NCIIT 12 Proceedings
NCIIT 12 Proceedings
DRDO Sponsored  
Third National Conference on Innovations in 
Information Technology 
NCIIT 2012 
 
 24
th
 & 25
th
   February 2012 
 
 
 
 
 
 
 
     
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
   
 
 
 
 
 
 
Organized By 
Department of Computer Science and Engineering 
Bannari Amman Institute of Technology 
Sathyamangalam  638 401 
Erode District, Tamil Nadu 
 
 
 
 
 
ORGANIZING COMMITTEE  
 
 
PATRON 
Dr S V Balasubramaniam 
Chairman, BIT 
 
 
CHIEF PATRON 
Dr S K Sundararaman 
Director, BIT 
 
 
CHAIRMEN 
Dr A M Natarajan 
Chief Executive, BIT 
 
Dr A Shanmugam 
Principal, BIT 
 
 
CONVENER 
Dr. P. Thangaraj 
Professor & Head / CSE. BIT 
 
 
ORGANIZING SECRETARY 
Dr. K. Premalatha 
Professor / CSE, BIT 
 
 
COORDINATOR 
Mr. J Vijay Franklin 
Assistant Professor / CSE, BIT 
 
 
 
 
 
 
TECHNICAL COMMITTEE 
 
 
 
Dr A Kannan  
Anna University, Chennai 
 
 
Dr S Kanmani 
Pondicherry Engg. College, 
Pondicherry 
 
 
Dr K Chadrasekaran 
NIT,Suratkal 
 
 
Dr. Sudhasadhasivam  
PSG College of Tech,  
Coimbatore 
 
 
Dr. M.L. Valarmathi  
GCT, Coimbatore 
 
 
Dr.N.Shanthi, 
K.S.Rangasamy College of 
Technology, Tiruchengode 
 
 
 
 
 
 
 
Mr. N. Sundersan, 
CTS, Bangalore 
 
 
Dr. R. Thangarajan 
Kongu Engineering College, 
Erode 
 
 
Dr. R.R. Rajalaxmi 
Kongu Engineering College, 
Erode 
 
Dr. B. Sathyabama 
Sona College of Technology, 
Salem 
 
Dr. B. Nagarajan 
Bannari Amman Institute of 
Technology, Sathyamangalam  
 
 
Dr. Amitabh Wahi 
Bannari Amman Institute of 
Technology, Sathyamangalam  
 
 
 
 
 
 
 
 
 
 
 
Proceedings of NCIIT 2012   
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
 
About the Conference  
The  Third  National  Conference  on  Innovations  in  Information  Technology will 
provide  an  excellent  national  forum  for  sharing  knowledge  and  results  in  theory, 
methodology,  applications  and  innovations  in  Information  Technology.  The  Conference 
looks  for  significant  contributions  to  all  major  fields  of  the  Computer  Science  and 
Information  Technology  in  theoretical  and  practical  aspects.  The  aim  of the  conference  is 
to  bring  together  academic  scientists,  industry  researchers  and  scholar  students  to 
exchange and share their experiences and research results about all aspects of Information 
Technology, and discuss the practical challenges encountered and the solutions adopted. 
 
About Bannari Amman I nstitute of Technology  
The Bannari Amman Institute of Technology (BIT) is the fruit of decided efforts put 
up  by  the  Bannari  Amman  Group,  a  leading  corporate  house  under  the  dynamic 
chairmanship of a great visionary Dr. S. V. Balasubramaniam in South India to establish a 
center of excellence in Engineering & Technology. It is an impressive campus, situated in a 
serene surrounding at the foot hills of Nilgiris Mountains. The institute is affiliated to Anna 
University,  Coimbatore  and  approved  by  AICTE,  New  Delhi.  The  Institute  offers  several 
undergraduate and postgraduate Programmes in Engineering, Technology. The institution 
is ISO 9001:2000 certified for its quality education and most of the courses are accredited 
by National Board of Accreditation (NBA), AICTE. 
 
About the Department of CSE 
The  Department  of  Computer  Science  &  Engineering  is  a  unique  center  of  BIT 
established  in  1996.  It  offers  a  4  year  B.E  -  CSE  programme  and  2  year  M.E  -  CSE 
programme.  The  department  has  dedicated  and  specialized  faculty  members  in  different 
areas  of  computer  Science  &  Engg.,  with  rich  experience  in  academics,  industry  and 
research.  The  department  has  well  equipped  and  spacious  laboratories  with  modern 
computer equipments.  
 
    Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
LIST OF PAPERS 
 
                                            Venue: CSE Smart Hall I & II
          
S.NO.  TITLE OF THE PAPER   PAGE NO. 
1.    A Secure And Dependable Storage With Multiple Cloud Servers 
 
1 
2.    A Survey: Job Scheduling Algorithms In Grid Environment 
 
1 
3.    An Efficient And Secure Nonlinear Programming Outsourcing in 
Cloud Computing 
 
2 
4.    Caching Scheme For Distributed Data Sharing In Peer-To-Peer 
Environments 
 
2 
5.    Enabling Public Auditability And Data Dynamics For Storage 
Security In Cloud Computing 
 
3 
6.    Enhancing Performance Of Home Network Using Middleware 
 
3 
7.    Improving Hierarchical Load Balanced Algorithm For Job 
Scheduling In A Grid Environment 
 
4 
8.    Parallel Scheduling And Security Mechanism For Heterogeneous 
Distributed Systems 
 
4 
9.    Performance Analysis And Optimization Of Multi-Cloud 
Computing For Loosely Coupled MTC Applications 
 
5 
10.   Resume Analyzer Website For IT Companies Using Cloud 
Computing 
 
5 
11.   A Study Of Congestion Control Algorithm In Wireless Sensor 
Networks 
 
6 
12.   Accurate Tracking In Wireless Sensor Network By Sensor 
Collaboration 
 
6 
13.   Achieving High-Throughput Multicast Routing Based On 
Rateguard In Wireless Mesh Networks 
 
7 
14.   Analysis Of Contention Based Method For MAC Layer In 
Wireless Networks 
 
7 
 
Proceedings of NCIIT 2012   
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
 
15.   Channel Allocation For Uncoordinated WLANs 
 
8 
16.   Cognitive Topology Control In CR-MANETs 
 
8 
17.   Constructing Minimum Size Wireless Sensor Networks To 
Provide Critical Square Grid Coverage Using Steiner Tree Based 
Critical Grid Coverage Algorithm 
 
9 
18.   Controlled Sink Mobility For Prolonging Wireless Sensor 
Networks Lifetime 
 
9 
19.   Cooperative Multi-Hop Transmission In Wireless Networks 
 
10 
20.   Customized QoS Metric Based On Data Traffic In Wireless 
Sensor Network Routing 
 
10 
21.   Secure And Efficient Retrieval Of Data In Cloud Computing 
 
11 
22.   Workflow Optimization For Allocation Of Jobs In Grid 
Environments 
11 
23.   Efficient Resource Selection And Load Balancing Algorithm 
Based On The Scheduling Of Parallel Applications 
12 
24.   Novel Method For Throughput A Prediction Of Network Service 
And Transfer Of Data Packets 
12 
25.   Efficient Clustering And Discovery Of Resources In Wide-Area 
Distributed Computational Grids 
13 
26.   Concert Measure Of Network I/O Workload In Virtualized 
Datacenter Using Para virtualization 
 
13 
27.   Classification And Evaluation Of Grid Resources Based On Grid 
Tasks For Minimizing Overhead Computation Time 
14 
28.   Grid Technology For Neuroscience  14 
29.   Automatic Reconfigurable System For Run-Time Application  15 
30.   Secured And Efficient Outsourcing Of Linear Programming In 
Cloud Computing 
15 
    Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
31.   Fairness Scheduler With Hierarchical Classification For 
Resource Management In Grid Environment 
16 
32.   A New Wireless Web Access For Web Surfing Based On Cloud 
Computing 
16 
33.   User Movement And Service Prediction Scheme For Mobile 
Environment 
17 
34.   Efficient Data Broadcasting In Underwater Wireless 
Communication Networks 
17 
35.   Efficient Data Collection Over Multitraffic Flow Using The Pass 
Node Deployment 
18 
36.   Energy Efficient On-Demand Routing Protocol For Local 
Monitoring In Wireless Sensor Networks 
18 
37.   Enhanced Medium Access Control Using Cross-Layer Link 
Asymmetry Interaction For Wireless Mesh Network 
19 
38.   Multiuser Detection And Collision Avoidance In Wireless 
Network 
 
19 
39.   Supporting Efficient And Scalable Multicasting Over Mobile Ad 
Hoc Networks 
20 
40.   Improving ADCC For Home Automation Networks In High 
Volume Sensed Data 
 
21 
41.   A Novel Approach for Network Security Using Data Mining 
 
21 
42.   A Secure Authentication for Blocking Misbehaving Access using 
Ticket Based Method 
22 
43.   A Secure Key Transfer In Decentralized Secure Group 
Communication By Using MDS Codes 
22 
44.   Adaptive Audio Steganography Based On LSBMR Algorithm  23 
45.   An Architecture To Provide Authentication In Anonymous 
Networks 
23 
 
Proceedings of NCIIT 2012   
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
46.   An Improved Method Based On Anonymization Algorithms For 
Preserving Source-Location Privacy In Wireless Sensor Network 
24 
47.   Authentic Non Symmetric Group Key Agreement Using 
Broadcast Encryption 
24 
48.   Automotive Can Network Attacked By Security Threats  25 
49.   Balancing Revocation And Storage Trade-Offs In Privacy-
Preserving Universal Authentication Protocol 
 
25 
50.   Blacklisting Misbehaving  Users In Indistinctive Networks  26 
51.   Concealment Of Information In Inactive Audio Frames Of VoIP  26 
52.   Detection Of Malicious User In Cooperative System 
 
27 
53.   Dynamic Path Selection For Secure Communication In Peer-To-
Peer Systems 
27 
54.   Improving Security And Efficiency In Mobile IP Networks  28 
55.   Low Cost And Low Power Security System Based On GSM 
Technology 
28 
56.   Low-Rate DDOS Attack Detection And Modified IP Traceback  29 
57.   Mitigating Selective Forwarding TCP Attacks By Combining 
MAITH With A Channel-Aware Approach In MANET 
29 
58.   Restoring Network Connectivity By Securing The Topology Of 
Wireless Sensor Networks From Malicious Attack 
30 
59.   Ticket Based Security Architecture For Anonymizing And 
Tracing Misbehaving Clients In Wireless Mesh Networks 
30 
60.   Stealthy Attacks In Wireless Adhoc Networks: Detection In 
Multihop Networks 
31 
    Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
61.   Accuracy Optimization For High-Dimensional Data Using 
DENCOS Clustering Algorithm 
 
31 
62.   Efficient Bridging of Domain Distribution Gap using BIG 
Algorithm in Transfer Learning 
 
32 
63.   Document Segmentation Approaches And Techniques  An 
Overview 
 
32 
64.   E-Mail Abstraction Scheme For Spam Detection 
 
33 
65.   Automatic Segmentation Of Retinal Images By Using 
Morphological Watershed And Region Growing Method 
 
33 
66.   Boosting-SVM And SRM-SVM Cascade Classifiers In Face 
Verification 
 
34 
67.   Detection Of Video Copy Using Fingerprint Extraction 
 
34 
68.   Detection of WML In Brain Images Using Geostatistical Fuzzy 
Clustering 
 
35 
69.   Feature Extraction Of Intraductal Breast Lesion Images Using 
GMM 
 
35 
70.   Furthest Nearest Neighbour Criterion Based Active Learning In 
KNN And SVM Classifiers 
 
36 
71.   Image Segmentation For High Spatial Resolution Using Marker 
Based Watershed Algorithm 
 
36 
72.   Improving Web Image Search Using GMI Method 
 
37 
73.   Optimal Contrast Tone-Mapping Using Linear Programming For 
Image Enhancement 
 
37 
74.   Optimal Feature Region Set Selection For Robust Digital Image 
Watermarking 
 
38 
75.   Reversible Data Hiding Technique For Hiding Secret Data In 
Video Scene 
 
38 
76.   Road Detection From A Single Image Using Simulated 
Annealing 
39 
 
Proceedings of NCIIT 2012   
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
 
77.   The Effective Color Feature Selection And Mechanism For Face 
Recognition 
 
39 
78.   Vessel Tree Segmentation In Lung Images Affected By 
Interstitial Lung Diseases 
 
40 
79.   Handwritten Letter Recognition Using Classification Algorithms 
 
40 
80.   An Approach To Motion Detection In Video Sequence 
 
41 
81.   Location Monitoring Algorithms For Wireless Adhoc Networks 
 
41 
82.   Modified Multimedia Architecture For Mobile Multimedia 
Application 
 
42 
83.   Enhancing Reliability And Lifetime Maximization In Duty 
Cycled Wireless Sensor Network Based On Forwarding 
Procedure 
 
42 
84.   Performance Analysis And Improvement Measures For 
Cognitive Radio Networks 
 
43 
85.   Relay Node Placement Scheme To Increase Life Time In 
Wireless Sensor Networks 
 
43 
86.   Reliability And Securing Topology Maintenance Protocols For 
Sensor Network 
 
44 
87.   Robust Diffusion Of Video Using SUV In VANETs 
 
44 
88.   Stable Channel Based Routing With Node-Path Handoff In 
MANET 
 
45 
89.   File Sharing In Unstructured Peer-To-Peer Network Using 
Sampling Technique 
 
45 
90.   Supporting Scalability And Stateless Multicasting In MANET 
 
46 
91.   A Novel Approach On Greedy Maximal Scheduling Algorithm 
On Embedded Networks 
 
46 
92.   Location Tracking In Underwater Sensor Networks Using 
Mobility Prediction By Divided Sensitive Ranges 
 
47 
    Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
 
93.   A High-Quality Secured Shell For Location Monitoring System 
In Wireless Sensor Networks 
 
47 
94.   Localization Scheme For  Minimizing Error In Wireless Sensor 
Networks Using Monte Carlo Localization Algorithm 
  48 
95.   Latency For Vertical Handoff Decision In Heterogeneous 
Networks 
48 
96.   Secure Hybrid Range Query Framework In Tiered Sensor 
Network 
 
49 
97.   Secure On-Demand Multicast Routing Protocol For  Wireless 
Mesh Networks 
 
49 
98.   Route Redirection In Unstructured Network Using Chord 
 
50 
99.   Secure And Efficient Incentive Protocol For Wireless Sensor 
Networks 
 
50 
100.    Automated urban drinking water distribution and water theft 
control 
 
51 
101.    Realizing Programmable Logic Control Environment Using Arm7 
Microcontroller With Wired And Wireless Communication 
Capabilities To Host 
51 
102.    Sea  Waves  Signal  Processing  Using Recurrent Neural 
Networks 
 
52 
103.    Design Of Multiband Microstrip Patch Antenna 
 
52 
104.    Linked Data Generation Framework and Its Application 
 
53 
105.    Enhancement Of Wireless Sensor Network Based On Clustering 
Approach 
 
53 
106.    High Dimensional Data Anonymous Publication And Updates 
To Confidential Databases 
 
54 
107.    Identification Of Spam Using Structure Abstraction Generation 
 
54 
108.    Mining KDD Cup Database For Intrusion Detection Based On 
Fuzzy Class-Association Rule Mining Using Genetic Network 
Programming 
 
 
55 
 
Proceedings of NCIIT 2012   
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
 
109.    Liver Cancer Classification From Gene Expression Using Swarm 
Intelligence 
 
56 
110.    An Efficient False Hits Reduction by Authenticated Multistep 
Nearest Neighbor Search 
 
57 
111.    Feature based Semantic Multi-Document Update Summary 
Generation 
57 
112.    Improving The Intrusion Detection System Using An Elegant 
Adaptive Learning Technique 
 
58 
113.    Web User Interference By Clustering 
 
58 
114.    An Indexing Method For XML Data 
 
59 
115.    Customized News Filtering and Summarization System Based on 
Personal Interest 
 
59 
116.    Low Power Filter Design Using Optimized Multiplexer Based 
Multiplier And Adder Cell 
 
60 
117.    Optimum Throughput Estimation In Multiband Multiantenna 
Wireless Mesh Networks 
 
60 
118.    Background Modeling and Subtraction of Dynamic Scenes 
 
61 
119.    A Comparison Study Of Genetic Algorithm And Artificial 
Immune System 
 
61 
120.    Biometrics as an Authentication Measure 
 
62 
121.    Review on Free and Open Source Software 
 
62 
122.    Dynamic Bandwidth Adaptation supported Adaptive Call 
Admission Control Mechanism for 3GPP: LTE Networks 
 
63 
123.    An Efficient Jamming Detection in Wireless Mesh Networks 
 
63 
124.    Enhancing Privacy And Reducing The Traffic Levels In 
Vehicular Ad-Hoc Networks 
 
64 
125.    Threat Modeling Using An Attack Surface Metric 
 
 
64 
    Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
S.NO.  TITLE OF THE PAPER   PAGE NO. 
 
126.    Secure Routing Through Trusted Nodes for Mobile Adhoc 
Networks 
 
65 
127.    A Modified Approach For Continuous User Authentication And 
Intrusion Detection In High Security Mobile Ad Hoc Networks 
 
65 
128.    An Efficient Approach For Detecting Mobile Replica Node 
Attack In Wireless Sensor Network 
 
66 
129.    A Optimal Information Hiding Technique with Tree Based 
Similarity 
 
66 
130.    An Effective Minimization Of Storage Overhead For Tracking 
Down The Invasion Of Replicated Nodes In Wireless Sensor 
Networks 
 
67 
131.    Correlation - Based Traffic Analysis Attacks On Anonymity 
Networks 
 
67 
132.    Quick Response (Qr) Code: A Review 
 
68 
133.    Modified Multimedia Architecture For Mobile Multimedia 
Application 
 
68 
134.    A Novel Hybrid Approach To Detect Color Texts In Natural 
Scene Images 
 
69 
135.    VP8 Video Codecs for mobile applications 
 
69 
136.    Image based learning to enhance the study of visual impaired 
person 
 
70 
137.    Efficient Iris Recognition Based Biometric Techniques  For 
Embedded System 
 
70 
138.    Image retrieval Using multi-feature score fusion through Genetic 
Algorithm 
 
71 
139.    An Artificial Device To Regain Memories For Accidently 
Memory Lost Persons 
 
71 
140.    Intelligent Car Backup Warning System 
 
72 
 
 
 
Proceedings of NCIIT 2012   
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
A SECURE AND DEPENDABLE STORAGE WITH MULTIPLE 
CLOUD SERVERS 
 
Gomathy N, 
PG Student, Computer 
Science and Engineering, 
Oxford Engineering 
College, Trichy. 
gomathynagarajan@yahoo.com 
Raghav Ramana A V T 
ASSO. PROF.& HOD, 
Information Technology, 
Oxford Engineering 
College, Trichy. 
avtraghavramana@gmail.com 
Sampathkumar V 
PROF&HOD, Computer 
Science and Engineering, 
Oxford Engineering 
College, Trichy
 
Abstract 
 
A cloud storage system, consisting of a collection of storage servers, provides long 
term storage services over the Internet. Storing data in single cloud server causes Loss and 
corruption  of  data,  loss  of  availability.  Dependable  storage  system,  a  storage  cloud  of-
clouds  that  overcomes  the  limitations  of  individual  clouds  by  using  cryptography,  secret 
sharing, erasure codes and the diversity that comes from using several clouds. Dependable 
storage employs a secret sharing scheme and erasure codes to avoid storing clear data in the 
clouds  and  to  improve  the  storage  efficiency,  amortizing  the  replication  factor  on  the  cost 
of  the  solution.  The  proposed  model  extending  scheme  using  the  asymmetric  keys  and 
multiple cloud servers for storage. 
 
 
A SURVEY: JOB SCHEDULING ALGORITHMS IN GRID 
ENVIRONMENT 
 
 
 
 
 
 
Abstract 
 
Grid computing is now being used in many applications that are beyond distribution 
and sharing of resources. The distributed resources are useful only if the grid resources are 
scheduled.  Using  optimal  scheduler  results  in  high  performance  grid  computing,  where  as 
poor  schedulers  produce  contrast  results.  Now,  the  grid  scheduling  is  a  big  topic  in  grid 
environment for new algorithm model. The scheduling in grid environment has to satisfy a 
number  of  constraints  of  different  problems.  This  study  provides  one  even  basis  for 
comparison  and  insights  into  circumstances  where  one  technique  will  outperform  another. 
The  evaluation  procedure  is  specified,  the  heuristics  are  defined,  and  then  comparison 
results are discussed. 
 
 
S.Umarani 
PG Student, 
SNS College of Technology, 
Coimbatore 
umaranisks@gmail.com 
 
L.M.Nithya  
Associate Professor, 
 SNS College of 
Technology, Coimbatore 
 
Dr.A.Shanmugam                 
Professor & 
Principal, Bannari 
Amman Institute of 
Technology, Erode 
2    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
AN EFFICIENT AND SECURE NONLINEAR PROGRAMMING 
OUTSOURCING IN CLOUD COMPUTING 
M.Madhura, 
PG Scholar, Department of Computer 
Science and Engineering, Karpagam 
University,INDIA 
madhu7cs@gmail.com 
R.Santosh
 
Assistant Professor, Department of 
Computer Science and Engineering, 
Karpagam University,INDIA 
santhoshrd@gmail.com 
 
Abstract 
 
 Cloud  Computing  provides  a  appropriate  on-demand  network  access  to  a  shared 
pool  of  configurable  computing  resources  which  could  be  rapidly  deployed  with  much 
more great efficiency and with minimal overhead to management. This paper deals with the 
secure  outsourcing  of  nonlinear  programming.  It  provides  a  practical  mechanism  design 
which  fulfils  input/output  privacy,  cheating  resilience,  and  efficiency.  In  the  proposed 
approach  practical  efficiency  is  achieved  by  explicit  decomposition  of  NLP  into  NLP 
solvers  running  on  the  cloud  and  private  NLP  parameters  owned  by  the  customer.  When 
compared  to  the  general  circuit  representation  the  resulting  flexibility  allows  exploring 
appropriate security/efficiency trade-off via higher-level abstraction of NLP computations. 
It is possible to construct a set of effective privacy-preserving transformation techniques for 
any  problem,  by  framing  a  private  data  possessed  by  the  client  for  NLP  problem  as  a 
combination  of  matrices  and  vectors,  which  allow  customers  to  transform  original  NLP 
problem  into  some  arbitrary  value  while  defending  sensitive  input  or  output  information. 
To confirm the computational result, the fundamental duality theorem of NLP computation 
should  be  explored  and  then  derive  the  essential  and  adequate  constraints  that  a  accurate 
result  must  satisfy.  Such  a  result  verification  mechanism  is  very  competent  and  suffers 
close-to-zero extra cost on both cloud server and customers. 
 
