Hall - 1 |
January 2, 2011 |
Time |
Session 1
Chair :B.K.Kaushik, Indian Institute of Technology-Roorkee, India
Apurba Das, CDAC, Kolkata |
08:00 -
08:30AM |
Registration |
08:30 -
09:00AM |
Welcome Message & Invited Talk : Encoding in VLSI Interconnects
(B.K.Kaushik, Indian Institute of Technology-Roorkee, India)
|
09:00 -
09:20AM |
Improved Ant Colony Optimization Technique for Mobile Adhoc Networks (Mano Yadav, Vinay Rishiwal and K.V. Arya) |
09:20 -
09:40AM |
Cross-Layer Analyses of QoS Parameters in Wireless Sensor Networks
(Alireza Masoum, Nirvana Meratnia, Arta Dilo, Zahra Taghikhaki and Paul J. M. Havinga) |
09:40 -
10:00AM |
Privacy Preservation Naive Bayes Classification using Trusted Third Party Computation over Distributed Progressive Databases (Keshavamurthy B.N and Durga Toshniwal) |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Cluster Based Mobility Considered Routing Protocol for Mobile Ad hoc Networks
(Soumya Brata Saha and Rituparna Chaki) |
10.40 -
11.00AM
|
Speech Transaction for Blinds Using speech-Text-Speech Conversions (Kanisha Johnny and G.Balakrishanan) |
11.00 -
11.20AM
|
Safety Information Gathering and Dissemination in Vehicular Ad hoc Networks: Cognitive Agent Based Approach
(M.S. Kakkasageri and S. S. Manvi) |
11.20 -
11.40AM
|
Differential Artificial Bee Colony for Dynamic Environment
(Syed Raziuddin, Syed Abdul Sattar, Rajya Lakshmi and Moin Parvez) |
11.40 -
12.00PM
|
Adaptive Threshold based on Group Decisions for Distributed Spectrum Sensing in Cognitive Adhoc Networks
(Rajagopal Sreenivasan, Sasirekha GVK and Jyotsna Bapat) |
12.00 -
12.20PM |
A cross-layer Frame Work for Adaptive Video Streaming Over IEEE 802.11 Wireless Networks
(Santhosha Rao, Vijaykumar M and Kumara shama) |
12.30 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 2
Chair :Santhosha Rao, Manipal University, India
Vanathi, Anna University - Chennai, India |
01.40 -
2.00PM
|
An Approach towards Lightweight, Reference Based, Tree Structured Time Synchronization Scheme in WSN
(Surendra Rahamatkar and Ajay Agarwal) |
2.00 -
2.20PM
|
Towards a Hierarchical Based Context Representation and Selection by Pruning Technique in a Pervasive Environment
(Vanathi.B and Rhymend Uthariaraj.V) |
2.20 -
2.40PM
|
Deployment of GSM and RFID Technologies for Public Vehicle Position Tracking System
(Apurv Vasal, Deepak Mishra and Puneet Tandon) |
2.40 -
3.00PM
|
MIMO Ad Hoc Networks-Mutual Information and Channel Capacity
(Swati Chowdhuri, Arun Kumar Mondal and P.K.Baneerjee) |
3.00 -
3.20PM
|
A Relative Study of Manet & Vanet: their Applications, Broadcasting Approaches & Challenging Issues
(Ajit Singh, Mukesh Kumar, Rahul Rishi and D.K. Madan) |
3.20 -
3.40PM |
Non Local Means Image Denoising for Color Images using
PCA (P.A Shyjila and M Wilscy) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Physiologically Based Speech Synthesis Using Digital Waveguide Model (Patil A.R. and Vandana T.Chavan) |
4.20 -
4.40PM
|
New Distributed Initialization Protocals for IEEE 802.11 Based Single Hop Ad Hoc Networks
(Rasmeet S. Bali and C. Rama Krishna) |
4.40 -
5.00PM
|
Face Recognition using Multi-exemplar Discriminative Power Analysis (Ganesh Bhat and K. K. Achary) |
5.00 -
5.20PM
|
Context Aware Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks
(Abhijit Sarma, Shantanu Joshi and Sukumar Nandi) |
5.20 -
5.40PM
|
Multicast-Based Data Dissemination to maintain Cache Consistency in Mobile Environment
(Kahkashan Tabassum and A. Damodaram) |
5.40 -
6.00PM |
