Registered Papers

ICCAN 2017

First Round Registered Articles. Second Round Registration will be updated soon…

Paper Id

Paper Title

24

Optimization of Handoff Latency using Efficient Spectrum Sensing for CR System

Rohini S. Kale, and J.B.Helonde

34

Location Independent Key Distribution for Sensor Network using Regular Graph

Monjul Saikia and Md. Anwar Hussain

41

Performance Comparison of Deep VM Workload Prediction Approaches for Cloud

Yashwant Singh Patel, and Rajiv Misra

45

A New Neural Network Based IDS for Cloud Computing

Priyanka Joshi, Ritu Prasad, Pradeep Mewada, and Praneet Saurabh

52

Designing of an Orchestration Mechanism for the Efficient Web-Services Composition

Reena Gupta,  Raj Kamal,  and Ugrasen Suman

55

Influence of Parameters in Multiple Sequence Alignment Methods for Protein Sequences

P.Manikandan, and D. Ramyachitra

57

Analyzing Cloud Computing Security issues and Challenges

Neeti Mehra, Shalu Aggarwal, Ankita Shokeen, and Deepa Bura

61

An online review based hotel selection process using intuitionistic fuzzy TOPSIS method

Saikat Pahari, Dhrubajyoti Ghosh, and Anita Pal

64

A Layered Approach to Network Intrusion Detection using Rule Learning Classifiers with Nature Inspired Feature Selection

Ashalata Panigrahi, and Manas Ranjan Patra

68

Fractal Dimension of Gray Scale Images

Soumya Ranjan Nayak, Jibitesh Mishra, and Pyari Mohan Jena

75

Dominant and LBP based content image retrieval using combination of color, shape and texture features

Savita Chauhan, Ritu Prasad, Praneet Saurabh, and Pradeep Mewada

76

Proof of Retrieval and Ownership for Secure Fuzzy Deduplication of Multimedia Data

Preetha Bini S and Abirami S

78

Maintaining Consistency in Data-intensive Cloud Computing Environment

Sruti Basu, and Prasant Kumar Pattnaik

81

Cryptographic key Generation Scheme from Cancellable Biometrics

Arpita Sarkar, Binod KrSingh, and Ujjayanta Bhaumik

82

A Trust Based Technique For Secure Spectrum Access in Cognitive Radio Networks

Sumit Kar, Srinivas Sethi, and Ramesh Kumar Sahoo

85

Analytics Based On Video-Object Tracking for Surveillance

Nagaraj Bhat, U Eranna, Mahendra B M, Savita Sonali,Adokshaja Kulkarni, and Vikhyath Rai

86

Histogram of Oriented Gradients based Digit Classification using Naive Bayesian Classifier

Shashwati Mishra, and Mrutyunjaya Panda

89

Identifying Dissimilar OLAP Query Session for Building Goal Hierarchy

Parimala N. and Ranjeet Kumar Ranjan

90

Retinal Vessel Extraction and Fovea Detection Using Morphological Processing

Avik Banerjee, Soumyadeep Bhattacharjee, and Sk.Latib

92

 Developing High Performance AVM based VLSI Computing Systems: A Study

Siba Kumar Panda, and Dhruba Charan Panda

93

A Fuzzy Optimization Technique For Energy Efficient Node Localization In Wireless Sensor Network Using Dynamic Trilateration Method

Saroj Kumar Rout, Amiya Kumar Rath, Pradyumna Kumar Mohapatra,  Pradeep K. Jena, and Aparimita Swain

94

Flow Aggregator Module for Analysing Network Traffic

Nour Moustafa, Gideon Creech, and Jill Slay

96

Anomaly Detection System using Beta Mixture Models and Outlier Detection

Nour Moustafa, Gideon Creech, and Jill Slay

106

Personalize Movie Recommendation System Using Twitter Data

Debashis Das, Himadri Tanaya Chidananda, Laxman Sahoo, and Sujoy Dutta

108

Implementation of Chaotic Based Hybrid Method to Provide Double Layer Protection

Shreela Dash, Madhabananda Das, and Mamatarani Das

121

Sentiment Analysis Using N-gram Technique

Himadri Tanaya Chidananda, Debashis Das, and Santwana Sagnika

131

A Novel Edge Supported Cost Efficient Resource Management Approach for Smart Grid System

