16
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT 2013) Tiruchengode, India 4 - 6 July 2013 Pages 1489-2231 IEEE Catalog Number: CFP1352J-POD ISBN: 978-1-4799-3927-5 3/3

NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

2013 Fourth International

Conference on Computing,Communications and

Networking Technologies

(ICCCNT 2013)

Tiruchengode, India

4 - 6 July 2013

Pages 1489-2231

IEEE Catalog Number: CFP1352J-POD

ISBN: 978-1-4799-3927-5

3/3

Page 2: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

TABLE OF CONTENTS

A Survey on Trust & Trust-Based Schemes In VANETs 1

M. Kavilha, Shrikant S. Tangade

Enhancing QoS Parameters of Group Mobility Model in WiMAX Networks for Military Applications 7

Shalini Easwaramoorthy, T. V. P. Sundararajan

An Efficient Feature Selection Paradigm Using PCA-CFS-Shapley Values Ensemble Applied to Small

Medical Data Sets 15S. Sasikala, S. Appavu Balamurugan, S. Geetha

Comprehensive Study on MANETs Network Layer Attacks 20

Gaurav Garg, Sakshi Kaushal, Akashdeep Sharma

Fusion Fingerprint Minutiae Matching System for Personal Identification 28

Pratixa I. Mislry, ChiragN. Paunwala

VHDL Implementation of UART with BIST Capability 34

Nitin Patel, Naresh Pale!

Challenges & Approaches in Multi-label Image Annotation 39

A. Kalaivani, S. Chitrakal

Objective Assesment of Different Segmentation Algorithm for Underwater Images 47

Jay C. Acharya, Sohil A. Gadhiya, Kapil S. Raviya

Efficient QR Decomposition Algorithm for LTE Standard 54

K. Kalyani, D. Sellalhambi, S. Rajaram

Concentration Control ofCSTR Through Fractional Order PID Controller by Using Soft Techniques 59

Abhishek Singh, Veena Sharma

Surveyon Privacy Preserving Updates on Unidentified Database 65

E. Gokulakannan, K. VenkalachalapathyA Survey on Scalable Image Indexing and Searching 70

S. Suchitra, S. Chitrakala

Low Power Analysis of MAC Using Modified Booth Algorithm 75T. S. UdhayaSwiya, A. Alii Rani

Effectiveness of RTS/CTS in IEEE 802.11 Wireless Adhoc Network in Light of Order DependentCapture 80

Kulsum I. Patel, Mayur M. Vegad

Packet Hiding Using Cryptography with Advanced Key Management against Counter JammingAttacks in Wireless Sensor Networks 86

S. swaminathan, S. suganya, K. Ambika

Improved Power Control for Femtocells in the Presence of Channel Uncertainty 90

5. Gokila, P. Padmaloshani, S. Nirmala

A Novel Asymmetric Coplanar Strip Fed Antenna for Dual Band Application 96K. A. Ansal, T. Shanmugantham

Ontology Based Clustering Algorithm for Information Retrieval 100

Nadana T. Ravishankar, R. Shriram

A Novel Approach for USB2.0 Validation on System on Chip 104

Maneesh Kumar Pandey, Shwetank Shekhar, Joginder Singh, GauravKumar Agarwal, Nitin Saxena

Intrusion Detection System Using Stream Data Mining and Drift Detection Method 108

Manish Kumar, M. Hanumanthappa

Performance Improvement of RMSA Using Different Substrates 113

SurajRabindranath, M. Utkala Prakash, D. Chetana, Mahesh M. Gadag

Security for Wireless Sensor Networks in Military Operations 118

Rajat Gupta, Pallavi Singh ,Kaushal Sultania, Archil Gupta

Fractional Order Controller for Trajectory Tracking of a Two Degree of Freedom Robot

Manipulator 124Amala Preyadarchanc, Srinivasan Alavandar

Result Evaluation of Transaction and Occurrences Based on Density and Zonal Minimum Support 128

PreetiKhare, Hitesh GuptaIssues ofMANET Routing Protocols on 4G Network 134

Shamurailatpam Susanta, Khomdram Barun, Robert Hijam, Rashree Rajkumari

Automatic Generation of Emotions for Social Networking Websites using Text Mining 142

Tejasvini Patil, Sachin Patil

Page 3: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Voltage Intensity Based Non-Invasive Blood Glucose Monitoring 148

K. A. Unnikrishna Menon, Deepak Hemachandran, Abishek Thekkeyil Kunnath

Entanglement Distillation Using Various Quantum Channels 153

Akash Vcrma, Abhinav Pandey. Sankel Nandan, P. K. Panigrahi

NextGen Data Persistence Pattern in Healthcare: Polyglot Persistence 159Srikrishna Prasad, M. S. Nunifar Sha

Classification Based Survey ofImage Registration Methods 167Kralika Sharma, Ajay Goyal

Performance of Secured Zone Routing Protocol due to the Effect ofMalicious Nodes in MANETs 174

Dilli Ravilla, Chandra Shekar Reddy Putta

Enhanced Fast Emergency Path Schema (EFEP-S) to Redcue Packet Loss During MultipleIndependent Link Failure in OSPF Routing 182

V. Janani, R. Chandrasekar

Analysis of Two Novel Chaotic Systems with a Hyperbolic Sinusoidal Nonlinearity and their AdaptiveChaos Synchronization 187

Sundarapandian VaidyanathanRS Scheduled Multiple Mobile Sinks in WSNS with Delay Constrained Approach 195

M. Sudha, J. Sundararajan, K. Kavilha

Classification of Selected Medicinal Plant Leaves Using Texture Analysis 202T. Sathwik. R. Yasaswini, Roshini Venkatesh, A. Copal

A Review on Illumination Techniques in Augmented Reality 208Divya Kamboj, Wankui Liu, Neelika Gupta

Depth - Based Segmentation- a Review 217Neelika Gupta, Weipeng Xu, Divya Kamboj

Classification of Electrooculograph Signals: Comparing Conventional Lassifiers Using CBFS Feature

Election Algorithm 2265. Mala, K. Latha

Removal of Black Hole Attack in AODV Routing Protocol of MANET 233Ketan S. Chavda, Ashish V. Nimavat

Realization of Reconfigurable FLC on ADSP-BF537 Processor 238P. Maji, S. K. Patra, K. K. Mahapalra, J. Govindarajan, J. J. Patel

Integrating MAPD in Mobility Architecture using MIPv6 242R. Venkadesh, V. Nehru, K. Rajan

Active Controller Design for the GPS ofFour-Wing Chaotic Systems 247Sundarapandian Vaidyanathan, Sarasu Pakiriswamy

Enhancing TCP Performance in Multihop Ad Hoc Networks 255Minakshee Patil. Ashwini Patil

Interpretation of User Intention Via Textual and Visual Resemblance 261Chailali Pawar, Sachin Patil

Agent Based Tool for Topologically Sorting Badsmells and Refactoring by Analyzing Complexities inSource Code

267S. Ayshwaryu Lakshmi, S. A. Sahaaya Arul Mary, S. Shamnuga Vadivu

Verification and Validation of MapReduce Program Model for Parallel K-Means Algorithm on

Hadoop Cluster274

Amresh Kumar, M. Kiran, B. R. Prat hapA Methodology for Ranking Cloud System Vulnerabilities 282

