Search and Find
Service
More of the content
Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings (Communications in Computer and Information
Preface
5
Table of Contents
7
SVD and Neural Network Based Watermarking Scheme
17
Introduction
17
Watermark Embedding
18
Watermark Extraction
20
Conclusion
21
References
21
Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms
22
Introduction
22
Query Term Proximity Heuristic and Semantic Associations
23
Multi-term Query
23
Semantic Association between Query Terms
23
Term Proximity Measures
24
Experimental Evaluation
25
Related Works
26
Conclusion
27
References
27
Network Management Initialization for Wired and Wireless Communication: A Real Time Study
28
Introduction
28
Overview of the Infrastructure Modules
29
Adaptive Security Algorithm
29
Back Bone Implementation
30
Performance Management
31
Conclusion and Future Work
32
References
32
IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network
33
Introduction
33
Literature Review
34
Proposed System
34
Processing IPv6 Initiated Communications in V6EGT
35
Processing IPv4 Initiated Communications in V4EGT
35
Processing IPv6 Destined Communications in V6EGT
36
Implementation
36
Conclusion
36
References
36
An Efficient Multicast Hybrid Routing Protocol for MANETs
38
Introduction
38
Proposed Protocol
39
Performance Evaluation
40
Simulation Environment and Parameters
41
Observations and Discussions
41
Conclusions
42
References
42
Applications of Graph Theory in Face Biometrics
44
Introduction
44
Face Recognition Using Graph Matching Constraint
45
Reduced Point Based Match Constraint for Face Recognition
45
Face Recognition Using Probabilistic Graph
46
Fusion of Matching Scores
46
Experimental Results
47
Face Recognition Using RPbMC
47
Face Recognition by Fusion of Salient Invariant Features
47
Conclusion
48
References
49
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map
50
Introduction
50
Proposed Method
50
Generation of Synthetic Images
51
Image Stretching and XORing
51
Diffusion and XORing
52
Decryption
52
Security and Performance Analysis
52
Sensitivity Analysis oof the Encryption
53
Conclusion
54
References
54
Hybrid Activities of AODV for Wireless Ad hoc Sensor Network
55
Introduction
55
Proposed Protocol
56
Performance Evaluation Parameters
57
Simulation Parameters
57
Observation and Discussion
58
Conclusion
59
References
59
Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm
61
Introduction
61
Scheduling Algorithms
62
First-Come, First-Served (FCFS
62
Shortest-Job-First (SJF)
62
Priority Scheduling (PrS)
63
Fuzzy-Based Scheduling (FuzS)
63
Results and Performance Evaluation
64
Case-Study 1
65
Case-Study 2
66
Case-Study 3
66
Case-Study 4
66
Conclusion
67
References
67
Object Location in Cluster Based Mobile Ad Hoc Networks
69
Introduction
69
Previous Work
70
Assumptions Made
71
Algorithm
71
Maintenance of Location Information
72
Metrics Used
72
Simulation Results
73
Conclusion and Future Work
74
References
74
Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications
76
Introduction
76
IEEE 802.11a Specifications
77
Implementing Coded Orthogonal Frequency Division Multiplexing Based System
77
Simulation Results
79
Conclusion
80
References
80
Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks
81
Introduction
81
Proposed Design
82
Simulation and Results
84
Input Data
84
Results
84
Conclusion
86
References
86
A Closed Form Slew Evaluation Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects
87
Introduction
87
Basic Theory
87
Properties of Burr’s Distribution
88
Proposed Slew Metric Model
89
Experimental Result
90
Conclusion
91
References
91
Wavelet-Domain $L$^{8}-Constrained Two-Stage Near-Lossless EEG Coder
92
Introduction
92
Techniques Used
93
Lifting Scheme
93
SPIHT Encoding Algorithm
93
Compression Algorithm
93
Experiments
94
Results and Discussion
95
Conclusion
96
References
96
Fuzzy Based Bandwidth Management for Wireless Multimedia Networks
97
Introduction
97
Related Work
98
Proposed Work
99
Network Environment
99
Bandwidth Allocation
99
Fuzzy Based Bandwidth Allocation
100
Simulation
102
Simulation Model
102
Simulation Procedure
103
Simulation Inputs
103
Performance Parameters
103
