Program for 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
Wednesday, September 13
Wednesday, September 13 8:30 - 13:00 (Asia/Kolkata)
Registration
Wednesday, September 13 9:30 - 11:00 (Asia/Kolkata)
Conference Inauguration
Wednesday, September 13 11:00 - 11:30 (Asia/Kolkata)
Tea Break
Wednesday, September 13 11:30 - 12:30 (Asia/Kolkata)
Keynote: Deep Learning with Spiking Random Neural Networks, Dr. Erol Gelenbe, Imperial College and Polish Academy of Sciences (Inventor of G-Networks and the Random Neural Network)
Abstract: Networks in mammalian brains are mainly of a spiking nature so that the manner in which such networks learn are of great philosophical, scientific and engineering interest. Thus several years ago, we developed the first O(n^3) gradient descent learning algorithm for recurrent networks using the spiking and random behaviour of biological neuronal cells. In this presentation we will details how these dense structures can be exploited in deep learning and how they can achieve significantly better performance than standard models. The presentation will be illustrated with numerous practical examples.
Wednesday, September 13 12:30 - 13:20 (Asia/Kolkata)
Lunch Break
Wednesday, September 13 16:00 - 16:30 (Asia/Kolkata)
Tea Break
Thursday, September 14
Thursday, September 14 8:30 - 13:00 (Asia/Kolkata)
Registration
Thursday, September 14 9:15 - 10:15 (Asia/Kolkata)
Keynote: Ubiquitous Displays: Spatially Augmenting Reality Via Multiple Projector-Agents, Dr. Aditi Majumder, Professor, Department of Computer Science, University of California, Irvine, USA (ACM Distinguished Speaker)
Abstract: The state of the art VR/AR devices provide access to completely virtual environments or augment information on the existing world seen by the user. Wearable devices encumber the users, and sometimes even cut them off completely from the real world. Users interact with digital avatars instead of the real people themselves. Spatially augmented reality (SAR) instead focuses on illuminating physical spaces with one or more projectors which when observed by one or more cameras can enable unique interaction modalities between the physical space and multiple users without being encumbered by any wearable device. This talk will present a new SAR paradigm of ubiquitous displays where displays are not mere carriers of information, but active members of the workspace interacting with data, user, environment and other displays. The goal is to integrate such active displays seamlessly with the environment making them ubiquitous to multiple users and data. This talk will present the overview of decade long research at UCI that has been instrumental in making ubiquitous displays accessible and affordable. Such ubiquitous displays are already gaining traction as projected augmented reality and promise to be a critical component of the future collaborative workspace.
Thursday, September 14 10:15 - 11:10 (Asia/Kolkata)
Keynote: High Efficiency Video Coding, Prof. K. R. Rao, Dept. of Electrical Engineering, University of Texas at Arlington, USA (co-inventor of Discrete Cosine Transform(DCT) )
Abstract: In the family of video coding standards, HEVC has the promise and potential to replace/supplement all the existing standards (MPEG and H.26x series including H.264/AVC). While the complexity of the HEVC encoder is several times that of the H.264/AVC, the decoder complexity is within the range of the latter. Researchers are exploring about reducing the HEVC encoder complexity . Kim et al have shown that motion estimation (ME) occupies 77-81% of HEVC encoder implementation. Hence the focus has been in reducing the ME complexity. Several researchers have implemented performance comparison of HEVC with other standards such as H.264/AVC , MPEG-4 Part 2 visual, H.262/PEG-2 Video , H.263, and VP9, THOR, DAALA and also with image coding standards such as JPEG, JPEG2000, JPEG-LS, JPEG-XT and JPEG-XR. Several tests have shown that HEVC provides improved compression efficiency up to 50% bit rate reduction for the same subjective video quality compared to H.264/AVC. Besides addressing all current applications, HEVC is designed and developed to focus on two key issues: increased video resolution - up to 8kx4k - and increased use of parallel processing architecture. Brief description of the HEVC is provided. However for details and implementation, the reader is referred to the JCT-VC documents , overview papers , keynote speeches , tutorials , panel discussions , poster sessions , special issues , test models (TM/HM) , web/ftp site, open source software , software manuals, test sequences, anchor bit streams and the latest books on HEVC . Also researchers are exploring transcoding between HEVC and other standards such as MPEG-2 and H.264. Further extensions to HEVC are scalable video coding (SVC), 3D video/multiview video coding and range extensions which include screen content coding (SCC), bit depths larger than 10 bits and color sampling of 4:2:2 and 4:4:4. SCC in general refers to computer generated objects and screen shots from computer applications (both images and videos) and may require lossless coding. Some of these extensions have been finalized by the end of 2014 (time frame for SCC is late 2016). They also provide fertile ground for R & D. Iguchi et al have already developed a hardware encoder for super hi-vision (SHV) i.e., ultra HDTV at 7680x4320 pixel resolution. Also real-time hardware implementation of HEVC encoder for 1080p HD video has been done. NHK is planning SHV experimental broadcasting in 2016. A 249-Mpixel/s HEVC video decoder chip for 4k Ultra-HD applications has already been developed. Bross et al have shown that real time software decoding of 4K (3840x2160) video with HEVC is feasible on current desktop CPUs using four CPU cores. They also state that encoding 4K video in real time on the other hand is a challenge.
Thursday, September 14 11:10 - 11:30 (Asia/Kolkata)
Tea Break
Thursday, September 14 11:30 - 12:30 (Asia/Kolkata)
Keynote: Objective, innovation and impact of the energy-efficient DOME MicroDataCenter, Ronald P. Luijten, Data Motion Architect, IBM Research - Zurich
Abstract: The DOME MicroDataCenter technology, developed by IBM Zurich Research and ASTRON Netherlands Institute for Radio Astronomy, brings together the embedded and data-center computing technologies resulting in the densest general purpose computing capability with best energy-efficiency. My presentation will cover how this project went from an initial idea and obtaining funding to a small dedicated team building innovative hard and software. I will explain how we used first principles in physics to motivate our decisions, a few practical technical obstacles we needed to overcome and key lessons we learnt along the way. Our result, which we are currently bringing to market thru a startup company, addresses the needs of edge-computing for the Internet of Things, a opportunity that we did not foresee when we started the project 5 years ago. I will close with a technology roadmap.
Thursday, September 14 12:30 - 13:30 (Asia/Kolkata)
Lunch Break
Thursday, September 14 16:00 - 17:30 (Asia/Kolkata)
Lightning Talks
- Enhancing Routing Efficiency Using Agents, Dr. M A Rizvi, National Institute of Technical Teachers' Training and Research, Bhopal
- Real Time Smart Sensing Systems: Challenges and Opportunities, Dr. Geetika Srivastava, Amity University Uttar Pradesh
- Image fusion an answer to Minimally Invasive surgeries, Dr. Tripty Singh, Amrita University
- Resource Allocation in Cloud using Agriculture Concept, Dr. Madhumathi, Sri Ramakrishna Engineering College
- Passive Optical Networks (PON) for Remote Area, Dr. S. Mary Praveena, Sri Ramakrishna Institute of Technology, Coimbatore
- Defining Multi-Word Expressions in Healthcare Sector, Srishti Singh, Jawaharlal Nehru University, New Delhi
- Improved Quad split Decision Tree Algorithm, Shubha Puthran, NMIMS University
- Protein Sciences: Revealing the Secrets of Life, Sandhya Parasnath Dubey, Manipal University, Manipal
- MQTT-SN for the Tiny Devices, Prof. Smitha N Pai, Manipal University
- Mass personalization Using Machine Learning, Abhishek S N, [24] 7 Inc
- Design of Wireless Sensor Network Based Attendance System for Smart University, Salma Fauzia, Muffakham Jah College Of Engineering and Technology
- Soft Case-based Reasoning: Retrieval and Adaptation, Nabanita Choudhury, Assam University, Silchar
- Linked data, Prof. Manjula Shenoy K, Manipal Institute of Technology, Manipal University
- Towards 5G network slicing: Key concepts and applications, Prof. Zoran Bojkovic, University of Belgrade
Thursday, September 14 16:30 - 17:15 (Asia/Kolkata)
Tea Break
Thursday, September 14 17:40 - 18:30 (Asia/Kolkata)
Plenary Talk : Cost-Effective Device and Cloud Enabled Smart Solutions for Diabetes Care, Dr. Bipin Nair, Professor and Dean, Amrita School of Biotechnology, Amrita University, Kollam, India
Abstract: Diabetes Mellitus is a public health problem affecting 65 million people in India with another 21 million people probably being in the prediabetic stage. The healthcare infrastructure for diabetes care in India, especially for the middle and low income population is extremely fragmented. With accessibility, availability and affordability being the issues of optimal healthcare today, there is an acute need for proactive low cost intelligent systems for diabetes care. The present smart solution being developed involves a totally indigenous, automated insulin pump that is a dual micro-controller based compact programmable drug infusion system. This US patented cost-effective system could be highly effective for administering insulin therapy, which is the gold standard for diabetes care. The smart solution also comprises a unique and cost-effective, US patented non-enzymatic glucose monitoring system which involves a glucometer, connected devices, mobility, cloud and helpline based ecosystem. In a mutually beneficial collaboration with Wipro Technologies, Amrita University aims to develop this smart solution with the goal to provide low cost quality care especially for the economically challenged diabetic population across the globe.