Patrick Kamongi, Srujan Kotikela, Mahadevan Gomalhisankaran, Krishna Kavi

Stochastic Analysis of Data Collection Using Mobile Sink with Fixed and Variable Trajectories 288S. Pushpavalli, K. Indra Gandhi

Separation and Recognition of Overlapped Latent Images 2935. Jeyamhi, N. Uma Maheswari, R. Venkatesh

Real Time Speaker Recognition of Letter 'ZHA' in Tamil Language 299A. Srinivasan

Performance Analysis of Montgomery Multiplier for Public Key Cryptosystem 304Sandeep Kakdc. G. Somulu, Pravin Zode

Implementation of Xenserver to Ensuring Business Continuity Through Power ofVisualization forCloud Computing 309

N. Stualinprasannah, S. SuriyaStochastic Analysis of Data Collection Using Mobile Sink with Fixed and Variable Trajectories 315

5. Pushpavalli, K. Indra Gandhi

Ensemble Based Optimal Classification Model for Pre-diagnosis ofLung Cancer 320K. Balachandran, R. Anitha

Page 4: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

URED: Upper Threshold RED an Efficient Congestion Control Algorithm 327

Chandni M. Patel

A Novel Approach for Image Enhancement by Using Contrast Limited Adaptive HistogramEqualization Method 332

5. Muniyappan, A. Allirani, S. Saraswathi

Data Security in Cloud Using RSA 338

Pachipala Yellamma, Challa Narasimham, Velagapudi sreenivas

Viper Snake Intelligent Algorithm Using Missile Tracking and Attacking System 344

M. Venkateswaran, M. Backialakshmi

Protection of Depth-image-based Rendering 3D Images Using Blind Watermarking 349

K. A. Arun, Jeno P. Poul

Evaluation Performance Study of Firefly Algorithm, Particle Swarm Optimization and Artificial Bee

Colony Algorithm for Non-Linear Mathematical Optimization Functions 355

Siddharth Agarwal, Amrit Pal Singh, Nit in Anand

Wireless Embedded Device (PIC) Based on MiWi Technology for Monitoring PhysiologicalParameters 363

Nurul S. Hidaya, P. Jenopaul

Comparison of Data Mining Classification Algorithms for Breast Cancer Prediction 369

Chintan Shah, Anjali G. Jivani

Mining Hidden Communities in Social Networks Using KD-Tree and Improved KD-Tree 373

Renuga R. Devi, M. Hemalatha

Characterization of an Optical Communication System Utilizing Dispersion Compensating Fiber and

Nonlinear Optical Effects 380

K. Miziya, S. K. Sudheer, Alina C. Kuriakose

An Effective Numbering and Classification System for Dental Panoramic Radiographs 386

Vijayakumari Pushparaj, Ulaganathan Gurunathan, BanumalhiArumugam, Abhinaya Baskaran, Alamelu

Valliappan

Design and Implementation of a BIST Embedded High Speed RS-422 Utilized UART over FPGA 394

Shumit Saha, Ashikur Rahman, Amit Thakur

Improving Dynamic Data Integrity Verification in Cloud Computing 399

Trushna S. Khatvi, G. B. Jelhava

Energy Aware Optimal Cluster Head Selection in Wireless Sensor Networks 405

M. Natarajan, R. Arthi, K. Murugan

Bio-inspired Algorithm for Optimizing the Localization of Wireless Sensor Networks 409

A. Tamizharasi, R. Arthi, K. Murugan

Image Encryption Using Separable Reversible Data Hiding Scheme 414

M. Smitha, V. E. Jayanthi, Ajitha Merlin

Multi-tenant SaaS Cloud 420

Gurudatt Kulkarni, Rupali Shelke, Rajnikant Palwe, PrasadKhatawkar, SadanandBhuse, Hemant Bankar

Low Cost Real Time Vehicle Tracking System 424

Rohit Minni, Rajat Gupta

Information Gradien Based Content Search Architecture for Mobile Opportunistic Network 429

Suvadip Batabyal, Parama Bhaumik

Multi Pattern Matching Technique on Fragmented and Out-of-Order Packet Streams for Intrusion

Detection System 437

Manish Kumar, M. Hanumanthappa

An Efficient Web Recommender System Based on Approach of Mining Frequent Sequential Pattern

from Customized Web Log Preprocessing 443

Manisha Valera, Uttam Chauhan

Deployment ofFemtocell and Antenna in Commercial 449

Lavina Balraj, R. Kavitha

Second Order Twisting Sliding Mode Control of Multi-agent Network with Input Disturbance 454

Udayan B. Kamble, Jayalkshmi O. Chandle, V. S. Lahire, R. D. Langde

Improve the Performance of LRU Page Replacement Algorithm using Augmentation of Data

Structure 460

C. C. Kavar, S. S. Parmar

Data Mining Based CIDS: Cloud Intrusion Detection System for Masquerade Attacks [DCIDSM] 465

Jain P. Pratik, Madhu B. R.

Incremental PSVM for Underwater Target Classification with Incorporation of New Classes 470

Poonam Panchal, Sarath Gopi, R. Pradeepa

Low-Power and Area-Efficient Carry Select Adder Using Modified BEC-1 Converter 476

L. Mugilvannan, S. Ramasamy

Page 5: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

TEST PATTERN GENERATION FOR BENCHMARK CIRCUITS using LFSR 481

Chengani Vinod Chandra, S. Ramasamy

Sine/cos Generator for Direct Digital Frequency Synthesizer Using Pipelined Cordic Processor 487

P. Saravanan. S. Ramasamy

Reliable OSPM Schema for Secure Transaction Using Mobile Agent in Micropayment System 493

Chitra N. Kiran, G. Narendra Kumar

Evaluation of Tumor Segmentation 499

Sonam Bansal, Ajay Miltal

Hand Gesture to Speech Conversion Using Matlab 503

R. R. Itkarkar, Anil V. Nandi

Adoption of Business Intelligence: In Hotel Industry 507

M. Daryaei, M. Shirzad, V. Kumar

Optimization of Migration Downtime of Virtual Machines in Cloud 513

J. Arpulharaj Johnson

Bandwidth Map-TCP Friendly Rate Control Algorithm for Improving QoS in StreamingApplications 518

K. Suresh KumarReddy, D. Rajaveerappa, S. Khadeeja Banu

Shot Boundary Detection Using Color Correlogram and Gauge-SURF Descriptors 524

C. R. Deepak, Umesh R. Babu, Khande Bharath Kumar, C. M. Rahul Krishnan

Enhancement of Coarse- Grained Parallel Genetic Algorithm for Shortest Path Routing 529

L. Venkatesan, P. Sivakumar

Reputation-Based Mechanism to Mitigate Misbehavior in Mobile Ad Hoc Networks 535

P. Mani, P. Kamalakkannan

Performance Evaluation of Encryption Techniques and Uploading of Encrypted Data in Cloud 540

V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma

Virtual World for Education and Entertainment 546

Ravinsingh Jain, Srikanl Iyengar, Ananyaa Arora

An Algorithm to Enhance Security in RSA 552

Rohil Minni, Kaushal Sullania, Saurabh Mishra, Durai Raj Vincent

Mitigating Distributed Denial OfService Attacks In Multiparty Applications In The Presence Of

Clock Drifts 556

P. Malalhi

Framework for Enhanced Joint Connectivity and Coverage Using Random Based Distribution in

