<p><span>The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in th
Advances in Computer Science, Engineering and Applications: Proceedings of the Second International Conference on Computer Science, Engineering and ... in Intelligent and Soft Computing, 167)
β Scribed by David C. Wyld (editor), Jan Zizka (editor), Dhinaharan Nagamalai (editor)
- Publisher
- Springer
- Year
- 2012
- Tongue
- English
- Leaves
- 1073
- Edition
- 2012
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas. The Second International Conference on Computer Science, Engineering & Applications (ICCSEA-2012), held in Delhi, India, during May 25-27, 2012 attracted many local and international delegates, presenting a balanced mixture of Β intellect and research both from the East and from the West. Upon a strenuous peer-review process the best submissions were selected leading to an exciting, rich and a high quality technical conference program, which featured high-impact presentations in the latest developments of various areas of computer science, engineering and applications research.
β¦ Table of Contents
Title
Preface
Organization
Contents
Networks and Communications
Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning
Introduction
Motivation and Related Work
Notations and Assumptions
Step I: Selective Partitioning
Step II QoS Provisioning by Load Sharing
Step III: Mathematical Constraints for Node Transition to Powerline
Part I: Which Node t to Be Moved to Wired Network?
Part II: How Will Th his Node Move to the Wired Network While Preservin the WMN Integrity?
Final Algorithm II
Algorithm II
Results and Comparison
Conclusions
References
A New Secret Key Cipher: C128
Introduction and Motivation
Proposed Design: C128
Encryption Process
Decryption Process
Function F
Function G
Sub Key and S-Box G Generation
Analysis
Future Work
Conclusion
Notes
References
Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET)
Introduction
Mobile Ad Hoc Networks (MANET)
IEEE 802.11
IEEE 802.11 e
Resource Allocation
Problem Identification
Related Works
Optimum Bandwidth Allocation Scheme
Overview
Estimation of Available Bandwidth
Admission Control Using Bandwidth Sharing
Bandwidth Sharing Technique
Admission Control
Bandwidth Allocation Policy
Overall Algorithm
Simulation Results
Simulation Model and Parameters
Performance Metrics
Results
Conclusion
References
Trusted AODV for Trustworthy Routing in MANET
Introduction
Literature Survey
Proposed Work
Evaluation Results
Conclusion and Future Enhancements
References
Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network
Introduction
Need for Trusted Environment in MANET
Issues in Designing Trusted Environment
Related Studies
Desired Model for Fuzzy Based Reputation System
Trust Level Computation
Trust Table Computation
Route Trust Calculation
Conclusions
References
Policy Based Traffic in Video on Demand System
Introduction
Traffic Flow Policy
Simulation Environment
Results and Performance Analysis
Conclusion and Future Research Section
References
Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization
Introduction
ZRP Routing Framework
Motivation to Distance Aware ZRP
Proposed Modification
Physical Distance Measurement
Advantages
Modified IERP and BRP
Result Obtained
Applications
Conclusion
Future Work
References
Mobile Data Offloading: Benefits, Issues, and Technological Solutions
Introduction
Problems with 3G Network
Why There is a Problem
Where Is the Problem?
