INAUGURAL SESSION CUM AWARDS CEREMONY

Size: px
Start display at page:

Download "INAUGURAL SESSION CUM AWARDS CEREMONY"

Transcription

1 WORLD CONFERENCE ON WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WS4 2017) IN CONCURRENT WITH WORLD EMINENCE AWARDS FOR SYSTEMS, SECURITY AND SUSTAINABILITY Time INAUGURAL SESSION CUM AWARDS CEREMONY Day One Details 09:00 AM 10:00 AM Registration with Tea/Coffee and Cookies Inauguration cum Awards Ceremony Begins 10:00 AM 10:02 AM ( Welcoming of Guests ) 10:02 AM 10:07 AM 10:07 AM 10:10 AM 10:10 AM 10:15 AM 10:15 AM 10:20 AM 10:20 AM 10:35 AM WELCOME ADDRESS By: Dr. Malaya Nayak, Organising Chair, WS ABOUT THE WS CONFERENCE AND AWARDS By: Mr. Amit Joshi, Organising Secretary, WS CSI THEME AND KNOWLEDGE ADDRESS By: Dr. Durgesh Kumar Mishra, Chairman, Division IV, CSI INDUSTRY ADDRESS By: Mr. Bharat Patel, Industry Chair, WS ADDRESS BY INAUGURAL SPEAKER AND GUEST Mr. Amarjit Dhillon, GROUP CIO, Turning Point, London, UK 10:35 AM 10:50 AM ADDRESS BY CHIEF GUEST 10: 50 AM 10:55 AM AWARDS AND FELECIATION CEREMONY FOR EMINENCE AWARDS :55 AM 11:00 AM 11:15 AM 11:45 AM 11:45 AM 12:15 PM 12:15 PM 12:45 PM 15 February 2017, America Square, London, UK VOTE OF APPRECIATION By: Dr. Nilanjan Dey, Session Coordinator, WS Conference and Awards Group Photograph Snacks Break ( 11:00 AM 11:15 AM ) Keynote Address Begins KEYNOTE ADDRESS 1 By - Prof. João Manuel R. S. Tavares Faculdade de Engenharia da Universidade do Porto, Portugal KEYNOTE ADDRESS 2 By - Prof. Wim JC Melis University of Greenwich, London, United Kingdom KEYNOTE ADDRESS 3 By: Mr. Aninda Bose Sr. Publishing Editor, Springer India KEYNOTE ADDRESS 4 12:45 PM 01:15 PM By: Prof. Xin-She Yang Middlesex University, London, United Kingdom Presentation of Token of Remembrance to Keynote Speakers/Guests

2 NETWORKING LUNCH ( 01:15 PM 01:45PM ) WS Technical Paper Presentation Schedule 15 February 2017, America Square, London, UK Day One Time Details Each Presenter will get 6 minutes for presentation and 2 minutes for Q-A Authors: Spyridon Papastergiou, Nineta Polemi MITIGATE: A dynamic Supply Chain Cyber Risk Assessment Methodology Authors: Madiop Diouf, Idy Diop, Ibra Dioum Enhanced MIMO Systems performances by concatenating small Polar Coding to Spatial Time Block Codes Authors: Muazzam A. Khan, Nazar A. Saqib, Umair Shafiq Khan Target Tracking in Wireless Sensor Networks using NS2 01:45 PM 03:15 PM Authors: Muftah Fraifer, Helen Hasenfuss, Mikael Fernström Taking away the Green Screen- A Brief Discussion of a Multidisciplinary approach To IoT via, Smart Parking and Interaction Design Authors: Eleni-Maria Kalogeraki, Nineta Polemi, Spyridon Papastergiou, Themis Panayiotopoulos Modeling SCADA Attacks Authors: Ganesh Singadkar, Shubham Talbar, Parang Sanghavi, Bhavin Jankharia, Sanjay Talbar Automatic Lung Field Segmentation Based on Non Negative Matrix Factorization and Fuzzy Clustering Authors: Pallavi Thacker, H. P. Mathur Competitive Advantage through Social Media: A Study of Indian Authors: Jayshree Pansare, Maya Ingle A Real-time Devnagari Sign Language Recognizer (α-dslr) for Devnagari Script Authors: Sagar Tambe, Suhas Gajre Novel Strategy for Congestion Control and Power Consumption Speed with Mobile Node in Wireless Sensor Networks Authors: Eva Tuba, Milan Tuba, Marko Beko Two stage wireless sensor node localization using firefly algorithm Authors: Varin Chouvatut Detection of Brain Tumor from MR Image Sequence Using Image Segmentation and Blob s Centroid Authors: Reena Gupta, Manju Mandot Visual Image Enhancement of High Security Registration Number Plate Recognition System (HSRNP) with Region Calculation