Results
104
Conclusions
105
References
105
A Novel Digital Algorithm for Sobel Edge Detection
107
Introduction
107
Functional Description
108
Sobel Edge Detection
108
Block Diagram
110
Algorithm for Sobel Edge Detection Method
110
Results
111
Conclusion
111
References
111
Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison
112
Introduction
112
Related Work
112
Dataset Description
113
Exclusion of Dataset
114
Estimation of Model Performance
114
Performance Evaluation
114
Dimensionality Reduction
114
Result
115
ROC Statistical Result
115
Performance Comparison of Weka Explorer and Knowledge Flow
115
Conclusion
116
References
117
Recognition of Isolated Indian Sign Language Gesture in Real Time
118
Introduction
118
Generation of ISL Video Training Samples
119
Methodology
119
Feature Extraction
120
Classification and Result Analysis
121
Conclusion and Future Work
122
References
122
Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors
124
Introduction
124
Power Consumption in CMOS
124
Dual-Edge Clocking Methodology
125
Application of Dual-Edge Clocking in Caches
125
The OpenSPARC T1 and Alpha AXP 21064 Processor Caches
126
Modification Using Dual-Edge Clocking
127
Experimental Results and Analysis
127
Conclusion
128
References
129
Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor
130
Introduction
130
Direct Mapped Cache Architecture
131
Set Associative Cache Architecture
131
Phased Set Associative Cache Architecture
131
The Alpha AXP 21064 Processor
132
Implementation and Experimental Results
133
Conclusion
134
References
134
Role of Resolution in Noisy Pattern Matching
136
Introduction
136
The Approach
136
Experimental Results
138
Conclusion
139
References
140
Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security
141
Introduction
141
The Authorization Protocol and Its Integration with the Trigon-Based Authentication Protocol
142
Simulation Results
144
Conclusion
144
References
145
Bandwidth Estimation Scheme for Mobile Adhoc Network
146
Introduction
146
QOS-Aware Routing
147
Simulation Results
150
Conclusion
151
References
151
Multimodal Biometric Invariant Moment Fusion Authentication System
152
Introduction
152
Related Work
153
Multimodal Biometric System
153
Invariant Moment Fusion System
154
Fingerprint
154
Face
155
Fusion
156
Authentication
157
Conclusion
158
References
158
Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography
160
Introduction
160
Advantages of Direct Digital Radiography Compared with Conventional Film
161
Routine Dental Diseases
162
Digital Image Processing Radiographs
162
Method
164
Results
164
Discussion
165
Conclusion
166
References
167
Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images
168
Introduction
168
Overview of Histogram and Spatiogram
169
Histogram
169
Spatiogram
169
Methodology
170
Results
171
Conclusions
172
References
172
Vector Quantization for Tumor Demarcation of Mammograms
173
Introduction
173
Algorithms for Segmentation
174
Watershed Algorithm
174
Vector Quantization
175
Results
175
Conclusion
177
References
177
Selective Encryption of Video Using Multiple Chaotic Maps
180
Introduction
180
Encryption Scheme
181
Experimental and Performance Analysis
181
Histogram Analysis
182
Key Sensitivity Analysis
182
Key Space Analysis
183
Conclusion
183
References
184
Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks
185
Introduction
185
Related Work
185
Time Synchronization Protocols and Their Approaches
186
Time Synchronization Protocol for Sensor Networks
186
Reference Broadcast Protocol
186
Hybrid Protocol
186
Theoretical Analysis of Hybrid Protocol
187
Calculation of Threshold Value for Hybrid Protocol
187
Analysis of Message Transmission for Hybrid Protocol
187
Optimized Hybrid Protocol: New Approach
187
Optimized Hybrid Protocol and Analysis of Message Transmission
187
Algorithm for Optimized Hybrid Protocol
188
Implementation
188
Methodology
188
Simulation and Tools Employed
188
Performance Results and Analysis
189
Conclusion
189
References
190
Tracking Based Secure AODV Routing Protocol
191
Introduction
191
Related Works
191
AODV Routing Protocol [3]
192
Route Discovery
192
Route Maintenance
192
Security Problems in AODV Protocol