Thursday, September 14 18:30 - 20:30 (Asia/Kolkata)
Cultural Events followed by Banquet Dinner and Best Paper Award Ceremony
Friday, September 15
Friday, September 15 8:30 - 13:00 (Asia/Kolkata)
Registration
Friday, September 15 10:00 - 11:00 (Asia/Kolkata)
Keynote: "Industrial Applications of Big Data and Cognitive Technologies: From Cognitive Cities, to Cognitive Commerce and Cognitive Clouds", Dr. Arun Hampapur - Senior Director & Distinguished Engineer, Watson Research Group, IBM New York
Friday, September 15 11:00 - 11:15 (Asia/Kolkata)
Tea
Friday, September 15 11:15 - 12:10 (Asia/Kolkata)
Keynote(ICACCI/SSCC) : Can't You Hear Me Knocking : Novel Security and Privacy Threats to Mobile Users, Dr. Mauro Conti, University of Padua, Italy
Abstract: While Smartphone and IoT devices usage become more and more pervasive, people start also asking to which extent such devices can be maliciously exploited as "tracking devices". The concern is not only related to an adversary taking physical or remote control of the device, but also to what a passive adversary without the above capabilities can observe from the device communications. Work in this latter direction aimed, for example, at inferring the apps a user has installed on his device, or identifying the presence of a specific user within a network. In this talk, we discuss threats coming from contextual information and to which extent it is feasible, for example, to identify the specific actions that a user is doing on mobile apps, by eavesdropping their encrypted network traffic. We will also discuss the possibility of building covert and side channels leveraging energy consumption and audio signals.
Friday, September 15 12:10 - 13:00 (Asia/Kolkata)
Keynote : Searching for Gravitational Waves, Dr. Dilip Krishnaswamy, IBM Research, India
Abstract: This talk will give an overview of research in progress for the detection of gravitational waves. The talk will address both the physics and computational aspects related to the problem. Gravitational wave detectors in India and Japan are expected to come on board soon to complement detectors in the US and in Europe. This distributed network of detectors will work jointly to detect and estimate parameters such as event localization or determining the masses and spins of black holes or neutron stars involved in the event. One can expect new distributed algorithms related to signal processing or distributed computing or application of machine learning techniques to be developed in the search for gravitational waves, leading to exciting new research opportunities in this domain.
Friday, September 15 13:00 - 14:00 (Asia/Kolkata)
Lunch Break
Friday, September 15 15:00 - 16:00 (Asia/Kolkata)
Tutorial: Agility vs Stability Paradox in Computing World, Mr. Arijit Sarbagna, Strategic Consultant on Agile, DevOps, Digital, Mobile & IoT - Transformation, Delivery, Enabling, Atos India
Abstract: Over a decade or more, the field of Information Technology has seen a wild spread of Agile Software Development (with its several associated spikes like - ScrumBan, DevOps, 2 Speed IT et al). This has not only created a huge wave of innovation, but also lot of contradicting philosophies (& debates). We do see questions (or confusions) on the need to have a stable infrastructure, whereas the rapid dynamics of market expects us to deliver fast. How do we manage a balance between these two spheres? We will dive deep in to these areas and also understand how Agilie Software Delivery is moving to future.
The talk will cover below points for 60 Minutes: o Agility vs Stability Paradox in Computing World. o DevOps in Computing World o Agility in Informatics
Friday, September 15 16:00 - 17:00 (Asia/Kolkata)
Tea Break
Saturday, September 16
Saturday, September 16 8:30 - 11:00 (Asia/Kolkata)
Registration
Saturday, September 16 9:20 - 10:00 (Asia/Kolkata)
Keynote: Cognitive Computing-Next Wave to AI, Dr. Elizabeth Sherly, IIITM-Kerala [Fifth Symposium on Women in Computing and Informatics (WCI'17)]
Cognitive Computing-Next Wave to AI: Self learning Systems without much of human intervention and mimicking the way the human brain processes is a challenging research area. Cognitive Computing dealt with such systems which involve self-learning systems using use Data mining, Pattern recognition, and Natural Language. This talk will explore various components required for cognitive computing and how a virtual agent creates using a chat bot in a mobile environment. The use of natural language modeling, data analytics, visual recognition are also be discussed in the presentation.
Saturday, September 16 10:00 - 10:50 (Asia/Kolkata)
Hot off the Press
In this session, researchers will present summaries of their own work recently published in top-tier conferences and journals. Contributions are selected based on their scientific quality and their relevance to the ICACCI community.
Saturday, September 16 10:50 - 11:00 (Asia/Kolkata)
Tea Break
Saturday, September 16 13:00 - 14:15 (Asia/Kolkata)
Lunch Break
Saturday, September 16 14:30 - 15:00 (Asia/Kolkata)
WCI Panel Discussion: Empowering women association in Tech Spectrum, Moderator: Dr. Aditi Majumder, Professor, Department of Computer Science, University of California, Irvine, USA
Saturday, September 16 15:00 - 15:30 (Asia/Kolkata)
Valedictory
Wednesday, September 13
Wednesday, September 13 14:30 - 18:00 (Asia/Kolkata)
ICACCI-02(A): ICACCI-02(A): Artificial Intelligence and Machine Learning/Data Engineering/Biocomputing (Regular Papers)
- ICACCI-02(A).1 14:30 Dynamic Data Placement and Tool Assignment for Big-data Orchestrated Bioinformatics Workflows
- ICACCI-02(A).2 14:45 Comparison of Neural-Network Learning Algorithms for Time-Series Prediction
- ICACCI-02(A).3 15:00 An Efficient Solution for Multi-label Classification Problem Using Apriori Algorithm(MLC-A)
- ICACCI-02(A).4 15:15 Question Bank Calibration Using Unsupervised Learning of Assessment Performance Metrics
- ICACCI-02(A).5 15:30 Comparison of Reinforcement Learning Algorithms Applied to the Cart-Pole Problem
- ICACCI-02(A).6 15:45 A Novel Deep Learning Based Method for RetinalLesion Detection
- ICACCI-02(A).7 16:00 Supervised Learning Based Instance Matching System for Data Linking
- ICACCI-02(A).8 16:15 Hardware Implementation of Support Vector Machine Classifier Using Reconfigurable Architecture
- ICACCI-02(A).9 16:30 Prediction of Cardiac Arrhythmia Type Using Clustering and Regression Approach (P-CA-CRA)
- ICACCI-02(A).10 16:45 Stock Price Prediction Using Dynamic Mode Decomposition
Wednesday, September 13 14:30 - 18:30 (Asia/Kolkata)
ICACCI-02(B): ICACCI-02(B): Artificial Intelligence and Machine Learning/Data Engineering/Biocomputing (Regular Papers)
- ICACCI-02(B).1 14:30 Applying Improved SVM Classifier for Leukemia Cancer Classification Using FCBF
- ICACCI-02(B).2 14:45 A Learning Method for Coreference Resolution Using Semantic Role Labeling Features
- ICACCI-02(B).3 15:00 Statistical Class Prediction Method for Efficient Microarray Gene Expression Data Sample Classification
- ICACCI-02(B).4 15:15 Handling Class Imbalance Problem Using Oversampling Techniques A Review
- ICACCI-02(B).5 15:30 Time-aware Relation Extraction for Entities Using News Headlines
- ICACCI-02(B).6 15:45 Modeling Non-equilibrium Glides in Flying Snakes
- ICACCI-02(B).7 16:00 Solar Power Prediction Using Deduced Feature of Visibility Index and Artificial Neural Network
- ICACCI-02(B).8 16:15 Design and Verification of a Collaborative Task Execution Procedure Using BPMN Modeler
- ICACCI-02(B).9 16:30 Semi-Automated Intelligent Systems
- ICACCI-02(B).10 16:45 Rough K-means and Support Vector Machine Based Brain Tumor Detection
Wednesday, September 13 14:30 - 18:00 (Asia/Kolkata)
ICACCI-03: ICACCI-03: Sensor Networks, MANETs and VANETs/Distributed Systems/WSTA (Regular Papers)
- ICACCI-03.1 14:30 Hybrid Biogeography Algorithm for Reducing Power Consumption in Cloud Computing
- ICACCI-03.2 14:45 An Efficient Scheme for On-Demand Energy Replenishment in Wireless Rechargeable Sensor Networks
- ICACCI-03.3 15:00 NS-2 Extension for Interface Assignment in AODV Routing Protocol
- ICACCI-03.4 15:15 Performance Analysis of IEEE 802.11Ac for Vehicular Networks Using Realistic Traffic Scenarios