WSN 562

Deepak S. Sakkari, T. G. Basavaraju

An Improved Motion Detection and Tracking of Active Blob for Video Surveillance 569Michael Kamaraj, Balakrishnan

Evolving Profligate and Conspicuous Web Applications Using Reverse AJAX_ICCNT 576Rachit Mohan Garg, Mohpreel Singh

Performance Analysis of Branch-and-Bound Approach with Various Model-Selection ClusteringTechniques for Image Data Point 581

C. S. Sasireka, P. Raviraj

Evaluating MANET Routing Protocols Under Multimedia Traffic 590

Ajinkya D. Kadam, Sharad S. WaghDetection of Brain Tumor Using Neural Network 595

V. Amsaveni, N. Albert Singh

Optimization of Encryption Technique Using Evolutionary Algorithm for Protecting Multimedia

Contents in P2P System 600Ramesh Shahabadkar, Ramachandra V. Pujeri

Behavior Recognition in Surveillance Video Using Temporal Features 606J. Arunnehru, M. Kalaiselvi Geetha

Gear Tooth Fault Detection by Autoregressive Modelling 611Ncela K. Nikhar. Sanika S. Patankar, Jayant V. Kulkarni

Robust and Cost-Effective Security Algorithm for Pre-Stage and Post-Stage of Data Aggregation 617M. A. Bharathi, B. P. Vijaya Kumar, D. H. Manjaiah

Addition of Polydimethylsiloxane in FOS Technology for Sustainable Sensing 623M. H. B. Afzal

Architecture Design of Illumination Change Progressive Motion Estimation Algorithm 629Madhwi Bamankar, P. Muralidhar, C. B. Ramarao

Energy Efficient Spinal Scheduling On Mobile Sensors 633M. Sudha, J. Sundararajan, R. Priya

Page 6: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Modified Full Search Block Matching Algorithm 638

Madhuri Bamankar, P. Muralidhar, C. B. Ramarao

Classification and Retrieval of Natural Scenes 642R. Raja, S. Mansoor Roomi, D. Dharmalakshmi

Identifying Trusted Routing Path in WSNS Through TARF 650

S. ANITHA, A. NITHYA

Automatic Registration of Images with Simulated Rotation and Translation Estimation UsingHAIRIS 655

K. Priyadharshini

Intrusion Detection System on MAC Layer for Attack Prevention in MANET 663

Tapan P. Gondaliya, Maninder Singh

Efficient Method for Controlling Electric Power by Automated Monitoring System using FPGA 668

R. Kannan, Suresh T. R. Kumar

Smooth Query Processing In Spatial Database 672

Tukaram Gawali, R. B. Wagh

Separation and Localisation of Heart Sound Artefacts from Respiratory Data by Adaptive Selection

of Eigen Triples in Singular Spectrum Analysis 677

Shinto Sebastian, S. Rathnakara

A Novel Algorithm for Fingerprint Identification Using Ellipse Method 682

M. J. Asha

Finite Time Consensus for Leader Following Multi-agent System with Distributed Observer Design 686

V. S. Lahire. J. O. Chandle, V. D. Dhaigude, A. A. Suste

High Performance Distributed Computing 692

Sneha Kumari

Double Image Encryption Using Double Pixel Scrambling and Linear Canonical Transform 696

Narendra Khatri, Navneet Agrawal

Detecting Anomalies in WLAN using Discrimination Algorithm 701

P. Kavitha, M. Usha

High Performance Low Power Dual Edge Triggered Static D Flip-Flop 707

Gagandeep Singh, Gurmohan Singh, Vemu Sulochna

Hybrid Fuzzy Classifier Based on Feature-wise Membership Given by Artificial Neural Network 712

U. V. Kulkarni. S. V. Shinde

RESTful Web Service Integration Using Android Platform 718

Mohammed Husain Bohara, Madhuresh Mishra, Sanjay ChaudharyA Remote Experimentation Using Virtual Laboratory 724

Chandrashekhar Gode, M. S. Madankar

Enhanced Fault Tolerance Using EMRC in Wireless Communication 730

Sadanand Patil, Ketki Khante

Domain Specific Modeling Framework for Agent Development 735

P. FelcyJudith, E. Kirubakaran

Review : Performance Evolution of different Detection Techniques in V-BLAST 740

Pratik P. Jariwala, Pranav Lapsiwala

Performance Evaluation and Comparison of Routing Protocols in MANETS 745

Tejashree S. Khanvilkar, K. P. Patil

Enhanced Ant Clustering Algorithm (EACA) For Distributed Databases 749

K. Sumangala

Design and Analysis of I-shaped MIMO Antenna for Wireless Applications 753

A. VISHWAPRIYA, S. BANU, R. YOGAMATTHI

Performance Evaluation of Color Image Segmentation Using K Means Clustering and Watershed

Technique 758

Sugandhi Vij, Sandeep Sharma, Chelan Marwaha

Towards a Cross Layer Framework for Improving the QoS of Delay Sensitive HeterogeneousWMSNs 762

S. Sridevi, M. Usha

Bandwidth Enhancement of Microstrip Patch Antenna Using Different Structures of Dielectric

Resonator 767

Harshil N. Prajapali, Jayesh C. PrajapatiEmbedded VoIP Communication System with Graphical User Interface Features 774

G. S. Divya, P. C. Srikanth

A Dynamic Hybrid Approach for Wormhole Detection and Prevention 780

Ankit Mehto, Hitesh Gupta

Page 7: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Cloud Resource Provisioning for Amazon EC2 784

Vidya K. Bhise, Ajit S. Mali

A Comparative Performance Evaluation ofEvolutionary Algorithms for Optimal Design ofThree-

phase Induction Motor 791

Soumya Ranjan, Sudhansu Kumar Mishra, Subhendu ku. Behera

Simple Pendulum Analysis - a Vision Based Approach 796

R. Kavitha, Umesh R. Babu. C. R. Deepak

Anti-Synchronization of Rabinovich Systems using Active and Adaptive Controllers 801

Sundarapandian Vaidyanathan, Karlhikeyan Rajagopal

Test Power Minimization of VLSI Circuits: A Survey 807

Senlhil G. Kumar. K. Paramasivam

Effective Dictionary Based Data Compression and Pattern Searching in Dictionary Based

Compressed Data 813

Pooja Jain, Anuragjain, Chelan Agrawal

LMP-DSR: Load Balanced Multi-Path Dynamic Source Routing Protocol for Mobile Ad-HOC

Network 819

Lokesh Kumar Malviya, Damodar Tiwari

Brain Computing Interface For Wheel Chair Control 823

Naveen R. S., Anitha Julian

Role of Signal Processing for Estimating the Wall Thickness for TWI System 828

Sandeep Kaushal, Dharmendra Singh

Fuzzy Based Clustering Method on Yeast Dataset with Different Fuzzification Methods 835

P. Ashok, G. M. Kadhar, E. Elayaraja, V. Vadivel

Tumour Detection in Brain MRI Using Improved Segmentation Algorithm 841

Praveen E. Kumar, Manoj V. Kumar, M. G. Sumithra

A Novel and Efficient Key Sharing Technique for Web Applications 848

P. M. Durai Raj Vincent, E. Salhiyamoorthy

Gain and Bandwidth Enhancement of Aperture Coupled Rectangular DRA 853

Sarila Singh, Rajveer S. Yaduvanshi

Performance Analysis of QoS Based Model for Wireless Network Communication 858

Beaulah David, P. RavirajInter-cell Interference Mitigation for Cell Edge Users 864

