Advances in Computing and Communications Part III First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st edition by Ajith Abraham, Jaime Lloret Mauri, John Buford- Ebook PDF Instant Download/Delivery.9783642227202, 3642227201
Full download Advances in Computing and Communications Part III First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st edition after payment
Product details:
ISBN 10: 3642227201
ISBN 13: 9783642227202
Author: Ajith Abraham, Jaime Lloret Mauri, John Buford
This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.
Advances in Computing and Communications Part III First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st Table of contents:
Security, Trust and Privacy
Chaotic Integrity Check Value
Introduction
Proposed Hash Function
Strengthening the Proposed Hash Function
Scheme A
Scheme B
Results and Analysis
Checking for Collisions in the Whole Space
Sensitivity of Proposed Keyed Hash Function with Respect to Input Message
Sensitivity of Control Parameter
Sensitivity of Initial Value
Collision Analysis
Conclusions
References
An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures
Introduction
Advanced Keylogger Characteristics
Keylogger Methodology: Stealth and Persistence
Keylogger Malware Statistics
Anti-keylogger Analysis
Mitigation Techniques Users
Multifactor Authentication to Thwart Password Stealing [10]
Scratch List
Time Based
Challenge Response Based
Our Solution
Advantages
Disadvantage
Conclusion
References
Cancelable Biometrics for Better Security and Privacy in Biometric Systems
Introduction
Cancelable Biometrics: Related Work
A Biometric Data Shuffling Scheme to Create Cancelable Biometric Templates
The Shuffling Technique
Advantages of Using the Proposed Shuffling Scheme
Experimental Setup
Experimental Results and Security Analysis
Results and Security Analysis on Iris Modality
Results and Security Analysis on Face Modality
Conclusions and Perspectives
References
Advanced Clustering Based Intrusion Detection (ACID) Algorithm
Introduction
Intrusion
Intrusion Detection and Its Importance
Clustering
Introduction
Clustering in Intrusion Detection
Advanced Clustering Based Intrusion Detection (ACID) Algorithm
Introduction
Analysis of the Problem
Solution Strategy
Various Modules or Functions Used
Results and Discussion
Conclusions
References
Measuring the Deployment Hiccups of DNSSEC
Introduction
Background
Domain Name System (DNS)
DNS Security Extensions (DNSSEC)
Methodology
PlanetLab
Tor
Data Collection
Results
Node Categorization
Failure Patterns
Related Work
Conclusion
References
Sensor Networks
Self-organizing MAC Protocol Switching for Performance Adaptation in Wireless Sensor Networks
Introduction
Background
Related Work
Proposed Dynamic MAC Protocol Switching
Protocol Adaptations
Adaptations of CSMA/CA for TDMA Coexistence
Adaptation of TDMA for CSMA/CA Coexistence
MAC Protocol Switching Logic
Influencing Switching Parameters
Switching Criteria
Experimental Evaluation
Switching in Response to Changes in Data Rate
Switching in Response to Number of Active Nodes
Switching with Spatially Clustered Traffic
Conclusions and Ongoing Work
References
DFDNM: A Distributed Fault Detection and Node Management Scheme for Wireless Sensor Network
Introduction
Cellular Automata
Mathematical Analysis
Energy Requirement for Wireless Communication
Fault Detection
Proposed DFDNM Approach
Experimental Results
Conclusions
References
An Optimized Reduced Energy Consumption (OREC) Algorithm for Routing in Wireless Sensor Networks
Introduction
Related Work
Proposed Method
The Node Deployment Protocol
The Realistic Power Model
Optimized Reduced Energy Consumption (OREC) Algorithm
Simulation Results
Conclusion and Future Work
References
Improving Energy Efficiency of Underwater Acoustic Sensor Networks Using Transmission Power Control:
Introduction
Related Work
Transmission Power Control to Enhance Energy Efficiency
Overview of RMAC
RMAC with Power Control (RMAC-PC)
Simulation and Results
Conclusion
References
A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN
Introduction
Related Works
Contributions
Network Deployment
Algorithm and Probability Analysis
Single Sensing Detection Model
Multi Sensing Detection Model
Simulation and Verification
Conclusions
References
An Efficient and Hybrid Key Management Scheme for Three Tier Wireless Sensor Networks Using LU Matri
