Sie sind auf Seite 1von 13

IEEE ICCCT-2010

SESSION DETAILS

TUTORIAL SESSION 1 *

Time: 9:30am to 12:30pm

DATE: 17/09/2010

Category: Tutorial

SL. TUTORIAL TITLE DELIVERED BY


NO.

1 SECURITY IN DR.JAYDIP SEN


COMMUNICATION AND
COMPUTING SENIOR SCIENTIST R&D

TCS, CALCUTTA

TUTORIAL SESSION 2*

TIME: 9:30AM TO 12:30PM

DATE: 17/09/2010

CATEGORY: Tutorial

SL. TUTORIAL TITLE DELIVERED BY


NO.

1 CLOUD COMPUTING ANUP KUMAR

PROFESSOR & DIRECTOR OF MINDS


LAB, USA

*Candidates can register for all Tutorial sessions with a payment of INR 2,000/- (for Non-students) and
INR 1,000/- (for Students) at the venue. The registration for the Conference does not include the
Tutorial sessions.
TUTORIAL SESSION 3*
TIME: 2:30PM TO 5:30PM

DATE: 17/09/2010

CATEGORY: Tutorial

SL. TUTORIAL TITLE DELIVERED BY


NO.

1 THE PATH TOWARDS ARIJIT UKIL


UBIQUITY: FROM WIRELESS
TO
SCIENTIST R&D

UBIQUITOUS COMPUTING TCS, CALCUTTA

TUTORIAL SESSION 4*
TIME: 2:30PM TO 5:30PM

DATE: 17/09/2010

CATEGORY: Tutorial
SL. TUTORIAL TITLE DELIVERED BY
NO.

1 DEVELOPMENT OF FPGA DR.AMLAN CHAKRABARTI


BASED EMBEDDED SYSTEM
APPLICATIONS Assistant Professor, School of
Information Technology University of
Calcutta, Kolkata

*Candidates can register for all Tutorial sessions with a payment of INR 2,000/- (for Non-students) and
INR 1,000/- (for Students) at the venue. The registration for the Conference does not include the
Tutorial sessions.
SESSION 1
Date: September 18, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Computer Communication & Network Security
No. of Paper: 16

Sr. Pap Title Author


No. er
No.
1. 96 Security Policy Integration And Conflict Reconciliation For Beneyaz Ara Begum, Rajesh
Data Integration Across Data Sharing Services In Ubiquitous Kumar Thakur and Prashanta
Computing Environments Kumar Patra
2. 105 Smart Card based Secure Authentication and key Agreement Sandeep Sood
Protocol
3. 112 Comparative Assessment of WiMAX Scheduler in Fixed and Isha Khirwar and Anjulata
Mobile WiMAX Networks for VoIP using QualNet Yadav.
4. 119 Secure Routing Protocol for Hybrid Wireless Mesh Network Divya Bansal, Sanjeev Sofat
and Gurdit Singh
5. 123 Performance of an Optimum Packet based CDMA Wireless Uma Datta, Chinmoy Kundu
Sensor Network in Presence of Correlated Interferers and Sumit Kundu.
6. 126 Optimal Transmit Power in Wireless Sensor Networks Using Arnab Nandi, Dipen Bepari and
MRC Space Diversity in Presence of Shadow Fading Sumit Kundu.
7. 129 Critical Path Minimization of Data Networks without Mou Dasgupta and G.P. Biswas
Compensating Reliability
8. 153 A New Algorithm for Admission Control of Secondary Users Sanjay Dhar Roy and Sumit
in CDMA based Cognitive Radio Network Kundu.
9. 161 Some Investigation On Slot-Loaded Equitriangular Microstrip Manish Rai, Y. Tyagi,
Antenna Raghvendra Singh and Mohd
Shahab
10. 182 The additional result over the work of Blomer and May Navaneet Ojha and Sahadeo
Padhye
11. 202 Improved Rst-Attacks Resilient Image Watermarking Based On Pavan Kumar Gupta and
Joint Svd-Dct Shailendra Sriwastava.
12. 206 An Analysis of Internet Integrated Mobile Adhoc Networks Prashant Kumar, Gautam Bose,
Jitendra Kumar Gupta and
Naveen Chauhan
13. 207 Adaptive-Step Reverse Link Closed Loop Power Control Krishan Kumar and Arvind
CDMA System Kumar
14. 211 An ID-based multi-proxy multi-signature scheme Rajeev Anand Sahu and
Sahadeo Padhye
15. 217 Performance Optimization of LUT of Subthreshold FPGA in Sachin Pable, Aminul Islam,
Deep Submicron Ale Imran and Dr. Mohd.
Hasan.
16. 220 Cross layer Energy Efficient Routing (XLE2R) for Prolonging Kanojia Sindhuben Babulal
Lifetime of Wireless Sensor Networks
SESSION 2
Date: September 18, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Computer Communication & Network Security.
No. of Paper: 16