192
Proposed Tracking Based Credence Computation Algorithm
193
A Security Mechanism Built on AODV Protocol
193
Credence Mechanism Built on AODV Protocol
193
Results and Analysis of the Algorithm
194
Conclusions
195
References
195
Study of Visitor Behavior by Web Usage Mining
197
Introduction
197
Related Work
198
Proposed Work
199
Pattern Discovery
199
Pattern Analysis
201
Theoretical Study
202
Experimental Analysis
202
Conclusions
203
References
203
A Hybrid Routing Protocol for Wireless Sensor Network
204
Introduction
204
Constraints of Sensor Nodes
205
Existing Protocols
205
AODV
205
LEACH
205
DSDV
206
DSR
206
TORA
206
Proposed Approach
206
Results
207
Conclusion
209
References
209
Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring
210
Introduction
210
Related Work
211
Notations and Terminology
211
Group Communication Using Public Key Broadcast Ring
211
Join Protocol
212
Leave Protocol
213
Region Based Group Communication
214
Join Protocol
214
Leave Protocol
215
Analysis
215
Cost of Join
215
Cost of Leave
216
Number of Keys at Each Member
216
Conclusion
216
References
216
Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks
218
Introduction
218
Problem Formation
219
Simulators for Wireless Sensor Networks
219
Generic Network Simulators
220
Code Level Simulators
220
Firmware Level Simulators
220
Evaluating Impact of O.S. Architectures on Simulation Results
220
Experimental Result-1
221
Experimental Result-2
222
Analysis of Experimental Result
222
Other Factors Influencing Simulation Results
222
Conclusion
223
References
223
A Novel Multipath Routing Scheme in Mobile Adhoc Networks
225
Introduction
225
Related Works
226
Proposed Architecture
227
Simulation Results
229
Conclusions
231
References
231
A Novel Security Approach for Detecting Black Hole Attack in MANET
233
Introduction
233
Related Works
234
Proposed Approach
235
Simulations and Discussion
236
Conclusion
238
References
238
NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database
240
Introduction
240
What Is Load Balancing?
240
Literature Survey
241
Proposed Model
241
Implementation
242
Performance
245
Conclusion and Future Work
247
References
247
A Secure e-Shopping Using Voice Ordering
249
Introduction
249
Design and Implementation
250
Credit Card Validation
250
Password Encryption
251
Voice Ordering Components
251
Mobile Services
252
Conclusion
253
References
253
Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model
254
Introduction
254
Mathematical Model
256
Simulation and Results
257
Conclusion
259
References
259
A Concurrent Synchronization Model for Distributed Multimedia Systems
261
Introduction
261
Related Works
261
System Architecture
262
Implementation and Results
262
Results
263
User Interactions
264
Conclusions and Future Enhancements
264
References
264
Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS
266
Introduction
266
Related Works
267
The Proposed Mechanism
268
Secure Broadcasting QRREQ Packets
268
Unipath Discovery Operations Perform by Destination Node
270
Multipath Discovery Operation Perform by Destination
271
Secure Unicasting QRREP Packets to Source Node
271
Multipaths Route Maintenance
272
Conclusions
272
References
272
A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System
274
Introduction
274
Proposed Approach
275
TrustProb: A Measure of Trust
275
Trust Scale and Classification of Nodes
275
Trust Management Framework for Load Balancing
275
Our Proposed Trust Building Approach
276
Simulation and Results
276
Conclusion
277
References
278
An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine
279
Introduction
279
Related Work
279
Materials and Methods
280
Pattern Finder
281
Pseudo code of 3-Length Huffman Algorithm
282
Experimental Results and Discussion
283
Conclusion
284
References
284
Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata
285
Introduction
285
Survey of Existing Encryption Algorithm
286
Motivation
286
Encryption Algorithm Based on PCA
286
Proposed Model Based on PCA for Encryption
288
Conclusion
290
References
290
Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network
292
IEEE 802.11s Mesh Network Architecture
292
Protocol Description
293
