The Third International Conference on Computer Science, Engineering and Applications

(ICCSEA-2013)

Venue : HABITAT WORLD
May 24 ~ 26, 2013. Delhi, India

Program Schedule 3

Hall 3

May 24, 2013

Time Session 1

Chair : P.Subashini, Avinashilingam University for Women, India

08:00 - 09:00AM

Registration

08:30 - 09:00AM

Welcome Message & Invited Talk : 

09:00 - 09:15AM Sliding Mode Controller Design for the Hybrid Synchronization of Hyperchaotic Yujun Systems
Sundarapandian Vaidyanathan
09:15 - 09:30AM Page Border Noise Removal in Document Images of Historical Gurmukhi Manuscripts
Harleen Kaur and Simpel Jindal
09:30 - 09:45AM On Recognition of Handwritten Bengali Numerals
Soharab Hossain Shaikh, Srabanti Bose and Nabendu Chaki
09:45 - 10:00AM Analysis of Multiple Beam Function Antenna Array using Artificial Neural Network
Rama Sanjeeva Reddy.B and Vakula.D
10:00 - 10:15AM -------------Break--------------
10.15 - 10.30AM
An ANN based brain abnormality detection using MR Images
K. V. Kulhalli and S. R. Khot
10.30 - 10.45AM
Noise Removal Techniques For Microwave Remote Sensing RADAR Data And Its Evaluation
Arundhati Misra, B Kartikeyan and S Garg
10.45 - 11.00AM
Multiple Region of Interest tracking of non-rigid objects using demon's algorithm
Rohan Pillai, Abhishikta Yalavali, Saima Mohan and Amol Patil
11.00 - 11.15AM
Image Encryption with Discrete Fractional Fourier Transform and Chaos
Goyal Seema, Sahay Ila and Agrawal Monika
11.15 - 11.30PM
An Exploration of Periocular Region with Reduced Region for Authentication: Realm of Occult
Ambika D R, Radhika K R and D Seshachalam
11.30 - 11.45PM
Modified Majority Voting Algorithm towards Creating Reference Image for Binarization
Ayan Dey, Soharab Hossain Shaikh, Khalid Saeed and Nabendu Chaki
11.45 - 12.00PM
Secure Two Phase Image Encryption
V Hemanth and R Praveen Kumar
12.00 - 12.15PM
Genetically Evolved Cellular Automata for Image Edge Detection
Jebaraj Selvapeter and Wim Hordijk
12.15 - 12.30PM
A Fast 2-Field De-interlacer using an edge-linking Procedure
Vijayachandran Mariappan
12.30 - 01.30PM -----------Lunch Break-----------
Time

