, 2015.
  1135. J. B. Antony, G. S. Mahalakshmi: "Challenges in morphological analysis of tamil biomedical texts". Indian Journal of Science and Technology 8(23), pp. 1-4, 2015.
  1136. E. Umamaheswari, K. Ranganathan, T. V. Geetha, R. Parthasarathi, M. Karky: "Enhancement of morphological analyzer with compound, numeral and colloquial word handler". In: Proceedings of ICON-2011: 9 th International Conference on Natural Language Processing, Macmillan Publishers, India, 2011.
  1137. R. Akilan, E. Naganathan: "Morphological analyzer for classical tamil texts: A rule-based approach". International Journal of Innovative Science Engineering and Technology 1(5), pp. 563-568, 2014.
  1138. M. A. Kumar, V. Dhanalakshmi, K. Soman, S. Rajendran: "A sequence labeling approach to morphological analyzer for tamil language". International Journal on Computer Science and Engineering 2(06), pp. 1944-1951, 2010.
  1139. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1140. T. Mokanarangan, T. Pranavan, U. Megala, N. Nilusija, G. Dias, S. Jayasena, S. Ranathunga: "Tamil morphological analyzer using support vector machines". In: International Conference on Applications of Natural Language to Information Systems. pp. 15-23, 2016.
  1141. S. L. Pandian, T. V. Geetha: "Morpheme based language model for tamil part-of-speech tagging". polibits (38), pp. 19-25, 2008. AUTHORS PROFILE Betina Antony J is a Research Scholar in the Department of Computer Science and Engineering in Anna University, Chennai, Tamilnadu, India. She finished her Bachelors (Computer Science and Engineering) in Sri Sivasubramania Nadar College of Engineering and her Post graduation (Software Engineering) in College of Engineering, Guindy, Anna University, in which she secured gold medal for being the first rank holder. She has presented many papers in national and international conferences. She is currently working on Named Entity Recognition for Tamil Biomedical texts. Her research interests are Natural Language Processing, Text and Data mining. G. S. Mahalakshmi is an Assistant Professor (Senior Grade) in the Department of Computer Science and Engineering, College of Engineering, Anna University, Chennai. She completed her B.E. (Computer Science and Engineering) from R.V.S. College of Engineering and Technology, Dindigul and M.E. (Computer Science and Engineering) and Ph.D. from College of Engineering, Anna University, Chennai. She has numerous international journal and conference publications to her credit. She is also the author of Tamil Edition of B.E. course -text books -Fundamentals of Computing and Computer Practice of Anna University. She has authored many book chapters and derives 100+ citations to her credit. Her research interests include Reasoning, Knowledge Sharing and representation, Text Mining, Social Network Analysis, bibliometrics, and Natural Language Computing.
  1142. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1143. Dr. Amit Agarwal, Saloni Jain," Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment", International Journal of Computer Trends and Technology (IJCTT) , Vol. 9 no. 7, Mar. 2014.
  1144. Vijaypal Singh Rathor1, R. K. Pateriya and Rajeev Kumar Gupta ,"An Efficient Virtual Machine Scheduling Technique in Cloud Computing Environment ",International Journal of Cloud-Computing and Super- Computing, pp.1-14, Vol.1, no.1 ,2014.
  1145. Tarun Goyal , Aakanksha Agrawal, "Dynamic scheduling of Data Using Genetic Algorithm in Cloud Computing", International Journal of Research in Engineering & Technology (IJRET) Vol. 1, Issue 1, June 2013, 7-12 © Impact Journals.
  1146. A.Kaleeswaran, V.Ramasamy, P.Vivekanandan ," Host Scheduling Algorithm Using Genetic Algorithm In Cloud Computing Environment", International Journal of Advances in Engineering & Technology, Jan. 2013. ©IJAET
  1147. Binitha S, S Siva Sathya ," A Survey of Bio inspired Optimization Algorithms",International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Vol. 2, Issue.2, May 2012.K. Elissa, "Title of paper if known," unpublished.
  1148. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, "Electron spectroscopy studies on magneto-optical media and plastic substrate interface," IEEE Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  1149. M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.
  1150. Etminani .K, and Naghibzadeh. M, "A Min-min Max-min Selective Algorithm for Grid Task Scheduling," The Third IEEE/IFIP International Conference on Internet, Uzbekistan, 2007.
  1151. MedhatTawfeek, Ashraf El-Sisi, ArabiKeshk and FawzyTorkey,"Cloud Task Scheduling Based on Ant Colony Optimization", The International Arab Journal of Information Technology, vol. 12, no. 2, Mar. 2015 .
  1152. Salim Bitam,"Bees Life Algorithm For Job Scheduling In Cloud Computing",International Conference on Communications and Information Technology(ICCIT),2012.
  1153. Omid Jafarzadeh-Shirazi, " Task Scheduling With Firefly Algorithm In Cloud Computing" ,Sci.Int.(Lahore), 27(1) , pp. 167-171, 2014.
  1154. Yue Miao, Fu Rao and Luo Yu,"Research on the Resource Scheduling of the Improved SFLA in Cloud Computing", International Journal of Grid Distribution Computing(IJGDC), vol. 8, no. 1, pp.101-108, 2015.
  1155. Liji Jacob, "Bat Algorithm for Resourse Scheduling In Cloud Computing", International Journal for Research in Applied Science and Engineering Technology(IJRASET), vol. 2 ,Issue IV , Apr. 2014.
  1156. Bhoi U, and Ramanujam P.N., "Enhanced Max-Min Task Scheduling Algorithm in Cloud Computing", International Journal of Application or Innovation in Engineering and Management(IJAIEM), pp. 259-264, ISSN:2319-4847, 2013.
  1157. Jing Liu, Xing-Guo Luo, Xing-Ming Zhang, Fan Zhang and Bai-Nan Li, "Job Scheduling Model for Cloud Computing Based on Multi-Objective Genetic Algorithm ", I.J.of Computer Science Engineering and Information Technology, November 2014.
  1158. V.Geetha R.Aruna Devi T. Ilavenil S.Marjana Begum S. Revathi, "Performance Comparison of Cloudlet Scheduling Policies", International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS) 24-26, February, 2016 , Thanjavur, Tamil Nadu, India. Proceedings in IEEE xplore.
  1159. Havens TC, Spain CJ, Salmon NG, Keller JM. Roach infestation optimization. In Swarm Intelligence Symposium, 2008. SIS 2008. IEEE 2008 Sep 21, 1-7, IEEE.
  1160. Feng, X. , Lau, F.C.M. , Gao, D. 'A new bio-inspired approach to the traveling salesman problem'. in Complex Sciences, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 2009, 02, 5, Springer Berlin Heidelberg, 1310-1321.
  1161. Das, S. , Biswas, A. , Dasgupta, S. , Abraham, A. (2009). Bacterial Foraging Optimization Algorithm: Theoretical Foundations, Analysis, and Applications, Volume 203/2009 of Studies in Computational Intelligence. Springer Berlin/Heidelberg, 23-55.
  1162. Subramanian, C., Subramanian, K. and Sekar, A.S.S., 2012. A New Parameter Free Meta-Heuristic Algorithm for Continuous Optimization: African Wild Dog Algorithm. European Journal of Scientific Research, 92(3), pp.348-356. AUTHORS PROFILE Vaithianathan Geetha is working as Associate Professor in the department of Information Technology at Pondicherry Engineering College, Puducherry, India. She has published several papers in reputed International Journals. Her areas of interest are Distributed Computing, Cloud Computing, Health care, Affective Computing, Internet of Things Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1163. D. Sitompul, S. Randhawa. Nurse scheduling models: A state-of-the- art review. Journal of the Society of Health Systems, 2 (1990), pp. 62- 72
  1164. R. Hung. Hospital nurse scheduling. Journal of Nursing Administration, 25 (7/8) (1995), pp. 21-23
  1165. Edmund K. Burke, Patrick De Causmaecker, Sanja Petrovic, and Greet Vanden Berghe. Variable neighbourhood search for nurse rostering problems. Metaheuristics: Computer Decision-Making, pages 153-172, 2003.
  1166. E .K. Burke, P. De Causmaecker, G. Vanden Berghe and H. Van Landeghem. The state of the art of nurse rostering, Journal of Scheduling, 7, 441-499, 2004
  1167. P. Brucker, E.K. Burke, T. Curtois, R. Qu and G. Vanden Berghe. Adaptive construction of nurse schedules: A shift sequence based approach. Under review at European Journal of Operational Research. Technical Report NOTTCS-TR-2007-1, School of Computer Science, University of Nottingham
  1168. M. Warner, "Scheduling Nursing personnel according to Nursing preference: A mathematical programming approach," Operations Research, 24, 1976, pp. 842-856.
  1169. R. Silvestro and C. Silvestro, "An evaluation of nurse rostering practices in the National Health Service," Journal of Advanced Nursing, 32(3), 2000, pp.525-535.
  1170. M.L. Miller, "Implementing self-scheduling," The Journal of Nursing Administration, 14, 1984, pp. 33-36.
  1171. K.K. Ringl and L. Dotson, "Self-scheduling for professional Nurses," Nursing Management, 20, 1989, pp.42-44.
  1172. D. Karaboga, An Idea Based on Honey Bee Swarm for Numerical Optimization,Techn. Rep. TR06, Erciyes Univ. Press, Erciyes, 2005.
  1173. D. Karaboga, B. Gorkemli, C. Ozturk, N. Karaboga, A comprehensive survey:artificial bee colony (abc) algorithm and applications, Artif. Intell. Rev. (2012)1-37.
  1174. A.L. Bolaji, A.T. Khader, M.A. Al-Betar, M.A. Awadallah, University coursetimetabling using hybridized artificial bee colony with hill climbing optimizer,J. Comput. Sci. 5 (5) (2014) 809-818.
  1175. A. Bolaji, A. Khader, M. Al-Betar, M. Awadallah, Artificial bee colony, its variantsand applications: a survey, J. Theor. Appl. Inf. Technol. 47 (2) (2013) 434-459.
  1176. I. Berrada, J.A. Ferland et P. Michelon, "A Multi-objective Approach for Nurse Scheduling with both Hard and Soft Constraints". Socio- Econ. Plann. Sci., 30, p. 183-193. 1996.
  1177. Cheang, B., Li, H., Lim, A. & Rodrigues, B. Nurse rostering problems -a bibliographic survey, European Journal of Operational Research 151(3): 447-460. 2003.
  1178. E. Burke, P. De Causmaecker, G. Vanden Berghe, and H. Van Landeghem, "The State of the Art of Nurse Rostering". Journal of Scheduling,7, 2004, pp. 441-499.
  1179. G. Ochoa, M. Hyde, T. Curtois, J.A. Vazquez-Rodriguez, J.Walker, M. Gendreau, G. Kendall, B. McCollum, A. Parkes, S. Petrovic, and E.K. Burke, "HyFlex: A Benchmark Framework for Cross-Domain Heuristic Search", Proceedings of the European Conference on Evolutionary Computation in Combinatorial Optimization (EvoCOP 2012), 7245, 2012, 136-147.
  1180. B. Jaumard; F. Semet et T. Vovor, Generalized Linear Programming Model for Nurse Scheduling. Europen Journal Of Opeluitaonal Research, 107(1):1-18. May 1998
  1181. Dowsland, K.A. Nurse scheduling with tabu search and strategic oscillation. European Journal of Operation Research, 106(2-3):393- 407. 1998.
  1182. Brusco, M. J.,Jacobs, L. W. Cost analysis of alternative formulations for personnel scheduling in continuously operating organisations. European Journal of Operational Research, vol 86, pp. 249-261. 1995.
  1183. Valouxis, C.,Housos, E. Hybrid optimization techniques for the work shift and rest assignment of nursing personnel. Artificial Intelligence in Medicine, vol 20, pp. 155-175. 2000.
  1184. M.A. Awadallah, A.T. Khader, M.A. Al-Betar, A.L. Bolaji, Global best harmonysearch with a new pitch adjustment designed for nurse rostering, J. King SaudUniv. Comput. Inf. Sci. 25 (2) (2013) 145-162.
  1185. Z. Lü, J. Hao, Adaptive tabu search for course timetabling, Eur. J. Oper. Res. 200(1) (2010) 235-244.
  1186. Ruibin Bai, Edmund K. Burke, Graham Kendall, Jingpeng Li, and Barry McCollum, "A hybrid evolutionary approach to the nurse rostering problem", IEEE Transactions on Evolutionary computation, Vol. 14, No. 4, August 2011.
  1187. Fang He, Rong Qu, "A constraint programming based column generation approach to nurse rostering problems", International journal of Computers and Operations Research 39, 2012.
  1188. Nikola Todorovic and Sanja Petrovic,"Bee Colony Optimization Algorithm for Nurse Rostering", IEEE Transactions on systems, Man and Cybernetics systems, Vol, 43, No.2, March 2013.
  1189. Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Asajuh Laaro Bolaji, "Hybrid Harmony search for nurse rostering problems", Journal of information sciences, vol 233, pp 126-140, June 2013.
  1190. Ademir Aparecido Constantino, Dario Landa-Silva, Everton Luiz de Melo, Candido Ferreira Xavier de Mendonca, Douglas Baroni Rizzato, Wesley Romao, "A heuristic algorithm based on multi-assignment procedures for nurse scheduling", journal of Annals of operations research, vol 218, pp 165-183, 2014.
  1191. Mohammed A. Awadallah, Asaju Laaro Bolaji, Mohammed Azmi A- Betar, "A hybrid Artificial Bee Colony for a nurse rostering problem", Journal of Applied Soft Computing 35, 2015, pp-726-739.
  1192. Hamed Jafari, Nasser Salmasi, "Maximizing the nurses preferences in nurse scheduling problem: mathematical modeling and a meta-heuristic algorithm", journal of industrial engineering Interational, vol 11, Issue 3, pp 439-458, sep 2015.
  1193. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1194. K. Pagiamtzis and A. Sheikholeslami, "Content-Addressable Memory (CAM) Circuits and Architectures: A Tutorial and Survey", IEEE Journal of Solid-State Circuits, Vol. 41, No. 3, pp. 712-727, Mar. 2006.
  1195. Due-Hung Le, MasahiroSowa and Cong-KhaPham, "A Fully - Parallel Information Detection Hardware System Employing Content Addressable Memory," Proceedings of International Conference in communication and electronics , pp.447 -452, 2012.
  1196. H. Yamada, M. Hirata, H. Nagai, K. Takahashi, "A High-Speed String Search Engine" , IEEE Journal of Solid-State Circuits, Vol. 22, No. 5, pp. 829-834, Oct. 1987.
  1197. S.A. Guccione, D. Levi and D. Downs, "A Reconfigurable Content Addressable Memory," Proc. of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing, pp. 882- 889, 2000.
  1198. M.M.Soni, P. K. Dakhole, "FPGA Implementation of Content Addressable Memory Based Information Detection System" , International Conference on Communication and Signal Processing, April 3-5, 2014.
  1199. Haoyu Song, John W. Lockwood "Efficient packet classification for network intrusion detection using FPGA", International Symposium on Field-Programmable Gate Arrays (FPGA'05) ,Monterey ,CA, pp 20-22,Feb. 2005.
  1200. Hooman Jarollahi, Vincent Gripon, Naoya Onizawa,"Algorithm and Architecture for a Low-Power Content-Addressable Memory Based on Sparse Clustered Networks" IEEE transactions on Very Large Scale Integration (VLSI) systems, vol. 23, no. 4, April 2015.
  1201. J-L. Brelet, "Using Block RAM for High Performance Read/Write CAMs," Xilinx Inc., application Notes 204, May. 2000.
  1202. Kuo-Hsing Cheng, Chia-Hung Wei, JiannchyiRau,"Design of Low-Power Content Addressable Memory Cell", IEEE Journal of Solid-State Circuits ,vol 3,Oct 2003.
