IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE



Similar documents
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

Broadly conference covers major areas in big data analytics like Descriptive Analytics, Predictive Analytics and Prescriptive Analytics.

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

IEEE JAVA TITLES

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah

IEEE JAVA Project 2012

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

ANALYTICS CENTER LEARNING PROGRAM

BIG DATA IN HEALTHCARE THE NEXT FRONTIER

Machine Learning Introduction

Doctor of Philosophy in Computer Science

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks

An Overview of Knowledge Discovery Database and Data mining Techniques

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Internet of Things (IoT): A vision, architectural elements, and future directions

Solar Powered Smart Irrigation System

Mobile Network Security Technology Research Center Kyungpook National University

Master of Science in Computer Science

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

A Novel Cryptographic Key Generation Method Using Image Features

Applied Mathematics and Mathematical Modeling

Doctor of Philosophy. Computer Science

PROGRAM DIRECTOR: Arthur O Connor Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements

Sanjeev Kumar. contribute

Cryptographic Data Security over Cloud

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING

Integrated Data Mining and Knowledge Discovery Techniques in ERP

PhD in Computer Science at North Carolina A&T State University

1. Low Voltage DC powered ICT Systems for Schools and Offices. By Dr. Matt Stewart, University of Liverpool

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

Dynamic Query Updation for User Authentication in cloud Environment

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

ATTPS Publication: Trustworthy ICT Taxonomy

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

Computer/IT Project LIST. Contact:

Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

INTRUSION DETECTION SYSTEM FOR WEB APPLICATIONS WITH ATTACK CLASSIFICATION

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

Remote Patient Monitoring- An Implementation in ICU Ward

BI Tools and Data Flow

A Review of Data Mining Techniques

List of Student Participated in National / International Level Workshop, Conference, Symposium

M.S. Computer Science Program

International Journal of Advanced Computer Technology (IJACT) ISSN: PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

Server Load Prediction

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile

A SURVEY ON MAPREDUCE IN CLOUD COMPUTING

How To Understand And Understand The Science Of Engineering In India

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

MEng, BSc Computer Science with Artificial Intelligence

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

Kalasalingam University

Inner Classification of Clusters for Online News

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

Security Analysis of Cloud Computing: A Survey

Data Integrity by Aes Algorithm ISSN

ANALYTICS IN BIG DATA ERA

Enabling the SmartGrid through Cloud Computing

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

Security Policy JUNE 1, SalesNOW. Security Policy v v

Introduction to Computer Networking: Trends and Issues

Embedded Systems Projects

Tech Presentation 2016

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

CLOUD FRAMEWORK & SECURITY OVERVIEW

Multimodal Biometric Recognition Security System

SURVEY PAPER ON SECURITY IN CLOUD COMPUTING

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

From Big Data to Smart Data Thomas Hahn

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Patent Big Data Analysis by R Data Language for Technology Management

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

New Technology Capabilities

How To Get A Computer Science Degree

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales

SIGNATURE VERIFICATION

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

ABV- Indian Institute of Information Technology & Management Gwalior (MP)

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

Transcription:

IIR Virtual Conference on Science, Engineering and Technology Applications IIRVCSETA 2016 PROGRAM SCHEDULE Organizer By Integrated Intelligent Research (IIR), India

