Program for 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
Tuesday, September 18
Tuesday, September 18 14:00 - 18:00 (Asia/Kolkata)
S2 -ISI'18: Symposium on Intelligent Informatics (ISI'18)
- 14:00 Multi-Objective Accelerated Particle Swarm Optimization Technique for Scientific workflows in IaaS cloud
- 14:15 Sentiment based Food Classification for Restaurant Business
- 14:30 Performance of Pattern Recognition Algorithms in Identifying Banking Networks
- 14:45 Text to Image Translation using Generative Adversarial Networks
- 15:00 Identification and grading of free hand sketches using Deep learning techniques
- 15:15 Sleep Pattern Monitoring and Analysis to Improve the Health and Quality of Life of People
- 15:30 Curious to Click It?-Identifying Clickbait using Deep Learning and Evolutionary Algorithm
- 15:45 Implementation of Artificial Neural Network on Raspberry Pi for Signal Processing Applications
- 16:00 Implementation and Testing of Cyber Physical System in Laboratory for Precision Agriculture
- 16:15 ARGoS based implementation of a multi-robot coordination algorithm
- 16:30 A Population-based Approach for Load Balancing in Distributed Computing Systems
- 16:45 An Effective Method For Hardware Multiplication Using Vedic Mathematics
- 17:00 Load Balancing through Block Rearrangement Policy for Hadoop Heterogeneous Cluster
- 17:15 A Hybrid Decision Support Model for Type II Diabetes
- 17:30 Personality Identification Using Auditory Nerve Modelling of Human Speech
- 17:45 English Multi-Word Expressions: A Tagset for Health Domain
- 18:00 A novel approach for handwriting recognition in Malayalam manuscripts using contour detection and Convolutional Neural Nets
- 18:15 Fuel Price Prediction Using RNN
Wednesday, September 19
Wednesday, September 19 8:30 - 13:00 (Asia/Kolkata)
Registration, Breakfast and tea
Wednesday, September 19 9:20 - 10:15 (Asia/Kolkata)
Inaugural Session
Wednesday, September 19 10:15 - 11:00 (Asia/Kolkata)
Keynote: Intent based networking
Abstract: The intuitive network starts with intent-based infrastructure that is secure - essentially all IP infrastructure, including switches, routers, wireless access points, that provides the connectivity and routes traffic from devices (PCs, tablets, phones, video screens, IoT) within the enterprise and to the internet.IP networking started small 30 years ago, connecting two departments in a lab. Now, enterprises have networks with tens of thousands of boxes. Most of them still have relatively primitive tools to manage this complexity. It's an expensive process and can slow down the business. The wireless network is separate from the wired network, which is separate from the Wide Area Network. And they're all managed and configured separately, and they can all have different interfaces, commands, and configuration models. Even worse, this is all usually done one box at a time. With the intuitive network, we fundamentally changed the approach, removing a lot of the complexity accumulated over the past 30 years. Now we have one unified system that spans the entire enterprise access network, covering all type of devices. It acts as a single platform, driven by intent. This intent-based infrastructure is programmable and integrated so that it can be automated. Also, security is built-in with the ability to find threats and automate responses to keep enterprises protected from advanced threats. This unified system includes our networking software operating system, IOS. Over the past two years, we've completely rebuilt IOS for the digital age. IOS is now API driven, open, programmable, and modular - all capabilities that are required from a modern software stack.
Wednesday, September 19 11:00 - 12:00 (Asia/Kolkata)
Keynote 1: Engineering the Fabric of IoT, People, and Systems
In this talk I will explore the integration of people, software services, and things with their data, into a novel resilient ecosystem, which can be modeled, programmed, and deployed on a large scale in an elastic way. This novel paradigm has major consequences on how we view, build, design, and deploy ultra-large scale distributed systems and establishes a novel foundation for an "architecture of value" driven Smart City. In particular, this talk addre es three novel paradigms for designing the service-oriented information systems of the future: Elastic Computing, Social Compute Units, and Osmotic Computing. These three paradigms serve as a foundation for future large-scale distributed systems. Furthermore, we will discu our responsibilities as computer scientists, technologists, and researchers for creating technologies, which benefit society in a positive way, thereby strengthening the new fabric of interconnected people, software services, and things into a novel resilient ecosystem.
Wednesday, September 19 12:00 - 13:00 (Asia/Kolkata)
Keynote 2: The Power of Memory
Abstract: Advances in computing, communications, networking and electronics have enabled the generation of enormous amounts of data. This is due to higher resolution data, captured more frequently, and the growing use of connected sensor data in IoT applications. This data must be captured, proce ed and then stored. Some data must be kept for a short time and proce ed quickly to be useful, e.g. in autonomous vehicles as well as robotics and automation. The results of this proce ing and data generated having economic value (e.g. commercial video) may be kept for a long time. This talk will examine the latest developments in the digital memory and storage hierarchy and how they will enable developments in AI, cloud computing, VR/AR, Smart Cities, robotics and automation and the preservation of culture, technology and history.
Wednesday, September 19 13:00 - 13:45 (Asia/Kolkata)
G4: Lunch Break
Wednesday, September 19 13:45 - 14:30 (Asia/Kolkata)
Keynote 3: Advanced architectures of Next Generation Wireless Networks
Abstract: Emerging Internet Quality of Service (QoS) mechanisms are expected to enable widespread use of real-time services such as VoIP and video conferencing. The "best effort" Internet delivery cannot be used for the new multimedia applications. New technologies and new standards are necessary to offer Quality of Service (QoS) for these multimedia applications. Therefore new communication architectures integrate mechanisms allowing guaranteed QoS services as well as high rate communications. The service level agreement with a mobile Internet user is hard to satisfy, since there may not be enough resources available in some parts of the network the mobile user is moving into. The emerging Internet QoS architectures, differentiated services, and integrated services do not consider user mobility. QoS mechanisms enforce a differentiated sharing of bandwidth among services and users. Thus, there must be mechanisms available to identify traffic flows with different QoS parameters and to make it possible to charge the users based on requested quality. The integration of fixed and mobile wireless access into IP networks presents a cost-effective and efficient way to provide seamless end-to-end connectivity and ubiquitous access in a market where the demand for mobile Internet services has grown rapidly and predicted to generate billions of dollars in revenue. It covers the issues of QoS provisioning in heterogeneous networks and Internet access over future 5G wireless networks. It discusses the characteristics of the Internet, mobility and QoS provisioning in wireless, IoT and mobile IP networks. This tutorial also covers routing, security, baseline architecture of the inter-networking protocols and end to end traffic management issues.
Wednesday, September 19 14:15 - 18:30 (Asia/Kolkata)
ICACCI-27: ICACCI-27: First Symposium on Social Media Analytics, Fintech, Healthcare and Corporate Social Responsibility Management - CSRTech2018
Title of Talk: Using Blockchain in Financial Services Industry. Speaker: Mr. Sajeev Vishwanathan, CEO and Founder, New Street Technology.
Abstract: How New Street Technology is using Blockchain technology in the Financial Services sector to reduce the cost of operation as well as to build trust with its customers and clients. They work with Banks in India on various financial services.
Title of Talk: Technology in Logistics Mr. Narendra Kochat, CEO and Founder, Nikkos Logistics.
Abstract: EHow Nikoos as a logistics company can drive IT for customers. Emerging trends and opportunities to solve business opportunities in India and how Nikoos uses a model and how technology to drive this model for customers.
