Paper Presentation Schedule

  • Pre-conference Workshop Registration
    6th Feb, 2019 from 9:30-10:00 at
    School of Computer Engineering, Campus 15, KIIT Deemed to be University
  • Conference Registration
    7th and 8th Feb, 2019 from 9:30-10:00 at
    Campus 6, Conference Hall 8, KIIT Deemed to be University

7th Feb, 2019

11.15 -13.00

Author Names Paper Title
Tanweer Jalal and Ishfaq Ahmad Malik Some Algebraic and Topological properties of Triple n-normed spaces
Swapan Maiti and Dipanwita Roy Chowdhury Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction
Subhabrata Mondal and B N Mandal Approximate Solution of Hypersingular Integral Equation by Using Differential Transform Method
Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari and Kouichi Sakurai Visual Secret Sharing Scheme with Distributed levels of Importance of Shadows
Vamshi Krishna Kammadanam, Virendra Sule and Yi Hong Conditions for Feedback Shift Registers to Generate Permutations
Maharage Nisansala Sevwandi Perera and Takeshi Koshiba A Guests Managing System with Lattice-based Verifier-local Revocation Group Signature Scheme with Time-bound keys
Tapadyoti Banerjee and Dipanwita Roy Chowdhury NCASH: Non-linear Cellular Automata based Hash function
Arya Kumar Bedabrata Chand and K. M. Reddy Monotonicity Preserving Rational Cubic Graph Directed Fractal Interpolation Functions
Subha Pal A study of Damped Navier-Stokes Equations with Navier boundary conditions in n-spacial dimension

15.30 – 16.30

Author Names Paper Title
Sanjay Mahto and Parmeshwary Srivastava A class of sequence spaces defined by l-fractional difference operator
Adane Abebaw Gessesse and Rajashree Mishra Genetic Algorithm Based Fuzzy Programming Method for Multi-Objective Stochastic Transportation Problem Involving Three-parameter Weibull Distribution
Arya Kumar Bedabrata Chand and K. M. Reddy Monotonicity Preserving Rational Cubic Graph Directed Fractal Interpolation Functions
Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay and Debasis Giri On the design of a secure anonymous user authentication scheme for multiple base stations-based wireless sensor networks
Sesappa A Rai Hybrid Numerical Additive Parameters Methods For the General Second Order Differential Equation

8th Feb, 2019

11.15 – 13.00

Author Names Paper Title
Tanushree Haldar and Dipanwita Roy Chowdhury Design of Hash Function Using Two Dimensional Cellular Automata
Sabyasachi Dutta and Kouichi Sakurai Theory and application of computationally independent one-way functions: Interactive proof of ability – Revisited
Soumya Banerjee, Odelu Vanga, Ashok Kumar Das, Samiran Chattopadhyay and Debasis Giri Anonymous fine-grained user access control scheme for Internet of Things architecture
Sangita Jha and A.K.B. Chand Zipper Rational Quadratic Fractal Interpolation Functions
Ashoke Kumar Bera, Dipak Kumar Jana, Debamalya Banerjee and Titas Nandy A decision making framework for green supplier selection using FAHP and Taguchi quality loss functions
Berhanu Belay and Acharya Srikumar Multi-Choice Multi-Objective Fractional Probabilistic Programming Problem
S. K. Katiyar and A. K. B. Chand $\mathbf{A}$-Fractal Rational Functions and Their Positivity Aspects
Ekrem Savas Double Lacunary Statistical Convergence of Weight g via Ideal in Topological Groups
Ekrem Savas On λ-IDEAL Statistical Convergence of Weighted g For Multiple Sequences
Subha Pal Weak Solutions to the Damped Navier-Stokes Equations Constructed by Semi-discretization Are Suitable
  • Duration of each paper presentation is 15-20 minutes. Authors should make the number of slides accordingly.