P. Venkata Krishna M. Rajasekhara BabuEzendu Ariwa (Eds.)
Global Trendsin Computingand CommunicationSystems
4th International Conference, ObCom 2011Vellore, TN, India, December 9-11, 2011Proceedings, Part I
13
Volume Editors
P. Venkata KrishnaVIT UniversitySchool of Computing Science and EngineeringVellore 632014, TN, IndiaE-mail: [email protected]
M. Rajasekhara BabuVIT UniversitySchool of Computing and EngineeringVellore 632014, TN, IndiaE-mail: [email protected]
Ezendu AriwaLondon Metropolitan University, UKE-mail: [email protected]
ISSN 1865-0929 e-ISSN 1865-0937ISBN 978-3-642-29218-7 e-ISBN 978-3-642-29219-4DOI 10.1007/978-3-642-29219-4Springer Heidelberg Dordrecht London New York
Library of Congress Control Number: 2012934198
CR Subject Classification (1998): I.2, H.3, H.4, C.2, I.4, I.5
© Springer-Verlag Berlin Heidelberg 2012
This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
Welcome to the fourth edition of the International Conference ObCom 2011—Recent Trends in Computing, Communication and Information Technology. Com-puting, communication and information technology are hand-in-glove responsiblefor the majority of innovations and novel transformations that occur around theworld. Starting from how data are stored, processed and consumed, there havebeen several optimizations taking place in different geographical locations. In or-der to tap the cutting-edge solutions from different streams of computing, ObComwas launched in the year 2003. The Conference ObCom 2004 was eventually madeavailable to the computing community in the year 2004 and it promoted the ex-ploitation of parallelism and distribution in order to achieve better functionalitiesand performance in certain classes of computer applications. The next version ofObCom was in 2006 and it was focused on the theme “Mobile, Ubiquitous and Per-vasive Computing.” The theme was chosen to script the challenges and issues whiledesigning and building the new spectrum of human–computer interfaces prevalentin mobile, ubiquitous and pervasive computing.
The ObCom 2011 conference addressed issues associated with computing,communication and information. Its aim was to increase exponentially the par-ticipants’ awareness of the current and future direction in the domains and tocreate a platform for researchers, leading industry developers and end users tointerrelate. The conference began with keynote address on the first day and con-tinued on the second and third day with invited lectures by leading researchersin academia and industry.
We have grown into an international conference of high influence by cater-ing to independent technical communities—the research/academic body and theindustry/practices body. The academic–industry synergy will eventually maketechnologies available at large. A glance at the participants’ record reveals anequal mix of high-caliber research academics and dominant industry engineersand managers in the software industry. ObCom 2011 was fortunate to attractpeople who are experts in their area of interest.
ObCom’s research paper selection process is unique and is praised for itsthoroughness and fairness in representation of the best practices in the researchcommunity. ObCom had a large Program Committee, both form the host countryand other developed countries, with a cross-section of skills and talents acrosscomputing and engineering disciplines. The Program and Advisory Committeeincreased gradually to fulfill the needs of the conference. The received paperswere reviewed by several expert critics (about two or more reviews per paper),while the Organizing Chair kept a close watch on review quality and reviewerthoroughness. Conflicts of interest were made transparent and handled to avoiddisputes. Thus, every research paper accepted at ObCom 2011 was carefullyexamined and discussed among a body of world-class researchers. The conference
VI Preface
accepted 173 papers from 842 submissions, which includes keynote and invitedpapers.
Research papers are just one element of ObCom 2011. We had several tracksmaking up the conference and catering to different segments of the community.In conjunction, we had an international ObCom student conference, OSIC 2011,dealing with research papers of UG, PG and PhD students, a PhD Forum exclu-sively for doctoral students to present their research challenge and find out itsfeasibility with a huge research panel of ObCom participants. Poster presenta-tions, workshops, and keynotes completed the event. Each of these had its owncommittee and processes for review and selection of papers.
The principal objective of this proceedings volume is to collect the cutting-edge results in the field of computing, communication and information technol-ogy. Accordingly, we selected papers representing such works.
The proceedings consist of invited paper dealing with the review of perfor-mance models of computer and communication systems and contributed papersdealing with the issues of networking, cloud computing, fuzzy logic, mobile com-munication, image processing, navigation systems, biometrics and Web servicescovering literally all the vital areas of the computing domains.
The conference as a whole was pulled off with an extremely engaged andcommitted team, and we thank those people involved in addressing the variousneeds of the conference. Recognition is given on our website with their respectiveroles and titles. The list might not cover many whose work was valuable for theconference.
Thanks to Alfred Hofmann, Leonie Kunz and other members of the editorialteam of Springer CCIS for their kind cooperation during the publication process.
Sincere thanks to our VIT University Chancellor G. Viswanathan, Vice Pres-ident (Administration), Sankar Viswanathan, Vice President (Operations) G.V.Sampath, Vice President (University Affairs), Sekar Viswanathan, Vice President(Chennai campus), G.V. Selvam, Vice Chancellor V. Raju, Pro-Vice Chancel-lor (Vellore campus), S. Narayanan, and Pro-Vice Chancellor (Chennai campus),Anand A. Samuel for their valuable suggestions and encouragement.
Lastly, thanks to everyone who attended this conference making it bigger inall respects.
