{"id":1392,"date":"2019-02-01T06:16:59","date_gmt":"2019-02-01T06:16:59","guid":{"rendered":"http:\/\/event.kiit.ac.in\/icmc2019\/?page_id=1392"},"modified":"2019-02-06T05:00:48","modified_gmt":"2019-02-06T05:00:48","slug":"paper-presentation-schedule","status":"publish","type":"page","link":"https:\/\/event.kiit.ac.in\/icmc2019\/paper-presentation-schedule\/","title":{"rendered":"Paper Presentation Schedule"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1 fusion-builder-column-0 fusion-one-full fusion-column-first fusion-column-last 1_1\"  style='margin-top:0px;margin-bottom:20px;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\">@media only screen and (max-width:800px) {.fusion-title.fusion-title-1{margin-top:10px!important;margin-bottom:10px!important;}}<\/style><div class=\"fusion-title title fusion-title-1 fusion-title-center fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-bottom:31px;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><h2 class=\"title-heading-center\" style=\"margin:0;\">Paper Presentation Schedule<\/h2><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text\"><ul>\n<li><strong>Pre-conference Workshop Registration<br \/>\n<\/strong>6<sup>th<\/sup> Feb, 2019 from 9:30-10:00 at<br \/>\nSchool of Computer Engineering, Campus 15, KIIT Deemed to be University<\/li>\n<li><strong>Conference Registration<br \/>\n<\/strong>7<sup>th<\/sup> and 8<sup>th<\/sup> Feb, 2019 from 9:30-10:00 at<br \/>\nCampus 6, Conference Hall 8, KIIT Deemed to be University<\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1 fusion-builder-column-1 fusion-one-full fusion-column-first fusion-column-last 1_1\"  style='margin-top:0px;margin-bottom:20px;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\">@media only screen and (max-width:800px) {.fusion-title.fusion-title-2{margin-top:10px!important;margin-bottom:10px!important;}}<\/style><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"margin-top:0px;margin-bottom:31px;\"><h3 class=\"title-heading-left\" style=\"margin:0;\"><strong>7<sup>th<\/sup> Feb, 2019<\/strong><\/h3><div class=\"title-sep-container\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text\"><p><strong>11.15 -13.00 <\/strong><\/p>\n<\/div>\n<div class=\"table-1\">\n<table width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\">Author Names<\/th>\n<th align=\"left\">Paper Title<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Tanweer Jalal and Ishfaq Ahmad Malik<\/td>\n<td>Some Algebraic and Topological properties of Triple n-normed spaces<\/td>\n<\/tr>\n<tr>\n<td>Swapan Maiti and Dipanwita Roy Chowdhury<\/td>\n<td>Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction<\/td>\n<\/tr>\n<tr>\n<td>Subhabrata Mondal and B N Mandal<\/td>\n<td>Approximate Solution of Hypersingular Integral Equation by Using Differential Transform Method<\/td>\n<\/tr>\n<tr>\n<td>Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari and Kouichi Sakurai<\/td>\n<td>Visual Secret Sharing Scheme with Distributed levels of Importance of Shadows<\/td>\n<\/tr>\n<tr>\n<td>Vamshi Krishna Kammadanam, Virendra Sule and Yi Hong<\/td>\n<td>Conditions for Feedback Shift Registers to Generate Permutations<\/td>\n<\/tr>\n<tr>\n<td>Maharage Nisansala Sevwandi Perera and Takeshi Koshiba<\/td>\n<td>A Guests Managing System with Lattice-based Verifier-local Revocation Group Signature Scheme with Time-bound keys<\/td>\n<\/tr>\n<tr>\n<td>Tapadyoti Banerjee and Dipanwita Roy Chowdhury<\/td>\n<td>NCASH: Non-linear Cellular Automata based Hash function<\/td>\n<\/tr>\n<tr>\n<td>Arya Kumar Bedabrata Chand and K. M. Reddy<\/td>\n<td>Monotonicity Preserving Rational Cubic Graph Directed Fractal Interpolation Functions<\/td>\n<\/tr>\n<tr>\n<td>Subha Pal<\/td>\n<td>A study of Damped Navier-Stokes Equations with Navier boundary conditions in n-spacial dimension<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"fusion-text\"><p><strong>15.30 &#8211; 16.30<\/strong><\/p>\n<\/div>\n<div class=\"table-1\">\n<table width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\">Author Names<\/th>\n<th