IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE

Size: px
Start display at page:

Download "IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE"

Transcription

1 IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE Organizer By Integrated Intelligent Research (IIR), India

2 General Chair Committees Dr. A.Clementking, King Khalid University, Kingdom of Saudi Arabia. Advisory Committee Xin-She Yang, Middlesex University London, London, United Kingdom. K.P. Thooyamani, Pro Vice Chancellor, Bharath University, India. Rev. Francis P Xavier SJ, Director, Loyola-ICAM College Eng. & Tech., India. Keun Ho RYU, Chungbuk National University, Korea. Sanghyuk LEE, Dept. of Elec. and Elec. Eng., Xi an Jiaotong-Liverpool University, China. Jothi Venkateswaran C, PG and Research Dept. of Com. Sci., Presidency College, India. Radhakrishanan P, King Khalid University, Kingdom of Saudi Arabia. Ranganathan K.N, Founder, Friends of USA, India. Thirumurugan Shanmugam, Dept. of Info. Tech., College of Applied Sciences, Oman. Karthikeyan Subramanian, Dept of Inf. Tech., College of Applied Sciences, Oman. Organizing Committee Victor Devadoss A., Dept of Maths, Loyola College, Chennai, India. Joby Joseph SDB, Vice Principal, St. Anthony's College, Shillong, India. Praveen R., AVIT, Chennai, India. Jon Arockiaraj J., Dept of Math., St. Joseph's College of Arts & Science, Cuddalore, India. Srinivasan R., JBIMS, University of Mumbai, Mumbai. Ravi K., PG and Research Department of Mathematics, Sacred Heart College, Tirupattur. Naveen A., Scholar, D.G.Vaishnav College, Affiliated to University of Madras, India. Publication Committee Satheesh Kumar J., Bharathiar University, Coimbatore, India. Natarajan Gajendran, President, Indian Society for Education and Environment (ISEE), India. Rani S., Dept of Computer Science, King Khalid University, Kingdom of Saudi Arabia. Managerial Committee Manimaran J, Integrated Intelligent Research, Chennai. Thanuja D, Integrated Intelligent Research, Chennai.

3 PROGRAM SCHEDULE , Thursday Time Event 9.30 AM AM Online Login AM AM Welcome Address & Dynamics of the Conferences Invited Talk : Research Paradigms AM AM (Dr. Harish C Chandramoorthy. Vice Chairman, Center for Stem, Cell Research, College of Medicine, King Khalid University, KSA) Paper Presentation I Chair : Dr. Radhakrishnan Palanikumar, AM AM King Khalid University, Kingdom of Saudi Arabia. V. Jeyabalaraja, Velammal Engineering College, India. Paper Presentation II Chair : Dr. C. Jothi Venkateswaran AM PM Presidency College, India. Dr. Kamala Kannan, Linton University College, Malaysia PM PM Lunch PM PM Online Login Invited Talk : PM PM Dr. Satheesh Kumar J., Bharathiar University, Coimbatore, India Paper Presentation III Chair : Dr. Sanghyuk Lee, PM PM Xi an Jiaotong-Liverpool University, China. Dr. Sasikala, University of Madras, Chennai. Paper Presentation IV Chair : Dr. Gyoo-Soo Chea, PM PM Baekseok University in Korea Dr. Mahadevan Gandhigram Rural Institute, Gandhigram PM PM Panel Discussion PM PM Valedictory For further details Dr A Clementking, General Chair IIRVCSETA [email protected]

