Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings (Communications in Computer and Information

of: Vinu V Das, R. Vijayakumar, Narayan C. Debnath, Janahanlal Stephen, Natarajan Meghanathan, Suresh Sa

Springer-Verlag, 2010

ISBN: 9783642122149 , 680 Pages

Format: PDF

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's

Price: 95,23 EUR



More of the content

Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings (Communications in Computer and Information


 

Preface

5

Table of Contents

7

SVD and Neural Network Based Watermarking Scheme

17

Introduction

17

Watermark Embedding

18

Watermark Extraction

20

Conclusion

21

References

21

Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms

22

Introduction

22

Query Term Proximity Heuristic and Semantic Associations

23

Multi-term Query

23

Semantic Association between Query Terms

23

Term Proximity Measures

24

Experimental Evaluation

25

Related Works

26

Conclusion

27

References

27

Network Management Initialization for Wired and Wireless Communication: A Real Time Study

28

Introduction

28

Overview of the Infrastructure Modules

29

Adaptive Security Algorithm

29

Back Bone Implementation

30

Performance Management

31

Conclusion and Future Work

32

References

32

IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network

33

Introduction

33

Literature Review

34

Proposed System

34

Processing IPv6 Initiated Communications in V6EGT

35

Processing IPv4 Initiated Communications in V4EGT

35

Processing IPv6 Destined Communications in V6EGT

36

Implementation

36

Conclusion

36

References

36

An Efficient Multicast Hybrid Routing Protocol for MANETs

38

Introduction

38

Proposed Protocol

39

Performance Evaluation

40

Simulation Environment and Parameters

41

Observations and Discussions

41

Conclusions

42

References

42

Applications of Graph Theory in Face Biometrics

44

Introduction

44

Face Recognition Using Graph Matching Constraint

45

Reduced Point Based Match Constraint for Face Recognition

45

Face Recognition Using Probabilistic Graph

46

Fusion of Matching Scores

46

Experimental Results

47

Face Recognition Using RPbMC

47

Face Recognition by Fusion of Salient Invariant Features

47

Conclusion

48

References

49

Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map

50

Introduction

50

Proposed Method

50

Generation of Synthetic Images

51

Image Stretching and XORing

51

Diffusion and XORing

52

Decryption

52

Security and Performance Analysis

52

Sensitivity Analysis oof the Encryption

53

Conclusion

54

References

54

Hybrid Activities of AODV for Wireless Ad hoc Sensor Network

55

Introduction

55

Proposed Protocol

56

Performance Evaluation Parameters

57

Simulation Parameters

57

Observation and Discussion

58

Conclusion

59

References

59

Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm

61

Introduction

61

Scheduling Algorithms

62

First-Come, First-Served (FCFS

62

Shortest-Job-First (SJF)

62

Priority Scheduling (PrS)

63

Fuzzy-Based Scheduling (FuzS)

63

Results and Performance Evaluation

64

Case-Study 1

65

Case-Study 2

66

Case-Study 3

66

Case-Study 4

66

Conclusion

67

References

67

Object Location in Cluster Based Mobile Ad Hoc Networks

69

Introduction

69

Previous Work

70

Assumptions Made

71

Algorithm

71

Maintenance of Location Information

72

Metrics Used

72

Simulation Results

73

Conclusion and Future Work

74

References

74

Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications

76

Introduction

76

IEEE 802.11a Specifications

77

Implementing Coded Orthogonal Frequency Division Multiplexing Based System

77

Simulation Results

79

Conclusion

80

References

80

Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks

81

Introduction

81

Proposed Design

82

Simulation and Results

84

Input Data

84

Results

84

Conclusion

86

References

86

A Closed Form Slew Evaluation Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects

