Program for Third International Conference on Computing and Network Communications (CoCoNet'19) & International Conference on Applied Soft Computing and Communication Networks (ACN'19)
Wednesday, December 18
Wednesday, December 18 8:45 - 12:30
Registration
All delegates should bring the printout of the Order issued by Explara (refer to the email received from Explara during registration) and photocopy of valid ID Cards. The registration will be closed at 12.30 pm on all three days.
The QR Code will be scanned to issue the registration kit.
Wednesday, December 18 9:45 - 10:30
Inaugural Session
Wednesday, December 18 10:30 - 11:30
Keynote: Trends and Issues in Networking: What's In What's Out?
Abstract: We begin with developments that led to virtualization, network function virtualization, and disaggregation. How software-defined networking definition has changed due to disaggregation. The trend of DevOps and the slowness of the standardization activities has led the networking industry towards open source software and hardware. Open-sourcing has now become the fastest way to introduce new research, idea, concept or technology. All these trends and their impact on networking research along several related myths and issues will be discussed in this talk.
Wednesday, December 18 11:30 - 12:00
Keynote: Shri. M. Sivasankar IAS, Secretary , Department of Electronics and Information Technology, Govt. of Kerala
Wednesday, December 18 12:00 - 12:30
Keynote: Dr. Guy Diedrich, Vice President and the Global Innovation Officer, Cisco Systems, USA
Wednesday, December 18 12:30 - 13:30
Lunch Break
Wednesday, December 18 13:30 - 14:30
Keynote: Research in medical imaging, processing, and informatics: prospect and perspective
Abstract: Research in medical informatics is multifaceted, and has a wide scope of addressing any issue related to computing and technological advancement in healthcare and medicine. A specialized domain of this area is medical image processing primarily dealing with image-based studies, whereas medical imaging further narrows down the scope to noninvasive studies of anatomy and physiology of living beings. Nevertheless, there are generic issues and challenges while doing research in these areas. In this talk, we would consider them from a holistic viewpoint through a few case studies.
Wednesday, December 18 14:40 - 18:00
ACN-01: ACN-01: Communication Networks
- ACN-01.1 14:40 Agent-based Traffic Obstacles Information System
- ACN-01.2 14:55 Desing of a Virtual Channel Router Architecture for Low Power on Mesh-of-Grid Topology for Network on Chip
- ACN-01.3 15:10 Hybridization of Constriction Coefficient Based Particle Swarm Optimization and Chaotic Gravitational Search Algorithm for Solving Engineering Design Problems
- ACN-01.4 15:25 User Authentication of IoT Devices for Decentralized Architecture Using Blockchain
- ACN-01.5 15:40 Detection of Packet Dropping Nodes in Wireless Mesh Networks
- ACN-01.6 15:55 Classification of Virtual Machine Consolidation Techniques: A Survey
- ACN-01.7 16:10 A Statistical Analysis on KDD Cup'99 Dataset for Network Intrusion Detection System
- ACN-01.8 16:25 Efficient Certificateless Privacy Preserving Public Auditing for Cloud Based IIoT
- ACN-01.9 16:40 A Study of CNN Architectures over Two Hands Indian Sign Language Dataset
- ACN-01.10 16:55 Real Time Communication Alert System for Missing Vessels in Deep Sea
- ACN-01.11 17:10 Periocular Recognition Under Unconstrained Conditions Using CNN Based Super-Resolution
- ACN-01.12 17:25 An Enhanced Bat Algorithm for Parallel Localization Based on a Mobile Beacon Sensor in Wireless Sensor Networks
- ACN-01.13 17:40 Performance Evaluation of RNNs for Short-Term Investment Decision in Stock Market
- ACN-01.14 17:55 Fruit Fly Optimization Based Reliable Routing Algorithm for Wireless Sensor Networks
- ACN-01.15 18:10 Parallel Association Rules Pruning Algorithm on Hadoop MapReduce
CoCoNet-S0-A: CoCoNet-S0-A: Best Paper Session
- CoCoNet-S0-A.1 14:40 VoIP-HDK2 - A Novel Channel Allocation Technique for QoS Aware VoIP Communication over Heterogeneous Networks
- CoCoNet-S0-A.2 15:00 An Upper Bound for Sorting Permutations with A Transposition Tree
- CoCoNet-S0-A.3 15:20 Graph Similarity Based Hierarchical Clustering of Trajectory Data
- CoCoNet-S0-A.4 15:40 An Unsupervised Hierarchical Rule Based Model for Aspect Term Extraction Augmented with Pruning Strategies
- CoCoNet-S0-A.5 16:00 Network Status Aware Congestion Control (NSACC) Algorithm for Wireless Body Area Network
- CoCoNet-S0-A.6 16:20 Adaptive Cubic Spline Interpolation in CIELAB Color Space for Underwater Image Enhancement
- CoCoNet-S0-A.7 16:40 An End-to-End Model for Detection and Assessment of Depression Levels Using Speech
- CoCoNet-S0-A.8 17:00 Creating a Dynamic Real Time Green Corridor and Assessing Its Impact on Normal Traffic Flow
CoCoNet-S0-B: CoCoNet-S0-B: Best Paper Session
- CoCoNet-S0-B.1 14:40 Automatic Detection of Naturally Occurring Epilepsy in Dogs Using Intracranial Electroencephalogram Signals
- CoCoNet-S0-B.2 15:00 Automatic Detection and Characterization of Lunar Wrinkle Ridges
- CoCoNet-S0-B.3 15:20 A Computationally Efficient sEMG Based Silent Speech Interface Using Channel Reduction and Decision Tree Based Classification
- CoCoNet-S0-B.4 15:40 A Light Weight Convolutional Neural Network for Single Image Super-Resolution
- CoCoNet-S0-B.5 16:00 Experimental Investigation of Fully Informed Particle Swarm Optimization Tuned Multi Loop L-PID and NL-PID Controllers for Gantry Crane System
- CoCoNet-S0-B.6 16:20 An Efficient Pairing-Free Certificateless Signcryption Without Secure Channel Communication During Secret Key Issuance
- CoCoNet-S0-B.7 16:40 Elastic Cloud Logs Traces, Storing and Replaying for Deep Machine Learning
- CoCoNet-S0-B.8 17:00 Conceptual Verification of Distributed Cyber Physical Systems Using Reference Nets
CoCoNet-S1: CoCoNet-S1: Symposium on Internet of Things, Fog Computing and Wireless Location Technologies (SIFL'19)
- CoCoNet-S1.1 14:40 A Novel MQTT Security Framework in Generic IoT Model
- CoCoNet-S1.2 14:55 Software Defined Internet of Things Using Lightweight Protocol
- CoCoNet-S1.3 15:10 Dynamic Hybrid-copy Live Virtual Machine Migration: Analysis and Comparison
- CoCoNet-S1.4 15:25 Performance Evaluation of Docker Container and Virtual Machine
- CoCoNet-S1.5 15:40 Multi-Objective Scheduling Using Logistic Regression for OpenStack Based Cloud
- CoCoNet-S1.6 15:55 Self-Managed Block Storage Scheduling for OpenStack-based Cloud
- CoCoNet-S1.7 16:10 Low Leakage SRAM Cell with Improved Stability for IoT Applications
- CoCoNet-S1.8 16:25 Comparative Analysis of NFS and iSCSI Protocol Performance on OpenStack Cinder Technology
- CoCoNet-S1.9 16:40 Comparison of IoT Architectures Using a Smart City Benchmark
- CoCoNet-S1.10 16:55 Green Networking: A Simulation of Energy Efficient Methods
- CoCoNet-S1.11 17:10 Channel Status Based Contention Algorithm for Non-safety Applications in IEEE802.11p Vehicular Network
- CoCoNet-S1.12 17:25 Computing Optimal Block Size for Blockchain Based Applications with Contradictory Objectives
- CoCoNet-S1.13 17:40 A Performance Study of Bio-Inspired Algorithms in Autonomous Landing of Unmanned Aerial Vehicle
- CoCoNet-S1.14 17:55 Energy-efficient and Dynamic Consolidation of Virtual Machines in OpenStack-based Private Cloud
- CoCoNet-S1.15 18:10 Improving Unwavering Quality and Adaptability Analysis of LoRaWAN
CoCoNet-S2: CoCoNet-S2: Sixth Symposium on Computer Vision and the Internet (VisionNet'19)
- 14:40 Segmentation of 3D Point Cloud Data Based on Supervoxel Technique
- 14:55 A Comparative Analysis of RootSIFT and SIFT Methods for Drowsy Features Extraction
- 15:10 Attention Based Multi-Modal Fusion Architecture for Open-Ended Video Question Answering Systems
- 15:25 Vector Based Object Identification in Spherical Images
- 15:40 An Improved RNN-LSTM Based Novel Approach for Sheet Music Generation
- 15:55 Learning-Based Hole Detection in 3D Point Cloud Towards Hole Filling
- 16:10 Deep Features for Categorization of Heritage Images Towards 3D Reconstruction
- 16:25 Framework for Underwater Image Enhancement
- 16:40 Adaptive Threshold for Fingerprint Recognition System Based on Threat Level and System Load
- 16:55 Vehicle Re-Identification Using Relative Entropy Representation and Gated Recurrent Unit Networks
- 17:10 Image Deblurring and Localization for Disaster Response and Humanitarian Assistance
- 17:25 Gujarati Handwritten Character Recognition from Text Images
CoCoNet-S3: CoCoNet-S3: Symposium on VLSI Design and Embedded Computing (VDEC'19) - Regular and Short Papers
- CoCoNet-S3.1 14:40 Design and Evaluation of Floating Point Matrix Operations for FPGA Based System Design
- CoCoNet-S3.2 14:55 CoDeCoVe: A Novel System Level Co-Design & Co-Verification Framework
- CoCoNet-S3.3 15:10 Transmission Gate and Hybrid CMOS Full Adder Characterization and Power-Delay Product Estimation Based on Mathematical Model
- CoCoNet-S3.4 15:25 A Fully On-Chip Low-Dropout Regulator for SoC Applications
- CoCoNet-S3.5 15:40 A Low Power, High Speed 1.2 V Dynamic Comparator for Analog-to-Digital Converters
- CoCoNet-S3.6 15:55 Parameter Extraction of PSP MOSFET Model in Multi-core Zynq SoC Platform
- CoCoNet-S3.7 16:10 Low Power High Performance Priority Encoder Using 2D-array to 3D-array Conversion
- CoCoNet-S3.8 16:25 Dependence of Electrical Characteristics of Junctionless FET on Body Material
