Program for Third International Conference on Applied Soft computing and Communication Networks (ACN'18)

Wednesday, September 19

Wednesday, September 19 8:30 - 13:00

Registration, Breakfast and tea

Room: Ground Floor - Entrance

Wednesday, September 19 9:20 - 10:15

Inaugural Session

Room: Seminar Hall -1

Wednesday, September 19 10:15 - 11:00

Keynote: Intent based networking

Mr. Saravanan Radhakrishnan, Distinguished Engineer at Cisco, Bangalore, India
Room: Seminar Hall -1

Abstract: The intuitive network starts with intent-based infrastructure that is secure - essentially all IP infrastructure, including switches, routers, wireless access points, that provides the connectivity and routes traffic from devices (PCs, tablets, phones, video screens, IoT) within the enterprise and to the internet.IP networking started small 30 years ago, connecting two departments in a lab. Now, enterprises have networks with tens of thousands of boxes. Most of them still have relatively primitive tools to manage this complexity. It's an expensive process and can slow down the business. The wireless network is separate from the wired network, which is separate from the Wide Area Network. And they're all managed and configured separately, and they can all have different interfaces, commands, and configuration models. Even worse, this is all usually done one box at a time. With the intuitive network, we fundamentally changed the approach, removing a lot of the complexity accumulated over the past 30 years. Now we have one unified system that spans the entire enterprise access network, covering all type of devices. It acts as a single platform, driven by intent. This intent-based infrastructure is programmable and integrated so that it can be automated. Also, security is built-in with the ability to find threats and automate responses to keep enterprises protected from advanced threats. This unified system includes our networking software operating system, IOS. Over the past two years, we've completely rebuilt IOS for the digital age. IOS is now API driven, open, programmable, and modular - all capabilities that are required from a modern software stack.

Wednesday, September 19 11:00 - 12:00

Keynote 1: Engineering the Fabric of IoT, People, and Systems

Speaker: Dr. Schahram Dustdar, Head of the Distributed Systems Group, The TU Wien, Austria
Room: Seminar Hall -1

Abstract: In this talk I will explore the integration of people, software services, and things with their data, into a novel resilient ecosystem, which can be modeled, programmed, and deployed on a large scale in an elastic way. This novel paradigm has major consequences on how we view, build, design, and deploy ultra-large scale distributed systems and establishes a novel foundation for an "architecture of value" driven Smart City. In particular, this talk addresses three novel paradigms for designing the service-oriented information systems of the future: Elastic Computing, Social Compute Units, and Osmotic Computing. These three paradigms serve as a foundation for future large-scale distributed systems. Furthermore, we will discuss our responsibilities as computer scientists, technologists, and researchers for creating technologies, which benefit society in a positive way, thereby strengthening the new fabric of interconnected people, software services, and things into a novel resilient ecosystem.

Wednesday, September 19 12:00 - 13:00

Keynote 2: The Power of Memory (Tom Coughlin)

Speaker: Tom Coughlin, 2018 President-Elect, IEEE-USA and President, Coughlin Associates, USA
Room: Seminar Hall -1

Abstract: Advances in computing, communications, networking and electronics have enabled the generation of enormous amounts of data. This is due to higher resolution data, captured more frequently, and the growing use of connected sensor data in IoT applications. This data must be captured, processed and then stored. Some data must be kept for a short time and processed quickly to be useful, e.g. in autonomous vehicles as well as robotics and automation. The results of this processing and data generated having economic value (e.g. commercial video) may be kept for a long time. This talk will examine the latest developments in the digital memory and storage hierarchy and how they will enable developments in AI, cloud computing, VR/AR, Smart Cities, robotics and automation and the preservation of culture, technology and history.

Wednesday, September 19 13:00 - 13:45

Lunch Break

Room: Ground Floor - Open Space

Wednesday, September 19 14:00 - 18:30

ISTA-01: ISTA-01: Intelligent Image Processing /Artificial Vision/Speech Processing

Room - 401
Chairs: Jisha John, Gowri Srinivasa
ISTA-01.1 14:00 Effect of Denoising on Hyperspectral Image Classification using Deep Networks and Kernel Methods
Naveen Varghese Jacob, V Sowmya and K p Soman
ISTA-01.2 14:18 Transfer Learning for Video Anomaly Detection
Suprit Bansod and Abhijeet Vijay Nandedkar
ISTA-01.3 14:36 Precision centric framework for activity recognition using Dempster Shaffer Theory and Information fusion algorithm in smart environment
Veeramuthu Venkatesh, Pethuru Raj Chellaiah, Kannan K and Balakrishnan P
ISTA-01.4 14:54 Spectacle problem removal from facial images based on detail preserving filtering schemes
Mayaluri Zefree Lazarus and Supratim Gupta
ISTA-01.5 15:12 Domain Independent Static Video Summarization using Sparse Autoencoders and K-means Clustering
Jesna Mohan and Madhu S Nair
ISTA-01.6 15:30 Deep Rectified System for High-speed Tracking in Images
Vysakh Mohan, Vinayakumar R and V Sowmya
ISTA-01.7 15:48 Identification and Exploration of Facial Expression in Children with ASD in a Contact less Environment
Abirami S p, Kousalya Govardhanan and Karthik Rajaram
ISTA-01.8 16:06 Computer-Aided Grading of Prostate Cancer from MRI images using Convolutional Neural Networks
Bejoy Abraham and Madhu S Nair
ISTA-01.9 16:24 An improved Local Binary Pattern based Edge Detection Algorithm for Noisy Images
Navdeep Yadav, Sonal Goyal, Asha Rani and Vijander Singh
ISTA-01.10 16:42 Pair wise training for stacked convolutional autoencoders using small scale images
Aiswarya S Kumar and Jyothisha J Nair