4 The following paper are accepted for the presentation Paper Presentation I AM AM Chair : Dr. Radhakrishnan Palanikumar, King Khalid University, Kingdom of Saudi Arabia. V. Jeyabalaraja, Velammal Engineering College, India. Felicitators : Mr. A Naveen, Researcher, University of Madras, Chennai 1 Advantage of Extended Kalman Filter Over Discrete Kalman Filter In Dynamic State Estimation of Power System Network Manojkumar Rampelli 4 Automated Security Testing of Android Applications on Cloud Computing S. Krishnaveni, Prabakaran S. Sivamohan V.Ajantha Devi 8 Portable Device Converting Braille and Text Document to Speech output using Raspberry Pi 15 A Comparative Study of Low Power Testing Techniques for Suhas B Shirol Digital Circuits Rajashekar B Shettar 17 File Based Object Replicas Approach for Relocation Services in P.SunilGavaskr Data Intensive Grid Environment A.Ramamohan Reddy 26 Smart Security For Data Sharing In Cloud Computing Ayinavalli Venkata Ramana, B.V.Chaitanya, K.Indrasena Reddy, M.Venu Babu,V.Kavitha 27 Finite State Automata as Analyzers of Certain Grammar Class Aiusha V Hujon Rules in the Khasi Language 47 Comparative Analysis of Real Time Analytics for Numerous Software Applications Srinivash R C Justin Samuel 34 Effective Monte-Carlo Tree Search Strategies for Gomoku AI Jun Hwan Kang, Hang Joon Kim 35 Design and Tuning of PID Controller for Fractional Order systems with Time Delay Prasant Kumar Maharana S. Sharanya P. Ramani Ranjan Senapati 21 Multi-Keyword Search Over Encrypted Cloud Using Blind Storage Ramyaa R Balika J Chelliah 22 XACML Policy Evaluation with Dynamic Context Handling Anupreethi K B Sarooraj R B 41 Security Concerns with Open Research Issues of Present Computer Network Geetanjali Rathee, Hemraj Saini 46 Social Network Analysis to Assist Hiring Process Shruthi Gopal, S.R.Mani Sekhar 56 Detection of Tumor and Thrombi in Echocardiography Images by using Adaptive Co-Segmentation and Sparse Classifier P. Sai Baba, G. Sai Siva Vignesh, K.Goutham, S.Latha, P.Muthu, Dhanalakshmi

5 Chair : Dr. C. Jothi Venkateswaran Presidency College, India. Paper Presentation II AM PM Dr. Kamala Kannan, Linton University College, Malaysia Felicitators: Mr. J Manimaran, Integrated Intelligent Research, Chennai. 37 Secure Binary Image Steganography Using F5 algorithm Based on Data Hiding and Diffusion techniques M.S. Antony Vigil Jitendra Singh, Sameer Singh Rathor 42 Vector Based Sensor Ranking in Internet of Things Neha, Sharad Saxena 43 Development of Assistive Technology Tools for Visually Challenged to their Better Life 44 An adaptive Approach for Dynamic Resource Allocation in Cloud Services 45 Double Encrypted Passwords by Pattern based CAPCHA for User authentication 3 Dimensionality Reduction Methods Classical and Recent Trends: A Survey A.Raghunath K.Radha rani N. Surya P.sindhu Harikrishnan Natarajan P. Ajitha I. Bala Venkateswarlu Shikha Agarwal, R. Rajesh, Prabhat Ranjan Ann Baby, A Kannammal 12 Exploratory Based PCA for Security Modelling of Tam in E- Learning 25 Efficiency for Cloud Storage based on Proof of Ownership A. Elvin, G.Atchudha, V.Nirmalrani 30 Detection of Brain Tumour by Image Fusion using SVM Classifier S.L.Jany Shabu Repala Santhoshi Lakshmi Shaik Afrin Taj 39 Survey on Energy Aware Scheduling Algorithms of DAG Applications for Multiprocessor System Raman Bhinder, Nirmal Kaur 57 Tuning Large Scale Deduplication With Reduced Effort Ashwini.R, Sridevi.S Through Effective Sampling Selection Strategy 58 Anonymous Publication of Sensitive Transactional Data With N. Nandhini Low Information Loss V. Bindu 59 Network Traffic Management using Omnet++ S. Kranthi, K. Pranathi Improving Energy Efficiency in MANETS by Multipath Routing Web-based Report Generation for Direct Course Outcome Assessment S. Kranthi, K. Pranathi Geetha.Guttikonda Sai Sandeep Anuroop Desu