Possible Solutions
Technologies for Mobile Data Offloading
Conclusion
References
Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA
Introduction
Gigabit Ethernet Standard
System Organization
Implementation
Performance Evaluation and Results
Conclusion and Future work
References
Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective
Introduction
Problem Formulation
Objectives
Advantages of Model - IGCM
Methodology
Information Input Sources (IIS)
Validation of IGCM
Information Security System of IGCM
Application of IGCM
Discussion
Conclusion
References
Modeling Soft Handoffsβ Performance in a Realistic CDMA Network
Introduction
Problem Statement
Background Literature
Proposed System Model
Soft Handoff Traffic Model
Empirical SHO Data Analysis
Model Simulation and Discussion of Results
Conclusion
References
A Security Approach for Mobile Agent Based Crawler
Introduction
Drawbacks of Mobile-Agent Based Crawler
Proposed Architecture of Security Based Mobile Agent Crawler
Conclusion
References
Prospects and Limitations of Organic Thin Film Transistors (OTFTs)
Introduction
OTFT Structure, Material and Fabrication
Top Gate Structures
Top Gate Structures
Organic Thin Film Transistor Materials
OTFTs Fabrication
OTFT Models and Operating Principle
OTFTs Compact DC Models
Operating Principle
Performance Analysis of OTFT
Characteristics of Different OTFT Structures
Performance Parameters
Limitations
Conclusions
References
Mining Queries for Constructing Materialized Views in a Data Warehouse
Introduction
Approach
Subject Area Identification
Frequent Query Selection
Example
Conclusion
References
Similarity Based Cluster Analysis on Engineering Materials Data Sets
Introduction
Methodology
Similarity Measures
K-Mean Clustering
Experimental Results on Cluster Analysis
Conclusion and Future Scope
References
A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack
Introduction
Cryptanalytic Procedures Used for the Analysis
Functions Used In Designing Cryptosystem
Proposed Encryption Method
Analysis Result
Conclusion
References
Introducing Session Relevancy Inspection in Web Page
Introduction
Proposed System Design
Analytical Study
Field Matching
Analytical Result of Field Matching
Pattern Matching
Condition 1:
Condition 2:
Analytical Result of Pattern Matching
Experimental Results
Conclusion
References
Way Directing Node Routing Protocol for Mobile Ad Hoc Networks
Introduction
The on Demand Hierarchy Routing
The On-Demand Hierarchy Routing Approach
Using AODV and DSR in ODHR
Operation of WDNR Routing Protocol
Route Discovery
Route Maintenance
Performance Evaluation of WDNR
Simulation Model and Scenarios
Results and Analysis
Conclusion
References
Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask
Introduction
Web-Page Prediction
Existing Models
Relevance Page Graph Model
Proposed Approach
Bit Pattern Generation Algorithm
Find Predicted Web-Page List
Performance Analyses
Test Setting
Test Results
Conclusions
References
Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation
Introduction
Arnold Transformation
Proposed Method
Embedding Algorithm
Extraction Algorithm
Results and Discussions
Conclusions
References
Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network
Introduction
Dissemination of Data Using Ad-Hoc On-Demand Distance Vector Routing Protocol
Multiple Connections in MANET-An Overview
Issues and Challenges to Achieve Multiple Connections
Proposal for Improvement
Future Enhancements
Conclusion
References
Conceptualizing an Adaptive Framework for Pervasive Computing Environment
Introduction
Related Work
The Proposed Conceptualized Adaptive Framework
The Processing Lay er
The Modeling Layer r
The Runtime Layer r
Case Study
Advantages of e the Proposed Conceptualized Adaptive Framework
Future Scope
Conclusion
References
Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad
Hoc Networks
Introduction
IEEE 802.11 DCF and TCP Instability Problem
IEEE 802.11 DCF
The TCP Instability Problem
ProposedWork
Proposed Dynamic DCF Backoff Algorithm(DDBA)
Working of Proposed Dynamic DCF Backoff Algorithm
Simulation and Performance Analysis
Simulation Environment
Simulation Parameters
Conclusion
References
Hybrid Cluster Validation Techniques
Introduction
Related Work
Proposed Hybrid Cluster Validation Indices
Experimental Results
Conclusion and Future Work
References
Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks
Introduction
Related Work
The Proposed Algorithm
Network and Energy Consumption Model
Simulation and Performance Evaluations
Simulation Parameters
Simulation Result
Energy Consumption with Different Sink Location
Network Lifetime with Different Sink Location
Energy Consumption with Different Network Size
Network Lifetime with Different Network Size
Conclusion and Future Work
References
Texel Identification Using K-Means Clustering Method
Introduction
State of Art
Texture Analysis
Clustering
Proposed Technique
K Means Clustering
Texel Identification
Experimental Results
Conclusion and Future Work
References
Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol
Introduction
Background
Proposed Work
Architectural Framework
Probability Analysis
Graph Analysis
Identification and Reduction of Malicious Conduct by TTPs
Results and Conclusion
References
Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory
Introduction
Mobile Learning in Medical
Mobile Learning Using Augmented Reality in Medical
Architecture
Appl
Problem Statement
Problem Solving with ARM
Iterative Visual Cognitive Based Learning Theory in ARM Application
Methodology
Objective
Conclusion
Acknowledgement.