- 14:15 Characteristics of Corporate Wilful Default
- 14:30 An Ensemble Stock Predictor and Recommender System
- 14:45 Enhancing the Quality of Processes in Healthcare in India
- 15:00 Chrome Extension For Malicious URLs detection in Social Media Applications Using Artificial Neural Networks And Long Short Term Memory Networks
- 15:15 Performance of mandated Corporate Social Responsibility of Indian Companies
- 15:30 Use of Social Media by Apparel Brands in India
- 15:45 Performance and Purchasing effects of Healthcare Supply Chain
Wednesday, September 19 14:45 - 18:30 (Asia/Kolkata)
ICACCI-01: ICACCI-01: 5th International Symposium on Computer Vision and the Internet (VisionNet'18)
- 14:45 Activation Function Optimisations for Capsule Networks
- 15:00 Crowd counting and Density Estimation using Multicolumn Discriminator in GAN
- 15:15 A highly accurate fire detection method using discriminate method
- 15:30 Semantic Deep Image Inpainting
- 15:45 Classification of High Resolution Remote Sensing Images using Deep Learning Techniques
- 16:00 Notification of Landslide Susceptible Regions Using Satellite Images
- 16:15 Enhanced Deep Image Super-Resolution
ICACCI-02: ICACCI-02:7th Symposium on Natural Language Processing (NLP'18) - Regular Papers
- 14:45 Location Based Real-time Sentiment Analysis of Top Trending Event Using Hybrid Approach
- 15:00 Open-Domain Question Answering using Feature Encoded Dynamic Coattention Networks
- 15:15 Sentiment Analysis on Interview Transcripts: An application of NLP for Quantitative Analysis
- 15:30 Automatic Parallel Corpus Creation for Hindi-English News Translation Task
- 15:45 Persona Traits Identification based on Myers-Briggs Type Indicator(MBTI) - A Text Classification Approach
- 16:00 PESUBot: An Empathetic Goal Oriented Chatbot
- 16:15 Effectiveness of Hierarchical Softmax in Large Scale Classification Tasks
- 16:30 Extracting and Visualising Character Associations in Literary Fiction using Association Rule Learning
- 16:45 Laughter Synthesis using Mass-spring Model and Excitation Source Characteristics
ICACCI-03: ICACCI-03: Artificial Intelligence and Machine Learning/Data Engineering/AIN'18 (Regular Papers)
- 14:45 Solving Multi-Objective Optimization Problems using Differential Evolution Algorithm with Different Population Initialization Techniques
- 15:00 TELIL: A Trilateration and Edge Learning based Indoor Localization Technique for Emergency Scenarios
- 15:15 Cardiac Arrhythmia Detection from Single-lead ECG using CNN and LSTM assisted by Oversampling
- 15:30 Folding Paper Currency Recognition and Research Based on Convolution Neural Network
- 15:45 Intelligent AI Assisted Psychological Disorder Analysis Using Sentiment Inference
- 16:00 Diabetes Prediction Model Using Cloud Analytics
- 16:15 Post-Surgical Survival forecasting of breast cancer patient: a novel approach
- 16:30 Novel Framework for Performance Prediction of Small and Medium Scale Enterprises: A Machine Learning Approach
- 16:45 Human Crawl vs Animal Movement and Person with Object Classifications Using CNN for Side-view Images from Camera
- 17:00 An Automatic Chord Progression Generator Based On Reinforcement Learning
ICACCI-04: ICACCI-04: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems/ICAIS'18 (Regular Papers)
- 14:45 Improved Iterative Thresholding Technique for Detection in Sporadic Large-Scale Multiuser MIMO Systems
- 15:00 Accurate Power and Latency Analysis of a Through-Silicon Via(TSV)
- 15:15 Bit Error Rate (BER) Performance Analysis of DASH7 Protocol In Rayleigh Fading Channel
- 15:30 ASIC Implementation of High Performance Radix-8 CORDIC Algorithm
- 15:45 Comparative study of LST and SJF Scheduling Algorithm in Soft Real-Time System with its Implementation and Analysis
- 16:00 Design of Quadrature Voltage Controlled Oscillator at 60GHz in 65nm CMOS
- 16:15 Design of Wideband Millimeter Wave Mixer in CMOS 65nm for 5G Wireless
ICACCI-05: ICACCI-05: Internet of Things (IoT)/Networks/Distributed Systems
- 14:45 Internet of Things applied to Asymmetric Operations
- 15:00 LoRaWAN Evaluation for IoT Communication
- 15:15 RMDD:Cross Layer Attack in Internet of Things
- 15:30 Fast Localization and Topology Discovery Scheme to Handle Topology Changes in Industrial IoT Networks
- 15:45 Blend of Cloud and Internet of Things (IoT) in agriculture sector using light weight protocol
- 16:00 Upsurge of IoT (Internet of Things) in engineering education: A case study
- 16:15 IoT2Vec: Identification of Similar IoT Devices via Activity Footprints
- 16:30 Localizing Assets in an Indoor Environment Using Sensor Fusion
- 16:45 Design of a 1kW Underwater Wireless Charging Station for Underwater Data Gathering Systems
- 17:00 Smart Helmets for Safety in Mining Industry
- 17:15 An Improved Firefly Algorithm for the Vehicle Routing Problem with Time Windows
- 17:30 Load Balancing through Block Rearrangement Policy for Hadoop Heterogeneous Cluster
ICACCI-06: ICACCI-06: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Regular Papers)
- 14:45 Convolution Neural Network Based Deep Features for Text Recognition in Multi-Type Images
- 15:00 An improved technique for Night-time Vehicle detection
- 15:15 Audio Mining: Unsupervised Spoken Term Detection over an Audio Database
- 15:30 Design and Evaluation of a Real-Time Character Recognition System
- 15:45 The Role of Color and Texture Features in Glaucoma Detection
- 16:00 Prediction of Lung Cancer from Low-Resolution Nodules in CT-Scan Images by using Deep Features
- 16:15 Multiclass Text Classification and Analytics for Improving Customer Support Response through different Classifiers
- 16:30 Speed Control of Permanent Magnet Synchronous Motor Drive System Using PI,PID,SMC and SMC plus PID Controller
- 16:45 EEG Based Control - A Study Using Wavelet Features
- 17:00 Tumour Detection in Double Threshold Segmented Mammograms Using Optimized GLCM Features fed SVM
ICACCI-07: ICACCI-07: Sixth Symposium on Control, Automation, Industrial Informatics and Smart Grid (ICAIS'18)
- 14:45 Development of Data Acquisition System using non-invasive Hardware and 3D software for Electric all terrain Vehicle
- 15:00 Efficient Photovoltaic Solar Panel with Mirror Actuation
- 15:15 Design and Implementationof Neural Network Based Non Linear Control System (LQR) For Target Tracking Mobile Robots
- 15:30 Fuzzy based MAC Adaptation in Industrial IoT based Sensor Networks
- 15:45 Queuing Models for Different Caching Schemes by Caching Partial Files
- 16:00 QR Code based Path Planning for Warehouse Management Robot
- 16:15 Energy Efficient Real Time Scheduling on Multi-core Processor with Voltage Islands
- 16:30 Building a Quadcopter: An approach for an Autonomous Quadcopter
- 16:45 Comparative Study of Different Current Control Techniques for Single Phase Grid Integrated Photovoltaic System
- 17:00 LMI Based design approach for the Stabilization and Tracking of a 3-DOF Remote Controlled Helicopter, Modeled in TP form
- 17:15 Formal Verification of Datarace in Safety Critical ARINC653 compliant RTOS
- 17:30 Microgrid Energy Management using Differential Evolution Algorithm
ICACCI-08: ICACCI-08: Third Symposium on Emerging Topics in Computing and Communications (SETCAC'18) - Regular Papers
- 14:45 Recognition Techniques in Buddhist Iconography and Challenges
- 15:00 SpreadMax: A Scalable Cascading Model for Influence Maximization in Social Networks
- 15:15 Resource Unit (RU) Based OFDMA Scheduling in IEEE 802.11 ax System
- 15:30 Motion Compensation on Range Doppler Algorithm for Airborne SAR
- 15:45 Performance Improvement in Rayleigh Faded Channel using Deep Learning
- 16:00 Delay Reduced Multimedia Transmission in Medical Emergencies
- 16:15 A JSON Based Healthcare Framework for Remote Areas and Emergency Situations
- 16:30 Rank Aggregation Approach for Identifying Critical Information Infrastructure
- 16:45 Design and trajectory estimation of dynamic motion model
- 17:00 Implementation and Design Issues for Augmented Reality Applications on Mobile Platforms
- 17:15 AdultSwine: A case study
- 17:30 Dynamic Macro Numeric Analysis of Fatal Traffic Accident
- 17:45 A Novel Fiber-Constrained Protection Scheme for Passive Optical Networks
- 18:00 Novel architectures to enhance QoS in long-reach passive optical networks
ICACCI-28: ICACCI-28: Signal/Image/speech Processing/Computer Vision/Embedded Systems/CIAP'18 (Short Papers)
- 14:45 Framework for simulating and testing different display topologies
- 15:00 Frequency Diversity Antenna for WLAN Applications
- 15:15 A Novel Star-shaped Dipole Antenna with inset feed for Base Station Application
- 15:30 Quantum Spider Monkey Optimization (QSMO) Algorithm for Automatic Gray-Scale Image Clustering
- 15:45 RTC based solar power multi-level Inverter
- 16:00 Impact of Mobility and Transmission Range on Transmission's Probability of Success and Contention in ITS
- 16:15 VoLTE Cell Capacity Estimation Using AMR-WB Codec
- 16:30 Amplifier and Doppler Effect on PSK modulatedsignals in Inter- Satellite Communication
- 16:45 Power And Delay Efficient Exact Adder For Approximate Multiplier
- 17:00 Sleep Pattern Monitoring and Analysis to Improve the Health and Quality of Life of People
- 17:15 Implementation and Testing of Cyber Physical System in Laboratory for Precision Agriculture
ICACCI-31: ICACCI-31: Artificial Intelligence and Machine Learning/Distributed Systems/Applied Informatics/Industry Track (Short Papers)
- 14:45 GLEnc Algorithm To Secure Data In Public Cloud Environment
- 15:00 Analysis of Data Hiding Methods in Image Steganography
- 15:15 Spectral Correlations in Speaker-Listener Behavior During a Focused Duo Conversation using EEG
- 15:30 Wearable devices and medical monitoring robot software to reduce costs and increase quality of care
- 15:45 A Hybrid Approach of Text Summarization Using Latent Semantic Analysis and Deep Learning
- 16:00 IoT-Mobile Enabled Smart Water Level Controlling System to Regulate Water Wastage
- 16:15 Comparative Analysis of IoT protocols for a Marine IoT System
- 16:30 Optimized Resource Allocation and Load Balancing in Distributed Cloud using Graph Theory
Wednesday, September 19 16:00 - 17:00 (Asia/Kolkata)
ICACCI-34: ICACCI-34: Poster Session -I
- Automated Segmentation and Detection of Brain Tumor from MRI
- Development of an interactive gaming solution using MYO sensor for rehabilitation
- Study on LBIST and Comparisons with ATPG
- Survey of Rank Attack Detection Algorithms in Internet of Things
- Genre Classification using Word Embeddings and Deep Learning
- Relationship between the Cosine Integer Transform and the Mapped Real Transform
- Synthetic Generation of Traffic Data for Urban Mobility
- Scheduling Applications of DAGs
- Epidemic model based visibility estimation in Online Social Networks
- Semantically Enriched Line Search in a Humanities Digital Library
- Web APIs for Internet of Things
- Antenna array for a unified radio frequency identification system
- Microstrip antenna with an air gap for use in RFID and tracking of cargo containers
- Microstrip dipole antenna with reduced dimensions with cutouts
- Intelligent Chatbot for Easy Web-Analytics Insights
- Impact of CSR Activities on Shareholders' Wealth in Indian Companies
- Artificial Neural Network Conventional Fusion Forecasting Model for Natural Gas Consumption
- Histogram of Oriented Gradients Based Reduced Feature for Traffic Sign Recognition