P. Venkata KrishnaM. Rajasekhara Babu
Ezendu Ariwa
Organization
Chief Patron
G. Viswanathan Chancellor, VIT University
Patrons
Sankar Viswanathan Vice President, AdministrationG.V. Sampath Vice President, OperationsSekar Viswanathan Vice President, University AffairsG.V. Selvam Vice President, Chennai campus
Co-Patrons
V. Raju Vice ChancellorS. Narayanan Pro-Vice Chancellor (Vellore campus)Anand A. Samuel Pro-Vice Chancellor (Chennai campus)
Convenor(s)
M. Khalid VIT University, VelloreMargret Anouncia S. SCSE, VIT University, Vellore
Conference Chair
P. Venkata Krishna VIT University, Vellore
Technical Chair
Ezendu Ariwa London Metropolitan University, UK
Technical Co-chair(s)
Sumanth Yenduri University of Southern Mississippi, USAH.R. Vishwakarma VIT University, Vellore, India
Honorary Chair
Rajkumar Buyya The University of Melbourne, Australia
VIII Organization
Publicity Chair
Ezendu Ariwa London Metropolitan University, UK
Sponsorship Co-chairs
S.R. Pullobhotla PAT, VIT University, IndiaSamuel Rajkumar V. PAT, VIT University, IndiaSingaravelan M. CTS, VIT University, India
International Advisory Board
BettinaHarriehausen-Muhlbauer Fachbereich Informatik, Germany
Kam-Hoi Cheng University of Houston, USAPhil Prins Seattle Pacific University, USASuiping Zhou NTU, SingaporePramod Kumar Meher NTU, SingaporePururav Thoutireddy California Institute of Technology, USAJaspal Subhlok University of Houston, USABoleslaw K. Szymanski Rensselaer Polytechnic Institute, USAHans Martin Gundner UAS Esslingen, GermanyEberhard Kienzle UAS Esslingen, GermanyGareth J. Monkman UAS Regensburg, GermanyWolfgang Koster UAS Darmstadt, GermanyArno G. Kostka Technical University of Darmstadt, GermanyHermann Hartig Technische Universitat Dresden, GermanyUwe Wloka UAS Dresden, GermanyAxel Toll UAS Dresden, GermanyH.-W. Philippsen UAS Bremen, GermanyRichard Aubele UAS Esslingen, GermanyLothar Issler UAS Esslingen, GermanyAlbrecht Eßlinger UAS Esslingen, GermanyBertold Deppisch University of Technology, UAS Karlsruhe,
GermanyFrieder Keller University of Technology, UAS Karlsruhe,
GermanyChristine Roueche Esigelec, FranceRobin Pollard Monash University, AustraliaMike Mannion Glasgow Caledonian University, UKJohn MacIntyre David Goldman Informatics Centre, UKT. Radhakrishnan Concordia University, CanadaDheeraj Sanghi IIT, Kanpur, IndiaPhalguni Gupta IIT, Kanpur, India
Organization IX
D. Janakiram IIT-M, Chennai, IndiaSudip Misra IIT, Kharagpur, IndiaS.C. Misra IIT, Kharagpur, IndiaManfred Goetze University of Applied Sciences, GermanyB. Srinivasan Monash University, AustraliaSumanth Yenduri University of Southern Mississippi, USARam Chakka Research & Development, MIET, Meerut,
IndiaLim Chee Peng Universiti sains Malaysia (Science University
of Malaysia), Penang, MalaysiaPalaniappan Ramaswamy University of Essex,UKLoo Chu Kiong University of Malaya, Kuala Lumpur,
MalaysiaVijanth Sagayan a/l Asirvadam University Technology Petronas, MalaysiaVijay Devabhaktuni The University of Toledo, USAShonali Krishnaswamy Monash University, AustraliaAsai Asaithambi University of North Florida, USAK. Baskaran Deakin University, AustraliaWanlei Zhou Deakin University, AustraliaLynn Batten Deakin University, AustraliaSita Ramakrishnan Monash University, AustraliaSita Venkatraman University of Ballarat, Victoria, Australia
Local Advisory Board
B.V.A. RaoM. Khalid SCSE, IndiaD. Subhakar VIT University, IndiaK. Chidambaram VIT Community Radio and Proctoring
Scheme, VIT University, IndiaM. Adithan Academic Staff College, VIT University,
IndiaS.R. Pullobhotla PAT, VIT, IndiaK. Kannabiran Students’ Welfare, VIT University, IndiaMargret Anouncia S. SCSE, VIT University, Vellore, IndiaAyee Goundan Aethros, IndiaAsoke K. Talukeder IIIT-BDeependra Moitra Infosys, Bangalore, IndiaP.C.P. Bhat Philips Innovations Center, Bangalore, IndiaPethuru Raj Project Manager, IndiaSundaresan Krishnan Infosys, Mysore, IndiaK. Chandrasekharan NIT, Suratkal, IndiaH.R. Vishwakarma VIT University, Vellore, IndiaE. Bhaskaran Dy. Director of Industries and Commerce,
India
X Organization
Technical Program Committee
Abdul Gaffar H. SCSE, VIT University, Vellore, IndiaAnthoniraj A. SCSE, VIT University, Vellore, IndiaArunachalam V. SENCE, VIT University, Vellore, IndiaBalamurugan B. SITE, VIT University, Vellore, IndiaBhagyavathi M. SCSE, VIT University, Vellore, IndiaBhulakshmi Bonthu SCSE, VIT University, Vellore, IndiaChandra Mouli P.V.S. SCSE, VIT University, Vellore, IndiaDhinesh Babu L.D. SITE, VIT University, Vellore, IndiaGanapathy G.P. CDMM, VIT University, Vellore, IndiaGanesh Gopal D. SCSE, VIT University, Vellore, IndiaIlango P. SCSE, VIT University, Vellore, IndiaJaisankar N. SCSE, VIT University, Vellore, IndiaKalaivani D. SCSE, VIT University, Vellore, IndiaKamalakannan J. SITE, VIT University, Vellore, IndiaKannadasan R. SCSE, VIT University, Vellore, IndiaKauser Ahmed P. SCSE, VIT University, Vellore, IndiaKumar K. SCSE, VIT University, Vellore, IndiaLakshmanan