References
A Secured Transport System by Authenticating Vehicles and Drivers Using RFID
Introduction
System Working Overview
Main Components of Vehicle Security System
ARM9 Overview
Radio Frequency Identification (RFID)
Linux Operating System
Wi-Fi Connections
Qt Framework
Motivation
Requirement Specification
Feasibility Study
Design
Implementation and Results
Conclusion and Fu uture Enhancement
References
Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing
Introduction
Data Management in Grid Computing
General Traditional Data Management
Related Work
Proposed Architecture
Data Locality
Domain Division
Data Management in Grid Computing
Algorithm Formulation at Bottom Level
Algorithm Formulation at Upper Level
Implementation and Experimental Evaluation
Dynamicity and Reliability Evaluation
Bandwidth Evaluation
Conclusion
Future Scopes
References
Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies
Introduction
Related Work
Problem Definition
Selection Strategies
Path Selection Strategy
Constraint Based Selection Strategy
Behavioral Profile Generations with SoNMine (Social Network Mining)
Evaluation of SoNMine
Conclusion
References
A Quantitative Model of Operating System Security Evaluation
Introduction
Evaluation Methodology
Evaluation Parameters
Case Study
Conclusion and Future Work
References
Energy Management in Zone Routing Protocol (ZRP)
Introduction
Zone Routing Protocol (ZRP)
Query Control Mechanisms
Query Detection (QD1/QD2)
Early Termination (E ET)
Random Query Processing Delay (RQPD)
Issues in ZRP
Power Management
Bandwidth Utilization
Modified ZRP
Power Factor in ZRP
Simulation Results and Analysis
Conclusions
References
Biographies
Dilli Ravilla
Dr C Chandra Shekar Reddy Putta
A New Approach for Vertical Handoff in Wireless 4G Network
Introduction
Related Work
Problem Formulation
Proposed System
Architecture
Link Quality Assessment
Methodology
Simulation and Results
Conclusion and Future work
References
An Analysis on Critical Information Security Systems
A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques
Introduction
Background
Comparative Study
Analysis Consequence
Conclusion and Future Scope
References
Emergency Based Remote Collateral Tracking System Using Googleβs Android Mobile Platform
Introduction
What Is Android?
Arduino Microcontroller
Heart Rate Monitoring Device
Integration of Arduino with Android-Amarino
Research Questions
Expected Outcomes
Main Contribution
Heart Rate Based
Problem Statement
Scenario
Modeling
Implementation and Validation
Conclusion
References
Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks
Introduction
Related Work
AIMM-I46 Architecture
AIMM-I46: Performance Evaluations
Simulation Setup
Simulation Scenario
Simulation Results and Performance Analysis
Conclusion
References
Wireless Mobile Networks
Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks
Introduction
Algorithm to Construct Strong Neighborhood-Based Connected Dominating Set
Description of the SN-CDS Algorithm, Time Complexity and Validation
Simulations
Conclusions
References
OERD - On Demand and Efficient Replication Dereplication
Introduction
Related Work
Proposed Approach
Architecture
Data Structures
Message Definitions for OERD Approach
RRA and RR Protocol
Strengths and Limitations of the Proposed Methodology
Simulation and Results
Case 1
Case 2
Case 3
Conclusion
References
A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks
Introduction
MAP Selection Schemes
Distance Based MAP Selection Scheme
Mobility Based MAP Selection Scheme
Modeling and Assumption
Analysis
Binding Update Cost
Handoff Latency
Tunneling Cost
Numerical Results
Binding Update Cost
Handoff Latency
Tunneling Cost
Conclusion
References
Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks
Introduction
The Proposed Routing Technique
Network Topology
Wireless Energy Transmission Model
Genetic Algorithm
Chromosome Coding.