Sr. Paper Title Author


No. No.
1. 257 A WiMAX Segmentation for 3rd Generation N/W Arun Singh, Ankur Garg and Amardeep
Simulator Gupta
2. 260 Geographical Distribution of Peers: A Measurement YU Lidong and Ming Chen
Study of BitTorrent
3. 287 Efficient Modulation Formats For Higher Bit Rates Shradha Gupta, Narender Kr Shukla and
Fiber Transmission Shikha Jaiswal.
4. 312 Secure Resilient High Performance File System for Sunil Chakravarthy and Chittaranjan
Distributed Systems Hota.
5. 330 A Proposed Model For Intrusion Detection System for Shahnawaz Husain
Mobile Adhoc Network
6. 331 Model Checking Message Exchange in Location Based Ashwini Moily, Keerthi Shetty, Guru
Services prasanna and Sanjay Singh
7. 332 Modeling Freshness Concept to overcome Replay Shilpa Rukmangada, Shreya
Attack in Kerberos Protocol using NuSMV Adyanthaya, Amrish Tiwari and Sanjay
Singh.
8. 333 High Capacity, Robust Lossless EPR Data Hiding using Sunita Dhavale.
CDCS with ROI Integrity Checking
9. 335 Forward Link Performance of Packet Data with LDPC Sanjay Dhar Roy
in Cellular CDMA
10. 352 Protecting Location Privacy in Augmented Reality Anoop Aryan and Sanjay Singh
Using k-Anonymization and Pseudo-id
11. 380 Text Independent Speaker Identification using Wavelet Gyanendra Verma and Uma Shankar
Transform Tiwary
12. 404 Enhancing the Efficiency of Secure Network Shashank Srivastava and G.C Nandi
Monitoring through Mobile Agents
13. 417 Fuzzy Based Trust Management for Wireless Ad hoc Pallavi Khatri and Shashikala tapaswi
Networks
14. 441 Optimizing Velocity Based Adaptive Zone Routing Amit Kumar JaiswaL and Pardeep
Protocol Singh
15. 447 Using Mobile Agent in Clustering Method for Energy Babak nikmard and Hosein Morady.
Consumption in Wireless Sensor Network
16. 44 To Prevent Wormhole Attacks Using Wireless Protocol Sanjay Keer, Anil Suryavanshi
in MANET
SESSION 3
Date: September 18, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Computer Graphics & Multimedia.
No. of Paper: 16

Sr. Paper Title Author


No. No.
1. 95 A Perceptual Video Coder Incorporating Wavelet Based Sreelekha G and Prashant G.
Intra Frame Coder Koparde.
2. 110 Image Processing Techniques for Grading & Bhupinder Verma and Dr. H.K.
Classification of Rice Sardana
3. 120 Grayscale Image Quality Measure in Spatial Domain Niveditta Thakur, Swapna Devi and
Prashant Upadhyay.
4. 160 A Comparative Study of Thresholding Techniques for Vaibhav Nigam, Sajal Luthra and
Image Denoising Smriti Bhatnagar.
5. 168 Curvelet Transform based Object Tracking Swati Nigam and Ashish Khare