3 Authors: Ezekiel Uzor Okike, Ofaletse Mphale A Project Metric Framework for Assessing ICT Project Success/Failure Authors: Chintan Sidpara, Darshana Patel, Kunal Khimani, Darshan Upadhyay, Avani Vasant Analysing Distribution of Copyrighted Files by Tracking BitTorrent Network Authors: Nhu Gia Nguyen, K. Jagatheesan, Amira S. Ashour, B. Anand, Nilanjan Dey Ant colony optimization based load frequency control of multi-area interconnected thermal power system with governor dead-band nonlinearity Authors: Kuldeep Raghuwanshi A Qualitative Review of two Evolutionary Algorithms Inspired by Heuristic population Based Search methods: GA & PSO Authors: Chinu Singla, Sakshi Kaushal, Gurjot Kaur, Jasleen Kaur, Nitish Mahajan, Shubhani Aggarwal An Intelligent Hardware Calibration Scheme for Real Time VoIP Applications Authors: Aparna Bhale, Manish Joshi Automatic Sub classication of benign breast tumor Authors: Jyoti Prabha, Sabita Shaivani, Dinesh Goyal, Amit Sanghi Prevention of Conjunct Black Hole MANET on DSR Protocol by Cryptanalytic Method Authors: Amit Sanghi, Sunita Chaudhary, Meenu Dave Enhance the Data Security in Cloud Computing by Text steganography 03:15 PM 04:45 PM Authors: Abhishek Bhattacharya, Radha Tamal Goswami A Hybrid Community based Rough Set Feature Selection Technique in Android Malware Detection Authors: Nidhi Malik, Aditi Sharan, Jaya Srivastava Natural Language Interface for ontology in agriculture domain Authors: Mamta Dadhich, Vijay Singh Rathore ASMAN Framework: A Framework for Comparison and Selection of SaaS Services Authors: Rohit Kamal Chatterjee, Avijit Kar Estimation of Heterogeneity to Improve Robust Anisotropic Diffusion Authors: Chia-Hung Yeh, Kahlil Muchtar, Chih-Yang Lin 3D-based Unattended Object Detection Method for Video Surveillance Authors: Sheng-Lung Peng The Disjunctive Total Domination Problem on Some Subclasses of Chordal Graphs

4 Authors: Sankhadeep Chatterjee, Nilanjan Dey, Amira S. Ashour, Cornelia Victoria Anghel Drugarin Electrical Energy Output prediction using Cuckoo Search supported Artificial Neural Network Authors: Sankhadeep Chatterjee, Rhitaban Nag, Nilanjan Dey, Amira Ashour Efficient Economic Profit Maximization: Genetic Algorithm based Approach Authors: Sreeram Murthy Kattamuri, Vijayalakshmi Kakulapati, Nagaraju Muthyala Configuration of IDS Tool On Linux OS Using Low Cost Low Power Computer Authors: Varad Vishwarupe, Mangesh Bedekar, Milind Pande, Anil Hiwale Intelligent Twitter Spam Detection: A Hybrid Approach Authors: Kamlesh Ahuja, Durgesh Kumar Mishra Data Elimination Based Technique for Mining Frequent Closed Item Set Authors: S.S. Sarangdevot, Manish Shrimali, Sanjay Tejasvee A Reformed Cohesive Tactic Towards Electronic Commerce, Business and Commerce NET Closing Remarks and Certificate Distribution (04:45 PM - 05:00 PM) 05:00 PM Onwards Tea/Coffee with Networking

5

Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM),

Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM), Series of GISFI s Five Years Anniversary First Series Event PROGRAMME Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM), March 10-12, 2014 Organizing