SIRS-01: SIRS-01: Intelligent Recognition Techniques and Applications

Room - 402
Chairs: Bhaskar Belavadi, Sudhanshu S. Gonge
SIRS-01.1 14:00 Pre-processed Hyperspectral Image Analysis Using Tensor Decomposition Techniques
Renu R K, V Sowmya and Soman K P
SIRS-01.2 14:18 Intelligent Systems Applied to the Classification of Multiple Faults in Inverter Fed Induction Motors
Wagner Fontes Godoy, Alessandro Goedtel, Ivan Nunes da Silva, Rodrigo Henrique Cunha Palácios and Alexandre L'Erario
SIRS-01.3 14:36 Wemotion: A system to detect emotion using wristbands and smartphones
Bao-Lan Le-Quang, Minh-Son Dao and Mohamed Saleem Haja Nazmudeen
SIRS-01.4 14:54 Recovery of a failed antenna element using Genetic Algorithm and Particle Swarm Optimization for MELISSA
Shweta Vincent, Sharmila Anand John Francis, Om Prakash Kumar and Kumudha Raimond
SIRS-01.5 15:12 Deep Learning Locally Trained Wildlife Sensing in Real Acoustic Wetland Environment
Clement Duhart, Brian Mayton, Gershon Dublon and Joseph A. Paradiso
SIRS-01.6 15:30 Clickbait Detection Using Swarm Intelligence
Deepanshu Pandey, Garimendra Verma and Sushama Nagpal
SIRS-01.7 15:48 A Novel Method for Stroke Prediction from Retinal Images using HoG Approach
Jeena R S, Sukesh Kumar A and Mahadevan K
SIRS-01.8 16:06 Digital Display Control Using Automation
Deven M Gupta, Soumya S Patil and Priyatam Kumar

SSCC-01: SSCC-01: Security and Privacy in Networked Systems

Room - 403
Chairs: Santosh Kumar Majhi, Tarun Yadav
SSCC-01.1 14:00 Workload Distribution for Supporting Anonymous Communications in Automotive Network
Mehran Alidoost Nia and Antonio Ruiz-Martínez
SSCC-01.2 14:18 Diversity and Progress Controlled Gravitational Search Algorithm for balancing load in cloud
Divya Chaudhary, Bijendra Kumar and Shaksham Garg
SSCC-01.3 14:36 Survey on Prevention, Mitigation and Containment of Ransomware Attacks
Sumith Maniath, Prabaharan Poornachandran and Sujadevi VG
SSCC-01.4 14:54 Managing Network Functions in Stateful Application Aware SDN
Prabhakar Krishnan and Krishnashree Achuthan
SSCC-01.5 15:12 Trust-Neighbors-Based to mitigate the cooperative black hole attack in OLSR protocol
Kamel Saddiki, Sofiane Boukli-Hacene, Pascal Lorenz and Marc Gilg
SSCC-01.6 15:30 Policy-based network and security management in federated service infrastructures with permissioned blockchains
Michael Grabatin, Wolfgang F. Hommel and Michael Steinke
SSCC-01.7 15:48 Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
El-Sayed M. El-Alfy and Sadam Al-Azani
SSCC-01.8 16:06 A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings
Guojun Wang
SSCC-01.9 16:24 Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution
Praveen Gauravaram and Chris Drake
SSCC-01.10 16:42 Security Threats Against LTE Networks: A Survey
Khyati P Vachhani
SSCC-01.11 17:00 On Minimality Attack for Privacy-Preserving Data Publishing
K Hemantha, Nidhi Desai and Manik Lal Das

Wednesday, September 19 16:30 - 17:30

Tea Break

Room: Ground Floor and 3rd Floor

Thursday, September 20

Thursday, September 20 8:30 - 13:00

Registration

Room: Ground Floor - Entrance

Thursday, September 20 10:00 - 11:00

Keynote 3: Advanced Signal Processing and Machine Learning Techniques for Neurological Disorder Detection and Prediction Approach

Speaker: Dr. Maheshkumar H Kolekar, Indian Institute of Technology(IIT), Patna, India
Room: Seminar Hall - 2

Talk description: EEG is used as a noninvasive tool for analyzing brain activity. The talk will summarize recent techniques used for detecting neurological disorders such as epilepsy and dementia. Epilepsy affects about 70 million people worldwide. Epilepsy is characterized by repeated seizures. EEG is used as a tool for auto diagnosis, localization, and prediction of seizure. Various features, features variation between pre-seizure, seizure and inter-seizure EEG signals and classifier used for the auto-detection will be discussed in the talk. Dementia is one of the largest neurological disorders affecting developing and poor countries. Pre-diagnosis of dementia will help to take steps for reducing the effect of dementia. Present need of the hour is to tackle dementia in India, estimate disease burden in the community and steps to increase awareness among people regarding dementia. The talk will focus on EEG signal processing techniques for pre-dementia diagnosis.

Thursday, September 20 11:00 - 11:15

Tea Break

Room: Ground Floor and 3rd Floor

Thursday, September 20 11:15 - 12:10

Keynote 4: Medical Image Diagnostics: A case study of spine pathology

Speaker: Dr. Vipin Chaudhary, SUNY Empire Innovation Professor, State University of New York (SUNY) at Buffalo, USA
Room: Seminar Hall -1

Talk description: With growing digital medical data and meteoric success of machine learning it is now feasible to aid the medical practitioner in better diagnosing pathology and in some cases, outperform them. Lower back pain (LBP) is widely prevalent in people all over the world and negatively affects the quality of life due to chronic pain and change in posture. According to the American Academy of Orthopedic Surgeons (AAOS) four out of five adults experience low back pain at some point during their lives. I will discuss results from our work in automating the diagnosis of spine pathology. Clinical datasets are generally limited to pathological findings such as arthritis, fracture, infection, dislocation or tumor, but in the absence of gross pathology there is very poor correlation to nonspecific spine pain clinical symptoms. Since the majority of spine pain patients do not have any correlative pathological findings, it is important to look at the mechanics of the spine from a clinical standpoint. I will end this talk with some results in automating the process of suggesting changes to biomechanics of the spine thus taking the automation from diagnosis to cure.