The Proposed Technique in Action
Proposed Routing Technique Operation on the Base Station.
Proposed Routing Technique Operation on any Sensor.
Simulation s Results
Conclusion
References
Load Balancing with Reduced Unnecessary Handoff
in Hierarchical Macro/Femto-cell WiMAX Networks
Introduction
System Model and Proposed Handoff Decision Algorithm
Analytical Model and Performance Evaluation Parameters
Numerical Results and Discussions
Conclusion
References
A Study on Transmission-Control Middlewareon an Android Terminal in a WLAN
Environment
Introduction
Android OS
Architecture
Application
Congestion Control of Android
Congestion Control Algorithm
How to Obtain the Parameters in Kernel
Congestion in Coexisting Environment
The Design of Transmission-Control Middleware
The Policy of Switching TCP
Suitable Congestion Control Algorithm
Sharing of Communication Condition
An Application on Terminal
How the Application Obtains Parameter in Kernel
Exchanging CWND
Experimental Environment
The Detail about the Experiment
Experimental Evaluation
Conclusion and Future Works
References
Study of Location-Based Data Replication Techniques and Location Services for MANETs
Introduction
Location-Services for MANETs
Location Based Data Replication Techniques
Location Services: A Special Case of Location Based Data Replication Techniques
Conclusion
References
A Comparative Analysis of Modern Day Network Simulators
Introduction
Comparison of Different Network Simulators
Methodology and Experimental Test Bed
Conclusion and Other Related Work
References
Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks
Introduction
Implementation Details
Results
Conclusion
References
Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets
Introduction
Related Work
System Architecture
Description of System Architecture
Algorithm of Intermediate Node
Description of Algorithm
Simulation Results
Simulation Parameters
Result Analysis
Large Scale-Routing Protocol Performance Evaluation
Conclusion
References
Reachability Analysis of Mobility Models under Idealistic and Realistic Environments
Introduction
Mobility Models Used in MANET
Random Way Point Mobility Model
Random Walk Mobility Model
Random Direction Mobility Model (RDM)
Simulation and Experimental Setup
Metric Used
Simulation Setup Parameter
Simulation Process
Results
Conclusion
References
Chaotic Cipher Using Arnolds and Duffings Map
Introduction
Background
Algorithm for the Developed Ciphers
Results and Analysis
Conclusions
References
Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks
Introduction
Background
System Architecture
Deployment
Distance Estimation
Error Introduced in Distance Estimation
Effect of Temperature, Salinity and Depth on Sound Speed
Calculating Speed of Sound
Our Proposed Equation for Estimating Errors
Our Proposed Algorithm for Position Estimation
Performance Analysis
Simulation Scenario
Results
Conclusion
References
An Analytical Model for Power Control B-MAC Protocol in WSN
Introduction
Related Work
Proposed Analytical of B-MAC
Analytical Model for Power Consumption
Simulation Results
Conclusion and Future Work
References
Enterprise Mobility β A Future Transformation Strategy for Organizations
Introduction
Enterprise Mobility β Customer Pain Areas
Critical Enablers of Enterprise Mobility
Enterprise Mobility β Critical Success Factors
Enterprise Mobility β Mobile Web Paradigm
Enterprise Mobility β Key Business imperatives
Mobile Application Models
Native v/s Mobile Web v/s Hybrid Applications
Enterprise Mobile Application Components
Enterprise Mobilit ty β Key Design considerations, Design Recommendations and Results
Design Consideration ns
Key Design Recommendations
Key Result Area
Conclusion
References
Allocation of Guard Channels for QoS in Hierarchical Cellular Network
Introduction
Related Work
System Description
Analysis
Analysis of the Model with Prioritized Handoff Procedure
