Program for Third International Conference on Applied Soft computing and Communication Networks (ACN'18)

Wednesday, September 19

Wednesday, September 19 8:30 - 13:00

Registration, Breakfast and teago to top

Room: Ground Floor - Entrance

Wednesday, September 19 9:20 - 10:15

Inaugural Sessiongo to top

Room: Seminar Hall -1

Wednesday, September 19 10:15 - 11:00

Keynote: Intent based networkinggo to top

Mr. Saravanan Radhakrishnan, Distinguished Engineer at Cisco, Bangalore, India
Room: Seminar Hall -1

Abstract: The intuitive network starts with intent-based infrastructure that is secure - essentially all IP infrastructure, including switches, routers, wireless access points, that provides the connectivity and routes traffic from devices (PCs, tablets, phones, video screens, IoT) within the enterprise and to the internet.IP networking started small 30 years ago, connecting two departments in a lab. Now, enterprises have networks with tens of thousands of boxes. Most of them still have relatively primitive tools to manage this complexity. It's an expensive process and can slow down the business. The wireless network is separate from the wired network, which is separate from the Wide Area Network. And they're all managed and configured separately, and they can all have different interfaces, commands, and configuration models. Even worse, this is all usually done one box at a time. With the intuitive network, we fundamentally changed the approach, removing a lot of the complexity accumulated over the past 30 years. Now we have one unified system that spans the entire enterprise access network, covering all type of devices. It acts as a single platform, driven by intent. This intent-based infrastructure is programmable and integrated so that it can be automated. Also, security is built-in with the ability to find threats and automate responses to keep enterprises protected from advanced threats. This unified system includes our networking software operating system, IOS. Over the past two years, we've completely rebuilt IOS for the digital age. IOS is now API driven, open, programmable, and modular - all capabilities that are required from a modern software stack.

Wednesday, September 19 11:00 - 12:00

Keynote 1: Engineering the Fabric of IoT, People, and SystemsDetailsgo to top

Speaker: Dr. Schahram Dustdar, Head of the Distributed Systems Group, The TU Wien, Austria
Room: Seminar Hall -1

Abstract: In this talk I will explore the integration of people, software services, and things with their data, into a novel resilient ecosystem, which can be modeled, programmed, and deployed on a large scale in an elastic way. This novel paradigm has major consequences on how we view, build, design, and deploy ultra-large scale distributed systems and establishes a novel foundation for an "architecture of value" driven Smart City. In particular, this talk addresses three novel paradigms for designing the service-oriented information systems of the future: Elastic Computing, Social Compute Units, and Osmotic Computing. These three paradigms serve as a foundation for future large-scale distributed systems. Furthermore, we will discuss our responsibilities as computer scientists, technologists, and researchers for creating technologies, which benefit society in a positive way, thereby strengthening the new fabric of interconnected people, software services, and things into a novel resilient ecosystem.

Wednesday, September 19 12:00 - 13:00

Keynote 2: The Power of Memory (Tom Coughlin)go to top

Speaker: Tom Coughlin, 2018 President-Elect, IEEE-USA and President, Coughlin Associates, USA
Room: Seminar Hall -1

Abstract: Advances in computing, communications, networking and electronics have enabled the generation of enormous amounts of data. This is due to higher resolution data, captured more frequently, and the growing use of connected sensor data in IoT applications. This data must be captured, processed and then stored. Some data must be kept for a short time and processed quickly to be useful, e.g. in autonomous vehicles as well as robotics and automation. The results of this processing and data generated having economic value (e.g. commercial video) may be kept for a long time. This talk will examine the latest developments in the digital memory and storage hierarchy and how they will enable developments in AI, cloud computing, VR/AR, Smart Cities, robotics and automation and the preservation of culture, technology and history.

Wednesday, September 19 13:00 - 13:45

Lunch Breakgo to top

Room: Ground Floor - Open Space

Wednesday, September 19 14:00 - 18:30

ISTA-01: ISTA-01: Intelligent Image Processing /Artificial Vision/Speech Processinggo to top

Room - 401
Chairs: Jisha John, Gowri Srinivasa
ISTA-01.1 14:00 Effect of Denoising on Hyperspectral Image Classification using Deep Networks and Kernel Methods
ISTA-01.2 14:18 Transfer Learning for Video Anomaly Detection
ISTA-01.3 14:36 Precision centric framework for activity recognition using Dempster Shaffer Theory and Information fusion algorithm in smart environment
ISTA-01.4 14:54 Spectacle problem removal from facial images based on detail preserving filtering schemes
ISTA-01.5 15:12 Domain Independent Static Video Summarization using Sparse Autoencoders and K-means Clustering
ISTA-01.6 15:30 Deep Rectified System for High-speed Tracking in Images
ISTA-01.7 15:48 Identification and Exploration of Facial Expression in Children with ASD in a Contact less Environment
ISTA-01.8 16:06 Computer-Aided Grading of Prostate Cancer from MRI images using Convolutional Neural Networks
ISTA-01.9 16:24 An improved Local Binary Pattern based Edge Detection Algorithm for Noisy Images
ISTA-01.10 16:42 Pair wise training for stacked convolutional autoencoders using small scale images