- Empirical Evidences to Validate the Performance of Self-Switching Base Vector Based Mutation of Differential Evolution Algorithm
- A Novel Design of a Multi-DOF Mobile Robotic Helping Hand for Paralyzed Patients
- Mitigating Mirai Malware Spreading in IoT Environment
- IoT Based Road Travel Time Detection
Wednesday, September 19 16:00 - 18:00 (Asia/Kolkata)
Lightning Talks
Titles for Lightning Talks
-- Transition to Software-defined waveforms (Mr. Abhay Shriramwar, Cyient Ltd)
-- Localization of Neuronal Activity Using Error Free MEG MRI Co-registration (Dr. Anitha, Manipal Institute of Technology)
-- Advertisements Analytics (Ms. Apoorva Saxena, PESIT-BSC)
-- Building Low-cost quick deployment chatbots (Mr. Aswin.T.S, [24]7.AI India)
-- iBCE-EL: A Sequence-Based Predictor for Identifying B-Cell Epitopes Using Ensemble Learning (Prof. Balachandran Manavalan, Ajou University School of Medicine)
-- On average mutation distance (Dr. Bhadrachalam Chitturi, Amrita Vishwa Vidyapeetham)
-- Dynamic Pa word Protocol Against Cyber Threats (Mr. Channabasava H, PES Institute of Technology Bangalore South Campus)
-- Combustion Quality Prediction Model based on Flame Shape using LSTM Regre ion (Dr. K. Sujatha, Profe or, EEE, Dr.MGR Educational & Research Institute)
-- Attack and Security Threats in MANETS (Ms. Fahmina Taranum, Muffakham Jah College of Engineering and Technology)
-- Classification of colposcopic cervigrams using EMD in R (Mr. Kumar Dron Shrivastav, Amity Institute of Public Health)
-- Fog computing (Prof. Manjula Shenoy K, Manipal Institute of Technology)
-- MOOC and its Indian chapter SWAYAM (Mr. Abdul Wahid, University of Kashmir)
Wednesday, September 19 16:30 - 17:30 (Asia/Kolkata)
Tea Break
Thursday, September 20
Thursday, September 20 8:30 - 13:00 (Asia/Kolkata)
Registration
Thursday, September 20 9:10 - 10:10 (Asia/Kolkata)
Keynote 4: Smart Spaces Deployment based on Internet of Things
Abstract: This keynote addresses a hot and updated topic focusing on Internet of Things (IoT), considering their most relevant challenges and opportunities for smart places deployment. It starts with an introduction to IoT and its typical application scenarios considering different verticals. After, an initiative to prepare ICT professionals for new challenges regarding this new generation technologies for IoT will be presented. A special attention will be given to the Inatel Smart Campus, an open Campus for research on IoT, experiments, and concepts and technology validation. Inatel has sponsored this project, started in August 2016, open for companies' participation and promoting the academy-enterprise interaction. It is a true living lab for several IoT verticals, including smart cities and smart homes. New challenges and opportunities on IoT are discussed. The communication ends with new trends and issues on Internet of Things, suggesting further research topics.
Thursday, September 20 9:30 - 13:00 (Asia/Kolkata)
ICACCI-26: ICACCI-26: Workshop on Modeling and Machine Learning in Astronomy
Talk 1: Title: Bayesian methods in Astrophysics Tarun Deep Saini, Assistant Professor and Academic Coordinator, Joint Astronomy Programme at Indian Institute of Science
It is commonly believed that Bayesian statistic differs from frequentist statistic only in the narrow sense that it allows for prior information in statistical inference; and in those cases where the priors are a umed flat, the two are, in fact, thought to be indistinguishable. However, through specific examples, I will show that the conceptual turnaround that the Bayes theorem enables, allows for neater solutions to several problems of statistical inference.
Talk 2: Title: From Machine Learning to Deep Learning in Astronomy Ajit Kembhavi, Professor Emeritus at the Inter-University Centre for Astronomy and Astrophysics
Machine Learning has for long been used in astronomy to address classification problems. It provides very useful techniques for quickly and reliably addressing problems such as to distinguish between stars and nearly unresolved galaxies and to distinguish between unresolved quasars and stars on the basis of their colours. These techniques have limitations because they are dependent on the use of derived parameters for the training. Such an approach might not be possible, for example, in classification problems involving objects with complex morphology, which cannot be easily parameterized. In such circumstances Deep Learning techniques, which have been used in applications like face recognition, prove to be very useful, since they directly use images or spectral data without the need for parameterization. I will consider, as convolutional neural networks (CNN) and describe their use with a few examples, including galaxy morphology and time series analysis. As applications, I will consider the finding of galaxies with bars and rings, and the classification of stellar spectra and show that very good accuracy can be obtained.
Talk 3: Title: Theoretical validation of potential habitability of recently discovered exoplanets via modeling and Machine learning Margarita Safonova, Birla Institute of Fundamental Research
Seven Earth-sized planets, known as the TRAPPIST-1 system, was discovered with great fanfare in the last week of February 2017. Three of these planets are in the habitable zone of their star, making them potentially habitable planets (PHPs) a mere 40 light years away. The discovery of the closest potentially habitable planet to us just a year before - Proxima b and a realization that Earth-type planets in circumstellar habitable zones are a common occurrence provide the impetus to the existing pursuit for life outside the Solar System. The search for life has two goals essentially: looking for planets with Earth-like conditions (Earth similarity) and looking for the possibility of life in some form (habitability). An index was recently developed, the Cobb-Douglas Habitability Score (CDHS), based on Cobb-Douglas habitability production function (CD-HPF), which computes the habitability score by using measured and estimated planetary parameters. As an initial set, radius, density, escape velocity and surface temperature of a planet were used. The proposed metric, with exponents accounting for metric elasticity, is endowed with analytical properties that ensure global optima and can be scaled to accommodate a finite number of input parameters. We show here that the model is elastic, and the conditions on elasticity to ensure global maxima can scale as the number of predictor parameters increase. K-NN (K-Nearest Neighbor) classification algorithm, embellished with probabilistic herding and thresholding restriction, utilizes CDHS scores and labels exoplanets into appropriate classes via feature-learning methods yielding granular clusters of habitability. The algorithm works on top of a decision theoretical model using the power of convex optimization and machine learning. The goal is to characterize the recently discovered exoplanets into an "Earth League" and several other classes based on their CDHS values. A second approach, based on a novel feature-learning and tree-building method classifies the same planets without computing the CDHS of the planets and produces a similar outcome. For this, we use XGBoosted trees. The convergence of the outcome of the two different approaches indicates the strength of the proposed solution scheme and the likelihood of the potential habitability of the recently announced discoveries. We plan to discuss new activation functions for such classification purposes.
Talk 4: Title: Machine Learning in the context of New Surveys and the Internet of Things(IoT) Ninan Sajeeth Philip, Associate Professor, and Head, Department of Physics, St. Thomas college. Area of specialization: Machine Learning
Abstract: Machine Learning became popular as a tool to substitute the logical deductions made by a human expert on a given problem by adjusting a finite nonlinear combination of variables through a process called training. In a large subset of problems, this can be done using a small set of derived features describing the logic used by the expert to come to the conclusions. When problems are described in terms of the derived features, the reliability of the predictions using it depends on how well the derived features are capable of describing the problem in all the possible situations. For example, when doing a star-galaxy classification, one can use the ellipticity of a galaxy to separate them from the gau ian psf of stars. The logic works well when the galaxy is well resolved. However, if the galaxy is far off, it might look similar to a star and our feature based classification fails. There is yet another class of problems where the domain expert has to dynamically select a subset of available features from a large pool of features to do the classification. This is typically the case when language, speech or image classifications are done, where, depending on each situation (context), the set of features for the classification are selected. For example, the set of features describing the image of a dog need not be the same for describing a human or some other animal in the same image. Going for manually defining the context leads to an ill-posed problem. The talk shall introduce the basic concepts of IoT, Natural Language Processing (NLP), big data and how it transforms modern machine learning from model-driven to a data-driven science.
Talk 5: Title: Classifying sources in multiwavelength astronomy using machine learning Jayant Murthy, Director, Indian Institute of Astrophysics
Astronomical data sets have been steadily increasing insensitivity and size to the point where it is no longer practical to extract ``interesting'' objects from the chaff. In this scenario, an automated analysis procedure is necessary not only to process the data into scientifically usable data sets, including a source catalog but to go further and classify the sources in the catalog. Even more information about the sources and, hence, a better classification will be obtained by combining multiple catalogs, particularly from multiple spacecraft with a broad spectral coverage. The complexity of the data and the number of sources necessitate a machine learning (ML) approach to the problem. We will specifically address the case of star-quasar separation where color-color plots have been used in the past. We have found that these would not yield a unique separation and used a template-based method where we fit all the available photometric data at once. We are now experimenting with a neural network based approach and are finding good results. I will focus here on presenting the scientific problem.
Workshop Chair: Snehanshu Saha < http://astrirg.org/projects.html >, http://icacci-conference.org/2018/astronomy
Thursday, September 20 10:10 - 11:00 (Asia/Kolkata)
Keynote 5: Detect Needle in a Haystack: Advanced Anomaly Detection mechanisms from execution logs
Abstract: Troubleshooting complex systems in IT data centers is a very complex problem. We focus on the problem of detecting anomalous run-time behavior of distributed applications from their execution logs. Specifically we mine templates and template sequences from logs to form a control flow graph (cfg) spanning distributed components. This cfg represents the baseline healthy system state and is used to flag deviations from the expected behavior of runtime logs.