Jyotirmaya Mishra, Jitendra Sheetlani, Diptendu S Roy, and K Hemant K Reddy

137

Improved Task Scheduling Algorithm Using Multi-criteria Decision-making Method (MACBETH) in Cloud Computing

Suvendu Chandan Nayak , Sasmita Parida, Chitaranjan Tripathy, Prasant Kumar Pattnaik

139

Multi-Objective Data Aggregation for Clustered Wireless Sensor Networks

Sukhchandan Randhawa and Sushma Jain

142

Multi-objective Assessment of Wind/BES Siting and Sizing in Electric Distribution Network

Kumari Kasturi ,  and M. R. Nayak

144

Drowsiness Detection for Safe Driving Using PCA EEG Signals

Poorna S S, Arsha V V, Aparna P T A, Parvathy Gopal, and G J Nair

148

Remote Healthcare Development Using Vehicular Ad hoc and Sensor Networks

Suparna DasGupta, Soumyabrata Saha, and Koyel Chatterjee

150

Comparative Analysis of Subcontracting Scheduling Methods

Konstantin Aksyonov, Anna Antonova, and Eugene Sysoletin

151

Chaos based Modifed Morphological Genetic Algorithm for Software Development Cost Estimation

Saurabh Bilgaiyan, Kunwar Aditya, Samaresh Mishra, and Madhabananda Das

152

K-Means Clustering: An Efficient Algorithm for Protein Complex Detection

S. Kalaivani, D. Ramyachitra, and P. Manikandan

154

Automatic Generation of Fill-in-the-blank Questions from History Books for School Level Evaluation

Sumeet Pannu, Aishwarya Krishna, Shiwani Kumari, Rakesh Patra, and Sujan Kumar Saha

161

Fault Control Using Triple Modular Redundancy (TMR)

Sharon Hudson, Shyama Sundar R S, and Srinivas Koppu M

164

Internet of Things Enabled Smart Campus Energy Management and Control with Soft Computing Approach

Ramasamy Mariappan

167

An efficient block phase correlation approach for CMFD system

Badal Soni, Pradip K. Das, and Dalton Meitei Thounaojam

169

Automated validation of DNSSEC

Kollapalli Ramesh Babu and Vineet Padmanabhan

170

Deep Learning approaches for detecting Objects from Images: A Review

Ajeet Ram Pathak, Manjusha Pandey, and Siddharth Rautaray

175

Dynamic Load balancing with Advanced Reservation of Resources for Computational Grid

Sophiya Sheikh, Aitha Nagaraju, and Mohammad Shahid

180

Automatic Generation of Named Entity Distractors of Multiple Choice Questions using Web Information

Rakesh Patra, and Sujan Kumar Saha

181

Spatial Domain Blind Watermarking for Digital Images

Maharshi Parekh, Shiv Bidani and V. Santhi

186

An Approach to Improve Load Balancing in Distributed Storage Systems for NoSQL Databases: MongoDB

Sudhakar, and Shivendra Kumar Pandey

190

Improved Cost-Effective Technique for Resource Allocation in Mobile Cloud Computing

Enakshmi Nandi, Ranjan Kumar Mondal, Payel Ray, Biswajit Biswas, Manas Kumar Sanyal, and Debabrata Sarddar

201

Comparison of statistical and soft computing models for predicting hardness and wear rate of Cu-Ni-Sn alloy

S. Ilangovan, R. Vaira Vignesh, R. Padmanaban, and J. Gokulachandran

202

Optimal Clustering in Weibull Distributed WSNs based on Realistic Energy Dissipation Model

Vinay Kumar, Sadanand Yadav, Vishal Kumar, Joydeep Sengupta, Rajeev Tripathi, and Sudarshan Tiwari

219

Development of Policy Designing Technique by Analyzing Customer Behavior through Big Data Analytics

