2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat Registration Starts Opening Ceremony High Tea Keynote - 1 by Dr. Satish Sharma Keynote - 2 by Dr. Lalit Garg Venue: Department of Computer Science and Engineering 01:30 PM 02:30 PM Session-1 04:00 PM 04:15 PM Session-4 09:00 AM Session-7 10:30 AM 12:00 Noon 12:15 PM Session-10 01:30 PM 02:30 PM 04:00 PM 04:30 PM Lunch at Central Lobby Session-2 Tea Break Session-5 Day 2, Thursday, 29 Dec 2016 Session-8 Keynote -3 by Mr. Hirdesh Singhal (Skype) Tea Break Session-11 Lunch at Central Lobby Session-13 Closing Ceremony Refreshment at Central Lobby Session-3 Session-6 Session-9 Session-12
IST 08:00 AM Registration Starts 09:00-10:00 AM Opening Ceremony Detailed ICCM-2016 Conference Schedule Day 1, Wednesday, 28 Dec 2016 Venue: V.C. Secretariat 10:00-10:30 AM High Tea 10:30-12:00 Noon Keynote- 1 by Dr. Satish Sharma 12:00-01:30 PM Keynote- 2 by Dr. Lalit Garg Venue: Department of Computer Science and Engineering 01:30-02:30 PM Lunch at Central Lobby Track-1: User Authentication and Security 02:30-04:00 PM 28-Dec 2016 Session 1, Lecture Theatre Session Chair 121 Rifaqat Ali A Secure and Robust Three-factor Based Authentication Scheme using RSA Cryptosystem 122 Preeti Chandrakar Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment 21 Subhash Chandra Static Signature Verification Based on Texture Analysis using Support Vector Machine 5 Sudha Ellison Mathe Efficient Sequential Polynomial Basis Multiplier over GF(28) 11 Sohum Prabhudesai Enhanced Attribute Access Control Mechanism with Sensitive Attribute Protection Track-2: Software Engineering, Data Mining, Cloud Computing 02:30-04:00 PM Session 2, Lecture Theatre Session Chair Mr. Skype 117 Arodh Lal Karn News Sentiment Incorporation in Real-Time Trading: Alpha Testing the Event Trading Strategy in High Frequency Trading 77 Keith Vassallo Cross-Platform Development Frameworks: Review of contemporary technologies and methods for cross-platform application development 102 Pratiksha Gautam Correlation and Performance Estimation of Clone Detection Tools 59 Honey Jindal An Empirical analysis of Web Navigation Prediction Techniques Mr. Oral
58 Oshin Sharma Energy Efficient Virtual Machine Consolidation for Cloud Data Centers Using Analytic Hierarchy Process Track-3: Decision Support Systems, E-Commerce, E-Government 02:30-04:00 PM Session 3, Lecture Theatre Session Chair Mr. Oral 133 Supreet Kanwal Impact of Organizational Culture and Process-Structure on Marketing Intelligence: Perspective of IT Professionals 33 Satish Sharma Innovative Health Services for Seniors 110 G. Singh Fuzzy Decision Support System to enhance Productivity in Indian Coal Mining Industry 101 Vipul Gupta E-Marketing Strategy for an E-Business Analysing tools and media for the development of an E-Marketing strategy 50 Sonu Rajak Distance and Bearing Based Vehicle Trajectory Segmentation 04:00-04:15 PM Tea Break Track-4: Hardware Design, Communication Networks, Multimedia Technologies 12:15-01:30 PM Session 4, Lecture Theatre Session Chair Mr. Oral 42 Vandana Shukla A Novel Approach for Reversible Realization of N-bit Arithmetic Circuit for Low Power Loss ALU Applications 112 Amit Kumar Gupta Design and Performance Evaluation of Smart Job First Multilevel Feedback Queue (SJFMLFQ) Scheduling Algorithm with Dynamic Smart Time Quantum 71 Madan Mohan Agarwal Design of Fuzzy Controlled Routing Protocol to Save Energy in Ad Hoc Networks 15 Manali Chandani A Survey on Synchronization Approach in MAC Layer Protocols 125 Lalit Garg Dwell-Free Eye-Driven Typing: A review of literature Track-5: Engineering Management and Decision Support Systems 04:15-05:45 PM Session 5, Lecture Theatre Session Chair Mr. Skype 123 Lalit Garg Assessment in e-learning for Higher Education 88 Joseph Bonello Manufacturing Production Line Modelling and Classification of associated NP- Hard problems 114 Irappa Basappa Hunagund Plant Layout of Manufacturing Firm - A Case Study
