FINAL PROGRAM
5th International Conference on
Information Technology
December 21-24, 2002
Bhubaneswar, INDIA
Organized by
Orissa Information Technology Society, Bhubaneswar
Main Sponsors
Avaya Labs, USA & Satyam Computer Services Ltd., India
Co-Sponsors
ITER - Bhubaneswar, NIST - Berhampur, Silicon School – Bhubaneswar,
Krupazal – Bhubaneswar, IISIT - Bhubaneswar, KIIT – Bhubaneswar,
School of Math. Stat. & Comp. Sc. (Utkal University) – Bhubaneswar
P R O G R A M M E (TUTORIALS)
DECEMBER 21, 2002
All tutorials are on 21.12.2002 at Bhubaneswar as below, and are free:
Tutorials at Time: 9 am - 12.30 pm
TUTORIAL 1: Formal Verification: Theory and Practice of Proving Computer Systems
S. Ramesh and S. Chakraborty, IIT Bombay
Venue: Utkal University; time 9 am - 12.30 pm
TUTORIAL 2: Security issues in computer networks
I. Sengupta, IIT Kharagpur
venue: ITER time: 9 am - 12.30 pm
Tutorials at Time: 2 pm - 5.30 pm
TUTORIAL 3: Multi-objective evolutionary algorithm for rule generation and data mining
Ashish Ghosh and Satchidananda Dehuri, ISI Calcutta & BIITMS, Bhubaneswar
venue: Silicon School; time 2 pm - 5.30 pm
TUTORIAL 4: Agent Technology
Hiranmoy Ghosh, Tata Infotech Research Centre, Delhi
venue: IISIT; time: 2 pm - 5.30 pm
TUTORIAL 5: Intelligent sensor and virtual instrumentation
A. Patnaik and B. S. Pattanaik, NIST, Berhampur
venue: Utkal University; time 2 pm - 5.30 pm
TUTORIAL 6: Soft Computing
S. Bandyopadhyay and U. Maulik, ISI Calcutta & Kalyani Govt. Eng. College
venue: Krupazal, time: 2 pm - 5.30 pm
TUTORIAL 7: Finite-state modeling in software
Sukhamoy Kundu, Louisiana State University
venue: KIIT, time: 2 pm - 5.30 pm
MAIN PROGRAM (VENUE: THE MARRION)
DECEMBER 22, 2002
08:00 - 9:30 REGISTRATION
9:30 - 10:00 TBA
10:00 - 10:10 Welcome of participants
10.10 - 11.00 INAUGURAL KEYNOTE SPEECH
A K Pujari, CEO, OCAC, Bhubaneswar
10:00 - 11:40 Tea Break
11:40 - 12:30 SESSION IA- FAULT TOLERANT COMPUTING
Checkpointing to tolerate transient faults for aperiodic tasks in hard real-time systems -- R. S. Yadav, P. Kumar and K. Singh, IIT Roorkee
On the use of category theory for component-based fault- tolerant software development -- A. Hanumantharaya and P. Sinha, Concordia University
SESSION IB- SOFT COMPUTING
Boundary detection of endocardial muscles using GA: A comparative study -- A. Mishra, S. Mishra and S.N. Mishra, IGIT Orissa
Face recognition by self-organized feature map v/s linear discriminating analysis from wavelets transform coefficients -- K. Karibasappa and S. Patnaik, Sambalpur University
12:30 - 13:30 Lunch
13:30 - 14:20 INVITED TALK 1
Right to Privacy in the Age of Information Technology
Ashok Panda, Supreme Court of India, New Delhi
14:20 - 15:40 SESSION IIA - HARDWARE DESIGN
Designing an ASIC for cellular automata based message authentication -- S. Chattopadhyay, S. Rahman and A. Singh, IIT Guwahati
Hardware software partitioning of multi-function systems – A. Prasad, W. Qui and R. Mahapatra, Texas A&M University
(short paper) Cellular automata based hardware hashing for pseudo- associative memory – S. Chattopadhyay, IIT Guwahati
(short paper) An efficient method for representation and verification of boolean functions using IBDD – A. K. Singh, P.V. Rajeswari and A. Mohan, Multimedia University, Malaysia; NIST, Berhampur; IT- BHU, Varanasi