6 Paper Presentation III PM PM Chair : Dr. Sanghyuk Lee, Xi an Jiaotong-Liverpool University, China. Dr. Sasikala, University of Madras, Chennai. Felicitators: Ms. D Thanuja, Integrated Intelligent Research, Chennai. 28 A Survey on Aadhaar Based E-Health System in India Sandeep Yelisetti, Vemuri Sindhura 5 A Biometric based approach for Three Dimension Bio Sensor Implanted in the Human Brain S.Subalakshmi, G.Murugaboopathi 10 Mad-Multisensory Application for Dyslexics Nirmala.B, Vidhya.M, Kalaiselvi.V.K.G 11 IoT Based Data Logger System Using XBEE-PRO Marmik R. Modi, Vidhi H. Kakadiya, Nischay D. Parekh 13 Intelligent Expert System Biometrics For Antiterrorism Subathra.P Shivaranjani.T 14 Authentication Based Intrusion Detection System for Clustered MANET Using POMDP, Multimodal Biometric and Weighted Clustering Algorithm P.Prabhusundhar, B.Srinivasan 16 Dynamic Continuous Query Processing Over Streaming Data Ananthi, Sreedhevi 18 Automation the Process of Unifying the Change in the Firewall Kirandeep kaur Performance 19 Applying Data Prediction and Query processing in P.Padma, Wireless Sensor Networks S.AnuMeenakshi, Varshaa Muralidharan 20 Privacy Preserving of Mobile Advertisement Request Guddy M Sabu R.J Poovaraghan 23 Secure Information in Social Network using Cryptographic Techniques V.S.Revathi, B.Swetha, G.Thirulochini Devi, T.Sheela 24 Efficient Ranking of web pages based on Synonyms Vemuri Sindhura 51 Multi Objective Fault Indicator Positioning Method in Distribution System Rajesh Kumar D. Ravichandran 52 Survey and identifying the best tool for data Protection using C H. Nanda Krishna Powerful Data Anonymization (ARX Tool) and Cleaning and K.Durgacharan Sanitizing Log (Cornell Tool)

7 Chair : Dr. Gyoo-Soo Chea, Baekseok University in Korea Paper Presentation IV PM PM Dr. Mahadevan Gandhigram Rural Institute, Gandhigram Felicitators : Mr. A Naveen, Researcher, University of Madras, Chennai 29 Visual Object Tracking by Linear Robust Regression Technique KonetiMathaPriya SiripireddyDeepthi J. Hemamalini 31 Study and Analysis of Automation Testing Techniques K.Sita Kumari Sneha Lakshmi Munagala 32 End to End Encryption by Algebraic OR/XOR Geetanjali Rathee Hemraj Saini 33 Automation Testing Using Selenium Web driver For a Lawyer Application Vemuri Sindhura Praturi Sai Ramya Madhavi Devi Neelesh Pandey D.Karthikeyan 36 Design And Analysis Of Modular Multilevel Inverter For Pv- Fed Applications 38 Password Security Using Blowfish Algorithm Madhavi Katamaneni, N.Paraveena 40 A Study On Building Underwater Ad-Hoc Networks And Chilakalapudi Meher Sensor Networks Babu, N. Praveena 48 Analysis of Intelligent Controller for Liquid level process S.Catherin, S.N. Deepa 49 Implementation Experiences of ISO/IEEE PHD Standard Aravind S. Nair using Antidote Library V. Natarajan 50 A Survey on Harnessing Big Data in the Cloud K.Durga charan CH.Nanda Krishna 53 Cross-LayerIDS for Grayhole Attack Prabhat Ranjan, in Wireless Mesh Networks Hemraj Saini 54 A Review and Comparative Study of methods used in finding S.Latha, P.Muthu, carotid artery abnormalities using ultrasound images S.Dhanalakshmi 55 Application Service Managers using Integrated Monitoring Prerana S. Mohod Software K. P. Wagh 62 Smart IOT Enabled - Web Interface Controlled Semi-Autonomous Mobile Robot P. N. Chatur P.Vince Rakesh G.Sajiv

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,

More information

Broadly conference covers major areas in big data analytics like Descriptive Analytics, Predictive Analytics and Prescriptive Analytics.

Broadly conference covers major areas in big data analytics like Descriptive Analytics, Predictive Analytics and Prescriptive Analytics. Introduction Today business performance is measured and analyzed by many innovative metrics and it is an inevitable affair for business houses engaged in the area of Tele-communications, Insurance, FMCG,

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah

Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Journal of mathematics and computer science 10 (2014), 189-198 Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Miran Hikmat Mohammed Baban Computer Dept.