K. SCSE, VIT University, Vellore, IndiaMadhu Viswanatham V SCSE, VIT University, Vellore, IndiaManjula R. SCSE, VIT University, Vellore, IndiaSuresh Thanga Krishnan SCSE, VIT University, Vellore, IndiaMuhammad Rukunuddin Ghalib SCSE, VIT University, Vellore, IndiaRajasekhara Babu M. SCSE, VIT University, Vellore, IndiaRamesh Babu K. SCSE, VIT University, Vellore, IndiaRavikanth A.S.V. SAS, VIT University, Vellore, IndiaSaleem Durai M.A. SCSE, VIT University, Vellore, IndiaSamuel Rajkumar V. PAT, VIT University, Vellore, IndiaSendhil Kumar K.S. SCSE, VIT University, Vellore, IndiaSingaravelan M. CTS, VIT University, Vellore, IndiaSivanesan S. SCSE, VIT University, Vellore, IndiaSwarnalatha P. SCSE, VIT University, Vellore, IndiaThirunavukkarasu A. SMBS, VIT University, Vellore, IndiaTripathy B.K. SCSE, VIT University, Vellore, IndiaVijaya Rajan V. SCSE, VIT University, Vellore, IndiaVijayasherly V. SCSE, VIT University, Vellore, IndiaViswanathan P. SITE, VIT University, Vellore, IndiaVivekanandashanmuganathan P. SMBS, VIT University, Vellore, IndiaAndrews Samraj P. SCSE, VIT University, Chennai, IndiaB. Sarojini Avinashilingam University, IndiaA. Srinivasan MNM Jain Engineering College, Chennai,
IndiaMaragatham Natraj Avinashilingam University for Women, IndiaS.N. Sivanandam Karpagam College of Engineering, India
Organization XI
K. Sankaranarayanan Easa College of Engineering and Technology,India
R.M. Somasundaram SNS College of Engineering, IndiaG. Thokappia Arusu Jayam College of Engineering and
Technology, IndiaR. Pugazendi KSR Arts College, IndiaKannan Ramakrishnan Multimedia University, MalaysiaShohel Sayeed Multimedia University, MalaysiaLim Chee Peng Universiti Sains Malaysia, MalaysiaZubeir Izaruku Daffala Colleges of Applied Sciences, OmanG. Prakash Intel Engineering College, IndiaB. Baskara Rao RGMCE, IndiaS.S. Gantayat GIET, IndiaH.K. Tripathy CSIR-IMMT, IndiaD. Mohanthy NII, IndiaMohanakrihsna Varma Kukman University, KoreaShoba Bindhu JNTUA, IndiaK. Komathy Eswary Engineering College, IndiaT.S. Pradeep Kumar VIT University, Chennai, IndiaV. Saritha VIT University, Vellore, IndiaCh. Pradeep Reddy VIT University, Vellore, India
Organized by
School of Computing Science and Engineering
Table of Contents – Part I
Steady State Solution to CPP/M/1 Queue with Working VacationsUsed in Internet Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Tien V. Do and Ram Chakka
Elastic Virtual Machine for Fine-Grained Cloud ResourceProvisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Wesam Dawoud, Ibrahim Takouna, and Christoph Meinel
A Theoretical Approach to a Better Tag Cloud Visualization . . . . . . . . . . 26Achin Mishra and Raj Pati Mishra
Core Temperature Depends on the Processing Load of the Core andthe Temperature of Adjacent Core-A Regression Analysis . . . . . . . . . . . . . 32
Subrata Sinha
Ligand Binding Studies of Caspase 3 Protein with Compounds ofBacopa monneri - A Target Protein Responsible for Alzheimer’sDisease (AD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Surabhi Johari, Subrata Sinha, Sewali Bora, Sagarika Biswas, andKhushboo Gupta
Protein Ligand Interaction Studies of DJ-1 Protein Responsible forParkinson’s Disease and Chemical Analogues of Bacopa monnieri(Brahmi) Compounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Subrata Sinha, Surabhi Johari, Khushboo Gupta, and Sewali Bora
Towards Development of an Intelligent Framework for ManagingAuthorization Service in Ubiquitous Enterprise ComputingEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Supreet Kaur and Kawaljeet Singh
ANOVA Discriminant Analysis for Features Selected through DecisionTree Induction Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
N. Gayatri, S. Nickolas, and A.V. Reddy
Developing an Efficient Mechanism for Retrieving Documents UsingAutomatically Generated Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Sayanti Bandyopadhyay and Amit Kumar Bandyopadhyay
Filtering Semantic Information at Client Side Using Semantic EnrichedTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Anand Kumar, S.K. Jain, Saurabh Parmar, and Gagandeep Kaur
XIV Table of Contents – Part I
4-Bit Serial-Parallel Multiplier and Bit-Level Systolic Architecture forImplementation of Discrete Orthogonal Transforms . . . . . . . . . . . . . . . . . . . 91
M.N. Murty, S.S. Nayak, B. Padhy, and S.N. Panda
Sound Data Compression Using Different Methods . . . . . . . . . . . . . . . . . . . 100Pravin Y. Kumbhar and Shoba Krishnan
A Non Redundant Compact XML Storage for Efficient Indexing andQuerying of XML Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Mohammed Atique and A.D. Raut
EduCloud: An Institutional Cloud with Optimal Scheduling Policies . . . . 114L. Shyamala and Saswati Mukherjee
Resource Discovery for Grid Computing Environment Using AntColony Optimization by Applying Routing Information and LRUPolicy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
S. Nirmala Devi and A. Pethalakshmi