General Chair Committees Dr. A.Clementking, King Khalid University, Kingdom of Saudi Arabia. Advisory Committee Xin-She Yang, Middlesex University London, London, United Kingdom. K.P. Thooyamani, Pro Vice Chancellor, Bharath University, India. Rev. Francis P Xavier SJ, Director, Loyola-ICAM College Eng. & Tech., India. Keun Ho RYU, Chungbuk National University, Korea. Sanghyuk LEE, Dept. of Elec. and Elec. Eng., Xi an Jiaotong-Liverpool University, China. Jothi Venkateswaran C, PG and Research Dept. of Com. Sci., Presidency College, India. Radhakrishanan P, King Khalid University, Kingdom of Saudi Arabia. Ranganathan K.N, Founder, Friends of USA, India. Thirumurugan Shanmugam, Dept. of Info. Tech., College of Applied Sciences, Oman. Karthikeyan Subramanian, Dept of Inf. Tech., College of Applied Sciences, Oman. Organizing Committee Victor Devadoss A., Dept of Maths, Loyola College, Chennai, India. Joby Joseph SDB, Vice Principal, St. Anthony's College, Shillong, India. Praveen R., AVIT, Chennai, India. Jon Arockiaraj J., Dept of Math., St. Joseph's College of Arts & Science, Cuddalore, India. Srinivasan R., JBIMS, University of Mumbai, Mumbai. Ravi K., PG and Research Department of Mathematics, Sacred Heart College, Tirupattur. Naveen A., Scholar, D.G.Vaishnav College, Affiliated to University of Madras, India. Publication Committee Satheesh Kumar J., Bharathiar University, Coimbatore, India. Natarajan Gajendran, President, Indian Society for Education and Environment (ISEE), India. Rani S., Dept of Computer Science, King Khalid University, Kingdom of Saudi Arabia. Managerial Committee Manimaran J, Integrated Intelligent Research, Chennai. Thanuja D, Integrated Intelligent Research, Chennai.

PROGRAM SCHEDULE 14-04-2016, Thursday Time Event 9.30 AM - 10.00 AM Online Login 10.00 AM-10.15 AM Welcome Address & Dynamics of the Conferences Invited Talk : Research Paradigms 10.15 AM- 10.45 AM (Dr. Harish C Chandramoorthy. Vice Chairman, Center for Stem, Cell Research, College of Medicine, King Khalid University, KSA) Paper Presentation I Chair : Dr. Radhakrishnan Palanikumar, 10.45 AM- 11.45 AM King Khalid University, Kingdom of Saudi Arabia. V. Jeyabalaraja, Velammal Engineering College, India. Paper Presentation II Chair : Dr. C. Jothi Venkateswaran 11.45 AM- 12.45 PM Presidency College, India. Dr. Kamala Kannan, Linton University College, Malaysia 12.45 PM- 01.45 PM Lunch 01.45 PM- 02.00 PM Online Login Invited Talk : 02.00 PM- 02.45 PM Dr. Satheesh Kumar J., Bharathiar University, Coimbatore, India Paper Presentation III Chair : Dr. Sanghyuk Lee, 02.45 PM- 03.30 PM Xi an Jiaotong-Liverpool University, China. Dr. Sasikala, University of Madras, Chennai. Paper Presentation IV Chair : Dr. Gyoo-Soo Chea, 03.30 PM- 04.15 PM Baekseok University in Korea Dr. Mahadevan Gandhigram Rural Institute, Gandhigram 04.15 PM- 04.45 PM Panel Discussion 04.45 PM- 05.00 PM Valedictory For further details Dr A Clementking, General Chair IIRVCSETA 2016 E-Mail: clementkingiir@gmail.com

