Global Trends in Computing and Communication Systems

25
Communications in Computer and Information Science 269

Transcript of Global Trends in Computing and Communication Systems

Communicationsin Computer and Information Science 269

P. Venkata Krishna M. Rajasekhara BabuEzendu Ariwa (Eds.)

Global Trendsin Computingand CommunicationSystems

4th International Conference, ObCom 2011Vellore, TN, India, December 9-11, 2011Proceedings, Part I

13

Volume Editors

P. Venkata KrishnaVIT UniversitySchool of Computing Science and EngineeringVellore 632014, TN, IndiaE-mail: [email protected]

M. Rajasekhara BabuVIT UniversitySchool of Computing and EngineeringVellore 632014, TN, IndiaE-mail: [email protected]

Ezendu AriwaLondon Metropolitan University, UKE-mail: [email protected]

ISSN 1865-0929 e-ISSN 1865-0937ISBN 978-3-642-29218-7 e-ISBN 978-3-642-29219-4DOI 10.1007/978-3-642-29219-4Springer Heidelberg Dordrecht London New York

Library of Congress Control Number: 2012934198

CR Subject Classification (1998): I.2, H.3, H.4, C.2, I.4, I.5

© Springer-Verlag Berlin Heidelberg 2012

This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Welcome to the fourth edition of the International Conference ObCom 2011—Recent Trends in Computing, Communication and Information Technology. Com-puting, communication and information technology are hand-in-glove responsiblefor the majority of innovations and novel transformations that occur around theworld. Starting from how data are stored, processed and consumed, there havebeen several optimizations taking place in different geographical locations. In or-der to tap the cutting-edge solutions from different streams of computing, ObComwas launched in the year 2003. The Conference ObCom 2004 was eventually madeavailable to the computing community in the year 2004 and it promoted the ex-ploitation of parallelism and distribution in order to achieve better functionalitiesand performance in certain classes of computer applications. The next version ofObCom was in 2006 and it was focused on the theme “Mobile, Ubiquitous and Per-vasive Computing.” The theme was chosen to script the challenges and issues whiledesigning and building the new spectrum of human–computer interfaces prevalentin mobile, ubiquitous and pervasive computing.

The ObCom 2011 conference addressed issues associated with computing,communication and information. Its aim was to increase exponentially the par-ticipants’ awareness of the current and future direction in the domains and tocreate a platform for researchers, leading industry developers and end users tointerrelate. The conference began with keynote address on the first day and con-tinued on the second and third day with invited lectures by leading researchersin academia and industry.

We have grown into an international conference of high influence by cater-ing to independent technical communities—the research/academic body and theindustry/practices body. The academic–industry synergy will eventually maketechnologies available at large. A glance at the participants’ record reveals anequal mix of high-caliber research academics and dominant industry engineersand managers in the software industry. ObCom 2011 was fortunate to attractpeople who are experts in their area of interest.

ObCom’s research paper selection process is unique and is praised for itsthoroughness and fairness in representation of the best practices in the researchcommunity. ObCom had a large Program Committee, both form the host countryand other developed countries, with a cross-section of skills and talents acrosscomputing and engineering disciplines. The Program and Advisory Committeeincreased gradually to fulfill the needs of the conference. The received paperswere reviewed by several expert critics (about two or more reviews per paper),while the Organizing Chair kept a close watch on review quality and reviewerthoroughness. Conflicts of interest were made transparent and handled to avoiddisputes. Thus, every research paper accepted at ObCom 2011 was carefullyexamined and discussed among a body of world-class researchers. The conference

VI Preface

accepted 173 papers from 842 submissions, which includes keynote and invitedpapers.

Research papers are just one element of ObCom 2011. We had several tracksmaking up the conference and catering to different segments of the community.In conjunction, we had an international ObCom student conference, OSIC 2011,dealing with research papers of UG, PG and PhD students, a PhD Forum exclu-sively for doctoral students to present their research challenge and find out itsfeasibility with a huge research panel of ObCom participants. Poster presenta-tions, workshops, and keynotes completed the event. Each of these had its owncommittee and processes for review and selection of papers.

The principal objective of this proceedings volume is to collect the cutting-edge results in the field of computing, communication and information technol-ogy. Accordingly, we selected papers representing such works.

The proceedings consist of invited paper dealing with the review of perfor-mance models of computer and communication systems and contributed papersdealing with the issues of networking, cloud computing, fuzzy logic, mobile com-munication, image processing, navigation systems, biometrics and Web servicescovering literally all the vital areas of the computing domains.

The conference as a whole was pulled off with an extremely engaged andcommitted team, and we thank those people involved in addressing the variousneeds of the conference. Recognition is given on our website with their respectiveroles and titles. The list might not cover many whose work was valuable for theconference.

Thanks to Alfred Hofmann, Leonie Kunz and other members of the editorialteam of Springer CCIS for their kind cooperation during the publication process.

Sincere thanks to our VIT University Chancellor G. Viswanathan, Vice Pres-ident (Administration), Sankar Viswanathan, Vice President (Operations) G.V.Sampath, Vice President (University Affairs), Sekar Viswanathan, Vice President(Chennai campus), G.V. Selvam, Vice Chancellor V. Raju, Pro-Vice Chancel-lor (Vellore campus), S. Narayanan, and Pro-Vice Chancellor (Chennai campus),Anand A. Samuel for their valuable suggestions and encouragement.

Lastly, thanks to everyone who attended this conference making it bigger inall respects.

