Professional Documents
Culture Documents
Editor
Prof. Umarani Srikanth
Organised by
ISBN: 978-93-80697-65-9
No part of this publication may be reproduced or transmitted in any form by any means, electronic or
mechanical, including photocopy, recording, or any information storage and retrieval system, without
permission in writing from the copyright owners.
DISCLAIMER
The authors are solely responsible for the contents of the papers compiled in this volume.
The publishers or editors do not take any responsibility for the same in any manner. Errors,
if any, are purely unintentional and readers are requested to communicate such errors to the editors or
publishers to avoid discrepancies in future.
Published by
EXCEL INDIA PUBLISHERS
61/28, Dalpat Singh Building, Pratik Market, Munirka, New Delhi-110067
Tel: +91-11-2671 1755/ 2755/ 5755 z Fax: +91-11-2671 6755
E-mail: publishing@excelpublish.com
Website: www.excelpublish.com
Typeset by
Excel Publishing Services, New Delhi - 110067
E-mail: prepress@excelpublish.com
Printed by
Excel Printing Universe, New Delhi - 110067
E-mail: printing@excelpublish.com
Preface
Information, Communication and Embedded Systems increasingly dominate the world of super computing because
of their flexibility, power and relatively low cost. It is imperative to develop all the above domains to meet the
future requirements. Research and development in to these areas will throw light for better understandings of these
domains. Moreover, there is a necessity to consolidate the work of various researchers and to utilize the same for
future studies. The proceedings of this conference help us to establish wide knowledge in the above domain
covering various aspects.
We have received around 780 papers, and all of them with abundant information. But our aim is to show, the
direction in which the future research will dominate in the field of Information, Communication and Embedded
systems. So we had to make difficult choices in the selection of papers and we ultimately ended up with 230
papers.
The selected papers are classified in the areas of
1. Information
2. Communication
3. Embedded Systems
We are optimistic that there papers will serve as a valuable reference material for the researchers, academicians
and for the industry professionals.
Chairman
S.A. ENGINEERING COLLEGE
(NBA Accredited and ISO 9001:2008 Certified Institution)
Poonamallee–Avadi Road, Veeraraghavapuram, Chennai–600 077
E-Mail: ncact2011@saec.ac.in Website: www.saec.ac.in
Phone Nos: 044 –26801999, 26801499 Fax No: 044–26801899
Shri. D. duraiswamy,
Chairman
Message
“The beliefs you hold in the beginning of a journey define your journey. When you believe that “you can
do it”, and really believe in this belief of your, then the “how to do it” unfolds automatically. Believing that
something can be done sets your mind and those infinite forces into motion to find a way to do it”.
It is a great pleasure and honor to announce the International Conference on “Information, Communication
and Embedded Systems ICICES-2011”, which takes place on 23rd & 24th Feb 2011 in our esteemed Institution
very first time. This International Conference is a forum for scientists, engineers, and practitioners to present their
latest research results, ideas, developments and applications in the areas Information, Communication and
Embedded Systems. Our intention at this combined scientific meeting is to offer a variety of papers which will be of
interest to the researchers and academicians throughout the world. Education is undergoing presently a welcome
seismic change. I fervently hope that the participants will enjoy this technical festival ICICES-2011. I wish them
all success.
Chairman
S.A. ENGINEERING COLLEGE
(NBA Accredited and ISO 9001:2008 Certified Institution)
Poonamallee–Avadi Road, Veeraraghavapuram, Chennai–600 077
E-Mail: ncact2011@saec.ac.in Website: www.saec.ac.in
Phone Nos: 044–26801999, 26801499 Fax No: 044–26801899
Shri. D. Dasarathan
Secretary
Message
I am extremely happy to learn that the Department of PG studies is organizing an International Conference ICICES-
2011 on 23rd and 24th Feburary, 2011. I am sure that this conference will provide much needed information for the
researchers, faculties and software professional for the betterment of Information, Communication and Embedded
System Technologies.
I wish them all success in their endeavour.
Secretary
S.A. ENGINEERING COLLEGE
(NBA Accredited and ISO 9001:2008 Certified Institution)
Poonamallee–Avadi Road, Veeraraghavapuram, Chennai–600 077
E-Mail: ncact2011@saec.ac.in Website: www.saec.ac.in
Phone Nos: 044–26801999, 26801499 Fax No: 044–26801899
Shri. S. Amarnaath
M.Com., Correspondent
Message
We at this institution constantly strive to provide an excellent academic environment for the benefit of students and
faculty so that they will acquire a technological competence synonymous with human dignity and values.
We are dedicated to a continuous process through this first International Conference on “INFORMATION,
COMMUNICATION AND EMBEDDED SYSTEMS ICICES-2011” to enable upgrading academic
performance and managerial practices through infra-structure and technological facilities. This commitment, will
enable us to provide updated knowledge-inputs and practical support to the participants in order to build their
confidence level.
I am happy to know that our Institution is maintaining the tradition set with respect to the contents in
Engineering & Technology, cultural and other activities of the organization extending with another milestone of this
International Conference in this academic year 2010-2011, organized by the Department of PG studies.
I congratulate and offer my best wishes to the organizers who have involved themselves in this conference
towards the academic development for the benefit of research fraternity.
Correspondent
S.A. ENGINEERING COLLEGE
(NBA Accredited and ISO 9001:2008 Certified Institution)
Poonamallee–Avadi Road, Veeraraghavapuram, Chennai–600 077
E-Mail: ncact2011@saec.ac.in Website: www.saec.ac.in
Phone Nos: 044–26801999, 26801499 Fax No: 044–26801899
Message
This institution is a tribute to the great organizing genius of its Founder. Without his initiative and inspiration it
would have been impossible to find an institution of this character. This institution is a memorable experiment in
the moral and technological regeneration of India. It stands for nothing less.