- ICACCI-03.5 15:30 Real Time Implementation of k Fake Location Generation Algorithm to Protect Location Privacy in Location Based Services
- ICACCI-03.6 15:45 ProTE: An OpenFlow Based Traffic Engineering Mechanism for Data Center Networks
- ICACCI-03.7 16:00 A Systematic Approach for Analyzing Hop Count and Path Reliability of Mobile Ad Hoc Networks
- ICACCI-03.8 16:15 An Iterative Message Passing Approach for Compressive Spectrum Sensing
- ICACCI-03.9 16:30 A Delay Efficient Path Selection Strategy for Mobile Sink in Wireless Sensor Networks
- ICACCI-03.10 16:45 Accelerated Kerninghan Lin Algorithm for Graph Partitioning
- ICACCI-03.11 17:00 Complete RFID Security Solution for Inventory Management Systems
- ICACCI-03.12 17:15 Detection of Pollution Content in an Urban Area Using Landsat 8 Data
ICACCI-04: ICACCI-04: Security, Trust and Privacy/Steganography/SAI'17 (Regular Papers)
- ICACCI-04.1 14:30 An Improved Secret Key Update for Multiple Intersymbol Obfuscation in Physical Layer Security
- ICACCI-04.2 14:45 A Big Data Framework for Intrusion Detection in Smart Grids Using Apache Spark
- ICACCI-04.3 15:00 Adaptive Content-Aware Access Control of EPR Resource in a Healthcare System
- ICACCI-04.4 15:15 Scalable and Parameterized Hardware Implementation of Elliptic Curve Digital Signature Algorithm over Prime Fields
- ICACCI-04.5 15:30 On the Extension of XOR Step Construction for Optimal Contrast Grey Level Visual Cryptography
- ICACCI-04.6 15:45 Eye Blink Count and Eye Blink Duration Analysis for Deception Detection
- ICACCI-04.7 16:00 A Novel Method for Intrusion Detection in Relational Databases
- ICACCI-04.8 16:15 Long Short-Term Memory Based Operation Log Anomaly Detection
- ICACCI-04.9 16:30 Robust Multimodal Biometric Verification System Based on Face and Fingerprint
- ICACCI-04.10 16:45 A Steganographic Approach to Mitigate Password Attacks
- ICACCI-04.11 17:00 A Novel Approach for Image Security Using Reversible Watermarking
- ICACCI-04.12 17:15 Evaluating Shallow and Deep Networks for Ransomware Detection and Classification
- ICACCI-04.13 17:30 Evaluating Shallow and Deep Networks for Secure Shell (SSH)Traffic Analysis
ICACCI-05: ICACCI-05: Symposium on Recent Advances in Communication Theory, Information Theory, Antennas and Propagation (CIAP'17)/Symposium on VLSI Design and Embedded Computing (VDEC'17)
- ICACCI-05.1 14:30 Ultra-Wideband Tightly Coupled Dipole Phased Array Antenna
- ICACCI-05.2 14:45 Bandwidth Enhancement of Wire-based Metamaterial Absorber Using Dielectric Cap
- ICACCI-05.3 15:00 Modified Weighted Bit Flipping Algorithm Based on Intrinsic Information for LDPC Codes
- ICACCI-05.4 15:15 Design and Analysis of Multiband Reconfigurable Microstrip Patch Antenna with Switchable Element
- ICACCI-05.5 15:30 Adaptive Threshold Multi Bit Flipping for Low Density Parity Check Codes
- ICACCI-05.6 15:45 Channel Modeling and Estimation of Polarized MIMO for Land Mobile Satellite Systems
- ICACCI-05.7 16:00 Detection of Closely Spaced Sinusoids in Noise Using FastICA Algorithm
- ICACCI-05.8 16:15 Adaptive Modulation and Coding and Cooperative ARQ in a Cognitive Radio System
- ICACCI-05.9 16:30 Spectral Efficiency of Multi-User Adaptive Cognitive Radio Networks
- ICACCI-05.10 16:45 A Low Complex Turbo Decoding Algorithm with Early Iteration Termination
- ICACCI-05.11 17:00 Defect and Fault Detection in Combinational Circuits: Techniques and Analysis
- ICACCI-05.12 17:15 FABRICATION AND STUDY OF VARIOUS CHARACTERISTICS OF HIGH PERFORMANCE III-V MOSFETS WITH HIGH- K DIELECTRICS
- ICACCI-05.13 17:30 Reversible Circuit Optimization Using Modified Toffoli Templates
- ICACCI-05.14 17:45 A Study on Spectral Occupancy in the North Eastern India for Rural Broadband Access
- ICACCI-05.15 18:00 Nonlinear State Estimation of Wind Turbine
ICACCI-06: ICACCI-06: Fifth International Symposium on Intelligent Informatics (ISI'17)
Keynote 4: Hierarchical Temporal Memories - Theory and Implementations for Algorithms, Circuits and Systems, Dr. Alex Pappachen James, Nazarbayev University, Kazakhstan
Abstract: Mimicking the functions of cortex in the human brain has been one of greatest challenges of artificial intelligence research. The adaptation of biological circuits to silicon systems is not a trivial task, and requires an interdisciplinary understanding of the problems, making this a topic of interest to a wide range of researchers from neuroscience to computer engineers. In this talk, the introduction to Hierarchical Temporal Memories (HTM) architecture in both software and hardware levels is presented. The HTM inspires from the functioning of pyramidal neurons in the cortex and is considered to be useful for several sequence learning tasks. In this talk, I will present a set of algorithms and hardware implementations, specifically that based on memristor circuits and systems. Further, example applications of HTM in pattern recognition applications will be presented.
- ICACCI-06.1 14:30 Preemptive Priority Mechanism with Hybrid Spectrum Sensing for Cognitive Radio Networks
- ICACCI-06.2 14:45 Deep Encrypted Text Categorization
- ICACCI-06.3 15:00 Comparing Chirplet-Based Classification with Alternate Feature-Extraction Approaches for Outdoor Intrusion Detection Using a PIR Sensor Platform
- ICACCI-06.4 15:15 Hyperspectral Crop Classification Using Fusion of Spectral, Spatial Features and Vegetation Indices: Approach to the Big Data Challenge
- ICACCI-06.5 15:30 Assessing Short-Term Social Media Marketing Outreach of a Healthcare Organization Using Machine Learning
- ICACCI-06.6 15:45 Automated Rating of Recorded Classroom Presentations Using Speech Analysis in Kazakh
- ICACCI-06.7 16:00 Shuffled Multi-Population Bat Algorithm (SMPBat)
- ICACCI-06.8 16:15 An Intelligent Fragile Watermarking Scheme Based on Contourlets for Effective Detection Localization and Recovery of Tampered Regions in Handwritten Document Images
- ICACCI-06.9 16:30 Enhanced RLS in Smart Antennas for Long Range Communication Networks
- ICACCI-06.10 16:45 Smart and Secure IoT Based Child Behaviour and Health Monitoring System Using Hadoop
- ICACCI-06.11 17:00 Design and Verification of Nuclear Waste Handling System
Thursday, September 14
Thursday, September 14 14:30 - 17:30 (Asia/Kolkata)
ICACCI-07: ICACCI-07: Internet of Things (IoT)
- 14:30 GEO TAGGED INTERNET OF THINGS (IoT) DEVICE FOR RADIATION MONITORING
- 14:45 Revenue Oriented Air Quality Prediction Microservices for Smart Cities
- 15:00 Intelligent Soil Quality Monitoring System for Judicious Irrigation
- 15:15 IoT Based Intelligent Poultry Management System Using Linux Embedded System
- 15:30 Flow Based Environmental Monitoring for Smart Cities
- 15:45 Low Cost Implementation of Smart Home Automation
- 16:00 Radio Data Infrastructure for Remote Monitoring System Using LoRa Technology
- 16:15 Implementing an Efficient Lightweight MODBUS Protocol over a Wireless Sensor Network
- 16:30 Obviating Capricious Behavior in Internet of Things
- 16:45 Highly Secure and Efficient Architectural Model for IoT Based Health Care System
- 17:00 Distinction Between Data Losses for Better Communications in IoT
- 17:15 IoT Based Automated Car Maintenance Assist
- 17:30 IoT BASED SCHOOL BUS TRACKING AND ARRIVAL TIME PREDICTION
Thursday, September 14 13:30 - 17:30 (Asia/Kolkata)
ICACCI-08: ICACCI-08: Workshop on Bioinspired modeling and Computational Neuroscience(BioCompNeuro'17)
Keynote Speakers
----------------------------------------------------------------------------- Speaker: Dr. Aditya Murthy, Centre for Neuroscience, Indian Institute of Science, Bengaluru, IndiaTitle of Talk: Computational Mechanisms Underlying the Control of Simple and Complex Movements
Abstract: A fundamental computation that our brains must perform is the conversion of a stimulus into a motor act. This operation implicitly requires decision-making and motor planning. Using fast eye movements called saccades that rapidly direct our gaze to points of interest in the visual scene we investigate the computational architecture underlying flexible motor planning and control. Using the insights from gained from these experiments we will describe results from recent experiments that provide insights into how the brain might coordinate and control simultaneous eye and hand movements.
