Hall 3 |
May 24, 2013 |
Time |
Session 1
Chair : P.Subashini, Avinashilingam University for Women, India |
08:00 -
09:00AM |
Registration |
08:30 -
09:00AM |
Welcome Message & Invited Talk :
|
09:00 -
09:15AM |
Sliding Mode Controller Design for the Hybrid Synchronization of Hyperchaotic Yujun Systems
Sundarapandian Vaidyanathan |
09:15 -
09:30AM |
Page Border Noise Removal in Document Images of Historical Gurmukhi Manuscripts
Harleen Kaur and Simpel Jindal |
09:30 - 09:45AM |
On Recognition of Handwritten Bengali Numerals
Soharab Hossain Shaikh, Srabanti Bose and Nabendu Chaki |
09:45 - 10:00AM |
Analysis of Multiple Beam Function Antenna Array using Artificial Neural Network
Rama Sanjeeva Reddy.B and Vakula.D |
10:00 - 10:15AM |
-------------Break-------------- |
10.15 -
10.30AM
|
An ANN based brain abnormality detection using MR Images
K. V. Kulhalli and S. R. Khot
|
10.30 -
10.45AM
|
Noise Removal Techniques For Microwave Remote Sensing RADAR Data And
Its Evaluation
Arundhati Misra, B Kartikeyan and S Garg |
10.45 -
11.00AM
|
Multiple Region of Interest tracking of non-rigid objects using demon's algorithm
Rohan Pillai, Abhishikta Yalavali, Saima Mohan and Amol Patil |
11.00 -
11.15AM
|
Image Encryption with Discrete Fractional Fourier Transform and Chaos
Goyal Seema, Sahay Ila and Agrawal Monika |
11.15 -
11.30PM
|
An Exploration of Periocular Region with Reduced Region for
Authentication: Realm of Occult
Ambika D R, Radhika K R and D Seshachalam |
11.30 -
11.45PM
|
Modified Majority Voting Algorithm towards Creating Reference
Image for Binarization
Ayan Dey, Soharab Hossain Shaikh, Khalid Saeed and Nabendu Chaki |
11.45 -
12.00PM
|
Secure Two Phase Image Encryption
V Hemanth and R Praveen Kumar
|
12.00 -
12.15PM
|
Genetically Evolved Cellular Automata for Image Edge Detection
Jebaraj Selvapeter and Wim Hordijk |
12.15 -
12.30PM
|
A Fast 2-Field De-interlacer using an edge-linking Procedure
Vijayachandran Mariappan
|
12.30 -
01.30PM |
-----------Lunch
Break----------- |
Time |
Session 2
Chair :Dr. V. Sundarapandian, Vel Tech University, India
|
01.30 -
01.45PM
|
Mesh Decomposition of 3D Scenes
Geetha Ramachandran, Markus Rupp and Walter Kropatsch |
01.45 - 02.00PM
|
Performance evaluations of Grioryan FFT and Cooley-Tukey FFT onto Xilinx Virtex-II Pro and Virtex-5 FPGAs
Narayanam Ranganadh and Bindu Tushara D |
02.00 - 02.15PM
|
An Efficient peak valley detection based VAD algorithm for robust detection of speech auditory brainstem responses
Ranganadh Narayanam |
02.15 -
02.30PM
|
A Novel Speech Tokenization Strategy using Unvoiced Regions, Pitch and Energy Contours
Vivek Kumar Gupta and Pradip K. Das |
02.30 -
02.45PM
|
Study of Acoustic Properties of Nasal and Non-nasal Vowels in Temporal Domain
Nishant Singhal and Pradip K. Das |
02.45 - 03.00PM |
Integrating Wiimote, WEKA, GIMP with Matlab for Bangla Handwritten Character Recognition
Md. Shakir Khan, M. A. Naser, Asif Ahmed and Jahidul Islam |
03.00 - 03.15PM |
Mixture of Gaussian Mixture Models for Robust Skin Color Based Segmentation
Mokhtar M. Hasan, Noor A. Ibraheem, Rafigul Z. Khan and Pramod K. Mishra |
03.15 - 03.30PM |
Hand Gesture Recognition using Gabor filter Bank and MFCC
Gupta Shikha, Jaafar Jafreezal, Wan Ahmad Wan Fatimah and Kilak Abhishek |
03.30 - 03.45PM |
Facial Landmarking Localization for Emotion Recognition Using Bayesian Shape Models
