Hall - 4 |
May 25, 2012 |
Time |
Session 1
Chair : |
08:00 -
09:00AM |
Registration |
08:30 -
09:00AM |
Multi-document Summarization based on Sentence Features and Frequest Itemsets ( J. Jayabharathy and S. Kanmani ) |
09:00 -
09:20AM |
Encryption of Images based on Genetic algorithm - A New Approach ( Jalesh kumar and S. Nirmala ) |
09:20 -
09:40AM |
A New Secret Key Cipher: C128 ( Indrajit Das and R. Saravanan ) |
09:40 -
10:00AM |
Information Security using Chains Matrix Multiplication ( Ch. Rupa and P. S Avadhani ) |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Methodology For Automatic Bacterial Colony Counter ( Surbhi Gupta, Priyanka Kamboj and Sumit Kaushik ) |
10.40 -
11.00AM
|
High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
( Sunita V. Dhavale, R.S. Deodhar and L.M. Patnaik ) |
11.00 -
11.20AM
|
Key Management Protocol in WIMAX revisited ( Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade ) |
11.20 -
11.40AM
|
Comparison of Content Based Image Retrieval System using Wavelet Transform
( Suchismita Das, Shruti Garg and G. Sahoo ) |
11.40 -
12.00PM
|
A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks
( Charles A. Kamhoua, Kevin A. KwiatM and Joon S. Park ) |
12.00 -
12.20PM |
Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL) ( Uttam Kr. Mondal and J.K.Mandal ) |
12.20 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 2
Chair : |
01.40 -
2.00PM
|
A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA) ( J. K. Mandal and S. K.Ghosal ) |
2.00 -
2.20PM
|
A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks ( Abhishek Majumder ) |
2.20 -
2.40PM
|
Energy Efficient Administrator Based Secured Routing in MANET ( Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee ) |
2.40 -
3.00PM
|
A Comparative Analysis of Modern Day Network Simulators ( Debajyoti Pal ) |
3.00 -
3.20PM
|
Chaotic Cipher Using Arnolds And Duffings Map (
Mina Mishra and V.H. Mankar ) |
3.20 -
3.40PM |
Strong Neighborhood based Stable Connected Dominating Sets for Mobile Ad hoc Networks
( Natarajan Meghanathan and Michael Terrell ) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Pre Decision Based Handoff In Multi Network Environment ( Manoj Sharma and R.K.Khola ) |
4.20 -
4.40PM
|
Optimal Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks (
Yingchi Mao ) |
4.40 -
5.00PM
|
ELRM: A Generic Framework for Location Privacy in LBS ( Muhamed Ilyas and R.Vijayakumar ) |
5.00 -
5.20PM
|
Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment
( Medha A.Shah and P.J.Kulkarni ) |
5.20 -
5.40PM
|
A Hierarchical CPN Model for Mobility Analysis in Zone based MANET
( Moitreyee Dasgupta, Sankhayan Choudhury and Nabendu Chaki ) |
5.40 -
6.00PM |
Trust Based Trustworthy Routing in MANET ( S.Sridhar and R.Baskaran ) |
|
May 26, 2012 |
Time |
Session 3
Chair : |
08:00 -
08:20AM |
A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network
( S.Sridhar and R.Baskaran ) |
08:20 -
08:40AM |
Resource Based Optimized Decentralized Grid Scheduling Algorithm: ( Piyush Chauhan and Nitin ) |
08:40 -
09:00AM |
Measuring, Comparing and Analyzing the Energy Efficiency of Cloud Database
( Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu ) |
09:00 -
09:20AM |
Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment
( Raghavendra Prabhu, Basappa B. Kodada and Shivakumar K. M ) |
09:20 -
09:40AM |
Gender Classification Techniques: A Review ( Preeti Rai and Pritee Khanna) |
09:40 -
10:00AM |
Text Dependent Voice Based Biometric Authentication System using Spectrum Analysis and Image Acquisition
( Somsubhra Gupta and Soutrik Chatterjee) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
A Gaussian Graphical Model Based approach for Image Inpainting
( Krishnakant verma and M.A.Zaveri) |
10.40 -
11.00AM
|
Various Implementations of Advanced Dynamic Signature Verification System
( Jin Whan Kim) |
11.00 -
11.20AM
|
Locally Adaptive Regularization for Robust Multiframe Super Resolution Reconstruction
( Chandra Mohan S, Rajan K and Srinivasan R) |
11.20 -
11.40AM
|
Thesaurus Based Web Searching ( K.V.N.Sunitha and A.Sharada) |
11.40 -
12.00PM
|
Cross-Layer Design In Wireless Sensor Networks ( S Jagadeesan and V Parthasarathy ) |
12.00 -
12.20PM |
Concept Adapting Real-Time Data Stream Mining for Health Care Applications
(Dipti D. Patil, Jyoti G. Mudkanna, Dnyaneshwar Rokade and Vijay M. Wadhai) |
12.20 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 4
Chair : |
01.40 -
2.00PM
|
Case Study of Failure Analysis Techniques for Safety Critical Systems ( Aiswarya Sundararajan and Selvarani R ) |
2.00 -
2.20PM
|
Implementation of Framework for Semantic Annotation of Geospatial Data
(Preetam Naik, Madhuri Rao, S.S.Mantha and J.A.Gokhale) |
2.20 -
2.40PM
|
Study of Architectural Design Patterns in Concurrence to Analysis of Design Pattern in Safety Critical Systems
( Feby A Vinisha and Selvarani R) |
2.40 -
3.00PM
|
Comparative Analysis of diverse Approaches for Air Target Classification based on Radar Track Data