P. Venkata KrishnaM. Rajasekhara Babu

Ezendu Ariwa

Organization

Chief Patron

G. Viswanathan Chancellor, VIT University

Patrons

Sankar Viswanathan Vice President, AdministrationG.V. Sampath Vice President, OperationsSekar Viswanathan Vice President, University AffairsG.V. Selvam Vice President, Chennai campus

Co-Patrons

V. Raju Vice ChancellorS. Narayanan Pro-Vice Chancellor (Vellore campus)Anand A. Samuel Pro-Vice Chancellor (Chennai campus)

Convenor(s)

M. Khalid VIT University, VelloreMargret Anouncia S. SCSE, VIT University, Vellore

Conference Chair

P. Venkata Krishna VIT University, Vellore

Technical Chair

Ezendu Ariwa London Metropolitan University, UK

Technical Co-chair(s)

Sumanth Yenduri University of Southern Mississippi, USAH.R. Vishwakarma VIT University, Vellore, India

Honorary Chair

Rajkumar Buyya The University of Melbourne, Australia

VIII Organization

Publicity Chair

Ezendu Ariwa London Metropolitan University, UK

Sponsorship Co-chairs

S.R. Pullobhotla PAT, VIT University, IndiaSamuel Rajkumar V. PAT, VIT University, IndiaSingaravelan M. CTS, VIT University, India

International Advisory Board

BettinaHarriehausen-Muhlbauer Fachbereich Informatik, Germany

Kam-Hoi Cheng University of Houston, USAPhil Prins Seattle Pacific University, USASuiping Zhou NTU, SingaporePramod Kumar Meher NTU, SingaporePururav Thoutireddy California Institute of Technology, USAJaspal Subhlok University of Houston, USABoleslaw K. Szymanski Rensselaer Polytechnic Institute, USAHans Martin Gundner UAS Esslingen, GermanyEberhard Kienzle UAS Esslingen, GermanyGareth J. Monkman UAS Regensburg, GermanyWolfgang Koster UAS Darmstadt, GermanyArno G. Kostka Technical University of Darmstadt, GermanyHermann Hartig Technische Universitat Dresden, GermanyUwe Wloka UAS Dresden, GermanyAxel Toll UAS Dresden, GermanyH.-W. Philippsen UAS Bremen, GermanyRichard Aubele UAS Esslingen, GermanyLothar Issler UAS Esslingen, GermanyAlbrecht Eßlinger UAS Esslingen, GermanyBertold Deppisch University of Technology, UAS Karlsruhe,

GermanyFrieder Keller University of Technology, UAS Karlsruhe,

GermanyChristine Roueche Esigelec, FranceRobin Pollard Monash University, AustraliaMike Mannion Glasgow Caledonian University, UKJohn MacIntyre David Goldman Informatics Centre, UKT. Radhakrishnan Concordia University, CanadaDheeraj Sanghi IIT, Kanpur, IndiaPhalguni Gupta IIT, Kanpur, India

Organization IX

D. Janakiram IIT-M, Chennai, IndiaSudip Misra IIT, Kharagpur, IndiaS.C. Misra IIT, Kharagpur, IndiaManfred Goetze University of Applied Sciences, GermanyB. Srinivasan Monash University, AustraliaSumanth Yenduri University of Southern Mississippi, USARam Chakka Research & Development, MIET, Meerut,

IndiaLim Chee Peng Universiti sains Malaysia (Science University

of Malaysia), Penang, MalaysiaPalaniappan Ramaswamy University of Essex,UKLoo Chu Kiong University of Malaya, Kuala Lumpur,

MalaysiaVijanth Sagayan a/l Asirvadam University Technology Petronas, MalaysiaVijay Devabhaktuni The University of Toledo, USAShonali Krishnaswamy Monash University, AustraliaAsai Asaithambi University of North Florida, USAK. Baskaran Deakin University, AustraliaWanlei Zhou Deakin University, AustraliaLynn Batten Deakin University, AustraliaSita Ramakrishnan Monash University, AustraliaSita Venkatraman University of Ballarat, Victoria, Australia

Local Advisory Board

B.V.A. RaoM. Khalid SCSE, IndiaD. Subhakar VIT University, IndiaK. Chidambaram VIT Community Radio and Proctoring

Scheme, VIT University, IndiaM. Adithan Academic Staff College, VIT University,

IndiaS.R. Pullobhotla PAT, VIT, IndiaK. Kannabiran Students’ Welfare, VIT University, IndiaMargret Anouncia S. SCSE, VIT University, Vellore, IndiaAyee Goundan Aethros, IndiaAsoke K. Talukeder IIIT-BDeependra Moitra Infosys, Bangalore, IndiaP.C.P. Bhat Philips Innovations Center, Bangalore, IndiaPethuru Raj Project Manager, IndiaSundaresan Krishnan Infosys, Mysore, IndiaK. Chandrasekharan NIT, Suratkal, IndiaH.R. Vishwakarma VIT University, Vellore, IndiaE. Bhaskaran Dy. Director of Industries and Commerce,

