Part III Soft Computing (AI, Neural Networks, Fuzzy Systems ...

16
Table of Contents - Part III Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.) Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic 1 Aravinthan Parthibarajan, Gopalakrishnan Narayanamurthy, Arun Srinivas Parthibarajan, and Vigneswaran Narayanamurthy An Intelligent Network for Offline Signature Verification Using Chain Code 10 Minal Tomar and Pratibha Singh An Improved and Adaptive Face Recognition Method Using Simplified Fuzzy ARTMAP 23 Antu Annam Thomas and M. Wilscy An Automatic Evolution of Rules to Identify Students' Multiple Intelligence 35 Kunjal Mankad, Priti Srinivas Sajja, and Rajendra Akerkar A Survey on Hand Gesture Recognition in Context of Soft Computing 46 Ankit Chaudhary, J.L. Raheja, Karen Das, and Sonia Raheja Handwritten Numeral Recognition Using Modified BP ANN Structure 56 Amit Choudhary, Rahul Rishi, and Savita Ahlawat Expert System for Sentence Recognition 66 Bipul Pandey, Anupam Shukla, and Ritu Tiwari RODD: An Effective .Reference-Based Outlier Detection Technique for Large Datasets 76 Monowar H. Bhuyan, D.K. Bhattacharyya, and 3.K. Kalita Distributed and Parallel Systems and Algorithms A Review of Dynamic Web Service Composition Techniques 85 Demian Antony D'Mello, V.S. Ananthanarayana, and Supriya Salían Output Regulation of Arneodo-Coullet Chaotic System 98 Sundarapandian Vaidyanathan Bibliografische Informationen http://d-nb.info/1009236172 digitalisiert durch

Transcript of Part III Soft Computing (AI, Neural Networks, Fuzzy Systems ...

Table of Contents - Part III

Soft Computing (AI, Neural Networks, FuzzySystems, etc.)

Analysis of the Severity of Hypertensive Retinopathy Using FuzzyLogic 1

Aravinthan Parthibarajan, Gopalakrishnan Narayanamurthy,Arun Srinivas Parthibarajan, and Vigneswaran Narayanamurthy

An Intelligent Network for Offline Signature Verification Using ChainCode 10

Minal Tomar and Pratibha Singh

An Improved and Adaptive Face Recognition Method Using SimplifiedFuzzy ARTMAP 23

Antu Annam Thomas and M. Wilscy

An Automatic Evolution of Rules to Identify Students' MultipleIntelligence 35

Kunjal Mankad, Priti Srinivas Sajja, and Rajendra Akerkar

A Survey on Hand Gesture Recognition in Context of SoftComputing 46

Ankit Chaudhary, J.L. Raheja, Karen Das, and Sonia Raheja

Handwritten Numeral Recognition Using Modified BP ANNStructure 56

Amit Choudhary, Rahul Rishi, and Savita Ahlawat

Expert System for Sentence Recognition 66Bipul Pandey, Anupam Shukla, and Ritu Tiwari

RODD: An Effective .Reference-Based Outlier Detection Technique forLarge Datasets 76

Monowar H. Bhuyan, D.K. Bhattacharyya, and 3.K. Kalita

Distributed and Parallel Systems and Algorithms

A Review of Dynamic Web Service Composition Techniques 85Demian Antony D'Mello, V.S. Ananthanarayana, and Supriya Salían

Output Regulation of Arneodo-Coullet Chaotic System 98Sundarapandian Vaidyanathan

Bibliografische Informationenhttp://d-nb.info/1009236172

digitalisiert durch

XII Table of Contents - Part III

A High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFS 108Indranil Hatai and Indrajit Chakrabarti

A Mathematical Modeling of Exceptions in Healthcare Workflow 120Sumagna Patnaik

Functional Based Testing in Web Services Integrated SoftwareApplications 130

Selvakumar Ramachandran, Lavanya Santapoor, andHaritha Rayudu

Design and Implementation of a Novel Distributed Memory FileSystem 139

Urvashi Karnani, Rajesh Kalmady, Phool Chand,Anup Bhattacharjee, and B.S. Jagadeesh

Decentralized Dynamic Load Balancing for Multi Cluster GridEnvironment 149

Malarvizhi Nandagopal and V. Rhymend Uthariaraj

Adoption of Cloud Computing in e-Governance 161Rama Krushna Das, Sachidananda Patnaik, and Ajita Kumar Misro