The novelty in our work stems from the new techniques employed to: (1) overcome the instrumentation requirements or application specific a umptions made in prior log mining approaches, (2) improve the accuracy of mined templates and the cfg in the presence of long parameters and high amount of interleaving respectively, and (3) improve by orders of magnitude the scalability of the cfg mining proce in terms of volume of log data that can be proce ed per day.
Thursday, September 20 11:00 - 11:15 (Asia/Kolkata)
Tea Break
Thursday, September 20 11:15 - 12:10 (Asia/Kolkata)
Keynote 6: Medical Image Diagnostics: A case study of spine pathology
Abstract: With growing digital medical data and meteoric success of machine learning it is now feasible to aid the medical practitioner in better diagnosing pathology and in some cases, outperform them. Lower back pain (LBP) is widely prevalent in people all over the world and negatively affects the quality of life due to chronic pain and change in posture. According to the American Academy of Orthopedic Surgeons (AAOS) four out of five adults experience low back pain at some point during their lives. I will discuss results from our work in automating the diagnosis of spine pathology. Clinical datasets are generally limited to pathological findings such as arthritis, fracture, infection, dislocation or tumor, but in the absence of gro pathology there is very poor correlation to nonspecific spine pain clinical symptoms. Since the majority of spine pain patients do not have any correlative pathological findings, it is important to look at the mechanics of the spine from a clinical standpoint. I will end this talk with some results in automating the process of suggesting changes to biomechanics of the spine thus taking the automation from diagnosis to cure.
Thursday, September 20 12:10 - 13:00 (Asia/Kolkata)
Keynote 7: Blockchain and its Applications on Edge Computing, Industry 4.0, IOT and Smart Cities
Abstract: Blockchain is the technology behind bitcoin, ether and most of the other cryptocurrencies. Blockchain is e entially a form of record keeping and can be used in almost any product that uses some form of record keeping or database management. Blockchain is ideal for protecting any data that needs to be unalterable and indestructible. Traditionally, data are kept on a server that is owned and operated by a third-party company. This approach has some disadvantages. In this way, if a third party has acce to your data, they could be destroyed, they could be altered, and it could leak. Through Blockchain, data are encrypted and then propagated over a distributed network of computers. In this way, data are nobody's properties, data cannot be destroyed and altered. Data block are sets of permanently recorded data e.g. financial transactions. The information is first hash which is a way to represent the data in a compact format where data can be easily compared for any change. Any small change in the data completely changes the hash version which makes the comparison very easy. The hash data are then encrypted. One private key allows the producer of the data to encrypt the data and serves as a digital signature. Also, one public key allows everyone else with the key to decrypt it. Finally, the data blocks are connected to each other (chained). Bitcoin is simply an application of Blockchain but there are many other applications where this technology has a lot to say. The application of this technology is endle in all fields but with respect to industry there are fields in which use is more and more common e.g. Supply Chain Management, Health Care and medical record sharing, Media Distribution, E-commerce with no middleman, Sharing economy with no central authority, Authenticated News Sharing/Data Sharing, Data Sharing Between companies Edge Computing, Industry 4.0, IOT and Smart Cities are areas in which Blockchain has high impact. The IoT refers to the ever-growing network of physical objects that feature an IP addre for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. The risk of connecting a machine to Internet is obvious and Blockchain may help to eliminate or at least reduce some of these risks. The industry is updating its proce es to be more efficient. Industry 4.0 is a transformation that makes it po ible to gather and analyze data acro machines, enabling faster, more flexible, and more efficient proce es to produce higher-quality goods at reduced costs, that's the reason why a technology such us Blockchain if also of great interest to guaranty security and data reliability. The main aim of this tutorial is to introduce Blockchain technology and represents its practical application in security of Industry 4.0, Smart cities, Smart homes, and Internet of Thing.
Thursday, September 20 12:50 - 14:00 (Asia/Kolkata)
Lunch Break
Thursday, September 20 14:00 - 17:30 (Asia/Kolkata)
ICACCI-10: ICACCI-10: 2nd Symposium on Recent Advances in Communication Theory, Information Theory, Antennas and Propagation (CIAP'18) - Regular Papers
- 14:00 A Particle Swarm approach to target detection in MIMO radar
- 14:15 High Performance Dual Circularly Polarized Microstrip Patch Antenna for Satellite Communication
- 14:30 Isolation Enhancement of Patch Antenna Array Using Open Loop Resonator
- 14:45 A Comparison of AFDX and 1553B Protocols Using Formal Verification
- 15:00 Compact tunable dual-band bandpass filter using Edge-open Split Ring Resonators for X-Band Applications
- 15:15 A Circularly-polarized Patch Antenna using Pin-loaded Technique with PSO
- 15:30 Filtered OFDM with Index Modulation
- 15:45 Macromodeling of High Frequency Interconnects Based on Accurate Delay Identification
- 16:00 A Compact TEM Horn Antenna for Ground Penetrating Radar
- 16:15 Detection of Ruptures in Pipeline Coatings Using Split Ring Resonator Sensor
- 16:30 Triple Band Antenna for 5G Applications
- 16:45 A Modified Frequency Selective Surface Band-stop Filter for Ultra-wideband Applications
- 17:00 Broadband Slotted Ground Square Patch Microstrip Antenna for Wireless Applications
- 17:15 Wide-band meander line MIMO antenna for wireless applications
ICACCI-11: ICACCI-11: 7th Symposium on Natural Language Proce ing (NLP'18) - Regular Papers
- 14:00 Enhancing Sentiment Analysis Using Domain-Specific Lexicon: A Case Study on GST
- 14:15 Query Quality Prediction on Source Code Base Dataset: A Comparative Study
- 14:30 Multilingual Text Detection and Identification from Indian Signage Boards
- 14:45 Sentiment Analysis for Code-Mixed Indian SocialMedia Text With Distributed Representation
- 15:00 A Deep Learning Approach for Part-of-Speech Tagging in Nepali Language
- 15:15 Word Level Language Identification in Code-Mixed Data using Word Embedding Methods for Indian Languages
- 15:30 Hadoop and Natural Language Processing Based Analysis on Kisan Call Center (KCC) Data
- 15:45 Automatic Singable Tamil lyric generation for a situation and tune based on causal effect
- 16:00 Handwriting Analysis Through Graphology: A Review
- 16:15 An Innovative Open Framework for Multilingual Translation with Ambiguity Resolution
ICACCI-12: ICACCI-12: Artificial Intelligence and Machine Learning/Data Engineering/AIN'18 (Regular Papers)
- 14:00 A Novel Approach for Youtube Video Spam Detection using Markov Decision Process
- 14:15 Machine Learning for Secure Device Personalization Using Blockchain
- 14:30 Predictive Analysis to Improve Crop Yield using a Neural Network Model
- 14:45 Different Machine Learning Models to predict dropouts in MOOCs
- 15:00 News Article Classification with Clustering using Semi-Supervised Learning
- 15:15 Deep learning framework for recognition of various skin lesions due to diabetes
- 15:30 Crop Prediction on the Region Belts of India: A Naïve Bayes MapReduce Precision Agricultural Model
- 15:45 Deep PCANet Framework for the Binary Categorization Of Breast Histopathology Images
- 16:00 Trajectory Tracking using a Bio-inspired Neural Network for a Low-Cost Robotic Articulator
- 16:15 Feature level fusion of Face and Iris using Deep Features based on Convolutional Neural Networks
- 16:30 TST: An Effective Approach to Extract Trend Feature in Stock Time Series
- 16:45 Probabilistic Determination Of Down's Syndrome Using Machine Learning Techniques
- 17:00 News Category Network based Approach for News Source Recommendations
- 17:15 Modeling Nitric Oxide Induced Neural Activity and Neurovascular Coupling in a Cerebellum Circuit
- 17:30 A generic approach of filling missing values in NCDC weather stations data
- 17:45 Improved Quality Detection Technique for Fruits Using GLCM and MultiClass SVM
ICACCI-13: ICACCI-13: Embedded Systems/Computer Architecture and VLSI/Adaptive Systems/ICAIS'18 (Regular Papers)
- 14:00 Performance of Ultra Wideband (UWB) pulsed doppler radar for heart rate and respiration rate monitoring in Noise
- 14:15 Joint Crosstalk Avoidance with Multiple Bit Error Correction Coding Technique for NoC Interconnect
- 14:30 Wideband Low Noise Amplifier Design for Microwave Frequency using CMOS 65nm Technology
- 14:45 Effects of Memristors on Fully Differential Transimpedance Amplifier Performance
- 15:00 Realtime On-chip Wireless Waveform Monitoring
- 15:15 FPGA Implementation of an Efficient High Speed Max-log-MAP Decoder
- 15:30 Design of Reversible Shift Registers Minimizing Number ofGates, Constant Inputs and Garbage Outputs
- 15:45 Two - Staged Precoder for Massive MIMO Millimeter Wave systems
- 16:00 FPGA Based Implementation of Linear SVM for Facial Expression Classification
- 16:15 Fast Approach for Iris Detection on GPU by Applying Search Localization for Circular Hough Transform
ICACCI-14: ICACCI-14: Internet of Things (IoT)/Networks/Distributed Systems
- 14:00 Optimal Query-Processing-Node Discovery inIoT-Fog Computing Environment
- 14:15 Trust Management Based on Node Stay Time in VANET
- 14:30 An IoT Automated Curtain System for Smart Homes
