Name:International Conference on Internet of Things and Applications for Smart City  AITS,Tirupati(ICIOTAS)

Date:18th March'2016
Place:Tirupati
Paper Count:55

VIDEO TRACKING FOR MULTI TASK BY USING HIERARCHICAL FEATURES

DOI:01.1617/vol3iss3pid216

Author:N.Latha

Quick Abstract Add To Library PDF ARL Cited By- 0

Design and Implementation of secure communication between Two Branches of a company using IPSec protocol In CLI and GUI modes

DOI:01.1617/vol3iss3pid217

Author:S. Sri Priya

Quick Abstract Add To Library PDF ARL Cited By- 1

An Intelligent Robotic Home Security System

DOI:01.1617/vol3iss3pid218

Author:A.R.Revathi

Quick Abstract Add To Library PDF ARL Cited By- 0

Employment Exchange Application for Android Platform

DOI:01.1617/vol3iss3pid219

Author:B Brindha

Quick Abstract Add To Library PDF ARL Cited By- 1

“Academia” - An Android Application

DOI:01.1617/vol3iss3pid220

Author:Janani.K

Quick Abstract Add To Library PDF ARL Cited By- 1

“Complex Event Processing Application for Smart City”

DOI:01.1617/vol3iss3pid221

Author:Poonam Hajare

Quick Abstract Add To Library PDF ARL Cited By- 0

Smart Education for Smart City: A Solution to School Dropout

DOI:01.1617/vol3iss3pid222

Author:V. S. Mahalle

Quick Abstract Add To Library PDF ARL Cited By- 1

Internet of Things as an Approach of Evolutionary Practice in Computer Applications

DOI:01.1617/vol3iss3pid223

Author:K.V.Sravani

Quick Abstract Add To Library PDF ARL Cited By- 0

Graphics Extraction - Vector Processing XSLT and XML Transformation

DOI:01.1617/vol3iss3pid224

Author:Irudaya Ratnam S

Quick Abstract Add To Library PDF ARL Cited By- 1

Prioritized and on Time Safety Critical Message Transmission in VANET

DOI:01.1617/vol3iss3pid225

Author:D.Raveena Reddy

Quick Abstract Add To Library PDF ARL Cited By- 0

Data Mining Using Matrix Factorization for Enhancing a Patient’s HealthCare

DOI:01.1617/vol3iss3pid226

Author:Manigandan. J

Quick Abstract Add To Library PDF ARL Cited By- 0

A Health-IoT Platform Based On the Bio-Sensor and Mobile Application

DOI:01.1617/vol3iss3pid227

Author:K.V.S.N.Rama Rao

Quick Abstract Add To Library PDF ARL Cited By- 0

Identification of the movements of Human in a Video

DOI:01.1617/vol3iss3pid238

Author:Divya.M

Quick Abstract Add To Library PDF ARL Cited By- 0

Greedy hop algorithm for detecting shortest path in Vehicular Networks

DOI:01.1617/vol3iss3pid239

Author:Gayathri. S

Quick Abstract Add To Library PDF ARL Cited By- 0

Tracking of Change in Database at API Level

DOI:01.1617/vol3iss3pid240

Author:Miss. Shivani Dhotre

Quick Abstract Add To Library PDF ARL Cited By- 0

Social Networking for City Safety - Abilities' And Unattended Challenges In Techniques Foreseeing Safety Value

DOI:01.1617/vol3iss3pid241

Author:C.S.Saradha

Quick Abstract Add To Library PDF ARL Cited By- 0

Spatial Data Analysis for Knowledge Discovery Using Segmentation Based Clustering

DOI:01.1617/vol3iss3pid242

Author:Ch. Mallikarjuna Rao

Quick Abstract Add To Library PDF ARL Cited By- 0

Social Networking for City Safety - Abilities' And Unattended Challenges In Techniques Foreseeing Safety Value

DOI:01.1617/vol3iss3pid243

Author:C.S.Saradha

Quick Abstract Add To Library PDF ARL Cited By- 0

Audio Cryptography

DOI:01.1617/vol3iss3pid244

Author:M Sai Chandrahasa

Quick Abstract Add To Library PDF ARL Cited By- 0

Automation Of Information Help Desk System

DOI:01.1617/vol3iss3pid245

Author:Manoj Kumar

Quick Abstract Add To Library PDF ARL Cited By- 0

Clustering and Content-Based Retrieval For Image Database

DOI:01.1617/vol3iss3pid246

Author:K Prabhu Kiran

Quick Abstract Add To Library PDF ARL Cited By- 1

Detecting Malicious Face book Applications

DOI:01.1617/vol3iss3pid247

Author:B Mariamma

Quick Abstract Add To Library PDF ARL Cited By- 0

Detecting Malicious Entities in Wireless Mesh Networks

DOI:01.1617/vol3iss3pid248

Author:K Vijay Kumar

Quick Abstract Add To Library PDF ARL Cited By- 0

Dynamic Search Algorithm for Message Routing In Unstructured Peer To Peer Network

DOI:01.1617/vol3iss3pid249

Author:A. Sai Pratheek

Quick Abstract Add To Library PDF ARL Cited By- 0

Embedded Extended Visual Cryptography Schemes

DOI:01.1617/vol3iss3pid250

Author:S. Meghana Reddy

Quick Abstract Add To Library PDF ARL Cited By- 0

Enhanced Efficient K-Means Clustering Algorithm

DOI:01.1617/vol3iss3pid251

Author:A.Avinash Goud

Quick Abstract Add To Library PDF ARL Cited By- 0

Fingerprint Compression Based On Representation Techniques

DOI:01.1617/vol3iss3pid252

Author:N Sai Ramya

Quick Abstract Add To Library PDF ARL Cited By- 0

Forbidden Zone Data Hiding in Video Using Selective Embedding Techniques

DOI:01.1617/vol3iss3pid253

Author:N Manasa

Quick Abstract Add To Library PDF ARL Cited By- 0

Google Project Loon

DOI:01.1617/vol3iss3pid254

Author:S Subhashini

Quick Abstract Add To Library PDF ARL Cited By- 1

Group Key Agreement Efficient In Communication

DOI:01.1617/vol3iss3pid255

Author:N Vasavi Reddy

Quick Abstract Add To Library PDF ARL Cited By- 0

Identification of Truthful Packet Dropping In Wireless Ad-Hoc Networks Using HLA Algorithm

