Detailed Schedule
Technical Session-1: |
|||||
January 11, Friday |
Time: 12.00 PM-1.30 PM |
||||
Key Note Address: 1 |
|||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251262 |
Key Pre-Distribution in a Non-Uniform Network Using Combinatorial Design |
Sarbari Mitra and Sourav Mukhopadhyay |
|||
251285 |
Carrier Aggregation for Enhancement of Bandwidth in 4G Systems |
Jolly Parikh, Anuradha Basu |
|||
251305 |
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA |
Rajesh Duvvuru1, Sunil Kumar Singh, G. Narasimha Rao, Ashok Kote, B.Bala Krishna and M. Vijaya Raju |
|||
251308 |
HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks |
Tamoghna Ojha and Sudip Misra |
|||
251314 |
FLAME: a Flexible and Low-power Architecture for Wireless Mesh Networks |
Seyed Dawood Sajjadi Torshizi, Sadra Mohammadalian, Fazirulhisyam Hashim and S. Shamala |
|||
251317 |
SEP-E (RCH): Enhanced Stable Election Protocol based on Redundant Cluster Head Selection for HWSNs |
Raju Pal, Ritu Sindhu, and Ajay K Sharma |
|||
|
|
|
|||
Technical Session-2: |
|||||
January 11, Friday |
Time: 12.00 PM-1.30 PM |
||||
Key Note Address 2 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251261 |
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System |
Dr. Sourav Mukhopadhyay and Dheerendra Mishra |
|||
251292 |
Improved proxy signature scheme without bilinear pairings |
Sahadeo Padhye and Namita Tiwari |
|||
251294 |
Filtering Nonlinear Feedback Shift Register using Welch-Gong Transformations for Securing RFID Applications |
Kalikinkar Mandal and Guang Gong |
|||
251315 |
An Efficient and Secure Micro-Payment Transaction using Imbricate Cryptography |
Mayank Tiwari, Priyanshu Saxena, Pankaj Sharma, Shaviya Jindal and Rajeshwar Kumar |
|||
251327 |
Analysis and Improvement of an Authentication Scheme using Smart Cards |
Sonam Devgan and Amit Kumar |
|||
251329 |
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes |
Karanbir Singh, NavdeepKaur and Deepa Nehra |
|||
|
|
|
|||
Technical Session-3: |
|||||
January 11, Friday |
Time: 2.30 PM-4.00 PM |
||||
Key Note Address: 3 |
|
||||
: |
|||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251320 |
Clusterhead Selection using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks |
Puneet Azad and Vidushi Sharma |
|||
251321 |
A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc Networks |
Anubhuti Roda Mohindra and Charu |
|||
251328 |
The Outage Analysis of Inter-Relay Coded Cooperation over Nakagami-m Fading Channels |
Prabhat Kumar Sharma and Parul Garg |
|||
251364 |
A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor Networks |
Manish Kumar, Itika Gupta ,Sudarshan Tiwari, Rajeev Tripathi |
|||
251373 |
Fault tolerant range grouping routing in Dynamic Networks |
Akanksha Bhardwaj, Prachi Badera, K.Rajalakshmi |
|||
251387 |
Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter |
Rajeev Agrawal, Amit Sehgal |
|||
|
|
|
|||
Technical Session-4: |
|||||
January 11, Friday |
Time: 2.30 PM-4.00 PM |
||||
Key Note Address: 4 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251330 |
On Generalized Nega-Hadamard Transform |
Aditi Gangopadhya and Ankita Chaturvedi |
|||
251372 |
A Novel Framework For Users’ Accountability On Online Social Networks |
Mohit Gambhir and M.N.Doja |
|||
251375 |
Feature and Future of Visual Cryptography based Schemes |
Dhiraj Pandey , Anil Kumar and Yudhvir Singh |
|||
251377 |
Trust Management Method for Vehicular Ad-Hoc Networks |
Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani |
|||
251380 |
Design of an Edge Detection based Image Steganography with High Embedding Capacity |
Tarok Pramanik andArup Kumar Pal |
|||
251381 |
On Second-order Nonlinearities of Two Classes of Cubic Boolean Functions |
Deep Singh and Maheshanand Bhaintwal |
|||
|
|
|
|||
Technical Session-5: |
|||||
January 11, Friday |
Time: 4.15 PM-5.45 PM |
||||
Key Note Address: 5 |
|
||||
|
|||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251388 |
Performance analysis of smac protocol In wireless sensor networks using Network simulator (ns-2) |
Gayatri Sakya, Vidushi Sharma |
|||
251393 |
Wireless sensor node placement due to power loss effects from surrounding vegetation |
Babu Sena Paul and Suvendi Rimer |
|||
251400 |
Mobile Based Attendance System In Distributed LAN Server |
B.K. Gupta, S.C.Sharma., Jyothi Sethi |
|||
251402 |
