<p>This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefully r
Computer Networks and Information Technologies: Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, ... in Computer and Information Science, 142)
β Scribed by Vinu V Das (editor), Janahanlal Stephen (editor), Yogesh Chaba (editor)
- Publisher
- Springer
- Year
- 2011
- Tongue
- English
- Leaves
- 689
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefully reviewed and selected for inclusion in the book. The papers feature current research in the field of Information Technology, Networks, Computational Engineering, Computer and Telecommunication Technology, ranging from theoretical and methodological issues to advanced applications.
β¦ Table of Contents
Title
Preface
Organization
Table of Contents
Full Papers
Solar Cell β A Novel Process Control Transducer
Introduction
Solar Cell Device: Fabrication and I-V Electrical Characteristic
Solar Cell as a Process Control Transducer
Temperature Measurement
Displacement Measurement
Speed/Velocity of Moving Object
Measurement of Pressure and Level
Sensitivity and Reliability
Sensitivity
Reliability
Experimental Investigation: Displacement Measurement and Its Validation with Computed Value
Data Acquisition
Calibration
Results and Discussion
Conclusions
References
A Hybrid Aggregation Technique for Continuous-Monitoring in Wireless Sensor Networks
Introduction
Network Model, Proposed Scheme and Application
WSN Model
Proposed Scheme
Application -- Power System Model Consideration
Results and Discussion
Conclusion
References
FLD-SIFT: Class Based Scale Invariant Feature Transform for Accurate Classification of Faces
Introduction
FLD-Based SIFT Descriptors
Computation of Patch Fisherspace
Experimental Results
Conclusion
References
Understanding the Performance of Multi-core Platforms
Introduction
Motivation
Contribution
Tools Used
Benchmarks
Summary of Results and Avenues for Future Research
Conclusion
References
Improvisation of E-Learning System Using Web Services Composition
Introduction
New Challenges and Requirements
Web Services Composition to Increase the Performance
Proposed Technique
Real Open Smart Classroom
Real Open Smart Platform
New Features
Three Communication Schemes in Real Open Smart Platform
Connecting Multiple Classrooms in an Open Network Using Web Services Composition
Advantages of Web Services Composition for Real Open Smart Classroom
System Analysis
Related Work
Existing Learning System
Conclusion and Future Work
References
Artificial Neural Network Based Contingency Ranking
Introduction
Voltage Collapse
Artificial Neural Networks
Case Study and Results
Conclusion
References
Detection and Tracking of Moving Object in Compressed Videos
Introduction
Proposed System
Tracking of Moving Objects in Compressed Vidoes
Experimental Results
Object Detection
Tracking Based on Multiple Feature Approach
Conclusion
References
An Enhanced Round Robin Policy for Real Time Traffic
Introduction
Round Robin Scheduling
Proposed Algorithm
Case Studies
For Simple Round Robin Algorithm
For Proposed Algorithm
Enhanced Model for Policy Based Routing
Conclusion and Future Work
References
A Novel Reconfigurable Video Burst Processor Offering High QoS
Introduction
Methodology
Video Burst
Markov Process
Optimization Parameters
Simulation Model
Simulation Results
Reconfigurability
Conclusion
References
Public Key Cryptography Based Approach for Securing SCADA Communications
Introduction
Key Challenges and Related Work
Proposed Methodology
Conclusion
References
gBeL: An Efficient Framework for e-Learning Using Grid Technology
Introduction
Use-Case Diagram for E-Learning
Grid Based E-Learning [gBeL]
gBeL Component Model
gBeL Framework
Implementation Scenario
Conclusion
References
An Algorithm Design to Evaluate the Security Level of anInformation System
Introduction
Background
Proposed Algorithm
Test Case
Conclusion and Future Work
References
Multi-agent Based Dynamic Data Integrity Protection in Cloud Computing
