IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE
|
|
|
- Irma Walsh
- 9 years ago
- Views:
Transcription
1 IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE Organizer By Integrated Intelligent Research (IIR), India
2 General Chair Committees Dr. A.Clementking, King Khalid University, Kingdom of Saudi Arabia. Advisory Committee Xin-She Yang, Middlesex University London, London, United Kingdom. K.P. Thooyamani, Pro Vice Chancellor, Bharath University, India. Rev. Francis P Xavier SJ, Director, Loyola-ICAM College Eng. & Tech., India. Keun Ho RYU, Chungbuk National University, Korea. Sanghyuk LEE, Dept. of Elec. and Elec. Eng., Xi an Jiaotong-Liverpool University, China. Jothi Venkateswaran C, PG and Research Dept. of Com. Sci., Presidency College, India. Radhakrishanan P, King Khalid University, Kingdom of Saudi Arabia. Ranganathan K.N, Founder, Friends of USA, India. Thirumurugan Shanmugam, Dept. of Info. Tech., College of Applied Sciences, Oman. Karthikeyan Subramanian, Dept of Inf. Tech., College of Applied Sciences, Oman. Organizing Committee Victor Devadoss A., Dept of Maths, Loyola College, Chennai, India. Joby Joseph SDB, Vice Principal, St. Anthony's College, Shillong, India. Praveen R., AVIT, Chennai, India. Jon Arockiaraj J., Dept of Math., St. Joseph's College of Arts & Science, Cuddalore, India. Srinivasan R., JBIMS, University of Mumbai, Mumbai. Ravi K., PG and Research Department of Mathematics, Sacred Heart College, Tirupattur. Naveen A., Scholar, D.G.Vaishnav College, Affiliated to University of Madras, India. Publication Committee Satheesh Kumar J., Bharathiar University, Coimbatore, India. Natarajan Gajendran, President, Indian Society for Education and Environment (ISEE), India. Rani S., Dept of Computer Science, King Khalid University, Kingdom of Saudi Arabia. Managerial Committee Manimaran J, Integrated Intelligent Research, Chennai. Thanuja D, Integrated Intelligent Research, Chennai.
3 PROGRAM SCHEDULE , Thursday Time Event 9.30 AM AM Online Login AM AM Welcome Address & Dynamics of the Conferences Invited Talk : Research Paradigms AM AM (Dr. Harish C Chandramoorthy. Vice Chairman, Center for Stem, Cell Research, College of Medicine, King Khalid University, KSA) Paper Presentation I Chair : Dr. Radhakrishnan Palanikumar, AM AM King Khalid University, Kingdom of Saudi Arabia. V. Jeyabalaraja, Velammal Engineering College, India. Paper Presentation II Chair : Dr. C. Jothi Venkateswaran AM PM Presidency College, India. Dr. Kamala Kannan, Linton University College, Malaysia PM PM Lunch PM PM Online Login Invited Talk : PM PM Dr. Satheesh Kumar J., Bharathiar University, Coimbatore, India Paper Presentation III Chair : Dr. Sanghyuk Lee, PM PM Xi an Jiaotong-Liverpool University, China. Dr. Sasikala, University of Madras, Chennai. Paper Presentation IV Chair : Dr. Gyoo-Soo Chea, PM PM Baekseok University in Korea Dr. Mahadevan Gandhigram Rural Institute, Gandhigram PM PM Panel Discussion PM PM Valedictory For further details Dr A Clementking, General Chair IIRVCSETA [email protected]