AODV (Ad hoc On-demand Distance Vector)
293
DYMO (Dynamic MANET On-demand)
293
OSPF (Open Shortest Path First)
293
Performance Metric
294
Packet Delivery Ratio and Throughput
294
End-to-End Delay and Average Jitter
294
Simulation Environment and Results
294
Conclusion
295
References
296
Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks
297
Introduction
297
Overview of Routing Algorithms
298
Sensor Protocols for Information via Negotiation (SPIN)
298
Low-Energy Adaptive Clustering Hierarchy (LEACH)
298
Directed Diffusion (DDiff)
298
Quality of Service On-demand Power Aware Routing Algorithm (QDPRA)
299
Basic Idea
299
Average Residual Battery Power Estimation
299
Rebroadcast Time Control
300
Delay Metric
300
Bandwidth Metric
300
Simulations
302
Simulation Model
302
Results
302
Conclusion
304
References
304
A Cryptographic Approach to Defend against IP Spoofing
306
Introduction
306
Related Work
307
Probabilistic Packet Marking
307
Deterministic Packet Marking
307
Neighbor Stranger Discrimination (NSD)
307
Existing Approaches for Detecting and Preventing IP Spoofed Attacks
307
Stack Pi: New Packet Marking and Filtering
308
Marking-Based Detection and Filtering (MDADF)
308
Cryptographic Approach
311
Key Generation Algorithms
311
Conclusion and Discussion
312
References
312
Multi-agent Based Network Performance Tuning in Grid
313
Introduction
313
Related Work
314
System Design
314
Detailed System Design
314
Implementation
316
Network Monitoring
316
Cost Model
316
Network Performance Tuning
317
Results and Discussion
317
Conclusion
319
Future Work
319
References
319
Finding Discriminative Weighted Sub-graphs to Identify Software Bugs
321
Introduction
321
Proposed Approach
322
Building Weighted Execution Graphs
322
Mining Discriminative Sub Graphs
322
Pruning Strategies Based on the Upper-Bound of Information Gain
323
Applying Decision Tree for Isolating Discriminative Sub-graphs
323
Experimental Results
324
Concluding Remarks
325
References
325
Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information
326
Introduction
326
Exchange of Route Information and Route Processing in BGP
327
MRAI Timers
328
BGP Modified Distance Vector Algorithm
329
BGP Performance Analysis Metrics
330
Performance Metrics Analysis for One Sample Topology
331
Design of BGP with Minimum Convergence Time and Less Number of Updates
331
Results and Discussion
332
Conclusion
334
References
334
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures
336
Introduction
336
Hierarchical PKI Model
337
Certificate Path
337
Proposed Method of Certificate Path Verification
338
Implementation and Experimental Results
339
Forward Vs. Reverse Path Construction
339
Proposed Method of Certificate Path Verification
339
Conclusions
340
References
340
Iris Recognition Technique Using Gaussian Pyramid Compression
341
Introduction
341
Iris Recognition
342
Image Preprocessing
342
Feature Extraction
344
Template Matching
344
Experimental Results
345
CASIA Database
345
Recognition Analysis
345
Conclusions
347
References
347
Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN
348
Introduction
348
General Notations
349
Model Description
350
Path Loss Model
350
Computational Steps for Access Point’s Calculation
351
Solution of the Model
351
Operation of PSO
351
Conclusion
352
References
352
Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks
353
Introduction
353
Related Work
354
CBMT Algorithm
355
Performance Evaluation
355
Simulation Results
356
Conclusion
357
References
357
An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid
358
Introduction
358
Related Work
359
Trust Management
359
Trust Based Scheduling
360
Client Rank Based Scheduling
361
Algorithm
361
Fault Tolerance Techniques
361
Checkpointing
361
Replication
362
Combined Fault Tolerance Technique
363
Performance
363
Conclusion
363
References
364
Reactive Network Monitor for DDoS Attacks
365
Introduction
365
Related Work
365
Proposed Framework
366
Router Components
366
Victim Components
368
Algorithm
368
Simulation Results
369
Conclusion
371
References
371
Statistical Method for English to Kannada Transliteration
372
Introduction
372
Statistical Machine Translation
373
Transliteration Procedure Using SMT
