Advances in Computing and Communications Part IV First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st edition by Ajith Abraham, Jaime Lloret Mauri, John Buford – Ebook PDF Instant Download/Delivery. 9783642227264, 3642227260
Full download Advances in Computing and Communications Part IV First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st edition after payment
Product details:
ISBN 10: 3642227260
ISBN 13: 9783642227264
Author: Ajith Abraham, Jaime Lloret Mauri, John Buford
This volume is the fourth part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 62 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are the papers of the Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), of the Workshop on Multimedia Streaming (MultiStreams2011), and of the Workshop on Trust Management in P2P Systems (IWTMP2PS2011).
Advances in Computing and Communications Part IV First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st Table of contents:
Position Papers
Impact of Node Density on Node Connectivity in MANET Routing Protocols
Introduction
Routing Protocols and Performance Metrics
Impact of Node Density on Routing Protocols-Comparative Evaluation
Impact of Node Density on Proactive Routing Protocol
Impact of Node Density in Reactive Routing Protocols
Discussion on MANET Routing Protocols Using Various Performance Metrics
Simulation Result and Observations
Conclusion
References
Survey and Comparison of Frameworks in Software Architecture
Introduction
Evolution of Software Architectural Frameworks
Evolution from 1920’s to 1995
Evolution from 1995 to 2010
Classification and Comparison Criteria
Classification of Frameworks
Comparison Criteria
Evaluation of Various Frameworks
Zachman Framework
NATO Architecture Framework/C4ISR/DODAF
TOGAF
TEAF
FEAF
ISO RM-ODP
Conclusion
References
Two Layered Hierarchical Model for Cognitive Wireless Sensor Networks
Introduction
Related Work
Motivation
Our Contribution
Conclusion
Future Work
References
3D-CGIN: A 3 Disjoint Paths CGIN with Alternate Source
Introduction
Background and Motivation
The Gamma Interconnection Network (GIN)
Cyclic Gamma Interconnection Network (CGIN)
Review of Fault Tolerance Techniques Used in GIN
3D-CGIN: A 3 Disjoint Paths CGIN
Network Architecture of 3D-CGIN
Multiple Disjoint Paths
Routing in 3D-CGIN
Routing Algorithm Considering Fault at Initial Stage
Re-routing Using Destination Tag
Comparison of 3DCGIN with Other Interconnection Networks
Conclusion
References
Architecture for Running Multiple Applications on a Single Wireless Sensor Network: A Proposal
Introduction
Motivation Scenarios
Related Works
Proposed Architecture
System Overview
System Design
Conclusion and Future Works
References
Feature Based Image Retrieval Algorithm
Introduction
Related Works
Overview of CBIR
Overview of Genetic Algorithm
Overview of Neural Network
Block Diagram
Algorithm
Proposed Implementation Methodology
Conclusion
References
Exploiting ILP in a SIMD Type Vector Processor
Introduction
SIMD-Vector Architecture
Proposed Approach for the Vectorization of Instructions for a SIMD Type Vector Processor
Conclusions
References
An Extension to Global Value Numbering
Introduction
Global Value Numbering
Proposed Solution
Conclusion
References
Data Privacy for Grid Systems
Introduction
Background
Architecture
Design Goal
Overview of Our Architecture
Trusted Part
Untrusted Part
Protected Part
The Relations between the Three Parts
Guest VM Boot Process
Evaluation
Hardware Platform
Memory Isolation
Storage
Network
Guest VM Boot Process
Virtual Devices
Related Work
Conclusion
References
Towards Multimodal Capture, Annotation and Semantic Retrieval from Performing Arts
Introduction
Related Work
MPEG7 Based Dance Semantics Retrieval
Need for Automatic Multimodal Annotation
Architecture for Multimodal Dance Information System
Conclusion
References
A New Indian Model for Human Intelligence
Introduction
Methodology
Existing Models for Human Intelligence
The Different Types of Human Thought Processes Described in Indian Texts and Philosophy
The Human Brain vs Machine Intelligence
The Biological Basis of These Different Thought Processes
A New Model for Human Intelligence
Conclusions and Future Directions
References
Stepping Up Internet Banking Security Using Dynamic Pattern Based Image Steganography
Introduction