Introduction
Related Works
Proposed Model
Concept Validation
Conclusion
References
Design of Efficient Reversible Parallel Binary Adder/Subtractor
Introduction
Literature Survey
Proposed Model
Full Adder/Subtractor β Design I
Full Adder/Subtractor β Design II
Full Adder/Subtractor β Design III
Reversible Eight-Bit Parallel Binary Adder/Subtractor
Results
Reversible Full Adder/Subtractor
Reversible Eight-Bit Parallel Binary Adder/Subtractor
Conclusions
References
A Computationally Simplified Numerical Algorithm for Evaluating a Determinant
Introduction
A New Numerical Method for Evaluating a Determinant
Numerical Algorithm for Proposed Method
Numerical Illustrations
Illustration 1
Illustration 2
Illustration 3
Result Analysis and Discussion
Conclusion
References
Deriving Association between Learning Behavior and Programming Skills
Introduction
Motivation
Learning Behavior
Criterion-Referenced Model
K-Means Approach
Multi-layer Perceptron
DALP Approach
Results and Discussion
Conclusion
References
Analysis of a New Base Station Receiver for Increasing Diversity Order in a CDMA Cellular System
Introduction
Proposed Receiver Structure
Performance Analysis
Numerical Results
Conclusion
References
An Improved SRS Document Based Software Complexity Estimation and Its Robustness Analysis
Introduction and Related Work
Introduction to Improved Requirement Based Complexity Measure (I-RBC)
Results
Robustness Analysis with Complexity Properties
Conclusions
References
A Novel Model for Software Effort Estimation Using Exponential Regression as Firing Interval in Fuzzy Logic
Introduction
Membership Functions
Cost Estimation Models Literature Review
COCOMO81 Model
COCOMO II Model
Doty: [1]
Mittal Model: [1]
Proposed Model Effort Estimation Using Fuzzy
Fuzzification
Defuzzification
Research Methodology
Experimental Result Analysis
Conclusion and Future Scope
References
Fault Informant Distributed Deadlock Detection Using Colored Probes
Introduction
Motivation
Proposed Scheme
Correctness of the Algorithm
Conclusion
References
Experiments with a Behavior-Based Robot
Introduction
Architecture of the System
Hybrid Control
Probable Mathematical Model
Experiments
Results and Discussion
Simulation Result
Experimental Result
Discussion
Conclusions
References
Investigation of Channel Capacity of Railway Power Lines for Track and Level Cross Monitoring Application
Introduction
Electric Power Distribution System of Indian Railways
Analytical Model of Railway Powerlines
Results and Findings
Conclusion
References
A Distributed Weighted Cluster Based Routing Protocol for MANETs
Introduction
Proposed Algorithm
Formation of Clusters
Running Mobility
Cluster Maintenance
Performance Analysis
No of Clusterheads Formed vs. No of Nodes
No. of Control Messages vs. No. of Nodes
Conclusions
References
ReeRisk βA Decisional Risk Engineering Framework for Legacy System Rejuvenation through Reengineering
Introduction
ReeRisk (Reengineering Risk) Framework Architecture
ReeRisk Process
Components of ReeRisk Framework
System Domain
Managerial Domain
Technical Domain
Conclusion
References
Quantitative and Qualitative Comparison Study of Reference Based Time Synchronization Approach in Wireless Sensor Network
Introduction
Existing Approaches to Time Synchronization
Proposed Time Synchronization Scheme
Evaluation and Comparison
Quantitative Evaluation
Qualitative Evaluation
Conclusion
References
Efficient Video Streaming in Wireless P2P Network Using HIS-MDC Technique
Introduction
Related Works on MDC
HIS-MDC Architecture
Encoder and Decoder
Spatial and Temporal Interpolation
System Scenario
Experimental Results
Conclusion
References
A Novel Framework for Target Tracking and Data Fusion in Wireless Sensor Networks Using Kernel Based Learning Algorithm
Introduction
Target Detection, Tracking and Data Fusion
Proposed Framework Using Kernel Based Learning Algorithm
Kernel Based Target Tracking [9, 10]
Conclusion
References
Low Power Lapped Bi-orthogonal Transform (LBT) for FPGAβs
