INAUGURAL SESSION CUM AWARDS CEREMONY

Similar documents
Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM),

Alpha College of Engineering & Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

Smart Manufacturing and Standards: The NIST Role

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS

INDIA SUSTAINABILITY LEADERSHIP SUMMIT 2017

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

NORTH ATLANTIC TREATY ORGANISATION

IEEE PES INTELLIGENT SYSTEMS SUBCOMMITTEE MEETING. Minutes. IEEE PES GM Vancouver, Canada

safely connecting to future smart hospital & healthcare

Session Schedule(Computer & IT) SESSION - I

FEATURE EXTRACTION TECHNIQUES USING SUPPORT VECTOR MACHINES IN DISEASE PREDICTION

Technologies with the potential to enhance resilience - An overview on the activities of ENISA

Route Optimization in MANET using FIGA

DIVERSIFIED OPTIMIZATION TECHNIQUES FOR ROUTING PROTOCOLS IN MOBILE AD-HOC WIRELESS NETWORKS

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation

A Brief Report. University, Ahmedabad Faculty of Technology, Nirma University, Ahmedabad. Nagar M/s Eigen Tech Pvt Ltd., New

Automatic Modelling Image Represented Objects Using a Statistic Based Approach

2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme

A Survey of Parallel Social Spider Optimization Algorithm based on Swarm Intelligence for High Dimensional Datasets

August 18-19, 2018 (Saturday-Sunday)

Various Strategies of Load Balancing Techniques and Challenges in Distributed Systems

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.

EMBARK ON THE DIGITAL REVOLUTION. Venue: Sheraton Petaling Jaya Date: 13 th November :30am 5:30pm No of Pax: 300 pax Seating: Theater

A Review on Quality-of-Service Multicast Routing Techniques Based on Genetic Algorithm in Manet

EC-Council GOVERNMENT OF KARNATAKA DEPARTMENT OF INDUSTRIES AND COMMERCE

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

UGC Human Resource Development Centre Jawaharlal Nehru University, New Delhi

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e

GDG Developers Conclave 2016, Rajkot

India Digital Education Summit. Handbook - Summit Overview

Conference on Cyber Security Emerging Cyber Threats & Challenges 24 th April 2010 : Hotel Accord Metropolitan, T Nagar, Chennai

Smart infrastructure for a smart sustainable city

A Survey And Comparative Analysis Of Data

PLC-HMI AND FUZZY BASED AUTOMATION INTWO AXIS PROFILE CUTTING MACHINE

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

ABSTRACT I. INTRODUCTION

E-Bulletin June 2018

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

ISSN: [Bavishna * et al., 7(4): April, 2018] Impact Factor: 5.164

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Tumor Detection and classification of Medical MRI UsingAdvance ROIPropANN Algorithm

The Design of Pole Placement With Integral Controllers for Gryphon Robot Using Three Evolutionary Algorithms

INDUSTRY 4.0 Summit 2018

An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks.

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER

4 th Fraunhofer Innovation and Technology Platform (FIT) 2 nd September 2016, Hotel Taj Palace, New Delhi

ROUTING PROJECT LIST

Transparency & Trust: A guide for landlords & tenants to data protection and privacy

Conferences/Workshops/Symposia organized

Fujitsu North America Technology Forum

Pattern Classification based on Web Usage Mining using Neural Network Technique

56 th Annual Technical Convention & National Conference On. Growth of Technologies in Electronics, Computers and Telecom - Indian Perception

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008

Pramod Bide 1, Rajashree Shedge 2 1,2 Department of Computer Engg, Ramrao Adik Institute of technology/mumbai University, India

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

Theme: Creating Sustainable IT Infrastructure Wednesday, 24 th August, 2011 The Westin, Mumbai, India

International Journal of Advance Research in Computer Science and Management Studies

2 nd Optimization & Stochastic Days India 2012

IoT privacy risk management in ANASTACIA project

Regional Seminar on Safe, Climate Adaptive and Disaster Resilient Transport for Sustainable Development 17 November 2015, Kathmandu, Nepal

Gupta Nikita $ Kochhar

Development, Analysis and Evaluation of Cyber Resilience Strategies

Computational Intelligence Applied on Cryptology: a Brief Review

New Horizons in Audit & Assurance

Matlab Genetic Algorithm Toolbox Tutorial Pdf

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

An Enhanced K-Medoid Clustering Algorithm

Sensor networks. Ericsson

Void main Technologies

MAY PRAGATI MAIDAN, NEW DELHI, INDIA

A Native Approach to Cell to Switch Assignment Using Firefly Algorithm

Improved Version of Kernelized Fuzzy C-Means using Credibility

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

UTC Region 7. Spring Meeting PROGRAM. Hyatt Place New Orleans Convention Center February 22-23, 2018 New Orleans, LA

Curriculum (Structure) for. M. Tech. With Effect From. Academic Year (F. Y. M. Tech.) (S. Y. M. Tech.)