We proposed to maintain here standards of discipline and decorum of decency, dignity and character building
are equalled by few and surpassed by none in contemporary education systems.
With this, we are proud to conduct the first International Conference on “Information, Communication and
Embedded Systems” ICICES-2011, on 23rd & 24th February, 2011. I wish this conference to act as a gate way for
knowledge sharing for all the participants who take part in this event. I appreciate the work done by the faculty
members who had involved and made our dreams come to true.
Director
S.A. ENGINEERING COLLEGE
(NBA Accredited and ISO 9001:2008 Certified Institution)
Poonamallee–Avadi Road, Veeraraghavapuram, Chennai–600 077
E-Mail: ncact2011@saec.ac.in Website: www.saec.ac.in
Phone Nos: 044–26801999, 26801499 Fax No: 044–26801899
Dr. S. Suyambazhahan
M.E., Ph.D., (IITM) Principal
Message
“Real Knowledge, like everything else of the highest value, is not to be obtained easily. It must be worked for,
studied for, thought for …” Thomas Arnold.
First, my heartfelt thanks to the management, the stimulant of all the ventures of S. A. Engineering College.
I am extremely elated to know that the Department of PG Studies is organizing the first International
Conference on Information, Communication and Embedded systems, ICICES–2011 on 23rd and 24th February,
2011. The diligence of the department ensures the success of the conference. The incessant urge to quench the thirst
of knowledge keeps the researchers in track. This conference kindles the individual innovative aspirations of the
researchers and students. I am confident that the presenters of various academics, R&D Institution will be sufficed
with their yearnings. The zealous of the presenters elucidates their unyielding effort in their accomplishments. This
intelligible participation configures the success of the conference. The astounding papers of the authors are
appreciable. The faculties dispensed by the department towards the excellence of the conference are inexplicable. I
wish the department to achieve the best in all its walks of expertise
Principal
S.A. ENGINEERING COLLEGE
(NBA Accredited and ISO 9001:2008 Certified Institution)
Poonamallee–Avadi Road, Veeraraghavapuram, Chennai–600 077
E-Mail: ncact2011@saec.ac.in Website: www.saec.ac.in
Phone Nos: 044–26801999, 26801499 Fax No: 044–26801899
Message
Dear Participants,
I welcome you all to the first ever International conference ICICES-2011 in India. Our Director Shri P. Venkatesh
Raja directed me to organize an International conference. I was very much elated because it is a fantastic and rare
opportunity for me. I personally thank our Director for having confidence in me and also for providing much
needed support.
Keeping in view, the importance of software, communication and Embedded systems in the fast changing
technological world, the theme of this conference was aptly selected. We are optimistic that this conference will
serve as a platform to provide information for future technologies. Our country India being a frontrunner in the
software technology field, we in the Conference pledge to make our country a technological power that could serve
for the wellbeing of mankind.
We in the organizing committee would like as many as participants as possible to benefit by listening to the
experts. We would also like to make this conference an annual event. We pray the Almighty for the success of the
conference. We request all the participants to convey constructive criticism to me so that it will help us to perform
and upgrade ourselves for next upcoming ICICES–2012.
We also wholeheartedly thank Dharma Naidu Educational trust and its administrators without whose solid
support this conference would not have been possible. We also sincerely express our thanks to Dr. S.
Suyambhazlahan IITM, Principal for his timely advice and direction in conducting this event.
On behalf of the Management, staff and students We the organizing committee of S.A.Engineering College are
very much honoured by the glorious presence of honorable Shri. Behrang Seraj, Vice Consulate General of USA,
Chennai and Shri. R. Muthu, Consulate General of Switzerland, Chennai. Our sincere thanks and gratitude to
the above esteemed dignitaries.
The Organizing committee is also thankful to our special guest and International advisory committee member
Dr. Alexander Bolotov, Professor, Department of Computer Science and Software Engineering, University of
Westminster, United Kingdom who has made his presence here to enrich the conference. We also thank our
special guest and National advisory committee member Dr. C. Senthil Kumar, Senior Scientific Officer, Safety
Research Institute, Atomic Energy Regulatory Board, Kalpakkam for his timely suggestions and for his
valuable presence here.
We also thank all the Members of the Conference ICICES–2011 who have acceded to our request to be a part
of International and National Advisory members. We also thank all the Head of the Departments of our college,
staff members and other non-teaching staff for their overwhelming support in organizing this event and making it a
grand success.