More information

Alpha College of Engineering & Technology

Alpha College of Engineering & Technology Alpha College of Engineering & Technology Collaboration With SHARMA COMPUTER ACADEMY Organized 2 days Workshop on I-phone Application Development Expert Speaker Mr. Ankit Desai (Head, Sharma Computer Academy)

More information

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

Smart Manufacturing and Standards: The NIST Role

Smart Manufacturing and Standards: The NIST Role Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS

USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS International Journal of Computer Science & Information Technology (IJCSIT) Vol 9 No 5 October 2017 USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS Jane

More information

INDIA SUSTAINABILITY LEADERSHIP SUMMIT 2017

INDIA SUSTAINABILITY LEADERSHIP SUMMIT 2017 INDIA SUSTAINABILITY LEADERSHIP SUMMIT 2017 Frost & Sullivan and The Energy and Resources Institute (TERI) Initiative 26TH MAY, 2017 ITC MARATHA, MUMBAI OVERVIEW: The India Sustainability Leadership Summit

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

NORTH ATLANTIC TREATY ORGANISATION

NORTH ATLANTIC TREATY ORGANISATION NORTH ATLANTIC TREATY ORGANISATION NATO MARITIME INTERDICTION OPERATIONAL TRAINING CENTRE NMIOTC SOUDA BAY 73200 CHANIA HELLAS NMIOTC 1 st CYBER SECURITY CONFERENCE AGENDA AND TIMELINE TIME TOPIC SPEAKER

More information

IEEE PES INTELLIGENT SYSTEMS SUBCOMMITTEE MEETING. Minutes. IEEE PES GM Vancouver, Canada

IEEE PES INTELLIGENT SYSTEMS SUBCOMMITTEE MEETING. Minutes. IEEE PES GM Vancouver, Canada IEEE PES INTELLIGENT SYSTEMS SUBCOMMITTEE MEETING Minutes IEEE PES GM Vancouver, Canada Date and Time: Tusday, 23 rd July 2013, 11am to 1pm Venue: Vancouver Convention Centre, East, Room No.4 Chair: Alexandre

More information

safely connecting to future smart hospital & healthcare

safely connecting to future smart hospital & healthcare Organizer Funding Organization Sponsors CYBER SECURITY ON MEDICAL AND HEALTHCARE SYSTEM safely connecting to future smart hospital & healthcare SYMPOSIUM CUM WORKSHOP Workshop: 30 November 2017 Symposium:

More information

Session Schedule(Computer & IT) SESSION - I

Session Schedule(Computer & IT) SESSION - I SESSI - I DATE: 10/3/2017 TIME: 12.15 P.M. to 1.45 P.M. LOCATI:C-229 SR NO. PAPER ID TITLE AUTHOR 1 17NC333 Clustering for Keyword Extraction in Document Conversation Shivangi. B. Chothani, Prof. Chintan

More information

FEATURE EXTRACTION TECHNIQUES USING SUPPORT VECTOR MACHINES IN DISEASE PREDICTION

FEATURE EXTRACTION TECHNIQUES USING SUPPORT VECTOR MACHINES IN DISEASE PREDICTION FEATURE EXTRACTION TECHNIQUES USING SUPPORT VECTOR MACHINES IN DISEASE PREDICTION Sandeep Kaur 1, Dr. Sheetal Kalra 2 1,2 Computer Science Department, Guru Nanak Dev University RC, Jalandhar(India) ABSTRACT

More information

Technologies with the potential to enhance resilience - An overview on the activities of ENISA

Technologies with the potential to enhance resilience - An overview on the activities of ENISA Technologies with the potential to enhance resilience - An overview on the activities of ENISA Demosthenes.Ikonomou@enisa.europa.eu 5 th International Conference on Critical Information Infrastructures

More information

Route Optimization in MANET using FIGA

Route Optimization in MANET using FIGA Route Optimization in MANET using FIGA Vishal Gupta Electronics and Communication Department P.I.E.T College Smalkha (Panipat), INDIA Abstract: In MANET route optimization is the basic requirement to improve

More information

DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS

DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS K. Devarajan and V. Padmathilagam Department of Electrical Engineering FEAT, Annamalai University, Annamalai

