2014 Conference on IT in Business, Industry and Government

2014 Conference on IT in Business, Industry and Government (CSIBIG 2014) Indore, India 8-9 March 2014 IEEE Catalog Number: ISBN: CFP1457X-POD 978-1...
Author: Kelly Mills
5 downloads 1 Views 368KB Size
2014 Conference on IT in Business, Industry and Government (CSIBIG 2014)

Indore, India 8-9 March 2014

IEEE Catalog Number: ISBN:

CFP1457X-POD 978-1-4799-3065-4

TABLE OF CONTENTS Preface Committee of CSIBIG 2014

INVITED TALK 1.

Security in Big Data of Medical Records 1 Dr. Aynur Ünal

2.

Analytics in the age of Big Data and the Internet of Things 3 Ashwin Rao Karavadi

3.

Improving Business Performance using Big Data 4 Anadi Upadhyay

4.

Engineering Analytics for Big Data 5 Dr. Ravi (Ravinder) Prakash G

5.

A Framework for Enhancing Quality of Learning and Knowledge Management Programmes using Analytics 6 H.R. Vishwakarma, B.K. Tripathy, D.P. Kothari

6.

Windows Azure HDInsight: Where big Data Meets the Cloud 8 Vinit Kumar Baheti

7.

Big Data and its Applicatios 10 Rishabh Agrawal

8.

The Berkeley Data Analytics Stack (BDAS) 11 Jayati

9.

Intrusion Detection Using Data Mining 12 Prof. (Dr.) Sunil Kumar Khatri

10.

Emerging Trends in Cloud Computing and Big Data 14 Dr. Dharanipragada Janakiram, Ph.D

11.

Big Data analytics with Case Study on Financial Organization 15 Anurag Mandloi

PAPERS 1.

Bird’s Eye View On “Big Data Management” 16 Jetti Suresh

2.

Content Sharing in Information Storage and Retrieval System Using Tree Representation of Documents 21 Dharmendra Sharma, Suresh Jain

3.

The Dawn of Big Data - Hbase 25 Vijayalakshmi Bhupathiraju, Ravi Prasad Ravuri

4.

Big Data: A Security Compliance Model 29

Archana Gupta, Ajita Verma, Parul Kalra, Lokesh Kumar 5.

Using Social Big Media for Customer Analytics 34 Aditya Patel, Hardik Gheewala, Lalit Nagla

6.

Real Time BIG Data Analytic: Security Concern and Challenges with Machine Learning Algorithm 40 Jainendra Singh

7.

Green Data Base Management System for the Intermediaries of Indian Stock Market 44 Krishna Kumar Singh, Priti Dimri, J.N. Singh

8.

Efficient Techniques for Improving Performance of Horizontal Aggregations in SQL Eͬ G. Rama Krishna, G. Sameer

9.

Information Diffusion through Social Media- Analysing Brand Promotion through Social Network Analysis tools -a Business Case Studyϱϯ Mini U., Poulose Jacob

10.

Impact of Wireless Technology on Future of Big-data Industryϱϳ Majid Ahmad, Tahir Rashid, Durgesh Kumar Mishra

11.

Novel Algorithm to Measure Consistency between Extracted Models from Big Dataset and Predicting Applicability of Rule Extraction ϲϭ Kamal Kumar Sethi, Durgesh Kumar Mishra, Bharat Mishra

12.

Towards Efficient Big Data and Data Analytics: A Reviewϲϵ Salim Raza Qureshi, Ankur Gupta

13.

A Classification Based Approach to Create Database Policy for Intrusion Detection and Respond Anomaly Requests ϳϱ Jitendra Parmar

14.

A Review on Vein Biometric Recognition using |Geometric Pattern Matching Techniques ϴϮ Anjali Agarwal, Saurabh Maheshwari, Garima Yadav

15.

Technique of Intrusion Detection Based on Neural Network- A Reviewϴϵ Anand Swarup Sen, Pritesh Jain

16.

Multilevel Authentication for Resource Allotment in MANETϵϮ Megha Patidar, Mayank Kumar Sharma, Aaquil Bunglowala

17.

Watermarking for Security in Database: A Review ϵϲ Brijesh B. Mehta, Hardika D. Aswar

18.

Implementation Issues and Challenges with PKI Infrastructure and its integration with in-house Developed IT Applications ϭϬϮ

Alok Jain, Gitika Khare, Alpana Rajan, Nirmala Manjhi, Diptikant Pathy, Anil Rawat

19.

A Distributed Randomization Framework for Privacy Preservation in Big Data ϭϬϳ Samiksha Shukla, G Sadashivappa

20.

Information Security Risk Management in Critical Informative Systems ϭϭϮ K.V.D. Kiran, L.S.S. Reddy, Velagapudi Pavan Kumar, Kalluri Krishna Sai Dheeraj

21.

Literature Survey – IDS for DDoS Attacks ϭϭϳ

Naveen Mohan Prajapati, Atish Mishra, Praveen Bhanodia 22.