Hernan F. Garcia, Alejandro T. Valencia and Alvaro A. Orozco |
03.45 - 04.00PM |
-----------Break----------- |
04.00 - 04.15PM
|
To Make Enhance Trust between BGP Speakers with Help of Secure Symmetric Key
Divan Raimagia, Sameena Zafar and Shraddha Singh |
04.15 - 04.30PM
|
A Novel Voting System Using Sms
M.Kamaraju, P.V.Subba Rao and T.Venkata Lakshmi |
04.30 - 04.45PM
|
An Improved DNA Based Cryptosystem
Nirmalya Kar, Atanu Majumder, Ashim Saha and Dwijen Rudrapal |
04.45 - 05.00PM
|
Speech Recognition system using Matlab®
Manan Vyas |
05.00 -
05.15PM
|
Automatic moving object segmentation using graph cut and label maps
zhan Xiong and Guoqiang Xiao |
05.15 -
05.30PM
|
Packet Combining Using Soft Bit Maximal Ratio Combining Technique in Cooperative Relay Network
Dhiraj K. Thote, Prabhakar D. Dorge, Sanjay S. Dorle and Harsha R.Tembhekar
|
05.30 -
05.45PM |
Crack Classification and Interpolation of Old Digital Paintings
Shruti Garg and G. Sahoo
|
05.45 - 06.00PM
|
Implementing Cross Layer Design In Adhoc Network
Nitin B. Chakole, Yogesh A. Suryavanshi and Dinesh S. Tundalwar |
Hall 3 |
May 25, 2013 |
Time |
Session 3
Chair : Nikhil Kumar Yadav, Motilal Nehru National Institute of Technology Allahabad, India
|
09:00 -
09:15AM |
Node Failure Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks
Natarajan Meghanathan and Philip D. Mumford |
09:15 -
09:30AM |
A Method of Recommendation using One-Class Collaborative Filtering
Nicholas Dzugan, Lance Fannin, and S. Kami Makki
|
09:30 - 09:45AM |
Fusion based Multimodal Authentication in Biometrics using Context-Sensitive Exponent Associative Memory Model: a Novel Approach
P. E. S. N. Krishna Prasad, K. Pavan Kumar, M. V. Rama Krishna and B. D. C. N. Prasad |
09:45 - 10:00AM |
Comparing the Impact ofmobile Nodes Arrival Patterns Inmanets Using Poisson and Paretomodels
John Tengviel, and K. Diawuo |
10:00 - 10:15AM |
-------------Break-------------- |
10.15 -
10.30AM
|
Materialized View Selection based on Query Constraints
T.V. Vijay Kumar and Mohammad Haider
|
10.30 -
10.45AM
|
Symbolic Data Analysis for the Development of Object Oriented Data Model for Sensor Data Repository
Doreswamy and Srinivas Narasegouda |
10.45 -
11.00AM
|
SSCMU: Software System for Cache Memory Utilization
Korde P.S, Khanale P.B and Jinturkar A.A
|
11.00 -
11.15AM
|
Framework for Tagging Software in Web Application
Karan Guptaa and Anita Goelb
|
11.15 -
11.30PM
|
Implementation of High Speed FIR Filter: Performance Comparison with Different Parallel Prefix Adders in FPGAs
Uma Ramadass and P. Dhavachelvan
|
11.30 -
11.45PM
|
Update Summarization Using Spectral Analysis
Vanitha P and Kogilavani S V
|
11.45 -
12.00PM
|
Mapping of Traditional Software Development Methods to Agile Methodology
Popli Rashmi, Anita, and Chauhan Naresh |
12.00 -
12.15PM
|
Wireless Sensor Networks – Architecture, Security Requirements, Security Threats and its Countermeasures
Ranjit Panigrahi, Kalpana Sharma and M.K. Ghose |
12.15 -
12.30PM
|
An Improved Speech Recognition System
Suma Swamy, Manasa S, Mani Sharma, Nithya A.S, Roopa K.S, and K.V Ramakrishnan
|
12.30 -
01.30PM |
-----------Lunch
Break----------- |
Time |
Session 4
Chair :Neetu Gupta, Amity University, India
|
01.30 -
01.45PM
|
Logical Effort Calculation of Full Adder in ASIC