87

Introduction

87

Basic Theory

87

Properties of Burr’s Distribution

88

Proposed Slew Metric Model

89

Experimental Result

90

Conclusion

91

References

91

Wavelet-Domain $L$^{8}-Constrained Two-Stage Near-Lossless EEG Coder

92

Introduction

92

Techniques Used

93

Lifting Scheme

93

SPIHT Encoding Algorithm

93

Compression Algorithm

93

Experiments

94

Results and Discussion

95

Conclusion

96

References

96

Fuzzy Based Bandwidth Management for Wireless Multimedia Networks

97

Introduction

97

Related Work

98

Proposed Work

99

Network Environment

99

Bandwidth Allocation

99

Fuzzy Based Bandwidth Allocation

100

Simulation

102

Simulation Model

102

Simulation Procedure

103

Simulation Inputs

103

Performance Parameters

103

Results

104

Conclusions

105

References

105

A Novel Digital Algorithm for Sobel Edge Detection

107

Introduction

107

Functional Description

108

Sobel Edge Detection

108

Block Diagram

110

Algorithm for Sobel Edge Detection Method

110

Results

111

Conclusion

111

References

111

Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison

112

Introduction

112

Related Work

112

Dataset Description

113

Exclusion of Dataset

114

Estimation of Model Performance

114

Performance Evaluation

114

Dimensionality Reduction

114

Result

115

ROC Statistical Result

115

Performance Comparison of Weka Explorer and Knowledge Flow

115

Conclusion

116

References

117

Recognition of Isolated Indian Sign Language Gesture in Real Time

118

Introduction

118

Generation of ISL Video Training Samples

119

Methodology

119

Feature Extraction

120

Classification and Result Analysis

121

Conclusion and Future Work

122

References

122

Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors

124

Introduction

124

Power Consumption in CMOS

124

Dual-Edge Clocking Methodology

125

Application of Dual-Edge Clocking in Caches

125

The OpenSPARC T1 and Alpha AXP 21064 Processor Caches

126

Modification Using Dual-Edge Clocking

127

Experimental Results and Analysis

127

Conclusion

128

References

129

Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor

130

Introduction

130

Direct Mapped Cache Architecture

131

Set Associative Cache Architecture

131

Phased Set Associative Cache Architecture

131

The Alpha AXP 21064 Processor

132

Implementation and Experimental Results

133

Conclusion

134

References

134

Role of Resolution in Noisy Pattern Matching

136

Introduction

136

The Approach

136

Experimental Results

138

Conclusion

139

References

140

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security

141

Introduction

141

The Authorization Protocol and Its Integration with the Trigon-Based Authentication Protocol

142

Simulation Results

144

Conclusion

144

References

145

Bandwidth Estimation Scheme for Mobile Adhoc Network

146

Introduction

146

QOS-Aware Routing

147

Simulation Results

150

Conclusion

151

References

151

Multimodal Biometric Invariant Moment Fusion Authentication System

152

Introduction

152

Related Work

153

Multimodal Biometric System

153

Invariant Moment Fusion System

154

Fingerprint

154

Face

155

Fusion

156

Authentication

157

Conclusion

158

References

158

Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography

160

Introduction

160

Advantages of Direct Digital Radiography Compared with Conventional Film

161

Routine Dental Diseases

162

Digital Image Processing Radiographs

162

Method

164

Results

164

Discussion

165

Conclusion

166

References

167

Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images

168

Introduction

168

Overview of Histogram and Spatiogram

169

Histogram

169

Spatiogram

169

Methodology

170

Results

171

Conclusions

172

References

172

Vector Quantization for Tumor Demarcation of Mammograms

173

Introduction

173

Algorithms for Segmentation

174

Watershed Algorithm

174

Vector Quantization

175

Results

175

Conclusion

177

References

177

Selective Encryption of Video Using Multiple Chaotic Maps

180

Introduction

180

Encryption Scheme

181

Experimental and Performance Analysis

181

Histogram Analysis

182

Key Sensitivity Analysis

182

Key Space Analysis

183

Conclusion

183

References

184

Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks

185

Introduction

185

Related Work

185

Time Synchronization Protocols and Their Approaches

186

Time Synchronization Protocol for Sensor Networks

186

Reference Broadcast Protocol

186

Hybrid Protocol

186

Theoretical Analysis of Hybrid Protocol

187

Calculation of Threshold Value for Hybrid Protocol

187

Analysis of Message Transmission for Hybrid Protocol

187

Optimized Hybrid Protocol: New Approach

187

Optimized Hybrid Protocol and Analysis of Message Transmission

187

Algorithm for Optimized Hybrid Protocol

188

Implementation

188

Methodology

188

Simulation and Tools Employed

188

Performance Results and Analysis

189

Conclusion

189

References

190

Tracking Based Secure AODV Routing Protocol

191

Introduction

191

Related Works

191

AODV Routing Protocol [3]

