International Conference On CCODE-2018 FEBRUARY 7-8, Organised by DEPARTMENT OF COMPUTER SCIENCE SRI PADMAVATI MAHILA VISVAVIDYALAYAM
|
|
- Allyson Ramsey
- 5 years ago
- Views:
Transcription
1
2 International Conference On CCODE 2018 UNIVERSAL COMPUTING, COMMUNICATIONS AND DATA ENGINEERING CCODE-2018 FEBRUARY 7-8, 2018 Organised by DEPARTMENT OF COMPUTER SCIENCE SRI PADMAVATI MAHILA VISVAVIDYALAYAM (Women s University) TIRUPATI ANDHRA PRADESH, INDIA. Page i
3
4 PROGRAMME SCHEDULE Date , Wednesday Time Event Venue Saaveri Guest House, 8:30 AM-10 AM Registration SPMVV Saaveri Seminar Hall, 10:00 AM 11:30 AM Inauguration SPMVV 11:30 AM 11:45 AM Tea Break 11:45 AM 1:00 PM Keynote Address Saaveri Seminar Hall 1:00 PM 2:00 PM Lunch Session 1 Saaveri Conference Plenary Speech Hall Coffee Break e-class Room, Dept. of 2:00 PM 5:00 PM Session 2 & Computer Science Paper Presentations CC, Dept. of Computer Session 3 Science Room # 2 Block Chain Workshop 1 Dept. of Computer Technologies Science 11:30 PM 5PM Room # 5 Workshop 2 Cloud Computing Dept. of Computer Science Date , Thursday Saaveri Conference 9.30 AM 1.00 PM Session 4 Session 5 Session 6 Plenary Speech Coffee Break & Paper Presentations 1.00 PM 2.00 PM Lunch 2.00 PM 5.00 PM AM 5.00 PM Session 7 Session 8 Session 9 Workshop 3 Workshop 4 Plenary Speech Coffee Break & Paper Presentations IoT Big Data Hall e-class Room, Dept. of Computer Science CC, Dept. of Computer Science Saaveri Conference Hall e-class Room, Dept. of Computer Science CC, Dept. of Computer Science Room # 2 Dept. of Computer Science Room # 5 Dept. of Computer Science Page xviii
5 On the Key Enabling Technologies for Smart Homes and Cities and Samples of Our Related Works Distinguished Keynote Speaker: 07 th Feb, 10:00 am Professor Mohammad S. Obaidat IEEE Fellow and SCS Fellow Inductee of SCS Hall of Fame-Life Achievement Award Past President, Society for Modeling & Simulation International (SCS) Past Advisor to the President of Philadelphia University Founding Editor-in-Chief, Security and Privacy Journal, Wiley Editor-in-Chief, International Journal of Communication Systems, Wiley Editor-in-Chief, Journal of Convergence Editor, IEEE Wireless Communications Editor, IEEE Systems Journal Distinguished Speaker of IEEE Computer Society ( ) Distinguished Lecturer of ACM (1995-Present) Distinguished Lecturer of SCS (2006-Present) msobaidat@gmail.com;m.sobaidat@ieee.org Page xi
6 ABSTRACT Digital and smart homes and cities have become an important research and development area in the 21st century due mainly to their significance to national and international health, economy, safety, transportation, and security, among others.ict Systems have played a vital role in the emergence and development of smart cities and homes. The impressive advances in areas of information and wired and wireless communications technology have brought with them the prospect of embedding different hierarchies of smartness and intelligence in the modern home and cities. Offering comfort and safe and healthy living with an intelligent form of collaboration with their residents has been the prime goal of smart and digital homes and cities. Contingentupon the settings, the communications may be multifaceted such as mobile agent based and context-aware services or they may be uncomplicated such as controlling the room temperature or its humidity level. Sophisticated situations include the delivery of position/location-aware info content of the resident of the digital home as well as his/her activities. The availability of inexpensive low-power sensors, the RF IC chips, and the embedded microprocessors/microcontrollers have made tremendous impact on digital homes and cities; with large quantity of sensors, which jointly manage and make the inferences from the collected data on the state of the home and city as well as the actions and behavior of the inhabitants. As the worldwide life expectancy, especially in developed countries and newly industrialized counties is increasing, the percentage of senior/elderly citizens is increasing at an accelerated pace and most projections suggest that this increase worldwide will reach about 10 millions in the coming decade. Senior citizens usually live in care centers, hospitals or their own homes with some relative supervision/care. Smart homes and cities can be used efficiently and economically in order to accommodate the needs of this population. The increase of worldwide population, especially in populous countries and cities and the increase migration of citizens to cities have also brought with it challenges in transportation systems, health care, utility s supplies, learning & education, sensing city dynamics, computing with heterogeneous data sources, managing urban big data, and environmental protection including pollution and others. In this keynote, we will shed some light on the key enabling Information and Communications technology to smart cities and homes. We will also investigate the advances, current trends, challenges and future in the research and development in smart homes and cities. Page xii
7 Some of our recent research results, especially the ones related to the use of wireless networks and security for smart and digital homes will be presented. Among these, fire detection schemes in forests. An intelligent system for fire prediction based on wireless sensor networks is presented. This system obtains the probability of fire and fire behavior in a particular area. This information allows firefighters to obtain escape paths and determine strategies to fight the fire. A firefighter can access this information with a portable device on every node of the network. Also, we will introduce an adaptive MAC protocol for distributed wireless LANs that is capable of operating efficiently under bursty traffic conditions. According to the proposed protocol, the mobile station that is granted permission to transmit is selected by means of a neural-based algorithm. Another new protocol for dynamically setting wireless LAN waveforms and transmission power levels based on the wireless channel s signal to noise ratio will be introduced. Our method, known as Signal-to- Noise Ratio-Waveform Power Adaptation (SNR-WPA), changes the power in discrete steps matched to each of the data rate-waveform steps. By matching the power to the spreading symbol rate, our technique maximizes the network throughput while minimizing MAC layer contention. We present other new schemes to