SIRS-01: SIRS-01: Intelligent Recognition Techniques and Applicationsgo to top

Room - 402
Chairs: Bhaskar Belavadi, Sudhanshu S. Gonge
SIRS-01.1 14:00 Pre-processed Hyperspectral Image Analysis Using Tensor Decomposition Techniques
SIRS-01.2 14:18 Intelligent Systems Applied to the Classification of Multiple Faults in Inverter Fed Induction Motors
SIRS-01.3 14:36 Wemotion: A system to detect emotion using wristbands and smartphones
SIRS-01.4 14:54 Recovery of a failed antenna element using Genetic Algorithm and Particle Swarm Optimization for MELISSA
SIRS-01.5 15:12 Deep Learning Locally Trained Wildlife Sensing in Real Acoustic Wetland Environment
SIRS-01.6 15:30 Clickbait Detection Using Swarm Intelligence
SIRS-01.7 15:48 A Novel Method for Stroke Prediction from Retinal Images using HoG Approach
SIRS-01.8 16:06 Digital Display Control Using Automation

SSCC-01: SSCC-01: Security and Privacy in Networked Systemsgo to top

Room - 403
Chairs: Santosh Kumar Majhi, Tarun Yadav
SSCC-01.1 14:00 Workload Distribution for Supporting Anonymous Communications in Automotive Network
SSCC-01.2 14:18 Diversity and Progress Controlled Gravitational Search Algorithm for balancing load in cloud
SSCC-01.3 14:36 Survey on Prevention, Mitigation and Containment of Ransomware Attacks
SSCC-01.4 14:54 Managing Network Functions in Stateful Application Aware SDN
SSCC-01.5 15:12 Trust-Neighbors-Based to mitigate the cooperative black hole attack in OLSR protocol
SSCC-01.6 15:30 Policy-based network and security management in federated service infrastructures with permissioned blockchains
SSCC-01.7 15:48 Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
SSCC-01.8 16:06 A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings
SSCC-01.9 16:24 Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution
SSCC-01.10 16:42 Security Threats Against LTE Networks: A Survey
SSCC-01.11 17:00 On Minimality Attack for Privacy-Preserving Data Publishing

Wednesday, September 19 16:30 - 17:30

Tea Breakgo to top

Room: Ground Floor and 3rd Floor

Thursday, September 20

Thursday, September 20 8:30 - 13:00

Registrationgo to top

Room: Ground Floor - Entrance

Thursday, September 20 10:00 - 11:00

Keynote 3: Advanced Signal Processing and Machine Learning Techniques for Neurological Disorder Detection and Prediction ApproachDetailsgo to top

Speaker: Dr. Maheshkumar H Kolekar, Indian Institute of Technology(IIT), Patna, India
Room: Seminar Hall - 2

Talk description: EEG is used as a noninvasive tool for analyzing brain activity. The talk will summarize recent techniques used for detecting neurological disorders such as epilepsy and dementia. Epilepsy affects about 70 million people worldwide. Epilepsy is characterized by repeated seizures. EEG is used as a tool for auto diagnosis, localization, and prediction of seizure. Various features, features variation between pre-seizure, seizure and inter-seizure EEG signals and classifier used for the auto-detection will be discussed in the talk. Dementia is one of the largest neurological disorders affecting developing and poor countries. Pre-diagnosis of dementia will help to take steps for reducing the effect of dementia. Present need of the hour is to tackle dementia in India, estimate disease burden in the community and steps to increase awareness among people regarding dementia. The talk will focus on EEG signal processing techniques for pre-dementia diagnosis.

Thursday, September 20 11:00 - 11:15

Tea Breakgo to top

Room: Ground Floor and 3rd Floor

Thursday, September 20 11:15 - 12:10

Keynote 4: Medical Image Diagnostics: A case study of spine pathologyDetailsgo to top

Speaker: Dr. Vipin Chaudhary, SUNY Empire Innovation Professor, State University of New York (SUNY) at Buffalo, USA
Room: Seminar Hall -1

Talk description: With growing digital medical data and meteoric success of machine learning it is now feasible to aid the medical practitioner in better diagnosing pathology and in some cases, outperform them. Lower back pain (LBP) is widely prevalent in people all over the world and negatively affects the quality of life due to chronic pain and change in posture. According to the American Academy of Orthopedic Surgeons (AAOS) four out of five adults experience low back pain at some point during their lives. I will discuss results from our work in automating the diagnosis of spine pathology. Clinical datasets are generally limited to pathological findings such as arthritis, fracture, infection, dislocation or tumor, but in the absence of gross pathology there is very poor correlation to nonspecific spine pain clinical symptoms. Since the majority of spine pain patients do not have any correlative pathological findings, it is important to look at the mechanics of the spine from a clinical standpoint. I will end this talk with some results in automating the process of suggesting changes to biomechanics of the spine thus taking the automation from diagnosis to cure.