Efficient Web Logs Stair-Case Technique to Improve Hit Ratios ofCaching 173

Khushboo Hemnani, Dushyant Chawda, and Bhupendra Verma

A Semantic Approach to Design an Intelligent Self Organized SearchEngine for Extracting Information Relating to Educational Resources... 183

B. Saleena, S.K. Srivatsa, and M. Chenthil Kumar

Cluster Bit Collision Identification for Recognizing Passive Tags inRFID System 190

Katheeja Parveen, Sheik Abdul Khader, and Munir Ahamed Rabbani

Integration Testing of Multiple Embedded Processing Components 200Hara Gopal Manx Pakala, K. V.S. V.N. Raju, and Ibrahim Khan

Security and Information Assurance

A New Defense Scheme against DDoS Attack in Mobile Ad HocNetworks 210

S.A. Arunmozhi and Y. Venkataramani

A M o d e l for D e l e g a t i o n B a s e d o n A u t h e n t i c a t i o n a n d A u t h o r i z a t i o n . . . . 217Coimbatore Chandersekaran and William R. Simpson

Identification of Encryption Algorithm Using Decision Tree 237R. Manjula and R. Anitha

Table of Contents - Part III XIII

A Novel Mechanism for Detection of Distributed Denial of ServiceAttacks 247

Jaydip Sen

Authenticating and Securing Mobile Applications Using Microlog 258Siddharth Gupta and Sunil Kumar Singh

Assisting Programmers Resolving Vulnerabilities in Java WebApplications 268

Pranjal Bathia, Bharath Reddy Beerelli, and Marc-André Laverdière

Estimating Strength of a DDoS Attack Using Multiple RegressionAnalysis 280

B.B. Gupta, P.K. Agrawal, R.C. Joshi, and Manoj Misra

A Novel Image Encryption Algorithm Using Two Chaotic Maps forMedical Application 290

G.A. Sathishkumar, K. Bhoopathybagan, N. Sriraam,SP. Venkatachalam, and R. Vignesh

Chest X-Ray Analysis for Computer-Aided Diagnostic 300Kim Le

Overcoming Social Issues in Requirements Engineering 310Selvakumar Ramachandran, Sandhyarani Dodda, andLavanya Santapoor

Ad Hoc and Ubiquitous Computing

Range-Free Localization for Air-Dropped WSNs by FilteringNeighborhood Estimation Improvements 325

Eva M. García, Aurelio Bermúdez, and Rafael Casado

Evolution of Various Controlled Replication Routing Schemes forOpportunistic Networks 338

Hemal Shah and Yogeshwar P. Kosta

Collaborative Context Management and Selection in Context AwareComputing 348

B. Vanathi and V. Rhymend Uthariaraj

Privacy Preservation of Stream Data Patterns Using Offset and TrustedThird Party Computation in Retail-Shop Market Basket Analysis 358

Keshavamurthy B.N. and Durga Toshniwal

XIV Table of Contents - Part III

Wireless Ad Hoc Networks and Sensor Networks

Application of Euclidean Distance Power Graphs in Localization ofSensor Networks 367

G.N. Purohit, Seema Verma, and Usha Sharma

A New Protocol to Secure AODV in Mobile AdHoc Networks 378Avinash Krishnan, Aishwarya Manjunath, and Geetha J. Reddy

Spelling Corrector for Indian Languages 390K.V.N. Sunitha and A. Sharada

Voltage Collapse Based Critical Bus Ranking 400Shobha Shankar and T. Ananthapadmanabha

Multiplexer Based Circuit Synthesis with Area-Power Trade-Off 410Sambhu Nath Pradhan and Santanu Chattopadhyay

Exergaming - New Age Gaming for Health, Rehabilitation andEducation 421

Ankit Kamal

Inclusion/Exclusion Protocol for RFID Tags 431Selwyn Piramuthu

Min Max Threshold Range (MMTR) Approach in PalmprintRecognition 438

Jyoti Malik, G. Sainarayanan, and Ratna Dahiya

Power and Buffer Overflow Optimization in Wireless Sensor Nodes 450Gauri Joshi, Sudhanshu Dwivedi, Anshul Goel,Jaideep Mulherkar, and Prabhat Ranjan

Web Log Data Analysis and Mining 459L.K. Joshila Grace, V. Maheswari, and Dhinaharan Nagamalai

