The Second International Conference on Computer Science, Engineering and Applications (CCSEA-2012)

Venue : The Connaught Hotel, May 27, 2012, Delhi, India.

Program Schedule 2

Hall - 2

May 27, 2012

Time Session 1

 

08:00 - 09:00AM

Registration

08:30 - 09:00AM Study of Receiver Initiated Multicast in Grid Environment
R. Abilash Joseph,M. Malleswaran and A. Radhakrishnan
09:00 - 09:20AM Trust Oriented Security Framework for Ad hoc Network
Amandeep Verma and Manpreet Singh Gujral
09:20 - 09:40AM Dynamic Network Anomaly Intrusion Detection Using Modified Som
Aneetha.A.S., Revathi.S. and Bose.S
09:40 - 10:00AM

Ingress Filtering at Edge Network to Protect VPN Service from DoS Attack
S.Saraswathi and P.Yogesh

10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
QoS Issues In Underwater Sensor Networks
Vivekanand Jha ,Preeti Gupta and Urvashi Ahuja
10.40 - 11.00AM
A Novel Approach For Exception Handling In Soa
Prachet Bhuyan1 ,Tapas Kumar Choudhury1 and Durga Prasad Mohapatra
11.00 - 11.20AM
An Emerging Trend Of Feature Extraction Method In Video Processing
R.Revathi and Hemalatha.M
11.20 - 11.40AM
A Survey on Tamil Handwritten Character Recognition using OCR techniques
M. Antony Robert Raj and S.Abirami
11.40 - 12.00PM
Impact Of Error Filters On Shares In Halftone Visual Cryptography
Sunil Agrawal and Anshul Sharma
12.00 - 12.20PM Combining Jpeg Steganography And Substitution Encryption For Secure Data Communication
Shamim Ahmed Laskar and Kattamanchi Hemachandran
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 2

 

01.40 - 2.00PM
Digital Image Steganalysis for Computer Forensic Investigation
Bhoopesh Singh Bhati and Nanhay Singh
2.00 - 2.20PM
Monogenic Scale Space Based Region Covariance Matrix Descriptor For Face Recognition
M. Sharmila Kumari1, B H Shekar2 and G Thippeswamy3
2.20 - 2.40PM
Visual Attention Based Keyframes Extraction And Video Summarization
S.Thiruchadai Pandeeswari1 , P.Geetha1 and SonyMohanan
2.40 - 3.00PM
Detection of Application Layer DDoS Attacks using Information Theory Based Metrics
S. Renuka Devi and P. Yogesh
3.00 - 3.20PM
Performance Analysis Of Clustering Based Image Segmentation And Optimization Methods
Jaskirat kaur, Sunil Agrawal and Renu Vig
3.20 - 3.40PM Neural Network Approach For Eye Detection
Vijayalaxmi, P.Sudhakara Rao and S Sreehari
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
Current Trends and Future Aspects in Cross- Layer Design for the Wireless Networks
Sandeep Sharma, Rajesh Mishra and Karan Singh
4.20 - 4.40PM
Analysis Of Watermarking Techniques For Medical Images Preserving Roi
Sonika C. Rathi and Vandana S. Inamdar
4.40 - 5.00PM
An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink
Ravindra k.gupta, Shashank Saxena
5.00 - 5.20PM
nalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Ravi Kanth Kotha ,Gaurav Prasad and Dinesh Naik 
5.20 - 5.40PM
 
5.40 - 6.00PM