Convenor-ICICES–2011
Contents
Preface v
Message vii
INFORMATION
1. An Efficient Authentication System for Wireless Sensor Network
R.S. Sangeetha and P. Vinothiyalakshmi 3
2. Data Mining Applications in Banking Sector
S. Asokkumar 3
3. Secure and Robust Localization in Wireless Sensor Networks
Kalpana A.V. and Jayakumar C. 4
4. Effective CAPTCHA Implementation (Next Generation Captcha)
B.Thilak Raj, S. Sri Ganesh and A. Thilagavathy 4
5. An Efficient Hash Tree Based Indexing Scheme over Distributed Hash Tables
G.S. Gayathri Amsa and C. Swarnambigai 5
6. Smart RFID Care [SRC] for Pervasive Health Care System
R.S. Lysa Packiam and A. Pravin Renold 5
7. A Memory Efficient and Secure Key Management Scheme
for Wireless Ad Hoc Networks
Ashly Thomas and N. Dhinakaran 6
8. An Efficient En-Route Filtering Scheme for Highly Dynamic
Wireless Sensor Networks
I. Bildass Santhosam and Anitha Christy Angelin 6
9. Analysis of Nodes Behavior Inconsistency on Reputation System
and Reduction in Manet
AR. Arunarani and R. Ramachandran 7
10. Survey on BGP QOS Support
R. Kamal Jagadeesan and N. Dhinakaran 7
11. Location Based Intelligent Mobile Organizer (LBIMO)
S. Ananya and B. Venkatalakshmi 8
12. New Efficient Proxy Based Quantum Key Distribution Protocol
for Group Communication
Prabu G., Ananthakumaran S. and Ramar K. 8
13. Implementation of Text and Smooth Block Compression in the Compound Image
N. Alagupriya and P.S. Jagadeesh Kumar 9
14. Optimized MaxMin Approach for Hiding Frequent, Itemsets
Janani R., R. Anuradha and N. Rajkumar 9
Contents xiii
15. An Approach for Measuring Semantic Similarity between Words
Using Association Rule Mining
Geetha K. and Rajkumar N. 10
16. Gesture Driven User Interface for Handhelds
Merrlin Benjamin and Ranjith Balakrishnan 10
17. Prediction of Future Stock Prices and their Performance Statistics
K.K. Sureshkumar and N.M.Elango 10
18. Automatic Detection of Masses in Digital Mammograms-A Novel Approach
M. Vasantha and Dr. V. Subbiah Bharathy 11
19. Multilingual Multi Document Summarization Using Fuzzy Model
with Naïve Bayes Classifier
Soundaravalli R., Dr. K.G. Srinivasagan and S. Babu Rengarajan 12
20. Enhancing the Adaptability of Web Service in Mobile Environment
Sivalingam, Shenbagavadevu and Kala 12
21. Ensuring Network Security in MANETs and Wireless Sensor Networks
with Artificial Neural Network Algorithms
S. Sivakama Sundariand R. Sundar 13
22. Clustering of Multispectral and Hyperspectral Images
J. Seetha, Dr. R. Varadharajan and Dr. V. Vaithiyanathan 13
23. Enhancing Elliptic Curve Cryptography Efficiency
M. Swarnalatha 14
24. SCTP Multihoming in Wireless Networking
S. Ambareesh and P. Aravind 14
25. Active Learning with Dynamic Queries Using Cart Algorithm
D. Senthil Kumar and G. Sathyadevi 15
26. Extraction of Palm Dorsal Vein Patterns Using Binarization and Thinning Methods
M. Rajalakshmi and P.Rega 15
27. Buffer Overflow Attack Blocker Using Sigfree Concept
N. Anbarasi and S. Kalaimagal 16
28. Providing Randomized Routes for Avoiding Compromised Node
and Denial of Service attacks in Wireless Sensor Networks
A. Arence Flemi and P. Robert 16
29. Person Identification Based on Decision Level Data Fusion Using Neural Network
S. Janardhanam, Dr. K. Venkatalakshmi, S. Vasuhi and Dr. V. Vaidehi 17
30. Energy Efficient Secure Data Collection Approach in Wireless Sensor Networks
Madhan V. 17
31. Improvised Shadow Removal for Video Sequences through Efficient Modeling
of Robust Statistical Descriptors
T. GraceWinsolin and M. Prakash 18
32. Network Traffic Control Using Multiagent System (Data Mining)
M. P. Srinivasan, T.Mahalingam and Dr. K.L. Shunmuganathan 18
xiv Contents
33. Multicast Authentication Based on Merkle Hash Tree Using MD5 Algorithm
Balaji Chandrasekaran 19
34. Trust System Protocol for Scada Networks
V.M. Priyadharshini and S. Sathiya 19
35. Enhancing the Design Quality by Move Method Refactoring
S. Durai and C.P. Indumathi 19
36. Simulation on JOB Scheduling Based on Cost Optimization in Grid Environment
Mohamed Mustafa, N. Shivakumar and N. Balaji 20
37. Network Based Framework for Information Retrieval Using Feature Association
Evangelin D. and Kalaivani V. 20
38. Ranked Query Processing Approach in Uncertain Databases
L. Vinoth Kumar and B. Jaison 21
39. Artificial Intelligence Based Decision Making System Using IRIS
J.K. Thiyagarajan and D. Karthik and Prof. Dr. S. Nagarajan 21
40. Securing Witness in Active Mode using Enhanced Secure Deep
Throat Protocol in P2P Networks
S. Manoj Thomas and M.A. Mukunthan 22
41. Realization of Self Healing Techniques by Virtualization to Progress
Software Rejuvenation
Anoo p Cherian Varughese and R. Sivakami 22
42. Effective Ways to Find Outliers during Classification
Malathi Eswaran and P. Vishnuraja 23
43. Advanced Congestion Control Technique for Health Care Monitoring
in Wireless Biomedical Sensor Networks
Jeshifa G. Immanuel, Prof. A. Fidal Castro and Prof. E. Babu Raj 23
44. Classification of Blood Types by Microscope Color Images
S.M. Nazia Fathima 24