CACHING SCHEME FOR DISTRIBUTED DATA SHARING IN 
PEER-TO-PEER ENVIROMENTS 
S.Umamaheswari, H.Arthi Geetha, S.Jeevanandham 
Assistant Professor,Department of Computer Science and Engineering 
Akshaya college of Engineering and Technology, Coimbatore 
Uma.dec3@gmail.com,arthigeetha@gmail.com
Abstract 
Distributed data sharing in peer-to-peer networks is implemented in two ways: One 
way is the structured peer-to-peer network which maintains regular topology and provides 
efficient data sharing. The other way is unstructured peer-to-peer network which maintains 
arbitrary  topology  and  provides  flexibility  in  peer  joining  and  leaving.  To  obtain  both 
efficiency  and  flexibility,  these  two  categories  of  peer-to-peer  networks  are  combined  as 
hybrid  peer-to-peer  network.  In  a  hybrid  network,  when  the  popular  data  is  requested  by 
large  number  of  peers,  the  hosting  peer  in  multicast  communication  is  responsible  in 
sending  data  to  all  those  requests.  Here  the  hosting  peer  reaches  the  state  of  load 
overwhelming.  So  we  divide  the  multicast  communication  group  into  regional  subgroups 
by  implementing  a  caching  scheme.  Each  subgroup  is  independently  managed  by  a 
subgroup controller (SGC) like a separate multicast group with its own subgroup key. 
3 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
ENABLING PUBLIC AUDITABILITY AND DATA DYNAMICS FOR 
STORAGE SECURITY IN CLOUD COMPUTING 
 
N.Sathya        
PG Scholar, Computer Science and 
Engineering, Vivekanandha College of 
Engineering for Women 
nsathya09@gmail.com 
V.UshaRani
 
Lecturer in Computer Science and 
Engineering, Vivekanandha College of 
Engineering for Women 
 
Abstract 
Cloud  Computing  has  been  envisioned  as  the  next-generation  architecture  of  IT 
Enterprise.  It  moves  the  application  software  and  databases  to  the  centralized  large  data 
centers, where the management of the data and services may not be fully trustworthy. This 
unique  paradigm  brings  about  many  new  security  challenges,  which  have  not  been  well 
understood.  This  work  studies  the  problem  of  ensuring  the  integrity  of  data  storage  in 
Cloud  Computing.  In  particular,  we  consider  the  task  of  allowing  a  third  party  auditor 
(TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the 
cloud.  The  introduction  of  TPA  eliminates  the  involvement  of  the  client  through  the 
auditing of whether his data stored in the cloud are indeed intact, which can beimportant in 
achieving economies of scale for Cloud Computing .The support for data dynamics via the 
most general forms of data operation, such as block modification, insertion, and deletion, is 
also  a  significant  step  toward  practicality,  since  services  in  Cloud  Computing  are  not 
limited to archive or backup data only.  
 
ENHANCING PERFORMANCE OF HOME NETWORK 
USING MIDLLEWARE 
 
 
 
 
Abstract 
Cloud computing allows accessing resources across Internet transparently: requiring 
no expertise in, or control over the underlying infrastructure. There is an increasing interest 
in  sharing  media  files  with  family  and  friends.  As  cloud  computing  grows  rapidly  and 
Video-on-Demand  (VoD)  services  become  popular,  it  is  critical  and  important  to  provide 
Quality of Service (QoS) to more customers under limited resources. To address this issue, 
we  propose  an  adaptive  QoS  management  framework  for  VoD  cloud  service  centers. 
However, UPnP or DLNA were not designed for media distribution beyond the boundaries 
of  a  local  network  and  manage  media  files  through  web  applications  can  be  tedious.  To 
overcome  this  problem,  we  propose  Media  Cloud,  a  middleware  for  Set-top  boxes  for 
classifying, searching, and delivering media inside home network and across the cloud that 
interoperates with UPnP and DLNA. We present the architecture of the service center and 
then  illustrate  the  QoS  controlling  process.  To  enhance  the  total  revenue  of  the  service 
provider,  we  define  optimization  problem  considering  the  charging  model  according  to 
pay-as-you-go patterns. The QoS-aware Cache Replacement algorithm is then developed 
and described. 
T.M.Nithya, 
Student II M.E CSE ,Oxford 
Engg college, Trichy-620009, 
nithusiva123@gmail.com 
 
V.Murugan, 
Asst.Professor,Oxford 
Engg College,  
Trichy-620009, 
Muruganv84@gmail.com 
P.Saravanan 
Lecturer,  
M.Kumarasamy College of 
Engineeering, 
saravancse@gmail.com 
 
4    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
IMPROVING HIERARCHICAL LOAD BALANCED ALGORITHM 
FOR JOB SCHEDULING IN A GRID ENVIRONMENT 
 
Tharani R                                                                                                    
Master of Engineering,                                                                                         
Sri Ramakrishna Engineering College,                                                           
Coimbatore. 
Email:crtharani@gmail.com 
Deepa K 
Asst.Professor,  
Department of Information Technology, 
Sri Ramakrishna Engineering College, 
Coimbatore. 
Abstract 
A  grid  environment  collects,  integrates,  and  uses  heterogeneous  or  homogeneous 
resources scattered around the  globe by  a high-speed network. A  grid environment can be 
classified  into  two  types:  computing  grids  and  data  grids.  This  paper  mainly  focuses  on 
computing  grids.  In  computing  grid,  job  scheduling  is  a  very  important  task.  A  good 
scheduling  algorithm  can  assign  jobs  to  resources  efficiently  and  can  balance  the  system 
load.  In  this  paper,  we  propose  a  hierarchical  framework  and  a  job  scheduling  algorithm 
called  Hierarchical  Load  Balanced  Algorithm  (HLBA)  for  Grid  environment.  In  our 
algorithm, we use the system load as a parameter in determining a balance threshold. And 
the scheduler adapts the balance threshold dynamically when the system load changes. The 
main  contributions  of  this  paper  are  twofold.  First,  the  scheduling  algorithm  balances  the 
system load with an adaptive threshold and second, it minimizes the makespan of jobs.   
 
PARALLEL SCHEDULING AND SECURITY MECHANISM FOR 
HETEROGENEOUS DISTRIBUTED SYSTEMS 
 
K.Lakshmi Raj, 
Muthayammal Engineering College, 
Rasipuram, Namakkal. 
Abstract 
  High speed networks are used to connect heterogeneous systems. Different resource 
levels  are  used  in  heterogeneous  distributed  systems.  Resources  are  allocated  for  the 
dependant  and  independent  tasks.  Processor  and  memory  are  shared  with  the  nodes  under 
heterogeneous  distributed  system  environment.  Scheduling  schemes  are  used  for  the 
resource allocation process.   
  Heterogeneous  systems  are  build  to  execute  user  applications  on  remote resources. 
Processors  are  shared  between  the  users.  Tasks  are  divided  into  two  categories.  They  are 
dependent  and  independent  tasks.  Independent  tasks  can  be  scheduled  in  any  sequence. 
Dependent tasks can be scheduled with reference to the tasks precedence. Denial of Service 
(DoS) attacks are initiated by the malicious users. Security is provided with reference to the 
trust  level  of  the  resources.  The  current  resource  scheduling  scheme  supports  single 
resource  allocation  model.  High  security  overhead  is  obtained  in  the  current  scheduling 
scheme. HDS interconnection is not handled. Trust level is not optimized in the scheduling 
methods 
  The  proposed  system  is  designed  to  manage  resources  with  security.  Multi 
dimensional  resource  allocation  scheme  is  proposed  for  the  scheduling  process. 
Heterogeneous  distributed  systems  (HDS)  communication  is  provided  in  the  system. 
Resource  allocation  is  performed  with  security  level  factors.  The  system  development  is 
planned with JAVA front end and Oracle back end softwares. 
5 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
PERFORMANCE ANALYSIS AND OPTIMIZATION OF MULTI-
CLOUD COMPUITNG FOR LOOSLY COUPLED  
MTC APPLICATIONS 
 
K.Indira,  
M.E CSE 
Mohamed Sathak Engineering  College, 
Kilakarai. 
email_id:indira777666@gmail.com 
R.Karthikeyan, M.E (Ph.D),  
Assist. Professor/CSE 
Mohamed  Sathak Engineering College, 
Kilakarai. 
 
Abstract                  
             Cloud  storage  enables  network  online  storage  where  data  is  stored  on  multiple 
virtual servers. In order to carry out huge tasks in cloud environment, single cloud provider 
is  not  sufficient  to  perform  the  many  tasks  applications  and  services.  For  Handling 
Intensive  task,  need  to  have  multi  cloud  environment  to  improve  the  cost-effectiveness  of 
the  deployment  and  increase  availability.  Larger  tasks  are  carried  out  by  processing  of 
many tasks at a time in a cloud computing environment. In this paper, for efficient handling 
of multiple tasks, need to have the performance analysis and optimization of all tasks in the 
multi-cloud  environment.  Performance  analyses  consist  of  CPU  scheduling,  Memory 
utilization,  I/O  tasks,  and  resource  time  sharing  and  cost  benefits.  Earlier  system 
concentrates  on  the  deployment  of  multi  cloud  architecture  and  multi-processing  needs 
more accuracy, scalability  and efficiency.  In the  methodology, Job allocation by  front end 
server  and  service  LAN  are  used.  This  research  will  achieved  the  process  of  multitasking 
environment  in  multi  cloud  infrastructure  by  having  some  effective  tools  for  measuring 
over all performance and optimization of multi cloud computing services. 
 
 
RESUME ANALYZER WEBSITE FOR IT COMPANIES USING 
CLOUD COMPUTING 
 
K.M.Bridhashree, 
(M.E), LECTURER, 
brindhashree@gmail.
com 
K.Aishwarya, 
B.Tech(IT) 
aishukrishnasamy@
gmail.com      
R.TamilSelvi, 
B.Tech(IT), 
tamilselvi90.r@
gmail.com, 
 .Akilandeswari, 
B.Tech (IT) 
akilamathi1031
@gmail.com, 
Angel College Of Engineering and Technology, Tirupur. 
Abstract 
In  recent  days  in  order  to  recruit  an  employee,  the  HR-Department  officials  has  to 
refer more than thousands of resumes personally and has to short list few of the resumes as 
per  the  job.  The  officials  spend  lot  of  time  on  this  process.  To  overcome  this  problem 
LOMATCH  tool  was  introduced.  The  LO-MATCH  platform  attempt  heterogeneity  issues 
in the descriptions of resumes. The LO-MATCH tool is not affordable by everyone because 
it is not open source. In this paper a system which offers a service similar to LO-MATCH 
tool is proposed. The service relies on a cloud computing environment so as to offer SaaS 
type of service. So that everyone can make use of the tool just by hiring instead of owning. 
 
6    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
A STUDY OF CONGESTION CONTROL ALGORITHM IN 
WIRELESS SENSOR NETWORKS 
 
 
 
 
 
Abstract  
 
Performance  of  Wireless  Sensor  Networks  (WSNs)  can  be  affected  when  the 
network  is  deployed  under  different  topologies.  Without  Proper  Congestion  control 
mechanisms,  the  network  become  highly  complex.  Congestion  occurs  due  to  buffer 
overflow and channel contention. Congestion causes packet losses, which in turn decreases 
network  performance  and  throughput.  It  is  important  to  design  protocols  to  control 
congestion.  It is also important to control traffic rather than forwarding path.  In this paper, 
we investigate various congestion control algorithms and evaluates their characteristics. 
 
 
ACCURATE TRACKING IN WIRELESS SENSOR NETWORK BY 
SENSOR COLLABORATION 
 
Ms T. Dhanalakshmi,                       Ms R.Mythili,                         Prof T. Rajendran,  
PG Scholar                                        PG Scholar                             HOD of CSE Department 
dhanaesec@gmail.com                     mythilimucse@gmail.com     rajendran_tm@yahoo.co.in 
     Angel College of Engineering and Technology, Tirupur 
Abstract 
 
Heuristic  techniques  enable  to  select  an  information  fusion  of  the  selected  sensor 
observation with the prior target location. The main objectives are to share the information 
about  the  target  accurately,  to  adjust  the  power  consuming  in  the  sensors  while 
transforming  the  information  and  to  conserve  the  system  resources  by  associating  data 
tracks  which  is  simpler  in  distributed  environment  of  global  consistency.  Mutual 
information  based  sensor  selection  (MISS)  algorithm  is  adopted  to  track  the  accurate 
information collaboratively. A novel approach to energy savings is devised as information-
controlled  transmission  power  (ICTP)  adjustment  in  the  nodes.  These  aspects  enable     
dual-space  approach  for  both  tracking  and  sensor  resource  management.
R.B.Dravida Priyaa, 
ME (CCE),  
SNS College of Technology, 
Coimbatore. 
dravidapriyaa2010@gmail.com 
   
7 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
ACHIEVING HIGH-THROUGHPUT MULTICAST ROUTING BASED 
ON RATEGUARD IN WIRELESS MESH NETWORKS 
 
 
 
 
 
 
Abstract   
Recent work in multicast routing for wireless mesh networks has focused on metrics 
that  estimate  link  quality  to  maximize  throughput.  Nodes  must  collaborate  in  order  to 
compute  the  path  metric  and  forward  data.  The  assumption  that  all  nodes  are  honest  and 
behave  correctly  during  metric  computation,  propagation,  and  aggregation,  as  well  as 
during  data  forwarding,  leads  to  unexpected  consequences  in  adversarial  networks  where 
compromised  nodes  act  maliciously.  In  this  work,  novel  attacks  against  high  throughput 
multicast  protocols  in  wireless  mesh  networks  are  identified.  The  attacks  exploit  the  local 
estimation and global aggregation of the metric to allow attackers to attract a large amount 
of  traffic.  Here  these  attacks  are  very  effective  against  multicast  protocols  based  on  high-
throughput metrics. Aggressive path selection is a double-edged sword: While it maximizes 
throughput,  it  also  increases  attack  effectiveness  in  the  absence  of  defense  mechanisms.  it 
from the network. 
 
ANALYSIS OF CONTENTION BASED METHOD FOR MAC LAYER 
IN WIRELESS NETWORKS 
 
 
 
 
 
 
Abstract 
Quality of Service (QoS) is the ability to guarantee a certain level of performance to 
a  data  flow  ie.,  guaranteeing  required  bit  rate,  delay,  etc.  IEEE  802.11  a/b/g  networks  do 
not  provide  QoS  differentiation  among  multimedia  traffic.  QoS  provisioning  is  one  of  the 
essential  features  in  IEEE  802.11e.  It  uses  Enhancement  Distributed  Channel  Access 
(EDCA)  which  is  a  contention-based  channel  access  mode  to  provide  QoS  differentiation. 
EDCA  works  with  four  Access  Categories  (AC).  Differentiation  of  Access  Categories  are 
achieved by differentiating the Arbitration Inter-Frame Space (AIFS), the initial contention 
window  size  (CWmin),  the  maximum  contention  window  size  (CWmax)  and  the 
transmission  opportunity  (TXOP).However  AIFS,  CWmin,  CWmax  are  considered  to  be 
fixed for a given AC, while TXOP may be varied. A TXOP is a time period when a station 
has  the  right  to  initiate  transmissions  onto  the  wireless  medium.  By  varying  the  TXOP 
value among the ACs the QoS optimization- throughput stability 
Anu Manohar , 
II Yr ME CSE 
Department of Computer Science and Engineering , 
M.Kumarasamy college of Engineering 
Thalavapalayam,Karur-639 113,Tamil Nadu,India 
anumanu45@gmail.com 
V.R.Azhaguramyaa 
PG Student,  
Sri Krishna College of  
Technology, 
vrazhaguramyaa@gmail.co 
 
S.J.K.Jagadeesh Kumar 
Professor & Head, Sri 
Krishna College of 
Technology, Coimbatore  
jagadeesh_sk@rediffmail.co 
P.Parthasarathi 
Asst. Professor, Sri Krishna 
College of Technology,  
Coimbatore 
sarathi.pp@gmail.com 
 
8    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
 CHANNEL ALLOCATION FOR UNCOORDINATED WLANS 
 
 
 
 
Abstract 
Uncoordinated  WLANs  are  small  in  size,  independently  owned  and  managed,  and 
deployed in areas where access points density may vary greatly. Traditional wireless LANs 
make  use  of  knowledgeable  network  administrators  for  centralized  decisions  on  channel 
selection,  whereas  in  uncoordinated  WLANs  access  points  are  often  deployed  by  network 
non  specialists  in  an  uncoordinated  manner,  leading  to  unplanned  topologies,  interference 
and  unsatisfactory  throughput  performance.  In  the  existing  system,  a  distributed  channel 
assignment algorithm for uncoordinated WLANs termed CACAO (Client-Assisted Channel 
Assignment  Optimization)  is  used  for  channel  assignment.  It  uses  the  clients  feedback 
traffic  information  such  as  number  of  neighbors  in  the  channel,  channel  traffic  load  for 
better  channel  assignment.  Using  the  client  feedback,  AP  calculates  the  interference  and 
switch  over  to  less  interference  channel.  The  proposed  work  is  to  modify  the  existing 
CACAO  algorithm  by  varying  the  way  of  calculating  interference.  Clients  send  the  signal 
strength  of  each  channel  to  access  points.  The  interference  in  channel  is  found  by  using 
signal  strength.  Access  point  and  its  associated  clients  with  high  interference  will  switch 
over to less interference channel. 
 
 
COGNITIVE TOPOLOGY CONTROL IN CR-MANETS 
 
 
 
 
 
Abstract 
Energy and topology are limited resources in manets, Topology control reduces the 
energy  consumption  of  a  node  by  reducing  the  number  of  links  in  a  topology  thereby 
reducing  initial  topology  of  the  network.  Cognitive  radio  networks  provide  dynamic 
spectrum  allocation  to  cognitive  users  when  primary  users  are  inactive.  In  this  paper 
prediction  based  cognitive  topology  control  (PCTC  algorithm)  is  used  such  that  topology 
control technique is used to induce cognition in routing in CR-MANETS (Cognitive Radio 
Mobile  Ad  Hoc  Networks)  based  on  link  availability  prediction.  In  this  paper  topology 
control  is  performed  on  a  cognitive  radio  network  using  AODV  protocol  with  prediction 
and  without  prediction.  Simulation  results  shows  that  AODV  routing  protocol  with 
prediction perform better than AODV without prediction. 
A.S.Renugadevi 
M.E Computer and Communication 
Engineering 
Department of information Technology 
Kongu Engineering College,Perundurai 
Erode Dt,TamilNadu,India 
Email:renugame@gmail.com 
R.Devipriya 
Assistant Professor 
Department of Information Technology 
Kongu Engineering College,Perundurai 
Erode Dt,TamilNadu,India. 
Email: rdevipriya@kongu.ac.in 
Chandni 
II ME (C.C.E) / Information 
Technology 
Kongu Engineering College 
Perundurai. Erode Dt., India 
chandni2289@gmail.com 
Suresh.P 
Assistant Professor/Information 
Technology 
Kongu Engineering College 
Perundurai. Erode Dt., India 
psuresh@kongu.ac.in 
9 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
CONSTRUCTING MINIMUM SIZE WIRELESS SENSOR 
NETWORKS TO PROVIDE CRITICAL SQUARE GRID COVERAGE 
USING STEINER TREE BASED CRITICAL GRID COVERAGE 
ALGORITHM 
 
 
 
 
 
 
Abstract  
Wireless sensor network is used in wide range of application, since it has the ability 
to  collect,  process  and  store  information  as  well  as  to  communicate  with      others.  Such 
connected  networks  have  been  applied  extensively  in  military  and  civilian  applications.  In 
certain  application,  the  large  sensor  field  is  often  distinguished  into  critical  and  common 
areas.  It  is  advisory  to  deploy  the  sensors  efficiently  in  the  critical  areas  compared  to 
common  areas.  Thus  the  connected  wireless  sensor  network  is  formed  by  deploying 
minimum  number  of  sensors  in  the  critical  grid  points.  In  this  paper,  we  propose  a  Steiner 
tree  based  algorithm  to  provide  coverage  of  the  critical  grids.  A  good  solution  for  the 
proposed algorithm is obtained from the simulation results. 
 