Thursday, September 20 12:10 - 13:00

Keynote 5: Blockchain and its Applications on Edge Computing, Industry 4.0, IOT and Smart Citiesgo to top

Speaker: Dr. Juan Manuel Corchado, European IoT Digital Innovation Hub, BISITE Research Group, University of Salamanca, Spain
Room: Seminar Hall -1

Abstract: Blockchain is the technology behind bitcoin, ether and most of the other cryptocurrencies. Blockchain is essentially a form of record keeping and can be used in almost any product that uses some form of record keeping or database management. Blockchain is ideal for protecting any data that needs to be unalterable and indestructible. Traditionally, data are kept on a server that is owned and operated by a third-party company. This approach has some disadvantages. In this way, if a third party has access to your data, they could be destroyed, they could be altered, and it could leak. Through Blockchain, data are encrypted and then propagated over a distributed network of computers. In this way, data are nobody's properties, data cannot be destroyed and altered. Data block are sets of permanently recorded data e.g. financial transactions. The information is first hash which is a way to represent the data in a compact format where data can be easily compared for any change. Any small change in the data completely changes the hash version which makes the comparison very easy. The hash data are then encrypted. One private key allows the producer of the data to encrypt the data and serves as a digital signature. Also, one public key allows everyone else with the key to decrypt it. Finally, the data blocks are connected to each other (chained). Bitcoin is simply an application of Blockchain but there are many other applications where this technology has a lot to say. The application of this technology is endless in all fields but with respect to industry there are fields in which use is more and more common e.g. Supply Chain Management, Health Care and medical record sharing, Media Distribution, E-commerce with no middleman, Sharing economy with no central authority, Authenticated News Sharing/Data Sharing, Data Sharing Between companies.

Edge Computing, Industry 4.0, IOT and Smart Cities are areas in which Blockchain has high impact. The IoT refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. The risk of connecting a machine to Internet is obvious and Blockchain may help to eliminate or at least reduce some of these risks. The industry is updating its processes to be more efficient. Industry 4.0 is a transformation that makes it possible to gather and analyze data across machines, enabling faster, more flexible, and more efficient processes to produce higher-quality goods at reduced costs, that's the reason why a technology such us Blockchain if also of great interest to guaranty security and data reliability. The main aim of this tutorial is to introduce Blockchain technology and represents its practical application in security of Industry 4.0, Smart cities, Smart homes, and Internet of Thing.

Thursday, September 20 12:50 - 14:00

Lunch Breakgo to top

Room: Ground Floor - Open Space

Thursday, September 20 14:00 - 17:30

ISTA-02: ISTA-02: Intelligent Tools and Techniquesgo to top

Room - 501
Chairs: Sudhanshu S. Gonge, Balakrishnan P
ISTA-02.1 14:00 Stroke Diagnosis from Retinal Fundus Images using Multi texture Analysis
ISTA-02.2 14:18 A Novel Bagged Naïve Bayes-Decision Tree Approach for Multi-class Classification Problems
ISTA-02.3 14:36 State of art fractional order controller for power system stabilizer
ISTA-02.4 14:54 Trajectory tracking of Maryland manipulator using linguistic lyapunov fuzzy controller
ISTA-02.5 15:12 An Innovative application for code generation of mathematical equations and problem solving
ISTA-02.6 15:30 Design and Implementation of In-situ Human-Elephant Conflict Management System
ISTA-02.7 15:48 Complementing the DTW based speaker verification systems with knowledge of specific regions of interest
ISTA-02.8 16:06 A hybrid framework for optimal feature subset selection
ISTA-02.9 16:24 A Multi-Matching Approximation Algorithm for Symmetric Traveling Salesman Problem
ISTA-02.10 16:42 Hybrid feature selection using micro genetic al-gorithm on microarray gene expression data
ISTA-02.11 17:00 Multiset Filters Of Residuated Lattices And Its Application In Medical Diagnosis
ISTA-02.12 17:18 Application of lattice ordered multi-fuzzy soft set in forecasting process
ISTA-02.13 17:36 Deep Residual Networks for Pre-classification based Indian Language Identification
ISTA-02.14 17:54 Optimal drug scheduling for cancer chemotherapy using two degree of freedom fractional order PID scheme
ISTA-02.15 18:12 Distributed e-health wide-world accounting ledger via blockchain
ISTA-02.16 18:30 Adaptive neuro-fuzzy behavioral learning strategy for effective decision making in the fuzzy-based cloud service negotiation framework

