The First International Conference on Computer Science and Information Technology
(COSIT-2011)

Venue: Royal Orchid Central
January 2 ~ 4, 2011, Bangalore, India.

Program Schedule

Hall - 3

January 2, 2011

Time Session 1

Chair :Dhinaharan Nagamalai, Wireilla net solutions, Australia
            Vanathi, Anna University chennai,India

08:00 - 08:30AM

Registration

08:30 - 09:00AM

Welcome Message 
 

09:00 - 09:20AM Genralized N X N Network Concept for Location and Mobility Management               (C.Ashok Baburaj and K. Alagarsamy)
09:20 - 09:40AM A Weight based Double Star Embedded Clustering of Homogeneous Mobile Ad Hoc Networks Using Graph Theory
(T.N. Janakiraman and A. Senthil Thilak)
09:40 - 10:00AM An Enhanced Secured Communication of MANET               (J.Thangakumar and M.Robert Masillamani)
10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
MIMO-OFDM Based Cognitive Radio for Modulation Recognition               (Deepa.R and K.Baskaran)
10:40 - 11:00AM System Implementation of Pushing the Battery Life and Performance Information of an Internal Pacemaker to the Handheld Devices via Bluetooth Version 3.0 + H.S               (Balasundaram Subbusundaram and Gayathri S)
11:00 - 11:20AM Intrusion Detection using Flowbased Analysis of Network Traffic      (Jisa David and Ciza Thomas)
11.20 - 11.40AM
Protocols for Network and Data Link Layer in WSNs: A Review and Open Issues
(Ankit Jain, A.K. Verma , Deepak Sharma and Mohit Goel)
11.40 - 12.00PM
Inverse Square Law Based Solution for Data Aggregation Routing using Survival Analysis in Wireless Sensor Networks
(Vinayaga Sundaram, Khaja Muhaiyadeen A, Hari Narayanan R, Shelton Paul Infant C and Rajesh G)
12.00 - 12.20PM
Psychoacoustic Models for Heart Sounds      (Kiran Kumari Patil, B.S Nagabhushan and B.P. Vijay Kumar)
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 2

Chair :P.Dananjayan, Pondicherry Engineering College, India
            Alireza Masoum, University of Twente, The Netherlands

01.40 - 2.00PM
A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
(Haimabati Dey and Raja Datta)
02.00 - 2.20PM
Dynamic Sink Placement in Wireless Sensor Networks
(Parisa D. Hossein Zadeh, Christian Schlegel and Mike H. MacGregor)
02.20 - 2.40PM A Novel Higly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication
(Tanmay Bhattacharya, Shirshendu Hore, Ayan Mukherjee and S. R. Bhadra Chaudhuri)
02.40 - 3.00PM
Deniable Encryption in Replacement of Untappable Channel to Prevent Coercion
(Jaydeep Howlader, Vivek Nair and Saikat Basu)
03:00 - 03:20AM Transmission Power Control in Virtual MIMO Wireless Sensor Network using Game Theoretic Approach
(R.Valli and P.Dananjayan)
03:20 - 03:40AM A Chaos Based Approach for improving Non linearity in S Box Design of Symmetric Key Cryptosystems
(Jeyamala.C, Subramanyan.B and Raman Selvanayagam)
03.40 - 04.00PM -----------Break-----------
04.00 - 04.20PM
Implementation of Invisible Digital Watermarking by Embedding Data in Arithmetically Compressed Form into Image using Variable-Length Key
(Sabyasachi Samanta and Saurabh Dutta)
04:20 - 04:40PM Stabilization of Large Scale Linear Discrete-Time Systems by Reduced Order Controllers
(Sundarapandian Vaidyanathan and Kavitha Madhavan)
04:40 - 05:00PM Improving the Performance of Color Image Watermarking Using Contourlet Transform        (Dinesh Kumar and Vijay Kumar)
05.00 - 05.20PM
TRIDNT: Isolating Dropper nodes with some degree of Selfishness in MANET
(Ahmed M. Abd El-Haleem, Ihab A. Ali, Ibrahim I. Ibrahim and Abdel Rahman H. El-Sawy)
05.20 - 5.40PM
Authenticating and Securing Mobile Applications Using Microlog      (Siddharth Gupta and Sunil Kumar Singh)
05.40 - 06.00PM
An Analytical Model for Sparse and Dense Vehicular Ad hoc Networks      (Sara Najafzadeh, Norafida Ithnin and Ramin Karimi)
 

