Hall - 3 |
January 2, 2011 |
Time |
Session 1
Chair :Dhinaharan Nagamalai, Wireilla net solutions, Australia Vanathi, Anna University chennai,India |
08:00 -
08:30AM |
Registration |
08:30 -
09:00AM |
Welcome Message
|
09:00 -
09:20AM |
Genralized N X N Network Concept for Location and Mobility Management (C.Ashok Baburaj and K. Alagarsamy) |
09:20 -
09:40AM |
A Weight based Double Star Embedded Clustering of Homogeneous Mobile Ad Hoc Networks Using Graph Theory
(T.N. Janakiraman and A. Senthil Thilak) |
09:40 -
10:00AM |
An Enhanced Secured Communication of MANET (J.Thangakumar and M.Robert Masillamani) |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
MIMO-OFDM Based Cognitive Radio for Modulation Recognition (Deepa.R and K.Baskaran) |
10:40 -
11:00AM |
System Implementation of Pushing the Battery Life and Performance Information of an Internal Pacemaker to the Handheld Devices via Bluetooth Version 3.0 + H.S (Balasundaram Subbusundaram and Gayathri S) |
11:00 -
11:20AM |
Intrusion Detection using Flowbased Analysis of Network Traffic (Jisa David and Ciza Thomas) |
11.20 -
11.40AM
|
Protocols for Network and Data Link Layer in WSNs: A Review and Open Issues
(Ankit Jain, A.K. Verma , Deepak Sharma and Mohit Goel) |
11.40 -
12.00PM
|
Inverse Square Law Based Solution for Data Aggregation Routing using Survival Analysis in Wireless Sensor Networks
(Vinayaga Sundaram, Khaja Muhaiyadeen A, Hari Narayanan R, Shelton Paul Infant C and Rajesh G) |
12.00 -
12.20PM
|
Psychoacoustic Models for Heart Sounds (Kiran Kumari Patil, B.S Nagabhushan and B.P. Vijay Kumar) |
12.20 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 2
Chair :P.Dananjayan, Pondicherry Engineering College, India Alireza Masoum, University of Twente, The Netherlands |
01.40 -
2.00PM
|
A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
(Haimabati Dey and Raja Datta) |
02.00 -
2.20PM
|
Dynamic Sink Placement in Wireless Sensor Networks
(Parisa D. Hossein Zadeh, Christian Schlegel and Mike H. MacGregor) |
02.20 -
2.40PM |
A Novel Higly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication
(Tanmay Bhattacharya, Shirshendu Hore, Ayan Mukherjee and S. R. Bhadra Chaudhuri) |
02.40 -
3.00PM
|
Deniable Encryption in Replacement of Untappable Channel to Prevent Coercion
(Jaydeep Howlader, Vivek Nair and Saikat Basu) |
03:00 -
03:20AM |
Transmission Power Control in Virtual MIMO Wireless Sensor Network using Game Theoretic Approach
(R.Valli and P.Dananjayan) |
03:20 -
03:40AM |
A Chaos Based Approach for improving Non linearity in S Box Design of Symmetric Key Cryptosystems
(Jeyamala.C, Subramanyan.B and Raman Selvanayagam) |
03.40 - 04.00PM |
-----------Break----------- |
04.00 -
04.20PM
|
Implementation of Invisible Digital Watermarking by Embedding Data in Arithmetically Compressed Form into Image using Variable-Length Key
(Sabyasachi Samanta and Saurabh Dutta) |
04:20 -
04:40PM |
Stabilization of Large Scale Linear Discrete-Time Systems by Reduced Order Controllers (Sundarapandian Vaidyanathan and Kavitha Madhavan) |
04:40 -
05:00PM |
Improving the Performance of Color Image Watermarking Using Contourlet Transform
(Dinesh Kumar and Vijay Kumar) |
05.00 -
05.20PM
|
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET
(Ahmed M. Abd El-Haleem, Ihab A. Ali, Ibrahim I. Ibrahim and Abdel Rahman H. El-Sawy) |
05.20 -
5.40PM