India

X Organization

Technical Program Committee

Abdul Gaffar H. SCSE, VIT University, Vellore, IndiaAnthoniraj A. SCSE, VIT University, Vellore, IndiaArunachalam V. SENCE, VIT University, Vellore, IndiaBalamurugan B. SITE, VIT University, Vellore, IndiaBhagyavathi M. SCSE, VIT University, Vellore, IndiaBhulakshmi Bonthu SCSE, VIT University, Vellore, IndiaChandra Mouli P.V.S. SCSE, VIT University, Vellore, IndiaDhinesh Babu L.D. SITE, VIT University, Vellore, IndiaGanapathy G.P. CDMM, VIT University, Vellore, IndiaGanesh Gopal D. SCSE, VIT University, Vellore, IndiaIlango P. SCSE, VIT University, Vellore, IndiaJaisankar N. SCSE, VIT University, Vellore, IndiaKalaivani D. SCSE, VIT University, Vellore, IndiaKamalakannan J. SITE, VIT University, Vellore, IndiaKannadasan R. SCSE, VIT University, Vellore, IndiaKauser Ahmed P. SCSE, VIT University, Vellore, IndiaKumar K. SCSE, VIT University, Vellore, IndiaLakshmanan K. SCSE, VIT University, Vellore, IndiaMadhu Viswanatham V SCSE, VIT University, Vellore, IndiaManjula R. SCSE, VIT University, Vellore, IndiaSuresh Thanga Krishnan SCSE, VIT University, Vellore, IndiaMuhammad Rukunuddin Ghalib SCSE, VIT University, Vellore, IndiaRajasekhara Babu M. SCSE, VIT University, Vellore, IndiaRamesh Babu K. SCSE, VIT University, Vellore, IndiaRavikanth A.S.V. SAS, VIT University, Vellore, IndiaSaleem Durai M.A. SCSE, VIT University, Vellore, IndiaSamuel Rajkumar V. PAT, VIT University, Vellore, IndiaSendhil Kumar K.S. SCSE, VIT University, Vellore, IndiaSingaravelan M. CTS, VIT University, Vellore, IndiaSivanesan S. SCSE, VIT University, Vellore, IndiaSwarnalatha P. SCSE, VIT University, Vellore, IndiaThirunavukkarasu A. SMBS, VIT University, Vellore, IndiaTripathy B.K. SCSE, VIT University, Vellore, IndiaVijaya Rajan V. SCSE, VIT University, Vellore, IndiaVijayasherly V. SCSE, VIT University, Vellore, IndiaViswanathan P. SITE, VIT University, Vellore, IndiaVivekanandashanmuganathan P. SMBS, VIT University, Vellore, IndiaAndrews Samraj P. SCSE, VIT University, Chennai, IndiaB. Sarojini Avinashilingam University, IndiaA. Srinivasan MNM Jain Engineering College, Chennai,

IndiaMaragatham Natraj Avinashilingam University for Women, IndiaS.N. Sivanandam Karpagam College of Engineering, India

Organization XI

K. Sankaranarayanan Easa College of Engineering and Technology,India

R.M. Somasundaram SNS College of Engineering, IndiaG. Thokappia Arusu Jayam College of Engineering and

Technology, IndiaR. Pugazendi KSR Arts College, IndiaKannan Ramakrishnan Multimedia University, MalaysiaShohel Sayeed Multimedia University, MalaysiaLim Chee Peng Universiti Sains Malaysia, MalaysiaZubeir Izaruku Daffala Colleges of Applied Sciences, OmanG. Prakash Intel Engineering College, IndiaB. Baskara Rao RGMCE, IndiaS.S. Gantayat GIET, IndiaH.K. Tripathy CSIR-IMMT, IndiaD. Mohanthy NII, IndiaMohanakrihsna Varma Kukman University, KoreaShoba Bindhu JNTUA, IndiaK. Komathy Eswary Engineering College, IndiaT.S. Pradeep Kumar VIT University, Chennai, IndiaV. Saritha VIT University, Vellore, IndiaCh. Pradeep Reddy VIT University, Vellore, India

Organized by

School of Computing Science and Engineering

Table of Contents – Part I

Steady State Solution to CPP/M/1 Queue with Working VacationsUsed in Internet Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Tien V. Do and Ram Chakka

Elastic Virtual Machine for Fine-Grained Cloud ResourceProvisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Wesam Dawoud, Ibrahim Takouna, and Christoph Meinel

A Theoretical Approach to a Better Tag Cloud Visualization . . . . . . . . . . 26Achin Mishra and Raj Pati Mishra

Core Temperature Depends on the Processing Load of the Core andthe Temperature of Adjacent Core-A Regression Analysis . . . . . . . . . . . . . 32

Subrata Sinha

Ligand Binding Studies of Caspase 3 Protein with Compounds ofBacopa monneri - A Target Protein Responsible for Alzheimer’sDisease (AD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Surabhi Johari, Subrata Sinha, Sewali Bora, Sagarika Biswas, andKhushboo Gupta

Protein Ligand Interaction Studies of DJ-1 Protein Responsible forParkinson’s Disease and Chemical Analogues of Bacopa monnieri(Brahmi) Compounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Subrata Sinha, Surabhi Johari, Khushboo Gupta, and Sewali Bora

Towards Development of an Intelligent Framework for ManagingAuthorization Service in Ubiquitous Enterprise ComputingEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Supreet Kaur and Kawaljeet Singh

ANOVA Discriminant Analysis for Features Selected through DecisionTree Induction Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

N. Gayatri, S. Nickolas, and A.V. Reddy

Developing an Efficient Mechanism for Retrieving Documents UsingAutomatically Generated Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Sayanti Bandyopadhyay and Amit Kumar Bandyopadhyay

Filtering Semantic Information at Client Side Using Semantic EnrichedTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Anand Kumar, S.K. Jain, Saurabh Parmar, and Gagandeep Kaur