authenticate and authorize wireless nodes within a network. This new layer of security relies on a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. Other related wireless research efforts by our group will be presented. Bio of Distinguished Keynote Speaker Professor Mohammad S. Obaidat(Fellow of IEEE and Fellow of SCS) is an internationally well-known academic/researcher/ scientist. He received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is a Professor of CIS at Fordham University, USA. Among his previous positions are Chair of the CIS Department at Fordham University and Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University, Dean of the College of Engineering at Prince Sultan University and Advisor to the President of Philadelphia University for Research, Development and Information Technology. He has received extensive research funding and has published over fiftyfive (55)books, over fifty five (55) book chapters, and over Seven hundreds and fifty(750) refereed technical articles in scholarly international Page xiii
8 journals and proceedings of international conferences, and currently working on three more books. Professor Obaidat has served as a consultant for several corporations and organizations worldwide. Mohammad is the Founding Editor-in-Chief of the Wiley Security and Privacy Journal. He is also the Editor-in-Chief of the Wiley International Journal of Communication Systems, the FTRA Journal of Convergence and the KSIP Journal of Information Processing. He is also an Editor of IEEE Wireless Communications. Between , he served as a Technical Editor and an Area Editor of Simulation: Transactions of the Society for Modeling and Simulations (SCS) International, TSCS. He also served on the Editorial Advisory Board of Simulation. He is now an editor of the IEEE Wireless Communications, IEEE Systems Journal, SCS Simulation: Transactions of SCS, Elsevier Computer Communications, Springer Supercomputing Journal, among others. He also serves on the editorial board and advisory board of many international journals. Obaidat has served as the steering committee chair, advisory Committee Chair and program chair of numerous international conferences. He is the founder of two well-known international conferences: The International Conference on Computer, Information and Telecommunication Systems (CITS) and the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). He is also the cofounder of the International Conference on Data Communication Networking, DCNET, and SIMULTECH. Between , Obaidat has served as distinguished speaker/visitor of IEEE Computer Society. Since 1995 he has been serving as an ACM distinguished Lecturer. He is also an SCS distinguished Lecturer. Between , Dr. Obaidat served as an IEEE/ACM program evaluator of the Computing Sciences Accreditation Board/Commission, CSAB/CSAC. Obaidat is the founder and first Chairman of SCS Technical Chapter (Committee) on PECTS (Performance Evaluation of Computer and Telecommunication Systems). He has served as the Scientific Advisor for the World Bank/UN Digital Inclusion Workshop- The Role of Information and Communication Technology in Development. Between , he has served as a member of the board of directors of the Society for Computer Simulation International. Between , he has served as Vice President of Conferences of the Society for Modeling and Simulation International SCS. Between , Prof. Obaidat has served as Vice President of Membership of the Society for Modeling and Simulation International SCS. Between , he has served as the Senior Vice President ofscs. Between , he served as the President of SCS. Four of his recent papers have received the Page xiv
9 best paper awards from IEEE AICCSA 2009, IEEE GLOBCOM 2009, IEEE DCNET 2011, and IEEE CITS 2013 International Conferences. Prof. Obaidat has been awarded a Nokia Research Fellowship and the distinguished Fulbright Scholar Award. He received the SCS Outstanding Service Award for his excellent leadership, services and technical contributions. Dr. Obaidat received very recently the Society for Modeling and Simulation Intentional (SCS) prestigious McLeod Founder's Award in recognition of his outstanding technical and professional contributions to modeling and simulation. He received in Dec 2010, the IEEE ComSoc- GLOBECOM 2010 Outstanding Leadership Award for his outstanding leadership of Communication Software Services and Multimedia Applications Symposium, CSSMA He received the Society for Modeling and Simulation International s (SCS) prestigious Presidential Service Award for his outstanding unique, long-term technical contributions and services to the profession and society.he was inductedto SCS Modeling and Simulation Hall of Fame Lifetime Achievement Award for his technical contribution to modeling and simulation and for his outstandingvisionaryleadershipanddedicationto increasingtheeffectivenessandbroadening theapplications of modeling and simulation worldwide. He has been invited to lecture and give keynote speeches worldwide. His research interests are: cyber security, wireless communications and networks, telecommunications and Networking systems, security of network, information and computer systems, security of e-based systems, performance evaluation of computer systems, algorithms and networks, green ICT, high performance and parallel computing/computers, applied neural networks and pattern recognition, adaptive learning and speech processing. During the 2004/2005, he was on sabbatical leave as Fulbright Distinguished Professor and Advisor to the President of Philadelphia University in Jordan, Dr. Adnan Badran. The latter became the Prime Minister of Jordan in April 2005 and served earlier as Deputy Director General of UNESCO. Prof. Obaidat is a Fellow of the Society for Modeling and Simulation International SCS, and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE). For more info; see: Page xv