192

Route Discovery

192

Route Maintenance

192

Security Problems in AODV Protocol

192

Proposed Tracking Based Credence Computation Algorithm

193

A Security Mechanism Built on AODV Protocol

193

Credence Mechanism Built on AODV Protocol

193

Results and Analysis of the Algorithm

194

Conclusions

195

References

195

Study of Visitor Behavior by Web Usage Mining

197

Introduction

197

Related Work

198

Proposed Work

199

Pattern Discovery

199

Pattern Analysis

201

Theoretical Study

202

Experimental Analysis

202

Conclusions

203

References

203

A Hybrid Routing Protocol for Wireless Sensor Network

204

Introduction

204

Constraints of Sensor Nodes

205

Existing Protocols

205

AODV

205

LEACH

205

DSDV

206

DSR

206

TORA

206

Proposed Approach

206

Results

207

Conclusion

209

References

209

Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring

210

Introduction

210

Related Work

211

Notations and Terminology

211

Group Communication Using Public Key Broadcast Ring

211

Join Protocol

212

Leave Protocol

213

Region Based Group Communication

214

Join Protocol

214

Leave Protocol

215

Analysis

215

Cost of Join

215

Cost of Leave

216

Number of Keys at Each Member

216

Conclusion

216

References

216

Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks

218

Introduction

218

Problem Formation

219

Simulators for Wireless Sensor Networks

219

Generic Network Simulators

220

Code Level Simulators

220

Firmware Level Simulators

220

Evaluating Impact of O.S. Architectures on Simulation Results

220

Experimental Result-1

221

Experimental Result-2

222

Analysis of Experimental Result

222

Other Factors Influencing Simulation Results

222

Conclusion

223

References

223

A Novel Multipath Routing Scheme in Mobile Adhoc Networks

225

Introduction

225

Related Works

226

Proposed Architecture

227

Simulation Results

229

Conclusions

231

References

231

A Novel Security Approach for Detecting Black Hole Attack in MANET

233

Introduction

233

Related Works

234

Proposed Approach

235

Simulations and Discussion

236

Conclusion

238

References

238

NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database

240

Introduction

240

What Is Load Balancing?

240

Literature Survey

241

Proposed Model

241

Implementation

242

Performance

245

Conclusion and Future Work

247

References

247

A Secure e-Shopping Using Voice Ordering

249

Introduction

249

Design and Implementation

250

Credit Card Validation

250

Password Encryption

251

Voice Ordering Components

251

Mobile Services

252

Conclusion

253

References

253

Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model

254

Introduction

254

Mathematical Model

256

Simulation and Results

257

Conclusion

259

References

259

A Concurrent Synchronization Model for Distributed Multimedia Systems

261

Introduction

261

Related Works

261

System Architecture

262

Implementation and Results

262

Results

263

User Interactions

264

Conclusions and Future Enhancements

264

References

264

Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS

266

Introduction

266

Related Works

267

The Proposed Mechanism

268

Secure Broadcasting QRREQ Packets

268

Unipath Discovery Operations Perform by Destination Node

270

Multipath Discovery Operation Perform by Destination

271

Secure Unicasting QRREP Packets to Source Node

271

Multipaths Route Maintenance

272

Conclusions

272

References

272

A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System

274

Introduction

274

Proposed Approach

275

TrustProb: A Measure of Trust

275

Trust Scale and Classification of Nodes

275

Trust Management Framework for Load Balancing

275

Our Proposed Trust Building Approach

276

Simulation and Results

276

Conclusion

277

References

278

An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine

279

Introduction

279

Related Work

279

Materials and Methods

280

Pattern Finder

281

Pseudo code of 3-Length Huffman Algorithm

282

Experimental Results and Discussion

283

Conclusion

284

References

284

Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata

285

Introduction

285

Survey of Existing Encryption Algorithm

286

Motivation

286

Encryption Algorithm Based on PCA

286

Proposed Model Based on PCA for Encryption

288

Conclusion

290

References

290

Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network

292

IEEE 802.11s Mesh Network Architecture

292

Protocol Description

293

AODV (Ad hoc On-demand Distance Vector)