Steganography Using Version Control System 470Vaishali S. Tidake and Sopan A. Talekar

Author Index 481

Table of Contents - Part I

Distributed and Parallel Systems and Algorithms

Improved Ant Colony Optimization Technique for Mobile AdhocNetworks 1

Mano Yadav, K. V. Arya, and Vinay Rishiwal

A Performance Comparison Study of Two Position-Based RoutingProtocols and Their Improved Versions for Mobile Ad Hoc Networks . . . 14

Natarajan Meghanathan

Privacy Preserving Naïve Bayes Classification Using Trusted ThirdParty Computation over Distributed Progressive Databases 24

Keshavamurthy B.N. and Durga Toshniwal

Cluster Based Mobility Considered Routing Protocol for Mobile AdHoc Network 33

Soumyabrata Saha and Rituparna Chaki

Speech T ransac t i on for Bl inds Using Speech-Text-Speech C o n v e r s i o n s . . . 43Johnny Kanisha and G. Balakrishanan

Floating-Point Adder in Techology Driven High-Level Synthesis 49M. Joseph, Narasimha B. Bhat, and K. Chandra Sekaran

Differential Artificial Bee Colony for Dynamic Environment 59Syed Raziuddin, Syed Abdul Sattar, Rajya Lakshmi, and Moin Parvez

FAM2BP: Transformation Framework of UML Behavioral Elementsinto BPMN Design Element 70

Jayeeta Chanda, Ananya Kanjilal, Sabnam Sengupta, andSwapan Bhattacharya

A Cross-Layer Framework for Adaptive Video Streaming over IEEE802.11 Wireless Networks 80

Santhosha Rao, M. Vijaykumar, and Kumara Shama

FIFO Optimization for Energy-Performance Trade-off in Mesh-of-TreeBased Network-on-Chip 90

Santanu Kundu, T. V. Ramaswamy, and Santanu Chattopadhyay

Outliers Detection as Network Intrusion Detection System Using MultiLayered Framework 101

Nagaraju Devarakonda, Srinivasulu Pamidi, Valli Kumari V., andGovardhan A.

XVI Table of Contents - Part I

A New Routing Protocol for Mobile Ad Hoc Networks 112S. Rajeswari and Y. Venkataramani

Remote-Memory Based Network Swap for Performance Improvement . . . 125Nirbhay Chandorkar, Rajesh Kalmady, Phool Chand,Anup K. Bhattacharjee, and B.S. Jagadeesh

Collaborative Alert in a Reputation System to Alleviate ColludingPacket Droppers in Mobile Ad Hoc Networks 135

K. Gopalakrishnan and V. Rhymend Uthariaraj

Secure Service Discovery Protocols for Ad Hoc Networks 147Haitham Elwahsh, Mohamed Hashem, and Mohamed Amin

Certificate Path Verification in Peer-to-Peer Public Key Infrastructuresby Constructing DFS Spanning Tree 158

Balachandra, Ajay Rao, and K. V. Prema

A Novel Deadlock-Free Shortest-Path Dimension Order RoutingAlgorithm for Mesh-of-Tree Based Network-on-Chip Architecture 168

Kanchan Manna, Santanu Chattopadhyay, and Indranil Sen Gupta

2-D DOA Estimation of Coherent Wideband Signals Using L-ShapedSensor Array 179

P.M. Swetha and P. Palanisamy

An Approach towards Lightweight, Reference Based, Tree StructuredTime Synchronization in WSN 189

Surendra Rahamatkar and Ajay Agarwal

Towards a Hierarchical Based Context Representation and Selection byPruning Technique in a Pervasive Environment 199

B. Vanathi and V. Rhymend Uthariaraj

An Analytical Model for Sparse and Dense Vehicular Ad hocNetworks 209

Sara Najafzadeh, Norafida Ithnin, and Ramin Karimi

MIMO Ad Hoc Networks-Mutual Information and Channel Capacity . . . 217Chowdhuri Swati, Mondai Arun Kumar, and P.K. Baneerjee

Optimization of Multimedia Packet Scheduling in Ad Hoc NetworksUsing Multi-Objective Genetic Algorithm 225

R. Muthu Selvi and R. Rajaram

TRIDNT: Isolating Dropper Nodes with Some Degree of Selfishness inMANET 236

Ahmed M. Abd El-Haleem, Ihab A. Ali, Ibrahim I. Ibrahim, andAbdel Rahman H. El-Sawy