373
Language Model
373
Transliteration Model
374
Decoder
374
English to Kannada Statistical Transliteration
375
Preprocessing
375
Language Modeling
376
Transliteration Model
376
Evaluation and Results
376
Comparison with SVM and Google Indic -Transliteration Systems
377
Conclusion
378
References
378
RIFMAS: River Flow Management System Using Wireless Sensing Agents
379
Introduction
379
Motivation and Related Works
380
System Architecture
380
Implementation of RIFMAS
381
Global RIFMAS: GRIFMAS
382
Implementation of GRIFMAS
383
Conclusion and Future Work
383
References
383
Finite Element Approach to Radial Heat Flow in Human Dermal Tissues
385
Introduction
385
Structure of Skin
386
Mathematical Background
387
Numerical Solution of the Problem
389
Numerical Result and Discussion
390
Conclusion
391
References
391
An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas
392
Introduction
392
VCG Mechanisms and Multi-unit Auction
393
VCG Mechanisms
393
Multi-unit Auction
393
Our Scheme
394
Experiment
395
Social Issues
396
Conclusion
396
References
396
Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA
398
Introduction
398
Experimental Setup
399
Results and Discussion
399
Conclusion
400
References
400
Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback
401
Introduction
401
The Basic Harmony Search (HS) Clustering Algorithm
401
Tabu Search for Retrieval
401
Harmony Tabu Algorithm
402
Relevance Feedback and Query Expansion
402
Empirical Results
402
Conclusion
403
References
403
Challenges in Segmentation of Text in Handwritten Gurmukhi Script
404
Introduction
404
Gurumukhi Script and Its Charaterstics
405
Segmentation: Significance in Recognition Process
406
Challenges in Segmenting Handwritten Gurmukhi Scripts
406
Conclusion
407
References
408
Exploring the Contrasts of VoIP Phone Services
409
Introduction
409
Types of Telephones Used in VoIP
409
VoIP Hard Phones
409
VoIP Soft Phones
409
VoIP Wireless Phones
410
VoIP Phone Services
410
Internet VoIP Phone Services
410
Cable VoIP Phone Services
410
VoIP Chat Services
410
Contrasts of VoIP Phone Services
410
Conclusion
411
References
411
Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET’S
412
Introduction
412
Preliminaries
413
FSR
413
LANMAR
413
LAR1
414
Performance Evaluation
414
Conclusion
415
References
416
Impact Factor of E - Learning: Using Secondary Education Case Study
417
Introduction
417
Content Development
417
MIMEO Technology
418
Proposed Work
418
Experiment
418
Conclusion
420
Future Scope
420
References
420
Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology
421
Introduction
421
The OntoAnnot System
422
Ontology Extraction Module
422
Annotation Module
423
Experimental Evaluation and Results
424
Future Work
425
References
426
A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System
427
Introduction
427
Proposed Methodology
428
Feature Extraction
428
Statistical Measures
428
Lifting Wavelet Transforms
429
Grey Level Co-occurrence Matrix(GLCM)
429
Matching
430
Euclidean Measures
430
Separable Power
431
Distance Threshold
431
Experimental Results
431
Conclusion
432
References
432
Binary Data Compression Using Medial Axis Transform Algorithm
433
Introduction
433
Data Redundancy
433
Medial Axis Transform
433
Review of Medial Axis Transform
434
Generation of Medial Axis Transform
434
Implementation of Proposed Algorithm
434
Distance Transform Algorithm
434
Medial Axis Transform
434
Results and Conclusion
435
References
435
Internet Usage Monitoring for Crime Detection
436
IUMCD Architecture and Working
436
IUMCD Monitor
437
IUMCD Agent
437
IUMCD Central Coordinator
437
Experimental Observations
437
Conclusion
438
References
438
Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition
440
Introduction
440
Perceptual Audio Coding
441
Wavelet Filter Bank
442
Spectral Fluctuation Analysis
442
System Implementation
443
Experiments and Results
443
Conclusion and Future Work
444
References
445
Defending against Node Misbehavior to Discover Secure Route in OLSR
446
Introduction
446
The Proposed Security Enhancement Mechanism
447
Message Authentication
447
Mutual Authentication
447
Authentic Route Confirmation
448
Timestamp Exchange Mechanism