Introduction
Related Works
Our Contributions
Preliminaries
Notations Used
WSN Architecture
Proposed Scheme
Security Analysis
Performance Analysis
References
Grey System Theory-Based Energy Map Construction for Wireless Sensor Networks
Introduction
Related Work
Prediction Based Energy Map
Energy Map
The Protocol
Grey System Theory-Based Energy Map
The GM(1, 1) Model
Simulation Results
Optimal Sequence Length
Predicted Value and Correct Value of Energy
Conclusion
References
An Entropic Approach to Data Aggregation with Divergence Measure Based Clustering in Sensor Network
Introduction
Related Work
Proposed Divergence Measure Based Clustering Technique
Preliminary Clustering Phase
Final Clustering Phase
Proposed Data Fusion Algorithm Using Fuzzy-Entropy
Simulation and Performance Evaluations
Conclusion
References
Energy Efficient Routing Protocols for Wireless Sensor Networks Using Spatial Correlation Based Coll
Introduction
Related Work
Proposed Model
Spatial Correlation in Wireless Sensor Networks
Distortion Constraint
Simulation Results for Distortion Constraint
Collaborative Based Medium Access control (CC-MAC)
Iterative Node Selection Algorithm
Routing Algorithms
Simulation Results
Comparison of End to End Delay with AODV, DSR, DSDV
Comparison of Packet Delivery Ratio with AODV, DSR, DSDV
Comparison of Packet Loss with AODV, DSR, DSDV
Comparison of Energy Consumption with AODV, DSR, DSDV
Conclusion and Future Work
References
Signal and Image Processing
Palmprint Authentication by Phase Congruency Features
Introduction
Palmprint Authentication System
Feature Extraction Using Phase Congruency Features
Feature Matching
Euclidean Distance Similarity Measurement
Reference Threshold
Experimental Results and Analysis
Palmprint Authentication System
Reference Threshold Calculation
Conclusion
References
Design and Implementation of 3D DWT for 4D Image Based Noninvasive Surgery
Introduction
3D Discrete Wavelet Transform for 4D Imaging
Proposed 3D DWT for 4D Imaging
Simulink Model Design of 3D-DWT
Result and Discussion
Conclusion
References
Stratified SIFT Matching for Human Iris Recognition
Introduction
Conventional SIFT Matching
Stratified SIFT Matching
Strata I: SIFT Matching
Strata II: Gradient Based Filtering
Strata III: Scale Based Filtering
Experimental Results
Conclusions
References
Quality Index Based Face Recognition under Varying Illumination Conditions
Introduction
Image Quality Index Based Face Recognition
Results and Discussion
Conclusion
References
Noise Adaptive Weighted Switching Median Filter for Removing High Density Impulse Noise
Introduction
Noise Models
Noise Adaptive Weighted Switching Median (NAWSM) Filter
Noise Detection Stage
Noise Filtering Stage
Performance Measures
Results and Discussion
Conclusion
References
SMT-8036 Based Implementation of Secured Software Defined Radio System for Adaptive Modulation Techn
Introduction
System Architecture
Random Number Generator Based Multi-modulation Software Defined Radio Transmitter
Adaptive SDR Receiver
Platform Used
System Level Simulations
Conclusion and Future Scope
References
Abstraction of Exudates in Color Fundus Images
Introduction
Related Works
Proposed Method
Image Acquisition
Preprocessing
Retinal Image Segmentation
Feature Selection
Region Level Classification
Results
Conclusion
References
A Histogram Adaptation for Contrast Enhancement
Introduction
Histogram Adaptation
Methodologies
Adjustable Histogram Equalization
Histogram Smoothing
Weighted Histogram Approximation
Low-Complexity Histogram Modification Algorithm
Results and Discussion
Conclusion
References
Evaluating the Performance of a Speech Recognition Based System
Introduction
Evaluation without Testing
Case Study
Conclusion
References
Unified Approach in Food Quality Evaluation Using Machine Vision
Introduction
Quality Evaluation Using Machine Vision
Assesment of Food Products
Proposed Unified Approach for Quality Evaluation
Conclusion
References
Mach-Zehnder Interferometer Based All-Optical Peres Gate
Introduction
SOA Based MZI Switch
Peres Gate (PG) Architecture and Its Simulation
Peres Gate (PG) Configuration Using MZI
Functional Operations
Simulation and Performance Evaluation
Concluding Remarks
References
Using PSO in Image Hiding Scheme Based on LSB Substitution
Introduction
Particle Swarm Optimization
Proposed Technique