Introduction
Lifting-Based Lapped BiOrthogonal Transform
Proposed LBT
Basic LBT
Fast LBT (Decimation in Frequency) and Proposed LBT
Results and Discussions
Area, Power and Time Utilization
Simulation Results
Conclusion
References
CASE-JigDFS: Context-Aware, Smart and Efficient JigDFS Network
Introduction
CASE-JigDFS Network
Test Results and Discussions
Conclusion and Future Work
References
Novel Stock Market Prediction Using a Hybrid Model of Adptive Linear Combiner and Differential Evolution
Introduction
Development of a Hybrid ALC-DE Based Prediction Model
Simulation Study and Discussion on Results
Conclusions
References
Secure Self Organization of Wireless Sensor Network: A Need Based Approach Using Certificate Less Public Key Infrastructure
Introduction
Related Work
Proposed Need Based Security
Low Security
Medium Security
High Security
Analysis
Conclusion
References
Design of High Resolution, Fast Locking, Low Power Multiphase-Output Delay Locked Loop
Introduction
Multiphse Output DLL
Calculation and Results
Locking Time and Locking Range
Charge Pump with Loop Filter
Control Circuit
Conclusion
References
Dynamic Materialized View Selection Approach for Improving Query Performance
Introduction
Related Works
Dynamic Selection of Views
Query Processing Cost
View Maintenance Cost
Total Query Cost
Dynamic View Selection Algorithm
Experimental Results
Comparison with Related Work
Conclusions
References
Approximate Pattern Matching for DNA Sequence Data
Introduction
Related Work
Proposed Approach
Algorithm for Finding Fuzzy Levenshtein Distance
Algorithm for Finding Total Number of Fuzzy Patterns Using Fuzzy Levens-htein Distance
Results and Discussion
Conclusions and Future Work
References
DFIG Based Wind Energy System (WES)
Introduction
Modelling of DFIG Based WECS
Simulation Study and Results
Conclusion
References
Modelling and Voltage Stability Enhancement Using βSenβ Transformer
Introduction
Modelling of Sen Transformer
Testing
Simulation and Results
Conclusion
References
DBAM: Novel User Based Bandwidth Allocation Mechanism in WiMAX
Introduction
Existing Bandwidth Allocation Algorithm
Differentiated Bandwidth Allocation Mechanism
Implementation
Analytical Modeling
Results and Discussion
Conclusion
References
Applying a Predictive Approach for QoS Monitoring in Web Service
Introduction
Approach
Implementation and Experiments
Conclusion and Future Work
References
An Effective Performance of Fuzzy Hierarchical Clustering Using Time Series Data Streams
Introduction
Methodology
Hierarchical Clustering
Clustering Time Series Data Stream
Online Divisible Agglomerative Clustering
Fuzzy Clustering
Fuzzy Hierarchical Clustering Algorithm
Experimental Results
Clustering Validity
Hierarchical Quality
System Performance on ECG Data
Scalability Evaluation
Conclusion
References
Credit Scoring Using PCA-SVM Hybrid Model
Introduction
Literature Review
Proposed Approach
Support Vector Machine (SVM)
Logistic Regression
Dataset Description
Results and Discussions
Conclusions
References
Energy Efficient Data Aggregation and Routing in Wireless Sensor Networks
Introduction
Proposed Work
Contributions
Simulation Model and Performance Metrics
Results and Discussions
Nodeβs Battery Usage
Delay vs Nodes
Conclusions
References
Poster Papers
Design of High Speed Optimized Flash ADC
Introduction
Flash ADC Architecture with Two Step Approach
ADC Components Optimization
Conclusion
References
Alleviating the Data Loss in Congested Sensor Networks Using a Differentiated Routing Methodology
Introduction
Active Congestion-Less Routing
MAC-Enhanced Active Congestion-Less Routing
Machine for MACR
Conclusion
References
Interoperable Dynamic Composite Web Service
Introduction
Dynamic Composite Web Service
Interoperability Issue in Data Exchange
Proposed Model for Interoperable Dynamic Composite Web Service with XML Serialization
Conclusion
References
A Message Passing System with Faulty Node Identification for Mobile Agents