12 Syed Ali Fathima S J Augmented Reality using Natural User Interface Based Physical Therapy Rehabilitation Framework with Mobile Decision Support System - A Global Solution for Remote Assistance 116 Gianpaolo Tomaselli A Review of Corporate Social Responsibility Application in the Healthcare Sector Track-6: Multimedia and Graphics Technologies 04:15-05:45 PM Session 6, Lecture Theatre Session Chair Oral 87 Sandeep Kumar Sharma OTCA Approach towards Blurred Image Feature Estimation and Enrichment 67 Neha Gopaliya Discrete Transform Based Image Fusion: A Review 64 Shiven Goyal, Poonam Sarda Image Fusion Based On Optimization Technique 108 Sugandha Agarwal Image Quality Improvement Using Shift Variant and Shift Invariant Based Wavelet Transform Methods- A Novel Approach 3 Sunita Kumari A review of RGB-D Sensor Calibration for Human Activity Recognition IST Day 2, Thursday, 29 Dec 2016 Track-7 Data Mining, Software Engineering and Business Intelligence 09:00-10:30 AM Session 7, Lecture Theatre Session Chair Mr. Oral 49 Megha Sharma Density- Based Clustering for Mixed Data 60 Nisha Comparison between Hierarchical and Graph Clustering method 137 Santosh Singh Evaluation of Neural Network Architectures for Lung Abnormality Classification 32 Satish Sharma Accumulative Software Development 19 Mehfooza. M Model on Quantifying Coastal data using Path Analysis to infer the Cause and Effect of the Pollutant Parameters 70 Supreet Kanwal The Role of Marketing Intelligence in Brand Positioning: Perspective of Marketing Professionals Track-8:Communication Networks, Data Mining, Decision Support Systems 09:00-10:30 AM Session 8, Lecture Theatre Session Chair Mr. Skype 55 Geetanjali Rathee Secure Modified Ad hoc On-demand Distance Vector (MAODV) routing protocol 02 Mamata Rath MAQ : A Mobile Agent Based Quality of Service Platform for Manets
90 Divya Agrawal Improving Classification Accuracy on Imbalanced Data by Ensembling Technique 84 Gianpaolo Tomaselli Healthcare Systems and Corporate Social Responsibility Communication: A Comparative Analysis between Malta and India 99 Dharmendra Sharma The determinants of Mobile Cloud Computing adoption by Financial Services Firms in Fiji Track-9 Cryptography and Information Security 09:00-10:30 AM Session 9, Lecture Theatre Session Chair Mr. Oral 98 Prerna Mohit Modification of Traditional RSA into Symmetric-RSA Cryptosystems 39 Sadanand Yadav A New Cryptographic Method for Image Encryption 4 Daya Sagar Gupta A Secure Cloud Storage using ECC-Based Homomorphic Encryption 25 Karan Singh Secure and Reliable Data Delivery Mechanism 26 Sugandha Agarwal Biometric Image Security Using Chaos Algorithm 10:30-12:00 Noon Keynote -3 by Mr. Hirdesh Singhal Lecture Theatre (Skype) 12:00-12:15 PM Tea Break Track-10: Hardware Design, Network Protocols, Cloud Computing 04:15-05:45 PM Session 10, Lecture Theatre Session Chair Mr. Oral 86 Vandana Shukla An Efficient Approach to Design a Low Power Loss Circuit for 2:4 Decoder with Reversible Logic 62 Manali Chandnani Node Synchronization Approach to Access CSMA/CA Channel 13 Vivek Jain Implement Multichannel Fractional Sample Rate Convertor using Genetic Algorithm 83 Priti Sharma Activity Scheduling Protocol for Energy Saving in Heterogeneous Wireless Sensor Networks 44 Jitendra Kumar Verma Resource Request Based Energy Efficient Heuristic for Server Offloading in Cloud Computing Environment Track-11: Cyber Security, Information Security 12:15-01:30 PM Session 11, Lecture Theatre Session Chair Mr. Skype 34 Regner Sabillon Cybersecurity Incident Handling and Incident Management 30 Hemraj Saini Mathematical Model for Cyber Attack in Computer Networking
89 Pratiksha Gautam A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security 106 Sudhanshu Maurya Secuity and Privacy Aspects of Mobile Cloud Computing using Quantum Cryptography Track-12: 5th Generation Mobile Data Technologies 12:15-01:30 PM Session 12, Lecture Theatre Session Chair Mr. Oral 24 Karan Singh Review of Security Features in Mobile Android System 118 Anjali Mathur Utility of Social Networking Tools Among Indians-An Anaytical Study 14 Somayya Madakam 5G Mobile Communication Technology: We Had Never Seen Her Ever Before 74 Ruchi Verma Crisis Management Using Centrality Measurement in Social Networks 01:30-02:30 PM Lunch at Central Lobby Track-13: Communication Networks & Protocols,Cloud Computing 02:30-04:00 PM Session 13, Lecture Theatre Session Chair Mr. Skype 22 Geetanjali Rathee Secure Buffer-based Routing Protocol for WMN 92 Keith Vassallo Mobile Language Learning: Providing tools that allow the asynchronous, casual and sometimes gamified learning of languages on mobile devices 52 Akashdeep Bhardwaj Efficient Fault Tolerance on Cloud Environments 27 Oshin Sharma Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment 23 Geetanjali Rathee Behavior Detection Mechanism of the Node against Black Hole Attack in Hierarchical Mesh Networks 04:00-04:30 PM Closing Ceremony at Lecture Theatre 04:30-05:00 PM Refreshment