|
Authenticating and Securing Mobile Applications Using Microlog (Siddharth Gupta and Sunil Kumar Singh) |
05.40 -
06.00PM
|
An Analytical Model for Sparse and Dense Vehicular Ad hoc Networks (Sara Najafzadeh, Norafida Ithnin and Ramin Karimi) |
|
January 3, 2011 |
Time |
Session 3
Chair : |
08:00 -
08:20AM |
Scale-down Digital Video Broadcast Return Channel via Satellite (DVB-RCS) Hub (N.G. Vasantha Kumar, Mohanchur Sarkar, Vishal Agarwal, B.P. Chaniara, S.V. Mehta, V.S. Palsule and K.S. Dasgupta) |
08.20 -
08.40AM
|
A Survey on Video Transmition using Wireless Technology
(S. M. Koli, R. G. Purandare, S. P. Kshirsagar and V. V. Gohokar) |
08.40 -
09.00AM |
Quantitative Analysis of Dependability and Performability in Voice and Data Networks (Almir Pereira Guimares, Paulo Romero M. Maciely and Rivalino Matias)
|
09:00 -
09:20AM |
Secured WiMAX Communication at 60 GHz Millimeter-Wave for Road-Safety
(Rabindranath Bera, Subir Kumar Sarkar, Bikash Sharma, Samarendra Nath Sur, Debasish Bhaskar and Soumyasree Bera) |
09.20 -
09.40AM
|
Exergaming – New Age Gaming for Health,Rehabilitation and Education (Ankit Kamal) |
09.40 -
10.00AM
|
Estimating Strength of a DDoS Attack using Multiple Regression Analysis
(B.B. Gupta, P.K. Agrawal, R.C. Joshi and Manoj Misra) |
10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
An Intelligent Automatic Story Generation System by Revising Proppians System
(A.Jaya and G.V.Uma) |
10.40 -
11.00AM
|
Deciphering the Main Research Themes of Software Validation a Bibliographical Study (Tsung Teng Chen, Yaw Han Chiu and Yen Ping Chi) |
11.00 -
11.20AM
|
Design Pattern Mining Using State Space Representation of graph matching (Manjari Gupta, Rajwant Singh Rao, Akshara Pande and A.K. Tripathi) |
11.20 -
11.40AM
|
An Iterative Method For Multimodal Biometric Face Recognition Using Speech Signal (Nageshkumar M and M.N.ShanmukhaSwamy) |
11.40 -
12.00PM
|
Efficient Substitution-Diffusion Based Image Cipher Using Modified Chaotic Map
(Shatheesh Sam, P. Devaraj and Bhuvaneswaran.R.S) |
12.00 -
12.20PM
|
Mutual Authentication of RFID Tag with Multiple Readers (Selwyn Piramuthu) |
12.20 -
01.40PM |
-----------Lunch
Break----------- |
Time |
Session 4
Chair :
|
01.40 -
2.00PM
|
Formal Verification of A Secure Mobile Banking Protocol
(Huy Hoang Ngo, Osama Dandash, Phu Dung Le, Bala Srinivasan and Campbell Wilson) |
02.00 -
02.20PM |
Design space exploration of power efficient cache design techniques (H V Ravish Aradhya and Ashish Kapania) |
02.20 -
02.40PM
|
Reconfigurable Area & Speed Efficient Interpolator using DALUT Algorithm for Wireless Communication Systems
(Rajesh Mehra and Ravinder Kaur) |
02.40 -
03.00PM
|
A Comparative study of Feedforward Neural Network and Simplified Fuzzy ARTMAP in the context of Face Recognition
(Antu Annam Thomas and M. Wilscy) |
03.00 -
03.20PM
|
Enhanced AODV Routing Protocol for Mobile Adhoc Networks (Shobha.K.R and K.Rajanikanth) |
03.20 -
03.40PM |
Deterministic Approach for the Elimination of MED Oscillations and Inconsistent Routing in BGP
(Berlin Hency, Vasudha V and Raghavendran N) |
03.40 - 04.00PM |
-----------Break----------- |
04.00 -
04.20PM
|
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP (Antu Annam Thomas and M. Wilscy) |
04.20 -
04.40PM
|
|
04.40 -
05.00PM
|
|
05.00
- 05.20PM
|
|
05.20 -
05.40PM
|
|
05.40 -
06.00PM |
|
|
|