448
OLSR with Security Enhancement Mechanism
448
HELLO Message Extension
449
TC Message Extension
449
Performance Evaluation of OLSR with Security Enhancement Mechanism
450
Security Analysis
450
Conclusions
451
References
451
SIMBIC: SIMilarity Based BIClustering of Expression Data
453
Introduction
453
Background
453
Problem Statement
454
Proposed Work
454
Feature Selection
454
Reference Genes and Reference Conditions
454
Experimental Analysis
455
Performance of the Proposed Algorithm
455
Merits of SIMBIC over RMSBE
455
Conclusion
456
References
457
An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System
458
Introduction
458
Architecture Overview
458
ID Scheme and Its Working
460
Conclusion and Results
460
References
461
Automatic Incorporation of Corrections into Reviewed Documents
462
Introduction
462
Proposed Methodology
463
Experimental Results
465
Conclusion
466
References
467
Performance Comparison of Multicast Routing Protocols for MANETs
468
Introduction
468
Related Work
468
Operational Principles of OPHMR, CAMP and ODMRP
469
OPHMR
469
CAMP
469
ODMRP
469
Simulation Results
470
Conclusion
470
References
470
Traffic Aware LSP Selection Method in MPLS Networks
471
Introduction
471
Related Work
471
Proposed LSP Selection Method
472
Conclusion and Future Work
473
References
473
Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks
474
Introduction
474
Background and Motivation
474
Adaptive Context-Aware Intrusion Detection
475
Experimental Results
475
Conclusion and Future Work
476
References
476
Energy and Fault Aware Management Framework for Wireless Sensor Network
477
Introduction
477
Fault Tolerant Framework
478
Lack of Power (LOP) and Loss of Data (LOD) Algorithms
478
Results and Conclusion
480
Future Work
480
References
480
An Image Index Model for Retrieval
481
Introduction
481
Motivation
481
Vector Quantization Based Image Index
482
Experimental Results and Evaluation
483
Conclusions and Future Work
483
References
483
Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet
484
Introduction
484
Blackhole and Cooperative Blackhole Attack
484
Related Work
485
Proposed System
486
Association Estimator Technique
486
Results
487
Conclusion
488
References
488
Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns
491
Introduction
491
The EFSM Model
491
Regression Test Suite Reduction Using Dynamic Dependencies
494
Regression Test Suite Reduction
496
Performance Analysis
496
Conclusion
497
References
497
Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks
498
Introduction
498
Scenario Description
499
Results
499
Conclusion
499
References
500
Separation of Machine Printed Roman and Gurmukhi Script Words
501
Introduction
501
Related Work
502
Proposed Technique
503
Line Segmentation
503
Word Segmentation
504
Word Coordinates Updation
504
Word Language Identification
504
Results and Discussions
505
References
505
FPGA Implementation of AES Co-processor in Counter Mode
507
Introduction
507
Previous Work
508
Present Work
509
AES Algorithm Module in Counter Mode
509
Results and Discussion
510
Conclusion
511
References
511
Detecting Plagiarism in Text Documents
513
Introduction
513
Related Works
514
Experimental Section
514
Conclusion and Future Improvements
515
References
515
Hiding Relevant Information in an Image
517
Introduction
517
Problem Statement
517
Proposed Algorithm(Modulus 11) for Cryptography
518
Proposed Embedding Algorithm
518
Proposed Extraction Algorithm
519
Conclusion
519
References
520
Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques
521
Introduction
521
Pre-processing Steps
521
Data Cleaning
521
User Identification
522
User Session Identification
522
Path Completion and Transaction Identification
522
Conclusion
523
References
523
Context-Aware System Using .NET Approach
524
Introduction
524
Component Assessment on the Basis of Metadata
525
Component Assessment Using .NET Approach
525
Run-Time Adaptations: An Example
526
Component Switcher
527
Monitor
528
Component Extractor
528
Conclusion
529
References
529
Genetic Audio Watermarking
530
Introduction
530
Why Still Substitution Techniques of Audio Watermarking
530
Problems of Substitution Techniques of Audio Watermarking
