international conference on inventive communication …icicct.org/icicct-2018...

41
International Conference on Inventive Communication and Computational Technologies (ICICCT 2018) 20-21 APRIL 2018 PROGRAM SCHEDULE (Registered and accepted author(s) list) CONFERENCE DAY 1 (20 th APRIL 2018) 07.45am-8.45 am-Registration 08.45am-09.15 am-Inauguration 09.15am-10.15 am-Keynote Address 1 10.15am-10.45 am-Tea Break 10.30am-12.30 pm-Session I 12.30pm-02.00 pm-Lunch Break 01.30pm-03.30 pm-Session II 03.15pm-04.15 pm-Tea Break 03.45pm-06.00 pm-Session III CONFERENCE DAY 2 (21 th APRIL 2018) 07.30am- 08.30 am-Registration 08.30am -09.30 am-Keynote Address 2 09.30am-1.30 am-Session IV 11.15am-11.45am-Tea Break 11.30am- 01.30pm-Session V 12.30 pm-02.00 pm-Lunch break 01.45 pm -03.45 pm-Session VI 03.15 pm-04.15 pm-Tea Break 4.00 pm-6.30 pm-Session VII 6.30 pm-7.00 pm-valedictory function Presntation Time: 15 Minutes Presentation Format: Power Point Presentation (PPT)

Upload: vuongkhanh

Post on 13-May-2018

249 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

International Conference on Inventive Communication and

Computational Technologies

(ICICCT 2018)

20-21 APRIL 2018

PROGRAM SCHEDULE

(Registered and accepted author(s) list)

CONFERENCE DAY 1

(20th

APRIL 2018)

07.45am-8.45 am-Registration

08.45am-09.15 am-Inauguration

09.15am-10.15 am-Keynote Address – 1

10.15am-10.45 am-Tea Break

10.30am-12.30 pm-Session I

12.30pm-02.00 pm-Lunch Break

01.30pm-03.30 pm-Session II

03.15pm-04.15 pm-Tea Break

03.45pm-06.00 pm-Session III

CONFERENCE DAY 2

(21th

APRIL 2018)

07.30am- 08.30 am-Registration

08.30am -09.30 am-Keynote Address – 2

09.30am-1.30 am-Session IV

11.15am-11.45am-Tea Break

11.30am- 01.30pm-Session V

12.30 pm-02.00 pm-Lunch break

01.45 pm -03.45 pm-Session VI

03.15 pm-04.15 pm-Tea Break

4.00 pm-6.30 pm-Session VII

6.30 pm-7.00 pm-valedictory function

Presntation Time: 15 Minutes

Presentation Format: Power Point Presentation (PPT)

Page 2: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-I| Parallel Session-I

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1 Analysis on Periodic Web Personalization for the Efficiency of Web services

Y.Raju, D. Suresh Babu, K. Anuradha

2 Techniques to Secure Data on Cloud: Docker Swarm or Kubernetes?

Arsh Modak, S.D.Chaudhary , P.S.Paygude, S.R.Idate

3 Driver Profiling Using Realistic Racing Games

Manas Kale, M.V.Bedekar

4

FREE ENERGY GENERATION BY USING MAGNETIC MOTOR

Ashish P. Upalkar, Mr.Sachin S.Patil, Mr.Rahul S Kulape, Mr.Vishal D.Kharat,

Shreya V. Hule

5 Plant leaf disease Detection and classification –A Review

Neha G. Kurale, Madhav V.Vaidya

6 IoT Based Smart Agricultural Device Controlling System

Asres Temam Abagissa, Ashutosh Behura, Santosh Kumar Pani

7

Bio-inspired technique for the Virtual Machine Migration in Green Cloud

Computing

Jiregna Abdissa Olana, Hrudaya Kumar Tripathy

8 Modeling of Sensor Packet Arrival in Simulation Environment

Shyam. S. M, Golla Vara Prasad

Page 3: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-I| Parallel Session-II

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1

Multipath Source Routing Protocol for Mobile Adhoc Networks with Performance

Effective Analysis

Vinay S, Shashidhar B Honnalli, G.Varaprasad

2 Classification of Hand Gestures from Wearable IMUs using Deep Neural Network

Karush Suri, Rinki Gupta

3

A review Report on WiMAX Vulnerabilities, Security Threats and their

Solutions

CHANDAN KUMAR , YDS ARYA, GAURAV AGARWAL

4 DEMONSTRATING DIFFERENT PHISHING ATTACKS USING FUZZY LOGIC

Shweta Dasharath Shirsat

5

A FASTER TECHNIQUE ON RICE DISEASE DETECTION USING IMAGE PROCESSING OF

AFFECTED AREA IN AGRO-FIELD

Taohidul Islam, Manish Sah, Sudipto Baral, Rudra RoyChoudhury

6 CMOS DESIGN OF PULSE PROCESSING ASIC FOR RADIATION DETECTION

Vatsala Sharma, Kamal Nayanam

7 STUDY OF MOBILITY MODELS WHEN DATA IS TRANSFERRED FROM Wi-Fi to UMTS

CH.Srilakshmi Prasanna, S.Zahoor-ul- Huq, P. Chenna Reddy

8

Smart ATVM Application

Farhana Zubair Siddiqui, Tasneem Mumtaz Ahmed Ansari, Almas Mohd Iqbal

Ansari, Simin Moin Ahmed Nagdawala

Session-I| Parallel Session-III

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1 Matlab Simulink Based Modeling of Flux Compression Generator

Page 4: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Prince Kumar, Atma Ram Gupta

2 PV-MPPT Based Active Voltage Quality Regulator

Nikhil K. Sawant, VRSV Bharath Pulavarthi, Vijay D. Mali

3 An Isolated Multiport Bidirectional DC-DC Converter for PV Battery System

Vijay D. Mali, A. R. Thorat, Nikhil K. Sawant

4

Securing Fog and Cloud Communication Using Attribute Based Access Control and

Re-encryption

Kunal Vohra, Mayank Dave

5

A Catalogue of Model Smells and Refactoring Operations for Object-Oriented

Software

Brahmaleen K. Sidhu, Kawaljeet Singh, Neeraj Sharma

6 An investigation on optimizing traffic flow based on Twitter Data Analysis

Raghuvira Pratap Adimulam , J V D Prasad , Praveen Kumar Kollu , S Babu

7

Analysis and Classification of Stenosis Severity from Coronary Angiogram

Images

Ms. Vidya.M, Mr. Dilip Kumar.S, Mr.S.Logesh Kumar, Ms.S.Pavithra,

Ms.R.Aishvarya

8

A Simple Novel Floating Point Matrix Multiplier VLSI Architecture for Digital

Image Compression Applications

Lakshmi Kiran Mukkara, K.Venkata Ramanaiah

9 Matlab Simulink Based Modeling of Flux Compression Generator

Prince Kumar, Atma Ram Gupta

Session-I| Parallel Session-IV

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1

Communication through Real-Time Video Oculography Using Face Landmark

Detection

Rakshita R

2 An Efficient and Secure Authentication Scheme for Wireless Body Area Networks

G. Anusya, M. Alamelu Sharmada, G. Anitha, G. Akilandeswari, M. Azees

3 Pose and Illumination Invariant Face Recognition for Automation of Door Lock

System

Page 5: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Amritha Purushothaman, Suja Palaniswamy

4

ANALYTICAL STUDY OF FBG SPECTRUM FOR TEMPERATURE SENSING APPLICATIONS

Anania S, Anjali Unnikrishnan, Aparna A, Parvathi G R, Baby Sreeja.S.D and

Poornima Mohan

5 Real time temperature prediction using IoT

TEMESEGAN WALELIGN AYELE, RUTVIK MEHTA

6

Smooth Starting of Induction Motor during Open Circuit and Short Circuit

Condition

Sachin Mestry, Shubham Kelkar

7 Automated Grading System using Natural Language Processing

Amit Rokade, Bhushan Patil, Sana Rajani, Surabhi Revandkar, Rajashree Shedge

8

Automatic optimization and control of power factor, reactive power and

reduction of THD for linear and nonlinear load by using arduino uno

Saurabh B. Jarad, Vishal D. Lohar, Shubham P. Choukate, Shrikant D. Mangate

Session-I| Parallel Session-V

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1 Survey On Automated Aquponics Based Gardening Approaches

Aishwarya K S, Prathibhashree S, Harish M, K Panimozhi,

2

Protection of Cloud Services from Disaster using Recovery Mechanism with

Openstack

Anuprabha S, Nivaashini M

3

Meta-heuristic based Optimization Techniques for the Steady-state Analysis of

Self-excited Induction Generator

Swarup Kumar Saha, Kanwarjit Singh Sandhu

4

Detection of Pests Using Color Based Image Segmentation

Apurva Sriwastwa, Shikha Prakash, Mrinalini , Swati Swarit, Khushboo Kumari,

Sitanshu Sekhar Sahu

5

A zero-day resistant malware detection method for securing Cloud using SVM

and Sandboxing

Techniques

Page 6: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Saket Kumar, Chandra Bhim Bhan Singh