- 14:45 An IoT-based Automated Shower System for Smart Homes
- 15:00 Performance Evaluation of IoT Network Management Platforms
- 15:15 System for Detection of Emergency Situations in Smart City Environments Employing Smartphones
- 15:30 Efficient and Novel Broadcasting in VANET using Next Forwarder Selection Algorithm
- 15:45 End-to-end delay and energy efficiency of multihop wireless networks with cooperative MAC
- 16:00 Task personalization for inexpertise workers in incentive based crowdsourcing platforms
- 16:15 Resource-Aware Energy Efficient Workflow Scheduling in Cloud Infrastructure
- 16:30 Software as a Service by Interoperating in a Multi-Cloud Environment
- 16:45 UVM Based Testbench Architecture for Coverage Driven Functional Verification of SPI Protocol
- 17:00 A Population-based Approach for Load Balancing in Distributed Computing Systems
ICACCI-15: ICACCI-15: Security, Trust and Privacy/Steganography/SAI'18 (Regular Papers)
- 14:00 Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools
- 14:15 Attribute based Range Search over Encrypted Data for Privacy Preserving in Cloud Computing
- 14:30 Intelligent Malware Detection using Oblique Random Forest Paradigm
- 14:45 A Hybrid Approach to Rumour Detection in Microblogging Platforms
- 15:00 Hardware Implementation of Text Encryption using Elliptic Curve Cryptography over 192 bit Prime Field
- 15:15 Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data
- 15:30 A Survey on Metamorphic Malware Detection based on Hidden Markov Model
- 15:45 An SVM-based Multiclass IDS for Multicast Routing Attacks in Mobile Ad Hoc Networks
- 16:00 Blind Quantitative Steganalysis using SVD Features
- 16:15 FPGA Implementation of Traffic Light Controller and its Analysis in the Presence of Hardware Trojan
- 16:30 Authentication using text and graphical password
ICACCI-16: ICACCI-16: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Regular Papers)
- 14:00 Co-saliency Detection Using Clustering and Multiple Video Foreground Identification
- 14:15 Analysis and Classification of Railway Track Surfaces based on Image Processing
- 14:30 ACORB - An ACO and ORB based Hybrid Image Feature Detector
- 14:45 Extracting Building Footprints from Satellite Images using Convolutional Neural Networks
- 15:00 Functional MRI Data Analysis Using Connectivity Strengths to Identify Cognitive States
- 15:15 Empirical study on two-class image classification
- 15:30 A comparative study of dictionary learning algorithms on speech recognition task
- 15:45 Segmentation of Pap Smear Images to Diagnose Cervical Cancer Types and Stages
- 16:00 Facial Expression Classifier Using Better Technique: FisherFace Algorithm
- 16:15 Efficient Similarity Measurement between Digitally Reconstructed Radiograph and Fluoroscopy for 3D-2D Registration
- 16:30 LRJPEG: A Luminance Reduction based Modification for JPEG Algorithm to Improve Medical Image Compression
ICACCI-29: ICACCI-29: Third Symposium on Emerging Topics in Computing and Communications (SETCAC'18) - short papers
- 14:00 Fault Identification System for Motor Cycle Using Malfunction Indicator Lamp LED Blinking Frequency Detection on Mobile Device
- 14:15 Security with IP Address Assignment and Spoofing for Smart IOT Devices
- 14:30 Performance Analysis of MC-CDMA based Underwater Wireless Sensor Network
- 14:45 Performance Evaluation of Advanced Classification Models on Spatial Location Based Shimmer2 Sensor Data Sets
- 15:00 Joint Subchannel and Power Allocation Optimization in Heterogeneous Networks
- 15:15 Dual-Objectives Mobile-RPL Routing Protocol Based QoS Data Gathering over Low Power Lossy Networks for Smart City Applications: DMRPL
- 15:30 Obtaining the upper bound on the number of non-dominated fronts in a Population
- 15:45 Preventing Information Leakage from Encoded Data in Lattice Based Cryptography
- 16:00 Traceability Management with Impact Analysis in DevOps based Software Development
- 16:15 Evolution of SIM Cards - What's Next?
- 16:30 On-demand Virtual Machine Placement in Infrastructure Cloud
ICACCI-30: ICACCI-30: Sixth International Symposium on Intelligent Informatics (ISI'18)/NLP'18 - Short Papers
- 14:00 Comparing the Performance of Neural and Statistical Sentence Embeddings on Summarization and Word Sense Disambiguation
- 14:15 Text Summarization of Spanish Documents
- 14:30 Graph-based Question Answering System
- 14:45 NLP Based Latent Semantic Analysis for Legal Text Summarization
- 15:00 DNN-based Bilingual (Telugu-Hindi) Polyglot Speech Synthesis
- 15:15 English Multi-Word Expressions: A Tagset for Health Domain
- 15:30 A novel approach for handwriting recognition in Malayalam manuscripts using contour detection and Convolutional Neural Nets
- 15:45 Comparison of Machine Learning Algorithms for Skin Disease Classification Using Color and Texture Features
- 16:00 Credit Scoring Model based on Kernel Density Estimation and Support Vector Machine for Group Feature Selection
- 16:15 Multi neural network model for product recognition and labelling
- 16:30 Classification of Urban Data using Satellite Imaging
- 16:45 Real Time Analysis of Crowd Behaviourfor Automatic and Accurate Surveillance
Thursday, September 20 14:00 - 17:50 (Asia/Kolkata)
ICACCI-09: ICACCI-09: Industry Track (Regular Papers)
Keynote Speaker: Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Title of Talk: Quantum Computing Technology interacting with Cla ical Computing Systems (Sept. 20, 2018, 14-14.50)
Abstract: The upcoming quantum computing devices based on superconducting qubit technology are expected to outperform conventional computers in a growing number of algorithms, such as the computing of energy spectra or the dynamics of molecular or condensed matter systems. To gain the best performance, algorithms can be partitioned and placed to the appropriate modules of a tightly coupled quantum-cla ical proce ing system. This talk will introduce in the superconducting qubit technology as we apply it in IBM. Some of the recently recognized challenges at qubit level regarding system architecture, but also the overall ecosystem will be outlined. Further, the integration of quantum computers into our computing environment to form a co-existing quantum-cla ical system will be reported. I will show developments towards useful quantum applications with potential advantage when running them on small-sized quantum computing hardware. Such methods may enhance the efficiency of variational methods for quantum chemistry or optimization tasks with the prospect of carrying out scientifically and commercially relevant computations in the near future.
- 14:00 Design and Evaluation of a Real-Time Speech Recognition System
- 14:15 Low Power and Area Efficient Max-log-MAP Decoder
- 14:30 Dynamic Traffic Light Control Mechanism in VANET
- 14:45 Traffic Service Quantitative Analysis Method under Developing Country
- 15:00 Safety Critical Embedded Software: Significance and Approach to Reliability
- 15:15 Hardware Design and Implementation of Pseudorandom Number Generator Using Piecewise Linear Chaotic Map
- 15:30 A Novel Approach for Generating Composite Sketches from Mugshot Photographs
- 15:45 Algebraic Applications on Multiset Filters of Residuated Lattices
- 16:00 Knowledge Extraction from Apps data and its Application in AdTargeting
- 16:15 Motivators, Hygiene Factors and Job Satisfaction of Employees in IT Sector in India
- 16:30 Design By Contract Methodology - A Step Towards Zero-defect Programming
- 16:45 Vulnerability Coverage Criteria for Security Testing of Web Applications
- 17:00 A Data Science - Centered Approach to Studying International Relations and Foreign Policies
Thursday, September 20 16:00 - 17:15 (Asia/Kolkata)
ICACCI-35: ICACCI-35: Poster Session II
- Pulse Oximetry and IOT based Cardiac monitoring integrated Alert system
- Adaptive Cruise Control with Auto Health Monitoring
- Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs
- Self Parking car prototype
- Design of Slotted Waveguide Antenna Using Particle Swarm Optimization
- Reducing DNSSEC Packet Size using Memorization in SDN environment
- Detection in Sporadic Multiuser Systems over 3GPP LTE Networks
- SDN Based Secure Virtual Machine Migration In Cloud Environment
- Favour prediction of Taxi services using real-time visualization
- Design and Implementation of the Prevention and Analysis of the Accident for Automobiles
- Performance of Dual mode OFDM-IM using Reduced Complexity Receiving Technique
- Performance Evaluation of Secured Wiretap Channel with Multi-Antenna Technologies
- Cooperative Spectrum Prescience for Advanced Performance of Cognitive Radio Networks (CRNs)
- Intelligent Daily Scheduler
- Design and Implementation of an Open-Source Browser-based Laboratory Platform for EEG Data Analysis
- Multi-Level Analysis of Bit-Plane Based GLAC Feature and other Existing Texture Features for a Robust Hand Detection System
- On Evaluation of Entity Matching Techniques for Bibliographic Database
- Autonomous Seed Sowing Agricultural Robot
- B2VDM: Blockchain Based Vehicular Data Management
- Simulation and Deep CNN based architecture for validation of Intelligent automotive functions
- A LSTM based Tool for Consumer Complaint Classification
- Energy Efficient And Reliable Communication in IEEE 802.15.6 IR-UWB WBAN
- Identification of Acute Lymphoblastic Leukemia in Microscopic Blood Image Using Image Processing and Machine Learning Algorithms
- Machine Type Comparative of Leading Cloud Players based on Performance & Pricing
- Exploring the Relationship between Socio-inspired CALM and Network Capacity through Regression Analysis
- A comparison study of Word Embedding for Detecting Named Entities of Code-Mixed Data in Indian Language
- Code-Mixing: A Brief Survey
Thursday, September 20 16:00 - 17:45 (Asia/Kolkata)
Lightning Talks
Titles for Lightning Talks
-- Explainable AI (XAI) (Mr. Manojkumar Parmar, Robert Bosch Engineering and Busine Solutions Private Ltd)
