lecture notes of the institute for computer sciences ...978-3-642-27299-8/1.pdf · lecture notes of...

26
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 84 Editorial Board Ozgur Akan Middle East Technical University, Ankara, Turkey Paolo Bellavista University of Bologna, Italy Jiannong Cao Hong Kong Polytechnic University, Hong Kong Falko Dressler University of Erlangen, Germany Domenico Ferrari Università Cattolica Piacenza, Italy Mario Gerla UCLA, USA Hisashi Kobayashi Princeton University, USA Sergio Palazzo University of Catania, Italy Sartaj Sahni University of Florida, USA Xuemin (Sherman) Shen University of Waterloo, Canada Mircea Stan University of Virginia, USA Jia Xiaohua City University of Hong Kong, Hong Kong Albert Zomaya University of Sydney, Australia Geoffrey Coulson Lancaster University, UK

Upload: doancong

Post on 27-Apr-2019

222 views

Category:

Documents


0 download

TRANSCRIPT

Lecture Notes of the Institutefor Computer Sciences, Social Informaticsand Telecommunications Engineering 84

Editorial Board

Ozgur AkanMiddle East Technical University, Ankara, Turkey

Paolo BellavistaUniversity of Bologna, Italy

Jiannong CaoHong Kong Polytechnic University, Hong Kong

Falko DresslerUniversity of Erlangen, Germany

Domenico FerrariUniversità Cattolica Piacenza, Italy

Mario GerlaUCLA, USA

Hisashi KobayashiPrinceton University, USA

Sergio PalazzoUniversity of Catania, Italy

Sartaj SahniUniversity of Florida, USA

Xuemin (Sherman) ShenUniversity of Waterloo, Canada

Mircea StanUniversity of Virginia, USA

Jia XiaohuaCity University of Hong Kong, Hong Kong

Albert ZomayaUniversity of Sydney, Australia

Geoffrey CoulsonLancaster University, UK

Natarajan Meghanathan Nabendu ChakiDhinaharan Nagamalai (Eds.)

Advances inComputer Science andInformation Technology

Networks and Communications

Second International Conference, CCSIT 2012Bangalore, India, January 2-4, 2012Proceedings, Part I

13

Volume Editors

Natarajan MeghanathanJackson State University, Jackson, MS, USAE-mail: [email protected]

Nabendu ChakiUniversity of Calcutta, Calcutta, IndiaE-mail: [email protected]

Dhinaharan NagamalaiWireilla Net Solutions PTY Ltd., Melbourne, VIC, AustraliaE-mail: [email protected]

ISSN 1867-8211 e-ISSN 1867-822XISBN 978-3-642-27298-1 e-ISBN 978-3-642-27299-8DOI 10.1007/978-3-642-27299-8Springer Heidelberg Dordrecht London New York

Library of Congress Control Number: 2011943315

CR Subject Classification (1998): H.4, C.2, I.2, H.3, D.2, I.4, H.5

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Preface

The Second International Conference on Computer Science and InformationTechnology (CCSIT-2012) was held in Bangalore, India, during January 2–4,2012. CCSIT attracted many local and international delegates, presenting a bal-anced mixture of intellect from the East and from the West. The goal of thisconference series is to bring together researchers and practitioners from academiaand industry to focus on understanding computer science and information tech-nology and to establish new collaborations in these areas. Authors are invitedto contribute to the conference by submitting articles that illustrate researchresults, projects, survey work and industrial experiences describing significantadvances in all areas of computer science and information technology.

The CCSIT-2012 Committees rigorously invited submissions for many monthsfrom researchers, scientists, engineers, students and practitioners related to therelevant themes and tracks of the conference. This effort guaranteed submissionsfrom an unparalleled number of internationally recognized top-level researchers.All the submissions underwent a strenuous peer-review process which comprisedexpert reviewers. These reviewers were selected from a talented pool of Techni-cal Committee members and external reviewers on the basis of their expertise.The papers were then reviewed based on their contributions, technical content,originality and clarity. The entire process, which includes the submission, reviewand acceptance processes, was done electronically. All these efforts undertakenby the Organizing and Technical Committees led to an exciting, rich and high-quality technical conference program, which featured high-impact presentationsfor all attendees to enjoy, appreciate and expand their expertise in the latestdevelopments in computer network and communications research. In closing,CCSIT-2012 brought together researchers, scientists, engineers, students andpractitioners to exchange and share their experiences, new ideas and researchresults in all aspects of the main workshop themes and tracks, and to discussthe practical challenges encountered and the solutions adopted. We would like tothank the General and Program Chairs, organization staff, the members of theTechnical Program Committees and external reviewers for their excellent andtireless work. We sincerely wish that all attendees benefited scientifically fromthe conference and wish them every success in their research.

It is the humble wish of the conference organizers that the professionaldialogue among the researchers, scientists, engineers, students and educatorscontinues beyond the event and that the friendships and collaborations forgedwill linger and prosper for many years to come.