Service Oriented Architecture for Governing Engineering Colleges . . . . . . 134Neelavathi Suryamurthy and Vivekanandan Kalimuthu
A Device Middleware-Based Smart Home Environment for AmbientHealth Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Veeramuthu Venkatesh, Pethuru Raj, and V. Vaithayanathan
Computer Oriented Process for Treating Second Order DifferentialEquations with Singular Coefficient at the First Derivative Term . . . . . . . 154
A.S.V. Ravi Kanth and K. Aruna
Text Dependent Speaker Identification and Speech Recognition UsingArtificial Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Suma Swamy, Shalini T., Sindhu P. Nagabhushan,Sumaiah Nawaz, and K.V. Ramakrishnan
Efficient Probabilistic Query Ranking in Uncertain Databases . . . . . . . . . 169Divya Katukoori, K. Bhima, T. Aruna Sri,S. Hemanth Chowdary, and Sujoy Bhattacharya
A Parameterized Framework of Trust Computation for Grid ResourceBroker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
M. Ashok and S. Sathiyan
Energy and Path Aware Ant Colony Optimization Based RoutingAlgorithm for Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Hamed Orojloo, Reza Askari Moghadam, and Abolfazl T. Haghighat
A Data Profile-Based Contention-Free MAC Protocol for the PatientMonitoring Systems on WBANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Hongkyu Jeong, Min-Gon Kim, and Hong-Shik Park
Table of Contents – Part I XV
Switching of a Sixteen Electrode Array for Wireless EIT System Usinga RF-Based 8-Bit Digital Data Transmission Technique . . . . . . . . . . . . . . . 202
Tushar Kanti Bera and J. Nagaraju
An Artificial Bee Colony Algorithm for the Minimum Average RoutingPath Clustering Problem in Multi-hop Underwater Sensor Networks . . . . 212
Venkateswara Rao Dokku and Alok Singh
Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic CurveCryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Anususya Sardar, Subba Rao Y.V., and RukmaRekha N.
On the Design and Realization of Non-Synchronous Frequency HoppingSpread Spectrum for Securing Data over Mobile and ComputerNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Javaid A. Sheikh, Shabir A. Parah, and G. Mohiuddin Bhat
Improved Object Lookup in Unstructured Peer-to-Peer OverlayNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Chittaranjan Hota, Gaurav K., Prasanna G., Narayana M.V.S.,Hrushikesha Mohanty, and Muttukrishnan Rajarajan
Ontology Construction for Polycystic Kidney Disease . . . . . . . . . . . . . . . . . 245Saurabh Parmar, S.K. Jain, Gagandeep Kaur, and Anand Kumar
An Intelligent Recommendation System for Individual and Group ofMobile Marketplace Users Based on the Influence of Items’ Featuresamong User Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Amer A. Sallam, Siba K. Udgata, and Vineet Padmanabhan
An Efficient Mechanism to Avoid Additional Nesting in Nested NetworkMobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
M. Dinakaran and P. Balasubramanie
Design of Secure Communication Model for Virtual Environment . . . . . . 277R. Anand, S. Saraswathi, V.R. Sindu, and B. Sandhya
An Enhanced Probabilistic Encryption Algorithm for Secured DataTransmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
K. Adi Narayana Reddy, V. Madhu Viswanatham, andB. Vishnu Vardhan
JavaScript Application Framework for Mobile Devices . . . . . . . . . . . . . . . . 291Raghu R. and Shobha K.R.
A Centralized Priority Based RWA Protocol for WDM Networks . . . . . . . 300T.K. Ramesh, A. Nageswara Reddy, G.V.L. Praveen Kumar,K. Biju, and P.R. Vaya
XVI Table of Contents – Part I
Low-Power Area Efficient Reconfigurable Pipelined Two’s ComplementMultiplier with Reduced Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
R. Sakthivel, M. Vanitha, and Harish M. Kittur
RWA Protocol for Larger WDM Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 322T.K. Ramesh, R. Janani, S. Prannoy Kiran, T. Swapna, andP.R. Vaya
Integration of SMS Security Systems in Cloud Computing . . . . . . . . . . . . . 329Mohan Kumar C.M., Raj Sudheer Dangeti, and Jeganathan L.
Identity Based Cryptosystem: A New Paradigm in Public KeyInfrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
S. Kuzhalvaimozhi and G. Raghavendra Rao
An Efficient Take-Back Call Admission Control Scheme for 3G/WLANIntegrated Cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
S. Nanda Kumar, Sibaram Khara, and T. Velmurugan
A Case Study on Various Routing Strategies of VANETs . . . . . . . . . . . . . . 353Santhosh Jayachandran, Johnson Doraisami Jothi, andSiva Rama Krishnan
High Utility and Low Cost Microcontroller Based Data AcquisitionSystem for Antenna Encoders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Vikalp Paharia, Harshul Gandhi, and Astha Jain
Design of WDM Optical Networks for the Analysis of Cross PhaseModulation and Self Phase Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Sugumaran S., Vamsi Nath Reddy P., Sirivella V.S.M. Reddy, andArulmozhivarman P.