Thursday, September 20 12:10 - 13:00

Keynote 5: Blockchain and its Applications on Edge Computing, Industry 4.0, IOT and Smart Cities

Speaker: Dr. Juan Manuel Corchado, European IoT Digital Innovation Hub, BISITE Research Group, University of Salamanca, Spain
Room: Seminar Hall -1

Abstract: Blockchain is the technology behind bitcoin, ether and most of the other cryptocurrencies. Blockchain is essentially a form of record keeping and can be used in almost any product that uses some form of record keeping or database management. Blockchain is ideal for protecting any data that needs to be unalterable and indestructible. Traditionally, data are kept on a server that is owned and operated by a third-party company. This approach has some disadvantages. In this way, if a third party has access to your data, they could be destroyed, they could be altered, and it could leak. Through Blockchain, data are encrypted and then propagated over a distributed network of computers. In this way, data are nobody's properties, data cannot be destroyed and altered. Data block are sets of permanently recorded data e.g. financial transactions. The information is first hash which is a way to represent the data in a compact format where data can be easily compared for any change. Any small change in the data completely changes the hash version which makes the comparison very easy. The hash data are then encrypted. One private key allows the producer of the data to encrypt the data and serves as a digital signature. Also, one public key allows everyone else with the key to decrypt it. Finally, the data blocks are connected to each other (chained). Bitcoin is simply an application of Blockchain but there are many other applications where this technology has a lot to say. The application of this technology is endless in all fields but with respect to industry there are fields in which use is more and more common e.g. Supply Chain Management, Health Care and medical record sharing, Media Distribution, E-commerce with no middleman, Sharing economy with no central authority, Authenticated News Sharing/Data Sharing, Data Sharing Between companies.

Edge Computing, Industry 4.0, IOT and Smart Cities are areas in which Blockchain has high impact. The IoT refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. The risk of connecting a machine to Internet is obvious and Blockchain may help to eliminate or at least reduce some of these risks. The industry is updating its processes to be more efficient. Industry 4.0 is a transformation that makes it possible to gather and analyze data across machines, enabling faster, more flexible, and more efficient processes to produce higher-quality goods at reduced costs, that's the reason why a technology such us Blockchain if also of great interest to guaranty security and data reliability. The main aim of this tutorial is to introduce Blockchain technology and represents its practical application in security of Industry 4.0, Smart cities, Smart homes, and Internet of Thing.

Thursday, September 20 12:50 - 14:00

Lunch Break

Room: Ground Floor - Open Space

Thursday, September 20 14:00 - 17:30

ISTA-02: ISTA-02: Intelligent Tools and Techniques

Room - 501
Chairs: Sudhanshu S. Gonge, Balakrishnan P
ISTA-02.1 14:00 Stroke Diagnosis from Retinal Fundus Images using Multi texture Analysis
Jeena R S, Sukesh Kumar A and Mahadevan K
ISTA-02.2 14:18 A Novel Bagged Naïve Bayes-Decision Tree Approach for Multi-class Classification Problems
Namrata Singh and Pradeep Singh
ISTA-02.3 14:36 State of art fractional order controller for power system stabilizer
Sunil Nangrani
ISTA-02.4 14:54 Trajectory tracking of Maryland manipulator using linguistic lyapunov fuzzy controller
Himanshu Chhabra, Vijay Mohan, Asha Rani and Vijander Singh
ISTA-02.5 15:12 An Innovative application for code generation of mathematical equations and problem solving
Shriram K Vasudevan, Abhishek SN, Vignesh Kumar, Prashant Nair and Aswin Ts
ISTA-02.6 15:30 Design and Implementation of In-situ Human-Elephant Conflict Management System
Jagannathan S, Sathiesh Kumar and Meganathan D
ISTA-02.7 15:48 Complementing the DTW based speaker verification systems with knowledge of specific regions of interest
Mohammad Azharuddin Laskar and Rabul Laskar
ISTA-02.8 16:06 A hybrid framework for optimal feature subset selection
Alok Shukla, Manu Vardhan and Pradeep Singh
ISTA-02.9 16:24 A Multi-Matching Approximation Algorithm for Symmetric Traveling Salesman Problem
Husain Naser, Wasan Awad and El-Sayed M. El-Alfy
ISTA-02.10 16:42 Hybrid feature selection using micro genetic al-gorithm on microarray gene expression data
Gurusamy Jeyakumar, C Pragadeesh, Jeyaraj Rohana, K Siranjeevi and R Abishek
ISTA-02.11 17:00 Multiset Filters Of Residuated Lattices And Its Application In Medical Diagnosis
VS Anusuya Ilamathi, Vimala Jayakumar and Bijan Davvaz
ISTA-02.12 17:18 Application of lattice ordered multi-fuzzy soft set in forecasting process
Vimala Jayakumar and Sabeena Begam S
ISTA-02.13 17:36 Deep Residual Networks for Pre-classification based Indian Language Identification
Chuya China Bhanja, Dipjyoti Bisharad and Rabul Laskar
ISTA-02.14 17:54 Optimal drug scheduling for cancer chemotherapy using two degree of freedom fractional order PID scheme
Bharti Panjwani, Vijay Mohan, Asha Rani and Vijander Singh
ISTA-02.15 18:12 Distributed e-health wide-world accounting ledger via blockchain
Roberto Casado-Vara and Juan M. Corchado
ISTA-02.16 18:30 Adaptive neuro-fuzzy behavioral learning strategy for effective decision making in the fuzzy-based cloud service negotiation framework
Rajkumar Rajavel, Kanagachidambaresan Iyer, R. Maheswar, Jayarajan P and Udaiyakumar R

SIRS-02: SIRS-02: Intelligent Recognition Techniques and Applications

Room - 502
Chairs: Santosh Kumar Majhi, Aswin Ts
SIRS-02.1 14:00 A v-Hog Tensor based Discriminant Analysis for small size Face Recognition
Bhaskar Belavadi
SIRS-02.2 14:18 Real-time poultry health identification using IoT test setup, optimization and results
Arun Gnana Raj Alex and Gnana Jayanthi Joseph
SIRS-02.3 14:36 Classification of the plants using score level fusion of GIST and LBP features
Pradip Salve
SIRS-02.4 14:54 STCKF Algorithm based SOC Estimation of Li-Ion Battery by Dynamic Parameter Modeling
Ramprasath R and Shanmughasundaram R
SIRS-02.5 15:12 Obstacle Detection in Drones using Computer Vision Algorithm
Aswini N and Uma Satyanarayana Visweswaraiya
SIRS-02.6 15:30 Addressing Relay Attacks without Distance-bounding in RFID tag Inclusion/Exclusion Scenarios
Selwyn Piramuthu
SIRS-02.7 15:48 Machine Learning and Data Mining Methods in Testing and Diagnostics of Analog and Mixed-Signal Integrated Circuits: Case Study
Sergey G. Mosin
SIRS-02.8 16:06 Probability-Based Approach for Epileptic Seizure Detection Using Hidden Markov Model
Deba Dash and Mahesh Kolekar
SIRS-02.9 16:24 Quality and Complexity measurement of 2D-DCT archietecture using loeffler algorithm along with CSD and CSE
JN Swaminathan, Vivek V Kajagar, Shaik Mohammad Ashraf Ansari Ansari and S. Rajasekaran
SIRS-02.10 16:42 HSV Based Histogram Thresholding Technique for MRI Brain Tissue Segmentation
P. Kalavathi and Priya T
SIRS-02.11 17:00 Significance of Epoch Identification Accuracy in Prosody Modification for Effective Emotion Conversion
S Lakshmi Priya and Govind D
SIRS-02.12 17:18 IoT-Enabled Distributed Detection of a Nuclear Radioactive Source via Generalized Score Tests
Pierluigi Salvo Rossi, Giampaolo Bovenzi, Domenico Ciuonzo, Valerio Persico and Antonio Pescapé
SIRS-02.13 17:36 Investigation of SAR exposure assessment in Vital Human tissues at GSM Frequency
Jemima Priyadarshini and D. Jude Hemanth