XIV Table of Contents – Part I

4-Bit Serial-Parallel Multiplier and Bit-Level Systolic Architecture forImplementation of Discrete Orthogonal Transforms . . . . . . . . . . . . . . . . . . . 91

M.N. Murty, S.S. Nayak, B. Padhy, and S.N. Panda

Sound Data Compression Using Different Methods . . . . . . . . . . . . . . . . . . . 100Pravin Y. Kumbhar and Shoba Krishnan

A Non Redundant Compact XML Storage for Efficient Indexing andQuerying of XML Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Mohammed Atique and A.D. Raut

EduCloud: An Institutional Cloud with Optimal Scheduling Policies . . . . 114L. Shyamala and Saswati Mukherjee

Resource Discovery for Grid Computing Environment Using AntColony Optimization by Applying Routing Information and LRUPolicy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

S. Nirmala Devi and A. Pethalakshmi

Service Oriented Architecture for Governing Engineering Colleges . . . . . . 134Neelavathi Suryamurthy and Vivekanandan Kalimuthu

A Device Middleware-Based Smart Home Environment for AmbientHealth Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

Veeramuthu Venkatesh, Pethuru Raj, and V. Vaithayanathan

Computer Oriented Process for Treating Second Order DifferentialEquations with Singular Coefficient at the First Derivative Term . . . . . . . 154

A.S.V. Ravi Kanth and K. Aruna

Text Dependent Speaker Identification and Speech Recognition UsingArtificial Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

Suma Swamy, Shalini T., Sindhu P. Nagabhushan,Sumaiah Nawaz, and K.V. Ramakrishnan

Efficient Probabilistic Query Ranking in Uncertain Databases . . . . . . . . . 169Divya Katukoori, K. Bhima, T. Aruna Sri,S. Hemanth Chowdary, and Sujoy Bhattacharya

A Parameterized Framework of Trust Computation for Grid ResourceBroker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

M. Ashok and S. Sathiyan

Energy and Path Aware Ant Colony Optimization Based RoutingAlgorithm for Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

Hamed Orojloo, Reza Askari Moghadam, and Abolfazl T. Haghighat

A Data Profile-Based Contention-Free MAC Protocol for the PatientMonitoring Systems on WBANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Hongkyu Jeong, Min-Gon Kim, and Hong-Shik Park

Table of Contents – Part I XV

Switching of a Sixteen Electrode Array for Wireless EIT System Usinga RF-Based 8-Bit Digital Data Transmission Technique . . . . . . . . . . . . . . . 202

Tushar Kanti Bera and J. Nagaraju

An Artificial Bee Colony Algorithm for the Minimum Average RoutingPath Clustering Problem in Multi-hop Underwater Sensor Networks . . . . 212

Venkateswara Rao Dokku and Alok Singh

Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic CurveCryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220

Anususya Sardar, Subba Rao Y.V., and RukmaRekha N.

On the Design and Realization of Non-Synchronous Frequency HoppingSpread Spectrum for Securing Data over Mobile and ComputerNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

Javaid A. Sheikh, Shabir A. Parah, and G. Mohiuddin Bhat

Improved Object Lookup in Unstructured Peer-to-Peer OverlayNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

Chittaranjan Hota, Gaurav K., Prasanna G., Narayana M.V.S.,Hrushikesha Mohanty, and Muttukrishnan Rajarajan

Ontology Construction for Polycystic Kidney Disease . . . . . . . . . . . . . . . . . 245Saurabh Parmar, S.K. Jain, Gagandeep Kaur, and Anand Kumar

An Intelligent Recommendation System for Individual and Group ofMobile Marketplace Users Based on the Influence of Items’ Featuresamong User Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

Amer A. Sallam, Siba K. Udgata, and Vineet Padmanabhan

An Efficient Mechanism to Avoid Additional Nesting in Nested NetworkMobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

M. Dinakaran and P. Balasubramanie

Design of Secure Communication Model for Virtual Environment . . . . . . 277R. Anand, S. Saraswathi, V.R. Sindu, and B. Sandhya

An Enhanced Probabilistic Encryption Algorithm for Secured DataTransmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

K. Adi Narayana Reddy, V. Madhu Viswanatham, andB. Vishnu Vardhan

JavaScript Application Framework for Mobile Devices . . . . . . . . . . . . . . . . 291Raghu R. and Shobha K.R.

A Centralized Priority Based RWA Protocol for WDM Networks . . . . . . . 300T.K. Ramesh, A. Nageswara Reddy, G.V.L. Praveen Kumar,K. Biju, and P.R. Vaya

XVI Table of Contents – Part I

Low-Power Area Efficient Reconfigurable Pipelined Two’s ComplementMultiplier with Reduced Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

R. Sakthivel, M. Vanitha, and Harish M. Kittur

RWA Protocol for Larger WDM Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 322T.K. Ramesh, R. Janani, S. Prannoy Kiran, T. Swapna, andP.R. Vaya

Integration of SMS Security Systems in Cloud Computing . . . . . . . . . . . . . 329Mohan Kumar C.M., Raj Sudheer Dangeti, and Jeganathan L.

Identity Based Cryptosystem: A New Paradigm in Public KeyInfrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

S. Kuzhalvaimozhi and G. Raghavendra Rao

An Efficient Take-Back Call Admission Control Scheme for 3G/WLANIntegrated Cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

S. Nanda Kumar, Sibaram Khara, and T. Velmurugan

A Case Study on Various Routing Strategies of VANETs . . . . . . . . . . . . . . 353Santhosh Jayachandran, Johnson Doraisami Jothi, andSiva Rama Krishnan

High Utility and Low Cost Microcontroller Based Data AcquisitionSystem for Antenna Encoders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363

Vikalp Paharia, Harshul Gandhi, and Astha Jain

Design of WDM Optical Networks for the Analysis of Cross PhaseModulation and Self Phase Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

Sugumaran S., Vamsi Nath Reddy P., Sirivella V.S.M. Reddy, andArulmozhivarman P.