R. Rajesh, K. Muruganandam

Fusion Fingerprint Minutiae Matching System for Personal Identification 869

Pralixa I. Mistry, Chirag N. Paunwala

An Improved Location-aware Ant Colony Optimization Based Routing Algorithm for MANETs 875

Ajit R. Bandgar, Sandeep A. Thorat

Cross Layer Approach to Detect Malicious Node in MANET 881

Vidya N. Patil, Sandeep A. Thorat

Design and Implementation of Data Acquisition and Control System for Multi-Wavelength DayglowPhotometer 887

K. Miziya, K. G.Gopchandran, P. Pradeepkumar, C. Vineeth, T. K. Panlh, P. G. Anumod

A New Energy Efficient Routing Algorithm for Network Lifetime Maximization in Wireless Sensor

Network 894Dhaval J. Rana, Nirav M. Raja

A Load Balancing Algorithm For Private Cloud Storage 901

B. Prabavathy, K. Priya, Chitra Babu

Rational Unified Process for Service Oriented Application in Extreme Programming 907

G. Sivanageswara Rao, V. Phani Krishna, K. Rajasekhar rao

Handling Concurrency Control Problem in Web Service Compositions 913

Shyam S. Sundar, R. Kanchana

Hybrid Technique for User's Web Page Access Prediction Based on Markov Model 918

Priyanka S. Panchal, Urmi D. Agravat

Chaos Synchronization of Coplitts Oscillator Via Backstepping Control 926

Sundarapandian Vaidyanathan, Suresh Rasappan

Quantitative Analysis and Fracture Detection of Pelvic Bone X- Ray Images 931

R. Vijayakumar, G. Gireesh

A Survey on Energy Efficient Routing Protocols in Wireless Sensor Network 938

Savita Lonare. Gayatri Wahane

Modeling and Optimization of Extraction- Transformation-loading (ETL) Processes in Data

Warehouse: an Overview 943Nitin Anand. Manoj Kumar

Page 8: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

DWT-SVD Based Reversible Watermarking Algorithm for Embedding the Secret Data in Medical

Images 948

Praveen E. Kumar, Remya Elizabeth Philip, Sunil P. Kumar, M. G. Sumilhra

A Novel Approach for Heart Beat Counting of Daphnia Pulex 9555. Mansoor Roomi, B. Ananta Narayanan, S. Rohini

Network Architecture and Security Issues in Campus Networks 961

MohammedNadirBin Ali, M. LutfarRahman, SyedAkhter Hossain

An Efficient Framework for Resource Allocation in Cloud Computing 970

Aman Kumar, Emmanuel S. Pilli, R. C. Joshi

Blackhole Attack Detection and Prevention by Real Time Monitoring 976

Durgesh Kshirsagar

FPGA Implementation ofHilbert Transform Via Radix-Pipilined FFT22

Processor 981

Archna Rani, Ram Mohan Verma, Saurabh Jaiswal

A Novel Technique for Medical Image Fusion Using Improved Contourlet Transformation with

Modified DFBs 985

Jaspreet kaur, Shefaly Sharma, Shipra GuptaDetection and Tracking of Moving Objects by Fuzzy textures 990

S. Mohamed Mansoor Roomi, S. Ann karpaga

Security Framework for VANET for Privacy Preservation 995

V. S. Chelan, N. S. Benni, C. Bhushan

An Automatic Contrast Enhancement Method Based on Stochastic Resonance 1001

G. Maragatham, S. Mansoor Roomi

Security and Design ofa Cryptoprocessor for Pairings Over BN Curves on FPGA Platform 1008

Sanihi Maria Joy, V. M. Senthil kumar

A Hybrid Method Based on Genetic Algorithm, Self-organised Feature Map, and Support Vector

Machine for Better Network Anomaly Detection 1013

S. Anil, R. Remya

Design a Peer to Peer Overlay Protocol for Mobility Management of Mobile Nodes Using Bluetooth

Media 1018

Abdollah Mohammadi, BehzadAkbari

Design and Fpga Implementation of Binary Squarer Using Vedic Mathematics 1024

L. Sriraman, K. Saravana Kumar, T. N. Prabakar

Bistate Speckle Removal Filter Based on Noise Variance 1029

P. Vasuki, S. MohamedMansoorRoomi

Improved Modified Fast Haar Wavelet Transformation [MFHWT] Based Visible Watermarking 1036

Shefaly Sharma, Jaspreet Kaur, Shipra Gupta

Robust Self Tuning ofFuzzy Sliding Mode Control 1041

G. V. Lakhekar, V. D. Saundarmal

On Hybridizing Fuzzy Min Max Neural Network and Firefly Algorithm for Automated Heart Disease

Diagnosis 1048

B. R. Rajakumar, Aloysius George

Nucleotide Transfigurations Using Playback Conversion 1053

Balamurugan Kathiresan, G. M. Karthik

A Neural Network Approach for Disease Forecasting in Grapes Using Weather Parameters 1058

S. Sannakki, V. S. Rajpurohit, F. Sumira, H. Venkatesh

A Efficient Key Strategy For Prolonging Network Lifetime in Wireless Network 1063

Neha Gupta, Anurag Jain, Harsh Kumar Singh

Diagnosis and Classification of Grape Leaf Diseases using Neural Networks 1067

Sanjeev S. Sannakki, Vijay S. Rajpurohit, V. B. Nargund, Pallavi Kulkarni

An Enhanced Virtual Carrier Mechanism for MANET With Multi Rate Traffic Subdomains 1072

M. Abdul Gafur, Niraj Upadhayaya, SyedAbdul Sattar

Active Key Management Scheme to Avoid Clone Attack in Wireless Sensor Network 1077

P. Thiruvannamalai Sivasankar, M. Ramakrishnan

An Approach to Detect Malicious Activities in SCADA Systems 1081

T. C. Pramod, N. R. Sunitha

RFID Based Health Assistance & Monitoring System through a Handmounted Embedded Device 1088

Divyesh Dixit, Ankit Kalbande, K. M. Bhurchandi

Technique for Detection of Cooperative Black Hole Attack in MANET 1097

Gayatri Wahane, Savita Lonare

Coherent BPSK Demodulator Using Costas Loop and Early-Late Gate Synchronizer 1105

P. Shachi, Rahul Mishra, Ravi KumarJatoth

Page 9: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Robust Detection & Tracking of Object by Particle Filter Using Color Information 1111

Ashveani Kumar, Sudhanshu kumarmishra, Pranjnaparimita Dash

Performace and Energy Efficient Greedy Forwarding Method for Sensor Networks 1117

Shradha P. Dugam, S. P. Pingal

Reduced Order Linear Functional Observers for Large Scale Linear Discrete-Time Control Systems 1122

Sundarapandian Vaidyanathan, Kavitha Madhavan

Distributed Trust & Time Management Strategy in VANETs 1129

M. Kavitha, Shrikant S.Tangade, SunilKumar S. Manvi

HEFT Based Workflow Scheduling Algorithm for Cost Optimization Within Deadline in HybridClouds H35

Nitish Chopra, Sarbjeet SinghNeuro-fuzzy Classifier Based on the Gaussian Membership Function 1141

U. V. Kulkarni, S. V. Shinde

Exploiting GNU Radio and USRP: An Economical Test Bed for Real Time Communication Systems 1148