CONTROLLED SINK MOBILITY FOR PROLONGING WIRELESS 
SENSOR NETWORKS LIFETIME 
 
 
 
 
 
 
Abstract  
Data delivery latency often increases due to the speed limit of mobile sink.  Mostly 
mobility  is  used  to  exploit  the  problem  of  data  collection  in  Wireless  Sensor  Networks 
(WSNs).  WSN  with  MS  (Mobile  Sink)  and  provides  a  comprehensive  taxonomy  of  their 
architectures,  based  on  the  role  of  the  MS.  The  overview  of  the  data  collection  process 
identifies the corresponding issues and challenges. On the basis of these issues, a protocol 
named Energy Efficient Data Collection (EEDC) is used. Path selection problem in delay-
guaranteed sensor networks with a path-constrained mobile sink is focused. EEDC efficient 
data  collection  scheme,  which  simultaneously  improves  the  total  amount  of  data  and 
reduces  the  energy  consumption.  The  optimal  path  is  chosen  to  meet  the  requirement  on 
delay  as  well  as  minimize  the  energy  consumption  of  entire  network.  Predictable  sink 
mobility  is  exploited  to  improve  energy  efficiency  of  sensor  networks.  Simulation 
experiments  based  on  GLOMOSIM  is  conducted  to  validate  the  effectiveness  of  the 
presented formulations and algorithms. 
Dr.S.Uma Maheswari 
Electronics and communication 
Engineering 
Coimbatore Institute of 
Technology                       
umamaheswari@cit.edu.in 
 
P.Nithyakalyani 
Electronics and communication 
Engineering 
Coimbatore Institute of 
Technology 
Coimbatore, India. 
nithyasct@gmail.com 
T.Sudha 
PG Scholar,  
Computer Science and Engineering,  
Muthayammal Engineering College 
sudhaoormi@gmail.com 
Prof.M.Sayee Kumar 
Assistant Professor,  
Computer Science and 
Engineering,  
Muthayammal Engineering College 
Sayee.academic@gmail.com 
 
10    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
COOPERATIVE MULTI-HOP TRANSMISSION IN WIRELESS 
NETWORKS 
 
 
 
 
 
Abstract 
We evaluate the performance of cooperative transmission, where nodes in a sending 
cluster  are  synchronized  to  communicate  a  packet  to  nodes  in  a  receiving  cluster.  In  our 
communication  model,  the  power  of  the  received  signal  at  each  node  of  the  receiving 
cluster  is  a  sum  of  the  powers  of  the  transmitted  independent  signals  of  the  nodes  in  the 
sending cluster. The increased power of the received signal, vis--vis the traditional single-
node-to-single-node communication, leads to overall saving in network energy and to end-
to-end robustness to data loss. We propose an energy-efficient cooperative protocol, and we 
analyze the robustness of the protocol to data packet loss. When the nodes are placed on a 
grid,  it  reduces  the  probability  of  failure  to  deliver  a  packet  to  destination.  In  Energy 
Efficient  Protocol  for  Cooperative  networks,  transmitting  and  receiving  nodes  recruit 
neighboring nodes to assist in communication. We model a cooperative transmission link in 
wireless  networks  as  a  transmitter  cluster  and  a  receiver  cluster.Up  to  80%  in  energy 
savings  can  be  achieved  for  a  grid  topology,  while  for  random  node  placement  our 
cooperative  protocol  can  save  up  to  40%  in  energy  consumption  relative  to  the  other 
protocols.  The  reduction  in  error  rate  and  the  energy  savings  translate  into  increased 
lifetime of cooperative sensor networks. 
 
      CUSTOMIZED QOS METRIC BASED ON DATA TRAFFIC IN WIRELESS 
SENSOR NETWORK ROUTING 
 
 
 
 
 
Abstract 
Wireless  Sensor  Networks  (WSN)  with  best  effort  quality  of  service  (QoS)  have 
recently attracted a lot of attention as effective platforms for pervasive computing. The QoS 
requirements  are  efficient  usage  of  energy,  latency  and  reliability.  So  the  routing  protocol 
based on QoS requirement is proposed. So the routing protocol based on QoS requirement 
is  proposed.  This  modular  approach  protocol  aims  in  ensuring  the  required  QoS.  In  this 
approach, a separate module is dedicatively made for QoS classification. A new  Localized 
quality  of  service  routing  protocol  attempts  to  fulfill  the  required  data-related  quality  of 
service  metrics  with  each  packet  while  considering  the  power  efficiency.  Queuing  module 
takes  strategy  of  prioritizing  the  packet.  The  QoS  requirement  is  based  on  data  traffic  and 
also  considering  the  efficient  energy  usage.  The  metric  considered  here  for  QoS 
classification  are  reliability,  transmission  energy,  residual  energy  and  delay.  Based  on  this 
metric,  traffic  is  classified  as  several  categories  and  queued.  Depending  on  this  classified 
traffic, sufficient QoS is provided.  
V.Yuvaraj 
PG Scholor,  
Department of Computer Science and 
Engineering, 
The Kavery Engineering College, Mecheri, Salem, 
India. 
sendtoyuva86@gmail.com 
P.Sathishkumar 
HOD,  
Department  of  Computer  Science  and 
Engineering, 
The  Kavery  Engineering  College,  Mecheri, 
Salem, India. 
 
V.Jeya Priya 
II year M.E-Communication Systems 
             Anna University of Technology Madurai 
priyajeya@ymail.com 
       R.Arun Prasath 
       Assistant Professor-ECE Department 
              Anna University of Technology Madurai   
prasta    prasath2k6@gmail.com 
 
 
11 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 WORKFLOW OPTIMIZATION FOR ALLOCATION OF JOBS IN 
GRID ENVIRONMENTS 
 
K.Nithiya ,ME(CSE)  II YEAR  
St.Michael college of 
engineering and technology, 
kalaiyarkoil.   
k.nithyaramya.nithya@gmail.com 
 
Abstract 
Grid scheduling is essential to Quality of Service provisioning as well as to efficient 
management  of  grid  resources.  Grid  scheduling  usually  considers  the  state  of  the  grid 
resources as well application demands. However, such demands are generally unknown for 
highly  demanding  applications,  since  these  often  generate  data  which  will  be  transferred 
during  their  execution.  Without  appropriate  assessment  of  these  demands,  scheduling 
decisions can lead to poor performance. This paper introduces the IPDT-FUZZY scheduler, 
a scheduler which considers the demands of grid applications with such uncertainties. The 
scheduler uses fuzzy optimization and both computational and communication demands are 
expressed  as  fuzzy  numbers.  Its  performance  was  evaluated,  and  it  was  shown  to  be 
attractive when communication requirements are uncertain. 
 
 
SECURE AND EFFICIENT RETRIEVAL OF DATA IN CLOUD 
COMPUTING 
M.Mythili,  
Department of IT.  
Angel College of Engineering  
and Technology, Tirupur. 
 
Abstract 
Cloud  Computing  has  been  envisioned  as  the  next-generation  architecture  of  IT 
Enterprise.It  moves  the  application  software  and  databases  to  the  centralized  large  data 
centers,  where  the  management  of  the  data  and  services  may  not  be  fully  trustworthy. 
Cloud  computing  provides  cheap  and  efficient  solutions  for  storing  and  analyzing  mass 
data.  Firstly,  cloud  computing,  Map  Reduce  programming  model  and  hash  table  are 
introduced.  This  paper  proposes  a  method  for  retrieving  efficient  data  in  cloud 
environment.  This  work  studies  the  problem  of  ensuring  the  integrity  of  data  storage  in 
Cloud  Computing.  In  particular,  we  consider  the  task  of  allowing  a  third  party  auditor 
(TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the 
cloud.  The  introduction  of  TPA  eliminates  the  involvement  of  the  client  through  the 
auditing of whether his data stored in the cloud are indeed intact, which can be important in 
achieving economies of scale for Cloud Computing. The support for data dynamics via the 
most general forms of data operation, such as block modification, insertion, and deletion, is 
also  a  significant  step  toward  practicality,  since  services  in  Cloud  Computing  are  not 
A.Saranyadevi, 
Department of IT,  
Angel College of Engineering and 
Technology,Tirupur. 
 
A.Suresh ME,MBA, 
St.Michael college of 
engineering and technology, 
kalaiyarkoil. 
 
12    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
limited to archive or backup data only. While prior works on ensuring remote data integrity 
often lacks the support of either dynamic data operations, this paper achieves both. We first 
identify  the  difficulties  and  potential  security  problems  of  direct  extensions  with  fully 
dynamic  data  updates  from  prior  works  and  then  show  how  to  construct  an  elegant 
verification scheme for the seamless integration of these two salient features. In particular, 
to  achieve  efficient  data  dynamics,  we  improve  the  existing  proof  of  storage  models  by 
manipulating  the  classic  Merkle  Hash  Tree  construction  for  block  tag  authentication.  To 
support  efficient  handling  of  multiple  auditing  tasks,  we  further  explore  the  technique  of 
bilinear aggregate signature to extend our main result into a multiuser setting, where  TPA 
can  perform  multiple  auditing  tasks  simultaneously.  Extensive  security  and  performance 
analysis show that the proposed schemes are highly efficient and provably secure. 
 
 NOVEL METHOD FOR THROUGHPUT A PREDICTION OF 
NETWORK SERVICE AND TRANSFER OF DATA PACKETS 
 
Sangeetha. P                                                                        R.Kanagaraj, M.E,   
PG scholar                                                                           Assist .Professor  
geethu.shiny@gmail.com                                                    Dept of Software Engg   
               
Abstract  
   Data  Communication  using  Many  task  Computing  Environment  in  a  widely 
Distributed Environment service uses multiple parallel TCP streams to improve the end-to-
end  throughput  of  data  transfers.    It  is  developed  to  determine  the  number  of  parallel 
streams,  required  to  achieve  the  best  network  performance.  Prediction      points  can  be 
obtained using Iperf   and   Grid FTP samplings inter cluster protocols, aggregating traffic 
for high-speed encoding and using a new forward error correction scheme to handle bursty 
loss. 
 
EFFICIENT RESOURCE SELECTION AND LOAD BALANCING 
ALGORITHM BASED ON THE SCHEDULING OF PARALLEL 
APPLICATIONS 
G.K. Kamalam, 
Assistant Proffesor/CSE 
Kongu Engineering College, 
Erode, India. 
                            
Abstract 
Scheduling  of  jobs  to  the  distributed  heterogeneous  resources  in  grid  is  a  complicated 
problem.The goal of scheduling is to achieve highest possible system throughput and to match 
the application need with the available computing resources. In grid computing system, when 
all jobs are assigned to the same resource leads to the high work load for the resource and the 
computational  time  of  the  processed  jobs  is  also  high.  Load  balancing  is  a  methodology 
involving the linear and continuous modeling of partitionable computation and communication 
loads for parallel processing. The ULS maintains the user-level resource pool, enables resource 
selection and controls the execution. WLB-based  scheduling,  evaluate  dynamic  resource  pool 
and resource selection mechanisms, and examine dependencies of  application performance on 
aggregate characteristics of selected  resources and application profile. 
M.Sarmila, 
PG Scholor, Dept of CSE 
Kongu Engineering College, 
Erode, India. 
sarmilatsms@gmail.com 
 
 
13 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
EFFICIENT CLUSTERING AND DISCOVERY OF RESOURCES IN 
WIDE-AREA DISTRIBUTED COMPUTATIONAL GRIDS 
R.Nithya, ME CSE,  
Kongu Engineering College,  
Erode, Tamil Nadu, India 
Email: rnithyame@gmail.com 
 
Abstract     
In large-scale computational Grids, discovery of heterogeneous resources as a working 
group  is  crucial  to  achieving  scalable  performance.  In  the  existing  system,  resource 
management  scheme,  hierarchical  cycloid  overlay  architecture,  resource  clustering  and 
discovery  algorithms  for  wide-area  distributed  Grid  systems  are  designed.  Program/data 
locality  is  established  by  clustering  resources  based  on  their  physical  proximity  and 
functional  matching  with  user  applications.  Dynamism  resilient  resource  management 
algorithm,  cluster-token  forwarding  algorithm  and  deadline-driven  resource  management 
algorithms  are  developed  for  comparing  favorably  with  other  resource  discovery  methods 
in static and dynamic Grid applications. The proposed work is to extend the HCO model to 
secure and safeguard the Grid applications by applying virtual machine techniques and also 
it  focus  on  integrating  peer-to-peer  and  grid  technologies  with  machine  virtualization 
techniques for global scale internet applications.   
 
CONCERT MEASURE OF NETWORK I/O WORKLOAD IN 
VIRTUALIZED DATACENTER USING PARAVIRTUALIZATION 
Rajesh .M, 
II Year M.E, 
Department of Computer Science  
and Engineering, 
Kongu Engineering College, 
Anna University Tamil Nadu, 
Email: goldmraja@gmail.com 
 
Abstract  
Cloud  computing  [10]  is  gaining  popularity  as  its  the  way  to  virtualize  the 
datacenter and increase flexibility in the use of computation resources. This virtual machine 
approach  can  dramatically  improve  the  efficiency,  power  utilization  and  availability  of 
costly hardware resources, such as CPU and memory. Virtualization in datacenter had been 
done in the back end of Eucalyptus software and Front end was installed on another CPU. 
The  operation  of  performance  measurement  had  been  done  in  network  I/O  applications 
environment  of  virtualized  cloud.  Then  measurement  was  analyzed  based  on  performance 
impact  of  co-locating  applications  in  a  virtualized  cloud  in  terms  of  throughput  and 
resource  sharing  effectiveness,  including  the  impact  of  idle  instances  on  applications  that 
are running concurrently on the same physical host. This project proposes the virtualization 
technology  which uses the hypervisor to install the Eucalyptus software in single physical 
machine for setting up a cloud computing environment.  
 
Geetha M 
Assistant Professor, 
Department  of  Computer  Science  and 
Engineering, 
Kongu Engineering College, 
Anna University Tamil Nadu, India. 
E-mail:geetha @kongu.ac.in 
 
Mr.N.Krishnamoorthy, 
Assistant Professor, CSE, Kongu 
Engineering College, Erode, Tamil 
Nadu, India.                                                     
Email:nmoorthy@kongu.ac.in 
 
14    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 CLASSIFICATION AND EVALUATION OF GRID RESOURCES 
BASED ON GRID TASKS FOR MINIMIZING OVERHEAD 
COMPUTATION TIME 
K.Kayalvizhi 
PG Student, CSE, 
 Kongu Engineering College,  
Erode, Tamil Nadu, India 
Email: kkayalvizhi@gmail.com 
 
Abstract 
Grid  computing  aggregates  heterogeneous  resources  distributed  across  Internet, 
regardless  of  differences  between  resources  such  as  platform,  hardware,  software, 
architecture,  language,  and  geographical  location.  Resource  allocation  and  job  scheduling 
are  the  core  functions  of  grid  computing.  These  functions  are  based  on  adequate 
information of available resources. Timely acquiring resource status information is of great 
importance  in  ensuring  overall  performance  of  grid  computing.  Grid  resource  monitoring 
and  grid  resource  prediction  mechanisms  are  used  for  acquiring  information  of  grid 
resources.  A  distributed  system  architecture  is  designed  which  includes  the  key  issues  for 
system  implementation,  including  machine  learning  based  methodologies  for  modelling 
and optimization of resources. The proposed system focus on classification and evaluation 
of grid resources. 
 
GRID TECHNOLOGY FOR NEUROSCIENCE 
 
Jayabharathi.P,G.Rubia,  
Research scholar 
Karpagam University, Coimbatore 
kavibharati20@gmail.com 
 
Abstract 
A  parallel  processing  architecture  in  which  CPU  resources  are  shared  across  a 
network,  and  all  machines  function  as  one  large  supercomputer.  It  allows  unused  CPU 
capacity  in  all  participating  machines  to  be  allocated  to  one  application  that  is  extremely 
computationintensive and programmed for parallel processing.   Grid computing evolved 
from  the  parallel  processing  systems  of  the  1970s,  the  large-scale  cluster  computing 
systems  of  the  1980s,  and  the  distributed  processing  systems  of  the  1990s,  and  is  often 
referred  to  by  these  names.In  this  paper  we  present  the  overview  of  Brain  Analysis  Using 
Grid Computing. 
 
 
 
 
 
 
S.Kuppuswami, 
Principal,   
Kongu Engineering College,  
Erode, Tamil Nadu, India 
Email: skswami@kongu.ac.in 
 
Mrs.Agnes Kalarani,  
Professor 
Karpagam University, Coimbatore                                  
agneskalarani@yahoo.co.in 
 
15 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
AUTOMATIC RECONFIGURABLE SYSTEM FOR RUN-TIME 
APPLICATION 
S.Inayathulla 
2nd year ME., 
Sudharsan Engineering College, 
Pudukkottai 
Email id: inayathfifa@gmail.com 
 
Abstract 
New  generation  embedded  systems  demand  high  performance,  efficiency,  and 
flexibility.  Reconfigurable  hardware  can  provide  all  these  features.  However,  the  costly 
reconfiguration process and the lack of management support have prevented a broader use 
of  these  resources.  To  solve  these  issues  we  have  developed  a  scheduler  that  deals  with 
task-graphs  at  run-time,  steering  its  execution  in  the  reconfigurable  resources  while 
carrying  out  both  prefetch  and  replacement  techniques  that  cooperate  to  hide  most  of  the 
reconfiguration delays. In our scheduling environment, task-graphs are analyzed at design-
time  to  extract  useful  information.  This  information  is  used  at  run-time  to  obtain  near-
optimal schedules, escaping from local-optimum decisions, while only carrying out simple 
computations. 
 
SECURED AND EFFICIENT OUTSOURCING OF LINEAR 
PROGRAMMING IN CLOUD COMPUTING 
 
 
 
 
 
 
Abstract 
 Cloud computing is delivery of computing in form of service rather than product. It 
enables  customers  with  limited  computational  resources  to  outsource  their  large 
computation  workloads  to  the  cloud.  Economically  it  provides  massive  computational 
power, bandwidth, storage, and even appropriate software that can be  shared in a pay-per-
use manner. Even though it provides tremendous benefits, security is the main concern for 
computing  customers  confidential  data  over  the  cloud.  Mechanisms  have  to  be  designed 
for  protecting  data  and  also  the  malicious  behavior  of  computations  in  cloud.  Fully 
homomorphic  encryption  was  a  technique  used  for  encrypting  data  for  computational 
outsourcing.  This  was  represented  by  combinational  Boolean  circuit  that  was  evaluated 
with encrypted private inputs. Due to high complexity and circuit sizes it was not easy for 
applying  in  practical.  So,  to  provide  higher  level  of  abstraction,  linear  programming 
concept  was  designed.  it  decomposes  the  LP  computation  outsourcing  into  public  LP 
solvers running on the cloud and private LP parameters owned by the customer. As a result 
the security and effiency were improved over the general circuit representation. 
 
Mr.T.Kapilachander M.E., 
Assistant professor, 
ECE Department, 
Sudharsan Engineering, 
College,Pudukkottai. 
 
Vijayalakshmi M 
PG Student, Department of CSE, 
Oxford Engineering College 
mm.vijayalakshmi@ymail.com 
Murugan V 
Senior Lecturer, Department 
of IT, Oxford Engineering 
College 
muruganv@gmail.com 
16    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
FAIRNESS SCHEDULAR WITH HIERARCHICAL 
CLASSIFICATION FOR RESOURCE MANAGEMENT IN GRID 
ENVIRONMENT 
 
 
 
 
 
Absract 
Resource  management  is  a  vital  task  of  grid  computing  environment.  It  is  the 
responsibility  of  grid  system  to  ensure  that  all  applications/clients/tasks  requesting  for 
resources  are  getting  resources  in  a  timely  manner.  Various  recourse  allocation  strategies 
are  there  which  provide  guidance  for  grid  systems  to  make  resource  allocation  decisions. 
The  detail  paper  will  describes  various  Proportional  share  schedulers  with  O(1)  overhead 
for resource management in grid environment. The fair share scheduler(s) and Hierarchical 
Classification ensure that resources are allocated to in an efficient manner and this ensures 
fairness in resource allocation. 
 
A NEW WIRELESS WEB ACCESS FOR WEB SURFING BASED ON 
CLOUD COMPUTING 
 
 
 
 
 
 
Abstract 
The growing popularity of wireless networks has ead to cases of heavy utilization of 
wireless  networks;  the  wireless  portion  of  the  network  is  a  major  performance  bottleneck. 
Understanding  the  behavior  of  the  wireless  portion  of  such  networks  is  critical  to  ensure 
their  robust  operation.  This  understanding  can  also  help  optimize  network  performance. 
This  paper  deals  about  Wireless  network  refers  to  computer  network  associated  with  a 
cloud  computing  whose  interconnections  between  nodes  are  implemented  without  the  use 
of wires (e.g., Mobile web) and how is accessed. Wireless operations permits services, such 
as long range communications, that are impossible or impractical to implement with the use 
of  wires.  Here  the  Mobile  Web  refers  to  the  use  of  Internet-connected  applications,  or 
browser-based access to the Internet from a mobile device, such as a Smartphone or tablet 
computer, connected to a wireless network. 
 
 
 
 
P.Dhivya  
M.E Computer Science and  
Engineering, SNS College of Technology, 
Coimbatore 
M.Sukanya 
M.E Software Engineering 
SNS College of Technology, 
Coimbatore 
 
Rajeshwari.P  
PG scholar 
Angel College of Engineering & 
Technology 
rajiponraj@gmail.com 
 
 
Padmavathi.S  
PG scholar 
Angel College of Engineering & 
Technology 
padmaspretty@gmail.com 
 
 
17 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
USER MOVEMENT AND SERVICE PREDICTION SCHEME FOR 
MOBILE ENVIRONMENT 
 
 
 
 
Abstract 
Spatial  data  mining  techniques  are  used  to  mine  data  values  with  location 
information.  Temporal  analysis  is  applied  to  perform  time  analysis.  Location  and  time 
based  analysis  is  applied  on  a  variety  of  mobile  service  analysis  application.  Different 
services  are  provided  under  the  mobile  environment.  User  behavior  analysis  is  carried  out 
using  the  sequential  pattern  mining  methods.  Location  and  time  factors  are  used  in  the 
sequential  pattern  mining  methods.  Clustering  techniques  are  used  to  group  up  the 
transactions  based  on  the  transaction  relevancy.Most  of  existing  techniques  focus  on 
discovering mobile patterns from the whole logs. However, this kind of patterns may not be 
precise  enough  for  predictions  since  the  differentiated  mobile  behaviors  among  users  and 
temporal  periods  are  not  considered.  Cluster-based  Temporal  Mobile  Sequential  Pattern 
Mine  (CTMSP-Mine)  is  used  to  discover  the  Cluster-based  Temporal  Mobile  Sequential 
Patterns  (CTMSPs).  A  prediction  strategy  is  proposed  to  predict  the  subsequent  mobile 
behaviors.  In  CTMSP-Mine,  user  clusters  are  constructed  by  Cluster-Object-based  Smart 
Cluster  Affinity  Search  Technique  (CO-Smart-CAST).  The  similarities  between  users  are 
evaluated  by  the  Location-Based  Service  Alignment  (LBS-Alignment).  A  time 
segmentation approach is presented to find segmenting time intervals where similar mobile 
characteristics  exist.  The  CTMSP  mine  model  is  enhanced  with  hybrid  prediction  model 
(HPM) and recursive motion functions (RMF) scheme to improve the pattern identification 
and prediction accuracy levels. The system development is planned with Java language and 
Oracle database. 
 