Voltage Collapse Based Critical Bus Ranking Using Composite
Index (Shobha Shankar and T.Ananthapadmanabha) |
|
January 3, 2011 |
Time |
Session 3
Chair :V. Sundarapandian, Vel Tech Dr. RR & Dr. SR Technical University, Chennai, INDIA
P. Hara Gopal Mani, Vigyana Bharati Institute of Tech, India |
08:00 -
08:20AM |
Toward a Comprehensive View of Software Product Line (Sami Ouali, Naoufel Kraiem and Henda Ben Ghezala) |
08:20 -
08:40AM |
Collecting the Inter Component Interactions in Multithreaded Environment
(Arun Mishra, Alok Chaurasia, Pratik Bhadkoliya and Arun K. Misra) |
08:40 -
09:00AM |
On the Benefit of Quantification in AOP Systems-A Quantitative and a Qualitative Assessment
(Kotrappa Sirbi and Prakash Jayanth Kulkarni) |
09:00 -
09:20AM |
Empirical Measurements on the Convergence Nature of Differential Evolution Variants
(G.Jeyakumar and C.Shanmugavelayutham) |
09:20 -
09:40AM |
An Intelligent System for Web Usage Data Preprocessing (V.V.R. Maheswara Rao, V. Valli Kumari and K.V.S.V.N Raju) |
09:40 -
10:00AM |
Discovery & High Availability of Services in Auto- Load Balanced Clusters
(Shakti Mishra, Alok Mathur, Harit Agarwal, Rohit Vashishtha, D.S. Kushwaha and A.K.Misra) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Bayes Theorem and Information Gain based Feature Selection for Maximizing the Performance of Classifiers (Subramanian Appavu, Ramasamy Rajaram, M.Nagammai, N.Priyanga and S.Priyanka) |
10.40 -
11.00AM
|
Data Mining Technique for Knowledge Discovery from Engineering Materials Data Sets
(Doreswamy, Hemanth K S, Channabasayya M Vastrad and Nagaraju S) |
11.00 -
11.20AM
|
Mobile Database Cache Replacement Policies : LRU and PPRRP (Hariram Chavan and Suneeta Sane) |
11.20 -
11.40AM
|
A Novel Data Mining Approach for Performance Improvement of EBGM based Face Recognition Engine to handle large database (Soma Mitra, Suparna Parua, Apurba Das and Debasis Mazumdar) |
11.40 -
12.00PM
|
Efficient Density Based Outlier Handling Technique in Data Mining (Krishna Gopal Sharma, Anant Ram and Yashpal Singh) |
12.00 -
12.20PM |
Overcoming Social Issues in Requirements Engineering (Selvakumar Ramachandran, Sandhyarani Dodda and LavanyaSantapoor) |
12.30 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 4
Chair :William R Simpson, Institute for Defense Analyses, USA Monowar Hussain Bhuyan, Tezpur University, India
|
01.40 -
2.00PM
|
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System
(Katheeja Parveen, Sheik Abdul Khader and Munir Ahamed Rabbani) |
2.00 -
2.20PM
|
Location Based GSM Marketing (Sparsh Arora and Divya Batia) |
2.20 -
2.40PM
|
A new defense scheme against DDoS attack in Mobile Ad hoc Networks (S.A.Arunmozhi and Y.Venkataramani) |
2.40 -
3.00PM
|
An Model for Delegation That is based upon both Authentication and Authorization
(Coimbatore Chandersekaran and William R. Simpson) |
3.00 -
3.20PM
|
Identification of Encryption Algorithm using Decision Tree (R.Manjula and R.Anitha) |
3.20 -
3.40PM |
A Novel Mechanism for Detection of Distributed Denial of Service Attacks (Jaydip Sen) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Privacy Preservation Naive Bayes Classification using Trusted Third Party Computation over Vertical Partitioned Distributed Progressive Sequential Data Streams (Keshavamurthy B.N. and Durga Toshniwal) |
4.20 -
4.40PM
|
Assisting Programmers Resolving Vulnerabilities in Java Web Applications
(Pranjal Bathia, Bharath Reddy Beerelli and Marc-André Laverdière) |
4.40 -
5.00PM
|
Integration Testing of Multiple Embedded Processing Components (Hara Gopal Mani Pakala, Raju KVSVN, Ibrahim Khan) |