10 Dr. Ezendu Ariwa Bedfordshire University, UK Keynote Speaker 8 th Feb, 10:00 am Green Technology and Consumer Electronics applications in Corporate Social Responsibility (CSR) Professor Ezendu Ariwa is a Chartered Fellow of British Computer Society (BCS) and Chair of IEEE Consumer Electronics & Broadcast Technology Chapter, UK and Ireland. He is an Academic Supervisor at the University of Warwick, UK and held various academic and professional positions with many years of experience in the United Kingdom and Internationally. He has achieved good collaboration with multicultural SMEs in the United Kingdom, with respect to mentoring and working on joint professional development on ICT enterprise programmes. He has experience of doctoral research supervision and consultancy as well as doctoral external examiner for various Universities both in the UK and internationally on Information Risk Management and applicable computing in Smart Cities and Healthcare. He has a good research profile and the Founding Editor-in-Chief of the International Journal of Green Computing (IJGC), Editor-in-Chief of the International Journal of Computing and Digital Systems (IJCDS), Journal of E-Technology, and the Associate Editor of the International Journal of E-Politics and the Associate Editor of International Journal of Distributed Systems and Technologies (IJDST) Ezendu is author of a number of books and papers published in international journals and conference proceedings. He has also delivered keynote speeches at various international conferences. He recently published a book on Green Technology Applications for Enterprise and Academic Innovation, Publisher: IGI Global, USA Page xvi
11 Session-1 SESSION PLAN Title: Data Science and Applications Venue: Saaveri Seminar Hall SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 27 A Novel Approach on Document Mining using Dirichlet Process Mixture Models and its Kernels Ratnam Dodda 28 Comparison of Single and Multi-Criteria Collaborative Recommendation Systems V. Lakshmi Chetana and K. Vinaya Sri 32 A new NoSQL Framework for effective interpretation in Web Usage Mining Meenatchi Thirumurugan, Thangaraj M., Gnanambal S. and Gayathri V. 34 A Framework for Sentiment Analysis based Recommender System for Agriculture using Deep Learning Approach Pradeepthi Nimirthi, P. Venkata Krishna and Mohammad Obaidat 35 A Methodology for Processing Opinion Mining on GST in India from Social Media Data Using Recursive Neural Networks and Maximum Entropy Techniques N.V. Muthu Lakshmi and T. Lakshmi Praveena 44 Agriculture soil classification and fertilizer recommendation using Adaboost and Bagging approaches G. T. Prasanna Kumari, M. Vijaya Santhi and Jasmine Sabeena 59 Big Data Modeling for Geo-Spatial Data Sai Jyothi Bolla and S. Jyothi 64 Feature based Fuzzy Inference System Design for Squids Classification K. Himabindu, S. Jyothi and D.M. Mamatha Page xix
12 66 A Study on Evaluations of BigData Processing Sai Sandhya Rani and P. Venkata Krishna 75 Adaboost with Feature Selection to Bring the Paths for Somatic Mutations Evaluation in Cancer Chokka Anuradha and K. Sandhya Rani 89 Dimensionality Reduction with Feature selection using Nature inspired algorithms Vaishali R. and Sasikala R. 94 Analysis and Prediction of Crime Rate against Women in West Bengal by Clustering Kamalakannan J., Satadru Datta and Anurag Chakrabortty 95 Weather Analysis Using Statistical Methods Kamalakannan J. and Mira S. 233 Hadoop Technology for BigData Analytics K. Urmila and K. Sandhya Rani 237 Investigating Recommender Systems in OSNs Jana Shafi, AmtulWaheed and P. Venkata Krishna 248 Operational-Log Analysis for Big Data Systems: Challenges and Solutions M. Praneetha and G. Prasad Babu 265 Research Challenges in Big Data solutions in different Applications Bhawna Dhupia and M. Usha Rani 273 Web Data Interchange Using Automatic Semantic Extraction K. Manasa and M. Lavanya Page xx
13 Title: Big Data Analytics and its Applications Session-2 CCODE 2018 Venue: e-cr, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 30 Challenges with Hadoop Distributed Framework: An Overview Neelam Sobha Rani and N.V. Muthulakshmi 46 TBTAG+ A Topic-based Discussion Retrieval System for Twitter Content Gayathri V., Thangaraj M., Gnanambal S., Meenatchi Thirumurugan and Aruna Saraswathy P. 50 Optimal Algorithm for Inner & Outer Region Detection of Indian Pulse Seed Varieties for Feature Extraction and Classification Process Salome Hemachitra Hector and S. Suguna Sangaiah 53 A Survey on Contribution of Visual Analytics in Health Care Domain G. Sudha and S. Suguna 54 Optimal algorithms for Preprocessing of server side web logs using parallel computing and HBASE M.Vithya Gopalakrishnan and S. Suguna Thankaraj 73 Critical Analysis of Big Visual Analytics: A Survey Santhi Kuraganti and A. Rama Mohan Reddy 74 Web of Things and Big Data Analytics for Smart and Connected Communities Lokaiah Pullagura and Vinaya Babu 99 Scalable Pattern Mining using Hadoop T. Aditya Sai Srinivas, Manivannan S.S., Ramasubbareddy Somula, Bhuvaneshwari P. and Govinda K. 108 A Survey On Big-Data Analytics In The Health-Care Field Prof Rajasekhara Babu and Vivekananda Potti 109 Analytical Study Of Internet Routers Under Self-Similar Network Traffic With Voids D Mallikarjuna Reddy Doodipala, Thandu Vamshi Krishna and Basetty Mallikarjuna 210 Application of Evolutionary Algorithms in Bigdata to Optimize The Data B. Uma, R. Padmini and E. Ramesh Babu 234 Graph Analysis and Visualization of Social Network Big Data N. Mithili Devi and K. Sandhya Rani Page xxi
14 Title: Advanced Networking, Protocols, Standards & Applications Session-3 Venue: CC, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 6 Feasibility Investigation on Cognitive Radio Network Systems: Hearsay Algorithm Adem. Sai Suneel and S. Shiyamala 16 Gossip Based Congestion Aware Routing Algorithm For Vehicular Adhoc Networks Eruvaram Bhanusri 17 Agent Based Hybrid Routing Protocol for Vehicular Ad Hoc Networks P.S. Nithyadharshini1, SanthiyaKumari and M. Pounambal 36 A Novel Approach For Transmission Expansion Planning For 133 Bus Tamilnadu Test System Using BFOA Prakash Samana and Joseph Henry 52 Performance Analysis of Energy Efficient Multicast Routing Protocols in MANET Radhika G. and Papanna N. 62 A Survey on Smart Transportation based on VANET: A Cyber Physical Systems approach Bommineni Kavitha and P.Venkata Krishna 70 A Comparisons of Reservation Based And Non-Reservation Based Routing in Dynamic Source Routing Environment Basetty Mallikarjuna and A. Nagaraju Yadav 78 Dynamic and Random Distribution Method for Route Construction in Vehicular Ad hoc Networks Abhilash M. and A. Rama Mohan Reddy 82 Relative Velocity based Mobility Aware Clustering Algorithm for Wireless Mesh Networks Mallikarjuna Rao Yamarthy, Makam Venkata Subramanyam and Kodati Satya Prasad Page xxii