M. Abirami, V. Hariharan, M. B. Srulhi, R. Gandhiraj, K. P. Soman

Optimized Data Analysis in Cloud Using BigData Analytics Techniques 1154

5. Ramamoorlhy, S. Rajalakshmi

Very High Resolution Image Registration Based on Two Step Harris-Laplace Detector and SIFT

Descriptor 1159

Kralika Sharma, Ajay Goyal

Traffic Analysis using Discrete Wavelet Transform and Bayesian Regression 1164T. Nishidha, P. Janardhanan

Energy Efficient Clustering Scheme Based On Grid Optimization Using Genetic Algorithm for

Wireless Sensor Networks 1174

Gagandeep Kumar, Jaget Singh

Improving Tcp Performance in Wireless Network During Vertical Handoff from WiFi to WiMAX 1179K. Abirami, S. Solhya Priya, K. Murugan

User-centric Trust Based Identity As a Service for Federated Cloud Environment 1183E. Samlinson, M. Usha

Multi-level and Multi-key Trust in PPDM 1188A. V. Sriharsha, C. Parlhasaralhy

Fuzzy Rule Based Data Forwarding for Energy Efficient Wireless Sensor Networks in IndustrialControl System 1193

S. Jisha, Sangeelha Jama]

Design and Implementation of an Automatic Beverages Vending Machine and its Performance E

valuation Using Xilinx ISE and Cadence 1199V. V. S. Vijay Krishna, A. Monisha, S. Sadulla, J. Pralhiba

Real-time Implementation and Performance Analysis ofan Intelligent Fuzzy Logic Controller forLevel Process 1205

P. Manikandan, M. Geetha, T. K. Vijaya, K. S. Elamurugan, V. Silambarasan

LEACH-SCH: An Innovative Routing Protocol for Wireless Sensor Network 1211Ankit Solanki, Nileen B. Palel

Obsolescence Risk Optimization Using Fuzzy Logic and Genetic Algorithm 1216Amir Kouhpayehzadeh Esfahani, BehzadDarbeheshty. Sedigheh Kouhpayehzadeh Esfahani, AH Akbar Niknafs

Hybrid Association-classification Algorithm for Anomaly Extraction 1221Gaurav shelke, AnuragJain, Shubha dubey

Stand-alone Photovoltaic / Wind Energy Hybrid Generation System with MPPT for Rural

Applications 1226R. Karlhikeyan, P. Mahalakshmi, N. GowriShankar

Minimization of Position Uncertainty Using 3-D Stereo Imaging Technique for the Real-Time

Positioning ofa Handheld Breast Tissue Anomaly Detection Probe 1232ParvindK. Grewal. K. S. Viswanath. Farid Golnaraghi

Implementation ofVoice Based Wheelchair For Differently Abled 1238M. BALA KUMARAN, A. Pravin Renold

Evacuation Map Generation Using Maze Routing 1244Arushi Jain

A Faster Genetic Algorithm to Solve Knapsack Problem Employing Fuzzy Technique 1250Shalini Mahalo, Sanjay Biswas

Analysis of Sentiment on Newspaper Quotations: A Preliminary Experiment 1257S. Padmaja, Sameen S. Fatima, Sasidhar Bandu

Page 10: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

EMP (Electro-Magnetic Pulse) Weapon Technology along with EMP Shielding & Detection

Methodology 1262

Viren Pereira, G. R. Kunkolienkar

FPGA Implementation of Reliable and Energy Efficient Architecture for a LTE Uplink System 1267

G. Indumathi, Allin Joe

High Efficiency Biquad Infinite Impulse Response Filter Using Charge Recovery Logic Family 1274

K. Chinnusamy, K. Duraiswamy, K. Surya

OFDM Transceiver Design Using C 1280

Indira Bahaddur, C. L. Triveni, P. C. Srikanth

Automatic Verification of Test Oracles In Functional Testing 1284

T. R. Monisha, A. Chamundeswari

Generating Test Cases for Q-Learning Algorithm 1288

Lavanya Kumaresan, A. Chamundeswari

An Enhanced Method for Privacy Preservation in Data Publishing 1295

Christy Thomas, Diya Thomas

Pell's RSA Key Generation and its Security Analysis 1300

Chandra T. segar, R. Vijayaragavan

Design of Impulse Distributed Waveform Generator 1305

S. Janaki, Siva Yellampalli

OFDM Transceiver Design Using C 1311

Indira Bahaddur, C. L. Triveni, P. C. Srikanlh

Novel Defense Mechanism against Data Flooding Attacks in Ad Ho. Network 1315

Indira Bahaddur, C. L. Triveni, P. C. Srikanth

Recent Computing Techniques of ECG 1320

G. Chandra Mohan, SwapnaDevi

Double Threshold Energy Aware Load Balancing In Cloud Computing 1324

Jayant Adhikari, Sulabha Patil

Performance Evaluation ofVirtual Machine (VM) Scheduling Policies in Cloud Computing:(Spaceshared & Timeshared) 1330

Sumit Khurana, Khyati Marwah

Multicasting ofVideo Stream Over Wimax Network 1335

A Chandra, P. Saravanaselvi, P. Latha

A Survey on Attacks, Security and Trust Management Solutions in VANETs 1340

Shrikant S. Tangade, Sunilkumar S. Manvi

Detection of Lung Cancer Nodules Using Automatic Region Growing Method 1346

S. SHAIK PAR VEEN, C. KAVITHA

Automated Static Data Flow Analysis 1352

IshwariAghav, Vishal Tathe, Aashay Zajriya, M. Emmanuel

Taguchi's Loss Function Based Measurement ofMobile Ad-Hoc Network Parameters under AODV

Routing Protocol 1356

Vinod Mahor, Sandeep Raghuwanshi

Network Device Driver for RTL8139C 1363

G. N. Chandan, H. C. Praveen, K. N. Muralidhara

A Novel Boundary Approach for Shape Representation and Classification 1369

L. Sumalatha, B. Sujatha, P. Sreekanth

Improving the Efficiency ofRetrieved Result Through Transparent Proxy Cache Server 1373

S. Kalarani, G. V. Uma

Automated Stock Price Prediction and Trading Framework for Nifty Intraday Trading 1381

AparnaAnant Bhal, Sowmya S. Kamaih

Blur Estimation Using Polynomial Curve Fitting Algorithm for Image Restoration Using Blind

Deconvolution 1387

Smita S. Patil, Pramod M. Kanjalkar, Jayant V. Kulkarni

A Comparative Study of Various Object Oriented Testing Techniques 1392

Prashanl Vats, Sushila Madan, Anjana Gosain

An Approach to Improve Apriori Algorithm Based On Association rule Mining 1400

Chanchal Yadav, Shuliang Wang, Manoj Kumar

An Enhanced Security Algorithm for Wireless Application Using RSA and Genetic Approach 1407

G. Prema, S. Natarajan

Resource Aware Scheduling in Hadoop for Heterogeneous Workloads Based on Load Estimation 1412

Sutariya B. Kapil, Sowmya S. Kamath

Hardware Software Co-simulation ofDual Image Encryption Using Latin Square Image 1417

Naveen Kumar, Sharath Kumar, H. T. Panduranga

Page 11: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Global Optimization for 3-D Reconstruction of Coronary Artery Trees from Angiographic ImageSequence 1422

Mahima Goyal, Jian Yang, Arun Prakash Agrawal. RuoxiuXiao

Capacity and SINR Improvement Through Inter-cell Interference Management in LTE Femtocell