SIRS-02: SIRS-02: Intelligent Recognition Techniques and Applicationsgo to top

Room - 502
Chairs: Santosh Kumar Majhi, Aswin Ts
SIRS-02.1 14:00 A v-Hog Tensor based Discriminant Analysis for small size Face Recognition
SIRS-02.2 14:18 Real-time poultry health identification using IoT test setup, optimization and results
SIRS-02.3 14:36 Classification of the plants using score level fusion of GIST and LBP features
SIRS-02.4 14:54 STCKF Algorithm based SOC Estimation of Li-Ion Battery by Dynamic Parameter Modeling
SIRS-02.5 15:12 Obstacle Detection in Drones using Computer Vision Algorithm
SIRS-02.6 15:30 Addressing Relay Attacks without Distance-bounding in RFID tag Inclusion/Exclusion Scenarios
SIRS-02.7 15:48 Machine Learning and Data Mining Methods in Testing and Diagnostics of Analog and Mixed-Signal Integrated Circuits: Case Study
SIRS-02.8 16:06 Probability-Based Approach for Epileptic Seizure Detection Using Hidden Markov Model
SIRS-02.9 16:24 Quality and Complexity measurement of 2D-DCT archietecture using loeffler algorithm along with CSD and CSE
SIRS-02.10 16:42 HSV Based Histogram Thresholding Technique for MRI Brain Tissue Segmentation
SIRS-02.11 17:00 Significance of Epoch Identification Accuracy in Prosody Modification for Effective Emotion Conversion
SIRS-02.12 17:18 IoT-Enabled Distributed Detection of a Nuclear Radioactive Source via Generalized Score Tests
SIRS-02.13 17:36 Investigation of SAR exposure assessment in Vital Human tissues at GSM Frequency

SSCC-02: SSCC-02: Workshop on Detecting Malicious Domain names (DMD 2018)go to top

Speaker: Rajshekhar Biradar, SW Applications Engineer, Extreme Networks
Room - 503
Chair: Vinayakumar R

Title of talk: Role of security in the cyber-physical system

Talk description: IoT Security is becoming more challenging because of the diverse set of devices with limited resources, long lifecycles, and proprietary protocols. Also, IoT products are often sold with old and unpatched embedded operating systems and software. Hence, focusing security only at the edge (IoT) is not feasible. There is a need to shift the focus of IoT security from IoT devices to centralized/distributed deep learning models for the overall security of the network. Contents of Session would include understanding general terms and background of deep learning, quick introduction to Sony's NNABLA framework and discuss various application's of deep learning in cyber-security in general with special focus on IoT security.

About the Speaker: Rajshekhar Biradar is a Software Application Engineer working in the area of deep learning and cybersecurity with Extreme Networks. He is currently working on building Deep Learning based IoT security solution. His research interests include Networking, Machine Learning, Computer Vision and Natural Language Processing

SSCC-02.1 14:00 Domain name detection and classification using deep neural networks
SSCC-02.2 14:18 Transfer Learning Approach for Identification of Malicious Domain Names
SSCC-02.3 14:36 Detecting DGA using deep neural networks(DNNs)
SSCC-02.4 14:54 Algorithmically Generated Domain Detection and Malware Family Classification
SSCC-02.5 15:12 Bidirectional LSTM models for DGA classification
SSCC-02.6 15:30 Behavioral Biometrics and Machine Learning to secure Website Logins

SSCC-03: SSCC-03: System and Application Security/Cryptosystems, Algorithmsgo to top

Room - 504
Chairs: Musheer Ahmad, Al-Sakib Khan Pathan
SSCC-03.1 14:00 FinSec 3.0: Theory and Practices in Financial Enterprise
SSCC-03.2 14:18 A TCB Minimizing Model of Computation
SSCC-03.3 14:36 SPIC - SRAM PUF Intergrated Chip based Software Licensing Model
SSCC-03.4 14:54 Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts
SSCC-03.5 15:12 Group Key Management Schemes under Strong Active Adversary Model: A Security Analysis
SSCC-03.6 15:30 Detection of Suspicious Transactions with Database Forensics and Theory of Evidence
SSCC-03.7 15:48 Key Retrieval From AES Architecture Through Hardware Trojan Horse
SSCC-03.8 16:06 KarmaNet: SDN solution to DNS-based Denial-of-Service
SSCC-03.9 16:24 Overinfection In Ransomware
SSCC-03.10 16:42 DeepMal4J: Java Malware Detection Employing Deep Learning
SSCC-03.11 17:00 MedCop: Verifiable Computation for Mobile Healthcare System
SSCC-03.12 17:18 Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning
SSCC-03.13 17:36 Extensive Simulation Analysis of TCP Variants for Wireless Communication

Thursday, September 20 16:30 - 17:30

Tea Breakgo to top

Room: Ground Floor and 3rd Floor

Thursday, September 20 18:00 - 20:30

Cultural Events followed by Banquet Dinnergo to top

Room: Ground Floor - Open Space

Friday, September 21

Friday, September 21 8:30 - 13:00

Registrationgo to top

Room: Ground Floor - Entrance

Friday, September 21 9:10 - 11:00

Tutorial: Embedded platforms for AI and Blockchaingo to top

Speaker: Mr. L. K. Prasad, Founder, CEO and Managing Director, Acceleron Labs, India
Room - 301

Embedded platforms for AI and Blockchain

This tutorial provides an overview of the most relevant approaches to next Generation computing. AI, ML, IOT, and Cloud Infrastructure create an enormous amount of data and the amount of data generated daily by an individual can go up to 1TB and similarly by an industry can go up to 500TB by 2022. In order to process this huge amount of data, it needs very high computing and storage infrastructure and low latency network. Cloud infrastructure is being built across the world to process this data. Generation, transportation, and processing of these data at Cloud securely when the amount of data explode exponentially is a major challenge. This challenge involves many factors such as security in handling these data, network bandwidth required to move this data across the cloud, latency in which transferring the data across the computing nodes and huge computing power required in a data centre. Isolated high power data centers are not a viable option to address above challenges. Edge computing, Automation, Artificial Intelligence, and block-chain are some of the solutions which address the above challenges. Using these solutions simultaneously is the key to solving these challenges which industry is going to face in near future.