SSCC-02: SSCC-02: Workshop on Detecting Malicious Domain names (DMD 2018)

Speaker: Rajshekhar Biradar, SW Applications Engineer, Extreme Networks
Room - 503
Chair: Vinayakumar R

Title of talk: Role of security in the cyber-physical system

Talk description: IoT Security is becoming more challenging because of the diverse set of devices with limited resources, long lifecycles, and proprietary protocols. Also, IoT products are often sold with old and unpatched embedded operating systems and software. Hence, focusing security only at the edge (IoT) is not feasible. There is a need to shift the focus of IoT security from IoT devices to centralized/distributed deep learning models for the overall security of the network. Contents of Session would include understanding general terms and background of deep learning, quick introduction to Sony's NNABLA framework and discuss various application's of deep learning in cyber-security in general with special focus on IoT security.

About the Speaker: Rajshekhar Biradar is a Software Application Engineer working in the area of deep learning and cybersecurity with Extreme Networks. He is currently working on building Deep Learning based IoT security solution. His research interests include Networking, Machine Learning, Computer Vision and Natural Language Processing

SSCC-02.1 14:00 Domain name detection and classification using deep neural networks
B Bharathi and Bhuvana J
SSCC-02.2 14:18 Transfer Learning Approach for Identification of Malicious Domain Names
R Rajalakshmi, S Ramraj and Ramesh Kannan R
SSCC-02.3 14:36 Detecting DGA using deep neural networks(DNNs)
Jyothsna P V, Greeshma Prabha, Shahina K. K and Anu Vazhayil
SSCC-02.4 14:54 Algorithmically Generated Domain Detection and Malware Family Classification
Chhaya Choudhary, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson Nascimento and Martine De Cock
SSCC-02.5 15:12 Bidirectional LSTM models for DGA classification
Giuseppe Attardi and Daniele Sartiano
SSCC-02.6 15:30 Behavioral Biometrics and Machine Learning to secure Website Logins
Falaah Arif Khan, Sajin Kunhambu and K Chakravarthy G

SSCC-03: SSCC-03: System and Application Security/Cryptosystems, Algorithms

Room - 504
Chairs: Musheer Ahmad, Al-Sakib Khan Pathan
SSCC-03.1 14:00 FinSec 3.0: Theory and Practices in Financial Enterprise
Yang Li
SSCC-03.2 14:18 A TCB Minimizing Model of Computation
Mahalingam Ramkumar, Naresh Adhikari and Naila Bushra
SSCC-03.3 14:36 SPIC - SRAM PUF Intergrated Chip based Software Licensing Model
Vyshak Suresh and Manimegalai Rajkumar
SSCC-03.4 14:54 Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts
Hiroaki Higaki and Masayoshi Hayashi
SSCC-03.5 15:12 Group Key Management Schemes under Strong Active Adversary Model: A Security Analysis
Sarvesh Sawant, Gaurav Pareek and Purushothama B R
SSCC-03.6 15:30 Detection of Suspicious Transactions with Database Forensics and Theory of Evidence
Harmeet Khanuja and Dattatraya S Adane
SSCC-03.7 15:48 Key Retrieval From AES Architecture Through Hardware Trojan Horse
Manivannan Sivappriya, N. Nalla Anandakumar and Nirmala Devi
SSCC-03.8 16:06 KarmaNet: SDN solution to DNS-based Denial-of-Service
Govind Mittal and Vishal Gupta
SSCC-03.9 16:24 Overinfection In Ransomware
Yassine Lemmou and El mamoun Souidi
SSCC-03.10 16:42 DeepMal4J: Java Malware Detection Employing Deep Learning
Pallavi Jha, Prem Sankar, Sujadevi VG and Prabaharan Poornachandran
SSCC-03.11 17:00 MedCop: Verifiable Computation for Mobile Healthcare System
Hardik Gajera, Shruti Naik and Manik Lal Das
SSCC-03.12 17:18 Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning
Tarun Yadav and Koustav Sadhukhan
SSCC-03.13 17:36 Extensive Simulation Analysis of TCP Variants for Wireless Communication
Amol P Pande

Thursday, September 20 16:30 - 17:30

Tea Break

Room: Ground Floor and 3rd Floor

Thursday, September 20 18:00 - 20:30

Cultural Events followed by Banquet Dinner

Room: Ground Floor - Open Space

Friday, September 21

Friday, September 21 8:30 - 13:00

Registration

Room: Ground Floor - Entrance

Friday, September 21 9:10 - 11:00

Tutorial: Embedded platforms for AI and Blockchain

Speaker: Mr. L. K. Prasad, Founder, CEO and Managing Director, Acceleron Labs, India
Room - 301

Embedded platforms for AI and Blockchain

This tutorial provides an overview of the most relevant approaches to next Generation computing. AI, ML, IOT, and Cloud Infrastructure create an enormous amount of data and the amount of data generated daily by an individual can go up to 1TB and similarly by an industry can go up to 500TB by 2022. In order to process this huge amount of data, it needs very high computing and storage infrastructure and low latency network. Cloud infrastructure is being built across the world to process this data. Generation, transportation, and processing of these data at Cloud securely when the amount of data explode exponentially is a major challenge. This challenge involves many factors such as security in handling these data, network bandwidth required to move this data across the cloud, latency in which transferring the data across the computing nodes and huge computing power required in a data centre. Isolated high power data centers are not a viable option to address above challenges. Edge computing, Automation, Artificial Intelligence, and block-chain are some of the solutions which address the above challenges. Using these solutions simultaneously is the key to solving these challenges which industry is going to face in near future.