293

DYMO (Dynamic MANET On-demand)

293

OSPF (Open Shortest Path First)

293

Performance Metric

294

Packet Delivery Ratio and Throughput

294

End-to-End Delay and Average Jitter

294

Simulation Environment and Results

294

Conclusion

295

References

296

Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks

297

Introduction

297

Overview of Routing Algorithms

298

Sensor Protocols for Information via Negotiation (SPIN)

298

Low-Energy Adaptive Clustering Hierarchy (LEACH)

298

Directed Diffusion (DDiff)

298

Quality of Service On-demand Power Aware Routing Algorithm (QDPRA)

299

Basic Idea

299

Average Residual Battery Power Estimation

299

Rebroadcast Time Control

300

Delay Metric

300

Bandwidth Metric

300

Simulations

302

Simulation Model

302

Results

302

Conclusion

304

References

304

A Cryptographic Approach to Defend against IP Spoofing

306

Introduction

306

Related Work

307

Probabilistic Packet Marking

307

Deterministic Packet Marking

307

Neighbor Stranger Discrimination (NSD)

307

Existing Approaches for Detecting and Preventing IP Spoofed Attacks

307

Stack Pi: New Packet Marking and Filtering

308

Marking-Based Detection and Filtering (MDADF)

308

Cryptographic Approach

311

Key Generation Algorithms

311

Conclusion and Discussion

312

References

312

Multi-agent Based Network Performance Tuning in Grid

313

Introduction

313

Related Work

314

System Design

314

Detailed System Design

314

Implementation

316

Network Monitoring

316

Cost Model

316

Network Performance Tuning

317

Results and Discussion

317

Conclusion

319

Future Work

319

References

319

Finding Discriminative Weighted Sub-graphs to Identify Software Bugs

321

Introduction

321

Proposed Approach

322

Building Weighted Execution Graphs

322

Mining Discriminative Sub Graphs

322

Pruning Strategies Based on the Upper-Bound of Information Gain

323

Applying Decision Tree for Isolating Discriminative Sub-graphs

323

Experimental Results

324

Concluding Remarks

325

References

325

Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information

326

Introduction

326

Exchange of Route Information and Route Processing in BGP

327

MRAI Timers

328

BGP Modified Distance Vector Algorithm

329

BGP Performance Analysis Metrics

330

Performance Metrics Analysis for One Sample Topology

331

Design of BGP with Minimum Convergence Time and Less Number of Updates

331

Results and Discussion

332

Conclusion

334

References

334

Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures

336

Introduction

336

Hierarchical PKI Model

337

Certificate Path

337

Proposed Method of Certificate Path Verification

338

Implementation and Experimental Results

339

Forward Vs. Reverse Path Construction

339

Proposed Method of Certificate Path Verification

339

Conclusions

340

References

340

Iris Recognition Technique Using Gaussian Pyramid Compression

341

Introduction

341

Iris Recognition

342

Image Preprocessing

342

Feature Extraction

344

Template Matching

344

Experimental Results

345

CASIA Database

345

Recognition Analysis

345

Conclusions

347

References

347

Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN

348

Introduction

348

General Notations

349

Model Description

350

Path Loss Model

350

Computational Steps for Access Point’s Calculation

351

Solution of the Model

351

Operation of PSO

351

Conclusion

352

References

352

Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks

353

Introduction

353

Related Work

354

CBMT Algorithm

355

Performance Evaluation

355

Simulation Results

356

Conclusion

357

References

357

An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid

358

Introduction

358

Related Work

359

Trust Management

359