Outline of the presentation (Duration 1 hr 50 Min): • Motivation and Introduction (5 Min) • 4th Industrial revolution -AI (5 Min) • Type of AI (5 Min) • Need for AI and Blockchain (5 Min) • Need for Automation (5 Min) • Evolution of edge computing (5 Min) • API computing and economy (5 Min) • Heterogeneous Computing (5 min) • Low latency Computing (5 Min) • Blockchain basics (10 Minutes) • Hardware accelerated and Managed Blockchain (10 Minutes) • Heterogeneous Computing for AI and ML (5 Min) • Acceleron MDC accelerate AI and Blockchain (30 Minutes). • Discussion (10 Min)

Friday, September 21 10:45 - 11:10

Tea Breakgo to top

Friday, September 21 11:10 - 12:00

Keynote 6: From Gutenberg to Smartphones: Inferring Keypress from Side ChannelsDetailsgo to top

Speaker: Dr. Mauro Conti, University of Padua, Italy
Room: Seminar Hall -1

Abstract: Typing is still one of the main methods of interaction with computing devices: we do it regularly on our laptops, smartphones and other devices, like ATM machines. Oftentimes, we want to keep the typed text confidential (emails, password, pin codes...). To protect our text, we use all kinds of access control and encryption mechanisms, but we might forget to leave some other doors open to the adversary. In this talk, we will review recent results on typing inference from side channels exploitable by both local and remote adversaries (e.g., through a VoIP conversation).

SHORT BIO: Mauro Conti is Full Professor at the University of Padua, Italy, and Affiliate Professor at the University of Washington, Seattle, USA. He obtained his Ph.D. from Sapienza University of Rome, Italy, in 2009. After his Ph.D., he was a Post-Doc Researcher at Vrije Universiteit Amsterdam, The Netherlands. In 2011 he joined as Assistant Professor the University of Padua, where he became Associate Professor in 2015, and Full Professor in 2018. He has been Visiting Researcher at GMU (2008, 2016), UCLA (2010), UCI (2012, 2013, 2014, 2017), TU Darmstadt (2013), UF (2015), and FIU (2015, 2016). He has been awarded with a Marie Curie Fellowship (2012) by the European Commission, and with a Fellowship by the German DAAD (2013). His research is also funded by companies, including Cisco and Intel. His main research interest is in the area of security and privacy. In this area, he published more than 200 papers in topmost international peer-reviewed journals and conference. He is Area Editor-in-Chief for IEEE Communications Surveys & Tutorials, and Associate Editor for several journals, including IEEE Communications Surveys & Tutorials, IEEE Transactions on Information Forensics and Security, and IEEE Transactions on Network and Service Management. He was Program Chair for TRUST 2015, ICISS 2016, WiSec 2017, and General Chair for SecureComm 2012 and ACM SACMAT 2013. He is Senior Member of the IEEE.

Friday, September 21 12:00 - 12:50

Keynote 7: Physical Layer Security for MIMO-NOMA Based Cognitive Radio NetworksDetailsgo to top

Speaker: Dr. Sudhan Majhi, Associate Professor in Electrical Engineering, Indian Institute of Technology, Patna, India
Room: Seminar Hall - 2

Abstract: The talk will be on designing physical-layer security for both primary user (PU) and secondary user (SU) in the underlay multiple-input multiple-output cognitive-radio network (MIMO-CRN) by using a bi-directional zero-forcing beamformer. The proposed method enables the PU to communicate along with the SU through a relay node without sacrificing their individual secrecy capacity, i.e., without causing interference to each other even in the presence of eavesdropper(s). In the first phase, a transmit beamforming at the PU/SU transmitters and a receive beamforming at the relay have been adopted to separate PU and SU data. In the second phase, a bi-directional beamformer has been applied to eradicate the necessity of involving artificial noise for preventing the active eavesdropper(s). To maximize the total secrecy capacity, a generalized non-linear optimization problem has been formulated and converted to a simplified constrained optimization problem by utilizing the beamformer and the subspace restriction. Then this problem is solved by the Lagrangian method. Both theoretical and numerical analyses of the total and individual ergodic secrecy rates are provided to demonstrate the effectiveness of our proposed method. The secrecy outage probability is also derived to evaluate the performance variations of our proposed scheme when the channel-estimation error occurs. The physical layer security issue has been extended for non-orthogonal multiple access (NOMA)-CRN where multi-cluster and multi-cell have been considered. A cascaded beamforming technique with alignment vector has been proposed to remove the restriction on number antennae at the transmitter.