4 The following paper are accepted for the presentation Paper Presentation I AM AM Chair : Dr. Radhakrishnan Palanikumar, King Khalid University, Kingdom of Saudi Arabia. V. Jeyabalaraja, Velammal Engineering College, India. Felicitators : Mr. A Naveen, Researcher, University of Madras, Chennai 1 Advantage of Extended Kalman Filter Over Discrete Kalman Filter In Dynamic State Estimation of Power System Network Manojkumar Rampelli 4 Automated Security Testing of Android Applications on Cloud Computing S. Krishnaveni, Prabakaran S. Sivamohan V.Ajantha Devi 8 Portable Device Converting Braille and Text Document to Speech output using Raspberry Pi 15 A Comparative Study of Low Power Testing Techniques for Suhas B Shirol Digital Circuits Rajashekar B Shettar 17 File Based Object Replicas Approach for Relocation Services in P.SunilGavaskr Data Intensive Grid Environment A.Ramamohan Reddy 26 Smart Security For Data Sharing In Cloud Computing Ayinavalli Venkata Ramana, B.V.Chaitanya, K.Indrasena Reddy, M.Venu Babu,V.Kavitha 27 Finite State Automata as Analyzers of Certain Grammar Class Aiusha V Hujon Rules in the Khasi Language 47 Comparative Analysis of Real Time Analytics for Numerous Software Applications Srinivash R C Justin Samuel 34 Effective Monte-Carlo Tree Search Strategies for Gomoku AI Jun Hwan Kang, Hang Joon Kim 35 Design and Tuning of PID Controller for Fractional Order systems with Time Delay Prasant Kumar Maharana S. Sharanya P. Ramani Ranjan Senapati 21 Multi-Keyword Search Over Encrypted Cloud Using Blind Storage Ramyaa R Balika J Chelliah 22 XACML Policy Evaluation with Dynamic Context Handling Anupreethi K B Sarooraj R B 41 Security Concerns with Open Research Issues of Present Computer Network Geetanjali Rathee, Hemraj Saini 46 Social Network Analysis to Assist Hiring Process Shruthi Gopal, S.R.Mani Sekhar 56 Detection of Tumor and Thrombi in Echocardiography Images by using Adaptive Co-Segmentation and Sparse Classifier P. Sai Baba, G. Sai Siva Vignesh, K.Goutham, S.Latha, P.Muthu, Dhanalakshmi
5 Chair : Dr. C. Jothi Venkateswaran Presidency College, India. Paper Presentation II AM PM Dr. Kamala Kannan, Linton University College, Malaysia Felicitators: Mr. J Manimaran, Integrated Intelligent Research, Chennai. 37 Secure Binary Image Steganography Using F5 algorithm Based on Data Hiding and Diffusion techniques M.S. Antony Vigil Jitendra Singh, Sameer Singh Rathor 42 Vector Based Sensor Ranking in Internet of Things Neha, Sharad Saxena 43 Development of Assistive Technology Tools for Visually Challenged to their Better Life 44 An adaptive Approach for Dynamic Resource Allocation in Cloud Services 45 Double Encrypted Passwords by Pattern based CAPCHA for User authentication 3 Dimensionality Reduction Methods Classical and Recent Trends: A Survey A.Raghunath K.Radha rani N. Surya P.sindhu Harikrishnan Natarajan P. Ajitha I. Bala Venkateswarlu Shikha Agarwal, R. Rajesh, Prabhat Ranjan Ann Baby, A Kannammal 12 Exploratory Based PCA for Security Modelling of Tam in E- Learning 25 Efficiency for Cloud Storage based on Proof of Ownership A. Elvin, G.Atchudha, V.Nirmalrani 30 Detection of Brain Tumour by Image Fusion using SVM Classifier S.L.Jany Shabu Repala Santhoshi Lakshmi Shaik Afrin Taj 39 Survey on Energy Aware Scheduling Algorithms of DAG Applications for Multiprocessor System Raman Bhinder, Nirmal Kaur 57 Tuning Large Scale Deduplication With Reduced Effort Ashwini.R, Sridevi.S Through Effective Sampling Selection Strategy 58 Anonymous Publication of Sensitive Transactional Data With N. Nandhini Low Information Loss V. Bindu 59 Network Traffic Management using Omnet++ S. Kranthi, K. Pranathi Improving Energy Efficiency in MANETS by Multipath Routing Web-based Report Generation for Direct Course Outcome Assessment S. Kranthi, K. Pranathi Geetha.Guttikonda Sai Sandeep Anuroop Desu