Internet Banking
Threats in Internet Banking
Existing Techniques for Handling Attacks in Internet
Proposed Method Using Dynamic Pattern Image Steganography Algorithm
Behavior of Common Attacks in the Stego-Layer Method
Detection of Tampered Stego Images
Comparison of Stego-Layer Method with Existing Standard Cryptographic Algorithm
Conclusion
References
A Combinatorial Multi-objective Particle Swarm Optimization Based Algorithm for Task Allocation in D
Introduction
Multi-objective Task Allocation Problem
Nomenclature
Problem Statement
Combinatorial MOSPO Algorithm for MOTAP
Particle Representation
Fitness Evaluation
Velocity and Position Updation
Selection of Pijt and PiG
Repository Updation
Experimental Study
Dataset
Experimental Environment
Result and Analysis
Conclusion
References
Enhancement of BARTERCAST Using Reinforcement Learning to Effectively Manage Freeriders
Introduction
Existing Solutions
Comparison of Existing Solutions
Proposed Solution
Q-Learning
Q-Learning Applied in BARTERCAST
Algorithm for Learning Approach in BARTERCAST
Illustrating the Algorithm
Q-Table Creation and Initialization
Q-Value Updation and Reward Calculation
Behavior Analysis
Result Analysis
Simulation Scheme
Conclusion
References
A Novel Approach to Represent Detected Point Mutation
Introduction
Motivation
Existing Methods
Proposed Solution
Method of Implementation
Computation of Input to the Representation Algorithm
Sample Representation
Graph-Based Data Mining
Performance Enhancement through Parallelism
Result
Conclusion
Future Work
References
Anonymous and Secured Communication Using OLSR in MANET
Introduction
Existing Approaches
Necessity for Achieving Anonymity and Security
Security Architecture of the Proposed System
Four Way Handshaking Using HIP
OLSR
Advantages of the Proposed Solution
Conclusion and Future Scope
References
Bilingual Translation System for Weather Report (For English and Tamil)
Introduction
Proposed Work
Parameters for Testing
Results
Conclusion
References
Design of QRS Detection and Heart Rate Estimation System on FPGA
Introduction
Basics of Wavelet Transform Approach
Discrete Wavelet Transform
Fast Wavelet Transform
Discrete Wavelet Transform
Spline Dyadic Wavelets
Quadratic Spline Function
“Algorithme a Trous”
Algorithm and Implementation
Zero Crossing Detection
Detection of R Peaks
Rate Determination
Implementation
Results
Conclusions
References
Multi-document Text Summarization in E-learning System for Operating System Domain
Introduction
Proposed Work
User Authentication
Query Answering System
Parameters for Testing
Results
Conclusion
References
Improving Hadoop Performance in Handling Small Files
Introduction
Background
MapReduce
Hadoop Distributed File System
The Small Files Problem
Impact on HDFS
Impact on MapReduce
Why Are the Small Files Produced?
Significance of Small Files Problem
Existing Solutions
Hadoop Archives
Sequence Files
Proposed Solution
Conclusion
Future Work
References
Studies of Management for Dynamic Circuit Networks
Introduction
Dynamic Circuit Network
The GMPLS Control Plane
The Management Plan
Traffic Engineering
Conclusion
References
International Workshop on Identity: Security, Management and Applications (ID 2011)
Game Theoretic Approach to Resolve Energy Conflicts in Ad-Hoc Networks
Introduction
MANET
Game Theory Approach
Topology
Algorithm
Setting Up a Dedicated Path
Identifying the Cheating Node
Implementation
Conclusion
References
Software Secureness for Users: Significance in Public ICT Applications
Introduction
National Rural Employment Guarantee Scheme (NREGS)
State of Software Sources and Data Formats
Secureness through Access to Sources
Secureness through Adherence to Data Standards
A Framework That Indicates Secureness of Software
Software Monitoring Application with Enhanced Secureness
Conclusion
References
Vector Space Access Structure and ID Based Distributed DRM Key Management
Introduction
Preliminaries
Common Components in DRM System
Certificate-Based Vs. Identity-Based Cryptography
Secret Sharing Schemes
Protocol
Overview of the Proposed DRM Architechture
Overview of the Proposed Key Distribution
Secure Delivery of Content Key
Security Analysis
Performance Analysis
Conclusion
References
Multiple Secrets Sharing with Meaningful Shares
Introduction
Related Work
(2,2) Visual Cryptography Scheme
Hou’s Scheme