January 3, 2011

Time

Session 3

Chair :

08:00 - 08:20AM Scale-down Digital Video Broadcast Return Channel via Satellite (DVB-RCS) Hub     (N.G. Vasantha Kumar, Mohanchur Sarkar, Vishal Agarwal, B.P. Chaniara, S.V. Mehta, V.S. Palsule and K.S. Dasgupta)
08.20 - 08.40AM
A Survey on Video Transmition using Wireless Technology
(S. M. Koli, R. G. Purandare, S. P. Kshirsagar and V. V. Gohokar)
08.40 - 09.00AM Quantitative Analysis of Dependability and Performability in Voice and Data Networks      (Almir Pereira Guimares, Paulo Romero M. Maciely and Rivalino Matias)
09:00 - 09:20AM Secured WiMAX Communication at 60 GHz Millimeter-Wave for Road-Safety        (Rabindranath Bera, Subir Kumar Sarkar, Bikash Sharma, Samarendra Nath Sur, Debasish Bhaskar and Soumyasree Bera)
09.20 - 09.40AM
Exergaming – New Age Gaming for Health,Rehabilitation and Education           (Ankit Kamal)
09.40 - 10.00AM
Estimating Strength of a DDoS Attack using Multiple Regression Analysis
(B.B. Gupta, P.K. Agrawal, R.C. Joshi and Manoj Misra)
10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
An Intelligent Automatic Story Generation System by Revising Proppians System
(A.Jaya and G.V.Uma)
10.40 - 11.00AM
Deciphering the Main Research Themes of Software Validation a Bibliographical Study
(Tsung Teng Chen, Yaw Han Chiu and Yen Ping Chi)
11.00 - 11.20AM
Design Pattern Mining Using State Space Representation of graph matching      (Manjari Gupta, Rajwant Singh Rao, Akshara Pande and A.K. Tripathi)
11.20 - 11.40AM
An Iterative Method For Multimodal Biometric Face Recognition Using Speech Signal      (Nageshkumar M and M.N.ShanmukhaSwamy)
11.40 - 12.00PM
Efficient Substitution-Diffusion Based Image Cipher Using Modified Chaotic Map
(Shatheesh Sam, P. Devaraj and Bhuvaneswaran.R.S)
12.00 - 12.20PM
Mutual Authentication of RFID Tag with Multiple Readers     (Selwyn Piramuthu)
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 4

Chair :   

01.40 - 2.00PM
Formal Verification of A Secure Mobile Banking Protocol
(Huy Hoang Ngo, Osama Dandash, Phu Dung Le, Bala Srinivasan and Campbell Wilson)
02.00 - 02.20PM Design space exploration of power efficient cache design techniques      (H V Ravish Aradhya and Ashish Kapania)
02.20 - 02.40PM
Reconfigurable Area & Speed Efficient Interpolator using DALUT Algorithm for Wireless Communication Systems        (Rajesh Mehra and Ravinder Kaur)
02.40 - 03.00PM
A Comparative study of Feedforward Neural Network and Simplified Fuzzy ARTMAP in the context of Face Recognition
(Antu Annam Thomas and M. Wilscy)
03.00 - 03.20PM
Enhanced AODV Routing Protocol for Mobile Adhoc Networks
(Shobha.K.R and K.Rajanikanth)
03.20 - 03.40PM Deterministic Approach for the Elimination of MED Oscillations and Inconsistent Routing in BGP
(Berlin Hency, Vasudha V and Raghavendran N)
03.40 - 04.00PM -----------Break-----------
04.00 - 04.20PM
An Improved and Adaptive Face Recognition Method using Simplified Fuzzy ARTMAP
(Antu Annam Thomas and M. Wilscy)
04.20 - 04.40PM
04.40 - 05.00PM
05.00 - 05.20PM
05.20 - 05.40PM
05.40 - 06.00PM