An Energy Efficient Event Based Hierarchical Clustering Algorithm forWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

Chiranjib Patra, Arindam Mondal, Parama Bhaumik, andMatangini Chattopadhyay

Throughput Improvement in Mobile OFDM System with Pilot FreeAdaptive Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386

K. Vinoth Babu, G. Ramachandra Reddy, Sunit Gupta,Pratul Chauhan, and Pratik Patel

Trust Based Certificate Authority for Detection of Malicious Nodes inMANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392

Manoj V., Raghavendiran N., Aaqib M., and Vijayan R.

A Comparative Study on Web Log Clustering Approaches . . . . . . . . . . . . . 402Sudhamathy G., Sarojini Illango B., and Jothi Venkateswaran C.

Table of Contents – Part I XVII

A New Performance Modelling and Measurement Method forService-Oriented Cloud Applications (SOCAs) . . . . . . . . . . . . . . . . . . . . . . . 412

S. RajaRaajeswari, R. Selvarani, and Pethuru Raj

Defending DoS Attacks Using a Puzzle-Based Approach and Reductionin Traceback Time towards the Attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425

Anup Mathew Abraham and Shweta Vincent

Cloud and Grid Computing Based Telemedicine Using ComputerCommunication Network through Internet . . . . . . . . . . . . . . . . . . . . . . . . . . 434

S. Saravanan, M. AnbuRajan, and A. Venkatraman

AT Command Implementation for a Multimode Wireless Device . . . . . . . 447Sharana Goud B. and Parimala P.

CIMG-BSDS: Image Clustering Based on Bookshelf Data Structure inWeb Search Engine Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457

S.K. Jayanthi and S. Prema

Fuzzy Based Integrated Security Model for Mobile Ad Hoc Network . . . . 467M.B. Mukesh Krishnan and P. Sheik Abdul Khader

An Efficient Authentication Method for Throttling DDoS Attacks . . . . . . 473Ch. Rupa, J. Madhu Babu, P. Siva Prasad, and P.S. Avadhani

Computational Analysis of Stationary and Transient Distribution ofSingle Server Queue with Working Vacation . . . . . . . . . . . . . . . . . . . . . . . . . 480

R. Sudhesh and L. Francis Raj

APD: ARM Deceptive Phishing Detector System Phishing Detection inInstant Messengers Using Data Mining Approach . . . . . . . . . . . . . . . . . . . . 490

Mohd Mahmood Ali and Lakshmi Rajamani

Adaptive Duplex Technique for Reduction of Turnaround Time inIEEE 802.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503

Kalidoss Rajakani and M.A. Bhagyaveni

WiMAX and WiFi Convergence Architecture to Achieve QoS . . . . . . . . . . 512G. Vijayalakshmy and G. Shivaradje

BPSK Phase Modulation with Novel Prime Codes in OCDMANetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

Helan Vidhya T., Pavithra S., and Sivasankari S.A.

A Simplified Pricing Model for the 3G/4G Mobile Networks . . . . . . . . . . . 535Reeky Maiti

Performance Analysis and Dispersion Compensation in Ultra Long-Haul10Gbps Optical System by OPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

Pradeep Doss M., Sridarshini T., and Valliammai M.

XVIII Table of Contents – Part I

An Augmented Three-Phase Concept Map Design for an AdaptiveLearning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550

R. Kavitha, A. Vijaya, and D. Saraswathi

Formal Specification of Trusted Neighbor Information Base of OLSRRouting Protocol of Adhoc Network Using Z Language . . . . . . . . . . . . . . . 560

Amandeep Verma and Manpreet Singh Gujral

Vertical Handover Based on Voice Activity in HeterogeneousNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571

G. Kalaivani and S. Usha

Cross-Layer Scheme to Solve Hidden Device Problem in WPANs withIncreased Transmission Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576

M.L. Mathivathani and S. Usha

Road Detection Using a New Method for Vanishing Point DetectionBased on Hough Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

Binu B.

Stock Price Prediction Using Support Vector Regression . . . . . . . . . . . . . . 588Abirami R. and Vijaya M.S.

Modeling and Simulation of Content-Based Video StreamingUsing ns2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598

Sankar Padmanabhan, Krithika Parameswaran, Anandhi Natarajan,Angel Regi Chelladurai Vijayakumari, andChellamuthu Chinnagounder

A Solution to Prevent Resource Flooding Attacks in 802.11 WLAN . . . . 607Arockiam L., Vani B., Sivagowry S., and Persia A.

Enhancement of Orchestration Algorithms for CompilerOptimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617

J. Andrews and T. Sasikala

Development of Sensor Node to Measure Soil Moisture . . . . . . . . . . . . . . . . 628Kapil Mundada, Pramod Kanjalkar, and Jayant Kulkarni

Localization of Sensor Nodes Using Flooding in Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637

Basavaraj K. Madagouda, R. Sumathi, and A.H. Shanthakumara

A Packet Classification and Node-Level Certification Mechanism forIntrusion Detection in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647

S.P. Manikandan, R. Manimegalai, V. Rakesh, and V. Vaishnavi

Table of Contents – Part I XIX

MEDINFO CLOUD-A Cloud Based Solution to Ensure Secure Accessto Health Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654

Sankari Senthil, Ramya R., and Saranya B.