6. 268 Look-up Table based Multiple Watermarking with Jaishree Jain, Vijendra Rai and
Minimum Distortion Suneeta Agarwal.
7. 344 An Efficient Automatic Hierarchical Image Sreya Banerjee, Ayan Banerjee and
Segmentation Algorithm based on Modal Analysis and Amiya Halder
Mutational Agglomeration
8. 345 An Efficient Image Compression Algorithm for almost Ayan Banerjee and Amiya Halder.
Dual-Color Image Based on K-Means Clustering, Bit-
Map Generation and RLE
9 365 A Hybrid DCT-VQ Based Approach for Efficient Arup Pal, Dr. G. P. Biswas and Dr.
Compression of Color Images S. Mukhopadhyay.
10 381 Reversible Fragile Medical Image Watermarking with Nagaraj Dharwadkar, B Amberker,
zero Distortion Supriya Kulkarni and Prateeksha B
Panchannavar.
11. 448 2-D Separable Discrete Hartley Transform Architecture Vijay Kumar Sharma, Richa
for Efficient FPGA Resource Agrawal, Umesh Chandra Pati and
Kamala Kanta Mahapatra.
12. 455 A New Approach for Image Segmentation with Saurabh Chaudhury and Indrani Pal.
MATLAB
13. 546 Temporal Alignment of non-gated image sequences for Ennesai Sengottaiyan and
4D cardiac imaging using wavelets M.Ganesan Murgan.
14. 547 Digital image watermarking using adpative casting Gurprakash Kang and Chandan
energy in different resolutions of wavelet transoform. Singh.
15. 90 An Enhanced Method for Singular Points Detection in Nirmala Salam, Rekha P Nair, Nipun
Fingerprint Images Pandey and Zia Saquib
308 Layered Mixed Media Painting Kapil Dev and Satish Chand
16.
SESSION 4
Date: September 18, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Hardware & Software Design
No. of Paper: 15

Sr. Paper Title Author


No. No.
1. 116 Low Power Design of an SRAM Cell for Portable Prashant Upadhyay, Rajesh Mehra and
Devices Niveditta Thakur.
2. 127 Dynamically Reconfiguration Of Pll Using Fpga Archana Bhambore and R R Harkare.

3. 144 Deep Sub-Micron SRAM Design for Low Leakage Sampath Kumar V, Sanjay Kumar
Singh and Dr B K Kaushik.
4. 174 A Novel Method For Diagnosis Of Board Level Pankaj Kumar, Rajender Kumar
Interconnect Faults Using Boundary Scan Sharma, Devendra Kumar Sharma and
Brijesh Kumar Kaushik.
5. 179 High Performance Optimised CNFET based Ale Imran, Mohd Hasan and Pable
Current Conveyor at 32nm technology node S.D.
6. 213 A Novel Channel Select Filter For Multi Standard Neeta Pandey, Sajal K Paul and Asok
Wireless Receiver Bhattachrayya.
7. 214 A Novel Active Shunt-peaked MCML-based Four- Kirti Gupta, Neeta Pandey and
Bit Ripple-Carry Adder for High Spees Manisha Gupta.
Applications
8. 232 Low Power High Throughput Current Mode Sunil Jadav, Gargi Khanna, Ashok
Signaling Technique for Global VLSI Interconnect Kumar and Gaurav Saini
9. 234 Low-Power Techniques: Leakage Feedback with Pankaj Pal, Gaurav Saini, Ashwani
Stack & Sleep Stack with Keeper Rana and Rituraj Rathore.
10. 235 Leakage Behavior of Underlap FinFET Structure: Gaurav Saini, Ashwani Rana, Pankaj
A Simulation Study Pal and Sunil Jadav.
11. 250 Resource Provisioning and Scheduling in Grids: Rajni aron and Inderveer Chana.
Issues, Challenges and Future Directions
12. 272 Bandwidth Extension Of A Cmos Constant Q Ashta Neekhra and Maneesha Gupta
Active Inductor
13. 323 Performance analysis of SiGe:C HBT Ritesh Kumar Jaiswal and R.K.
Chauhan.
14. 401 A Comparative study of CMOS & CNFET based Ale Imran, Mohd Hasan and Pable
Current Conveyor at 32nm technology node S.D.
15 58 Modeling of On-Chip Global RLCG Interconnect Rajib Kar, Vikas Maheshwari, Aman
Delay For Step Input Choudhary and Abhishek Singh
SESSION 5
Date: September 18, 2010.
Timings: 1400 Hrs to 1630 Hrs
Category: Computer communication and Network Security.
No. of Paper: 16