- CoCoNet-S3.9 16:40 An Efficient Optimization and Secured Triple Data Encryption Standard Using Enhanced Key Scheduling Algorithm
- CoCoNet-S3.10 16:55 Tunable Memristor Emulator Using Off-The-Shelf Components
- CoCoNet-S3.11 17:10 Efficient Hardware of RGB to Gray Conversion Realized on FPGA AND ASIC
- CoCoNet-S3.12 17:25 Implementation of High-Speed Modulo (2^n+1) Multiplier for IDEA Cipher
- CoCoNet-S3.13 17:40 Design and Implementation of Cellular Automata on FPGA for Hardware Acceleration
- CoCoNet-S3.14 17:55 Computer Aided Numerical Simulations of Current Induced Domain Wall in a Nanowire
- CoCoNet-S3.15 18:10 Analysis of Ionospheric Scintillations of NavIC L5 and S-band Signals over Low Latitude Indian Region
CoCoNet-S4: CoCoNet-S4: Main Track - Security and Privacy/Wireless Communications (Regular Papers)
- 14:40 Physical Layer Security in Bidirectional Communication with SWIPT
- 14:55 PhishSKaPe: A Content Based Approach to Escape Phishing Attacks
- 15:10 Cover Dependent Watermarking Against Ambiguity Attacks
- 15:25 A Secured Data Hiding Using Affine Transformation in Video Steganography
- 15:40 Evaluation of N-Gram Based Multi-Layer Approach to Detect Malware in Android
- 15:55 A Comparative Evaluation of Community Detection Algorithms in Social Networks
- 16:10 Backtracking Tool Root-Tracker to Identify True Source of Cyber Crime
- 16:25 An Ensemble Approach for Algorithmically Generated Domain Name Detection Using Statistical and Lexical Analysis
- 16:40 A Framework for Detecting Phishing Websites Using GA Based Feature Selection and ARTMAP Based Website Classification
- 16:55 PhishPreventer: A Secure Authentication Protocol for Prevention of Phishing Attacks in Mobile Environment with Formal Verification
- 17:10 A Comparative Study of Static Code Analysis Tools for Vulnerability Detection in C/C++ and JAVA Source Code
CoCoNet-S5: CoCoNet-S5: Main Track - Computer Vision, Image Processing, Machine Learning and Pattern Recognition (Short Papers)
- 14:40 A New Approach of Multilevel Unsupervised Clustering for Detecting Replication Level in Large Image Set
- 14:55 Vehicle Data Aggregation from Highway Video of Madurai City Using Convolution Neural Network
- 15:10 Design and Evaluation of a Real-Time Face Recognition System Using Convolutional Neural Networks
- 15:25 Deep Learning Based Feature Extraction for Texture Classification
- 15:40 Determination of Green Spots (Trees) for Google Satellite Images Using MATLAB
- 15:55 Feature Selection Using Improved Teaching Learning Based Algorithm on Chronic Kidney Disease Dataset
- 16:10 Improving Pattern Matching Performance in Genome Sequences Using Run Length Encoding in Distributed Raspberry Pi Clustering Environment
- 16:25 ECG Heartbeat Arrhythmia Classification Using Time-Series Augmented Signals and Deep Learning Approach
- 16:40 Performance Analysis of Weighted Cat Swarm Optimization with Sobol Mutation
ISTA-01: ISTA-01: Best Paper Session
- ISTA-01.1 14:40 Improved PSO for Optimizing the Performance of Intrusion Detection Systems
- ISTA-01.2 15:00 Image Forgery Detection Using Deep Textural Features from Local Binary Pattern Map
- ISTA-01.3 15:20 S-DDoS: Apache Spark Based Real-time DDoS Detection System
- ISTA-01.4 15:40 Combining Trust and Reputation as User Influence in Cross Domain Group Recommender System (CDGRS)
- ISTA-01.5 16:00 A Fuzzy Based System for Target Search Using Top-Down Visual Attention
- ISTA-01.6 16:20 A Log-periodic Spiral Antenna Array for L-band Radio Interferometric Imaging
- ISTA-01.7 16:40 Knowledge Discovery in Medical and Biological Datasets by Integration of Relief-F and Correlation Feature Selection Techniques
- ISTA-01.8 17:00 Empirical Study on Imbalanced Learning of Arabic Sentiment Polarity with Neural Word Embedding
ISTA-02: ISTA-02: Intelligent Image Processing /Artificial Vision/Speech Processing
- ISTA-02.1 14:40 Foreign Accent Classification Using Deep Neural Nets
- ISTA-02.2 14:58 Occluded Face Recognition Using NonCoherent Dictionary
- ISTA-02.3 15:16 An Improved Hyper Smoothing Function Based Edge Detection Algorithm for Noisy Images
- ISTA-02.4 15:34 A Computationally Efficient Method for Human Activity Recognition Based on Spatio Temporal Cuboid and Super Normal Vector
- ISTA-02.5 15:52 Random Fourier Feature Based Music-Speech Classification
- ISTA-02.6 16:10 A Vital Neurodegenerative Disorder Detection Using Speech Cues
- ISTA-02.7 16:28 Evolutionary Intelligence for Breast Lesion Detection in Ultrasound Images: A Wavelet Modulus Maxima and SVM Based Approach
- ISTA-02.8 16:46 "Application of Machine-Learning Technique for Prediction of Road Accidents in State of Haryana-A Novel Approach"
- ISTA-02.9 17:04 An Intelligent Technique for the Characterization of Coal Microscopic Images Using Ensemble Learning
- ISTA-02.10 17:22 Hybrid Architecture for Multiple Transforms for Signal Processing Applications
- ISTA-02.11 17:40 Tongue Print Identification Using Deep CNN for Forensic Analysis
- ISTA-02.12 17:58 Analysing Applicability of Intelligent Data Mining Techniques for Texture Classification
- ISTA-02.13 18:16 Neighborhood Pixel Based Approach for Arbitrary Oriented Multilingual Text Localization
SIRS-01: SIRS-01: Intelligent Recognition Techniques and Applications
- SIRS-01.1 14:40 Multilingual Phone Recognition: Comparison of Traditional Versus Common Multilingual Phone-set Approaches and Applications in Code-Switching
- SIRS-01.2 14:55 Obstructive Pulmonary Disease Prediction Through Heart Structure Analysis
- SIRS-01.3 15:10 Reliability and Connectivity Improve the Ranking Principle
- SIRS-01.4 15:25 Rank Level Fusion of Multimodal Biometrics Based on Cross-Entropy Monte Carlo Method
- SIRS-01.5 15:40 Speaker Specific Formant Dynamics of Vowels
- SIRS-01.6 15:55 Identifying the Influential User Based on User Interaction Model for Twitter Data
- SIRS-01.7 16:10 CNN Based Periocular Recognition Using Multispectral Images
- SIRS-01.8 16:25 Estimation of Bone Mineral Density Using Machine Learning Approach
- SIRS-01.9 16:40 Acoustic Identification of Nocturnal Bird Species
- SIRS-01.10 16:55 Internet of Assistants: Humans Can Get Assistance Anywhere Anytime and Any Areas
SoMMA-01: SoMMA-01: Symposium on Machine Learning and Metaheuristics Algorithms, and Applications
- SoMMA-01.1 14:40 NSGA III for CNC End Milling Process Optimization
- SoMMA-01.2 14:58 Facial Emotion Recognition Using Shallow CNN
- SoMMA-01.3 15:16 CNN and Stacked LSTM Model for Indian Sign Language Recognition
- SoMMA-01.4 15:34 A Textural Feature Based Cytological Image Classification Using Artificial Neural Network
- SoMMA-01.5 15:52 Proposing Contextually Relevant Advertisements for Online Videos
- SoMMA-01.6 16:10 A Cost-Effective Data Node Management Scheme for Hadoop Clusters in Cloud Environment
- SoMMA-01.7 16:28 A Brain Computer Interface Based Visual Keyboard System Using SSVEP and Electrooculogram
- SoMMA-01.8 16:46 Lead Artist Identification from Music Videos Using Auto-Encoders
- SoMMA-01.9 17:04 Enhanced Differential Evolution-based EEG Channel Selection
- SoMMA-01.10 17:22 Deep Temporal Analysis of Twitter Bots
- SoMMA-01.11 17:40 Hybrid Duty Cycle Algorithm for Industrial WSNs Using Machine Learning
SSCC-01: SSCC-01: Security and Privacy in Networked Systems
- SSCC-01.1 14:40 Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment
- SSCC-01.2 15:00 Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study
- SSCC-01.3 15:20 Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
- SSCC-01.4 15:40 A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation
- SSCC-01.5 16:00 Enhancing Enterprise IT Security with a Visualization-based Process Framework
- SSCC-01.6 16:20 The Impact of a Security Model in a Fog Computing Environment
- SSCC-01.7 16:40 Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process
- SSCC-01.8 17:00 Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey
- SSCC-01.9 17:20 Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity
- SSCC-01.10 17:40 Towards a Privacy Web Scanner for End-Users
Wednesday, December 18 14:45 - 16:15
Tutorial: Fog Computing, Edge Computing and a return to privacy and personal autonomy,
Abstract: How can we anticipate the evolving relationships between Fog Computing and the Internet of Things, Big Data and AI and the impact on our traditions of security and privacy? Computing in the Fog and at the Edge of the Internet of Things represents the greatest bilateral data exchange in the lives of others since the advent of the telephone. It may offer more than improved response times and reduced latency in home and personal data services. It may reintroduce user and community control over the data lives generated by remote systems introduced by the Internet of Things. At the same time, the invasive risks it presents to home and personal security and privacy may increase regulatory complexity to protect those rights. This tutorial invites you to map the technical, legal and social artifacts between these elements so we may:
Anticipate what may come and Identify design elements that may protect our needs in security and privacy
Wednesday, December 18 14:45 - 18:00
Tutorial: Hands-on training on BigData Analytics and Machine Learning with PySpark,
Abstract: This training is expected to cover foundations of Big Data, Why we need a different set of tools to analyze big data, Importance of Spark in analyzing Big Data, Use of Resilient Distributed Data Sets and Spark SQL. Further, there will be a demonstration of how to use pySpark for machine learning.
