WORLD CONFERENCE ON WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WS4 2017) IN CONCURRENT WITH WORLD EMINENCE AWARDS FOR SYSTEMS, SECURITY AND SUSTAINABILITY Time INAUGURAL SESSION CUM AWARDS CEREMONY Day One Details 09:00 AM 10:00 AM Registration with Tea/Coffee and Cookies Inauguration cum Awards Ceremony Begins 10:00 AM 10:02 AM ( Welcoming of Guests ) 10:02 AM 10:07 AM 10:07 AM 10:10 AM 10:10 AM 10:15 AM 10:15 AM 10:20 AM 10:20 AM 10:35 AM WELCOME ADDRESS By: Dr. Malaya Nayak, Organising Chair, WS4 2017 ABOUT THE WS4 2017 CONFERENCE AND AWARDS By: Mr. Amit Joshi, Organising Secretary, WS4 2017 CSI THEME AND KNOWLEDGE ADDRESS By: Dr. Durgesh Kumar Mishra, Chairman, Division IV, CSI INDUSTRY ADDRESS By: Mr. Bharat Patel, Industry Chair, WS4 2017 ADDRESS BY INAUGURAL SPEAKER AND GUEST Mr. Amarjit Dhillon, GROUP CIO, Turning Point, London, UK 10:35 AM 10:50 AM ADDRESS BY CHIEF GUEST 10: 50 AM 10:55 AM AWARDS AND FELECIATION CEREMONY FOR EMINENCE AWARDS 2017 10:55 AM 11:00 AM 11:15 AM 11:45 AM 11:45 AM 12:15 PM 12:15 PM 12:45 PM 15 February 2017, America Square, London, UK VOTE OF APPRECIATION By: Dr. Nilanjan Dey, Session Coordinator, WS4 2017 Conference and Awards Group Photograph Snacks Break ( 11:00 AM 11:15 AM ) Keynote Address Begins KEYNOTE ADDRESS 1 By - Prof. João Manuel R. S. Tavares Faculdade de Engenharia da Universidade do Porto, Portugal KEYNOTE ADDRESS 2 By - Prof. Wim JC Melis University of Greenwich, London, United Kingdom KEYNOTE ADDRESS 3 By: Mr. Aninda Bose Sr. Publishing Editor, Springer India KEYNOTE ADDRESS 4 12:45 PM 01:15 PM By: Prof. Xin-She Yang Middlesex University, London, United Kingdom Presentation of Token of Remembrance to Keynote Speakers/Guests
NETWORKING LUNCH ( 01:15 PM 01:45PM ) WS4 2017 Technical Paper Presentation Schedule 15 February 2017, America Square, London, UK Day One Time Details Each Presenter will get 6 minutes for presentation and 2 minutes for Q-A Authors: Spyridon Papastergiou, Nineta Polemi MITIGATE: A dynamic Supply Chain Cyber Risk Assessment Methodology Authors: Madiop Diouf, Idy Diop, Ibra Dioum Enhanced MIMO Systems performances by concatenating small Polar Coding to Spatial Time Block Codes Authors: Muazzam A. Khan, Nazar A. Saqib, Umair Shafiq Khan Target Tracking in Wireless Sensor Networks using NS2 01:45 PM 03:15 PM Authors: Muftah Fraifer, Helen Hasenfuss, Mikael Fernström Taking away the Green Screen- A Brief Discussion of a Multidisciplinary approach To IoT via, Smart Parking and Interaction Design Authors: Eleni-Maria Kalogeraki, Nineta Polemi, Spyridon Papastergiou, Themis Panayiotopoulos Modeling SCADA Attacks Authors: Ganesh Singadkar, Shubham Talbar, Parang Sanghavi, Bhavin Jankharia, Sanjay Talbar Automatic Lung Field Segmentation Based on Non Negative Matrix Factorization and Fuzzy Clustering Authors: Pallavi Thacker, H. P. Mathur Competitive Advantage through Social Media: A Study of Indian Authors: Jayshree Pansare, Maya Ingle A Real-time Devnagari Sign Language Recognizer (α-dslr) for Devnagari Script Authors: Sagar Tambe, Suhas Gajre Novel Strategy for Congestion Control and Power Consumption Speed with Mobile Node in Wireless Sensor Networks Authors: Eva Tuba, Milan Tuba, Marko Beko Two stage wireless sensor node localization using firefly algorithm Authors: Varin Chouvatut Detection of Brain Tumor from MR Image Sequence Using Image Segmentation and Blob s Centroid Authors: Reena Gupta, Manju Mandot Visual Image Enhancement of High Security Registration Number Plate Recognition System (HSRNP) with Region Calculation