Networks 1427

Anand Bhikhubhai Patel. Sukant K. Chhotamy, Niteen B. Patel

Secure Energy Management System Using Embedded Fuzzy Controller 1432

Deepiga Ravi, A. S. Dharani, S. Sandhya, Kanthalakshmi

CH-MAC: Congestion Control Hybrid MAC for Wireless Sensor Network 1438

B. Priya. S. Solai Manohar

A system to Filter Unsolicited Texts from Social Learning Networks 1444

Sunil Yadav. S. Das, D. Rudrapal

Design of Free Space Optical Communication Link with Mach-Zehnder Optical Modulator for LongDistance I449

Nitin Garg, Sanjeev Kumar

A Time Space Cryptography Hashing Solution for Prevention Jellyfish Reordering Attack in Wireless

Adhoc Networks 1454

Hera/P. Patel, M. B. Chaudhari

Introduction To Fibre-Optic Sensing System And Practical Applications In Water Quality

Management 1460

M. H. B. Afzal

An Artificial Immune System with Local Feature Selection Classifier for Spam Filtering 1469

Mayank Kalbhor, Shailendra Shrivastava, Babita Ujjainiya

DIP: Detection of Invalid Packets in Vehicular Ad-hoc Networks (VANETs) 1476

M. Maheswari. R. Muthumeenakshi, C. Chinthamani. K. Murugan

Automated Techniques and Tools for Program Analysis : Survey 1482Kulkarni A. Ashi.ih, Jagannath Aghav

Signed Fixed-point Multiplier for DSP Using Vertically and Crosswise Algorithm 1489

M. Ashwalh, B. S. Premananda

Earth Moon Communication Incorporated Internet Webpage Based Control for Robots 1495C. Abilash, B. Lakshminath

Analysis of Required Resources for a Node Using Queue System in an Ad hoc Network 1500

Vahid Haghighaldoosl, Siavash Khorsandi

Querying RDF and OWL Data Source Using SPARQL 1507Naveen Kumar, Suresh Kumar

Optimized - Block Based Trace Cache 1553P.Sreeram, Pradeep.K. Mukherjee

A Hybrid-Token and Textual Based Approach to Find Similar Code Segments 1518Akshat Agrawal, Sumil Kumar Yadav

Cross Layer Awareness Optimization Between Physical Layer and MAC Layer of Wireless

Infrastructure Based Network Using Bio Inspired Algorithm 1522Vinay Verma, Savila Shiwani

RFID Based Student Monitoring and Attendance Tracking System 1525SA1KR1SHNA CHATRATI, SUMANTHNAIDU, CHRAGHAVA PRASAD

Location Awareness of the Cloud Storage with Trust Management Using Common DeploymentModel 1530

C. Saravanakumar, C. Arun

VM Level Load Balancing in Cloud Environment 1535M. Ajil. G. Vidya

FPGA Implementation for Generation of Six Phase Pulse Compression Sequences 1540M. K. Verma. B. S. Premananda

Implementing a Power Aw are QoS Constraints Routing Protocol in MANETs 1545Shivashankar, G. Varaprasad, H. N. Suresh, G. Devaraju

On the Combined Beamforming with Space-Time-Frequency Code in MIMO-OFDM Systems 1552Neeraj Shrivastava. Aditya Trivedi

A Novel Capacitive RF MEMS Switch Design for Low Voltage Applications 1557Tejinder Singh. Navjot Khaira, Jitendra Sengar

Calculations of the Impact on Atmospheric Turbulence Conditions on Free Space OpticalCommunication Links Using Gamma-Gamma Model 1563

Tejinder Singh

Vibration Analysis of Electrical Rotating Machines Using FFT: a Method of Predictive Maintenance 15685. 5. Palil. J. A. Gaikwad

Page 12: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

An Efficient Test Pattern Generator for High Fault Coverage in Built-In-Self-Test Applications 1574

P. Moorthy, S. Saranya Bharathy

Design of Low Power Multiple Output Power Supply for Embedded Systems 1578

Umesh Goyal, Neelam Rup Prakash

Comparative Performance Analysis of Extended Kalman Filter and Neural Observer for State

Estimation of Continuous Stirred Tank Reactor 1583

M. Geetha, Jovitha Jerome, Arun P. Kumar, Karthik Anadhan

NFC in Industrial Applications for Monitoring Plant Information 1590

Ramakrishnan Ramanathan, Jahanzaib Imtiaz

A Novel Approach for Task Scheduling in Cloud 1594

R. Vijayalakshmi, Soma Pralhibha

Analysis of Block Matching Motion Estimation Algorithms 1599

P. Muralidhar, C. B.Rama Rao

A QoS Based Network Selection Scheme for 4G Systems with Preplanner for Emergency Services 1603

Jeeva Susan Jacob, K. G. Preetha

Anonymous Privacy-preserving Routing in Location Based Dynamic Ad-hoc Networks 1607

K. Vinoth Kumar, N. Senthil Kumaresan

Microstrip Patch Antenna Array for Rainfall Radar 1613

Samruddha Thakur, S. S. Narkhede, Tapas Bhuiya

A Weighted Seeds Affinity Propagation Clustering for Efficient Document Mining 1617

Preeti Kashyap, Shailendra Kumar Shrivastava, Babita Ujjainiya

Traffic Aware Dynamic Speed Sensitive CAC for IMS Based UMTS-WiMAX-WLAN OverlayNetworks 1624

V. Bharathi, L. Nithyanandan

Performance of the MIMO MC-CDMA System with Beamforming 1630

N. Tamilarasan, L. Nithyanandan

Performance Evaluation of a Fuzzy Processor 1635

M. Jothi, N. B. Balamurugan, R. Harikumar

An Innovative Approach for Scheduling of Tasks in Cloud Environment 1641

Shivani Dubey, Vismay Jain, Shailendra Shrivastava

A Nonlinear Sea Clutter Analysis Using Chaotic System 1649

Rina Anna Simon, P. B. Vinod Kumar

Set Reconciliation in Multi-Node Environment 1654

Aravind Selvan

Real-Time Implementation and Performance Analysis ofState Estimation based Model Predictive

Controller for CSTR Plant 1658

M. Geetha, R. Naveen, Jovitha Jerome, Suriya V. Kumar

A 4b 40 Gbps 140 mW 2.2 mm 0.13 urn Pipelined ADC for I-UWB Receiver 1664

K. Lokesh Krishna, D. Srihari, D. Reena, T. Ramashri

A UPnP Extension for Multilevel Security in Pervasive Systems 1670

P. Prabu Rajkumar, A. Aswathy Nair

A Cross Layer Routing Metric for Gateway Aware Routing in Wireless Mesh Network 1679

D. G. Narayan, Kumar Sugnani, Abhishek Raichur, M. Uma

A Novel Neural Network Based Current Injection Technique for Torque Ripple Reduction in

BLDCM 1685

J. Vandhana, T. Sreekumar, Anish Benny

Layout Design and Simulation of Fault Tolerant Triple Modular Redundant ALU System 1690

Sudipta Ghosh, Jitendra Singh Sengar

Contriving of a Novel BIST (Built In Self-Test) Digital Combinational Lock 1697

Jitendra Singh Sengar, Sudipta Ghosh, S. Raj Shekhar, Praveen Verma, Rajat Sharma

