The Second International Conference on Computer Science, Engineering and Applications (ICCSEA-2012)

Venue: The Connaught Hotel
May 25 ~ 27, 2012, Delhi, India.

Program Schedule 4

Hall - 4

May 25, 2012

Time Session 1

Chair :  

08:00 - 09:00AM

Registration

08:30 - 09:00AM Multi-document Summarization based on Sentence Features and Frequest Itemsets      ( J. Jayabharathy and S. Kanmani )
09:00 - 09:20AM Encryption of Images based on Genetic algorithm - A New Approach      ( Jalesh kumar and S. Nirmala )
09:20 - 09:40AM A New Secret Key Cipher: C128    ( Indrajit Das and R. Saravanan )
09:40 - 10:00AM

Information Security using Chains Matrix Multiplication    ( Ch. Rupa and P. S Avadhani )

10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
Methodology For Automatic Bacterial Colony Counter ( Surbhi Gupta, Priyanka Kamboj and Sumit Kaushik )
10.40 - 11.00AM
High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
( Sunita V. Dhavale, R.S. Deodhar and L.M. Patnaik )
11.00 - 11.20AM
Key Management Protocol in WIMAX revisited        ( Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade )
11.20 - 11.40AM
Comparison of Content Based Image Retrieval System using Wavelet Transform
( Suchismita Das, Shruti Garg and G. Sahoo )
11.40 - 12.00PM
A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks       
( Charles A. Kamhoua, Kevin A. KwiatM and Joon S. Park )
12.00 - 12.20PM Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)       ( Uttam Kr. Mondal and J.K.Mandal )
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 2

Chair :  

01.40 - 2.00PM
A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)    ( J. K. Mandal and S. K.Ghosal )
2.00 - 2.20PM
A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks     ( Abhishek Majumder )
2.20 - 2.40PM
Energy Efficient Administrator Based Secured Routing in MANET ( Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee )
2.40 - 3.00PM
A Comparative Analysis of Modern Day Network Simulators   ( Debajyoti Pal )
3.00 - 3.20PM
Chaotic Cipher Using Arnolds And Duffings Map  ( Mina Mishra and V.H. Mankar )
3.20 - 3.40PM Strong Neighborhood based Stable Connected Dominating Sets for Mobile Ad hoc Networks  
( Natarajan Meghanathan and Michael Terrell )
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
Pre Decision Based Handoff In Multi Network Environment  ( Manoj Sharma and R.K.Khola )
4.20 - 4.40PM
Optimal Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks  ( Yingchi Mao )
4.40 - 5.00PM
ELRM: A Generic Framework for Location Privacy in LBS   ( Muhamed Ilyas and R.Vijayakumar )
5.00 - 5.20PM
Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment  
( Medha A.Shah and P.J.Kulkarni )
5.20 - 5.40PM
A Hierarchical CPN Model for Mobility Analysis in Zone based MANET  
( Moitreyee Dasgupta, Sankhayan Choudhury and Nabendu Chaki )
5.40 - 6.00PM Trust Based Trustworthy Routing in MANET   ( S.Sridhar and R.Baskaran )
 

May 26, 2012

Time

Session 3

Chair :  

08:00 - 08:20AM A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network
( S.Sridhar and R.Baskaran )
08:20 - 08:40AM Resource Based Optimized Decentralized Grid Scheduling Algorithm:   ( Piyush Chauhan and Nitin )
08:40 - 09:00AM Measuring, Comparing and Analyzing the Energy Efficiency of Cloud Database  
( Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu )
09:00 - 09:20AM Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment  
( Raghavendra Prabhu, Basappa B. Kodada and Shivakumar K. M )
09:20 - 09:40AM Gender Classification Techniques: A Review          ( Preeti Rai and Pritee Khanna)
09:40 - 10:00AM

Text Dependent Voice Based Biometric Authentication System using Spectrum Analysis and Image Acquisition      
( Somsubhra Gupta and Soutrik Chatterjee)

10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
A Gaussian Graphical Model Based approach for Image Inpainting       ( Krishnakant verma and M.A.Zaveri)
10.40 - 11.00AM
Various Implementations of Advanced Dynamic Signature Verification System        ( Jin Whan Kim)
11.00 - 11.20AM
Locally Adaptive Regularization for Robust Multiframe Super Resolution Reconstruction            
( Chandra Mohan S, Rajan K and Srinivasan R)
11.20 - 11.40AM
Thesaurus Based Web Searching             ( K.V.N.Sunitha and A.Sharada)
11.40 - 12.00PM
Cross-Layer Design In Wireless Sensor Networks ( S Jagadeesan and V Parthasarathy )
12.00 - 12.20PM

Concept Adapting Real-Time Data Stream Mining for Health Care Applications
(Dipti D. Patil, Jyoti G. Mudkanna, Dnyaneshwar Rokade and Vijay M. Wadhai)

12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 4

Chair :  