Sr. Paper Title Author


No. No.
1. 454 A Cross-layer frame work for adaptive Video Vijaykumar Manne and Santhosha
streaming over Wireless networks Rao
2. 458 Comprehensive Performance Analysis of MAC Bhoopendra Kumar, Rakesh Kumar
Protocols for Wireless Sensor Networks Yadav and Rama Krishna Challa
3. 473 Performance analysis of OFDM Mobile Systems for Sarika pal, Narendra Pal and
Wireless Communication Avinash Kumar.
4. 478 Energy Efficient Sensor Network Security Using Shish Ahmad, Dr. Rizwan Beg and
Stream Cipher Mode of Operation Dr.Qamar Abbas.
5. 479 p-Cycle based Network Design to Control the Optical Raghav Yadav, Rama Shankar
Path Lengths in Restored State of Transparent Network Yadav and Hari Mohan Singh.
6. 481 Link Utilization in Survivable WDM Mesh Network Baibaswata Mohapatra, Rajendra K.
Nagaria and Sudarshan Tiwari.
7. 485 Localization of Mobile Robots in a Network using Shashank Srivastava and G.C
Mobile Agents Nandi.
8. 512 Performance Evaluation of TCP variants using Media Vibha Tiwari, Sarita Kansal and
Independent Handover in Heterogeneous network Apurva Gaiwak
9. 515 Performance of Ad hoc Network Routing in IEEE Chandra Shekar and Dilli Ravilla
802.11
10. 518 Performance Evaluation of Effective Resource Arvind Kumar.
Utilization in Wireless Mesh Networks using Smart
Antenna
11. 521 Adaptive Channel Allocation Algorithm for Video Bijendra Kumar and Satish Chand.
Delivery
12. 525 Performance Evaluation of TCP Variants over Routing Mohit P. Tahiliani, K C Shet and T
Protocols in Multi-hop Wireless Networks G Basavaraju
13. 532 A simple delayed acknowledgement scheme Chandra Sahu.
14. 540 Performance Analysis of Support Vector Machine as Sitanshu Gupta, Sharanyan
Classifier for Voiced and Unvoiced Speech Srikanthan and Asim Mukherjee
15. 544 AODV and OLSR Routing Protocols for Wireless Ad- Sunil kumar and Dr. Jyotsna
hoc and Mesh Networks Sengupta
16. 557 A Two Ray Propagation Model For Finding Mobile D. Rajaveerappa and Fituri H.
Location Over Plain Microcellular Environment Belgassem.
SESSION 6
Date: September 18, 2010.
Timings: 1400 Hrs to 1630 Hrs
Category: Advanced Database Management System.
Advanced Database Management System
No. of Paper: 8

Sr. No. Paper No. Title Author

1. 154 Mobile Distributed Real Time Database Vishnu Swaroop and Udai Shanker
Systems - A Research Challenges
2. 163 Multi Agent System In Distributed Latchoumi T.P
Datawarehousing
3. 263 A Comparative Study of Four Feature Kavita Das and O. P. Vyas
Selection Methods for Associative
Classifiers
4. 341 Analysis Of Website Effectiveness Shivani Panchal and Karunesh Gupta.