An Energy Efficient Event Based Hierarchical Clustering Algorithm forWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Chiranjib Patra, Arindam Mondal, Parama Bhaumik, andMatangini Chattopadhyay
Throughput Improvement in Mobile OFDM System with Pilot FreeAdaptive Modulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
K. Vinoth Babu, G. Ramachandra Reddy, Sunit Gupta,Pratul Chauhan, and Pratik Patel
Trust Based Certificate Authority for Detection of Malicious Nodes inMANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Manoj V., Raghavendiran N., Aaqib M., and Vijayan R.
A Comparative Study on Web Log Clustering Approaches . . . . . . . . . . . . . 402Sudhamathy G., Sarojini Illango B., and Jothi Venkateswaran C.
Table of Contents – Part I XVII
A New Performance Modelling and Measurement Method forService-Oriented Cloud Applications (SOCAs) . . . . . . . . . . . . . . . . . . . . . . . 412
S. RajaRaajeswari, R. Selvarani, and Pethuru Raj
Defending DoS Attacks Using a Puzzle-Based Approach and Reductionin Traceback Time towards the Attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Anup Mathew Abraham and Shweta Vincent
Cloud and Grid Computing Based Telemedicine Using ComputerCommunication Network through Internet . . . . . . . . . . . . . . . . . . . . . . . . . . 434
S. Saravanan, M. AnbuRajan, and A. Venkatraman
AT Command Implementation for a Multimode Wireless Device . . . . . . . 447Sharana Goud B. and Parimala P.
CIMG-BSDS: Image Clustering Based on Bookshelf Data Structure inWeb Search Engine Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
S.K. Jayanthi and S. Prema
Fuzzy Based Integrated Security Model for Mobile Ad Hoc Network . . . . 467M.B. Mukesh Krishnan and P. Sheik Abdul Khader
An Efficient Authentication Method for Throttling DDoS Attacks . . . . . . 473Ch. Rupa, J. Madhu Babu, P. Siva Prasad, and P.S. Avadhani
Computational Analysis of Stationary and Transient Distribution ofSingle Server Queue with Working Vacation . . . . . . . . . . . . . . . . . . . . . . . . . 480
R. Sudhesh and L. Francis Raj
APD: ARM Deceptive Phishing Detector System Phishing Detection inInstant Messengers Using Data Mining Approach . . . . . . . . . . . . . . . . . . . . 490
Mohd Mahmood Ali and Lakshmi Rajamani
Adaptive Duplex Technique for Reduction of Turnaround Time inIEEE 802.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Kalidoss Rajakani and M.A. Bhagyaveni
WiMAX and WiFi Convergence Architecture to Achieve QoS . . . . . . . . . . 512G. Vijayalakshmy and G. Shivaradje
BPSK Phase Modulation with Novel Prime Codes in OCDMANetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Helan Vidhya T., Pavithra S., and Sivasankari S.A.
A Simplified Pricing Model for the 3G/4G Mobile Networks . . . . . . . . . . . 535Reeky Maiti
Performance Analysis and Dispersion Compensation in Ultra Long-Haul10Gbps Optical System by OPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Pradeep Doss M., Sridarshini T., and Valliammai M.
XVIII Table of Contents – Part I
An Augmented Three-Phase Concept Map Design for an AdaptiveLearning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
R. Kavitha, A. Vijaya, and D. Saraswathi
Formal Specification of Trusted Neighbor Information Base of OLSRRouting Protocol of Adhoc Network Using Z Language . . . . . . . . . . . . . . . 560
Amandeep Verma and Manpreet Singh Gujral
Vertical Handover Based on Voice Activity in HeterogeneousNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
G. Kalaivani and S. Usha
Cross-Layer Scheme to Solve Hidden Device Problem in WPANs withIncreased Transmission Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
M.L. Mathivathani and S. Usha
Road Detection Using a New Method for Vanishing Point DetectionBased on Hough Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Binu B.
Stock Price Prediction Using Support Vector Regression . . . . . . . . . . . . . . 588Abirami R. and Vijaya M.S.
Modeling and Simulation of Content-Based Video StreamingUsing ns2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Sankar Padmanabhan, Krithika Parameswaran, Anandhi Natarajan,Angel Regi Chelladurai Vijayakumari, andChellamuthu Chinnagounder
A Solution to Prevent Resource Flooding Attacks in 802.11 WLAN . . . . 607Arockiam L., Vani B., Sivagowry S., and Persia A.
Enhancement of Orchestration Algorithms for CompilerOptimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
J. Andrews and T. Sasikala
Development of Sensor Node to Measure Soil Moisture . . . . . . . . . . . . . . . . 628Kapil Mundada, Pramod Kanjalkar, and Jayant Kulkarni
Localization of Sensor Nodes Using Flooding in Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Basavaraj K. Madagouda, R. Sumathi, and A.H. Shanthakumara
A Packet Classification and Node-Level Certification Mechanism forIntrusion Detection in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
S.P. Manikandan, R. Manimegalai, V. Rakesh, and V. Vaishnavi
Table of Contents – Part I XIX
MEDINFO CLOUD-A Cloud Based Solution to Ensure Secure Accessto Health Related Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
Sankari Senthil, Ramya R., and Saranya B.
