Hall - 2 |
May 27, 2012 |
Time |
Session 1
|
08:00 - 09:00AM |
Registration |
08:30 - 09:00AM |
Study of Receiver Initiated Multicast in Grid Environment
R. Abilash Joseph,M. Malleswaran and A. Radhakrishnan |
09:00 - 09:20AM |
Trust Oriented Security Framework for Ad hoc Network
Amandeep Verma and Manpreet Singh Gujral |
09:20 - 09:40AM |
Dynamic Network Anomaly Intrusion Detection Using Modified Som
Aneetha.A.S., Revathi.S. and Bose.S |
09:40 - 10:00AM |
Ingress Filtering at Edge Network to Protect VPN Service from DoS Attack
S.Saraswathi and P.Yogesh |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 - 10.40AM
|
QoS Issues In Underwater Sensor Networks
Vivekanand Jha ,Preeti Gupta and Urvashi Ahuja |
10.40 - 11.00AM
|
A Novel Approach For Exception Handling In Soa
Prachet Bhuyan1 ,Tapas Kumar Choudhury1 and Durga Prasad Mohapatra |
11.00 - 11.20AM
|
An Emerging Trend Of Feature Extraction Method In Video Processing
R.Revathi and Hemalatha.M |
11.20 - 11.40AM
|
A Survey on Tamil Handwritten Character Recognition using OCR techniques
M. Antony Robert Raj and S.Abirami |
11.40 - 12.00PM
|
Impact Of Error Filters On Shares In Halftone Visual Cryptography
Sunil Agrawal and Anshul Sharma |
12.00 - 12.20PM |
Combining Jpeg Steganography And Substitution Encryption For Secure Data Communication
Shamim Ahmed Laskar and Kattamanchi Hemachandran |
12.20 - 01.40PM |
-----------Lunch Break----------- |
Time |
Session 2
|
01.40 - 2.00PM
|
Digital Image Steganalysis for Computer Forensic Investigation
Bhoopesh Singh Bhati and Nanhay Singh |
2.00 - 2.20PM
|
Monogenic Scale Space Based Region Covariance Matrix Descriptor For Face Recognition
M. Sharmila Kumari1, B H Shekar2 and G Thippeswamy3 |
2.20 - 2.40PM
|
Visual Attention Based Keyframes Extraction And Video Summarization
S.Thiruchadai Pandeeswari1 , P.Geetha1 and SonyMohanan |
2.40 - 3.00PM
|
Detection of Application Layer DDoS Attacks using Information Theory Based Metrics
S. Renuka Devi and P. Yogesh |
3.00 - 3.20PM
|
Performance Analysis Of Clustering Based Image Segmentation And Optimization Methods
Jaskirat kaur, Sunil Agrawal and Renu Vig |
3.20 - 3.40PM |
Neural Network Approach For Eye Detection
Vijayalaxmi, P.Sudhakara Rao and S Sreehari |
3.40 - 4.00PM |
-----------Break----------- |
4.00 - 4.20PM
|
Current Trends and Future Aspects in Cross- Layer Design for the Wireless Networks
Sandeep Sharma, Rajesh Mishra and Karan Singh |
4.20 - 4.40PM
|
Analysis Of Watermarking Techniques For Medical Images Preserving Roi
Sonika C. Rathi and Vandana S. Inamdar |
4.40 - 5.00PM
|
An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink
Ravindra k.gupta, Shashank Saxena |
5.00 - 5.20PM
|
nalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Ravi Kanth Kotha ,Gaurav Prasad and Dinesh Naik |
5.20 - 5.40PM
|
|
5.40 - 6.00PM |
|