The following paper are accepted for the presentation Paper Presentation I 10.45 AM- 11.45 AM Chair : Dr. Radhakrishnan Palanikumar, King Khalid University, Kingdom of Saudi Arabia. V. Jeyabalaraja, Velammal Engineering College, India. Felicitators : Mr. A Naveen, Researcher, University of Madras, Chennai 1 Advantage of Extended Kalman Filter Over Discrete Kalman Filter In Dynamic State Estimation of Power System Network Manojkumar Rampelli 4 Automated Security Testing of Android Applications on Cloud Computing S. Krishnaveni, Prabakaran S. Sivamohan V.Ajantha Devi 8 Portable Device Converting Braille and Text Document to Speech output using Raspberry Pi 15 A Comparative Study of Low Power Testing Techniques for Suhas B Shirol Digital Circuits Rajashekar B Shettar 17 File Based Object Replicas Approach for Relocation Services in P.SunilGavaskr Data Intensive Grid Environment A.Ramamohan Reddy 26 Smart Security For Data Sharing In Cloud Computing Ayinavalli Venkata Ramana, B.V.Chaitanya, K.Indrasena Reddy, M.Venu Babu,V.Kavitha 27 Finite State Automata as Analyzers of Certain Grammar Class Aiusha V Hujon Rules in the Khasi Language 47 Comparative Analysis of Real Time Analytics for Numerous Software Applications Srinivash R C Justin Samuel 34 Effective Monte-Carlo Tree Search Strategies for Gomoku AI Jun Hwan Kang, Hang Joon Kim 35 Design and Tuning of PID Controller for Fractional Order systems with Time Delay Prasant Kumar Maharana S. Sharanya P. Ramani Ranjan Senapati 21 Multi-Keyword Search Over Encrypted Cloud Using Blind Storage Ramyaa R Balika J Chelliah 22 XACML Policy Evaluation with Dynamic Context Handling Anupreethi K B Sarooraj R B 41 Security Concerns with Open Research Issues of Present Computer Network Geetanjali Rathee, Hemraj Saini 46 Social Network Analysis to Assist Hiring Process Shruthi Gopal, S.R.Mani Sekhar 56 Detection of Tumor and Thrombi in Echocardiography Images by using Adaptive Co-Segmentation and Sparse Classifier P. Sai Baba, G. Sai Siva Vignesh, K.Goutham, S.Latha, P.Muthu, Dhanalakshmi

Chair : Dr. C. Jothi Venkateswaran Presidency College, India. Paper Presentation II 11.45 AM- 12.45 PM Dr. Kamala Kannan, Linton University College, Malaysia Felicitators: Mr. J Manimaran, Integrated Intelligent Research, Chennai. 37 Secure Binary Image Steganography Using F5 algorithm Based on Data Hiding and Diffusion techniques M.S. Antony Vigil Jitendra Singh, Sameer Singh Rathor 42 Vector Based Sensor Ranking in Internet of Things Neha, Sharad Saxena 43 Development of Assistive Technology Tools for Visually Challenged to their Better Life 44 An adaptive Approach for Dynamic Resource Allocation in Cloud Services 45 Double Encrypted Passwords by Pattern based CAPCHA for User authentication 3 Dimensionality Reduction Methods Classical and Recent Trends: A Survey A.Raghunath K.Radha rani N. Surya P.sindhu Harikrishnan Natarajan P. Ajitha I. Bala Venkateswarlu Shikha Agarwal, R. Rajesh, Prabhat Ranjan Ann Baby, A Kannammal 12 Exploratory Based PCA for Security Modelling of Tam in E- Learning 25 Efficiency for Cloud Storage based on Proof of Ownership A. Elvin, G.Atchudha, V.Nirmalrani 30 Detection of Brain Tumour by Image Fusion using SVM Classifier S.L.Jany Shabu Repala Santhoshi Lakshmi Shaik Afrin Taj 39 Survey on Energy Aware Scheduling Algorithms of DAG Applications for Multiprocessor System Raman Bhinder, Nirmal Kaur 57 Tuning Large Scale Deduplication With Reduced Effort Ashwini.R, Sridevi.S Through Effective Sampling Selection Strategy 58 Anonymous Publication of Sensitive Transactional Data With N. Nandhini Low Information Loss V. Bindu 59 Network Traffic Management using Omnet++ S. Kranthi, K. Pranathi 60 61 Improving Energy Efficiency in MANETS by Multipath Routing Web-based Report Generation for Direct Course Outcome Assessment S. Kranthi, K. Pranathi Geetha.Guttikonda Sai Sandeep Anuroop Desu