6

Land Cover Prediction from Satellite Imagery Using Machine Learning

Techniques

Abhisek Panda, Abhisek Singh, Keshav Kumar, Akash kumar, Uddeshya, Aleena

Swetapadma

7 A Review of Ultra-Wideband Fractal Antennas

Indumathi Ganesan, Paulkani Iyampalam

8 Database Intrusion Detection System Using Octraplet and Machine Learning

Souparnika Jayaprakash, Kamalanathan Kandasamy

Session-I| Parallel Session-VI

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1

A Novel Method of Object Identification and Tagging Using Speeded-Up Robust

Feature

Laya K Roy, Reshma K V

2

Face Recognition Techniques Based on 2D Local Binary Pattern, Histogram of

Oriented Gradient and Multiclass Support Vector Machines for Secure Document

Authentication

Melkye Wereta Tsigie, Rasika Thakare, Rahul Joshi

3 Satellite image enhancement based on multi-technology fusion

Lalit Mohan Satapathy, Abhisek Dalai, Soubhagya Satapathy, Anwesha Jena

4

Estimation of Fault Location in Line-Commutated Converter based Bipolar High

Voltage Direct Current Transmission System

Aleena Swetapadma

5 A Novel Chicken Pecking Order Algorithm for Efficient Map-Reduce

Mathan Kumar M, RishiVikram N, Sakthi Kavin S.S, K.Sathya

6

A Machine Learning Based Approach Towards Building A SustainabilityModel For

NBA Players

Sirshendu Hore, Tanmay Bhattacharya

7

COMPARATIVE PERFORMANCE ANALYSIS OF SVC, STATCOM & UPFC DURING THREE PHASE

SYMMETRICAL FAULT

Badrinarayan Behera, Kamalesh Chandra Rout

8 Evaluation of Classifiers for Recognition of Ventricular Arrhythmia using DWT

based Features

Page 7: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Monalisa Mohanty, Asit Kumar Subudhi, Pradyut Kumar Biswal, Sukanta Kumar

Sabut

Session-I| Parallel Session-VII

20th APRIL 2018| 10.30am-12.30 pm

S.No Title/Author Name

1

Performance analysis of AODV and EDAODV routing protocol under congestion

control in

VANETs

P Sailaja, Banoth Ravi, Jaisingh T

2

Performance Analysis of Various Combination Sorting Algorithms for Large

Dataset to fit to a Multi-Core Architecture

Aparna Suresh, A.K George

3 Ensemble Approach for Predicting Genetic Disease through Case-Control Study

Frangly Francis, Namitha T. N

4

Energy balancing between computation and communication in IoT edge devices

using data

offloading schemes

Wajge Shubham Ravindra, Pooja Devi

5 Cross Layer Protocol for Bandwidth-hungry applications in IoT network

Pooja Devi, Wajge Shubham Ravindra

6

A COMPREHENSIVE REVIEW ON HYBRID ELECTIC VEHICLES: POWER TRAIN

CONFIGURATIONS, MODELLING APPROACHES, CONTROL TECHNIQUES

CHINJU SAJU, M. LYDIA

7

Key Aggregate Cryptography based solution for Dynamic Ownership Management in

Fog

Infrastructures

Avinash Tulasi, Mayank Dave

Page 8: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-II | Parallel Session-I

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

1 Intrusion Detection in Wireless Sensor Networks

M.V.NaveenaReddy , T.Sasilaka

2 Optimal LCL Filter Based UPQC Topologies for the Power Quality Enrichment

H. R. Sukhesh, Senthil Vadivu U, Sathiya R

3 NI-LabVIEW Based Automated Testing of Electronic Control Unit

H. R. Sukhesh, M. Mahesh

4 understanding cloud based health care service with its benefits

Fekadu workneh, Ahmed Adem, Roshni Pradhan

5

Surveillance Robot with Human Detection

Amit Maurya, Mayuri Sonkusare, Akshata Raut, Dhanashree Tamhane,Deepali

Palase

6 Miniature low profile UWB antenna with defective ground plane

Mahadu A. Trimukhe, Balaji G.Hogade

7 Design and Analysis of Electrical Drives Using Active Front End Converter

Kudzai B. Chimonyo, Sathish Kumar K, B. Kishore Kumar, K. Ravi

8 A Hybrid Model for Book Recommendation

Rohit Darekar, Karan Dayma, Rohan Parabh, Prof Swapnali Kurhade

9 Intrusion Detection in Wireless Sensor Networks

M.V.NaveenaReddy , T.Sasilaka

Session-II | Parallel Session-II

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

Page 9: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

1 Simultaneous Feature Selection and Classification Using Fuzzy Rules

D. Sai Kumar, V Madhusudan Rao

2 An Intelligent System for Aiding Farming Process

Sahil Khedeskar, Mohit Rokade, Bhargav Patil, Tatwadarshi P.N

3 Secure Document Sharing And Access Control on Cloud for Corporate User

Kanchan S. Gajghate, Ravi V. Mante

4

SECURITY ENHANCED MEDICAL DATA SERVER FOR CARDIAC ARREST CARE ANALYSIS USING

DNSSEC

M.SHOBEETHA, A.SHAIK ABDUL KHADIR

5 The Clustering techniques for wireless sensor networks: a Review

Janvi A. Patel, Yask Patel

6

Privacy Preserving and Information Sharing in Decentralized Online Social

Network

Nikita V. Ghodpage, R. V. Mante

7

Collaborative Kay Management in Cipertext Policy Attribute Based Encryption

for Cloud

Mayur N. Ghuge, Prashant N. Chatur

8

A MULTI LEVEL SHARED PROCEDURE MECHANISM FOR HUGE PICTURES BY USING LARGE

STATISTICS

Uday Shankar Sekhar, GOPINADH SASUBILLI

Session-II | Parallel Session-III

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

1 Hexagonal Search Based Compression Noise Estimation And Reduction In Video

Nibin Raj, Shabeer S

2 High Efficiency Image Coding Using Iterative Hybrid Filtering

Nandhu Krishnan S, Preetha Basu

Page 10: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

3

A Comparative Evaluation of Supervised and Unsupervised Methods for Detecting

Outliers

A.M.Rajeswari, S.K.Yalini, R.Janani, N.Rajeswari, C.Deisy

4

Optimization of Grunwald-Letnikov’s (G-L) based Fractional Filter Used for

Image Enhancement

Reju John,Nissan Kunju

5 Defects Detection in PCB Using Image Processing for Industrial Applications

Ananthu Raj, Sajeena A

6

Image Processing Based End-view Alignment for Symmetric Specialty Optical

Fibers

Ashiq A Samad, Unni C

7 Remotely Accessible, Low Power Network Attached Storage Device

Anirudh Lanka, Arjun Gargeyas

8 Trust Based Certificate Revocation and Attacks in MANETs

Preeti Tonape, Sachin Deshpande

Session-II | Parallel Session-IV

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

1

Simulation for Brine Evaporation Parameters Acquired using Distributed

Embedded System and

Seepage Estimation

Rameshchandra Makavana, Vibhutikumar Joshi, Hiteshkumar Lad

2 Cloud Based Smart Parking System

Rishi Gupta,Sharvil Pradhan,Abhijit Haridas,D C Karia

3

Security approaches for data aggregation in Wireless Sensor Networks against

Sybil Attack

Surinder Singh, Hardeep Singh Saini

4 MOTION ESTIMATION AND COMPENSATION IN FREQUENCY DOMAIN

R. Krishnamoorthy , P. Archana , V.Hema Priya , K. Akshaya

5 Addressing Cold Start Problem in Recommendation System Using Custom Built

Hadoop Ecosystem

Page 11: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

P.V. Sai charan, P. Ravi Kumar, P. Mohan Anand

6

FPGA Implementation of Parallel Sorting Mechanism for Turbo Decoding in LTE

System

Sushant Sadangi, Priti Priyanka

7

ROUTE AWARE VIRTUAL MACHINE MIGRATION IN CLOUD DATACENTER

Getzi Jeba Leelipushpam Paulraj, Sharmila Anand John Francis, J. Dinesh

Peter, Immanuel Johnraja Jebadurai

8 Changing the world of Autonomous Vehicles using Cloud and Big Data

Sunny Kumar, Eesha Goel

Session-II | Parallel Session-V

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

1 Real-World Applications and Research Challenges of Fog/Edge Services

Chandra Shekhar Rendla, G.R. Gangadharan, Rajeev Wankar

2 Tempo Octave Correction Using Multiclass Support Vector Machine

Oshin Dutta

3 Predicting fraudulent claims in automobile insurance

G.Kowshalya, M.Nandhini

4 Driver Drowsiness Detection System Based on Visual Features

Fouzia, Roopalakshmi R, Jayantkumar A Rathod, Ashwitha S Shetty, Supriya k

5 Need of Fundus Image Analysis : A Review

Nisha R. Wankhade, Dr. Ujwalla H. Gawande

6

Ethiopian Banknote Recognition and Fake Detection Using Support Vector

Machine

Engdaw Ayalew Tessfaw, Bhupendra Ramani, Tadesse Kebede Bahiru

7 Automated Intelligent Systems for Secure Live Migration

S.Sengole Merlin, Nisha Maria Arunkumar, Angela Miriam.A

8

Predicting Resource Utilization for Cloud Workloads Using Machine Learning

Techniques

Padma D. Adane, O. G. Kakde

Page 12: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-II | Parallel Session-VI

