Download Click here to Schedule of Presentation

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cluster analysis wikipedia , lookup

Nonlinear dimensionality reduction wikipedia , lookup

Expectation–maximization algorithm wikipedia , lookup

K-means clustering wikipedia , lookup

K-nearest neighbors algorithm wikipedia , lookup

Transcript
Tentative Schedule of AICTC -2016
Date - 12-08-2016
10.00 AM –10.30 AM
Breakfast
10.30 AM –12.15 PM
Inauguration
12.15 PM – 02.15 PM
Invited Talk and Session 1, Session 2, Session 3
02.15 PM – 03.00 PM
Lunch
03.00 PM – 05.00 PM
Invited Talk and Session 4, Session 5, Session 6
05.00 PM – 05.30 PM
High Tea
08.00 PM – 10.00 PM
Dinner
Date - 13-08-2016
10.00 AM –10.30 AM
Breakfast
10.30 AM –12.15 PM
Invited Talk and Session 7, Session 8, Session 9
12.15 PM – 02.15 PM
Valedictory
02.15 PM – 03.00 PM
Lunch
Date – 12-08-2016
Session – 1
Venue – Hall -1
Time – 12.15 pm to 2.15 PM
S.No Title
Paper
ID
206
1.
Transactional memory analysis using CSB+ trees
2.
34
4.
5.
6.
IPv6 Cryptographically Generated Address: Analysis and
Optimization
IMSS-E: An Intelligent Approach to Design of Adaptive Meta Search System for E
Commerce Website Ranking
Three-way decision based Defect Prediction for Object Oriented Software
Process Mining for Clinical Workflows
An Integrated Fiber-Cell-WiFi Architecture for 4G/5G Fixed-Mobile Convergence
7.
8.
Text Steganography Based on Feature Coding Method
A Content Based Image Retrieval using Color and Texture Features
187
62
9.
10.
11.
Hidden Markov Model Implementation for Prediction of Stock Prices with TF-IDF features
MULTI-DOMAIN IMAGE ENCRYPTION USING CHAOTIC MAP WITH DRPE
Abnormality Detecting Deep Belief Network
128
326
147
12.
Affinity Propagation-driven Multiple Weighted Clustering in MANETs
44
3.
260
308
342
47
Date – 12-08-2016
Session – 2
Venue – Hall - 2
Time – 12.15 pm to 2.15 PM
S.No Title
1.
Fast Three Level DNA Cryptographic Technique to Provide Better Security
Paper
ID
182
2.
3.
4.
A Methodology for Multiple Fault Handling in QoS Based Service Oriented Architecture
HTTP Flood Attack Detection using Ontology
Web Service Selection using Semantic Matching
36
352
253
5.
A systolic array architecture for morphological operators using arbitrary structuring
elements
219
6.
An Effective reduction of Gait Recognition Time by using Gender Classification
191
7.
Cryptanalysis and Improvement of a Certificateless Short Signature Scheme using
Bilinear Pairing
Impact of Snow Avalanche on Vegetation Area Using Remote Sensing Data
Breast Cancer Detection using Intuitionistic Fuzzy Histogram Hyperbolization and
Possibilitic Fuzzy c-mean Clustering algorithms with texture feature based Classification
on Mammography Images
Performance Analysis of Cache Coherence Protocols for Multi-core Architectures : A
System Attribute Perspective
Effect of Activation Function Symmetry on Training of SFANNs with RPROP Algorithm
281
Cluster based template generation for fast and secure fingerprint matching
Techno-innovative solution in the form of neural expert system to address the problem
of high attrition rate
138
362
8.
9.
10.
11.
12.
13
48
200
292
160
Date – 12-08-2016
Session – 3
Venue – Hall -3
Time – 12.15 pm to 2.15 PM
S.No Title
1.
Optimization of Cloud Resources for Air Pollution Monitoring Devices
Paper
ID
245
2.
A Novel Hybrid Ant Colony Optimization Approach to Terminal Assignment Problem
314
3.
Land-Sea Classification using Machine Learning Technique for SCATTEROMETER L1B
Globe
149
4.
Rationale of Class and Feature size on Face Recognition
273
5.
An Empirical Study on Fault Prediction using Token-Based Approach
54
6.
A Congestion Detection System Using Optical Flow and Standard Deviation in Mass
Gathering
241
7.
Combining Synthetic Minority Oversampling Technique And Subset Feature Selection