EFFICIENT DATA BROADCASTING IN UNDERWATER WIRELESS 
COMMUNICATION NETWORKS 
R.Navitha 
PG Scholar, 
Department of CSE, 
Kongu Engineering College, Erode, Tamil Nadu, India 
Email: navithacs06@gmail.com 
Abstract 
Underwater  wireless  communications  can  enable  many  scientific,  environmental, 
commercial,  safety,  and  military  applications.  The  design  of  routing  protocols  for 
Underwater  Wireless  Sensor  Networks  (UWSNs)  poses  many  challenges  due  to  the 
intrinsic  properties  of  underwater  environments.  This  paper  proposes  an  efficient  adaptive 
depth-based routing protocol (DBR) for disseminating the data items in the network. DBR 
does  not  require  full-dimensional  location  information  of  sensor  nodes.  Instead,  it  needs 
only local depth information of every sensor node in order to forward the data packets. The 
main advantage of DBR protocol is that it can handle network dynamics efficiently without 
the  assistance  of  a  localization  service  and  also  it  achieves  higher  packet  delivery  ratio  in 
dense networks. 
C.Kavitha, 
Sengunthar Engineering College, 
Tiruchengode. 
Kavithajan12@gmail.com 
M.Sakthivel., M.E., (Ph.D)., 
Sengunthar Engineering College, 
Tiruchengode. 
 
 
18    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
EFFICIENT DATA COLLECTION OVER MULTITAFFIC FLOW 
USING THE PASS NODE DEPLOYMENT 
S.SARIGA, 
PG Scholar, Mount Zion College 
of Engineering and 
Technology,Lenevilaku 
Email: sarigavasanbtech@gmail.com 
Vivian Rachel jayson, 
Assistant Professor, Mount Zion 
College of Engineering and 
Technology,Lenevilaku 
Email: 
vivian.r.jayson@gmail.com@.com 
 
Abstract 
In a heterogeneous wireless sensor network (WSN), relay nodes (RNs) are  adopted 
to relay data packets from sensor nodes (SNs) to the base station (BS). The deployment of 
the RNs can have a significant impact on connectivity and lifetime of a WSN system. This 
paper  studies  the  effects  of  random  deployment  strategies.  We  first  discuss  the  biased 
energy  consumption  rate  problem  associated  with  uniform  random  deployment.  This 
problem  leads  to  insufficient  energy  utilization  and  shortened  network  lifetime.  To 
overcome  this  problem,  we  propose  two  new  random  deployment  strategies,  namely,  the 
lifetime-oriented deployment and hybrid deployment. The former solely  aims at balancing 
the  energy  consumption  rates  of  RNs  across  the  network,  thus  extending  the  system 
lifetime. However, this deployment scheme may not provide sufficient connectivity to SNs 
when  the  given  number  of  RNs  is  relatively  small.  The  latter  reconciles  the  concerns  of 
connectivity  and lifetime extension. Both single-hop and multihop communication models 
are  considered  in  this  paper.  With  a  combination  of  theoretical  analysis  and  simulated 
evaluation, this study explores the trade-off between connectivity and lifetime extension in 
the  problem  of  RN  deployment.  It  also  provides  a  guideline  for  efficient  deployment  of 
RNs in a large-scale heterogeneous WSN. 
 
ENERGY EFFICIENT ON-DEMAND ROUTING PROTOCOL FOR 
LOCAL MONITORING IN WIRELESS SENSOR NETWORKS 
 
P.Kavitha  
PG Scholar, Computer Science and 
Engineering, Muthayammal Engineering 
College 
Pkavi89@gmail.com 
Prof.M.Sayee Kumar 
Assistant Professor, Computer Science 
and Engineering, Muthayammal 
Engineering College 
Sayee.academic@gmail.com 
 
Abstract 
`   Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. 
However,  an  open  problem  is  how  to  develop  efficient  mechanisms  that  can  be 
incorporated  with  sleep-wake  protocols  to  ensure  both  long  lived  operation  and  a  high 
degree of security. Our contribution in this paper is to address this problem by using local 
monitoring,  a  powerful  technique  for  detecting  and  mitigating  control  and  data  attacks  in 
sensor networks. In local monitoring, each node oversees part of the traffic going in and out 
of its neighbors to determine if the behavior is suspicious, such as, unusually long delay in 
forwarding a packet.  
19 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
ENHANCED MEDIUM ACCESS CONTROL USING CROSS-LAYER 
LINK ASYMMETRY INTERACTION FOR WIRELESS MESH 
NETWORK 
S.Priya 
M.E- Computer Science & Engineering 
Muthayammal Engineering College 
Namakkal- 637 408 
India 
Email:priyacses@gmail.com 
D.Dhivya 
Lecturer Computer Science & 
Engineering 
Narasus Sarathy Institute of Technology 
Salem 
India 
Email:maildhivya@gmail.com 
 
Abstract 
In  wireless  mesh  network,  the  cross-layer  approach  eliminates  the  link  asymmetry 
problem  that  occurs  due  to  heterogeneous  transmission  range.  However  in  transport  layer, 
network events such as channel noise, mobility and congestion deteriorates the quality of an 
existing  end-to-end  TCP  connection  performance.  A  two  new  mechanisms  namely,  the 
TCP Fractional Window Increment scheme and the ROute-failure notification using BUlk-
losS  Trigger  (ROBUST)  policy  are  designed  to  address  the  problem  in  TCP  connection.   
The TCP Fractional Window Increment scheme is a preventive solution used to reduce the 
congestion-driven  wireless  link  loss.  The  ROBUST  policy  is  a  corrective  solution  that 
enables  on-demand  routing  protocols  to  suppress  overreactions  induced  by  the  aggressive 
TCP behavior. This approach improves the performance and throughput of Wireless Mesh 
Network.  Simulation  results  can  be  performed  to  determine  the  performance  of  the 
network. 
 
MULTIUSER DETECTION AND COLLISION AVOIDNESS IN 
WIRELESS NETWORK 
S.Arunkumar, 
M.E. Network Engineering, 
Vel Tech Multi Tech Dr.RR Dr.SR 
Engineering College. 
Email: arun.naf@gmail.com. 
Y.Kallifulla, 
Assistant Professor, 
Department of Information Technology, 
Vel Tech Multi Tech Dr.RR Dr.SR 
Engineering College. 
Abstract 
Combating  collision  is  one  of  the  major  challenges  in  the  design  of  the  MAC 
algorithm  for  wireless  network.  To  overcome  this  problem,  proposing  new  MIMO/MPR- 
aware cross layer MAC/PHY design. That is capable of combating collision through the use 
of  a  multiple  packet  reception  technique.  Recent  advances  in  MIMO  communication  have 
provided the possibility of simple detection of colliding packets. Analytical and simulation 
result  show  that  proposed  MAC  design  can  considerably  improve  the  throughput  of  a 
WLAN  operating  over  lossy  links.  Exploit  the  multi-packet  reception  (MPR)  do  the 
increase  the  order  capacity  of  random  wireless  network.MPR  provides  a  better  capacity 
improvement  for  wireless  network.  The  use  of  MIMO  in  PHY  point-to-point  as  well  as 
multiuser  communication  has  been  extensively  studied  in  the  recent  literature.  The 
proposed  analysis  applies  both  packet  transmission  schemes  employed  by  DCF,  namely, 
the basic access and the RTS/CTS access mechanism. 
20    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
SUPPORTING EFFICIENT AND SCALABLE MULTICASTING 
OVER MOBILE AD HOC NETWORKS 
 
F.AngelIgnishyaa,[II-ME] 
Department of Computer Science and Engineering,
 
M.Kumarasamy college of Engineering 
Thalavapalayam, Karur (Dt.), Tamil Nadu, India. 
ignishyaa@gmail.com
 
 
Abstract 
 
Group  communications  are  important  in  Mobile  Ad  hoc  Networks  (MANETs). 
Multicast  is  an  efficient  method  for  implementing  group  communications.  However,  it  is 
challenging  to  implement  efficient  and  scalable  multicast  in  MANET  due  to  the  difficulty 
in  group  membership  management  and  multicast  packet  forwarding  over  a  dynamic 
topology. I propose a novel Efficient Geographic Multicast Protocol (EGMP). EGMP uses 
a  virtual-zone-based  structure  to  implement  scalable  and  efficient  group  membership 
management. A network wide zone-based bidirectional tree is constructed to achieve more 
efficient membership management and multicast delivery. The position information is used 
to  guide  the  zone  structure  building,  multicast  tree  construction,  and  multicast  packet 
forwarding,  which  efficiently  reduces  the  overhead  for  route  searching  and  tree  structure 
maintenance. Several strategies have been proposed to further improve the efficiency of the 
protocol,  for  example,  introducing  the  concept  of  zone  depth  for  building  an  optimal  tree 
structure and integrating the location search of group members with the hierarchical group 
membership management. Finally,  I design a scheme to handle empty zone problem faced 
by  most  routing  protocols  using  a  zone  structure.  The  scalability  and  the  efficiency  of 
EGMP  are  evaluated  through  simulations  and  quantitative  analysis.  My  simulation  results 
demonstrate  that  EGMP  has  high  packet  delivery  ratio,  and  low  control  overhead  and 
multicast group joining delay under all test scenarios, and is scalable to both group size and 
network  size.  Compared  to  Scalable  Position-Based  Multicast  (SPBM),  EGMP  has 
significantly  lower  control  overhead,  data  transmission  overhead,  and  multicast  group 
joining delay. 
 
 
 
 
 
 
 
 
 
 
 
21 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
IMPROVING ADCC FOR HOME AUTOMATION NETWORKS IN 
HIGH VOLUME SENSED DATA
 
 
 
 
 
 
Abstract 
A  wireless  sensor  network  (WSN)  consists  of  spatially  distributed  autonomous 
sensors  to  monitor  physical  or  environmental  conditions,  such  as  temperature,  sound, 
vibration,  pressure,  motion  or  pollutants  and  to  cooperatively  pass  their  data  through  the 
network  to  a  main  location.There  is  a  growing  interest  in  the  wireless  sensor  network 
technology  in  the  home  automation  field,  but  as  the  number  of  sensor  nodes  in  the  home 
increases and as the data traffic generated by such nodes grows, the network becomes more 
congested.  Due  to  resource  constraints,  a  congestion  control  scheme  for  wireless  sensor 
network  is  designed  with  simplicity  and  energy  efficiently.  In  existing  system,  ADCC 
(Adaptive Duty-cycle Based Congestion Control), a lightweight congestion control scheme 
using duty-cycle adjustment for wireless sensor networks was used. This scheme uses both 
the  resource  control  and  traffic  control  approaches  according  to  the  amount  of  network 
traffic  for  the  congestion  avoidance.  The  proposed  work  improves  energy  efficiency  with 
congestion  control  scheme  implemented  for  Home  Automation  Network  (HAN)  with 
wireless sensor network (WSN). The Improvement is made on Adaptive Duty-cycle Based 
Congestion  Control  (ADCC)  scheme.  The  deployment  of  Improved  ADCC  involves  the 
aggregation of incoming traffic and nodes channel capacity variation. 
 
A NOVEL APPROACH FOR NETWORK SECURITY USING DATA 
MINING 
M.M Gowthul Alam
1
 
Assistant professor 
National College of Engineering, 
Maruthakulam, Tirunelveli. 
alam_mpm@yahoo.com 
P.Rama Subramanian
2 
P.G student 
National College of Engineering, 
Maruthakulam, Tirunelveli 
bagaram24@gmail.com
 
Abstract  
 
  Data mining is the process of automatically searching large volumes of data for patterns. 
The  Network  Security  System  has  been  developed  to  impart  security  to  the  files  accessed 
by the users logging into a secured network. The System determines whether the user is an 
authorized  user  of  the  network.  The  users  are  validated  using  their  login  id,  password  and 
secret codes. If the user login is valid then they are given access to view the files according 
to their category classification. If the user is an intruder then an alert message is displayed. 
The System determines all the intruders using Decision tree algorithm which is one of type 
of Data mining algorithm.  
A.M.NATARAJAN 
Professor & Chief 
Executive, Bannari Amman 
Institute of Technology, 
Sathyamangalam, Erode 
 
N.PREMALATHA, 
Assistant Professor, 
Department of CSE, Kongu 
Engineering College, Erode,  
premalathan@gmail.com 
 
J.YASODHA, 
PG Student, CSE, Kongu 
Engineering College, 
Erode, 
yasoramyabe@gmail.com 
 
 
22    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
A SECURE AUTHENTICATION FOR BLOCKING MISBEHAVING 
ACCESS USING TICKET BASED METHOD 
 
 Jackulin.C ,  
PG Scholar, Mount Zion College of 
Engineering and Technology,lenevilaku 
Email: jackulin_chin@yahoo.co.in 
   D.Elavarasi M.E  
Assistant Professor, Mount Zion    
College of Engineering and Technology, 
lenevilaku 
 
Abstract 
 
  The main purpose of Ticket based method  is to make a credential system authentication 
for the users who are misbehave with the anonymous networks. These anonymous systems 
helps user to hide their ip from the server, so server cant find the clients who are doing the 
defacing.  And  generally  the  most  of  the  abuser  acts  in  the  server  with  these  anonymous 
network  helps.  During  this  kind  of  problem  the  server  will  denial  the  whole  access  of  the 
particular route, because of this the users which are properly communicate by the route may 
affect.  When  the  server  blocks  the  whole  route  it  will  purely  reflect  on  the  other  users. 
Ticket  based  system  makes  an  authentication  for  the  defacing  users.  It  will  get  a  blacklist 
from  the  server  and  check  every  user  with  it  by  the  help  of  pseudonym  manager[6].  The 
black  list  of  the  server  will  helps  to  restrict  the  users  of  anonymous  network.  If  the  user 
misbehaves the pseudonyms will added into the blacklist, this will further helps to nymble 
manager  to  block  the  users  from  route.  This  system  ensures  that  users  are  aware  of  their 
blacklist  status  before  they  present  a  nymble,  and  disconnect  immediately  if  they  are 
blacklisted.  
 
A SECURE KEY TRANSFER IN DECENTRALIZED SECURE 
GROUP COMMUNICATION BY USING MDS CODES 
 
T.Sangeetha ,R.B Dravidaa priyaa                              Mr.V.Jeyakrishnan 
M.E Computer &Communication Engg                 Assistant professor 
SNS College Of Technology, Coimbatore                  SNS College Of Technology, 
Coimbatore sangimusic@gmail.com                                              
jeyan.krishnan@gmail.com 
 
Abstract 
  In  this  paper  mainly,  we  mainly  focus  storage,  computation,  communication  cost  for 
secure  dynamic  multicast  key  distribution.  Efficient  key  distribution  is  an  important 
problem  in  secure  group  communication.  Members  in  the  groups  are  dynamic.  They 
required  new  key  update  by  using  some  encryption  algorithm  during  the  time  of  member 
join and revoked from the group. The previous work is focus on the basis of complete key 
graph algorithm, hierarchical key management algorithm follow the secure key distribution 
in  the  centralized  method.  We  propose  new  protocol  framework  is  secure  group  overlay 
multicast  (SeGrOM)  that  follow  decentralized  method  apply  the  protocol  in  hierarchical 
structure  forms  hybrid  key  management  algorithm.  Instead  of  using  conventional 
encryption  algorithm,  the  MDS  code  is  used.  Easily  combined  with  the  hierarchical 
structure  provide  low  and  balanced  communication  cost,  storage  cost,  computation 
complexity for secure dynamic multicast key distribution. 
23 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
ADAPTIVE AUDIO STEGANOGRAPHY BASED ON LSBMR 
ALGORITHM 
Sharmila.B 
II M.E [Computer and Communicaiton Engg]                        
Kongu Engineering College           
Perundurai. Erode Dt., India           
e-mail :sharmilame@yahoo.com           
 
 
Abstract   
   Steganography is the art of hiding the fact that communication is taking place, by hiding 
information  in  other  medium.  Many  different  carrier  file  formats  can  be  used,  but  audio 
files  are  the  most  popular  because  of  their  frequency  on  the  Internet.  For  hiding  secret 
information  in  audio,  there  exists  a  large  variety  of  steganographic  techniques.  The  least-
significant- bit (LSB) based approach is a simplest type of steganographic algorithm. In all 
the  existing  approaches,  the  decision  of  choosing  the  region  within  a  audio  is  performed 
without considering the relationship between audio samples and the size of secret message. 
Thus  the  samples  in  lower  power  audio  will  be  ruin  after  data  hiding  even  at  a  low  data 
rate. Hence choosing the high power audio samples for data hiding will be a solution. This 
paper presents the results of analyzing the performance of data hiding at high power of the 
audio.  Moreover  to  increase  the  complexity  for  intrusion  detection,  some  preprocess  is 
done. The adaptive steganography for audio file is experimented with WAV file.  
 
AN ARCHITECTURE TO PROVIDE AUTHENTICATION IN 
ANONYMOUS NETWORKS 
 
P.Yogananth, 
Department of CSE,  
M. Kumarasamy College of Engineering, 
Karur-639 113, India. 
Email: yoganmse@gmail.com, 
Tel: +91 9965868842. 
 
Abstract 
  Anonymizing  networks  such  as  Tor  allow  users  to  access  Internet  services  privately  by 
using a series of routers to hide the clients IP address from the server. The success of such 
networks,  however,  has  been  limited  by  users  employing  this  anonymity  for  abusive 
purposes such as defacing popular Web sites. Web site administrators routinely rely on IP-
address blocking for disabling access to misbehaving users, but blocking IP addresses is not 
practical  if  the  abuser  routes  through  an  anonymizing  network.  As  a  result,  administrators 
block  all  known  exit  nodes  of  anonymizing  networks,  denying  anonymous  access  to 
misbehaving  and behaving users alike. To address this problem,  I have present Nymble, a 
system in which servers can blacklist misbehaving users, thereby blocking users without 
compromising their anonymity. Our system is thus agnostic to different servers definitions 
of  misbehaviorservers  can  blacklist  users  for  whatever  reason,  and  the  privacy  of 
blacklisted users is maintained.  
Shanthakumari.R 
Assistant Professor/Information 
Technology 
Kongu Engineering College 
Perundurai. Erode Dt., India 
email: rsk_shan@yahoo.co.in 
 
 
 
Mr.P.Saravanan ME 
Department of CSE,  
M. Kumarasamy College of 
Engineering, 
Karur-639 113, India. 
 
24    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
AN IMPROVED METHOD BASED ON ANONYMIZATION 
ALGORITHMS FOR PRESERVING SOURCE-LOCATION PRIVACY 
IN WIRELESS SENSOR NETWORK 
 
S.Reka, 
PG Scholar, 
Mount Zion College of 
 Engineering and Technology, 
Lenevilaku. 
reka24nov@gmail.com 
 
Abstract 
   Sensor networks have been widely employed in  many  real-time  applications. One of the 
most  obvious  challenges  appearing  to  threaten  the  successful  deployment  of  sensor 
networks  is  privacy  issues  including  source-location  privacy  which  can  not  be  adequately 
addressed  by  general  security  mechanisms.  Focusing  on  this  important  kind  of  privacy, 
among  many  approaches  proposed  in  literatures,  self-adjusting  phantom  routing  is  a  very 
successful  one.  But  it  still  has  some  weaknesses.  In  this  paper,  we  propose  an  improved 
version of it to enhance its performance. This method can decrease energy consumption and 
communication cost while increase the accuracy  of the  aggregate locations by minimizing 
their monitored areas. 
 
 
 
AUTHENTIC NON SYMMETRIC GROUP KEY AGREEMENT 
USING BROADCAST ENCRYPTION 
Eva Mariam Babu, PG Scholar, 
Sri Ramakrishna Engineering College, Coimbatore. 
Email: evamariam.10@gmail.com 
 
Abstract  
  Asymmetric  GKA  enables  users  of  a  group  to  derive  common  encryption  key  which  is 
accessible to any outsiders. This provides confidential communications and also allows any 
outsider  to  send  encrypted  messages  to  the  users  of  a  group.  An  Authenticated  ASGKA 
protocol  offers  security  against  active  attacks  in  open  networks.  Based  on  this  protocol,  a 
broadcast encryption system without relying on a trusted dealer to distribute the secret keys 
to the users is proposed. Improved systems are also permits a sender to select receivers for 
broadcast encryption and achieves perfect forward security. 
 