  1203. H. Nakahara, T. Sasao and M. Matsuura, "A CAM Emulator UsingLook-Up Table Cascades," Proc. 21st International Parallel andDistributed Processing Symposium (IPDPS 07), pp. 26-30, Mar. 2007.
  1204. Y. Utan, S.Wakabayashi, S.Nagayama, "An FPGA-based text search engine for approximate regular expression matching," Proc.International Conference on Field-Programmable Technology (FPT),pp.184-191, Dec. 2010.
  1205. Y.-J. Chang and Y.-H. Liao, "Hybrid-type CAM design for both power and performance efficiency," IEEE Transactions on Very Large Scale Integrations (VLSI) Systems, vol. 16, no. 8, Aug. 2008.
  1206. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1207. KeivanNavi, Amir Sabbagh Molahosseini, and Mohammad Esmaeildous," How to Teach Residue Number System to Computer Scientists and Engineers", IEEE Transactions on education, vol. 54, no. 1,pp.156-163, February 2011.
  1208. Cedric Walravens and WimDehaene, "Low-Power Digital Signal Processor Architecture for Wireless Sensor Nodes", IEEE Transactions on very large scale integration (VLSI) systems, vol. 22, no. 2, pp.313-320,February 2014.
  1209. Richard E. Ladner, Michael J. Fischer, "Parallel prefix computation",Journal of the Association for Computing Machinery, vol.27, no.4, pp.831-838,October 1980.
  1210. ThianFattTay, Chip-Hong Chang, and Jeremy Yung Shern Low, "Efficient VLSI Implementation of 2n Scaling of Signed Integer in RNS {2 n -1, 2 n , 2 n + 1}",IEEE Transactions on very large scale integration (VLSI) systems, vol. 21, no. 10,pp.1936-1940,October 2013.
  1211. Yuke Wang, Xiaoyu Song, MostaphaAboulhamid, Hong Shen, "Adder Based Residue to Binary Number Converters for {2 n -1, 2 n , 2 n + 1}", IEEE Transactions on signal processing, vol. 50, no. 7, pp.1772-1779,July 2002. P.Rajagopalan @ Sabarinathan was born in Puducherry, India, in 1993. He received the M.Tech degree in electronics and communication engineering from Pondicherry Engineering College, Puducherry, India, in 2016. His areas of research are VLSI and basic electronics. He is a life member of Indian Science Congress Association.
  1212. A.V.Ananthalakshmi is currently working as an Assistant Professor in the Department of Electronics and Communication Engineering, Pondicherry Engineering College, Puducherry, India. She completed Ph.D in the year 2015. Her research interests include CMOS VLSI, Reversible Logic and Computer Arithmetic Architecture. She has published papers in reputed journals and conferences.
  1213. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1214. P.Kundur, Power System Stability and Control, McGraw-Hill, Inc. 1993, pp.774-835.
  1215. P.K. Dash, A.C. Liew, B.R. Mishra, "An adaptive PID stabilizer for power systems using fuzzy logic", Electric Power Systems Research, Vol. 44, 1998, pp.213-222.
  1216. R. Segal, A. Sharma and M.L. Kothari, "A self-tuning power system stabilizer based on artificial neural network", Int. J. of Elec. Pow. & Energy Sys., Vol. 26, 2004, pp.423-430.
  1217. S. Duman and A. Ozturk, " Robust design of PID controller for power system stabilization by real coded genetic algorithm", Int. Rev. of Elec. Eng., Vol.5, 2010, pp.2159 -2170.
  1218. M.A. Abido and Y.L. Abdel-Magid, "Optimal design of power system stabilizers using evolutionary programming", IEEE T. on Energy Conv., Vol. 17, 2002, pp.429-436.
  1219. Zhe Sun, Ning Wang, Dipti Srinivasan and Yunrui Bi, "Optimal tuning of type -2 fuzzy logic power system stabilizers based on differential evolution algorithm", Int. J. of Elec. Pow. & Energy Sys., Vol. 62, 2014, pp.19-28.
  1220. B.S.Theja, A. Rajasekhar, D.P. Kothari, S.Das, "Design of PID controller based power system stabilizer using Modified Philip - Heffron's model: An artificial bee colony approach", IEEE Symposium on Swarm Intelligence (SIS), pp. 228-234, April 2013.
  1221. Sayed Mojtaba Shirvani Boroujeni, Reza Hemmati, Hamideh Delafkar, Amin Safarnezhad Boroujeni, "Optimal PID power system stabilizer tuning based on particle swarm optimization", Indian Journal of Science & Technology, Vol. 4, 2011 pp.379-383.
  1222. S.P. Ghoshal, P.K. Roy, S.S. Thakur, "Biogeography based optimization approach for optimal power flow problem considering valve loading effects", ACEEE Int. J. of Elec. & Pow. Eng., Vol. 1, 2010, pp. 48-53.
  1223. Rinku Scaria and Tissa Tom, "Active and reactive power compensation in distribution system based on Biogeography based optimization technique", Int. Conf. on Control Communication and Comp, pp.216- 220, December 2013,
  1224. K. Karthikeyan and P. Lakshmi, "Optimal design of PID controller for improving rotor angle stability using BBO", Int. Conf. on Modeling Optimization and Comp, Elsevier, 2012, pp.889-902.
  1225. K. Gowrishankar and P. Jagadeesh, "A Comparative Study of the Z-N, Adaptation Law and PSO Methods of Tuning the PID Controller of a Synchronous Machine", Int. Rev. of Modeling & Simulations, Vol. 7, 2014, pp.919 -926.
  1226. D.J.Simon, "Biogeography-Based Optimization", IEEE T. on Evolut. Comp., Vol. 12, 2008, pp. 702-713.
  1227. James H Brown, Brett R Riddle, Mark V Lomolino, Bio-geography, 3rd ed. Sunderland, Massachusetts, UK: Sinauer Associates Inc. 2009.
  1228. K.Gowrishankar and P.Jagadeesh, "BBO algorithm based tuning of PID controller for speed control of synchronous machine", Tur. J. of Elec. Eng. & Comp. Sci. Vol. 24, 2016, pp.: 3274 -3285.
  1229. Gowrishankar Kasilingam and Jagadeesh Pasupuleti, "Design of Coordinated Controller using BBO Algorithm for Synchronous Machine Speed Control", Australian Journal of Basic and Applied Sciences, Vol.10, 2016, pp.102-109.
  1230. Fig. 2. Simulink model of SMIB system Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1231. IRC Tentative Guidelines on the Provision of Speed Breakers for Control of Vehicular Speeds on Minor Roads, Abhinav Prints, Delhi, 1998.
  1232. M.Jain, A.P.Singh, S. Bali, andS. Kaul, "Speed-Breaker EarlyWarning System," presented at 6th USENIX Conf., Boston, 2012.
  1233. H. Potluri, H. (2011) Speed Bump Detection System. [online]. Available http://www.cvel.clemson.edu/auto/aue835 _projects_2011/potluri_project.html
  1234. A. Mednis, G. Strazdins, R. Zviedris, G. Kanonirs and L. Selavo, "Real time pothole detection using android smartphones with accelerometers," presented in International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, IEEE, pp. 1-6.
  1235. V. Astarita, V. Rosolino, I. Teresa, C. Maria Vittoria and P. Giofrè Vincenzo. "Automated sensing system for monitoring of road surface quality by mobile devices," in Procedia-Social and Behavioral Sciences, 2014, pp. 242-251.
  1236. J. Eriksson, L. Girod, B. Hull, R. Newton, S. Madden and H. Balakrishnan, "The pothole patrol: using a mobile sensor network for road surface monitoring," in Proc. 6th International Conference on Mobile systems, Applications, and Services, ACM, 2008, pp. 29-39.
  1237. P. Mohan, V. N. Padmanabhan and R. Ramjee. "Nericell: rich monitoring of road and traffic conditions using mobile smartphones." in Proc. 6th ACM conference on Embedded network sensor systems, ACM, 2008, pp. 323-336.
  1238. M. Perttunen, O. Mazhelis, F. Cong, M. Kauppila, T. Leppänen, J. Kantola, J. Collin et al. "Distributed road surface condition monitoring using mobile phones," in Proc. International Conference on Ubiquitous Intelligence and Computing, Springer, Berlin Heidelberg, 2011, pp. 64-78.
  1239. R. Bhoraskar, N. Vankadhara, B. Raman and P. Kulkarni, "Wolverine: Traffic and Road Condition Estimation Using Smartphone Sensors," in Proc. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), IEEE, 2012, pp. 1-6.
  1240. Murakami, T., Takahashi, K, "Fast and Accurate Biometric Identification Using Score Level Indexing and Fusion", Biometrics (IJCB), International Joint Conference, IEEE, pp. 1 -8, October 2011.
  1241. Ajay Kumar, Yingbo Zhou, "Human Identification Using Finger Images", IEEE Transactions on image processing, vol. 21, no. 4, pp. 2228-2244, April 2012.
  1242. Davide Maltoni, Dario maio, Anil K Jain, Salil Prabhakar, " Hand book of finger print Recognition", 6 th edition , pp.98-168, March 2009.
  1243. M. Kalaivani, M. S. Jeyalakshmi, Aparna.V, "Extraction of Retinal Blood Vessels using Curvelet Transform And Kirsch's Templates", International Journal of Emerging Technology and Advanced Engineering, vol. 2, pp. 360 - 363 November 2012.
  1244. Anil K. Jain, Fellow, Jianjiang Feng, Member, "Latent Fingerprint Matching", IEEE Transactions on pattern analysis and machine intelligence, vol. 33, no. 1, pp. 88-100, January 2011.
  1245. Diego Marín, Arturo Aquino, Manuel Emilio Gegundez-Arias, José Manuel Bravo, "A New Supervised Method for Blood Vessel Segmentation in Retinal Images by Using Gray-Level and Moment Invariants-Based Features", IEEE Transactions on medical imaging, vol. 30, no. 1, pp. 146- 158, January 2011.
  1246. Gyaourova, A., Ross, A, "A coding scheme for indexing multimodal biometric databases", Computer Vision and Pattern Recognition Workshops, IEEE Computer Society Conference, pp. 93 -98, June 2009.
  1247. Jayaraman, U.,Prakash, S.,Devdatt, "An Indexing technique for biometric database", Wavelet Analysis and Pattern Recognition, International Conference on Wavelet Analysis and Pattern Recognition, vol 2, pp. 758-763, August 2008.
  1248. Youssef Elmir, Zakaria Elberrichi, Reda Adjoudj, "Score Level Fusion Based Multimodal Biometric Identification (Fingerprint & Voice)", IEEE 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 146-150, March 2012.
  1249. Ilaiah Kavati, Munaga V.N.K. Prasad and Chakravarthy Bhagvati, "An Efficient Coding Method for Indexing Hand-based Biometric Databases", Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Proceedings of ICAEES 2014, vol 2, pp. 723-731, November 2014. References
  1250. R. Jedermann, L.J. Antunez, W. Lang, M. Lorenz, J.D. Gehrke, and O. Herzog, "Dynamic
  1251. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Decision making on Embedded Platforms in Transport Logistics," Dynamics in Logistics, pp. 191-200, 2008.
  1252. J.P. Rodrigue, C. Comtois, and B. Slack, "The Geography of Transport Systems, Routledge," New York, 2013.
  1253. L. Li, "Managing Supply Chain and Logistics," World Scientific Publishing, Singapore, 2014.
  1254. S. Xiaoqiang, X. Kun, S. Xi, L. Yan, D. Yitang, W. Jian, and L. Jintong, "New Hierarchical Architecture for Ubiquitous Wireless Sensing and Access With Improved Coverage Using CWDM-ROF Links," Journal of Optical Communications and Networking, Vol. 3(10), pp. 790-796, 2011.
  1255. Good Distribution Practices (GDP). Working Document QAS/04.68 (RESTRICTED), World Health Organization, Geneva, 2004.
  1256. R. Angeles, "RFID Technologies: Supply-Chain Applications and Implementation Issues," Information Systems Management, Vol.2 (1), pp. 51-65, 2005.
  1257. T. Kelepouris, "RFID-enabled traceability in the food supply chain," Industrial Management & Data Systems, Vol. 107 (2), pp.183 -200, 2007.
  1258. D. Yue, X. Wu, and M. Hao, "A Cost-Benefit Analysis for Applying RFID to Pharmaceutical Supply Chain," DOI: 978-1-61284-311-7/11. IEEE 2011.
  1259. U. Barchetti, A. Bucciero, M. De Blasi, L. Mainetti, and L. Patrono, "Traceability in the Pharmaceutical Supply Chain," IEEE International Conference on RFID-Technology and Applications, pp. 17 -19, 2010
  1260. A. Moreno, I. Angulo, H. Landaluce, and A. Perallos, "Easily Deployable Solution Based on Wireless Technologies for Traceability of Pharmaceutical Drugs," IEEE International Conference on RFID-Technologies and Application, pp. 252-258, 2011.
  1261. X. Jia, Q. Feng, T. Fan, and Q. Lei, "RFID Technology and Its Applications in Internet of Things (IOT )," DOI: 978-1-4577-1415-3/12, pp. 1282-1285, 2012.
  1262. S. Chuan-Heng, L. Wen-Yong, Z. Chao, L. Ming, J. Zeng-Tao and Y. Xin-Ting, " Anti- counterfeit code for aquatic product identification for traceability and supervision in China," Food Control, Vol. 37, 126-134, 2014.
  1263. X. Xiao, Q. He, Z. Fu, M. Xu, and X. Zhang, "Applying CS and WSN methods for improving efficiency of frozen and chilled aquatic products monitoring system in cold chain logistics," Food Control, vol. 60, pp. 656-666, 2016.
  1264. J.N. Smith, "Specialized logistics for a longer perishable supply chain," World Trade, Vol. 18(11), pp. 46-47, 2005
  1265. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 REFERENCES
  1266. Ahmed A EL Tayyan. An approach to extract the parameters of solar cells from their illuminated i-v curves using the lambert w function. Turkish Journal of Physics, 39(1):1-15, 2015.
  1267. H. Saleem and S. Karmalkar. An analytical method to extract the physical parameters of a solar cell from four points on the illuminated j-v curves. IEEE Electron Device Letters, 30(4):349-352, 2009.
  1268. Amit Jain and Avinashi Kapoor. Exact analytical solutions of the parameters of real solar cells using lambert w-function. Solar Energy Materials and Solar Cells, 81(2):269 -277, 2004. ISSN 0927-0248. doi: http://dx.doi.org/10.1016/j.solmat.2003.11.018. URL http://www.sciencedirect.com/science/article/pi i/S0927024803002605.
  1269. Hengsi Qin and Jonathan W Kimball. Parameter determination of photovoltaic cells from field testing data using particle swarm optimization. In Power and Energy Conference at Illinois (PECI), 2011 IEEE, pages 1-4. IEEE, 2011.
  1270. Meiying Ye, Xiaodong Wang, and Yousheng Xu. Parameter extraction of solar cells using particle swarm optimization. Journal of Applied Physics, 105(9):094502, 2009.
  1271. Alireza Askarzadeh and Alireza Rezazadeh. Parameter identification for solar cell models using harmony search-based algorithms. Solar Energy, 86(11):3241-3249, 2012.
  1272. Sanjaykumar J Patel, Ashish K Panchal, and Vipul Kheraj. Solar cell parameters extraction from a current-voltage characteristic using genetic algorithm. Journal of Nano-and Electronic Physics, 5(2), 2013.
  1273. G Venkateswarlu and P Sangameswar Raju. Modeling and parameter extraction of pv modules using genetic algorithms and differential evaluation. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 5(6):37-44, 2013.