A Service Oriented Modeling and Analysis for Building IntrusionDetection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Rama Rao K.V.S.N. and Manas Ranjan Patra
Centralized Parallel Form of Pattern Matching Algorithm in PacketInspection by Efficient Utilization of Secondary Memory in NetworkProcessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
N. Kannaiya Raja, K. Arulanandam, and B. RajaRajeswari
Effective Use of Interbank Network Services by Using TransactionCounter in ATMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
Rajesh Vemulakonda and Raja Yasodhar Kapalavayi
Performance Analysis of Case Based Word Sense Disambiguation withMinimal Features Using Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
P. Tamilselvi and S.K. Srivatsa
Performance Evaluation of EAP-TLS Authentication Protocol forUMTS-WiMAX Interworking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
R. Narmadha and S. Malarkan
Tiny SPU: Implementation and Analysis of Secure Program Update forClustered Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
M.B. Nirmala, A.S. Majunath, and B.G. Yogesh
Secured Routing Using Quantum Cryptography . . . . . . . . . . . . . . . . . . . . . . 714M. Vijay Anand and C. Jayakumar
Green Technology and Monetization of Clonization Model: The Chineseand Indian Options for Nigeria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
Ezendu Ariwa and Ijeoma Chichebe Ezeasor
Emitted Sound Amplitude Analysis Using Hilbert HuangTransformation for Cutting Tool Flank Wear Prediction . . . . . . . . . . . . . . 743
Emerson Raja Joseph, Loo Chu Kiong, Lim Way Soong, andS. Purushothaman
A Survey on Cellular Automata and Its Applications . . . . . . . . . . . . . . . . . 753Debasis Das
Extraction of Domain-Specific Concepts to Create Expertise Profiles . . . 763Gagandeep Kaur, S.K. Jain, Saurabh Parmar, and Anand Kumar
Inter and Intra Cluster Load Balancing Strategies for Cluster BasedVideo-on-Demand Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Vinay A. and Prateek Saxena
XX Table of Contents – Part I
Symlet2 Based Wavelet Filter Bank for Uncorrelated Digital SignalRecovery: Some Advantages over Matched Filter . . . . . . . . . . . . . . . . . . . . . 782
Amit Kumar Ahuja and Ram Chakka
Iterative Relaxed Median Filter for Impulse Noise Removal andValidation of FCM Clustering Using Cluster Error Index in MedianFiltered MR Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792
R. Vijayarajan and S. Muttan
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Table of Contents – Part II
An Examination of Word Stemming in Latent Semantic IndexSearches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Louise Perkins, David E. Sallis, and Sumanth Yenduri
Financial Sequences and the Hidden Markov Model . . . . . . . . . . . . . . . . . . 5Shreeya Sengupta, Hui Wang, William Blackburn, and Piyush Ojha
A Dynamic Semantic Metadata Model in Cloud Computing . . . . . . . . . . . 13R. Anitha and Saswati Mukherjee
A Novel Approach to Classify High Dimensional Datasets UsingSupervised Manifold Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Binod Kumar Mishra, Praneet Saurabh, and Bhupendra Verma
Term-Frequency Inverse-Document Frequency Definition Semantic(TIDS) Based Focused Web Crawler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Mukesh Kumar and Renu Vig
Multiple 3D Chaotic Systems Based Approach for Visual MultimediaContent Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Musheer Ahmad, Tanvir Ahmad, and Chirag Gupta
Kannada Word Sense Disambiguation Using Association Rules . . . . . . . . . 47S. Parameswarappa and V.N. Narayana
K-Means Clustering of Use-Cases Using MDL . . . . . . . . . . . . . . . . . . . . . . . 57Sunil Kumar, Rajesh Kumar Bhatia, and Rajesh Kumar
Topological Characterization of Rough Set on Two Universal Sets andKnowledge Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
B.K. Tripathy, D.P. Acharjya, and L. Ezhilarasi
A Novice Approach for Lossless Visible Watermarking Approach byPioneering the Best Block (LVW-PBB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
R. Sinduja, I. Rachel Rupala, and R.D. Sathiya
Topological Properties of Incomplete Multigranulation Based on RoughFuzzy Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
B.K. Tripathy and M. Nagaraju
Automated Heart Sound Diagnosis Using Feature Extraction Model forBio-signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
P.S. Rajakumar, S. Ravi, and R.M. Suresh
XXII Table of Contents – Part II
Improved Intelligent Dynamic Swarm PSO Algorithm and Rough Setfor Feature Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
J. Anuradha and B.K. Tripathy
Estimating Database Size and Its Development Effort at ConceptualDesign Stage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Samaresh Mishra, Elina Aisuryalaxmi, and Rajib Mall
No Reference Image Quality Assessment Using Block Based Featuresand Artificial Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
J.V. Bagade, Y.H. Dandawate, and Kulbir Singh
CAC Based Data Mining Workflow to Test and Re-engineer SoftwareAgents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
N. Sivakumar, Kalimuthu Vivekanandan, and A. Gunasekaran
An Ensembled Neural Network Classifier for Vehicle ClassificationUsing ILD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
K. Vijaya, Tessy Mathew, Kalyani Desikan, and L. Jeganathan
Climate Analysis Using Oceanic Data from Satellite Images –CAODSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
R.D. Sathiya, V. Vaithiyanathan, and G. VictorRajamanickam
Cloud Gaming with P2P Network Using XAML and Windows Azure . . . 165S. Prabu and Swarnalatha Purushotham
Active Contour Based Color Image Segmentation . . . . . . . . . . . . . . . . . . . . 173G. Raghotham Reddy, M. Mahesh Chandra, Kama Ramudu, andR. Rameshwar Rao
Inference of Naıve Baye’s Technique on Student Assessment Data . . . . . . 186S. Anupama Kumar and Vijayalakshmi M.N.