Biography: Dr. SUDHAN MAJHI is currently an Associate Professor in the Department of Electrical Engineering and Mathematics, Indian Institute of Technology, Patna, India. Currently, he is Fellow of Sir Visvesvaraya Young Faculty Research awarded by Meity. He is also An Editor of IEEE Transactions on Vehicular Technology. He received M.Tech degree in Computer Science and Data Processing from Indian Institute of Technology, Kharagpur, India in 2004 and the Ph.D. degree from Nanyang Technological University, Singapore in 2008. He has postdoctoral experience with University of Michigan- Dearborn, MI, USA, Institute of Electronics and Telecommunications, Rennes, France and Nanyang Technological University, Singapore. He has received best academic award in NI ASEAN Graphical System Design Achievement Awards 2012. He has received young scientist start-up grand from DST. Currently he is Associate editor of Circuits, Systems and Signal Processing - Springer. His research interest includes signal processing for wireless communication which includes blind synchronization and parameter estimation, cooperative communications, physical layer security for cognitive radio, sequence design, OFDM, MIMO, SC-FDMA, and MIMO-OFDM. For more details please visit https://www.iitp.ac.in/spwicom/ .

Friday, September 21 12:50 - 14:00

Lunch Breakgo to top

Room: Ground Floor - Open Space

Friday, September 21 14:00 - 18:30

ISTA-03: ISTA-03: Applications using Intelligent Techniquesgo to top

Room - 301
Chairs: Pooja Agarwal, Amit Prakash Singh
ISTA-03.1 14:00 Morphisms on Lattice Ordered Interval-Valued Hesitant Fuzzy Soft Sets
ISTA-03.2 14:18 Performance analysis of DWT and FMH in Classifying Hand Motions using sEMG Signals
ISTA-03.3 14:36 Refined Stop-Words and Morphological Variants Solutions Applied to Hindi-English Cross-Lingual Information Retrieval
ISTA-03.4 14:54 A Hybrid Approach to Generate Visually Seamless Aerial Mosaicks from Unmanned Aerial Vehicles
ISTA-03.5 15:12 A machine learning approach for fast mode decision in HEVC intra prediction based on statistical features
ISTA-03.6 15:30 Real Time Detection System of Driver Drowsiness based on Representation learning using Deep Neural Networks
ISTA-03.7 15:48 Affective State Recognition using Audio Cues
ISTA-03.8 16:06 A Multi Verse Optimization based MPPT Controller for Drift Avoidance in Solar System
ISTA-03.9 16:24 Behavior of 3-axis conformal proximity sensor arrays for restraint-free, in-vehicle, deployable safety assistance
ISTA-03.10 16:42 A decision making approach based on L-IVHFSS setting
ISTA-03.11 17:00 Different Algebras on Lattice Ordered Soft Groups
ISTA-03.12 17:18 Intelligent Refrigerator

ISTA-04: ISTA-04: Intelligent Techniques for Ad-hoc and Wireless Sensor Networks/Intelligent Distributed Computinggo to top

Room - 302
Chair: Juhi R Srivastava
ISTA-04.1 14:00 Advanced Credit Score Calculation using Social Media and Machine Learning
ISTA-04.2 14:18 Impact of Trimet Graph Optimization Topology on Scalable Networks
ISTA-04.3 14:36 Roll Forward Validation based Decision Tree Classification for Detecting Data Integrity Attacks in Industrial Internet of Things
ISTA-04.4 14:54 Information Criteria Based Optimal Structure Identification of RF Power Amplifier Models
ISTA-04.5 15:12 A Lightweight Inter-Zonal Authentication Protocol for Moving Objects in Low Powered RF Systems
ISTA-04.6 15:30 A Secure and Optimized Location Update for Next Generation Proxy Mobility based Internet Protocol Networks
ISTA-04.7 15:48 An Intelligent Energy Efficient Clustering Technique for Multiple Base Stations Positioning in a Wireless Sensor Network
ISTA-04.8 16:06 Fuzzy Clustering using Salp Swarm Algorithm for Automobile Insurance Fraud Detection
ISTA-04.9 16:24 Swarm intelligence based optimization of energy consumption in cognitive radio network
ISTA-04.10 16:42 Grefenstette Bias based Genetic Algorithm for Multi-Site Offloading using Docker Container in Edge computing
ISTA-04.11 17:00 A Review on VANET Routing Protocols and Proposing a Parallelized Genetic Algorithm based heuristic modification to mobicast routing for real time message passing
ISTA-04.12 17:18 Light Weight Text Independent Speaker Recognition Method for the Internet of Things

SIRS-03: SIRS-03: Intelligent Recognition Techniques/Signal Processing(Short Papers)Detailsgo to top

Speaker: Dr. Selwyn Piramuthu, Professor of Information Systems, University of Florida, Gainesville, Florida, USA
Room - 303
Chairs: Punam Bedi, Ram Ratan

Title of Talk: RFID-based Relay Attacks [14:00-14:50]

Biography: Selwyn Piramuthu is Professor of Information Systems at the University of Florida, where he has taught since Fall 1991. Trained in machine learning, his research interests also include cryptography with applications related to IoT/RFID, privacy/security, supply chain management, among others. Co-authored with Wei Zhou, his book titled, "RFID and Sensor Network Automation in the Food Industry" was published by Wiley in 2016. He received his B.Tech., M.S., and Ph.D. respectively from IIT-Madras, University of Arizona, and the University of Illinois at Urbana-Champaign.