Table of Contents - Part I XVII

DSP/Image Processing/Pattern Recognition/Multimedia

Physiologically Based Speech Synthesis Using Digital WaveguideModel 248

A.R. Patil and V.T. Chavan

Improving the Performance of Color Image Watermarking UsingContourlet Transform 256

Dinesh Kumar and Vijay Kumar

Face Recognition Using Multi-exemplar Discriminative PowerAnalysis 265

Ganesh Bhat and K.K. Achary

Efficient Substitution-Diffusion Based Image Cipher Using ModifiedChaotic Map 278

/. Shatheesh Sam, P. Devaraj, and R.S. Bhuvaneswaran

Non Local Means Image Denoising for Color Images Using PCA 288P.A. Shy jila and M. Wilscy

An Iterative Method for Multimodal Biometrie Face Recognition UsingSpeech Signal 298

M. Nageshkumar and M.N. ShanmukhaSwamy

Quality Analysis of a Chaotic and Hopping Stream Based CipherImage 307

G.A. Sathishkumar, K. Bhoopathybagan, and N. Sriraam

Design Pattern Mining Using State Space Representation of GraphMatching 318

Manjari Gupta, Rajwant Singh Rao, Akshara Pande, andA.K. Tripathi

MST-Based Cluster Initialization for K-Means 329Damodar Reddy, Devender Mishra, and Prasanta K. Jana

Geometry and Skin Color Based Hybrid Approach for Face Tracking inColour Environment 339

Mahesh Goyani, Guam Shikkenawis, and Brijesh Joshi

Performance Analysis of Block and Non Block Based Approach ofInvisible Image Watermarking Using SVD in DCT Domain 348

Mahesh Goyani and Gunvantsinh Gohil

A Novel Topographic Feature Extraction Method for Indian CharacterImages 358

Soumen Bag and Gaurav Harit

XVIII Table of Contents - Part I

Comprehensive Framework to Human Recognition Using Palmprintand Speech Signal 368

Mahesh P.K. and ShanmukhaSwamy M.N.

Logical Modeling and Verification of a Strength Based Multi-agentArgumentation Scheme Using NuSMV 378

Shravan Shetty, H.S. Shashi Kiran, Murali Babu Namala, andSanjay Singh

Key Frame Detection Based Semantic Event Detection andClassification Using Heirarchical Approach for Cricket Sport VideoIndexing 388

Mahesh M. Goyani, Shreyash K. Dutta, and Payai Raj

Software Engineering

Towards a Software Component Quality Model 398Nitin Upadhyay, Bharat M. Despande, and Vishnu P. Agrawal

Colour Image Encryption Scheme Based on Permutation andSubstitution Techniques 413

Narendra K. Pareek, Vinod Patidar, and Krishan K. Sud

Deciphering the Main Research Themes of SoftwareValidation - A Bibliographical Study 428

Tsung Teng Chen, Yaw Han Chiu, and Yen Ping Chi

Toward a Comprehension View of Software Product Line 439Sami Ouali, Naoufel Kraiem, and Henda Ben Ghezala

Collecting the Inter Component Interactions in MultithreadedEnvironment 452

Arun Mishra, Alok Chaurasia, Pratik Bhadkoliya, and Arun Misra

On the Benefit of Quantification in AOP Systems - A Quantitative anda Qualitative Assessment 462

Kotrappa Sirbi and Prakash Jayanth Kulkarni

Empirical Measurements on the Convergence Nature of DifferentialEvolution Variants 472

G. Jeyakumar and C. Shanmugavelayutham

Database and Data Mining

An Intelligent System for Web Usage Data Preprocessing 481V.V.R. Maheswara Rao, V. Valli Kumari, and K.V.S.V.N. Raju

Table of Contents - Part I XIX

Discovery and High Availability of Services in Auto-load BalancedClusters 491

Shakti Mishra, Alok Mathur, Harit Agarwal, Rohit Vashishtha,D.S. Kushwaha, and A.K. Misra

Bayes Theorem and Information Gain Based Feature Selection forMaximizing the Performance of Classifiers 501

Subramanian Appavu, Ramasamy Rajaram, M. Nagammai,N. Priyanga, and S. Priyanka

Data Mining Technique for Knowledge Discovery from EngineeringMaterials Data Sets 512