Outline
Introduction to Big Data Spark Architecture RDD in Spark Spark SQL & Dataframes Machine Learning with PySpark
Prerequisite The participants are expected to have python programming skills and basic understating of data analytics and machine learning
Software and hardware requirements for participants' laptops Laptops should be installed with MobaXterm (https://mobaxterm.mobatek.net/). There should not be any network issues with the laptop to connect with our main server.
Wednesday, December 18 15:30 - 17:30
CoCoNet-S6: CoCoNet-S6: Poster Paper Session-A
- CoCoNet-S6.1 Simplified Ciphertext Policy Attribute Based Encryption for Secured Multimedia Communications
- CoCoNet-S6.2 Threats Faced by Mixed Reality and Countermeasures
- CoCoNet-S6.3 Finding the Duplicate Questions in Stack Overflow Using Word Embeddings
- CoCoNet-S6.4 Towards an Efficient Malayalam Named Entity Recognizer Analysis on the Challenges
- CoCoNet-S6.5 Modeling Access Control on Streaming Data in Apache Storm
- CoCoNet-S6.6 Secure Self Optimizing Software Defined Framework for NB-IoT Towards 5G
- CoCoNet-S6.7 Data Traffic Classification in Software Defined Networks (SDN) Using Supervised-Learning
- CoCoNet-S6.8 Interpolation Based Low Dose CT Image Reconstruction
- CoCoNet-S6.9 Multi Interference Analysis of Two-way Full-Duplex Decode and Forward Relay System
- CoCoNet-S6.10 5 G for Military Communications
- CoCoNet-S6.11 Statistical Parameters for Glaucoma Detection from Color Fundus Images
- CoCoNet-S6.12 Cluster Based Key Management Schemes in Wireless Sensor Networks: A Survey
- CoCoNet-S6.13 Exploring and Optimizing the Fog Computing in Different Dimensions
- CoCoNet-S6.14 Analysis of Various Parameters of L5 and S1 NavIC Signals over Low Latitude Region
- CoCoNet-S6.15 Design and Implementation of Novel Scan Architecture for Test Power Reduction
Wednesday, December 18 15:30 - 18:15
Lightning Talks
-- NDN: New way of understanding Network ( Md Rashedur Rahman, Impress Capital Limited)
-- Prediction and Detection of Brain Tumors Using Machine Learning Techniques (Sudhanshu Suhas Gonge, Vishwakarma Institute of Technology, India)
-- Underwater communication and navigation (Mrinal Sarvagya, Reva University)
-- Neuro Fuzzy System for Epileptic EEG Signal Classification (Rajesh R, Central University of Kerala)
-- Real-world scenarios on Constraints of Digital Image Deep Processing (Sathya, MIT Anna University)
-- Interoperability of SDR Products (Abhay Shriramwar, Cyient Ltd)
-- A new secure Evidence Collection Protocol for Network Forensic Investigation (Rachana Yogesh Patil, A. C. Patil College of Engineering, Kharghar, Navi-Mumbai)
-- Security challenges In IoT Applications: An Authentication Approach (Patel Chintan J, Pandit Deendayal Petroleum University)
-- A New Polyalphabetic Substitution Scheme for Secure Communication (Ranju S Kartha, SNGCE, Kerala)
-- Federated Learning and its Applications, (Manu Vardhan, National Institute of Technology Raipur)
Wednesday, December 18 16:00 - 17:00
Tea Break
Birds of a Feather Sessions (BoFs): Role Model of Technical Education in Society
Thursday, December 19
Thursday, December 19 8:45 - 12:30
Registration
Thursday, December 19 9:30 - 10:40
Keynote: A journey of five generations of biomedical signal feature extraction
Abstract: This talk will cover historical and state-of-the-art developments in signal processing and machine learning techniques applied to biomedicine. Most of the real-world signals possess non-stationary and non-linear characteristics. Information processing and feature extraction from these signals is a challenging task. This talk will focus on five generations of signal processing algorithms developed for the analysis and interpretation of biomedical signals. The talk will touch upon event analysis, spectral analysis, time-frequency domain analysis, and multi-modal biomedical signal processing. Recent advances in using sparse signal representation and compressive sensing of long-term signals from wearables will also be covered. The application of the extraction and classification of features from cardiac signals, bio-acoustical signals, and sleep signals will be discussed in detail.
Thursday, December 19 10:30 - 11:00
Student Research Symposium (SRS'19) - Poster Presentation
Posters:
Judy K George, Gayatri Menon B, Elizabeth Sherly, Visual Saliency Prediction Using Deep Model
Michael K, Asharaf S, Nikhil Chandran, Text-based Logical Question Answering
Renju V R, Malu G, Elizabeth Sherly, Diagnosis of Mild Cognitive Impairment Using Convolutional Neural Networks
Rudhra B, Elizabeth Sherly, Malu G, Diagnosis of Parkinson's Disease Using Deep Learning
Suma R, Anoop V.S., Asharaf S, Graph Convolutional Network for Cross-lingual Knowledge Graph Alignment
Nayana Uday, Elizabeth Sherly, Content-based Image Retrieval Using Convolutional Neural Network
Sreeshma Mohan, Indu V, Sabu M Thampi, A Cognitive Psychology Model for Limiting Bullying in Social Media
Sini S, Malu.G, tba
Thursday, December 19 10:40 - 11:00
Tea Break
Thursday, December 19 11:00 - 12:00
Keynote: Cybersecurity Trends and Challenges
Abstract: This talk will present a personal perspective of a long-time researcher and some-time practitioner on cybersecurity trends and challenges. It will seek to draw some lessons from the decades-long history of this discipline, as well as from more recent developments. Finally, it will present some speculations on cybersecurity developments in the coming decade.
Thursday, December 19 12:00 - 13:00
Keynote: Muscle Fatigue Detection using Infrared Thermography
Abstract: Wireless Sensor Networks (WSNs) have been primarily introduced for defense applications, using large number of wireless sensor nodes (SNs) and a Base Station (BS) that collects information from all SNs. Secured communication in a WSN is an important aspect ignored by researchers and an innovative technique of distributing keys for shared secret key-based communication is described and various characteristics including resiliency are outlined. This presentation first introduces basics of sensor networks and the covers the problem of muscle fatigue which affects people from all walks of life. Muscle fatigue can be defined as a reversible decrease in the contractile strength of the muscle(s) that occurs after long lasting or repetitive muscular activity. Muscle fatigue, when not diagnosed and treated in the early stages, leads to muscle injuries which tend to have long-lasting effects. The current technologies which are used to detect and treat muscle fatigue are highly invasive and often require the personnel to visit specialized clinics. A non-invasive, cost-efficient method for detecting muscle fatigue is crucial. Infrared thermography is a non-radiating and contact-free technology which measures the surface temperature of objects. Infrared thermography can be an effective non-invasive technology which can be used to detect muscle fatigue. The thermal images of the test subjects are taken before and after the exercise routine. The changes in temperature values of the regions of interest have been tabulated and the results indicate a clear correlation between muscle fatigue and increase in the measured temperature. We conclude this talk with final remarks.
Thursday, December 19 13:00 - 13:40
Lunch Break
Thursday, December 19 13:40 - 14:30
Keynote: Machine Learning and Visible Light Communications for Autonomous and Electric Vehicles
Abstract: Autonomous Vehicles (AVs) are incredibly disruptive and can be referred as the third transportation revolution. AVs will not only save commuting time and labour but also alleviate the need for huge parking lots, taxi services or even public transport. When AVs use electricity for fueling there will be a very positive impact on air pollution in as well. However, there are still many technical hurdles to overcome before fully realizing the benefits of AVs. In addition to machine learning and multi-sensor information fusion, V2X communication (where, X stand for Vehicle, Infrastructure or Network) is very essential for many safety aspects of AVs. 5G network-based RF solutions promise ultra-reliable low-latency connections for AV user cases via network slicing. On another frontier, Visible Light Communications (VLC) is gaining momentum to provide short-range V2X connectivity. Wide deployment of solid-state lights and, image sensors in vehicles enable simultaneous lighting, sensing and communication possibilities. The talk will highlight state of the art research issues in real time communication solutions for vehicular networks.