  1274. M. Zagrouba, A. Sellami, M. Bouaicha, and M. Ksouri. Identification of pv solar cells and modules parameters using the genetic algorithms: Application to maximum power extraction. Solar Energy, 84(5):860 - 866, 2010. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2010.02.012. URL http://www.sciencedirect.com/science/article/pi i/S0038092X10000848.
  1275. Basil Jacob, Karthik Balasubramanian, S Mohammed Azharuddin, N Rajasekar, et al. Solar pv modelling and parameter extraction using artificial immune system. Energy Procedia, 75:331-336, 2015.
  1276. Alireza Askarzadeh and Alireza Rezazadeh. Artificial bee swarm optimization algorithm for parameters identification of solar cell models. Applied Energy, 102: 943-949, 2013.
  1277. Jieming Ma, TO Ting, Ka Lok Man, Nan Zhang, Sheng-Uei Guan, and Prudence WH Wong. Parameter estimation of photovoltaic models via cuckoo search. Journal of Applied Mathematics, 2013. URL http://dx.doi.org/10.1155/2013/362619.
  1278. MR AlRashidi, KM El-Naggar, and MF AlHajri. Characteristics of solar cell model using sa. International Journal of Advances in Science and Technology, 2014. ISSN 2348-5426. URL http://www.sciencepublication.org.
  1279. Kashif Ishaque and Zainal Salam. An improved modeling method to determine the model parameters of photovoltaic (pv) modules using differential evolution (de). Solar Energy, 85(9):2349 -2359, 2011. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2011.06.025. Figure 6: Convergence plot
  1280. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 URL http://www.sciencedirect.com/science/article/pi i/S0038092X11002374.
  1281. Yourim Yoon and Zong Woo Geem. Parameter optimization of single- diode model of photovoltaic cell using memetic algorithm. International Journal of Photoenergy, 2015, 2015.
  1282. HT Jadhav and Ranjit Roy. Gbest guided artificial bee colony algorithm for environmental/economic dispatch considering wind power. Expert Systems with Applications, 40(16):6385-6399, 2013.
  1283. Qun Niu, Letian Zhang, and Kang Li. A biogeography-based optimization algorithm with mutation strategies for model parameter estimation of solar and fuel cells. Energy Conversion and Management, 86:1173-1185, 2014.
  1284. Sanjaykumar J Patel, Ashish K Panchal, and Vipul Kheraj. Extraction of solar cell parameters from a single current-voltage characteristic using teaching learning based optimization algorithm. Applied Energy, 119:384-393, 2014.
  1285. Mohammad Jamadi, Farshad Merrikh-Bayat, and Mehdi Bigdeli. Very accurate parameter estimation of single-and double-diode solar cell models using a modified artificial bee colony algorithm. International Journal of Energy and Environmental Engineering, pages 1-13, December 2015. doi: 10.1007/s40095-015-0198-5.
  1286. Jean-Pierre Charles, Ismail Mekkaoui-Alaoui, Guy Bordure, and Pierre Mialhe. A critical study of the effectiveness of the single and double exponential models for i-v characterization of solar cells. Solid-State Electronics, 28(8):807 -820, 1985. ISSN 0038-1101. doi: http://dx.doi.org/10.1016/0038-1101(85)90068-1. URL http://www.sciencedirect.com/science/article/pi i/0038110185900681.
  1287. Xin-She Yang. Nature-inspired metaheuristic algorithms. Luniver press, 2008. ISBN 1-905986-10-6.
  1288. Xin-She Yang and Xingshi He. Firefly algorithm: Recent advances and applications. Int. J. Swarm Intelligence, 1(1):36-50, 2013. doi: 10.1504/IJSI.2013. 055801.
  1289. Xin Yang and She. Firefly algorithm, stochastic test functions and design optimisation. Int. J. Bio-Inspired Comput., 2 (2):78-84, March 2010. ISSN 1758-0366. doi: 10.1504/IJBIC.2010.032124. URL http://dx.doi.org/10.1504/IJBIC.2010.032124.
  1290. B. Hadj A. J. Joseph and A. L. Ali. Solar cell parameter extraction using genetic algorithms. Measurement Science and Technology, 12(11):1922 -1925, 2001.
  1291. Alireza Askarzadeh and Alireza Rezazadeh. Extraction of maximum power point in solar cells using bird mating optimizer-based parameters identification approach. Solar Energy, 90:123 -133, 2013. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2013.01.010. URL http://www.sciencedirect.com/science/article/pi i/S0038092X1300025X.
  1292. T. Easwarakhanthan, J. Bottin, I. Bouhouch, and C. Boutrit. Nonlinear minimization algorithm for determining the solar cell parameters with microcomputers. International Journal of Solar Energy, 4(1):1-12, 1986. doi: 10.1080/01425918608909835. URL http://dx.doi.org/10.1080/01425918608909835.
  1293. G. J Yu, Y. S Jung, J. Y Choi, and G. S Kim. A novel two-mode mppt control algorithm based on comparative study of existing algorithms. Solar Energy, 76(4):455 -463, 2004. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2003.08.038. URL http://www.sciencedirect.com/science/article/pi i/S0038092X03003839.
  1294. T Bendib, F Djeffal, D Arar, and M Meguellati. Fuzzy-logic-based approach for organic solar cell parameters extraction. In Proceedings of the world congress on engineering, volume 2, 2013.
  1295. Anup Anurag, Satarupa Bal, Suman Sourav, and Mrutyunjaya Nanda. A review of maximum power-point tracking techniques for photovoltaic systems. International Journal of Sustainable Energy, 35(5):478-501, 2016. doi: 10.1080/14786451.2014. 918979. URL http://dx.doi.org/10.1080/14786451.2014.918979.
  1296. T. Ikegami, T. Maezono, F. Nakanishi, Y. Yamagata, and K. Ebihara. Estimation of equivalent circuit parameters of pv module and its application to optimal operation of pv system. Solar Energy Materials and Solar Cells, 67(1-4): 389-395, 3 2001. ISSN 0927-0248. doi: 10.1016/S0927-0248(00)00307-X.
  1297. T. Easwarakhanthan, J. Bottin, I. Bouhouch, and C. Boutrit. Nonlinear minimization algorithm for determining the solar cell parameters with microcomputers. International Journal of Solar Energy, 4(1):1-12, 1986. doi: 10.1080/01425918608909835. URL http://dx.doi.org/10.1080/01425918608909835.
  1298. Ahmed A EL Tayyan. An approach to extract the parameters of solar cells from their illuminated i-v curves using the lambert w function. Turkish Journal of Physics, 39(1):1-15, 2015.
  1299. Amit Jain and Avinashi Kapoor. Exact analytical solutions of the parameters of real solar cells using lambert w-function. Solar Energy Materials and Solar Cells, 81(2):269 -277, 2004. ISSN 0927-0248. doi: http://dx.doi.org/10.1016/j.solmat.2003.11.018. URL http://www.sciencedirect.com/science/article/pi i/S0927024803002605.
  1300. Rituraj Tamrakar and Archana Gupta. A review: extraction of solar cell modelling parameters.
  1301. Eftichios Koutroulis and Frede Blaabjerg. Overview of maximum power point tracking techniques for photovoltaic energy production systems. Electric Power Components and Systems, 43(12):1329-1351, 2015. doi: 10.1080/15325008.2015. 1030517. URL http://dx.doi.org/10.1080/15325008.2015.1030517.
  1302. Sanjaykumar J Patel, Ashish K Panchal, and Vipul Kheraj. Solar cell parameters extraction from a current-voltage characteristic using genetic algorithm. Journal of Nano-and Electronic Physics, 5(2), 2013.
  1303. G Venkateswarlu and P Sangameswar Raju. Modeling and parameter extraction of pv modules using genetic algorithms and differential evaluation. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 5(6):37-44, 2013.
  1304. M. Zagrouba, A. Sellami, M. Bouaicha, and M. Ksouri. Identification of pv solar cells and modules parameters using the genetic algorithms: Application to maximum power extraction. Solar Energy, 84(5):860 - 866, 2010. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2010.02.012. URL http://www.sciencedirect.com/science/article/pi i/S0038092X10000848.
  1305. Basil Jacob, Karthik Balasubramanian, S Mohammed Azharuddin, N Rajasekar, et al. Solar pv modelling and parameter extraction using artificial immune system. Energy Procedia, 75:331-336, 2015.
  1306. Alireza Askarzadeh and Alireza Rezazadeh. Artificial bee swarm optimization algorithm for parameters identification of solar cell models. Applied Energy, 102: 943-949, 2013.
  1307. MR AlRashidi, KM El-Naggar, and MF AlHajri. Characteristics of solar cell model using sa. International Journal of Advances in Science and Technology, 2014. ISSN 2348-5426. URL http://www.sciencepublication.org.
  1308. MR AlRashidi, KM El-Naggar, and MF AlHajri. Extraction of photovoltaic characteristics using simulated annealing. In International Conference on Advances in Engineering Sciences and Applied Mathematics, May 2014.
  1309. Hengsi Qin and Jonathan W Kimball. Parameter determination of photovoltaic cells from field testing data using particle swarm optimization. In Power and Energy Conference at Illinois (PECI), 2011 IEEE, pages 1-4. IEEE, 2011.
  1310. Meiying Ye, Xiaodong Wang, and Yousheng Xu. Parameter extraction of solar cells using particle swarm optimization. Journal of Applied Physics, 105(9):094502, 2009.
  1311. Kashif Ishaque and Zainal Salam. An improved modeling method to determine the model parameters of photovoltaic (pv) modules using differential evolution (de). Solar Energy, 85(9):2349 -2359, 2011. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2011.06.025. URL http://www.sciencedirect.com/science/article/pi i/S0038092X11002374.
  1312. Alireza Askarzadeh and Alireza Rezazadeh. Parameter identification for solar cell models using harmony search-based algorithms. Solar Energy, 86(11):3241-3249, 2012.
  1313. Yourim Yoon and Zong Woo Geem. Parameter optimization of single- diode model of photovoltaic cell using memetic algorithm. International Journal of Photoenergy, 2015, 2015.
  1314. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1315. AlRashidi. MR, El-Naggar. KM, and AlHajri.MF. Parameters estimation of double diode solar cell model. In Proceedings of World Academy of Science, Engineering and Technology, number 74, page 100. World Academy of Science, Engineering and Technology (WASET), 2013.
  1316. Jieming Ma, TO Ting, Ka Lok Man, Nan Zhang, Sheng-Uei Guan, and Prudence WH Wong. Parameter estimation of photovoltaic models via cuckoo search. Journal of Applied Mathematics, 2013. URL http://dx.doi.org/10.1155/2013/362619.
  1317. HT Jadhav and Ranjit Roy. Gbest guided artificial bee colony algorithm for environmental/economic dispatch considering wind power. Expert Systems with Applications, 40(16):6385-6399, 2013.
  1318. Qun Niu, Letian Zhang, and Kang Li. A biogeography-based optimization algorithm with mutation strategies for model parameter estimation of solar and fuel cells. Energy Conversion and Management, 86:1173-1185, 2014.
  1319. Sanjaykumar J Patel, Ashish K Panchal, and Vipul Kheraj. Extraction of solar cell parameters from a single current-voltage characteristic using teaching learning based optimization algorithm. Applied Energy, 119:384-393, 2014.
  1320. Mohammad Jamadi, Farshad Merrikh-Bayat, and Mehdi Bigdeli. Very accurate parameter estimation of single-and double-diode solar cell models using a modified artificial bee colony algorithm. International Journal of Energy and Environmental Engineering, pages 1-13, December 2015. doi: 10.1007/s40095-015-0198-5.
  1321. Alireza Askarzadeh and Alireza Rezazadeh. Extraction of maximum power point in solar cells using bird mating optimizer-based parameters identification approach. Solar Energy, 90:123 -133, 2013. ISSN 0038-092X. doi: http://dx.doi.org/10.1016/j.solener.2013.01.010. URL http://www.sciencedirect.com/science/article/pi i/S0038092X1300025X.
  1322. Jean-Pierre Charles, Ismail Mekkaoui-Alaoui, Guy Bordure, and Pierre Mialhe. A critical study of the effectiveness of the single and double exponential models for i-v characterization of solar cells. Solid-State Electronics, 28(8):807 -820, 1985. ISSN 0038-1101. doi: http://dx.doi.org/10.1016/0038-1101(85)90068-1. URL http://www.sciencedirect.com/science/article/pi i/0038110185900681.
  1323. Seyedali Mirjalili. The ant lion optimizer. Advances in Engineering Software, 83: 80 -98, 2015. ISSN 0965-9978. doi: http://dx.doi.org/10.1016/j.advengsoft.2015.01.010. URL http://www.sciencedirect.com/science/article/pi i/S0965997815000113.
  1324. B. Hadj A. J. Joseph and A. L. Ali. Solar cell parameter extraction using genetic algorithms. Measurement Science and Technology, 12(11):1922 - 1925, 2001. REFERENCES
  1325. Mohammad Wazid, AvitaKatal, R.H. Goudar, D.P. Singh, AsitTyagi, Robin Sharma, and PriyankaBhakuni ," A Framework for Detection and Prevention of Novel Keylogger Spyware Attacks",7th International Conference on Intelligent Systems and Control (ISCO 2013).
  1326. Akhil S, Neeraja M Nair, Asst Prof. Arun R, "Detection and Prevention of Keylogger Spyware Attacks," IJCET, 2014, pp. 167-172.
  1327. Hemita Pathak, Apurva Pawar, Balaji Patil, "A Survey on Keyloggers: A malicious Attack", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 4, April 2015
  1328. Jesudoss. A. et.al,, "A survey on authentication attacks and countermeasures in a distributed environment", Indian Journal of Computer Science and Engineering (IJCSE).
  1329. Malware Definition Available at http://en.wikipedia.org/wiki/Malware.
  1330. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1331. https://en.wikipedia.org/wiki/Keystroke_logging/Keylogger Details and its types.
  1332. https://securelist.com/analysis/publications/36138/keylogge rs-how-they-work-and-how-to-detect-them-part-1/- Keylogger detection technique.
  1333. Different Permissions in android http://developer.android.com/guide/topics/security/permissi ons.html/ How Permissions are used http://developer.android.com/guide/topics/manifest/permiss ion-element.html.
  1334. Sebastián Sznur et al, 2013. " Advances in Keystroke Dynamics Techniques to Group User Sessions" , International journal of Information Security Science, 4: 2.
  1335. Thefts in Remote Banking Systems: Incident Investigations Secure list, by Mikhail Prokhorenko on September 11, 2014.
  1336. Md. Shoriful Islam, 2014. "Systematic Literature Review: Security Challenges of Mobile Banking and Payments System", International Journal of u-and e-Service, Science and Technology, 7(6): 107-116. http://dx.doi.org/10.14257/ijunesst.2014.7.6.10
  1337. S.Geetha, J. Madhusudanan et al, "An Introspective Study on Key loggers Trojan in Smartphone", International Journal of Applied Engineering Research, Volume 11, Number 4, May 2016, Pages 509-517.
  1338. Kaushik Roy et al., "Leakage Current Mechanisms and Leakage Reduction Techniques in Deep-Submicrometer CMOS Circuits", Proceedings of the IEEE, Vol. 91, No. 2, February 2003
  1339. N.S.Kim et al., "Leakage Current: Moore's Law Meets Static Power", published by the IEEE Computer Society, 2003.
  1340. Ramesh Vaddi, S.Dasgupta, and R. P. Agarwal, "Device and Circuit Design Challenges in the Digital Subthreshold Region for Ultralow- Power Applications", Hindawi Publishing Corporation, VLSI Design, Volume 2009.
  1341. Christophe J. Merlin and Wendi B. Heinzelman, "Duty Cycle Control for Low-Power-Listening MAC Protocols", IEEE Transactions on Mobile Computing, Vol. 9, Issue.11, July 2010.