Doreswamy, K.S. Hemanth, Channabasayya M. Vastrad, andS. Nagaraju

Mobile Database Cache Replacement Policies: LRU and PPRRP 523Hariram Chavan and Suneeta Sane

A Novel Data Mining Approach for Performance Improvement ofEBGM Based Face Recognition Engine to Handle Large Database 532

Soma Mitra, Suparna Parua, Apurba Das, and Debasis Mazumdar

Efficient Dens i ty B a s e d Ou t l i e r H a n d l i n g Techn ique in D a t a M i n i n g . . . . 542Krishna Gopal Sharma, Anant Ram, and Yashpal Singh

Hierarchical Clustering of Projected Data Streams Using ClusterValidity Index 551

Bharat Pardeshi and Durga Toshniwal

Non-Replicated Dynamic Fragment Allocation in Distributed DatabaseSystems 560

Nilarun Mukherjee

Soft Computing (AI, Neural Networks, FuzzySystems, etc.)

A Comparative Study of Machine Learning Algorithms as ExpertSystems in Medical Diagnosis (Asthma) 570

B.D.C.N. Prasad, P.E.S.N. Krishna Prasad, and Yeruva Sagar

Stabilization of Large Scale Linear Discrete-Time Systems by ReducedOrder Controllers 577

Sundarapandian Vaidyanathan and Kavitha Madhavan

Hybrid Synchronization of Hyperchaotic Qi and Lii Systems byNonlinear Control 585

Sundarapandian Vaidyanathan and Suresh Rasappan

XX Table of Contents - Part I

An Intelligent Automatic Story Generation System by RevisingProppian's System 594

Jay a A. and Uma G.V.

A Genetic Algorithm with Entropy Based Probabilistic Initializationand Memory for Automated Rule Mining 604

Saroj, Kapila, Dinesh Kumar, and Kanika

Author Index 615

Table of Contents - Part II

Networks and Communications

Analysis of Successive Interference Cancellation in CDMA Systems 1G.S. Deepthy and R.J. Susan

Scenario Based Performance Analysis of AODV and DSDV in MobileAdhoc Network 10

S. Taruna and G.N. Purohit

Web Service Based Sheltered Medi Helper 20Priya Loganathan, Jeyalakshmi Jeyabalan, and Usha Sarangapani

Reliable Neighbor Based Multipath Multicast Routing in MANETs 33Rajashekhar C. Biradar and Sunilkumar S. Manvi

Ad-Hoc On Demand Distance Vector Routing Algorithm UsingNeighbor Matrix Method in Static Ad-Hoc Networks 44

Aitha Nagaraju, G. Choran Kumar, and S. Ramachandram

Improving QoS for Ad-Hoc Wireless Networks Using PredictivePreemptive Local Route Repair Strategy 55

G.S. Sharvani, T.M. Rangaswamy, Aayush Goel, B. Ajith,Binod Kumar, and Manish Kumar

Improving Energy Efficiency in Wireless Sensor Network Using MobileSink 63

K. Deepak Samuel, S. Murali Krishnan, K. Yashwant Reddy, andK. Suganthi

Transformed Logistic Block Cipher Scheme for Image Encryption 70/. Shatheesh Sam, P. Devaraj, and R.S. Bhuvaneswaran

Context Management Using Ontology and Object Relational Database(ORDBMS) in a Pervasive Environment 79

B. Vanathi and V. Rhymend Uthariaraj

Path Optimization and Trusted Routing in MANET: An Interplaybetween Ordered Semirings 88

Kiran K. Somasundaram and John S. Baras

LEAD: Energy Efficient Protocol for Wireless Ad Hoc Networks 99Subhankar Mishra, Sudhansu Mohan Satpathy, and Abhipsa Mishra

XXII Table of Contents - Part II

Scale-Down Digital Video Broadcast Return Channel via Satellite(DVB-RCS) Hub 107

N.G. Vasantha Kumar, Mohanchur Sarkar, Vishal Agarwal,B.P. Chaniara, S.V. Mehta, V.S. Palsule, and K.S. Dasgupta

Reconfigurable Area and Speed Efficient Interpolator Using DALUTAlgorithm 117

Rajesh Mehra and Ravinder Kaur

Performance Evaluation of Fine Tuned Fuzzy Token Bucket Scheme forHigh Speed Networks 126