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

1 Performance Analysis of Machine Learning Algorithms for Gender Classification

Laxmi Narayana Pondhu, Govardhani Kummari

2

Design and Development of Multimodal Medical Image Fusion using Discrete

Wavelet Transform

Mohammed Basil Abdulkareem

3 Classification of WBC Using Deep Learning for Diagnosing Diseases

Riya roy, SWAPNA SASI

4 Design and Comparative Analysis of Mobile Computing Software Framework

Jisna John, C.K Raju

5 N-Curve Analysis of Low power SRAM Cell

D.Anitha, K.Manjunatha Chari, P.Satish Kumar

6 Modern Design and Implementation of XY Plotter

R.R.Jegan, Sivanesan R, Gnanasundaram E, Thiyagarajan D, Gowtham M

7

Comparative Study on Data Mining Classification Algorithms for Predicting

Road Traffic Accident Severity

Tadesse Kebede Bahiru, Dheeraj Kumar Singh, Engdaw Ayalew Tessfaw

8 Regenerative Braking of BLDC Motor using Fuzzy Control for Electric Vehicles

Aswathi E. R, Prathibha P. K, Jayasri R. Nair

Page 13: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-II | Parallel Session-VII

20th APRIL 2018 | 01.30pm-03.30 pm

S.No Title/Author Name

1 Modern Face Recognition with Deep Learning

Jothi Thilaga.P, Arshath Khan .B, Jones .A.A, Krishna Kumar .N

2

A Practical approach for integrating Big data Analytics into E-governance

using hadoop

Bhushan Jadhav, Archana B. Patankar, Sonali B. Jadhav

3 Testing of Advanced Features of High Throughput Satellites

V. NithyaPriya, Gowrishankara CK, U.N. VasanthaKumari

4

Automated Gait Generation for Simulated Bodies using Deep Reinforcement

Learning

Abhishek Ananthakrishnan, Dipen Ved, Vatsal Kanakiya, Grishma Sharma

5 Survey On IoT based Automated Aquaponics Gardening Approaches

Aishwarya K S, Prathibhashree S, Harish M, K Panimozhi

6

Design and Implementation of Thermoelectric energy Harvesting System with

Thermoelectric Generator for Automobiles Battery Charging

Suraj Suryakant Solanki, Abhay Balkrishna Chavan, Omkar Nandkumar Tharwal,

Triveni Mohan Ghadi, Siddhesh P. Sawant, Sumit Sakharam Bondre

7 Fractional order OTA-C current-mode all-pass filter

D. V. Kamath, Navya S, Soubhagyaseetha N

8

Secured algorithm for routing the military field data using Dynamic Sink :

WSN

Mounika Tokala, Rajeswari Nallamekala

Session-III | Parallel Session-I

20th APRIL 2018 | 03.45pm-06.00 pm

S.No Title/Author Name

1 A Deep Learning Approach for sleuthing Disease-Treatment Relations in brief

Texts

Page 14: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Raghu T Mylavarapu

2 A Framework for Hierarchical Big Image Data

Bharadwaja Krishnadev Mylavarapu, Raghu T Mylavarapu

3 Recognition of Handwritten Math Equations by Pipeline Mechanism

Rohit Raturi , Kumar Attangudi Perichiappan Perichappan

4 Huge information extraction techniques of Data Security

Raghu T Mylavarapu , Bharadwaja Krishnadev Mylavarapu

5 Adapting Deep Features for Scene Recognition utilizing Places Database

Rohit Raturi

6

Security approaches for data aggregation in Wireless Sensor Networks against

Sybil Attack

Surinder Singh,Hardeep Singh Saini

7 Privacy Preserving Techniques for Big Data: A Survey

Kajol Patel, G.B.Jethava

8 Soil moisture prediction using machine learning

Shikha Prakash, Animesh Sharma, Sitanshu Shekhar Sahu

9

A Deep Learning Approach for sleuthing Disease-Treatment Relations in brief

Texts

Raghu T Mylavarapu

Session-III | Parallel Session-II

20th APRIL 2018 | 03.45pm-06.00 pm

S.No Title/Author Name

1 A 15GHz GaAs HEMT low noise amplifier

ThejasVishnu R

2 Survey on Evaluation of Student's Performance in Educational Data Mining

Sharayu Bonde , D.K. Kirange

3 Object Detection and seperation Using Raspberry PI

Sumeet Sanjay Walam, Siddhi Prakash Teli, Bilal Sikandar Thakur, Ravindra

Page 15: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Ramchandra Nevarekar, Suhas M Patil