5.00
- 5.20PM
|
A Novel Image Encryption Algorithm Using two Chaotic Maps for Medical Application
(G.A.Sathishkumar, K.Bhoopathy Bagan, N.Sriraam, Venkatachalam and R.Vignesh) |
5.20 -
5.40PM
|
Chest X-Ray Analysis for Computer-Aid Diagnostic
(Kim Le) |
5.40 -
6.00PM |
Inclusion/Exclusion Protocol for RFID Tags (Selwyn Piramuthu) |
|
January 4, 2011 |
Time |
Session 5
Chair :Balachandra, Manipal University, India Nitin Upadhyay, BITS Pilani K. K. Birla Goa Campus, India |
08:00 -
08:20AM |
A Distributed Mobility-Adaptive and Energy Driven Clustering Algorithm for MANETs Using Strong Degree
(T.N. Janakiraman and A. Senthil Thilak) |
08:20 -
08:40AM |
Secure Data Aggregation in Wireless Sensor Networks using Privacy Homomorphism (M.K.Sandhya and K.Murugan) |
08:40 -
09:00AM |
Evolution of Various Controlled Replication Routing Schemes for Oppotunistic Networks
(Hemal Shah and Yogeshwar.P.Kosta) |
09:00 -
09:20AM |
Context Representation Using Hierarchical method and Context Selection Using Heuristic in a Pervasive Environment
(Vanathi.B and V.Rhymend Uthariaraj) |
09:20 -
09:40AM |
Privacy Preservation of Stream Data Patterns using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis (Keshavamurthy B.N. and Durga Toshniwal) |
09:40 -
10:00AM |
Application of Euclidean Distance Power graphs in Localization of sensor networks
(G.N. Purohit, Seema Verma and Usha Sharma) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
A New Protocol to secure AODV in Mobile AdHoc Networks (J Geetha Reddy, Avinash Krishnan R. and Aishwarya M) |
10.40 -
11.00AM
|
Spelling Corrector for Indian Languages (K.V.N.Sunitha and A.Sharada) |
11.00 -
11.20AM
|
Quantitative Analysis of Dependability and Performability in Voice and Data Networks (Almir Pereira Guimares, Paulo Romero M. Maciely and Rivalino Matias) |
11.20 -
11.40AM
|
Multiplexer Based Circuit Synthesis with Area-Power Trade-off (Sambhu Nath Pradhan and Santanu Chattopadhyay) |
11.40 -
12.00PM
|
Steganography Using Version Control System (Vaishali S. Tidake and Sopan A. Talekar) |
12.00 -
12.20PM |
Rain Fade Calculation and Power Compensation for Ka-Band Spot Beam Satellite Communication in India (Jayadev Iena and Prasanna Kumar Sahu) |
12.30 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 6
Chair :R.Deepa, Amrita Vishwa Vidhyapeetham, India B.Vanathi, Anna University - chennai, India
|
01.40 -
2.00PM
|
Min Max Threshold Range (MMTR) Approach In Palmprint Recognition (Jyoti Malik, G. Sainarayanan and Ratna Dahiya) |
2.00 -
2.20PM
|
Power and Buffer Overflow Optimization in Wireless Sensor Nodes
(Gauri Joshi, Sudhanshu Dwivedi, Anshul Goel, Jaideep Mulherkar and Prabhat Ranjan) |
2.20 -
2.40PM
|
Web Log Data Analysis And Mining (L.K. Joshila Grace, V.Maheswari and Dhinaharan Nagamalai) |
2.40 -
3.00PM
|
Optimization of Mutimedia Packet Scheduling In AD HOC Networks Using Multi obective Genetic Algorithm
(R.Muthu Selvi and R.Rajaram) |
3.00 -
3.20PM
|
Floating Point Adder in Techology driven High-Level Synthesis (M.Joseph, Narasimha B Bhat and K.Chandra Sekaran) |
3.20 -
3.40PM |
FAM2BP: Transformation Framework of UML Behavioral Elements into BPMN Design Element
(Jayeeta Chanda, Ananya Kanjilal, Sabnam Sengupta and Swapan Bhattacharya) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Copyright Protection in Digital Multimedia
(Santosh Kumar, Sumit Kumar and Sukumar Nandi) |
4.20 -
4.40PM
|
|
4.40 -
5.00PM
|
|
5.00 -
5.20PM
|
|
5.20 -
5.40PM
|
|
5.40 -
6.00PM |
|
|
|