Trust Based Scheduling

360

Client Rank Based Scheduling

361

Algorithm

361

Fault Tolerance Techniques

361

Checkpointing

361

Replication

362

Combined Fault Tolerance Technique

363

Performance

363

Conclusion

363

References

364

Reactive Network Monitor for DDoS Attacks

365

Introduction

365

Related Work

365

Proposed Framework

366

Router Components

366

Victim Components

368

Algorithm

368

Simulation Results

369

Conclusion

371

References

371

Statistical Method for English to Kannada Transliteration

372

Introduction

372

Statistical Machine Translation

373

Transliteration Procedure Using SMT

373

Language Model

373

Transliteration Model

374

Decoder

374

English to Kannada Statistical Transliteration

375

Preprocessing

375

Language Modeling

376

Transliteration Model

376

Evaluation and Results

376

Comparison with SVM and Google Indic -Transliteration Systems

377

Conclusion

378

References

378

RIFMAS: River Flow Management System Using Wireless Sensing Agents

379

Introduction

379

Motivation and Related Works

380

System Architecture

380

Implementation of RIFMAS

381

Global RIFMAS: GRIFMAS

382

Implementation of GRIFMAS

383

Conclusion and Future Work

383

References

383

Finite Element Approach to Radial Heat Flow in Human Dermal Tissues

385

Introduction

385

Structure of Skin

386

Mathematical Background

387

Numerical Solution of the Problem

389

Numerical Result and Discussion

390

Conclusion

391

References

391

An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas

392

Introduction

392

VCG Mechanisms and Multi-unit Auction

393

VCG Mechanisms

393

Multi-unit Auction

393

Our Scheme

394

Experiment

395

Social Issues

396

Conclusion

396

References

396

Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA

398

Introduction

398

Experimental Setup

399

Results and Discussion

399

Conclusion

400

References

400

Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback

401

Introduction

401

The Basic Harmony Search (HS) Clustering Algorithm

401

Tabu Search for Retrieval

401

Harmony Tabu Algorithm

402

Relevance Feedback and Query Expansion

402

Empirical Results

402

Conclusion

403

References

403

Challenges in Segmentation of Text in Handwritten Gurmukhi Script

404

Introduction

404

Gurumukhi Script and Its Charaterstics

405

Segmentation: Significance in Recognition Process

406

Challenges in Segmenting Handwritten Gurmukhi Scripts

406

Conclusion

407

References

408

Exploring the Contrasts of VoIP Phone Services

409

Introduction

409

Types of Telephones Used in VoIP

409

VoIP Hard Phones

409

VoIP Soft Phones

409

VoIP Wireless Phones

410

VoIP Phone Services

410

Internet VoIP Phone Services

410

Cable VoIP Phone Services

410

VoIP Chat Services

410

Contrasts of VoIP Phone Services

410

Conclusion

411

References

411

Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET’S

412

Introduction

412

Preliminaries

413

FSR

413

LANMAR

413

LAR1

414

Performance Evaluation

414

Conclusion

415

References

416

Impact Factor of E - Learning: Using Secondary Education Case Study

417

Introduction

417

Content Development

417

MIMEO Technology

418

Proposed Work

418

Experiment

418

Conclusion

420

Future Scope

420

References

420

Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology

421

Introduction

421

The OntoAnnot System

422

Ontology Extraction Module

422

Annotation Module

423

Experimental Evaluation and Results

424

Future Work

425

References

426

A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System

427

Introduction

427

Proposed Methodology

428

Feature Extraction

428

Statistical Measures

428

Lifting Wavelet Transforms

429

Grey Level Co-occurrence Matrix(GLCM)