 
 
 
 
 
 
 
C.Senthamarai M.E  d Ph.
, 
Assistant Professor, Mount Zion College of 
Engineering and Technology, 
Lenevilaku. 
senthamarai.subbu22@gmail.com 
 
 
25 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
AUTOMOTIVE CAN NETWORK ATTACKED BY SECURITY 
THREATS 
C. Umaa, 
PG Scholar, 
 Anna University of Technology, 
 Madurai,umalekshmi08@gmail.com 
 
Abstract 
  The  IT  security  of  automotive  system  is  an  evolving  area  of  research.  To  analyse  the 
current  situation  and  the  potentially  growing  tendency  of  arising  threats  we  performed 
several  practical  tests  on  recent  automotive  technology.  This  article  summarizes  the  result 
of  four  practical  tests  performed  on  the  control  system  for  the  window  lift  ,airbag  control 
system,  warning  light  and  the  central  gateway.  The  paper  further  discuss  two  selected 
countermeasures  and  they  are  Intrusion  detection  and  IT  forensics  measures.  While  these 
reactive  approaches  are  short-term  measures,  which  could  already  be  added  to  todays 
automotive  IT  architecture,  long-term  concepts  also  are  shortly  introduced,  which  are 
mainly preventive but will require a major redesign. Beneath a short overview on respective 
research approaches, we discuss their individual requirements, potential and restrictions.  
 
 
 
BALANCING REVOCATION AND STORAGE TRADE-OFFS IN 
PRIVACY-PRESERVING UNIVERSAL AUTHENTICATION 
PROTOCOL 
M.Saranya, 
PG Student, 
Sri Krishna College of Technology,  
saranmanirajan@gmail.com 
Abstract 
  A  novel  protocol  to  achieve  privacy-preserving  universal  authentication  protocol  for 
wireless  communications  called  Priauth.  Verifier-Local  Revocation  Group  Signature  with 
Backward  Unlinkability  (VLR-GS-BU),  it  can  satisfy  all  requirements.  Priauth  belongs  to 
the class of Universal Authentication Protocols in which same protocol and signaling flows 
are  used  regardless  of  the  domain  (home  or  foreign)  a  roaming  user  is  visiting.  Allowing 
people  to  get  connected  seamlessly  using  their  devices  without  being  limited  by  the 
geographical  coverage  of  their  own  home  networks  roaming  service  should  be  deployed. 
The key is used to encrypt data transmitted to the servers or users. The efficient distribution 
of  the  new  key  for  multiple  membership  changes  is  a  critical  problem  in  secure  group 
communication. The goal of the enhancement is to evaluate trade-off between storage and 
revocation  cost.  Storage  is  computed  in  terms  of  keys  that  each  user  (respectively,  VA) 
maintains  and  revocation  cost  is  computed  in terms  of  the  encryptions  performed,  and  the 
number of messages transmitted by the VA(visitor agent). 
 
 
 
A.Muthu krishnan 
Faculty, ECE, Anna university 
of technology, Madurai 
P.Dhivya, 
Assistant Professor 
Sri Krishna College of Technology, 
dhivyainfo@gmail.com 
 
 
 
26    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
BLACKLISTING MISBEHAVING USERS IN INDISTINCTIVE 
NETWORKS 
P.Suganya, 
PG Scholar, 
 Computer Science and Engineering,  
Srinivasan Engineering College. 
Suganyapandiyan03@gmail.com 
 
 
Abstract  
  The  Onion  Router  is  used  to  access  Internet  services  privately  by  hiding  the  clients  IP 
address  from  the  server.  The  success  has  been  limited  by  the  concept  of  anonymity  for 
purpose of defacing the popular Web Sites. Administrators monitors and rely on IP address 
blocking for disabling access to users those who misbehaves. If the user accessing from the 
anonymizing  network  then  it  is  impossible  to  block.  As  a  result  web  site  administrators 
block all the users from an anonymizing network. To solve this problem we use Nymble in 
which  it  can  blacklist  only  the  misbehaving  users  although  they  access  from  the 
anonymizing networks. Servers can blacklist the users and the privacy of  blacklisted users 
can be maintained 
 
 
 
CONCEALMENT OF INFORMATION IN INACTIVE AUDIO 
FRAMES OF VoIP 
M.Karthick, 
PG Student, Department of CSE,SKCT, 
Coimbatore, Tamilnadu, India. 
Mail: sarakarthick@gmail.com 
 
Abstract 
  Steganography  is  the  hiding  of  a  secret  message  within  an  ordinary  message  and  the 
extraction  of  secret  message  at  its  destination.  In  digital  steganography,  electronic 
communications  may  include  steganographic  coding  inside  of  a  transport  layer,  such  as  a 
document  file,  image  file,  program  or  protocol.  This  paper  describes  how  to  segregate  the 
audio  that  are  streaming  in  the  Voice  over  Internet  Protocol  (VoIP)  and  a  steganography 
algorithm  for  embedding  data  in  the  inactive  frames  of  low  bit  rate  audio  streams.VoIP  is 
an IP telephony term for a set of facilities used to manage the delivery of voice information 
over the Internet. Voice activity detection (VAD), is a technique used in speech processing 
in which the presence or absence of human speech is detected. The main uses of VAD are 
in  speech  coding  and  speech  recognition,  it  can  avoid  unnecessary  coding/transmission  of 
silence packets in Voice over Internet Protocol applications, saving on computation and on 
network  bandwidth.  This  VAD  algorithm  decides  whether  the  current  audio  frame  is  an 
active  voice  or  inactive  voice.  The  experimental  results  show  the  VAD  process.  The 
purpose of segregating the audio  frames is to  embed the data in audio  frame. These audio 
frames are encoded with G.723.1 source codec. 
 
Prof.J.Suganya, 
Assistant Professor, Computer 
Science  and Engineering, 
Srinivasan Engineering College. 
Suganyabe08@gmail.com    Suganyabe08@gmail.com 
 
P.Madhavan, 
Assistant Professor, 
Department of CSE,SKCT, 
Coimbatore, Tamilnadu, India. 
Mailto:madhrace@rediffmail.com 
 
27 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
DETECTION OF MALICIOUS USER IN COOPERATIVE SYSTEM 
 
 
 
 
 
 
 
Abstract  
   Detection  of  primary  users  is  an  important  task  for  cognitive  radio  systems.  By 
countering the shadow effects, it is found that the performance of the CR spectrum sensing 
system by the cooperation of few spectrum users. Final decision regarding the presence or 
absence  of  the  PU  signal  is  made  by  a  parallel  fusion  network  with  sensors  to  sense 
information to an access point. Severe degradation of performance of the system will take 
place  when  malicious  users  are  present.  They  are  identified  in  this  paper  using  outlier 
detection techniques for a cooperative sensing system, by considering constraints like lack 
of  information  about  primary  signal  propagation  environment  and  small  data  sensing 
samples.  A  novel  method  is  proposed  here  to  identify  such  users  by  using  the  spatial 
information of the CR sensors and the performance results are simulated. 
 
 
DYNAMIC PATH SELECTION FOR SECURE COMMUNICATION IN 
PEER-TO-PEER SYSTEMS 
 
AARTHI M, 
PG student, Oxford  
Engineering College,  
Trichy. 
veera.arti25@gmail.com 
 
Abstract 
   Anonymizing  Peer-to  Peer  (P2P)  systems  often  incurs  extra  traffic  costs.  Peer  to  Peer 
network doesnt contain the centralized server hence the communication between the peers 
in the network.Communication between the peers should have the path to transfer a data or 
information  from  source  to  destination.  Existing  approach  is  a  lightweight  protocol  and 
non-path-based  mutual  anonymity  protocol  for  decentralized  Peer-to-Peer  systems.But  the 
security  is  not  enhanced  in  the  non-path-based  systems.Predefined  path  in  peer  to  peer 
systems  leads  some  attacks  and  also  act  as  non  secured  communication.  For  that  purpose 
the  protocol  rumor  riding  is  involved  to  make  the  communication  secured  by  using  the 
dynamic  path  selection  technique.  The  proposed  system  increase  the  query  speed  by 
using  the  protocol  rumor  riding  and  also  acknowledgement  about  the  message 
transformation to the source node is also specified. 
 
 
P.Sakthi Vadivel,                                                 
PG scholar,Department of ECE,                                                                   
Sri Krishna college of engineering   
and technology, 
Coimbatore, 
E-mail: sakthivadivel87@yahoo.com 
K.Suriya,                                                  
Assistant professor,Department of ECE,                                                                   
Sri  Krishna  college  of  engineering    and 
technology, 
Coimbatore, 
E-mail: kk.suriya@gmail.com 
 
JEYASUDHA  J, 
Lecturer, Oxford 
Engineering 
College, Trichy 
 
Dr.SAMPATH KUMAR, 
Prof & Head in Dept of 
CSE, Oxford Engineering 
College, Trichy 
 
 
28    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
IMPROVING SECURITY AND EFFICIENCY IN MOBILE IP 
NETWORKS 
 
Dr.S.Uma, 
Electronics and Communication Engineering, 
Coimbatore-641 014 
 
                       
Abstract 
  The emergence of mobile devices or mobile nodes allows the users to access the network 
when they are on the move. As users move frequently from one network to another network 
a  new  IP  address  is  assigned  to  the  mobile  node  every  time  when  it  visits  a  new  network. 
The  change  in  IP  address  is  informed  to  other  nodes  is  dealt  by  Mobile  IP.  A  secure  and 
efficient  ID-based  registration  protocol  with  user  anonymity  is  proposed  in  this  paper  for 
IP-based mobile networks. The protocol minimizes the registration delay through a minimal 
usage  of  the  identity  (ID)-basedsignature  scheme  that  eliminates  expensive  pairing 
operations.  User  anonymity  is  achieved  via  a  temporary  identity  (TID)  transmitted  by  a 
mobile user, instead of its true identity. Additional replay protection from a Foreign Agent 
(FA) is included in the registration messages to prevent a possible replay attack. Numerical 
analysis  and  computer  simulation  results  demonstrate  that  the  proposed  protocol 
outperforms the existing ones in terms of the registration delay and the computational load 
on a Mobile Node (MN) while improving security. 
 
LOW COST AND LOW POWER SECURITY SYSTEM BASED ON 
GSM TECHNOLOGY 
 
Ms. M. Poongothai 
Electronics and Communication Engineering 
Coimbatore Institute of Technology 
E mail id: gothaikathirvel@yahoo.com 
 
Abstract 
 
  In this paper, we have proposed a model that alerts the user (owner) in case of intrusion in 
office premises or home by calling a pre-defined number. A Passive Infrared (PIR) sensor 
is  used  to  identify  the  presence  of  intruder  by  detecting  the  motion  of  a  body  that  emits 
infrared  radiation.  A  PIC  microcontroller  is  used  to  receive  the  signal  sensed  by  the  PIR 
sensor. On receiving the signal from the sensor the controller sends AT commands to GSM 
modem,  that  initiates  a  voice  call  to  the  pre-defined  number.  Test  bed  design  has  been 
implemented and simulation results were presented. 
 
 
 
 
 
R.Thilagavathy, 
Electronics and Communication 
Engineering,                                                                                        
Coimbatore-641 014.            
thilagavathy.ece@gmail.com 
 
Mr. R. Suresh 
Electronics and 
Communication Engineering 
Coimbatore Institute of 
Technology 
sureshnicholasr@gmail.com 
 
29 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
LOW-RATE DDOS ATTACK DETECTION AND MODIFIED IP 
TRACEBACK 
 
Prof.T Senthil Vinayakam (Research Scholar), 
Electronics and Communication Engineering, 
Coimbatore. 
 
Abstract 
  A  distributed  denial-of-service  (DDoS)  attack  is  one  in  which  a  multitude  of 
compromised systems attack a single target, thereby  causing denial of service  for users of 
the targeted system. The flood of incoming messages to the target system essentially forces 
it  to  shut  down,  thereby  denying  service  to  the  system  to  legitimate  users.  There  exists 
several metrics to detect DDoS attacks. In this paper, we proposed the entropy variation is 
used  to  discriminate  the  DDoS  attack  from  surge  legitimate  accessing.  The  simulation 
results  show  that  the  proposed  information  metric  can  effectively  detect  low-rate  DDoS 
attacks  and  clearly  reduce  false  positive  rates.  Furthermore,  the  proposed  IP  traceback 
based  on  TTL  based  packet  marking,  can  find  all  attacks  as  well  as  discard  attack  traffic. 
The  simulation  environment  for  DDoS  attacks  of  flooding  type  is  done  using  network 
simulator NS2. 
 
 
MITIGATING SELECTIVE FORWARDINGTCP ATTACKS BY 
COMBINING MAITH WITH A CHANNEL-AWARE APPROACH IN 
MANET 
 
Mrs.M.Kavitha, 
AP/CSE,Dept of CSE, 
SNS College  of  
Technology,  
tameezh@yahoo.co.in 
 
Abstract 
 
  TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to 
its  limited  network  and  host  resources.  Attacker  traceback  is  a  promising  solution  in 
MAITH  Environment  which  allows  a  victim  to  identify  the  exact  location  of  the  attacker 
and  hence  enables  the  victim  to  take  proper  countermeasure  near  attack  origins,  for 
forensics and to discourage attackers from launching the attacks. While most of the existing 
studies on selective forwarding attacks focus on attack detection under the assumption of an 
error-free  wireless  channel,we  consider  a  more  practical  and  challenging  scenario  that 
packetdropping  may  be  due  to  an  attack,  or  normal  loss  events  such  as  medium  access 
collision or bad channel quality.  However, attacker traceback in MANET is a challenging 
problem  due  to  dynamic  network  topology,  limited  network  and  host  resources  such  as 
memory,  bandwidth  and  battery  life.  We  introduce  a  novel  method  of  TCP  attacker 
Identication in MANET by combining MAITH method with a Channel aware approach .  
 
C.Suganthi Evangeline, 
Electronics and 
Communication Engineering, 
ssherlin.suganthi@gmail.com. 
 
Manjula.M , 
SNS College  
of Technology,  
manjucse.sns08
@gmail.com 
 
Kishore Kumar.C, 
SNS College  of 
Technology,  
uot.kishore@gmail.com 
MasanaYuvaraj.S, 
SNS College  of 
Technology,  
masanayuvaraj@ 
gmail.com 
 
30                   
    Proceedings of NCIIT 2012 
 
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
RESTORING NETWORK CONNECTIVITY BY SECURING THE 
TOPOLOGY OF WIRELESS SENSOR NETWORKS FROM 
MALICIOUS ATTACK 
 
D.Abila Princy, 
M.E. Scholar , 
Anna University of Technology ,  
Tirunelveli abiladavid@gmail.com 
 
  Abstract  
   A Wireless Sensor Network is a collection of nodes that are organized into a cooperative 
network .The topology maintenance protocols such as PEAS and CCP are important for the 
operation  of  sensor  networks  .Sensor  network  lifetime  is  increased  by  the  protocols  .The 
existing PEAS and CCP protocol do not care the effect of malicious attacks .Three types of 
attacks launched against these protocols are Network substitution attack ,Snooze attack and 
Sleep  deprivation  attack  .These  attack  reduces  the  lifetime  of  the  sensor  network  and 
degrade the functionality of the sensor applications by decreasing the network connectivity 
and  sensing  coverage  .The  proposed  Sec-PEAS  and  Sec-CCP  protocol  takes 
countermeasures  to  increase  the  connectivity  and  coverage  lifetime  of  the  sensor  network 
.Authentication mechanism is provided  
 
TICKET BASED SECURITY ARCHITECTURE FOR ANONYMIZING 
AND TRACING MISBEHAVING CLIENTS IN WIRELESS MESH 
NETWORKS 
 
P.Priyadharshini,II-M.E(CSE)., 
M.Kumarasamy college of Engineering, 
dharshini.kps08@gmail.com 
 
Abstract 
  Anonymity has received increasing attention in the literature due to the users awareness 
of  their  privacy  nowadays.  Anonymity  provides  protection  for  users  to  enjoy  network 
services  without  being  traced.  While  anonymity-related  issues  have  been  extensively 
studied  in  payment-based  systems  such  as  e-cash  and  peer-to-peer  (P2P)  systems,  little 
effort  has  been  devoted  to  wireless  mesh  networks  (WMNs).  On  the  other  hand,  the 
network  authority  requires  conditional  anonymity  such  that  misbehaving  entities  in  the 
network  remain  traceable.  In  this  paper,  I  propose  security  architecture  to  ensure 
unconditional anonymity for honest users and traceability of misbehaving users for network 
authorities in WMNs. The proposed architecture strives to resolve the conflicts between the 
anonymity  and  traceability  objectives,  in  addition  to  guaranteeing  fundamental  security 
requirements  including  authentication,  confidentiality,  data  integrity,  and  nonrepudiation. 
Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility 
and effectiveness of the proposed architecture.   
 
 
S.RajaRajeswari ,  
Asst.Prof(CSE) ,  
Anna University of Technology 
,Tirunelveli 
 
31 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
STEALTHY ATTACKS IN WIRELESS ADHOC NETWORKS: 
DETECTION IN MULTIHOP NETWORKS 
 
 
 
 
 
 
 
Abstract 
  In  adhoc  wireless  network  there  are  four  possible  attacks.  They  are  misrouting,  power 
control,  identity  delegation,  and  colluding  collision.  The  popular  method  of  detecting 
attacks  in  wireless  network  is  multihop  detection  technique  using  ODMRP.  The  multihop 
networks  provide  connection  oriented  service  by  partitioning  available  bandwidth  to 
multiple channels. ODMRP provides a richer connectivity among multicast members using 
a  mesh  based  approach  and  it  Supplies  multiple  route  for  one  particular  destination.  In 
single hop it does not effectively to transfer long distance but multi-hop process to get high 
gain,  throughput  and  efficient.  These  provide  an  addition  protection  against  malicious 
nodes  by  supporting  multiple  node  disjoint  paths  and  use  NS2  simulation  to  show  its 
effectiveness against representative control and data attacks.  
 
 
 
ACCURACY OPTIMIZATION FOR HIGH-DIMENSIONAL DATA 
USING DENCOS CLUSTERING ALGORITHM 
M.S.Hema                                                                            S.Leela 
Department of Computer Science                                        Department of Computer Science 
Kumaraguru College of Technology                                    Kumaraguru College of 
Technology 
Coimbatore, TamilNadu, India                                            Coimbatore, TamilNadu, India 
ghema_shri@yahoo.co.in                                                     leels.rose@gmail.com 
 
Abstract 
Subspace clustering seeks to find clusters in a dataset by selecting the most relevant 
dimensions  for  each  cluster  separately.  Dense  regions  in  subspaces  are  predicted  using 
density  threshold.  Identifying  such  dense  regions  suffers  from  a  critical  problem,  called 
the  density  divergence  problem,  which  incurs  the  serious  loss  of  clustering  accuracy 
(precision  or  recall)  in  different  subspace  cardinalities.  This  paper  proposes  an  innovative 
algorithm,  called  DENCOS  (DENsity  Conscious  Subspace  clustering),  which  adopts  a 
divide-and-conquer  scheme  to  efficiently  discover  clusters  satisfying  different  density 
thresholds  in  different  subspace  cardinalities.  As  validated  by  extensive  experiments  on 
various data sets, DENCOS can discover the clusters in all subspaces with high quality and 
efficiency. 
 
 
Gowri S 
PG Student, Department of 
Computer Science and 
Engineering 
Oxford Engineering College 
gowri.inftec@gmail.com 
Muthu Venkatachalam P 
Professor, Department of  
Computer Science and  
Engineering 
Oxford Engineering College 
Dr Sampathkumar V  
Professor and Head,  
Department of Computer  
Science and Engineering 
Oxford Engineering College 
32    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
EFFICIENT BRIDGING OF DOMAIN DISTRIBUTION GAP USING 
BIG ALGORITHM IN TRANSFER LEARNING 
R. Kavitha                                                                          C. Gowtham 
Department of Computer Science                                      Department of Computer Science 
Kumaraguru College of Technology                                 Kumaraguru College of 
Technology 
Coimbatore, Tamil Nadu, India                                         Coimbatore, Tamil Nadu, India 
kavitha.cse2009@yahoo.com                                            gowtham26indian@gmail.com 
 
Abstract 
In  data  classification,  the  lack  of  labeled  data  degrades  the  classification 
performance  in  many  real  world  applications.  To  overcome  this  problem  transfer  learning 
techniques  are  used  to  classify  domain  data  from  other  source  data.  But  transfer  learning 
may not work well when the distribution gap between source domain and target domain is 
large.  This  paper  proposes  BIG  (Bridging  Information  Gap)  algorithm  which  effectively 
extracts  useful  knowledge  from  a  worldwide  knowledge  base  and  links  the  source  and 
target  domains  for  improving  the  classification  performance.  As  validated  by  extensive 
experiments  on  several  real-world  cross-domain  text  classification  tasks,  BIG  algorithm 
outperforms several existing domain adaptation approaches significantly. 
 
 
DOCUMENT SEGMENTATION APPROACHES AND TECHNIQUES 
 AN OVERVIEW 
Priyadharshini N        Vijaya MS 
M.Phil Research Scholar,                Associate Professor, 
PSGR Krishnammal College for Women,    G.R.Govindarajalu School of Applied 
Computer Technology 
npriyadharshinimphil@gmail.com    msvijaya@grgsact.com 
Abstract 
This paper presents an analysis on different approaches and techniques of document 
segmentation.  Document  segmentation  is  vital  phase  of  document  analysis  process.  It 
includes  separation  of  text  and  non-text  region  from  a  document  image.  A  text  region 
contains  pure  text  regions,  tables,  mathematical  equations  labels  etc  and  a  non-text  region 
contains  images,  graphs,  charts,  background  regions  etc.  Two  categories  of  methods  have 
been used in document analysis namely 1) hierarchical methods including Bottom-up, Top-
down  and  Hybrid  approaches  2)  non-hierarchical  methods.  The  segmentation  technique 
which use these approaches are Hough Transform, Skew Detection, Projection profile Cuts, 
Run-Length  Smoothing  Algorithm,  Texture  Analysis,  Projection-based,  Pitch-based, 
Recognition-based, Region-based Which have been used in these approaches are discussed 
in this chapter.  
 
