2nd International Conference on Computers & Management (ICCM-2016) Dec 2016 Tentative Programme

Similar documents
ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e

Name of the lecturer Doç. Dr. Selma Ayşe ÖZEL

MASP Chapter on Safety and Security

Proposal for Scrambled Method based on NTRU

ALLOTMENT OF TOPICS FOR TERM PAPER WRITING

SIR C R REDDY COLLEGE OF ENGINEERING

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

Void main Technologies

Academic Course Description

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

AI: A UAE Perspective. Nawaf I. Almoosa Deputy Director - EBTIC March 7 th 2018

Digital Humanities Digital Economics. Digital Arts. 05. One elective course from the courses offered at the university faculties

Communication Networks & Cyber Security Workshop and Sixteenth GISFI Standardisation Series Meeting (GSSM),

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Indian Silicon Technologies 2013

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DEPARTMENT OF COMPUTER SCIENCE

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

Course Curriculum for Master Degree in Network Engineering and Security

ONLINE BIOMETRIC VERIFICATION USING APACHE STORM ON PUBLIC CLOUD

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

What makes a hot topic hot? An NSF Perspective

CompTIA Security+ Study Guide (SY0-501)

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

HK ASTRI FinTech Initiative

Name Qualification Designation Specialization Experience (in years) Dr. Shaily Jain PhD Faculty Networking, MP SoC

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Fujitsu World Tour 2018

Diversified Caesar Cipher for Impeccable Security

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

COMPUTER SCIENCE INTERNET SCIENCE AND TECHOLOGY HUMAN MEDIA INTERACTION BUSINESS INFORMATION TECHNOLOGY

ISSN: (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java

Leading the Digital Transformation from the Centre of Government

IEEE Project Titles

YMCA UNIVERSITY OF SCIENCE AND TECHNOLOGY, FARIDABAD

Star: Sla-Aware Autonomic Management of Cloud Resources

Void main Technologies

M.B.Srinivas Chairman, IEEE Hyderabad Section General Co-Chair, TENCON 2008

Security in ECE Systems

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

Multiple Encryption using ECC and Its Time Complexity Analysis

Innovation policy for Industry 4.0

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

Analysis of Cryptography and Pseudorandom Numbers

Security Standardization

The NIST Cybersecurity Framework

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,

REV2019 Conference Schedule

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

Academic Course Description

New Horizons in Audit & Assurance

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

Kusum Lata, Sugandha Sharma

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of

Information Security: Principles and Practice Second Edition. Mark Stamp

( It will be applied from Fall)

Public Sector Cyber Security Series

Programme Outcome COURSE OUTCOMES MCA

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa

Post-Quantum Cryptography A Collective Challenge

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

safely connecting to future smart hospital & healthcare

Image Processing and Watermark

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

A Combined Encryption Compression Scheme Using Chaotic Maps

1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489

OUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.

National Institute of Standards and Technology

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Academic Course Description

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Introduction to SPCOM Group (Signal Processing, Communication & IIT Kanpur. Abhishek Gupta, EE

Aspects of Enhancing Security in Software Development Life Cycle

Digital Communication Networks

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division

Network Intrusion Detection System Using Fuzzy Logic Ppt

Protection Against DDOS Using Secure Code Propagation In The VANETs

Course Information

COMP4109 : Applied Cryptography

S. Indirakumari, A. Thilagavathy

ANALYSIS OF AES ENCRYPTION WITH ECC

School of Engineering and Technology. Department of Engineering

Overview of Web Mining Techniques and its Application towards Web

Cryptography Today. Ali El Kaafarani. Mathematical Institute Oxford University. 1 of 44

Disquisition of a Novel Approach to Enhance Security in Data Mining

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

International Journal of Computer Engineering and Applications,

Transcription:

2nd International Conference on Computers & Management (ICCM-2016) 28-29 Dec 2016 Tentative Programme Day 1, Wednesday, 28 Dec 2016 IST 08:00 AM 09:00 AM 10:00 AM 10:30 AM 12:00 Noon Venue: V.C. Secretariat Registration Starts Opening Ceremony High Tea Keynote - 1 by Dr. Satish Sharma Keynote - 2 by Dr. Lalit Garg Venue: Department of Computer Science and Engineering 01:30 PM 02:30 PM Session-1 04:00 PM 04:15 PM Session-4 09:00 AM Session-7 10:30 AM 12:00 Noon 12:15 PM Session-10 01:30 PM 02:30 PM 04:00 PM 04:30 PM Lunch at Central Lobby Session-2 Tea Break Session-5 Day 2, Thursday, 29 Dec 2016 Session-8 Keynote -3 by Mr. Hirdesh Singhal (Skype) Tea Break Session-11 Lunch at Central Lobby Session-13 Closing Ceremony Refreshment at Central Lobby Session-3 Session-6 Session-9 Session-12