A Service Oriented Modeling and Analysis for Building IntrusionDetection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661

Rama Rao K.V.S.N. and Manas Ranjan Patra

Centralized Parallel Form of Pattern Matching Algorithm in PacketInspection by Efficient Utilization of Secondary Memory in NetworkProcessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671

N. Kannaiya Raja, K. Arulanandam, and B. RajaRajeswari

Effective Use of Interbank Network Services by Using TransactionCounter in ATMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681

Rajesh Vemulakonda and Raja Yasodhar Kapalavayi

Performance Analysis of Case Based Word Sense Disambiguation withMinimal Features Using Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687

P. Tamilselvi and S.K. Srivatsa

Performance Evaluation of EAP-TLS Authentication Protocol forUMTS-WiMAX Interworking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697

R. Narmadha and S. Malarkan

Tiny SPU: Implementation and Analysis of Secure Program Update forClustered Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703

M.B. Nirmala, A.S. Majunath, and B.G. Yogesh

Secured Routing Using Quantum Cryptography . . . . . . . . . . . . . . . . . . . . . . 714M. Vijay Anand and C. Jayakumar

Green Technology and Monetization of Clonization Model: The Chineseand Indian Options for Nigeria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726

Ezendu Ariwa and Ijeoma Chichebe Ezeasor

Emitted Sound Amplitude Analysis Using Hilbert HuangTransformation for Cutting Tool Flank Wear Prediction . . . . . . . . . . . . . . 743

Emerson Raja Joseph, Loo Chu Kiong, Lim Way Soong, andS. Purushothaman

A Survey on Cellular Automata and Its Applications . . . . . . . . . . . . . . . . . 753Debasis Das

Extraction of Domain-Specific Concepts to Create Expertise Profiles . . . 763Gagandeep Kaur, S.K. Jain, Saurabh Parmar, and Anand Kumar

Inter and Intra Cluster Load Balancing Strategies for Cluster BasedVideo-on-Demand Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772

Vinay A. and Prateek Saxena

XX Table of Contents – Part I

Symlet2 Based Wavelet Filter Bank for Uncorrelated Digital SignalRecovery: Some Advantages over Matched Filter . . . . . . . . . . . . . . . . . . . . . 782

Amit Kumar Ahuja and Ram Chakka

Iterative Relaxed Median Filter for Impulse Noise Removal andValidation of FCM Clustering Using Cluster Error Index in MedianFiltered MR Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792

R. Vijayarajan and S. Muttan

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803

Table of Contents – Part II

An Examination of Word Stemming in Latent Semantic IndexSearches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Louise Perkins, David E. Sallis, and Sumanth Yenduri

Financial Sequences and the Hidden Markov Model . . . . . . . . . . . . . . . . . . 5Shreeya Sengupta, Hui Wang, William Blackburn, and Piyush Ojha

A Dynamic Semantic Metadata Model in Cloud Computing . . . . . . . . . . . 13R. Anitha and Saswati Mukherjee

A Novel Approach to Classify High Dimensional Datasets UsingSupervised Manifold Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Binod Kumar Mishra, Praneet Saurabh, and Bhupendra Verma

Term-Frequency Inverse-Document Frequency Definition Semantic(TIDS) Based Focused Web Crawler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Mukesh Kumar and Renu Vig

Multiple 3D Chaotic Systems Based Approach for Visual MultimediaContent Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Musheer Ahmad, Tanvir Ahmad, and Chirag Gupta

Kannada Word Sense Disambiguation Using Association Rules . . . . . . . . . 47S. Parameswarappa and V.N. Narayana

K-Means Clustering of Use-Cases Using MDL . . . . . . . . . . . . . . . . . . . . . . . 57Sunil Kumar, Rajesh Kumar Bhatia, and Rajesh Kumar

Topological Characterization of Rough Set on Two Universal Sets andKnowledge Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

B.K. Tripathy, D.P. Acharjya, and L. Ezhilarasi

A Novice Approach for Lossless Visible Watermarking Approach byPioneering the Best Block (LVW-PBB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

R. Sinduja, I. Rachel Rupala, and R.D. Sathiya

Topological Properties of Incomplete Multigranulation Based on RoughFuzzy Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

B.K. Tripathy and M. Nagaraju

Automated Heart Sound Diagnosis Using Feature Extraction Model forBio-signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

P.S. Rajakumar, S. Ravi, and R.M. Suresh

XXII Table of Contents – Part II

Improved Intelligent Dynamic Swarm PSO Algorithm and Rough Setfor Feature Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

J. Anuradha and B.K. Tripathy

Estimating Database Size and Its Development Effort at ConceptualDesign Stage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

Samaresh Mishra, Elina Aisuryalaxmi, and Rajib Mall

No Reference Image Quality Assessment Using Block Based Featuresand Artificial Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

J.V. Bagade, Y.H. Dandawate, and Kulbir Singh

CAC Based Data Mining Workflow to Test and Re-engineer SoftwareAgents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

N. Sivakumar, Kalimuthu Vivekanandan, and A. Gunasekaran

An Ensembled Neural Network Classifier for Vehicle ClassificationUsing ILD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

K. Vijaya, Tessy Mathew, Kalyani Desikan, and L. Jeganathan

Climate Analysis Using Oceanic Data from Satellite Images –CAODSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

R.D. Sathiya, V. Vaithiyanathan, and G. VictorRajamanickam

Cloud Gaming with P2P Network Using XAML and Windows Azure . . . 165S. Prabu and Swarnalatha Purushotham

Active Contour Based Color Image Segmentation . . . . . . . . . . . . . . . . . . . . 173G. Raghotham Reddy, M. Mahesh Chandra, Kama Ramudu, andR. Rameshwar Rao

Inference of Naıve Baye’s Technique on Student Assessment Data . . . . . . 186S. Anupama Kumar and Vijayalakshmi M.N.