Uma Ramadass and P. Dhavachelvan |
01.45 - 02.00PM
|
IMBPC- An Intelligent Model Based Hybrid Authentication Technique to Preserve User Privacy and Secrecy for Cloud Users
Chandramohan.D, Vengattaraman.T, Dhavachelvan.P and Baskaran.R |
02.00 - 02.15PM
|
An Approach to Provide Privacy Preservation for User Data in Pervasive & Ubiquitous Environment
Chandramohan.D, Vengattaraman.T, Dhavachelvan.P and Baskaran.R |
02.15 -
02.30PM
|
A Hybrid Approach for Ensuring Security in Data Communication
Shailender Gupta, Bharat Bhushan, Surbhi Singhania and Jeetesh Gulani |
02.30 -
02.45PM
|
Powers-of-two Design of Finite Impulse Response Filter using Self-organizing Random Immigrants Genetic Algorithm
Abhijit Chandra and Sudipta Chattopadhyay |
02.45 - 03.00PM |
Discovering Latent Relationships among Learning Style Dimensions using Association Rule Mining
C. Beulah Christalin Latha, Sujni Paul and E. Kirubakaran |
03.00 - 03.15PM |
Classification of Tamil Poetry using Context Free Grammar using Tamil Grammar Rules
Subha Rashmi S, Subasree Venkatsubhramaniyen and Rajeswari Sridhar |
03.15 - 03.30PM |
Humanistic Approach in Mobile Adhoc Network: HAMANET
Md. Amir Khusru Akhtar and G. Sahoo |
03.30 - 03.45PM |
Study of Different Non Destructive Testing Based on Applications, Working Principles and their Uses
Vimal Upadhyay, Krishna Kant Agrawal and Gopal Bhati
|
03.45 - 04.00PM |
-----------Break----------- |
04.00 - 04.15PM
|
A Variant of Utility Design Pattern for Object Oriented Performance Testing
Arpit Christi |
04.15 - 04.30PM
|
Fault Detection in Sensor Network using DBSCAN and Statistical Models
Doreswamy and Srinivas Narasegouda |
04.30 - 04.45PM
|
Cost Efficient ELCA based PRNG for BIST
Arnab Mitra and Anirban Kundu |
04.45 - 05.00PM
|
Learning Data: Intrusion Detection
Sita Rama Murty Pilla, M Sailaja and R Kiran Kumar |
05.00 -
05.15PM
|
A Novel Distance Function Based K-Mean Algorithm for Clustering of Engineering Materials' Database
Doreswamy and Hemanth. K. S
|
05.15 -
05.30PM
|
MPC-BLAR: Maximal Power Conserved and Battery Life Aware Routing in Ad hoc Networks
M.Sunitha, T.Venugopal and P.V.S.Srinivas
|
05.30 -
05.45PM |
An Important Intelligent Information Extraction from Legal Texts Using Probabilistic Models for Segmenting & Labeling Sequence Data
V.Annapoorani and A.Vijaya Kathiraven |
05.45 - 06.00PM
|
Speech Processing with combined use of MFCC and LPC for Wide band coding
B.Kanisha and G.Balakrishnan |
Hall 3 |
May 26, 2013 |
Time |
Session 5
Chair :Dr. Omar Tayan, Taibah University, Saudi Arabia
|
09:00 -
09:15AM |
State Based Test case Generation using Variable Chromosome Length Genetic Algorithm
Anuja Arora and Madhavi Sinha |
09:15 -
09:30AM |
Air Pollution Monitoring Using ZigBee
Darshana N. Tambe and Nekita A. Chavhan
|
09:30 - 09:45AM |
A Regular Exponentiation Algorithm Resistant to Simple Power Analysis and Safe-Error Attack
Nan-Qing Shou, Si-Yang Yu, Yan Liu, Yun-Chuan Qin and Ken-Li Li
|
09:45 - 10:00AM |
Need of Programming Models, tools and algorithms for new generation HPC(EXASCALE System)
Abbas Mohammed and Niraj Updhyaya |
10:00 - 10:15AM |
-------------Break-------------- |
10.15 -
10.30AM
|
A Secure Key Computation Protocol for Secure Group Communication with Password Based Authentication
Velumadhava Rao R, Vikhnesh ma, Kailash B, Selvamani K and Elakkiya R
|
