Hall - 1 |
July 15, 2012 |
Time |
Session 1
Chair : Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India
|
08:00 -
09:00AM |
Registration |
08:30 -
09:00AM |
Welcome Message & Invited Talk :
|
09:00 - 09:20AM |
Intrusion Protection against SQL Injection Attacks Using A Reverse Proxy ( S. Fouzul Hidhaya and Angelina Geetha ) |
09:20 - 09:40AM |
An Efficient Solution For Privacy-Preserving, Secure Remote Access To Sensitive Data (Kalpana Singh, Jian Zhong, Lynn M. Batten and Peter Bertok) |
09:40 - 10:00AM |
Application of Image Fusion for EnhancingThe Quality of An Image (Suman Deb, Saptarshi Chakraborty and Taniya Bhattacharjee) |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 - 10.40AM
|
New Replica Selection Technique for Binding Cheapest Replica Sites in Data Grids ( Rafah Mohammed, Rajeev Wankar, Atul Nagi, C. R. Rao and Mahdi Saleh) |
10.40 - 11.00AM
|
New Improved 2D SVD Based Algorithm for Video Coding ( Sachin V, Rahul R Vasist, Shashank S Hegde, Shashikiran R P and M Uttarakumari ) |
11.00 - 11.20AM
|
Computing Wiener Index Of Fibonacci Weighted Trees ( K. R. Udaya Kumar Reddy and Ranjana S. Chakrasali ) |
11.20 - 11.40AM
|
Automated Smiley Face Extraction Based on Genetic Algorithm (Md Alamgir Hossain, Debabrata Samanta and Goutam Sanyal) |
11.40 - 12.00PM
|
A Shot Boundary Detection Technique Based on Local Color Moments in YCbCr Color Space (Shanmukhappa Angadi and Vilas Naik) |
12.00 - 12.20PM |
Sign Video Segmentation Using Region, Boundary Based Active Contours with Shape Priors (P.V.V.Kishore, E.Kiran Kumar and P.Rajesh Kumar) |
12.20 - 01.40PM |
-----------Lunch Break----------- |
Time |
Session 2
Chair : Jan Zizka, Mendel University in Brno, Czech Republic
S.Selvakanmani,Velammal Institute of Technology, India |
1.40 - 2.00PM
|
Development of a New Recursive Median Filtering Scheme for Processing Potentiometer Signal in CSRDM of PFBR (M. Mohana, Sudheer Patri, S. Narmadha, B. Babu, V. Prakash and K. K. Rajan) |
2.00 - 2.20PM
|
Overview and Literature Survey on Routing Protocols for Mobile Cognitive Radio Ad Hoc Networks (S. Selvakanmani and M. Sumathi) |
2.20 - 2.40PM
|
A novel way of providing Confidentiality to shared secret key and authenticate the shares during reconstruction ( Devaki P and Raghavendra Rao G ) |
2.40 - 3.00PM
|
Enhancement of Tcp Fairness In 802.11 Networks ( Bhuvana LN, Divya PD and Divya A ) |
3.00 - 3.20PM
|
A Review Of Human Activity Recongnition And Behavior Understanding In Video Surveillance ( DhanajayKumar and A.R.Revathi ) |
3.20 - 3.40PM |
System Identification for Interacting and Non-Interacting Tank systems using Genetic Algorithm ( Bhuvaneswari.N.S and Divya.R ) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 - 4.20PM
|
A Secured template based Face Recognition technique
(Minakshi Gogoi, RupKumar Deka, Deepjyoti Mazumdar, Rupam Das and Manasjyoti Barman) |
4.20 - 4.40PM
|
Designing a Scaffolding for Supporting Personalized Synchronous e-Learning
(S.Sengupta, B. Mukherjee and S. Bhattacharya) |
4.40 - 5.00PM
|
Design and Implementation of Binary Neural Network Learning with Fuzzy Clustering
(Sachin Bhandariand Aruna Tiwari) |
5.00 - 5.20PM
|
Scan Chains Testing for Latches to Reduce Area and the Power Consumption
(Anusuya Yuvaraj and Rajashekhar Biradar) |
5.20 - 5.40PM
|
Acoustic Perception Based On Real Time Video Acquisition for Navigational Assistance
(Supreeth K Rao, Arpitha Prasad B, Anushree R Shetty, Chinmai, Rajeshwari Hegde and R. Bhakthavathsalam) |
5.40 - 6.00PM |
New Approach to Develop the Messenger Application: From Client-Server Design to P2p Implementation
(Ha Quoc Trung) |