 
 
 
33 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
EMAIL ABSTRACTION SCHEME FOR SPAM DETECTION 
 
S.Jansi Rani            E.A.Vimal 
II Year ME Student          Assistant Professor(SRG) 
Kumaraguru College of Technology,  Kumaraguru College of Technology,  
jansiranis89@gmail.com        eavimal@gmail.com 
 
Abstract  
spam  is  one  of  the  major  problems  of  the  todays  internet,  bringing  financial 
damage to companies and annoying individual users. Among the approaches developed to 
stop  spam,  filtering  is  an  important  and  popular  one.  In  the  field  of  collaborative  spam 
filtering  by  near-duplicate  detection,  a  superior  e-mail  abstraction  scheme  is  required  to 
more  certainly  catch  the  evolving  nature  of  spams.  Compared  to  the  existing  methods  in 
prior research, in this project, we explore a more sophisticated and robust e-mail abstraction 
scheme,  which  considers  e-mail  layout  structure  to  represent  e-mails.  The  specific 
procedure  SAG  is  proposed  to  generate  the  e-mail  abstraction  using  HTML  content  in  e-
mail,  and  this  newly-devised  abstraction  can  more  effectively  capture  the  near-duplicate 
phenomenon  of  spams.  Moreover,  a  complete  spam  detection  system  Cosdes  has  been 
designed to efficiently process the near-duplicate matching and to progressively update the 
known  spam  database  .One  major  focus  of  this  work  is  to  design  the  innovative  data 
structure  to  facilitate  the  process  of  near-duplicate  matching.  SpTable  and  SpTrees  (sp 
stands for spam) are proposed to store large amounts of the email abstractions of reported 
spams. 
 
AUTOMATIC SEGMENTATION OF RETINAL IMAGES BY USING 
MORPHOLOGICAL WATERSHED AND REGION GROWING 
METHOD 
 
D.Jebasudha          S.Kaleeswari M.Tech 
PG Scholar,          Assistant Professor, 
Mount Zion College of Engineering               Mount Zion College of Engineering 
and Technology,                                              and Technology, 
lenevilaku          lenevilaku 
jebasudha2010@gmail.com      kaleeswari@sakthivel@yahoo.co.in 
 
Abstract 
Retinal  image  segmentation  is  essential  for  diagnosing  various  problems  occurs  in 
eye. Retinal image segment is one of the critical issues because these images contain very 
small  nerves  and  some  artifacts  present  in  it.  This  paper  proposes  an  automatic 
morphological  watershed  segmentation  and  region  growing  method  to  change  the 
representation of an image into something that is more meaningful and easier to analyze the 
interested  object.  There  are  several  methods  that  intend  to  perform  segmentation,  but  it  is 
difficult  to  adapt  easily  and  detect  the  very  small  nerves  accurately.  To  resolve  this 
problem,  this  paper  aims  to  present  an  adaptable  automatic  morphological  watershed 
segmentation and region growing method that can be applied to any type of retinal images 
which is exactly diagnosed even with the small changes that  
34    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
BOOSTING-SVM AND SRM-SVM CASCADE CLASSIFIERS IN FACE 
VERIFICATION 
 
 
 
 
 
 
Abstract 
Face  verification  in  the  presence  of  age  progression  is  an  important  problem.  The 
problem  of  designing  and  evaluating  discriminative  approaches  without  explicit  age 
modelling  is  used.  To  find  the  gradient  orientation  discard  magnitude  information.  This 
representation  is  further  improved  when  hierarchical  information  is  used  which  results  in 
the  use  of  gradient  orientation  pyramid.  When  combined  with  a  support  vector  machine, 
gradient  orientation  pyramid  demonstrate  excellent  performance.  Gradient  Orientation  of 
each  color  channel  of  human  faces  is  robust  under  age  progression.  The  feature  vector 
which  is  computed  as  the  cosines  of  the  difference  between  gradient  orientations  at  all 
pixels,  is  given  as  the  input  to  the  support  vector  machine  classifier.  The  support  vector 
machine is used to divide the feature space into two classes, one for the intrapersonal pairs 
and  the  other  for  extrapersonal  pairs.  Svm  is  not an  easy  classifier  to  train.  Also  Svm  is a 
binary  classifier  and  it  is  immune  to  noise  Boosting  svm  and  SRM  svm  can  be  used  to 
improve the performance.The proposed method may give better performance. 
 
DETECTION OF VIDEO COPY USING FINGERPRINT 
EXTRACTION 
 
 
 
 
 
 
Abstract 
A video copy detection system is a content-based search engine focusing on Spatio-
temporal  features.  It  aims  to  find  whether  a  query  video  segment  is  a  copy  of  video  from 
the video database or not based on the signature of the video. It is hard to find a video is a 
copied video or a similar video since the features of the content are very  similar from one 
video to the other. The  main focus is to detect that the query video is present in the video 
database  with  robustness  depending  on  the  content  of  video  and  also  by  fast  search  of 
fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted 
to  achieve  robust,  fast,  efficient  and  accurate  video  copy  detection.  As  a  first  step,  the 
Fingerprint  Extraction  algorithm  is  employed  which  extracts  a  fingerprint  through  the 
features  from  the  image  content  of  video.  The  images  are  represented  as  Temporally 
Informative  Representative  Images  (TIRI).    Next  step  is  to  find  the  presence  of  copy  of  a 
query  video  in  a  video  database,  in  which  a  close  match  of  its  fingerprint  in  the 
corresponding fingerprint database is searched using inverted-file-based method.  
Safiya K.M 
PG student, 
Sri Krishna College of 
Technology, 
Coimbatore, India, 
safiyamoideen@gmail.com 
Prof.S.Bhuvana 
Assistant Professor, 
Sri Krishna College 
of Technology, 
Coimbatore, India, 
bhuvana_anju@reiffmail.com 
R.Gnana Rubini 
PG Student, 
Sri Krishna College of 
Technology, 
Prof.P.Tamijeselvy 
Assistant Professor, 
Sri Krishna College of 
Technology, 
 
Ms. P. Anantha Prabha
 
Assistant Professor, 
Sri Krishna College of 
Technology,  
 
 
35 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
DETECTION OF WML IN BRAIN IMAGES USING 
GEOSTATISTICAL FUZZY CLUSTERING 
 
 
 
 
 
 
Abstract 
White matter lesions are small areas of dead cells found in parts of the brain that act 
as connectors are detected using magnetic resonance imaging (MRI) which has increasingly 
been  an  active  and  challenging  research  area  in  computational  neuroscience.  This  paper 
presents new image segmentation models for automated detection of white matter changes 
of  the  brain  in  an  elderly  population.  The  main  focus  is  on  unsupervised  clustering 
algorithms. Clustering is a method for dividing scattered groups of data into several groups. 
It  is  commonly  viewed  as  an  instance  of  unsupervised  learning.    In  machine  learning, 
unsupervised learning refers to the problem of trying to find hidden structures in unlabeled 
data. Unsupervised clustering models, Fuzzy c-means clustering and Geostatistical Fuzzy c-
means  clustering  algorithms  partition  the  dataset  into  clusters  according  to  some  defined 
distance measure. The Region of  Interest (ROI) is then extracted on the membership map. 
Much more accurate results are obtained by GFCM, which better localized the large regions 
of WMLs when compared to FCM. 
 
FEATURE EXTRACTION OF INTRADUCTAL BREAST LESION 
IMAGES USING GMM 
 
 
 
 
 
 
Abstract 
Intraductal Carcinoma is a noninvasive condition in which abnormal cells are found 
in the lining of a breast duct. The abnormal cells have not spread outside the duct to other 
tissues in the breast. In some cases, Intraductal Carcinoma may become invasive cancer and 
spread  to  other  tissues,  although  it  is  not  known  at  this  time  how  to  predict  which  lesions 
will  become  invasive.    Intraductal  cancer  is  the  most  common  type  of  breast  cancer  in 
women. Memory Intraductal includes 3-types of cancer: Usual Ductal Hyperplasia (UDH), 
Atypical Ductal Hyperplasia (ADH), and Ductal Carcinoma in Situ (DCIS). So the system 
of detecting the breast microscopic tissue of   UDH, ADH, DCIS is proposed. The current 
standard  of  care  is  to  perform  percutaneous  needle  biopsies  for  diagnosis  of  palpable  and 
image-detected  breast  abnormalities.  UDH  is  considered  benign  and  patients  diagnosed 
UDH  undergo  routine  follow-up,  whereas  ADH  and  DCIS  are  considered  actionable  and 
patients diagnosed with these two subtypes get  
 
M. Anitha 
PG Student, 
Sri Krishna College of 
Technology,  
anitha_murugaiyan@yahoo.com 
Prof.P.Tamijeselvy 
Assistant Professor, 
Sri Krishna College of 
Technology,  
ptamijeselvy@gmail.com 
G.Prieyadharsini 
PG Student, 
Sri Krishna College of 
Technology,  
gprieyadharsini@gmail.com 
 
Prof.P.Tamijeselvy 
Assistant Professor 
Sri Krishna College of 
Technology,  
tamijeselvy@gmail.com 
36    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
FURTHEST NEAREST NEIGHBOUR CRITERION BASED ACTIVE 
LEARNING IN KNN AND SVM CLASSIFIERS 
 
 
 
 
 
 
 
Abstract  
Active  learning  is  a  supervised  learning  method  that  is  based  on  the  idea  that  a 
machine  learning  algorithm  can  achieve  greater  accuracy  with  fewer  labelled  training 
images if it is allowed to choose the image from which it learns. Facial age classification is 
a  technique  to  classify  face  images  into  one  of  the  several  predefined  age  groups.  The 
proposed  system  applies  an  active  learning  approach  to  facial  age  classification  which 
allows  a  classifier  to  select  the  data  from  which  it  learns.  The  classifier  is  initially  trained 
using  a  small  pool  of  labeled  training  images.  This  is  achieved  by  using  the  bilateral  two 
dimension  linear  discriminant  analysis.  Then  the  most  informative  unlabeled  image  is 
found out from the unlabeled pool using the furthest nearest neighbor criterion, labeled by 
the  user  and  added  to  the  appropriate  class  in  the  training  set.  The  incremental  learning  is 
performed  using  an  incremental  version  of  bilateral  two  dimension  linear  discriminant 
analysis. This active learning paradigm is proposed to be applied to the k nearest neighbor 
classifier  and  the  support  vector  machine  classifier  and  to  compare  the  performance  of 
these two classifiers. 
 
IMAGE SEGMENTATION FOR HIGH SPATIAL RESOLUTION 
USING MARKER BASED WATERSHED ALGORITHM 
Vaigarai B             Mathivanan B 
PG Scholar,             Asst. Proffesor,                                   
Department Of CSE,        Department of CSE, 
Sri Ramakrishna Engineering college,  Sri Ramakrishna Engineering College, 
Coimbatore          Coimbatore 
vaigarai14@gmail.com 
 
Abstract 
In this paper we proposes an edge embedded marker based watershed algorithm for 
high  spatial  resolution  remote  sensing  image  segmentation.  Two  improvement  techniques 
are proposed for the two key steps of maker  extraction and pixel labeling, respectively, to 
make  it  more  effective  and  efficient  for  high  spatial  resolution  image  segmentation. 
Moreover, the edge information, detected by the edge detector embedded with confidence, 
is used to direct the two key steps for detecting objects with weak boundary and improving 
the positional accuracy of the objects boundary. It performs well both in retaining the weak 
boundary and reducing the undesired over-segmentation. 
 
 
 
Indu. M. T 
PG Student, 
Sri Krishna College of 
Technology,  
Coimbatore 
indumt.anjali@gmail.com 
 
Ms. S. Bhuvana 
Assistant Professor,  
Sri Krishna College of 
Technology,  
Coimbatore  
bhuvana_anju@rediffmail.com 
37 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
IMPROVING WEB IMAGE SEARCH USING GMI METHOD 
M.Sree Rajeswari                   J.Selvakumar 
 Master of Engineering                 Asst.Professor 
 Department of CSE (PG)                 Dept.of Software Engineering 
 Sri Ramakrishna Engineering College,             Sri RamakrishnEngineering College 
 Coimbatore            Coimbatore 
  rajikool@ymail.com                  selvakumar_me@yahoo.co.in 
 
Abstract 
We have to type a query in traditional text-based image retrieval (TBIR), relevant images 
are  to  be  reranked  using  visual  features  after  the  initial  text-based  search.  reranked  using  visual 
features after the initial text-based search.  In this  paper,  we  propose a new bag-based  reranking 
framework  for  large-scale  TBIR.  MI  learning  methods  is  used  in  this  bag  based  re-ranking.  we 
used generalised MI (GMI) setting for this application. Developing a new method referred to as 
GMI-SVM to enhance retrieval performance by propagating  the labels from the bag level to the 
instance level. To acquire bag annotiations for GMI learning, we propose a bag ranking method 
to  rank  all  the  bags  according  to  the  bag  ranking  score.  We  had  used  real-world  data  set  NUS-
WIDE  demonstrate  our  framework  with  automatic  bag  annotation  can  achieve  the  best 
performances  compared  with  existing  image  reranking  methods.  GMI-SVM  can  achieve  better 
performances. 
 
OPTIMAL CONTRAST TONE-MAPPING USING LINEAR 
PROGRAMMING FOR IMAGE ENHANCEMENT 
Dr.S.Uma Maheswari         T.Sasikumar 
Electronics and communication Engineering    Electronics and communication 
Engineering 
Coimbatore Institute of Technology      Coimbatore Institute of Technology 
Coimbatore, India          Coimbatore, India. 
 
Abstract 
A  novel  linear  programming  approach  for  optimal  contrast-tone  mapping  is 
proposed. A measure of contrast gain and a sister measure of tone distortion are defined for 
gray level transfer functions. These definitions allow us to depart from the current practice 
of histogram equalization and formulate contrast enhancement as a problem of maximizing 
contrast  gain  subject  to  a  limit  on  tone  distortion  and  possibly  other  constraints  that 
suppress  artifacts.  The  resulting  contrast-tone  optimization  problem  can  be  solved 
efficiently  by  linear  programming.  The  proposed  constrained  optimization  framework  for 
contrast  enhancement  is  general,  and  the  user  can  add  and  fine  tune  the  constraints  to 
achieve  desired  visual  effects.  Experimental  results  are  presented  to  illustrate  the 
performance  of  the  proposed  method,  demonstrating  clearly  superior  performance  of  the 
new  technique  over  histogram  equalization.  In  addition,  two  locally  adaptive  contrast 
enhancement techniques by the proposed method are investigated. 
 
 
 
38    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
OPTIMAL FEATURE REGION SET SELECTION FOR ROBUST 
DIGITAL IMAGE WATERMARKING 
R.Sakila            N.Naveenkumar,M.E.,(Ph.D) 
II year M.E. (C.S.E)          Sr.Lecturer 
Sengunthar Engineering College,       Sengunthar Engineering College, 
Tiruchengode.           Tiruchengode. 
Emailid:sakilacse@gmail.com 
 
Abstract 
The  efficiency  of  a  digital  watermarking  algorithm  is  indicated  by  the  strength  of 
embedded  watermarks  against  various  attacks.  Attacks  which  attempt  to  destroy  or 
invalidate  watermarks  can  be  classified  into  two  types,  noise-like  signal  processing  and 
geometric  distortions.  Attacks  of  the  first  type  intend  to  remove  embedded  watermarks 
from  the  cover  image  by  a  signal  processing  approach.  The  second  type  of  attack,  which 
results in synchronization errors by geometric distortions, makes a detector fail to detect the 
existence  of  watermarks  even  if  they  are  still  on  the  image.  Comparing  with  some  well-
known  feature-based  methods,  the  proposed  method  exhibits  better  performance  in  robust 
digital watermarking.The proposed system is the region collection scheme for robust digital 
image  watermarking.  This  method  aims  to  select  a  non  overlapping  feature  region  set, 
which  has  the  greatest  strength  against  various  attacks  and  can  care  for  image  quality  as 
much as possible after watermarked.  
 
REVERSIBLE DATA HIDING TECHNIQUE FOR HIDING SECRET 
DATA IN VIDEO SCENE 
K.Eswaramoorthy              R.Dhanalakshmi 
Department of Computer Science            Department of Computer 
Science  
and Engineering              and Engineering 
R.M.K Engineering College          R.M.K Engineering College 
eswaramoorthy88@gmail.com        rdl.cse@rmkec.ac.in 
 
Abstract 
This  work  proposes  a  novel  reversible  data  hiding  scheme  for  Encrypted  & 
Compressed  video  scene,  which  enables  the  exact  recovery  of  the  original  video  upon 
extraction  of  the  embedded  information.  It  is  expected  that  this  reversible  data  hiding 
technique  will  be  deployed  for  a  wide  range  of  applications  in  the  areas  such  as  secure 
medical  image  data  system,  law  enforcement,  e-government,  image  authentication  and 
covert communication where any distortion to the original image is not acceptable. First the 
raw  video  is  taken  and  then  splitted  into  the  video  frames.  After  encrypting  the  image 
(video  frame),  the  additional  data  can  also  be  encrypted  using  encrypted  key  and  then 
embedded  into  the  image  by  modifying  a  small  proportion  of  the  video  frames.  With  an 
encrypted  image  containing  additional  encrypted  data  called  marked  image  is  send  to  the 
receiver.  Receiver  may  rstly  decrypt  the  image  using  the  encryption  key,  and  the 
decrypted  version  is  similar  to  the  original  video.  According  to  the  data-hiding  key,  with 
the  aid  of  spatial  correlation  in  natural  video  scene,  the  embedded  data  can  also  be 
successfully extracted and then decrypted using the encryption key. 
39 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
ROAD DETECTION FROM A SINGLE IMAGE USING SIMULATED 
ANNEALING 
Sofia Joshy               M.Balamurugan 
PG Student,            Assistant Professor 
Department of Computer Science       Department of Computer Science  
and Engineering,          and Engineering,   
Sri Krishna College of Technology,       Sri Krishna College of Technology,  
Coimbatore-641 042          Coimbatore-641 042 
sofiajoshy@gmail.com        bala.munisamy@gmail.com 
 
Abstract 
Road  detection  algorithms  are  used  to  detect  road  form  a  single  image.  This  paper 
decompose the road detection process into two steps: the estimation of the vanishing point 
associated  with  the  main  (straight)  part  of  the  road,  followed  by  the  segmentation  of  the 
corresponding  road  area  based  upon  the  detected  vanishing  point.    The  proposed  system 
compute  texture  orientation  for  each  pixel  in  the  image  using  Gabor  filter.  Then  the 
confidence score for each pixel orientation is calculated and it is used for the estimation of 
vanishing  point  of  the  road  by  a  locally  adaptive  soft  voting  scheme  (LASV).    Vanishing 
point constrained road border detection method is used to find the road borders. Simulated 
annealing algorithm can be used to improve the performance of the system by selecting the 
parameters of the Gabor filters correctly. 
 
THE EFFECTIVE COLOR FEATUER SELECTION AND 
MECHANISM FOR FACE RECOGNITION 
 
KANCHERALA.  HIMABINDU 
M.E (comm. systems) 
Hindustan University 
Chennai-603103 
Tamilnadu, India 
bindu.324@gmail.com 
 
Abstract 
This  paper  introduces  the  new  color  face  recognition  (FR)  method  that  makes 
effective  use  of  boosting  learning  as  color-component  feature  selection  framework.  The 
proposed boosting color-component feature selection framework is designed for finding the 
best  set  of  color-component  features  from  various  color  spaces  (or  models),  aiming  to 
achieve  the  best  FR  performance  for  a  given  FR  task.  In  addition,  to  facilitate  the 
complementary effect of the selected color-component features for the purpose of color FR, 
they are combined using the proposed weighted feature fusion scheme. 
The  effectiveness  of  our  color  FR  method  has  been  successfully  evaluated  on  the 
following  public  face  databases  (DBs):  Experimental  results  show  that  the  results  of  the 
proposed method are impressively better than the results of other state-of-the-art color FR  
 
Ms .SHIJU C CHACKO 
Department Electronics & 
Communication 
Hindustan University 
Chennai-603103 
Tamilnadu, India 
 
40    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
VESSEL TREE SEGMENTATION IN LUNG IMAGES AFFECTED BY 
INTERSTITIAL LUNG DISEASES 
Dr.S Uma Maheswari                                              S. X. Roger Antony 
Electronics and communication Engineering          Electronics and communication 
Engineering 
Coimbatore Institute of Technology             Coimbatore Institute of Technology 
Coimbatore, India.                  Coimbatore, India. 
 
Abstract 
Vessel  tree  segmentation  techniques  have  gained  attention,  since  they  play  a  key 
role  in  Computer  Aide  Diagnosis  (CAD)  applications  aimed  at  nodule  or  pulmonary 
embolism detection as well as Interstitial Lung Disease (ILD) pattern quantification. These 
segments  can  act  as  the  control  points  for  lung  image  registration  applications  in  case  of 
follow-up  data,  as  well  as  for  guiding  airway  tree  and  lung  lobe  segmentation. 
Segmentation of lung images has been done from the past to know the exact position of the 
lobes  and  other  structures  in  the  lungs.  Segmentation  of  vessel  trees  is  important  in  the 
diagnosis  of  ILD.  Segmentation  of  nodular  trees  is  also  an  area  of  research  used  for 
identification of Obstructive airway diseases. Techniques used till now are used only for the 
extraction of vessel trees of the lungs.  In this project, the presence of any pathologies and 
lesions  can  also  be  extracted  along  with  the  vessels  from  lung  images  which  is  gives  a 
better and clear interpretation of the disease. Thus, this acts as a pre-processing step in the 
CAD  schemes  of  ILD  patterns  in  Multi  Detector  Computed  Tomography  (MDCT).  The 
performance of this algorithm is evaluated using three main performance measures namely 
area overlap, true positive fraction and false positive fraction. 
 