A Survey on Particle Swarm Optimization in Feature Selection . . . . . . . . 192Vipul Kothari, J. Anuradha, Shreyak Shah, and Prerit Mittal

Interaction Diagram Based Test Case Generation . . . . . . . . . . . . . . . . . . . . 202Rohit Kumar and Rajesh K. Bhatia

Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision . . . . 212V. Thanikaiselvan, P. Arulmozhivarman,Rengarajan Amirtharajan, and John Bosco Balaguru Rayappan

Test Suite Amelioration Using Case Based Reasoning for anAgent-Based System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

N. Sivakumar, Kalimuthu Vivekanandan, S. Hemanandh,S. Praveen Kumar, and E. Sasidharan

Table of Contents – Part II XXIII

Ocean Ambient Noise Classification Using Soft Techniques -OANCST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

V. Vaithiyanathan, R.D. Sathiya, G. VictorRajamanickam, andG. Latha

Incident Management Process Capability: A Simulation Study . . . . . . . . . 243Goutam Kumar Kundu, B. Murali Manohar, and Jayachandra Bairi

An Efficient Numerical Method for the Prediction of Clusters UsingK-Means Clustering Algorithm with Bisection Method . . . . . . . . . . . . . . . . 256

D. Napoleon, M. Praneesh, S. Sathya, and M. SivaSubramani

A Primitive Solution of Video Super Resolution . . . . . . . . . . . . . . . . . . . . . . 267A. Geetha Devi, T. Madhu, and K. Lal Kishore

Designing of Power Optimized Bypassing Array Multiplier inNanometer Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

Ravi Nirlakalla, Bhaskara Rao Boothuru, Subba Rao Thota,M. Rajasekhar Babu, Jayachandra Prasad Talari, andP. Venkata Krishna

Telecine Anti – Encoder An Anti Piracy System in Movie Theatres . . . . . 285Arun Prashanth, Nazim Fazil, and Madhusudhanan

A Novel FPGA Based Reconfigurable Architecture for Image ColorSpace Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

M.C. Hanumantharaju, G.R. Vishalakshi, Srinivas Halvi, andS.B. Satish

Increasing Scalability through Affinity Measure in Clustering . . . . . . . . . . 302A. Banumathi and A. Pethalakshmi

Efficient Use of Shares in Color Visual Cryptography . . . . . . . . . . . . . . . . . 311B. Dinesh Reddy, V. Valli Kumari, K.V.S.V.N. Raju, andY. Jaya Lakshmi

Features Based Mammogram Image Classification Using WeightedFeature Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320

S. Kavitha and K.K. Thyagharajan

INZEDS: An Integrated Explosive Detection System Using ZigbeeBased Wireless Sensor Network and Nanotechnology . . . . . . . . . . . . . . . . . 330

R. Divya and G.S.S.K. Pooja Santhoshi

Person Identification Using Palm Print Features with an EfficientMethod of DWT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

S. Sumathi and R. Rani Hemamalini

PAPR Reduction Techniques for Multicarrier Systems . . . . . . . . . . . . . . . . 347M.G. Sumithra and M. Sarumathi

XXIV Table of Contents – Part II

An Impact of Personality Traits and Recollection & Retention Skill inE-Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

L. Arockiam, J. Charles Selvaraj, and S. Amala Devi

Collaborative Approaches for Personalized Web Search Using FuzzyNeural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

Selvakumar Kamalanathan and Sendhilkumar Selvaraju

Performance Analysis of Wavelet Based Transforms in JPEG . . . . . . . . . . 377M. Arun Sankar and Philomina Simon

An Catholic and Enhanced Study on Basis Path Testing to AvoidInfeasible Paths in CFG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386

T. Bharat Kumar, N. Harish, and V. Sravan Kumar

Iris Authentication by Encoded Variant Length Iris Templates . . . . . . . . . 396S. Poornima and S. Subramanian

Optimal and User Friendly Technique for Enhancing Security byRobust Password Creation Using Biometric Characteristic . . . . . . . . . . . . 406

Richa Golash, Chhaya Rani Ram Kinkar, and Akhilesh Upadhyay

Raga Identification in CARNATIC Music Using Hidden Markov ModelTechnique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414

Surendra Shetty, K.K. Achary, and Sarika Hegde

Automatic Lesion Detection in Colposcopy Cervix Images Based onStatistical Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424

P.S. RamaPraba and H. Ranganathan

An Efficient Algorithm for Automatic Malaria Detection in MicroscopicBlood Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

J. Somasekar, A. Rama Mohan Reddy, and L. Sreenivasulu Reddy

Isolated Tamil Digit Speech Recognition Using Template-Based andHMM-Based Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441

S. Karpagavalli, R. Deepika, P. Kokila, K. Usha Rani, andE. Chandra

An Improved Algorithm for Medical Image Compression . . . . . . . . . . . . . . 451M. Moorthi and R. Amutha

Malware Obfuscator for Malicious Executables . . . . . . . . . . . . . . . . . . . . . . . 461Sachin Jain