45. Performance Analysis of Pest Image Segmentation Using Nonlinear
Objective Assessments
Pravin Kumar S.K. and Sivasangari A. 24
46. Enhanced Three-Party Quantum Key Distribution Protocol
Angel A., Ananthakumaran S. and Ramar K. 25
47. Extending QOX Metric Suit to Additional Metrics for Reducing
the Cost of ETL Design
Parthiban N., Jaisankar N. and Vijaya Bhaskar K. 25
48. A Secure Client–Side Watermark Embedding Using ST–DM algorithm
M. Leela 26
49. A Secure Resource Allocation for Grid
Sheeba J. and Neelaveni P. 26
50. HAC: Highest Affinity Clustering using Impetus Perception (IP)
Algorithm for Categorical Data
R. Kavitha, T.K.S. Rathish Babu and T. Kalaichelvi 27
Contents xv
51. Elastic Routing Table with Efficient Congestion Control
Using Node Capacity in DHT Networks
Tarun R. and Pandimurugan V. 27
52. Application of UNL in Document Summarization
S. Mangairkarasi and S. Gunasundari 28
53. A Congestion Free Contract Signing Protocol based on the RSA Signature
L. Sharmila 28
54. A Comparison of Maximum Likelihood Classifier and Edge Detection
Techniques for Performing Change Detection Analysis Using SAR Images
S. Vidhusha and T. Sree Sharmila 29
55. Effective Information Retrieval using Ontology and Semantic Link Network
S. Ganesh Shanker 29
56. A Fair and Connection based Opt Scheduling in IEEE 802.11 based Mesh Topology
Sajini S., Kanaga Suba Raja S. and Jebarajan T. 30
57. Hybrid Scheduling using Selection Method in Grid Environment
R. Bindhuja, G. Arul Dalton and Jebarajan T. 30
58. Improved Driver Fatigue Detection for Efficient Vehicle Control
based on Eye-Tracking
M. Bommy, D. Jayanthi and Sheik Faritha Begum 31
59. An Efficient Approach for Combating Spamdexing in Web Search Engine
using Link and Content Analysis
D. Saraswathi, Dr. A. Vijaya Kathiravan and S. Anita 31
60. A Review of Significant Researches
on Automatic EEG Epileptic Detection Algorithms
S. Vijay Anand and Dr. R. Shantha Selvakumari 32
61. Applying Ant Colony Optimization Technique for the Job Scheduling Problems
of a Semi-Automated Production System
Tamilarasi T., Jegadeeshwaran R. and Thangarasu S.K. 33
62. Multiparty Session Authentication Protocol for ODS SOA Based Business Processes
Bakiya K and Chellammal P. 33
63. Back-Up Routing for Cluster based Delay Tolerant Mobile Network
V. Gunasekaran and K. Sathyapriya 34
64. Optimization of Linear Recursive Queries with Infinite Recursion in SQL
R. Gomathi and A.M. Natarajan 34
65. Techniques for Clustering and Visualizing Web Search Results
S. Poomagal and Dr. T. Hamsapriya 35
66. Multi Resolution Wavelet Decomposition Image Fusion
R. Vijaya Arjunan, C.K. Swapna and B. Sivachandra Mahalingam 35
67. Implementation Aspects of Secure Network and Design of Log Analyser
S. Manikandan and Kiran M. Kumar 36
xvi Contents
68. Cell Breathing for Load Balancing in Wireless LAN
R. Latha and S. Radhakrishnan 36
69. High Sensitive Multiple Object Motion Detection in Surveillance
Video Applications
Ferdin Joe J. and Prof. B. Vijayakumar 37
70. Implementing Shrew Attack Protection (SAP) to Defend Against
Shrew Attack on Edges
D. Gayathri and Dr. N. Sankar Ram 37
71. Preventing Data Leakage Using Allocation Strategies
Parvathi Maheswari T. and Manjula R. 38
72. CAMSHIFT Object Tracking Algorithm Based
on Inter-Frame Differences for Noise Removal
P. Rayavel, G. Appasami and R. Nakeeran 38
73. Uninteresting Rule Reduction Using Ontologies and Bayesian Belief Networks
Suhasini Manoharan and Madhan Subramaniam 39
74. Decision Support System for Weapon Detection Using Image Mining
Alleluia Pushpa A. and D. Senthil Kumar 39
75. Advanced Searching Technique for Peer to Peer Network
Using Friend Set Concept
S. Anbu and C. Jayakumar 40
76. Efficient Cache Consistency Maintenance in Ad-hoc Networks
Y.S. Beena Wislien and A. Kanagaraj 40
77. Extended Gradient Descent Method for Privacy Preservation
Devipriya A., Anuradha R. and Rajkumar N. 41
78. Enhancing Features of Steward Protocol to Scale Byzantine Fault-Tolerance in Wan
P. Sathish, Dr. N. Sankar Ram and T.K.S. Rathish Babu 41
79. Efficient Packet Delivery in Manet Using RSGM
T. Chindrella Priyadharshini and S. Neelakandan 42
80. Imposing GUI Runtime State Feedback for Model-based Testing
J. Aswini and S. Vimala 43
81. SHARF: Secret Enhanced Security Framework for Metropolitan WMNs
V. Parthipan and N. Partheeban 43
82. TEAR: Trust Evaluation and Attack Detection
using Reputation of Nodes in MANET
K. Sudharson and C. Bala Krishnan 44
83. Public Security in Tracking People Using Surveillance Cameras
P. Uma Eswari and K.Sumathi 44
84. Picture Based Tamil Sentences Generation
M.S. Girija 45
85. Similarity Search and Identification of Online Videos with Graph
Transformation Techniques
Dwarakanath B. and Karthik B. 45
Contents xvii
86. Traffic Analysis Attacks on Anonymity Networks
Bhaskar N. R.Prabu and R. Karthikeyan 46
87. Snoogle: A Physicalworld Search Engine
P. Robert and T.G. Ruby Angel 46
88. A Dynamic Fuzzy Technique for Mining Temporal Medical Database
S. Radhika and T. Sethukkarasi 47