A Survey on Particle Swarm Optimization in Feature Selection . . . . . . . . 192Vipul Kothari, J. Anuradha, Shreyak Shah, and Prerit Mittal
Interaction Diagram Based Test Case Generation . . . . . . . . . . . . . . . . . . . . 202Rohit Kumar and Rajesh K. Bhatia
Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision . . . . 212V. Thanikaiselvan, P. Arulmozhivarman,Rengarajan Amirtharajan, and John Bosco Balaguru Rayappan
Test Suite Amelioration Using Case Based Reasoning for anAgent-Based System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
N. Sivakumar, Kalimuthu Vivekanandan, S. Hemanandh,S. Praveen Kumar, and E. Sasidharan
Table of Contents – Part II XXIII
Ocean Ambient Noise Classification Using Soft Techniques -OANCST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
V. Vaithiyanathan, R.D. Sathiya, G. VictorRajamanickam, andG. Latha
Incident Management Process Capability: A Simulation Study . . . . . . . . . 243Goutam Kumar Kundu, B. Murali Manohar, and Jayachandra Bairi
An Efficient Numerical Method for the Prediction of Clusters UsingK-Means Clustering Algorithm with Bisection Method . . . . . . . . . . . . . . . . 256
D. Napoleon, M. Praneesh, S. Sathya, and M. SivaSubramani
A Primitive Solution of Video Super Resolution . . . . . . . . . . . . . . . . . . . . . . 267A. Geetha Devi, T. Madhu, and K. Lal Kishore
Designing of Power Optimized Bypassing Array Multiplier inNanometer Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Ravi Nirlakalla, Bhaskara Rao Boothuru, Subba Rao Thota,M. Rajasekhar Babu, Jayachandra Prasad Talari, andP. Venkata Krishna
Telecine Anti – Encoder An Anti Piracy System in Movie Theatres . . . . . 285Arun Prashanth, Nazim Fazil, and Madhusudhanan
A Novel FPGA Based Reconfigurable Architecture for Image ColorSpace Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
M.C. Hanumantharaju, G.R. Vishalakshi, Srinivas Halvi, andS.B. Satish
Increasing Scalability through Affinity Measure in Clustering . . . . . . . . . . 302A. Banumathi and A. Pethalakshmi
Efficient Use of Shares in Color Visual Cryptography . . . . . . . . . . . . . . . . . 311B. Dinesh Reddy, V. Valli Kumari, K.V.S.V.N. Raju, andY. Jaya Lakshmi
Features Based Mammogram Image Classification Using WeightedFeature Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
S. Kavitha and K.K. Thyagharajan
INZEDS: An Integrated Explosive Detection System Using ZigbeeBased Wireless Sensor Network and Nanotechnology . . . . . . . . . . . . . . . . . 330
R. Divya and G.S.S.K. Pooja Santhoshi
Person Identification Using Palm Print Features with an EfficientMethod of DWT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
S. Sumathi and R. Rani Hemamalini
PAPR Reduction Techniques for Multicarrier Systems . . . . . . . . . . . . . . . . 347M.G. Sumithra and M. Sarumathi
XXIV Table of Contents – Part II
An Impact of Personality Traits and Recollection & Retention Skill inE-Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
L. Arockiam, J. Charles Selvaraj, and S. Amala Devi
Collaborative Approaches for Personalized Web Search Using FuzzyNeural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Selvakumar Kamalanathan and Sendhilkumar Selvaraju
Performance Analysis of Wavelet Based Transforms in JPEG . . . . . . . . . . 377M. Arun Sankar and Philomina Simon
An Catholic and Enhanced Study on Basis Path Testing to AvoidInfeasible Paths in CFG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
T. Bharat Kumar, N. Harish, and V. Sravan Kumar
Iris Authentication by Encoded Variant Length Iris Templates . . . . . . . . . 396S. Poornima and S. Subramanian
Optimal and User Friendly Technique for Enhancing Security byRobust Password Creation Using Biometric Characteristic . . . . . . . . . . . . 406
Richa Golash, Chhaya Rani Ram Kinkar, and Akhilesh Upadhyay
Raga Identification in CARNATIC Music Using Hidden Markov ModelTechnique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Surendra Shetty, K.K. Achary, and Sarika Hegde
Automatic Lesion Detection in Colposcopy Cervix Images Based onStatistical Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
P.S. RamaPraba and H. Ranganathan
An Efficient Algorithm for Automatic Malaria Detection in MicroscopicBlood Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
J. Somasekar, A. Rama Mohan Reddy, and L. Sreenivasulu Reddy
Isolated Tamil Digit Speech Recognition Using Template-Based andHMM-Based Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
S. Karpagavalli, R. Deepika, P. Kokila, K. Usha Rani, andE. Chandra
An Improved Algorithm for Medical Image Compression . . . . . . . . . . . . . . 451M. Moorthi and R. Amutha
Malware Obfuscator for Malicious Executables . . . . . . . . . . . . . . . . . . . . . . . 461Sachin Jain
A Better RGB Channel Based Image Steganography Technique . . . . . . . . 470Gandharba Swain and Saroj Kumar Lenka
LSB Array Based Image Steganography Technique by Exploring theFour Least Significant Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Gandharba Swain and Saroj Kumar Lenka
Table of Contents – Part II XXV
Isolated Kokborok Vowels Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489Abhijit Debbarma
A Spatio-temporal Framework for Moving Object Detection in OutdoorScene . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Deepak Kumar Rout and Sharmistha Puhan