  1342. O.Semenov et al., "Impact of technology scaling on thermal behaviour of leakage current in sub-quarter micron MOSFETs: Perspective of low temperature current testing, Microelectronics Journal 33, (2002), 985- 994.
  1343. Saleh Abdel-Hafeez, Ann Gordon-Ross and Behrooz Parhami, " Scalable Digital CMOS Comparator using a Parallel Prefix Tree", IEEE
  1344. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 21, No. 11, November 2013.
  1345. Amuthavalli.G, Gunasundari.R and Nijandan.A, "Leakage Power Reduction in 32-bit Digital Comparator using Modified Power Gating Technique", Applied Mechanics and Materials, Vol.742, pp.741-744, March 2015.
  1346. Amuthavalli.G and Gunasundari.R, "Analysis and Design of Subthreshold Leakage Power-Aware Ripple Carry Adder at Circuit Level using 90nm Technology", Elsevier Procedia Computer Science, Vol.48, 2015, 660-665.
  1347. Amuthavalli.G and Gunasundari.R, "Analysis of 16-bit Carry Look Ahead Adder-a Subthreshold Leakage Power Perspective", Journal of Engineering and Applied Sciences, Vol.10, No.6, April 2015.
  1348. Yen Kheng Tan and Sanjib Kumar Panda, "Review of Energy Harvesting Technologies for Sustainable Wireless Sensor Networks", in Sustainable Wireless Sensor Networks. Yen Kheng Tan (Ed.), InTech, DOI: 10.5772/13062.
  1349. Pratyush Dwivedi, Krishna Kumar, Aminul Islam, "Comparative Study of subthreshold leakage in CNFET & MOSFET @ 32-nm Technology Node", Int. Conf. of Micro-Com published in IEEE Xplore, July2016.
  1350. Hippolyte Djonon Tsague and Bhekisipho Twala, "Leakage Current Minimisation and Power Reduction Techniques using Sub-threshold Design", Int. Conf. on Information Society published in IEEE xplore, January 2016.
  1351. Rahul Kumar and C.P. Ravikumar, " Leakage Power Estimation for Deep Submicron Circuits in an ASIC Design Environment", Int. Conf. on VLSI Design published in IEEE xplore, August 2002.
  1352. Paulo Francisco Butzen and Renato Perez Ribas, " Leakage Current in Sub-Micrometer CMOS Gates", Universidade Federal do Rio Grande do Sul, 1-28, 2006.
  1353. Amit Agarwal et al., "Leakage Power Analysis and Reduction for Nanoscale Circuits", Journal of IEEE Micro, Volume 26, Issue 2, Page 68-80, March 2006.
  1354. Richard X.Gu and Mohamed I.Elmasry, "Power Dissipation analysis and Optimization of Deep Submicron CMOS Digital Circuits", IEEE Journal of Solid State Circuits, Vol. 31, No. 5, May 1996.
  1355. P.F.Butzen et al., "Modeling and Estimating Leakage Current in Series- Parallel CMOS Networks", ACM Great Lakes Symposium on VLSI, pages 269-274, 2007.
  1356. P.F.Butzen et al., "Subthreshold Leakage Modeling and Estimation of General CMOS Complex Gates", Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, Springer, pp 474-484, 2007.
  1357. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 IJCSIS REVIEWERS' LIST
  1358. Assist Prof (Dr.) M. Emre Celebi, Louisiana State University in Shreveport, USA Dr. Lam Hong Lee, Universiti Tunku Abdul Rahman, Malaysia Dr. Shimon K. Modi, Director of Research BSPA Labs, Purdue University, USA Dr. Jianguo Ding, Norwegian University of Science and Technology (NTNU), Norway Assoc. Prof. N. Jaisankar, VIT University, Vellore,Tamilnadu, India Dr. Amogh Kavimandan, The Mathworks Inc., USA Dr. Ramasamy Mariappan, Vinayaka Missions University, India Dr. Yong Li, School of Electronic and Information Engineering, Beijing Jiaotong University, P.R. China Assist. Prof. Sugam Sharma, NIET, India / Iowa State University, USA Dr.
  1359. Jorge A. Ruiz-Vanoye, Universidad Autónoma del Estado de Morelos, Mexico Dr. Neeraj Kumar, SMVD University, Katra (J&K), India
  1360. Dr Genge Bela, "Petru Maior" University of Targu Mures, Romania Dr. Junjie Peng, Shanghai University, P. R. China Dr. Ilhem LENGLIZ, HANA Group -CRISTAL Laboratory, Tunisia Prof. Dr. Durgesh Kumar Mishra, Acropolis Institute of Technology and Research, Indore, MP, India Dr. Jorge L. Hernández-Ardieta, University Carlos III of Madrid, Spain Prof. Dr.C.Suresh Gnana Dhas, Anna University, India Dr Li Fang, Nanyang Technological University, Singapore Prof. Pijush Biswas, RCC Institute of Information Technology, India Dr. Siddhivinayak Kulkarni, University of Ballarat, Ballarat, Victoria, Australia Dr. A. Arul Lawrence, Royal College of Engineering & Technology, India Dr. Wongyos Keardsri, Chulalongkorn University, Bangkok, Thailand Dr. Somesh Kumar Dewangan, CSVTU Bhilai (C.G.)/ Dimat Raipur, India Dr. Hayder N. Jasem, University Putra Malaysia, Malaysia Dr. A.V.Senthil Kumar, C. M. S. College of Science and Commerce, India Dr. R. S. Karthik, C. M. S. College of Science and Commerce, India Dr. P. Vasant, University Technology Petronas, Malaysia Dr. Wong Kok Seng, Soongsil University, Seoul, South Korea Dr. Praveen Ranjan Srivastava, BITS PILANI, India Dr. Kong Sang Kelvin, Leong, The Hong Kong Polytechnic University, Hong Kong Dr. Mohd Nazri Ismail, Universiti Kuala Lumpur, Malaysia Dr. Rami J. Matarneh, Al-isra Private University, Amman, Jordan Dr Ojesanmi Olusegun Ayodeji, Ajayi Crowther University, Oyo, Nigeria Dr. Riktesh Srivastava, Skyline University, UAE Dr.
  1361. Oras F. Baker, UCSI University -Kuala Lumpur, Malaysia Dr. Ahmed S. Ghiduk, Faculty of Science, Beni-Suef University, Egypt and Department of Computer science, Taif University, Saudi Arabia Dr. Tirthankar Gayen, IIT Kharagpur, India Dr. Huei-Ru Tseng, National Chiao Tung University, Taiwan Prof. Ning Xu, Wuhan University of Technology, China Dr Mohammed Salem Binwahlan, Hadhramout University of Science and Technology, Yemen & Universiti Teknologi Malaysia, Malaysia.
  1362. Dr. Aruna Ranganath, Bhoj Reddy Engineering College for Women, India Dr. Hafeezullah Amin, Institute of Information Technology, KUST, Kohat, Pakistan Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Prof. Syed S. Rizvi, University of Bridgeport, USA Dr. Shahbaz Pervez Chattha, University of Engineering and Technology Taxila, Pakistan Dr. Shishir Kumar, Jaypee University of Information Technology, Wakanaghat (HP), India Dr. Shahid Mumtaz, Portugal Telecommunication, Instituto de Telecomunicações (IT) , Aveiro, Portugal Dr. Rajesh K Shukla, Corporate Institute of Science & Technology Bhopal M P Dr. Poonam Garg, Institute of Management Technology, India Dr. S. Mehta, Inha University, Korea Dr. Dilip Kumar S.M, Bangalore University, Bangalore Prof. Malik Sikander Hayat Khiyal, Fatima Jinnah Women University, Rawalpindi, Pakistan Dr. Virendra Gomase , Department of Bioinformatics, Padmashree Dr. D.Y. Patil University Dr. Irraivan Elamvazuthi, University Technology PETRONAS, Malaysia Dr. Saqib Saeed, University of Siegen, Germany Dr. Pavan Kumar Gorakavi, IPMA-USA [YC] Dr. Ahmed Nabih Zaki Rashed, Menoufia University, Egypt Prof. Shishir K. Shandilya, Rukmani Devi Institute of Science & Technology, India Dr. J. Komala Lakshmi, SNR Sons College, Computer Science, India Dr. Muhammad Sohail, KUST, Pakistan Dr. Manjaiah D.H, Mangalore University, India Dr. S Santhosh Baboo, D.G.Vaishnav College, Chennai, India Prof. Dr. Mokhtar Beldjehem, Sainte-Anne University, Halifax, NS, Canada Dr. Deepak Laxmi Narasimha, University of Malaya, Malaysia Prof. Dr. Arunkumar Thangavelu, Vellore Institute Of Technology, India Dr. M. Azath, Anna University, India Dr. Md. Rabiul Islam, Rajshahi University of Engineering & Technology (RUET), Bangladesh Dr. Aos Alaa Zaidan Ansaef, Multimedia University, Malaysia Dr Suresh Jain, Devi Ahilya University, Indore (MP) India, Dr. Mohammed M. Kadhum, Universiti Utara Malaysia Dr. Hanumanthappa. J. University of Mysore, India Dr. Syed Ishtiaque Ahmed, Bangladesh University of Engineering and Technology (BUET) Dr Akinola Solomon Olalekan, University of Ibadan, Ibadan, Nigeria Dr. Santosh K. Pandey, The Institute of Chartered Accountants of India Dr. P. Vasant, Power Control Optimization, Malaysia Dr. Petr Ivankov, Automatika -S, Russian Federation Dr. Utkarsh Seetha, Data Infosys Limited, India Mrs. Priti Maheshwary, Maulana Azad National Institute of Technology, Bhopal Dr. (Mrs) Padmavathi Ganapathi, Avinashilingam University for Women, Coimbatore Assist. Prof. A. Neela madheswari, Anna university, India Prof. Ganesan Ramachandra Rao, PSG College of Arts and Science, India Mr. Kamanashis Biswas, Daffodil International University, Bangladesh Dr. Atul Gonsai, Saurashtra University, Gujarat, India Mr. Angkoon Phinyomark, Prince of Songkla University, Thailand Mrs. G. Nalini Priya, Anna University, Chennai Dr. P. Subashini, Avinashilingam University for Women, India Assoc. Prof. Vijay Kumar Chakka, Dhirubhai Ambani IICT, Gandhinagar ,Gujarat Mr Jitendra Agrawal, : Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal Mr. Vishal Goyal, Department of Computer Science, Punjabi University, India Dr. R. Baskaran, Department of Computer Science and Engineering, Anna University, Chennai Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1363. Assist. Prof, Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India Dr. Jamal Ahmad Dargham, School of Engineering and Information Technology, Universiti Malaysia Sabah Mr. Nitin Bhatia, DAV College, India Dr. Dhavachelvan Ponnurangam, Pondicherry Central University, India Dr. Mohd Faizal Abdollah, University of Technical Malaysia, Malaysia Assist. Prof. Sonal Chawla, Panjab University, India Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India Mr. Arash Habibi Lashkari, University of Malaya (UM), Malaysia Mr. Md. Rajibul Islam, Ibnu Sina Institute, University Technology Malaysia Professor Dr. Sabu M. Thampi, .B.S Institute of Technology for Women, Kerala University, India Mr. Noor Muhammed Nayeem, Université Lumière Lyon 2, 69007 Lyon, France Dr. Himanshu Aggarwal, Department of Computer Engineering, Punjabi University, India Prof R. Naidoo, Dept of Mathematics/Center for Advanced Computer Modelling, Durban University of Technology, Durban,South Africa Prof. Mydhili K Nair, Visweswaraiah Technological University, Bangalore, India M. Prabu, Adhiyamaan College of Engineering/Anna University, India Mr. Swakkhar Shatabda, United International University, Bangladesh Dr. Abdur Rashid Khan, ICIT, Gomal University, Dera Ismail Khan, Pakistan Mr. H. Abdul Shabeer, I-Nautix Technologies,Chennai, India Dr. M. Aramudhan, Perunthalaivar Kamarajar Institute of Engineering and Technology, India Dr. M. P. Thapliyal, Department of Computer Science, HNB Garhwal University (Central University), India Dr. Shahaboddin Shamshirband, Islamic Azad University, Iran Mr. Zeashan Hameed Khan, Université de Grenoble, France Prof. Anil K Ahlawat, Ajay Kumar Garg Engineering College, Ghaziabad, UP Technical University, Lucknow Mr. Longe Olumide Babatope, University Of Ibadan, Nigeria Associate Prof. Raman Maini, University College of Engineering, Punjabi University, India Dr. Maslin Masrom, University Technology Malaysia, Malaysia Sudipta Chattopadhyay, Jadavpur University, Kolkata, India Dr. Dang Tuan NGUYEN, University of Information Technology, Vietnam National University -Ho Chi Minh City Dr. Mary Lourde R., BITS-PILANI Dubai , UAE Dr. Abdul Aziz, University of Central Punjab, Pakistan Mr. Karan Singh, Gautam Budtha University, India Mr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India Associate Prof Dr Zuraini Ismail, University Technology Malaysia, Malaysia Assistant Prof. Yasser M. Alginahi, Taibah University, Madinah Munawwarrah, KSA Mr. Dakshina Ranjan Kisku, West Bengal University of Technology, India Mr. Raman Kumar, Dr B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India Associate Prof. Samir B. Patel, Institute of Technology, Nirma University, India Dr. M.Munir Ahamed Rabbani, B. S. Abdur Rahman University, India Asst. Prof. Koushik Majumder, West Bengal University of Technology, India Dr. Alex Pappachen James, Queensland Micro-nanotechnology center, Griffith University, Australia Assistant Prof. S. Hariharan, B.S. Abdur Rahman University, India Asst Prof. Jasmine. K. S, R.V.College of Engineering, India Mr Naushad Ali Mamode Khan, Ministry of Education and Human Resources, Mauritius Prof. Mahesh Goyani, G H Patel Collge of Engg. & Tech, V.V.N, Anand, Gujarat, India Dr. Mana Mohammed, University of Tlemcen, Algeria Prof. Jatinder Singh, Universal Institutiion of Engg. & Tech. CHD, India Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Mrs. M. Anandhavalli Gauthaman, Sikkim Manipal Institute of Technology, Majitar, East Sikkim Dr. Bin Guo, Institute Telecom SudParis, France Mrs. Maleika Mehr Nigar Mohamed Heenaye-Mamode Khan, University of Mauritius Prof. Pijush Biswas, RCC Institute of Information Technology, India Mr. V. Bala Dhandayuthapani, Mekelle University, Ethiopia Dr. Irfan Syamsuddin, State Polytechnic of Ujung Pandang, Indonesia Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius Mr. Ravi Chandiran, Zagro Singapore Pte Ltd. Singapore Mr. Milindkumar V. Sarode, Jawaharlal Darda Institute of Engineering and Technology, India Dr. Shamimul Qamar, KSJ Institute of Engineering & Technology, India Dr. C. Arun, Anna University, India Assist. Prof. M.N.Birje, Basaveshwar Engineering College, India Prof. Hamid Reza Naji, Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Assist. Prof. Debasis Giri, Department of Computer Science and Engineering, Haldia Institute of Technology Subhabrata Barman, Haldia Institute of Technology, West Bengal Mr. M. I. Lali, COMSATS Institute of Information Technology, Islamabad, Pakistan Dr. Feroz Khan, Central Institute of Medicinal and Aromatic Plants, Lucknow, India Mr. R. Nagendran, Institute of Technology, Coimbatore, Tamilnadu, India Mr. Amnach Khawne, King Mongkut's Institute of Technology Ladkrabang, Ladkrabang, Bangkok, Thailand Dr. P. Chakrabarti, Sir Padampat Singhania University, Udaipur, India Mr. Nafiz Imtiaz Bin Hamid, Islamic University of Technology (IUT), Bangladesh. Shahab-A. Shamshirband, Islamic Azad University, Chalous, Iran Prof. B. Priestly Shan, Anna Univeristy, Tamilnadu, India Venkatramreddy Velma, Dept. of Bioinformatics, University of Mississippi Medical Center, Jackson MS USA Akshi Kumar, Dept. of Computer Engineering, Delhi Technological University, India Dr. Umesh Kumar Singh, Vikram University, Ujjain, India Mr. Serguei A. Mokhov, Concordia University, Canada Mr. Lai Khin Wee, Universiti Teknologi Malaysia, Malaysia Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India Mr. Syed R. Rizvi, Analytical Services & Materials, Inc., USA Dr. S. Karthik, SNS Collegeof Technology, India Mr. Syed Qasim Bukhari, CIMET (Universidad de Granada), Spain Mr. A.D.Potgantwar, Pune University, India Dr. Himanshu Aggarwal, Punjabi University, India Mr. Rajesh Ramachandran, Naipunya Institute of Management and Information Technology, India Dr. K.L. Shunmuganathan, R.M.K Engg College , Kavaraipettai ,Chennai Dr. Prasant Kumar Pattnaik, KIST, India. Dr. Ch. Aswani Kumar, VIT University, India Mr. Ijaz Ali Shoukat, King Saud University, Riyadh KSA Mr. Arun Kumar, Sir Padam Pat Singhania University, Udaipur, Rajasthan Mr. Muhammad Imran Khan, Universiti Teknologi PETRONAS, Malaysia Dr. Natarajan Meghanathan, Jackson State University, Jackson, MS, USA Mr. Mohd Zaki Bin Mas'ud, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia Prof. Dr. R. Geetharamani, Dept. of Computer Science and Eng., Rajalakshmi Engineering College, India Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India Dr. S. Abdul Khader Jilani, University of Tabuk, Tabuk, Saudi Arabia Mr. Syed Jamal Haider Zaidi, Bahria University, Pakistan
  1364. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Dr. N. Devarajan, Government College of Technology,Coimbatore, Tamilnadu, INDIA Mr. R. Jagadeesh Kannan, RMK Engineering College, India Mr. Deo Prakash, Shri Mata Vaishno Devi University, India Mr. Mohammad Abu Naser, Dept. of EEE, IUT, Gazipur, Bangladesh Assist. Prof. Prasun Ghosal, Bengal Engineering and Science University, India Mr. Md. Golam Kaosar, School of Engineering and Science, Victoria University, Melbourne City, Australia Mr. R. Mahammad Shafi, Madanapalle Institute of Technology & Science, India Dr. F.Sagayaraj Francis, Pondicherry Engineering College,India Dr. Ajay Goel, HIET , Kaithal, India Mr. Nayak Sunil Kashibarao, Bahirji Smarak Mahavidyalaya, India Mr. Suhas J Manangi, Microsoft India Dr. Kalyankar N. V., Yeshwant Mahavidyalaya, Nanded , India Dr. K.D. Verma, S.V. College of Post graduate studies & Research, India Dr. Amjad Rehman, University Technology Malaysia, Malaysia Mr. Rachit Garg, L K College, Jalandhar, Punjab Mr. J. William, M.A.M college of Engineering, Trichy, Tamilnadu,India Prof. Jue-Sam Chou, Nanhua University, College of Science and Technology, Taiwan Dr. Thorat S.B., Institute of Technology and Management, India Mr. Ajay Prasad, Sir Padampat Singhania University, Udaipur, India Dr. Kamaljit I. Lakhtaria, Atmiya Institute of Technology & Science, India Mr. Syed Rafiul Hussain, Ahsanullah University of Science and Technology, Bangladesh Mrs Fazeela Tunnisa, Najran University, Kingdom of Saudi Arabia Mrs Kavita Taneja, Maharishi Markandeshwar University, Haryana, India Mr. Maniyar Shiraz Ahmed, Najran University, Najran, KSA Mr. Anand Kumar, AMC Engineering College, Bangalore Dr. Rakesh Chandra Gangwar, Beant College of Engg. & Tech., Gurdaspur (Punjab) India Dr. V V Rama Prasad, Sree Vidyanikethan Engineering College, India Assist. Prof. Neetesh Kumar Gupta, Technocrats Institute of Technology, Bhopal (M.P.), India Mr. Ashish Seth, Uttar Pradesh Technical University, Lucknow ,UP India Dr.
