FINAL PROGRAM

5th International Conference on

Information Technology

December 21-24, 2002

Bhubaneswar, INDIA

 

Organized by

Orissa Information Technology Society, Bhubaneswar

Main Sponsors

Avaya Labs, USA & Satyam Computer Services Ltd., India

Co-Sponsors

ITER - Bhubaneswar, NIST - Berhampur, Silicon School – Bhubaneswar,

Krupazal – Bhubaneswar, IISIT - Bhubaneswar, KIIT – Bhubaneswar,

School of Math. Stat. & Comp. Sc. (Utkal University) – Bhubaneswar

 

 

P R O G R A M M E (TUTORIALS)

DECEMBER 21, 2002

All tutorials are on 21.12.2002 at Bhubaneswar as below, and are free:

Tutorials at Time: 9 am - 12.30 pm

TUTORIAL 1: Formal Verification: Theory and Practice of Proving Computer Systems

S. Ramesh and S. Chakraborty, IIT Bombay

Venue: Utkal University; time 9 am - 12.30 pm

TUTORIAL 2: Security issues in computer networks

I. Sengupta, IIT Kharagpur

venue: ITER time: 9 am - 12.30 pm

Tutorials at Time: 2 pm - 5.30 pm

TUTORIAL 3: Multi-objective evolutionary algorithm for rule generation and data mining

Ashish Ghosh and Satchidananda Dehuri, ISI Calcutta & BIITMS, Bhubaneswar

venue: Silicon School; time 2 pm - 5.30 pm

TUTORIAL 4: Agent Technology

Hiranmoy Ghosh, Tata Infotech Research Centre, Delhi

venue: IISIT; time: 2 pm - 5.30 pm

TUTORIAL 5: Intelligent sensor and virtual instrumentation

A. Patnaik and B. S. Pattanaik, NIST, Berhampur

venue: Utkal University; time 2 pm - 5.30 pm

TUTORIAL 6: Soft Computing

S. Bandyopadhyay and U. Maulik, ISI Calcutta & Kalyani Govt. Eng. College

venue: Krupazal, time: 2 pm - 5.30 pm

TUTORIAL 7: Finite-state modeling in software

Sukhamoy Kundu, Louisiana State University

venue: KIIT, time: 2 pm - 5.30 pm

MAIN PROGRAM (VENUE: THE MARRION)

DECEMBER 22, 2002

08:00 - 9:30 REGISTRATION

9:30 - 10:00 TBA

10:00 - 10:10 Welcome of participants

10.10 - 11.00 INAUGURAL KEYNOTE SPEECH

A K Pujari, CEO, OCAC, Bhubaneswar

10:00 - 11:40 Tea Break

11:40 - 12:30 SESSION IA- FAULT TOLERANT COMPUTING

Checkpointing to tolerate transient faults for aperiodic tasks in hard real-time systems -- R. S. Yadav, P. Kumar and K. Singh, IIT Roorkee

On the use of category theory for component-based fault- tolerant software development -- A. Hanumantharaya and P. Sinha, Concordia University

SESSION IB- SOFT COMPUTING

Boundary detection of endocardial muscles using GA: A comparative study -- A. Mishra, S. Mishra and S.N. Mishra, IGIT Orissa

Face recognition by self-organized feature map v/s linear discriminating analysis from wavelets transform coefficients -- K. Karibasappa and S. Patnaik, Sambalpur University

12:30 - 13:30 Lunch

13:30 - 14:20 INVITED TALK 1

Right to Privacy in the Age of Information Technology

Ashok Panda, Supreme Court of India, New Delhi

14:20 - 15:40 SESSION IIA - HARDWARE DESIGN

Designing an ASIC for cellular automata based message authentication -- S. Chattopadhyay, S. Rahman and A. Singh, IIT Guwahati

Hardware software partitioning of multi-function systems – A. Prasad, W. Qui and R. Mahapatra, Texas A&M University

(short paper) Cellular automata based hardware hashing for pseudo- associative memory – S. Chattopadhyay, IIT Guwahati

(short paper) An efficient method for representation and verification of boolean functions using IBDD – A. K. Singh, P.V. Rajeswari and A. Mohan, Multimedia University, Malaysia; NIST, Berhampur; IT- BHU, Varanasi

SESSION IIB - MOBILE NETWORKS

Fully distributed call admission control and adaptive bandwidth reservation scheme for mobile networks -- H.K. Pati, R. Mall and I. Sengupta, IIT Kharagpur