Cross Refferal Validation for Sim Card Validation Using One Time Token and Image Split/merge 1702

G. L. Bharath, S. N. Charan, Madhuri Gangadhara, D. R. Manasa, Arveti Ka\ya, T. N. Srikanth, S. Prabhudeva

Heart Diseases Diagnosis Using Neural Network 1707

Ankeela R. Patel, Maulin M. Joshi

Unifying Clone Analysis and Refactoring Activity Advancement Towards C# Applications 1712

S. Sarala, M. Deepika

Copy Move Image Forgery Detection Using Mutual Information 1717

Somnath Chakraborty

Real Time Visual SLAM Using Cloud Computing 1721

Kumar Ayush, Navin KumarAgarwal

Real-Time Harmonic Minimization of Multilevel Inverters Used in Photovoltaic Systems 1728

Jibin George, Anish Benny

Page 13: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Moving and Immovable Object in Video Processing Using Intuitionistic Fuzzy Logic 1734

R. Revalhi, M. Hemalalha

Ant Clustering Based Text Detection in Natural Scene Images 1740

Pooja Tomer, Ajay Goyal

Network on Chip Design and Implementation on FPGA with Advanced Hardware and Networking

Functionalities 1747

V. Veeraprathap, M. Nagaraja, M. Z. Kurian

Fuzzy Logic Controller Based Maximum Power Point Tracking of Photovoltaic System Using Boost

Converter ^ 753

Shilpa Srcekumar, Anish Benny

MLP for Prediction ofArea and Rice Production of Upper Brahmaputra Valley Zone of Assam 1759

Raju PrasadPaswan, Shahin Ara Begum

Modified Ant Colony Optimization Algorithm with Uniform Mutation using Self-Adaptive Approach

for Travelling Salesman Problem 1768

Ramlakhan Singh Jadon, Unmukh Datta

Bioinformatics: Protein Structure Prediction 1772

Chandrayani N. Rokde, Manali Kshirsagar

Globular Topology of Large Scale WSN for Efficient Load Balancing Using Multiple Sink Node 1776

S. Prabhavathi, A. Ananda Rao. A. Subramanyam

An Approach for Semantic Query Expansion Based on Maximum Entropy-hidden Markov Model 1782

R. Jothilakshmi, N. Shanlhi, R. Babisaraswathi

Design of RF Power Delivery System for Wireless BCI Devices 1787

M. Durairaj, M. Ramakrishnan

A Technical Insight on Software Architectures Deployed in e-Governance: A Study 1792

L. Manjunalha Rao, S. Rama Krishna

Secure Authentication Model for Online Health Monitoring System 1798

Srivatsan Sridharan, Gorthy Ravi Kiran

A Privacy-preserving Storage Security for Spatial Data in Dynamics Cloud Environment 1803

S. Saklhivel, B. Dhiyanesh

Automation of the Gate Scanning Mechanism ofthe Multi-Wavelength Dayglow Photometer Using

LabVIEW 1809

K. Miziya, K. G. Gopchandran, P. Pradeepkumar, C. Vineeth, T. K.Panth, P. G. Anumod

Fault Tolerant Control ofWind Energy Conversion System - Fuzzy Approach 1817

AthulyaJustin, S. Reshma

Combined Curvelet Transform and Multispinning Algorithm for Despeckling of SAR Images 1823

R. Sivaranjani, S. MohamedMansoor Roomi, D. Kalaiyarasi

QoS Realization for Routing Protocol on VANETs using Combinatorial Optimization 1829

Uday Mane, S. A. Kulkarni

Comparison ofGradient Operator Based Pseudocolored Enhanced Medical Images 1834

Rajbahadur Singh Raghuvanshi, Ashutosh Dalar

Automatic Road Extraction Using High Resolution Satellite Images Based on Level Set and Mean

Shift Methods 1839

M. Revalhi, M. Sharmila

Energy Efficient LEACH by Enhancing the Data Update Procedure of Cluster Head 1846

Prabhal Rajan, V. Geetha

Designing a Secure Architecture Against Wormhole Attacks in Wireless Sensor Networks 1849

Rohit S. Jigalur, Suresha, C. Bhushan

A Secure Message Authentication Scheme for VANET Using ECDSA 1855

Kalkundri Ravi, S. A. Kulkarni

Human Agent Knowledge Transfer Applied To Web Security 1861

Chinmay C. Kulkarni, S. A. Kulkarni

On the Approximate Equalities of Multigranular Rough Sets and Approximate Reasoning 1865B. K. Tripathy, Anirban Milra

2D-Discrete Walsh WaveletTransform for Image Compression with Arithmetic Coding 1872

Sunil Malviya, Neelesh Gupta, Vibhanshu Shirvastava

Diagnosis of Melanomas by Check-list Method 1876

Apoorva Raikar, S. P. Sangani, K. D. Hanabaratti

FBFET: Fuzzy Based Fingerprint Enhancement Technique Based on Adaptive Thresholding 1882M. Selvi, Aloysius George

N-gram Based Algorithm for Distinguishing Between Hindi and Sanskrit Texts 1887C. Sreejith, M. Indu, P. C. Reghu Raj

Page 14: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Low Power and High Speed Computation Using Hybridized Multiplier 1891

Uvaraj Subramaniam, Srinivasan Aiavandar

Attacks Resistant Hybrid Watermarking Scheme 1895

Sandeep Pachauri, Neelesh Mehra, Madhu ShandilyaExploration of Security Parameters to Evaluate SaaS 1900

Ankit Banka, Anshul Saravgi, Mangal Sain, Hoon Jae Lee,

Reduced Order Modeling of Uncertain Systems by Pole Clustering Technique using Genetic

Algorithm 1906V. G. Pralheep, K. Ramesh, K. Venkatachalam

Vulnerability Analysis on Virtualized Environment using FPVA 1913

LakshmanJayaraju, Dinesh Naik, Biju R. Mohan

Secure Multicast Transmission 1918

W. R. Salem Jeyaseelan, Shanmugasundaram Hariharan

Parallel Implementation of3D Modelling of Indoor Environment Using Microsoft Kinect Sensor 1921Pawar Manojkumar, G. Ram Mohana Reddy

A Survey on Wireless LAN Internal Roaming Protocols 1927

Amit Kumar, Prabhat Kumar, M. P. Singh

Multimodal Based Fuzzy Vault Using Iris Retina and Fingervein 1933

Geetika, Manavjeel Kaur

Design ofFractal Antenna for Multiband Applications 1938R. Yogamathi, S. Bami, A. Vishwapriya

The Need of Awareness in Cyber Security with a Case Study 1943

Goverdhan Reddy Jidiga, P. Sammulal

Wavelet and Fast Discrete Curvelet Transform for Medical Application 1950

Anjali A. Pure, Neelesh Gupta, Meha Shrivastava

Performance Analysis of Circular Patch Antenna for Breast Cancer Detection 1955S. Banu, A. Vishwapriya, R. Yogamathi

A Novel algorithm for Optimization ofAssociation Rule with Karnagh Map and Genetic Algorithm 1962

Priyanka Mandrai, Raju Barskar

An Approach for Mining Heterogeneous Data for Cross-Media Retrieval 1969

K. Madhu Pavan, V. S. Ananthanarayana

Directivity Enhancement of Circularly Polarized Microstrip Antenna Using Split Ring FSS