align=\"left\">Paper Title<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Sanjay Mahto and Parmeshwary Srivastava<\/td>\n<td>A class of sequence spaces defined by l-fractional difference operator<\/td>\n<\/tr>\n<tr>\n<td>Adane Abebaw Gessesse and Rajashree Mishra<\/td>\n<td>Genetic Algorithm Based Fuzzy Programming Method for Multi-Objective Stochastic Transportation Problem Involving Three-parameter Weibull Distribution<\/td>\n<\/tr>\n<tr>\n<td>Arya Kumar Bedabrata Chand and K. M. Reddy<\/td>\n<td>Monotonicity Preserving Rational Cubic Graph Directed Fractal Interpolation Functions<\/td>\n<\/tr>\n<tr>\n<td>Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay and Debasis Giri<\/td>\n<td>On the design of a secure anonymous user authentication scheme for multiple base stations-based wireless sensor networks<\/td>\n<\/tr>\n<tr>\n<td>Sesappa A Rai<\/td>\n<td>Hybrid Numerical Additive Parameters Methods For the General Second Order Differential Equation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<style type=\"text\/css\">@media only screen and (max-width:800px) {.fusion-title.fusion-title-3{margin-top:10px!important;margin-bottom:10px!important;}}<\/style><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"margin-top:50px;margin-bottom:31px;\"><h3 class=\"title-heading-left\" style=\"margin:0;\"><strong>8<sup>th<\/sup> Feb, 2019<\/strong><\/h3><div class=\"title-sep-container\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text\"><p><strong>11.15 &#8211; 13.00<\/strong><\/p>\n<\/div>\n<div class=\"table-1\">\n<table width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\">Author Names<\/th>\n<th align=\"left\">Paper Title<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Tanushree Haldar and Dipanwita Roy Chowdhury<\/td>\n<td>Design of Hash Function Using Two Dimensional Cellular Automata<\/td>\n<\/tr>\n<tr>\n<td>Sabyasachi Dutta and Kouichi Sakurai<\/td>\n<td>Theory and application of computationally independent one-way functions: Interactive proof of ability &#8211; Revisited<\/td>\n<\/tr>\n<tr>\n<td>Soumya Banerjee, Odelu Vanga, Ashok Kumar Das, Samiran Chattopadhyay and Debasis Giri<\/td>\n<td>Anonymous fine-grained user access control scheme for Internet of Things architecture<\/td>\n<\/tr>\n<tr>\n<td>Sangita Jha and A.K.B. Chand<\/td>\n<td>Zipper Rational Quadratic Fractal Interpolation Functions<\/td>\n<\/tr>\n<tr>\n<td>Ashoke Kumar Bera, Dipak Kumar Jana, Debamalya Banerjee and Titas Nandy<\/td>\n<td>A decision making framework for green supplier selection using FAHP and Taguchi quality loss functions<\/td>\n<\/tr>\n<tr>\n<td>Berhanu Belay and Acharya Srikumar<\/td>\n<td>Multi-Choice Multi-Objective Fractional Probabilistic Programming Problem<\/td>\n<\/tr>\n<tr>\n<td>S. K. Katiyar and A. K. B. Chand<\/td>\n<td>$\\mathbf{A}$-Fractal Rational Functions and Their Positivity Aspects<\/td>\n<\/tr>\n<tr>\n<td>Ekrem Savas<\/td>\n<td>Double Lacunary Statistical Convergence of Weight <em>g<\/em> via Ideal in Topological Groups<\/td>\n<\/tr>\n<tr>\n<td>Ekrem Savas<\/td>\n<td>On \u03bb-IDEAL Statistical Convergence of Weighted <em>g<\/em> For Multiple Sequences<\/td>\n<\/tr>\n<tr>\n<td>Subha Pal<\/td>\n<td>Weak Solutions to the Damped Navier-Stokes Equations Constructed by Semi-discretization Are Suitable<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"fusion-text\"><ul>\n<li>Duration of each paper presentation is 15-20 minutes. Authors should make the number of slides accordingly.<\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1392","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/pages\/1392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/comments?post=1392"}],"version-history":[{"count":9,"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/pages\/1392\/revisions"}],"predecessor-version":[{"id":1413,"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/pages\/1392\/revisions\/1413"}],"wp:attachment":[{"href":"https:\/\/event.kiit.ac.in\/icmc2019\/wp-json\/wp\/v2\/media?parent=1392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}