Speaker: Dr. V. Srinivasa Chakravarthy, Indian Institute of Technology Madras, Chennai. India
Title of Talk: Understanding the Parkinsonian Brain through Computational Modeling
Abstract: We present a model of Basal Ganglia (BG) that departs from the classical Go/NoGo picture of the function of its key pathways - the direct and indirect pathways (DP & IP). Between the Go and NoGo regimes, we posit a third Explore regime, which denotes random exploration of action alternatives. Striatal dopamine is assumed to switch between DP and IP activation. The IP is modeled as a loop of the Subthalamic Nucleus (STN) and the Globus Pallidus externa (GPe). Simulations reveal that while the model displays Go and NoGo regimes for extreme values of dopamine, at intermediate values of dopamine, it exhibits exploratory behavior, which originates from the chaotic activity of the STN-GPe loop. We describe a series of BG models based on Go/Explore/NoGo approach, to explain the role of BG in three cases: 1) reaching and 2) gait impairment and 3) willed action.
Speaker: Dr. Shyam Diwakar, Amrita University, Kollam, India
Title of Talk: Computational Neuroscience of cerebellum and interconnected circuits
Abstract: Over the last years, cerebellum, a small yet significant region of the brain has been connected for its roles in ataxias, Parkinson's, Alzheimers disorders and several other neurological conditions. Signal coding in the cerebellum happens at the input granular layer comprising of a large percentage of cells. With mathematical modeling as the focus, this talk will elucidate the information transmission and signal recoding properties in the cerebellum. To understand circuit function, we modeled population activity such as local field potentials and fMRI BOLD signals. Local field potentials (LFPs) were reconstructed (Parasuram, 2016, 2017) to test and parameterize the molecular mechanisms of cellular function with network properties. The role of synaptic plasticity in modifying the information capability of this circuit will also be addressed. To conclude, we will also show how abstractions of such brain circuits can help as algorithms in robotic control and deep learning.
- ICACCI-08.1 13:30 Computational Modelling of Apoptosis in Parkinson's Disease Using Biochemical Systems Theory
- ICACCI-08.2 13:45 Computational Neuroscience of Substantia Nigra Circuit and Dopamine Modulation During Parkinson's Disease
- ICACCI-08.3 14:00 An Open-Source Computational Neuroscience Virtual Laboratory Tool for Simulating Spiking Neurons and Circuits
- ICACCI-08.4 14:15 Comparing Parallel Simulation of Single and Multi Compartmental Spiking Neuron Models Using GPGPU
- ICACCI-08.5 14:30 Information Theoretic Visualization of Spiking Neural Networks
- ICACCI-08.6 14:45 Classifying Gait Features for Stance and Swing Using Machine Learning
- ICACCI-08.7 15:00 Implementation of Analog Electrical Neurons as Virtual Labs for Neuroscience Education
- ICACCI-08.8 15:15 Modeling Population Network Activity Using LFPsim, Spiking Neurons and Neural Mass Models
- ICACCI-08.9 15:30 Modeling Component and Pattern Motion Selectivity in the MT Area of Visual Cortex
- ICACCI-08.10 15:45 Comparing Robotic Control Using a Spiking Model of Cerebellar Network and a Gain Adapting Forward-Inverse Model
Thursday, September 14 14:30 - 17:30 (Asia/Kolkata)
ICACCI-09: ICACCI-09: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems/ICAIS'17 (Regular Papers)
- ICACCI-09.1 14:30 Adaptive Backstepping Control Scheme with Integral Action for Quanser 2-DOF Helicopter
- ICACCI-09.2 14:45 Neural Network Approach for Vision-Based Track Navigation Using Low-Powered Computers on MAVs
- ICACCI-09.3 15:00 Follow-Me Robot Using Bluetooth Based Position Estimation
- ICACCI-09.4 15:15 Energy Harvesting Relay Outage Probability Analysis of Cooperative Communication System over Small and Large Scale Fading Channels
- ICACCI-09.5 15:30 Moon Slotted Circular Planar Monopole UWB Antenna Design and Analysis
- ICACCI-09.6 15:45 Dynamic Media Selection Between WiFi and LTE in Telemedicine Scenarios
- ICACCI-09.7 16:00 A Novel Noise Floor Estimation Technique for Optimized Thresholding in Spectrum Sensing
- ICACCI-09.8 16:15 Modified Signal Design for Multistream Spatial Modulation over Spatially Correlated Channels
- ICACCI-09.9 16:30 Analytical Channel Model for Double Layer Metamaterial-Improved Magnetic Induction Communication
- ICACCI-09.10 16:45 Offline Routing and Wavelength Assignment for Identification of Regeneration Sites in Translucent WDM Optical Networks
- ICACCI-09.11 17:00 Pipeline-Design Based FPGA Implementation of Online Sequential Learning Algorithm
- ICACCI-09.12 17:15 Programmable Multimode Twin Pump Controller
ICACCI-10: ICACCI-10: Sixth Symposium on Natural Language Processing (NLP'17)/Natural Language Processing and Machine Translation (Regular Papers)
- ICACCI-10.1 14:30 Word Sense Disambiguation of Polysemy Words in Kannada Language
- ICACCI-10.2 14:45 Document Summarization Using Dictionary Learning
- ICACCI-10.3 15:00 Extracting Quality Relations from Categorical Data Using Modified Qube Algorithm
- ICACCI-10.4 15:15 Intelligent Context Based Prediction Using Probabilistic Intent-Action Ontology and Tone Matching Algorithm
- ICACCI-10.5 15:30 A Hybrid Approach for Automatic Document Summarization
- ICACCI-10.6 15:45 Contextual Advertising for Regional Language Blogs
- ICACCI-10.7 16:00 Development of Speech Emotion Recognition System Using Deep Belief Networks in Malayalam Language
ICACCI-11: ICACCI-11: Sensor Networks, MANETs and VANETs/Distributed Systems/WSTA (Regular Papers)
- ICACCI-11.1 14:30 Seamless Test Environment for Distributed Embedded Wireless Networks
- ICACCI-11.2 14:45 IHIDS:Introspection-Based Hybrid Intrusion Detection System in Cloud Environment
- ICACCI-11.3 15:00 Semantic Tourism Information Retrieval Interface
- ICACCI-11.4 15:15 A Preliminary Framework Using BPNN for Performability Modelling and Analyses of a Kerberos Server
- ICACCI-11.5 15:30 Clustering of Web Users' Access Patterns Using a Modified Competitive Agglomerative Algorithm
- ICACCI-11.6 15:45 A Framework for Seed User Identification Across Multiple Online Social Networks
- ICACCI-11.7 16:00 Uniform Distribution of Energy in Wireless Sensor Network Using Efficient Path Search
- ICACCI-11.8 16:15 A Novel Green Stable Evolutionary Routing Algorithm for Energy Efficiency in WSNs
- ICACCI-11.9 16:30 Keeping the Android User Aware of past and Present Network Traffic
- ICACCI-11.10 16:45 TOPSIS Based Delay Sensitive Network Selection for Wireless Body Area Networks
- ICACCI-11.11 17:00 On Designing Lightweight QoS Routing Protocol for Delay-Sensitive Wireless Body Area Networks
- ICACCI-11.12 17:15 Coordinator-based Adaptive Fault Diagnosis Algorithm for Distributed Computing Systems
ICACCI-12: ICACCI-12: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Regular Papers)
- ICACCI-12.1 14:30 Facial Emotion Recognition Using Min-Max Similarity Classifier
- ICACCI-12.2 14:45 Implementation of Advanced Authentication System Using OpenCv by Capturing Motion Images
- ICACCI-12.3 15:00 Affective Computing Using Speech Processing for Call Centre Applications
- ICACCI-12.4 15:15 An Integrated Robust Approach for Fast Face Tracking in Noisy Real-World Videos with Visual Constraints
- ICACCI-12.5 15:30 A Robust Reversible Watermarking Technique Based on Prediction Error Expansion Using ECC
- ICACCI-12.6 15:45 Curved Document Image Rectification
- ICACCI-12.7 16:00 Issues Involved in Automatic Selection and Intensity Based Matching of Feature Points for MLS Registration of Medical Images
- ICACCI-12.8 16:15 Support Vector Machine Based Classification of Medicinal Plants Using Leaf Features
- ICACCI-12.9 16:30 Musical Notes to MIDI Conversion
- ICACCI-12.10 16:45 Hyperspectral Image Denoising: A Least Square Approach Using Wavelet Filters
- ICACCI-12.11 17:00 Strongly Orthogonal Sequences and Their Application to Calibration and Pointing of Satellite Beam Former