Anurag Aeron, C. Rama Krishna, and Mohan Lai

A Survey on Video Transmission Using Wireless Technology 137S.M. Koli, R.G. Purandare, S.P. Kshirsagar, and V.V. Gohokar

Cluster Localization of Sensor Nodes Using Learning MovementPatterns 148

R. Arthi and K. Murugan

Improving TCP Performance through Enhanced Path RecoveryNotification 158

S. Sathya Priya and K. Murugan

The Replication Attack in Wireless Sensor Networks: Analysis andDefenses 169

V. Manjula and C. Chellappan

New Distributed Initialization Protocols for IEEE 802.11 Based SingleHop Ad Hoc Networks 179

Rasmeet S. Bali and C. Rama Krishna

Deployment of GSM and RFID Technologies for Public Vehicle PositionTracking System 191

Apurv Vasal, Deepak Mishra, and Puneet Tandon

Type of Service, Power and Bandwidth Aware Routing Protocol forMANET 202

Divyanshu, Ruchita Goyal, and Manoj Mishra

Energy Efficiency in Wireless Network Using Modified DistributedEfficient Clustering Approach 215

Kaushik Chakraborty, Abhrajit Sengupta, and Himadri Nath Saha

ERBR: Enhanced and Improved Delay for Requirement Based Routingin Delay Tolerant Networks 223

Mohammad Arif, Kavita Satija, and Sachin Chaudhary

Table of Contents - Part II XXIII

Deterministic Approach for the Elimination of MED Oscillations andInconsistent Routing in BGP 233

Berlin Hency, Vasudha Venkatesh, and Raghavendran Nedunchezhian

Context Aware Mobile Initiated Handoff for Performance Improvementin IEEE 802.11 Networks 243

Abhijit Sarma, Shantanu Joshi, and Sukumar Nandi

Safety Information Gathering and Dissemination in Vehicular Ad hocNetworks: Cognitive Agent Based Approach 254

M.S. Kakkasageri and S.S. Manvi

Enhanced AODV Routing Protocol for Mobile Adhoc Networks 265K.R. Shobha and K. Rajanikanth

A Comparative Study of Feedforward Neural Network and SimplifiedFuzzy ARTMAP in the Context of Face Recognition 277

Antu Annam Thomas and M. Wilscy

A Multicast-Based Data Dissemination to Maintain Cache Consistencyin Mobile Environment 290

Kahkashan Tabassum and A. Damodaram

Quantitative Analysis of Dependability and Performability in Voiceand Data Networks 302

Almir P. Guimaräes, Paulo R.M. Maciel, and Rivalino Alatias Jr.

Rain Fade Calculation and Power Compensation for Ka-Band SpotBeam Satellite Communication in India 313

Jayadev Jena and Prasanna Kumar Sahu

Generalized N X N Network Concept for Location and MobilityManagement 321

C. Ashok Baburaj and K. Alagarsamy

A Weight Based Double Star Embedded Clustering of HomogeneousMobile Ad Hoc Networks Using Graph Theory 329

T.N. Janakiraman and A. Senthil Thilak

An Enhanced Secured Communication of MANET 340J. Thangakumar and M. Robert Masillamani

MIMO-OFDM Based Cognitive Radio for Modulation Recognition 349R. Deepa and K. Baskaran

Network and Communications Security

Mutual Authentication of RFID Tag with Multiple Readers 357Selwyn Piramuthu

XXIV Table of Contents - Part II

Design Space Exploration of Power Efficient Cache DesignTechniques 362

Ashish Kapania and E.V. Ravish Aradhya

Secured WiMAX Communication at 60 GHz Millimeter-Wave forRoad-Safety 372

Bera Rabindranath, Sarkar Subir Kumar, Sharma Bikash,Sur Samarendra Nath, Bhaskar Debasish, and Bera Soumyasree

A Light-Weight Protocol for Data Integrity and Authentication inWireless Sensor Networks 383

Jibi Abraham, Nagasimha M P, Mohnish Bhatt, and Chaitanya Naik

Intrusion Detection Using Flow-Based Analysis of Network Traffic 391Jisa David and Ciza Thomas

A Threshold Cryptography Based Authentication Scheme for MobileAd-hoc Network 400

Haimabati Dey and Raja Datta

Formal Verification of a Secure Mobile Banking Protocol 410Huy Hoang Ngo, Osama Dandash, Phu Dung Le,Bala Srinivasan, and Campbell Wilson