  1365. V V S S S Balaram, Sreenidhi Institute of Science and Technology, India Mr Rahul Bhatia, Lingaya's Institute of Management and Technology, India Prof. Niranjan Reddy. P, KITS , Warangal, India Prof. Rakesh. Lingappa, Vijetha Institute of Technology, Bangalore, India Dr. Mohammed Ali Hussain, Nimra College of Engineering & Technology, Vijayawada, A.P., India Dr. A.Srinivasan, MNM Jain Engineering College, Rajiv Gandhi Salai, Thorapakkam, Chennai Mr. Rakesh Kumar, M.M. University, Mullana, Ambala, India Dr. Lena Khaled, Zarqa Private University, Aman, Jordon Ms. Supriya Kapoor, Patni/Lingaya's Institute of Management and Tech., India Dr. Tossapon Boongoen , Aberystwyth University, UK Dr . Bilal Alatas, Firat University, Turkey Assist. Prof. Jyoti Praaksh Singh , Academy of Technology, India Dr. Ritu Soni, GNG College, India Dr . Mahendra Kumar , Sagar Institute of Research & Technology, Bhopal, India. Dr. Binod Kumar, Lakshmi Narayan College of Tech.(LNCT)Bhopal India Dr. Muzhir Shaban Al-Ani, Amman Arab University Amman -Jordan Dr. T.C. Manjunath , ATRIA Institute of Tech, India Mr. Muhammad Zakarya, COMSATS Institute of Information Technology (CIIT), Pakistan
  1366. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Assist. Prof. Harmunish Taneja, M. M. University, India Dr. Chitra Dhawale , SICSR, Model Colony, Pune, India Mrs Sankari Muthukaruppan, Nehru Institute of Engineering and Technology, Anna University, India Mr. Aaqif Afzaal Abbasi, National University Of Sciences And Technology, Islamabad Prof. Ashutosh Kumar Dubey, Trinity Institute of Technology and Research Bhopal, India Mr. G. Appasami, Dr. Pauls Engineering College, India Mr. M Yasin, National University of Science and Tech, karachi (NUST), Pakistan Mr. Yaser Miaji, University Utara Malaysia, Malaysia Mr. Shah Ahsanul Haque, International Islamic University Chittagong (IIUC), Bangladesh Prof. (Dr) Syed Abdul Sattar, Royal Institute of Technology & Science, India Dr. S. Sasikumar, Roever Engineering College Assist. Prof. Monit Kapoor, Maharishi Markandeshwar University, India Mr. Nwaocha Vivian O, National Open University of Nigeria Dr. M. S. Vijaya, GR Govindarajulu School of Applied Computer Technology, India Assist. Prof. Chakresh Kumar, Manav Rachna International University, India Mr. Kunal Chadha , R&D Software Engineer, Gemalto, Singapore Mr. Mueen Uddin, Universiti Teknologi Malaysia, UTM , Malaysia Dr. Dhuha Basheer abdullah, Mosul university, Iraq Mr. S. Audithan, Annamalai University, India Prof. Vijay K Chaudhari, Technocrats Institute of Technology , India Associate Prof. Mohd Ilyas Khan, Technocrats Institute of Technology , India Dr. Vu Thanh Nguyen, University of Information Technology, HoChiMinh City, VietNam Assist. Prof. Anand Sharma, MITS, Lakshmangarh, Sikar, Rajasthan, India Prof. T V Narayana Rao, HITAM Engineering college, Hyderabad Mr. Deepak Gour, Sir Padampat Singhania University, India Assist. Prof. Amutharaj Joyson, Kalasalingam University, India Mr. Ali Balador, Islamic Azad University, Iran Mr. Mohit Jain, Maharaja Surajmal Institute of Technology, India Mr. Dilip Kumar Sharma, GLA Institute of Technology & Management, India Dr. Debojyoti Mitra, Sir padampat Singhania University, India Dr. Ali Dehghantanha, Asia-Pacific University College of Technology and Innovation, Malaysia Mr. Zhao Zhang, City University of Hong Kong, China Prof. S.P. Setty, A.U. College of Engineering, India Prof. Patel Rakeshkumar Kantilal, Sankalchand Patel College of Engineering, India Mr. Biswajit Bhowmik, Bengal College of Engineering & Technology, India Mr. Manoj Gupta, Apex Institute of Engineering & Technology, India Assist. Prof. Ajay Sharma, Raj Kumar Goel Institute Of Technology, India Assist. Prof. Ramveer Singh, Raj Kumar Goel Institute of Technology, India Dr. Hanan Elazhary, Electronics Research Institute, Egypt Dr. Hosam I. Faiq, USM, Malaysia Prof. Dipti D. Patil, MAEER's MIT College of Engg. & Tech, Pune, India Assist. Prof. Devendra Chack, BCT Kumaon engineering College Dwarahat Almora, India Prof. Manpreet Singh, M. M. Engg. College, M. M. University, India Assist. Prof. M. Sadiq ali Khan, University of Karachi, Pakistan Mr. Prasad S. Halgaonkar, MIT -College of Engineering, Pune, India Dr. Imran Ghani, Universiti Teknologi Malaysia, Malaysia Prof. Varun Kumar Kakar, Kumaon Engineering College, Dwarahat, India
  1367. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1368. Assist. Prof. Nisheeth Joshi, Apaji Institute, Banasthali University, Rajasthan, India Associate Prof. Kunwar S. Vaisla, VCT Kumaon Engineering College, India Prof Anupam Choudhary, Bhilai School Of Engg.,Bhilai (C.G.),India Mr. Divya Prakash Shrivastava, Al Jabal Al garbi University, Zawya, Libya Associate Prof. Dr. V. Radha, Avinashilingam Deemed university for women, Coimbatore. Dr. Kasarapu Ramani, JNT University, Anantapur, India Dr. Anuraag Awasthi, Jayoti Vidyapeeth Womens University, India Dr. C G Ravichandran, R V S College of Engineering and Technology, India Dr. Mohamed A. Deriche, King Fahd University of Petroleum and Minerals, Saudi Arabia Mr. Abbas Karimi, Universiti Putra Malaysia, Malaysia Mr. Amit Kumar, Jaypee University of Engg. and Tech., India Dr. Nikolai Stoianov, Defense Institute, Bulgaria Assist. Prof. S. Ranichandra, KSR College of Arts and Science, Tiruchencode Mr. T.K.P. Rajagopal, Diamond Horse International Pvt Ltd, India Dr. Md. Ekramul Hamid, Rajshahi University, Bangladesh Mr. Hemanta Kumar Kalita , TATA Consultancy Services (TCS), India Dr. Messaouda Azzouzi, Ziane Achour University of Djelfa, Algeria Prof. (Dr.) Juan Jose Martinez Castillo, "Gran Mariscal de Ayacucho" University and Acantelys research Group, Venezuela Dr. Jatinderkumar R. Saini, Narmada College of Computer Application, India Dr. Babak Bashari Rad, University Technology of Malaysia, Malaysia Dr. Nighat Mir, Effat University, Saudi Arabia Prof. (Dr.) G.M.Nasira, Sasurie College of Engineering, India Mr. Varun Mittal, Gemalto Pte Ltd, Singapore Assist. Prof. Mrs P. Banumathi, Kathir College Of Engineering, Coimbatore Assist. Prof. Quan Yuan, University of Wisconsin-Stevens Point, US Dr. Pranam Paul, Narula Institute of Technology, Agarpara, West Bengal, India Assist. Prof. J. Ramkumar, V.L.B Janakiammal college of Arts & Science, India Mr. P. Sivakumar, Anna university, Chennai, India Mr. Md. Humayun Kabir Biswas, King Khalid University, Kingdom of Saudi Arabia Mr. Mayank Singh, J.P. Institute of Engg & Technology, Meerut, India HJ. Kamaruzaman Jusoff, Universiti Putra Malaysia Mr. Nikhil Patrick Lobo, CADES, India Dr. Amit Wason, Rayat-Bahra Institute of Engineering & Boi-Technology, India Dr. Rajesh Shrivastava, Govt. Benazir Science & Commerce College, Bhopal, India Assist. Prof. Vishal Bharti, DCE, Gurgaon Mrs. Sunita Bansal, Birla Institute of Technology & Science, India Dr. R. Sudhakar, Dr.Mahalingam college of Engineering and Technology, India Dr. Amit Kumar Garg, Shri Mata Vaishno Devi University, Katra(J&K), India Assist. Prof. Raj Gaurang Tiwari, AZAD Institute of Engineering and Technology, India Mr. Hamed Taherdoost, Tehran, Iran Mr. Amin Daneshmand Malayeri, YRC, IAU, Malayer Branch, Iran Mr. Shantanu Pal, University of Calcutta, India Dr. Terry H. Walcott, E-Promag Consultancy Group, United Kingdom Dr. Ezekiel U OKIKE, University of Ibadan, Nigeria Mr. P. Mahalingam, Caledonian College of Engineering, Oman Dr. Mahmoud M. A. Abd Ellatif, Mansoura University, Egypt
  1369. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Prof. Kunwar S. Vaisla, BCT Kumaon Engineering College, India Prof. Mahesh H. Panchal, Kalol Institute of Technology & Research Centre, India Mr. Muhammad Asad, Technical University of Munich, Germany Mr. AliReza Shams Shafigh, Azad Islamic university, Iran Prof. S. V. Nagaraj, RMK Engineering College, India Mr. Ashikali M Hasan, Senior Researcher, CelNet security, India Dr. Adnan Shahid Khan, University Technology Malaysia, Malaysia Mr. Prakash Gajanan Burade, Nagpur University/ITM college of engg, Nagpur, India Dr. Jagdish B.Helonde, Nagpur University/ITM college of engg, Nagpur, India Professor, Doctor BOUHORMA Mohammed, Univertsity Abdelmalek Essaadi, Morocco Mr. K. Thirumalaivasan, Pondicherry Engg. College, India Mr. Umbarkar Anantkumar Janardan, Walchand College of Engineering, India Mr. Ashish Chaurasia, Gyan Ganga Institute of Technology & Sciences, India Mr. Sunil Taneja, Kurukshetra University, India Mr. Fauzi Adi Rafrastara, Dian Nuswantoro University, Indonesia Dr. Yaduvir Singh, Thapar University, India Dr. Ioannis V. Koskosas, University of Western Macedonia, Greece Dr. Vasantha Kalyani David, Avinashilingam University for women, Coimbatore Dr. Ahmed Mansour Manasrah, Universiti Sains Malaysia, Malaysia Miss. Nazanin Sadat Kazazi, University Technology Malaysia, Malaysia Mr. Saeed Rasouli Heikalabad, Islamic Azad University -Tabriz Branch, Iran Assoc. Prof. Dhirendra Mishra, SVKM's NMIMS University, India Prof. Shapoor Zarei, UAE Inventors Association, UAE Prof. B.Raja Sarath Kumar, Lenora College of Engineering, India Dr. Bashir Alam, Jamia millia Islamia, Delhi, India Prof. Anant J Umbarkar, Walchand College of Engg., India Assist. Prof. B. Bharathi, Sathyabama University, India Dr. Fokrul Alom Mazarbhuiya, King Khalid University, Saudi Arabia Prof. T.S.Jeyali Laseeth, Anna University of Technology, Tirunelveli, India Dr. M. Balraju, Jawahar Lal Nehru Technological University Hyderabad, India Dr. Vijayalakshmi M. N., R.V.College of Engineering, Bangalore Prof. Walid Moudani, Lebanese University, Lebanon Dr. Saurabh Pal, VBS Purvanchal University, Jaunpur, India Associate Prof. Suneet Chaudhary, Dehradun Institute of Technology, India Associate Prof. Dr. Manuj Darbari, BBD University, India Ms. Prema Selvaraj, K.S.R College of Arts and Science, India Assist. Prof. Ms.S.Sasikala, KSR College of Arts & Science, India Mr. Sukhvinder Singh Deora, NC Institute of Computer Sciences, India Dr. Abhay Bansal, Amity School of Engineering & Technology, India Ms. Sumita Mishra, Amity School of Engineering and Technology, India Professor S. Viswanadha Raju, JNT University Hyderabad, India Mr. Asghar Shahrzad Khashandarag, Islamic Azad University Tabriz Branch, India Mr. Manoj Sharma, Panipat Institute of Engg. & Technology, India Mr. Shakeel Ahmed, King Faisal University, Saudi Arabia Dr. Mohamed Ali Mahjoub, Institute of Engineer of Monastir, Tunisia Mr. Adri Jovin J.J., SriGuru Institute of Technology, India Dr. Sukumar Senthilkumar, Universiti Sains Malaysia, Malaysia
  1370. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Mr. Rakesh Bharati, Dehradun Institute of Technology Dehradun, India Mr. Shervan Fekri Ershad, Shiraz International University, Iran Mr. Md. Safiqul Islam, Daffodil International University, Bangladesh Mr. Mahmudul Hasan, Daffodil International University, Bangladesh Prof. Mandakini Tayade, UIT, RGTU, Bhopal, India Ms. Sarla More, UIT, RGTU, Bhopal, India Mr. Tushar Hrishikesh Jaware, R.C. Patel Institute of Technology, Shirpur, India Ms. C. Divya, Dr G R Damodaran College of Science, Coimbatore, India Mr. Fahimuddin Shaik, Annamacharya Institute of Technology & Sciences, India Dr. M. N. Giri Prasad, JNTUCE,Pulivendula, A.P., India Assist. Prof. Chintan M Bhatt, Charotar University of Science And Technology, India Prof. Sahista Machchhar, Marwadi Education Foundation's Group of institutions, India Assist. Prof. Navnish Goel, S. D. College Of Enginnering & Technology, India Mr. Khaja Kamaluddin, Sirt University, Sirt, Libya Mr. Mohammad Zaidul Karim, Daffodil International, Bangladesh Mr. M. Vijayakumar, KSR College of Engineering, Tiruchengode, India Mr. S. A. Ahsan Rajon, Khulna University, Bangladesh Dr. Muhammad Mohsin Nazir, LCW University Lahore, Pakistan Mr. Mohammad Asadul Hoque, University of Alabama, USA Mr. P.V.Sarathchand, Indur Institute of Engineering and Technology, India Mr. Durgesh Samadhiya, Chung Hua University, Taiwan Dr Venu Kuthadi, University of Johannesburg, Johannesburg, RSA Dr. (Er) Jasvir Singh, Guru Nanak Dev University, Amritsar, Punjab, India Mr. Jasmin Cosic, Min. of the Interior of Una-sana canton, B&H, Bosnia and Herzegovina Dr S. Rajalakshmi, Botho College, South Africa Dr. Mohamed Sarrab, De Montfort University, UK Mr. Basappa B. Kodada, Canara Engineering College, India Assist. Prof. K. Ramana, Annamacharya Institute of Technology and Sciences, India Dr. Ashu Gupta, Apeejay Institute of Management, Jalandhar, India Assist. Prof. Shaik Rasool, Shadan College of Engineering & Technology, India Assist. Prof. K. Suresh, Annamacharya Institute of Tech & Sci. Rajampet, AP, India Dr . G. Singaravel, K.S.R. College of Engineering, India Dr B. G. Geetha, K.S.R. College of Engineering, India Assist. Prof. Kavita Choudhary, ITM University, Gurgaon Dr. Mehrdad Jalali, Azad University, Mashhad, Iran Megha Goel, Shamli Institute of Engineering and Technology, Shamli, India Mr. Chi-Hua Chen, Institute of Information Management, National Chiao-Tung University, Taiwan (R.O.C.)