The Proposed Scheme
Encryption
Data Extraction
Method Extension
Analysis
Security Analysis
Performance Analysis
Experimental Results
Conclusions
References
On Estimating Strength of a DDoS Attack Using Polynomial Regression Model
Introduction
Polynomial Regression Model
Detection of Attacks
Experimental Setup and Performance Analysis
Model Development
Results and Discussion
Conclusion and Future Work
References
Finding New Solutions for Services in Federated Open Systems Interconnection
Introduction
Federated Services Challenges
User Authentication and Authorization
Trust Establishment
Trusted Computing
AuthN with Private Key Protection
Attestation (Platform Authentication)
Assessment: Trusted Platform Module vs. Existing AuthN Types
Conclusion
References
Duplicate File Names-A Novel Steganographic Data Hiding Technique
Introduction
Related Work
Hiding Information on Storage Devices
Requirements
Application Scenario
Hiding On Floppy Disk
The Process of Hiding
The Process of Detection and Recovery
Renaming Method of Detection
Conclusion and Future Work
References
A Framework for Securing Web Services by Formulating an Collaborative Security Standard among Prevai
Introduction
Web Service Model
SOAP
WSDL
UDDI
Security Issues
Confidentiality
Authentication
Authorization
Non-Repudiation
Availability
Integrity
Proposed Security Framework Including Formulation of Collaborative Standards
Security Framework
Collaborative Security Standard
WS-* Security Standards
WS-Policy
WS-SecurityPolicy
WS-Security
WS-SecureConversation
WS-Trust
WS-Federation
Collaboration of WS-* Security Standards
Scenarios of Security Challenges and Technological Solutions
Evaluation Process
Conclusion
References
Improved Web Search Engine by New Similarity Measures
Introduction
Related Word
Similarity Measure as Inner dot Product
Cosine Similarity Measure
User Personalization
Click-through Data
Click-through Data Structure
Capturing and Storing Click-through Data
Ranking and Re-ranking
Experimental Setup
Conclusion and Future Work
References
International Workshop on Applications of Signal Processing (I-WASP 2011)
Recognition of Subsampled Speech Using a Modified Mel Filter Bank
Introduction
Computing MFCC of Subsampled Speech
Proposed Filter Bank
Experimental Results
Comparison Using Pearson Correlation Coefficient
Speech Recognition Experiments
Conclusion
References
Tumor Detection in Brain Magnetic Resonance Images Using Modified Thresholding Techniques
Introduction
Materials
Methodology
Modified Fuzzy Thresholding
Modified Minimum Error Thresholding
Results and Discussion
Modified Fuzzy Thresholding
Modified Minimum Error Thresholding
Performance Measure
Conclusion
References
Generate Vision in Blind People Using Suitable Neuroprosthesis Implant of BIOMEMS in Brain
Introduction
Image Acquisition and Processing
Adaptive Network Using VLSI
Visual Evoked Potential
Conclusion
References
Undecimated Wavelet Packet for Blind Speech Separation Using Independent Component Analysis
Introduction
Blind Speech Separation
Problem Formulation
FastICA Algorithm
Undecimated Wavelet Packet
Wavelet Transform
The Undecimated Wavelet Packet
The Proposed Method
Preprocessing Module
Separation Module
Results and Evaluation
Conclusion
References
A Robust Framework for Multi-object Tracking
Introduction
Proposed Framework
Multi-object Tracking
Object Appearance Modelling
Detection of Object Correspondence
Experimental Results
Conclusion
References
SVM Based Classification of Traffic Signs for Realtime Embedded Platform
Introduction
System Overview
ROI Selection
Shape Classification Using SVM
Pattern Classification
Training Non-linear SVM for Shape Classification and Pattern Recognition
Experimental Results
Conclusion
References
A Real Time Video Stabilization Algorithm
Introduction
Feature Extraction and Matching
Corner Features
Edge Based Template Matching
Motion Estimation and Compensation
Motion Estimation
Motion Compensation
Experimental Results
Conclusions
References
Object Classification Using Encoded Edge Based Structural Information
Introduction
Vehicle Detection in Daytime
Edge Feature Analysis Using DHWT
Representation of Object Edge Properties Using DHWT
Contour Suppression
Run Length Encoding
Structure Encoding in Run length Code
Classification
Profile Based Classification
Run Length Based Classification