January 2012 Natarajan MeghanathanNabendu Chaki

Dhinaharan Nagamalai

Organization

General Chairs

David C. Wyld Southeastern Louisiana University, USANatarajan Meghanathan Jackson State University, USA

General Co-chairs

Jae Kwang Lee Hannam University, South KoreaMichal Wozniak Wroclaw University of Technology, Poland

Steering Committee

Abdul Kadhir Ozcan The American University, CyprusBrajesh Kumar Kaushik Indian Institute of Technology - Roorkee, IndiaDhinaharan Nagamalai Wireilla Net Solutions Pty Ltd., AustraliaEric Renault Institut Telecom-Telecom SudParis, FranceJohn Karamitsos University of the Aegean, Samos, GreeceKamalrulnizam Abu Bakar Universiti Teknologi Malaysia, MalaysiaKhoa N. Le University of Western Sydney, AustraliaNabendu Chaki University of Calcutta, India

Program Committee

A.P. Sathish Kumar PSG Institute of Advanced Studies, IndiaAbdul Aziz University of Central Punjab, PakistanAbdul Kadir Ozcan The American University, CyprusAndreas Riener Johannes Kepler University Linz, AustriaAndy Seddon Asia Pacific Institute of Information

Technology, MalaysiaArmendariz-Inigo Universidad Publica de Navarra, SpainAtilla Elci Eastern Mediterranean University, CyprusB. Srinivasan Monash University, AustraliaBalasubramanian K. Lefke European University, CyprusBoo-Hyung Lee KongJu National University, South KoreaBrajesh Kumar Kaushik Indian Institute of Technology, IndiaCharalampos Z. Patrikakis National Technical University of Athens,

GreeceChih-Lin Hu National Central University, TaiwanChin-Chih Chang Chung Hua University, TaiwanCho Han Jin Far East University, South KoreaCynthia Dhinakaran Hannam University, South Korea

VIII Organization

Danda B. Rawat Old Dominion University, USADebasis Giri Haldia Institute of Technology, IndiaDhinaharan Nagamalai Wireilla Net Solutions Pty Ltd., AustraliaDimitris Kotzinos Technical Educational Institution of Serres,

GreeceDong Seong Kim Duke University, USAEmmanuel Bouix iKlax Media, FranceEric Renault Institut Telecom - Telecom SudParis, FranceFarhat Anwar International Islamic University, MalaysiaFirkhan Ali Bin Hamid Ali Universiti Tun Hussein Onn Malaysia, MalaysiaFord Lumban Gaol University of IndonesiaH.V. Ramakrishnan MGR University, IndiaHo Dac Tu Waseda University, JapanHoang, Huu Hanh Hue University, VietnamHwangjun Song Pohang University of Science and Technology,

South KoreaJacques Demerjian Communication & Systems, Homeland SecurityJae Kwang Lee Hannam University, South KoreaJan Zizka SoNet/DI, FBE, Mendel University in Brno,

Czech RepublicJeong-Hyun Park Electronics Telecommunication Research

Institute, KoreaJivesh Govil Cisco Systems Inc. - CA, USAJohann Groschdl University of Bristol, UKJohn Karamitsos University of the Aegean, Samos, GreeceJohnson Kuruvila Dalhousie University, Halifax, CanadaJose Enrique Armendariz-Inigo Universidad Publica de Navarra, SpainJungwook Song Konkuk University, South KoreaK.P. Thooyamani Bharath University, IndiaKamaljit I. Lakhtaria Atmiya Institute of Technology and Science,

IndiaKhamish Malhotra University of Glamorgan, UKKhoa N. Le University of Western Sydney, AustraliaKrzysztof Walkowiak Wroclaw University of Technology, PolandKshetrimayum Indian Institute of Technology-Guwahati, IndiaLopes Domingos University of Lisbon, PortugalLu Yan University of Hertfordshire, UKLuis Veiga Technical University of Lisbon, PortugalMarco Roccetti University of Bologna, ItalyMichael Peterson University of Hawaii at Hilo, USAMichal Wozniak Wroclaw University of Technology, PolandMohsen Sharifi Iran University of Science and Technology, IranMuhsin Abbas University of Babylon, IraqMurugan D. Manonmaniam Sundaranar University, IndiaN. Krishnan Manonmaniam Sundaranar University, India

Organization IX

Nabendu Chaki University of Calcutta, IndiaNatarajan Meghanathan Jackson State University, USANicolas Sklavos Technological Educational Institute of Patras,

GreecePhan Cong Vinh London South Bank University, UKPonpit Wongthongtham Curtin University of Technology, AustraliaRajendra Akerkar Technomathematics Research Foundation,

IndiaRajesh Kumar P. The Best International, AustraliaRamayah Thurasamy Universiti Sains Malaysia, MalaysiaRituparna Chaki West Bengal University of Technology, IndiaS. Hariharan B.S. Abdur Rahman University, IndiaSagarmay Deb Central Queensland University, AustraliaSajid Hussain Fisk University, USASalah S. Al-Majeed University of Essex, UKSanguthevar Rajasekaran University of Connecticut, USASarmistha Neogyv Jadavpur University, IndiaSattar B. Sadkhan University of Babylon, IraqSergio Ilarri University of Zaragoza, SpainSerguei A. Mokhov Concordia University, CanadaShivan Haran Arkansas State University, USASomitra Sanadhya IIT-Delhi, IndiaSriman Narayana Iyengar VIT University, IndiaSunYoung Han Konkuk University, South KoreaSusana Sargento University of Aveiro, PortugalSyed Rahman University of Hawaii-Hilo, USASyed Rizvi University of Bridgeport, USAVelmurugan Ayyadurai Center for Communication Systems, UKVishal Sharma Metanoia Inc., USAWei Jie University of Manchester, UKYan Luo University of Massachusetts Lowell, USAYannick Le Moullec Aalborg University, DenmarkYao-Nan Lien National Chengchi University, TaiwanYeong Deok Kim Woosong University, South KoreaYuh-Shyan Chen National Taipei University, TaiwanYung-Fa Huang Chaoyang University of Technology, Taiwan

External Reviewers

Amit Choudhary Maharaja Surajmal Institute, IndiaAbhishek samanta Jadavpur University, Kolkata, IndiaAnjan K. MSRIT, IndiaAnkit BITS, Pilani, IndiaAravind P.A. Amrita School of Engineering IndiaAshutosh Dubey NRI Institute of Science and Technology,