More information

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Ripandeep Kaur 1, Manpreet Kaur 2 1, 2 Punjab Technical University, Chandigarh Engineering College, Landran, Punjab, India Abstract:

More information

A Brief Report. University, Ahmedabad Faculty of Technology, Nirma University, Ahmedabad. Nagar M/s Eigen Tech Pvt Ltd., New

A Brief Report. University, Ahmedabad Faculty of Technology, Nirma University, Ahmedabad. Nagar M/s Eigen Tech Pvt Ltd., New BVM Engineering College, Computer Engineering Department 4th January, 017 One Week STTP on Wireless Sensor Networks and Applications 19th - 4th December, 016 A Brief Report About Experts and their Topics:

More information

Automatic Modelling Image Represented Objects Using a Statistic Based Approach

Automatic Modelling Image Represented Objects Using a Statistic Based Approach Automatic Modelling Image Represented Objects Using a Statistic Based Approach Maria João M. Vasconcelos 1, João Manuel R. S. Tavares 1,2 1 FEUP Faculdade de Engenharia da Universidade do Porto 2 LOME

More information

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme 2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat

More information

A Survey of Parallel Social Spider Optimization Algorithm based on Swarm Intelligence for High Dimensional Datasets

A Survey of Parallel Social Spider Optimization Algorithm based on Swarm Intelligence for High Dimensional Datasets International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 9 (2017), pp. 2259-2265 Research India Publications http://www.ripublication.com A Survey of Parallel Social

More information

August 18-19, 2018 (Saturday-Sunday)

August 18-19, 2018 (Saturday-Sunday) August 18-19, 2018 (Saturday-Sunday) ORGANIZED BY: HUMAN RESOURCE DEVELOPMENT CENTER & SCHOOL OF COMPUTER & SCIENCE ENGINEERING LOVELY PROFESSIONAL UNIVERSITY PHAGWARA, PUNJAB. BACK DROP AND RATIONALE

More information

Various Strategies of Load Balancing Techniques and Challenges in Distributed Systems

Various Strategies of Load Balancing Techniques and Challenges in Distributed Systems Various Strategies of Load Balancing Techniques and Challenges in Distributed Systems Abhijit A. Rajguru Research Scholar at WIT, Solapur Maharashtra (INDIA) Dr. Mrs. Sulabha. S. Apte WIT, Solapur Maharashtra

More information

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY. EVENT BROCHURE www.security.org.vn SECURITY WORLD 2017 4 APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY Ministry of Public Security Authority of Cyber Security - MPS Authority of Information

More information

EMBARK ON THE DIGITAL REVOLUTION. Venue: Sheraton Petaling Jaya Date: 13 th November :30am 5:30pm No of Pax: 300 pax Seating: Theater

EMBARK ON THE DIGITAL REVOLUTION. Venue: Sheraton Petaling Jaya Date: 13 th November :30am 5:30pm No of Pax: 300 pax Seating: Theater EMBARK ON THE DIGITAL REVOLUTION Venue: Sheraton Petaling Jaya Date: 13 th November 2018 Time: 8:30am 5:30pm No of Pax: 300 pax Seating: Theater PIKOM THE NATIONAL ICT ASSOCIATION OF MALAYSIA E1, EMPIRE

More information

A Review on Quality-of-Service Multicast Routing Techniques Based on Genetic Algorithm in Manet

A Review on Quality-of-Service Multicast Routing Techniques Based on Genetic Algorithm in Manet A Review on Quality-of-Service Multicast Routing Techniques Based on Genetic Algorithm in Manet Sukhvinder Singh Department of Computer Science and Engineering Guru Jambheshwar University of Science and

More information

EC-Council GOVERNMENT OF KARNATAKA DEPARTMENT OF INDUSTRIES AND COMMERCE

EC-Council GOVERNMENT OF KARNATAKA DEPARTMENT OF INDUSTRIES AND COMMERCE National Conference on Cyber Space Security (NCCSS) 2013 Research Challenges and Trends December 6-7, 2013 Venue: Hotel Atria, Palace Road, Bangalore Theme: Securing National Critical Infrastructure SUPPORTED