-- Batch Processing through Mulesoft (Ms. Manvi Seth, Cisco Systems India Pvt Ltd)
-- Railway Track Monitoring (Mr. Sai Pavan Kartheek Sunkara, Amrita School of Engineering, Bengaluru)
-- Automation, Innovation & Education (Ms. Prajakta Dnyandev Patil, Rajarambapu Institute of Technology)
-- Enhancing the capabilities of the network protocol for forensic investigation and Evidence Collection (Prof. Rachana Yogesh Patil, A. C. Patil College of Engineering, Navi Mumbai)
-- Discriminative Feature Learning for URL based Web Page Classification (Dr. Rajalakshmi R, Vellore Institute of Technology, Chennai Campus)
-- Artificial Intelligence based Internet of Things (Dr. Ravinder Reddy Ramasani, CBIT, Osmania University)
-- Artificial neural networks for anomaly detection (Dr. Seema Singh, BMS Institute of Technology and Management)
-- Technologies that Enable High Capacity Wireless 5G Network (Mr. Dhanurdhar Murali, P.E.S. Institute of Technology)
-- IoT Techniques Used for Monitoring Patient (Dr. Sudhanshu Suhas Gonge, Marathwada Mitra Mandal's College of Engineering)
-- Forecasting System for Future Transaction Volume of Bitcoin Cryptocurrency (Dr. Sudalaimuthu T, Hindustan University)
-- Detection of Energy Theft in Smart Grid (Dr. Tan Wooi Nee, Multimedia University)
Thursday, September 20 16:30 - 17:30 (Asia/Kolkata)
Tea Break
Thursday, September 20 18:00 - 20:30 (Asia/Kolkata)
Cultural Events followed by Banquet Dinner
Friday, September 21
Friday, September 21 8:30 - 13:00 (Asia/Kolkata)
Registration
Friday, September 21 9:00 - 9:50 (Asia/Kolkata)
Keynote 9: Sensing and monitoring the water environment using Cognitive group-based collaborative sensor network
Abstract: Grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary me age forwarding and additional overheads, thus providing low energy consumption. Grouping nodes also diminish the average network delay while allows scaling the network considerably. Communications in sensor networks should be as efficient as possible and collaborative methods can enhance their performance. Group-based collaborative wireless sensor networks appear as the proper logical step. When a Wireless Sensor Network is deployed, environment data can be obtained using two sides. The first one is the direct sensing, where the information is measured physically from the medium. The second one is the indirect sensing, which provides the information using the parameters of the wireless network (Received Signal Strength, lost frames, disconnections, etc.) and from the behavior of the traffic and the nodes of the network. Both can be mixed to have a complete picture of what is happening in the aquatic medium and to estimate the right prediction. In this talk, a cognitive group-based collaborative wireless sensor network for controlling water pollution and underwater monitoring is presented. Discussions about the network parameters that are affected by the environment, how they can be used for environmental monitoring, and their relationship with what is happening in the environment will be held. Self-learning algorithms, techniques for the representation of the knowledge acquired from the environment, and information management are added to the wireless sensor network in order to have an efficient system. Moreover, the group-based system lets the network send the information according to several cooperation rules and taken decisions. Some examples for wide areas monitoring and for small size areas monitoring in real aquatic scenarios will be shown.
Friday, September 21 9:10 - 11:00 (Asia/Kolkata)
Tutorial: Embedded platforms for AI and Blockchain
Embedded platforms for AI and Blockchain
This tutorial provides an overview of the most relevant approaches to next Generation computing. AI, ML, IOT, and Cloud Infrastructure create an enormous amount of data and the amount of data generated daily by an individual can go up to 1TB and similarly by an industry can go up to 500TB by 2022. In order to process this huge amount of data, it needs very high computing and storage infrastructure and low latency network. Cloud infrastructure is being built across the world to process this data. Generation, transportation, and processing of these data at Cloud securely when the amount of data explode exponentially is a major challenge. This challenge involves many factors such as security in handling these data, network bandwidth required to move this data across the cloud, latency in which transferring the data across the computing nodes and huge computing power required in a data centre. Isolated high power data centers are not a viable option to address above challenges. Edge computing, Automation, Artificial Intelligence, and block-chain are some of the solutions which address the above challenges. Using these solutions simultaneously is the key to solving these challenges which industry is going to face in near future.
Outline of the presentation (Duration 1 hr 50 Min): • Motivation and Introduction (5 Min) • 4th Industrial revolution -AI (5 Min) • Type of AI (5 Min) • Need for AI and Blockchain (5 Min) • Need for Automation (5 Min) • Evolution of edge computing (5 Min) • API computing and economy (5 Min) • Heterogeneous Computing (5 min) • Low latency Computing (5 Min) • Blockchain basics (10 Minutes) • Hardware accelerated and Managed Blockchain (10 Minutes) • Heterogeneous Computing for AI and ML (5 Min) • Acceleron MDC accelerate AI and Blockchain (30 Minutes). • Discussion (10 Min)
Friday, September 21 9:50 - 10:45 (Asia/Kolkata)
Keynote 10: How Can We Change the World Through Human-Centred Computing Research?
Abstract: There is a growing concern in computing about how research can make an impact by addre ing pre ing societal i ues. Topics that are being proposed are far-reaching, including climate change; health and well being; facilitating innovation in developing countries and instrumenting new forms of civic engagement with the aim of influencing policy change. Such big questions, however, need the computing community, along with others, to change how research is done. This requires new framings, new collaborations and new integrated methods. However, this is simpler said than done: the gap is huge between working and achieving succe at the micro level and at the macro scale required (Shneiderman, 2016). In my talk I will describe some of our attempts to bridge the gap from a human-centred perspective with a focus on urban tech design, community empowerment and behavioural change.
Friday, September 21 10:45 - 11:10 (Asia/Kolkata)
Tea Break
Friday, September 21 11:10 - 12:00 (Asia/Kolkata)
Keynote 11: From Gutenberg to Smartphones: Inferring Keypress from Side Channels
Abstract: Typing is still one of the main methods of interaction with computing devices: we do it regularly on our laptops, smartphones and other devices, like ATM machines. Oftentimes, we want to keep the typed text confidential (emails, pa word, pin codes...). To protect our text, we use all kinds of acce control and encryption mechanisms, but we might forget to leave some other doors open to the adversary. In this talk, we will review recent results on typing inference from side channels exploitable by both local and remote adversaries (e.g., through a VoIP conversation).
SHORT BIO: Mauro Conti is Full Profe or at the University of Padua, Italy, and Affiliate Profe or at the University of Washington, Seattle, USA. He obtained his Ph.D. from Sapienza University of Rome, Italy, in 2009. After his Ph.D., he was a Post-Doc Researcher at Vrije Universiteit Amsterdam, The Netherlands. In 2011 he joined as A istant Profe or the University of Padua, where he became A ociate Profe or in 2015, and Full Profe or in 2018. He has been Visiting Researcher at GMU (2008, 2016), UCLA (2010), UCI (2012, 2013, 2014, 2017), TU Darmstadt (2013), UF (2015), and FIU (2015, 2016). He has been awarded with a Marie Curie Fellowship (2012) by the European Commi ion, and with a Fellowship by the German DAAD (2013). His research is also funded by companies, including Cisco and Intel. His main research interest is in the area of security and privacy. In this area, he published more than 200 papers in topmost international peer-reviewed journals and conference. He is Area Editor-in-Chief for IEEE Communications Surveys & Tutorials, and A ociate Editor for several journals, including IEEE Communications Surveys & Tutorials, IEEE Transactions on Information Forensics and Security, and IEEE Transactions on Network and Service Management. He was Program Chair for TRUST 2015, ICISS 2016, WiSec 2017, and General Chair for SecureComm 2012 and ACM SACMAT 2013. He is Senior Member of the IEEE.
Friday, September 21 12:00 - 12:50 (Asia/Kolkata)
Keynote 12: The state-of-the-art wireless body area sensor networks - Issues and Challenges
Abstract: Wirele body area sensor network is a sub-field of wirele sensor network. Wirele body area sensor network has come into existence after the development of wirele sensor network reached some level of maturity. This has become po ible due to the tremendous technological advancement leading to easy-to-use wirele wearable technologies and electronic components that are small in size. Indeed, this field has gained significant attention in recent time due to its applications which mostly are toward healthcare sector. Today, tiny-sized sensors could be placed on the human body to record various physiological parameters and these sensors are capable of sending data to other devices so that further nece ary actions could be taken. Hence, this can be used for diagnosis of disease and for developing serious health complication alert systems. In this talk, we would cover the state-of-the-art of various aspects of wirele body area sensor network, its communication architectures, wirele body area sensor network applications, programming frameworks, security i ues, and energy-efficient routing protocols.
