ACITY 2012 - Program Schedule - 3

The Second International Conference on Advances in Computing and Information Technology
(ACITY 2012)

Venue: The Park Hotels
July 13 ~ 14, 2012, Chennai, India.

Program Schedule 3

Hall - 3

July 13, 2012

Time Session 1

Chair :  Nabendu Chaki, University of Calcutta, India

08:00 - 09:00AM

Registration

08:30 - 09:00AM

Welcome Message & Invited Talk : Dr. Nabendu Chaki, University of Calcutta, India

09:00 - 09:20AM Key Distribution Schemes in Wireless Sensor Networks: Novel classification and Analysis (Premraj Mahajan and Anjali Sardana)
09:20 - 09:40AM SVIP-Enhanced Security Mechanism for SIP based VoIP Systems and its Issues         ( D.Chandramohan and Shailesh Khapre )
09:40 - 10:00AM Multi Tree View of Complex Attack - Stuxnet       ( Shivani Mishra, Krishna Kant and R.S Yadav )
10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
Security and Availability of Data in the Cloud       ( Ahtesham Akhtar Patel, S.Jaya Nirmala and S.Mary Saira Bhanu )
10.40 - 11.00AM
Temporary Parallel Route Recovery for Frequent Link Failure in VANET
( B.Siva kumar reddy, M.Sakthi ganesh and P.Venkata krishna )
11.00 - 11.20AM
Design of Broadband Optical Sources for WDM Applications        ( Lakshmi Priya, M. Meenakshi and G. Geetha )
11.20 - 11.40AM
NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component           
( Debajyoti Mukhopadhyay, Sheetal Vij and Suyog Tasare )
11.40 - 12.00PM
MSRCC- Mitigation of Security Risks in Cloud Computing ( D.Chandramohan and Shailesh Khapre )
12.00 - 12.20PM A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks  ( Preetha Theresa Joy and K.Polouse Jacob )
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 2

Chair : Soma Bandyopadhyay, Tata Consultancy Services - Kolkata, India
            Shivani Mishra, MNNIT Allahabad, India

1.40 - 2.00PM
Performance Analysis of AODV and DSDV Protocols using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots        ( Rajesh P Barnwal and Arnab Thakur )
2.00 - 2.20PM
A Statistical Pattern Mining Approach for Identifying Wireless ( Nur Al Hasan Haldar, Muhammad Abulaish and Syed Asim Pasha )
2.20 - 2.40PM
Connecting Entropy-Based Detection methods and Entropy to Detect Covert Timing Channels
( Bukke Devendra Naik,Pothula Sujatha and P.Dhavachelvan )
2.40 - 3.00PM
Personalised High Quality Search with in a Web Site : No User Profiling  
( L.K. Joshila Grace, V.Maheswari and Dhinaharan Nagamalai )
3.00 - 3.20PM
Securing Multi-agent Systems: A survey and Assessment        ( S.V.Nagaraj )
3.20 - 3.40PM Host-based Bot Detection using destination white-lists for user's profile       ( Soniya B and Wilscy M )
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts ( Priyanka Dey and Suparna Biswas )
4.20 - 4.40PM
SLA for a Pervasive Healthcare Environment  ( Valarmathi J , Lakshmi K , Menaga R.S and Abirami K.V )
4.40 - 5.00PM
Dynamic Topology Construction of 3D Wireless Sensor Network ( Sarbani Roy and Nandini Mukherjee )
5.00 - 5.20PM
Secure Peer-Link Establishment in Wireless Mesh Networks        ( Swathi Bhumireddy, Somanath Tripathy and Rakesh Matam )
5.20 - 5.40PM
Plugging DHCP Security Holes Using S-DHCP ( Amit Kumar Srivastava and Arun Kumar Misra )
5.40 - 6.00PM A Novel Triangle Centroid Authentication Protocol For Cloud Environment   
( AnithaKumari K, SudhaSadasivam G, Bhandari Chetna and Jeevan F R )
 