Introduction
The Broadcast Procedure
The Experiment
Result
References
Automatic Traffic Signal Controller for Roads by Exploiting Fuzzy Logic
Introduction
Fuzzy Based Traffic Signal Controller
Design Procedure of Fuzzy Controller
Membership Functions of Input Variables
Mapping of Crisp Output Variable vs. Input Variable
Conclusion
References
Multimedia Conferencing for MANET in Cluster Based Signaling
Introduction
Existing System
Proposed System
Cluster Based Signaling Architecture
Operational Procedures of Clusters
Result
References
Specification Based Test Case Generation Using Classification Tree Method
Introduction
Existing System
Proposed System
Problem Definition
System Implementation
Result
References
Mammogram Problem Solving Approach: Building CBR Classifier for Classification of Masses in Mammogram
Introduction
Mass Segmentation
CBR Classifier
Building Perform Case Base Classifier
Improving the Accuracy of Perform CB Classifier
Experimental Results
Results
Conclusion
References
New Mutants Generation for Testing Java Programs
Introduction
Related Work
Proposed Mutation Operators for Java
Mutation Operators for Exception Handling
Mutation Operators for String Handling
Conclusion
References
A Novel Approach to Hindi Text Steganography
Introduction
Related Work
Proposed Algorithm
Punctuation Marks Based
Synonym Based
Sanskrit Classification Based
Conclusion
References
Object Detection and Tracking in Videos Using Snake and Optical Flow Approach
Introduction
Proposed System
Experimental Results
Tracking by Active Contour Models
Trcking by Optical Flow Method
Conclusion
References
An Improved Technique for Handling Information Regarding Location of Moving Object
Introduction
Proposed System
Experimental Results
Implementation
Conclusion
References
Advanced Bioinformatics Approach in Machine Learning for Analyzing Genome Wide Expression Profiles and Proteomic Data Sets
Introduction
Types and Methods
Biological Research Is Database Oriented
Machine Learning Approaches to Genomic Data Analysis
Supervised Learning and Classification
Classifying Gene Function with Support Vector Machines
Conclusion
References
Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks
Introduction
The Optimized Link State Routing Protocol
OLSR Vulnerabilities
Simulation Results and Analysis
Conclusion
References
Bayesian Belief Networks β Based Product Prediction for E-Commerce Recommendation
Introduction
Proposed Approach
Product Recommendation
Experimental Results
Conclusion and Further Work
References
Yield Prediction Using Artificial Neural Networks
Introduction
Related Work
Methodologies
Results and Conclusion
References
A Novel Approach for Matrix Chain Multiplication Using Greedy Technique for Packet Processing
Introduction
Greedy Approach
Algorithm and Proof
Conclusion
References
Width of a General Tree for Packet Routing
Introduction
Recursive Approach
Iterative Approach
Conclusion
References
Unified Knapsack Problem
Introduction
Types of Knapsack Problem
Unified Knapsack Problem
Terms Used in Algorithm
Explanation of Algorithm
Simulation and Performance of Algorithm
Conclusion and Future Scope
References
Autonomous System Dealings in the Internet
Introduction
Related Work
Internet Architecture
Routing Policies
Routing Table and Topology Table
Conclusion
References
Federated Query Processing Service in Service Oriented Business Intelligence
Introduction
Data Integration Techniques
Related Work
Proposed Query Decomposition Algorithm
Experimental Results
Conclusions and Future Enhancement
References
Comparative Study of P2P and Cloud Computing Paradigm Usage in Research Purposes
Introduction
The P2P Paradigm
Underlying Architecture
The Cloud Computing Paradigm
Underlying Architecture
Application of P2P Paradigm for Research Purposes
Application of the Cloud Computing Paradigm for Research Purposes
Software (SaaS)
A Comparative Study of P2P and Cloud Computing Paradigm for Research Purposes
Conclusion
References