SESSION IIB - MOBILE NETWORKS
Fully distributed call admission control and adaptive bandwidth reservation scheme for mobile networks -- H.K. Pati, R. Mall and I. Sengupta, IIT Kharagpur
Load aware routing in mobile ad hoc networks -- V. Saigal, A. K. Nayak, S. K. Pradhan and R. Mall, IIT Kharagpur; Silicon Orissa; Utkal Univ; IIT Kharagpur
Direction based cost effective mobility tracking for wireless cellular communication networks -- I. S. Misra, M. K. S. Mahapatra, P. Mitra, P.S. Bhattacharjee, D. Saha and A. Mukherjee, Jadhavpur University; IIM Calcutta; PWC Calcutta
Performance of TCP over IEEE 802.11 based ad hoc networks -- M. Bansal and G. Barua, IIT Guwahati
15.40 - 16.00 Tea Break
16.00 - 16.50 Interactive Session
DECEMBER 23, 2002
9:00 - 9:50 KEYNOTE SPEECH
Ashok Jhunjhunwala, IIT Madras
10:00 - 10:50 INVITED TALK 2
Multiprotocol Label Switching (MPLS) for Traffic Engineering in IP network
Abhay Karandikar, IIT Bombay
11:00 - 11:15 Tea Break
11:15 - 12:30 SESSION III A - PARALLEL AND DISTRIBUTED PROCESSING
DIAPANGSE: Distributed intelligent agent based parallel architecture for next generation search engines -- K.S.S. Prakash and S.V. Raghavan, IIT Madras
Data warehousing on a cluster of workstations -- R. Baruah, S.N. Dehuri and R. Mall, IIT Kharagpur; Utkal University
(short paper) A new architecture for tracking attackers in distributed reflective denial of service attacks -- R.K. Tiwari and P. K. Chande, GSITS, Indore; OIST, Bhopal
SESSION III B - WEB APPLICATIONS
TelephonyXML: A markup language based approach for developing IVR applications -- G. Vaidya, A. K. Misra and P. Kumar, Ishoni networks; Experts software; MNREC Allahabad
Keyphrase extraction using semantics -- M. Srinivas and P. Bhattacharya, IIT Bombay
(short paper) Interoperability in heterogeneous medical information systems using smart mobile agents and HL7 -- B. Orgun, Y. Pisan, A. Nayak and J. Vu, Macquarie University and South Western Sydney Area Health Services.
(short paper) AAB: A generalized java-based algorithm animation builder – S. Sharma, V. Chaudhari and R.K. Ghosh, IIT, Kanpur
12:30 - 13:30 Lunch
13:30 - 14:20 INVITED TALK 3
Numerical Simulation of Track and Intensity of Orissa Super Cyclone-1999
U. C. Mohanty, IIT, Delhi
14:20 - 15:40 SESSION IV A - SOFT COMPUTING
Optimizing structure of neural network model for chaotic time series prediction B. Chakraborty, Iwate Prefectural University
Multi-factor fuzzy decision making system for sequential facility placement routine under manufacturing environment -- S. K. Deb and B. Bhattacharyya, Jadavpur University
(short paper) Fuzzy natural language interface to image databases -- P. A. Kumar, R. Bhaskaran, A. Kannan and K.M. Mehata, Anna University, Channai
(short paper) Soft computing approach to solve the weighted complex-triangle elimination (CTE) problem -- S. Roy, S. Bandyopadhyay and U. Maulik, Kalyani Govt. Eng. College; ISI Calcutta
SESSION IV B - NETWORKS
Adaptive guard channel assignment scheme for cellular networks -- H.K. Pati, IIT Kharagpur
Implementation of mobile users club for group based communication in ad hoc networks -- P.K. Behera and P.K. Meher, Utkal Univ; Santiniketan.