4 A Tourist Place Recommendation and Recognition System

Viken Parikh, Madhura Keskar, Dhwanil Dharia, Pradnya Gotmare

5 Magnetic Induction Based Routing in Underwater Wireless Sensor Networks

Vishu Modi, C. P. Gupta

6 A Comparative Analysis of Algorithmic Music Generation on GPUs and FPGAs

Garvit Joshi, Jasvinder Singh, Vidya Nyayapati, Aishwarya Karmarkar

7 Machine Learning Techniques and Challenges in Wireless Sensor Networks

Jigyasha Prajapati, S.C. Jain

8

Cryptographic Method to Provide Confidentiality and Integrity in Implantable

Medical Devices

Vishnupriya T H, Jucy Vareed

Session-III | Parallel Session-III

20th APRIL 2018 | 03.45pm-06.00 pm

S.No Title/Author Name

1 Partition Tuning based Bagging technique to Skew Handling

Kanak Meena, Devendra K.Tayal

2

Multipurpose Color Image Watermarking in Wavelet Domain using Multiple

Decomposition Techniques

S. Prasanth Vaidya

3 Advisory Search and Security on Data Mining using Clustering Approaches

P.Madhavilatha, K.Madhavi, G.Geetha

4 AES Hybridization with Genetic Technique for guarded Image Transmission

Shekharan Deep Bindra, Navneet Bawa

5

Automatic Leukemia Identification System Using Otsu Image segmentation and

MSER Approach for Microscopic Smear Image Database

Rege M.V, Mohammed Basil Abdulkareem, Santosh Gaikwad, B.W. Gawli

6 Performance Analysis of Cryptographic Algorithms for Cloud Security

Page 16: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

G.Sai Vennela, N.Venkata Varun, N.Neelima, L.Sai Priya, J.Yeswanth

7 MMLD Algorithm for Power Estimation in OFDMA System

Naveen K N, K. Ramesha

8 Image Transmission Using Li-Fi

Mohit Vasuja, Amritansh Kumar Mishra, Udbhav Singh Chauhan, Deeksha Chandola

Session-III | Parallel Session-IV

20th APRIL 2018 | 03.45pm-06.00 pm S.No Title/Author Name

1

Denoising of MST Radar Signal Using Multi-Band Wavelet Transform with

Improved Thresholding

G. Chandraiah, T. Sreenivasulu Reddy

2 Design of Compact Size Wideband Antenna with Circular Polarization

Malu Mohan, Sheeba O

3

Compact Inverted U Shaped slot Triple Band MIMO Antenna for WLAN and WiMAX

Applications

Lisha Alex, Sreekumari Amma

4

Directivity Beam-Width Trade Off and Analysis of Hand Off for High Speed

Train Communication

Arya Ajay, Heera Karunakaran

5

Analysis of pulmonary diseases using wireless breathing rate and pulse rate

monitoring system

Anita Thakur, Priya Aggarwal , Umaima Siddiqui

6

Integrated Fuzzy Logic Approach For Calculation Of Health Index Of Power

Transformer

Arun Chantola, Manisha Sharma, Abhishek Saini

7 Inter Disc Fault Simulation In Transformer Windings

Abhishek Saini, Manisha Sharma, Arun Chantola

Page 17: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

8

Dynamic Malware analysis Using Cuckoo Sandbox

Sainadh Jamalpur, Yamini Sai Navya, Perla Raja, Gampala Tagore, G.Rama

Koteswara Rao

Session-III | Parallel Session-V

20th APRIL 2018 | 03.45pm-06.00 pm S.No Title/Author Name

1

Hybrid Technique Using Pso and Region Growing Algorithm for Brain Tumor

Detection

Rupinder kaur, Gurjeet Singh

2

A Random Selective Block Encryption Technique for Secure Image Cryptography

Using Blowfish Algorithm

Amandeep Kaur, Gurjeet Singh

3

Design of an unlimited range web browser controlled robot with self-adapting

fuzzy logic

Controller

Sujoy Ghosh, Subarna Ghosh, Meet Dayani

4 Automatic Exam Seating & Teacher Duty Allocation System

Apurva Inamdar, Anand Gangar, Arun Gupta, Varsha Shrivastava

5 A Word Embedding Model For Topic Recommendation

Megala S Kannan, Mahalakshmi G S, Smitha E S, Sendhilkumar S

6 IoT based low cost smart irrigation system

Kiranmai Pernapati

7 Implementation of Indoor pollution Monitoring using MQTT Protocol

Bhargavi Nimmaka, Amara Prakasarao

8

EMBA: AN EFFICIENT ANONYMOUS MUTUAL AND BATCH AUTHENTICATION SCHEMES FOR

VANETs

Anis Begum Shakeel Ahamed, Navaneetha Kanagaraj, Maria Azees

Page 18: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-III | Parallel Session-VI

20th APRIL 2018 | 03.45pm-06.00 pm S.No Title/Author Name

1

Comparison on Luo and Ultra Luo converter for Power Factor Correction in BLDC

Motor Drive

Baiju Antony, Gomathy S

2

A NEW THREE PHASE SIX LEVEL EFFICIENT MULTILEVEL INVERTER WITH

REDUCED NUMBER OF COMPONENTS

Vrinda Vijayan, Sreehari S

3

An Effective and Robust Self-Training Algorithm Using k-Means and Random

Forest Models for Program-Level Student Classification

Vo Thi Ngoc Chau, Nguyen Hua Phung

4

COMPARISON OF PI CONTROLLER AND FUZZY LOGIC CONTROLLER FOR THE

IMPROVEMENT OF POWER FACTOR IN SMPS

Anjaly Das, Krishnakumari T

5

An Energy Efficient Secure Routing (EESR) using Elliptic Curve Cryptography

for Wireless Sensor Networks

C. Deepa, B. Latha

6 Smart Water Management in Housing Societies using IoT

Kaushik Gupta, Mandar Kulkarni, Manas Magdum, Yash Baldawa, Shivprasad Patil

7 Chatbot using TensorFlow for small Businesses

Rupesh Singh, Harshkumar Patel, Manmath Paste, Nitin Mishra, Nirmala Shinde

8

A Review of IoT based Smart Farm Monitoring

Vaishali Lohchab, Manish Kumar, Gaurav Suryan, Vishal Gautam and Rohit Kumar

Das

Session-III | Parallel Session-VII

20th APRIL 2018 | 03.45pm-06.00 pm S.No Title/Author Name

Page 19: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

1 A Review on Machine Learning Big Data using R

M. Prakash, G. Padmapriya, M. Vinoth Kumar

2 A Survey: Comparative Analysis of Different Variants of Local Binary Pattern

Susheel Kumar Yadav, Dhirendra Pratap Singh, Jaytrilok Choudhary

3

Energy efficiency and lifetime enhancement of K-Barrier coverage in Wireless

Sensor Networks

Anagha. S. Anand, Anitha. V. S

4 Demographic Progress Analysis of Census Data Using Data Mining

Manan Chawda, Rutuja Rane, Srikanth Giri

5 Implementation of 2-DOFPID controller in multi area deregulated power system

Gundoji Mahesh, P.D.Dewangan

6 Design and Implementation of Low Cost Optical Spectrometer

Michael da Silva, Saurav Panda, Deeksha Tiwari, Sreedevi Nair, Anita Jadhav

7

Photovoltaic Pumping System using SVPWM based Induction Motor Drive with a

High Gain Converter

Niravadya V S, Caroline Ann Sam, Elizabeth Rita Samuel

8 A STANDALONE GENERATIVE CONVERSATIONAL INTERFACE USING DEEP LEARNING

Enza Varghese, M T Rajappan Pillai

9 Vitamins and Minerals Diagnosis System Using Neural Network

Saurabh Yadav, Akshay Rathod, Prathviraj Patil, Varsha Hole

10 Dynamic Forms UI: Flexible and Portable Tool for easy UI Design

Rajvardhan Oak, Mrunmayee Khare, Advait Gogate, Gargi Vipra

Session-IV | Parallel Session-I 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1 A Hybrid Approach for Movie Recommendation System Using Feature Engineering

S.Sathiya Devi, G.Parthasarathy

2

Design and Implementation of Ultra-Fast Acting Electronic Circuit Breaker for

Protection against Various Abnormal Condition

Jayesh Harkulkar, Hrishikesh Pawaskar, Imran A. Patel, Kedar Mestry,

Prathamesh Panchal, Vinit Kanase

3 Energy Efficient Clustering in Heterogeneous Environment

Piyush Rawat, Siddhartha Chauhan

4 Smart Automated Home Application using IoT with Blynk App

Mitul Sheth, Homera Durani, Madhuri Vaghasia, Shyam Kotecha

Page 20: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

5

RFID-Based Smart Traffic Control Framework for Emergency Vehicles

Tejas Naik, Roopalakshmi R, Divya Ravi N, Pawdhan Jain, Sowmya B H,

Manichandra

6 Improved ACE method for reducing PAPR in OFDM system

pranav kashyap, khushal thakur

7 Real Time Somnolence Detection System In OpenCV Environment for Drivers

Rohan Patel, Mayur Patel, Jaldip Patel

8 Fuzzy Logic Based Energy Management System Design for AC Microgrid

PRATHYUSH M, JASMIN E A

Session-IV | Parallel Session-II 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1 ECU Health Monitor Using CANUSB

Abhijit D. Sutar, Sagar B. Shinde

2 A Comprehensive Approach for Network Security

Manikandan Rm, Radha D

3 INTERACTIVE READER AND RECOGNISER SYSTEM

Ajinkya Rajguru , Ankit Pawale, Om Shelke, Priya Thakare, Shubham Kote

4 An Efficient Pruning Algorithm for IFFT/FFT Based on NC-OFDM in 5G

De-Zhuang Qin, Jin-An Ren, Yi-Hu Xu

5 Designing and implementation of chemical mixing and filling bottles using PLC

SAYALI NAIK,PRASAD BIRMOLE,MADHUSHRI KAMBLE,ANJALI SADAMATE

6

Personal Verification Using Fast and Self Consistent Estimation for Biometric

Match Score Fusion

Long Binh Tran, Thai Hoang Le

7

A Novel Approach For Insight Finding Mechanism On ClickStream Data Using

Hadoop

P.MOHAN ANAND, G.SAI VAMSI, P.RAVI KUMAR

8

Segmentation of lungs nodules by iterative thresholding method and

classification with Reduced Features

Moumita Mukherjee, Pradyut Kumar Biswal

Page 21: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-IV | Parallel Session-III 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1 Fast and Reliable Biometric Verification System Using Iris

Bhagyashree Deshpande, Deepak Jayaswal

2

Performance analysis of Opportunistic Network Protocols in BlackHole

Environment

Deepak Kumar Sharma, Mohd Shoaib Ahmad, Himanshu Garg, Kshitij Sharma

3 IoT Based Embedded System for Vehicle Security And Driver Surveillance

MAHESH RAJU PAWAR, IMDAD RIZVI

4

Enhancement of Low Light Images Using Retinex Model via Illumination Map

Estimation

Priyanka B. Waghmode, Nilesh Vani

5 Sub-Feature Selection for Novel Classification

Hemanta Kumar Bhuyan, C. V. Madhusudan Reddy

6 Intelligent Irrigation System based on Wireless Sensor Networks

Chetan Vinayak Gawali, R.B.Dhumale

7

FACEBOOK BASED HOME APPLIANCES SECURITY CONTROL AND MONITORING USING

RASPBERRY PI 3

Vineet Pratap Singh, Urmila Deshmukh

8 Detection of Stress using Wearable Sensors in IoT Platform

Sreedevi Uday, C. Jyotsna, Amudha J

Page 22: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-IV | Parallel Session-IV 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1 Behavioral Analysis of Docker Swarm under DoS/DDoS Attack