Parallel and Distributed Approach for Incremental Closed Regular Pattern Mining ϭϮϬ M. Sreedevi, G.Vijay Kumar, L. S.S. Reddy

23.

Two Approach Comparisons for Relative Evaluation of Faculty Performance Using Data Mining Techniques ϭϮϱ Archana Bhardwaj, Mamta Bhusry

24.

Managing Data in SVM Supervised Algorithm for Data Mining Technology ϭϯϰ Sachin Bhaskar, Vijay Bahadur Singh, A. K. Nayak

25.

Evolution of Data Mining: An Overview ϭϯϴ Majid Ramzan, Majid Ahmad

26.

A Study on Designing A Layered Star Schema for Data Mining Optimization ϭϰϮ Md. Shams Raza, A.K. Nayak

27.

A Novel Approach for Discovering Relevant Semantic Associations on Social web Mining ϭϰϳ Lakshmana Phaneendra Maguluri, M Vamsi Krishna, P S S Sridhar

28.

Analyzing Web Application Log Files to Find Hit Count Through the Utilization of Hadoop MapReduce in Cloud Computing Environment ϭϱϰ Sayalee Narkhede, Trupti Baraskar, Debajyoti Mukhopadhyay

29.

Big Data: Magnification Beyond the Relational Database and Data Mining Exigency of Cloud Computing ϭϲϭ Abhishek Khare

30.

Privacy Preserving Model in Cloud Environment ϭϲϳ V.K. Saxena, Shashank Pushkar

31.

Combining Encryption and Stego - Object Processing: A New Direction in Cloud Securityϭϳϯ Aishwarya Kaul, Sheoli Tuli, Rachna Jain

32.

Extreme Programming for Service-Based Application Development Architecture ϭϳϳ G. Sivanageswara Rao, Ch.V. Phani Krishna, K. Rajasekhar Rao

33.

Performance Evolution of Higher Reliability Task in Cloud Computing ϭϴϭ Ankit Upadhyay, Prashant Lakkadwala

34.

A Survey Paper on Cloud Security Issues and Challenges ϭϴϰ Tunisha Saxena, Vaishali Chourey

35.

Neighbourhood Systems Based Knowledge Acquisition Using MapReduce from Big Data Over Cloud Computing ϭϴϵ B.K.Tripathy, H.R. Vishwakarma, D.P. Kothari

36.

Software Cost Estimation using the Improved Fuzzy Logic Framework ϭϵϱ Neetu Kushwaha, Suryakant

37.

Effect of Managerial Dimensions on Reengineering Process of Legacy Software Systems ϮϬϬ Anand Rajavat, Vrinda Tokekar

38.

When to Stop Testing Under Warranty Using SRGM with Change-Point ϮϬϲ

P.K. Kapur, Sunil Kumar Khatri, Ompal Singh, A.K.Shrivastava 39.

Improving the Rapid Application Development process Model Ϯϭϯ B. Prashanth Kumar, Y. Prashanth

40.

Parsing Natural Language Text of Use Case Description Ϯϭϲ Prasanth Yalla, Nakul Sharma

41.

Structure Based Drug Design Studies on CDK2 Amino Pyrazole Inhibitors Using Autodock Tools Ϯϭϵ Nulaka Srinivasu, K.V.V. Satyanarayana, N. Gopala Krishna Murthy

42.

Building of an Ecosystem of Applications for Efficient Delivery of Financial Services: A Case for MIPCϮϮϰ

Purav Parikh 43.

Overview of Software Engineering Metrics for Procedural Paradigm ϮϮϳ Gaurav Gaur, Bharti Suri, Shweta Singhal

44.

Web Based Spatio -Temporal data Modeling and Application Development for Solar Power Plant Siting using GIS for India ϮϯϮ B.C. Surve

45.

Survey of Algorithms for Assigning Advertisement to Search Keywords Ϯϯϳ Ashish S. Awate, Sameer S. Prabhune

46.

A Systematic Approach to Automate Spiddos Information Extraction for On-Web GP SystemϮϰϮ

Madhu Sharma, Anita Rathore, Richa Bhatt, Saakshi Sharma, Manish Biyani Harshita Sharma, Koichi Nishigaki 47.

Hidden Web Data Extraction using Wordnet Ontology’s Ϯϰϳ Vidya Sagar Ponnam, V. P Krishna Anne, Venkata Kishore Konki

48.

Web Image Re-Ranking by Utilizing Text and Visual Features Ϯϱϭ Aruna Bajpai

49.

Prediction of Heart Disease Using Learning Vector Quantization Algorithm Ϯϱϲ Jayshril S. Sonawane, D. R. Patil

50.

The New Age Search Engines Ϯϲϭ Sumith Kumar Puri

51.

Modification in Routing Mechanism of AODV for Defending Blackhole and Wormhole Attacks Ϯϲϴ

Kriti Patidar, Vandana Dubey 52.

A Survey on Load Based Routing Techniques in Wireless Ad-Hoc NetworkϮϳϰ Neeraj Shrivastava, Bharat Pahadiya

53.