Thursday, December 19 14:40 - 18:00
CoCoNet-S10: CoCoNet-S10: Main Track - Computer Vision, Image Processing, Machine Learning and Pattern Recognition (Regular Papers)
- CoCoNet-S10.1 14:40 Web Usage Mining: Data Pre-processing Impact on Found Knowledge in Predictive Modelling
- CoCoNet-S10.2 14:55 Dengue and Early Warning Systems: A Review Based on Social Network Analysis
- CoCoNet-S10.3 15:10 Clustering Cloud Workloads: K-Means Vs Gaussian Mixture Model
- CoCoNet-S10.4 15:25 VIZIYON: Assistive Handheld Device for Visually Challenged
- CoCoNet-S10.5 15:40 A Novel Approach for Character Segmentation of Offline Handwritten Marathi Documents Written in MODI Script
- CoCoNet-S10.6 15:55 Project Repositories for Machine Learning with TensorFlow
- CoCoNet-S10.7 16:10 An Efficient Framework for Identification of Tuberculosis and Pneumonia in Chest X-ray Images Using Neural Network
- CoCoNet-S10.8 16:25 Object Boundary Identification Using Two-phase Incremental Clustering
- CoCoNet-S10.9 16:40 Implementation of Brain-Machine Interface Using Mind Wave Sensor
- CoCoNet-S10.10 16:55 ECG Denoising Using Wiener Filter and Kalman Filter
- CoCoNet-S10.11 17:10 Smart Rent Portal Using Recommendation System Visualized by Augmented Reality
- CoCoNet-S10.12 17:25 Cross-layer Optimization for Video Transmission Using MDC in Wireless Mesh Networks
- CoCoNet-S10.13 17:40 Preliminary Analysis of Standalone Galileo and NavIC in the Context of Positioning Performance for Low Latitude Region
- CoCoNet-S10.14 17:55 NITCAD - Developing an Object Detection Classification and Stereo Vision Dataset for Autonomous Navigation in Indian Roads
- CoCoNet-S10.15 18:10 KCC QA Latent Semantic Representation Using Deep Learning & Hierarchical Semantic Cluster Inferential Framework
Thursday, December 19 14:40 - 18:15
CoCoNet-S11: CoCoNet-S11: Eighth Symposium on Natural Language Processing (NLP'19)/Data Engineering - Regular & Short Papers
- CoCoNet-S11.1 14:40 Evaluation of Machine Translation Quality Through the Metrics of Error Rate and Accuracy
- CoCoNet-S11.2 14:55 Emotion Detection in Hinglish(Hindi+English) Code-Mixed Social Media Text
- CoCoNet-S11.3 15:10 Deep Contextualized Medical Concept Normalization in Social Media Text
- CoCoNet-S11.4 15:25 Automatic Correction of Stutter in Disfluent Speech
- CoCoNet-S11.5 15:40 Text Segregation on Asynchronous Group Chat
- CoCoNet-S11.6 15:55 Bengali Spoken Digit Classification: A Deep Learning Approach Using Convolutional Neural Network
- CoCoNet-S11.7 16:10 Comparison of Fake and Real News Based on Morphological Analysis
- CoCoNet-S11.8 16:25 OCR-Nets: Variants of Pre-trained CNN for Urdu Handwritten Character Recognition via Transfer Learning
- CoCoNet-S11.9 16:40 Recognition of Ancient Tamil Palm Leaf Vowel Characters in Historical Documents Using B-spline Curve Recognition
- CoCoNet-S11.10 16:55 Towards a Semantic Approach for Candidate Answer Generation in Solving Crossword Puzzles
- CoCoNet-S11.11 17:10 Conversational Implicatures in English Dialogue: Annotated Dataset
- CoCoNet-S11.12 17:25 DHOT-Repository and Classification of Offensive Tweets in the Hindi Language
- CoCoNet-S11.13 17:40 Evaluation of Content Compaction in Assamese Language
- CoCoNet-S11.14 17:55 Algorithm Inspection for Chatbot Performance Evaluation
- CoCoNet-S11.15 18:10 Recognizing Named Entities in Agriculture Documents Using LDA Based Topic Modelling Techniques
Thursday, December 19 14:40 - 18:00
CoCoNet-S12: CoCoNet-S12: Doctoral Consortium
- CoCoNet-S12.1 14:40 A New Digital Signature Scheme Based on the Hardness of Some Expanded Root Problems
- CoCoNet-S12.2 14:55 IOT based Online Load Forecasting Using Machine Learning Algorithms
- CoCoNet-S12.3 15:10 A Band Pass Coupled Line Filter with DGS for Ultra-Wide Band Application
- CoCoNet-S12.4 15:25 Training an Artificial Neural Network Using Qubits as Artificial Neurons: A Quantum Computing Approach
- CoCoNet-S12.5 15:40 FOPID Controller for Buck Converter
- CoCoNet-S12.6 15:55 Personalised Self-Directed Learning Recommendation System
- CoCoNet-S12.7 16:10 Breast Cancer Prediction Using Varying Parameters of Machine Learning Models
- CoCoNet-S12.8 16:25 Towards Identifying Most Important Leads for ECG Classification. A Data Driven Approach Employing Deep Learning
- CoCoNet-S12.9 16:40 A Novel Methodology for the Classification of Debris Scars Using Discrete Wavelet Transform and Support Vector Machine
- CoCoNet-S12.10 16:55 High Throughput and Energy Efficient FIR Filter Architectures Using Retiming and Two Level Pipelining
- CoCoNet-S12.11 17:10 SchedCust: Design & Development of Scheduling Policy Customization Framework for ARM Based System on Chip
CoCoNet-S7: CoCoNet-S7: Seventh Symposium on Control, Automation, Industrial Informatics and Smart Grid (ICAIS'19) - - Regular & Short Papers
- CoCoNet-S7.1 14:40 A Comparative Study of Fuzzy Logic and WQI for Groundwater Quality Assessment
- CoCoNet-S7.2 14:55 Influence of Gate Dielectrics on Electrical Characterization of ZnO Schottky Thin Film Transistor
- CoCoNet-S7.3 15:10 Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review
- CoCoNet-S7.4 15:25 Design and Development of Spherical Spy Robot for Surveillance Operation
- CoCoNet-S7.5 15:40 A Novel Controller of Multi-Agent System Navigation and Obstacle Avoidance
- CoCoNet-S7.6 15:55 Design and Real Time Implementation of Fmincon MOGA Tuned IO-PID and FO-PI^λ D^μ Controllers for Stabilization of TRMS
- CoCoNet-S7.7 16:10 Linear Quadratic Optimal Control Problem of Fractional Order Continuous - Time Singular System
- CoCoNet-S7.8 16:25 Technological Implication and Its Impact in Agricultural Sector: An IoT Based Collaboration Framework
- CoCoNet-S7.9 16:40 Proximity-Aware Worker Preferred Task Allocation for Spatial Crowdsourcing
- CoCoNet-S7.10 16:55 A Multi-Temporal Landsat Data Analysis for Land-use/Land-cover Change in Haridwar Region Using Remote Sensing Techniques
- CoCoNet-S7.11 17:10 Active Infrared Imaging for Estimation of Sub-Surface Features in a Steel Material
- CoCoNet-S7.12 17:25 Forecasting Air Pollution Particulate Matter (PM 2.5) Using Machine Learning Regression Models
- CoCoNet-S7.13 17:40 Computational Method Based on Reflection Operator for Solving a Class of Fractional Optimal Control Problem
- CoCoNet-S7.14 17:55 Optimization Strategy of Bio-Inspired Metaheuristic Algorithms Tuned PID Controller for PMBDC Actuated Robotic Manipulator
- CoCoNet-S7.15 18:10 Design and Fabrication of SHRALA: Social Humanoid Robot Based on Autonomous Learning Algorithm
CoCoNet-S8: CoCoNet-S8: Third Symposium on Recent Advances in Communication Theory, Information Theory, Antennas and Propagation (CIAP'19) - Regular & Short Papers
- CoCoNet-S8.1 14:40 Search Radius Setting and Updation for Sphere Decoder for MIMO Systems
- CoCoNet-S8.2 14:55 Novel Approach for Center Frequency and Bandwidth Tuning in Multimode Resonator Based Microstrip Dual-Mode Bandpass Filter
- CoCoNet-S8.3 15:10 Novel Watermarking Technique Using Encryption Steganography, Chaotic Logistic Map and Multiple Embedding
- CoCoNet-S8.4 15:25 Omega Shaped Complementary Split Ring Resonator Loaded Bandwidth Reconfigurable Antenna for Cognitive Radio Applications
- CoCoNet-S8.5 15:40 Prediction Mechanism - A Novel Approach for over Load Management in a Distributed Computing System
- CoCoNet-S8.6 15:55 Joint Beamforming with Speed Sensitive Relay Selection for Future Wireless Generation MIMO Networks
- CoCoNet-S8.7 16:10 Highly Isolated Inset-Feed 28 GHz MIMO-antenna Array for 5G Wireless Application
- CoCoNet-S8.8 16:25 Inset Fed Miniaturized Antenna with Defected Ground Plane for LoRa Applications
- CoCoNet-S8.9 16:40 Error-Rate Performance of Coded System for MC-IDMA Using Spatial Diversity in Cognitive Spectrum
- CoCoNet-S8.10 16:55 Simulation of Pathological ECG Signal Using Transform Method
- CoCoNet-S8.11 17:10 Microstrip Patch Antenna Design for Fixed Mobile and Satellite 5G Communications
- CoCoNet-S8.12 17:25 A Novel Multiband Microstrip Patch Antenna for 5G Communications
- CoCoNet-S8.13 17:40 A Novel Analytical OFDM Modulation Framework Using Wavelet Transform with Window Function in the Hilbert Space
Thursday, December 19 14:40 - 18:15
CoCoNet-S9: CoCoNet-S9: Main Track - Cloud/Edge/Fog Computing/Wireless Communications (Short Papers)
- CoCoNet-S9.1 14:40 A Multipath Packet Scheduling Approach Based on Buffer Acknowledgement for Congestion Control
- CoCoNet-S9.2 14:55 Metaheuristic Approach to Optimal Pathfinding in Wireless Charging of Sensor Nodes Using Autonomous Bots
- CoCoNet-S9.3 15:10 Critical Routers Identification to Handle Distribution Fiber Failure in Wireless Optical Broadband Access Network (WOBAN)
- CoCoNet-S9.4 15:25 Minimum Pearson Distance Based Detection for MIMO Systems
- CoCoNet-S9.5 15:40 A Cross-Layer Routing Metric with Link Prediction in Wireless Mesh Networks
- CoCoNet-S9.6 15:55 Data Aggregation Using Compressive Sensing for Energy Efficient Routing Strategy
- CoCoNet-S9.7 16:10 OFDM Based RADAR-Communication System Development
- CoCoNet-S9.8 16:25 SDVADC: Secure Deduplication and Virtual Auditing of Data in Cloud
- CoCoNet-S9.9 16:40 Modified Min Sum Decoding Algorithm for Low Density Parity Check Codes
- CoCoNet-S9.10 16:55 Performance Analysis of SWIPT in Multi-Hop Wireless Sensor Network