89. An Efficient Age Estimation System based on MPCA
V. Tamil Selvi and Dr. K. Vani 47
90. Neural Cryptography with Spy Units of Pre-Sharing Key Architecture
Dr. N. Prabakaran, A. Anthonisan and B. Madasamy 48
91. Dynamic Load Balancing and Job Replication
S. Muthukumarasamy and N. Sivakamy 48
92. Adaptive File Replication and Consistency Maintenance
in P2P Network Systems
P. Karpagam and V. Umarani 49
93. Record Matching over Query Results using Fuzzy Ontological
Document Clustering
G. Kalpana, R. Prasanna Kumar and Dr. T. Ravi 49
94. Web-based Intrusion Detection System Using Gaussian Mixture Model
V. Sulochana and P. Preethy Rebecca 50
95. Mobile General Packet Radio Services Sensors Array for Atmospheric
Air Pollution Monitoring
Dr. L. Vijay, Rakesh Kumar Giri, Dr. M. Umamaheswari and S. Sivasubramanian 50
96. Privacy Awareness Monitoring for Continuously Moving Object
Dr. L. Vijay, Rakesh Kumar Giri, Dr. M. Umamaheswari and S. Sivasubramanian 51
97. Information Security and Retrieval on E-Business
K. Jarina Begum and Ammer K. AL-Deber 51
98. Speaker Identification Using Neural Network
M.S. Ghute, V. B. Niranjane and P.M. Awachat 52
99. A New Methodology for Reducing Test Suites Using Ping-Pong Heuristics
M. Narasimhulu and A. Ananda Rao 52
100. Load Balancing Through Shortest Path in Regular Mesh Topologies
M. Ashwini and S. Vasundara 52
101. Effective Packet Loss Measurement with Geometric Approach
K. Ashfaq Ahmed and R. Raja Sekhar 53
102. Thin Plate Spline (TPS) Based Image Warping
V.B. Bagde, A.C. Bhagali and S.I. Parihar 53
103. Interconnect-Centric Design for Advanced System-on-Chip & Network-on-Chip
B. Muralikrishna, A.L.G.N Aditya, M. Sahithi and J. Poornima 54
104. Network Intrusion Detection for Unsupervised Authentication Records in Matlab
Bhawana Pillai, Vineet Rechhariya and Er. Niranjan Singh 54
xviii Contents
105. Retinal Recognition System
Nandana Prabhu and Ashwin Prabhu 55
106. Intelligent Mobile Banking based on Cloud Computing
R.Suresh, G. Raghu, M. Kumaravendan, A. Thamizharimam T. Manikandan 55
107. Development of Adaptive Traffic System Using Video Processing
Swapnil.S. Jain, Atish.S. Khobragade and Yeshwant.A. Deodhe 56
108. Position based Routing Scheme Using Concentric Circular Quadrant
Routing Protocol in Mobile Ad-Hoc Network
Upendra Verma and Vijay Prakash 56
109. Model Driven Design Method: An Approach to Design Software Architecture
Gaurav Kumar Gaur and Vaishali Mishra 57
110. Detection of Deformities in Lung Using Short Time Fourier Transform Spectrogram
Analysis on Lung sound
Abhinav A. Parkhi and Mahesh S. Pawar 57
111. A Novel Aop Based Adaptive Strategy Design Pattern for Autonomic Systems
V.S. Prasad Vasireddy, Vishnuvardhan Mannava and Yamini Chirumamilla 58
112. A Novel Autonomic Design Pattern for Stream Classification
System Design Using Aop
Bangaru Babu Kuravadi, Vishnuvardhan Mannava and V S. Prasad Vasireddy 58
113. A Co-clustering Model by Using Cross-domain Text
Classification through Wikipedia
R. Venkat, Dr. K. Raghava Rao and B. Ram Kumar 59
114. Analysis of Image Quality Using Quantitative Methods
Shruthi T.V., Ramyashree N, Pavithra P. and Kamalam Balasubramani 59
115. Administrative Office Content Management via Semantic Web–A Case Study
Dr. Sanjay K. Dwivedi and Anand Kumar 60
116. Time Synchronization in Heterogeneous Sensor Networks
Md. Rahmathulla and Mr. R. Raja Sekhar 60
117. Secure Integration of Private Data
K.V. Phani Kumar, B. Ramesh Babu and M. Sudhir 61
118. User Controlled Inter-Domain Routing Architecture
G. Zabeen Taj and G. Prakash Babu 61
119. A Novel Framework for Selective Encryption of MPEG-2 Video
Chittaranjan Pradhan and Mukut Roy 62
120. Efficient Dynamic Search Algorithm for Unstructured Peer-to-Peer Networks
S.Vijaya and S.Vasundara 62
121. SVM Identify Handwritten and Type Character
with Small and Capital Character
Abha Suryavanshi and Er. Niranjan Singh 63
Contents xix
COMMUNICATION
122. Maximizing Strength and Performance by Manually Designed Biquad Antenna
Vrushali V. Kadu and V.A. Gulhane 67
123. Design and Implementation of Multistandard Digital Filter Using FPGA
Bhanu A. and Latha R. 67
124. FPGA Based Convolutional Encoder and Viterbi Decoder
Sankari K.N. and Mohana Geetha D. 68
125. Point to Multipoint Communication in Mobile Adhoc Devices using Bluetooth
J. Praveen Kumar 68
126. CAMSHIFT Object Tracking Algorithm Based
on Inter-Frame Differences for Noise Removal
P. Rayavel G. Appasami and R. Nakeeran 69
127. Secure Approach towards Wormhole Attack in Ad-hoc Network
N.S. Raote and K.N. Hande 69
128. FPGA Implementation of Digital Front End QAM Modulator
for OFDM Transceiver
K. Anitha and A. Parimala 70
129. Novel Approach Based Coverage Repair in Clustered Wireless Sensor Networks
J. Naskath and K.G. Srinivasagan 70
130. A Bio-Inspired Adaptable Network Implemented With Stilted Molecule
ArunKumar U. and Roopa Sriram 71
131. Design of Parallel Multiplier with Low Power Adder Units
S.P. Prakash and P. Malarmathi 71
132. Combined Source and Channel Coding
