Hall - 2 |
January 2, 2011 |
Time |
Session 1
Chair :Nabendu chaki, University of Calcutta, India Sharvani.G.S, R.V.College Of Engineering, India |
08:00 -
08:30AM |
Registration |
08:30 -
09:00AM |
Welcome Message & Invited Talk : High Level Net Modeling for Distributed Computing Systems
( Nabendu Chaki, University of Calcutta, India )
|
09:00 -
09:20AM |
FIFO Optimization for Energy-Performance Trade-Off in Mesh-of-Tree based Network-on-Chip
(Santanu Kundu, T. V. Ramaswamy and Santanu Chattopadhyay) |
09:20 -
09:40AM |
Outliers Detection as Network Intrusion Detection System Using Multi Layered Framework
(Devarakonda Nagaraju, Pamidi Srinivasulu, V Valli Kumari and A Govardhan) |
09:40 -
10:00AM |
A New Routing Protocol For Mobile Ad hoc Networks (S.Rajeswari and Y.Venkataramani) |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Remote-Memory based Network Swap for Performance Improvement
(Nirbhay Chandorkar, Rajesh Kalmady, Phool Chand, Anup Bhattacharjee and B.S. Jagadeesh) |
10.40 -
11.00AM
|
Collaborative Alert in a Reputation System to Alleviate Colluding Packet Droppers in Mobile Ad Hoc Networks
(Gopalakrishnan. K and Rhymend Uthariaraj) |
11.00 -
11.20AM
|
Secure Service Discovery Protocol For Ad Hoc Networks (Haitham Elwahsh, Mohamed Hashem and Mohamed Amin) |
11.20 -
11.40AM
|
Certificate Path Verification in Peer-to-Peer Public Key Infrastructures by Constructing DFS Spanning Tree
(Ajay Rao, Balachandra and Prema K V) |
11.40 -
12.00PM
|
A Novel Deadlock-free Shortest-path Dimension Order Routing Algorithm for Mesh-of-Tree based Network-on-Chip Architecture (Kanchan Manna, Santanu Chattopadhyay and Indranil Sen Gupta) |
12.00 -
12.20PM |
2-D DOA estimation of coherent wideband signals using L-shaped sensor array (Swetha.P.M and P.Palanisamy) |
12.30 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 2
Chair :M. S. Kakkasageri, Basaveshwar Engineering College, India Deepthy G.S, Rajagiri School of Engineering & Technology, India |
01.40 -
2.00PM
|
Quality Analysis of a Chaotic Hopping Based Cipher Image (G.A.Sathishkumar, K.Boopathy Bagan and N.Sriraam) |
2.00 -
2.20PM
|
Type of Service, Power and Bandwidth Aware Routing Protocol for MANET A cross-layer routing protocol for Quality of Service provisioning in MANET (Ruchita Goyal, Divyanshu and Manoj Mishra) |
2.20 -
2.40PM
|
MST-based Cluster Initialization for K-means (Damodar Reddy, Devender Mishra and Prasanta K. Jana) |
2.40 -
3.00PM
|
Geometry and Skin Color Based Hybrid Approach for Face Tracking in Colour Environment
(Mahesh M Goyani, Gitam Shikkenawis and Brijesh Joshi) |
3.00 -
3.20PM
|
Performance Analysis of Block and Non Block Based Approach of Invisible Image Watermarking Using SVD in DCT Domain
(Mahesh M Goyani and Gunvantsinh Gohil) |
3.20 -
3.40PM |
A Novel Topographic Feature Extraction Method for Indian Character Images (Soumen Bag and Gaurav Harit) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Comprehensive Framework to Human Recognition using Palmprint and Speech Signal
(Mahesh P.K. and M.N. ShanmukhaSwamy) |
4.20 -
4.40PM
|
Logical Modeling & Verification of a Strength based Multi-Agent Argumentation Scheme using NuSMV
(Shravan Shetty, Shashi Kiran H.S, Murali Babu Namala and Sanjay Singh) |
4.40 -
5.00PM
|
Key Frame Detection Based Semantic Event Detection And Classification Using Hierarchical Approach For Cricket Sport Video Indexing
(Mahesh M Goyani, Shreyash K. Dutta and Payal Raj) |
5.00 -
5.20PM
|
Towards a Software Component Quality Model (Nitin Upadhyay and Bharat M. Despande) |
5.20 -
5.40PM
|
Colour image encryption scheme based on permutation and substitution techniques (Narendra K Pareek, Vinod Patidar and Krishan K Sud) |
5.40 -
6.00PM |
A New Approach for Workflow Tasks Scheduling in