Cyclic Prefix Based Modulation Selection Using Comparative Analysis of EVM and RCE for WiMAX Network
Introduction
Simulation Background and Modeling Environment
Modulation Selection Algorithm and Simulation Results
References
Experimental Study of Rank 1 Chaos in Chuaβs Oscillator with Cubic Nonlinearity
Introduction
Cubic-Polynomial Chuaβs Diode and Switch-Controlled Chuaβs Oscillator
Experimental Results
Conclusions
References
A Novel Algorithm for the Implementation of PSO-Based SVM
Introduction
SVM
PSO
Intelligent Initialization of Swarm
Manner in Which Particles Are Initialized
Fitness Function
Software Architecture
Results
Conclusions
References
Omega Loops of Proteins in Homo Sapiens: Role in Diseases
Introduction
Methods
Results
1LN1
1NL0
3FGQ
3PRG
Discussion
References
Voice Record on RISE (Radio Broadcasting Integrated System) on Air Application
Introduction
Design and Implementation
Closing
Conclusion
Suggestion
References
Design of Hybrid Billboard with Scrolling Static Image and Remotely Updatable Matrix Display
Introduction
System Design
Scrolling Billboard Mechanism
Electrical System Block Diagram
Programming Design
System Test
Results
Future Development
References
Determining Factors of Online Auction Prices Analysis with Data Mining Algorithms on the Basis of Decision Trees
Introduction
Online Auctions and Auction Success
Dataset
Decision Trees
Results
Conclusion
References
A Framework for Efficient Information Retrieval Using NLP Techniques
Introduction
System Architecture
Experimental Setup and Evaluation Measures
Conclusion
References
Modified Graph Spectra Approach for Music Information Retrieval
Introduction and Background
Modification and Experiments
Conclusions
References
Comparative Analysis of CK Metrics across Object Oriented Languages
Introduction
Research Objective and Evaluation Results
Conclusion
References
Integration of Spatial and Transform Domain in LSB Steganography
Introduction
Algorithm
Performance Analysis
Conclusions
References
Rail Road Strategy for SJF Starvation Problem
Introduction
Related Work
Materials and Method
Algorithm
Implementation
Comparison and Performance
Conclusion
References
A Descriptive Approach towards Data Warehouse and OLAP Technology: An Overview
Introduction
Data Warehouse, OLTP and OLAP
Data Warehouse Support for OLTP Systems
OLAP as a Data Warehouse Tool
Data Warehouse Designing: Prerequisite
Data Warehouse Architecture Goals
Developing the Data Warehouse: Details
Identify and Gather Requirements
Designing the Dimensional Model
Designing the OLAP Cubes
Developing the Data Maintenance Application and Analysis Application
Testing and Deploying the System
Conclusion
References
Energy Consumption Analysis of Multicast Routing Protocols in Wireless Ad Hoc Network Environment
Introduction
Related Works
Multicasting Protocols
Experimental Results
Conclusion
References
Fuzzy Logic Based Computer Vision System for Classification of Whole Cashew Kernel
Introduction
Methods and Material
RGB Image Acquisition
Preprocessing and Segmentation
Feature Extraction
Classification
Final Grading
Conclusion
References
Efficiently-Enabled Inclusive Approach Preventing SQL Injection Attacks
Introduction
Proposed Approach
Implementation and Results
References
Simulation of Ultrasonic Phased Array Sensors for Time of Flight Measurements
Introduction
Principle of Operation
Modelling of Ultrasonic Signals
Time of Flight Calculation
Conclusion
References
Short Papers
Verifying and Enhancing the Correctness of the Dynamic Composite Web Service
Introduction
Related Work
Proposed Model for Testing the Web Service
Conclusion
References
Script Identification for a Tri-lingual Document
Introduction
Segmentation
Feature Extraction
Rule-Based Classifier
Experimental Results
Conclusion
References
Analysis of Different Key Distribution Schemes for Distributed Sensor Networks
Introduction
Key Distribution Schemes
The Eschenauer-Gligor (EG) Scheme
q-Composite Random Key Pre-distribution Scheme