Bhopal, India

X Organization

Ashutosh Gupta MJP Rohilkhand University, Bareilly, IndiaBabak Khosravifar Concordia University, CanadaBalaji SriramuluBalakannan S.P. Chonbuk National University, Jeonju, KoreaBhupendra Suman IIT Roorkee, IndiaCauvery Giri RVCE, IndiaChandra Mohan Bapatla Engineering College, IndiaDebdatta Kandar Sikkim Manipal University, IndiaDoreswamyh Hosahalli Mangalore University, IndiaP. Sheik Abdul Khader B.S. Abdur Rahman University, IndiaDurga Toshniwal Indian Institute of Techniology, IndiaGopalakrishnan Kaliaperumal Anna University, IndiaGovardhan A. JNTUH College of Engineering, IndiaHameem Shanavas Vivekananda Institute of Technolgy, IndiaHari Chavan National Institute of Technology, Jamshedpur,

IndiaKaushik Chakraborty Jadavpur University, IndiaKota Sunitha G. Narayanamma Institute of Technology and

Science, Hyderabad, IndiaLavanya Blekinge Institute of Technology, SwedenMahalinga V. Mandi Dr. Ambedkar Institute of Technology,

Bangalore, Karnataka, IndiaMohammad Mehdi Farhangia Universiti Teknologi Malaysia (UTM),

MalaysiaMurty Ch.A.S. JNTU, Hyderabad, IndiaMydhili Nair M.S. Ramaiah Institute of Technology, IndiaNaga Prasad Bandaru P.V.P. Siddartha Institute of Technology, IndiaNagamanjula Prasad Padmasri Institute of Technology, IndiaNagaraj Aitha I.T. Kamala Institute of Technology and

Science, IndiaNana Patil NIT Surat, Gujrat, IndiaOmar Almomani Universiti Utara Malaysia, MalaysiaOsman B. Ghazali Universiti Utara Malaysia, MalaysiaPadmalochan Bera Indian Institute of Technology, Kharagpur,

IndiaPappa Rajan Anna University, IndiaParth LakhiyaPradeepini Gera Jawaharlal Nehru Technological University,

IndiaR.M. Suresh Mysore University, IndiaRabindranath Bera Sikkim Manipal Institute of Technology, IndiaRajashree Biradar Ballari Institute of Technology and

Management, IndiaRajesh Kumar Krishnan Bannari Amman Institute of Technology, IndiaRamin Karimi University Technology Malaysia

Organization XI

Reena Dadhich Govt. Engineering College Ajmer, IndiaReshmi Maulik University of Calcutta, IndiaRituparna Chaki West Bengal University of Technology, IndiaS. Bhaskaran SASTRA University, IndiaSaleena Ameen B.S. Abdur Rahman University, IndiaSalini P. Pondichery Engineering College, IndiaSami Ouali ENSI, Manouba, TunisiaSamodar Reddy India School of Mines, IndiaSanjay Singh Manipal Institute of Technology, IndiaSara Najafzadeh University Technology MalaysiaSarada Prasad Dakua IIT-Bombay, IndiaS.C. Sharma IIT - Roorkee, IndiaSeetha Maddala CBIT, Hyderabad, IndiaSelvakumar Ramachandran Blekinge Institute of Technology, SwedenShriram Vasudevan VIT University, IndiaSoumyabrata Saha Guru Tegh Bahadur Institute of Technology,

IndiaSrinivasulu Pamidi V.R. Siddhartha Engineering College

Vijayawada, IndiaSubhabrata Mukherjee Jadavpur University, IndiaSubir Sarkar Jadavpur University, IndiaSuhaidi B. HassanSunil Singh Bharati Vidyapeeth’s College of Engineering,

IndiaSuparna DasGuptaSwarup Mitra Jadavpur University, Kolkata, IndiaTsung Teng Chen National Taipei University, TaiwanValli Kumari Vatsavayi AU College of Engineering, IndiaYedehalli Kumara Swamy Dayanand Sagar College of Engineering, India

Technically Sponsored by

Software Engineering & Security Community (SESC)Networks & Communications Community (NCC)Internet Computing Community (ICC)Computer Science & Information Technology Community (CSITC)

Organized By

ACADEMY & INDUSTRY RESEARCH COLLABORATION CENTER (AIRCC)

www.airccse.org

Table of Contents – Part I

Networks and Communications

Adaptive Quorum Based MAC Protocol in Non Uniform NodeDistribution of Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

L. Sherly Puspha Annabel and K. Murugan

Mobile Agent in InVANET – Traffic Management . . . . . . . . . . . . . . . . . . . . 10V. Arun and K.L. Shunmuganathan

The Design of Observers for Nonlinear Control Systems aroundEquilibria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Sundarapandian Vaidyanathan

A Node Stability Index-Based Connected Dominating Set Algorithmfor Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Natarajan Meghanathan

Energy Efficient Dynamic Routing Protocol for Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Md Golam Murshed and Alastair R. Allen

Generalized Projective Synchronization of Hyperchaotic Lu andHyperchaotic Cai Systems via Active Control . . . . . . . . . . . . . . . . . . . . . . . . 53

Sarasu Pakiriswamy and Sundarapandian Vaidyanathan

Energy Efficient Stable Connected Dominating Set Construction inMobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

R. Ramalakshmi and S. Radhakrishnan

Hybrid Synchronization of Arneodo and Rossler Chaotic Systems byActive Nonlinear Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Sundarapandian Vaidyanathan and Suresh Rasappan

Realization of SDR in Partial Reconfigurable FPGA Using DifferentTypes of Modulation Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Neenu Joseph and P. Nirmal Kumar

A Recommender System for Sweaty Sock Syndrome . . . . . . . . . . . . . . . . . . 90L. Arockiam, S. Charles, C. Lalitha, and I. Carol