The Proposed Guard Channel Ratio Technique Based on a Two Low Layer of HCN
Result
Conclusion
References
Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment
Introduction
Wireless Mobile Ad-Hoc Networks
Publish-Subscribe Flavors and Variations
Cost Model
System Parameters
Cost Analysis of Publish/Subscribe Model
REDS Middleware
Application Development Using REDS for Wired Network
Experiment Setup and Result Analysis in Wired Network
Evaluation Through β Real World Experiment in Wireless Network
Conclusion
References
Automatic Speech Recognizer Using Digital Signal Processor
Introduction
Hardware Architecture
Software Algorithm
Basic Software Module Using Dsk
Software Algorithm
Training Module
Experimental Results
Conclusion
References
Pre Decision Based Handoff in Multi Network Environment
Introduction
Related Work
Predictions of RSS
Proposed Method for Handoff Decision
Experimental Results and Analysis
Conclusion
References
A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs
Introduction
Routing in Mobile Ad-Hoc Wireless Networks
Congestion in Mobile Ad-Hoc Wireless Networks
Related work
Proposed Work
Swarm Behavior
Congestion Metric
Ant Based Probabilistic Path Selection
Description of the Algorithm
Analysis
Conclusion
References
A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET
Introduction
Related Work
The Proposed CPN Model
Transitions and the Firing Rule
Performance Analysis
Conclusion
References
Sensor Deployment for Mobile Object Tracking
in Wireless Sensor Networks
Introduction
Related Work
Preliminaries
Main Idea of Node Sequences
??(
Problem Formulation
Three Deployment Patterns Categories
Regular Pattern
Triangular Tiling.
β
β
β
Square Tiling.
β
β
β
Hexagonal Tiling.
β
β
β
Random Pattern
β
β
β
Irregular Pattern
Definition 1.
Queens Pattern
Definition 2.
β
β
β
Definition 3.
Theorem 1.
Proof:
Grid-Random Pattern
Definition 4.
β
β
β
Discussion
Lemma 1.
Theorem 2.
Corollary 1.
Corollary 2.
Simulation Evaluation
Simulation Settings and Methodology
Simulation Results
Map Division.
Tracking Accuracy.
Visualized Simulation Example.
Conclusion
References
ELRM: A Generic Framework for Location Privacy in LBS
Introduction
Related Works
System Architecture and Location Cloaking
Generating SCA
Algorithm 1: ComputeSCA
Generating GCA
The Greedy Algorithm
Algorithm 2: Compute GCA
Experimental Evaluation
Conclusion
References
Energy Efficient Administrator Based Secure Routing in MANET
Introduction
Related Work
The Scheme
Algorithm
Simulation Results
Security Aspect
Comparitive Study with Existing Schemes
Conclusion
References
Effect of Mobility on Trust in Mobile Ad-Hoc Network
Introduction
Trust
Mobile Ad hoc Network
Mobility Model
Calculation of Trustworthiness for Two Nodes
Context for the Model
Background and Related Work
The Proposed Approach
Calculation of Trustworthiness for Two Nodes
Calculation for Average Speed of Node
Mobility Factor
Calculation of Final Trustworthiness
on a Node
Simulation
Conclusion and Future Work
References
Communications Security and Information Assurance
Securing Systems after Deployment
Introduction
Security Architecture
Cipher Considerations
Database Security Considerations
Application Security Considerations
Types of Cipher Attacks
Cryptography Types of Cipher Attacks
Conclusion
References
On the Security of Two Certificateless Signature
Schemes
Introduction
Cryptanalysis of Xiao et al.βs CL-SDVS Scheme
Review of Xiao et al.βs CL-SDVS Scheme
Weakness of Xiao et al.βs Scheme
Cryptanalysis of Li et al.βs CLS Scheme
Review of Li et al.βs CLS Scheme
Key Replacement Attack on Li et al.βs Scheme
Conclusion
References
Information Security Using Chains Matrix Multiplication
Introduction
Privacy Preserving Techniques in Information Security
Limitations
Proposed Technique by Using CMM
Objectives
Chains Matrix Multiplication (CMM)