429

Matching

430

Euclidean Measures

430

Separable Power

431

Distance Threshold

431

Experimental Results

431

Conclusion

432

References

432

Binary Data Compression Using Medial Axis Transform Algorithm

433

Introduction

433

Data Redundancy

433

Medial Axis Transform

433

Review of Medial Axis Transform

434

Generation of Medial Axis Transform

434

Implementation of Proposed Algorithm

434

Distance Transform Algorithm

434

Medial Axis Transform

434

Results and Conclusion

435

References

435

Internet Usage Monitoring for Crime Detection

436

IUMCD Architecture and Working

436

IUMCD Monitor

437

IUMCD Agent

437

IUMCD Central Coordinator

437

Experimental Observations

437

Conclusion

438

References

438

Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition

440

Introduction

440

Perceptual Audio Coding

441

Wavelet Filter Bank

442

Spectral Fluctuation Analysis

442

System Implementation

443

Experiments and Results

443

Conclusion and Future Work

444

References

445

Defending against Node Misbehavior to Discover Secure Route in OLSR

446

Introduction

446

The Proposed Security Enhancement Mechanism

447

Message Authentication

447

Mutual Authentication

447

Authentic Route Confirmation

448

Timestamp Exchange Mechanism

448

OLSR with Security Enhancement Mechanism

448

HELLO Message Extension

449

TC Message Extension

449

Performance Evaluation of OLSR with Security Enhancement Mechanism

450

Security Analysis

450

Conclusions

451

References

451

SIMBIC: SIMilarity Based BIClustering of Expression Data

453

Introduction

453

Background

453

Problem Statement

454

Proposed Work

454

Feature Selection

454

Reference Genes and Reference Conditions

454

Experimental Analysis

455

Performance of the Proposed Algorithm

455

Merits of SIMBIC over RMSBE

455

Conclusion

456

References

457

An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System

458

Introduction

458

Architecture Overview

458

ID Scheme and Its Working

460

Conclusion and Results

460

References

461

Automatic Incorporation of Corrections into Reviewed Documents

462

Introduction

462

Proposed Methodology

463

Experimental Results

465

Conclusion

466

References

467

Performance Comparison of Multicast Routing Protocols for MANETs

468

Introduction

468

Related Work

468

Operational Principles of OPHMR, CAMP and ODMRP

469

OPHMR

469

CAMP

469

ODMRP

469

Simulation Results

470

Conclusion

470

References

470

Traffic Aware LSP Selection Method in MPLS Networks

471

Introduction

471

Related Work

471

Proposed LSP Selection Method

472

Conclusion and Future Work

473

References

473

Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks

474

Introduction

474

Background and Motivation

474

Adaptive Context-Aware Intrusion Detection

475

Experimental Results

475

Conclusion and Future Work

476

References

476

Energy and Fault Aware Management Framework for Wireless Sensor Network

477

Introduction

477

Fault Tolerant Framework

478

Lack of Power (LOP) and Loss of Data (LOD) Algorithms

478

Results and Conclusion

480

Future Work

480

References

480

An Image Index Model for Retrieval

481

Introduction

481

Motivation

481

Vector Quantization Based Image Index

482

Experimental Results and Evaluation

483

Conclusions and Future Work

483

References

483

Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet

484

Introduction

484

Blackhole and Cooperative Blackhole Attack

484

Related Work

485

Proposed System

486

Association Estimator Technique

486

Results

487

Conclusion

488

References

488

Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns

491

Introduction

491

The EFSM Model

491

Regression Test Suite Reduction Using Dynamic Dependencies

494

Regression Test Suite Reduction

496

Performance Analysis

496

Conclusion

497

References

497

Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks

498

Introduction

498

Scenario Description

499

Results

499

Conclusion

499

References

500

Separation of Machine Printed Roman and Gurmukhi Script Words

501

Introduction

501

Related Work

502

Proposed Technique

503

Line Segmentation

503

Word Segmentation

504

Word Coordinates Updation

504

Word Language Identification

504

Results and Discussions

505

References

505

FPGA Implementation of AES Co-processor in Counter Mode

507

Introduction

507

Previous Work

508

Present Work

509

AES Algorithm Module in Counter Mode

509

Results and Discussion

510

Conclusion

511

References

511

Detecting Plagiarism in Text Documents

513

Introduction

513

Related Works

514

Experimental Section

514

Conclusion and Future Improvements

515

References

515

Hiding Relevant Information in an Image

517

Introduction

517

Problem Statement

517

Proposed Algorithm(Modulus 11) for Cryptography

518

Proposed Embedding Algorithm

518

Proposed Extraction Algorithm

519

Conclusion

519

References

520

Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques

521

Introduction

521

Pre-processing Steps

521

Data Cleaning

521

User Identification

522

User Session Identification

522

Path Completion and Transaction Identification

522

Conclusion

523

References

523

Context-Aware System Using .NET Approach

524

Introduction

524

Component Assessment on the Basis of Metadata

525

Component Assessment Using .NET Approach

525

Run-Time Adaptations: An Example

526

Component Switcher

527

Monitor

528

Component Extractor

528

Conclusion

529

References

529

Genetic Audio Watermarking

530

Introduction

530

Why Still Substitution Techniques of Audio Watermarking

530

Problems of Substitution Techniques of Audio Watermarking

531

The Solution

531

Genetic Algorithm Approach

532

Conclusions

533

References

533

Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure

534

Introduction

534

Traditional BST Approach

534

Traditional Interval Tree [1]