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

UGC Human Resource Development Centre Jawaharlal Nehru University, New Delhi

UGC Human Resource Development Centre Jawaharlal Nehru University, New Delhi UGC Human Resource Development Centre, New Delhi 1 st Refresher Course in E-Learning & E-Governance (Interdisciplinary) 23 rd July 17 th August, 2018 Course coordinators: Dr. Ravikesh Mishra Special Centre

More information

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e Payal Gulati House No. 1H-36, NIT, gulatipayal@yahoo.co.in Total Experience: 9.5 years E xp e r i e nc e Currently working as Assistant Professor (IT) in YMCA University of Science & Technology, since

More information

GDG Developers Conclave 2016, Rajkot

GDG Developers Conclave 2016, Rajkot NEWSLETTER 16 th May 2016, Monday GDG Developers Conclave 2016, Rajkot About Conclave The Biggest IT Developers Conclave has been organized in Rajkot and crafted by GDG community Ahmedabad was held on

More information

India Digital Education Summit. Handbook - Summit Overview

India Digital Education Summit. Handbook - Summit Overview India Digital Education Summit Handbook - Summit Overview Before you Travel Dress Code Please note the dress code for the conference and dinners is smart casual. Hyderabad has a tropical climate with very

More information

Conference on Cyber Security Emerging Cyber Threats & Challenges 24 th April 2010 : Hotel Accord Metropolitan, T Nagar, Chennai

Conference on Cyber Security Emerging Cyber Threats & Challenges 24 th April 2010 : Hotel Accord Metropolitan, T Nagar, Chennai (Southern Region) Conference on Cyber Security Emerging Cyber Threats & Challenges 24 th April 2010 : Hotel Accord Metropolitan, T Nagar, Chennai PROGRAMME 24 th April 2010 1000 1100 hrs : Inaugural Session

More information

Smart infrastructure for a smart sustainable city

Smart infrastructure for a smart sustainable city CSIC Emerging Connections Workshop, Cambridge, 23 June 2017 Smart infrastructure for a smart sustainable city Dr Navil Shetty Fellow and Technical Chair for Asset Management Atkins Context Smart Infrastructure

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

PLC-HMI AND FUZZY BASED AUTOMATION INTWO AXIS PROFILE CUTTING MACHINE

PLC-HMI AND FUZZY BASED AUTOMATION INTWO AXIS PROFILE CUTTING MACHINE PLC-HMI AND FUZZY BASED AUTOMATION INTWO AXIS PROFILE CUTTING MACHINE A. Selwin Mich Priyadharson, S. Vinson Joshua and B. Senthil Kumaran Department of Electronics and Communication Engineering, School

More information

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS Volume 4, No. 5, May 2013 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,

More information

E-Bulletin June 2018

E-Bulletin June 2018 Sandip Foundation s Sandip Institute of Technology and Research Center, Nashik. E-Bulletin June 2018 Staff Co-ordinator: Prof. Pravin R Pachorkar Department of Computer Engineering Zensar ESD Phase I Training

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

ISSN: [Bavishna * et al., 7(4): April, 2018] Impact Factor: 5.164

ISSN: [Bavishna * et al., 7(4): April, 2018] Impact Factor: 5.164 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AN ENHANCED METHOD FOREXTENDING COMPUTATION AND RESOURCES BY MINIMIZING SERVICE DELAY IN EDGE CLOUD COMPUTING B.Bavishna *1, Mrs.M.Agalya

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm International Journal of Engineering Research and Advanced Technology (IJERAT) DOI:http://dx.doi.org/10.31695/IJERAT.2018.3273 E-ISSN : 2454-6135 Volume.4, Issue 6 June -2018 Tumor Detection and classification

More information

The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms

The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms Somayyeh Nalan-Ahmadabad and Sehraneh Ghaemi Abstract In this paper, pole placement with integral

More information

INDUSTRY 4.0 Summit 2018

INDUSTRY 4.0 Summit 2018 EVENT BROCHURE 12th 13th July 2018 JW Marriott Hotel Hanoi INDUSTRY 4.0 Summit 2018 HOSTED & ORGANIZED BY EVENT OVERVIEW Industry 4.0 Summit 2018 hosted by the Government of the Socialist Republic of Viet

More information

An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks.