5. 434 A Neuron model for documents Kolla bhanu prakash, M A Dorai Ranga
containing multingual Indian texts Swamy and Raja Raman Arun
6. 493 An Approach To Graph Mining Using Sadhana Priyadarshini and Debahuti
Gspan Algorithm Mishra
7. 369 Re optimization of ID3 and C4.5 decision Devashish Thakur, Nisarga M and Sharan
tree Raj
8. 553 Semantic Tagging and Classification of A. K. Singh and R.C. Joshi.
Blogs
SESSION 7
Date: September 18, 2010.
Timings: 1400 Hrs to 1630 Hrs
Category: Evolutionary Computing.
No. of Paper: 14

Sr. Paper
Title Author
No. No.
1. 167 Fuzzy Efficient and Pareto - Optimal Solution For Pitam Singh, Shiv Datt Kumar and
Multiobjective Linear Plus Linear Frational R . K Singh.
Programming Problem
2. 255 Prioritization of Test Case Scenarios Derived from Chayanika Sharma, Sangeeta
Activity Diagram using Genetic Algorithm Sabharwal and Ritu Sibal.
3. 386 SVM based Methods for Arrhythmia Classification in Narendra Kohli, Nishchal Verma and
ECG Abhishek Roy.
4. 391 A Genetic Algorithm with entropy based initial bias for Saroj Ratnoo, Kapila Kundu, Dinesh
automated rule mining Kumar and Kanika Anand.
5. 498 An Optimized Scheduling Algorithm for Migrated Jobs Shakti Mishra, Dharmender Singh
in Trusted Distributed Systems Kushwaha and Arun Kumar Misra.
6. 508 Differential Evolution Algorithm for Synthesis of Banani Basu and Gautam Kumar
Collinear Dipole Array of Arbitrary Length with Mahanti.
Minimum Standing Wave Ratio and Fixed Side Lobe
Level
7. 514 An Evolutionary approach for Protein Classification Swati Vipsita.
using Feature Extraction by Artificial Neural network
8. 528 A Fuzzy Logic Prediction Method to determine Suman Kumar S P and Mr. Vijay
Scheduling Algorithm Parameters for Resource Anand S
Intensive Network Dependent Applications on Digital
Handheld Devices
9. 529 A Comparative Analysis of Different Neural Networks Raman Bhati, Dinesh Bhati, Nilesh
for Face Recognition Using Principal Component Maltare and Sarika Jain
Analysis, Wavelets and Efficient Variable Learning
Rate
10. 25 Speech Corpus of Assamese Numerals Extracted using Kandarpa Kumar Sarma, Mousmita
an Adaptive Pre-emphasis Filter for Speech Sarma and Krishna Dutta.
Recognition
11. 56 Performance of MBMS with Minimum SINR Sanjay Dhar Roy and Sumit Kundu.
Algorithm
12. 59 Implementation Of Object Oriented Approach For Chinta Someswara Rao and Adavi
Copyright Protection Using Hadamard Transforms Balakrishna.

13. 497 A Relative Position based Algorithm to find out the Amit Shukla and Suneeta Agarwal
Longest Common Subsequence from Multiple
Biological Sequences
14. 563 Security Vs Cost: An Issue of Multi-objective Divya Kumar, Divya Kashyap and
Optimization for Choosing PGP Algorithms K.Mishra.
SESSION 8
Date: September 18, 2010.
Timings: 1400 Hrs to 1630 Hrs
Category: Advanced Software Engineering.
No. of Paper: 12