Gaurav Bhatia, Arjun Choudhary, Krati Dadheech

2 Energy-Efficient Cooperative Spectrum Sensing: A Review

Anjana S., Nandan S

3 Modern Design and Implemetation of XY Plotter

Gnanasundaram E , Gowtham M , Sivanesan R , Thiyagarajan D

4

A comparative study of supervised machine learning algorithms for stock

market trend prediction

Indu Kumar, Kiran Dogra, Chetna Utreja, Premlata Yadav

5 An Innovative Machine Learning Approach For Object Detection and Recognition

AISHWARYA SARKALE, KAIWANT SHAH, ANANDJI CHAUDHARY, TATWADARSHI NAGARHALLI

6 Class Level Code Summarization Based On Dependencies and Micro patterns

Mrinaal malhotra, jitender kumar chhabra

7 An Approach for Storing and Retrieving Health Informatics Big Data

Yalini M, Sridevi S

8 Tweet Summarization: A New Approch

Siddhi Naik, Shruti Lade, Swati Mamidipelli, Ashwini Save

Session-IV | Parallel Session-V 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1

Design of Circular Slot on Rectangular Patch with Meander line Antenna for

Satellite Communications

Ketavath Kumar Naik, Senior Member

2 Cheque Image Security Enhancement in Online Banking

Page 23: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Dhanya K, Harikrishnan M, Uday Babu P

3 An Intelligent System for Thyroid Disease Classification and Diagnosis

Aswathi A K, Anil Antony

4 An Intelligent System for Early Assessment and Classification of Brain Tumor

Keerthana T K, Sobha xavier

5 Energy Detection over Unified α − η − μ and α − κ − μ Fading Channels

Manisha Bhatt, Sanjay Kumar Soni

6 Repository File Transfer: A New Compound File Encryption Technique

Shubham Patil, Amruta Dhumal, Ankita Sankhe, Umesh Mohite

7

Performance Analysis of MMSE equalizer and Time-Frequency Block Code for

MIMO-OFDM under Single-RF system

Himankashi Grover, Reetu Pathania

8

SIMULATIVE ANALYSIS OF FIBER BRAGG GRATING ON FWM FOR ANALYZING KERR EFFECT

ON WDM OPTICAL FIBER NETWORK

Abhineet Kaur, Atul Mahajan

Session-IV | Parallel Session-VI 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1

Distinctive Performance Analysis of CCB and PO based MPPT Technique for Grid

Connected PV Generation System

Subhashree Choudhury, Samikhya Nayak, Tara Prasanna Dash, P K Rout

2 Overview of DC Microgrid as a Conceivable Future Power System

Subhashree Choudhury, Samikhya Nayak, Tara Prasanna Dash, P K Rout

3

FOCV Based MPPT Control For PV, And Sine Reference-Feedback Oriented Control

For Single Phase Grid Tied Solar Inverter

Madhavadas M, Vibin C Thomas

4 PERFORMANCE ANALYSIS OF PARALLEL PREFIX ADDER FOR DATAPATH VLSI DESIGN

Shilpa K. C and Shwetha M, Geetha B. C, Lohitha D. M, Navya and Pramod N. V

5 Auto Vehicle Speed Control System-The Review

Monali B. Zade, S. M. Kulkarni

6 Estimating Frequent Products in Shopping Cart Using Data Mining

Nidhi Tripathi, Darshana Vartak, Himanshu Chaudhari, Sunita Naik

Page 24: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

7

A Comparative Study on Novel adaptive control scheme for PV Module Integrated

Converter

Ashna Jose, Sijo George

8 Two-Stage FinFET-MOSFET Hybrid Inductive Boost Converter

Mohd Yasir, Mohd. Hasan, Mohd. Samar Ansari

Session-IV | Parallel Session-VII 21st APRIL 2018 | 09.30am-11.30pm

S.No Title/Author Name

1

Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of

Things (IoT)

Jamshiya P. K, Divya M. Menon

2

Wireless Bio signal Acquisition Electrode module for EMG

S.Logesh Kumar, M. Swathy, Vidya.M, Poojaa K, Manikandan G, Aarthi Jennifer

A

3 Taxonomy of SLA violation minimization techniques in cloud computing

Shivani, Ajmer singh

4 Photonic Crystal Waveguide and Cavities for all-Optical Logic Devices

Mahesh V, Sanjaykumar C. Gowre, Savita Soma, Sanjeev P. Gogga

5

An Efficient system to stumble on and Mitigate DDoS attack in cloud

Environment

MANJU MOHAN K

6 An Artificial Intelligence Approach for Predicting Different Types of Stroke

Hima Haridas, Aswathy Wilson

7

Data Mining Approach for Anomaly Detection in Social Network Analysis

M.Swarna Sudha, K.Arun Priya, A.Kanaka Lakshmi, A.Kruthika, D.Lakshmi Priya,

Valarmathi K

8 FIFTH GENERATION (5G) WIRELESS TECHNOLOGY “REVOLUTION IN TELECOMMUNICATION”

Amit Kr. Jain, Rupesh Acharya, Saroj Jakhar, Tarun Mishra

Page 25: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-V | Parallel Session-I 21st APRIL 2018 | 11.30am- 01.30pm

S.No Title/Author Name

1 Addressing Techniques for Secure Data Sharing in Cloud

ARTI BHAGAT,NISHA RATHEE

2

Measurement of Bandwidth and FFT of a low frequency modulated signal in a

Phase locked VCO

Pranav Rawat, Divyanshu Sahu, Mukul Varshney & Sujata Pandey

3

An effective implementation of Social Spider Optimization for text document

clustering using

single cluster approach

T.Ravi Chandran, A.V.Reddy, B.Janet

4 Performance Analysis of Fi-Wi Network With LTE-A to Achieve Improved QoS

Prabhjot Kaur, Hardeep Singh Saini

5

THE FUTURE OF INDIA CREEPING UP IN BUILDING A SMART CITY: INTELLIGENT TRAFFIC

ANALYSIS PLATFORM

S Appavu Alias Balamurugan, J Felicia Lilian, S Sasikala

6

High Density Fixed Valued Impulse Noise Removal Using Improved Decision Based

Hybrid Median Filter and its Application on Medical Images

Lalit Kumar Baghel, Ramesh Kumar Sunkaria

7

Human Computer Interaction System for Impaired People by using Kinect Motion

Sensor :

Voice and Gesture Integrated Smart Home

K. A. S. V. Rathnayake, , W. K. I. L. Wanniarachchi, W. H. K. P. Nanayakkara

8

An IoT based Safety & Health Advisory System for Homemaker with Service

Independency on Various Sensors

P T Nithia, S. Ullas

Session-V | Parallel Session-II

Page 26: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

21st APRIL 2018 | 11.30am- 01.30pm

S.No Title/Author Name

1 Smart Stick for the Blind and Visually Impaired People

Mukesh Prasad Agrawal, Atma Ram Gupta

2

Transient Response Improvement Of DC to DC Converter By Using Auto-tuned PID

Controller

Prashant S Malik, Sujay S Gawas, Imran Altaf Patel, Ninad P Parsekar Akshay

A Parab, Shubham S Parkar

3

R Peak Detection Using Empirical Mode Decomposition With Shannon Energy

Envelope

Khushboo Kumari, Sitanshu Shekhar Sahu, Rupesh Kumar Sinha

4 Face Photo Recognition from Sketch Images Using HOG descriptors

G.G Rajput, Prashantha, Geeta B

5 Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)

Mohammed Ali Shaik

6 Gaze-contingent screen adjustment

Anshul Vora, Rishabh Shah, Hrutwin Pottekkatt, Deepen Parmar

7 A Personal Healthcare IoT System model using Raspberry Pi 3

Soumya Yattinahalli, R M Savithramma

8

Performance Analysis of Indoor Optical Wireless Communication With and

Without FLI Effect Using Various Modulation Schemes

G Dushyanth Kumar Reddy, Rajat Kumar Giri

Session-V | Parallel Session-III 21st APRIL 2018 | 11.30am- 01.30pm

S.No Title/Author Name

1 A Novel 3G/LTE Data Assortment System in Conveyance Networks-A review

K.Divya Priya, Karuyna Rathan, K.Pavani

2

An Intelligent Software defined Network Controller for preventing Distributed

Denial of Service Attack

Aditya Prakash,Rojalina Priyadarshini

3 Enhanced energy efficient OSPF algorithm for wireless sensor network

Page 27: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Ashutosh Anand, Himanshu Garg, Vinay Joshi ,Sanjay Kumar