June 14, 2012

Time

Session 3

Chair : Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
            Sarbani Roy, Jadavpur University, India

08:00 - 08:20AM Personal Secret Information Based Authentication Towards Preventing Phishing Attacks      ( Gaurav Varshney, Anjali Sardana )
08:20 - 08:40AM An Integrated Intrusion Detection System For Credit Card Fraud Detection ( M.Sasirekha, Sumaiya Thaseen.I and Saira Banu J )
08:40 - 09:00AM Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV ( Chaitali Biswas Dutta and Utpal Biswas )
09:00 - 09:20AM A Novel power balanced encryption scheme for secure information exchange in Wireless Sensor Networks   
( Shanta Mandal and Rituparna Chaki )
09:20 - 09:40AM Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control    ( Sundarapandian Vaidyanathan )
09:40 - 10:00AM Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi radio Vehicular Ad-hoc Networks
( Jagadeesh Kakarla, S Siva Sathya and Ramesh Babu B )
10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
Designing Usability Heuristics for Intrusion Detection System  ( Tulsidas Patil, Ganesh Bhutkar and Noshir Tarapore )
10.40 - 11.00AM
A Cryptographic Approach Towards Black Hole Attack Detection ( Pratima sarkar and Rituparna Chaki )
11.00 - 11.20AM
Performance Analysis of SCTP compared to TCP and UDP ( Nagesha and Sunilkumar S.Manvi )
11.20 - 11.40AM
Analysis of Fractional Frequency Reuse (FFR) Over Classical Reuse Scheme in 4G (LTE) Cellular Network       
( Chandra Thapa and Chandrasekhar.C )
11.40 - 12.00PM
Analysis of MIMO channel Characteristics in Indoor Environment using Ray Tracing Simulator
( Manjusha Karkhanis and Achala Deshmukh )
12.00 - 12.20PM Feature Selection for Detection of Ad Hoc Flooding Attacks ( Sevil Sen and Zeynep Dogmus )
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 4

Chair : Achala Deshmukh, Sinhgad College of Engineering, India
            Rajesh P Barnwal, CSIR-CMERI Durgapur, India

1.40 - 2.00PM
Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System
( Soma Bandyopadhyay and Abhijan Bhattacharyya )
2.00 - 2.20PM
Improving TCP Performance in Hybrid Networks
( GnanaPrakasi O.S, Gokul Subramanian, Nizha Shree Seenivasan, Vanathi Kathirvelu and Varalakshmi.p )
2.20 - 2.40PM
Quantum Dot Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor   
( Induvadhani.S, B.Vinayagasundaram and G.Vithya )
2.40 - 3.00PM
Performance Improvement In MIMO Systems Using Rotating Codebooks ( Julia J and M.Meenakshi )
3.00 - 3.20PM
Efficient Technique for the Implementation of AES Subbyte and Mixcolumn Transformation
( M. Priya Zach, K. Rahimunnisa and S. Suresh Kumar )
3.20 - 3.40PM Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK modulation ( Rajni and Gaurav Sikri )
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for Delay Tolerant Networks
( Sujoy Saha, Satadal Sengupta, Rohit Verma and Subrata Nandi )
4.20 - 4.40PM
Analysis and Performance Evaluation of Application Specific Processors for Network-based Intrusion Detection Systems
( Majid Nezakatolhoseini,Sam Jabbehdari and Mohammad Ali Pourmina )
4.40 - 5.00PM
Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks      
( Shyamala Ramachandran and Valli Shanmugam )
5.00 - 5.20PM
Jong Nang 3-Input Nor Channel       ( Moon Ho Lee )
5.20 - 5.40PM
Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channel      
( Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran and Prabagarane Nagaradjane )
5.40 - 6.00PM Reliability Enhanced Routing Protocol for Wireless Mesh Networks       ( Rakesh Matam and Somanath Tripathy )