SAGAR INSTITUTE OF RESEARCH AND TECHNOLOGY, BHOPAL

advertisement
SAGAR INSTITUTE OF RESEARCH AND TECHNOLOGY, BHOPAL
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNATIONAL CONFERENCE ON INTERDISCIPLINARY RESEARCH IN ENGINEERING, MANAGEMENT,
PHARMACYANDSCIENCE (ICIREMPS2k15)
Second Conference of Sagar Society of Interdisciplinary,
Research & Technology
Sagar Group of Institutions, Bhopal, India
Website: www.sirtbhopal.ac.in/iciremps E-mail: iciremps@sirtbhopal.ac.in
19th – 22nd February, 2015
DAY-1
Schedule
Plenary Lecture by Prof. Anil Wipat University
of Newcastle England
09:30 AM – 10:30 AM
Dr K R Pardasani
Tea Time
10:30 AM – 11:00 AM
Paper Presentation:
20th January 2015
Session Chair:
Reporter and session management
Anchors
S NO.
TPC-1
Session Chair
Time : 11:00 AM – 1:30 PM
Dr K R Pardasani
Dr Ritu Shrivastava
Ms Priyanka Saxena (CSE, SIRT)
TITLE
AUTHOR 1
Venue: SIRTE
Seminar Hall
Session Co-Chair: Dr Anil Wipat
Dr Neelesh Jain
Ms Arpana Bhandari (CSE, SIRTE)
AUTHOR 2
A Survey On Techniques To Enhance
Performance Of TCP Data Type And Its
Variants For Wireless Adhoc Network
Ms. Sheeni Patidar
TPC-2
Analysis Of Synchronized Mobile
Communication Using JADE
Bhagyayshree
Megha Kamble
TPC-3
Detection Of Zombies In Distributed System
Through Bandwidth Detection
Arpanabhandari
Vijay Bhandari
TPC-4
Review On Security Techniques In Cloud
Computing
Amit Chouksey
TPC-5
A Hybrid Approach To Enhance The
Performance Of Wireless Network By Using
Optimal RTS And CTS Handshaking Protocol
Meenakshi Tiwari1
Yogadhar Pandey
TPC-6
A Review On Storage And Prevention In Cloud
Computing
Minakshi
Vivek Rawat
Solanki
Reporter and session management
Dr Ritu Shrivastava
Dr Neelesh Jain
Presentation
Status
Marks
Out of
10
Special
Remarks if
any
TPC-7
Mobsafe: Analysis Of Android Mobile
Applications Using Cloud Computing And Data
Mining
Amrita Rawat
TPC-8
Clustering Based Outlier Detection Method
Annu Singh
Yogdhar Pandey
TPC-9
Tahoe-LAFS (Tahoe Least Access File System)
Technique For Securing Big Data
Bablu Kumar Mishra
Rashmi Singh Lodhi
TPC-10
Relay Node Selection Algorithm For
Cooperative Communications In Wireless
Networks
Bharat Ankulnerkar
Rashmi Singh Lodhi
TPC-11
Review On Assembling Of Soft Computing
Techniques For Intrusion Detection System
Jyoti Kushwaha
TPC-12
Analysis Of Classification Techniques Of Wheat
Variety Identification -A Review
Megha Shrivastava
TPC-13
Addressing
Big Data
Rajni Vishwakarma
TPC-14
An Inclusive Survey Of Wormhole Attack
Detection And Prevention On Manet Using
Different Techniques
Rakesh Singh Parihar
TPC-15
Kerberos Technique For Node Authentication In
Big Data
Surendra Kumar Namdeo
TPC-16
An Improve Probability Based Routing Protocol
Over MANET By Using Belief Function
Priyanka Ghosh
Yogdhar Pandey
TPC-17
Automation Testing Of Web Application Using
Selenium Webdriver With Testng Framework
Purnima Hedau
Yogadhar Pandey
TPC-18
Data Hiding And Extraction In Audio File
Surbhi Thigale
Yogadhar Pandey
TPC-19
Review Of Secure Hash Algorithm-Family
Sushama Ingale
Yogdhar Pandey
TPC-20
Evaluating Image Steganography Techniques
With Cryptography
Ajay Kumar Raghuwanshi
Yogdhar Panday
Data Extraction Problem With
SAGAR INSTITUTE OF RESEARCH AND TECHNOLOGY, BHOPAL
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNATIONAL CONFERENCE ON INTERDISCIPLINARY RESEARCH IN ENGINEERING, MANAGEMENT,
PHARMACYANDSCIENCE (ICIREMPS2k15)
Second Conference of Sagar Society of Interdisciplinary,
Research & Technology
Sagar Group of Institutions, Bhopal, India
Website: www.sirtbhopal.ac.in/iciremps E-mail: iciremps@sirtbhopal.ac.in
19th – 22nd February, 2015
DAY-1 (CONT.)