4 De-Militarized Zone: A Next Level to Network Security

Krati Dadheech, Arjun Choudhary, Gaurav Bhatia

5 Artificial Intelligence Based Solarbot

Wasudeo Rahane, Sayali Patil, Komal Dhondkar, Tanvi Mate

6

Speech and Audio Cryptography System using Chaotic Mapping and Modified

Euler's System

Sathiyamurthi P, Ramakrishnan S, Shobika S, Subashri N, Prakavi M

7

Optimization of Grunwald-Letnikov’s (G-L) based Fractional Filter Used for

Image Enhancement

Reju John, Nissan Kunju

8 AN EMPIRICAL STUDY ON DISEASE DIAGNOSIS USING DATA MINING TECHNIQUES

M. DEEPIKA, K. KALAISELVI

Session-V | Parallel Session-IV 21st APRIL 2018 | 11.30am- 01.30pm

S.No Title/Author Name

1 Estimate soil moisture using Hyperspectal Remote Sensing for Crops

Mitul Sheth, Homeara Durani,

2 A new method for Detection of Phishing Websites: URL Detection

Shraddha Parekh, Dhwanil Parikh, Srushti Kotak, Smita Sankhe

3 A Review: Cryptography and Steganography Algorithm for Cloud Computing

Surbhi Singla, Anju Bala

4 Design of Wideband Broccoli Fractal Antenna for WiMAX/WLAN applications

Anish Patel, Riki Patel, Arpan Desai, Trushit Upadhyaya, Jay Patel

5

An Infrared Image detecting System model to monitor human with weapon for

controlling

smuggling of Sandalwood Trees

Mohan Sai.S, Naresh K, RajKumar.S, Mohan Sai Ganesh, LokSai, Abhinav

6 INTRUSION PREVENTION METHOD TO SECURE NETWORK SESSIONS

Sarath Kumar E, Sai Darshan Thirunavukarasu, Almas Mehtab

7 CONTENT BASED IMAGE RETRIEVAL USING MULTI-SEQUENTIAL SEARCH

MRUDULA DESAI, SANCHIT SHINDE, MIHIKA GUPTE, DIVYA RACHA

Page 28: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

8 Smart Security: Remotely Controllable Doorlock

Shraddha Tiwari , Drishti Shetty , Salomi Thakur, Abhishek Pandey

Session-V | Parallel Session-V 21st APRIL 2018 | 11.30am- 01.30pm

S.No Title/Author Name

1 Mining User's Browser History to Personalize Web Search

Vandik Zaveri, Jimit Dholakia, Isha Bandi, Smita Sankhe

2 Objects Talk - Object detection and Pattern Tracking using TensorFlow

Rasika Phadnis, Shruti Bendale, Jaya Mishra

3 Sentiment Analysis using Neural Networks: A New Approach

Shiv Dhar, Suyog Pednekar, Kishan Borad, Ashwini Save

4 VLSI IMPLEMENTATION OF SMS4 CIPHER FOR OPTIMIZED UTILIZATION OF FPGA

G.Sai Manoj, B.Sravanthi, G.Thirumal, Sudheer Raja Venishetty

5 Denoising of Iris Image Using Stationary Wavelet Transform

K. Sai Kumar, K. Nikhil Naga Sai Ram, K. Kiranmai, S. Sri Harsha

6 Verifiable Image Secret Sharing with Cheater Identification

Sonali D. Patil, Priya K. Ithape

7 Hybrid Cloud: A Solution To Cloud Interoperability

Shweta M.Barhate, M.P.Dhore

8 Design of Isolated Bidirectional Converter for PV Systems.

Anshadha Chandekar, A.K.Saonerkar, S.D.Naik

Page 29: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-V | Parallel Session-VI 21st APRIL 2018 | 11.30am- 01.30pm

S.No Title/Author Name

1

Optical character recogniation for Tigrigna Printed Documents using HOG and

SVM

Kibrom Tsegay, Yask Patel

2 PREDICTION OF PNEUMONIA USING SVM AND GENETIC ALGORITHMS

Tanashri Karle, Deepali Vora

3

A Comparative Study of Various Classification Techniques to Determine Water

Quality

Ramya Prakash, Tharun V.P, S. Renuga Devi

4 Prediction of Rainfall Using Data Mining Techniques

Tharun V.P, Ramya Prakash, S. Renuga Devi

5 Robotic Vacuum Cleaner Using Arduino with wifi

P. B. Jarande, S. P. Murakar, N. S. Vast, N. P. Ubale, S. S. Saraf

6 Heart Rate Variability Analysis: Application Overview

Aboli N. Londhe, Mithilesh Atulkar

7

Comparitive study and simulation of different MPPT techniques in

MATLAB/Simulink

Shubham, Akhilesh Swarup

8 A Lucid IoT Challenge to Sustainable Society

Adarsh Garg

Session-V | Parallel Session-VII 21st APRIL 2018 | 11.30am- 01.30pm

Page 30: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

S.No Title/Author Name

1

Spam Reviews Detection Framework Based on Heterogeneous Information Network

(HIN)

Arpita kunne, Roopalakshmi R, Suviksha.V.Shetty, Ananya S.V, Pankaj Devidas

Divgi Manasa

2

A Comprehensive Development and Testing of Improved Publish-Subscribe Method

For IoT

Jyoti Deogirikar, Amarsinh Vidhate

3 Visualization of News Feed Data using Lexicon-based Approach

Pujitha Appasani, Madhavi Latha

4 Gabor filter based Image segmentation for Disease Detection using VHDL

P.Nagabushanam, S.Radha, Sushmita Selvadass, Kezia Kanishka Joseph

5 Transmission Distance in MAC protocol for Wireless Sensor Networks

S.Radha, P.Nagabushanam, Thanam Jaideep Reddy, B.Sachin

6 A NOVEL APPROACH FOR miRNA TARGET PREDICTION USING DEEP LEARNING

Shaina Paulson, Jyothis T.S

7

Real-Time Robot Control Using Gesture Recognition via Electromyography

Signals

Aditya Thakur, M Reshwanth, S. Suhasini

8

Comparative analysis of boost and buck-boost converter in photovoltaic power

system

under varying irradiance using MPPT

Lalit Mohan Satapathy, Annadanapu Harshita, Md Saif, Paresh Kumar Dalai,

Subhashree Jena

Session-VI | Parallel Session-I 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Opinion Mining and Sentiment Study of Tweets Polarity Using Machine Learning

Mridula A, Kavitha C. R

2

Digital Psychiatry – Curbing Depression using Therapy Chatbot and Depression

Analysis

Bhuvan Sharma, Harshita Puri, Deepika Rawat

3 Automatic Irrigation System with Data Log Creation

Abhilash Shrivastava, Rajesh M

Page 31: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

4

Indian Sign Language Numeral Recognition Using Region of Interest

Convolutional Neural Network

Sajanraj T D, Beena M V

5

Cashew Nut Grade Identification and Quality Testing Using Machine Learning

Laxmikant Bordekar, Harish Velingkar, Elanton Fernandes, Heramb Hanumant

Bandekar, Ashutosh Gurudas Harmalkar, Bradwel Jose Antonio Pinto

6

Comparison of Approaches of Distributed Satellite Image Edge Detection on

Hadoop

Tapan Sharma, Vinod Shokeen, Sunil Mathur

7

Blended Vector Matrix On Different Channels Of Image Encryption With Multi-

Level Distinct

Frequency Based Chaotic Approach To Prevent Cyber Crimes By Using Affine

Transformation

Harsh Mathur, S. Veenadhari

8

AN ADAPTIVE WINDOW BASED POLYNOMIAL FITTING APPROACH FOR PIXEL MATCHING IN

STEREO IMAGES

Lokesh Sharma, Darpan Anand, Jayash Kumar Sharma, Shakti Sharma

Session-VI | Parallel Session-II

21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 UAV Video Processing for Traffic Surveillence with Enhanced Vehicle Detection

Najiya K. V, Archana M

2 Analysis of Community Detection Algorithms

Jaya Krishna R, Yash Chaudhry, Devi Prasad Sharma

3 Impacts of correlated failures in data plane and rule space occupation in

Software-Defined Networking(SDN)

Sonali Sen Baidya, Abhishek Baidya

4 Design and Analysis of Different Configurations of Photonic Crystal Ring

Resonator

Phalguni, Harsimranjit Kaur

5 Reliable Smart Earplug Sensors for Monitoring Human Organs based on 5G

Technology

Divya.R, Chinnaiyan

6 Detection of a Drowsy state of the Driver on road using wearable sensors: A

survey

Dishita Mashru, Vaibhav Gandhi

Page 32: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

7 Survey on Clustering Techniques

Damodar Reddy Edla, Diwakar Tripathi, Venkatanareshbabu Kuppili,

Ramalingaswamy Cheruku

8

Bus Voltage Magnitude Improvement of IEEE 14 Bus System with Multiple

Renewable Sources Feeding Heavy Electrical Vehicle Load

Abhishek Dattaram Ghagare, Janhavi Sudhir Bhatkar, Shweta Hanumant Ganage,

Ashwini Ajit Nikam, Onkar M. Marathe

Session-VI | Parallel Session-III 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Image Compression using Shannon- Fano-Elias Coding and Run Length Encoding