01.40 - 2.00PM
Case Study of Failure Analysis Techniques for Safety Critical Systems ( Aiswarya Sundararajan and Selvarani R )
2.00 - 2.20PM
Implementation of Framework for Semantic Annotation of Geospatial Data
(Preetam Naik, Madhuri Rao, S.S.Mantha and J.A.Gokhale)
2.20 - 2.40PM
Study of Architectural Design Patterns in Concurrence to Analysis of Design Pattern in Safety Critical Systems      
( Feby A Vinisha and Selvarani R)
2.40 - 3.00PM
Comparative Analysis of diverse Approaches for Air Target Classification based on Radar Track Data   
( Manish Garg and Upasna Singh )
3.00 - 3.20PM
A New Hybrid Binary Particle Swarm Optimization Algorithm for Multidimensional Knapsack Problem      
( Amira Gherboudj, Said Labed and Salim Chikhi )
3.20 - 3.40PM An Enhancement To Aodv Protocol For Efficient Routing In Vanet – A Cluster Based Approach       ( Aswathy M C & Tripti C )
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
A New Process Placement Algorithm in Multi-Core Clusters Aimed to Reducing Network Interface Contention       
( Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui )
4.20 - 4.40PM
A Policy Driven Business Logic Change Management for Enterprise Web Services       
( Thirumaran. M, Naga Venkata Kiran. G and Dhavachelvan. P )
4.40 - 5.00PM
A Particular Approach For Personalised Knowledge Processing
(Stefan Svetsky, Oliver Moravcik, Peter Schreiber, Pavol Tanuska, Jana Stefankova and Pavol Vazan )
5.00 - 5.20PM
Metrics Based Quality Assessment for Retrieval Ability of Web-Based Bioinformatics Tools
( Jayanthi Manicassamy and P. Dhavachelvan )
5.20 - 5.40PM
A New Approach for Vertical Handoff in Wireless 4G Network ( Vijay Malviya, Praneet Saurabh and Bhupendra Verma )
5.40 - 6.00PM Exploring Possibilities of Reducing Maintenance Effort in Object Oriented Software by Minimizing Indirect Coupling
( Nirmal Kumar Gupta, Mukesh Kumar Rohil and Naveen )
 

May 27, 2012

Time

Session 5

Chair :  

08:00 - 08:20AM A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs
( Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri )
08:20 - 08:40AM New hashing scheme to overcome the problem of overloading of articles in usenet
(Monika Saxena, Praneet Saurabh and Bhupendra Verma)
08:40 - 09:00AM An Optimal Approach for DICOM Image Segmentation Based on Fuzzy Techniques (J.Umamaheswari and G. Radhamani)
09:00 - 09:20AM Text Independent Speaker Recognition Model Based On Gamma Distribution Using Delta,Shifted Delta Cepstrals
( K Suri Babu,Srinivas Yarramalle and Suresh Varma Penumatsa )
09:20 - 09:40AM Application of Intervention Analysis on Stock Market Forecasting ( Mahesh S. Khadka, K. M. George, N. Park and J. B. Kim )
09:40 - 10:00AM A Chaotic Encryption Algorithm: Robustness against Brute- force attack ( Mina Mishra and V.H. Mankar )
10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM

Vital Signs Data Aggregation And Transmission Over Controller Area Network (CAN)
( Nadia Ishaque, Atiya Azmi, Noveel Azhar, Umm-e-laila and Ammar Abbas)

10.40 - 11.00AM

A Comparative Study On Different Biometric Modals Using PCA ( Pranay Kumar, Harendra Kumar, Naushad Ali and Ritu Tiwari)

11.00 - 11.20AM
An Effective Software Implemented Data Error Detection Method in Real Time Systems
( Atena Abdi, Seyyed Amir Asghari, Saadat Pourmozaffari, Hassan Taheri and Hossein Pedram )
11.20 - 11.40AM
Using Modularity with Rough Information Systems (Ahmed Taisser, Hesham Ahmed and Ashraf Hassan )
11.40 - 12.00PM
Web-page Prediction for Domain Specific Web-search using Boolean Bit Mask
( Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay )
12.00 - 12.20PM Survey on Web Service Discovery Approaches ( Debajyoti Mukhopadhyay and Archana Chougule )
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 6

Chair :  

01.40 - 2.00PM
Conceptualizing an Adaptive Framework for Pervasive Computing Environment ( Akhil Mohan and Nitin Upadhyay )
2.00 - 2.20PM
Preprocessing Of Automated Blood Cell Counter Data And Generation Of Association Rules In Clinical Pathology
( D.Minnie and S.Srinivasan )
2.20 - 2.40PM
Incomplete Multigranulation Based on Rough Intuitionistic Fuzzy Sets ( G K Panda, B K Tripathy and Anirban Mitra )
2.40 - 3.00PM

Hybrid Cluster Validation Techniques (Satish Gajawada and Durga Toshniwal)

3.00 - 3.20PM
Texel Identification Using K-Means Clustering Method ( S. Padmavathi, C. Rajalakshmi and K.P. Soman )
3.20 - 3.40PM Ubiquitous Medical Learning Using Augmented Reality based on Cognitive Information Theory
(Zahra Mohana Gebril, Behrang Parhizkar, Imam Musa Abiodunde Tele, Arash Habibi Lashkari, Mohammed A.Tahir and Yap Sing Nian)
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
A High Level Approach to Web Content Verification ( Liliana Alexandre and Jorge Coelho )
4.20 - 4.40PM
Histogram Correlation for Video Scene Change Detection ( Nisreen I. Radwan, Nancy M. Salem and Mohamed I. El Adawy )
4.40 - 5.00PM
Active Learning with Bagging for NLP Tasks Ruy Luiz Milidi_u, Daniel Schwabe, and Eduardo Motta
( Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Mott )
5.00 - 5.20PM
Towards a Practical “State Reconstruction” for Data Quality Methodologies: A Customized List of Dimensions
(S.Bekkouche and A.Chouarfia )
5.20 - 5.40PM
Hybrid Reputation Model Through Federation Of Peers Having Analogous Function ( Sreenu.G and Dhanya P M )
5.40 - 6.00PM A Quantitative Model of Operating System Security Evaluation ( Hammad Afzali and Hassan Mokhtari )