An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks. An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks. Anagha Nanoti, Prof. R. K. Krishna M.Tech student in Department of Computer Science 1, Department of

More information

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India

More information

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER N. Suresh Kumar, Dr. M. Thangamani 1 Assistant Professor, Sri Ramakrishna Engineering College, Coimbatore, India 2 Assistant

More information

4 th Fraunhofer Innovation and Technology Platform (FIT) 2 nd September 2016, Hotel Taj Palace, New Delhi

4 th Fraunhofer Innovation and Technology Platform (FIT) 2 nd September 2016, Hotel Taj Palace, New Delhi 4 th Fraunhofer Innovation and Technology Platform (FIT) 2 nd September 2016, Hotel Taj Palace, New Delhi In Co-operation with Ministry of Heavy Industries & Public Enterprises, Government of India & Ministry

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Transparency & Trust: A guide for landlords & tenants to data protection and privacy

Transparency & Trust: A guide for landlords & tenants to data protection and privacy Transparency & Trust: A guide for landlords & tenants to data protection and privacy 20 June 2017 Novotel Leeds Publication by HouseMark in association with Anthony Collins Solicitors and AmicusHorizon

More information

Conferences/Workshops/Symposia organized

Conferences/Workshops/Symposia organized Conferences/Workshops/Symposia organized a) Prof S P Ghrera, Dr Rajesh Siddavatam & Dr. Pranay Chaudhury, 2011 IEEE International Conference On Image Information Processing(ICIIP-2011), Organized by JUIT,

More information

Fujitsu North America Technology Forum

Fujitsu North America Technology Forum Fujitsu North America Technology Forum Powering a Sustainable Future with Next Generation Technologies January 24, 2013 Master of Ceremonies Alison Rowe Global Executive Director, Sustainability International

More information

Pattern Classification based on Web Usage Mining using Neural Network Technique

Pattern Classification based on Web Usage Mining using Neural Network Technique International Journal of Computer Applications (975 8887) Pattern Classification based on Web Usage Mining using Neural Network Technique Er. Romil V Patel PIET, VADODARA Dheeraj Kumar Singh, PIET, VADODARA

More information

56 th Annual Technical Convention & National Conference On. Growth of Technologies in Electronics, Computers and Telecom - Indian Perception

56 th Annual Technical Convention & National Conference On. Growth of Technologies in Electronics, Computers and Telecom - Indian Perception 56 th Annual Technical Convention & National Conference On Growth of Technologies in Electronics, Computers and Telecom - Indian Perception (GTECT 2013) at Y B Chavan Centre, Mumbai September 28 & 29,

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008

M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008 M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008 Conference Details To be Held in Hyderabad, located in South-Central India, about 800KM North of Bangalore Hyderabad is about

More information

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India Comparative Study and Analysis of Cloud Intrusion Detection System Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India ABSTRACT

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Theme: Creating Sustainable IT Infrastructure Wednesday, 24 th August, 2011 The Westin, Mumbai, India

Theme: Creating Sustainable IT Infrastructure Wednesday, 24 th August, 2011 The Westin, Mumbai, India Wednesday, 24 th August, 2011 The Westin, Mumbai, India AGENDA 08.00 am Registration 08.30 am Welcome Address by Mr Dileep Kumar, BICSI Country Chair - India Lamp lighting and Inauguration Address by Dr

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 8, August 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

2 nd Optimization & Stochastic Days India 2012

2 nd Optimization & Stochastic Days India 2012 Report 2 nd Optimization & Stochastic Days India 2012 December 3 4, 2012 9:00 Registrations Agenda Day 1 Seminar 9:50 Welcome by CADFEM 10:00 KEYNOTE: Why Robust Design Optimization in Virtual Product

More information

IoT privacy risk management in ANASTACIA project

IoT privacy risk management in ANASTACIA project ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.