Enhanced AODV Routing Protocol for Wireless Sensor Network Basedon ZigBee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Dilip Kumar Ahirwar, Prashant Verma, and Jitendra Daksh

XIV Table of Contents – Part I

Sliding Mode Controller Design for the Global Chaos Synchronizationof Coullet Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Sundarapandian Vaidyanathan and Sivaperumal Sampath

Generalized Projective Synchronization of Double-Scroll ChaoticSystems Using Active Feedback Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Sundarapandian Vaidyanathan and Sarasu Pakiriswamy

Mobile Ad Hoc Networks Security Attacks and Secured RoutingProtocols: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

Supriya and Manju Khari

Privacy and Security in Digital Networks from the Perspective ofModeling and Software Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Erich Ortner

A Logical Topology to Find Alternate Routes in WDM LightwaveNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

Santosh Das and Abhijit Makhal

A Novel Approach for MIMO OFDM Systems to Estimate I/QImbalance, CFO, Channel Response Using Training Sequences . . . . . . . . . 146

J. Tarun Kumar and K. Anitha Sheela

A Trust Based Routing Scheme for Wireless Sensor Networks . . . . . . . . . . 159Aveek Chakrabarti, Vishal Parekh, and Atin Ruia

Survey of Trust Schemes on Ad-Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . 170Renu Dalal, Manju Khari, and Yudhvir Singh

Improve Service Discovery Performance over Different NetworksUtilization and Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

Intisar Al-Mejibli, Martin Colley, and Salah Al-Majeed

Adaptive K-Means Clustering to Handle Heterogeneous Data UsingBasic Rough Set Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

B.K. Tripathy, Adhir Ghosh, and G.K. Panda

Different Types of Attacks Mitigation in Mobile Ad Hoc NetworksUsing Cellular Automata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Himadri Nath Saha, Debika Bhattachayya, and P.K. Banerjee

A Location Dependent Semantic Cache Replacement Strategy inMobile Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

Kahkashan Tabassum, Mahmood Quadri Syed, and A. Damodaram

Connectivity of Autonomous Agents Using Ad-Hoc Mobile RouterNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

Emi Mathews and Ciby Mathew

Table of Contents – Part I XV

A New Approach to Stegnography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238Soumik Mukherjee, Moumita Deb, Pratik Kumar Agarwal, andAbhinava Roy

Survey on Key Pre Distribution for Security in Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

T.P. Rani and C. Jaya Kumar

Wireless and Mobile Networks

A Link Distance Ratio Based Stable Multicast Routing Protocol forMobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

Natarajan Meghanathan

A New Security Solution Architecture (SSA) for MANETS againstNetwork Layer Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

G.S. Mamatha

Analysis of Different Associative Memory Neural Network for GPS/INSData Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

S. Angel Deborah

Handover Latency Measurement of Mobile IPv6 in a TestbedEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

Muhammad Arif Amin, Kamalrulnizam Bin Abu Bakar,Abdul Hanan Abdullah, Mahesh Nair, and Rashid Hafeez Khokhar

Different Strategy for Data Management in Mobile Computing . . . . . . . . 300Chandrani Chakravorty and J. Usha

Generic Network Visualization Tool for Monitoring Adhoc WirelessNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

Girish Revadigar and Chitra Javali

Adaptive MMSE Equalizer through LMS Algorithm Based CMAChannel Equalization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

R. Nirmala Devi, Tara Saikumar, and K. Kishan Rao

Weighted Angle Based Approach for Face Recognition . . . . . . . . . . . . . . . . 325M. Koteswara Rao, K. Veeraswamy, K. Anitha Sheela, andB. Chandra Mohan

Multiple Mobile Agents Based Data Dissemination Protocol forWireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334

Govind P. Gupta, Manoj Misra, and Kumkum Garg

Enhanced Cluster Based Routing Protocol for MANETS . . . . . . . . . . . . . . 346Kartheek Srungaram and M.H.M. Krishna Prasad

XVI Table of Contents – Part I

Soft Computing Technique Based Call Admission Control DecisionMechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

H.S. Ramesh Babu, Gowrishankar, G. Mahesh, andP.S. Satyanarayana

Mechanisms Supporting Mobility in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . 368Saimadhavi and Y.S. Kumarswamy

An Optimal RPC Based Approach to Increase Fault in WirelessAd-Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

Rabindra Kumar Shial, K. Hemant Ku. Reddy, and K.L. Narayana

Location Management and Resource Allocation Using Load Balancingin Wireless Heterogeneous Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

G. Adiline Macriga and V.S. Surya

Cross Language Information Retrieval Approach in Peer-to-PeerNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394

M. Archana and K.A. Sumithra Devi

Detecting and Avoiding Wormhole Attack in MANET Using StatisticalAnalysis Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402

Saurabh Upadhyay and Brijesh Kumar Chaurasia

Energy Efficient Hierarchical Clustering Routing Protocol for WirelessSensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

Diwakar Meenakshi and Sushil Kumar

An Analysis on Energy Efficient System Design in Grid Computing . . . . 421D. Ramesh and A. Krishnan

Cluster-Based Power Aware Scheduling (CPAS) Algorithm for NetworkLongevity in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429

K. Arthi and P. Vanaja Ranjan

Development of System for GPS Data Transmission to Web Server forOnline over Head Conductor Sag Measurement . . . . . . . . . . . . . . . . . . . . . . 437

Sangeeta Kamboj and Ratna Dahiya

A Comparative Study of Partitioning Algorithms for Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445

Zeenat Rehena, Debasree Das, Sarbani Roy, and Nandini Mukherjee

Sensor-Cloud: Assimilation of Wireless Sensor Network and theCloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