Technique For Class Imbalance Problem
295
8.
9.
A review & impact of Trust Schemes in MANET
Scrutable Algorithm for Enhancing the Efficiency of Recommender System using Fuzzy
Decision Tree
Optimal Ranking-based Discovery and Selection of WMAT using Information Service of
IEEE 802.21 in Mobile Wireless Heterogeneous Networks
13
250
11.
Analysis and Measurement of Medical Image Defects through the Reliability Computing
of Image data
269
12.
A Boolean Expression based Template Matching Technique for Optical Circuit
Generation
81
10.
305
Date – 12-08-2016
Session – 4
Venue – Hall - 1
Time – 3.00 pm to 5.00 PM
S.No Title
1.
2.
3.
4.
A NOVEL SCHEME FOR DATA SECURITY IN CLOUD COMPUTING USING QUANTUM
CRYPTOGRAPHY
Mapping Hindi Text To Indian sign language with Extension Using Wordnet
Empirical analysis of Machine Learning Techniques for context aware Recommender
Systems in the environment of IoT
Median Edge Detector for Lossless Video Coding
Paper
ID
135
257
301
223
5.
Reliable Approach to Address Broadcast Storm & Hidden Terminal Problem in Multihop
Wireless Sensor Network for Image Dissemination
119
6.
A Security based Architecture using Kerberos and PGP
279
7.
DCCSR: Document Clustering by Conceptual and Semantic Relevance as Factors of
Unsupervised Learning
53
8.
Reputation System Based On Message Dissemination in VANET
228
9.
Genetic Algorithm with Mixed Crossover approach for Travelling Salesman Problem
196
10.
11.
Dynamic Structure for Web Graphs with Extended Functionalities
Design and Modeling of PLL based 1GHz Frequency Synthesizer using 0.35µm SiGe
BiCMOS Process
39
225
12.
A More Private & Secure E-Mail System using Image Steganography (EPS) and Data
Mining
333
13
Age, Gender and Racial Effects on Electrocardiographic Parameters
358
Date – 12-08-2016
Session – 5
Venue – Hall - 2
Time – 3.00 pm to 5.00 PM
S.No Title
1.
Deniable Encryption using One Time Pads
Paper
ID
59
2.
Improved Soar’s Intelligent Agents
17
3.
Parallelization of Vertical Search Engine using Hadoop and MapReduce
210
4.
Efficient Power Aware AODV Routing Protocol in MANET
136
5.
A SURVEY ON SENTIMENT ANALYSIS AND OPINION MINING
108
6.
A MODIFIED RSA APPROACHFOR ENCRYPTING AND DECRYPTING TEXT AND IMAGES
USING MULTI- POWER, MULTI PUBLIC KEYS, MULTI PRIME NUMBERS AND K-NEAREST
NEIGHBOR ALGORITHM
188
7.
Encoding of Color Images in DWT domain using FrFT
268
8.
A Proposed framework for improved identification of implicit aspects in tourism domain
using supervised learning technique
122
9.
Energy Efficient Dynamic Algorithm for Centralize Controller
83
10.
Automatic Vehicle Detection Using Various Object Detecting Algorithm and
Thresholding
Overcome the interference between Si rods based Add Drop Filter using Twodimensional PCRR
Design of New Multi Keyword Ranked Search Scheme and Validation for Cloud
Computing
Forecasting stock market movements using various kernels functions in Support Vector
Machine
363
11.
12.
13
364
170
286
Date – 12-08-2016
Session – 6
Venue – Hall - 2
Time – 3.00 pm to 5.00 PM
S.No Title
1.
Reversible Data Hiding Scheme for LZW Codes using LSB Flipping Strategy
Paper
ID
100
2.
An approach to Ternary logic gates using FinFET
276
3.
Energy Efficient Approach of Route Selection for Dynamic Source Routing Protocol in
MANET
221
4.
ECG analysis with signal classification using Decision Tree Induction (DTI)
354
5.
Classification of Plant Leaf Diseases Using Gradient And Texture Feature Set
355
6.
Secure and Efficient Regression Analysis Outsourcing Algorithm for Cloud Server
134
7.
8.
SDN Control Plane Security in Cloud Computing Against DDoS Attack
Identification and ranking of key persons in a Social Networking Website using Hadoop
& Big Data Analytics
255
80
9.
Summarization Techniques of Cloud Computing
242
10.
SearchAutomaton: Searching mechanism for multi-format data by combining indexing