A Novel Highly Secured Session Based Data Encryption TechniqueUsing Robust Fingerprint Based Authentication 422

Tanmay Bhattacharya, Sirshendu Hore, Ay an Mukherjee, andS.R. Bhadra Chaudhuri

An Active Host-Based Detection Mechanism for ARP-RelatedAttacks 432

F.A. Barbhuiya, S. Roopa, R. Ratti, N. Hubballi, S. Biswas, A. Sur,S. Nandi, and V. Ramachandran

Privacy-Preserving Naïve Bayes Classification Using Trusted ThirdParty Computation over Vertically Partitioned Distributed ProgressiveSequential Data Streams 444

Keshavamurthy B.N. and Durga Toshniwal

Copyright Protection in Digital Multimedia 453Santosh Kumar, Sumit Kumar, and Sukumar Nandi

Trust as a Standard for E-Commerce Infrastructure 464Shabana and Mohammad Arif

A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16Network 472

Sandip Chakraborty, Soumyadip Majumder,Ferdous A. Barbhuiya, and Sukumar Nandi

Table of Contents - Part II XXV

Secure Data Aggregation in Wireless Sensor Networks Using PrivacyHomomorphism 482

M.K. Sandhya and K. Murugan

Deniable Encryption in Replacement of Untappable Channel to PreventCoercion 491

Jaydeep Howlader, Vivek Nair, and Saikat Basu

Author Identification of Email Forensic in Service OrientedArchitecture 502

Pushpendra Kumar Pateriya, Shivani Mishra, andShefalika Ghosh Samaddar

A Chaos Based Approach for Improving Non Linearity in S Box Designof Symmetric Key Cryptosystems 516

Jeyamala Chandrasekaran, B. Subramanyan, andRaman Selvanayagam

Implementation of Invisible Digital Watermarking by Embedding Datain Arithmetically Compressed Form into Image Using Variable-LengthKey 523

Samanta Sabyasachi and Dutta Saurabh

Wireless and Mobile Networks

Transmission Power Control in Virtual MIMO Wireless Sensor NetworkUsing Game Theoretic Approach 535

R. Valli and P. Dananjayan

Protocols for Network and Data Link Layer in WSNs: A Review andOpen Issues 546

Ankit Jain, Deepak Sharma, Mohit Goel, and A.K. Verma

Psychoacoustic Models for Heart Sounds 556Kiran Kumari Patil, B.S. Nagabhushan, and B.P. Vijay Kumar

Location Based GSM Marketing 564Sparsh Arora and Divya Bhatia

Inverse Square Law Based Solution for Data Aggregation RoutingUsing Survival Analysis in Wireless Sensor Networks 573

Khaja Muhaiyadeen A., Hari Narayanan R.,Shelton Paul Infant C, and Rajesh G.

System Implementation of Pushing the Battery Life and PerformanceInformation of an Internal Pacemaker to the Handheld Devices viaBluetooth Version 3.0 + H.S 584

Balasundaram Subbusundaram and Gayathri S.

XXVI Table of Contents - Part II

Cross-Layer Analyses of QoS Parameters in Wireless SensorNetworks 595

Alireza Masoum, Nirvana Meratnia, Arta Dilo,Zahra Taghikhaki, and Paul J.M. Havinga

Optimum Routing Approach vs. Least Overhead Routing Approach forMinimum Hop Routing in Mobile Ad hoc Networks 606

Natarajan Meghanathan

Architecture for High Density RFID Inventory System in Internet ofThings 617

Jain Atishay and Tanwer Ashish

A Relative Study of MANET and VANET: Its Applications,Broadcasting Approaches and Challenging Issues 627

Ajit Singh, Mukesh Kumar, Rahul Rishi, and D.K. Madan

Adaptive Threshold Based on Group Decisions for DistributedSpectrum Sensing in Cognitive Adhoc Networks 633

Rajagopal Sreenivasan, G. V.K. Sasirekha, and Jyotsna Bapat

A Distributed Mobility-Adaptive and Energy Driven ClusteringAlgorithm for MANETs Using Strong Degree 645

T.N. Janakiraman and A. Senthil Thilak

Dynamic Sink Placement in Wireless Sensor Networks 656Parisa D. Hossein Zadeh, Christian Schlegel, andMike H. MacGregor

Author Index 667