 
HANDWRITTEN LETTER RECOGNITION USING 
CLASSIFICATION ALGORITHMS 
Saranya K             Vijaya MS 
M.Phil Research Scholar,       Associate Professor, 
PSGR Krishnammal College for Women,     G.R. Govindarajalu School of Applied                  
Computer Technology 
k.saranyamphil@gmail.com      msvijaya@grgsact.com 
 
Abstract 
Handwriting  Recognition  is  the  ability  of  a  computer  to  receive  and  interpret  intelligible 
handwritten input from sources such as paper documents The image of the written text may 
be  sensed  "off  line"  from  a  piece  of  paper  by  optical  scanning  or  intelligent  word 
recognition.  Handwriting  recognition  system  handles  formatting,  performs  correct 
segmentation into characters and finds the most plausible words. Classification technique in 
data  mining  suits  best  for  this  problem.  In  this  paper  the  classification  algorithms  namely 
Naive Bayes, J48 and Multilayer Perceptron are trained and the trained models are used to 
recognize  the  letter.  The  data  set  retrieved  from  UCI  Machine  learning  repository  is  used 
for  learning.  The  letter  recognition  dataset  consists  of  10,000  instances  and  17  attributes. 
The  performance  of  the  classifiers  is  evaluated  using  10-fold  cross-validation  and  the 
results are analyzed. 
41 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
AN APPROACH TO MOTION DETECTION IN VIDEO SEQUENCE 
 
VANITHA.R, 
M.E. Computer and communication 
M.A.M. College of Engineering 
E mail id: vanitha_tiscon@yahoo.co.in 
 
Abstract 
Video processing is one of the most challenging areas in image processing. It deals 
with identifying an object of interest. Motion detection has been used in many fields either 
directly  or  indirectly.  In  this  paper  an  efficient  approach  to  motion  detection  in  video 
sequence  using  color  feature  extraction  operator.  Using  this  approach  we  improve  the 
background  subtraction  and  detecting  the  moving  object  with  greater  accuracy.  In  this 
paper, background modeling is done in order to make the update of background due to light 
illumination  and  change  in  the  weather  condition.  Foreground  detection  is  done  before 
updating  the  background  model.    Color  feature  extraction  is  done  in  order  to  avoid  the 
dynamic background such as moving leaves, rain, snow, rippling water. 
 
LOCATION MONITORING ALGORITHMS FOR WIRELESS 
ADHOC NETWORKS 
P.Kavitha              Prof.M.Sayee Kumar 
PG Scholar,  
           
Assistant Professor, 
Computer Science and Engineering,      Computer Science and Engineering, 
Muthayammal Engineering College       Muthayammal Engineering College 
Pkavi89@gmail.com          Sayee.academic@gmail.com 
 
Abstract 
It  monitors  personal  locations  with  a  potentially  untrusted  server  poses  privacy 
threats. The two algorithms, namely, resource-aware and quality-aware algorithms, that aim 
to  provide  high  quality  location  monitoring  services  for  system  users.  Both  algorithms 
established  k-anonymity  privacy  concept  to  enable  trusted  sensor  nodes  to  provide  the 
aggregate  location  information.  The  resource-aware  algorithm  aims  to  minimize 
communication  and  computational  cost,  while  the  quality-aware  algorithm  aims  to 
maximize the accuracy of the aggregate locations. These two algorithms are used in adhoc 
networks  rather  than  infrastructure.  It  use  a  spatial  histogram  approach  that  estimates  the 
distribution of the monitored persons based on the gathered aggregate location information. 
It guarantees the location privacy of the monitored persons. 
 
 
 
 
 
 
 
42    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
MODIFIED MULTIMEDIA ARCHITECTURE FOR MOBILE 
MULTIMEDIA APPLICATION 
S.Priya          D.Dhivya 
M.E- Computer Science & Engineering   Lecturer Computer Science & Engineering 
Muthayammal Engineering College     Narasus Sarathy Institute of Technology 
Namakkal- 637 408          Salem 
India              India 
Email:priyacses@gmail.com       Email:maildhivya@gmail.com 
 
Abstract 
Dynamically  modified  SRAM  array  for  low-power  mobile  multimedia  application. 
The  proposed  structure  use  a  lower  voltage  for  cells  storing  low-order  bits  and  a  nominal 
voltage  for  cells  storing  higher  order  bits  .Parametric  failures  due  to  manufacturing 
variations  limit  the  opportunities  for  power  saving  in  SRAM.  The  architecture  allows 
reconfigure the number  of bits in the low-voltage mode to change the  error characteristics 
of  the  array  in  run-time.  We  can  obtain  more  than  45%  savings  in  memory  power  with  a 
marginal (10%) reduction in image quality under Simulations in predictive 70 nm nodes. 
 
ENHANCING RELIABILITY AND LIFETIME MAXIMIZATION IN 
DUTY CYCLED WIRELESS SENSOR NETWORK BASED ON 
FORWARDING PROCEDURE 
S.Arunkumar,            Y.Kallifulla, 
M.E. Network Engineering,         Assistant Professor, 
Vel Tech Multi Tech           Department of Information Technology, 
Dr.RR Dr.SR Engineering College,        Vel Tech Multi Tech 
Email: arun.naf@gmail.com         Dr.RR Dr.SR Engineering College 
 
Abstract 
The  paper  deals  about  Chinese  remainder  theorem  based  packet  forwarding 
technique  in  duty  cycled  wireless  sensor  network  with  energy  efficient  multipath 
routing.This  is  a  novel  packet  forwarding  technique  to  grade  reliable  delivery  and  saves 
energy  of  this  duty  cycled  wireless  sensor  network.This  forwarding  technique  reduces  the 
burden of the node by transmitting only few message bits.The duty cycled wireless  sensor 
network  is  the  network  in  which  node  switches  to  active  and  power  saving  state  to  save 
energy.Consider  a  node  in  network  wants  to  transmit  a  message  to  sink  then  the  nodes 
grouped  as  hierarchial  cluster  and  also  each  node  knows  about  the  number  of 
neighbourhood nodes in next hierarchy of cluster so that splitting of packets could be done 
at  nodes.By  Chinese  remainder  theorem(CRT)  the  packet  splitting  will  be  done  in  which 
the  number  of  message  bits  is  modular  divisioned  with  the  set  of  Prime  numbers  and  a 
mask will be added to the message and this is called CRT component. Mask gives the index 
of the splitted message.A simple reconstruction which satisfies the computation complexity 
level  of  processor  in  duty  cycled  wireless  sensor  network.Node  switches  between  active 
state and power saving state and if the CRT component is passed within the active state of 
node  then  the  node  will  receive  else  packet  will  be  lost.Using  this  CRT  method  CRT 
component loss is admissible and  
43 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
PERFORMANCE ANALYSIS AND IMPROVEMENT MEASURES 
FOR COGNITIVE RADIO NETWORKS 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Abstract 
Cognitive Radio Network opportunistically exploits locally unused spectrum which 
is not heavily occupied by licensed users. It provides a new path to resolve spectral scarcity 
and to avoid spectral congestion, without disturbing the QoS requirements of others in the 
system.  Of  the  many  challenges  involved  in  the  practical  ways  of  framing  concepts  for  a 
working model of CR Network, we present its results for predominant applications of data 
and video, in detail. This project addresses the most plausible method of integrating a full 
scale CR Network capable of using TCP connections and data based traffic. 
By providing a higher priority status for video traffic over data traffic feeds, simulations for 
performance  analysis  are  shown  with  the  help  of  Dynamic  Vertical  Sharing  Overlay 
methodology. The theoretical values of mean delay and jitter for data and TCP packets may 
be computed along with an analysis of the average throughput and efficiency of the system 
for  different  TCP  based  connections.  Further  simulation  with  higher  priority  video  signal 
and  data  traffic  will  be  considered.  A  comparative  analysis  of  results  over  data  and  video 
signal will be carried out. 
 
RELAY NODE PLACEMENT SCHEME TO INCREASE LIFE TIME 
IN WIRELESS SENSOR NETWORKS 
J.YASODHA              N.PREMALATHA 
PG Student,               Assistant Professor, 
Department of CSE,             Department of CSE, 
 Kongu Engineering College,          Kongu Engineering College, 
 Erode, Tamil Nadu, India            Erode, Tamil Nadu, India 
Email: yasoramyabe@gmail.com             Email: 
premalathan@gmail.com 
Abstract 
To  alleviate  the  traffic  burden  of  sensor  nodes  and  extend  the  network  lifetime  in 
wireless  sensor  networks,  one  approach  is  to  deploy  a  large  number  of  expensive  macro-
relay nodes  for routing data. The problem is it will degrade the  fault tolerance  capacity of 
WSNs. If relay nodes are uniformly placed, the issue of uneven power consumption arises 
as relay nodes closer to the sink are required to relay more data and thus will deplete their 
energy  more  quickly.  Here,  the  relay  node  deployment  problem  is  discussed  under  the 
assumption  that  the  relay  node  has  the  same  dimension  and  same  energy  supply  as  the 
sensor  node.  Based  on  balancing  power  consumption  among  all  sensor  nodes  and  relay 
nodes, a relay node density function is deduced according to which relay nodes are placed 
in  the  sensing  field.  This  approach  can  achieve  high  energy  utilization  and  the  network 
lifetime  is  significantly  extended  compared  with  the  approach  of  uniformly  placing  relay 
nodes. 
V.P.Ajay,  
[M.E  Comm.Systems] 
PG Student, SKCET, 
Coimbatore 
Ph: +918870764430 
brittoajay1986@gmail.com 
Mrs. Rathika Dhamu, 
Assistant Professor, 
KPRIET, 
Coimbatore 
Ph: +919865817783 
rathikadhamu@gmail.com 
Dr. Sofia Sudhir 
Professor, 
SKCET, 
Coimbatore 
Ph: +919487752081 
sofia_sudhir@yahoo.co.in 
44    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
RELIABILITY AND SECURING TOPOLOGY MAINTENANCE 
PROTOCOLS FOR SENSOR NETWORK 
 
A.ANUPAMA              V.MURUGAN 
PG student,               Senior lecturer, 
Oxford engineering college            Oxford engineering college 
anuarthi17@gmail.com           muruganv84@gmail.com 
 
Abstract 
We  analyze  the  security  vulnerabilities  of  PEAS,  ASCENT,  and  CCP,  three  well-
known  topology  maintenance  protocols  (TMPs)  for  sensor  networks.  These  protocols  aim 
to increase the lifetime of the sensor network by  only maintaining  a subset of nodes in  an 
active or awake state. The design of these protocols assumes that the sensor nodes will be 
deployed  in  a  trusted,  nonadversarial  environment,  and  does  not  take  into  account  the 
impact  of  attacks  launched  by  malicious  insider  or  outsider  nodes.  We  propose  a 
metaprotocol  (Meta-TMP)  to  represent  the  class  of  topology  maintenance  protocols.  The 
Meta-TMP  provides  us  with  a  better  understanding  of  the  characteristics  and  of  how  a 
specific TMP works, and it can be used to study the vulnerabilities of a specific TMP. We 
describe  various  types  of  malicious  behavior  and  actions  that  can  be  carried  out  by  an 
adversary  to  attack  a  wireless  sensor  network  by  exploiting  the  TMP  being  used  in  the 
network. We describe three  attacks against these  protocols that may be used to reduce the 
lifetime of the sensor network, or to degrade the functionality of the sensor application by 
reducing the network connectivity  and the sensing coverage that can be achieved. Further, 
we  describe  countermeasures  that  can  be  taken  to  increase  the  robustness  of  the  protocols 
and make them resilient to such attack. 
 
ROBUST DIFFUSION OF VIDEO USING SUV IN VANETS 
S.Parthasarathy                           Mr.V.Arun,  
M.E Student,                 Assistant Professor of ECE,  
Anna University of Technology Madurai,.            Anna University of Technology Madurai, 
Madurai.                                                 Madurai. 
parthasarathy.me.2010@gmail.com 
 
Abstract 
Vehicular  ad  hoc  network  is  not  efficient  to  support  the  transformation  process  of 
multimedia  streaming.  Broadcast  and  Multicast  in  adhoc  network  facing  the  problem  of 
highly  dynamic  topology  of  Vehicular  network  and  the  strict  delay  requirements  of 
streaming  application.  Inter  vehicular  communications  called  Streaming  Urban  Video, 
which  is  fully  distributed  and  dynamically  adapts  to  topology  changes,  and  leverages  the 
characteristics of streaming applications to yield a highly efficient, cross-layer solution. 
 
 
 
 
 
 
45 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
STABLE CHANNEL BASED ROUTING WITH NODE-PATH 
HANDOFF IN MANET 
Jinu Mercy Joy, 
PG Scholar, 
Sri Ramakrishna Engineering College, Coimbatore 
Email: jinumjoy@gmail.com 
 
Abstract 
In wireless mobile ad hoc networks (MANETs), packet transmission is impaired by 
radio link fluctuations. A variety of routing protocols have been proposed for mobile ad hoc 
networks communicating over unreliable wireless links and have generally ignored channel 
fading. To accommodate this channel fading, this paper proposes a novel channel adaptive 
routing  protocol  which  extends  the  Ad  hoc  On-Demand  Multipath  Distance  Vector 
(AOMDV)  routing  protocol.  It  utilizes  the  average  nonexpiring  time,  combined  with  hop-
count,  to  select  stable  links  and  applies  a  preemptive  handoff  strategy  to  maintain  reliable 
connections. 
 
FILE SHARING IN UNSTRUCTURED PEER-TO-PEER NETWORK 
USING SAMPLING TECHNIQUE 
 
Ms. P. Preethi Rebecca,         M.ARUNA M.E (CSE) , 
Asst.Professor / CSE ,         St. Peters University,Chennai 
St. Peters University, Chennai. 
 
Abstract 
This paper presents a detailed examination of how the dynamic and heterogeneous 
nature  of  real-world  peer-to-peer  systems  can  introduce  bias  into  the  selection  of 
representative  samples  of  peer  properties  (e.g.,  degree,  link  bandwidth,  number  of  files 
shared).  We  propose  the  Metropolized  Random  Walk  with  Backtracking  (MRWB)  as  a 
viable  and  promising  technique  for  collecting  nearly  unbiased  samples  and  conduct  an 
extensive simulation study to demonstrate that our technique works well for a wide variety 
of commonly-encountered peer-to-peer network 
conditions. We have implemented the MRWB algorithm for selecting peer addresses Using 
the  Gnutella  network,  we  empirically  show  that  -  yields  more  accurate  samples  than  tools 
that rely on  commonly-used sampling techniques and results in dramatic improvements in 
efficiency and scalability compared to performing a full crawl. 
 
 
 
 
 
 
 
 
 
 
46    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
SUPPORTING SCALABILITY AND 
STATELESS MULTICASTING IN MANET 
K.Vanitha           S.Varadhaganapathy 
M.E Computer and Communication     Professor 
Department of Information Technology   Deprtment of Information Technology 
Kongu Engineering College      Kongu Engineering College. 
Erode, TamilNadu.India.       Erode,TamilNadu.India. 
vnthkrshnn@gmail.com       svg@kongu.ac.in 
 
Abstract 
A  mobile  ad  hoc  network  is  defined  as  a  transient  network  which  is  formed 
dynamically  by  the  collection  of  nodes  which  are  arbitrary.  It  can  also  be  called  as 
infrastructure  less  network,  because  it  has  no  structure  frame  for  positioning  the  nodes. 
Node itself acts and does the work of router in routing the packets from one node to another 
node.  Multicasting  is  the  process  of  delivering  packets  from  a  single  source  to  several 
destinations  simultaneously.  To  achieve  scalability,  the  network  terrain  is  divided  into 
zones  and  every  node  is  aware  of  its  own  position.  The  position  information  is  integrated 
with  zone  structure  building,  group  membership  management  and  multicast  tree 
maintenance.  The  concept  of  zone  depth  is  used  to  further  improve  the  efficiency  of  the 
protocol. EGMP provides high packet delivery ratio, less control overhead .The main focus 
of this work is to  reduce the control overhead  and also to improve the performance of the 
Efficient Geographic Multicast Protocol (EGMP) through stateless multicasting. 
 
A NOVEL APPROACH ON GREEDY MAXIMAL SCHEDULING 
ALGORITHM ON EMBEDDED NETWORKS 
 
Mr.N.Kumaresan,                          N.Arun Prasath, 
Assistant Professor                         M.E.EmbeddedSystemsand 
Technologies,  
Department of  Electronics and Communication,                 
Anna University of technology, Coimbatore                   
prakumpriniv@gmail.com arunprasathest@gmail.com 
 
Abstract 
There  has  been  a  significant  amount  of  work  done  in  developing  low-complexity 
scheduling schemes to achieve high performance in  wireless networks. A centralized sub-
optimal scheduling policy, called Greedy Maximal  Scheduling (GMS) is a good candidate 
because  its  empirically  observed  performance  is  close  to  optimal  in  a  variety  of  network 
settings.  However,  its  distributed  realization  requires  high  complexity,  which  becomes  a 
major  obstacle  for  practical  implementation.  In  this  paper,  we  develop  simple  distributed 
greedy  algorithms  for  scheduling  in    wireless  networks  in  embedded.  we  propose  greedy 
algorithms  for  scheduling,    with  better    performance  and    lower    complexity    and    reduce 
delay .We reduce the  complexity  by relaxing the global ordering requirement of GMS, up 
to near-zero. Simulation results show that the new algorithms approximate the performance 
of  GMS,  and    improved  method  to  reduce  packet  loss  and  enhance  the  total  output.  This 
algorithm also reduce larger queue length on the wireless networks. 
47 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
LOCATION TRACKING IN UNDERWATER SENSOR NETWORKS 
USING MOBILITY PREDICTION BY DIVIDED SENSITIVE RANGES 
A.Arivazhagi            Prof.S.Jayanthi 
PG Scholar,            Assistant Professor, 
Computer Science and Engineering,      Computer Science and Engineering,  
Srinivasan Engineering College      Srinivasan Engineering College 
arivupra@gmail.com          nigilakash@gmail.com 
Abstract  
  Location  tracking  of  mobile  sensor  nodes  is  indispensable  for  underwater  sensor 
networks.  For  example,  in  aquatic  environment  monitoring  applications,  getting  a  correct 
location  is  an  essential  task  in  order  to  get  useful  location-aware  data.  Only  a  limited 
number  of  schemes  are  available    for  the  localization  service  in  underwater  acoustic 
networks.  These  solutions  are  mainly  designed  for  small-scale  networks(usually  with  tens 
of  nodes  or  even  less).However,  many  aquatic  applications,  such  as  coastline  protection, 
requires  a  localization  solution  that  communicate  with    large  number  (hundreds  to 
thousands)  of  nodes.  The  proposed  paper,  focus  on  the  localization  service  for  large-scale 
mobile  underwater  sensor  networks.  We  propose  a  mobility  prediction  algorithm    by 
dividing  sensitive  ranges.  The  division  is  in  accordance  with  the  cell  transformation 
probability. Then various estimation methods are applied according to the sensitivity of the 
range to gain high precision. As it turns out, the simulation results show that the proposed 
method  can  accurately  estimate  the  location  for  mobile  users  even  in  the  situation  of 
deficient location history. 
 
A HIGH-QUALITY SECURED SHELL FOR LOCATION 
MONITORING SYSTEM IN WIRELESS SENSOR NETWORKS 
N.Rekha            S.Chinnadurai 
PG Scholar,            Assistant Professor, 
Computer Science and Engineering,      Computer Science and Engineering, 
Srinivasan Engineering College      Srinivasan Engineering College 
Rekha.rajan88@gmail.com        Duchinna198227@gmail.com 
 
Abstract 
Advances  in  sensor  networking  and  location  tracking  technology  enable  location 
based  applications  but  they  also  create  signicant  privacy  risk.  Tracking  our  personal 
information  in  an  untrusted  environment  poses  privacy  breach.  In  order  to  preserve  the 
privacy, a high quality location monitoring services for system users needed. Hence two in-
network location anonymization algorithms, namely, resource and quality-aware algorithms 
has  been  proposed.  Both  algorithms  use  k-anonymity  privacy  concept,  to  enable  trusted 
sensor  nodes  to  provide  the  aggregate  location  information  of  monitored  persons  for  our 
system  and  also  preserve  personal  location  privacy,  while  enabling  the  system  to  provide 
location  monitoring  services.  The  resource-aware  algorithm  aims  to  minimize 
communication  and  computational  cost,  while  the  quality-aware  algorithm  aims  to 
minimize the size of cloaked areas in order to generate more accurate aggregate locations. 
To  provide  location  monitoring  services  based  on  the  aggregate  location  information,  a 
spatio-temporal  histogram  approach  has  been  proposed  that  analyzes  the  aggregate 
locations reported from the sensor nodes to estimate the distribution of the monitored  
48    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
LOCALIZATION SCHEME FOR  MINIMIZING ERROR IN 
WIRELESS SENSOR NETWORKS USING MONTE CARLO 
LOCALIZATION ALGORITHM 
S.Balasubramanian                                                S.Sathishkumar                                                                                                                  
M.E Software Engineering                                           M.E Software Engineering 
Anna University of Technology                                   Anna University Of  Technology 
Tiruchirapalli                                                                Tiruchirapalli     
Email id:balamanian09@gmail.com                            Email id: sathish.infostar@gmail.com                                               
                                                                                                                                                                                                                                                                                                                            
Abstract 
Localization is an essential and important research issue in wireless sensor networks 
(WSNs).  Most  localization  schemes  focus  on  static  sensor  networks.  However,  mobile 
sensors  are  required  in  some  applications  to  acquire  all  the  relevant  data.  As  such,  a 
localization scheme designed  for mobile sensor networks is necessary to track the moving 
nodes. In this paper, we propose a localization scheme to improve the localization accuracy 
of  existing  protocols.  In  this  proposed  scheme,  the  normal  nodes  without  location 
information  can  estimate  their  own  locations  by  gathering  the  positions  of  location-aware 
nodes (anchor nodes) and the one-hop normal nodes whose locations are estimated from the 
anchor nodes. In addition, we propose a scheme that predicts the moving direction of sensor 
nodes to increase localization accuracy. Simulation results show that the  localization error 
in our proposed scheme is lower than the previous schemes in various mobility models and 
moving speeds. 
 