Sanjit Kumar Dash, Jyoti Prakash Sahoo, Subasish Mohapatra, andSarada Prasanna Pati

Table of Contents – Part I XVII

Game Theoretic Model for Selfish Node Avoidance in Ad HocNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

Upasana Dohare, D.K. Lobiyal, and Sushil Kumar

Performance Evaluation of VANET Using Realistic VehicularMobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477

Nidhi and D.K. Lobiyal

Ensuring Data Confidentiality and Privacy in Mobile Ad HocNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490

Hamza Aldabbas, Helge Janicke, Radwan AbuJassar, andTariq Alwada’n

Hiding Sensitive Association Rules without Altering the Support ofSensitive Item(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500

Dhyanendra Jain, Pallavi Khatri, Rishi Soni, andBrijesh Kumar Chaurasia

Network Security

Dependable Solutions Design by Agile Modeled Layered SecurityArchitectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510

M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani,K. Venkateswar Rao, A.V. Krishna Prasad, and D. Shravani

Block Lanczos to Solve Integer Factorization Problem Using GPU’s . . . . 520Harish Malla, Vilas SantKaustubh, Rajasekharan Ganesh, andPadmavathy R.

Lattice Based Tools for Cryptanalysis in Various Applications . . . . . . . . . 530R. Santosh Kumar, C. Narasimham, and S. Pallam Setty

Securing the National Knowledge Network . . . . . . . . . . . . . . . . . . . . . . . . . . 538S.V. Nagaraj

Pattern Based IDS Using Supervised, Semi-supervised andUnsupervised Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

Vinod K. Pachghare, Vaibhav K. Khatavkar, and Parag Kulkarni

A Secure Session Transfer Protocol for Downloading a Large File acrossa Cluster of Servers in the Presence of Network Congestion . . . . . . . . . . . . 552

Natarajan Meghanathan and Bhadrachalam Chitturi

An Improved Anti Spam Filter Based on Content, Low Level Featuresand Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

Anand Gupta, Chhavi Singhal, and Somya Aggarwal

XVIII Table of Contents – Part I

Diameter Single Sign On – Secure and Personalized Service Provisionvia Authentication and Authorization Mechanisms . . . . . . . . . . . . . . . . . . . 573

Robayet Nasim

Application of Genetic Algorithms for Detecting Anomaly in NetworkIntrusion Detection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582

K.G. Srinivasa

A New Symmetric Key Cryptosystem Based on Feistel Network:Parallel Dependent Feistel Network (PDFN) . . . . . . . . . . . . . . . . . . . . . . . . . 592

Indrajit Das and R. Saravanan

Survey of Shape Based Boundary Methods for Leaf Retrieval . . . . . . . . . . 602Komal Asrani, Renu Jain, and Deepak Asrani

Modified Chain Code Histogram Feature for Handwritten CharacterRecognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611

Jitendra Jain, Soyuj Kumar Sahoo, S.R. Mahadeva Prasanna, andG. Siva Reddy

A Novel Image Edge Detection Method Using Simplified GaborWavelet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620

C. Sujatha and D. Selvathi

Low Power Spatial Modulation Scheme for Wide Band Multiple Inputand Multiple Output Wireless Communication Systems . . . . . . . . . . . . . . . 631

Dhirendra Kumar Tripathi, S. Saravanan, andHarNarayan Upadhyay

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641

Table of Contents – Part II

Advances in Computer Science and Engineering

Qualitative Optimization of Coupling Parasitics and Driver Width inGlobal VLSI Interconnects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Devendra Kumar Sharma, Brajesh Kumar Kaushik, andR.K. Sharma

Survey on Optimization Techniques in High Level Synthesis . . . . . . . . . . . 11B. Saravanakumaran and M. Joseph

An Adaptive Technique Using Advanced Encryption Standard toImplement Hard Disk Security for Personalized Devices . . . . . . . . . . . . . . . 22

Minal Moharir and A.V. Suresh

Design of Fractional Order Digital Differentiator Using InverseMultiquadric Radial Basis Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Nitin Kumar and Tarun Kumar Rawat

Cognitive Symmetric Key Cryptographic Algorithm . . . . . . . . . . . . . . . . . . 50Y.R.A. Kannan, S. Aravind Prasad, and P. Varalakshmi

Modeling and Verification of Fiat-Shamir Zero KnowledgeAuthentication Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Amit K. Maurya, Murari S. Choudhary, P. Ajeyaraj, andSanjay Singh

Developing Software Metrics for Analysis and Design Artifacts inUnified Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Meena Sharma and Rajeev G. Vishwakarma

A Novel Approach for Green Computing through Event-Driven PowerAware Pervasive Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Jeeva Susan Jacob and K.G. Preetha

Coloured Petri Net for Modelling and Validation of DynamicTransmission Range Adjustment Protocol in an Ad-Hoc Network . . . . . . 89

Lopamudra Mohapatra and Debansu Panda

Security Analysis of Proxy Blind Signature Scheme Based on Factoringand ECDLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Namita Tiwari and Sahadeo Padhye

Dynamic Enterprises Architecture for One or More Clouds . . . . . . . . . . . . 109P. Mangayarkarasi and R. Selvarani

XX Table of Contents – Part II

Congestion Control in Distributed Networks - A Comparative Study . . . . 115K. Vinodha and R. Selvarani

Adaptive Controller and Synchronizer Design for the Qi-Chen ChaoticSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Sundarapandian Vaidyanathan

Opinion Mining from Weblogs and Its Relevance for Socio-politicalResearch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

Vivek Kumar Singh, Mousumi Mukherjee,Ghanshyam Kumar Mehta, Shekhar Garg, and Nisha Tiwari