6 Paper Presentation III PM PM Chair : Dr. Sanghyuk Lee, Xi an Jiaotong-Liverpool University, China. Dr. Sasikala, University of Madras, Chennai. Felicitators: Ms. D Thanuja, Integrated Intelligent Research, Chennai. 28 A Survey on Aadhaar Based E-Health System in India Sandeep Yelisetti, Vemuri Sindhura 5 A Biometric based approach for Three Dimension Bio Sensor Implanted in the Human Brain S.Subalakshmi, G.Murugaboopathi 10 Mad-Multisensory Application for Dyslexics Nirmala.B, Vidhya.M, Kalaiselvi.V.K.G 11 IoT Based Data Logger System Using XBEE-PRO Marmik R. Modi, Vidhi H. Kakadiya, Nischay D. Parekh 13 Intelligent Expert System Biometrics For Antiterrorism Subathra.P Shivaranjani.T 14 Authentication Based Intrusion Detection System for Clustered MANET Using POMDP, Multimodal Biometric and Weighted Clustering Algorithm P.Prabhusundhar, B.Srinivasan 16 Dynamic Continuous Query Processing Over Streaming Data Ananthi, Sreedhevi 18 Automation the Process of Unifying the Change in the Firewall Kirandeep kaur Performance 19 Applying Data Prediction and Query processing in P.Padma, Wireless Sensor Networks S.AnuMeenakshi, Varshaa Muralidharan 20 Privacy Preserving of Mobile Advertisement Request Guddy M Sabu R.J Poovaraghan 23 Secure Information in Social Network using Cryptographic Techniques V.S.Revathi, B.Swetha, G.Thirulochini Devi, T.Sheela 24 Efficient Ranking of web pages based on Synonyms Vemuri Sindhura 51 Multi Objective Fault Indicator Positioning Method in Distribution System Rajesh Kumar D. Ravichandran 52 Survey and identifying the best tool for data Protection using C H. Nanda Krishna Powerful Data Anonymization (ARX Tool) and Cleaning and K.Durgacharan Sanitizing Log (Cornell Tool)
7 Chair : Dr. Gyoo-Soo Chea, Baekseok University in Korea Paper Presentation IV PM PM Dr. Mahadevan Gandhigram Rural Institute, Gandhigram Felicitators : Mr. A Naveen, Researcher, University of Madras, Chennai 29 Visual Object Tracking by Linear Robust Regression Technique KonetiMathaPriya SiripireddyDeepthi J. Hemamalini 31 Study and Analysis of Automation Testing Techniques K.Sita Kumari Sneha Lakshmi Munagala 32 End to End Encryption by Algebraic OR/XOR Geetanjali Rathee Hemraj Saini 33 Automation Testing Using Selenium Web driver For a Lawyer Application Vemuri Sindhura Praturi Sai Ramya Madhavi Devi Neelesh Pandey D.Karthikeyan 36 Design And Analysis Of Modular Multilevel Inverter For Pv- Fed Applications 38 Password Security Using Blowfish Algorithm Madhavi Katamaneni, N.Paraveena 40 A Study On Building Underwater Ad-Hoc Networks And Chilakalapudi Meher Sensor Networks Babu, N. Praveena 48 Analysis of Intelligent Controller for Liquid level process S.Catherin, S.N. Deepa 49 Implementation Experiences of ISO/IEEE PHD Standard Aravind S. Nair using Antidote Library V. Natarajan 50 A Survey on Harnessing Big Data in the Cloud K.Durga charan CH.Nanda Krishna 53 Cross-LayerIDS for Grayhole Attack Prabhat Ranjan, in Wireless Mesh Networks Hemraj Saini 54 A Review and Comparative Study of methods used in finding S.Latha, P.Muthu, carotid artery abnormalities using ultrasound images S.Dhanalakshmi 55 Application Service Managers using Integrated Monitoring Prerana S. Mohod Software K. P. Wagh 62 Smart IOT Enabled - Web Interface Controlled Semi-Autonomous Mobile Robot P. N. Chatur P.Vince Rakesh G.Sajiv
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,
Broadly conference covers major areas in big data analytics like Descriptive Analytics, Predictive Analytics and Prescriptive Analytics.