Session 2

Chair :Dr. V. Sundarapandian, Vel Tech University, India     
                           

01.30 - 01.45PM
Mesh Decomposition of 3D Scenes
Geetha Ramachandran, Markus Rupp and Walter Kropatsch
01.45 - 02.00PM
Performance evaluations of Grioryan FFT and Cooley-Tukey FFT onto Xilinx Virtex-II Pro and Virtex-5 FPGAs
Narayanam Ranganadh and Bindu Tushara D
02.00 - 02.15PM
An Efficient peak valley detection based VAD algorithm for robust detection of speech auditory brainstem responses
Ranganadh Narayanam
02.15 - 02.30PM
A Novel Speech Tokenization Strategy using Unvoiced Regions, Pitch and Energy Contours
Vivek Kumar Gupta and Pradip K. Das
02.30 - 02.45PM
Study of Acoustic Properties of Nasal and Non-nasal Vowels in Temporal Domain
Nishant Singhal and Pradip K. Das
02.45 - 03.00PM Integrating Wiimote, WEKA, GIMP with Matlab for Bangla Handwritten Character Recognition
Md. Shakir Khan, M. A. Naser, Asif Ahmed and Jahidul Islam
03.00 - 03.15PM Mixture of Gaussian Mixture Models for Robust Skin Color Based Segmentation
Mokhtar M. Hasan, Noor A. Ibraheem, Rafigul Z. Khan and Pramod K. Mishra
03.15 - 03.30PM Hand Gesture Recognition using Gabor filter Bank and MFCC
Gupta Shikha, Jaafar Jafreezal, Wan Ahmad Wan Fatimah and Kilak Abhishek
03.30 - 03.45PM Facial Landmarking Localization for Emotion Recognition Using Bayesian Shape Models
Hernan F. Garcia, Alejandro T. Valencia and Alvaro A. Orozco
03.45 - 04.00PM -----------Break-----------
04.00 - 04.15PM
To Make Enhance Trust between BGP Speakers with Help of Secure Symmetric Key
Divan Raimagia, Sameena Zafar and Shraddha Singh
04.15 - 04.30PM
A Novel Voting System Using Sms
M.Kamaraju, P.V.Subba Rao and T.Venkata Lakshmi
04.30 - 04.45PM
An Improved DNA Based Cryptosystem
Nirmalya Kar, Atanu Majumder, Ashim Saha and Dwijen Rudrapal
04.45 - 05.00PM
Speech Recognition system using Matlab®
Manan Vyas
05.00 - 05.15PM
Automatic moving object segmentation using graph cut and label maps
zhan Xiong and Guoqiang Xiao
05.15 - 05.30PM
Packet Combining Using Soft Bit Maximal Ratio Combining Technique in Cooperative Relay Network
Dhiraj K. Thote, Prabhakar D. Dorge, Sanjay S. Dorle and Harsha R.Tembhekar
05.30 - 05.45PM Crack Classification and Interpolation of Old Digital Paintings
Shruti Garg and G. Sahoo
05.45 - 06.00PM
Implementing Cross Layer Design In Adhoc Network
Nitin B. Chakole, Yogesh A. Suryavanshi and Dinesh S. Tundalwar

Hall 3

May 25, 2013

Time Session 3

Chair : Nikhil Kumar Yadav, Motilal Nehru National Institute of Technology Allahabad, India
                           
             

09:00 - 09:15AM Node Failure Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks
Natarajan Meghanathan and Philip D. Mumford
09:15 - 09:30AM A Method of Recommendation using One-Class Collaborative Filtering
Nicholas Dzugan, Lance Fannin, and S. Kami Makki
09:30 - 09:45AM Fusion based Multimodal Authentication in Biometrics using Context-Sensitive Exponent Associative Memory Model: a Novel Approach
P. E. S. N. Krishna Prasad, K. Pavan Kumar, M. V. Rama Krishna and B. D. C. N. Prasad
09:45 - 10:00AM Comparing the Impact ofmobile Nodes Arrival Patterns Inmanets Using Poisson and Paretomodels
John Tengviel, and K. Diawuo
10:00 - 10:15AM -------------Break--------------
10.15 - 10.30AM
Materialized View Selection based on Query Constraints
T.V. Vijay Kumar and Mohammad Haider
10.30 - 10.45AM
Symbolic Data Analysis for the Development of Object Oriented Data Model for Sensor Data Repository
Doreswamy and Srinivas Narasegouda
10.45 - 11.00AM
SSCMU: Software System for Cache Memory Utilization
Korde P.S, Khanale P.B and Jinturkar A.A
11.00 - 11.15AM
Framework for Tagging Software in Web Application
Karan Guptaa and Anita Goelb
11.15 - 11.30PM
Implementation of High Speed FIR Filter: Performance Comparison with Different Parallel Prefix Adders in FPGAs
Uma Ramadass and P. Dhavachelvan
11.30 - 11.45PM
Update Summarization Using Spectral Analysis
Vanitha P and Kogilavani S V
11.45 - 12.00PM
Mapping of Traditional Software Development Methods to Agile Methodology
Popli Rashmi, Anita, and Chauhan Naresh
12.00 - 12.15PM
Wireless Sensor Networks – Architecture, Security Requirements, Security Threats and its Countermeasures
Ranjit Panigrahi, Kalpana Sharma and M.K. Ghose
12.15 - 12.30PM
An Improved Speech Recognition System
Suma Swamy, Manasa S, Mani Sharma, Nithya A.S, Roopa K.S, and K.V Ramakrishnan
12.30 - 01.30PM -----------Lunch Break-----------
Time