M.Rajasekhar Reddy,K.Akshaya, R. Alice Infanta Seles, RA.Dhivya,

K.S.Ravichandran

2 Analysis of Bandwidth and Miniaturization of Yagi Uda Antenna

Saurabh kumar, Harbinder Singh

3 AUTOMATED SYSTEM FOR RETINAL VESSEL SEGMENTATION

Akyas Ahamed T U, Abhin Jothish, Geo Johnson, Santhosh Krishna B V

4 Data Preprocessing for Efficient Sentimental Analysis

Shreyas Wankhede, Ranjit Patil, Sagar Sonawane, Ashwini Save

5 Mining Utility Patterns

ASHMITA SAHA, DR. VAISHALI D. KHAIRNAR

6 A Streamlined Approach for Real-Time Data Analytics

Shruti Arora, Rinkle Rani

7 A survey on big data applications and challenges

Palak V. Desai

8 Automated Traffic Monitoring Using Image Vision

R. Krishnamoorthy, Sethu Manickam

Page 33: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-VI | Parallel Session-IV 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Beamforming using Phased Coprime MIMO Radar

Minerva Priyadarsini, C.Srinivas Rao

2 Negative Image Matching Technique and Its Realization for Ultra-Wide Band Low

Noise Amplifier

Kishor G Sawarkar, Kushal Tuckley

3 Network Lifetime Enhancement using Improved Honey Bee Optimization based

Routing Protocol for WSN

Deepshikha Sharma, Sukanya Kulkarni

4 AUTOMATIC SPEED CONTROL OF VEHICLE USING VIDEO PROCESSING

R.D.Thombare, P. M.Sawant, P. P.Sawant, P. A.Sawant, V. P.Naik

5 Artificial Intelligence Based Solar Bot

Wasudeo Rahane, Sayali Patil, Komal Dhondkar, Tanvi Mate

6 A Robust Color Image Encryption Algorithm in Dual Domain using Chaotic Map

Deepak Kumar Singh , Dr. Kuldeep Tomar

7 Autonomous Driving Car Using Convolutional Neural Networks

Raj Chaudhari, Shivani Dubey, Jayesh Kathale, Rama Rao

8 An enhanced Data Possession Checking scheme using Identity Based Signature

Thayaambika M, Solomon Sylvia Rajakumar, V Kalpana

Session-VI | Parallel Session-V

Page 34: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Automatization of Coloring Grayscale Images using Convolutional Neural

Network

Shweta Salve, Twinkle Shah, Vishakha Ranjane, Sumitra Sadhukhan

2 Comparative Analysis of Data Mining Models for Crop Yield by Using Rainfall

and Soil Attributes

Kunal Teeda, Nandini Vallabhaneni, T.Sridevi

3 CLUSTERING BASED PRIORITIZATION OF TEST CASES

Paruchuri Ramya, Vemuri Sindhura, Dr. P. Vidya Sagar

4 AN IOT BASED SMART MOBILE HEALTH MONITORING SYSTEM

Vemuri Sindhura, Paruchuri Ramya, Sandeep Yelisetti

5 High Resolution CSRR Loaded Microstrip Line Resonator for Dielectric Sensing

Application

Subhasish Pandav, Surya Prakash Singh

6 CLUSTERING BASED PRIORITIZATION OF TEST CASES

Paruchuri Ramya, P. Vidya Sagar, Vemuri Sindhura

7 HIGH GAIN MICROSTRIP PATCH ANTENNA FOR BIOMEDICAL APPLICATIONS

Dhayabarani R, Anitha C, Aby john J , Gomathi P, Hebsiba B

8 Design of FIR Filter for Reduction of Power line Interference from ECG signal

ARUNKUMAR R, BALACHANDAR P, ELAKKIYASELVAN M

Session-VI | Parallel Session-VI 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Design of Rectangular Patch Antenna with X-slots for Wireless Communications

B.Kalyan Kumar, P.V.V.Kishore, K. Kumar Naik

2 Mathematical Modeling and control of QNET Rotary inverted pendulum in MATLAB

and real time implementation in LabVIEW using ELVIS

R.Sritharan, M.Sivapalanirajan, M.WilljuiceIruthayarajan

Page 35: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

3 Towards on Cloud of Things: Survey, Challenges,Open Research Issues, and

Tools

Abdulrahman Mohammed, Prasant Kumar Pattnaik, Santosh Kumar Pani

4

THROTTLED LOAD BALANCING SCHEDULING POLICY ASSIST TO REDUCE

GRAND TOTAL COST AND DATA CENTER PROCESSING TIME IN CLOUD

ENVIRONMENT USING CLOUD ANALYST

Snehal A.Narale, P.K.Butey

5 NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION

Ch.Nagamani, Suneetha Chittineni

6 A Boosting Approach for Maternal Hypertensive Disorder Detection

Neethu Mathew

7 Gait Based Authentication with Hog Feature Extraction

S. Joul Monisha ,G. Merlin Sheeba

8

IOT Based Live Environmental Monitoring Using Embedded Sensors

Kannadasan.R ,Prabakaran.R, Namarata Galla ,Kavuri Vamsi ,Karan Balakrishna,

Upendra,

Challagulla Akshay Kumar.S and Tushar Kumar

Session-VI | Parallel Session-VII 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Design and Analysis of Microstrip Patch Antenna and Antenna Array for

Vehicular Communication System

Uzma Uddin, W. Akaram, Md Rashid Anasri

2 A Novel soft switching bidirectional dc dc converter

Bindhu Babu, Divya S

3 Weather Forecasting Using Artificial Neural Network

Dires Negash Fente, Dheeraj Kumar Singh

4 Pokemon Fight Augmented Reality Game

Akshay Karkera, Sushil Dhadse, Vinayak Gawde, Kavita Jain

5 RF Transceiver based Vehicle Speed Control for Economic Student Transport

Arjun M, Nihal N, Salahudheen S, Shahina E P, Nitin V Nair

6 A state-of-the-art Recommender Systems: an overview on Concepts, Methodology

and Challenges

Priyanka Jariha, Sanjay Kumar Jain

Page 36: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

7 Moving object detection and tracking using deep learning neural network and

correlation filter

Supreeth H S G, Chandrashekar M Patil

8

Mining Association rule with Attribute Oriented Induction High level Emerging

Pattern (AOI-HEP) data mining technique

Harco Leslie Hendric Spits Warnars, Ford Lumban, Gaol, Yaya Heryadi, Agung

Trisetyarso, Horacio Emilio Perez Sanchez

Session-VII | Parallel Session-I 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Wireless Printing System

Priyanka Bhosale, Shivam Yeole, Suchita Singh, Sunayana Modhave, Nilima

Dongre, Madhav Vyas

2 Voice to Text transcription using CMU Sphinx

Burhanuddin Lakdawala, Farhan Khan, Arif Khan, Yash Tomar, Rahul Gupta,

Ashfaq Shaikh

3 A Logistic Approach To Route Image In A Protected Way – A Skeptimistic Image

Nithya Chidambaram, Manikandan N, Muthu Kumar R, Pethuru Raj, Thenmozhi K,

Amirtharajan Rengarajan

4

DNA Coupled Chaos For Unified Color Image Encryption – A Secure Sharing

Approach

Nithya Chidambaram,Thenmozhi K, Amirtharajan, Rengarajan, Kunda Vineela,

Srilakshmi Murali,Veerepalli Vandana, Pethuru Raj,

5 Onboard Entertainment Services using Raspberry Pi with Recommendation Engine

Wasudeo Rahane, Shriman Anand Kabra, Pallavi Ravindra Kore, Anurag

Dipakkumar Pawar, Akshay Vijaykumar Gugale

6 Highly Impartible Spatial Domain Steganography in Double Precision Images

ARUN KUMAR SINGH, JUHI SINGH, Dr. HARSH VIKRAM SINGH

7 A Novel Approach Towards Handwritten Character Recognition Using Deep-

Learning

Rohan Vaidya , Darshan Trivedi , Sagar Satra , Mrunalini Pimpale

8 Power Quality Analysis For Sugar Industry With Cogeneration

Vaibhav P. Ingale, Akash D. Jadhav, Nilesh K. Takawale, Shrikant D. Mangate

Page 37: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-VII | Parallel Session-II 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Prediction of Prediabetes using Fuzzy Logic based Association Classification