- ICACCI-12.12 17:15 Medical Image Segmentation Using Rough-Spatial Kernelized FCM Algorithm
- ICACCI-12.13 17:30 A Comparative Study of Two Recent Word Spotting Techniques in the Run-Length Compressed Domain
- ICACCI-12.14 17:45 Ubiquitous Displays: Spatially Augmenting Reality via Multi-Projector Agents
Friday, September 15
Friday, September 15 14:00 - 18:00 (Asia/Kolkata)
ICACCI-13: ICACCI-13: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems/ICAIS'17 (Regular Papers)
- ICACCI-13.1 14:00 Design of Fuzzy Based Intelligent Controller for Autonomous Mobile Robot Navigation
- ICACCI-13.2 14:15 Micro-controller Driven Wind Turbine Blade Cleaning Peripheries
- ICACCI-13.3 14:30 Averaging Circuit Using Graphene FETs: A Novel Approach for Analog and Digital Signal Averaging
- ICACCI-13.4 14:45 Design and Fabrication of Robotic Systems: Converting A Conventional Car to A Driverless Car
- ICACCI-13.5 15:00 A Cable Driven Parallel Robot for Coconut Farm
- ICACCI-13.6 15:15 Steering Angle Estimation for Autonomous Vehicle
- ICACCI-13.7 15:30 Effective Utilization and Analysis of ROS on Embedded Platform for Implementing Autonomous Car Vision and Navigation Modules
- ICACCI-13.8 15:45 LabVIEW Based EMG and Blood Pressure Measurement Bio Telemetry System
- ICACCI-13.9 16:00 Jaya Optimization Algorithm Based Multiuser Detector over Generalized-K Fading Channels
- ICACCI-13.10 16:15 Greedy Search Algorithm Based Two Stage Energy Saving Technique for Dense LTE-A HetNets
- ICACCI-13.11 16:30 An Optimization Framework for Solving RFID Reader Placement Problem Using Greedy Approach
- ICACCI-13.12 16:45 Tool to Handle Imbalancing Problem in Software Defect Prediction Using Oversampling Methods
- ICACCI-13.13 17:00 Objective, Innovation and Impact of the Energy-Efficient DOME MicroDataCenter
ICACCI-14: ICACCI-14: Sixth Symposium on Natural Language Processing (NLP'17)/Natural Language Processing and Machine Translation (Regular Papers)
- ICACCI-14.1 14:00 Chunking Based Malayalam Paraphrase Identification Using Unfolding Recursive Autoencoders
- ICACCI-14.2 14:15 Key to Crossword Solving: NLP
- ICACCI-14.3 14:30 Digital Corpus of Santali Language
- ICACCI-14.4 14:45 Automata for Santali Language Processing
- ICACCI-14.5 15:00 A Graph-Based Relation Extraction Method for Question Answering System
- ICACCI-14.6 15:15 Kannada Spell Checker with Sandhi Splitter
- ICACCI-14.7 15:30 Improving the Rule Based Machine Translation System Using Sentence Simplification (English to Tamil)
- ICACCI-14.8 15:45 Detecting Stance in Kannada Social Media Code-Mixed Text Using Sentence Embedding
- ICACCI-14.9 16:00 Enhanced Utility in Preserving Privacy for Multiple Heterogeneous Sensitive Attributes Using Correlation and Personal Sensitivity Flags
- ICACCI-14.10 16:15 Recognition of Multilingual Text from Signage Boards
- ICACCI-14.11 16:30 Analysis of Linear Relation Between P-Value and Co Relational Value Using R Programming
ICACCI-15: ICACCI-15: Sensor Networks, MANETs and VANETs/Distributed Systems/WSTA (Regular Papers)
- ICACCI-15.1 14:00 Security Analysis of Group Key Management Schemes of Wireless Sensor Network Under Active Outsider Adversary Model
- ICACCI-15.2 14:15 Instance Based Human Physical Activity(HPA) Recognition Using Shimmer2 Wearable Sensor Data Sets
- ICACCI-15.3 14:30 A Smart Transportation System Facilitating On-Demand Bus and Route Allocation
- ICACCI-15.4 14:45 Efficient Virtual Machine Placement in Cloud Environment
- ICACCI-15.5 15:00 Method Level Power Estimation and Optimization in Next Generation Smart Phones
- ICACCI-15.6 15:15 A Framework for Optimization of Regression Testing of Web Services Using Slicing
- ICACCI-15.7 15:30 Trace-Based Method for Big Data Memory Characteristics Research
- ICACCI-15.8 15:45 Shuffle Phase Optimization in Spark
- ICACCI-15.9 16:00 Efficient Relocation of Mobile Sensors for Target Coverage
- ICACCI-15.10 16:15 Performance Evaluation of Scalable Video Stream over Bandwidth Constrained Network Using Software Defined Networks
- ICACCI-15.11 16:30 Video Artifact Evaluation Based on QoS and Objective QoE Parameters
- ICACCI-15.12 16:45 Capacity and Energy Management in Massive MIMO and Heterogeneous Small Cell Networks
- ICACCI-15.13 17:00 An IoT-based E-Parking System for Smart Cities
ICACCI-16: ICACCI-16: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Regular Papers)
- ICACCI-16.1 14:00 Extraction of Lung Nodules in HRCT Images Using Partial Differential Equation Based Model
- ICACCI-16.2 14:15 Performance Analysis of Trajectory Compression Algorithms on Marine Surveillance Data
- ICACCI-16.3 14:30 Multi-Modality Face Recognition: An Information Theoretic Approach
- ICACCI-16.4 14:45 Application of Nyaya Inference Method for Feature Selection and Ranking in Classification Algorithms
- ICACCI-16.5 15:00 Classification of Cognitive State Using Clustering Based Maximum Margin Feature Selection Framework
- ICACCI-16.6 15:15 Coarse to Fine Difference Edge Detection with Binary Neural Firing Model
- ICACCI-16.7 15:30 Indexing and Retrieval of Malayalam News Videos Based on Word Image Matching
- ICACCI-16.8 15:45 A Comprehensive Study of Text Classification Algorithms
- ICACCI-16.9 16:00 Epileptic Seizure Detection Based on EEG Signal Analysis Using Hierarchy Based Hidden Markov Model
- ICACCI-16.10 16:15 An Adaptive Reconfigurable Antenna for Cognitive Radio System
- ICACCI-16.11 16:30 Thought-Forms Patterns Identification Using Histograms of the Derivative of Intensity Outline
- ICACCI-16.12 16:45 Robust Classification of MR Brain Images Based on Fractal Dimension Analysis
ICACCI-17: ICACCI-17: Fourth International Symposium on Computer Vision and the Internet (VisionNet'17)
Illumination has been found to be an effective cue for detecting splicing forgeries in images. In illumination-based image forensics, the illumination information is estimated from different objects present in an image. The estimated illumination features are later compared to check for possible forgeries. The forensics community has been using two different aspects of illumination for forgery detection: the illumination direction and the illumination colour. Hany Farid and his team at Dartmouth College, pioneered the work on illumination direction-based forensics. In their first method, they estimated the 2D illumination direction from the shading and 2D object contour normals and checked the consistencies in the illumination directions. Later, they proposed to use spherical harmonic (SH) analysis to estimate more complex illumination environment in terms of the SH coefficients, making the method more applicable to real-life images. To estimate the full 3D illumination environment, a 3D face model is created from some face images. The 3D surface normals for a test face image are extracted by applying this model and used to estimate the lighting environment. Recently, Peng et al. have proposed a more accurate 3D SH-based method by relaxing some less practical assumptions about human faces. Like the illumination direction, the illumination colour is proved be an effective cue for checking authenticity of images. In the first illumination colour-based method, we showed how illumination colour can be effectively used to expose splicing forgery. In the method, we first created a dichromatic plane (DP) from the specular highlights of each object utilising the dichromatic reflection model (DRM). We showed that for an authentic image, the DPs estimated from different objects intersect at a single point. For a forged image, there will be more than one intersection points. Carvalho et al. from Brazil have proposed a machine learning-based approach, where a new image, called illuminant map (IM), is first created by replacing each homogenous region with its illuminant colour. Then, machine learning-based classifiers are trained to capture the texture, shape and colour inconsistencies present in spliced images. The presentation will outline these techniques.