Puja Shrivastava, Laxman Sahoo, Manjusha Pandey, and Sandeep Agrawal

227

An Empirical Analysis of Articles on Sentiment Analysis

Vishal Vyas and V.Uma

235

Analytical Model for OpenFlow-based Software Defined Network

Chiranjit Sarkar and S.K. Setua

236

Enhanced Parallel Image Retrieval Technique Using Relevance Feedback

M. Sridevi, Vishnu Balakrishnan, Janardhan J. Kammath, and Sherine Davis

241

Extrapolation and Visualization of NPA using Feature based Random Forest Algorithm in Indian Banks

Arthi.J, and Akoramurthy.B

246

Discovering Significant Performing variables of Athlete Students through Data Mining Techniques

Parag Bhalchandra, Aniket Muley, Rahul Sarode, and Sinku Kumar Singh

247

Newspaper Selection Analysis Technique

Gourab Das, and S.K. Setua

249

Veri cation and Validation of Trust Based Opportunistic Routing Protocol

Sandeep A. Thorat, P. J. Kulkarni, and S. V. Yadav

258

Adaptive MAC protocol in Wireless Sensor Networks for Disaster Detection

Anshu Katiyar, Jitendra Kumar and Pabitra Mohan Khilar

260

Dynamic Security Risk Assessment in Cloud Computing using IAG

Gopi Puppala and Syam Kumar Pasupuleti

263

Variants of Wormhole Attacks and their Impact in Wireless Sensor Networks

Manish Patel, Akshai Aggarwal, and Nirbhay Chaubey

267

Optimal Choice between Chemotherapy and Immunotherapy for Leukemia Treatment Depends on Individual Patients’ Patho-physiological State

Probir Kumar Dhar, Tarun Kanti Naskar, and Durjoy Majumder

268

Time Efficient Advent for Diagnosing Flaws in Hadoop on the Big Sensor type Data

Mehta Jaldhi Jagdishchandra and Bhargavi R. Upadhyay

277

Trusted model for Virtual Machine Security in Cloud Computing

Sathya Narayana K, Syam Kumar Pasupuleti

283

An Efficient Technique for Medical Image Enhancement Based on Interval Type-2 Fuzzy Set Logic

Dibya Jyoti Bora

295

Employing Kaze features for the purpose of Emotion Recognition

Ashutosh Vaish, and Sagar Gupta

297

Appplication of Artificial Immune System Algorithms in Anamoly Detection

Rama Krushna Das, Manisha Panda, Sanghamitra Dash, and Sweta Shree Dash

298

Higher Order Neural Network and its Applications: A Comprehensive Survey

Radha Mohan Pattanayak, and H.S.Behera

308

Derivation of optimal cropping pattern in part of Hirakud command using genetic algorithm

Ashutosh Rath, Sandeep Samantaray, Sudarsan Biswal, and Prakash Chandra Swain

309

Collaborative Filtering using Restricted Boltzmann Machine and Fuzzy C-means

Dayal Kumar Behera, Madhabananda Das, S. Swetanisha, and Bighnaraj Naik

310

MistGIS: Optimizing Geospatial Data Analysis Using Mist Computing

R. K. Barik, A. Tripathi, H. Dubey, R. K. Lenka, T Pratik, S. Sharma, and K. Mankodiya

312

Unsupervised Morphological Approach for Retinal Vessel Segmentation

Santhosh Krishna B V, Gnanasekaran T, and Aswini S

314

Classification of Intrusion Detection using Data Mining Techniques

Roma Sahani, Shatabdi Nalini, J. Chandrakanta Badajena, Chinmayee Rout, Ajay Kumar Jena, and Himansu Das

315

Rare Correlated High Utility Itemsets Mining: An Experimental Approach

P. Lalitha Kumari, S. G. Sanjeevi , and T.V Madhusudhana Rao

316

Crow Search Optimization Based Hybrid Metaheuristic for Classification: A Novel Approach

Bighnaraj Naik and Janmenjoy Nayak

317

A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective

Ravi Kiran Varma P, Valli Kumari V, and Srinivas Kumar S

320

Feed Forward Neural Network Based Sensor Node Localization in Internet of Things

Ajay Kumar, and V. K. Jain

322

Recognition of Various Handwritten Indian Numerals using Artificial Neural Network

Geetika Mathur, and Suneetha Rikhari

330

A Collaborative Location based Personalized Recommender System

Madhusree Kuanr, and Sachi Nandan Mohanty