15 83 QoS Enhanced Hierarchical Mobility Management in Wireless Mesh Networks Mallikarjuna Rao Yamarthy, Makam Venkata Subramanyam and Kodati Satya Prasad 97 High Speed Wireless Internet Using Li-Fi Kamalakannan J., Chinmay Agarwal and Medhavini Kulshrestha 103 Efficient Node Selection Mechanism in Wireless Sensor Networks using Fast Track Random Walk Model Vijaya Bhaskar K., Seshadri R. and A. Rama Mohana Reddy 228 Fusion of multiple techniques and filters for fast and efficient De-noising of Images with Mixed Noise P. Prathusha and S. Jyothi 230 Network Routing Protocols Analysis for Internet of Things & Adhoc Wireless Networks K. Jhansi Lakshmi Rani and N. Geethanjali 235 A Review on Bandwidth Utilization for Bursty Traffic in ATM Networks T. Anuradha and A. Renuka Devi 239 Power Control Approaches in Femtocell Networks Brahmi Ibtissem, Mohamamd S. Obaidat,, Mhiri Fadoua and Faozi Zarai 250 MAC Protocols in Wireless Sensor Networks Garikapati Prasad Babu and Palamakula Ramesh Babu 268 Power Management For Multi-Channel Mac Protocol In Adhoc Wireless Networks K. Jhansi Lakshmi Rani and N. Geethanjali 301 An Energy Efficient Approach for Distributed Channel Allocation with Reservation in Next Generation Cellular Networks Digavinti Sreenivasulu and P. Venkata Krishna 112 Sigfree : Providing Negligible Throughput Degradation To Normal Client Requests In Network Services Gitanjali J, B.Sharmil & Nareshkumar K Page xxiii
16 Session-4 Title: Security and Privacy Issues and Challenges CCODE 2018 Venue: Saaveri Seminar Hall SPMVV, Tirupati. Date & Time: , 9:30 AM 12:30 PM 37 Cryptanalysis of Secure Hash Password Technique (CSHPT) in Linux Harshavardhan Metla, Vinay Reddy Mallidi, Sai Kiran Chintalapudi and Madhu Viswanatham V. 56 Authenticated Users Reviews Based on Genuine Ratings for Apps Tejasree Samakoti 61 Security Analysis of Verifyable and Recoverable Encryption of A New Variant of RSA Signstures Anitha Cuddapah and Padmavathamma M. 65 Honey Maze Encryption (HOME) Usha Rani N., Noor Ahmad Shaik, Hari Kumar Reddy C. and Jaya Lakshmi P. 79 Extending Network Security by Multi Model Encryption Standards for Dynamic Networks using Fuzzy Logic Technique Shanmugam S., Vetrivel K. and Sasikumar Gurumurthy 91 Securing Internet of Things (IoT) Health Care Data using Blockchain Technology Divyanshu Bhati and M. Rajasekhara Babu 96 Security Verification in Web Browser Extensions Kamalakannan J. and Chinmay Agarwal 227 Efficient Pairing Free Certificateless Authentication Scheme with Batch Verification for VANETS N.B. Gayathri, P. Vasudeva Reddy and T. Gowri Page xxiv
17 232 Image Transformation Based Hybrid Graphical Password Authentication System P. Baby Maruthi and K. Sandhya Rani 240 Iris and Fingerprint Based Authentication Protocol for Impersonate Attacks in the Smart Health care C. Naga Swaroopa 242 Digital Evidences In Forensics Using Cryptography T. Anuradha and S. Saravana 249 Security in Wireless Body Area Network and Open Research Issues: A Review G. Prasanna, R.J. Ramasree and K. Ramesh Reddy 260 Test Packet Generation based on Firewall Policies K. Vijaya Bhaskar, R. Sheshadri and A. Rama Mohan Reddy 264 Possible attacks on SOHO Systems B.J. Annie Neeraja and Padmaja M. 275 The study of Block Chain Technology in Bit Coin E.N. Rambabu Page xxv
18 Title: Cloud Computing, Architectures and Applications Session-5 Venue: e-cr, Dept. of Computer Science SPMVV, Tirupati. Date &Time: , 9:30 AM 12:30 PM 11 Shortest Job First and Priority Based Hybrid Algorithm for Cloud Govinda K., Ramasubba Reddy Somula, Rajkumar R., Sreenivasulu Vajjala and Adithya Sai Srinivas S. 13 Fault Tolerant Framework for Web Applications using CloudFront Govinda K., Ramasubba Reddy Somula, Rajkumar R., Sreenivasulu Vajjala and Ramya S. 45 Intensified Task Scheduling Algorithm For Balancing Load In Cloud Computing Environment Barani R. and Suguna S. 63 Securing cloud data using laplace transform based encryption P. Namratha, Shoba Bindu Chigarapalle and Sri Lakshmi 67 Designing an Efficient auto Scaling Technique for Minimizing Response Time on Amazon AWS Cloud Load Balancing Kaushik Sekaran and Arvindhan M. 72 Mobile Healthcare Management System Utilizing Cloud Computing and Android Operating System Basetty Mallikarjuna and D. Arun Kumar Reddy 77 Heterogeneous Data Storage Management with Deduplication Aware in Cloud Computing Tulasi K. and Susmitha Karanam 84 Shortest Job First and Priority Based Hybrid Algorithm for Cloud Ramasubbareddy Somula and Swetha E. Page xxvi
19 86 Task Scheduling Using PSO and GA in Cloud Computing Ramasubbareddy Somula, Govinda K., Aditya Sai Srinivas Thuluva, Sasikala R. and Manivannan S.S. 98 A Study on Performance Analysis of Various Load Balancing Algorithms for Cloud Environment P.S. Latha Kalyampudi and P. Venkata Krishna 104 Performance Analysis of Cloud Computing Center With Queuing Model Anand Gnana Selvam S., Rita D. and Reni Sagayaraj M. 212 A New Bio-Inspired Optimization Algorithm for Dynamic Resource Allocation in Cloud Computing P. Neelima and A. Rama Mohan Reddy 214 Ensuring QOS Through Cloud Federation Gunakala Rekha 238 Classifying Content Quality and Interaction Quality on Online Social Networks Jana Shafi, Amtul Waheed and P. Venkata Krishna 266 An efficient approach for virtual machine placement in cloud computing environment Prasad Devarasetty and Ch. Satyananda Reddy 271 Identification of major security issues and suggested measures in Cloud Computing Y. Kiran Kumar and R. Mahammad Shafi 114 Trust Based Framework For Efficient Communication In Mobile Cloud Computing D. Shobha Rani and Pounambal M Page xxvii
20 Session-6 Title: Health and Bio Informatics Venue: CC, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 9:30 AM 12:30 PM 22 Rank Level Fusion Based on Multiple Iris Biometric Instances Sireesha Vedururu and K.Sandhya Rani 33 Role of Imaging Modality in Premature Detection of Bosom Irregularity Kavitha Modepalli and P. Venkata Krishna 39 An effective framework for Breast Cancer diagnosis using Weka knowledge flow environment Gnanambal S., Thangaraj M., Meenatchi Thirumurugan and Gayathri V. 43 Cellular and Molecular Signalling Mechanisms in Neuronal Injury and Neurodegeneration Maralla Swaroopa and Depuru Bharathi 47 Alzheimer s disease Diagnosis using Fuzzy Logic Approach R.M. Mallika, K. Usha Rani and K. Hemalatha 49 Identifying Protein Coding Regions using Computational Methods Subhashini U., Bhargavi P. and Jyothi S. 58 A Comprehensive Study on Software Engineering B. Manaswini and A. Rama Mohan Reddy 60 Insilico Anti-Inflammatory Activity of Dibutylphthalate Derived From Marine Streptomyces Carpaticus Uma Maheswari Devi Palempalli, Lavanya Latha Yerraguravagari and Vasavi Thirumalanadhuni 93 Enhancing the performance of Decision Tree using NSUM technique for Diabetes patients Nithya Settu and M. Rajasekhara Babu 202 Cellular And Molecular Signaling Mechanisms In Neuronal Injury And Neurodegeneration Swaroopa Maralla and D. Bharathi 205 Search for Novel β- Lactamase Inhibitors using Bioinformatics Tools Lakshmi Jayasri Akkiraju and V.V. Lakshmi Page xxviii