Energy Model Techniques in Wireless AdHoc Network Ϯϳϵ Ajaykumar T. Shah, Shrikant Patel, Amit J. Patel

54.

Enhancement of Manet Routing Protocol Ϯϴϱ Rais Khan, Ansari Mohammad Nabi Azad S., Anilkumar Vishwakarma

55.

Performance Evaluation of Coordinated Node Monitoring & Response (CNMR) Based IDS for MANET Ϯϵϭ

Ankit Agrawal, Megha Patidar, Mayank Kumar Sharma 56.

Comparison of Ad hoc Reactive Routing Protocols: AODV and DSR with Respect to Performance Parameters for Different Number of NodesϮϵϳ

Ankit Chopra, Rajeev G. Vishwakarma 57.

A Novel Technique for Improving the Performance of Read Operations in BlobSeer Distributed File SystemϯϬϭ

T Lakshmi Siva Rama Krishna, T. Ragunathan 58.

Distributed Knowledge Base Fault Tolerant System ϯϬϴ Swati Rustogi, Manisha, P.C. Saxena

59.

To Evaluate the Impact of Vector Mobility Modelover Routing Protocols in MANET ϯϭϯ Suryakant, Neetu Kushwaha

60.

An Enhanced Framework for Optimizing the throughput of ZigBee Cluster Tree Network ϯϭϵ Mayuri Singhal, Neeraj Mehta

61.

QoS Model for Intranet Area Network Based on Media Access Control Protocol over TCP Connection ϯϮϱ

Ravi Verma, Bharat Bhushan 62.

Fuzzy Logic based Clusterhead Selection Protocol under Competence Level, Goodness Funciton and Mobility for Mobile Ad Hoc Network ϯϯϬ Shivangi Singhal, A. K. Daniel

63.

Stable and Scalable on-demand Routing for Mobile Ad hoc network ϯϯϲ Ayushi Singhal, A.K. Daniel

64.

Simulation Analysis of Directed Diffusion and SPIN Routing Protocol in Wireless Sensor NetworkϯϰϮ

Vaishali Jain, Nayyar Ahmed Khan 65.

Novel Approach for Reliable Communication Using Energy Aware Routing Protocol in MANETϯϰϴ

Akanksha Meshram, M .A. Rizvi 66.

Feasibility of TEA in Wireless Sensor Networksϯϱϯ Binod Kumar Mishra, Mohan C. Nikam, Prashant Lakkadwala

67.

Detection and Prevention of Worm Holes in Mobile ad-hoc Networks using Hybrid Methodology ϯϱϵ

Vikas Kumar Upadhyay, Rajesh K Shukla, Rajshree Dubey 68.

Denoising of Images using Fuzzy Rulebase and Clustering Approach ϯϲϱ Saikat Maity, Jaya Sil

69.

Video Inpainting of Objects using Modified Patch based Image Inpainting Algorithm ϯϳϮ B. A. Ahire, Neeta A. Deshpande

70.

Automatic Construction Health Image Library Using Information Retrieval Technique ϯϳϳ Neha Sharma

71.

Facial Expression Representation and Classification using LBP, 2DPCA and their Combination ϯϴϰ Sunny Bagga, Sarika Jain, Ramchand Hablani, Narendra Choudhari, Sanjay Tanwani

72.

User Friendly Approach for Video Search Technique Using Text and Image as Query ϯϴϵ Vishakha Soni, Sandeep Kumar Mathariya, Ranu Soni

73.

Blind Digital Watermarking algorithm based on DCT Domain and Fractal Images ϰϬϭ Arun, Kunal Kumar Kabi, Bidyut Jyoti Saha, Chittaranjan Pradhan

74.

Image Retrieval Using Contribution-based Clustering Algorithm with Different Feature Extraction Techniques ϰϬϴ Snehal Mahajan, Dharmaraj Patil

75.

Significance of Facial Features in Performance of Automatic Facial Expression Recognition ϰϭϱ

           

Sarika Jain, Sunny Bagga, Ramchand Hablani, Narendra Choudhari, Sanjay Tanwani 76.

Novel Technique Data- Hiding Scheme for Digital Image ϰϮϮ Poorva Khandelwal, Barkha Sahu

77.

Noise Removal using First Order Neighborhood Mean Filter 426 Priyanka Shrivastava, Uday Pratap Singh

78.

Heart Rate Monitoring System using IR base Sensor & Arduino Uno 432 Prajakta A. Pawar

79.

Short Messaging Service as an Alternative for Pushing Information to Build Efficient Information Passing Systems in Academic Institutions 435 Vamshi Krishna, Rachit Anurag, S. S. Prabhune

80.

Hybrid Wavenet Model for Short Term Electrical Load Forecasting 441 D.A. Kapgate, S.W. Mohod

81.

Coordinated Multi-Robot Navigation Using Sectorization of Environment 449 Wali Ullah Farooqui, Lokesh Chouhan

82.

Analysis of LMS, RLS and SMI Algorithm on the Basis of Physical Parameters for Smart Antenna 455 Vijendra Mishra, Gaurav Chaitanya

Author Index

   

Suggest Documents