The Second International Conference on Computer Science, Engineering and Applications (CCSEA-2012)

Venue : The Connaught Hotel, May 27, 2012, Delhi, India.

Program Schedule 1

Hall - 1

May 27, 2012

Time Session 1

Chair : V. Sundarapandian, Vel Tech Dr. RR & Dr. SR Technical University, India

08:00 - 09:00AM

Registration

08:20 - 08:40AM Forensic Computing Models: Technical Overview ( Gulshan Shrivastava, Akansha Dwivedi and Kavita Sharma )
08:40 - 09:00AM Analysis of Bayes, Neural Network and Tree Classifier of Classification Technique in Data Mining using WEKA ( Yugal kumar and G.Sahoo )
09:00 - 09:20AM Exploring The Current Trends And Future Prospects In Terrorist Network Mining ( Akhilesh Tiwari, Nisha Chaurasia and Astha Chharia )
09:20 - 09:40AM Emotion Detection From Text  (Shiv Naresh Shivhare and Saritha Khethawat )
09:40 - 10:00AM

A Hybrid Clustering Algorithm for Data Mining        ( Ravindra Jain )

10:00 - 10:20AM -------------Break--------------
10.20 - 10.40AM
Analytical study of hexapode miRNAs using phylogenetic methodsn       ( A.K. Mishra and H.Chandrasekharan )
10.40 - 11.00AM
Detection Techniques Of Selective Forwarding Attacks In Wireless Sensor Networks : A Survey
( Preeti Sharma )
11.00 - 11.20AM
A Modified Directional Weighted Cascaded-Mask Median Filter For Removal Of Random Impulse Noise         ( J.K. Mandal and Aparna Sarka )
11.20 - 11.40AM

Steganography Using Adaptive Pixel Value Differencing(Apvd) Of Gray Images Through Exclusion Of Overflow/Undflow        ( J.K. Mandal and Debashis Das )

11.40 - 12.00PM
Efficient Utilization Of Channels Using Dynamic Guard Channel Allocation With Channel Borrowing Strategy In Handoffs
( Alagu S and Meyyappan T )
12.00 - 12.20PM A Novel Ant Colony Algorithm For Multicast Routing In Wireless Ad Hoc Networks    
( Sunita Prasad, Zaheeruddin and D. K. Lobiyal T )
12.20 - 01.40PM -----------Lunch Break-----------
Time

Session 2

Chair : A. K. Mishra, USI,IARI, Delhi

01.40 - 2.00PM
Information Security through Image Watermarking using Least Significant Bit Algorithm ( Puneet Kr Sharma and Rajni )
2.00 - 2.20PM
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks ( Jayashree V. Shiral and. Bhushan N. Mahajan )
2.20 - 2.40PM
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks 
( Amit Kumar, Dhirendra Srivastav and Suchismita Chinara )
2.40 - 3.00PM
Energy Optimisation Schemes For Wireless Sensor Network        ( Vivekanand Jha ,Elisha Chauhan,Harshpreet Kaur and Neeharika Taneja )
3.00 - 3.20PM
Object-Oriented Database Model For Effective Mining Of Advanced Engineering Materials Data Sets        ( Doreswamy, Manohar M G and Hemanth K S )
3.20 - 3.40PM Tuning Of Cost-231 Hata Model For Radio Wave Propagation Predictions       ( Chhaya Dalela1, M V S N Prasad2, P K Dalela )
3.40 - 4.00PM -----------Break-----------
4.00 - 4.20PM
An Comparison with Property Based Resource Attestation to Secure Cloud Environment
( Ravindra k.gupta, Rajat Pali , Shailendra Singh and Ashutosh Kumar Dubey )
4.20 - 4.40PM
SubGraD- An Approach for Subgraph Detection 
( Akshara Pande, Vivekanand Pant and S. Nigam )
4.40 - 5.00PM
CloudPass – a passport system based on Cloud Computing and Near Field Communication
( Adethya Sudarsanan )
5.00 - 5.20PM
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator           ( Navdeep Prashar and Balwinder Singh )
5.20 - 5.40PM
Generation and Optimization of Test case for Object Oriented Software Using State Chart Diagram
( Ranjita Swain,Prafulla Kumar Behera and Durga Prasad Mahapatra )
5.40 - 6.00PM A Novel Approach For Feature Extraction And Selection On Mri Images For Brain Tumor Classification       ( V.P.Gladis Pushpa Rathi and S.Palani )