Paper Presentation III 02.45 PM- 03.30 PM Chair : Dr. Sanghyuk Lee, Xi an Jiaotong-Liverpool University, China. Dr. Sasikala, University of Madras, Chennai. Felicitators: Ms. D Thanuja, Integrated Intelligent Research, Chennai. 28 A Survey on Aadhaar Based E-Health System in India Sandeep Yelisetti, Vemuri Sindhura 5 A Biometric based approach for Three Dimension Bio Sensor Implanted in the Human Brain S.Subalakshmi, G.Murugaboopathi 10 Mad-Multisensory Application for Dyslexics Nirmala.B, Vidhya.M, Kalaiselvi.V.K.G 11 IoT Based Data Logger System Using XBEE-PRO Marmik R. Modi, Vidhi H. Kakadiya, Nischay D. Parekh 13 Intelligent Expert System Biometrics For Antiterrorism Subathra.P Shivaranjani.T 14 Authentication Based Intrusion Detection System for Clustered MANET Using POMDP, Multimodal Biometric and Weighted Clustering Algorithm P.Prabhusundhar, B.Srinivasan 16 Dynamic Continuous Query Processing Over Streaming Data Ananthi, Sreedhevi 18 Automation the Process of Unifying the Change in the Firewall Kirandeep kaur Performance 19 Applying Data Prediction and Query processing in P.Padma, Wireless Sensor Networks S.AnuMeenakshi, Varshaa Muralidharan 20 Privacy Preserving of Mobile Advertisement Request Guddy M Sabu R.J Poovaraghan 23 Secure Information in Social Network using Cryptographic Techniques V.S.Revathi, B.Swetha, G.Thirulochini Devi, T.Sheela 24 Efficient Ranking of web pages based on Synonyms Vemuri Sindhura 51 Multi Objective Fault Indicator Positioning Method in Distribution System Rajesh Kumar D. Ravichandran 52 Survey and identifying the best tool for data Protection using C H. Nanda Krishna Powerful Data Anonymization (ARX Tool) and Cleaning and K.Durgacharan Sanitizing Log (Cornell Tool)

Chair : Dr. Gyoo-Soo Chea, Baekseok University in Korea Paper Presentation IV 03.30 PM- 04.15 PM Dr. Mahadevan Gandhigram Rural Institute, Gandhigram Felicitators : Mr. A Naveen, Researcher, University of Madras, Chennai 29 Visual Object Tracking by Linear Robust Regression Technique KonetiMathaPriya SiripireddyDeepthi J. Hemamalini 31 Study and Analysis of Automation Testing Techniques K.Sita Kumari Sneha Lakshmi Munagala 32 End to End Encryption by Algebraic OR/XOR Geetanjali Rathee Hemraj Saini 33 Automation Testing Using Selenium Web driver For a Lawyer Application Vemuri Sindhura Praturi Sai Ramya Madhavi Devi Neelesh Pandey D.Karthikeyan 36 Design And Analysis Of Modular Multilevel Inverter For Pv- Fed Applications 38 Password Security Using Blowfish Algorithm Madhavi Katamaneni, N.Paraveena 40 A Study On Building Underwater Ad-Hoc Networks And Chilakalapudi Meher Sensor Networks Babu, N. Praveena 48 Analysis of Intelligent Controller for Liquid level process S.Catherin, S.N. Deepa 49 Implementation Experiences of ISO/IEEE 11073 PHD Standard Aravind S. Nair using Antidote Library V. Natarajan 50 A Survey on Harnessing Big Data in the Cloud K.Durga charan CH.Nanda Krishna 53 Cross-LayerIDS for Grayhole Attack Prabhat Ranjan, in Wireless Mesh Networks Hemraj Saini 54 A Review and Comparative Study of methods used in finding S.Latha, P.Muthu, carotid artery abnormalities using ultrasound images S.Dhanalakshmi 55 Application Service Managers using Integrated Monitoring Prerana S. Mohod Software K. P. Wagh 62 Smart IOT Enabled - Web Interface Controlled Semi-Autonomous Mobile Robot P. N. Chatur P.Vince Rakesh G.Sajiv