A.M.Rajeswari, M.Sumaiya Sidhika, M.Kalaivani, C.Deisy

2 IoT Based Intelligent Traffic Signal System For Emergency Vehicles

S.P.Patil , Shubhankar Bhate, Prasad Kulkarni, Shubham Lagad, Mahesh Shinde

3 Prediction of Cardiac Disease Based on Patient’s Symptoms

Prabakaran.N, Kannadasan.R

4 Intelligent Healthcare Using IoT:A Extensive Survey

Disha Amrutlal Gandhi, Munmun Ghosal

5 Abstractive Summarization using Graph Based Methods

Chetana Badgujar,Vimla Jethani, Tushar Ghorpade

6 Realization of Band Stop Filter using Perturbed Microstrip Line

Devika Mohan, Jwala A, Meenakshi Sreekumar, Thriveni B. Krishnan and

Sreedevi K. Menon

7 MODIFIED HEFT ALGORITHM FOR WORKFLOW SCHEDULING IN CLOUD COMPUTING

ENVIRONMENT

M.Divyaprabha,V.Priyadharshni,V.Kalpana

8 A Secured IoT Based Webcare Healthcare Controlling System using BSN

Snehal Sanjay Kale, Dheeraj Bhagwat

Session-VII | Parallel Session-III

Page 38: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Intrusion detection System based on Hybrid Whale-Genetic Algorithm

Riya Bilaiya, Rajeev Mohan Sharma

2 A Word Embedding Model For Topic Recommendation

Megala S Kannan, Smitha E S, Mahalakshmi G S, Sendhilkumar S

3 Design of Circularly Polarized Microstrip Patch Antenna with Inserting of

Shorting Pins

Jayesh B. Patil, Deepak C. Karia

4 Sub-threshold Inverter for Low Power Consumption

Sindhu R, Shilpa Mehta

5 Boolean-based Multi Secret Sharing Scheme using Meaningful Shares

Vishakha J. Kapadiya, Laxmi S. Desai, Yogesh K. Meghrajani

6 FPGA IMPLEMENTATION FOR THE LINKING OF CELL TRACKS USING NEW STRUCTURE

ALGORITHM

MOHAMMAD JAVEED, GIRIBABU KANDE

7 Design a maximally flat 5th-order BSF for a receiver for satellite

communication

Anisha Kiran, Shikha Sargam, Md Imranuddin

8 An Android based Mobile Application for Career Guidance

Vishal. D. Kamath, Deepthi S

Session-VII | Parallel Session-IV 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 BER analysis using Pilot Contamination Mitigation Technique over Weibull

Fading in Massive MIMO System

Bharti Katiyar, Chetan Fadnis

2 Time Frequency Analysis of OFDM-LFM Waveforms for Multistatic Airborne Radar

Dillip Dash, Kodanda Dhar Sa,Valarmathi Jayaraman

Page 39: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

3 DCT Based Multifocus Image Fusion for Wireless Sensor Networks

Subham Mahapatra, Kodanda Dhar Sa, Dillip Dash

4 Design of an efficient algorithm for Iris recognition

Sunil S Harakannanavar, Asharani T S

5 ENHANCED SENTIMENT CLASSIFICATION USING GEO LOCATION TWEETS

Shital Anil Phand, V. A. Chakkarwar

6 A Comparative Study of the Techniques for Feature Extraction and

Classification in Stuttering

Shweta Khara, Shailendra Singh, Dharam Vir

7 MPTCP over Datacenter Networks

Rajnish Kumar Chaturvedi, Satish Chand

8 Finger Print Image Enhancement using Thresholding and Binarization Techniques

Anupama Shetter, Prajwalasimha S N, Swapna H

9 House Price Prediction Using Machine Learning And Neural Networks

Ayush Varma, Abhijit Sarma, Sagar Doshi, Rohini Nair

Session-VII | Parallel Session-V 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 AN ENHANCED BIOMETRIC INFORMATION SECURITY SYSTEM USING ORTHOGONAL CODES AND

LSB STEGANOGRAPHY

G H Ghazia, Kanjana G

2 FPGA Implementation of Physical Layer Data Encoding Schemes

Gawtham G Dath, Anu Chalil

3 TRAFFIC LIGHT CONTROLLER USING SOUND SENSORS AND DENSITY SENSORS

E. Sree Devi, M.Sindhuja, D.Sudha, S.Pushpa, R.R. Jegan

4 Fall Detection System using Artificial Neural Network

Anagha Purushothaman, Vineetha K. V, Dhanesh G. Kurup

5 Convolutional Neural Network for categorization of Lung Tissue Patterns in

Interstitial Lung Diseases

Namrata Bondfale, D.S. Bhagwat

6 Implementation of Area and Power Efficient components of a MAC unit for DSP

Page 40: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Processors

Mumin Sajad, Archika Singh, Nidhi Gaur, Shikha Bathla, Anupama Mehra

7 EXTENSIBLE FLEXRAY COMMUNICATION METHODOLOGY FOR THE APPLICATION OF ADVANCED

AUTOMOBILE APPLICATION

S.SEDHUMADHAVAN, M.ANITHA, B.RENUKADEVI, B.VINOTHINI

8 Preventive Maintenance System For Dam using IOT and Cloud

Mrunalini Bajare, Shraddha Kawade, Manali Kamble, Apurva Deshpande, Prof.

Jayant D. Bokefode

9 Game theoretical approach with Audit based Misbehavior Detection system

Gayathri Narayanan, Mr.Krishna Das J, M Rajeswari , Dr.Satheesh Kumar R

Session-VII | Parallel Session-VI 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 A Novel Low Complexity PAPR Reduction scheme for TDS-OFDM Systems

Pavika Sharma, Deepak Kedia

2 Privacy & Security in Mobile Devices, Social Network Services and Social

Reform

S.M. Buddhika Harshanath

3 Matrix Circuit Designing for a Multiport Multiple Beam Generating Antenna

Alfia M, Sreekumari Amma

4 INTELLIGENT DECISION MAKING SYSTEM FOR QUALITY DETECTION OF LIQUID FOOD

SAMPLES

Akshay Rajesh Babtiwale, R. P. Mudhalwadkar, Pratik Vijay Makh

5 Hybrid Approach For Feature Extraction of Lung Cancer Detection

Twinkal Patel, Vimal Nayak

6 HIGH-SPEED, LOW-POWER, AND HIGHLY RELIABLE FREQUENCY MULTIPLIER FOR DLL-BASED

CLOCK GENERATOR

K.RAMYA, B.SOWMIYA, R.ILAIYARAJA

7 Sensor System Development for Bronchitis Detection from Exhaled Breath

Pratik Makh, Rohini Mudhalwadkar, Akshay Babtiwale

8 ROBOTIC LIBRARY ASSISTANT

Sai Praneeth Animireddy, Kanak Prabha Singh, Neha, Natarajan.V

9 Design & Performance Analysis of Area Optimized In BPSK On NCO And High Speed

64 Bit-QAM With Gardner Algorithm

Ilaiyaraja.R, S.Sedhumadhavan

Page 41: International Conference on Inventive Communication …icicct.org/ICICCT-2018 Schedule.pdfCommunication through Real-Time Video Oculography Using Face ... Badrinarayan Behera,

Session-VII | Parallel Session-VII 21st APRIL 2018 | 01.45 pm -03.45 pm

S.No Title/Author Name

1 Computational Intelligence Approach for Predicting Ischemic Stroke using

Brain MRI

A.K. Subudhi, M. Mohanty, S. S. Jena, S. K. Sabut

2 Design of low voltage supply Current Feedback Operational Amplifier

Ansari Faheem, Narendra Bhagat, Uday Pandit Khot

3 Design of Secure Storage for Health-care Cloud using Hybrid Cryptography

P.Chinnasamy, P.Deepalakshmi

4 Single Phase Isolated Converter for Light Electric Vehicle Charging with PFC

and Battery Protection

Thasni V. M, P.C. Unnikrishnan, Ragam Rajagopal

5 A Novel Approach for Detection of Copy-Move Forgery Detection using Transform

Domain

T.Sridevi, B.Ramya Krishna

6 Futuristic Surveillance Spectacles

Sourabh Tirodkar, Elton Rodrigues, Harsh Raval

7 SINGLE SOURCE 31-LEVEL CASCADED H-BRIDGE MULTILEVEL INVERTER

Gopika R, Deepa Sankar, Priya Jose

8 Air pollution monitoring and prediction using IoT

Temesegan Walelign Ayele, Rutvik Mehta

9

Optimization of Concentric Circular Arrays Using a Crossover Improved Genetic

Algorithm

Ankit Kumar Azad, Amrita Jena, Prerna, Anumodita Mishra, Richa Singh and

Bhargav Appasani

10 Data Deduplication On Encrypted Big Data In HDFS

Saif Ahmed Salim, Prof. Latika R. Desai

11 iDUSTER: Improved Method for Removing DUST Based on Efficient Multiple

Sequence Alignment Technique

Mrs. Priyanka S. Rane, Mrs. Madhuri Dalal

12 Automated Approach for DDOS Attacks Detection Based on Naive Bayes

Multinomial Classifier

Mrs. Shital K. Ajagekar, Prof. Vaishali Jadhav

13 IOT BASED HEALTH MONITORING SYSTEM USING RASPBERRY PI – REVIEW

Sunilkumar Laxmanbhai Rohit, Bharat V. Tank