SIRS-03.1 14:00 Survey on Virtual Assistant: Google Assistant, Siri, Cortana, Alexa
SIRS-03.2 14:15 Contemporary Approaches in Image Segmentation - A Quantitative Approach
SIRS-03.3 14:30 IoT based Food Inventory Tracking System
SIRS-03.4 14:45 Design of a Compact high gain wide band Ψ shaped Patch antenna on slotted circular ground plane
SIRS-03.5 15:00 On acoustic monitoring of farm environments
SIRS-03.6 15:15 Investigation of Fractality and Stationarity Behaviour on Earthquake
SIRS-03.7 15:30 Technologies and Methods for 3D Reconstruction in Archaeology
SIRS-03.8 15:45 Fuzzy Based Energy Efficient Protocol for Monitoring of Nuclear Radiation using Wireless Sensor Network
SIRS-03.9 16:00 Geometrically uniform differential signalling for MISO/MIMO channels using optimized PM codebook
SIRS-03.10 16:15 A Comprehensive Review on Automatic Diagnosis of Diabetic Maculopathy in Retinal Fundus Image
SIRS-03.11 16:30 Multi-Image Enhancement Technique using Max-Plus Algebra-Based Morphological Wavelet Transform
SIRS-03.12 16:45 Dimensionality Reduction by Dynamic Mode Decomposition for Hyperspectral Image Classification Using Deep Learning and Kernel Methods

Friday, September 21 14:00 - 18:00

SSCC-04: SSCC-04: Security and Privacy in Networked SystemsDetailsgo to top

Speaker: Dr. Christian Callegari, RaSS (Radar and Surveillance Systems) National Laboratory - CNIT, Dept. of Information Engineering - University of Pisa, Italy
Room - 304
Chairs: Rajiv Pandey, Tarun Yadav

Title of the Talk: IoT and Network Security: Should I care about network security? (14:00-14:50)

Talk description: Network security is becoming more and more challenging as new communication paradigms and architectures (e.g., IoT, SDN) are deployed all over the world. Indeed, the need for self-configuring devices, which do not necessarily require an operator for their management and are usually designed without taking security and privacy into account, makes security more challenging than ever before. In a such a context, the talk will first investigate some of the most recent attacks to the IoT world (e.g., the Mirai botnet) and some of the most critical threats (e.g., Advanced Persistent Threats) highlighting how "standard" approaches to security are not efficient any-longer. Then it will focus on the analysis of some of the most recent and promising approach to attack detection and reaction. The main objective of the talk is to show that even the "standard" Internet users must take care of the security of their devices, as well as of their own privacy.

SSCC-04.1 14:00 Cost Based Model for Secure Health Care Data Retrieval
SSCC-04.2 14:15 Inter-Path Diversity Metrics for Increasing Network Robustness Against Zero-Day Attacks
SSCC-04.3 14:30 Privacy-preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update
SSCC-04.4 14:45 HGKA:Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks
SSCC-04.5 15:00 Network Anomaly Detection using Artificial Neural Networks Optimised with PSO-DE Hybrid
SSCC-04.6 15:15 A Blockchain based Vehicle Database System
SSCC-04.7 15:30 Proof of Stack Consensus for Blockchain Networks
SSCC-04.8 15:45 Effective Hardware Trojan Detection using Front-End Compressive Sensing
SSCC-04.9 16:00 Probabilistic real-time intrusion detection system for Docker container
SSCC-04.10 16:15 Wearable Device Forensic: Probable Case studies and Proposed Methodology
SSCC-04.11 16:30 Enhanced Session Initiation Protocols for Emergency Healthcare Applications
SSCC-04.12 16:45 Accessing Data in Healthcare application
SSCC-04.13 17:00 Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study
SSCC-04.14 17:16 Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments
SSCC-04.15 17:31 A Graph-based Decision Support Model for Vulnerability Analysis in IoT networks

Friday, September 21 16:30 - 17:30

Tea Breakgo to top

Room: Ground Floor and 3rd Floor

Saturday, September 22

Saturday, September 22 9:00 - 11:00

Registrationgo to top

Room: Ground Floor - Entrance

Saturday, September 22 9:30 - 13:30

ISTA-05: ISTA-05: Applications using Intelligent Techniques(Short Papers)go to top