21 206 Structure-Based Virtual Screening For Drug Discovery: Tools and Applications V.V. Lakshmi 207 Diversity Analysis of Beta-Lactamase among Uropathogenic Enterobacteriaceae Y.V.S. Annapurna and V.V. Lakshmi 208 Investigating Molecular Relationships Among Clinically Prevalent Aminoglycoside Phosphotransferases K.Madhavi and V.V. Lakshmi 216 Image Processing Techniques for Anteversion Angle Detection (Avad) in Total Hip Replacement Surgery T. Sandhya and M. Usha Rani 219 Impact of e- health technology in India BurraVijitha 231 Big Data Analytics for Healthcare System S. Sandhya kumari and K. Sandhya Rani 262 Role of ICT on the conservation strategies for rain water harvesting B. Hemavathi, A. Shobha Rani and D. Bharathi 272 Recommender System to Classify Antenatal Records of Pregnant Women M. Lavanya and K. Manasa 304 Conserving Rare and Endangered medicinal plants through Net Working Data Base P. Lakshmi Padmavathi, A. Suvarna Latha, K.S. Shanhi Sree and D. Bharathi 309 Metric Based Quality Assessment Technique For Software Requirement Specification M.R Raja Ramesh, Dr. Ch.Satyananda Reddy Page xxix
22 Title: Systems, Architecture, Protocols and Models Session-7 Venue: Saaveri Seminar Hall SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 209 A Model for Prognosticating Effect of Defects During Software Estimation Using Rayleigh Function P. Srivyshnavi, B. Sony and A. Supriya 215 Enhancement of Security in cloud Maas and JUJU using Foxiproxy Naresh, M. Muni Babu and P. Venkata Krishna 218 CLOAK: A Flow Cipher Based Encryption Protocol for Mobile Cloud Computing K. Lavanya 223 Binary Particle Swarm Optimization for Solving NP Hardness in Software Architecture Sushama and A. Rama Mohan Reddy 224 A Survey on SDN Orchestration and NFV in Cloud Networking N. Chandana Priya and M. Usha Rani 226 Data Analytics on Chronic Kidney Disease Data N. Padmaja and T.Sudha 229 Cloud Storage Auditing by Utilizing Provable Data Possession Method P.Vijaya Kumari and V. Kavitha 247 Student Chat Box Android App for College Related Activity R. Yamuna and M. Usha Rani 255 A Review on Soil Data Analytics using Apache Spark Padmavathi Vanka and T. Sudha 257 Pervasive and Mobile Computing Characteristics and Challenges V. Sireesha and M. Usha Rani Page xxx
23 Session-8 CCODE 2018 Title: Machine Learning and Classification Methods Venue: e-cr, Dept. of Computer Science SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 15 Multiple Kernel Probabilistic Clustering with Crow Lion Neural Network for Missing Data Imputation and Classification Rajalingam Rajani and T. Sudha 51 a architectural approach for image mining using k means and c- means algorithm Saritha Dasari1, Dr.A.Rama Mohan Reddy, Dr.B.Eswara Reddy3 69 Fusion of multiple techniques and filters for fast and efficient Denoising of Images with Mixed Noise Prathusha Reddy and Jyothi S. 71 Enhancement of Railway and Metro Rail Reservation System Basetty Mallikarjuna and A. Nagaraju Yadav 87 Predicting Ozone Layer Concentration Using Machine Learning Techniques Rekha G., Ramasubbareddy Somula, Govinda K., Ellaji Ch and Jaya Sri P. 201 Comparative Study of different Statistical Distributions in generating Noise Components for Privacy Preserving Data Clustering T. Sudha and P. Nagendra Kumar 203 Heart Disease Prediction Using Multi-Constrain Support Vector Machine G. Krishna Veni and T. Sudha 217 Performance Analysis of Metric Multi Dimensional Scaling with Respect to Different Goodness-of-Fit Criteria in the Context Of Dimensionality Reduction T. Sudha and P. Nagendra Kumar 221 Deep Web Indexing and Ranking Search with Learning-Based Application Framework using Mobiles S. Suneetha and M. Usha Rani 225 Rack-based Privacy Preserving Algorithm uses cryptographic scheme for Workload Balancing In Hadoop MapReduce N. Padmaja and T.Sudha 236 Multidocument Textsummarization Using Deeplearning Algorithm With Fuzzylogic S. Sudha Lakshmi and M. Usha Rani Page xxxi
24 243 Ground Water Quality Data Analysis Using Classification Techniques S.V.S. Ganga Devi 244 Mining Association rules in Distributed Data mining K. Srilakshmi, M. Praneetha and D. Mukesh 245 Feature Based Summarization System for E-Commerce Based Products by Using Customers Reviews Penubaka Balaji, D. Haritha and O. Nagaraju 246 Efficient Tool for Diabetes Tracking through Layered Classification (Bigrams) Approach V. Vasudha Rani and K. Sandhya Rani 252 Falling the risk of consumerrelocation by using bigdata clustering algorithm P. Nirupama and E. Madhusudhana Reddy 253 Agriculture soil classification and fertilizer recommendation using Adaboost and Bagging approaches G.T. Prasanna kumari, M. Vijayasanthi and Jasmine Sabeena 254 Population Classification of Dietary Data Using Machine Learning Techniques and Big Data Jangam J. S. Mani and K. Sandhya Rani 256 An Extensive Survey on Various Deep Learning Applications Jabeen Sultana, M. Usha Rani and Mohammed Farquad 259 Decision Tree with Genetic algorithm for Health care a Data Mining approach C.S. Udaya and G. Bala Krishna Priya 261 Anomaly Detection Techniques G. Sandhya Madhuri and M. Usha Rani 263 TPS Classification in Data Mining A Review K. Sreelatha 267 A Multi-objective Pareto Optimization Algorithm For Feature Selection In Medical Datasets B. Sarojini and R. Bhuvaneshwari 302 Improving the Efficacy of Automotive Service With Recovery Analytics Kushanoor Akbar, K.K. Baseer and Kalaga Anil 311 Imine Index A General And Compact Structure Providing Tight Integration Of Item Set Extraction Gitanjali J, Kayal, Ponnarasi and J Indumathi Page xxxii