Sr. No. Paper Title Author


No.
1. 157 A New Approach for Design Pattern Detection Akshara Pande, Manjari Gupta and
A.K. Tripathi. DNIT
2. 166 An Event-Based Approach To Generate Test Sangeeta Sabharwal, Sandeep Kumar
Scenarios Singh, Dhruv Sabharwal and Aditya
Gabrani
3. 351 Representing Join Point in UML Using Kirti Muley, Ugrasen Suman and Maya
Pointcuts Ingle
4. 400 A Systematic Literature Survey of Integration Praneeth Chakka and Phani Shashank
Testing in Component-Based Software Saripalli
Engineering
5. 431 Meta-Level Constructs in Content Annappa B, Chandrasekaran K and
Personalization of a Web Application Shet KC
6. 435 Extracting The Similarity In Detected Software Perumal.A, E.Kodhai Jeevaraj and
Clones Using Metrics Kanmani S.
7. 470 Modified Timeboxing Process Model For Himadri Bhusan Mahapatra
Proper Utilization Of Resources
8. 471 Does Coupling Really Affect Complexity? A. Yadav and Raees Khan

9. 482 Designing metrics for Caching Techniques for Dr.deepti Mehrotra, Ms.Renuka
dynamic web site Nagpal and Dr. Pradeep Bhatia
10. 519 Specifying Safety and critical Real-Time sathish midde and Shivani Goel
Systems in Z
11. 533 A Clustering Algorithm for Software Fault Arashdeep Kaur, Deepinder Kaur and
Prediction Sunil Gulati
12. 558 Complexity measure based on Requirement Sharma Ashish and Kushwaha D.S.
Engineering Document: A Comprehensive
Approach
SESSION 1
Date: September 19, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Hardware & Software Design.
No. of Paper: 14

Sr. No. Paper Title Author


No.
1. 472 Migrating FPGA based PCI Express Gen1 Sarun O.S Nambiar, Yogindra
design to Gen2 Abhyankar and Sajish Chandrababu.
2. 490 Modelling of Trapping Mechanism in MEMS Kunal Dekate
Switches
3. 506 Multi Input Multi Output Biquadratic Universal Shipra Maheshwari and Sudhanshu
Filter using Dual X Current Maheshwari.
Conveyor(DXCCII)
4. 513 Novel PSO based FPGA Placement Techniques Prakash Kumar Rout, Debiprasad
Priyabrata Acharya and Ganapati
Panda
5. 552 Micro-strip patch antenna design using Genetic Shibaji Chakraborty and Uddipan
Algorithms Mukherjee.
6. 22 Fast Parallel Prefix on Multi-Mesh of Trees Sudhanshu Jha and Prasanta Jana.
7. 45 An Extention of Edge Zeroing Heuristic for Abhishek Mishra and Anil Kumar
Scheduling Precedence Constrained Task Tripathi.
Graphs on Parallel Systems using Cluster
Dependent Priority Scheme
8. 467 3D Facial Model Construction and Expressions Narendra Patel, Mukesh Zaveri
Synthesis from a Single Frontal Face Image
9. 254 A Novel OTRA based oscillator with non Rajeshwari Pandey, Neeta Pandey,
interactive control Rajendra Kumar, Garima Solanki
10. 526 Adaptive Security Improvement using Dynamic Sarsij Tripathi, Rama Shanker Yadav,
Window Concept for Real Time Tasks on Rajib Jana
Cluster
11. 541 Effect of Aggressor Driver Width on Crosstalk D.K. Sharma, Brijesh Kumar Kaushik,
for Static and Dynamic Switching of Victim R. K. Sharma
Line
12. 412 Accurate Estimation Of On-Chip Global RLC RAJIB KAR, VIKAS
Interconnect Delay For Step Input MAHESHWARI, Aman Choudhary,
Vasundhara Agrawal, Ashis Kumar
Mal, Anup Kumar Bhattacharjee and
Abhishek Singh.
13. 347 Design and Simulation of an improved Dual Antosh Kumar Gupta, Abhash Garg
Band LNA for WLAN Applications and Nitin Prabhakar Singh
14. 69 Corner Effects in SOI-Tri gate FinFET by using Pavan Kumar Manchi and Santosh
3D Process and Device Simulations Kumar Gupta.
15. 334 An Approximate Algorithm for Degree Rupesh Srivastava, Sweetesh Singh,
Constraint Minimum Spanning Tree Varun Kumar and Suneeta Agarwal
16. 542 Graceful Degradation in Performance of Neha Sharma and Kumar Sambhav
WaveScalar Pandey.
SESSION 2
Date: September 19, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Artificial Intelligence.
No. of Paper: 15