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

ANALYTICS CENTER LEARNING PROGRAM

ANALYTICS CENTER LEARNING PROGRAM Overview of Curriculum ANALYTICS CENTER LEARNING PROGRAM The following courses are offered by Analytics Center as part of its learning program: Course Duration Prerequisites 1- Math and Theory 101 - Fundamentals

More information

BIG DATA IN HEALTHCARE THE NEXT FRONTIER

BIG DATA IN HEALTHCARE THE NEXT FRONTIER BIG DATA IN HEALTHCARE THE NEXT FRONTIER Divyaa Krishna Sonnad 1, Dr. Jharna Majumdar 2 2 Dean R&D, Prof. and Head, 1,2 Dept of CSE (PG), Nitte Meenakshi Institute of Technology Abstract: The world of

More information

Machine Learning. 01 - Introduction

Machine Learning. 01 - Introduction Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks K. Thiagarajan, Department of Mathematics, PSNA College of Engineering and Technology, Dindigul, India. A. Veeraiah,

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges

More information

Solar Powered Smart Irrigation System

Solar Powered Smart Irrigation System Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 341-346 Research India Publications http://www.ripublication.com/aeee.htm Solar Powered Smart Irrigation System

More information

Mobile Network Security Technology Research Center Kyungpook National University

Mobile Network Security Technology Research Center Kyungpook National University The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an

More information

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

A Novel Cryptographic Key Generation Method Using Image Features

A Novel Cryptographic Key Generation Method Using Image Features Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic

More information

Applied Mathematics and Mathematical Modeling

Applied Mathematics and Mathematical Modeling Applied Mathematics and Mathematical Modeling Joseph Malkevitch, York College (CUNY), Chair Ricardo Cortez, Tulane University Michael A. Jones, Mathematical Reviews Michael O Neill, Claremont McKenna College

More information

Doctor of Philosophy. Computer Science

Doctor of Philosophy. Computer Science Judiciary-friendly software piracy forensics with POSAR Thesis submitted to the Bharathiar University in partial fulfillment of the requirements for the award of the degree of Doctor of Philosophy in Computer

More information

PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements

PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, [email protected] URL:

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 [email protected] 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING

WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING S. Janani Devi 1, G. S. Sreetha Devi 2, G. M. Tamil Selvan 3 SPG Scholar Bannari Amman Institute of Technology, Alathukombai,

More information

Integrated Data Mining and Knowledge Discovery Techniques in ERP

Integrated Data Mining and Knowledge Discovery Techniques in ERP Integrated Data Mining and Knowledge Discovery Techniques in ERP I Gandhimathi Amirthalingam, II Rabia Shaheen, III Mohammad Kousar, IV Syeda Meraj Bilfaqih I,III,IV Dept. of Computer Science, King Khalid

More information

PhD in Computer Science at North Carolina A&T State University

PhD in Computer Science at North Carolina A&T State University PhD in Computer Science at North Carolina A&T State University December 5, 2013 Contents Admission...1 Program Requirements...2 Course Work...2 Advisory Committee...2 Residency and Other Requirements...2

More information

1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool

1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool Invited Speakers (Tentative) 1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool The worldwide market for DC technologies in buildings is estimated

More information

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE

More information

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture

Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture

More information

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing

Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing work for MS leading to PhD in Electrical Engineering 1 s for Digital Systems and Signal Processing EE 801 Analysis of Stochastic Systems EE 802 Advanced Digital Signal Processing EE 80 Advanced Digital

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION

INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION Volume 3, No. 12, December 2012 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Remote Patient Monitoring- An Implementation in ICU Ward

Remote Patient Monitoring- An Implementation in ICU Ward 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,

More information

BI Tools and Data Flow

BI Tools and Data Flow BI Tools and Data Flow http://web.peralta.edu/indev/peralta business intelligence bi tool Mike Orkin, Ph.D. Associate Vice Chancellor of Academic Affairs Peralta Community College District 1 Business Intelligence

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

List of Student Participated in National / International Level Workshop, Conference, Symposium 2013 2014

List of Student Participated in National / International Level Workshop, Conference, Symposium 2013 2014 List of Student Participated in National / International Level Workshop, Conference, Symposium 2013 2014 National Level 1. Dinakaran.S, on National Level workshop on WEKA Tool held at Kongu Arts and Science

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.