More information

Regional Seminar on Safe, Climate Adaptive and Disaster Resilient Transport for Sustainable Development 17 November 2015, Kathmandu, Nepal

Regional Seminar on Safe, Climate Adaptive and Disaster Resilient Transport for Sustainable Development 17 November 2015, Kathmandu, Nepal Regional Seminar on Safe, Climate Adaptive and Disaster Resilient Transport for Sustainable Development 17 November 2015, Kathmandu, Nepal DAY 1: 17 NOVEMBER 2015 08:00-09:00 Registration 09:00-9:15 Opening

More information

Gupta Nikita $ Kochhar

Gupta Nikita $ Kochhar Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Congestion Control

More information

Development, Analysis and Evaluation of Cyber Resilience Strategies

Development, Analysis and Evaluation of Cyber Resilience Strategies Development, Analysis and Evaluation of Cyber Resilience Strategies Prof. Dr. Axel Lehmann Prof. Dr. Udo Helmbrecht Institut für Technische Informatik, Universität der Bundeswehr München, Germany European

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

New Horizons in Audit & Assurance

New Horizons in Audit & Assurance IIA Hyderabad Chapter brings you a Seminar on New Horizons in Audit & Assurance 6 CPE Hours for IIA Members Date : 04 th January 2018 1 Schedule... SCHEDULE 09:00 AM to 09:30 AM Seminar Registration 09:30

More information

Matlab Genetic Algorithm Toolbox Tutorial Pdf

Matlab Genetic Algorithm Toolbox Tutorial Pdf Matlab Genetic Algorithm Toolbox Tutorial Pdf MATLAB and Simulink are registered trademarks of The MathWorks, Inc. See How to Build Mamdani Systems Using Fuzzy Logic Toolbox and genetic algorithms may

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

An Enhanced K-Medoid Clustering Algorithm

An Enhanced K-Medoid Clustering Algorithm An Enhanced Clustering Algorithm Archna Kumari Science &Engineering kumara.archana14@gmail.com Pramod S. Nair Science &Engineering, pramodsnair@yahoo.com Sheetal Kumrawat Science &Engineering, sheetal2692@gmail.com

More information

Sensor networks. Ericsson

Sensor networks. Ericsson Sensor networks IoT @ Ericsson NETWORKS Media IT Industries Page 2 Ericsson at a glance Organization & employees CEO Börje Ekholm Technology & Emerging Business Finance & Common Functions Marketing & Communications

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

MAY PRAGATI MAIDAN, NEW DELHI, INDIA

MAY PRAGATI MAIDAN, NEW DELHI, INDIA 17-19 MAY PRAGATI MAIDAN, NEW DELHI, INDIA www.power-genindia.com Renewables Fossil Fuels Nuclear YOUR GUIDE TO INDIA'S LEADING CLEAN ENERGY EVENT 5,000+ Attendees 180+ Exhibitors 75+ Speakers 20+ Conference

More information

A Native Approach to Cell to Switch Assignment Using Firefly Algorithm

A Native Approach to Cell to Switch Assignment Using Firefly Algorithm International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 2(September 2012) PP: 17-22 A Native Approach to Cell to Switch Assignment Using Firefly Algorithm Apoorva

More information

Improved Version of Kernelized Fuzzy C-Means using Credibility

Improved Version of Kernelized Fuzzy C-Means using Credibility 50 Improved Version of Kernelized Fuzzy C-Means using Credibility Prabhjot Kaur Maharaja Surajmal Institute of Technology (MSIT) New Delhi, 110058, INDIA Abstract - Fuzzy c-means is a clustering algorithm

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

UTC Region 7. Spring Meeting PROGRAM. Hyatt Place New Orleans Convention Center February 22-23, 2018 New Orleans, LA

UTC Region 7. Spring Meeting PROGRAM. Hyatt Place New Orleans Convention Center February 22-23, 2018 New Orleans, LA UTC Region 7 Spring Meeting PROGRAM Hyatt Place New Orleans Convention Center February 22-23, 2018 New Orleans, LA 2018 Region 7 Spring Meeting Hyatt Place New Orleans Convention Center Feb 22 23, 2018

More information

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.) Curriculum (Structure) for M. Tech. Computer Science and Information Technology With Effect From Academic Year 2018-2019 (F. Y. M. Tech.) 2019-2020 (S. Y. M. Tech.) Teaching and Evaluation Scheme First