Outline of the presentation (Duration 1 hr 50 Min): • Motivation and Introduction (5 Min) • 4th Industrial revolution -AI (5 Min) • Type of AI (5 Min) • Need for AI and Blockchain (5 Min) • Need for Automation (5 Min) • Evolution of edge computing (5 Min) • API computing and economy (5 Min) • Heterogeneous Computing (5 min) • Low latency Computing (5 Min) • Blockchain basics (10 Minutes) • Hardware accelerated and Managed Blockchain (10 Minutes) • Heterogeneous Computing for AI and ML (5 Min) • Acceleron MDC accelerate AI and Blockchain (30 Minutes). • Discussion (10 Min)

Friday, September 21 10:45 - 11:10

Tea Break

Friday, September 21 11:10 - 12:00

Keynote 6: From Gutenberg to Smartphones: Inferring Keypress from Side Channels

Speaker: Dr. Mauro Conti, University of Padua, Italy
Room: Seminar Hall -1

Abstract: Typing is still one of the main methods of interaction with computing devices: we do it regularly on our laptops, smartphones and other devices, like ATM machines. Oftentimes, we want to keep the typed text confidential (emails, password, pin codes...). To protect our text, we use all kinds of access control and encryption mechanisms, but we might forget to leave some other doors open to the adversary. In this talk, we will review recent results on typing inference from side channels exploitable by both local and remote adversaries (e.g., through a VoIP conversation).

SHORT BIO: Mauro Conti is Full Professor at the University of Padua, Italy, and Affiliate Professor at the University of Washington, Seattle, USA. He obtained his Ph.D. from Sapienza University of Rome, Italy, in 2009. After his Ph.D., he was a Post-Doc Researcher at Vrije Universiteit Amsterdam, The Netherlands. In 2011 he joined as Assistant Professor the University of Padua, where he became Associate Professor in 2015, and Full Professor in 2018. He has been Visiting Researcher at GMU (2008, 2016), UCLA (2010), UCI (2012, 2013, 2014, 2017), TU Darmstadt (2013), UF (2015), and FIU (2015, 2016). He has been awarded with a Marie Curie Fellowship (2012) by the European Commission, and with a Fellowship by the German DAAD (2013). His research is also funded by companies, including Cisco and Intel. His main research interest is in the area of security and privacy. In this area, he published more than 200 papers in topmost international peer-reviewed journals and conference. He is Area Editor-in-Chief for IEEE Communications Surveys & Tutorials, and Associate Editor for several journals, including IEEE Communications Surveys & Tutorials, IEEE Transactions on Information Forensics and Security, and IEEE Transactions on Network and Service Management. He was Program Chair for TRUST 2015, ICISS 2016, WiSec 2017, and General Chair for SecureComm 2012 and ACM SACMAT 2013. He is Senior Member of the IEEE.

Friday, September 21 12:00 - 12:50

Keynote 7: Physical Layer Security for MIMO-NOMA Based Cognitive Radio Networks

Speaker: Dr. Sudhan Majhi, Associate Professor in Electrical Engineering, Indian Institute of Technology, Patna, India
Room: Seminar Hall - 2

Abstract: The talk will be on designing physical-layer security for both primary user (PU) and secondary user (SU) in the underlay multiple-input multiple-output cognitive-radio network (MIMO-CRN) by using a bi-directional zero-forcing beamformer. The proposed method enables the PU to communicate along with the SU through a relay node without sacrificing their individual secrecy capacity, i.e., without causing interference to each other even in the presence of eavesdropper(s). In the first phase, a transmit beamforming at the PU/SU transmitters and a receive beamforming at the relay have been adopted to separate PU and SU data. In the second phase, a bi-directional beamformer has been applied to eradicate the necessity of involving artificial noise for preventing the active eavesdropper(s). To maximize the total secrecy capacity, a generalized non-linear optimization problem has been formulated and converted to a simplified constrained optimization problem by utilizing the beamformer and the subspace restriction. Then this problem is solved by the Lagrangian method. Both theoretical and numerical analyses of the total and individual ergodic secrecy rates are provided to demonstrate the effectiveness of our proposed method. The secrecy outage probability is also derived to evaluate the performance variations of our proposed scheme when the channel-estimation error occurs. The physical layer security issue has been extended for non-orthogonal multiple access (NOMA)-CRN where multi-cluster and multi-cell have been considered. A cascaded beamforming technique with alignment vector has been proposed to remove the restriction on number antennae at the transmitter.

Biography: Dr. SUDHAN MAJHI is currently an Associate Professor in the Department of Electrical Engineering and Mathematics, Indian Institute of Technology, Patna, India. Currently, he is Fellow of Sir Visvesvaraya Young Faculty Research awarded by Meity. He is also An Editor of IEEE Transactions on Vehicular Technology. He received M.Tech degree in Computer Science and Data Processing from Indian Institute of Technology, Kharagpur, India in 2004 and the Ph.D. degree from Nanyang Technological University, Singapore in 2008. He has postdoctoral experience with University of Michigan- Dearborn, MI, USA, Institute of Electronics and Telecommunications, Rennes, France and Nanyang Technological University, Singapore. He has received best academic award in NI ASEAN Graphical System Design Achievement Awards 2012. He has received young scientist start-up grand from DST. Currently he is Associate editor of Circuits, Systems and Signal Processing - Springer. His research interest includes signal processing for wireless communication which includes blind synchronization and parameter estimation, cooperative communications, physical layer security for cognitive radio, sequence design, OFDM, MIMO, SC-FDMA, and MIMO-OFDM. For more details please visit https://www.iitp.ac.in/spwicom/ .