Session 4

Chair :Neetu Gupta, Amity University, India     
                           

01.30 - 01.45PM
Logical Effort Calculation of Full Adder in ASIC
Uma Ramadass and P. Dhavachelvan
01.45 - 02.00PM
IMBPC- An Intelligent Model Based Hybrid Authentication Technique to Preserve User Privacy and Secrecy for Cloud Users
Chandramohan.D, Vengattaraman.T, Dhavachelvan.P and Baskaran.R
02.00 - 02.15PM
An Approach to Provide Privacy Preservation for User Data in Pervasive & Ubiquitous Environment
Chandramohan.D, Vengattaraman.T, Dhavachelvan.P and Baskaran.R
02.15 - 02.30PM
A Hybrid Approach for Ensuring Security in Data Communication
Shailender Gupta, Bharat Bhushan, Surbhi Singhania and Jeetesh Gulani
02.30 - 02.45PM
Powers-of-two Design of Finite Impulse Response Filter using Self-organizing Random Immigrants Genetic Algorithm
Abhijit Chandra and Sudipta Chattopadhyay
02.45 - 03.00PM Discovering Latent Relationships among Learning Style Dimensions using Association Rule Mining
C. Beulah Christalin Latha, Sujni Paul and E. Kirubakaran
03.00 - 03.15PM Classification of Tamil Poetry using Context Free Grammar using Tamil Grammar Rules
Subha Rashmi S, Subasree Venkatsubhramaniyen and Rajeswari Sridhar
03.15 - 03.30PM Humanistic Approach in Mobile Adhoc Network: HAMANET
Md. Amir Khusru Akhtar and G. Sahoo
03.30 - 03.45PM Study of Different Non Destructive Testing Based on Applications, Working Principles and their Uses
Vimal Upadhyay, Krishna Kant Agrawal and Gopal Bhati
03.45 - 04.00PM -----------Break-----------
04.00 - 04.15PM
A Variant of Utility Design Pattern for Object Oriented Performance Testing
Arpit Christi
04.15 - 04.30PM
Fault Detection in Sensor Network using DBSCAN and Statistical Models
Doreswamy and Srinivas Narasegouda
04.30 - 04.45PM
Cost Efficient ELCA based PRNG for BIST
Arnab Mitra and Anirban Kundu
04.45 - 05.00PM
Learning Data: Intrusion Detection
Sita Rama Murty Pilla, M Sailaja and R Kiran Kumar
05.00 - 05.15PM
A Novel Distance Function Based K-Mean Algorithm for Clustering of Engineering Materials' Database
Doreswamy and Hemanth. K. S
05.15 - 05.30PM
MPC-BLAR: Maximal Power Conserved and Battery Life Aware Routing in Ad hoc Networks
M.Sunitha, T.Venugopal and P.V.S.Srinivas
05.30 - 05.45PM An Important Intelligent Information Extraction from Legal Texts Using Probabilistic Models for Segmenting & Labeling Sequence Data
V.Annapoorani and A.Vijaya Kathiraven
05.45 - 06.00PM
Speech Processing with combined use of MFCC and LPC for Wide band coding
B.Kanisha and G.Balakrishnan

Hall 3

May 26, 2013

Time Session 5

Chair :Dr. Omar Tayan, Taibah University, Saudi Arabia
                           
             