Peer Intermediaries for Key Establishment (PIKE)
Blom's Key Pre-distribution Scheme
The Du-Deng-Han-Varshney (DDHV) Scheme
Analysis
References
Audio Database Watermarking for Tamper Detection
Introduction
Audio Database Watermarking
Proposed Watermarking Model for Audio in DB
Encoding
Verification for Tampering
Search Capability
Attach Model
References
Agent Based Information Aggregation and Routing inWSN
Introduction
Proposed Work
Node Agency (NA)
Routing Agent (RA)
Aggregation Agent (AA)
Conclusion
References
Dynamic IP Address Auto-configuration in MANETs
Introduction
Related Work
Ad Hoc IP Address Auto-configuration
Reason Why Nonce Is Used
Experimental Results
Conclusion
References
Design of a Low Power High Speed ALU in 45nm Using GDI Technique and Its Performance Comparison
Introduction
Low Power High Speed Design Metholodgy using a GDI Cell
Performance Characteristics Comparison of a 1-Bit ALU
Number of Transistors Comparison
Delay Comparison
Power Dissipation Comparison
Power - Delay Product Comparison
Conclusion
References
Normalization of Semantic Based Web Search Engines Using Page Rank Algorithm and Hypergraph Based Clustering
Introduction
Related Works in Semantic Web Search
Overview of Ranking Strategy (Proposed Approach)
Starting Point -- Query Definition Process
Introduction to Relation Based Ranking
Basic Idea for Proposed Aproach
User Interaction
Clustering of High Dimensional Data
Query Processing
Calculation of Relevance Score for Each Page
Example with Stastical Data
Conclusions and Future Work
References
A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
Introduction
Proposed Protocol
Watermark Generation and Extraction Protocol with DCT
Registration Protocol
Watermarking Protocol
Conclusion
References
Efficient Non-chronological Dynamic Video Abstraction Using the Rack-Through Method
Introduction
Abstract Video
Proposed System
Experimental Results
References
Target Tracking in Aerial Videos Using Image Registration Techniques
Introduction
Proposed System
Accuracy of Registration
Experimental Results
Matching Error Analysis of Image Registration Algorithms
Conclusion
References
Cost Control and Quality Maintenance Metrics for Component- Based Software Development
Introduction
Benefits of Reuse on Productivity of Software
Benefits of Reuse on Quality of Software
Proposed Scheme
Fault Detection Metric for CBSD
Cost Estimation Metric for CBSD
Analysis
Analysis of Cost Estimation Metric
Analysis of Defect Removal Metric
Conclusion
References
Study of Process Variations on ft in 30 nm Gate Length FinFET Using TCAD Simulations
Introduction
Simulation Environment
Results and Discussion
Variation in Gate Length
Variation in Underlap
Variation in Fin Width
Variation in Corner Radius
Variation in Hardmask Height
Conclusion
References
A Cluster Based Multi-Radio Multi-Channel Assignment Approach in Wireless Mesh Networks
Introduction
Related Work
Proposed Work
Simulation
Conclusion
References
VSPACE: A New Secret Sharing Scheme Using Vector Space
Introduction
Background
Vectors and Vector Space
Vector Space Associated with a Character
Our Proposal of Secret Sharing
Initial Phase
Distribution Phase
Reconstruction Phase
Security Analysis
Conclusions
References
Secure Group Deffie-Hellman Key Exchange with ID Based Cryptography
Introduction
Related Work
Proposed Scheme
Conclusion
References
Computing with Enhanced Test Suite Reduction Heuristic
Introduction
Background
CC/CC Pair and Test Suite Reduction
Proposed Test Suite Reduction Technique
Objectives
Experimental Study
Subject Programs, Faulty Versions and Test Case Pools
Experiment Instrumentation
Experimental Analysis
Conclusion
References
Robotic Arm with Finger Movement
Introduction
Related Work
Description of Design
Servodriver
Finger Driving Circuit
Logic for the Code
Experimental Results
Implementation and Result
References
Impulse Noise Removal in Digital Images Using Image Fusion Technique
Introduction
Conversion from RGB to YIQ and YIQ to RGB