A Better RGB Channel Based Image Steganography Technique . . . . . . . . 470Gandharba Swain and Saroj Kumar Lenka

LSB Array Based Image Steganography Technique by Exploring theFour Least Significant Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

Gandharba Swain and Saroj Kumar Lenka

Table of Contents – Part II XXV

Isolated Kokborok Vowels Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489Abhijit Debbarma

A Spatio-temporal Framework for Moving Object Detection in OutdoorScene . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494

Deepak Kumar Rout and Sharmistha Puhan

Two New Approaches of Independent Component Analysis . . . . . . . . . . . . 503V. Salai Selvam, S. Shenbagadevi, V. Padhma, D. Sujatha, andR. Sharmila

GAB CLIQDET: - A Diagnostics to Web Cancer (Web Link Spam)Based on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

S.K. Jayanthi and S. Sasikala

Grammar Checking System Using Rule Based Morphological Processfor an Indian Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524

Lata Bopche, Gauri Dhopavkar, and Manali Kshirsagar

Object Recognition with Wavelet-Based Salient Points . . . . . . . . . . . . . . . . 532R. Ahila Priyadharshini, S. Arivazhagan, and S. Jeypriya

The Role of ICTs in Knowledge Management (KM) for OrganizationalEffectiveness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

R. Subashini, S. Rita, and M. Vivek

JPEG Compression and Decompression for Color Images Using LatticeBased Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550

T.A. Sangeetha, A. Saradha, and Ilango Paramasivam

Detection of Car in Video Using Soft Computing Techniques . . . . . . . . . . 556T. Senthil Kumar, S.N. Sivanandam, and G.P. Akhila

A Survey of Different Stages for Monitoring Traffic Rule Violation . . . . . 566R. Aarthi, C. Arunkumar, and S. Padmavathi

Common Ground Method of Current Injection in Electrical ImpedanceTomography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574

Tushar Kanti Bera and J. Nagaraju

OO Metric Studies of Behavioral Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . 588Lavu Jayasudha, Sriraman Kothuri, and M. Venkata Rao

Optimizing a Tone Curve for Backward-Compatible High DynamicRange Image and Video Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596

S. Aravind Kumar

Short - Text Mining Approach for Medical Domain . . . . . . . . . . . . . . . . . . . 606R. Kavitha, A. Padmaja, and P. Subha

XXVI Table of Contents – Part II

Multilevel Security in Cloud Computing Environment Using GracefulCodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613

K. Govinda and E. Sathiyamoorthy

Let’s Play with Images and Private Data Using Stick of Randomness . . . 619Manish Mahajan and Navdeep Kaur

EJS Algorithm for Job Scheduling in Grid Environment . . . . . . . . . . . . . . 629K. Manikandan, Jacob P. Cherian, and Nikhil Scaria

Clustering of Concept-Drift Categorical Data Implementation inJAVA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639

K. Reddy Madhavi, A. Vinaya Babu, and S. Viswanadha Raju

A Weighted Particle Swarm Optimization Technique for OptimizingAssociation Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655

G. Maragatham and M. Lakshmi

Enhancement of Infrared Images Using Triangular Fuzzy MembershipFunction and Truncated Interval Thresholding . . . . . . . . . . . . . . . . . . . . . . . 665

S. Arun Bharathi, S. Logesh, and P.V.S.S.R. Chandra Mouli

Seizure Detection Using Parameter Estimation and Morlet WaveletTransform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674

P. Grace Kanmani Prince and R. Rani Hemamalini

Evaluation of Classifier Models Using Stratified Tenfold CrossValidation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680

Swarnalatha Purushotham and B.K. Tripathy

Hybrid Approach for Construction of Summaries and Clusters of BlogData for Improved Blog Search Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691

K. Saravanakumar and K. Deepa

Performance Evaluation of IEEE 802.11e Based Wireless LAN in MultiService Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701

M. Singaravelan

Performance Analysis of Routing Metrics for MultiRadio MultiChannelWMN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709

Kavitha Athota, Stalin Babu, and Atul Negi

An Innovative Hybrid Hierarchical Model for Automatic ImageAnnotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718

T. Sumathi and M. Hemalatha

An Adaptive Subspace Clustering Dimension Reduction Framework forTime Series Indexing in Knime Workflows . . . . . . . . . . . . . . . . . . . . . . . . . . . 727

T.M. Bhraguram, Shekha Chenthara, Geethu Gopan, andAnu R. Nair

Table of Contents – Part II XXVII

Reliable Requirement Specification: Defect Analysis Perspective . . . . . . . . 740Sandeep Kumar Nayak, Raees Ahmad Khan, and Md. Rizwan Beg

Comparative Analysis of IR Based Web Service Similarity MeasuresUsing Vector Space Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752

Vaneet Sharma and Mukesh Kumar

Comparative Study of Bit Loading Algorithms for OFDM BasedSystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761

Isha, Pankaj Rana, and Ravikant Saini

Comparison of PAPR of OFDM Systems Using CDF Plots for QAMand QPSK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768

T. Durga Prasad, K.V. Kumar, P. Raju,R. Koteswara Rao Naik, and V. Santosh Kumar

Green Technology and Assessment of the Environment and ChallengesFaced by Regulatory Authorities in Uganda: A Case of the ElectricityRegulatory Authority (ERA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 780

Ezendu Ariwa and Isaac Wasswa Katono

Spectral Expansion Method for QBD and QBD-M Processes inPerformance Modeling of Computing and Communication Systems:A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794

Ram Chakka

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811