Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Tentative Schedule of AICTC -2016 Date - 12-08-2016 10.00 AM –10.30 AM Breakfast 10.30 AM –12.15 PM Inauguration 12.15 PM – 02.15 PM Invited Talk and Session 1, Session 2, Session 3 02.15 PM – 03.00 PM Lunch 03.00 PM – 05.00 PM Invited Talk and Session 4, Session 5, Session 6 05.00 PM – 05.30 PM High Tea 08.00 PM – 10.00 PM Dinner Date - 13-08-2016 10.00 AM –10.30 AM Breakfast 10.30 AM –12.15 PM Invited Talk and Session 7, Session 8, Session 9 12.15 PM – 02.15 PM Valedictory 02.15 PM – 03.00 PM Lunch Date – 12-08-2016 Session – 1 Venue – Hall -1 Time – 12.15 pm to 2.15 PM S.No Title Paper ID 206 1. Transactional memory analysis using CSB+ trees 2. 34 4. 5. 6. IPv6 Cryptographically Generated Address: Analysis and Optimization IMSS-E: An Intelligent Approach to Design of Adaptive Meta Search System for E Commerce Website Ranking Three-way decision based Defect Prediction for Object Oriented Software Process Mining for Clinical Workflows An Integrated Fiber-Cell-WiFi Architecture for 4G/5G Fixed-Mobile Convergence 7. 8. Text Steganography Based on Feature Coding Method A Content Based Image Retrieval using Color and Texture Features 187 62 9. 10. 11. Hidden Markov Model Implementation for Prediction of Stock Prices with TF-IDF features MULTI-DOMAIN IMAGE ENCRYPTION USING CHAOTIC MAP WITH DRPE Abnormality Detecting Deep Belief Network 128 326 147 12. Affinity Propagation-driven Multiple Weighted Clustering in MANETs 44 3. 260 308 342 47 Date – 12-08-2016 Session – 2 Venue – Hall - 2 Time – 12.15 pm to 2.15 PM S.No Title 1. Fast Three Level DNA Cryptographic Technique to Provide Better Security Paper ID 182 2. 3. 4. A Methodology for Multiple Fault Handling in QoS Based Service Oriented Architecture HTTP Flood Attack Detection using Ontology Web Service Selection using Semantic Matching 36 352 253 5. A systolic array architecture for morphological operators using arbitrary structuring elements 219 6. An Effective reduction of Gait Recognition Time by using Gender Classification 191 7. Cryptanalysis and Improvement of a Certificateless Short Signature Scheme using Bilinear Pairing Impact of Snow Avalanche on Vegetation Area Using Remote Sensing Data Breast Cancer Detection using Intuitionistic Fuzzy Histogram Hyperbolization and Possibilitic Fuzzy c-mean Clustering algorithms with texture feature based Classification on Mammography Images Performance Analysis of Cache Coherence Protocols for Multi-core Architectures : A System Attribute Perspective Effect of Activation Function Symmetry on Training of SFANNs with RPROP Algorithm 281 Cluster based template generation for fast and secure fingerprint matching Techno-innovative solution in the form of neural expert system to address the problem of high attrition rate 138 362 8. 9. 10. 11. 12. 13 48 200 292 160 Date – 12-08-2016 Session – 3 Venue – Hall -3 Time – 12.15 pm to 2.15 PM S.No Title 1. Optimization of Cloud Resources for Air Pollution Monitoring Devices Paper ID 245 2. A Novel Hybrid Ant Colony Optimization Approach to Terminal Assignment Problem 314 3. Land-Sea Classification using Machine Learning Technique for SCATTEROMETER L1B Globe 149 4. Rationale of Class and Feature size on Face Recognition 273 5. An Empirical Study on Fault Prediction using Token-Based Approach 54 6. A Congestion Detection System Using Optical Flow and Standard Deviation in Mass Gathering 241 7. Combining Synthetic Minority Oversampling Technique And Subset Feature Selection Technique For Class Imbalance Problem 295 8. 