Friday, September 21 12:50 - 14:00 (Asia/Kolkata)
Lunch Break
Friday, September 21 14:00 - 18:00 (Asia/Kolkata)
ICACCI-17: ICACCI-17: Symposium on VLSI Design and Embedded Computing (VDEC'18)
- 14:00 FPGA Based Ultrasonic Thickness Measuring Device
- 14:15 High Speed, Low Power Approximate Multipliers
- 14:30 Low power and area efficient error tolerant design for parallel filters
- 14:45 Delay based Physical Unclonable Function for Hardware Security and Trust
- 15:00 FPGA Implementation of Pseudo Chaos-signal Generator for Secure Communication Systems
- 15:15 Design of LVDS Transmitter with SLVDS mode for Low Power Applications in 55nm CMOS Technology
- 15:30 All Digital Phase Locked Loop for Low Frequency Applications
- 15:45 A performance study of Levenberg - Marquardt (LM) Algorithm in Echo Estimation
- 16:00 FPGA implementation of compensation algorithm for impacts of eliminated flicker noise in Zero IF architecture PCRs
ICACCI-18: ICACCI-18: Third Symposium on Advances in Applied Informatics (SAI'18)
- 14:00 A Multi-Classifier Approach on L1-Regulated Features of Microarray Cancer Data
- 14:15 Experimental Recording and Computational Analysis of EEG signals for a Squeeze Task: Assessments and Impacts for Applications
- 14:30 Experimental Recording and Assessing Gait Phases Using Mobile Phone Sensors and EEG
- 14:45 Diagnosis of Cardiotocography For Analysis and Prediction of Treatment During Pregnancy
- 15:00 Factors Influencing Consumer Responses to Marketing Gamification
- 15:15 The Social Travelers: Factors Impacting Influence of Location Sharing In Social Media On Motivation To Travel
- 15:30 Virtual Laboratories in Biotechnology are Significant Educational Informatics Tools
- 15:45 Mathematical Models as Bioscience Educational Informatics Tools
- 16:00 Prediction Models for Identification and Diagnosis of Tomato Plant Diseases
- 16:15 Novel technique for estimating Quiet Breathe Rate and Strength
- 16:30 V Score - A Data Analytical Versatility Metric For Cricket
- 16:45 Sangati - A Social Event Web approach to Index Videos
- 17:00 Emergency Healthcare Enhancement by Multi-Iterative Filtering of Service Delivery Centers
- 17:15 Eye Gaze as an Indicator for Stress Level Analysis in Students
- 17:30 Capacity Analysis of Correlated MIMO in GEOSAT Downlink Land Mobile System
ICACCI-19: ICACCI-19: Third Symposium on Emerging Topics in Computing and Communications (SETCAC'18) - Regular Papers
- 14:00 Optimal Tour Planning for Measles and Rubella Vaccination in Kochi, South India
- 14:15 Reproducing the firing properties of a cerebellum deep cerebellar nucleus with a multi-compartmental morphologically realistic biophysical model
- 14:30 Cell Association and Resource Partitioning in 5G Heterogeneous Networks
- 14:45 Algorithmic Approaches for Solving RFID Reader Positioning Problem with Simulated and Real-time Experimental Setups
- 15:00 Analysis of Stock Market using Streaming data Framework
- 15:15 Characteristics of 'Escaping' and 'Falling into' Poverty in India: An Analysis of IHDS Panel Data using machine learning approach
- 15:30 Applying Reverse Engineering Techniques to Analyze Design Patterns in Source Code
- 15:45 Augmenting cloud concepts learning with open source software environment
- 16:00 Android Dashboard for Past and Present Processes
- 16:15 Minimum Interference Topology Control in Cognitive Radio Networks through Channel Assignment
- 16:30 Computational Enhancement of All Possible Context Generation in Modified-SPEED Algorithm
- 16:45 Automatic Assessment Item Bank Calibration for Learning Gap Identification
- 17:00 Construction of Multiplicative Graph Spanners using Minimum Connected Dominating Set with Bounded Diameter
- 17:15 Towards Solving the IoT Standards Gap
ICACCI-20: ICACCI-20: Security, Trust and Privacy/Steganography/SAI'18 (Regular Papers)
- 14:00 A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
- 14:15 Mitigating DNS Amplification Attacks Using a Set of Geographically Distributed SDN Routers
- 14:30 Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level
- 14:45 Output Compressive Sensing for Trojan Detection Using Time-Based Side Channel Technique
- 15:00 A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard
- 15:15 A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model
ICACCI-21: ICACCI-21: Signal/Image/video/speech Processing/Computer Vision/Pattern Recognition (Regular Papers)
- 14:00 Motion Artifact Removal and Feature Extraction from PPG Signals Using Efficient Signal Processing Algorithms
- 14:15 Real-Time ECG Monitoring over Multi-Tiered Telemedicine Environment using Firebase
- 14:30 Implementation of Compact Wearable Fall Detector for the Elderly
- 14:45 Line Detection in Run-Length Encoded Document Images using Monotonically Increasing Graph Model
- 15:00 Modeling of Glutamate Pathway in Alzheimer's Disease using Biochemical Systems Theory
- 15:15 Discriminative sparse representation for speech mode classification
- 15:30 Detection of Exudates in Diabetic Retinopathy
- 15:45 Sub-block based global motion estimation for affine motion model
- 16:00 Analysis of Denoising Techniques for Speckle Noise Removal in Synthetic Aperture Radar Images
- 16:15 Corrosion Damage Identification and Lifetime Estimation of Ship Parts using Image Processing
ICACCI-22: ICACCI-22: Sixth International Symposium on Intelligent Informatics (ISI'18) - Regular Papers
- 14:00 Multi-Objective Accelerated Particle Swarm Optimization Technique for Scientific workflows in IaaS cloud
- 14:15 Sentiment based Food Classification for Restaurant Business
- 14:30 Performance of Pattern Recognition Algorithms in Identifying Banking Networks
- 14:45 Text to Image Translation using Generative Adversarial Networks
- 15:00 Identification and grading of free hand sketches using Deep learning techniques
- 15:15 Curious to Click It?-Identifying Clickbait using Deep Learning and Evolutionary Algorithm
- 15:30 Implementation of Artificial Neural Network on Raspberry Pi for Signal Processing Applications
- 15:45 ARGoS based implementation of a multi-robot coordination algorithm
- 16:00 An Effective Method For Hardware Multiplication Using Vedic Mathematics
- 16:15 A Hybrid Decision Support Model for Type II Diabetes
- 16:30 Fuel Price Prediction Using RNN
Friday, September 21 14:00 - 18:30 (Asia/Kolkata)
ICACCI-33: ICACCI-33: Symposium on Assistive Technologies for the Differently Abled (ATDA'18)
Title of the Talk: Technology for Inclusion Speaker: Prof. Rangasayee Raghunathrao, Chairman, Audiology Committee of International Association of Logopedics and Phoniatrics
Title of the Talk: Innovations and Incubation opportunities in the Disability Speaker: Mr. Mahantesh G Kivadasannavar, Founder, Managing Trustee - Samarthanam Trust
- 14:00 Environment Descriptor for the Visually Impaired
- 14:15 Assistive Technology for the Visually Impaired Using Computer Vision
- 14:30 Personality Identification Using Auditory Nerve Modelling of Human Speech
- 14:45 Automated Screening for Trisomy 21 by measuring Nuchal Translucency and Frontomaxillary Facial angle
- 15:00 Design of a Tactile Braille Cell
- 15:15 Estimating Gap Detection Threshold and Comodulation Masking Release (Uncomodulated Noise Bands) on Android
- 15:30 Kannada Speech Recognition System for APHASIC People
- 15:45 Speech Recognition and Correction of a Stuttered Speech
- 16:00 Automated Public Bus Identification System for Visually Impaired
- 16:15 A CMUcam5 Computer Vision Based Arduino Wearable Navigation System for the Visually Impaired
ICACCI-23: ICACCI-23: Sixth International Symposium on Women in Computing and Informatics (WCI'18) - regular papers & WCI Keynotes)
Title of Talk: Multiobjective Optimization for Clustering and Cla ification (14.00-14.50)
- 14:00 Resilient Mechanism for security in navigation of Service Vehicles and Aircrafts at Airports
- 14:15 Trajectory Tracking by Multi-Agent in Octagonal Formation using Conventional and Adaptive Control
- 14:30 Counting Chemical Structures Resembling Trees
- 14:45 Secure Session Key Sharing Using Symmetric Key Cryptography
- 15:00 Extending Denoising AutoEncoders for Feature Recognition
- 15:15 Analysis and Prediction of Survival after Colorectal Chemotherapy using Machine Learning Models
- 15:30 A Novel Community Detection Method for Collaborative Networks
- 15:45 Online Voting Application Using Ethereum Blockchain
- 16:00 Image to Speech Converter - A Case Study on Handwritten Kannada Characters
- 16:15 Commercial Mango Juice Classification Using Fuzzy Logic
- 16:30 Tagging of Research Publications based on Author and Year Extraction
- 16:42 Efficient Communication in Disaster-hit Areas in Smart Cities using Infrastructure-less networks
- 16:54 Primary User Authentication in Cognitive Radio Network Using pre-generated hash digest
Friday, September 21 16:00 - 17:15 (Asia/Kolkata)
ICACCI-36: ICACCI-36: Poster Session III
- A Review on Machine Learning Trends, Application and Challenges in Internet of Things
- Ensemble Similarity based Collaborative Filtering Feedback: A Recommender System Scenario
- Identification of Illegal Garbage Dumping with Video Analytics
- Sentiment Analysis of Product Reviews using Deep Learning
- Comparison of different Acoustic Models for Kannada language using Kaldi Toolkit
- Multilevel Authentication using QR code based watermarking with mobile OTP and Hadamard transformation
- Performance Evaluation of Augmented Reality based 3D Modelling Furniture Application
- Predictive analysis of drug reviews using Gibbs sampling topic modeling
- A Data Mining Model To Predict Breast Cancer Using Improved Feature Selection Method On Real Time Data
- Network Intrusion Detection using Improved Genetic K-means Algorithm
- Defending against packet dropping attacks in Wireless Adhoc Networks using Cluster based Trust Entropy
- Multimodal Medical Image fusion using Curvelet Algorithm
- Automatic Image Registration for Oceansat-2 OCM Products
- Drift fault accommodation system of a transport aircraft using Neural network models
- A Hopfield Neural Network Approach forAuthentication of Password Based on Fuzzy Logic
- A k-clique based clustering protocol for resource discovery in P2P network
- Effect of Feature Reduction using Bigram Technique for detection of Forged Reviews
- A Survey of Low-cost Lock-in Amplifiers for Sensor Application
- CMOS-Memristive Self-Cascode Current Mirror
- Implementation of FIR Filter & MAC Unit by using Neural Networks in FPGA
- Efficient Dynamic Virtual Channel Architecture for NoC Systems
Friday, September 21 16:30 - 17:30 (Asia/Kolkata)
Tea Break
Saturday, September 22
Saturday, September 22 9:00 - 11:00 (Asia/Kolkata)
Registration
Saturday, September 22 9:00 - 13:30 (Asia/Kolkata)
ICACCI-32: ICACCI-32: Artificial Intelligence and Machine Learning/Distributed Systems/Applied Informatics/Industry Track/AIN'18 (Short Papers)
- 9:00 Dynamic Load Balancing Strategy based on Resource Classification Technique in IaaS Cloud
- 9:15 Optimal Placement of Wi-Fi Access Points for Indoor Regions to provide 2.4 GHz and 60 GHz spectrum using Dual Band Architecture
- 9:30 Machine Learning Approaches for Resource Allocation in the Cloud: Critical Reflections
- 9:45 Building a Dataset for Personalized Learning Recommendation System
- 10:00 Forecasting of annual crime rate in India
- 10:15 A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card
- 10:30 An Approach Towards Building an IoT Based Smart Classroom
- 10:45 Torque Analysis of Male-Female Gait and Identification using Machine Learning
- 11:00 False Data Injection Prevention in Wireless Sensor Networks using Node-level Trust Value Computation
- 11:15 Survey on Extractive Text Summarization Methods with Multi-Document Datasets
Saturday, September 22 9:15 - 13:30 (Asia/Kolkata)
ICACCI-24(B): ICACCI-24(B): Sixth International Symposium on Women in Computing and Informatics (WCI'18) - regular papers & WCI Keynotes
Dr. Jharna Majumdar, Centre for Robotics Research, Nitte Meenakshi Institute of Technology, Bangalore Title of Talk: Advance Algorithms for Video Proce ing
Abstract: With the rapid growth of Advanced Technology and the availability of affordable low-cost sensors coupled to high-end computers, it is po ible to capture video at a faster rate than ever before. The talk introduces the video proce ing methodologies and their wide variety of applications. Some of the topics covered will be Modeling of Transitions in Video; Video Shot Detection and Summarization; Human Detection, Tracking, Activity Recognition from Video for Robotics application; High-End Defense applications like Registration and Mosaicking.