Distributed Heterogeneous environment
(K. Prabavathi and P. Varalakshmi) |
|
January 3, 2011 |
Time |
Session 3
Chair :M Roberts Masillamani, Hindustan University ,India C.Ashok Baburaj, K.L.N College Of Engineering ,India |
08:00 -
08:20AM |
A High-speed, Low-power, Low-latency Pipelined ROM-less DDFS (Indranil Hatai and Indrajit Chakrabarti) |
08:20 -
08:40AM |
A Comparative Study of Machine Learning Algorithms as Expert Systems in Medical Diagnosis (Asthma)
(B.D.C.N.Prasad, P.E.S.N.krishna Prasad and Y Sagar) |
08:40 -
09:00AM |
Energy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach
(Kaushik Chakraborty, Abhrajit Sengupta and Himadri Nath Saha) |
09:00 -
09:20AM |
Hybrid Synchronization of Hyperchaotic Qi and Lu Systems by Nonlinear Control
(Sundarapandian Vaidyanathan and Suresh Rasappan) |
09:20 -
09:40AM |
An Active Host-based Detection Mechanism for ARP-related Attacks (S Roopa, R Ratti, Neminath H, F.A. Barbhuiya, S Biswas, S Nandi, A Sur and V Ramachandran) |
09:40 -
10:00AM |
A Genetic Algorithm with Entropy Based Probabilistic Initialization and Memory for Automated Rule Mining
(Saroj, Kapila, Dinesh Kumar and Kanika) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic (Aravinthan Parthibarajan, Gopalakrishnan Narayanamurthy, Arun Parthibarajan and Vigneshwaran Narayanamurthy) |
10.40 -
11.00AM
|
An Intelligent Network for offline Signature Verification using Chain Code (Minal Tomar and Pratibha Singh) |
11.00 -
11.20AM
|
A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network (Sandip Chakraborty, Soumyadip Majumder, Ferdous A. Barbhuiya and Sukumar Nandi) |
11.20 -
11.40AM
|
An Automatic Evolution of Rules to Identify Students Multiple Intelligence
(Kunjal Mankad, Priti Srinivas Sajja and Rajendra Akerkar) |
11.40 -
12.00PM
|
A Survey On Hand Gesture Recognition in context of Soft Computing
(Ankit Chaudhary, J. L. Raheja, Karen Das and Sonia Raheja) |
12.00 -
12.20PM |
Handwritten Numeral Recognition using Modified BP ANN Structure
(Amit Choudhary, Rahul Rishi and Savita Ahlawat) |
12.30 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 4
Chair :Sharvani.G.S, R.V.College Of Engineering,India V.V.R. Maheswara Rao |
01.40 -
2.00PM
|
Expert System for Sentence Recognition (Bipul Pandey, Anupam Shukla and Ritu Tiwari) |
2.00 -
2.20PM
|
RODD: An Effective Reference-based Outlier Detection Approach for Large Datasets
(M H Bhuyan, D K Bhattacharyya and J K Kalita) |
2.20 -
2.40PM
|
A Review of Dynamic Web Service Composition Techniques (Demian Antony D’Mello, Ananthanarayana V. S and Supriya Salian) |
2.40 -
3.00PM
|
Output Regulation of Arneodo-Coullet Chaotic System (Sundarapandian Vaidyanathan) |
3.00 -
3.20PM
|
Non-Replicated Dynamic Fragment Allocation In Distributed Database Systems (Nilarun Mukherjee) |
3.20 -
3.40PM |
A Mathematical Modeling of Exceptions in Healthcare Workflow (Sumagna Patnaik) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Functional Based Testing In Web Services Integrated Software Applications
(Selvakumar Ramachandran, LavanyaSantapoor and Haritha Rayudu) |
4.20 -
4.40PM
|
Design and Implementation of Novel Distributed Memory File System
(Urvashi Karnani, Rajesh Kalmady, Phool Chand, Anup Bhattacharjee and B.S. Jagadeesh) |
4.40 -
5.00PM
|
Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment
(Malarvizhi Nandagopal and V. Rhymend Uthariaraj) |
5.00
- 5.20PM
|
Adoption of Cloud Computing in e-governance (Rama Krushna Das, Sachidananda Patnaik and Ajita Kumar Misro) |
5.20 -
5.40PM
|
A Semantic Approach To Design An Intelligent Self Organized Search Engine For Extracting Information Relating to Educational Resources (B.Saleena, S.K.Srivatsa and M. Chenthil Kumar) |
5.40 -
6.00PM |
Author Identification in e-mail Forensic through Service Oriented Architecture