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

WSIS Forum 2019 First Physical Meeting of the Open Consultation Process 12 November, 12:20-13:20 Room III, UNESCO Headquarters

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

Algorithm Collections for Digital Signal Processing Applications Using Matlab

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Human motion analysis: methodologies and applications

TECHNIQUES FOR COMPONENT REUSABLE APPROACH

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks

MAY. (Tue) Hong Kong. CYBERSECURITY & RISK MANAGEMENT How to preempt cybersecurity challenges in the digital world

Optimization of Process Parameters of CNC Milling

RAJASTHAN TECHNICAL UNIVERSITY, KOTA

Open Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010

DATE : : SAP in Text Data Processing GUEST LECTURE GIVEN BY : Mr.Shyamal (Alumni), Cap Gemini, Banglore

REV2019 Conference Schedule

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong

Transcription:

WORLD CONFERENCE ON WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WS4 2017) IN CONCURRENT WITH WORLD EMINENCE AWARDS FOR SYSTEMS, SECURITY AND SUSTAINABILITY Time INAUGURAL SESSION CUM AWARDS CEREMONY Day One Details 09:00 AM 10:00 AM Registration with Tea/Coffee and Cookies Inauguration cum Awards Ceremony Begins 10:00 AM 10:02 AM ( Welcoming of Guests ) 10:02 AM 10:07 AM 10:07 AM 10:10 AM 10:10 AM 10:15 AM 10:15 AM 10:20 AM 10:20 AM 10:35 AM WELCOME ADDRESS By: Dr. Malaya Nayak, Organising Chair, WS4 2017 ABOUT THE WS4 2017 CONFERENCE AND AWARDS By: Mr. Amit Joshi, Organising Secretary, WS4 2017 CSI THEME AND KNOWLEDGE ADDRESS By: Dr. Durgesh Kumar Mishra, Chairman, Division IV, CSI INDUSTRY ADDRESS By: Mr. Bharat Patel, Industry Chair, WS4 2017 ADDRESS BY INAUGURAL SPEAKER AND GUEST Mr. Amarjit Dhillon, GROUP CIO, Turning Point, London, UK 10:35 AM 10:50 AM ADDRESS BY CHIEF GUEST 10: 50 AM 10:55 AM AWARDS AND FELECIATION CEREMONY FOR EMINENCE AWARDS 2017 10:55 AM 11:00 AM 11:15 AM 11:45 AM 11:45 AM 12:15 PM 12:15 PM 12:45 PM 15 February 2017, America Square, London, UK VOTE OF APPRECIATION By: Dr. Nilanjan Dey, Session Coordinator, WS4 2017 Conference and Awards Group Photograph Snacks Break ( 11:00 AM 11:15 AM ) Keynote Address Begins KEYNOTE ADDRESS 1 By - Prof. João Manuel R. S. Tavares Faculdade de Engenharia da Universidade do Porto, Portugal KEYNOTE ADDRESS 2 By - Prof. Wim JC Melis University of Greenwich, London, United Kingdom KEYNOTE ADDRESS 3 By: Mr. Aninda Bose Sr. Publishing Editor, Springer India KEYNOTE ADDRESS 4 12:45 PM 01:15 PM By: Prof. Xin-She Yang Middlesex University, London, United Kingdom Presentation of Token of Remembrance to Keynote Speakers/Guests