(short paper) Replication of location update information in a hierarchical extended hypercube to reduce location update cost -- S. K. Udgata and A. K. Pujari, Berhampur University; U of Hyderabad
(short paper) A reliable and scalable logical topology for multihop optical networks -- U.Bhattacharya, R. Chaki, D. Datta, B.Chowdhury, G. C.Saha and B. K. Sikdar, B.E. College, Howrah
(short paper) Measuring quality of service in a differentiated services domain with Linux -- P. Nanda, A.J. Simmonds, and S. Lee, UTS, Sydney
15.40 - 16.00 Tea Break
16.00 - 16.50 Poster Presentation
DECEMBER 24, 2002
9:00 - 9:50 INVITED TALK 4
QoS Based Routing in Communication Networks
K. Thulasiraman, University of Oklahoma
9:50 - 10:40 INVITED TALK 5
Digitalisation of Indian Languages
Sanghamitra Mohanty, Utkal Un., Bhubaneswar
10:40 - 11:00 Tea Break
11:00 - 12:30 SESSION VA PARALLEL AND DISTRIBUTED COMPUTING
Parallel evaluation of chebyshev polynomials: A cyclic reduction approach -- K. Chakraborty and P.K. Jana, MCKV Inst of Engg, Howrah; ISM, Dhanbad
(short paper) A PRAM based programming enviroment for distributed memory machines -- S.G. Popuri and G. Sajith, IIT, Guwahati
(short paper) A generalized bitonic sorting technique for a q- dimensional mesh connected computer -- K. Chaudhuri, S. Saha and P. Gupta, IIT, Kanpur
SESSION VB - WEB APPLICATIONS
A new architecture for hyper-documents with granular, secure and flexible management -- M. S. Meitei, M. Barooah and S. Nandi, IIT Guwahati
(short paper) Textual search using WordNet based word sense disambiguation techniques – I. Krishnamurthi, A. Pandey, K. Pokharna and V. Verma, REC, Trichi.
(short paper) DTD-guided containment of xpath expressions -- P.C. Karthik and P. Sreenivasa Kumar, IIT, Madras
(short paper) Improved Shimura technique for rank aggregation on the World Wide Web -- M. M. S. Beg and N. Ahmad, IIT, Delhi
12:30 - 13:30 Lunch
13:30 - 14:50 SESSION VIA - SOFTWARE ENGINEERING
Effective package implementation by operational process modeling R. Agarwal, and B. Ghosh, Infosys
(short paper) UML enterprise instance G. Bruno, M. Torchiano and Rakesh Agarwal, Infosys
(short paper) Typehole model: An OSP-free role paradigm conformance model -- K.C. Sekharaiah, D.J. Ram and A.V.S.K. Kumar, IIT, Madras
(short paper) An investigation of the use of BBNs for project management -- D. Rodriguez, R. Harrison and M. Satpathy, Univ. of Reading, UK
(short paper) Planning and model checking: Relationship and synergy R. Niyogi, IIT Kharagpur
SESSION VIB - SOFT COMPUTING
Design and development of object-oriented neural network system for software visualization -- T. S. Vignesh and G. V. Uma, Anna University
Adaptive fuzzy controller based model reference control -- G. Gurusamy and P. Anitha, PSGTech, Coimbatore
A fuzzy approach for extracting object from noisy background using self organizing map -- S. Bhattacharya, U. Maulik and S. Bandyopadhyay, Kalyani Govt. Eng. College and ISI Calcutta
14:50 - 15:10 Tea Break
15:10 - 16:00 CLOSING KEYNOTE ADDRESS
Deepak Phatak, IIT Bombay
16:00 - 16:50 CLOSING REMARKS AND AWARDS
16:50 - 17:00 Tea
POSTERS
Monte carlo simulation technique - an efficient too for material research -- P.S. Mallick and D. Mukhopadhyay, NIST, Berhampur; Jadhavpur University
Decision tree based task allocation algorithm for soccer domain -- R. Subramaniam, R. Geetharamani, P. Prathima and M. Sangeetha, Pondicherry University
Layered agent architecture for soccer domain -- R. Subramaniam, R. Geetharamani, M. Sangeetha and P. Prathima, Pondicherry University
Generation of self similar graphical images using iterated function system -- A.K. Bisoi, S.N. Mishra and S. Mishra, Utkal University; IGIT, Orissa
Emulator for quantum computers -- C. Samantha and R. Sanyal, IIIT Allahabad
Agent application security in ubiquitous service environment -- P.S. Neog and S.K. Nandi, IIT Guwahati
Peak power minimization during combinatorial circuit testing - - S. Chemudugunta and S. Chattopadhyay, IIT Guwahati
A semantic query caching system for XML queries -- K. Ravichandran and P. S. Kumar, IIT Madras
An agent based architecture for cyber forensics -- B.B. Jaysingh, M.R. Patra and P.K. Sastry, Police R&D; Berhampur Univ
Runtime reconfigurable embedded execution core for digital signal processing applications -- A.K. Rath and P.K. Meher, KIIT; Santiniketan
An efficient algorithm for rule mining -- A. Das and D. K. Bhattacharya, Tezpur University
Mobile Card: Model of future mobile communications -- Dinkar Borde, CDAC, Pune