Image Fusion Technique
Experimental Results
Conclusion
References
Faster Arithmetic and Logical Unit CMOS Design with Reduced Number of Transistors
Introduction
Arithmetic and Logical Operations
Mirror Adder as Subtractor
Proposed ALU Circuitry
Discussion on Proposed Circuit
Progressive Transistor Sizing
Input Reordering
Performance
Conclusion
References
Dimensionality Reduction of Data Warehouse Using Wavelet Transformation: An Enhanced Approach for Business Process
Introduction
Popular Techniques for Dimensionality Reduction
Wavelet Transformation
Procedure
Implementation
Conclusion
References
Analysis of Adaptive Floating Search Feature Selection Algorithm
Introduction
Background
Proposed Work
Experimental Results and Analysis
Conclusions
References
Reconfigurable Vlsi Architecture for Graph Color Allocation with Its Chromatic Number
Introduction
Operation of the Architecture
Proposed Hardware Architecture
Simulation and Synthesis Results
References
Hop-Count Filtering: A Successful Security Alongside Spoofed Network Traffic
Introduction
Hop Count
TTL (Time to Live )
TTL Based HopCount Computation
Related Work
Feasibility of Hop Count Filtering
Hop Count Stability
Diversity of Hop Count Distribution
Staying βAlertβ to Drdos Attacks
Blocking Bandwidth Attacks
Conclusion
References
Impulse Noise Reduction Using Mathematical Morphology
Introduction
Basic Morphological Operations
Noise Density (ND) Calculation
Self Adaptive Median Morphological Filter
Edge Detection Algorithm
Experimental Results
Conclusion
References
Improving the QoS Routing for Mobile Ad Hoc Networks
Introduction
Unipath and Multipath Routing in MANETs
Simulation
Method to Improve AOMDV
Conclusion and Future Work
References
An Approach towards Promoter Database Search Using Hidden Markov Model
Introduction
Methodology
Result and Discussion
References
Computational Characterization of CNT-Papain Interactions for Developing a Biosensor
Introduction
Computational Methodology
Results and Discussions
Conclusion
References
A Fast Sentence Searching Algorithm
Introduction
Related Work
Semantic Differences between Pattern and Sentences/Paragraph
Algorithm
Theoretical Analysis
Implementation
Conclusion and Future Scope
References
Early Congestion Detection and Self Cure Routing in Manet
Introduction
Early Detection of Congestion and Self Cure Routing Protocol
Early Congestion Detection Techniques
Self Cure Routing
Performance Study
Simulation Configuration and Performance Metrics
Varying Number of Connections
Varying CBR Load
Conclusion and Future Work
References
WCDMA-Third Generation Radio Interface
Introduction
Parameters of WCDMA
Protocol Architecture
Logical Channels
Transport Channels
Physical Channels
Summary and Proposed Simulation
References
Image Registration Using Mexican-Hat Wavelets and Invariant Moments
Introduction
Feature Point Extraction Using Scale Interaction of MHW
A Proposed Registration Algorithm
Experimental Results
Conclusion
References
Centralized Management Approach for WLAN
Introduction
Centralized Approaches for WLAN
WLAN Network Management Server by Intel
Meraki Enterprise Cloud Controller
Cisco WLAN Controller
Analysis of Centralized Approaches for WLAN
Conclusion
References
A New Metric Based Cluster Head Selection Technique for Increasing the Lifetime of Energy Aware Wireless Sensor Network
Introduction
System Model
The Proposed Scheme
Initialization Phase
Cluster Head Selection
Cluster Formation
Performance Evaluation
Conclusion and Future Work
References
A Feature Extraction Algorithm with Minimum Entropy for Images
Introduction
Proposed Method
Simulation Results
Conclusion
References
Shot Boundary Detection Algorithm Based on Color Texture Moments
Introduction
Proposed Methodology
Experimental Results
Conclusion
References
Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography
Introduction
Proposed Work
Watermark Embedding
Message Embedding with Encryption
Message Extraction with Decryption
Experimental Results