More information

Server Load Prediction

Server Load Prediction Server Load Prediction Suthee Chaidaroon ([email protected]) Joon Yeong Kim ([email protected]) Jonghan Seo ([email protected]) Abstract Estimating server load average is one of the methods that

More information

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile S.Saravanan Research Scholar, Department of CSE, Rajiv Gandhi college of

More information

A SURVEY ON MAPREDUCE IN CLOUD COMPUTING

A SURVEY ON MAPREDUCE IN CLOUD COMPUTING A SURVEY ON MAPREDUCE IN CLOUD COMPUTING Dr.M.Newlin Rajkumar 1, S.Balachandar 2, Dr.V.Venkatesakumar 3, T.Mahadevan 4 1 Asst. Prof, Dept. of CSE,Anna University Regional Centre, Coimbatore, [email protected]

More information

How To Understand And Understand The Science Of Engineering In India

How To Understand And Understand The Science Of Engineering In India RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 [email protected].

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Appl. Math. Inf. Sci. 7, No. 1L, 149-153 (2013) 149 Applied Mathematics & Information Sciences An International Journal Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing Chen

More information

Kalasalingam University

Kalasalingam University Kalasalingam University Anand Nagar, Krishnankoil-626 126 Research Supervisor List S. NO NAME DEPARTMENT 1 Dr.A.MANOHAR Sr. ASSO.PROF/ HOD i/c CHEMISTRY 2 Dr.P.THILLAI ARASU PROF. /CHEMISTRY 3 Dr.E.R.NAGARAJAN

More information

Inner Classification of Clusters for Online News

Inner Classification of Clusters for Online News Inner Classification of Clusters for Online News Harmandeep Kaur 1, Sheenam Malhotra 2 1 (Computer Science and Engineering Department, Shri Guru Granth Sahib World University Fatehgarh Sahib) 2 (Assistant

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Data Integrity by Aes Algorithm ISSN 2319-9725

Data Integrity by Aes Algorithm ISSN 2319-9725 Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

Embedded Systems Projects

Embedded Systems Projects Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Automated Health Alerts Using In-Home Sensor Data for Embedded Health Assessment 2. Model-Based mean Arterial pressure estimation using

More information

Tech Presentation 2016

Tech Presentation 2016 Tech Presentation 2016 Our Management Team Marvin Igelman CEO Alex Zivkovic CTO David Berman CFO Matt Burns PM and Growth BreakingSports is the world s first fully automated real-time alerts platform for

More information

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System 1.Data Mining Analysis on EB bill system 2.Graph Based Share Market Data Updations 3.Web Based Book Publishing System 4.Online product opinion and Ranking system 5. Online Dynamic Form creation for Non-IT

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

CLOUD FRAMEWORK & SECURITY OVERVIEW

CLOUD FRAMEWORK & SECURITY OVERVIEW CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users

More information

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Simplifying Big Data Analytics: Unifying Batch and Stream Processing John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Streaming Analy.cs S S S Scale- up Database Data And Compute Grid

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

From Big Data to Smart Data Thomas Hahn

From Big Data to Smart Data Thomas Hahn Siemens Future Forum @ HANNOVER MESSE 2014 From Big to Smart Hannover Messe 2014 The Evolution of Big Digital data ~ 1960 warehousing ~1986 ~1993 Big data analytics Mining ~2015 Stream processing Digital

More information

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing

More information

Patent Big Data Analysis by R Data Language for Technology Management

Patent Big Data Analysis by R Data Language for Technology Management , pp. 69-78 http://dx.doi.org/10.14257/ijseia.2016.10.1.08 Patent Big Data Analysis by R Data Language for Technology Management Sunghae Jun * Department of Statistics, Cheongju University, 360-764, Korea

More information

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step

More information

New Technology Capabilities

New Technology Capabilities New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales Canvas Lumber Compass Sextant 1851 America s Cup The oldest

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,

More information

ABV- Indian Institute of Information Technology & Management Gwalior (MP)

ABV- Indian Institute of Information Technology & Management Gwalior (MP) ABV- Indian Institute of Information Technology & Management Gwalior (MP) Following are the links to various online courses available (through MOOC etc.). This list is prepared by the Doctoral Students

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information