Generalized Projective Synchronization of Three-Scroll ChaoticSystems via Active Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Sarasu Pakiriswamy and Sundarapandian Vaidyanathan

Switching Algorithms in Peer to Peer Networks - Review . . . . . . . . . . . . . . 156M. Padmavathi and R.M. Suresh

Proposed Software Development Model for Small Organization and ItsExplanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Vinish Kumar and Sachin Gupta

A Comparative Analysis of Reduction Algorithms in Picasso Tool forCost Based Query Optimizers of Relational Databases . . . . . . . . . . . . . . . . 176

Neeraj Sharma and Yogendra Kumar Jain

Tele-control of Remote Digital Irrigation System Performed throughInternet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Akin Cellatoglu and Balasubramanian Karuppanan

A Fuzzy Rule Based Expert System for Effective Heart DiseaseDiagnosis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

E.P. Ephzibah and V. Sundarapandian

Moving Object Detection Using Incremental Statistical MeanTechnique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

Safvan A. Vahora, Narendra C. Chauhan, and Nilesh B. Prajapati

Classification of Moving Vehicles in Traffic Videos . . . . . . . . . . . . . . . . . . . . 211Elham Dallalzadeh, D.S. Guru, S. Manjunath, and M.G. Suraj

Use of Augmented Reality in Serious Game for Training MedicalPersonnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

Arun Kumar Karthikeyan, Praveen Kumar Mani,Suresh Kumar Balasubramaniyan, andPraveen Jelish Panneer Selvam

Table of Contents – Part II XXI

Encouraging the Usage of Neural Network in Video Text DetectionApplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

Suresh Kumar Balasubramaniyan, Praveen Kumar Mani,Arun Kumar Karthikeyan, and Ganesh Shankar

A Novel Face Recognition Method Using PCA, LDA and SupportVector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

U. Raghavendra, P.K. Mahesh, and Anjan Gudigar

Contextual Strategies for Detecting Spam in Academic Portals . . . . . . . . . 250Balaji Rajendran and Anoop Kumar Pandey

Hybrid Synchronization of Hyperchaotic Chen Systems via SlidingMode Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Sundarapandian Vaidyanathan and Sivaperumal Sampath

Design and Implementation of Efficient Viterbi Decoders . . . . . . . . . . . . . . 267K.S. Arunlal and S.A. Hariprasad

Classification of MRI Brain Images Using Cosine-ModulatedWavelets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

Yogita K. Dubey and Milind M. Mushrif

A Novel Approach for Email Login System . . . . . . . . . . . . . . . . . . . . . . . . . . 282Bhavesh Patel, Dipak Patel, Shakti Patel, Rajendra Patel,Bhavin Tanti, and Nishant Doshi

A Non-revisiting Genetic Algorithm with Adaptive Mutation forFunction Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

Saroj and Devraj

xScribble: A Generalized Scheme for String-Encoding Graphical Datain Multiuser Graphical Chat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298

Rahul Anand, Joshy Joseph, P. Dipin Dev, Hegina Alex, andP.C. Rafeeque

Analysis of IG DV Protocols in MPLS Network for Quality of VideoConference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

Swarnalatha Mannar Mannan, Arunkumar Jayaraman, andSrinivasa Kranthi Kiran Kolachina

A Comparative Analysis of Watermarking Techniques for CopyProtection of Digital Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

Dolley Shukla and Manisha Sharma

Unique-Minimum Conflict-Free Coloring for a Chain of Rings . . . . . . . . . . 319Einollah Pira

XXII Table of Contents – Part II

Enhanced Ad Hoc on Demand Distance Vector Local Repair Trial forMANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325

P. Priya Naidu and Meenu Chawla

Multi-class SVM for EEG Signal Classification Using Wavelet BasedApproximate Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

A.S. Muthanantha Murugavel and S. Ramakrishnan

Hybrid Intrusion Detection with Rule Generation . . . . . . . . . . . . . . . . . . . . 345V.V. Korde, N.Z. Tarapore, S.R. Shinde, and M.L. Dhore

Tele-Operation of Web Enabled Wireless Robot for Old AgeSurveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355

Yatin Wadhawan and Sajal Gupta

DSP Implementation of Wavelet Transform Based Embedded BlockCoder Using Quadtree Partitioning Method . . . . . . . . . . . . . . . . . . . . . . . . . 366

Deepali P. Ladhi and Richa R. Khandelwal

Calculation of the Minimum Time Complexity Based on InformationEntropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

Xue Wu

Enhancing E-Learning through Cognitive Structures for LearningSports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386

S. MuthuLakshmi, S. Nagasundari, S.P. Surender Nath, andG.V. Uma

Speaker Independent Connected Digit Recognition Using VQ andHMM in Additive Noise Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393

A. Revathi and Y. Venkataramani

Decomposition+: Improving �-Diversity for Multiple SensitiveAttributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403

Devayon Das and Dhruba K. Bhattacharyya

Radix-4 Modified Interleaved Modular Multiplier Based on SignDetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413

Mohamed A. Nassar and Layla A.A. El-Sayed

Adapting Temporal Aspects to Static GIS Models . . . . . . . . . . . . . . . . . . . . 424K.C.S. Murti and Viksit Agarwal

A Basic Comparison of Different Memories for Object OrientedComputer Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435

Ankit V. Patel and Paresh Mathur

Performance Evaluation of Segmentation of Frog-Eye Spot Lesions onTobacco Seedling Leaves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

P.B. Mallikarjuna and D.S. Guru

Table of Contents – Part II XXIII

Password Authentication Using Context-Sensitive Associative MemoryNeural Networks: A Novel Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454