(Pushpendra Kumar Pateriya, Shivani Mishra and Shefalika Ghosh Samaddar) |
|
January 4, 2011 |
Time |
Session 5
Chair :J.Thangakumar, Hindustan University ,India G.Jeyakumar, Amrita School of Engineering, India |
08:00 -
08:20AM |
Analysis of Successive Interference Cancellation in CDMA systems (Deepthy G S and Susan R.J) |
08:20 -
08:40AM |
Scenario Based Performance Analysis of AODV and DSDV in Mobile Adhoc Networks (Taruna S and G.N Purohit) |
08:40 -
09:00AM |
Web Service Based Sheltered Medi – helper (Priya sundar, Jeyalakshmi Jayabalan and Usha Sarangapani) |
09:00 -
09:20AM |
Reliable Neighbor Based Multipath Multicast Routing in MANETs (Rajashekhar Biradar and Sunilkumar Manvi) |
09:20 -
09:40AM |
Ad- hoc On Demand Distance Vector Routing Algorithm Using Neighbor Matrix Method in Static Ad-Hoc Networks
(Aitha Nagaraju, G.Charan Kumar and S.Ramachandram) |
09:40 -
10:00AM |
Improving QoS for Ad-hoc wireless networks using predictive preemptive local route repair strategy
(Sharvani G.S, Rangaswamy T.M, Aayush Goel, Ajith B, Binod Kumar and Manish Kumar) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Improving energy efficiency in wireless sensor network using mobile sink
(Deepak Samuel, Murali Krishnan, Yashwanth Reddy and Suganthi Kamal) |
10.40 -
11.00AM
|
A Light-Weight Protocol for Data Integrity and Authentication in Wireless Sensor Networks
(Jibi Abraham, Nagasimha M P, Mohnish Bhatt and Chaitanya Naik) |
11.00 -
11.20AM
|
Context Management Using Ontology and Object Relational Database (ORDBMS) in a Pervasive Environment
(Vanathi.B. and Rhymend Uthariaraj.V) |
11.20 -
11.40AM
|
Path Optimization and Trusted Routing in MANET: An Interplay Between Ordered Semirings
(Kiran K Somasundaram and John S Baras) |
11.40 -
12.00PM
|
LEAD: Energy Efficient Design of Wireless Ad Hoc Networks (Subhankar Mishra, Sudhansu Mohan Satpathy and Abhipsa Mishra) |
12.00 -
12.20PM |
The Replication Attack in wireless Sensor Networks: Analysis & Defenses (V.Manjula and C.Chellappan) |
12.30 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 6
Chair :Rajashekhar C. Biradar, Reva Institute of Technology and Management, Bangalore, India Malarvizhi Nandagopal, Anna University - Chennai, India |
01.40 -
2.00PM
|
Architecture for High Density RFID Inventory System in Internet of Things
(Atishay Jain and Ashish Tanwer) |
2.00 -
2.20PM
|
Performance Evaluation of Fine Tuned Fuzzy Token Bucket Scheme for High Speed Networks
(Anurag Aeron, C. Rama Krishna and Mohan Lal) |
2.20 -
2.40PM
|
Improving TCP Performance through Enhanced Path Recovery Notification (Sathya Priya.S and Murugan. K) |
2.40 -
3.00PM
|
Cluster Localization of Sensor odes Using Learning Movement Patterns (Arthi.R and Murugan.K) |
3.00 -
3.20PM
|
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching
(Khushboo Hemnani, Dushyant Chawda and Bhupendra Verma) |
3.20 -
3.40PM |
Hierarchical Clustering of Projected Data Streams using Cluster Validity Index (Bharat Pardeshi and Durga Toshniwal) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
A Performance Comparison Study of Two Position based Routing Protocols and their Improved Versions for Mobile Ad hoc Networks (Natarajan Meghanathan) |
4.20 -
4.40PM
|
Optimum Routing Approach vs. Least Overhead Routing Approach for Minimum Hop Routing in Mobile Ad hoc Networks (Natarajan Meghanathan) |
4.40 -
5.00PM
|
ERBR: Enhanced and improved delay for Requirement Based Routing in Delay Tolerant Networks
(Mohammad Arif, Kavita Satija and Sachin Chaudhary) |
5.00 -
5.20PM
|
Trust as a Standard for e-Commerce Infrastructure techniques (Shabana and Mohammad Arif) |
5.20 -
5.40PM
|
Transformed Logistic Block Cipher Scheme for Image Encryption (Shatheesh Sam, P. Devaraj and R. S. Bhuvaneswaran) |
5.40 -
6.00PM |
|
|
|