25 Session-9 Title: IoT and Applications Venue: CC, Dept. of Computer Science, SPMVV, Tirupati. Date & Time: , 2 PM 5 PM 19 Internet of Things (IoT) & Big Data Analytics for Smart Cities-A Case Study Telugu Giribabu and Swathi Pothala 23 A Credibility Management for Assisted Health Care Using Context Aware Monitoring Sai Deva Dattu Kakumanu, Gitanjali J. and Sathiyamoorthy E. 25 Development of a Wireless Temperature Monitoring System Using Smartphone Harini Roddam and Rama Murthy B. 31 IoT (Internet of Things) & Big data Solutions for Farmers and Agriculture Industry to boost yields and reduce waste in farming Telugu Giribabu and G. Anjanbabu 40 IoT: A Study on Retailer s- Internet of Things Utilizing Today Vijaya Santhi and Jaya Chandra 41 IoT: A Survey on E-Pool Smart System for Swimming Pool Using Wireless Monitoring System Vijaya Santhi and Jaya Chandra 42 IOT: An Overview on Internet of Restorative Things Vijaya Santhi and Jaya Chandra 57 The Role Of Big Data Analytics, Cloud and Fog Computing In Internet Of Things Basetty Mallikarjuna, Chakradhar Pabba and Sridhar Reddy Gogu 85 IoT Based Waste Management for Smart City Usha Rani 92 Sensitivity enhancement of Micro Mass Optical MEMS Sensor for Bio- Medical IoT devices I. Mala Serene, M. Rajasekhara Babu and Zachariah C. Alex 100 Survey on Multilevel Association Rule Mining Nandhaluru Swathi and V. Saritha 101 A Novel Framework for Healthcare Monitoring System through Cyber Physical System Monisha K. and M. Rajasekhara Babu Page xxxiii
26 102 A Review on Crypto-Currency Transactions Using Iota (Technology) Kundan Dasgupta and M. Rajasekhara Babu 110 Iot Model To Improve Cognitive Skills Of Students Learning Experience Using Neuro Sensors Abhishek Padhi, M Rajasekhara Babu, Bhasker Jha and Shrutisha Joshi 111 Anomaly Based Technique For Detection And Prevention Of Black Hole Attacks In Rpl Based Networks Mr. Vikram Neerugatti and Prof. A. Rama Mohan Reddy 204 A Smart Cognitive Agricultural Robot T. Manjula and T. Sudha 211 Localized Mobile Agent Framework for data processing on Internet of Things J. Mahalakshmi and P. Venkata Krishna 213 Feedback based data forwarding approach for smart communication in IoT based Cloud D. Arun kumar Reddy and P. Venkata Krishna 220 Literature Survey on Real World Applications using IoT Dr. K. Sailaja and Ms. M. Rohitha 258 A Novel Implementation for Patient Monitoring in Rural Areas using IOT Technology M. Usha Rani and P. Divyaja 269 A Novel Approach for Road Symbol Detection using Sensors K. Suneetha, M. Sreekanth, K. Sankara and E. Hari 270 An Intelligent Traffic Signal Control System for Ambulance using IoT K. Suneetha, M. Sreekanth and E. Hari 274 A Survey on Secure Data Management and Transmission over IoT Devices E. Hari and H. Parveen Sultana 303 Analysis and Detection of Deforestation Using Novel Remote-Sensing Technologies with Satellite Images J. Suresh Babu and Prof. T. Sudha 310 A Malicious Node Detection Algorithm For 6lowpan Based Networks A Sreekanth Reddy, K.Venkatagurunatha Naidu, Pradeep G and K. Syama Sundar 113 Group And Hierarchical Key Management For Secure Communications In Iot Environments Aravind Karrothu and Jasmine Norman 115 A Study On Analyzing Massive Data In Iot Enabled Infrastructures Through Machine Learning Methods N.SAI Lohitha and Pounambal M Page xxxiv
27
Keynote Speakers CyberC 2010
Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationAI: A UAE Perspective. Nawaf I. Almoosa Deputy Director - EBTIC March 7 th 2018
AI: A UAE Perspective Nawaf I. Almoosa Deputy Director - EBTIC March 7 th 2018 2 EBTIC Overview 3 Our Model Research & Innovation Structure Partners and Target Sectors Sustainability Smart Air- Conditioning
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree
Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3
More informationIntelligent Operations Utilizing IT to Accelerate Social Innovation
324 Hitachi Review Vol. 63 (2014), No. 6 Featured Articles Operations Utilizing IT to Accelerate Social Innovation Toshiyuki Moritsu, Ph.D. Keiko Fukumoto Junji Noguchi, Ph.D. Takeshi Ishizaki Katsuya
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationEmbedded Systems Projects
Embedded Systems Projects I. Embedded based ANDROID Mobile Systems 1. Health Assessment Monitoring using Embedded sensor data for Mobile Apps (IEEE 2. Precise pressure indication using simultaneous Electro
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationAceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)
Intranet Mailing System Intrusion Detection System M-banking Mobi-Thesaurus Mobile Video Archive Mobile i Broker Android Projects Mobiminder: Location Based Reminder on Mobiles Mobi Travel Guide Friend
More informationCONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING
MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationThe 2018 (14th) International Conference on Data Science (ICDATA)
CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationCollaborative Next Generation Networking
CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing
More informationClassification and Optimization using RF and Genetic Algorithm
International Journal of Management, IT & Engineering Vol. 8 Issue 4, April 2018, ISSN: 2249-0558 Impact Factor: 7.119 Journal Homepage: Double-Blind Peer Reviewed Refereed Open Access International Journal
More informationROUTING PROJECT LIST
ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital
More informationVoid main Technologies
SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure
More informationEMBEDDED MAJOR PROJECTS LIST
CODE PROJECT TITLE APPLICATION TECHNOLOGY /CORE KTEMB 01 KTEMB 02 KTEMB 03 A Location Aided Flooding Mechanism In Community Based Iot Networks An Iot Based Fire Alarming And Authentication System For Workhouse
More informationM.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008
M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008 Conference Details To be Held in Hyderabad, located in South-Central India, about 800KM North of Bangalore Hyderabad is about
More informationResume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram
Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,
More informationIT POLICY AND PROJECTS THAILAND
IT POLICY AND PROJECTS THAILAND Mr. Kitti Sriboonyagorn Acting Director Digital Technology Infrastructure Bureau Ministry of Digital Economy and Society Thailand 4.0 is a model aims to eliminate the middle
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationIJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby
Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address
More informationIEEE Project Titles
www.chennaisunday.com PH:9566137117 IEEE Project Titles -2018 S.No Project Title Year CLOUD COMPUTING 1 A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationDEPARTMENT OF COMPUTER SCIENCE
Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,
More informationIEEE Access Special Section Editorial. Yan, Zheng.