DOI:01.1617/vol3iss3pid256

Author:CH V Divya Teja

Quick Abstract Add To Library PDF ARL Cited By- 0

Information Hiding within Image File Using Steganography Technique

DOI:01.1617/vol3iss3pid257

Author:K.Vinay Kumar

Quick Abstract Add To Library PDF ARL Cited By- 0

Information Retrieval by Keyword Query Routing

DOI:01.1617/vol3iss3pid258

Author:G.Prasanna

Quick Abstract Add To Library PDF ARL Cited By- 0

K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

DOI:01.1617/vol3iss3pid259

Author:K Sumalatha

Quick Abstract Add To Library PDF ARL Cited By- 0

Location-Aware and Personalized Collaborative Filtering For Web Service Recommendation

DOI:01.1617/vol3iss3pid260

Author:R Archana

Quick Abstract Add To Library PDF ARL Cited By- 0

Mirror Cast

DOI:01.1617/vol3iss3pid261

Author:V Dinesh Reddy

Quick Abstract Add To Library PDF ARL Cited By- 2

Multiple Biometric Features Extraction Using 2-D and 3-D Hand-Geometry

DOI:01.1617/vol3iss3pid262

Author:P Ashwini

Quick Abstract Add To Library PDF ARL Cited By- 0

Online Payment System Using Steganography and Visual Cryptography

DOI:01.1617/vol3iss3pid263

Author:Sumana Sarkar

Quick Abstract Add To Library PDF ARL Cited By- 0

Privacy Policy – User Uploaded Images on Content Sharing Sites

DOI:01.1617/vol3iss3pid264

Author:D.Akhila Reddy

Quick Abstract Add To Library PDF ARL Cited By- 0

Screen less Displays – The Emerging Computer Technology

DOI:01.1617/vol3iss3pid265

Author:G Navaneetha Reddy

Quick Abstract Add To Library PDF ARL Cited By- 4

Security Evaluation Of Pattern Classifiers Under Attack

DOI:01.1617/vol3iss3pid266

Author:B Soundarya

Quick Abstract Add To Library PDF ARL Cited By- 0

Security Constraint System for Android Devices

DOI:01.1617/vol3iss3pid267

Author:P Greeshma Chowdary

Quick Abstract Add To Library PDF ARL Cited By- 0

Tracking Community Strength in Dynamic Networks

DOI:01.1617/vol3iss3pid268

Author:K Lakshmi Priya

Quick Abstract Add To Library PDF ARL Cited By- 0

Wound Assessment System Patients of Foot Diabetes Identification

DOI:01.1617/vol3iss3pid269

Author:K Lakshmi Priya

Quick Abstract Add To Library PDF ARL Cited By- 0

Real Time Multi Parameter Monitoring Using Internet of Things (IOT)

DOI:01.1617/vol3iss3pid270

Author:P.Evangeline Sharon

Quick Abstract Add To Library PDF ARL Cited By- 0

WSN the Suppress Of Predictable DAT for FailureAware Networks

DOI:01.1617/vol3iss3pid271

Author:K.Madhavi

Quick Abstract Add To Library PDF ARL Cited By- 0

Secure Data by using Biometric and Image Slicing

DOI:01.1617/vol3iss3pid272

Author:J Rajasekhar

Quick Abstract Add To Library PDF ARL Cited By- 0

Discovering Of Neighbor in an Wireless Networks Based On Efficient Algorithm

DOI:01.1617/vol3iss3pid273

Author:T.Shilpa

Quick Abstract Add To Library PDF ARL Cited By- 0

A Report on Privacy Data Publishing Using Slicing

DOI:01.1617/vol3iss3pid274

Author:E Ashwini Kumari

Quick Abstract Add To Library PDF ARL Cited By- 1

Denail Of Service Attacks (DOS) Based On Parallel Ranking Assist against Distributed Ranking

DOI:01.1617/vol3iss3pid275

Author:S.Sudeshna

Quick Abstract Add To Library PDF ARL Cited By- 0

NFC Enabled Contactless Access Control System

DOI:01.1617/vol3iss3pid276

Author:Vicky Singh

Quick Abstract Add To Library PDF ARL Cited By- 3

Privacy Preserving For Cloud Data by Using TPA

DOI:01.1617/vol3iss3pid277

Author:M. Harshini

Quick Abstract Add To Library PDF ARL Cited By- 1

Load Balancing in Content Delivery Networks Using Distributed Control Law

DOI:01.1617/vol3iss3pid278

Author:A.Sharavani

Quick Abstract Add To Library PDF ARL Cited By- 1

Effect of Particle Length and Radius On Movement Of Metallic Particle In Single Phase Gas Insulated Busduct

DOI:01.1617/vol3iss3pid279

Author:M.Surya Kalavathi

Quick Abstract Add To Library PDF ARL Cited By- 0

Automatic Scraper of Celebrity Images from Heterogeneous Websites Based On Face Recognition and Sorting For Profiling

DOI:01.1617/vol3iss3pid280

Author:Sneha

Quick Abstract Add To Library PDF ARL Cited By- 1