( Manish Garg and Upasna Singh ) |
3.00 -
3.20PM
|
A New Hybrid Binary Particle Swarm Optimization Algorithm for Multidimensional Knapsack Problem
( Amira Gherboudj, Said Labed and Salim Chikhi ) |
3.20 -
3.40PM |
An Enhancement To Aodv Protocol For Efficient Routing In Vanet – A Cluster Based Approach ( Aswathy M C & Tripti C ) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
A New Process Placement Algorithm in Multi-Core Clusters Aimed to Reducing Network Interface Contention
( Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui ) |
4.20 -
4.40PM
|
A Policy Driven Business Logic Change Management for Enterprise Web Services
( Thirumaran. M, Naga Venkata Kiran. G and Dhavachelvan. P ) |
4.40 -
5.00PM
|
A Particular Approach For Personalised Knowledge Processing
(Stefan Svetsky, Oliver Moravcik, Peter Schreiber, Pavol Tanuska, Jana Stefankova and Pavol Vazan ) |
5.00
- 5.20PM
|
Metrics Based Quality Assessment for Retrieval Ability of Web-Based Bioinformatics Tools
( Jayanthi Manicassamy and P. Dhavachelvan ) |
5.20 -
5.40PM
|
A New Approach for Vertical Handoff in Wireless 4G Network ( Vijay Malviya, Praneet Saurabh and Bhupendra Verma ) |
5.40 -
6.00PM |
Exploring Possibilities of Reducing Maintenance Effort in Object Oriented Software by Minimizing Indirect Coupling
( Nirmal Kumar Gupta, Mukesh Kumar Rohil and Naveen ) |
|
May 27, 2012 |
Time |
Session 5
Chair : |
08:00 -
08:20AM |
A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs
( Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri ) |
08:20 -
08:40AM |
New hashing scheme to overcome the problem of overloading of articles in usenet (Monika Saxena, Praneet Saurabh and Bhupendra Verma) |
08:40 -
09:00AM |
An Optimal Approach for DICOM Image Segmentation Based on Fuzzy Techniques (J.Umamaheswari and G. Radhamani) |
09:00 -
09:20AM |
Text Independent Speaker Recognition Model Based On Gamma Distribution Using Delta,Shifted Delta Cepstrals
( K Suri Babu,Srinivas Yarramalle and Suresh Varma Penumatsa ) |
09:20 -
09:40AM |
Application of Intervention Analysis on Stock Market Forecasting ( Mahesh S. Khadka, K. M. George, N. Park and J. B. Kim ) |
09:40 -
10:00AM |
A Chaotic Encryption Algorithm: Robustness against Brute- force attack ( Mina Mishra and V.H. Mankar ) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Vital Signs Data Aggregation And Transmission Over Controller Area Network (CAN)
( Nadia Ishaque, Atiya Azmi, Noveel Azhar, Umm-e-laila and Ammar Abbas) |
10.40 -
11.00AM
|
A Comparative Study On Different Biometric Modals Using PCA ( Pranay Kumar, Harendra Kumar, Naushad Ali and Ritu Tiwari) |
11.00 -
11.20AM
|
An Effective Software Implemented Data Error Detection Method in Real Time Systems
( Atena Abdi, Seyyed Amir Asghari, Saadat Pourmozaffari, Hassan Taheri and Hossein Pedram ) |
11.20 -
11.40AM
|
Using Modularity with Rough Information Systems (Ahmed Taisser, Hesham Ahmed and Ashraf Hassan ) |
11.40 -
12.00PM
|
Web-page Prediction for Domain Specific Web-search using Boolean Bit Mask
( Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay ) |
12.00 -
12.20PM |
Survey on Web Service Discovery Approaches ( Debajyoti Mukhopadhyay and Archana Chougule ) |
12.20 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 6
Chair : |
01.40 -
2.00PM
|
Conceptualizing an Adaptive Framework for Pervasive Computing Environment ( Akhil Mohan and Nitin Upadhyay ) |
2.00 -
2.20PM
|
Preprocessing Of Automated Blood Cell Counter Data And Generation Of Association Rules In Clinical Pathology
( D.Minnie and S.Srinivasan ) |
2.20 -
2.40PM
|
Incomplete Multigranulation Based on Rough Intuitionistic Fuzzy Sets ( G K Panda, B K Tripathy and Anirban Mitra ) |
2.40 -
3.00PM
|
Hybrid Cluster Validation Techniques (Satish Gajawada and Durga Toshniwal) |
3.00 -
3.20PM
|
Texel Identification Using K-Means Clustering Method ( S. Padmavathi, C. Rajalakshmi and K.P. Soman ) |
3.20 -
3.40PM |
Ubiquitous Medical Learning Using Augmented Reality based on Cognitive Information Theory
(Zahra Mohana Gebril, Behrang Parhizkar, Imam Musa Abiodunde Tele, Arash Habibi Lashkari, Mohammed A.Tahir and Yap Sing Nian) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
A High Level Approach to Web Content Verification ( Liliana Alexandre and Jorge Coelho ) |
4.20 -
4.40PM
|
Histogram Correlation for Video Scene Change Detection ( Nisreen I. Radwan, Nancy M. Salem and Mohamed I. El Adawy ) |
4.40 -
5.00PM
|
Active Learning with Bagging for NLP Tasks Ruy Luiz Milidi_u, Daniel Schwabe, and Eduardo Motta
( Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Mott ) |
5.00
- 5.20PM
|
Towards a Practical “State Reconstruction” for Data Quality Methodologies: A Customized List of Dimensions
(S.Bekkouche and A.Chouarfia ) |
5.20 -
5.40PM
|
Hybrid Reputation Model Through Federation Of Peers Having Analogous Function ( Sreenu.G and Dhanya P M ) |
5.40 -
6.00PM |
A Quantitative Model of Operating System Security Evaluation ( Hammad Afzali and Hassan Mokhtari ) |
|
|