https://helda.helsinki.fi IEEE Access Special Section Editorial Yan, Zheng 2018 Yan, Z, Wang, H, Yang, L T & Niemi, V 2018, ' IEEE Access Special Section Editorial : Trust Management in Pervasive Social
More informationMany of these have already been announced via JIT weekly updates on the KB-L listserv, but are gathered here for a more complete look.
WorldCat Knowledge Base Monthly Update March 2017 Many of these have already been announced via JIT weekly updates on the KB-L listserv, but are gathered here for a more complete look. New Collections
More informationInnovative M-Tech projects list
1 Technologies: Innovative M-Tech projects list 1. ARM-7 TDMI - LPC-2148 2. Image Processing 3. MATLAB Embedded 4. GPRS Mobile internet 5. Touch screen. IEEE 2012-13 papers 6. Global Positioning System
More informationInformation and Communication Technologies (ICT) thematic area
Information and Communication Technologies (ICT) thematic area Network & Service Infrastructures 1.1 The Network of the Future (Call 4, Call 5) 2009-2010 a) Future Internet Architectures and Network Technologies
More informationACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology
ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session
More informationSaint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.
Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor
More informationADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 ADAPTIVE HANDLING OF 3V S OF BIG DATA TO IMPROVE EFFICIENCY USING HETEROGENEOUS CLUSTERS Radhakrishnan R 1, Karthik
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationEMBEDDED SYSTEMS 2017 IEEE PROJECT
EMBEDDED SYSTEMS 2017 IEEE PROJECT 1. Smartphone Application to evaluate the individual possibilities for the Application of Electric Vehicles 2. Face recognition System for Smartphone based on LBP 3.
More informationIntroducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN
Avaya-FatPipe Solution Overview Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN The Avaya SDN-Fx and FatPipe Networks solution provides a fabric-based SDN architecture for simplicity
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationEradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data
Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationA STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES
A STUDY OF SOME DATA MINING CLASSIFICATION TECHNIQUES Narsaiah Putta Assistant professor Department of CSE, VASAVI College of Engineering, Hyderabad, Telangana, India Abstract Abstract An Classification
More informationBMS COLLEGE OF ENGINEERING (Autonomous Institute, Affiliated under VTU)
BMS COLLEGE OF ENGINEERING (Autonomous Institute, Affiliated under VTU) TEQIP-II SPONSORED One Week Workshop Jointly organized by Department of Computer Science & Engineering and Information Science &
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationBroadband for Digital Transformation
Broadband for Digital Transformation ITU Regional Workshop on Organizational and Technical Aspects of Broadband access Development Odessa-Ukraine, 27-28 September 2017 Turhan Muluk Government and Policy
More informationAll Rights Reserved 2017 IJARCET
END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,
More informationTech Wings. News letter of the CSE Department, CIET. From the HOD s Desk VOLUME 4, ISSUE 1,JULY 2016-DECMBER. Inside Issue:
Tech Wings VOLUME 4, ISSUE 1,JULY 2016-DECMBER 2016 2016 News letter of the CSE Department, CIET From the HOD s Desk Inside Issue: PEO s PO S Faculty Achievements Student Achievements Department Events
More informationData Processing at Scale (CSE 511)
Data Processing at Scale (CSE 511) Note: Below outline is subject to modifications and updates. About this Course Database systems are used to provide convenient access to disk-resident data through efficient
More informationSemi-Structured Data Management (CSE 511)
Semi-Structured Data Management (CSE 511) Note: Below outline is subject to modifications and updates. About this Course Database systems are used to provide convenient access to disk-resident data through
More informationTechnologies for Solutions for Society. September, 2014 NEC Corporation
Technologies for Solutions for Society September, 2014 NEC Corporation NEC s Focus: Solutions for Society Providing infrastructures for an abundant society for all people via ICT Social Value Innovations
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationGEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE
GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE George Anders is a president of Anders Consulting. Between 1975 and 2012 he has been employed by Ontario Hydro and its successor companies in Toronto, Canada.
More informationJEAS-Accredited Environmental Assessor Qualification Scheme
JEAS-Accredited Environmental Assessor Qualification Scheme Osamu Kajitani, President Japan Association of Environment Assessment (JEAS) Abstract The Japan Association of Environment Assessment (JEAS)
More informationKeywords Hadoop, Map Reduce, K-Means, Data Analysis, Storage, Clusters.