Extraction of Secret Image
Experimental Results
Conclusions
References
Matrix Embedding Using Random Linear Codes and Its Steganalysis
Introduction
Basic Concepts
Matrix Embedding
Matrix Embedding Using Random Linear Codes for Large Relative Payloads
The Algorithm
Experimental Results
Embedding Efficiency
PSNR Values
Chi-Square Attack
RS Attack
Conclusion
References
An Efficient Directional Weighted Median Switching Filter for Impulse Noise Removal in Medical Image
Introduction
Noise Models
An Efficient Directional Weighted Median Switching Filter for Impulse Noise Removal in Medical Image
Noise Detection Stage
Noise Filtering Stage
Performance Measures
Results and Discussion
Conclusion
References
An Improved Handwritten Text Line Segmentation Technique
Introduction
Proposed Method
Painting Algorithm and Stripe Minimization
Line Drawing by Estimated Slope and Adding Words to blocks
Edge Detection Process
Experiment Analysis and Comparative Study
Conclusion
References
Skew Estimation for Unconstrained Handwritten Documents
Introduction
Proposed Method
Experimental Results and Comparative Study
Discussion and Conclusion
References
Recognition of Simple and Conjunct Handwritten Malayalam Characters Using LCPA Algorithm
Introduction
Proposed OCR System
Pre processing Technique
Skeletonization
Feature Extraction and Recognition
Classification of Characters Based on Features
Experimental Analysis
Conclusion
References
A Fuzzy Genetic Approach to Impulse Noise Removal
Introduction
Genetic Algorithm Based Impulse Noise Removal
The Proposed Method Using Fuzzy Genetic Algorithm
Results and Discussion
Performance Evaluation
Conclusion
References
Chain Code Histogram Based Facial Image Feature Extraction under Degraded Conditions
Introduction
Face Database
Chain Code Histogram (CCH) for Image Feature Extraction
Face Verification System Using CCH Feature
Preprocessing
Canny Edge Detection
CCH Feature Extraction
Verification System
Experiments and Outcomes
Experimental Details
Experimental Results and Discussions
Summary and Conclusions
References
Object Recognition Based on Fuzzy Morphological Polynomial Signal Representation
Introduction
Background Knowledge
Fuzzy Mathematical Morphology
Fuzzy Morphological Polynomial (FMP) Signal Representation
FMP Object Recognition
Examples
Conclusions
References
Face Detection for Skin-Toned Images Using Signature Functions
Introduction
Preprocessing
Proposed Algorithm
Feature Extraction Stage
Testing Phase
Results
Conclusion
References
Recurrent Neural Network Based Phoneme Recognition Incorporating Articulatory Dynamic Parameters
Introduction
Distinctive Phonetic Features
Phoneme Recognition Methods
The Existing Method [9]
Proposed Method
Experiments
Speech Database
Experimental Setup
Experimental Results and Analysis
Conclusion
References
Gaussian Noise and Haar Wavelet Transform Image Compression on Transmission of Dermatological Images
Introduction
The Dermatological Image Database
The HWT Compression Based Teledermatology System (HTS)
Results and Conclusion
References
Image Processing Techniques for Glaucoma Detection
Introduction
Proposed Methods for Glaucoma Detection
Pre Processing
Segmentation from the Preprocessed Image
Results and Discussions of Glaucoma Detection Techniques Based on CDR Evaluation
Glaucoma Detection Based on Multi-thresholding
Glaucoma Detection Based on Active Contour Method
Glaucoma Detection Based on Region Growing Segmentation Technique
Conclusion
References
Transmitter Preprocessing Assisted MIMO SDMA Systems over Frequency-Selective Channels
Introduction
System Configuration
Power Allocation Policy
Joint Power Allocation Policy
Individual Power Allocation Policy
Performance Results
Conclusion
References
A Fuzzy Neuro Clustering Based Vector Quantization for Face Recognition
Introduction
Related Works
Proposed Face Recognition System
Pre-processing
The Proposed Adaptive Codebook Design
Codebook Generated by Code Classification
Codebook Design Using IAFC
Experimental Results and Discussions
Conclusion
References
3D Face Recognition Using Orientation Maps
Introduction
Methodology
Preprocessing
Significant Point Extraction
Significant Point Descriptor Computation
Similarity between Two Face Images
Experimental Results
Database
Results
Conclusion
References
The Optimal Wavelet for Speech Compression
Introduction
Choice of Wavelet