P.E.S.N. Krishna Prasad, B.D.C.N. Prasad,A.S.N. Chakravarthy, and P.S. Avadhani

A Heuristic Approach for Community Detection in Protein Networks . . . 469Sminu Izudheen and Sheena Mathew

Single Reduct Generation by Attribute Similarity Measurement Basedon Relative Indiscernibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

Shampa Sengupta and Kr. Das

Adaptive QoS-Aware Web Service Composition . . . . . . . . . . . . . . . . . . . . . . 488Deivamani Mallayya and Baskaran Ramachandran

Key Dependent Feature Point Based Image Watermaking Scheme . . . . . . 498Ramesh Kumar Surapathi, Kamalika Datta, and I. Sengupta

A Survey on ATTACK – Anti Terrorism Technique for ADHOC UsingClustering and Knowledge Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

K. Sudharson and V. Parthipan

SecureWear: A Framework for Securing Mobile Social Networks . . . . . . . . 515Baishakhi Ray and Richard Han

Throughput Analysis of Next-Hop Forwarding Method for Non-linearVehicular Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525

Ram Shringar Raw and D.K. Lobiyal

A Novel Algorithm for Prediction of Protein Coding DNA fromNon-coding DNA in Microbial Genomes Using Genomic Compositionand Dinucleotide Compositional Skew . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535

Baharak Goli, B.L. Aswathi, and Achuthsankar S. Nair

User-Centric Situation Awareness in Ubiquitous ComputingEnvironments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

Gautham Pallapa and Sajal K. Das

A Review of QoS Driven Optimal Selection of Web Services forCompositions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553

Demian Antony D’Mello and V.S. Ananthanarayana

Location Service Management Protocol for Vehicular Ad Hoc NetworkUrban Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

Salim M. Zaki, M.A. Ngadi, Shukor Abd Razak,Maznah Kamat, and Johan Mohamad Shariff

CNT Based Channel Interconnect for CMOS Devices . . . . . . . . . . . . . . . . . 575Ginto Johnson and Vinod Pangracious

XXIV Table of Contents – Part II

Conviction Scheme for Classifying Misbehaving Nodes in MobileAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586

S. Sridhar and R. Baskaran

Virtual Interactive Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594Kurien Zacharia, Eldo P. Elias, and Surekha Mariam Varghese

Chaotic Masking of Voice Bitstream Using Mixed Sequences forAuthorized Listening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604

Musheer Ahmad, Bashir Alam, and Omar Farooq

A Framework for Transparency in SHGs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612A.B. Sagar

Classification of Text Documents Using B-Tree . . . . . . . . . . . . . . . . . . . . . . 627B.S. Harish, D.S. Guru, and S. Manjunath

Comparison between Different Feature Extraction Techniques toIdentify the Emotion ‘Anger’ in Speech . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637

Bageshree V. Pathak and Ashish R. Panat

Feature Image Generation Using Energy Distribution for FaceRecognition in Transform Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644

Vikas Maheshkar, Sushila Kamble, Suneeta Agarwal, andVinay Kumar Srivastava

A Comparative Study of Placement of Processor on Silicon andThermal Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654

Ramya Menon C. and Vinod Pangracious

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663

Table of Contents – Part III

Advances in Computer Science and InformationTechnology

Driving Hazards Message Propagation Using Road Side Infrastructurein VANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

M.A. Berlin and Sheila Anand

Policy Based Distributed Run Time Fault Diagnoser Model for WebServices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

K. Jayashree and Sheila Anand

The Reconstruction Conjecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Subhashis Banerjee, Debajit SenSarma, Krishnendu Basuli,Saptarshi Naskar, and Samar Sen Sarma

Collaborative Framework for Distributed Computing in P2P Network . . . 26B. Swaminathan and Sheila Anand

Minimizing Boolean Sum of Products Functions Using Binary DecisionDiagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Debajit Sensarma, Subhashis Banerjee, Krishnendu Basuli,Saptarshi Naskar, and Samar Sen Sarma

Compression of Gray Scale Images Using Linear Prediction on WaveletCoefficients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

P.S. Arya Devi and M.G. Mini

An Innovative Approach to Association Rule Mining Using Graph andClusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

N. Balaji Raja and G. Balakrishnan

Policy Based Accounting for Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . 68V. MuthuLakshmi and Sheila Anand

Fusion Based Linked Object Web Ranking for Social Networks . . . . . . . . . 76Pushpa R. Suri and Harmunish Taneja

Comparing Supervised Learning Classifiers to Detect Advanced FeeFraud Activities on Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Abiodun Modupe, Oludayo O. Olugbara, and Sunday O. Ojo

Algebra of Geometric Filters Defined over Three DimenisonalRectangular Lattice-PartI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Towheed Sultana and E.G. Rajan

XXVI Table of Contents – Part III

Finite State Transducers Framework for Monitors Conflict Detectionand Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Soha Hussein

Real Time Facial Expression Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Saumil Srivastava

Face Recognition System in Cell Phones Based on Text MessageService . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

Suman Deb, Sourav Biswas, Chinmoy Debnath,Suddhasatta Dhar, and Priyanka Deb

Requirements Volatility in Software Maintenance . . . . . . . . . . . . . . . . . . . . . 142D. Kavitha and Ananthi Sheshasaayee

Information Security Measurement and E-Governance . . . . . . . . . . . . . . . . 151Subhash Chander and Ashwani Kush

Comparison of Efficient and Rand Index Fitness Function for ClusteringGene Expression Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

P.S. Patheja, Akhilesh A. Waoo, and Ragini Sharma

A Novel Hybrid Fuzzy Multi-Objective Evolutionary Algorithm:HFMOEA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Amit Saraswat and Ashish Saini

Testability Estimation Model (TEMOOD) . . . . . . . . . . . . . . . . . . . . . . . . . . . 178Mohd Nazir and Raees A. Khan