Privacy Preserving of Information Using CMM
Solutions to the Limitations of the Existing System
Different Case Studies of CMM Based Approach
Results and Discussion
Conclusion
References
Formal Security Verification of Secured ECC Based Signcryption Scheme
Introduction
Related Work
Signcryption (SA) and Unsigncryption (UA) Algorithms
System, Network and Adversary Model
Generation and Distribution of Keys by the Trusted Dealer (TD)
Signcryption Algorithm (SA)
Unsigncryption Algorithm (UA)
Performance Analysis
Computational Overhead
Communication Overhead
Comparison with Other Schemes
Security Analysis
Confidentiality
Authentication
Unforgeability
Non-repudiation
Forward Secrecy
Public Verifiability
Formal Security Verification Using AVISPA Tool
Conclusion
References
Universal Steganalysis Using Contourlet Transform
Introduction
Related Work
Proposed Scheme
Contourlet Transform
Feature Extraction
Classification
Experimental Results
Comparison with Prior Art
Conclusions
References
Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K β Means Algorithms
Introduction
Clustering Algorithms for Intrusion Detection
Modified K-Means Clustering
Results and Analysis
Conclusions
References
Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM)
Introduction
Two Dimensional Z Transform
Two Dimensional Inverse Z Transform
Derivation of Inverse Z Transform from Continuous to Discrete Form
The Technique
Insertion Algorithm
Extraction Algorithm
Result Comparison and Analysis
Conclusion
References
Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)
Introduction
The Technique
Encoding Lower Frequencies (DHTL - ELF)
Embedding Secret Message (DHTL - ESM)
Authentication
Estimating Limit
Extraction
Experimental Results
Results
Comparison with Existing Systems
Conclusion and Future Work
References
A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)
Introduction
Transformation Techniques
Proposed Technique
Insertion
Re-adjustment
Extraction
Results, Comparison and Analysis
Conclusion
References
A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System
Introduction
Related Work
Proposed Model
Attack Characteristic Variable Modeling Using CUSUM
ANFIS Engines
Decision Making
Experimental Results
Conclusion and Future Work
References
Encryption of Images Based on Genetic Algorithm β A New Approach
Introduction
Genetic Process
Literature Survey
The Proposed Method
Experimental Results
Statistical Analysis
Histogram Analysis
Correlation Coefficient Analysis
Complexity
Image size Encryption Time
Conclusions
References
Content Based Image Retrieval Using Normalization of Vector Approach to SVM
Introduction
Related Work
Support Vector Machine
Proposed Technique
Experiment Result
Conclusion
References
Modified GrΓΈstl: An Efficient Hash Function
Introduction
GrΓΈstl Overview
Hash Function Const truction
The Compression Fu nction
The Output Transfor rmation
Proposed Algorith m
Hash Function Const truction
The Compression Fu nction
The Output Transfor rmation
Analysis of Modifi ed GrΓΈstl Hash Function
Efficiency of Modifie d GrΓΈstl Function
Near-Collision Resistance
Avalanche Effect
Randomness Test
The Bit-Variance Tes st
Conclusion
References
Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform
Introduction
Related Work
Proposed System
Iris Template Generation Using Libormasek Algorithm [2]
Feature Vector Generation Using Multi Level Haar Wavelet
Iriscode Generation
Storing Iriscode in Database
Calculation of Hamming Distance between Templates
Authentication Using Majority Voting
Experiments and Results
Iris Database
Evaluation Criteria
Results
Conclusion and Future Work
References
Recovery of Live Evidence from Internet Applications
Introduction
Background
Testing Procedure
Test Overview
Environment Setup
Acquisition
Analysis
Results
Sonicwall
Facebook
Gmail
IRCTC
SBI
Conclusion and Future Work
References
Face Detection Using HMM βSVM Method