09:00 - 09:15AM State Based Test case Generation using Variable Chromosome Length Genetic Algorithm
Anuja Arora and Madhavi Sinha
09:15 - 09:30AM Air Pollution Monitoring Using ZigBee
Darshana N. Tambe and Nekita A. Chavhan
09:30 - 09:45AM A Regular Exponentiation Algorithm Resistant to Simple Power Analysis and Safe-Error Attack
Nan-Qing Shou, Si-Yang Yu, Yan Liu, Yun-Chuan Qin and Ken-Li Li
09:45 - 10:00AM Need of Programming Models, tools and algorithms for new generation HPC(EXASCALE System)
Abbas Mohammed and Niraj Updhyaya
10:00 - 10:15AM -------------Break--------------
10.15 - 10.30AM
A Secure Key Computation Protocol for Secure Group Communication with Password Based Authentication
Velumadhava Rao R, Vikhnesh ma, Kailash B, Selvamani K and Elakkiya R
10.30 - 10.45AM
Iris Indexing Techniques
N. Poonguzhalii and M. Ezhilarasan
10.45 - 11.00AM
Information Technology Model for Product Lifecycle Engineering
Bhanumathi KS and B Haridas
11.00 - 11.15AM
Knowledge Base Compound approach against Phishing Attacks using Some Parsing Techniques
Gaurav Kumar Tak, Udit Kumar and Gaurav Ojha
11.15 - 11.30PM
An Advanced Authentication Method by Fractal Sieve and MMD against Bruit-force attack
Ch. Rupa, SK. Rizwana, SK. Salma and V. Shalini
11.30 - 11.45PM
On Average Case Analysis through Statistical Bounds: Linking Theory to Practice
Niraj Kumar Singh, Soubhik Chakraborty and Dheeresh Kumar Mallick
11.45 - 12.00PM
A semantic based approach for Information Retrieval from HTML Documents using Wrapper Induction Technique
A.M.Abirami, A.Askarunisa, T.M.Aishwarya and K.S.Eswari
12.00 - 12.15PM
A Novel Ant Colony Optimization-based Algorithm for the Optimal Centralized Wireless Access Network
Dac-Nhuong Le, Nhu Gia Nguyen and Vinh Trong Le
12.15 - 12.30PM
A Study of Digital Watermarking Taxonomy and Attacks
Tanmay Dutta, Indranil Paria, Poulami Das, Bijurika Nandi and Nilanjan Dey
12.30 - 01.30PM -----------Lunch Break-----------
Time

Session 6

Chair :Meenakshi Tripathi, MNIT Jaipur, India     
                           

01.30 - 01.45PM
Adaptation of Parametric Uniform Crossover in Genetic Algorithm
Farhad Nadi and Ahamad Tajudin Khader
01.45 - 02.00PM
Software Metrics on Test Data Generation Using EDAs
Abdul jabbar and Sarala Subramani
02.00 - 02.15PM
Performance Analysis of Asynchronous Periodic Pattern Mining Algorithms
N.V.G. Sirisha Gadiraju, Shashi Mogalla and Padma Raju G.V.
02.15 - 02.30PM
Multi-velocity Energy-efficient Reliable Routing Protocol for Coal Mine Monitoring
D.Usha and B.Paramasivan
02.30 - 02.45PM
Real Time Database Compression Optimization Using Iterative Length Compression Algorithm
Muthukumar Murugesan and T Ravichandran
02.45 - 03.00PM EEKWSN- Energy Efficient key Distribution in Wireless Sensor Network
Ambika.N and G.T.Raju
03.00 - 03.15PM Semantic Web Services – Discovery, Selection and Composition Techniques
Sowmya Kamath and Ananthanarayana V.S
03.15 - 03.30PM HMM based POS Tagger for Hindi
S Nisheeth Joshi, Hemant Darbari and Iti Mathur
03.30 - 03.45PM A Model for Aligning Software Projects’ Requirements with Project Team Members’ Requirements
Robert Hans
03.45 - 04.00PM -----------Break-----------
04.00 - 04.15PM
Empirical Study of Email Security Threats and Countermeasures
Dhinaharan Nagamalai, Ozcan Abdulkadir, Ali Okatan
04.15 - 04.30PM
The Effecitive way of Processor Performance Ehancement by Proper Branch handling
Jisha P Abraham and Sheena Mathew
04.30 - 04.45PM
A new alignment free method for similarity/dissimilarity analysis of protein sequences
Manoj Kumar Gupta, Rajdeep Niyogi and Manoj Misra
04.45 - 05.00PM
A Survey on Wireless Sensor Networks Security with the Integration of Clustering and Keying Techniques
V.K. Singh and Kalpana Sharma
05.00 - 05.15PM
A Clustering-Based Approach for Detecting Profileinjection attacks in Recommender Systems
Parthasarathi Chakraborty and Sunil Karforma
05.15 - 05.30PM
A Time point Series-based Profile-injection attack Detection Technique for Recommender Systems
Parthasarathi Chakraborty and Sunil Karforma