Room - 201
Chairs: Annapurna D, Arunesh Kumar Singh
ISTA-05.1 9:30 A Study on Plant Recognition Using Conventional Image Processing and Deep Learning Approaches
ISTA-05.2 9:42 Impact analysis of LFM Jammer Signals on Stepped Frequency PAM4 RADAR Waveforms
ISTA-05.3 9:54 Online Knowledge-Based System for CAD modeling and Manufacturing: An Approach
ISTA-05.4 10:06 Hepatoprotective activity of the Bi-Herbal Extract in Carbon tetra chloride (CCl4) induced hepatoxicity - A study of Histopathological Image Analysis
ISTA-05.5 10:18 Battery Assisted, PSO - BFOA based Solar powered single stage power conditioning unit based Five Phase Induction Motor Drive for Green Boat Applications
ISTA-05.6 10:30 Intrinsic Evaluation for English-Tamil Bilingual Word Embeddings
ISTA-05.7 10:42 A Novel Approach of Augmenting Training Data for Legal Text Segmentation by Leveraging Domain Knowledge
ISTA-05.8 10:54 IoT enabled Air Monitoring System
ISTA-05.9 11:06 Evaluation of water body extraction from satellite images using open source tools
ISTA-05.10 11:18 Phase-Modulated, Stepped Frequency Waveform Design for Low Probability of Detection RADAR Signals
ISTA-05.11 11:30 Effect of waveform coding on stepped frequency modulated, pulsed radar transmit signals
ISTA-05.12 11:42 Sarcasm Detection on Twitter: User Behavior Approach
ISTA-05.13 11:54 Personalized Recommender Agent for E-Commerce Products Based on Data Mining Techniques

ISTA/SIRS-ICPM'18: ISTA/SIRS-ICPM'18: Workshop on Advances in Image Processing, Computer Vision, Pattern Recognition and Machine Intelligence (ICPM'18)go to top

Room - 202
Chairs: Bhaskar Belavadi, V Sowmya
ISTA/SIRS-ICPM'18.1 9:30 Bit-plane Specific Measures and its Applications in Analysis of Image Ciphers
ISTA/SIRS-ICPM'18.2 9:45 A Framework for Lane Prediction on Unstructured Roads
ISTA/SIRS-ICPM'18.3 10:00 Classification of colposcopic cervigrams using EMD in R
ISTA/SIRS-ICPM'18.4 10:15 Curvelet Based Thinning Algorithm
ISTA/SIRS-ICPM'18.5 10:30 Dynamic Mode based Feature with Random Mapping for Sentiment Analysis
ISTA/SIRS-ICPM'18.6 10:45 A Modification to the Nguyen-Widrow Weight Initialization Method
ISTA/SIRS-ICPM'18.7 11:00 Variant of Nearest neighborhood fingerprint storage system by reducing redundancies
ISTA/SIRS-ICPM'18.8 11:15 Modelling, Analysis and Control of an Eddy Current Braking System using Intelligent Controllers
ISTA/SIRS-ICPM'18.9 11:30 Pep- Personalized Educational Platform
ISTA/SIRS-ICPM'18.10 11:45 Efficient Pre-processing and Feature Selection for Clustering of Cancer Tweets
ISTA/SIRS-ICPM'18.11 12:00 Maneuvering Black hole attack using different traffic generators in MANETs
ISTA/SIRS-ICPM'18.12 12:15 User Graph Topic Model
ISTA/SIRS-ICPM'18.13 12:30 Automated Analytical Model for Content Based Selection of Web Services

SSCC-05: SSCC-05: Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2018)go to top

Room - 203
Chairs: Santosh Kumar Majhi, Abhishek SN
SSCC-05.1 9:30 A Comparative Analysis of Different Soft Computing Techniques For Intrusion Detection System
SSCC-05.2 9:45 A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems
SSCC-05.3 10:00 Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT
SSCC-05.4 10:15 Survey of security threats in IoT and emerging countermeasures
SSCC-05.5 10:30 Holistic Credit Rating System for Online Microlending Platforms with Blockchain Technology
SSCC-05.6 10:45 Analysis of Execution Time for Encryption during Data Integrity Check in Cloud Environment
SSCC-05.7 11:00 Inverted Index based Ranked Keyword Search in Multi-user Searchable Encryption
SSCC-05.8 11:15 Power and Area Efficient FSM with Comparison-Free Sorting Algorithm for Write-Evaluate Phase and Read-Sort Phase
SSCC-05.9 11:30 A New Chaotic Map Based Secure and Efficient Pseudo-random Bit Sequence generation
SSCC-05.10 11:45 Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling
SSCC-05.11 12:00 Analysis of circuits for security using Logic Encryption

Saturday, September 22 10:45 - 11:10

Tea Breakgo to top

Room: Ground Floor and 3rd Floor

Saturday, September 22 13:00 - 14:00

Lunch Breakgo to top

Room: Ground Floor - Open Space

Saturday, September 22 15:30 - 16:00

Valedictory Functiongo to top

Room: Seminar Hall -1

Saturday, September 22 16:00 - 16:15

Teago to top

Room: Ground Floor