Introduction
Face Detection Using Modified Kernel Based HMM and SVM
Kernel Hidden Markov Model (K-HMM)
Support Vector Machine (SVM)
Face Image HMM
Feature Extractions
Training the Face Model
Experimental Results
Conclusions
References
High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
Introduction
Proposed Scheme
Watermark Embedding Process
Watermark Detection Process
Experimental Results
Experimental Setup
Perceptual Quality Measures and Robustness Test
Conclusions
References
Key Management Protocol in WIMAX Revisited
Introduction
Security Requirements
Security Property
Scyther Tool
Security Propriety
Modeling and Analyzing Pkmv2 Protocol
PKMv2 Protocol
Modeling PKMv2
Analysis of PKMv2
The Proposed Revised Authentication Protocol
Modeling New Protocol in SPDL language
Analysis the New Version
Conclusion
References
Image Authentication Technique Based on DCT (IATDCT)
Introduction
Two Dimensional Discrete Cosine Transform
Two Dimensional Inverse Discrete Cosine Transform
The Technique
Insertion Algorithm
Extraction Algorithm
Result Comparison and Analysis
Conclusion
References
Survey on a Co-operative Multi-agent Based
Wireless Intrusion Detection Systems Using MIBs
Introduction
Wireless Intrusion Detection System
Problems Related to Wireless Networks
Architectures of Wireless IDS
Stand-Alone IDS
Co-operative and Distributed IDS
ProposedWork
Experimentation and Results
Conclusion
References
A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks*
Introduction
Related Works
Calculation of the Optimum Number of Nodes
Optimum Node Arrangement
Clustering
Hierarchical Troika
Structure Comparison
Simulation Results
System-of-Node Reliability Comparison
Malicious Nodes Influence Comparison
Conclusion and Future Works
References
A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers
Introduction
Embedding
Replacement of Pixels Based on Pseudorandom Number
Proposed Work
Security Analysis
Conclusions
References
Security Assurance by Efficient Non-repudiation Requirements
Introduction
Non-repudiation
The Checklist Approach
A Non-repudiation Checklist
Implementation Mechanism
Tryout Results and Discussion
Conclusion and Future Work
References
Poor Quality Watermark Barcodes Image Enhancement
Introduction
Barcode
The Proposed Technique
Algorithm 1: Reading Algorithm
Experimental Results
Conclusion
References
Hiding Data in FLV Video File
Introduction
Flash Video File Format
The Proposed Technique
Algorithm 1: Embedding Algorithm
Experimental Results
Conclusion
References
Taxonomy of Network Layer Attacks in Wireless Mesh Network
Introduction
Network Layer Attacks
Control Plane Attacks
Data Plane Attacks
Conclusion
References
Implementing Availability State Transition Model to Quantify Risk Factor
Introduction
Review Work
Terminologies Used
The Methodology
Availability Risk Check Process (ARCP)
Availability Check for Class Hierarchy (AC2H) Algorithm
Availability State Transition Model (ASTM)
Security Metrics
Experimental Validation
Hypothesis Formulation
Collection of Data
Metric Results
Hypothesis Testing
Set Regression Line
Tryout
Statistical Analysis
Significance
Conclusions
References
Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System
Introduction
Narrow Band Signal Model
Mimo Signal Model
Algorithms Used
New Approach of DOA Estimation
Simulation and Performance Comparison
Conclusion
References
Grid Computing
DAGITIZER β A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing
Introduction
Applications of DAG
Related Works
Architecture and Operations of the Tool
Tool Architecture
Implementation and Results
Time Complexity of the Algorithm
Conclusion
References
A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network
Introduction and Motivation
Structure of Modified Alpha Network
Proposed Network Model
Advance Irregular Alpha Multistage Interconnection Network
Routing Algorithm of AIAMIN
Example1.