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationAccelerating Innovation and Collaboration for the Next Stage
Accelerating Innovation and Collaboration for the Next Stage November 8, 2013 Smart Life & Smart Work in the Next Stage - ICT as an Enabler Transportation Intelligent Transportation Systems, Quick Charging
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationFall 2017 ECEN Special Topics in Data Mining and Analysis
Fall 2017 ECEN 689-600 Special Topics in Data Mining and Analysis Nick Duffield Department of Electrical & Computer Engineering Teas A&M University Organization Organization Instructor: Nick Duffield,
More informationSecurity & Trust in Smart Cities. A Min Tjoa Vienna University of Technology & SBA Research
Security & Trust in Smart Cities A Min Tjoa Vienna University of Technology & SBA Research Overview General Intro Smart City / Digital Trust Activities Quest for Specific Smart City Activities Quest for
More informationHow UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations
How UAE is Driving Smart Sustainable Cities: key Achievements and Future Considerations By Dr. Saeed Al Dhaheri @DDSaeed Chairman, We are the leading Smart Solutions Integrator. With our far sight and
More informationSENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK Mohammad Alwadi 1 and Girija Chetty 2 1 Department of Information Sciences and Engineering, The University of Canberra, Canberra, Australia
More information5G Journey: Path Forward
5G Journey: Path Forward Vida Ilderem, PhD Vice President, Intel Labs Director, Wireless Communication Research Acknowledgement: Schooler, Foerster, Srikanteswara, Himayat, Talwar WE ARE HERE: 5G Reactive,
More informationNetworking Cyber-physical Applications in a Data-centric World
Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday
More informationGreen ICT Technologies for Smart Cities
Green ICT Technologies for Smart Cities Pr. Mohamed Cheriet, P.Eng, Ph.D Canada Research Chair on Sustainsble Smart Eco-Cloud École de technologie supérieure, Montréal, Québec Laboratory for Multimedia
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
2015-2016 DOT NET IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE 2015 DOT NET Project Titles Domain Lang/Year 1 JPD1501 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
More informationMohamed Mahmoud Mahmoud Azab. Education: Ongoing research:
Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,
More informationCharting the Progress of Smart City Development in Shanghai
Charting the Progress of Smart City Development in Shanghai Xueguo Wen Executive Vice President of Shanghai Academy 2017 TM Forum 1 C ONTENTS Current situation Experience and outlook Strategic cooperation
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationD DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi
Journal of Energy and Power Engineering 10 (2016) 405-410 doi: 10.17265/1934-8975/2016.07.004 D DAVID PUBLISHING Shirin Abbasi Computer Department, Islamic Azad University-Tehran Center Branch, Tehran
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY
More informationSmart infrastructure for a smart sustainable city
CSIC Emerging Connections Workshop, Cambridge, 23 June 2017 Smart infrastructure for a smart sustainable city Dr Navil Shetty Fellow and Technical Chair for Asset Management Atkins Context Smart Infrastructure
More informationITU Kaleidoscope 2013 Building Sustainable Communities. Achieving Sustainable Communities with ICT: lessons from the Great East Japan Earthquake
ITU Kaleidoscope 2013 Building Sustainable Communities Achieving Sustainable Communities with ICT: lessons from the Great East Japan Earthquake Hideyoshi TOMINAGA Professor emerritus of GITI Waseda University
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationA System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things
- 2018 Embedded Systems IEEE FINAL YEAR Projects @ JP infotech S.NO Project Code IEEE SYSTEM Project Titles Domain Year 1 JPE1701 A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things
More informationA Review on Privacy Preserving Data Mining Approaches
A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana
More informationNEC Enterprise Overview
NEC Enterprise Overview Huw Wilkins - NEC Enterprise Business Development NEC Enterprise Solutions EMEA March 2018 Agenda NEC Enterprise Portfolio Overview NEC Networking NEC VDI NEC High Availability
More informationCOURSE OUTCOMES AND PROGRAM OUTCOMES
COURSE OUTCOMES AND PROGRAM OUTCOMES 3.1. Establish the correlation between the courses and the Program Outcomes (POs) and Program Specific Outcomes (PSOs) List of PSO s List of Program Outcomes PSO1 PSO2
More informationMachine Learning in WAN Research
Machine Learning in WAN Research Mariam Kiran mkiran@es.net Energy Sciences Network (ESnet) Lawrence Berkeley National Lab Oct 2017 Presented at Internet2 TechEx 2017 Outline ML in general ML in network
More informationRoute Optimization in MANET using FIGA
Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationHigh-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment
Circuits and Systems, 2016, 7, 3246-3252 Published Online August 2016 in SciRes. http://www.scirp.org/journal/cs http://dx.doi.org/10.4236/cs.2016.710276 High-Performance Multipath Routing Algorithm Using
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationCSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce
CSE 701: LARGE-SCALE GRAPH MINING A. Erdem Sariyuce WHO AM I? My name is Erdem Office: 323 Davis Hall Office hours: Wednesday 2-4 pm Research on graph (network) mining & management Practical algorithms
More informationProposed Cooperative ICT Projects. Mie Mie Thet Thwin. Rector University of Computer Studies, Yangon, Myanmar
Proposed Cooperative ICT Projects Mie Mie Thet Thwin Rector University of Computer Studies, Yangon, Myanmar Contents Cyber Security Projects Big Data Analytic Projects Research & Education Network Other
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationContents PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1
Preface xiii PART I: CLOUD, BIG DATA, AND COGNITIVE COMPUTING 1 1 Princi ples of Cloud Computing Systems 3 1.1 Elastic Cloud Systems for Scalable Computing 3 1.1.1 Enabling Technologies for Cloud Computing
More informationSecurity Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B
More informationHybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto
Hybrid Communication CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Contents Project Overview Hybrid Communication Concepts Services Enabled by Hybrid Communication
More informationTOOLS FOR INTEGRATING BIG DATA IN CLOUD COMPUTING: A STATE OF ART SURVEY
Journal of Analysis and Computation (JAC) (An International Peer Reviewed Journal), www.ijaconline.com, ISSN 0973-2861 International Conference on Emerging Trends in IOT & Machine Learning, 2018 TOOLS
More informationBuilding a Europe of Knowledge. Towards the Seventh Framework Programme
Building a Europe of Knowledge Towards the Seventh Framework Programme 2007-2013 FP7 /1 EUROPEAN COMMISSION - Research DG - November 2005 EU research: the story so far 1952: ECSC treaty; first projects
More informationSMART. Investing in urban innovation
SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.
More informationIMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER
IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER N. Suresh Kumar, Dr. M. Thangamani 1 Assistant Professor, Sri Ramakrishna Engineering College, Coimbatore, India 2 Assistant
More information