Perceptibility
Robustness
Editing
Conclusions
References
Building and Controlling a Ball and Plate System
Introduction
Ball and Plate System
Mechanical Part Design
Electrical and Control Parts
Programming
Testing, Result and Discussion
Servo Motor and DT Basic Servo Controller Testing
Control System Testing and Discussion
Conclusion and Recommendation
References
A VLSI Based Scheme for Implementation of BIBD
Introduction
Combinatorial Design
VLSI Design Process
Algorithm and Flow of the Design
Experimental Results
Conclusion
References
On 3D Streaming over Peer-to-Peer Networks
Introduction
Non-Linear (3D) Streaming Techniques
Key Challenges and Proposed Solutions
Conclusion
References
Secure Identity-Based Key Establishment Protocol
Introduction
Related Work
Man-in-Middle Attack in Deffie-Hellman Key Exchange
Proposed Scheme
Conclusion
References
RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication
Introduction
Threshold Cryptography
RSA Algorithm
Why RSA Works
Diffie Hellman Key Exchange Algorithms
Examples for New Concept
References
Cooperative Caching Strategy in Mobile Ad Hoc Networks
Introduction
System Model
Simulation Results
Effects of Cache Size
Effects of Transmission Range
References
Enhancement of Color Image Using Forth Order Partial Differential Equation Based on S-Type Enhancement
Introduction
Paper Preparation
Fourth Order PDE
Normalized the RGB Value
S-Type Enhancement
Enhance the Color Level Linearly
Proposed Algorithm
Result and Analysis
Conclusion
References
Log Based Recovery with Low Overhead for Mobile Computing Systems
Introduction and System Model
Proposed Scheme
Message Logging
Global Checkpoint
Recovery
Evaluation
Proof of Correctness
Conclusion
References
Custom Processor Implementation of a Self Clocked Coding Scheme for Low Power RF Communication Systems
Introduction
Manchester Encoder
PLL Based Manchester Decoder
Digitally Controlled Oscillator (DCO)
Phase Detector
Loop Filter
Implementation Results
Conclusion
References
A Novel Message Routing in Unstructured P2P Using CIS and Ant Search Algorithm
Introduction
Related Works
Proposed Methodology
Conclusion
References
Image Fusion Framework
Introduction
Image Registration Using NMI
Image Fusion
Quality Analysis of Image Fusion
Conclusion
References
An Enhancement to BioPPISVMExtractor Using Multidimensional Support Vector Machine
Introduction
Methods
Pronoun Resolution
Protein Name Recognition
MD-SVM Model
Feature Selection
Experiment and Discussion
Corpus
Evaluation and Results
Conclusion
References
Industrial Monitoring Using Zigbee Network
Introduction
Zigbee Technology
Experimental Details
Conclusion
References
Erratum: A New Metric Based Cluster Head SelectionTechnique for Increasing the Lifetime of Energy AwareWireless Sensor Network
Retraction Note to: Hop-Count Filtering: A SuccessfulSecurity Alongside Spoofed Network Traffic
Author Index
π SIMILAR VOLUMES
<p>This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefully r
This volume constitutes the selected and extended papers of the International Conference on Advances in Communication and Networking, FGCN2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The articles discuss recent progress in the area of Communication and Net
<span>This book constitutes selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2020, held in Gwalior, India, in December 2020. <br>The 23 full papers and 7 short papers were thoroughly reviewed and selected from the 102 submissi
<span>This book constitutes selected and revised papers of the 9th International Conference, SENSORNETS 2020, Valletta, Malta, held in February 2020, and the 10th International Conference, SENSORNETS 2021, held virtually in February 2021. <br>The 7 full papers presented were carefully reviewed and s
<span>These two volumes constitute the selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2022, held in Gwalior, India, in December 2022.<br>The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They