- 9:15 Ransomware detection by mining API call usage
- 9:30 A Novel Collaborative Caching Framework for Peer-to-Peer Networks
- 9:45 R-peak Extraction for Wireless ECG Monitoring System
- 10:00 Mobile Applications Recommendation Based on User Ratings and Permissions
- 10:15 Highly Secured Architectural Model for Web based Applications using 2-way Authentication Technique
- 10:30 PSO based feature selection of gene for cancer classification using SVM-RFE
- 10:45 Anomaly Detection in Role Administered Relational Databases- A Novel Method
- 11:00 A Graph Based Algorithm for Clustering and Ranking Proteins for Identifying Disease Causing Genes
- 11:15 Bi-Histogram Equalization with Adaptive Multi-Plateau Limits for Enhancing Magnetic Resonance Images
- 11:30 Video Shot Detection based on SIFT Features and Video Summarization using Expectation-Maximization
- 11:45 Smart Store Assistor for Visually Impaired
- 12:00 Significant feature extraction automated frameworkfor cancer diagnosis from bone histopathologyimages
ICACCI-24(A): ICACCI-24(A): Sixth International Symposium on Women in Computing and Informatics (WCI'18) - regular papers & WCI Keynotes
Speaker: Dr. Lillykutty Jacob, Profe or, Dept. of ECE, National Institute of Technology, Calicut, India
Tentative Title of Talk: Introduction to 5G Wireless Networks
Abstract: The talk will start with a brief overview of the evolution of wireless communications and roadmap of 5G evolution. It will continue with a discussion on the vision of 5G, 5G use cases, 5G spectrum, and 5G network architecture. The concept of 5G network slicing will then be introduced. A detailed discussion of the 5G air interface will also be done, which will cover: Non-Orthogonal Multiple Access (NOMA); Millimeter Wave (mmWave); Massive MIMO; and Massive IoT. The talk will end with the use of low power WANS (LPWANs) for massive IoT.
- 9:15 Gathering of Autonomous Mobile Robots Under Limited Sensing Ranges
- 9:30 E-waste Management Using Blockchain based Smart Contracts
- 9:45 Optimized QoS Prediction of Web Service using Genetic Algorithm and Multiple QoS Aspects
- 10:00 Affective State Recognition using Image Cues
- 10:15 Assigning Sentiment Score for Twitter Tweets
- 10:30 Genetic Algorithms for Vaccination Tour Planning in Tribal Areas in Kerala
- 10:45 Modified Shuffled Multi-Population Bat Algorithm
- 11:00 An Implementation of Genetic Algorithm for Clustering Help Desk Data for Service Automation
- 11:15 Optimization of Gaussian Membership Functions using Unscented Kalman Filter
- 11:30 A Community Based Web Summarization in Near Linear Time
- 11:45 SFrame: Design & Development of Smart Framework to Port Linux Kernel on ARM Based Raspberry Pi
- 12:00 Auto-encoder Based Automated Epilepsy Diagnosis
Saturday, September 22 10:00 - 13:00 (Asia/Kolkata)
Workshop on Information Security in a connected World - Why should we care?
This workshop aims to provide an introduction to Information security and will expose the beginner to various facets of Information security - Network security, Secure programming, IoT security, Mobile Security, SCADA/Industry 4.0 etc. Thereafter, Participants will have the opportunity to work "hands-on" to understand a couple of topical security challenges/problems and po ible solutions.
Talk: There will talks on Security by CISCO personnel for about 1 hour.
Topics:
Hands-on Demo / Hands-on Workshop for participants (time 2hour 30 min)
IoT Security (approx. 45 min)
Secure Programming - SQL Injection (approx. 75 min)
IoT Security: The purpose is to demonstrate the importance of security in IoT networks and platforms.
What will be done:
A Rasberry Pi will be connected to a device such as a lamp and will be controlled remotely from our Android Mobile smartphone.
A DDOS attack will be launched after which the user will be unable to control the device.
A simple defense mechanism to thwart the attack will also be shown.
Secure Programming - Injection Attacks: Injection attacks continue to be the #1 vulnerability as per the latest OWASP top 10 2017 report. The purpose is to demonstrate the attack and defense methods to help insecure software design/development.
What will be done:
A website will be created for use of participants.
One group will be given challenges to perform a variety of inject attacks.
The other group will then be given the challenge to defend against such attacks (aka Red/blue teams).
This will elevate the understanding and need for secure programming.
Speakers: Prof. Prasad Honnavalli, PES University, Bangalore Prof. Malashree, PES University, Bangalore
Saturday, September 22 10:00 - 13:30 (Asia/Kolkata)
ICACCI-25: ICACCI-25: Symposium on Signal Processing for Wireless and Multimedia Communications (SPWMC'18)
- 10:00 User Defined Encryption Procedure For IDEA Algorithm
- 10:15 Design and Analysis of Circularly Polarized Defected Ground Elliptical Patch Antenna for Long Term Evolution (LTE) and 4G Wireless Applications
- 10:30 Image Registration using Hampel and Modified Hampel M-estimators
- 10:45 Multidimensional Data Model for Air Pollution Data Analysis
- 11:00 Audio-Internet [A-I]: A Novel Technique for Streaming [Bits-over-Sound]*
- 11:15 A novel approach for cloud service composition ensuring global QoS constraints optimization
- 11:30 Performance Enhancement of a Series Active Power Filter using Kalman Filter based Neural Network Control Strategy
- 11:45 Data Hiding Scheme in Quad Channel Images using Square Block Algorithm
- 12:00 Compact Low Cost Passive RFID Tag for Object Tracking
- 12:15 High performance square spiral inductor for 65nm CMOS V-band Low Noise Amplifier
Saturday, September 22 10:45 - 11:10 (Asia/Kolkata)
Tea Break
Saturday, September 22 13:00 - 14:00 (Asia/Kolkata)
Lunch Break
Saturday, September 22 14:30 - 15:30 (Asia/Kolkata)
ICACCI-37: WCI Panel Discussion: Why women expertise remain unutilized in Tech Spectrum
Expected points to be covered in the discussion:
-- Why are women professionals le in number in the domain
-- Why less number of women leaders in Tech Spectrum?
-- Challenges faced by women working in industries and technical areas
-- Are there enough opportunities for women in industry and research field?
-- Lack of awareness of the success stories of women working in the domain?
-- Is there differences in the way boys and girls are brought up during their growing years?
Moderator: Dr. Shikha Tripathi, Professor, PES University, Bangalore & General Chair, WCI'18
Panel Members:
- Dr. Punitha Swamy, IBM Bangalore, India
- Dr. Punam Bedi, Professor, Delhi University
- Dr. Annapoorna Patil, Profesor, MS Ramiah Institute of Technology, Bangalore
- Dr. Poornima Girish, Professor, MIT, Manipal
Saturday, September 22 15:30 - 16:00 (Asia/Kolkata)
ICACCI-38: Valedictory Function
Saturday, September 22 16:00 - 16:15 (Asia/Kolkata)
Tea
Program last updated on no date/time given