9. A review & impact of Trust Schemes in MANET Scrutable Algorithm for Enhancing the Efficiency of Recommender System using Fuzzy Decision Tree Optimal Ranking-based Discovery and Selection of WMAT using Information Service of IEEE 802.21 in Mobile Wireless Heterogeneous Networks 13 250 11. Analysis and Measurement of Medical Image Defects through the Reliability Computing of Image data 269 12. A Boolean Expression based Template Matching Technique for Optical Circuit Generation 81 10. 305 Date – 12-08-2016 Session – 4 Venue – Hall - 1 Time – 3.00 pm to 5.00 PM S.No Title 1. 2. 3. 4. A NOVEL SCHEME FOR DATA SECURITY IN CLOUD COMPUTING USING QUANTUM CRYPTOGRAPHY Mapping Hindi Text To Indian sign language with Extension Using Wordnet Empirical analysis of Machine Learning Techniques for context aware Recommender Systems in the environment of IoT Median Edge Detector for Lossless Video Coding Paper ID 135 257 301 223 5. Reliable Approach to Address Broadcast Storm & Hidden Terminal Problem in Multihop Wireless Sensor Network for Image Dissemination 119 6. A Security based Architecture using Kerberos and PGP 279 7. DCCSR: Document Clustering by Conceptual and Semantic Relevance as Factors of Unsupervised Learning 53 8. Reputation System Based On Message Dissemination in VANET 228 9. Genetic Algorithm with Mixed Crossover approach for Travelling Salesman Problem 196 10. 11. Dynamic Structure for Web Graphs with Extended Functionalities Design and Modeling of PLL based 1GHz Frequency Synthesizer using 0.35µm SiGe BiCMOS Process 39 225 12. A More Private & Secure E-Mail System using Image Steganography (EPS) and Data Mining 333 13 Age, Gender and Racial Effects on Electrocardiographic Parameters 358 Date – 12-08-2016 Session – 5 Venue – Hall - 2 Time – 3.00 pm to 5.00 PM S.No Title 1. Deniable Encryption using One Time Pads Paper ID 59 2. Improved Soar’s Intelligent Agents 17 3. Parallelization of Vertical Search Engine using Hadoop and MapReduce 210 4. Efficient Power Aware AODV Routing Protocol in MANET 136 5. A SURVEY ON SENTIMENT ANALYSIS AND OPINION MINING 108 6. A MODIFIED RSA APPROACHFOR ENCRYPTING AND DECRYPTING TEXT AND IMAGES USING MULTI- POWER, MULTI PUBLIC KEYS, MULTI PRIME NUMBERS AND K-NEAREST NEIGHBOR ALGORITHM 188 7. Encoding of Color Images in DWT domain using FrFT 268 8. A Proposed framework for improved identification of implicit aspects in tourism domain using supervised learning technique 122 9. Energy Efficient Dynamic Algorithm for Centralize Controller 83 10. Automatic Vehicle Detection Using Various Object Detecting Algorithm and Thresholding Overcome the interference between Si rods based Add Drop Filter using Twodimensional PCRR Design of New Multi Keyword Ranked Search Scheme and Validation for Cloud Computing Forecasting stock market movements using various kernels functions in Support Vector Machine 363 11. 12. 13 364 170 286 Date – 12-08-2016 Session – 6 Venue – Hall - 2 Time – 3.00 pm to 5.00 PM S.No Title 1. Reversible Data Hiding Scheme for LZW Codes using LSB Flipping Strategy Paper ID 100 2. An approach to Ternary logic gates using FinFET 276 3. Energy Efficient Approach of Route Selection for Dynamic Source Routing Protocol in MANET 221 4. ECG analysis with signal classification using Decision Tree Induction (DTI) 354 5. Classification of Plant Leaf Diseases Using Gradient And Texture Feature Set 355 6. Secure and Efficient Regression Analysis Outsourcing Algorithm for Cloud Server 134 7. 8. SDN Control Plane Security in Cloud Computing Against DDoS Attack Identification and ranking of key persons in a Social Networking Website using Hadoop & Big Data Analytics 255 80 9. Summarization Techniques of Cloud Computing 242 10. SearchAutomaton: Searching mechanism for multi-format data by combining indexing tools and techniques 207 11. An Antenna Array of Coplanar Monopole Antenna for RF Energy Harvesting Application 337 12. Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm 291 13 Smart Handoff Framework for Next generation Heterogeneous Networks in smart Cities 38 Date – 13-08-2016 Session – 7 Venue – Hall - 1 Time – 10.30 AM to 12.30 PM S.No Title Paper ID 213 1. Multi-agent Web Service Composition using Partially Observable Markov Decision Process 2. Proposed SKYMAX Load balancing Algorithm 209 3. An Enhanced Hybrid Approach for Reducing Downtime, Cost and Power Consumption of Live VM Migration 319 4. Perceptive Proposition of Combined Boosted Algorithm for Brain Tumor Segmentation 230 5. An automation framework for configuration management to reduce manual intervention 335 6 DESIGN & COMPARISON A SIMPLE EDGE-FED PATCH ANTENNA WITH DIFFERENT SUBSTRATES USING IE3D 357 7. Systematic Mapping Study of Metrics based Clone Detection Techniques 320 8. Spin-offs in Indian Stock Market owing to Twitter Sentiments, Commodity Prices and Analyst Recommendations 235 9. Computer Vision Based Overlapped Flowers Detection 145 10. Optimizing VM provisioning of map reduce tasks on Public Clouds 328 11. 12. Managing Queue Service Pattern for CAM Broadcast in Vehicular Adhoc Network Hindi Word Sense Disambiguation Using Lesk Approach on Bigram and Trigram Words 204 359 13 Protein Sequence Structure Prediction Using Artificial Intelligent Techniques 360 Date – 13-08-2016 Session – 8 Venue – Hall - 2 Time – 10.30 AM to 12.30 PM S.No Title Paper ID 343 1. Cost Aware Load Balanced Task Scheduling with Active VM Load Evaluation 2. Tweet Sentiment Analyzer: Sentiment Score Estimation Method for Assessing the Value of Opinions in Tweets 154 3. Secure Dsr Routing Protocol Based on Homomorphic Digital signature 115 4. A Novel Technique of Implementing Bidirectional Point Coordination Function for Voice Traffic in WLAN 158 5. Topic Extraction and Sentiment Classification by using Latent Dirichlet Markov Allocation and Senti Word Net 325 6. Breast Thermo grams Analysis for Cancer Detection Using Feature Extraction and Data Mining Technique 234 7. Attribute Analysis using Fuzzy Association Rules and Interestingness Measures 155 8. Automatic Email Response in E-learning 263 9. Potent Cloud Services Utilization with Efficient Revised Rough Set Optimization Service Parameters 20 10. Analysis of users’ comments on political portal for extraction of suggestions and opinion mining 310 11. Hierarchical Cluster Analysis On Security Design Patterns 201 12. Region Based Blind Watermarking Scheme for Digital Images in Wavelet Domain 244 13 Analysis of Spatial and Temporal Data Using Remote Sensing Technology 353 Date – 13-08-2016 Session – 9 Venue – Hall - 3 Time – 10.30 AM to 12.30 PM S.No Title 1. Two Factor Authentication for Cloud Machine Deletion Paper ID 95 2. An Approach to Tackle Road Traffic Using Number Plate 107 3. RSJ Approach for User Authentication 150 4. A Feature Based Approach for Medical Databases 132 5. Energy Efficient Approach for Intrusion Detection System for WSN by applying Optimal Clustering and Genetic Algorithm 220 6. Implementation of Costing Model for High Performance Computing as a Services on the 243 Cloud Environment 7. No load Robustness Analysis of AI Based Controllers & Estimators for SRM Drive 356 8. Identification of informal settlement using Remote Sensing Images 256 9. Auto-Evolving Clusters based on Rejection and Migration 351 10. An Approach for Personalized Web Information Retrieval using Modified Page Rank Method 199 11. Proposing a method for Skype Forensic- preserving data evidences to present in front of court of law 240 12. A More Private & Secure E-Mail System using Image Steganography (EPS) and Data Mining 333