531
The Solution
531
Genetic Algorithm Approach
532
Conclusions
533
References
533
Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure
534
Introduction
534
Traditional BST Approach
534
Traditional Interval Tree [1]
535
Modification Suggested for Underflow Condition in Interval Trees
535
Conclusion
536
References
536
Natural Disaster Impact Assessment Using Genetic Algorithm
537
Introduction
537
Genetic Algorithm
537
Earth Quake
538
Tsunami
538
Proposed System
539
Sample Input and Output
540
Conclusion
542
References
542
An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition
543
Introduction
543
Proposed Approach
543
Iris Segmentation and Polar Transformation
544
Feature Extraction
544
Feature Point Selection
544
Matching
545
Results and Performance
545
References
545
A Framework for Priority-Based Inter Vehicle Communication for Highway Safety
547
Introduction
547
Literature Survey
547
Existing Information Propagation Scheme for Vehicular Networks
548
Proposed Scheme
548
Conclusion
550
References
550
Data Compression on Embedded System
551
Introduction
551
Literature Survey
551
Implementation
552
Experimental Results
552
Conclusions
553
References
553
A Survey on Preserving Privacy for Sensitive Association Rules in Databases
554
Introduction
554
Theoretical Background and Preliminaries
555
Classification of Privacy Preserving Association Rule Mining Algorithms
555
Heuristic Based Approaches
555
Border Based Approaches
556
Exact Approaches
556
Reconstruction Based Approaches
557
Cryptography Based Approaches
557
Comparative Performance Evaluation Metrics
557
Conclusion and Future Scope
558
References
559
Boon and Bane of Curvelet Transform
561
Introduction
561
Curvelet to aid Tamil Font Character Recognition
561
Curvelet to Identify Malignant Melanoma
562
Unidentifiable Data Hiding in Images
563
Curvelets – Threat to the Security of Web Applications
564
Conclusion
565
References
566
Security in High Performance Computing
568
Introduction
568
Security Applying in Cluster Architecture
569
Security Applying in Grid Architecture
570
Security Achievement through Existing Technologies
571
Conclusion
572
References
572
Trust Worthy Architecture for Mobile Ad Hoc Network Environment
573
Introduction
573
Trust Worthy Architecture
574
Security Model
574
Mobility Model
574
Reliability Model
575
QoS Metrics for MANET
575
Trust Worthy Architecture Pseudo Code Implementation
575
Results and Conclusion
575
Future Work
576
References
576
A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks
577
Introduction
577
Planes in Protocol Stack
577
Proposed Protocol Stack
578
Design Flow
578
XLA Algorithm
579
Result and Conclusion
580
Future Work
580
References
580
Security Solutions to the Phishing: Transactions Based on Security Questions and Image
581
Introduction
581
Proposed System
582
Conclusions
583
References
583
CloneManager: A Tool for Detection of Type1 and Type2 Code Clones
584
Code Clones
584
Proposed Method
584
Experimental Results
585
Conclusion
586
References
586
Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification
587
Introduction
587
Literature Survey
587
Proposed Method
589
Results
590
Conclusions
591
References
591
An Analysis to BER Performances of Differential OFDM Systems
593
Introduction
593
System Description and Fading Channel Model
594
Results and Discussions
596
Conclusions
597
References
597
MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions
598
Introduction
598
Literature Review
599
Secure Communication between MPCS and MP User
599
Implementation Using J2ME
601
Conclusion
601
References
601
Team Automata Based Framework for Spatio-Temporal RBAC Model
602
Introduction
602
Literature Survey
603
Team Automata
603
Construction of Team Automata for STRBAC
604
Conclusion
606
References
606
Knowledge Discovery in Feedback System Using Pixel Oriented Technique
608
Introduction
608
Proposed Solution
609
Experimental Results
609
Conclusion
610
References
610
Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level
611
Introduction
611
SRAM Cell Architecture
611
Techniques for Leakage Reduction
612
Drowsy Cache Scheme
612
Simulation
612
References
613
Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks
614
Introduction
614
Path Accumulation
614
Minimum Route Spanning Tree
615
Result Analysis
616
Conclusions
616
References
616
Design Issues for Replacing Credit Card on Mobile Phone
617
Introduction
617
Proposed Mobile Based Credit Card System
618
Design of the Application
619
Conclusion
620
References
620
Unknown Key Share Attack on STPKE’ Protocol
621
Introduction
621
Unknown Key Share Attack on STPKE’ Protocol
623
Experimental Results
623
Conclusion
623
References
624
An Effective SOA Model for Developing Efficient Systems
625
Introduction
625
Proposed Approach an Effectual SOA Model
625
Working Principles of the Proposed Approach
626
Conclusion
627
References
628
Refactoring Interprocedural Dynamic Slicing for Handling Pointers
629
Introduction
629
Basic and Proposed Concepts for Finding Slices
630
Conclusion
631
References
632
Image Segmentaion and Steganography for Secured Information Transmission
633
The Proposed Model
633
Algorithms
634
Algorithm for Message Permutation
634
Algorithm for Message Encoding
634
Extraction of Cuts of the Stego Image
635
Analysis of the Results
635
Concluding Remarks
635
References
636
Ant System Embedded with Local Search for Solving Facility Layout Problem
637
Introduction
637
Past Work
637
Mathematical Formulation
638
Proposed ANTELS
639
Initialize Trials and Parameters
639
Local Search
640
Intensification
641
Updating Pheromone Matrix
641
Diversification
641
Computational Results and Discussions
641
Conclusions
643
References
643
Strategic Initiatives and Automated Decision Support with ERP System Environment
645
Introduction
645
Lineage of ERP System Evolution and Fitting the Proposed Model
646
The Proposed Model – Automated Decision Support System with Enterprise Resources Planning (ADSSERP) System
647
The Model
647
Available Technologies
648
Position of ADSSERP with the Existing Decision Support Technologies
648
Possible Decisions with the ADSSERP
649
Strategic Planning and Decisions
649
Management of Technology
649
Decisions due to Economic Unrest
649
Benefits of ADSSERP
649
Concluding Remarks
650
References
650
A Case Study of Strategic Design Management
652
Introduction
652
Analysis Framework and Review of Previous Works
652
Concepts
652
Environment
653
Risk Taking
654
Case Study
654
Strategic Design of IKEA
654
The Design Management of IKEA
655
Conclusion
656
References
656
The Effects of Mannequins on Consumers’ Perception and Shopping Attitude
657
Introduction
657
Literature Review
658
Research Methodology
659
Research Objectives
659
Methodology
659
Findings from the Study
660
Discussion
662
Conclusion
662
References
662
Knowledge Transfer: Do Instructor Characteristics Matter?
664
Introduction
664
Literature Review
664
Various Perspectives on Knowledge
664
Factors Leading to Students Liking of an Instructor
665
Research Questions
665
Method
666
Participants and Procedure
666
Results and Discussion
666
Conclusion
669
References
669
Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem
672
Introduction and Literature Review
672
Mathematical Formulation of SSUWLP
673
Strong and Weak Formulations and Their Relaxations
673
Experimental Setup
674
Results and Discussion
674
Conclusions
675
References
675
CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment
676
Introduction
676
Characteristics of Pharma Industry
677
Objective of CRM
677
Role of CRM in Pharma Sector
677
Customer Orientation in Pharma Industry
679
Pitfall of CRM
679
Conclusion
680
References
680
HR Roadmap: Becoming a Strategic Business Partner
681
Introduction
681
Some Key Statistics
681
Objectives of the Study
682
Research Methodology
682
Limitations and Further Research
682
Literature Review
682
Best Employers Study
683
Analysis, Findings and Key Learning
683
Conclusion
684
References
685
Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra
686
Introduction
686
Role of Government in Education Sector
686
National Policies on Education
687
Size of the Indian Education System
687
Growth and Important Achievements
687
Factors Influencing Quality of Technical Education
688
Autonomy
688
Conclusion
689
References
689
Author Index
690
All prices incl. VAT