- CoCoNet-S9.11 17:10 De-Noising Scheme for VLC-Based V2V Systems A Machine Learning Approach
- CoCoNet-S9.12 17:25 A Hybrid Link Reliability Model for Estimating Path Reliability of Mobile Ad Hoc Network
- CoCoNet-S9.13 17:40 Claims-Based VM Authorization on OpenStack Private Cloud Using Blockchain
- CoCoNet-S9.14 17:55 Pilot Interpolation Based Channel Estimation for LTE Systems
- CoCoNet-S9.15 18:10 Machine Learning Approach on Traffic Congestion Monitoring System in Internet of Vehicles
- CoCoNet-S9.16 18:25 Neural Net Time Series Forecasting Framework for Time-Aware Web Services Recommendation
Thursday, December 19 14:40 - 18:00
ISTA-03: ISTA-03: Intelligent Techniques for IoT/Sensor Networks/Distributed Computing/Security
- ISTA-03.1 14:40 A Flattened Architecture for Distributed Mobility Management in IPv6 Networks
- ISTA-03.2 14:58 Intelligent Autonomous Navigation System for UAV in Randomly Changing Environmental Conditions
- ISTA-03.3 15:16 An Optimal Data Storage Hosting Model Using Sugeno-Type Fuzzy Inference System for Multi-Cloud Environments
- ISTA-03.4 15:34 An Intelligent Low Power Consumption Routing Protocol to Extend the Lifetime of Wireless Sensor Networks Based on Fuzzy C-Means++ Clustering Algorithm
- ISTA-03.5 15:52 Multi-Biometric Cryptosystem Using Graph for Secure Cloud Authentication
- ISTA-03.6 16:10 Combination of Neural Network and Advanced Encryption and Decryption Technique is Used for Digital Image Watermarking
- ISTA-03.7 16:28 Homomorphic Encryption Approach for Exploration of Sensitive Information Retrieval
- ISTA-03.8 16:46 Energy Measure Cluster Based Concealed Aggregation for Confidentiality and Integrity in WSN
- ISTA-03.9 17:04 A Preliminary Investigation into Automatically Evolving Computer Viruses Using Evolutionary Algorithms
- ISTA-03.10 17:22 Krill Herd Based TSP Approach for Mobile Sink Path Optimization in Large Scale Wireless Sensor Networks
- ISTA-03.11 17:40 Nonce Reuse/Misuse Resistance Authentication Encryption Schemes for Modern TLS Cipher Suites and QUIC Based Web Servers
- ISTA-03.12 17:58 Towards Minimizing Delay and Energy Consumption in Vehicular Fog Computing (VFC)
Thursday, December 19 14:40 - 18:15
ISTA-04: ISTA-04: Intelligent Tools and Techniques and Applications
- ISTA-04.1 14:40 Trends in Chaos and Instability for Understanding System Complexity
- ISTA-04.2 14:55 A New Parallel Galactic Swarm Optimization Algorithm for Training Artificial Neural Networks
- ISTA-04.3 15:10 An Orthogonal Moth Flame Optimization for Global Optimization and Application to Model Order Reduction Problem
- ISTA-04.4 15:25 Link Prediction Model Based on Geodesic Distance Measure Using Various Machine Learning Classification Models
- ISTA-04.5 15:40 Automated Genre-based Multi-domain Sentiment Lexicon Adaptation Using Unlabeled Data
- ISTA-04.6 15:55 An Improved MVO Assisted Global MPPT Algorithm for Partially Shaded PV System
- ISTA-04.7 16:10 Hypnotic Computer Interface (hypCI) Using GEORGIE: An Approach to Design Discrete Voice User Interfaces
- ISTA-04.8 16:25 A Fully Convolutional Neural Network Approach for the Localization of Optic Disc in Retinopathy of Prematurity Diagnosis
- ISTA-04.9 16:40 Extractive Multi-Document Summarization Using Relative Redundancy and Coherence Scores
- ISTA-04.10 16:55 Solving Word Sense Disambiguation Problem Using Combinatorial PSO
- ISTA-04.11 17:10 Oppositional Spotted Hyena Optimizer with Mutation Operator for Global Optimization and Application in Training Wavelet Neural Network
- ISTA-04.12 17:25 Enhancement of Hydrophone Sensitivity by Varying Mandrel Parameters for Detection of Acoustic Waves in Underwater Environment
- ISTA-04.13 17:40 Brain Computer Interface for Measuring the Impact of Yoga on Concentration Levels in Engineering Students
- ISTA-04.14 17:55 Intelligent Gaze Tracking Approach for Trail Making Test
- ISTA-04.15 18:10 Nonlinear Fractional Order PID Controller for Tracking Maximum Power in Photo-Voltaic System
- ISTA-04.16 18:25 A High Payload Separable Reversible Data Hiding in Cipher Image with Good Decipher Image Quality
SIRS-02: SIRS-02: Intelligent Recognition Techniques and Applications
- 14:40 Voice Controlled Media Player: A Use Case to Demonstrate an On-Premise Speech Command Recognition System
- 14:55 A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm
- 15:10 Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
- 15:25 Efficient Traffic Signboard Recognition System Using Convolutional Networks
- 15:40 Modeling Vehicle Fall Detection Event Using Internet of Things
- 15:55 A Chronic Psychiatric Disorder Detection Using Ensemble Classification
- 16:10 Development of a Novel Database in Gujarati Language for Spoken Digits Classification
- 16:25 Indian Semi-Acted Facial Expression (iSAFE) Dataset for Human Emotions Recognition
- 16:40 Artificial Intelligence Enabled Online Non-Intrusive Load Monitoring Embedded in Smart Plugs
- 16:55 Using Evaluation Data Analytics in Environmental Education Projects
- 17:10 User Recognition Using Cognitive Psychology Based Behavior Modeling in Online Social Networks
SSCC-02: SSCC-02: System and Application Security/Cryptosystems, Algorithms
- SSCC-02.1 14:40 Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks
- SSCC-02.2 14:55 Secure Authentication Using One Time Contextual QR Code
- SSCC-02.3 15:10 Malware Detection in Android Applications Using Integrated Static Features
- SSCC-02.4 15:25 Braille Based Steganography System Using Dynamic Key Exchange
- SSCC-02.5 15:40 Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification
- SSCC-02.6 15:55 Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions
- SSCC-02.7 16:10 Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage
- SSCC-02.8 16:25 On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics
- SSCC-02.9 16:40 Realization of Re-Configurable True Random Number Generator on FPGA
- SSCC-02.10 16:55 Towards Privacy-Preserving Dummy Generation in Location-Based Services
Thursday, December 19 14:45 - 18:00
Tutorial: Social Engineering: Exploiting the Weakest Link
Abstract: "Social Engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information." In other words, tricking the human mind to steal confidential information. A famous quote says ‘A chain is only as strong as its weakest link'. The weakest link in any security system is the ‘human being'. Recent trends show that most of the cyber-attacks begin with social engineering tactics. Phishing is one of the popular types of Social Engineering attacks. The valuable and sensitive information is captured via social engineering attacks and by using that information, the cybercriminals destroy the larger cyber ecosystem. Nowadays, financial frauds are using social engineering methods to steal bank related confidential information. The rate of these type of crimes also increased in recent years. There are a number of tools and techniques available to assist the social engineering attacks and it has became very easy for anyone to perform a social engineering attack. As these methods use the human mind exploitation, the technical controls to prevent those attacks are not much effective. However, there are various prevention mechanisms available in the cyber world. The banks are providing various options to protect their customers against money loss by financial frauds. A combination of technical controls and best practices would help to prevent the social engineering attacks to a great extent.
Thursday, December 19 14:45 - 17:45
Tutorial: Tutorial / Hands-on Workshop on Bayesian Optimization
Abstract: Bayesian Optimization is a derivative free optimization approach for global optimization of an expensive black-box function and creates a surrogate model of the black-box objective function and finds the optimum of an unknown objective function from which samples can be obtained. It is a class of sequential-model based optimization algorithms that uses past evaluations of the function to find the next point to sample. Since the objective function is unknown, according to Bayesian theory the function is treated as random and a prior belief is placed over the function values, and as more values are observed, the posterior is updated based on the observation likelihood. These models use different types of acquisition functions to determine the next point to be evaluated based on the current posterior distribution over functions.
Outline including a short summary of every section:
- First half- talk on Bayesian Optimization
An introduction to Optimization techniques, followed by an introduction and necessity of Bayesian Optimization to practical problems will be covered. In continuation, with an explanation of Gaussian Processes, several acquisition functions, the working of Bayesian Optimization will be covered and conclude with some practical applications of Bayesian optimization such as for astrophysics and automotive design.
2. Second half - Hands-on Bayesian Optimization (participants are expected to bring their laptops on Linux platform with Python 2.7 or its later version).
Hands-on Bayesian Optimization will be handled on the Python environment in which examples of the derivative-free optimization will be dealt with.