10.30 -
10.45AM
|
Iris Indexing Techniques
N. Poonguzhalii and M. Ezhilarasan |
10.45 -
11.00AM
|
Information Technology Model for Product Lifecycle Engineering
Bhanumathi KS and B Haridas |
11.00 -
11.15AM
|
Knowledge Base Compound approach against Phishing Attacks using Some Parsing Techniques
Gaurav Kumar Tak, Udit Kumar and Gaurav Ojha |
11.15 -
11.30PM
|
An Advanced Authentication Method by Fractal Sieve and MMD against Bruit-force attack
Ch. Rupa, SK. Rizwana, SK. Salma and V. Shalini |
11.30 -
11.45PM
|
On Average Case Analysis through Statistical Bounds: Linking Theory to Practice
Niraj Kumar Singh, Soubhik Chakraborty and Dheeresh Kumar Mallick |
11.45 -
12.00PM
|
A semantic based approach for Information Retrieval from HTML Documents using Wrapper Induction Technique
A.M.Abirami, A.Askarunisa, T.M.Aishwarya and K.S.Eswari |
12.00 -
12.15PM
|
A Novel Ant Colony Optimization-based Algorithm for the Optimal Centralized Wireless Access Network
Dac-Nhuong Le, Nhu Gia Nguyen and Vinh Trong Le
|
12.15 -
12.30PM
|
A Study of Digital Watermarking Taxonomy and Attacks
Tanmay Dutta, Indranil Paria, Poulami Das, Bijurika Nandi and Nilanjan Dey |
12.30 -
01.30PM |
-----------Lunch
Break----------- |
Time |
Session 6
Chair :Meenakshi Tripathi, MNIT Jaipur, India
|
01.30 -
01.45PM
|
Adaptation of Parametric Uniform Crossover in Genetic Algorithm
Farhad Nadi and Ahamad Tajudin Khader
|
01.45 - 02.00PM
|
Software Metrics on Test Data Generation Using EDAs
Abdul jabbar and Sarala Subramani |
02.00 - 02.15PM
|
Performance Analysis of Asynchronous Periodic Pattern Mining Algorithms
N.V.G. Sirisha Gadiraju, Shashi Mogalla and Padma Raju G.V. |
02.15 -
02.30PM
|
Multi-velocity Energy-efficient Reliable Routing Protocol for Coal Mine Monitoring
D.Usha and B.Paramasivan |
02.30 -
02.45PM
|
Real Time Database Compression Optimization Using Iterative Length Compression Algorithm
Muthukumar Murugesan and T Ravichandran |
02.45 - 03.00PM |
EEKWSN- Energy Efficient key Distribution in Wireless Sensor Network
Ambika.N and G.T.Raju
|
03.00 - 03.15PM |
Semantic Web Services – Discovery, Selection and Composition Techniques
Sowmya Kamath and Ananthanarayana V.S
|
03.15 - 03.30PM |
HMM based POS Tagger for Hindi
S Nisheeth Joshi, Hemant Darbari and Iti Mathur |
03.30 - 03.45PM |
A Model for Aligning Software Projects’ Requirements with Project Team Members’ Requirements
Robert Hans
|
03.45 - 04.00PM |
-----------Break----------- |
04.00 - 04.15PM
|
Empirical Study of Email Security Threats and Countermeasures
Dhinaharan Nagamalai, Ozcan Abdulkadir, Ali Okatan |
04.15 - 04.30PM
|
The Effecitive way of Processor Performance Ehancement by Proper Branch handling
Jisha P Abraham and Sheena Mathew
|
04.30 - 04.45PM
|
A new alignment free method for similarity/dissimilarity analysis of protein sequences
Manoj Kumar Gupta, Rajdeep Niyogi and Manoj Misra
|
04.45 - 05.00PM
|
A Survey on Wireless Sensor Networks Security with the Integration of Clustering and Keying Techniques
V.K. Singh and Kalpana Sharma
|
05.00 -
05.15PM
|
A Clustering-Based Approach for Detecting Profileinjection attacks in Recommender Systems
Parthasarathi Chakraborty and Sunil Karforma |
05.15 -
05.30PM
|
A Time point Series-based Profile-injection attack Detection Technique for Recommender Systems
Parthasarathi Chakraborty and Sunil Karforma |