Introduction Today business performance is measured and analyzed by many innovative metrics and it is an inevitable affair for business houses engaged in the area of Tele-communications, Insurance, FMCG,
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
IEEE 2015-2016 JAVA TITLES
ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:
Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah
Journal of mathematics and computer science 10 (2014), 189-198 Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Miran Hikmat Mohammed Baban Computer Dept.
IEEE JAVA Project 2012
IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing
Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar
Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining
S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and
ANALYTICS CENTER LEARNING PROGRAM
Overview of Curriculum ANALYTICS CENTER LEARNING PROGRAM The following courses are offered by Analytics Center as part of its learning program: Course Duration Prerequisites 1- Math and Theory 101 - Fundamentals
BIG DATA IN HEALTHCARE THE NEXT FRONTIER
BIG DATA IN HEALTHCARE THE NEXT FRONTIER Divyaa Krishna Sonnad 1, Dr. Jharna Majumdar 2 2 Dean R&D, Prof. and Head, 1,2 Dept of CSE (PG), Nitte Meenakshi Institute of Technology Abstract: The world of
Machine Learning. 01 - Introduction
Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks
Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks K. Thiagarajan, Department of Mathematics, PSNA College of Engineering and Technology, Dindigul, India. A. Veeraiah,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses
İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Solar Powered Smart Irrigation System
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 341-346 Research India Publications http://www.ripublication.com/aeee.htm Solar Powered Smart Irrigation System
Mobile Network Security Technology Research Center Kyungpook National University
The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
Applied Mathematics and Mathematical Modeling
Applied Mathematics and Mathematical Modeling Joseph Malkevitch, York College (CUNY), Chair Ricardo Cortez, Tulane University Michael A. Jones, Mathematical Reviews Michael O Neill, Claremont McKenna College
Doctor of Philosophy. Computer Science
Judiciary-friendly software piracy forensics with POSAR Thesis submitted to the Bharathiar University in partial fulfillment of the requirements for the award of the degree of Doctor of Philosophy in Computer
PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements
Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, [email protected] URL:
Sanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 [email protected] 1. Introduction The field of data mining and knowledgee discovery is emerging as a
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING
WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING S. Janani Devi 1, G. S. Sreetha Devi 2, G. M. Tamil Selvan 3 SPG Scholar Bannari Amman Institute of Technology, Alathukombai,
Integrated Data Mining and Knowledge Discovery Techniques in ERP
Integrated Data Mining and Knowledge Discovery Techniques in ERP I Gandhimathi Amirthalingam, II Rabia Shaheen, III Mohammad Kousar, IV Syeda Meraj Bilfaqih I,III,IV Dept. of Computer Science, King Khalid
PhD in Computer Science at North Carolina A&T State University
PhD in Computer Science at North Carolina A&T State University December 5, 2013 Contents Admission...1 Program Requirements...2 Course Work...2 Advisory Committee...2 Residency and Other Requirements...2
1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool
Invited Speakers (Tentative) 1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool The worldwide market for DC technologies in buildings is estimated
The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
Computer/IT Project LIST. Contact: 9860171201 8796142757
Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis
Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture
Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture
Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing
work for MS leading to PhD in Electrical Engineering 1 s for Digital Systems and Signal Processing EE 801 Analysis of Stochastic Systems EE 802 Advanced Digital Signal Processing EE 80 Advanced Digital
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION
Volume 3, No. 12, December 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
Remote Patient Monitoring- An Implementation in ICU Ward
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,
BI Tools and Data Flow