Authors: Ezekiel Uzor Okike, Ofaletse Mphale A Project Metric Framework for Assessing ICT Project Success/Failure Authors: Chintan Sidpara, Darshana Patel, Kunal Khimani, Darshan Upadhyay, Avani Vasant Analysing Distribution of Copyrighted Files by Tracking BitTorrent Network Authors: Nhu Gia Nguyen, K. Jagatheesan, Amira S. Ashour, B. Anand, Nilanjan Dey Ant colony optimization based load frequency control of multi-area interconnected thermal power system with governor dead-band nonlinearity Authors: Kuldeep Raghuwanshi A Qualitative Review of two Evolutionary Algorithms Inspired by Heuristic population Based Search methods: GA & PSO Authors: Chinu Singla, Sakshi Kaushal, Gurjot Kaur, Jasleen Kaur, Nitish Mahajan, Shubhani Aggarwal An Intelligent Hardware Calibration Scheme for Real Time VoIP Applications Authors: Aparna Bhale, Manish Joshi Automatic Sub classication of benign breast tumor Authors: Jyoti Prabha, Sabita Shaivani, Dinesh Goyal, Amit Sanghi Prevention of Conjunct Black Hole MANET on DSR Protocol by Cryptanalytic Method Authors: Amit Sanghi, Sunita Chaudhary, Meenu Dave Enhance the Data Security in Cloud Computing by Text steganography 03:15 PM 04:45 PM Authors: Abhishek Bhattacharya, Radha Tamal Goswami A Hybrid Community based Rough Set Feature Selection Technique in Android Malware Detection Authors: Nidhi Malik, Aditi Sharan, Jaya Srivastava Natural Language Interface for ontology in agriculture domain Authors: Mamta Dadhich, Vijay Singh Rathore ASMAN Framework: A Framework for Comparison and Selection of SaaS Services Authors: Rohit Kamal Chatterjee, Avijit Kar Estimation of Heterogeneity to Improve Robust Anisotropic Diffusion Authors: Chia-Hung Yeh, Kahlil Muchtar, Chih-Yang Lin 3D-based Unattended Object Detection Method for Video Surveillance Authors: Sheng-Lung Peng The Disjunctive Total Domination Problem on Some Subclasses of Chordal Graphs
Authors: Sankhadeep Chatterjee, Nilanjan Dey, Amira S. Ashour, Cornelia Victoria Anghel Drugarin Electrical Energy Output prediction using Cuckoo Search supported Artificial Neural Network Authors: Sankhadeep Chatterjee, Rhitaban Nag, Nilanjan Dey, Amira Ashour Efficient Economic Profit Maximization: Genetic Algorithm based Approach Authors: Sreeram Murthy Kattamuri, Vijayalakshmi Kakulapati, Nagaraju Muthyala Configuration of IDS Tool On Linux OS Using Low Cost Low Power Computer Authors: Varad Vishwarupe, Mangesh Bedekar, Milind Pande, Anil Hiwale Intelligent Twitter Spam Detection: A Hybrid Approach Authors: Kamlesh Ahuja, Durgesh Kumar Mishra Data Elimination Based Technique for Mining Frequent Closed Item Set Authors: S.S. Sarangdevot, Manish Shrimali, Sanjay Tejasvee A Reformed Cohesive Tactic Towards Electronic Commerce, Business and Commerce NET Closing Remarks and Certificate Distribution (04:45 PM - 05:00 PM) 05:00 PM Onwards Tea/Coffee with Networking