Deployment of Sensors in Regular Terrain in form of Interconnected WSN units |
Arup Kr. Chattopadhyay, Chandan Kr. Bhattacharyya |
|||
251408 |
Routing Protocols In Mobile Ad-Hoc Network: A Review |
Bahuguna Renu , Mandoria Hardwari lal , Tayal Pranavi |
|||
251412 |
Mobility based Energy Efficient Coverage Hole Maintenance for Wireless Sensor Network |
Anil Kumar Sagar and D.K. Lobiyal |
|||
|
|
|
|||
Technical Session-6: |
|||||
January 11, Friday |
Time: 4.15 PM-5.45 PM |
||||
Key Note Address: 6 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251389 |
Design of High Performance MIPS Cryptography Processor |
Kirat Pal Singh, Shivani Parmar and Dilip Kumar |
|||
251397 |
GAS: A Novel Grid Based Authentication System |
Narayan Gowraj, Srinivas Avireddy and Sruthi Prabhu |
|||
251403 |
Multiplicative Watermarking of Audio in Spectral Domain |
Parul Garg and Jyotsna Singh |
|||
251404 |
Image Secret Sharing in Stego-images with Authentication |
Sushanta Biswas , Debasree Sarkar and Partha Pratim Sarkar |
|||
251407 |
Secret Image Sharing Scheme Based On Pixel Replacement |
Tapasi Bhattacharjee and Jyoti Prakash Singh |
|||
251409 |
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks |
Adarsh Kumar, Krishna Gopal and Alok Aggarwal |
|||
|
|
|
|||
Technical Session-7: |
|||||||
January 11, Saturday |
Time: 6.00PM-7.30PM |
||||||
Key Note Address: 7 |
|
||||||
|
|||||||
Paper Id. |
Topic Name |
Author |
|||||
251416 |
3-Tier Heterogeneous Network model for Increasing Lifetime in Three Dimensional WSNs |
Samayveer Singh, Satish Chand, and Bijendra Kumar |
|||||
251445 |
Power Efficient MAC Protocol for Mobile Ad Hoc Networks |
Sohan Kumar Yadav, D. K. Lobiyal |
|||||
251450 |
Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks |
Chandan Kumar Sonkar, Om Prakash Sangwan and Arun Mani Tripathi |
|||||
251455 |
Security Improvement in Group Key Management |
Manisha Manju, Rakesh Kumar, Rajesh Mishra |
|||||
251457 |
Integrated Approach for Multicast Source Authentication and Congestion Control |
Karan Singh and Rama Shankar Yadav |
|||||
|
|
|
|||||
|
|
|
|||||
Technical Session-8: |
||||
January 11, Saturday |
Time: 6.00PM-7.30PM |
|||
Key Note Address: 8 |
|
|||
|
||||
Paper Id. |
Topic Name |
Author |
||
251420 |
NTTM: Novel Transmission Time based Mechanism to Detect Wormhole Attack |
D.K.Lobiyal, Kumar Chanchal |
||
251422 |
Enhanced Block Playfair Cipher |
Arvind Kumar, Pawan Singh Mehra, Gagan Gupta and Manika Sharma |
||
251423 |
A review on remote user authentication schemes using smart cards |
Keerti Srivastava, Amit K Awasthi and RC Mittal |
||
251425 |
A Proposal for SMS Security Using NTRU Cryptosystem |
Ashok Kumar and Lalit Kumar |
||
251429 |
A Privacy Preserving Representation for Web Service Communicator’s in the Cloud |
D.Chandramohan,T.Vengattaraman, D.Rajaguru , R.Baskaran and P.Dhavachelvan |
||
251441 |
Ciphertext-Policy Attribute-Based Encryption with User Revocation support |
Balu Chettiyar |
||
|
|
|
||
Technical Session-9: |
|||||
January 12, Saturday |
Time: 10.15AM-11.45AM |
||||
Key Note Address: 9 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251448 |
Protecting PLM Data throughout their lifecycle |
Rohit Ranchal and Bharat Bhargava |
|||
251456 |
Detailed Dominant Approach Cloud Computing Integration With WSN |
Niranjan Lal, Shamimul Qamar and Mayank Singh |
|||
251370 |
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration |
Pritom Rajkhowa,Shyamanta M Hazarika and Guillermo R Simari |
|||
251359 |
Threats and Challenges to Security of Electronic Health Records |
Shalini Bhartiya and Deepti Mehrotra |
|||
251304 |
Network Security using ECC with Biometric |
Dindayal Mahto and Dilip Kumar Yadav |
|||
251303 |
Hybrid Key Management Technique for WSNs |
Ravi Kishore Kodali and Sushant K Chougule |
|||
|
|
|
|||
Technical Session-10: |
|||||
January 12, Saturday |
Time: 10.15AM-11.45AM |
||||
Key Note Address: 10 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251300 |
WG-8: A Lightweight Stream Cipher for Resource- Constrained Smart Devices |
Xinxin Fan, Kalikinkar Mandal and Guang Gong |
|||
251298 |
DRMWSN-Detecting Replica nodes using Multiple identities in Wireless Sensor Network |
Ambika Nagaraj |
|||
251334 |
Performance Analysis of Cryptographic Acceleration in Multicore Environment |
Yashpal Dutta and Varun Sethi |
|||
251324 |
A Review on Wireless Network Security |