Friday, September 21 12:50 - 14:00

Lunch Break

Room: Ground Floor - Open Space

Friday, September 21 14:00 - 18:30

ISTA-03: ISTA-03: Applications using Intelligent Techniques

Room - 301
Chairs: Pooja Agarwal, Amit Prakash Singh
ISTA-03.1 14:00 Morphisms on Lattice Ordered Interval-Valued Hesitant Fuzzy Soft Sets
Vimala Jayakumar, Pandipriya AR and VS Anusuya Ilamathi
ISTA-03.2 14:18 Performance analysis of DWT and FMH in Classifying Hand Motions using sEMG Signals
Parul Chopra, Shivangi Agarwal, Asha Rani and Vijander Singh
ISTA-03.3 14:36 Refined Stop-Words and Morphological Variants Solutions Applied to Hindi-English Cross-Lingual Information Retrieval
Vijay Kumar Sharma and Namita Mittal
ISTA-03.4 14:54 A Hybrid Approach to Generate Visually Seamless Aerial Mosaicks from Unmanned Aerial Vehicles
Koshy George and Vishnukumar S
ISTA-03.5 15:12 A machine learning approach for fast mode decision in HEVC intra prediction based on statistical features
Preethi S. Nair, K. r. Rao and Madhu S Nair
ISTA-03.6 15:30 Real Time Detection System of Driver Drowsiness based on Representation learning using Deep Neural Networks
Vineetha Vijayan and Sherly Elizabeth
ISTA-03.7 15:48 Affective State Recognition using Audio Cues
Lalitha Sreeram, P Murali Krishna, R Pradeep Reddy and Veena Narayanan
ISTA-03.8 16:06 A Multi Verse Optimization based MPPT Controller for Drift Avoidance in Solar System
Urvashi Chauhan, Asha Rani, Bhavnesh Kumar and Vijander Singh
ISTA-03.9 16:24 Behavior of 3-axis conformal proximity sensor arrays for restraint-free, in-vehicle, deployable safety assistance
Durgam Vamshi Krishna Kumar and Shanmugha Sundaram Ga
ISTA-03.10 16:42 A decision making approach based on L-IVHFSS setting
Vimala Jayakumar, Pandipriya AR, Xindong Peng and Sabeena Begam S
ISTA-03.11 17:00 Intelligent Refrigerator
Ishank Agarwal

ISTA-04: ISTA-04: Intelligent Techniques for Ad-hoc and Wireless Sensor Networks/Intelligent Distributed Computing

Room - 302
Chair: Juhi R Srivastava
ISTA-04.1 14:00 Advanced Credit Score Calculation using Social Media and Machine Learning
Swati Vyas Kulkarni and Sudhir Namdeorao Dhage
ISTA-04.2 14:18 Impact of Trimet Graph Optimization Topology on Scalable Networks
Shanmuk S Amiripalli and Veeramallu Bobba
ISTA-04.3 14:36 Roll Forward Validation based Decision Tree Classification for Detecting Data Integrity Attacks in Industrial Internet of Things
Surendar Madhawa, Balakrishnan P and Umamakeswari Arumugam
ISTA-04.4 14:54 Information Criteria Based Optimal Structure Identification of RF Power Amplifier Models
Srinadh Reddy Bhavanam, Sanjika Devi R V, Sriram Mudulodu and Dhanesh G. Kurup
ISTA-04.5 15:12 A Lightweight Inter-Zonal Authentication Protocol for Moving Objects in Low Powered RF Systems
Shyamala C Kandsamy and Anand K Rajagopalan
ISTA-04.6 15:30 A Secure and Optimized Location Update for Next Generation Proxy Mobility based Internet Protocol Networks
Senthilkumar Mathi, Anshu Khatri, Sethuraman Maanasaa and Natarajan Anbarasi
ISTA-04.7 15:48 An Intelligent Energy Efficient Clustering Technique for Multiple Base Stations Positioning in a Wireless Sensor Network
Veervrat Singh Chandrawanshi, Rajiv Tripathi and Rahul Pachauri
ISTA-04.8 16:06 Fuzzy Clustering using Salp Swarm Algorithm for Automobile Insurance Fraud Detection
Santosh Kumar Majhi, Subho Bhatachharya, Rosy Pradhan and Shubhra Biswal
ISTA-04.9 16:24 Swarm intelligence based optimization of energy consumption in cognitive radio network
Ashim Gogoi, Krishna Baishnab and Hussain A Choudhury
ISTA-04.10 16:42 Grefenstette Bias based Genetic Algorithm for Multi-Site Offloading using Docker Container in Edge computing
Ezhilarasie Rajapackiyam, Umamakeswari Arumugam, Mandi Sushmanth Reddy and Balakrishnan P
ISTA-04.11 17:00 A Review on VANET Routing Protocols and Proposing a Parallelized Genetic Algorithm based heuristic modification to mobicast routing for real time message passing
Rahul Saxena, Monika Jain, Devi Prasad Sharma and Siddharth Jaidka

SIRS-03: SIRS-03: Intelligent Recognition Techniques/Signal Processing(Short Papers)

Speaker: Dr. Selwyn Piramuthu, Professor of Information Systems, University of Florida, Gainesville, Florida, USA
Room - 303
Chairs: Punam Bedi, Ram Ratan

Title of Talk: RFID-based Relay Attacks [14:00-14:50]

Biography: Selwyn Piramuthu is Professor of Information Systems at the University of Florida, where he has taught since Fall 1991. Trained in machine learning, his research interests also include cryptography with applications related to IoT/RFID, privacy/security, supply chain management, among others. Co-authored with Wei Zhou, his book titled, "RFID and Sensor Network Automation in the Food Industry" was published by Wiley in 2016. He received his B.Tech., M.S., and Ph.D. respectively from IIT-Madras, University of Arizona, and the University of Illinois at Urbana-Champaign.