tools and techniques
207
11.
An Antenna Array of Coplanar Monopole Antenna for RF Energy Harvesting Application
337
12.
Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm
291
13
Smart Handoff Framework for Next generation Heterogeneous Networks in smart
Cities
38
Date – 13-08-2016
Session – 7
Venue – Hall - 1
Time – 10.30 AM to 12.30 PM
S.No Title
Paper
ID
213
1.
Multi-agent Web Service Composition using Partially Observable Markov Decision
Process
2.
Proposed SKYMAX Load balancing Algorithm
209
3.
An Enhanced Hybrid Approach for Reducing Downtime, Cost and Power Consumption
of Live VM Migration
319
4.
Perceptive Proposition of Combined Boosted Algorithm for Brain Tumor Segmentation
230
5.
An automation framework for configuration management to reduce manual
intervention
335
6
DESIGN & COMPARISON A SIMPLE EDGE-FED PATCH ANTENNA WITH DIFFERENT
SUBSTRATES USING IE3D
357
7.
Systematic Mapping Study of Metrics based Clone Detection Techniques
320
8.
Spin-offs in Indian Stock Market owing to Twitter Sentiments, Commodity Prices and
Analyst Recommendations
235
9.
Computer Vision Based Overlapped Flowers Detection
145
10.
Optimizing VM provisioning of map reduce tasks on Public Clouds
328
11.
12.
Managing Queue Service Pattern for CAM Broadcast in Vehicular Adhoc Network
Hindi Word Sense Disambiguation Using Lesk Approach on Bigram and Trigram Words
204
359
13
Protein Sequence Structure Prediction Using Artificial Intelligent Techniques
360
Date – 13-08-2016
Session – 8
Venue – Hall - 2
Time – 10.30 AM to 12.30 PM
S.No Title
Paper
ID
343
1.
Cost Aware Load Balanced Task Scheduling with Active VM Load Evaluation
2.
Tweet Sentiment Analyzer: Sentiment Score Estimation Method for Assessing the
Value of Opinions in Tweets
154
3.
Secure Dsr Routing Protocol Based on Homomorphic Digital signature
115
4.
A Novel Technique of Implementing Bidirectional Point Coordination Function for
Voice Traffic in WLAN
158
5.
Topic Extraction and Sentiment Classification by using Latent Dirichlet Markov
Allocation and Senti Word Net
325
6.
Breast Thermo grams Analysis for Cancer Detection Using Feature Extraction and Data
Mining Technique
234
7.
Attribute Analysis using Fuzzy Association Rules and Interestingness Measures
155
8.
Automatic Email Response in E-learning
263
9.
Potent Cloud Services Utilization with Efficient Revised Rough Set Optimization Service
Parameters
20
10.
Analysis of users’ comments on political portal for extraction of suggestions and
opinion mining
310
11.
Hierarchical Cluster Analysis On Security Design Patterns
201
12.
Region Based Blind Watermarking Scheme for Digital Images in Wavelet Domain
244
13
Analysis of Spatial and Temporal Data Using Remote Sensing Technology
353
Date – 13-08-2016
Session – 9
Venue – Hall - 3
Time – 10.30 AM to 12.30 PM
S.No Title
1.
Two Factor Authentication for Cloud Machine Deletion
Paper
ID
95
2.
An Approach to Tackle Road Traffic Using Number Plate
107
3.
RSJ Approach for User Authentication
150
4.
A Feature Based Approach for Medical Databases
132
5.
Energy Efficient Approach for Intrusion Detection System for WSN by applying Optimal
Clustering and Genetic Algorithm
220
6.
Implementation of Costing Model for High Performance Computing as a Services on the 243
Cloud Environment
7.
No load Robustness Analysis of AI Based Controllers & Estimators for SRM Drive
356
8.
Identification of informal settlement using Remote Sensing Images
256
9.
Auto-Evolving Clusters based on Rejection and Migration
351
10.
An Approach for Personalized Web Information Retrieval using Modified Page Rank
Method
199
11.
Proposing a method for Skype Forensic- preserving data evidences to present in front
of court of law
240
12.
A More Private & Secure E-Mail System using Image Steganography (EPS) and Data
Mining
333