535

Modification Suggested for Underflow Condition in Interval Trees

535

Conclusion

536

References

536

Natural Disaster Impact Assessment Using Genetic Algorithm

537

Introduction

537

Genetic Algorithm

537

Earth Quake

538

Tsunami

538

Proposed System

539

Sample Input and Output

540

Conclusion

542

References

542

An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition

543

Introduction

543

Proposed Approach

543

Iris Segmentation and Polar Transformation

544

Feature Extraction

544

Feature Point Selection

544

Matching

545

Results and Performance

545

References

545

A Framework for Priority-Based Inter Vehicle Communication for Highway Safety

547

Introduction

547

Literature Survey

547

Existing Information Propagation Scheme for Vehicular Networks

548

Proposed Scheme

548

Conclusion

550

References

550

Data Compression on Embedded System

551

Introduction

551

Literature Survey

551

Implementation

552

Experimental Results

552

Conclusions

553

References

553

A Survey on Preserving Privacy for Sensitive Association Rules in Databases

554

Introduction

554

Theoretical Background and Preliminaries

555

Classification of Privacy Preserving Association Rule Mining Algorithms

555

Heuristic Based Approaches

555

Border Based Approaches

556

Exact Approaches

556

Reconstruction Based Approaches

557

Cryptography Based Approaches

557

Comparative Performance Evaluation Metrics

557

Conclusion and Future Scope

558

References

559

Boon and Bane of Curvelet Transform

561

Introduction

561

Curvelet to aid Tamil Font Character Recognition

561

Curvelet to Identify Malignant Melanoma

562

Unidentifiable Data Hiding in Images

563

Curvelets – Threat to the Security of Web Applications

564

Conclusion

565

References

566

Security in High Performance Computing

568

Introduction

568

Security Applying in Cluster Architecture

569

Security Applying in Grid Architecture

570

Security Achievement through Existing Technologies

571

Conclusion

572

References

572

Trust Worthy Architecture for Mobile Ad Hoc Network Environment

573

Introduction

573

Trust Worthy Architecture

574

Security Model

574

Mobility Model

574

Reliability Model

575

QoS Metrics for MANET

575

Trust Worthy Architecture Pseudo Code Implementation

575

Results and Conclusion

575

Future Work

576

References

576

A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks

577

Introduction

577

Planes in Protocol Stack

577

Proposed Protocol Stack

578

Design Flow

578

XLA Algorithm

579

Result and Conclusion

580

Future Work

580

References

580

Security Solutions to the Phishing: Transactions Based on Security Questions and Image