for Image Transmission Using Turbo Decoding Algorithms
T. Gnanasekaran, P. Sivaselvi and D.V. Soundari 72
133. Implementation of Systolic Matrix Multiplication on FPGA
G.C. Veeresh and Mahesha M.S. 72
134. High Fault Coverage in SRAM-Based FPGA Using BIST Technique
Chandra Mohan Gupta V. and Meenakshi Vidya P. 73
135. Low Power High Speed Multiplier
Venkatesh Kolli and Meenakshi Vidya P. 73
136. Speckle Reduction and 3D Volume Evaluation of 2D Ultrasound Images
V. Kumutha and K.Sumathi 74
137. An Efficient VLSI Architecture for 3-D Discrete Wavelet Transform
Using Folding Technique
N. Vinod Kumar and V.R. Saraswathy 74
138. Analysis of Fiber Nonlinearity for Various Power Levels
of Individual Channels in DWDM System
T. Sabapathi, S. Sundaravadivelu and M. Ganesh Babu 75
xx Contents
139. Performance Analysis of Scheduling Algorithms in IEEE 802.16e
Gnanasekaran T., Kadhambari T., Rajarajachozhan C. and Kanagasundaram K. 75
140. Design and Power Analysis OF SPST Equipped VMFU and H.264 Codec
V. Manimekalai and M. Shanthi 76
141. An Efficient Multistage Decimation Filter Design based on Residue Number System
R. Venkata Krishnan and R. Latha 76
142. A Noval Approach on Multicast Algorithms for Multi-Radio
Wireless Ad hoc Networks
V. Tamilarasi and S. Sivakumar 77
143. Lowpower Implementation of 10-BIT Flash ADC in 90nm CMOS Technology
Akhila Mohan 77
144. Low Complexity and Low Power Digit Serial Systolic Multiplier
K. Archana and R. Senthamizh Selvi 78
145. An Enhanced Traffic Less Cooperative Proxy Caching
V. Krishna Kumar and P.S. Prakash 78
146. Performance Evaluation of Low-Power SRAM Cell
Nithya B. 79
147. An overview of Smart Antenna Implementation Using Neural Network
Sonia Jaiswal, Rasika Manapure and S.W. Varade 79
148. Design of Sparse-2 Ling Adder
Prabha 80
149. Efficient and Dynamic Key Distribution Protocol for 4G Wireless Sensor Networks
G. Shoba and S. Uma 80
150. Design of Sequential Circuits Using Gate Diffusion Input Technique
Deepa S., Priyadarshini R. and Rajalakshmi R. 81
151. Design of Solid Mounted Components
Using Bulk Acoustic Wave Technology for RF Communication
K. Radhika, B. Venkatalakshmi and S. Manjula 81
152. A Secure Authenticated Real Time Video Streaming Using WI-FI
S. Ganesh and A. Pravin Renold 82
153. Design of Dual Band UHF RFID Reader Antenna
Radha Manohar K., Venkatalakshmi B., Manjula S. 82
154. Detection of Unauthorized Access Points Using Clock Skew
Based Fingerprint Technique
Chandru Vignesh C. and Prakash P.S. 82
155. Design, Analysis and Applications of Cylindrical Array Antenna
H.L.Viswanath, S.Ghosh and D.Ganesh Rao 83
156. Optimization of Distributed Detection in Wireless Sensor Networks
Beulah Mary J. and I. Johnsi Stella 84
157. Analysis of Anomaly Detection and Data Transfer in Mobile Ad-hoc Networks
Josephin Ida Litrizia and Ganesan 84
Contents xxi
158. Extended-Refined Sequence Estimation: A novel Approach for TCM
Basamma D.U. and Dr. Suresh Chandra Mohan 85
159. Elimination of Non-monotonicity
of Variance Estimate in Weighted Overlap Segment Averaging
Venkatanarayana Moram, Mahaboob Pasha and Jayachandra Prasad Talari 85
160. Implementation of Hex-Derived Structure in Hexagonal Networks
V. Ceronmani Sharmila, T. Surekha and A. George 85
161. LSB Matching Revisited based Video Steganography
R. Selvaraj and P.S. Prakash 86
162. Channel Allocation Scheme for Preemptive Priority
based Handoffs in Multimedia wireless Networks
Satish K. Srivastava, Alok Jha, Saurabh Desai, Virendrapratap Singh 86
163. Dynamic Region Growth for Image Segmentation
Sunita Parihar, Prof. D.M. Meshram and Prof. V.V. Bagde 87
167. Performance Enhanced Delay Modelled Multiplier Accumulator
based on Modified Booth Algorithm USING FPGA
U. Krishna Divya, M. Ravi Kishore and N. Bala Dastagiri 87
168. Human Recognition using RFID
Nilu R. Mishra and Archana Charkhawala 88
169. Study of STTC MC-CDMA System for Wireless Application
Rasika Manapure, Sonia Jaiswal, and S.W. Varade 88
170. Morphological Background Detection and Contrast Development of Color Images
P. Premkumar and S.Deepa 89
171. Optimization of Reversible BCD Adder in Terms of Number of Lines
P. Radhika Ramya and V. Rajmohan 89
172. High Data Rate AES Encrypt/Decrypt Using Iterative Approach
D. Jeslin Sophia 90
173. MAC Module Structure for Secure Simplification WiMAX
Yogesh Gedam and S.D. Chede 90
174. RF-MEMS Switch and its Applications for Antennas
S.N. Ganorkar and Y.A. Nafde 90
175. WBAN based Health Monitoring by Using OMNeT++
S.B. Rangankar and S.D. Chede 91
176. Denial of Sleep Attacks in Wireless Sensor Networks
Sruthi Sivakumar and Kamal S. 91
177. A Survey on Multimodal Biometric System
S. Senthilnathan and A. Arunkumar 92
178. Design of Clock Multiplication Unit (CMU) Block
of RF Transceiver: Challenges and Solutions
S. Sophiya, S.R. Sindhu and Dr. Siva Yellampalli 92
xxii Contents
179. Hybrid Pass Transistor/CMOS Logic Cells for Low Power Optimization
I. Flavia Princess Nesamani and S. Miriam Niranjana 92
180. Compact Hardware Architecture for BLAKE Function