Load aware routing in mobile ad hoc networks -- V. Saigal, A. K. Nayak, S. K. Pradhan and R. Mall, IIT Kharagpur; Silicon Orissa; Utkal Univ; IIT Kharagpur

Direction based cost effective mobility tracking for wireless cellular communication networks -- I. S. Misra, M. K. S. Mahapatra, P. Mitra, P.S. Bhattacharjee, D. Saha and A. Mukherjee, Jadhavpur University; IIM Calcutta; PWC Calcutta

Performance of TCP over IEEE 802.11 based ad hoc networks -- M. Bansal and G. Barua, IIT Guwahati

15.40 - 16.00 Tea Break

16.00 - 16.50 Interactive Session

DECEMBER 23, 2002

9:00 - 9:50 KEYNOTE SPEECH

Ashok Jhunjhunwala, IIT Madras

10:00 - 10:50 INVITED TALK 2

Multiprotocol Label Switching (MPLS) for Traffic Engineering in IP network

Abhay Karandikar, IIT Bombay

11:00 - 11:15 Tea Break

11:15 - 12:30 SESSION III A - PARALLEL AND DISTRIBUTED PROCESSING

DIAPANGSE: Distributed intelligent agent based parallel architecture for next generation search engines -- K.S.S. Prakash and S.V. Raghavan, IIT Madras

Data warehousing on a cluster of workstations -- R. Baruah, S.N. Dehuri and R. Mall, IIT Kharagpur; Utkal University

(short paper) A new architecture for tracking attackers in distributed reflective denial of service attacks -- R.K. Tiwari and P. K. Chande, GSITS, Indore; OIST, Bhopal

SESSION III B - WEB APPLICATIONS

TelephonyXML: A markup language based approach for developing IVR applications -- G. Vaidya, A. K. Misra and P. Kumar, Ishoni networks; Experts software; MNREC Allahabad

Keyphrase extraction using semantics -- M. Srinivas and P. Bhattacharya, IIT Bombay

(short paper) Interoperability in heterogeneous medical information systems using smart mobile agents and HL7 -- B. Orgun, Y. Pisan, A. Nayak and J. Vu, Macquarie University and South Western Sydney Area Health Services.

(short paper) AAB: A generalized java-based algorithm animation builder – S. Sharma, V. Chaudhari and R.K. Ghosh, IIT, Kanpur

12:30 - 13:30 Lunch

13:30 - 14:20 INVITED TALK 3

Numerical Simulation of Track and Intensity of Orissa Super Cyclone-1999

U. C. Mohanty, IIT, Delhi

14:20 - 15:40 SESSION IV A - SOFT COMPUTING

Optimizing structure of neural network model for chaotic time series prediction B. Chakraborty, Iwate Prefectural University

Multi-factor fuzzy decision making system for sequential facility placement routine under manufacturing environment -- S. K. Deb and B. Bhattacharyya, Jadavpur University

(short paper) Fuzzy natural language interface to image databases -- P. A. Kumar, R. Bhaskaran, A. Kannan and K.M. Mehata, Anna University, Channai

(short paper) Soft computing approach to solve the weighted complex-triangle elimination (CTE) problem -- S. Roy, S. Bandyopadhyay and U. Maulik, Kalyani Govt. Eng. College; ISI Calcutta

SESSION IV B - NETWORKS

Adaptive guard channel assignment scheme for cellular networks -- H.K. Pati, IIT Kharagpur

Implementation of mobile users club for group based communication in ad hoc networks -- P.K. Behera and P.K. Meher, Utkal Univ; Santiniketan.

(short paper) Replication of location update information in a hierarchical extended hypercube to reduce location update cost -- S. K. Udgata and A. K. Pujari, Berhampur University; U of Hyderabad

(short paper) A reliable and scalable logical topology for multihop optical networks -- U.Bhattacharya, R. Chaki, D. Datta, B.Chowdhury, G. C.Saha and B. K. Sikdar, B.E. College, Howrah

(short paper) Measuring quality of service in a differentiated services domain with Linux -- P. Nanda, A.J. Simmonds, and S. Lee, UTS, Sydney