Comparative Analysis
Performance Evaluation
Experimental Results
Profile Based Classification
Run Length Code Based Classification
Comparative Analysis
Parametric Analysis
Conclusions and Summary
References
Real Time Vehicle Detection for Rear and Forward Collision Warning Systems
Introduction
Algorithm Description – Forward Vehicles
ROI Selection
Profiling
Grouping of Edges
False Detections
Algorithm Description –Passing Vehicles
Tracking
Experiments
Highway Road Condition
Normal City Condition
Conclusions
References
PIN Generation Using Single Channel EEG Biometric
Introduction
Methodology
Pre-processing
Classification
Results
Conclusion
References
International Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp 2011
A Framework for Intrusion Tolerance in Cloud Computing
Introduction
Related Work
The Framework
Overview of Framework
Framework Components
Framework Validation
Simulation Environment
Simulation Results
Conclusion and Future Work
References
Application of Parallel K-Means Clustering Algorithm for Prediction of Optimal Path in Self Aware Mo
Introduction
Previous Work
Map-Reduce for Determining Clusters and K-Means Clustering Algorithm
K-Mean Clustering Algorithm
Previous Result and Analysis
Simulation Result
Identifying Link Stability
Comparison of the Results
Conclusion
References
Clouds’ Infrastructure Taxonomy, Properties, and Management Services
Introduction
Cloud Evolution
Related Work
Organization of the Paper
Taxonomy of the Cloud
Cloud Infrastructure Taxonomy
Virtual Control Center
Factors Affecting Management Services
Deriving Self-managed Services
Multi-tier Application Scenario at the Cloud
Identifying Management Services
Conclusion and Research Agenda
References
A Deduced SaaS Lifecycle Model Based on Roles and Activities
Introduction
Related Works
SaaS Software Ecosystem
Deducing Approach
Roles and Activities
Clustering Algorithm
Deducing Results
Conclusions and Future Works
References
Towards Achieving Accountability, Auditability and Trust in Cloud Computing
Introduction
A Trust-Related Scenario
Complexities Introduced by Cloud’s Elasticity
Challenges Introduced by Virtualisation
Logging from Operating System Perspective vs. Logging from File-Centric Perspective
Live and Dynamic Systems
Scale, Scope and Size of logging
Achieving an Accountable Cloud
Phases of Cloud Accountability
Cloud Accountability Abstraction Layers
Foreseeable Research Challenges
Technical Approaches to Increasing Accountability
Policy Approaches to Increasing Accountability
Related Research
Governance, Risk Management and Compliance (GRC) Stack of the Cloud Security Alliance (CSA) [34]
CSC and National Institute of Standards and Technology
HP Labs – Cloud and Security Lab
University of Pennsylvania
HyTrust Appliance [12]
Data and Workflow Provenance Research [17]
Concluding Remarks
References
Cloud Computing Security Issues and Challenges: A Survey
Introduction
Cloud Computing Definition and Features
Definition
Characteristics
Cloud Computing Service Model
Cloud Deployment Models
Security Issues Associated with the Cloud
Security Issues Based on the Delivery and Deployment Model of Cloud
Security Challenges
Service –Level Agreement
Authentication and Identity Management
Data- Centric Security and Protection
Trust Management
Access Control and Accounting
Conclusion
References
A Deadline and Budget Constrained Cost and Time Optimization Algorithm for Cloud Computing
Introduction
Novel Service Computing Framework-RAINBOW
Motivations and Related Work
Resource Allocation in Clouds
Cost and Time Optimization Algorithm
Experimental Framework
Time Complexity
Conclusion and Future Work
References
International Workshop on Multimedia Streaming (MultiStreams 2011)
A Bit Modification Technique for Watermarking Images and Streaming Video
Introduction
Image Watermarking
Bit Modification Image Watermarking at High Bit Index
Experimental Results and Discussion
Robustness of Watermark to Noise
Discussion
Conclusion
References
Efficient Video Copy Detection Using Simple and Effective Extraction of Color Features
Introduction
Proposed Scheme
Fingerprint Extraction
Fingerprint Matching
Experimental Results
Experiment 1: Detection Accuracy
Experiment 2: Detection Efficiency
Conclusion
References
Mobile Video Service Disruptions Control in Android Using JADE
Introduction