Two New Approaches of Independent Component Analysis . . . . . . . . . . . . 503V. Salai Selvam, S. Shenbagadevi, V. Padhma, D. Sujatha, andR. Sharmila
GAB CLIQDET: - A Diagnostics to Web Cancer (Web Link Spam)Based on Genetic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
S.K. Jayanthi and S. Sasikala
Grammar Checking System Using Rule Based Morphological Processfor an Indian Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
Lata Bopche, Gauri Dhopavkar, and Manali Kshirsagar
Object Recognition with Wavelet-Based Salient Points . . . . . . . . . . . . . . . . 532R. Ahila Priyadharshini, S. Arivazhagan, and S. Jeypriya
The Role of ICTs in Knowledge Management (KM) for OrganizationalEffectiveness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
R. Subashini, S. Rita, and M. Vivek
JPEG Compression and Decompression for Color Images Using LatticeBased Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
T.A. Sangeetha, A. Saradha, and Ilango Paramasivam
Detection of Car in Video Using Soft Computing Techniques . . . . . . . . . . 556T. Senthil Kumar, S.N. Sivanandam, and G.P. Akhila
A Survey of Different Stages for Monitoring Traffic Rule Violation . . . . . 566R. Aarthi, C. Arunkumar, and S. Padmavathi
Common Ground Method of Current Injection in Electrical ImpedanceTomography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Tushar Kanti Bera and J. Nagaraju
OO Metric Studies of Behavioral Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . 588Lavu Jayasudha, Sriraman Kothuri, and M. Venkata Rao
Optimizing a Tone Curve for Backward-Compatible High DynamicRange Image and Video Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
S. Aravind Kumar
Short - Text Mining Approach for Medical Domain . . . . . . . . . . . . . . . . . . . 606R. Kavitha, A. Padmaja, and P. Subha
XXVI Table of Contents – Part II
Multilevel Security in Cloud Computing Environment Using GracefulCodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
K. Govinda and E. Sathiyamoorthy
Let’s Play with Images and Private Data Using Stick of Randomness . . . 619Manish Mahajan and Navdeep Kaur
EJS Algorithm for Job Scheduling in Grid Environment . . . . . . . . . . . . . . 629K. Manikandan, Jacob P. Cherian, and Nikhil Scaria
Clustering of Concept-Drift Categorical Data Implementation inJAVA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
K. Reddy Madhavi, A. Vinaya Babu, and S. Viswanadha Raju
A Weighted Particle Swarm Optimization Technique for OptimizingAssociation Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
G. Maragatham and M. Lakshmi
Enhancement of Infrared Images Using Triangular Fuzzy MembershipFunction and Truncated Interval Thresholding . . . . . . . . . . . . . . . . . . . . . . . 665
S. Arun Bharathi, S. Logesh, and P.V.S.S.R. Chandra Mouli
Seizure Detection Using Parameter Estimation and Morlet WaveletTransform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
P. Grace Kanmani Prince and R. Rani Hemamalini
Evaluation of Classifier Models Using Stratified Tenfold CrossValidation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Swarnalatha Purushotham and B.K. Tripathy
Hybrid Approach for Construction of Summaries and Clusters of BlogData for Improved Blog Search Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
K. Saravanakumar and K. Deepa
Performance Evaluation of IEEE 802.11e Based Wireless LAN in MultiService Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
M. Singaravelan
Performance Analysis of Routing Metrics for MultiRadio MultiChannelWMN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Kavitha Athota, Stalin Babu, and Atul Negi
An Innovative Hybrid Hierarchical Model for Automatic ImageAnnotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
T. Sumathi and M. Hemalatha
An Adaptive Subspace Clustering Dimension Reduction Framework forTime Series Indexing in Knime Workflows . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
T.M. Bhraguram, Shekha Chenthara, Geethu Gopan, andAnu R. Nair
Table of Contents – Part II XXVII
Reliable Requirement Specification: Defect Analysis Perspective . . . . . . . . 740Sandeep Kumar Nayak, Raees Ahmad Khan, and Md. Rizwan Beg
Comparative Analysis of IR Based Web Service Similarity MeasuresUsing Vector Space Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752
Vaneet Sharma and Mukesh Kumar
Comparative Study of Bit Loading Algorithms for OFDM BasedSystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
Isha, Pankaj Rana, and Ravikant Saini
Comparison of PAPR of OFDM Systems Using CDF Plots for QAMand QPSK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
T. Durga Prasad, K.V. Kumar, P. Raju,R. Koteswara Rao Naik, and V. Santosh Kumar
Green Technology and Assessment of the Environment and ChallengesFaced by Regulatory Authorities in Uganda: A Case of the ElectricityRegulatory Authority (ERA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 780
Ezendu Ariwa and Isaac Wasswa Katono
Spectral Expansion Method for QBD and QBD-M Processes inPerformance Modeling of Computing and Communication Systems:A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794
Ram Chakka
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
Top Related