IST 08:00 AM Registration Starts 09:00-10:00 AM Opening Ceremony Detailed ICCM-2016 Conference Schedule Day 1, Wednesday, 28 Dec 2016 Venue: V.C. Secretariat 10:00-10:30 AM High Tea 10:30-12:00 Noon Keynote- 1 by Dr. Satish Sharma 12:00-01:30 PM Keynote- 2 by Dr. Lalit Garg Venue: Department of Computer Science and Engineering 01:30-02:30 PM Lunch at Central Lobby Track-1: User Authentication and Security 02:30-04:00 PM 28-Dec 2016 Session 1, Lecture Theatre Session Chair 121 Rifaqat Ali A Secure and Robust Three-factor Based Authentication Scheme using RSA Cryptosystem 122 Preeti Chandrakar Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment 21 Subhash Chandra Static Signature Verification Based on Texture Analysis using Support Vector Machine 5 Sudha Ellison Mathe Efficient Sequential Polynomial Basis Multiplier over GF(28) 11 Sohum Prabhudesai Enhanced Attribute Access Control Mechanism with Sensitive Attribute Protection Track-2: Software Engineering, Data Mining, Cloud Computing 02:30-04:00 PM Session 2, Lecture Theatre Session Chair Mr. Skype 117 Arodh Lal Karn News Sentiment Incorporation in Real-Time Trading: Alpha Testing the Event Trading Strategy in High Frequency Trading 77 Keith Vassallo Cross-Platform Development Frameworks: Review of contemporary technologies and methods for cross-platform application development 102 Pratiksha Gautam Correlation and Performance Estimation of Clone Detection Tools 59 Honey Jindal An Empirical analysis of Web Navigation Prediction Techniques Mr. Oral

58 Oshin Sharma Energy Efficient Virtual Machine Consolidation for Cloud Data Centers Using Analytic Hierarchy Process Track-3: Decision Support Systems, E-Commerce, E-Government 02:30-04:00 PM Session 3, Lecture Theatre Session Chair Mr. Oral 133 Supreet Kanwal Impact of Organizational Culture and Process-Structure on Marketing Intelligence: Perspective of IT Professionals 33 Satish Sharma Innovative Health Services for Seniors 110 G. Singh Fuzzy Decision Support System to enhance Productivity in Indian Coal Mining Industry 101 Vipul Gupta E-Marketing Strategy for an E-Business Analysing tools and media for the development of an E-Marketing strategy 50 Sonu Rajak Distance and Bearing Based Vehicle Trajectory Segmentation 04:00-04:15 PM Tea Break Track-4: Hardware Design, Communication Networks, Multimedia Technologies 12:15-01:30 PM Session 4, Lecture Theatre Session Chair Mr. Oral 42 Vandana Shukla A Novel Approach for Reversible Realization of N-bit Arithmetic Circuit for Low Power Loss ALU Applications 112 Amit Kumar Gupta Design and Performance Evaluation of Smart Job First Multilevel Feedback Queue (SJFMLFQ) Scheduling Algorithm with Dynamic Smart Time Quantum 71 Madan Mohan Agarwal Design of Fuzzy Controlled Routing Protocol to Save Energy in Ad Hoc Networks 15 Manali Chandani A Survey on Synchronization Approach in MAC Layer Protocols 125 Lalit Garg Dwell-Free Eye-Driven Typing: A review of literature Track-5: Engineering Management and Decision Support Systems 04:15-05:45 PM Session 5, Lecture Theatre Session Chair Mr. Skype 123 Lalit Garg Assessment in e-learning for Higher Education 88 Joseph Bonello Manufacturing Production Line Modelling and Classification of associated NP- Hard problems 114 Irappa Basappa Hunagund Plant Layout of Manufacturing Firm - A Case Study