- ICACCI-17.1 14:00 Reduced Keyframes for Fast Bundle Adjustment Using Point and Line Features in MonoSLAM
- ICACCI-17.2 14:15 An Efficient GMM and Active Contour Based Unsupervised Person Re-Identification
- ICACCI-17.3 14:30 Implementation of Telugu Speech Synthesis System
- ICACCI-17.4 14:45 A Reduced-Complexity, Reduced-Power Camera System for Intrusion Classification in an Outdoor Setting
- ICACCI-17.5 15:00 Handling Workload Skew in a Consistent Hashing Based Partitioning Implementation
- ICACCI-17.6 15:15 Study of Execution Parallelism by Resource Partitioning in Hadoop YARN
- ICACCI-17.7 15:30 Sign Language Translator for MobilePlatforms
- ICACCI-17.8 15:45 A Bottom Up Procedure for Text Line Segmentation of Latin Script
- ICACCI-17.9 16:00 Detection of COPPER in Southern India Using HYPERION Imagery
- ICACCI-17.10 16:15 A Simple Recursive Backtracking Algorithm for Knight's Tours Puzzle on Standard 8X8 Chessboard
- ICACCI-17.11 16:30 Computer Vision Based Robotic Weed Control System for Precision Agriculture
ICACCI-18: ICACCI-18: Security, Trust and Privacy/Steganography/SAI'17 (Regular Papers)
- ICACCI-18.1 14:00 Proxy Re-encryption Using Rectangular Integer Matrix Keys
- ICACCI-18.2 14:15 Time-based One-Time Password for Wi-Fi Authentication and Security
- ICACCI-18.3 14:30 Improved Personalized Recommendation System with Better User Experience
- ICACCI-18.4 14:45 Applying Convolutional Neural Network for Network Intrusion Detection
- ICACCI-18.5 15:00 MP4 Video Steganography in Wavelet Domain
- ICACCI-18.6 15:15 Analysis of Latest Vulnerabilities in Android
- ICACCI-18.7 15:30 Bounding the Diameter of Cayley Graphs Generated by Specific Transposition Trees
- ICACCI-18.8 15:45 Enhancing Control System Security of Power Grid Using Anomaly Detection and Behaviour Analysis
- ICACCI-18.9 16:00 Secure Model for Clustering Distributed Data
- ICACCI-18.10 16:15 An Efficient Digital Signature Scheme by Using Integer Factorization and Discrete Logarithm Problem
- ICACCI-18.11 16:30 Transaction Signing on Multiple Channels
- ICACCI-18.12 16:45 Learning Mechanisms for Anomaly-Based Intrusion Detection: Updated Review
- ICACCI-18.13 17:00 Evaluating Effectiveness of Shallow and Deep Networks to Intrusion Detection System
Saturday, September 16
Saturday, September 16 11:00 - 13:30 (Asia/Kolkata)
ICACCI-19: ICACCI-19: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems (Regular Papers)
- ICACCI-19.1 11:00 Fuzzy Logic Based Fault Detection of Controller Area Network Using MicroAutoBox - II
- ICACCI-19.2 11:15 User Centered Energy Management Scheme for Smart Buildings
- ICACCI-19.3 11:30 Automated System for Obstructive Sleep Apnea Detection Using Heart Rate Variability and Respiratory Rate Variability
- ICACCI-19.4 11:45 Classification of Benign and Malignant Melanocytic Lesions: A CAD Tool
- ICACCI-19.5 12:00 Automatic Waste Segregator
- ICACCI-19.6 12:15 Forecasting of Ozone Concentration in Smart City Using Deep Learning
- ICACCI-19.7 12:30 Performance Evaluation of Predictive Models for Missing Data Imputation in Weather Data
- ICACCI-19.8 12:45 Energy Harvesting Using Cyclic Prefixed OFDMA
- ICACCI-19.9 13:00 An Empirical Approach for Optimizing Globally Distributed Software Product Engineering
- ICACCI-19.10 13:15 Efficient Test Scheduling for Reusable BIST in 3D Stacked ICs
- ICACCI-19.11 13:30 Remote Software Maintenance System for Telecom Network
ICACCI-20: ICACCI-20: Second Symposium on Emerging Topics in Computing and Communications (SETCAC'17)
- ICACCI-20.1 11:00 Localization of an Unmanned Aerial Vehicle for Fault Detection in Railway Tracks
- ICACCI-20.2 11:15 Detection of Distributed Denial of Service Attacksusing Machine Learning Algorithms in SoftwareDefined Networks
- ICACCI-20.3 11:30 Enabling Open Domain Information Exploitation for Disaster Management
- ICACCI-20.4 11:45 Evaluation of Sampling Techniques in Software Fault Prediction Using Metrics and Code Smells
- ICACCI-20.5 12:00 Comparison of Sequence Diagram from Execution Against Design-Time State Specification
- ICACCI-20.6 12:15 Learning from Demonstration Algorithm for Cloth Folding Manipulator
- ICACCI-20.7 12:30 Multipath Routing in Mobile Ad-hoc Network Using Meta-heuristic Approach
- ICACCI-20.8 12:45 Mixed Bilingual Social Media Analytics
- ICACCI-20.9 13:00 Study of an Electromagnetically Coupled Resonator Energized Using U- Shaped Microstrip Feed
- ICACCI-20.10 13:15 Distributed Processing Across Gravitational Wave Detector Streams to Determine Wave Orientation
- ICACCI-20.11 13:30 Resource Allocation for Device to Device (D2D) Communication in Underlaying Cellular Network
- ICACCI-20.12 13:45 Critical Observation on the Exponential Growth of Nature-Inspired Computation
ICACCI-21: ICACCI-21: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Regular Papers)
- ICACCI-21.1 11:00 Significance of Exploring Pitch Only Features for the Recognition of Spontaneous Emotions from Speech Signals
- ICACCI-21.2 11:15 Denoising of Phonocardiogram Signals Using Variational Mode Decomposition
- ICACCI-21.3 11:30 Comparison of Glottal Closure Instant Estimation Algorithms for Singing Voices in Indian Context
- ICACCI-21.4 11:45 Least Square Based Image Deblurring
- ICACCI-21.5 12:00 A Novel Approach for Matching Composite Sketches to Mugshot Photos Using the Fusion of SIFT and SURF Feature Descriptor
- ICACCI-21.6 12:15 Iris Recognition Using Savitzky-Golay Filter Energy Feature Through Symbolic Data Modeling
- ICACCI-21.7 12:30 Novel Hybrid Feature Selection Models for Unsupervised Document Categorization
- ICACCI-21.8 12:45 Natural Calamity Assessment by Innovative Methods
- ICACCI-21.9 13:00 Evaluation of Instance-Based Feature Subset Selection Algorithm for Maintainability Prediction
ICACCI-22(A): ICACCI-22(A): Fifth International Symposium on Women in Computing and Informatics (WCI'17) (Regular & Short Papers)
- ICACCI-22(A).1 11:00 A Novel Web Crawling Method for Vertical Search Engines
- ICACCI-22(A).2 11:15 Abnormality Prediction in High Dimensional Dataset Among Semi Supervised Learning Approaches
- ICACCI-22(A).3 11:30 Hand Gesture Control of Virtual Object inAugmented Reality
- ICACCI-22(A).4 11:45 Video Clip Retrieval Using Serial Walk Local Descriptor
- ICACCI-22(A).5 12:00 Task Recommendation in Reward-Based Crowdsourcing Systems
- ICACCI-22(A).6 12:15 A Proactive Intelligent Model for Identification of Reduced Factors Affecting Severity of Coronary Artery Disease and Its Prediction
- ICACCI-22(A).7 12:30 Chatbot for University Related FAQs
- ICACCI-22(A).8 12:45 Fitness Function to Find Game Equilibria Using Genetic Algorithms
- ICACCI-22(A).9 13:00 RMSC: Robust Modeling of Subspace Clustering for High Dimensional Data
- ICACCI-22(A).10 13:15 Voice Transformation Using Pitch and Spectral Mapping
- ICACCI-22(A).11 13:30 A Dynamic Statistical Nonparametric Cleaning and Enhancement System for Highly Degraded Ancient Handwritten Modi Lipi Documents
- ICACCI-22(A).12 13:45 An Effective Way of Word-level Language Identification for Code-mixed Facebook Comments Using Word-Embedding via Character-embedding
ICACCI-22(B): ICACCI-22(B): Fifth International Symposium on Women in Computing and Informatics (WCI'17) (Regular & Short Papers)
- ICACCI-22(B).1 11:00 Automatic Summarization and Visualisation of Healthcare Tweets
- ICACCI-22(B).2 11:15 A Novel Approach for Group Formation in Collaborative Learning Using Learner Preferences
- ICACCI-22(B).3 11:30 GPU Accelerated Preemptive HAPO (GHAPO-P) for Reducing Trip Time in VANETs
- ICACCI-22(B).4 11:45 Security Analysis of Centralized Group Key Management Schemes for Wireless Sensor Networks Under Strong Active Outsider Adversary Model
- ICACCI-22(B).5 12:00 Adaptive Web Personalization System Using Splay Tree
- ICACCI-22(B).6 12:15 IoT Based Patient Monitoring and Diagnostic Prediction Tool Using Ensemble Classifier
- ICACCI-22(B).7 12:30 Technology Enabled Teacher Training for Low-literate, Remote and Rural Multi-grade Education Centers
- ICACCI-22(B).8 12:45 Comparative Study of Color Iris Recognition: DCT vs. Vector Quantization Approaches in RGB and HSV Color Spaces
- ICACCI-22(B).9 13:00 Smart Water ATM in India Using Cloud Model
- ICACCI-22(B).10 13:15 Building a Common Notation for Enabling Comparison of Design and Execution
- ICACCI-22(B).11 13:30 Video Clip Retrieval: An Integrated Approach Based on KDM and LBPV
- ICACCI-22(B).12 13:45 Word Based Thematic Game on Indian Mythology
- ICACCI-22(B).13 14:00 Determination of Optimum Refactoring Sequence Using a* Algorithm After Prioritization of Classes