Superstrate 1974

Meena Maurya, Swati Void, AshokMittal

Contrast Enhancement of Bi-histogram Equalization with Neighborhood Metrics 1979

K. Santhi, R. S. D. Wahida Banu

Segmentation of Thyroid Gland in Ultrasound Image Using Neural Network 1984

Hitesh Garg, AlkaJindal

Considerations in Autism Therapy Using Robotics 1989

Jaishankar Bharalharaj, S. Senthil Kumar

Dealing QAP& KSP with Green Heron Optimization Algorithm - A New Bio-Inspired Meta-heuristic 1994

Chiranjib Sur, Anupam Shukla

An Investigation on High-Gain Dual-Polarized Cavity Reflex Antenna Using Slotted-Patch FSS

Superstrate 2002

Karishma Sharma, Swati Vaid, AshokMittal

Implementation of Authenticated and Secure Online Voting System 2006

Srivatsan Sridharan

Innovative Pattern Based Morphological Method for Texture Segmentation 2013

M. Joseph Prakash, Saka Kezia, V. Vijaya Kumar, I. Santhi Prabha, P. Shkanth

Knowledging on Tamil Nadu Electricity Board (TNEB) and Electricity Load Demand Forecasting byGaussian Processes Using Real Time Data 2018

T. M. Usha, S. Appavu Balamurugan

A Swarm-based Hybrid Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in

Mobile Ad Hoc Networks 2026

S. K. Nivetha, R. Asokan, N. Senthilkumaran

Data Object Optimal Manipulation on Data Base Using Merging Algorithm(DOOMDUMA) 2034

Ekta Agrawal, Sreeja Nair

Modelling Of Cantilever Based MEMS RF Switch 2041

Chaitali Anil Muley, SyedA. Naveed

Real-time Implementation and Performance Analysis of Two Dimension PID Fuzzy Controller for

Continuous Stirred Tank Reactor 2046M. Geetha, P. Manikandan, P. Shanmugapriya, V. Silambarasan, R. Naveen

Page 15: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Solution of Firefly Algorithm for the Economic Themal Power Dispatch with Emission Constraint in

Various Generation Plants 2051

a:, thenmalar, a. allirani

A Battery-based Constant Current Source (Bb-CCS) for Biomedical Applications 2058

Tushar Kanti Bera, Manobjyoti Saikia, J. Nagaraju

Parallelization of AES Algorithm for Disk Encryption Using CBC and ICBC Modes 2063

Akshay Desai, Krishna Ankalgi, Harish Yamanur, Siddalingesh S. Navalgund

Improved Clustering Protocol for Energy Efficiency Algorithms in Wireless Sensor Networks 2070

K. Kalaiselvi, G. R. Suresh

Data Anonymization and Integrity Checking in Cloud Computing 2075

Reenu Sara George, S. Sabilha

A VLSIArchitecture for Arrhythmia Detection and Its Implementation on FPGA 2080

Catherine Glenitta Figueiredo, Tressa Michael

Optimizing the Performance of Database As a Service (daaS) Model- a Distributed Approach 2085

R. J. Thara, S. Shine, C. Sanu

SRTF: Secure Routing and Traffic Management Framework for WSNs 2090

C. Sanu, S. S. Deepa, R. J. Thara

Sentiment Analysis in Twitter Using Machine Learning Techniques 2098

M. S. Neelhu, R. Rajasree

Support Vector Machine Based Prognostic Analysis ofRenal Transplantations 2103

Aswathy Ravikumar, R. Saritha, S. S. Vinod Chandra

Computational Prediction of Continuous B-Cell Epitopes Using Random Forest Classifier 2109

K. V. Kavitha, R. Saritha, S. S. VinodChandra

A Comparison of Multiclass SVM and HMM Classifier for Wavelet Front End Robust Automatic

Speech Recognition 2114

Rajeswari, N. N. S. S. R. K. Prasad, V. Sathyanarayana

Getting Ready for BigData Testing: A Practitioner's Perception 2119

S. Nachiyappan. S. Justus

Deadlock Avoidance through Efficient Load Balancing to Control Disaster in Cloud Environment 2124

O. Mahitha, V. Suma

Content Based Retrieval of Geotagged Images Using Wavelet As Part of Digital Forensic 2130

Vijay Bagdi, Sulabha Patil, R. V. Dharskar

An Optimized Approach for Live VM Migration Using Log Records 2134

Anju Mohan, S. Shine

Performance of LMMSE Receivers in Broadband Communication Systems 2138

M. D. Kokate, T. R. Sontakke

Data Clustering Using Particle Swarm Optimization and Bee Algorithm 2144

C. A. Dhote, Anuradha D. Thakare, Shruti M. Chaudhari

Efficient and Secure Routing in Multi-hop Wireless Network Using a Micropayment Scheme 2149

Presty Kasmir, Sakhi S. Anand

QoS-Ring:a Token Ring Approach for QoS Provisioning in Ad-hoc Networks 2153

7". Narasimhan, S. S. Deepa

Improving the Denoising Performance of Perona Malik Filter Using Adaptive Edge Indicator 2158

T. Vasundhara, Meena Srinivasan

Defense Mechanism Against Selective Forwarding Attack in Wireless Sensor Networks 2163

P. C. Geethu, RameezA. Mohammed

Verifiable El-Gamal Re-encryption with Authenticity in Cloud 2167P. Renjith, S. Sahitha

A Hybrid Artificial Immune System for IDS Based On SVM and Belief Function 2172

Sandeep Singh, Jasvinder Pal Singh, Gaurav Shrivastva

PLC Modem for Home Automation Over Three Phase Powerline 2178

Nimmy Rose James, Able Eldhose, Deepthi Das Krishna

Performance Improvement of OFDM Using Hybrid PAPR Reduction Technique 2182

N. Annamalai Gokkul, A. AshokKumar, S. Hemant Kumar, M. Ramakrishnan

Comparison and Analysis of Combinational Circuits Using Different Logic Styles 2186

Shofia Ram, Rooha Razmid Ahamed

Modified MAC Unit for Low Power High Speed DSP Application Using Multipler with BypassingTechnique and Optimized Adders 2192

Teffi Francis, Tresa Joseph, Jobin K. Antony

Implementation of Radix 2 and Radix 22 FFT Algorithms on Spartan6 FPGA 2196Lakshmi Santhosh, Anoop Thomas

Page 16: NetworkingTechnologies (ICCCNT 2013) · 2013FourthInternational Conference onComputing, Communicationsand NetworkingTechnologies (ICCCNT2013) Tiruchengode,India 4-6July2013Pages1489-2231

Transient Stability Improvement in Power System Using Unified Power Flow Controller (UPFC) 2200

F. Gopinath Balakrishnan, Suresh Kumar Sreedharan, Juvan Michael

A Study On Classification Techniques in Data Mining 2206

G. Kesavaraj, S. Sukumaran

Performance of Different Clustering Methods and Classification Algorithms for Prediction of

Warning Level in Aircraft Accidents: an Empirical Study 2213

A. B. Arockia Christopher, S. Appavu Balamurugan

An Efficient Query Processing with Approval of Data Reliability Using RBF Neural Networks with

Web Enabled Data Warehouse 2220

K. Soundararajan, S. Sureshkumar, P. Selvamani

A Representation for Human Gesture Recognition and Beyond 2226

Yiwen Wan, Wasana Santiteerakul, Guangchun Cheng, Bill Buckles, Ian Parberry

Author Index