BI Tools and Data Flow http://web.peralta.edu/indev/peralta business intelligence bi tool Mike Orkin, Ph.D. Associate Vice Chancellor of Academic Affairs Peralta Community College District 1 Business Intelligence
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
List of Student Participated in National / International Level Workshop, Conference, Symposium 2013 2014
List of Student Participated in National / International Level Workshop, Conference, Symposium 2013 2014 National Level 1. Dinakaran.S, on National Level workshop on WEKA Tool held at Kongu Arts and Science
M.S. Computer Science Program
M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Server Load Prediction
Server Load Prediction Suthee Chaidaroon ([email protected]) Joon Yeong Kim ([email protected]) Jonghan Seo ([email protected]) Abstract Estimating server load average is one of the methods that
Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile
Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile S.Saravanan Research Scholar, Department of CSE, Rajiv Gandhi college of
A SURVEY ON MAPREDUCE IN CLOUD COMPUTING
A SURVEY ON MAPREDUCE IN CLOUD COMPUTING Dr.M.Newlin Rajkumar 1, S.Balachandar 2, Dr.V.Venkatesakumar 3, T.Mahadevan 4 1 Asst. Prof, Dept. of CSE,Anna University Regional Centre, Coimbatore, [email protected]
How To Understand And Understand The Science Of Engineering In India
RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 [email protected].
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing
Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen
Kalasalingam University
Kalasalingam University Anand Nagar, Krishnankoil-626 126 Research Supervisor List S. NO NAME DEPARTMENT 1 Dr.A.MANOHAR Sr. ASSO.PROF/ HOD i/c CHEMISTRY 2 Dr.P.THILLAI ARASU PROF. /CHEMISTRY 3 Dr.E.R.NAGARAJAN
Inner Classification of Clusters for Online News
Inner Classification of Clusters for Online News Harmandeep Kaur 1, Sheenam Malhotra 2 1 (Computer Science and Engineering Department, Shri Guru Granth Sahib World University Fatehgarh Sahib) 2 (Assistant
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT
INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Introduction to Computer Networking: Trends and Issues
Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,
Embedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Automated Health Alerts Using In-Home Sensor Data for Embedded Health Assessment 2. Model-Based mean Arterial pressure estimation using
Tech Presentation 2016
Tech Presentation 2016 Our Management Team Marvin Igelman CEO Alex Zivkovic CTO David Berman CFO Matt Burns PM and Growth BreakingSports is the world s first fully automated real-time alerts platform for
9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System
1.Data Mining Analysis on EB bill system 2.Graph Based Share Market Data Updations 3.Web Based Book Publishing System 4.Online product opinion and Ranking system 5. Online Dynamic Form creation for Non-IT
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
CLOUD FRAMEWORK & SECURITY OVERVIEW
CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!
Simplifying Big Data Analytics: Unifying Batch and Stream Processing John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Streaming Analy.cs S S S Scale- up Database Data And Compute Grid
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
From Big Data to Smart Data Thomas Hahn
Siemens Future Forum @ HANNOVER MESSE 2014 From Big to Smart Hannover Messe 2014 The Evolution of Big Digital data ~ 1960 warehousing ~1986 ~1993 Big data analytics Mining ~2015 Stream processing Digital
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Patent Big Data Analysis by R Data Language for Technology Management
, pp. 69-78 http://dx.doi.org/10.14257/ijseia.2016.10.1.08 Patent Big Data Analysis by R Data Language for Technology Management Sunghae Jun * Department of Statistics, Cheongju University, 360-764, Korea
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning
Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step
New Technology Capabilities
New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch
How To Get A Computer Science Degree
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales
Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Canvas Lumber Compass Sextant 1851 America s Cup The oldest
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
ABV- Indian Institute of Information Technology & Management Gwalior (MP)
ABV- Indian Institute of Information Technology & Management Gwalior (MP) Following are the links to various online courses available (through MOOC etc.). This list is prepared by the Doctoral Students
TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