  1371. Assoc. Prof. A. Rajendran, RVS College of Engineering and Technology, India Assist. Prof. S. Jaganathan, RVS College of Engineering and Technology, India Assoc. Prof. (Dr.) A S N Chakravarthy, JNTUK University College of Engineering Vizianagaram (State University)
  1372. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Dr. Pankaj Gupta, Microsoft Corporation, U.S.A. Assist. Prof. Panchamukesh Chandaka, Hyderabad Institute of Tech. & Management, India Prof. Mohan H.S, SJB Institute Of Technology, India Mr. Hossein Malekinezhad, Islamic Azad University, Iran Mr. Zatin Gupta, Universti Malaysia, Malaysia Assist. Prof. Amit Chauhan, Phonics Group of Institutions, India Assist. Prof. Ajal A. J., METS School Of Engineering, India Mrs. Omowunmi Omobola Adeyemo, University of Ibadan, Nigeria Dr. Bharat Bhushan Agarwal, I.F.T.M. University, India Md. Nazrul Islam, University of Western Ontario, Canada Tushar Kanti, L.N.C.T, Bhopal, India Er. Aumreesh Kumar Saxena, SIRTs College Bhopal, India Mr. Mohammad Monirul Islam, Daffodil International University, Bangladesh Dr. Kashif Nisar, University Utara Malaysia, Malaysia Dr. Wei Zheng, Rutgers Univ/ A10 Networks, USA Associate Prof. Rituraj Jain, Vyas Institute of Engg & Tech, Jodhpur -Rajasthan Assist. Prof. Apoorvi Sood, I.T.M. University, India Dr. Kayhan Zrar Ghafoor, University Technology Malaysia, Malaysia Mr. Swapnil Soner, Truba Institute College of Engineering & Technology, Indore, India Ms. Yogita Gigras, I.T.M. University, India Associate Prof. Neelima Sadineni, Pydha Engineering College, India Pydha Engineering College Assist. Prof. K. Deepika Rani, HITAM, Hyderabad Ms. Shikha Maheshwari, Jaipur Engineering College & Research Centre, India Prof. Dr V S Giridhar Akula, Avanthi's Scientific Tech. & Research Academy, Hyderabad Prof. Dr.S.Saravanan, Muthayammal Engineering College, India Mr. Mehdi Golsorkhatabar Amiri, Islamic Azad University, Iran Prof. Amit Sadanand Savyanavar, MITCOE, Pune, India Assist. Prof. P.Oliver Jayaprakash, Anna University,Chennai Assist. Prof. Ms. Sujata, ITM University, Gurgaon, India Dr. Asoke Nath, St. Xavier's College, India Mr. Masoud Rafighi, Islamic Azad University, Iran Assist. Prof. RamBabu Pemula, NIMRA College of Engineering & Technology, India Assist. Prof. Ms Rita Chhikara, ITM University, Gurgaon, India Mr. Sandeep Maan, Government Post Graduate College, India Prof. Dr. S. Muralidharan, Mepco Schlenk Engineering College, India Associate Prof. T.V.Sai Krishna, QIS College of Engineering and Technology, India Mr. R. Balu, Bharathiar University, Coimbatore, India Assist. Prof. Shekhar. R, Dr.SM College of Engineering, India Prof. P. Senthilkumar, Vivekanandha Institue of Engineering and Techology for Woman, India Mr. M. Kamarajan, PSNA College of Engineering & Technology, India Dr. Angajala Srinivasa Rao, Jawaharlal Nehru Technical University, India Assist. Prof. C. Venkatesh, A.I.T.S, Rajampet, India Mr. Afshin Rezakhani Roozbahani, Ayatollah Boroujerdi University, Iran Mr. Laxmi chand, SCTL, Noida, India Dr. Dr. Abdul Hannan, Vivekanand College, Aurangabad Prof. Mahesh Panchal, KITRC, Gujarat Dr. A. Subramani, K.S.R. College of Engineering, Tiruchengode
  1373. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1374. Assist. Prof. Prakash M, Rajalakshmi Engineering College, Chennai, India Assist. Prof. Akhilesh K Sharma, Sir Padampat Singhania University, India Ms. Varsha Sahni, Guru Nanak Dev Engineering College, Ludhiana, India Associate Prof. Trilochan Rout, NM Institute of Engineering and Technlogy, India Mr. Srikanta Kumar Mohapatra, NMIET, Orissa, India Mr. Waqas Haider Bangyal, Iqra University Islamabad, Pakistan Dr. S. Vijayaragavan, Christ College of Engineering and Technology, Pondicherry, India Prof. Elboukhari Mohamed, University Mohammed First, Oujda, Morocco Dr. Muhammad Asif Khan, King Faisal University, Saudi Arabia Dr. Nagy Ramadan Darwish Omran, Cairo University, Egypt.
  1375. Assistant Prof. Anand Nayyar, KCL Institute of Management and Technology, India Mr. G. Premsankar, Ericcson, India Assist. Prof. T. Hemalatha, VELS University, India Prof. Tejaswini Apte, University of Pune, India Dr. Edmund Ng Giap Weng, Universiti Malaysia Sarawak, Malaysia Mr. Mahdi Nouri, Iran University of Science and Technology, Iran Associate Prof. S. Asif Hussain, Annamacharya Institute of technology & Sciences, India Mrs. Kavita Pabreja, Maharaja Surajmal Institute (an affiliate of GGSIP University), India Mr. Vorugunti Chandra Sekhar, DA-IICT, India Mr. Muhammad Najmi Ahmad Zabidi, Universiti Teknologi Malaysia, Malaysia Dr. Aderemi A. Atayero, Covenant University, Nigeria Assist. Prof. Osama Sohaib, Balochistan University of Information Technology, Pakistan Assist. Prof. K. Suresh, Annamacharya Institute of Technology and Sciences, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Malaysia Mr. Robail Yasrab, Virtual University of Pakistan, Pakistan Mr. R. Balu, Bharathiar University, Coimbatore, India Prof. Anand Nayyar, KCL Institute of Management and Technology, Jalandhar Assoc. Prof. Vivek S Deshpande, MIT College of Engineering, India Prof. K. Saravanan, Anna university Coimbatore, India Dr. Ravendra Singh, MJP Rohilkhand University, Bareilly, India Mr. V. Mathivanan, IBRA College of Technology, Sultanate of OMAN Assoc. Prof. S. Asif Hussain, AITS, India Assist. Prof. C. Venkatesh, AITS, India Mr. Sami Ulhaq, SZABIST Islamabad, Pakistan Dr. B. Justus Rabi, Institute of Science & Technology, India Mr. Anuj Kumar Yadav, Dehradun Institute of technology, India Mr. Alejandro Mosquera, University of Alicante, Spain Assist. Prof. Arjun Singh, Sir Padampat Singhania University (SPSU), Udaipur, India Dr. Smriti Agrawal, JB Institute of Engineering and Technology, Hyderabad Assist. Prof. Swathi Sambangi, Visakha Institute of Engineering and Technology, India Ms. Prabhjot Kaur, Guru Gobind Singh Indraprastha University, India Mrs. Samaher AL-Hothali, Yanbu University College, Saudi Arabia Prof. Rajneeshkaur Bedi, MIT College of Engineering, Pune, India Mr. Hassen Mohammed Abduallah Alsafi, International Islamic University Malaysia (IIUM) Dr.
  1376. Wei Zhang, Amazon.com, Seattle, WA, USA Mr. B. Santhosh Kumar, C S I College of Engineering, Tamil Nadu Dr. K. Reji Kumar, , N S S College, Pandalam, India
  1377. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1378. Assoc. Prof. K. Seshadri Sastry, EIILM University, India Mr. Kai Pan, UNC Charlotte, USA Mr. Ruikar Sachin, SGGSIET, India Prof. (Dr.) Vinodani Katiyar, Sri Ramswaroop Memorial University, India Assoc. Prof., M. Giri, Sreenivasa Institute of Technology and Management Studies, India Assoc. Prof. Labib Francis Gergis, Misr Academy for Engineering and Technology (MET), Egypt Assist. Prof. Amanpreet Kaur, ITM University, India Assist. Prof. Anand Singh Rajawat, Shri Vaishnav Institute of Technology & Science, Indore Mrs. Hadeel Saleh Haj Aliwi, Universiti Sains Malaysia (USM), Malaysia Dr. Abhay Bansal, Amity University, India Dr. Mohammad A. Mezher, Fahad Bin Sultan University, KSA Assist. Prof. Nidhi Arora, M.C.A. Institute, India Prof. Dr. P. Suresh, Karpagam College of Engineering, Coimbatore, India Dr. Kannan Balasubramanian, Mepco Schlenk Engineering College, India Dr. S. Sankara Gomathi, Panimalar Engineering college, India Prof. Anil kumar Suthar, Gujarat Technological University, L.C. Institute of Technology, India Assist. Prof. R. Hubert Rajan, NOORUL ISLAM UNIVERSITY, India Assist. Prof. Dr. Jyoti Mahajan, College of Engineering & Technology Assist. Prof. Homam Reda El-Taj, College of Network Engineering, Saudi Arabia & Malaysia Mr. Bijan Paul, Shahjalal University of Science & Technology, Bangladesh Assoc. Prof. Dr. Ch V Phani Krishna, KL University, India Dr. Vishal Bhatnagar, Ambedkar Institute of Advanced Communication Technologies & Research, India Dr. Lamri LAOUAMER, Al Qassim University, Dept. Info. Systems & European University of Brittany, Dept. Computer Science, UBO, Brest, France Prof. Ashish Babanrao Sasankar, G.H.Raisoni Institute Of Information Technology, India Prof. Pawan Kumar Goel, Shamli Institute of Engineering and Technology, India Mr. Ram Kumar Singh, S.V Subharti University, India Assistant Prof. Sunish Kumar O S, Amaljyothi College of Engineering, India Dr Sanjay Bhargava, Banasthali University, India Mr. Pankaj S. Kulkarni, AVEW's Shatabdi Institute of Technology, India Mr. Roohollah Etemadi, Islamic Azad University, Iran Mr. Oloruntoyin Sefiu Taiwo, Emmanuel Alayande College Of Education, Nigeria Mr. Sumit Goyal, National Dairy Research Institute, India Mr Jaswinder Singh Dilawari, Geeta Engineering College, India Prof. Raghuraj Singh, Harcourt Butler Technological Institute, Kanpur Dr. S.K. Mahendran, Anna University, Chennai, India Dr. Amit Wason, Hindustan Institute of Technology & Management, Punjab Dr. Ashu Gupta, Apeejay Institute of Management, India Assist. Prof. D. Asir Antony Gnana Singh, M.I.E.T Engineering College, India Mrs Mina Farmanbar, Eastern Mediterranean University, Famagusta, North Cyprus Mr. Maram Balajee, GMR Institute of Technology, India Mr. Moiz S. Ansari, Isra University, Hyderabad, Pakistan Mr. Adebayo, Olawale Surajudeen, Federal University of Technology Minna, Nigeria Mr. Jasvir Singh, University College Of Engg., India Mr. Vivek Tiwari, MANIT, Bhopal, India Assoc. Prof. R. Navaneethakrishnan, Bharathiyar College of Engineering and Technology, India Mr. Somdip Dey, St. Xavier's College, Kolkata, India
  1379. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Mr. Souleymane Balla-Arabé, Xi'an University of Electronic Science and Technology, China Mr. Mahabub Alam, Rajshahi University of Engineering and Technology, Bangladesh Mr.
