Technical Programme
Day 1: December 14, 2011 |
|
Inauguration Ceremony |
10:00 – 10:30 |
Keynote – I: Heinrich Voss, Hamburg University of Technology, Germany. |
10:30 – 11:30 |
Tea Break |
11:30 – 12:00 |
Session I : Networking and Its Applications |
12:00 – 13:30 |
Chandreyee Chowdhury, and Sarmistha Neogy, Reliability Estimation of Delay tolerant QoS Mobile Agent System in MANET |
|
Michal Choras, and Rafal Kozik, Network Event Correlation and Semantic Reasoning for Federated Networks Protection System |
|
Anupam Saha, and Rituparna Chaki, VAMI – A Novel architecture for Vehicular Ambient Intelligent System |
|
Subhendu Barat, Ashok Kumar Pradhan, and Tanmay De, A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network |
|
Lunch Break |
13:30 – 14:15 |
Session II: Agent-based Systems |
14:15 – 16:00 |
Plenary Lecture: Aditya Ghosh, University of Wollongong, Australia. |
14:15 – 15:00 |
Mohamed Achraf Dhouib, Lamine Bougueroua, and Katarzyna Węgrzyn-Wolska, Combination of Decision Support System (DSS) for remote healthcare monitoring using a multi-agent approach |
15:00 – 16:00 |
Debdutta Barman Roy, and Rituparna Chaki, MAHIDS: A New Mobile Agent Based Blackhole Intrusion Detection System |
|
Rakesh Kumar Mishra, Suparna Saha, Sankhayan Choudhury, and Nabendu Chaki, Agent based approach for radio resource optimization for Cellular Networks |
|
Tea Break |
16:00 – 16:15 |
Session III: Biometric Applications |
16:15 – 17:15 |
Piotr Panasiuk, and Khalid Saeed, Influence of Database Quality on the Results of Keystroke Dynamics Algorithms |
|
Jakub Karwan, and Khalid Saeed, A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech |
|
Michal Choras, and Rafal Kozik, Fast Feature Extractors for Palmprint Biometrics |
|
Cultural Programme and Welcome Reception |
18:00 – 21:00 |
Day 2: December 15, 2011 |
|
Keynote 2: Dipankar Dasgupta, University of Memphis, USA. |
09:30 – 10:15 |
Keynote 3: Young Im Cho, The University of Suwon, Korea. |
10:15 – 11:00 |
Tea Break |
11:00 – 11:15 |
Session IV: Pattern Recognition & Image Processing |
11:15 – 13:15 |
Rafal Doroz, and Piotr Porwik, Handwritten signature recognition with adaptive selection of behavioral features |
|
Kamil Surmacz, and Khalid Saeed, Robust algorithm for fingerprint identification with a simple image descriptor |
|
Arijit Sinharay, Syed Mohd Bilal, and Tanushyam Chattopadhyay, A method for unsupervised detection of the boundary of coarticulated units from isolated speech using Recurrence Plot |
|
Tomas Kocyan, Jan Martinovic, Jiri Dvorsky, and Vaclav Snasel, Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann law |
|
Soharab Hossain Shaikh, Asis Kumar Maiti, and Nabendu Chaki, On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Methods |
|
Pramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri, and Dipak Kumar Basu, Medical Aid for Automatic Detection of Malaria |
|
Lunch Break |
13:15 – 14:00 |
Keynote 4: Dong Hwa Kim, Hanbat National University, Korea. |
14:00 – 14:45 |
Session V: Industrial Applications |
14:45 – 15:45 |
Pouyeh Rezazadeh, Measuring Leanness and Agility Status of Iranians Food Industry Supply Chains Using Data Envelopment Analysis |
|
Antonio Candiello, and Agostino Cortesi, KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment |
|
Sudip Kundu, and Sriyankar Acharyya, Stochastic Local Search Aproaches in Solving the Nurse Scheduling Problem |
|
Tea Break |
15:45 – 16:00 |
Session VI: Algorithmic Applications & Data Management |
16:00 – 17:30 |
J. K. Mandal, and Somnath Mukhopadhyay, GA based Denoising of Impulses (GADI) |
|
Sangeeta Sen, and Rituparna Chaki, Handling Write Lock Assignment in Cloud Computing Environment |
|
Sundarapandian Vaidyanathan, and Sarasu Pakiriswamy, The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems |
|
Lukas Vojacek, Jan Martinovic, Jiri Dvorsky, Katerina Slaninova, and Ivo Vondrak, Parallel Hybrid SOM Learning on High Dimensional Sparse Data |
|
Abhijit Sanyal, and Sankhayan Choudhury, Operational Algebra for a Graph based Semantic Web Data Model |
|
Supriya Chakraborty, and Nabendu Chaki, A Survey on the Semi-Structured Data Models |
|
Conference Dinner |
19:00 – 22:00 |
Day 3: December 16, 2011 |
|
Session VII: Information and Network Security |
10:00 – 13:15 |
Plenary Lecture: Sushil Jajodia, George Mason Univ., Fairfax, USA |
10:00 – 10:45 |
Raju Halder, and Agostino Cortesi; Observation-based Fine Grained Access Control for XML Documents |
10:45 – 11:30 |
Subhasis Dasgupta, and Aditya Bagchi, Controlled Access over Documents for concepts having Multiple Parents in a Digital Library Ontology |
|
Tea Break |
11:30 – 11:45 |
Session VII: Information and Network Security cont… |
11:45 – 13:15 |
Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri, Secret Image Sharing with Embedded Session Key |
|
Anna M. Bartkowiak, Block and command profiles for legitimate users of a computer network |
|
Uttam Kr. Mondal, and J. K. Mandal, Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS) |
|
Riti Chowdhury, and Debashis De, Secure money transaction in NFC Enabled Mobile wallet using session based alternative cryptographic techniques |
|
Lunch Break |
13:15 – 14:15 |
Industry Presentations |
14:15 – 16:00 |