Basic Ideas of Our Agent Based Control Mechanism
The Service Disruption Problem and Our Solution
Experimental Results
Conclusions and Future Work
References
Performance Analysis of Video Protocols over IP Transition Mechanisms
Introduction
Background
Related Works
Network Setup
Traffic Generating and Monitoring Tools
Experimental Design
Results
Discussion and Conclusion
References
Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling Mechanisms
Introduction
Background
Related Works
Network Setup
Traffic Generating and Monitoring Tools
Experimental Design
Results Analysis
Discussion and Conclusion
References
IPTV End-to-End Performance Monitoring
Introduction
IPTV Architecture
Super Headend (SHE) and Video Hub Office (VHO)
Core Network
Access Network
Home Network
Need for Performance Monitoring and Its Benefits
QoS for IPTV
Approach for Monitoring
Monitoring Points and Methodology
System Integration
Correlation Engine
Unified dashboard
Performance Metrics
QoE in IPTV
QoE Estimation
Conclusion
References
A Color Image Encryption Technique Based on a Substitution-Permutation Network
Introduction
Encryption Process
Matrix Transformation
Pixel Diffusion
Permutation
Experimental Results
Visual Test
Information Entropy Analysis
Cross–Correlation
Net Pixel Change Rate
Unified Average Change in Intensity
Key Space and Sensitivity Analysis
Key Space Analysis
Decryption Key Sensitivity
Encryption Key Sensitivity
Plaintext Sensitivity
Ciphertext Sensitivity
Efficiency Analysis
Conclusion
References
Second International Workshop on Trust Management in P2P Systems (IWTMP2PS 2011)
Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature
Introduction
Review of Harn-Ren Scheme
PKG
Multisignature Generation
Multisignature Verification
Yang et al. Attack and Improvement
Yang et al.’s Forgery Attack I
Yang et al.’s Improvement
Our Comment
Erratum to Harn-Ren Scheme
Security Analysis of Improvement Scheme
Conclusion
References
A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs
Introduction
Related Work
Dynamic Key Management Mechanism
Secure Auto Configuration Mechanism
Key Management Scheme
Trust Estimator Technique
Enhanced Routing
Simulation Result and Observation
Conclusion
References
A Convertible Designated Verifible Blind Multi-signcryption Scheme
Introduction
The Proposed Scheme
Discussion
Security Analysis
Attacks for Parametre Reduction
Forgery Attack
Performance Evaluation
Conclusion
References
Middleware Services at Cloud Application Layer
Introduction
Scope of the Paper and Related Work
Middleware Services of Application Layer
Adaptability
Resilience
Scalability
Availability
Reliability
Security and Privacy
Summary of Services Interdependency
Services Interaction for Multi-tier Application in the Cloud
Application Architecture in the Cloud and Types of Middleware
Middleware Services Interaction
Discussion, Conclusion, and Research Direction
References
Attribute Based Anonymity for Preserving Privacy
Introduction
Related Work
Proposed Work
Attribute Combination Based Generalization
Information Loss
Complexity
Conclusions and Future Work
References
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
Introduction
Related Work
WMN Security Architecture
Access Network Security
Backbone Network Security
The Key Distribution Protocol
Server Initiated Key Management Protocol
The Privacy and Anonymity Protocol
Performance Evaluation
Conclusion and Future Work
References
Data Dissemination and Power Management in Wireless Sensor Networks
Introduction
Related Works
System Model and Assumptions
Data Dissemination and Power Management Protocol (DDPM)
Initialization Phase
Data Dissemination Process
Performances Evaluation
Energy Consumption
Response Time
Conclusion
References
Performance Evaluation of ID Assignment Schemes for Wireless Sensor Networks
Introduction
Related Work
Performance Evaluation
Simulation Results
Energy Consumption
Communication Overhead
Impact of Packet Size on Energy Consumption
Impact of Packet Size on Communication Overhead
Conclusions
References
Author Index
People also search Advances in Computing and Communications Part IV First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st :
what is advances in technology
advances in computer and communication
advances in computer and electrical engineering
advance in computer application