Sandeep Sharma, Rajesh Mishra and Karan Singh |
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
Technical Session-11: |
|||||
January 12, Saturday |
Time:12.00 PM-1.30 PM |
||||
Key Note Address: 11 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251385 |
Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power Filter |
Ajay Kumar Mauryaa, Yogesh K Chauhana |
|||
251449 |
Classi_cation of Speech Dysuencies using Speech Parameterization Techniques and Multiclass SVM |
P Mahesha and D S Vinod |
|||
251444 |
Fuzzy approach for Image Near -Duplicate detection using gray level vertex matching in Attribute Relational Bipartite Graphs |
Goutam Datta, B.L.Raina |
|||
251424 |
Wavelet analysis of electrical signals From brain–the electroenceplograms |
Rohtash Dhiman, Dr. Priyanka, Dr. J.S. Saini |
|||
251419 |
An Improved Method for Contrast Enhancement of Real World Hyperspectral Images |
Shyam Lal, Rahul Kumar and Mahesh Chandra |
|||
251418 |
Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection |
Asutosh Kar, Mahesh Chandra |
|||
|
|
|
|||
Technical Session-12: |
|||||
January 12, Saturday |
Time: 12.00 PM-1.30 PM |
||||
Key Note Address: 12 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251458 |
Increasing the Reliability of Fuzzy Angle Oriented Cluster using Peer-to-Peer |
R.N.V.Jagan Mohan, Vegi Srinivas and Dr.K.Raja Sekhara Rao |
|||
251459 |
Wireless sensor node placement due to power loss effects from surrounding vegetation |
Paul, B. S. & Rimer, S |
|||
251451 |
Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability |
Mohd Ashraf and Rajesh Mishra |
|||
251415 |
Evaluation of Understandability of Object-Oriented Design |
Dr. Devpriya Soni |
|||
251291 |
Safety Analysis of Automatic Door Operation for Metro Train: A Case Study |
Ajeet Kumar Pandey, Srinivas Panchangam, Jessy George Smith |
|||
251394 |
Secure Real Time Scheduling on Cluster with Energy Minimization |
Rudra Pratap Ojha1 , Rama Shankar Yadav, Sarsij Tripathi |
|||
|
|
|
|||
Technical Session-13: |
|||||
January 12, Saturday |
Time: 2.30 PM-4.00 PM |
||||
Key Note Address: 13 |
|||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251417 |
Design of low power FSM using verilog in VLSI |
Himani Mittal ,Prof. Dinesh Chandra ,Dr. Arvind Tiwari Sampath Kr |
|||
251406 |
6H-SiC based Power VJFET and Its Temperature dependence |
Amir Khan, Mohd. Hasan, Anwar Sadat, Shamsuz Z. Usmani |
|||
251399 |
RoboGardner: A Low-Cost System with Automatic Plant Identification using Markers |
Reema Aswani, Hema N. |
|||
251395 |
Change Detection from Satellite Images using PNN |
Akansha Mehrotra, Krishna Kant Singh, Kirat Pal and M.J.Nigam |
|||
251371 |
Pruning search spaces of RATA model for the job-shop scheduling |
Farid Arfi , Jean-Michel Ilié , and Djamel-Eddine Saidouni |
|||
251367 |
Optimal Location and Size of Different Type of Distributed Generation with voltage Step Constraint and Mixed Load Models |
Rajendra P. Payasi, Asheesh K. Singh, and Devender Singh |
|||
251366 |
Simulation and modeling of a Constant voltage controller based solar powered water pumping system |
Bhavnesh Kumar, Yogesh K Chauhan, and Vivek Shrivastava |
|||
Technical Session-14: |
|||||
January 12, Saturday |
Time: 2.30 PM-4.00 PM |
||||
Key Note Address: 14 |
|
||||
|
|||||
Paper Id. |
Topic Name |
Author |
|||
251307 |
A Generalized Model for Internet-based Access Control Systems with Delegation Support |
Utharn Buranasaksee, Kriengkrai Porkaew, and Umaporn Supasitthimethee |
|||
251310 |
A Framework of Service Selection and Composition for Flexible Network Architecture |
Akhilendra Pratap Singh, O.P. Vyas, and Shirshu Varma |
|||
251421 |
Qos Support Downlink For Wimax Network |
Pooja Gupta, Brijesh Kumar and BL Raina |
|||
251302 |
Real Time Object Tracking: Simulation and Implementation on FPGA based Soft Processor |
Manoj Pandey, Dorothi Borgohain, Gargi Baruah, J S Ubhi, Kota Solomon Raju |
|||
251301 |
Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks |
Suddhasil De, Diganta Goswami, and Sukumar Nandi |
|||
251432 |
Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application |
Sanjeev Jain, Indrasen Singh, Vijay Shanker Tripathi and Sudarshan Tiwari |
|||
251433 |
Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit Cell |
Indrasen Singh, Sanjeev Jain, Vijay Shanker Tripathi and Sudarshan Tiwari |
|||