Sr. Paper Title Author


No. No.
1. 111 Experimental Investigation on Mobile Robot Drive Ponnusamy Arunkumar,
System through Resonant Induction Technique Shanmugam Nandhakumar and
Alagappan Pandian.
2. 169 Behavior-based Navigation of Multiple Robotic Agents shubhasri kundu and Dayal R.
using Hybrid-Fuzzy Controller Parhi
3. 177 Recognizing and Interpreting Indian Sign Language Anup Nandy, Soumik Mondal and
Gesture for Human Robot Interaction Jay Shankar Prasad.
4. 191 Neutrosophic Modeling and Control Swati Aggarwal

5. 229 An Enhanced Speech-based Internet Browsing System Avinash Singh, Raghuraj Singh,
for Visually Challenged Prabhat Verma, Vibhash Yadav
and Aditya Pandey
6. 275 A New Data Mining Based Network Intrusion Kapil Wankhade.
Detection Model
7. 278 A Contemporary Approach to Hybrid Expert Systems Suresh Kumar and Dharm Raj

8. 281 Decision Support System for Heart Disease based on Snehlata Dongre
Support Vector Machine and Artificial Neural Network
9. 300 Improving dynamic difficulty adjustment to enhance Joy James
player experience in games
10. 339 Web service Selection based on Ranking of Qos using Chitra Ramesh, Vidhya
Nave Bayes through Ontology Mapping Balamurugan and Dr. G. Aghila
11. 360 Context Free Grammar Induction Library Using Hari Mohan Pandey
Genetic Algorithms
12. 388 Face Recognition based Veri cation with Reinforced Kandarpa Kumar Sarma and
Decision Support Hemashree Bordoloi
13. 389 Automatic standardization of spelling variations of Vishal Goyal and Gurpreet Singh.
Hindi Text
14. 405 Exploiting Grammatical Dependencies for Fine-grained Ritesh Srivastava, M.P.S. Bhatia
Opinion Mining and Hemant Kr. Srivastava.
15. 439 Rule Base to Resolve Translation Problems due to Kalyani Patel and Jyoti Pareek
Differences in Gender Properties in Sibling Language
Pair Gujarati-Hindi
SESSION 3
Date: September 19, 2010.
Timings: 0930 Hrs to 1230 Hrs
Category: Computer Communication & Network Security.
No. of Paper: 9

Sr. Paper Title Author


No. No.
1 66 A Printed F-Shaped Dual-band Monopole Jyoti R. Panda and Rakhesh S.
Antenna for RFID and WLAN Application Kshetrimayum.
2. 78 Performance Evaluation of Authentication Bachan Pattima and Brahmjit Singh.
Protocols for IEEE 802.11 Standard
3. 85 Throughput/Delay Performance of Secondary Sanjay Dhar Roy and Sumit Kundu.
User in Spectrum Underlay
4. 51 A Planar Microstrip-Line Fed Elliptical UWB 5.2 Jyoti R. Panda and Rakhesh S.
GHz/5.8 GHz Notch Antenna With U-Shaped Slot Kshetrimayum.
5. 23 Influence of computer network designing Aziz Hatami and Abdolmajid Mosleh.
parameters on organizational structure factors
6. 41 Optimal Number of Clusters in Wireless Sensor Ajay Singh Raghuvanshi, Sudarshan
Networks: An FCM Approach Tiwari and Rajeev Tripathi.
7. 505 LMS Adaptive Multiple Sub-filter based Acoustic Alaka Bairk, Ravindra Nath, Govind
Echo Cancellation Murmu
8. 503 Emerging Mobile Communication Technologies Basant Kumar, Suryapal Singh and
for Health Anand Mohan
9. 476 Identifying Cyber Black Holes (Deep Web) Pradeep Rai and Shubha Singh

Das könnte Ihnen auch gefallen