NETWORKING LUNCH ( 01:15 PM 01:45PM ) WS4 2017 Technical Paper Presentation Schedule 15 February 2017, America Square, London, UK Day One Time Details Each Presenter will get 6 minutes for presentation and 2 minutes for Q-A Authors: Spyridon Papastergiou, Nineta Polemi MITIGATE: A dynamic Supply Chain Cyber Risk Assessment Methodology Authors: Madiop Diouf, Idy Diop, Ibra Dioum Enhanced MIMO Systems performances by concatenating small Polar Coding to Spatial Time Block Codes Authors: Muazzam A. Khan, Nazar A. Saqib, Umair Shafiq Khan Target Tracking in Wireless Sensor Networks using NS2 01:45 PM 03:15 PM Authors: Muftah Fraifer, Helen Hasenfuss, Mikael Fernström Taking away the Green Screen- A Brief Discussion of a Multidisciplinary approach To IoT via, Smart Parking and Interaction Design Authors: Eleni-Maria Kalogeraki, Nineta Polemi, Spyridon Papastergiou, Themis Panayiotopoulos Modeling SCADA Attacks Authors: Ganesh Singadkar, Shubham Talbar, Parang Sanghavi, Bhavin Jankharia, Sanjay Talbar Automatic Lung Field Segmentation Based on Non Negative Matrix Factorization and Fuzzy Clustering Authors: Pallavi Thacker, H. P. Mathur Competitive Advantage through Social Media: A Study of Indian Authors: Jayshree Pansare, Maya Ingle A Real-time Devnagari Sign Language Recognizer (α-dslr) for Devnagari Script Authors: Sagar Tambe, Suhas Gajre Novel Strategy for Congestion Control and Power Consumption Speed with Mobile Node in Wireless Sensor Networks Authors: Eva Tuba, Milan Tuba, Marko Beko Two stage wireless sensor node localization using firefly algorithm Authors: Varin Chouvatut Detection of Brain Tumor from MR Image Sequence Using Image Segmentation and Blob s Centroid Authors: Reena Gupta, Manju Mandot Visual Image Enhancement of High Security Registration Number Plate Recognition System (HSRNP) with Region Calculation

Authors: Ezekiel Uzor Okike, Ofaletse Mphale A Project Metric Framework for Assessing ICT Project Success/Failure Authors: Chintan Sidpara, Darshana Patel, Kunal Khimani, Darshan Upadhyay, Avani Vasant Analysing Distribution of Copyrighted Files by Tracking BitTorrent Network Authors: Nhu Gia Nguyen, K. Jagatheesan, Amira S. Ashour, B. Anand, Nilanjan Dey Ant colony optimization based load frequency control of multi-area interconnected thermal power system with governor dead-band nonlinearity Authors: Kuldeep Raghuwanshi A Qualitative Review of two Evolutionary Algorithms Inspired by Heuristic population Based Search methods: GA & PSO Authors: Chinu Singla, Sakshi Kaushal, Gurjot Kaur, Jasleen Kaur, Nitish Mahajan, Shubhani Aggarwal An Intelligent Hardware Calibration Scheme for Real Time VoIP Applications Authors: Aparna Bhale, Manish Joshi Automatic Sub classication of benign breast tumor Authors: Jyoti Prabha, Sabita Shaivani, Dinesh Goyal, Amit Sanghi Prevention of Conjunct Black Hole MANET on DSR Protocol by Cryptanalytic Method Authors: Amit Sanghi, Sunita Chaudhary, Meenu Dave Enhance the Data Security in Cloud Computing by Text steganography 03:15 PM 04:45 PM Authors: Abhishek Bhattacharya, Radha Tamal Goswami A Hybrid Community based Rough Set Feature Selection Technique in Android Malware Detection Authors: Nidhi Malik, Aditi Sharan, Jaya Srivastava Natural Language Interface for ontology in agriculture domain Authors: Mamta Dadhich, Vijay Singh Rathore ASMAN Framework: A Framework for Comparison and Selection of SaaS Services Authors: Rohit Kamal Chatterjee, Avijit Kar Estimation of Heterogeneity to Improve Robust Anisotropic Diffusion Authors: Chia-Hung Yeh, Kahlil Muchtar, Chih-Yang Lin 3D-based Unattended Object Detection Method for Video Surveillance Authors: Sheng-Lung Peng The Disjunctive Total Domination Problem on Some Subclasses of Chordal Graphs

Authors: Sankhadeep Chatterjee, Nilanjan Dey, Amira S. Ashour, Cornelia Victoria Anghel Drugarin Electrical Energy Output prediction using Cuckoo Search supported Artificial Neural Network Authors: Sankhadeep Chatterjee, Rhitaban Nag, Nilanjan Dey, Amira Ashour Efficient Economic Profit Maximization: Genetic Algorithm based Approach Authors: Sreeram Murthy Kattamuri, Vijayalakshmi Kakulapati, Nagaraju Muthyala Configuration of IDS Tool On Linux OS Using Low Cost Low Power Computer Authors: Varad Vishwarupe, Mangesh Bedekar, Milind Pande, Anil Hiwale Intelligent Twitter Spam Detection: A Hybrid Approach Authors: Kamlesh Ahuja, Durgesh Kumar Mishra Data Elimination Based Technique for Mining Frequent Closed Item Set Authors: S.S. Sarangdevot, Manish Shrimali, Sanjay Tejasvee A Reformed Cohesive Tactic Towards Electronic Commerce, Business and Commerce NET Closing Remarks and Certificate Distribution (04:45 PM - 05:00 PM) 05:00 PM Onwards Tea/Coffee with Networking