  1380. Sathyapraksh P., S.K.P Engineering College, India Dr. N. Karthikeyan, SNS College of Engineering, Anna University, India Dr. Binod Kumar, JSPM's, Jayawant Technical Campus, Pune, India Assoc. Prof. Dinesh Goyal, Suresh Gyan Vihar University, India Mr. Md. Abdul Ahad, K L University, India Mr. Vikas Bajpai, The LNM IIT, India Dr. Manish Kumar Anand, Salesforce (R & D Analytics), San Francisco, USA Assist. Prof. Dheeraj Murari, Kumaon Engineering College, India Assoc. Prof. Dr. A. Muthukumaravel, VELS University, Chennai Mr. A. Siles Balasingh, St.Joseph University in Tanzania, Tanzania Mr. Ravindra Daga Badgujar, R C Patel Institute of Technology, India Dr. Preeti Khanna, SVKM's NMIMS, School of Business Management, India Mr. Kumar Dayanand, Cambridge Institute of Technology, India Dr. Syed Asif Ali, SMI University Karachi, Pakistan Prof. Pallvi Pandit, Himachal Pradeh University, India Mr. Ricardo Verschueren, University of Gloucestershire, UK Assist. Prof. Mamta Juneja, University Institute of Engineering and Technology, Panjab University, India Assoc. Prof. P. Surendra Varma, NRI Institute of Technology, JNTU Kakinada, India Assist. Prof. Gaurav Shrivastava, RGPV / SVITS Indore, India Dr. S. Sumathi, Anna University, India Assist. Prof. Ankita M. Kapadia, Charotar University of Science and Technology, India Mr. Deepak Kumar, Indian Institute of Technology (BHU), India Dr. Dr. Rajan Gupta, GGSIP University, New Delhi, India Assist. Prof M. Anand Kumar, Karpagam University, Coimbatore, India Mr. Mr Arshad Mansoor, Pakistan Aeronautical Complex Mr. Kapil Kumar Gupta, Ansal Institute of Technology and Management, India Dr. Neeraj Tomer, SINE International Institute of Technology, Jaipur, India Assist. Prof. Trunal J. Patel, C.G.Patel Institute of Technology, Uka Tarsadia University, Bardoli, Surat Mr. Sivakumar, Codework solutions, India Mr. Mohammad Sadegh Mirzaei, PGNR Company, Iran Dr. Gerard G. Dumancas, Oklahoma Medical Research Foundation, USA Mr. Varadala Sridhar, Varadhaman College Engineering College, Affiliated To JNTU, Hyderabad Assist. Prof. Manoj Dhawan, SVITS, Indore Assoc. Prof. Chitreshh Banerjee, Suresh Gyan Vihar University, Jaipur, India Dr. S. Santhi, SCSVMV University, India Mr. Davood Mohammadi Souran, Ministry of Energy of Iran, Iran Mr. Shamim Ahmed, Bangladesh University of Business and Technology, Bangladesh Mr. Sandeep Reddivari, Mississippi State University, USA Assoc. Prof. Ousmane Thiare, Gaston Berger University, Senegal Dr. Hazra Imran, Athabasca University, Canada Dr. Setu Kumar Chaturvedi, Technocrats Institute of Technology, Bhopal, India Mr. Mohd Dilshad Ansari, Jaypee University of Information Technology, India Ms. Jaspreet Kaur, Distance Education LPU, India Dr. D. Nagarajan, Salalah College of Technology, Sultanate of Oman Dr. K.V.N.R.Sai Krishna, S.V.R.M. College, India
  1381. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Mr. Himanshu Pareek, Center for Development of Advanced Computing (CDAC), India Mr. Khaldi Amine, Badji Mokhtar University, Algeria Mr. Mohammad Sadegh Mirzaei, Scientific Applied University, Iran Assist. Prof. Khyati Chaudhary, Ram-eesh Institute of Engg. & Technology, India Mr. Sanjay Agal, Pacific College of Engineering Udaipur, India Mr. Abdul Mateen Ansari, King Khalid University, Saudi Arabia Dr. H.S. Behera, Veer Surendra Sai University of Technology (VSSUT), India Dr. Shrikant Tiwari, Shri Shankaracharya Group of Institutions (SSGI), India Prof. Ganesh B. Regulwar, Shri Shankarprasad Agnihotri College of Engg, India Prof. Pinnamaneni Bhanu Prasad, Matrix vision GmbH, Germany Dr. Shrikant Tiwari, Shri Shankaracharya Technical Campus (SSTC), India Dr. Siddesh G.K., : Dayananada Sagar College of Engineering, Bangalore, India Dr. Nadir Bouchama, CERIST Research Center, Algeria Dr. R. Sathishkumar, Sri Venkateswara College of Engineering, India Assistant Prof (Dr.) Mohamed Moussaoui, Abdelmalek Essaadi University, Morocco Dr. S. Malathi, Panimalar Engineering College, Chennai, India Dr. V. Subedha, Panimalar Institute of Technology, Chennai, India Dr. Prashant Panse, Swami Vivekanand College of Engineering, Indore, India Dr. Hamza Aldabbas, Al-Balqa'a Applied University, Jordan Dr. G. Rasitha Banu, Vel's University, Chennai Dr. V. D. Ambeth Kumar, Panimalar Engineering College, Chennai Prof. Anuranjan Misra, Bhagwant Institute of Technology, Ghaziabad, India Ms. U. Sinthuja, PSG college of arts &science, India Dr. Ehsan Saradar Torshizi, Urmia University, Iran Dr. Shamneesh Sharma, APG Shimla University, Shimla (H.P.), India
  1382. Assistant Prof. A. S. Syed Navaz, Muthayammal College of Arts & Science, India Assistant Prof. Ranjit Panigrahi, Sikkim Manipal Institute of Technology, Majitar, Sikkim Dr. Khaled Eskaf, Arab Academy for Science ,Technology & Maritime Transportation, Egypt Dr. Nishant Gupta, University of Jammu, India Assistant Prof. Nagarajan Sankaran, Annamalai University, Chidambaram, Tamilnadu, India Assistant Prof.Tribikram Pradhan, Manipal Institute of Technology, India Dr. Nasser Lotfi, Eastern Mediterranean University, Northern Cyprus Dr. R. Manavalan, K S Rangasamy college of Arts and Science, Tamilnadu, India Assistant Prof. P. Krishna Sankar, K S Rangasamy college of Arts and Science, Tamilnadu, India Dr. Rahul Malik, Cisco Systems, USA Dr. S. C. Lingareddy, ALPHA College of Engineering, India Assistant Prof. Mohammed Shuaib, Interal University, Lucknow, India Dr. Sachin Yele, Sanghvi Institute of Management & Science, India Dr. T. Thambidurai, Sun Univercell, Singapore Prof. Anandkumar Telang, BKIT, India Assistant Prof. R. Poorvadevi, SCSVMV University, India Dr Uttam Mande, Gitam University, India Dr. Poornima Girish Naik, Shahu Institute of Business Education and Research (SIBER), India Prof. Md. Abu Kausar, Jaipur National University, Jaipur, India Dr. Mohammed Zuber, AISECT University, India Prof. Kalum Priyanath Udagepola, King Abdulaziz University, Saudi Arabia Dr. K. R. Ananth, Velalar College of Engineering and Technology, India
  1383. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1384. Assistant Prof. Sanjay Sharma, Roorkee Engineering & Management Institute Shamli (U.P), India Assistant Prof. Panem Charan Arur, Priyadarshini Institute of Technology, India Dr. Ashwak Mahmood muhsen alabaichi, Karbala University / College of Science, Iraq Dr. Urmila Shrawankar, G H Raisoni College of Engineering, Nagpur (MS), India Dr. Krishan Kumar Paliwal, Panipat Institute of Engineering & Technology, India Dr. Mukesh Negi, Tech Mahindra, India Dr. Anuj Kumar Singh, Amity University Gurgaon, India Dr. Babar Shah, Gyeongsang National University, South Korea Assistant Prof. Jayprakash Upadhyay, SRI-TECH Jabalpur, India Assistant Prof. Varadala Sridhar, Vidya Jyothi Institute of Technology, India Assistant Prof. Parameshachari B D, KSIT, Bangalore, India Assistant Prof. Ankit Garg, Amity University, Haryana, India Assistant Prof. Rajashe Karappa, SDMCET, Karnataka, India Assistant Prof. Varun Jasuja, GNIT, India Assistant Prof. Sonal Honale, Abha Gaikwad Patil College of Engineering Nagpur, India Dr. Pooja Choudhary, CT Group of Institutions, NIT Jalandhar, India Dr. Faouzi Hidoussi, UHL Batna, Algeria Dr. Naseer Ali Husieen, Wasit University, Iraq Assistant Prof. Vinod Kumar Shukla, Amity University, Dubai Dr. Ahmed Farouk Metwaly, K L University Mr. Mohammed Noaman Murad, Cihan University, Iraq Dr. Suxing Liu, Arkansas State University, USA Dr. M. Gomathi, Velalar College of Engineering and Technology, India Assistant Prof. Sumardiono, College PGRI Blitar, Indonesia Dr. Latika Kharb, Jagan Institute of Management Studies (JIMS), Delhi, India Associate Prof. S. Raja, Pauls College of Engineering and Technology, Tamilnadu, India Assistant Prof. Seyed Reza Pakize, Shahid Sani High School, Iran Dr. Thiyagu Nagaraj, University-INOU, India Assistant Prof. Noreen Sarai, Harare Institute of Technology, Zimbabwe Assistant Prof. Gajanand Sharma, Suresh Gyan Vihar University Jaipur, Rajasthan, India Assistant Prof. Mapari Vikas Prakash, Siddhant COE, Sudumbare, Pune, India Dr. Devesh Katiyar, Shri Ramswaroop Memorial University, India Dr. Shenshen Liang, University of California, Santa Cruz, US Assistant Prof. Mohammad Abu Omar, Limkokwing University of Creative Technology-Malaysia Mr. Snehasis Banerjee, Tata Consultancy Services, India Assistant Prof. Kibona Lusekelo, Ruaha Catholic University (RUCU), Tanzania Assistant Prof. Adib Kabir Chowdhury, University College Technology Sarawak, Malaysia Dr. Ying Yang, Computer Science Department, Yale University, USA Dr. Vinay Shukla, Institute Of Technology & Management, India Dr. Liviu Octavian Mafteiu-Scai, West University of Timisoara, Romania Assistant Prof. Rana Khudhair Abbas Ahmed, Al-Rafidain University College, Iraq Assistant Prof. Nitin A. Naik, S.R.T.M. University, India Dr. Timothy Powers, University of Hertfordshire, UK Dr. S. Prasath, Bharathiar University, Erode, India Dr. Ritu Shrivastava, SIRTS Bhopal, India Prof. Rohit Shrivastava, Mittal Institute of Technology, Bhopal, India Dr. Gianina Mihai, Dunarea de Jos" University of Galati, Romania
  1385. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016
  1386. Assistant Prof. Ms. T. Kalai Selvi, Erode Sengunthar Engineering College, India Assistant Prof. Ms. C. Kavitha, Erode Sengunthar Engineering College, India Assistant Prof. K. Sinivasamoorthi, Erode Sengunthar Engineering College, India Assistant Prof. Mallikarjun C Sarsamba Bheemnna Khandre Institute Technology, Bhalki, India Assistant Prof. Vishwanath Chikaraddi, Veermata Jijabai technological Institute (Central Technological Institute), India Assistant Prof. Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, India Assistant Prof. Mohammed Noaman Murad, Cihan University, Iraq Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Dr. Parul Verma, Amity University, India Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco Assistant Prof. Madhavi Dhingra, Amity University, Madhya Pradesh, India Assistant Prof.. G. Selvavinayagam, SNS College of Technology, Coimbatore, India Assistant Prof. Madhavi Dhingra, Amity University, MP, India Professor Kartheesan Log, Anna University, Chennai Professor Vasudeva Acharya, Shri Madhwa vadiraja Institute of Technology, India Dr. Asif Iqbal Hajamydeen, Management & Science University, Malaysia Assistant Prof., Mahendra Singh Meena, Amity University Haryana Assistant Professor Manjeet Kaur, Amity University Haryana Dr. Mohamed Abd El-Basset Matwalli, Zagazig University, Egypt Dr. Ramani Kannan, Universiti Teknologi PETRONAS, Malaysia Assistant Prof. S. Jagadeesan Subramaniam, Anna University, India Assistant Prof. Dharmendra Choudhary, Tripura University, India Assistant Prof. Deepika Vodnala, SR Engineering College, India Dr. Kai Cong, Intel Corporation & Computer Science Department, Portland State University, USA Dr. Kailas R Patil, Vishwakarma Institute of Information Technology (VIIT), India Dr. Omar A. Alzubi, Faculty of IT / Al-Balqa Applied University, Jordan Assistant Prof. Kareemullah Shaik, Nimra Institute of Science and Technology, India Assistant Prof. Chirag Modi, NIT Goa Dr. R. Ramkumar, Nandha Arts And Science College, India Dr. Priyadharshini Vydhialingam, Harathiar University, India Dr. P. S. Jagadeesh Kumar, DBIT, Bangalore, Karnataka Dr. Vikas Thada, AMITY University, Pachgaon Dr. T. A. Ashok Kumar, Institute of Management, Christ University, Bangalore Dr. Shaheera Rashwan, Informatics Research Institute Dr. S. Preetha Gunasekar, Bharathiyar University, India Asst Professor Sameer Dev Sharma, Uttaranchal University, Dehradun Dr. Zhihan lv, Chinese Academy of Science, China Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, Amritsar Dr. Umar Ruhi, University of Ottawa, Canada Dr. Jasmin Cosic, University of Bihac, Bosnia and Herzegovina Dr. Homam Reda El-Taj, University of Tabuk, Kingdom of Saudi Arabia Dr. Mostafa Ghobaei Arani, Islamic Azad University, Iran Dr. Ayyasamy Ayyanar, Annamalai University, India Dr. Selvakumar Manickam, Universiti Sains Malaysia, Malaysia Dr. Murali Krishna Namana, GITAM University, India Dr. Smriti Agrawal, Chaitanya Bharathi Institute of Technology, Hyderabad, India Professor Vimalathithan Rathinasabapathy, Karpagam College Of Engineering, India Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Dr. Sushil Chandra Dimri, Graphic Era University, India Dr. Dinh-Sinh Mai, Le Quy Don Technical University, Vietnam Dr. S. Rama Sree, Aditya Engg. College, India Dr. Ehab T. Alnfrawy, Sadat Academy, Egypt Dr. Patrick D. Cerna, Haramaya University, Ethiopia Dr. Vishal Jain, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), India Associate Prof. Dr. Jiliang Zhang, North Eastern University, China Dr. Sharefa Murad, Middle East University, Jordan Dr. Ajeet Singh Poonia, Govt. College of Engineering & technology, Rajasthan, India Dr. Vahid Esmaeelzadeh, University of Science and Technology, Iran Dr. Jacek M. Czerniak, Casimir the Great University in Bydgoszcz, Institute of Technology, Poland Associate Prof. Anisur Rehman Nasir, Jamia Millia Islamia University Assistant Prof. Imran Ahmad, COMSATS Institute of Information Technology, Pakistan Professor Ghulam Qasim, Preston University, Islamabad, Pakistan Dr. Parameshachari B D, GSSS Institute of Engineering and Technology for Women Dr. Wencan Luo, University of Pittsburgh, US Dr. Musa PEKER, Faculty of Technology, Mugla Sitki Kocman University, Turkey Dr. Gunasekaran Shanmugam, Anna University, India Dr. Binh P. Nguyen, National University of Singapore, Singapore Dr. Rajkumar Jain, Indian Institute of Technology Indore, India Dr. Imtiaz Ali Halepoto, QUEST Nawabshah, Pakistan Dr. Shaligram Prajapat, Devi Ahilya University Indore India Dr. Sunita Singhal, Birla Institute of Technologyand Science, Pilani, India Dr. Ijaz Ali Shoukat, King Saud University, Saudi Arabia Dr. Anuj Gupta, IKG Punjab Technical University, India Dr. Sonali Saini, IES-IPS Academy, India Dr. Krishan Kumar, MotiLal Nehru National Institute of Technology, Allahabad, India Dr. Z. Faizal Khan, College of Engineering, Shaqra University, Kingdom of Saudi Arabia Prof. M. Padmavathamma, S.V. University Tirupati, India Prof. A. Velayudham, Cape Institute of Technology, India Prof. Seifeidne Kadry, American University of the Middle East Dr. J. Durga Prasad Rao, Pt. Ravishankar Shukla University, Raipur Assistant Prof. Najam Hasan, Dhofar University Dr. G. Suseendran, Vels University, Pallavaram, Chennai Prof. Ankit Faldu, Gujarat Technological Universiry-Atmiya Institute of Technology and Science Dr. Ali Habiboghli, Islamic Azad University Dr. Deepak Dembla, JECRC University, Jaipur, India Dr. Pankaj Rajan, Walmart Labs, USA Assistant Prof. Radoslava Kraleva, South-West University "Neofit Rilski", Bulgaria Assistant Prof. Medhavi Shriwas, Shri vaishnav institute of Technology, India Associate Prof. Sedat Akleylek, Ondokuz Mayis University, Turkey Dr. U.V. Arivazhagu, Kingston Engineering College Affiliated To Anna University, India Dr. Touseef Ali, University of Engineering and Technology, Taxila, Pakistan Assistant Prof. Naren Jeeva, SASTRA University, India Dr. Riccardo Colella, University of Salento, Italy Dr. Enache Maria Cristina, University of Galati, Romania Dr. Senthil P, Kurinji College of Arts & Science, India