12 Syed Ali Fathima S J Augmented Reality using Natural User Interface Based Physical Therapy Rehabilitation Framework with Mobile Decision Support System - A Global Solution for Remote Assistance 116 Gianpaolo Tomaselli A Review of Corporate Social Responsibility Application in the Healthcare Sector Track-6: Multimedia and Graphics Technologies 04:15-05:45 PM Session 6, Lecture Theatre Session Chair Oral 87 Sandeep Kumar Sharma OTCA Approach towards Blurred Image Feature Estimation and Enrichment 67 Neha Gopaliya Discrete Transform Based Image Fusion: A Review 64 Shiven Goyal, Poonam Sarda Image Fusion Based On Optimization Technique 108 Sugandha Agarwal Image Quality Improvement Using Shift Variant and Shift Invariant Based Wavelet Transform Methods- A Novel Approach 3 Sunita Kumari A review of RGB-D Sensor Calibration for Human Activity Recognition IST Day 2, Thursday, 29 Dec 2016 Track-7 Data Mining, Software Engineering and Business Intelligence 09:00-10:30 AM Session 7, Lecture Theatre Session Chair Mr. Oral 49 Megha Sharma Density- Based Clustering for Mixed Data 60 Nisha Comparison between Hierarchical and Graph Clustering method 137 Santosh Singh Evaluation of Neural Network Architectures for Lung Abnormality Classification 32 Satish Sharma Accumulative Software Development 19 Mehfooza. M Model on Quantifying Coastal data using Path Analysis to infer the Cause and Effect of the Pollutant Parameters 70 Supreet Kanwal The Role of Marketing Intelligence in Brand Positioning: Perspective of Marketing Professionals Track-8:Communication Networks, Data Mining, Decision Support Systems 09:00-10:30 AM Session 8, Lecture Theatre Session Chair Mr. Skype 55 Geetanjali Rathee Secure Modified Ad hoc On-demand Distance Vector (MAODV) routing protocol 02 Mamata Rath MAQ : A Mobile Agent Based Quality of Service Platform for Manets

90 Divya Agrawal Improving Classification Accuracy on Imbalanced Data by Ensembling Technique 84 Gianpaolo Tomaselli Healthcare Systems and Corporate Social Responsibility Communication: A Comparative Analysis between Malta and India 99 Dharmendra Sharma The determinants of Mobile Cloud Computing adoption by Financial Services Firms in Fiji Track-9 Cryptography and Information Security 09:00-10:30 AM Session 9, Lecture Theatre Session Chair Mr. Oral 98 Prerna Mohit Modification of Traditional RSA into Symmetric-RSA Cryptosystems 39 Sadanand Yadav A New Cryptographic Method for Image Encryption 4 Daya Sagar Gupta A Secure Cloud Storage using ECC-Based Homomorphic Encryption 25 Karan Singh Secure and Reliable Data Delivery Mechanism 26 Sugandha Agarwal Biometric Image Security Using Chaos Algorithm 10:30-12:00 Noon Keynote -3 by Mr. Hirdesh Singhal Lecture Theatre (Skype) 12:00-12:15 PM Tea Break Track-10: Hardware Design, Network Protocols, Cloud Computing 04:15-05:45 PM Session 10, Lecture Theatre Session Chair Mr. Oral 86 Vandana Shukla An Efficient Approach to Design a Low Power Loss Circuit for 2:4 Decoder with Reversible Logic 62 Manali Chandnani Node Synchronization Approach to Access CSMA/CA Channel 13 Vivek Jain Implement Multichannel Fractional Sample Rate Convertor using Genetic Algorithm 83 Priti Sharma Activity Scheduling Protocol for Energy Saving in Heterogeneous Wireless Sensor Networks 44 Jitendra Kumar Verma Resource Request Based Energy Efficient Heuristic for Server Offloading in Cloud Computing Environment Track-11: Cyber Security, Information Security 12:15-01:30 PM Session 11, Lecture Theatre Session Chair Mr. Skype 34 Regner Sabillon Cybersecurity Incident Handling and Incident Management 30 Hemraj Saini Mathematical Model for Cyber Attack in Computer Networking

89 Pratiksha Gautam A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security 106 Sudhanshu Maurya Secuity and Privacy Aspects of Mobile Cloud Computing using Quantum Cryptography Track-12: 5th Generation Mobile Data Technologies 12:15-01:30 PM Session 12, Lecture Theatre Session Chair Mr. Oral 24 Karan Singh Review of Security Features in Mobile Android System 118 Anjali Mathur Utility of Social Networking Tools Among Indians-An Anaytical Study 14 Somayya Madakam 5G Mobile Communication Technology: We Had Never Seen Her Ever Before 74 Ruchi Verma Crisis Management Using Centrality Measurement in Social Networks 01:30-02:30 PM Lunch at Central Lobby Track-13: Communication Networks & Protocols,Cloud Computing 02:30-04:00 PM Session 13, Lecture Theatre Session Chair Mr. Skype 22 Geetanjali Rathee Secure Buffer-based Routing Protocol for WMN 92 Keith Vassallo Mobile Language Learning: Providing tools that allow the asynchronous, casual and sometimes gamified learning of languages on mobile devices 52 Akashdeep Bhardwaj Efficient Fault Tolerance on Cloud Environments 27 Oshin Sharma Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment 23 Geetanjali Rathee Behavior Detection Mechanism of the Node against Black Hole Attack in Hierarchical Mesh Networks 04:00-04:30 PM Closing Ceremony at Lecture Theatre 04:30-05:00 PM Refreshment