- ICACCI-22(B).14 14:15 Optimization of Wright Huang-HYPR Low Dose Reconstruction Technique Using Taguchi Method
- ICACCI-22(B).15 14:30 Analog Multipliers for Deep Neural Net Architectures
- ICACCI-22(B).16 14:45 Stock Price Prediction Using RNN, LSTM, and CNN-Sliding Window Model
- ICACCI-22(B).17 15:00 Faculty Rating System Based on Student Feedbacks Using Sentimental Analysis
Wednesday, September 13
Wednesday, September 13 14:15 - 18:30 (Asia/Kolkata)
ICACCI-23: ICACCI-23: Artificial Intelligence and Machine Learning/Data Engineering/Biocomputing/Applied Informatics (Short Papers)
- ICACCI-23.1 14:15 New Machine Learning Based Approach for Predictive Modeling on Spatial Data
- ICACCI-23.2 14:30 CANFIS Based Robotic Navigation
- ICACCI-23.3 14:45 Deep Learning for Health Informatics: Recent Trends and Future Directions
- ICACCI-23.4 15:00 Prediction of Authorship Using Various Classification Algorithms
- ICACCI-23.5 15:15 Deep Android Malware Detection and Classification
- ICACCI-23.6 15:30 Prediction of Factors Affecting Amlodipine Induced Pedal Edema and Its Classification
- ICACCI-23.7 15:45 Abstractive Multi-Document Summarization
- ICACCI-23.8 16:00 A Model for Auto-Tagging of Research Papers Based on Keyphrase Extraction Methods
- ICACCI-23.9 16:15 A Robust Software Architecture Based on Distributed Systems in Big Data HealthCare
- ICACCI-23.10 16:30 Authentication of Digital Visual Data Using Discrete Wavelet Transform and TLBO
- ICACCI-23.11 16:45 Lateral Prediction in Adaptive Cruise Control Using Adaptive Particle Filter
Thursday, September 14
Thursday, September 14 14:30 - 17:30 (Asia/Kolkata)
ICACCI-24: ICACCI-24: Artificial Intelligence and Machine Learning/Data Engineering/Biocomputing/Applied Informatics (Regular/Short Papers)
- ICACCI-24.1 14:30 Misclassifications : The Missing Link
- ICACCI-24.2 14:45 Terrorism Analytics: Learning to Predict the Perpetrator
- ICACCI-24.3 15:00 Accurate Validation of GCV-based Regularization Parameter for Extreme Learning Machine
- ICACCI-24.4 15:15 Protein Structure Prediction on 2D Square HP Lattice with Revised Fitness Function
- ICACCI-24.5 15:30 A Study on the Use of Information and Communication Technology in Tourism
- ICACCI-24.6 15:45 Empirical Investigation on the Influence of Organizational Systems Mechanisms(OSM) on Employees Motivation to Effectively Use Human Resource Information Systems . A Case of South African Universities
- ICACCI-24.7 16:00 Improve Student Placement Using Job Competency Modeling and Personalized Feedback
- ICACCI-24.8 16:15 Employ…able A Tool to Achieve 7E's of Employability
- ICACCI-24.9 16:30 Error-Tolerant Graph Matching Using Homeomorphism
- ICACCI-24.10 16:45 A Hybrid Approach for Gait Based Gender Classification Using GEI and Spatio Temporal Parameters
- ICACCI-24.11 17:00 Hardware Implementation of K-means Clustering Based Spectrum Sensing Using USRP in a Cognitive Radio System
- ICACCI-24.12 17:15 A Shortest Path Approach to SPARQL Chain Query Optimisation
Friday, September 15
Friday, September 15 14:00 - 18:00 (Asia/Kolkata)
ICACCI-25: ICACCI-25: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Short Papers)
- ICACCI-25.1 14:00 Robust Pitch Estimation in Distant Speech Signals Collected from Vehicle
- ICACCI-25.2 14:15 Classification of States of Bi-Stable Oscillator Using Deep Learning
- ICACCI-25.3 14:30 A Survey on In-Domain and Cross-Domain Image Classification Using SURF Features
- ICACCI-25.4 14:45 Automatic Detection of Acute Myeloid Leukemia from Microscopic Blood Smear Image
- ICACCI-25.5 15:00 Big Data Challenges in Airborne HyperspectralImage for Urban Landuse Classification
- ICACCI-25.6 15:15 An Effective Hybrid Filter for Removal of Gaussian-Impulsive Noise in Computed Tomography Images
- ICACCI-25.7 15:30 Plant Health Analyser
- ICACCI-25.8 15:45 Information Hiding Through Dynamic Text Steganography and Cryptography
- ICACCI-25.9 16:00 Development and Comparison of ASR Models Using Kaldi for Noisy and Enhanced Kannada Speech Data
- ICACCI-25.10 16:15 Search and Rescue Operations Using Robotic Darwinian Particle Swarm Optimization
- ICACCI-25.11 16:30 Characteristics Determination of Infected Erithrocytes by Plasmodium Falciparum as a Diagnostic of Malaria, Based on Microscopic Images
- ICACCI-25.12 16:45 Open Source APIs for Processing the XML Result of Web Services
Saturday, September 16
Saturday, September 16 11:00 - 13:30 (Asia/Kolkata)
ICACCI-26: ICACCI-26: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems/ICAIS'17 (Short & Regular Papers)
- ICACCI-26.1 11:00 Automotive Drive Recorder as Black Box for Low End Vehicles
- ICACCI-26.2 11:15 Improving Model Predictive Controller by Using Non-Uniform Sampled Model
- ICACCI-26.3 11:30 A Quality Enhancement Through Defect Reduction Using Refactoring Operation
- ICACCI-26.4 11:45 Assessment of Forest Fire Danger Using Automatic Weather Stations and MODIS TERRA Satellite Datasets for the State Madhya Pradesh, India
- ICACCI-26.5 12:00 Study of Essential Personality Characteristics for the Young Indian Millennial: A Tobit Analysis
- ICACCI-26.6 12:15 GPS Based Navigation System for Autonomous Car
- ICACCI-26.7 12:30 Traffic Avoidance and Separation System
- ICACCI-26.8 12:45 The Role of Perceived Risk on Intention to Use Online Banking in Vietnam
ICACCI-27: ICACCI-27: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems/ICAIS'17 (Short Papers)
- ICACCI-27.1 11:00 Abelian Codes over Eisenstein-Jacobi Integers for MIMO Systems
- ICACCI-27.2 11:15 Self-adaptive Power Management Framework for High Performance Computing
- ICACCI-27.3 11:30 High Isolation Diplexer for RF Circuits Using Loop Resonators
- ICACCI-27.4 11:45 Design and Implementation of 8-Bit Vedic Multiplier Using mGDI Technique
- ICACCI-27.5 12:00 Vision Based Closed Loop PID Controller Design and Implementation for Autonomous Car
- ICACCI-27.6 12:15 Parallelizing GA Based Heuristic Approach for TSP over CUDA and OpenMP
- ICACCI-27.7 12:30 Design and Implementation of a RF Transceiver for 2X2 MIMO WLAN Module
- ICACCI-27.8 12:45 Reduction of FWM Effect in Fiber Optic Communication System by Using DPDDMZ and Circular Polarization
- ICACCI-27.9 13:00 Using System Analysis Modeling Language (SAML) for Validating the Critical Aerospace Model
- ICACCI-27.10 13:15 Design and Development of Certification Compliance Tool for Airborne Systems
- ICACCI-27.11 13:30 A Case Analysis of Node.js I/O Performance Under Linux Environment in Various Storage Media
ICACCI-28: ICACCI-28: Sensor Networks, MANETs and VANETs/Distributed Systems/WSTA/ACMiNS'17 (Short Papers)
- ICACCI-28.1 11:00 On Free of Cost Service Distribution in Cloud Computing
- ICACCI-28.2 11:15 Predicting External Rogue Access Point in IEEE 802.11 B WLAN Using RF Signal Strength
- ICACCI-28.3 11:30 Modified Harvest-Then-Cooperate Protocol for Relay-assisted Cellular Networks
- ICACCI-28.4 11:45 Multi-Group Message Communication on Android Smartphones via WiFi Direct
- ICACCI-28.5 12:00 All Pair Shortest Path Using Distributed Architectures
- ICACCI-28.6 12:15 Alternatives to VM Consolidation Techniques for Energy Aware Cloud Computing
- ICACCI-28.7 12:30 Dynamic and Resilient Protocol for Mutual Authentication of Nodes in Wireless Sensor Networks
- ICACCI-28.8 12:45 Enhanced Energy Optimized Cluster Based on Demand Routing Protocol for Wireless Sensor Networks
- ICACCI-28.9 13:00 A Learning-based MapReduce Scheduler in Heterogeneous Environments
- ICACCI-28.10 13:15 Secure Shell (SSH) Traffic Analysis with Flow Based Features Using Shallow and Deep Networks
- ICACCI-28.11 13:30 COMPAC - A Pricing Model for COmmunity Cloud
- ICACCI-28.12 13:45 Enhanced Timing Enabled Proxy Re-Encryption Model for E-Health Data in the Public Cloud
- ICACCI-28.13 14:00 An Investigation of Principal Component Analysis and Co-relation Based Selection Algorithms for Intrusion Detection System- A Quantitative Approach
- ICACCI-28.14 14:15 Novel Secured Reversible Covert Communication over Encrypted Domain Using SVM Classifier
- ICACCI-28.15 14:30 A Link Prediction Based Approach for Recommendation Systems
Wednesday, September 13
Wednesday, September 13 13:30 - 18:00 (Asia/Kolkata)
ICACCI-01: ICACCI-01: Symposium on Assistive Technologies for the Differently Abled (ATDA'17)
Title of Talk: PSYCHOSOCIAL PERSPECTIVE OF ASSISTIVE TECHNOLOGY
Abstract: In the past several years there has been a great increase in the use of assistive technologies (AT) by persons with disabilities so that they can pursue self-care, educational, vocational, and recreational activities.