Path Availability
Theorem 1
Theorem 2
Cost Analysis
Conclusion
References
Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database
Introduction
Energy Efficiency Model
Measurement Approach
Comparison between HBase and GridSQL
Conclusions and Future Works
References
A Grid Fabrication of Traffic Maintenance System
Introduction
Grid System
Traffic Maintenance Analogy in Grid System
Problem Analysis and Proposed Approach
Problem Analysis
Proposed Approach
GFTMS-An Illustrative Example
Tools
Conclusion
References
Authors
Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment
Introduction
Related Work
MAβIDS for Grid Computing
GRID-IDS
QoS for Grid Computing Environment
Most Benefit Travelling Salesman Problem (MBTSP)
Most Benefit Routing Algorithm (MBRA)
Conclusion
Acknowledement.
References
Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning
Introduction
Related Work
Proposed Autonomic Design Pattern
Design Pattern Template
Pattern Name
Classification
Intent
Context
Proposed Pattern Structure
Participants
Related Design Patterns
Roles of Our Design Pattern in Autonomic System
Feature Based Service insertion into Server Repository with Association Rule Based Learning
Profiling Results
Conclusion and Future Work
References
An Enhancement to AODV Protocol for Efficient Routing in VANET β A Cluster Based Approach
Introduction
Related Works
Proposed Routing Using Clusters
Cluster Formation
Cluster Maintenance
Clustered Routing
Experimental Setup
Conclusion
References
Human Emotion Recognition and Classificationfrom Digital Colour Images Using Fuzzy and PCA
Approach
Introduction
Related Work
Proposed Technique
Database Preparation
Preprocessing
FFDAS
PCS for Feature Extraction
PCA for Feature Extraction
Computing Euclidean Distances
Emotion Recognition
Experimental Results and Analysis
Conclusion
References
A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention
Introduction
Related Works
Proposed Mapping Algorithm
Evaluation of the New Mapping Algorithm
Simulation Testbed
Experimental Results
Conclusion
References
Resource Based Optimized Decentralized Grid Scheduling Algorithm
Introduction
Motivation and Background
Proposed Decentralized Grid Scheduling Algorithm
Proactive Hierarchical Arrangements of Resource
Resource Based Optimized Decentralized Grid Scheduling Algorithm
Experimental Results
Conclusion and Future Scope of Work
References
Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management
Introduction
The Web GIS
An Architecture of Typical WebGIS System
Components of Typical Web GIS Systems Include
Hardware
Database
Several important sectoral sources of information exist on the
The following are the examples of sectoral data:
Other important sources of information are the RS and GIS sites which are available on the
sites
GIS Software
Open Source Desktop GIS Software
Information of open source GIS software exits on the
Few very useful links are:
Addressing Water Resources Management through Web-Based GIS and FOSS Approach
Conclusions
References
A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA
Introduction
Related Work
Proposed Autonomic Design Pattern
Design Pattern Template
Pattern Name
Classification
Intent
Context
Proposed Pattern Structure
Participants
Consequences
Roles of our Design patterns in Autonomic System
Conclusion and Future Work
References
A Policy Driven Business Logic Change Management for Enterprise Web Services
Introduction
Framework for Policy Driven Web Service Change Management
Business Policy Driven Mapping Algorithm
Case Study
Airline_Reservation_Service.xsd [Before Change]
Airline_Reservation_Service.xsd [After Change]
Implementation
Related Works
Conclusion and Future Enhancements
References
Author Index
π SIMILAR VOLUMES
<p>This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology. Experts in research, industry, and academia present the latest d
<p><span>This book provides insights into the 5th Edition of the Proceedings of the Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2022) held in Ambato, Ecuador. This event brings together researchers, students, and professionals from the industrial and academic sector
This book provides insights into the 5th Edition of the Proceedings of the Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2022) held in Ambato, Ecuador. This event brings together researchers, students, and professionals from the industrial and academic sectors, seekin
The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas. Th
The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas. Th