Length of the tutorial - 3 hrs
Thursday, December 19 15:30 - 17:00
CoCoNet-S13: CoCoNet-S13: Poster Paper Session-B
- CoCoNet-S13.1 Data Hiding Technique Based on NFC-Enabled Smartphones
- CoCoNet-S13.2 Lessons Learned from Deploying Crowdsourced Technology for Disaster Relief During Kerala Floods
- CoCoNet-S13.3 A Survey to Analyze Routing Algorithms for Opportunistic Network
- CoCoNet-S13.4 Enhancements to Content Caching Using Weighted Greedy Caching Algorithm in Information Centric Networking
- CoCoNet-S13.5 Kaldi Recipe in Hindi for Word Level Recognition and Phoneme Level Transcription
- CoCoNet-S13.6 A Deep Convolutional Neural Network Approach for Static Hand Gesture Recognition
- CoCoNet-S13.7 An Enhanced Agricultural Data Mining Technique for Dynamic Soil Texture Prediction
- CoCoNet-S13.8 Anveshan - A Model for Search
- CoCoNet-S13.9 Building a Intrusion Detection System for IoT Environment Using Machine Learning Techniques
- CoCoNet-S13.10 Classification and Grading of Okra-Ladies Finger Using Deep Learning
- CoCoNet-S13.11 Remote Sensing Image Registration Methodology: Review and Discussion
- CoCoNet-S13.12 Automatic Source Code Documentation Using Code Summarization Technique of NLP
- CoCoNet-S13.13 Deploying a Web-based Electroencephalography Data Analysis Virtual Laboratory
- CoCoNet-S13.14 Learning Adaptable Approach to Classify Sentiment with Incremental Datasets
- CoCoNet-S13.15 Creating Common Object in Context (COCO) Dataset for Laboratory Apparatus
- CoCoNet-S13.16 Fooling the Master: Exploiting Weaknesses in the Modbus Protocol
- CoCoNet-S13.17 A Performance Based Comparative Study on the Modified Version of Empirical Mode Decomposition with Traditional Empirical Mode Decomposition
- CoCoNet-S13.18 Road Traffic Outlier Detection Technique Based on Linear Regression
- CoCoNet-S13.19 Design and Development of a Low Cost CNC Alternative SCARA Robotic Arm
Thursday, December 19 16:00 - 17:00
Tea Break
Thursday, December 19 16:00 - 18:00
Lightning Talks
Policing Cyber Security in a Distributed World-A Role for Local Law Enforcement (Michael Losavio, University of Louisville)
A requisite for framing an optimum network structure (Anne Dickson, Mar Baselios College of Engg & Technology)
Deep Learning and Cancer (Sindhuja.M, Rajalakshmi Engineering College)
Mobile Phone-Based Drinking Water Nitrate Monitoring (Darsana S., College of Engineering, Chengannur)
U-COSFIRE lters for vessel tortuosity quantication with application to automated diagnosis of retinopathy of prematurity (Siva Kumar R, College of Engineering Trivandrum)
Security at Physical Layer in Wireless Network with Cooperative Jamming (Shashibhushan Sharma, National Institute of Technology, Durgapur)
Sociology, Models and Computing (Prakash Hegade, KLE Technological University, Hubballi)
Heart and Lung Sounds Analysis for Diagnostic Purpose ( Madhusudhan Mishra, North Eastern Regional Institute of Science and Technology, Arunachal Pradesh)
Communication using IoT Architecture in Marine Environment (P Karthik, K S School of Engineering and Management)
IoT based Cognitive Video Analytics for Crowd Anomaly Detection (Elizabeth B Varghese, IIITM-K)
Thursday, December 19 18:15 - 20:15
Cultural Events followed by Banquet Dinner
Friday, December 20
Friday, December 20 8:30 - 12:30
Registration
Friday, December 20 9:30 - 10:40
Keynote: Artificial Intelligence and Machine Learning for 5G Wireless Networks
Abstract: 5G technology is making rapid advances and introducing new challenges in mobile communications. Artificial Intelligence (AI) and Machine learning (ML) techniques are opening up new opportunities in the mobile communications area, as these techniques can be used to personalize user experience while reducing the cost of network deployment and maintenance.
In this talk, a brief introduction to the features of 5G wireless networks will be presented first in comparison to earlier versions like 3/4 G wireless networks. Key infrastructure aspects and enabling technologies driving the 5G revolution will then be discussed. Typical methods to develop AI/ML powered 5G networks which are context-aware and have cognitive abilities will be discussed along with a list of research issues in this exciting technology domain. A brief description of how state of the art techniques like AR/VR are driving 5G network limits will also be presented. The talk will conclude by providing pointers and insights to signal processing researchers on how they can contribute to this exciting area.
Friday, December 20 10:40 - 11:00
Tea Break
Friday, December 20 11:00 - 12:00
Keynote: Four Decades of HPC: Architectures, Programming Environments, Systems, and Applications
Abstract: High-performance computing (HPC) impacts every aspect of scientific endeavor. In this talk, I will cover various HPC problems and applications over four decades from my journey in academia and industry. These include new multi-(many) core processors and interconnection networks, parallelizing compilers for non-uniform dependences, OpenMP for heterogeneous processors, Virtual Machines for HPC, multi-threaded embedded operating systems, accelerating bioinformatics algorithms using FPGAs and GPUs, hyper-converged computer systems and variable redundancy for flash storage arrays, and machine learning. I will describe applications of HPC in surgery and medical diagnosis and the future challenges in HPC.
Friday, December 20 12:00 - 13:00
Keynote: Denial of Service Attacks on Software-Defined Networks
Abstract: Software-defined networking facilitates better network management by decoupling the data and control planes of legacy routers and switches and is widely adopted in the data center and production networks. The decoupling of control and data planes facilitates more optimal network management and deployment of elaborate security mechanisms but also introduces new vulnerabilities that could be exploited using distributed denial of service (DDoS) attacks. This talk presents several protocol vulnerabilities and resource limitations that are exploited by DDoS attacks. Often, techniques mitigate these attacks change the attack surface, which can lead to new vulnerabilities exploitable by new DDoS attacks. Several examples of new vulnerabilities introduced by DDoS mitigation schemes are presented with potential attacks to exploit them. The talk concludes with some guidelines on designing DDoS attack mitigation schemes that minimize the introduction of new vulnerabilities.
Friday, December 20 13:00 - 13:40
Lunch Break
Friday, December 20 13:40 - 14:30
WCI Keynote: Security of Quantum Cryptography
Abstract: Quantum cryptography is one of the most mature areas of quantum information. In the past few decades, active research took place towards standardizing quantum key distribution. This resulted in the hardening of theoretical proofs for a robust implementation against realistic attacks on QKD system which was executed by exploiting the security loopholes. On one hand, many hacking strategies of the source, link, and detection system have been demonstrated. This paved the way for the development of robust engineering QKD products. The emphasis of this paper is twofold, on one hand it brings forth the newer security techniques paving way for information-theoretic security proofs of comparatively newer QKD protocols leading to high QKD performance for market deployment, on the other hand, it discusses the recent quantum hacking on different QKD systems which have led to the strengthening of the QKD system and enabled active monitoring against possible eavesdropping activities.
Friday, December 20 14:00 - 17:00
Tutorial: CAN Network Development Program
Abstract: Controller Area Network (CAN) is a serial asynchronous communication protocol. It is the most widely used protocol in the automotive sector, mainly because of its robustness. Its error handling mechanism and fault confinement feature made it best suited for the vehicular communication between the ECU. Messaged based communication feature of CAN provides flexibility to connect ‘n' number of nodes to the network without any changes in the hardware. Since the address is not involved in the frame transmission, by default, it becomes broadcast kind of communication protocol. CAN bus is very less immune to noise because it has adopted the differential voltage concept. The protocol is supplemented with invaluable features that make the OEMs and suppliers of ECUs prefer the CAN protocol. The proposed workshop focuses on building CAN network using cortex- m3 and analyzing the CAN bus data using advanced automotive tools. The workshop covers the theoretical background of CAN protocol, operation, developing C-code for transmitting and receiving CAN Data and its applications in the automotive and other industries.
Tutorial: Complex Networks: A Networking Perspective
Abstract: An abstract model of any complex physical system gives rise to a complex network model. Networks obtained by modeling complex systems result in a complex interconnection of nodes (vertices) by edges (links or arcs). The study of complex networks, also known as network science, is important due to the fact that complex networks appear in many aspects of our life such as biological networks, molecular networks, social networks, transportation networks, electric power grids, communication networks, and the Internet. In fact, most physical and biological systems often behave as complex networks of subsystems and connectivities among them. Therefore, complex network modeling spans a large number of natural as well as man-made networks. Further, there has been an evolution of Big Data in the form of large scale networks arising from social networks, biological networks, computer networks, and the Internet. This tutorial is an effort toward understanding the networking aspect of complex networks and discuss the current state of research as well as the open research issues.
Friday, December 20 14:40 - 18:30
CoCoNet-S14: CoCoNet-S14:Symposium on Multimedia, Visualization and Human-Computer Interaction (SMVH'19) - Regular & Short Papers
- CoCoNet-S14.1 14:40 Adaptive Switching Weight Mean Filter for Salt and Pepper Image Denoising