SIRS-03.1 14:00 Survey on Virtual Assistant: Google Assistant, Siri, Cortana, Alexa
Amrita S Tulshan and Sudhir Namdeorao Dhage
SIRS-03.2 14:15 Contemporary Approaches in Image Segmentation - A Quantitative Approach
Syed Fasiuddin
SIRS-03.3 14:30 IoT based Food Inventory Tracking System
Lakshmi Narayan S p, Kavinkartik E and Prabhu E
SIRS-03.4 14:45 Design of a Compact high gain wide band Ψ shaped Patch antenna on slotted circular ground plane
Anitha Peram, Agarala Subba Rami Reddy and Mahendra. N Giri Prasad
SIRS-03.5 15:00 On acoustic monitoring of farm environments
Stavros Ntalampiras
SIRS-03.6 15:15 Investigation of Fractality and Stationarity Behaviour on Earthquake
Bikash Sadhukhan, Somenath Mukherjee and Sugam Agarwal
SIRS-03.7 15:30 Technologies and Methods for 3D Reconstruction in Archaeology
Suma Dawn and Prantik Biswas
SIRS-03.8 15:45 Fuzzy Based Energy Efficient Protocol for Monitoring of Nuclear Radiation using Wireless Sensor Network
Ravi Yadav and A K Daniel
SIRS-03.9 16:00 Geometrically uniform differential signalling for MISO/MIMO channels using optimized PM codebook
Susheela K and Prerana G Poddar
SIRS-03.10 16:15 A Comprehensive Review on Automatic Diagnosis of Diabetic Maculopathy in Retinal Fundus Image
Rajesh IS, Bharathi A and Bharati Reshmi
SIRS-03.11 16:30 Multi-Image Enhancement Technique using Max-Plus Algebra-Based Morphological Wavelet Transform
Sreekala Kannoth and Halugona Sateesh Kumar
SIRS-03.12 16:45 Dimensionality Reduction by Dynamic Mode Decomposition for Hyperspectral Image Classification Using Deep Learning and Kernel Methods
Siva Charmisha Kondreddy, V Sowmya and Soman K P

Friday, September 21 14:00 - 18:00

SSCC-04: SSCC-04: Security and Privacy in Networked Systems

Speaker: Dr. Christian Callegari, RaSS (Radar and Surveillance Systems) National Laboratory - CNIT, Dept. of Information Engineering - University of Pisa, Italy
Room - 304
Chairs: Rajiv Pandey, Tarun Yadav

Title of the Talk: IoT and Network Security: Should I care about network security? (14:00-14:50)

Talk description: Network security is becoming more and more challenging as new communication paradigms and architectures (e.g., IoT, SDN) are deployed all over the world. Indeed, the need for self-configuring devices, which do not necessarily require an operator for their management and are usually designed without taking security and privacy into account, makes security more challenging than ever before. In a such a context, the talk will first investigate some of the most recent attacks to the IoT world (e.g., the Mirai botnet) and some of the most critical threats (e.g., Advanced Persistent Threats) highlighting how "standard" approaches to security are not efficient any-longer. Then it will focus on the analysis of some of the most recent and promising approach to attack detection and reaction. The main objective of the talk is to show that even the "standard" Internet users must take care of the security of their devices, as well as of their own privacy.

SSCC-04.1 14:00 Cost Based Model for Secure Health Care Data Retrieval
Kritika Kumari, Sayantani Saha and Sarmistha Neogy
SSCC-04.2 14:15 Inter-Path Diversity Metrics for Increasing Network Robustness Against Zero-Day Attacks
Ghanshyam Bopche, Gopal N. Rai and Babu Mehtre
SSCC-04.3 14:30 Privacy-preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update
Rashmi R, D. V. N Siva Kumar and Santhi Thilagam P.
SSCC-04.4 14:45 HGKA:Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks
Srinidhi V, Lakshmy Kv and Sethumadhavan M
SSCC-04.5 15:00 Network Anomaly Detection using Artificial Neural Networks Optimised with PSO-DE Hybrid
Rithesh K, Adwaith V Gautham and Chandrasekaran K
SSCC-04.6 15:15 A Blockchain based Vehicle Database System
Aswathy Sv and Lakshmy Kv
SSCC-04.7 15:30 Proof of Stack Consensus for Blockchain Networks
Anjani Barhanpure, Paaras Belandor and Bhaskarjyoti Das
SSCC-04.8 15:45 Effective Hardware Trojan Detection using Front-End Compressive Sensing
Nandhini A P, Sai Bhavani M, Dharani Dharan S, Harish N and Priyatharishini M.
SSCC-04.9 16:00 Probabilistic real-time intrusion detection system for Docker container
Siddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram and Sanchika Gupta
SSCC-04.10 16:15 Wearable Device Forensic: Probable Case studies and Proposed Methodology
Dhenuka Kasukurti and Suchitra Patil
SSCC-04.11 16:30 Enhanced Session Initiation Protocols for Emergency Healthcare Applications
Sourav Saha, Odelu Vanga and R. Rajendra Prasath
SSCC-04.12 16:45 Accessing Data in Healthcare application
Gaurav Mitra, Souradeep Barua, Srijan Chattopadhyay, Sukalyan Sen and Sarmistha Neogy
SSCC-04.13 17:00 Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study
Mohiuddin Ahmed and Al-Sakib Khan Pathan
SSCC-04.14 17:16 Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments
R Madhusudhan
SSCC-04.15 17:31 A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks
Gemini George and Sabu M Thampi

Friday, September 21 16:30 - 17:30

Tea Break

Room: Ground Floor and 3rd Floor

Saturday, September 22

Saturday, September 22 9:00 - 11:00

Registration

Room: Ground Floor - Entrance

Saturday, September 22 9:30 - 13:30

ISTA-05: ISTA-05: Applications using Intelligent Techniques(Short Papers)

Room - 201
Chairs: Annapurna D, Arunesh Kumar Singh
ISTA-05.1 9:30 A Study on Plant Recognition Using Conventional Image Processing and Deep Learning Approaches
Anubha Pearline S, Sathiesh Kumar and Harini S
ISTA-05.2 9:42 Impact analysis of LFM Jammer Signals on Stepped Frequency PAM4 RADAR Waveforms
Keerthana K and Shanmugha Sundaram Ga
ISTA-05.3 9:54 Online Knowledge-Based System for CAD modeling and Manufacturing: An Approach
Jayakiran Reddy Esanakula, J Venkatesu Naik, Rajendra D and V Pandu Rangadu
ISTA-05.4 10:06 Hepatoprotective activity of the Bi-Herbal Extract in Carbon tetra chloride (CCl4) induced hepatoxicity - A study of Histopathological Image Analysis
Sujatha Kesavan
ISTA-05.5 10:18 Battery Assisted, PSO - BFOA based Solar powered single stage power conditioning unit based Five Phase Induction Motor Drive for Green Boat Applications
Suribabu Yaramasu and K. Chandra Sekhar
ISTA-05.6 10:30 Intrinsic Evaluation for English-Tamil Bilingual Word Embeddings
Sanjanasri Jp, Vijay Krishna Menon, Rajendran S, Soman K P and Anand Kumar M
ISTA-05.7 10:42 A Novel Approach of Augmenting Training Data for Legal Text Segmentation by Leveraging Domain Knowledge
Rupali Sunil Wagh and Deepa Anand
ISTA-05.8 10:54 IoT enabled Air Monitoring System
Amit Prakash Singh, Shyamli Singh and Chavi Srivastava
ISTA-05.9 11:06 Evaluation of water body extraction from satellite images using open source tools
Karthi R, Rithin Paul Reddy K., Sai Srija Suda and P Geetha
ISTA-05.10 11:18 Phase-Modulated, Stepped Frequency Waveform Design for Low Probability of Detection RADAR Signals
Vignesh R, Gandhiraj R and Shanmugha Sundaram Ga
ISTA-05.11 11:30 Effect of waveform coding on stepped frequency modulated, pulsed radar transmit signals
Priyanga G and Shanmugha Sundaram Ga
ISTA-05.12 11:42 Sarcasm Detection on Twitter: User Behavior Approach
Nitin Malave and Sudhir Namdeorao Dhage
ISTA-05.13 11:54 Personalized Recommender Agent for E-Commerce Products Based on Data Mining Techniques
Veer Sain Dixit and Shalini Gupta