Assistive technology is an important concept and refers to a broad range of devices, services, strategies, and practices that are conceived and applied to ameliorate the problems faced by individuals who have disabilities. It is defined as per the Public Law 100-407, the Technical Assistance to the States Act in the United States as ‘any item, piece of equipment or product system, whether acquired commercially off the shelf, modified, or customized, that is used to increase or improve functional capabilities of individuals with disabilities'.
Assistive technology can assist individuals with disabilities to achieve optimal function and independence and has become an increasingly accepted intervention. However, there are numerous reports of dissatisfaction and nonuse of technology by consumers. Device abandonment is a critical part and is considered to be a grey area in the entire domain of AT. Inspite of technological availability, studies have showed that there is minimal use of assistive technology by people with physical disabilities. Literatures suggest that on average, about one third of all devices provided to customers end up stored in closet, basement, or drawer. And such a rate of AT nonuse, discontinuance, abandonment and non- adherence is unacceptably high for both the consumer of such services and the provider funding such services. When devices are not perceived to enhance quality of life (QoL), and those around them have come to expect much less from life, their world shrinks and they stop using devices. It has been observed that typical factors contributing to AT rejection are primarily non-medical psychosocial factors that appear to underlie why many people do not use, or quit using, their AT devices. These non-functional criteria are related to personal and psychosocial factors such as motivation, perceived and desired roles. These psychosocial constructs which might be critical components of the user perspective have been identified as factors in the construct of QoL.
Successful integration of assistive technology into daily lives requires potential device users to explore: 1. the meanings they assign to devices; 2. their expectations of assistive technology; 3. the anticipated social costs; and 4. ways to understand that disability is one, but not the defining, feature of one's identity.
Therefore psychosocial perspective is that part of the AT practice which is critical to the device and service delivery effectiveness. The user satisfaction is the perception of the degree to which the assistive technology system achieves the desired goal(s). And knowledge of consumer satisfaction can predict the likelihood of device retention and abandonment.
- ICACCI-01.1 13:30 iKnow How You Walk - A Smartphone Based Personalized Gait Diagnosing System
- ICACCI-01.2 13:45 Computer Based Rehabilitation for Patients with Central Vision Loss
- ICACCI-01.3 14:00 Sensor Based Speech Production System Without Use of Glottis
- ICACCI-01.4 14:15 Education Technology Used in Education for Making Student Outcomes of Engineering Graduates
- ICACCI-01.5 14:30 Technologies for Visually Impaired Solutions and Possibilities
- ICACCI-01.6 14:45 Obstacle Classification and Detection for Vision Based Navigation for Autonomous Driving
- ICACCI-01.7 15:00 Identification and Red Blood Cell Classification Using Computer Aided System to Diagnose Blood Disorders
- ICACCI-01.8 15:15 Self Efficacy Perceived Stress and Happiness Among the Students
- ICACCI-01.9 15:30 Assessing Employability of Students Using Data Mining Techniques
- ICACCI-01.10 15:45 Characteristics and Causes of Malnutrition Across Indian States: A Cluster Analysis Based on Indian Demographic and Health Survey Data
- ICACCI-01.11 16:00 A Low-cost Classroom Response System
- ICACCI-01.12 16:15 Aiding the Visually Impaired: Developing an Efficient Braille Printer
- ICACCI-01.13 16:30 Development of an Android Application in Kannada to Enhance Picture Naming Skills in Persons with Aphasia
Wednesday, September 13 16:00 - 17:30 (Asia/Kolkata)
ICACCI-29: ICACCI-29: Poster Session I
- ICACCI-29.1 A Novel Approach in SAR-ADC forVariable Conversion TimeUsing Window Detector
- ICACCI-29.2 Analysis of Feature Selection and Extraction Algorithm for Financial Big Data
- ICACCI-29.3 FPGA Implementation of Fourier Segmentation for Empirical Wavelet Transform
- ICACCI-29.4 A Survey on Microstrip Antennas for Portable Wireless Communication System Applications
- ICACCI-29.5 Data Hiding with Dual Based Reversible Image Using Sudoku Technique
- ICACCI-29.6 Underwater Communications in the Presence of Bubbles and Doppler Shift
- ICACCI-29.7 Goal-Based Multi-Agent Tree Formation Using Reinforcement Learning
- ICACCI-29.8 Intelligent Agriculture Mechanism Using Internet of Things
- ICACCI-29.9 Evolutionary Algorithm Based Structural Optimization for Patch Antenna Design and Its Performance Analysis
- ICACCI-29.10 A Meta-Level Hybridization Approach to Personalized Movie Recommendation
- ICACCI-29.11 New Results on Next Fit and First Fit On-line Algorithms for Square and Rectangle Packing
- ICACCI-29.12 Secure Data Migration Between Cloud Storage Systems
- ICACCI-29.13 An Effective Analysis on Intrusion Detection Systems in Wireless Mesh Networks
Thursday, September 14
Thursday, September 14 16:15 - 17:30 (Asia/Kolkata)
ICACCI-30: ICACCI-30: Poster Session II
- ICACCI-30.1 Bi-directional Partitioning Approach to Frequent Item Mining
- ICACCI-30.2 Internet of Things Based Approach for Open Precision Farming
- ICACCI-30.3 MIMO Antenna for Mobile Terminals with Enhanced Isolation in LTE Band
- ICACCI-30.4 Wireless Voice-Controlled Multi-Functional Secure eHome
- ICACCI-30.5 VLSI Implementation of LNS Arithmetic Unit by LUT Partitioning
- ICACCI-30.6 Multiclass Classification of Kirlian Images Using SVM Technique
- ICACCI-30.7 A Hybrid Approach to Emotion Recognition System Using Multi-Discriminant Analysis & K-Nearest Neighbour
- ICACCI-30.8 Iris Recognition Using Radon Transform and GLCM
- ICACCI-30.9 IMU Sensor Based Self Stabilizing Cup for Elderly and Parkinsonism
- ICACCI-30.10 Home Server and NAS Using Raspberry Pi
- ICACCI-30.11 Programmable High Data Rate QPSK Modulator for Space Applications
- ICACCI-30.12 Design of a Novel Reversible NLFSR
- ICACCI-30.13 An Automated Vision-based Method to Detect Elephants for Mitigation of Human-Elephant Conflicts
- ICACCI-30.14 Securing QR Codes by RSA on FPGA
- ICACCI-30.15 Study of Deep Learning and CMU Sphinx in Automatic Speech Recognition
- ICACCI-30.16 Enhanced Variant of RPL for Improved Security
Friday, September 15
Friday, September 15 10:15 - 11:15 (Asia/Kolkata)
ICACCI-31: ICACCI-31: Poster Session III
- ICACCI-31.1 Multiple Copy and Paste Operation in Mobile Web Browsers
- ICACCI-31.2 Secure and Energy Efficient Routing Protocol in Wireless Sensor Network: A Survey
- ICACCI-31.3 Sybil Attack in IoT: Modelling and Defenses
- ICACCI-31.4 Community Mobilization and Participation in Mobile Communities: A Case Study of a WhatsApp Blood Donation Volunteer Group in Ernakulam
- ICACCI-31.5 Analysis of AES Cryptosystem in the Existence of Hardware Trojan
- ICACCI-31.6 Restaurant Setup Business Analysis Using Yelp Dataset
- ICACCI-31.7 Narcissism, Happiness and Self Actualization
- ICACCI-31.8 Applying Deep Learning Approaches for Network Traffic Prediction
- ICACCI-31.9 Recognition of Indian License Plate Number from Live Stream Videos
- ICACCI-31.10 Quality Assessment Metrics for Edge Detection and Edge-aware Filtering: A Tutorial Review
- ICACCI-31.11 Aspect Based Sentiment Classication: SVD Features
- ICACCI-31.12 Exploring the Dynamic of Gameplay in F2P MMOGs: A Study of Clash of Clans
- ICACCI-31.13 Automated Image Segmentation for Detecting Cell Spreading for Metastasizing Assessments of Cancer Development
- ICACCI-31.14 R Peak Detection and Feature Extraction for the Diagnosis of Heart Diseases
- ICACCI-31.15 A Study to Understand the Impact of Emotional Intelligence on Employees' Team Orientation and Behaviour
- ICACCI-31.16 Onto-Thesaurus for Tamil Language Ontology Based Intelligent System for Information Retrieval
- ICACCI-31.17 Power Efficient-Resource Utilization Protocol for WDM Optical Networks
- ICACCI-31.18 Deep Learning Model on Stance Classification
Program last updated on no date/time given