- CoCoNet-S14.2 14:55 Solving the 3D Schrödinger Equation on a GPU
- CoCoNet-S14.3 15:10 Multi-Oriented Text Detection in Natural Scene Images Based on the Intersection of MSER with the Locally Binarized Image
- CoCoNet-S14.4 15:25 A Novel Texture Classification Scheme Based on Completed Multiple Adaptive Threshold Patterns
- CoCoNet-S14.5 15:40 Computational Analysis of Cortical EEG Biosignals and Neural Dynamics Underlying an Integrated Mind-Body Relaxation Technique
- CoCoNet-S14.6 15:55 Human Crowd Detection for City Wide Surveillance
- CoCoNet-S14.7 16:10 Computationally Efficient Intra and Inter Mode Decision in H.264/AVC
- CoCoNet-S14.8 16:25 F-test Feature Selection in Stacking Ensemble Model for Breast Cancer Prediction
- CoCoNet-S14.9 16:40 Autoencoders Based Deep Learner for Image Denoising
- CoCoNet-S14.10 16:55 VRNFC-Stego: Data Hiding Technique Based on VR Images and NFC-Enabled Smartphones
- CoCoNet-S14.11 17:10 Comparative Analysis of Convolution Neural Network Models for Continuous Indian Sign Language Classification
- CoCoNet-S14.12 17:25 Deployment Experiences with Amrita Kripa: A User-Friendly Feature Rich Crowdsourced Humanitarian Application
- CoCoNet-S14.13 17:40 Deep Self-Attention Network for Facial Emotion Recognition
- CoCoNet-S14.14 17:55 Analysis of CT Images for Detection of Colorectal Cancers Using Hybrid Artificial Neural Networks and Fire Fly Algorithm
- CoCoNet-S14.15 18:10 Image Forgery Detection Based on Statistical Features of Block DCT Coefficients
CoCoNet-S15: CoCoNet-S15:Fourth Symposium on Advances in Applied Informatics (SAI'19)- Regular & Short Papers
- CoCoNet-S15.1 14:40 Shallow and Deep Learning Approaches for Network Intrusion Alert Prediction
- CoCoNet-S15.2 14:55 Malicious Domain Detection Using Machine Learning on Domain Name Features, Host-Based Features and Web-Based Features
- CoCoNet-S15.3 15:10 Classification of ECG Heartbeat Arrhythmia: A Review
- CoCoNet-S15.4 15:25 Innovative Methods of Air Pollution Exposure Assessment for Environmental Safety
- CoCoNet-S15.5 15:40 Identification of Influential Spreaders in Social Networks Using Improved Hybrid Rank Method
- CoCoNet-S15.6 15:55 Modeling Information Diffusion in Online Social Networks Using SEI Epidemic Model
- CoCoNet-S15.7 16:10 The Use of Mobile Devices in International Management Communication: Current Situation and Future Trends of Managerial Communication
- CoCoNet-S15.8 16:25 GARCH Model Identification for Stock Crises Events
- CoCoNet-S15.9 16:40 CLadron:: AI Assisted Device for Identifying Artificially Ripened Climacteric Fruits
- CoCoNet-S15.10 16:55 Vision Based Detection and Categorization of Skin Lesions Using Deep Learning Neural Networks
- CoCoNet-S15.11 17:10 Securing Land Registration Using Blockchain
- CoCoNet-S15.12 17:25 Optimal Detection of Phising Attack Using SCA Based K-NN
- CoCoNet-S15.13 17:40 A Novel Image Compression Based Method for Multispectral Fingerprint Biometric System
- CoCoNet-S15.14 17:55 Grouping of Distributed Data at Multiple Sites by Sustaining the Privacy of Data
- CoCoNet-S15.15 18:10 Fog Computing, Edge Computing and a Return to Privacy and Personal Autonomy
- CoCoNet-S15.16 18:25 A Comparative Study of Location Privacy Preservation in the Internet of Things
- CoCoNet-S15.17 18:40 Predictive Analytics in Agriculture: Forecasting Prices of Arecanuts in Kerala
Friday, December 20 14:40 - 18:00
CoCoNet-S16: CoCoNet-S16: Seventh International Symposium on Women in Computing and Informatics (WCI'19)
- CoCoNet-S16.1 14:40 Trends and Challenges in Measuring Performance of Reviewer Paper Assignment
- CoCoNet-S16.2 14:55 Securing Wireless Sensors in Military Applications Through Resilient Authentication Mechanism
- CoCoNet-S16.3 15:10 Mapping of Real World Problems to Nature Inspired Algorithm Using Goal Based Classification and TRIZ
- CoCoNet-S16.4 15:25 Detection of Hate Speech Text in Hindi-English Code-mixed Data
- CoCoNet-S16.5 15:40 Modelling and Intelligent Control of Micro PMBLDC for Surgical Robotic Applications
- CoCoNet-S16.6 15:55 Clustering the Biological Networks Using Shortest Path
- CoCoNet-S16.7 16:10 Enterprise Applications Re Imagined- Cloud Abridges Mystery of Mobile Offline Working
- CoCoNet-S16.8 16:25 Near Real-time Crowd Counting Using Deep Learning Approach
- CoCoNet-S16.9 16:40 Siam-IDS: Handling Class Imbalance Problem in Intrusion Detection Systems Using Siamese Neural Network
- CoCoNet-S16.10 16:55 Smart Contract Based Central Sector Scheme of Scholarship for College and University Students
- CoCoNet-S16.11 17:10 Implementation of Linux Optimization Technique for ARM Based System on Chip
- CoCoNet-S16.12 17:25 Dynamics of a Neural Mass Coupled with Probabilistic Distributions-A Pilot Study
- CoCoNet-S16.13 17:40 IoT Based Indoor Air Quality and Smart Energy Management for HVAC System
- CoCoNet-S16.14 17:55 Network Steganography Using the Overflow Field of Timestamp Option in an IPv4 Packet
- CoCoNet-S16.15 18:10 A Multi Objective Enhancement Technique for Poor Contrast Magnetic Resonance Images of Brain Gliomablastomas
CoCoNet-S17: CoCoNet-S17: Symposium on Emerging Topics in Computing and Communications (SETCAC'19)- Regular & Short Papers
- CoCoNet-S17.1 14:40 A Low Latency Montgomery Modular Exponentiation
- CoCoNet-S17.2 14:55 Optimal Hybrid Precoding for Millimeter Wave Massive MIMO Systems
- CoCoNet-S17.3 15:10 Mitral Valve Leaflet Tracking in Echocardiography Using Custom Yolo3
- CoCoNet-S17.4 15:25 An Efficient Deep Learning Approach for Collaborative Filtering Recommender System
- CoCoNet-S17.5 15:40 An Efficient Image Segmentation Approach Using Superpixels with Colorization
- CoCoNet-S17.6 15:55 Protect Your Pacemaker: Blockchain Based Authentication and Consented Authorization for Implanted Medical Devices
- CoCoNet-S17.7 16:10 Emotion Recognition in Valence-Arousal Space from Multi-channel EEG Data and Wavelet Based Deep Learning Framework
- CoCoNet-S17.8 16:25 Implementation of Personnel Localization & Automation Network (PLAN) Using Internet of Things (IoT)
- CoCoNet-S17.9 16:40 Development of MultiBand MIMO Antenna with Defective Ground Structure: Review
- CoCoNet-S17.10 16:55 Computational Exploration of Neural Dynamics Underlying Music Cues Among Trained and Amateur Subjects
- CoCoNet-S17.11 17:10 A Novel Approach for Mammogram Enhancement Using Nonlinear Unsharp Masking and L0 Gradient Minimization
- CoCoNet-S17.12 17:25 IWT Based Iris Recognition for Image Authentication
- CoCoNet-S17.13 17:40 Denoising and Segmentation of Epigraphical Estampages by Multi Scale Template Matching and Connected Component Analysis
- CoCoNet-S17.14 17:55 Vehicle License Plate Transformation Using Deep Neural Network on Genesis of CPNet
- CoCoNet-S17.15 18:10 Neo-hybrid Composite Routing Metric for RPL
CoCoNet-S18: CoCoNet-S18:Main Track - Image and Signal Processing, Machine Learning and Pattern Recognition - Regular & Short Papers
- CoCoNet-S18.1 14:40 Classification and Kinetic Analysis of Healthy Gait Using Multiple Accelerometer Sensors
- CoCoNet-S18.2 14:55 Classification of Human Gait: Swing and Stance Phases Using Sum-Vector Analysis
- CoCoNet-S18.3 15:10 ReConvPy: Modeling Local Field Potentials of Cerebellum Granule Neurons Using Repetitive Convolutions in Python
- CoCoNet-S18.4 15:25 Artificial Neural Network Based Modelling and Simulation to Identify New Candidates for Hosting Skyrmions
- CoCoNet-S18.5 15:40 Performance Evaluation of Normalization Techniques in Adverse Conditions
- CoCoNet-S18.6 15:55 Computational Modeling of Convergent Mechanisms in Alzheimer's and Parkinson's Disease with Insulin Signaling Using Biochemical Systems Theory
- CoCoNet-S18.7 16:10 Mathematical Modeling of fMRI BOLD Responses Related Nitric Oxide Production-Consumption and in the Cerebellum Granule Layer
- CoCoNet-S18.8 16:25 Tree Census Using Circular Hough Transform and GRVI
- CoCoNet-S18.9 16:40 Computational Analysis of EEG Activity During Stance and Swing Gait Phases
- CoCoNet-S18.10 16:55 Low-Complexity High-Performance Deep Learning Model for Real-Time Low-Cost Embedded Fire Detection Systems
- CoCoNet-S18.11 17:10 Transition Region Based Approach for Skin Lesion Segmentation
- CoCoNet-S18.12 17:25 Modified LDA Approach for Cluster Based Gene Classification Using k-Mean Method
CoCoNet-S19A: CoCoNet-S19A: Symposium on Signal Processing for Wireless and Multimedia Communications (SPWMC'19)
- CoCoNet-S19A.1 14:40 On the Analysis of HEVC Intra Prediction Mode Decision Variants
- CoCoNet-S19A.2 14:55 Dynamic Management of Traffic Signals Through Social IoT
- CoCoNet-S19A.3 15:10 Hierarchical Convolutional Neural Network for Handwritten Digits Recognition
- CoCoNet-S19A.4 15:25 A Novel and Efficient Automatic Hyper-spectral Image Registration Technique
- CoCoNet-S19A.5 15:40 Self-Explanatory Interface: Embedding Visual and Aural Syntax to Improve Usability
- CoCoNet-S19A.6 15:55 Associative Filters and Associative Pseudofilters of Residuated Lattices in Multiset Context
- CoCoNet-S19A.7 16:10 GARCH-Model Identification Based on Performance of Information Criteria
- CoCoNet-S19A.8 16:25 Comparative Study of Two Divide and Conquer Sorting Algorithms: Quicksort and Mergesort
- CoCoNet-S19A.9 16:40 Design of a Good Oscillation Frequency and Moderate Phase Noise Current Mirror VCO
- CoCoNet-S19A.10 16:55 IoT-based Indoor Occupancy Estimation Using Edge Computing
- CoCoNet-S19A.11 17:10 Increasing Efficiency of Sensor Nodes by Clustering in Section Based Hybrid Routing Protocol with Artificial Bee Colony
- CoCoNet-S19A.12 17:25 Mobility and QoS Based Cross Network for ICN Vehicular Communication
CoCoNet-S19B: CoCoNet-S19B: Symposium on Signal Processing for Wireless and Multimedia Communications (SPWMC'19)
- 14:40 An Approach for Unattended Object Detection Through Contour Formation Using Background Subtraction
- 14:55 Switch Open-circuit Fault Diagnosis and Fault-Tolerant Control for Boost DC-DC Converter
- 15:10 Underwater Image Enhancement Based on Histogram Manipulation and Multiscale Fusion
- 15:25 Assessment of Anxiety, Depression and Stress Using Machine Learning Models
- 15:40 Visual Speech Recognition Using Fusion of Motion and Geometric Features
- 15:55 Performance of Quasi Oppositional Butterfly Optimization Algorithm for Cluster Head Selection in WSNs