More information

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY UNIVERSITY OF DIGITAL REVOLUTION. Fourth industrial revolution is upon us and you can be part of

More information

WSIS Forum 2019 First Physical Meeting of the Open Consultation Process 12 November, 12:20-13:20 Room III, UNESCO Headquarters

WSIS Forum 2019 First Physical Meeting of the Open Consultation Process 12 November, 12:20-13:20 Room III, UNESCO Headquarters WSIS Forum 2019 First Physical Meeting of the Open Consultation Process 12 November, 12:20-13:20 Room III, UNESCO Headquarters Presentation created by: Ms Gitanjali Sah and Mr Vladimir Stankovic, WSIS

More information

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh, Shaheed Bhagat Singh State Technical Campus, Ferozepur,

More information

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. TRAINING WEEK COURSE OUTLINE May 9-13 2016 RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I. Page2 FACILITATOR S BIOGRAPHY John Tannahill, CA, CISM, CGEIT, CRISC is a management consultant specializing

More information

Algorithm Collections for Digital Signal Processing Applications Using Matlab

Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab Algorithm Collections for Digital Signal Processing Applications Using Matlab E.S. Gopi National Institute of Technology, Tiruchi,

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of GA and PSO over Economic Load Dispatch Problem Sakshi Rajpoot sakshirajpoot1988@gmail.com Dr. Sandeep Bhongade sandeepbhongade@rediffmail.com Abstract Economic Load dispatch problem

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

Human motion analysis: methodologies and applications

Human motion analysis: methodologies and applications Human motion analysis: methodologies and applications Maria João M. Vasconcelos, João Manuel R. S. Tavares maria.vasconcelos@fe.up.pt CMBBE 2008 8th International Symposium on Computer Methods in Biomechanics

More information

TECHNIQUES FOR COMPONENT REUSABLE APPROACH

TECHNIQUES FOR COMPONENT REUSABLE APPROACH TECHNIQUES FOR COMPONENT REUSABLE APPROACH Sukanay.M 1, Biruntha.S 2, Dr.Karthik.S 3, Kalaikumaran.T 4 1 II year M.E SE, Department of Computer Science & Engineering (PG) sukanmukesh@gmail.com 2 II year

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks 014 1 st International Congress on Computer, Electronics, Electrical, and Communication Engineering (ICCEECE014) IPCSIT vol. 59 (014) (014) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.014.V59.1 Implementation

More information

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world 8 MAY 2018 (Tue) Hong Kong CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world CYBERSECURITY AND RISK MANAGEMENT By HKUST Business School Executive Education Office

More information

Optimization of Process Parameters of CNC Milling

Optimization of Process Parameters of CNC Milling Optimization of Process Parameters of CNC Milling Malay, Kishan Gupta, JaideepGangwar, Hasrat Nawaz Khan, Nitya Prakash Sharma, Adhirath Mandal, Sudhir Kumar, RohitGarg Department of Mechanical Engineering,

More information

RAJASTHAN TECHNICAL UNIVERSITY, KOTA

RAJASTHAN TECHNICAL UNIVERSITY, KOTA Instructions for the applicants for PhD Program and Schedule of I semester (session 2014-15) i) Selected applicants are required to report at the concerned institute with all the relevant documents on

More information

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced

More information

DATE : : SAP in Text Data Processing GUEST LECTURE GIVEN BY : Mr.Shyamal (Alumni), Cap Gemini, Banglore

DATE : : SAP in Text Data Processing GUEST LECTURE GIVEN BY : Mr.Shyamal (Alumni), Cap Gemini, Banglore Guest Lectures DATE : 05.08.2017 : SAP in Text Data Processing : Mr.Shyamal (Alumni), Cap Gemini, Banglore DATE : 19.07.2017 : JAVA Programming : Ms.Amritha B.Yadav (Alumni), QSpiders, Chennai Academic

More information

REV2019 Conference Schedule

REV2019 Conference Schedule REV2019 Conference Schedule Date Time Workshop Title Resource 3-2-2019 9:30am to 11.00am 11.15-12.45pm 1.30pm to 3:00pm 3.15pm- 4.45pm Track 1A Track 1B An Open and Improved VISIR System Through PILAR

More information

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational

More information