Discrete Wavelet Transform
Signal Reconstruction
Data Base used for the Experiment
Experiment
Performance Measurement Tools
Mean Square Error
Peak Signal to Noise Ratio
Normalized Root Mean Square Error
Retained Signal Energy (RSE)
Compression Ratio
Mean Opinion Score (MOS)
Result
Conclusion
References
Skew Angle Estimation and Correction for Noisy Document Images
Introduction
Prior and Related Work
System Description
Preprocessing
Noise Removal Algorithm
Image Block Selection
Skew Angle Estimation and Correction
Experimental Results
Mean Filter
Median Filter
Conclusion
References
Face Recognition Using ATP Feature Set under Difficult Lighting Conditions
Introduction
Related Work
Empirical Model of the Proposed System
Noise Removal Technique
Feature Extraction
Empirical Analysis
Conclusion
References
Classification of Mammogram Images Using Discrete Wavelet Transformations
Introduction
Digital Mammograms
Wavelet Transformations
Proposed Method
Results
Conclusions
References
Optimized Trace Transform Based Feature Extraction Architecture for CBIR
Introduction
Proposed Algorithm and Architecture for Trace Transform Based Feature Extraction
Proposed Algorithm
Proposed Architecture
Implementation and Results
Conclusion
References
Multi-algorithm Fusion for Speech Emotion Recognition
Introduction
Our Approach
Wavelet Transform
Mel Frequency Cepstral Coefficients (MFCC) Algorithm
Fusion of Algorithms
Feature Extraction
Feature Extraction from Wavelet Transform
Feature Extraction from MFCC
Feature Matching
Experiments and Results
Conclusion
References
Combining Chain-Code and Fourier Descriptors for Fingerprint Matching
Introduction
Shape Representation
Chain Code
Fourier Descriptors
Proposed Method
Pre-processing
Chain Code Processing
Fourier Descriptor
Feature Extraction
Matching Similarity Measures
Test Results
Conclusion
References
Facial Emotion Recognition Using Different Multi-resolution Transforms
Introduction
Related Work
Multi-resolution Image Analysis
Wavelet Transform
Curvelet Transform
Contourlet Transform
Experiments and Results
Emotion Corpus
Experimental Setup
Conclusion
References
Robust Watermarking through Spatially Disjoint Transformations
Introduction
Related Works
Theory of DCT Watermarking
Theory of DWT Watermarking
Theory of DFT Watermarking
Proposed Spatially Disjoint Watermarking Procedure
Experimental Results
Result Analysis for PSNR
Result Analysis for Similarity Factor
Results for PSNR and SM against Various Signal Processing Attacks
Conclusion
References
Soft Computing Techniques
An ANN Based Approach to Calculate Robotic Fingers Positions
Introduction
Related Work
System Description
ANN Implementation
Results
Conclusion
References
Word Classification Using Neural Network
Introduction
Features for Classification
Mel-Frequency Cepstral Coefficients (MFCCs)
Formants (F1, F2, F3 and F4)
Zero Crossing Rate
Results and Discussions
Conclusion
References
Very Short Term Wind Power Forecasting Using PSO-Neural Network Hybrid System
Introduction
PSO-Neural Network
Artificial Neural Network
Particle Swarm Optimization
Short Term Wind Power Forecasting
Wind Speed Prediction
Wind Power Prediction
Results
Conclusion
References
A Class of Recurrent Neural Network (RNN) Architectures with SOM for Estimating MIMO Channels
Introduction
Basic Considerations of RNN
System Model
Complex Time Delay Fully Recurrent Neural Network (CTDFRNN) with Self Organizing Map (SOM) Optimizat
Competitive Learning of the SOM Optimization Block
Experimental Results and Discussion
Conclusion
References
An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques
Introduction
Literature Survey
Motivation
Data Set Details
Proposed Data Preprocessing Framework
Proposed Approach to Impute Continuous Missing Values
Proposed Approach to Impute Categorical Missing Values
Prediction Model
Performance Analysis
Conclusions
References
Process Oriented Guided Inquiry Learning for Soft Computing
Introduction
Process Oriented Guided Inquiry Learning
Context and Examples
Genetic Algorithms
Neural Networks
Fuzzy Sets and Relations
Results
Conclusions
References
A Modified and Efficient Shuffled Frog Leaping Algorithm (MSFLA) for Unsupervised Data Clustering
Introduction
Scientific Backgrounds
Shuffled Frog Leaping Algorithm (SFLA)
Steps in SFL Algorithm
MSFLA to Data Clustering
Modified SFLA (MSFLA)
Application to Data Clustering