P. Lavanya and M. Rajmohan 93
181. Passive Method for Detecting Spliced Image
M. Selvakumar and J. Granty Regina Elwin 93
182. High Performance QOSTBC using Quasi Zero Forcing Decoding Algorithm
Darling Sweet Star J. and Senthil Kumar K. 93
183. PSO Tuned Neural Network for False Contour Reduction
Regina Manicka Rajam G. 94
184. QOS based Manycasting in Optical Networks
Ahilan S., Sivasubramanian A. and Balamurugan A.M. 94
185. FPGA Implementation of High Speed Infrared Image Enhancement
M. Nageswaraiah and Syed Jahangir Badashah 95
186. Reducing Power Consumption in SRAM Using BIST
and Programmable Delay Control
P. Sakthi Shunmuga Sundaram and G. Jeyalakshmi 95
187. Millimeter–Wave Mixer Circuits in Baseline CMOS Technology: A Review
Shubhangi B. Kadam and Dr. K.B. Khanchandani 96
188. Design and Simulation of Carbon NanoTube Conformal Antennas
Arivazhagan S., Kavitha K. and Amudha S. 96
189. Design and Analysis of Ring Resonator
based Programmable Optical Buffer for CWDM and DWDM Optical Networks
Sangamithra M. and Prita Nair 97
190. Secure IDMA Communication Using Quantum Cryptography
K. Divya, D. Sankareswaran and P.G. Bavyasri 97
191. Design of Reversible Logic Gates and It’s Application as BCD Adder
Anjalee P. Mandharey and Dr. Pravin K Dakhole 98
192. Environmental Economic Dispatch
Using Multi-Objective Particle Swarm Optimization Technique
Er. Khushbu Sahu and Dr. K.T. Chaturvedi 98
193. Convolutive Blind Source Separation Using Frequency
and Time Domain Transformation
Jerine Rini Rosebell V. Sharanya R. and Sugumar D. 99
194. Reduction of ICI Using ICI Self Cancellation Scheme in OFDM systems
Zahiruddin Syed and Sreekanth Neriyanuri 99
195. VoIP Network Quality Magnitude Using Time Delay
and Packet Loss for Voice Signal and Data Applications
M. Vijayakumar, Dr. Karthikeyani and Dr.Ammar Kalifa 100
196. A New Scan Architecture for Both Low Power Testing
and Test Volume Compression Under SOC Test Environment
V. Ramya 100
Contents xxiii
197. A Multi Layer IDS in Manet Using Clustering Techniques
M. Madhavi Latha, A. Fidal Castro and Dr. E. Babu Raj 101
198. A Selective Trigger Scan Architecture for VLSI Testing
N. Matthew Jones 101
199. QAM Transmitter and Receiver Design based on FPGA
GAE Satish Kumar, H. Devanna and K. Vasudevareddy 102
200. Miniaturization of Microstrip Patch Antenna Using Metamaterial as Substrate
Ratish Kumar, Rakesh N. Tiwari and Raman Sharma 102
201. A Novel U-Slot Loaded Broadband Rectangular Microstrip Patch Antenna
Rakesh N. Tiwari, Ratish Kumar and P. Kumar 103
202. Fault Detection in Gearbox/Ball Bearings Using Acoustic Analysis
K. Yavanarani, Y. Swaminathan, G.S. Simon Sundara Raj, S. Sheena Christabel,
J. Vijayaraghavan, Ganabhushan Rao S., Jagadeesh C.B. and Satheesh P. 103
203. Efficient Resource Sharing and Channel Assignment in Wireless Mesh Network
M. Raja and V. Bhanumathi 104
204. Low Power and High Speed Design of Double Edge Triggered D Flip-Flop
A.R. Kasetwar 104
EMBEDDED SYSTEMS
205. Multisensory System for Obstacle Detection and Location Estimation
on Railways
Preena Prasad 107
206. Soft-Switching Boost Converter with HI-Bridge Auxiliary Resonant Circuit
Lis Emmanuel and N. Maheswari 107
207. Design of Amplifier for Health Monitoring Wearable Device
Anu Priya R and Saravanan V. 108
208. Survey on Routing Attacks in Mobile Ad-Hoc Networks
Sebastian Terence J. and Britto Dennis J. 108
209. Implementation Experiences of Genetic Algorithm based Weighted
Clustering Algorithm in Mobile Ad hoc Networks
R. Pandi Selvam and V. Palanisamy 109
210. Wireless Sensor Network Based on ZigBee, ARM9
and GPRS for Advance Monitoring in Remote Areas
Ravi Sankar Reddy Lingareddy and Sahaya Lenin D. 109
211. Speed and Position Control of Autonomous Mobile Robot Using FPGA
O. Rakesh, K. Gerard Joe Nigel and Mahaboob S.K. 110
212. THD Reduction in Multilevel Inverters Using Real-Time Algorithm
Megha Jess Mathew and T. Chelladurai 110
213. Dynamic Key Management Scheme, Using AES Algorithm
for Wireless, Sensor Networks
Selvi S., Arthigeetha H., Asha.M, Swaruba P. 111
xxiv Contents
214. An Optimum PID Controller Design Based on Repulsive
Particle Swarm Optimization
S. Rajasekaran, Dr.T.Kannadasan and Dr. T. Kannadasan 111
215. Unmanned Reconnaissance Vehicle with Obstacle Sensing Design
to Decimate Eco-Warfare
T. Karthick, M. Sathyan and S. Vijayakumar 112
216. Smartdust Network for Tactical Border Surveillance System to Detect, Classify
and Track Enemy Intrusion
Nelliyan G. and Muthamizh S. 113
217. Network Power Management Using SNMP
S. Madhan Kumar and K.R. Jaya Chitra 113
218. Design Approach for Human Brain Hypothermia Detection System
Ashlesha S. Nagdive and Prof. Dr. L.G. Malik 114
219. A Real Time Hand Gesture Recognition Technique for Human
Computer Interaction
Shubhangi Moon and Prof. R.W. Jasutkar 114
220. Significance of Software Developemnet Process in Autosar
Anikesh Monot, Annie Smitha Paul, Martin K.M. 115
221. Electric Meter Theft and Tampering Detection
Priya S. Kamble and Sonali T. Bodkhe 115