15.40 - 16.00 Tea Break

16.00 - 16.50 Poster Presentation

DECEMBER 24, 2002

9:00 - 9:50 INVITED TALK 4

QoS Based Routing in Communication Networks

K. Thulasiraman, University of Oklahoma

9:50 - 10:40 INVITED TALK 5

Digitalisation of Indian Languages

Sanghamitra Mohanty, Utkal Un., Bhubaneswar

10:40 - 11:00 Tea Break

11:00 - 12:30 SESSION VA PARALLEL AND DISTRIBUTED COMPUTING

Parallel evaluation of chebyshev polynomials: A cyclic reduction approach -- K. Chakraborty and P.K. Jana, MCKV Inst of Engg, Howrah; ISM, Dhanbad

(short paper) A PRAM based programming enviroment for distributed memory machines -- S.G. Popuri and G. Sajith, IIT, Guwahati

(short paper) A generalized bitonic sorting technique for a q- dimensional mesh connected computer -- K. Chaudhuri, S. Saha and P. Gupta, IIT, Kanpur

SESSION VB - WEB APPLICATIONS

A new architecture for hyper-documents with granular, secure and flexible management -- M. S. Meitei, M. Barooah and S. Nandi, IIT Guwahati

(short paper) Textual search using WordNet based word sense disambiguation techniques – I. Krishnamurthi, A. Pandey, K. Pokharna and V. Verma, REC, Trichi.

(short paper) DTD-guided containment of xpath expressions -- P.C. Karthik and P. Sreenivasa Kumar, IIT, Madras

(short paper) Improved Shimura technique for rank aggregation on the World Wide Web -- M. M. S. Beg and N. Ahmad, IIT, Delhi

12:30 - 13:30 Lunch

13:30 - 14:50 SESSION VIA - SOFTWARE ENGINEERING

Effective package implementation by operational process modeling R. Agarwal, and B. Ghosh, Infosys

(short paper) UML enterprise instance G. Bruno, M. Torchiano and Rakesh Agarwal, Infosys

(short paper) Typehole model: An OSP-free role paradigm conformance model -- K.C. Sekharaiah, D.J. Ram and A.V.S.K. Kumar, IIT, Madras

(short paper) An investigation of the use of BBNs for project management -- D. Rodriguez, R. Harrison and M. Satpathy, Univ. of Reading, UK

(short paper) Planning and model checking: Relationship and synergy R. Niyogi, IIT Kharagpur

SESSION VIB - SOFT COMPUTING

Design and development of object-oriented neural network system for software visualization -- T. S. Vignesh and G. V. Uma, Anna University

Adaptive fuzzy controller based model reference control -- G. Gurusamy and P. Anitha, PSGTech, Coimbatore

A fuzzy approach for extracting object from noisy background using self organizing map -- S. Bhattacharya, U. Maulik and S. Bandyopadhyay, Kalyani Govt. Eng. College and ISI Calcutta

14:50 - 15:10 Tea Break

15:10 - 16:00 CLOSING KEYNOTE ADDRESS

Deepak Phatak, IIT Bombay

16:00 - 16:50 CLOSING REMARKS AND AWARDS

16:50 - 17:00 Tea

POSTERS

Monte carlo simulation technique - an efficient too for material research -- P.S. Mallick and D. Mukhopadhyay, NIST, Berhampur; Jadhavpur University

Decision tree based task allocation algorithm for soccer domain -- R. Subramaniam, R. Geetharamani, P. Prathima and M. Sangeetha, Pondicherry University

Layered agent architecture for soccer domain -- R. Subramaniam, R. Geetharamani, M. Sangeetha and P. Prathima, Pondicherry University

Generation of self similar graphical images using iterated function system -- A.K. Bisoi, S.N. Mishra and S. Mishra, Utkal University; IGIT, Orissa

Emulator for quantum computers -- C. Samantha and R. Sanyal, IIIT Allahabad

Agent application security in ubiquitous service environment -- P.S. Neog and S.K. Nandi, IIT Guwahati

Peak power minimization during combinatorial circuit testing - - S. Chemudugunta and S. Chattopadhyay, IIT Guwahati

A semantic query caching system for XML queries -- K. Ravichandran and P. S. Kumar, IIT Madras

An agent based architecture for cyber forensics -- B.B. Jaysingh, M.R. Patra and P.K. Sastry, Police R&D; Berhampur Univ

Runtime reconfigurable embedded execution core for digital signal processing applications -- A.K. Rath and P.K. Meher, KIIT; Santiniketan

An efficient algorithm for rule mining -- A. Das and D. K. Bhattacharya, Tezpur University

Mobile Card: Model of future mobile communications -- Dinkar Borde, CDAC, Pune