  1387. Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 Dr. Hasan Ashrafi-rizi, Isfahan University of Medical Sciences, Isfahan, Iran Dr. Mazhar Malik, Institute of Southern Punjab, Pakistan Dr. Yajie Miao, Carnegie Mellon University, USA Dr. Kamran Shaukat, University of the Punjab, Pakistan Dr. Sasikaladevi N., SASTRA University, India Dr. Ali Asghar Rahmani Hosseinabadi, Islamic Azad University Ayatollah Amoli Branch, Amol, Iran Dr. Velin Kralev, South-West University "Neofit Rilski", Blagoevgrad, Bulgaria Dr. Marius Iulian Mihailescu, LUMINA -The University of South-East Europe Dr. Sriramula Nagaprasad, S.R.R.Govt.Arts & Science College, Karimnagar, India Prof (Dr.) Namrata Dhanda, Dr. APJ Abdul Kalam Technical University, Lucknow, India Dr. Javed Ahmed Mahar, Shah Abdul Latif University, Khairpur Mir's, Pakistan Dr. B. Narendra Kumar Rao, Sree Vidyanikethan Engineering College, India Dr. Shahzad Anwar, University of Engineering & Technology Peshawar, Pakistan Dr. Basit Shahzad, King Saud University, Riyadh -Saudi Arabia Dr. Nilamadhab Mishra, Chang Gung University Dr. Sachin Kumar, Indian Institute of Technology Roorkee Dr. Santosh Nanda, Biju-Pattnaik University of Technology Dr. Sherzod Turaev, International Islamic University Malaysia Dr. Yilun Shang, Tongji University, Department of Mathematics, Shanghai, China Dr. Nuzhat Shaikh, Modern Education society's College of Engineering, Pune, India Dr. Parul Verma, Amity University, Lucknow campus, India Dr. Rachid Alaoui, Agadir Ibn Zohr University, Agadir, Morocco Dr. Dharmendra Patel, Charotar University of Science and Technology, India Dr. Dong Zhang, University of Central Florida, USA Dr. Kennedy Chinedu Okafor, Federal University of Technology Owerri, Nigeria Prof. C Ram Kumar, Dr NGP Institute of Technology, India Dr. Sandeep Gupta, GGS IP University, New Delhi, India Dr. Shahanawaj Ahamad, University of Ha'il, Ha'il City, Ministry of Higher Education, Kingdom of Saudi Arabia Dr. Najeed Ahmed Khan, NED University of Engineering & Technology, India Dr. Sajid Ullah Khan, Universiti Malaysia Sarawak, Malaysia Dr. Muhammad Asif, National Textile University Faisalabad, Pakistan Dr. Yu BI, University of Central Florida, Orlando, FL, USA Dr. Brijendra Kumar Joshi, Research Center, Military College of Telecommunication Engineering, India Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and Information Security (IJCSIS) https://sites.google.com/site/ijcsis/ ISSN 1947-5500 International Conference on Advances in Computational Intelligence and Communication (CIC 2016) Pondicherry Engineering College, Puducherry, India October 19 & 20 -2016 CALL FOR PAPERS International Journal of Computer Science and Information Security IJCSIS 2016 ISSN: 1947-5500 http://sites.google.com/site/ijcsis/ International Journal Computer Science and Information Security, IJCSIS, is the premier scholarly venue in the areas of computer science and security issues. IJCSIS 2011 will provide a high profile, leading edge platform for researchers and engineers alike to publish state-of-the-art research in the respective fields of information technology and communication security. The journal will feature a diverse mixture of publication articles including core and applied computer science related topics. Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Submissions may span a broad range of topics, e.g.: Track A: Security Access control, Anonymity, Audit and audit reduction & Authentication and authorization, Applied cryptography, Cryptanalysis, Digital Signatures, Biometric security, Boundary control devices, Certification and accreditation, Cross-layer design for security, Security & Network Management, Data and system integrity, Database security, Defensive information warfare, Denial of service protection, Intrusion Detection, Anti-malware, Distributed systems security, Electronic commerce, E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection, Grid security, Information hiding and watermarking & Information survivability, Insider threat protection, Integrity Intellectual property protection, Internet/Intranet Security, Key management and key recovery, Language- based security, Mobile and wireless security, Mobile, Ad Hoc and Sensor Network Security, Monitoring and surveillance, Multimedia security ,Operating system security, Peer-to-peer security, Performance Evaluations of Protocols & Security Application, Privacy and data protection, Product evaluation criteria and compliance, Risk evaluation and security certification, Risk/vulnerability assessment, Security & Network Management, Security Models & protocols, Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,), Trusted computing, Ubiquitous Computing Security, Virtualization security, VoIP security, Web 2.0 security, Submission Procedures, Active Defense Systems, Adaptive Defense Systems, Benchmark, Analysis and Evaluation of Security Systems, Distributed Access Control and Trust Management, Distributed Attack Systems and Mechanisms, Distributed Intrusion Detection/Prevention Systems, Denial-of-Service Attacks and Countermeasures, High Performance Security Systems, Identity Management and Authentication, Implementation, Deployment and Management of Security Systems, Intelligent Defense Systems, Internet and Network Forensics, Large- scale Attacks and Defense, RFID Security and Privacy, Security Architectures in Distributed Network Systems, Security for Critical Infrastructures, Security for P2P systems and Grid Systems, Security in E- Commerce, Security and Privacy in Wireless Networks, Secure Mobile Agents and Mobile Code, Security Protocols, Security Simulation and Tools, Security Theory and Tools, Standards and Assurance Methods, Trusted Computing, Viruses, Worms, and Other Malicious Code, World Wide Web Security, Novel and emerging secure architecture, Study of attack strategies, attack modeling, Case studies and analysis of actual attacks, Continuity of Operations during an attack, Key management, Trust management, Intrusion detection techniques, Intrusion response, alarm management, and correlation analysis, Study of tradeoffs between security and system performance, Intrusion tolerance systems, Secure protocols, Security in wireless networks (e.g. mesh networks, sensor networks, etc.), Cryptography and Secure Communications, Computer Forensics, Recovery and Healing, Security Visualization, Formal Methods in Security, Principles for Designing a Secure Computing System, Autonomic Security, Internet Security, Security in Health Care Systems, Security Solutions Using Reconfigurable Computing, Adaptive and Intelligent Defense Systems, Authentication and Access control, Denial of service attacks and countermeasures, Identity, Route and Location Anonymity schemes, Intrusion detection and prevention techniques, Cryptography, encryption algorithms and Key management schemes, Secure routing schemes, Secure neighbor discovery and localization, Trust establishment and maintenance, Confidentiality and data integrity, Security architectures, deployments and solutions, Emerging threats to cloud-based services, Security model for new services, Cloud-aware web service security, Information hiding in Cloud Computing, Securing distributed data storage in cloud, Security, privacy and trust in mobile computing systems and applications, Middleware security & Security features: middleware software is an asset on its own and has to be protected, interaction between security-specific and other middleware features, e.g., context-awareness, Middleware-level security monitoring and measurement: metrics and mechanisms for quantification and evaluation of security enforced by the middleware, Security co-design: trade-off and co-design between application-based and middleware-based security, Policy-based management: innovative support for policy-based definition and enforcement of security concerns, Identification and authentication mechanisms: Means to capture application specific constraints in defining and enforcing access control rules, Middleware-oriented security patterns: identification of patterns for sound, reusable security, Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects, Security in agent-based platforms: protection for mobile code and platforms, Smart Devices: Biometrics, National ID cards, Embedded Systems Security and TPMs, RFID Systems Security, Smart Card Security, Pervasive Systems: Digital Rights Management (DRM) in pervasive environments, Intrusion Detection and Information Filtering, Localization Systems Security (Tracking of People and Goods), Mobile Commerce Security, Privacy Enhancing Technologies, Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity), Ubiquitous Networks: Ad Hoc Networks Security, Delay- Tolerant Network Security, Domestic Network Security, Peer-to-Peer Networks Security, Security Issues in Mobile and Ubiquitous Networks, Security of GSM/GPRS/UMTS Systems, Sensor Networks Security, Vehicular Network Security, Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others This Track will emphasize the design, implementation, management and applications of computer communications, networks and services. Topics of mostly theoretical nature are also welcome, provided there is clear practical potential in applying the results of such work. Track B: Computer Science Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA, Resource allocation and interference management, Quality of service and scheduling methods, Capacity planning and dimensioning, Cross-layer design and Physical layer based issue, Interworking architecture and interoperability, Relay assisted and cooperative communications, Location and provisioning and mobility management, Call admission and flow/congestion control, Performance optimization, Channel capacity modeling and analysis, Middleware Issues: Event-based, publish/subscribe, and message-oriented middleware, Reconfigurable, adaptable, and reflective middleware approaches, Middleware solutions for reliability, fault tolerance, and quality-of-service, Scalability of middleware, Context-aware middleware, Autonomic and self-managing middleware, Evaluation techniques for middleware solutions, Formal methods and tools for designing, verifying, and evaluating, middleware, Software engineering techniques for middleware, Service oriented middleware, Agent-based middleware, Security middleware, Network Applications: Network-based automation, Cloud applications, Ubiquitous and pervasive applications, Collaborative applications, RFID and sensor network applications, Mobile applications, Smart home applications, Infrastructure monitoring and control applications, Remote health monitoring, GPS and location-based applications, Networked vehicles applications, Alert applications, Embeded Computer System, Advanced Control Systems, and Intelligent Control : Advanced control and measurement, computer and microprocessor-based control, signal processing, estimation and identification techniques, application specific IC's, nonlinear and adaptive control, optimal and robot control, intelligent control, evolutionary computing, and intelligent systems, instrumentation subject to critical conditions, automotive, marine and aero-space control and all other control applications, Intelligent Control System, Wiring/Wireless Sensor, Signal Control System. Sensors, Actuators and Systems Integration : Intelligent sensors and actuators, multisensor fusion, sensor array and multi-channel processing, micro/nano technology, microsensors and microactuators, instrumentation electronics, MEMS and system integration, wireless sensor, Network Sensor, Hybrid Sensor, Distributed Sensor Networks. Signal and Image Processing : Digital signal processing theory, methods, DSP implementation, speech processing, image and multidimensional signal processing, Image analysis and processing, Image and Multimedia applications, Real-time multimedia signal processing, Computer vision, Emerging signal processing areas, Remote Sensing, Signal processing in education. Industrial Informatics: Industrial applications of neural networks, fuzzy algorithms, Neuro-Fuzzy application, bioInformatics, real-time computer control, real-time information systems, human-machine interfaces, CAD/CAM/CAT/CIM, virtual reality, industrial communications, flexible manufacturing systems, industrial automated process, Data Storage Management, Harddisk control, Supply Chain Management, Logistics applications, Power plant automation, Drives automation. Information Technology, Management of Information System : Management information systems, Information Management, Nursing information management, Information System, Information Technology and their application, Data retrieval, Data Base Management, Decision analysis methods, Information processing, Operations research, E-Business, E-Commerce, E-Government, Computer Business, Security and risk management, Medical imaging, Biotechnology, Bio-Medicine, Computer-based information systems in health care, Changing Access to Patient Information, Healthcare Management Information Technology.
  1388. Communication/Computer Network, Transportation Application : On-board diagnostics, Active safety systems, Communication systems, Wireless technology, Communication application, Navigation and Guidance, Vision-based applications, Speech interface, Sensor fusion, Networking theory and technologies, Transportation information, Autonomous vehicle, Vehicle application of affective computing, Advance Computing technology and their application : Broadband and intelligent networks, Data Mining, Data fusion, Computational intelligence, Information and data security, Information indexing and retrieval, Information processing, Information systems and applications, Internet applications and performances, Knowledge based systems, Knowledge management, Software Engineering, Decision making, Mobile networks and services, Network management and services, Neural Network, Fuzzy logics, Neuro-Fuzzy, Expert approaches, Innovation Technology and Management : Innovation and product development, Emerging advances in business and its applications, Creativity in Internet management and retailing, B2B and B2C management, Electronic transceiver device for Retail Marketing Industries, Facilities planning and management, Innovative pervasive computing applications, Programming paradigms for pervasive systems, Software evolution and maintenance in pervasive systems, Middleware services and agent technologies, Adaptive, autonomic and context-aware computing, Mobile/Wireless computing systems and services in pervasive computing, Energy-efficient and green pervasive computing, Communication architectures for pervasive computing, Ad hoc networks for pervasive communications, Pervasive opportunistic communications and applications, Enabling technologies for pervasive systems (e.g., wireless BAN, PAN), Positioning and tracking technologies, Sensors and RFID in pervasive systems, Multimodal sensing and context for pervasive applications, Pervasive sensing, perception and semantic interpretation, Smart devices and intelligent environments, Trust, security and privacy issues in pervasive systems, User interfaces and interaction models, Virtual immersive communications, Wearable computers, Standards and interfaces for pervasive computing environments, Social and economic models for pervasive systems, Active and Programmable Networks, Ad Hoc & Sensor Network, Congestion and/or Flow Control, Content Distribution, Grid Networking, High-speed Network Architectures, Internet Services and Applications, Optical Networks, Mobile and Wireless Networks, Network Modeling and Simulation, Multicast, Multimedia Communications, Network Control and Management, Network Protocols, Network Performance, Network Measurement, Peer to Peer and Overlay Networks, Quality of Service and Quality of Experience, Ubiquitous Networks, Crosscutting Themes -Internet Technologies, Infrastructure, Services and Applications; Open Source Tools, Open Models and Architectures; Security, Privacy and Trust; Navigation Systems, Location Based Services; Social Networks and Online Communities; ICT Convergence, Digital Economy and Digital Divide, Neural Networks, Pattern Recognition, Computer Vision, Advanced Computing Architectures and New Programming Models, Visualization and Virtual Reality as Applied to Computational Science, Computer Architecture and Embedded Systems, Technology in Education, Theoretical Computer Science, Computing Ethics, Computing Practices & Applications Authors are invited to submit papers through e-mail ijcsiseditor@gmail.com. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated by IJCSIS. Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://sites.google.com/site/ijcsis/authors-notes .