- 16:10 Chest X-Ray Image Denoising Using Nesterov Optimization Method with Total Variation Regularization
- 16:25 A Secure and Lightweight Authentication Protocol for Mobile User Preserving Privacy in Global Mobility Networks
- 16:40 A Mechanism for Air Health Monitoring in Smart City Using Context Aware Computing
- 16:55 An Improved Reversible Data Hiding Through Encryption Scheme with Block Prechecking
- 17:10 A Novel Location Aware Content Prefetching Technique for Mobile Adhoc Network
- 17:25 Design of a Novel Dual Band Printed Antenna for Future Mobile Applications
ISTA-05: ISTA-05: Intelligent Image Processing /Artificial Vision/Speech Processing/Pattern Recognition (Regular and Short Papers)
- ISTA-05.1 14:40 A Layered Approach to Detect Elephants in Live Surveillance Video Streams Using Convolution Neural Networks
- ISTA-05.2 14:55 Residual and Ensemble Learning on Locally Derived Features for Face Recognition
- ISTA-05.3 15:10 Steganalysis of Reversible Data Hiding in Color Image Using Grayscale Invariance
- ISTA-05.4 15:25 A Meta-Heuristic Model Based Computational Intelligence in Exploration and Classification of Autism in Children
- ISTA-05.5 15:40 RIGGU: A Semi-Humanoid Robot Platform for Speech and Image Recognition
- ISTA-05.6 15:55 Emotion Recognition from Facial Expressions in Children and Adults Using Deep Neural Network
- ISTA-05.7 16:10 Handwritten English Character Recognition Using Swarm Intelligence and Neural Network
- ISTA-05.8 16:25 Deep Learning Based Automatic Classification of Slide Frames and Presenter Frames
ISTA-06: ISTA-06: Intelligent Techniques, Tools and Applications (Regular and Short Papers)
- ISTA-06.1 14:40 Blockchain-based Decentralized and Secure Light Weight E-health System for Electronic Health Records
- ISTA-06.2 14:55 Biological Inheritance on Fuzzy Hyperlattice Ordered Group
- ISTA-06.3 15:10 Interpreting Microgrid Reliability Using RBD-quantitative Approaches
- ISTA-06.4 15:25 Soft Computing Approach to Determine Students' Level of Comprehension Using a Mamdani Fuzzy System
- ISTA-06.5 15:40 Survey on LoRa Technology: Solution for Internet of Things
- ISTA-06.6 15:55 A Novel Publicly Delegable Secure Outsourcing Algorithm for Large-Scale Matrix Multiplication
- ISTA-06.7 16:10 Extractive Single Document Summarization Using NSGA-II
- ISTA-06.8 16:25 Exploring the Potential of Virtual Reality in Fire Training Research Using A'WOT Hybrid Method
- ISTA-06.9 16:40 Application of Coverage Path Planning Algorithm for Milling Operations
- ISTA-06.10 16:55 A Novel Lightweight Authentication for Intelligent Energy Monitoring in Smart Home
- ISTA-06.11 17:10 A Real-Time IoT Based Nitrate Sensing System Using Interdigital Transducer
- ISTA-06.12 17:25 A Task Parallel Programming Framework Based on Heterogeneous Computing Platforms
- ISTA-06.13 17:40 Analyzing Architectures of Reservoir Computing Models Using Particle Swarm Intelligence
SIRS-03: SIRS-03: Signal Processing
- 14:40 Data Aggregation Using Distributed Compressive Sensing in WSNs
- 14:55 Comparison of Noninvasive Blood Glucose Estimation Using Various Regression Models
- 15:10 Channel Estimation Using Adaptive Cuckoo Search Based Wiener Filter
- 15:25 Down Link:: Error-rate Performance of Cognitive D-STTD MC-IDMA System
- 15:40 SVD Diagonal Matrix Reconstruction Using OMP
- 15:55 Recurrence Network-Based Approach to Distinguish Between Chaotic and Quasiperiodic Solution
- 16:10 Non Linear Analysis of the Effect of Stimulation on Epileptic Signals Generated at Right Hippocampus
- 16:25 An Approach for Color Retinal Image Enhancement Using Linearly Quantile Separated Histogram Equalization and DCT Based Local Contrast Enhancement
- 16:40 What are 3GPP 5G Phase 1 and 2 and What Comes After
- 16:55 A Modified Approach for the Removal of Impulse Noise from Mammogram Images
- 17:10 Distributed Detection of a Non-cooperative Target with Multiplicative Fading
SoMMA-02: SoMMA-02: Symposium on Machine Learning and Metaheuristics Algorithms, and Applications
- SoMMA-02.1 14:40 Comparison of Metaheuristics for a Vehicle Routing Problem in a Farming Community
- SoMMA-02.2 14:58 Early Detection of Suicidal Predilection on Instagram Social Networking Service
- SoMMA-02.3 15:16 Comparison of Metaheuristics for the Allocation of Resources for an After-School Program in Remote Areas of India
- SoMMA-02.4 15:34 Stock Market Prediction Using a Hybrid Model
- SoMMA-02.5 15:52 An Internet of Things Framework to Forecast Indoor Air Quality Using Machine Learning
- SoMMA-02.6 16:10 An Efficient Word Embedded Click-Bait Classification of YouTube Titles Using SVM
- SoMMA-02.7 16:28 Steering Angle Estimation for Self-Driving Car Using Deep Learning
- SoMMA-02.8 16:46 A C-LSTM with Attention Mechanism for Question Categorization
- SoMMA-02.9 17:04 QuicklyCook: A User-Friendly Recipe Recommender
- SoMMA-02.10 17:22 Strategy Inference via Real-time Homeomorphic and Isomorphic Tree Matching of Probabilistic Graphical Models
- SoMMA-02.11 17:40 Air Quality Monitoring and Classification Using Machine Learning
SSCC-03: SSCC-03: System and Application Security/Cryptosystems, Algorithms
- SSCC-03.1 14:40 Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit
- SSCC-03.2 14:55 Detection and Analysis of Drive-by-Downloads and Malicious Websites
- SSCC-03.3 15:10 Intrusion Prediction and Detection with Deep Sequence Modeling
- SSCC-03.4 15:25 Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher
- SSCC-03.5 15:40 A Proximity-based Measure for Quantifying the Risk of Vulnerabilities
- SSCC-03.6 15:55 Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective
- SSCC-03.7 16:10 GOTCHA-I: A Multiview Human Videos Dataset
- SSCC-03.8 16:25 Exploitation of HTTP/2 Proxies for Cryptojacking
Friday, December 20 15:15 - 16:15
Birds of a Feather Sessions (BoFs)
Title for the session: New Social Paradigms from New Technologies - How to Build Novel Models of Transdisciplinary Security, Integrity and Authenticity in the Messy Human World of the Information Polity. (December 20, 2019 15.15 - 16.15 )
Organizer(s):
-- Michael Losavio, University of Louisville, USA -- Svetlana Polyakova, Perm State University, Russian Federation -- Pavel Pastukov, Perm State University, Russian Federation -- Alec Yasinsac, Professor and Dean, University of South Alabama, USA
Brief topic description:
Dissatisfaction with information security in our world of pervasive computing has led to calls for new paradigms to secure the confidentiality, integrity and authenticity of often vital information. Some paradigms represent old-style authoritarian control of information, hindering benefits for education and enlightenment. Others transfer responsibility and autonomy to individuals themselves.
This session discusses ways technologies, law and political must come together to create a coherent, beneficial regime of information security. The IBM Skills Academy Design Thinking model guides our iterative solution session on what next to do.
Friday, December 20 15:30 - 18:00
Hot Off the Press
- 15:30 Characterization of S1 and S2 Heart Sounds Using Stacked Autoencoder and Convolutional Neural Network
- 15:45 My Smartphone Kit: Design and Development of an Integrated Platform for Innovation and Product Design in Engineering Education
- 16:00 EAODBT: Efficient Auditing for Outsourced Database with Token Enforced Cloud Storage
- 16:15 Image Processing for Flame Monitoring in Power Station Boilers
- 16:30 An Optimal Multi-Level Backward Feature Subset Selection for Object Recognition
- 16:45 Novel Quality Metric for Image Super Resolution Algorithms - Super Resolution Entropy Metric(SREM)
- 17:00 Directionality Guided Non Linear Diffusion Compressed Sensing MR Image Reconstruction
- 17:15 Circular Mesh-Based Shape and Margin Descriptor for Object Detection
- 17:30 A Nature-Inspired Approach Based on Forest Fire Model for Modeling Rumor Propagation in Social Networks
- 17:45 Evaluating Color and Texture Features for Forgery Localization from Illuminant Maps
- 18:00 Vulnerability-Based Risk Assessment and Mitigation Strategies for Edge Devices in the Internet of Things
- 18:15 Social Internet of Things (SIoT): Foundations, Thrust Areas Systematic Review and Future Directions
Friday, December 20 15:30 - 17:00
CoCoNet-S20: CoCoNet-S20: Poster Paper Session-C
- CoCoNet-S20.1 Simulation and Performance Analysis of CIT Campus Network with Realistic Traffic Scenarios Using NETSIM
- CoCoNet-S20.2 Modified CSMACA Protocol for Emergency Vital Data Packet Transmission in ZigBee Enabled Hospital Centered Wireless Body Area Network
- CoCoNet-S20.3 Analysis of Surface Water Resources Using Sentinel-2 Imagery
- CoCoNet-S20.4 Analysis of Multimedia Communication Issues in the Immersive Smart Classroom System - A Control Center Approach
- CoCoNet-S20.5 Object Detection System Based on Convolution Neural Networks Using Single Shot Multi-Box Detector
- CoCoNet-S20.6 Typecasting of Microarray Data Using Machine Learning Algorithms
- CoCoNet-S20.7 Solutions to Vulnerabilities and Threats in Software Defined Networking (SDN)
- CoCoNet-S20.8 Classification of Energy Saving Techniques for IoT-based Heterogeneous Wireless Nodes
- CoCoNet-S20.9 A Novel High Q Active Inductor Design for Wireless Applications
- CoCoNet-S20.10 5G Enabled Tactile Internet for Tele-Robotic Surgery
Friday, December 20 16:00 - 17:00
Tea Break
Friday, December 20 18:00 - 18:45
WCI Panel Discussion: Challenges faced by female researchers and how to empower women professionals in Research and Academia?
Friday, December 20 18:45 - 19:00
Valedictory Function
Friday, December 20 19:00 - 19:30
High Tea
Saturday, December 21
Saturday, December 21 9:00 - 16:30
CoCoNet-S21: CoCoNet-S21: Workshop on Blockchain organised by Kerala Block Chain Academy (KBA)
Workshop Outline:
Introduction to Blockchain
History of Blockchain and Bitcoin Networks
Features of Blockchain
Cryptography in Blockchain
Consensus Protocols in Blockchain
Proof of Work
Bitcoin Mining
Ethereum Networks
Introduction to Smart Contracts & Remix IDE
Write your first smart contract using Solidity
Metamask Wallet
Workshop Page: http://coconet-conference.org/2019/?q=node/49
Program last updated on no date/time given