581

Introduction

581

Proposed System

582

Conclusions

583

References

583

CloneManager: A Tool for Detection of Type1 and Type2 Code Clones

584

Code Clones

584

Proposed Method

584

Experimental Results

585

Conclusion

586

References

586

Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification

587

Introduction

587

Literature Survey

587

Proposed Method

589

Results

590

Conclusions

591

References

591

An Analysis to BER Performances of Differential OFDM Systems

593

Introduction

593

System Description and Fading Channel Model

594

Results and Discussions

596

Conclusions

597

References

597

MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions

598

Introduction

598

Literature Review

599

Secure Communication between MPCS and MP User

599

Implementation Using J2ME

601

Conclusion

601

References

601

Team Automata Based Framework for Spatio-Temporal RBAC Model

602

Introduction

602

Literature Survey

603

Team Automata

603

Construction of Team Automata for STRBAC

604

Conclusion

606

References

606

Knowledge Discovery in Feedback System Using Pixel Oriented Technique

608

Introduction

608

Proposed Solution

609

Experimental Results

609

Conclusion

610

References

610

Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level

611

Introduction

611

SRAM Cell Architecture

611

Techniques for Leakage Reduction

612

Drowsy Cache Scheme

612

Simulation

612

References

613

Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks

614

Introduction

614

Path Accumulation

614

Minimum Route Spanning Tree

615

Result Analysis

616

Conclusions

616

References

616

Design Issues for Replacing Credit Card on Mobile Phone

617

Introduction

617

Proposed Mobile Based Credit Card System

618

Design of the Application

619

Conclusion

620

References

620

Unknown Key Share Attack on STPKE’ Protocol

621

Introduction

621

Unknown Key Share Attack on STPKE’ Protocol

623

Experimental Results

623

Conclusion

623

References

624

An Effective SOA Model for Developing Efficient Systems

625

Introduction

625

Proposed Approach an Effectual SOA Model

625

Working Principles of the Proposed Approach

626

Conclusion

627

References

628

Refactoring Interprocedural Dynamic Slicing for Handling Pointers

629

Introduction

629

Basic and Proposed Concepts for Finding Slices

630

Conclusion

631

References

632

Image Segmentaion and Steganography for Secured Information Transmission

633

The Proposed Model

633

Algorithms

634

Algorithm for Message Permutation

634

Algorithm for Message Encoding

634

Extraction of Cuts of the Stego Image

635

Analysis of the Results

635

Concluding Remarks

635

References

636

Ant System Embedded with Local Search for Solving Facility Layout Problem

637

Introduction

637

Past Work

637

Mathematical Formulation

638

Proposed ANTELS

639

Initialize Trials and Parameters

639

Local Search

640

Intensification

641

Updating Pheromone Matrix

641

Diversification

641

Computational Results and Discussions

641

Conclusions

643

References

643

Strategic Initiatives and Automated Decision Support with ERP System Environment

645

Introduction

645

Lineage of ERP System Evolution and Fitting the Proposed Model

646

The Proposed Model – Automated Decision Support System with Enterprise Resources Planning (ADSSERP) System

647

The Model

647

Available Technologies

648

Position of ADSSERP with the Existing Decision Support Technologies

648

Possible Decisions with the ADSSERP

649

Strategic Planning and Decisions

649

Management of Technology

649

Decisions due to Economic Unrest

649

Benefits of ADSSERP

649

Concluding Remarks

650

References

650

A Case Study of Strategic Design Management

652

Introduction

652

Analysis Framework and Review of Previous Works

652

Concepts

652

Environment

653

Risk Taking

654

Case Study

654

Strategic Design of IKEA

654

The Design Management of IKEA

655

Conclusion

656

References

656

The Effects of Mannequins on Consumers’ Perception and Shopping Attitude

657

Introduction

657

Literature Review

658

Research Methodology

659

Research Objectives

659

Methodology

659

Findings from the Study

660

Discussion

662

Conclusion

662

References

662

Knowledge Transfer: Do Instructor Characteristics Matter?

664

Introduction

664

Literature Review

664

Various Perspectives on Knowledge

664

Factors Leading to Students Liking of an Instructor

665

Research Questions

665

Method

666

Participants and Procedure

666

Results and Discussion

666

Conclusion

669

References

669

Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem

672

Introduction and Literature Review

672

Mathematical Formulation of SSUWLP

673

Strong and Weak Formulations and Their Relaxations

673

Experimental Setup

674

Results and Discussion

674

Conclusions

675

References

675

CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment

676

Introduction

676

Characteristics of Pharma Industry

677

Objective of CRM

677

Role of CRM in Pharma Sector

677

Customer Orientation in Pharma Industry

679

Pitfall of CRM

679

Conclusion

680

References

680

HR Roadmap: Becoming a Strategic Business Partner

681

Introduction

681

Some Key Statistics

681

Objectives of the Study

682

Research Methodology

682

Limitations and Further Research

682

Literature Review

682

Best Employers Study

683

Analysis, Findings and Key Learning

683

Conclusion

684

References

685

Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra

686

Introduction

686

Role of Government in Education Sector

686

National Policies on Education

687

Size of the Indian Education System

687

Growth and Important Achievements

687

Factors Influencing Quality of Technical Education

688

Autonomy

688

Conclusion

689

References

689

Author Index

690