Experimental Studies
Experimental Settings
Results and Discussion
Simulation Results
Conclusions
References
Neighborhood Search Assisted Particle Swarm Optimization (NPSO) Algorithm for Partitional Data Clust
Introduction
Data Clustering Problem Formulation
PSO Algorithms in Clustering
General Structure of Proposed NPSO Algorithm
Generation of Initial Particles
Centroid-Updating Scheme
Neighborhood Search Schemes
Performance Analysis of NPSO Algorithm
Experimental Setup
Results and Discussions
Conclusion
References
System Software
Portability in Incremental Compilers
Introduction
Related Work
Proposed Solution
External Data Representation
Proposed Architecture
XML-Based Code
Results and Observations
Conclusion and Future Work
References
Test Case Optimization Using Artificial Bee Colony Algorithm
Introduction
Background Work
Artificial Bee Colony (ABC) Algorithm
Proposed Strategy
ABC Optimization Algorithm
Case Study
Analysis and Comparison
Conclusions and Future Work
References
Vehicular Communications Networks
Adaptive Power Allocation in CI/MC-CDMA System Using Genetic Algorithms
Introduction
Review of Prior Works, Limitations and Scope of the Present Work
System Model with Antenna Diversity
Transmitter Model
Channel Model
Receiver Model
Antenna Diversity
Proposed GA Based Power Allocation Algorithm
Formulation of Objective Function
GA Based Adaptive Power Allocation
Performance Evaluation
Conclusions and Scope of Future Works
References
PHY Abstraction for MIMO Based OFDM Systems
Introduction
Link Level Simulations
System Level Simulations
Abstraction Methods for Link to Systems
Static Methodology of Abstraction
Dynamic PHY Abstraction Methodology
Received Symbol Mutual Information Rate
RBIR Mapping for MIMO Receiver
Channel Estimation Error Modeling
Simulations
Simulation Parameter
Conclusions
References
Level Crossing Rate in Land Mobile Satellite Channel with a Modified Nakagami-Lognormal Distribution
Introduction
Envelope Process and Probability Density Function
Expression for Level Crossing Rate
Expression for Joint Pdf of Signal and Its Time Derivative
Level Crossing Rate
Effects of Different Parameters on Computed LCR
Conclusion
References
Cache Invalidation for Location Dependent and Independent Data in IVANETS
Introduction
Related Work
Proposed Scheme
System Model
Proposed Approach
Proposed Cache Invalidation Technique
Theoretical Analysis
Conclusion
References
VCAR: Scalable and Adaptive Data Dissemination for VANET
Introduction
Related Work
Proposed Protocol Model
Junction Mode
Highway Mode
Cluster Formation
Cluster Head Announcement
Mobile Cluster in Highway Mode
Simulation and Performance Evaluation
Simulation Results and Analysis
Conclusion
References
Efficient Distributed Group Authentication Protocol for Vehicular Ad Hoc Network
Introduction
Related Work
Protocol Design
Security Requirements
E-GAP Protocol
Simulation
Performance Evaluation
Conclusions and Future Work
References
Opportunistic Dissemination for Accident Management Using Vehicular Networks
Introduction
Related Works
Proposed Model
Least Length Path Routing (LLPR)
Performance Evaluation
Conclusion
References
Machine Learning Approach for Multiple Misbehavior Detection in VANET
Introduction
Related Work
System and Attacker Model
Proposed Methodology
Experimental Setup
Results and Analysis
Conclusion
References
Improved Position-Based Routing in Vehicular Ad Hoc Networks Using P-DIR Method
Introduction
Related Work
Proposed Work
Link Duration (LD)
Direction towards Destination (DR)
Position Metric for Next-Hop Node
Results and Performance Analysis
Link Duration
Position of the Next-Hop Node
Conclusion
References
IMS and Presence Service Integration on Intelligent Transportation Systems for Future Services
Introduction
IMS Background
3GPP IMS Core
3GPP IMS Emergency Sessions
3GPP IMS Presence Architecture
Related Work
Reference Architecture
Development of the Presence-Based Service Platform
Service Prototypes
Conclusions and Future Work
References
Author Index
People also search for Advances in Computing and Communications Part III First International Conference ACC 2011 Kochi India July 22 24 2011 Proceedings 1st :
advances in computing and engineering
advances in computing and information icci 90
advances in computing and information icci 91
advances in computing and information technology