ISTA/SIRS-ICPM'18: ISTA/SIRS-ICPM'18: Workshop on Advances in Image Processing, Computer Vision, Pattern Recognition and Machine Intelligence (ICPM'18)

Room - 202
Chairs: Bhaskar Belavadi, V Sowmya
ISTA/SIRS-ICPM'18.1 9:30 Bit-plane Specific Measures and its Applications in Analysis of Image Ciphers
Ram Ratan and Arvind Yadav
ISTA/SIRS-ICPM'18.2 9:45 A Framework for Lane Prediction on Unstructured Roads
Rohan Dhanakshirur, Preeti Pillai, Ramesh Ashok Tabib, Ujwala Patil and Uma Mudenagudi
ISTA/SIRS-ICPM'18.3 10:00 Classification of colposcopic cervigrams using EMD in R
Kumar Dron Shrivastav, Ankan Mukherjee Das, Harpreet Singh, Priya Ranjan and Rajiv Janardhanan
ISTA/SIRS-ICPM'18.4 10:15 Curvelet Based Thinning Algorithm
Jyothi R L and AbdulRahiman M
ISTA/SIRS-ICPM'18.5 10:30 Dynamic Mode based Feature with Random Mapping for Sentiment Analysis
Sachin Kumar S, Anand Kumar M, Soman K P and Prabaharan Poornachandran
ISTA/SIRS-ICPM'18.6 10:45 A Modification to the Nguyen-Widrow Weight Initialization Method
Apeksha Mittal, Amit Prakash Singh and Pravin Chandra
ISTA/SIRS-ICPM'18.7 11:00 Variant of Nearest neighborhood fingerprint storage system by reducing redundancies
Anjana K, Praveen K, Amritha PP and Sethumadhavan M
ISTA/SIRS-ICPM'18.8 11:15 Modelling, Analysis and Control of an Eddy Current Braking System using Intelligent Controllers
Arunesh Kumar Singh, Ibraheem Nasiruddin, Amit Kumar Sharma and Abhinav Saxena
ISTA/SIRS-ICPM'18.9 11:30 Pep- Personalized Educational Platform
Vivek M. Jude, Nayana A, Reshma Pillai and Jisha John
ISTA/SIRS-ICPM'18.10 11:45 Efficient Pre-processing and Feature Selection for Clustering of Cancer Tweets
Lavanya PG, Kouser K and Suresha Mallappa
ISTA/SIRS-ICPM'18.11 12:00 Maneuvering Black hole attack using different traffic generators in MANETs
Fahmina Taranum
ISTA/SIRS-ICPM'18.12 12:15 User Graph Topic Model
Nadeem Akhtar and M. M. Sufyan Beg
ISTA/SIRS-ICPM'18.13 12:30 Automated Analytical Model for Content Based Selection of Web Services
S Subbulakshmi, Ramar K, Aparna Omanakuttan and Arya Sasidharan

SSCC-05: SSCC-05: Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2018)

Room - 203
Chairs: Santosh Kumar Majhi, Abhishek SN
SSCC-05.1 9:30 A Comparative Analysis of Different Soft Computing Techniques For Intrusion Detection System
Josy Elsa Varghese and Balachandra Muniyal
SSCC-05.2 9:45 A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems
Krishna Prakasha, Rachana Kalkur, Vasundhara Acharya, Balachandra Muniyal and Mayank Khandelwal
SSCC-05.3 10:00 Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT
Joseph Charles, A. S. and P. Kalavathi
SSCC-05.4 10:15 Survey of security threats in IoT and emerging countermeasures
Mimi Cherian
SSCC-05.5 10:30 Holistic Credit Rating System for Online Microlending Platforms with Blockchain Technology
Yash Mahajan and Shobhit Srivastava
SSCC-05.6 10:45 Analysis of Execution Time for Encryption during Data Integrity Check in Cloud Environment
Akshay KC and Balachandra Muniyal
SSCC-05.7 11:00 Inverted Index based Ranked Keyword Search in Multi-user Searchable Encryption
Manju S Nair and Rajasree M S
SSCC-05.8 11:15 Power and Area Efficient FSM with Comparison-Free Sorting Algorithm for Write-Evaluate Phase and Read-Sort Phase
Bhargav T a s and Prabhu E
SSCC-05.9 11:30 A New Chaotic Map Based Secure and Efficient Pseudo-random Bit Sequence generation
Musheer Ahmad, Mohammad Doja and Mohammad Beg
SSCC-05.10 11:45 Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling
Aniq Ur Rahman and Mayukh Bhattacharyya
SSCC-05.11 12:00 Analysis of circuits for security using Logic Encryption
Bandarupalli Chandini and M. Nirmala Devi

Saturday, September 22 10:45 - 11:10

Tea Break

Room: Ground Floor and 3rd Floor

Saturday, September 22 13:00 - 14:00

Lunch Break

Room: Ground Floor - Open Space

Saturday, September 22 15:30 - 16:00

Valedictory Function

Room: Seminar Hall -1

Saturday, September 22 16:00 - 16:15

Tea

Room: Ground Floor

Program last updated on no date/time given