Generation of All Spanning Trees in the Limelight . . . . . . . . . . . . . . . . . . . 188Saptarshi Naskar, Krishnendu Basuli, and Samar Sen Sarma

A New Encryption Method for Secured Message Passing by SortingTechnique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

S. Muthusundari and S. Santhosh Baboo

Algorithm for Constructing Complete Distributive Latticeof Polyhedrons Defined over Three Dimensional RectangularGrid- Part II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

G. Ramesh Chandra and E.G. Rajan

Enhancing the Network Security Using Lexicographic Game . . . . . . . . . . . 211T.P. Anithaashri and R. Baskaran

Spectral Characterization of Rank Filters Based Directional Texturesof Digital Images Using Rajan Transform . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

Naveed Farhana and Nisar Hundewale

Enlargement of Clinical Stemmer in Hindi Language for HomoeopathyProvince . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

Pramod P. Sukhadeve and Sanjay K. Dwivedi

Table of Contents – Part III XXVII

Fuzziness in Text Classification Using Different Similarity Metrics . . . . . . 249M.A. Wajeed and T. Adilakshmi

Image Compression over Low Channel Bandwidth . . . . . . . . . . . . . . . . . . . . 261S. Anitha and Nagabhushana

Fuzzy Identification of Geometric Shapes . . . . . . . . . . . . . . . . . . . . . . . . . . . 269B. Mohammed Imran and M.M. Sufyan Beg

Towards Perception Based Image Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . 280B. Mohammed Imran and M.M. Sufyan Beg

Estimation of f -Similarity in f -Triangles Using FIS . . . . . . . . . . . . . . . . . . . 290B. Mohammed Imran and M.M. Sufyan Beg

Survey on Image Compression Techniques: Using CVIP Tools . . . . . . . . . . 300Sujitha Juliet Devaraj, Kirubakaran Ezra, andKenanya Kumar Kasaraneni

Developing Hindi POS Tagger for Homoeopathy Clinical Language . . . . . 310Pramod P. Sukhadeve and Sanjay K. Dwivedi

Wireless Sensor Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317Saurabh Sharma, Amit Sahu, Ashok Verma, and Neeraj Shukla

Recent Developments in Scheduling and Allocation of High LevelSynthesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

M. Chinnadurai and M. Joseph

Digital Signature of an Image by Elliptic Curve Cryptosystem . . . . . . . . . 337T.N. Shankar, G. Sahoo, and S. Niranjan

Ad Hoc and Ubiquitous Computing

Mobile-Cloud: A Framework of Cloud Computing for MobileApplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

Jibitesh Mishra, Sanjit Kumar Dash, and Sweta Dash

The Effect of Design Patterns on Aspect Oriented Software Quality–An Empirical Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

Sirbi Kotrappa and Kulkarni Jayant Prakash

A Novel Statistical Fusion Rule for Image Fusion in Non SubsampledContourlet Transform Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

V.T. Manu and Philomina Simon

Maximizing Lifetime of Wireless Sensor Network through ExtendedLEACH Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

Indrajit Bhattacharya, Saurav Ghosh, and Suparna Kundu

XXVIII Table of Contents – Part III

Intersection Area Based Geocasting Protocol (IBGP) for VehicularAd Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Sanjoy Das and D.K. Lobiyal

Survey on H.264 Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397R. Vani and M. Sangeetha

Self-configurable Processor Schedule Window Algorithm . . . . . . . . . . . . . . 411A. Prasanth Rao, A. Govardhan, and P.V.V. Prasad Rao

An Authenticated BSS Methodology for Data Security UsingSteganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423

B. Ravi Kumar, P.R.K. Murti, and B. Hemanth Kumar

A Real Time Multivariate Robust Regression Based Flood PredictionModel Using Polynomial Approximation for Wireless Sensor NetworkBased Flood Forecasting Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432

Victor Seal, Arnab Raha, Shovan Maity, Souvik Kr. Mitra,Amitava Mukherjee, and Mrinal Kanti Naskar

AODV Enhancement Based on the Minimization of Route-RequestPackets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442

Puja Rani and G.P. Biswas

Key Management for Group Based Mobile Ad Hoc Networks . . . . . . . . . . 455Kamal Kumar Chauhan and Amit Kumar Singh Sanger

Optimal Clustering in Zone Based Protocol of Wireless SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

S. Taruna, Jain Kusum Lata, and G.N. Purohit

Optimized FZ-LEACH Using Exponential Weighted Moving Averagefor Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473

K. Ramesh and K. Somasundaram

IAMKeys: Independent and Adaptive Management of Keys for Securityin Wireless Body Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482

Raghav V. Sampangi, Saurabh Dey,Shalini R. Urs, and Srinivas Sampalli

A Study on Various Deployment Schemes for Wireless SensorNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495

G. Sanjiv Rao and V. Valli Kumari

Spanning Tree Based Reliable Data Transmission in LEACH . . . . . . . . . . 506Neeranjan Chitare, M. Rashmi, Shalini R. Urs, and Srinivas Sampalli

Image Deblurring Using Bayesian Framework . . . . . . . . . . . . . . . . . . . . . . . . 515K. Sitara and S. Remya

Table of Contents – Part III XXIX

Taxonomy and Control Measures of SPAM and SPIM . . . . . . . . . . . . . . . . 529Kamini (Simi) Bajaj and Josef Pieprzyk

A Distributed OFDM Polarizing Transmission via BroadcastSwitching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

Chengrong Huang, Ying Guo, and Moon Ho Lee

Multipath OLSR with Energy Optimization in Mobile Adhoc NETwork(MANET) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

Kirti Aniruddha Adoni and Radhika D. Joshi

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563