222. Counterfeit Currency Recognition System Using Characteristics Extraction
1
Trupti Pathrabe and 2Dr. N.G. Bawane 116
223. Comparative Study of FPGA based TRNGs
Demeke Gebresenbet, M.M. Kuber and Vidyavati S. Nayak 116
224. Interconnect-Centric Design for Advanced System-on-Chip
& Network-on-Chip
B. Muralikrishna, A.L.G.N. Aditya, M. Sahithi and J. Poornima 117
225. Multi-agent Systems Approach For Authorization, Authentication
and Secure Shared Storage in Mobile Business Applications
Ashlesha Mahawadiwar 117
226. Secured Infants Monitoring by Designing an Embedded Device
using DSP Processor
Kranti A. Dive and Prof. R.W. Jasutkar 118
227. PIC based Actuation System for Multi-Stage Reverse Osmosis Plant
Loitongbam Surajkumar Singh, Bhausaheb A. Botre and Shashikant Sadistap 119
AUTHOR INDEX 121
Contents xxv
INFORMATION
An Efficient Authentication System
for Wireless Sensor Network
R.S. Sangeetha and P. Vinothiyalakshmi
PG Student, Assistant Professor, Department of Computer Science,
Sri Venkateswara College of Engineering, Chennai, India
E-mail: Sangee.me.cse@gmail.com, vlakshmi@svce.ac.in
Abstract—X-TESLA, a new member of the TESLA family uses two levels of chains that have distinct
intervals and cross-authenticate each other are used. This allows the short key chains to continue
indefinitely and makes new interesting strategies and management methods possible, significantly
reducing unnecessary computation and buffer occupation. We propose a technique X-TESLA, can
efficiently be combined with public-key techniques. In this, data are splitted into two halves and that
data’s are encrypted. So that dos attack and other attacks are completely prevented. This encryption is
done by RSA algorithm.
Keywords: X-Tesla, cross-authentication, public key technique, short key chain, RSA algorithm.
Projection distances, multidimensional statistics, weighted coefficients, DYMO protocol.
Clustering of Multispectral
and Hyperspectral Images
1 2 3
J. Seetha, Dr. R. Varadharajan and Dr. V. Vaithiyanathan
1 2
Research Scholar and Assistant Professor, Dhanalakshmi college
of Engineering, Chennai. seetha.venkat80@gmail.com
3
Professor, SASTRA University, Thanjavur Professor, SASTRA University, Thanjavur
Abstract—Nowadays aerial photographs as well as imagery obtained from remote sensing using aircraft
or spacecraft have a wide range of commercial and military applications.These images may be a
panchromatic,multispectral,hyperspectral or even ultraspectral of terra byte size files. A very efficient set
image mining tools are needed for remote sensing.We are experimenting with both Supervised and
Unsupervised algorithms on multispectral and hyperspectral. The Result analysis requires both
experiment and experience. Here, we have compared some of the clustering algorithms and implemented
a clustering algorithm for multispectral based on fuzzy cluster.
Keywords: Multispectral, hyperspectral, Spectral, Supervised, unsupervised classification, Cluster
Time Synchronization
in Heterogeneous Sensor Networks
1 2
Md. Rahmathulla and Mr. R. Raja Sekhar
1
Associate Professor, K.S.R.M.C.E, Kadapa, Andhra Pradesh, India
2
Assistant Professor, JNTUA, Anantapur, Andhra Pradesh, India
E-mail: mdrahmathulla@yahoo.co.in
Abstract—A Wireless sensor networks[1] is comprised of a large number of sensors that are scattered
over a region. Sensor networks are a special type of ad hoc networks, where wireless devices(nodes) get
together and spontaneous form a network. Sensor Networks have their own characteristics such as very
limited energy sources, high density of node deployment and cheap and unreliable sensor nodes. These
networks are used for various applications such as residence, industry, military, and many others. Time
synchronization in a computer network aims to provide a common timescale for local clocks of nodes in
the network. Several time synchronization algorithms (Reference Broadcast synchronization (RBS)[2],
Keywords: Security, Wireless sensor networks security, one time dynamic key.
Abstract—Hypothermia of brain is conditions where rectal temperature lowered down below 33◦C.
Hypothermia occurs mainly during HeadInjury, IschaemicStroke, Prenatal Asphyxia, Cardiac Surgery,
Neurosurgery, Vascular Surgery. Brain hypothermia treatment (BHT) is efficient in decompressing the
intracranial hypertension in neurosurgery. As brain hypothermia treatment (BHT) consists of simultaneous
management of various vital physiological functions, a decoupling control of intracranial temperature (ICT)
and pressure (ICP) is proposed to give hints on this systemic medicine. Out of the methods employed now in
clinical practice for reducing the oxygen consumption by the cerebral tissue, the most efficacious is
craniocerebral hypothermia (CCH). The main objective is to Develop Human Brain Hypothermia Detection
system, thermoelectric hypothermic wearable helmet.
Keywords: Hypothermia, Craniocerebral Hypothermia, hypothermic wearable helmet, Brain
hypothermia treatment (BHT).