02:30 PM – 03:10 PM
Plenary Lecture by Dr K R Pardasani, Professor
MANIT Bhopal
Schedule
Session Chair
Reporter and session
management
Dr Ritu Shrivastava
Dr Neelesh Jain
Venue: SIRTE Seminar Hall
Prof. Anil Wipat
Paper Presentation:
20th January 2015
Session Chair:
Reporter and session management
Time : 03:10 PM – 04:30 PM
Dr Anil Wipat
Dr Ritu Shrivastava
Session Co-Chair:
Dr K R Pardasani
Dr Neelesh Jain
S NO.
TITLE
TPC-21
Security Schemes against Jamming Attack in Mobile Ad hoc Network:
A Survey
TPC-22
Review Paper on Image Processing using Image Compression
Techniques
TPC-23
Image Security and Steganography using Wavelet Transform and
Security Algorithm: A Review
Ankita Jain
Yogdhar Pandey
TPC-24
A Review of Watermarking Technique Based on Feature Selection
Method using Transform Function
Neha Dwiwedi
Yogdhar Pandey
TPC-25
A Review of Wind Speed Prediction Using Soft Computing Approach in
Renewable Energy Systems
Roopali Soni
Dr. S.K. Gandhi
TPC-26
Variants of Parallel Implementation of Bellman-Ford Algorithm on GPU
TPC-27
Survey: Injection Attacks Detection and Prevention Techniques
AUTHOR 1
Poonam Radhika
Jaju Yogadhar
Pandey
AUTHOR 2
Dr. R.R Janghel
Abhilasha Saxena
Sanghmitra
Sharma
Mitali Mittal
Yogdhar Pandey, Kiran
Pandey
Presentation
Status
Marks
Out of
10
Special
Remarks
if any
Rohit
Shrivastava
Dr. Ritu Shrivastava
Cloud Data
TPC-29
A Review of Medical Image Denoising using Transform Function
Ankur Mudgal
Harshvardhan Tiwari
TPC-30
Performance Evaluation of Centroid Based Clustering Technique
Krishna Pal
Dhakad,
Harshvardhan Tiwari
TPC-31
Mood Detection of a Person through Face Expression and Lip
Movements
Nandita Tiwari,
Dr. Dinesh Chandra Jain
TPC-32
Issues and Challenges in Personal Authentication Using Finger Knuckle
Creases (FKC): A Survey
Anjana Verma,
Dr. Neelu Khare
TPC-33
A Comparative Study of Wu Manber String Matching Algorithm & its
Variations
Akansha Malviya
TPC-34
Virtual Appliance Preparation for Science Clouds
Sumit Dhariwal,
TPC-35
Reform DSR through Advanced TEF
TPC-36
Enhancement of Security and Quality of Image Steganography Using
Skew Tent Map
Atul Kumar
Agrawal,
Nasreen Mansuri,
TPC-37
Big Data Analysis using Map reduce Framework
Ankush Verma,
Dr Neelesh Jain
TPC-38
Student Attendance System through Facial Image Recognition
Shubhi
Shrivastava
, Dr. Dinesh C. Jain
TPC-39
Security Model for Cloud Networking
Anupama Jain
TPC-40
A Survey of Triangle based techniques in Biometric Gait Recognition
Arun Kumar
Jhapate,
TPC-28
A Review on Various Techniques for Encrypting
Akash Saxena ,Khushboo
Saxena, Akanksha Saxena,
Shraddha Parganiha
Kamlesh Chopra
Yogadher Pandey
Sunil Malviya
Download