LATENCY FOR VERTICAL HANDOFF DECISION IN 
HETEROGENEOUS NETWORKS 
D.Velmurugan, P.Thirumaraiselvan 
Department of Electronics and communication, 
Adhiparasakthi Engineering College 
Vel.kumar.88@gmail.com 
Abstract 
Next  generation  wireless  communications  will  likely  rely  on  integrated  networks 
consisting  of  multiple  wireless  technologies.  Hybrid  networks  based,  for  instance,  on 
systems  such  as  WiMAX  and  WiFi  can  combine  their  respective  advantages  on  coverage 
and  data  rates,  offering  a  high  Quality  of  Service  (QoS)  to  mobile  users.  In  such 
environment,  WiFi/WiMAX  dual  mode  terminals  should  seamlessly  switch  from  one 
network  to  another,  in  order  to  obtain  improved  performance  or  at  least  to  maintain  a 
continuous  wireless  connection.  our  proposed  algorithm  raises  the  system  capacity,  thus 
increasing  the  gain  that  can  be  achieved  with  a  WiMAX  and  WiFi  heterogeneous 
deployment.  Here  use  a  new  fuzzy  logic  inference  system  for  vertical  handover,  which 
combines  a  trigger  to  continuously  maintain  the  connection  and  another  one  to  maximize 
the  user  throughput.  The    proposed      handoff    algorithm      between      WLAN  802.11  and   
WLAN 802.16 network is implemented. The result of the simulation shows the behavior of 
the handoff latency in WLAN networks. The vertical handoff decision algorithm is able to 
determine when a handoff is required, and selects the best access network that is optimized 
to  network  conditions,  quality  service  requirements,  mobile  terminal  conditions,  user 
preferences, and service cost.  
49 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
SECURE HYBRID RANGE QUERY FRAMEWORK 
IN TIERED SENSOR NETWORK 
Se.Nerthikaa          Prof.S.Saravanan 
PG Scholar,          Assistant Professor, 
Computer Science and Engineering,    Information Technology, 
Srinivasan Engineering College    Srinivasan Engineering College 
coolmestudent@gmail.com      samidhanam@gmail.com 
 
Abstract 
The two-tier architecture consisting of a small number of resource-abundant storage 
nodes in the upper tier and a large number of sensors in the lower tier. Master nodes collect 
data from sensor nodes and answer the queries from the network owner. In this architecture, 
each sensor having multiple sensing capabilities periodically forwards the multidimensional 
sensed data to the storage node. Unfortunately, the sensed data could be leaked to or could 
be manipulated by the compromised nodes. In this paper Centralized algorithm is proposed, 
represent  the  first  distributed  approximations  of  the  facility  location  problem  that  can  be 
practicably implemented in multihop sensor networks with local communication. Through 
simulation studies, clustering technique with hybrid tree structure is used to locate nodes to 
detect the adversary. In addition, this paper proposes simple extensions to our algorithms to 
support dynamic networks with varying link qualities and node additions and deletions. 
 
SECURE ON-DEMAND MULTICAST ROUTING PROTOCOL FOR 
WIRELESS MESH NETWORKS 
R.Maheshwari,            R.C.Suganthe, 
PG student, CSE,            Professor, CSE, 
Kongu Engineering College,          Kongu Engineering College, 
Erode, Tamil Nadu, India          Erode, Tamil Nadu, India 
maheshwaribtech@gmail.com 
 
Abstract 
Wireless  Mesh  Network  has  become  the  focus  of  research  in  recent  years  since  it 
offers  rich  and  high  speed  content  access.  Traditional  multicast  routing  protocols  in  mesh 
network  use  hop  count  as  a  path  selection  metric.  This  path  selection  may  leads  to  the 
selection  of  poor  quality  link  and  negatively  impact  on  throughput.  So,  high-throughput 
multicast  routing  protocols  use  link  quality  as  a  path  selection  metric.  In  this  protocol, 
nodes must collaborate inorder to compute path metric and forward data. Here all the nodes 
are  assumed  as  honest  and  behaving  correctly  during  path  establishment  and  data 
forwarding.  However,  given  the  shared  and  multihop  nature  of  the  communication,  this 
assumption  no  longer  holds  and  wireless  mesh  networks  are  subject  to  a  wide  range  of 
security  threats  like  metric  manipulation  attack,  Sybil  attack,  warmhole  attack,  blackhole 
attack,etc.  Previous  works  focus  on  protecting  the  multicast  protocol  from  metric 
manipulation  attack  that  distorts  the  path  selection  process  in  the  entire  network.  In  this 
work, we identify sybil attack against high throughput multicast protocols in wireless mesh 
network.  Our  proposed  defense  mechanism  relies  on  Redundant  Identity  Detection  for 
detecting attacks.  
 
50    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
ROUTE REDIRECTION IN UNSTRUCTURED NETWORK USING 
CHORD 
 
Rama B,                                     Muthu Venkatachalam P,         Dr.Sampath Kumar V 
PG Student,                                Professor,                                 Professor and Head, 
Oxford Engineering College.     Department of CSE,                 Department of CSE, 
rama_mce@yahoo.co.in         Oxford Engineering College.      Oxford Engineering College. 
 
Abstract 
Chord  as  a  tree  based  routing  DHTs  are  used  to  share  storage  and  routing 
responsibility  of  all  nodes  in  an  unstructured  network  (unbounded  path  length).  The  two 
major  problems  called  deny  access  and  misroute  lookups  are  addressed  by  replica 
placements.  This  placement  creates  route  redirection.  The  route  redirection  method  called 
neighbor  set  routing  with  the  replica  placement  can  successfully  route  messages  to  the 
correct  position  even  when  some  of  the  nodes  are  compromised  at  random.  Route 
redirection  provides  better  robustness.  The  one-hop  DHTs  and  DHT  with  multilevel 
hierarchies are the proposed technique for different type of applications. The benefit of this 
idea is to improve the throughput and to reduce the delay. 
 
SECURE AND EFFICIENT INCENTIVE PROTOCOL FOR 
WIRELESS SENSOR NETWORKS 
Aathira.R.Kurup         Prof.Sri Ramalinga Ganesa Perumal.B.E.,M.Tech., 
2nd year ME.,           Head of the Department, ECE Department, 
Sudharsan Engineering College,  Sudharsan Engineering College, 
Pudukkottai           Pudukkottai. 
Email id: aathira_thamburu@yahoo.com 
 
Abstract 
The selfish nodes in the multihop wireless network does not transfer packets as per 
the requirements of the client system and it affects the network performance adversely. To 
avoid  this  delay  in  the  transmission  of  the  data  packets  a  credit  based  secure  incentive 
protocol  was  proposed.  So  that  it  simulate  cooperation  among  mobile  nodes  implemented 
in a fully distributed way  and immune to wide range of attacks.  Incentive-based protocols 
are  more  proper  for  multi-hop  wireless  networks  because  in  addition  to  cooperation 
stimulation,  these  protocols  can  achieve  fairness  by  rewarding  credits  to  the  cooperative 
nodes, and discourage packetflooding attack where the attackers exchange bogus packets to 
consume  the  intermediate  nodes  resources  because  the  nodes  pay  for  relaying  their 
packets.  However,  secure  incentive  protocols  usually  use  signatures  to  achieve  payment 
nonrepudiation which is important to prevent payment manipulation, and thwart free riding 
attacks because the messages integrity is checked in each hop. These cryptosystems incur 
too  heavy  overhead  to  be  used  efficiently  in  limited-resource  nodes.  In  this  paper,  we 
propose an Efficient and Secure cooperation Incentive Protocol (ESIP) that uses public-key 
operations only for the first packet in a series, and then the efficient hashing operations are 
used in the next packets, so that the overhead of  the packet series converges to that of the 
hashing operations. Hash chains and keyed hash values are used to achieve payment non 
repudiation and thwart free riding attacks. 
51 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
AUTOMATED URBAN DRINKING WATER DISTIBUTION AND 
WATER THEFT CONTROL 
Renjisha E Rajan        Porf.P.Moorthy 
Vivekanadha College of Engineering,    Vivekanadha College of Engineering, 
Thiruchengode Tamilnadu, India    Thiruchengode Tamilnadu, India 
renjishaerajan@gmail.com      selvaec@gmail.com  
 
Abstract 
Water is a precious resource. Urban water supply  networks are large-scale systems 
that  transport  drinking  water  over  vast  geographical  areas  to  millions  of  consumers.  The 
rapid  growing  of  the  wide  urban  residential  areas  imposes  the  expansion  as  well      as    the 
modernization  of  the  existing  water  supply  facilities.  Along  with  this      one  more  problem  
identified in   the water supply channels is water theft  since some people use  HP to 1 HP 
pump  to  suck  the  water  directly  from  the  channel.  This  automated  urban  drinking  water 
distribution  and  theft  control  system  is  mainly  to  collect  the  real  time  parameters  and  to 
control  the  supply  if  any  consumer  consume  excess  amount  of  water.  Implementation  of 
this project in a domestic area is to monitor and control the real time water flow to houses, 
and  intimation  system  for  theft  control  along  with  safe  and  secure  operations.    This 
automated  system  allows  overall  supervision  and  remote  control  of  all  the  water  network 
equipments and the management of the water flow according to the users demand and the 
available water volume  related with the reservoirs level. Process  automation system based 
upon utilization of an industrial PC system including all the network components represents 
the best way to improve the water distribution technological process.  
 
 
REALIZING PROGRAMMABLE LOGIC CONTROL 
ENVIRONMENT USING ARM7 MICROCONTROLLER WITH 
WIRED AND WIRELESS COMMUNICATION CAPABILITIES TO 
HOST 
Kavi Kishore.P      Himanshu Shekhar 
M.E (Comm Systems)      M.Tech (Phd...) 
Hindustan University      Dept of  ECE, 
Chennai-603103      Hindustan University 
kavikishore.mtech@gmail.com      Chennai-603103 
        himshekh@gmail.com 
 
Abstract 
  In  this  paper,  a    new    design    is  brought  forward  according  to  the  requirement    of  
monitoring  for  the  remote  PLCs. The system based on DCS uses monitoring equipment 
to  collect    information    of  PLCs    by  UARTs,    and    then    the    data    is  sent    to    a    DCS  
terminal    to    be    processed    and    stored    in    SQL    Database.  The  microprocessor    control  
unit(MCU)    of  monitor  is  based    on    LPC1758,    which  is  ARM    Cortex-M3    based  
microcontroller.    The    hardware    configuration    of    monitor,    software    design    and  
communication  method  are  introduced.  The monitoring program of the DCS terminal is 
also described.  The monitor for remote PLCs has the characteristics of simple equipment, 
low cost and accuracy. It has great value in use for process control 
52    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
SEA  WAVES  SIGNAL  PROCESSING  USING RECURRENT 
NEURAL NETWORKS 
S.K.Umamaheswari,     Mrs.M.Umadevi 
Ganadipathy Tulsis Jain Engg College,        Ganadipathy Tulsis Jain Engg College,   
Chittoor-Cuddalore Road,                              Chittoor-Cuddalore Road,                               
 Kaniyambadi,     Kaniyambadi, 
Vellore-632102.    Vellore-632102. 
Email id:principal@gtec.ac.in,    Email id:uma_san2001@yahoo.co.in 
 
Abstract 
      Recurrent  neural  networks  (RNNs)  are  powerful  tools  to  learn  complex  dynamical 
systems,  for  two  main  reasons:  i)  they  are  universal  approximators  of  dynamical  systems, 
and  ii)  they  can  exhibit  continuous  dynamics;  a  suitable  property  to  model,  for  example, 
agent(robot)-environment  interaction.  However,  "standard"  RNNs,  such  as  BPTT  and 
RTRL  suffer  from    computational  complexity  and  slow  training.  To  overcome  these 
difficulties,  concepts  of      such  as  echo  state  networks  (ESN)  and  Liquid  State  Machines 
(LSM)  have been proposed. The core idea of reservoir computing consists of using a large 
RNN  as  a  pool  of  excitable  complex  neural  dynamics,  from  which  readout  neurons  can 
learn to extract the current state of the network. This reduces the complexity of training to 
simple linear regression while preserving the recurrent property of the network. 
 
DESIGN OF MULTIBAND MICROSTRIP PATCH ANTENNA 
S.Mahendrakumar, M.E., (Ph.D) 
Assistant Professor, 
Department of ECE, 
Velalar College of Engineering & Technology,  
Thindal. 
s.mahendrakumar@yahoo.com 
 
Abstract 
   In this project our aim is to design a patch antenna for frequency ranges starting from 900 
MHz to 5.35 GHz which includes the GSM (880-960) GPS (1568-1592 MHz), DCS (1710-
1880  MHz),  and  PCS  (1850-1990  MHz).  UMTS  (1920-2170  MHz),  IEEE  802.11  b/g 
(2400-2484)  and  WLAN  IEEE  802.11a  band  (5.15-5.35)  in  order  to  meet  the  demand  for 
newer  microwave  and  millimeter-wave  systems  and  emerging  telecommunication 
challenges with respect to size, performance and cost of an antenna. It offers the advantages 
of  light  weight,  low  cost  and  ease  of  fabrication.  Design  of  patch  antenna  includes  the 
analysis of antenna parameters such as Bandwidth, Gain and Efficiency which are related to 
antenna  dimensions  and  their  substrate  Material  parameters.  Further  we  extend  our 
investigations  on  various  methods  of  improving  the  bandwidth  and  gain  of  the  antenna 
which is used for mobile communication. 
 
 
 
 
M.Dhineshkumar,
  
V.S.Kamalamanickam,
   
R.Malathy,                  
M.Manikandan,
 
Department of ECE, 
Velalar College of Engineering & 
Technology, Thindal 
53 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
LINKED DATA GENERATION FRAMEWORK AND ITS 
APPLICATION 
 
Ujjal Marjit, 
C.I.R.M.,  
University of Kalyani 
 Klayani-741235, W.B.,  
India 
sic@klyuinv.ac.in    
 
 
Abstract 
  The  enormous  quantity  of  semantically  interlinked  data  is  a  prerequisite  for  making  the 
Semantic  Web  become  a  reality.  The  major  theme  of  the  Semantic  Web  is  to  publish 
structured  data  on  the  web  using  Resource  Description  Framework  (RDF).  Occasionally 
these expressive pieces of data remains on the web as data silos without contributing a lot 
to the preparation of a global data-space. Linked Data helps machines understand content of 
web and alleviate the mentioned above objective. In this paper our approach is to represent 
a  framework  and  an  application  based  on  it,  so  that  the  data  from  the  legacy  database 
(RDBMS) is published as linked data on the web around the concept of global data-space. 
 
 
ENHANCEMENT OF WIRELESS SENSOR NETWORK BASED ON 
CLUSTERING APPROACH 
 
Bibin.M,       Miss.E.Srie Vidhya Janani, 
2
nd
 year ME Communication Systems,          Asst professor, CSE Department, 
Anna University of Technology Madurai,       Anna University of Technology  
E-mail id: bibinlee@gmail.com.         Madurai 
 
Abstract 
  Wireless Sensor networks are infrastructure less and application specific in nature. They 
are  mostly  deployed  in  hard  to  reach  places,  hence  increase  in  the  lifetime  of  WSN  is 
mandatory in safety critical and reliable application, else it may cause economic losses, or 
even fatalities. In general, clustering sensors into groups is a popular strategy to maximize 
the  network  lifetime,  but  none  of  the  clustering  algorithms  address  the  predictability  issue 
for time-critical WSNs. In this proposed method the HEF clustering algorithm is chosen as 
a design reference model, which is proved to be an optimal clustering policy under certain 
ideal conditions. To address network lifetime predictability in practice, the network lifetime 
bounds  and  feasibility  test  for  the  HEF  are  developed  via  the  worst  case  energy 
consumption  analysis.  Proper  shedulability  of  packet  transmission  also  analyzed  using 
various techniques.  
 
 
 
 
Arup Sarkar, 
Department of Computer 
Science & Engineering., 
University of Kalyani 
Klayani-741235, W.B., 
India 
arup@klyuniv.ac.in 
 
Utpal Biswas, 
Department of Computer 
Science & Engineering., 
University of Kalyani 
Klayani-741235, W.B., 
India 
utpal01in@yahoo.com 
 
54    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
HIGH DIMENSIONAL DATA ANONYMOUS PUBLICATION AND 
UPDATES TO CONFIDENTIAL DATABASES 
S.Kiruthika
 
                     
PG Scholar, 
Computer Science and Engineering,  
Vivekanandha College of  
Engineering for Women 
kiruthimani@gmail.com 
 
Abstract  
  Existing research on privacy-preserving data publishing focuses on relational data: in this 
context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and 
-diversity,  while  minimizing  the  information  loss  incurred  in  the  anonymizing  process 
(i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low 
dimensionality.  We  propose  two  categories  of  novel  anonymization  methods  for  sparse 
high-dimensional  data.  The  first  category  is  based  on  approximate  nearest-neighbor  (NN) 
search in high-dimensional spaces, which is efficiently performed through locality-sensitive 
hashing (LSH).  
 
IDENTIFICATION OF SPAM USING STRUCTURE ABSTRACTION 
GENERATION 
 
Sharjina Rani. R 
M.E. Computer Science and Engineering 
Sri Krishna College Of Engineering 
and Technology 
shilparasmin@gmail.com 
Abstract 
  Spam  is  the  use  of  electronic  messaging  systems  to  send  unwanted  bulk  messages 
indiscriminately.  In  spam  detection,  collaborative  filtering  with  near  duplicate  similarity 
matching scheme has been recently used. Email abstraction is generated from email content 
text.  The  main  goal  of  near  duplicate  similarity  matching  scheme  is  to  maintain  a  known 
spam  database,  formed  by  user  feedback,  to  block  subsequent  near-duplicate  spams.  The 
email  abstractions  cannot  fully  catch  the  spams,  and  are  not  effective  in  near-duplicate 
detection  because  these  abstractions  are  too  brief  and  thus  they  are  not  robust  enough  to 
withstand  intentional  attacks.  In  proposed  system,  Collaborative  Spam  Detection 
System(Cosdes)  with  a  novel  e-mail  abstraction  scheme  is  used.  This  project  is  about 
identification of spam using HTML content in email. In this scheme, e-mail layout structure 
is used to represent emails. This email abstraction scheme generates the e-mail abstraction 
using HTML content in email and then designs a complete spam detection system Cosdes. 
Cosdes  consists  of  two  schemes.  There  are  near-duplicate  matching  scheme  and  a 
progressive update scheme. The progressive update scheme enables system Cosdes to keep 
the  most  up-to-date  information  for  near-duplicate  detection.  The  primary  idea  of  near 
duplicate  scheme  for  spam  detection  is  to  use  reported  known  spams  to  block  subsequent 
ones which have similar content. 
Dr.R.K.Gnanamurthy 
Principal,  
Vivekanandha College of 
Engineering for Women 
 
55 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
MINING KDD CUP DATABASE FOR INTRUSION DETECTION 
BASED ON FUZZY CLASS-ASSOCIATION RULE MINING USING 
GENETIC NETWORK PROGRAMMING 
 
N.Mohan Prabhu,  
PG student Dept of CSE ,  
Sudharshan Engg College,  
Pudukkottai.  
Email id: sbc_ias@yahoo.com 
 
Abstract 
 
  As  the  Internet  services  spread  all  over  the  world,  many  kinds  and  a  large  number  of 
security  threats  are  increasing.  Therefore,  intrusion  detection  systems,  which  can 
effectively detect intrusion accesses, have  attracted attention. This paper  describes a novel 
fuzzy class-association rule mining method based on genetic network programming (GNP) 
for  detecting  network  intrusions.  GNP  is  an  evolutionary  optimization  technique,  which 
uses  directed  graph  structures  instead  of  strings  in  genetic  algorithm  or  trees  in  genetic 
programming,  which  leads  to  enhancing  the  representation  ability  with  compact  programs 
derived  from  the  reusability  of  nodes  in  a  graph  structure.  By  combining  fuzzy  set  theory 
with  GNP,the  proposed  method  can  deal  with  the  mixed  database  that  contains  both 
discrete  and  continuous  attributes  and  also  extract  many  important  class  association  rules 
that  contribute  to  enhancing  detection  ability.  Therefore,the  proposed  method  can  be 
flexibly  applied  to  both  misuse  and  anomaly  detection  in  networkintrusion-  detection 
problems. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mr.Venkatasan, 
Asst Prof Dept of CSE, 
Sudharshan Engg College,  
Pudukkottai.  
 
 
 
56    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
LIVER CANCER CLASSIFICATION FROM GENE EXPRESSION 
USING SWARM INTELLIGENCE 
 
N.Kannaiya Raja,  
M.E., (P.hd) ., 
A.P/CSE Dept. 
 Arulmigu Meenakshi Amman College of Engg  
Thiruvannamalai Dt, 
 Near Kanchipuram ,  
Kanniya13@hotmail.com 
 
 
 
 
 
 
 
 
Abstract  
 
  The  most  important  vital  part  of  microarray  in  gene  expression  analysis  which  classify 
different types of liver cancer tissue sampling according to gene expression with the help of 
known  sample  expression  levels  which  have  been  extracted  from  different  sources  of  the 
systems  by  using  network.  We  present  parallel  form  of  dataset  that  ensures  high  level  of 
classification  can  be  done  on  the  dataset  from  different  hospital  from  worldwide  by  using 
logical  network  and  integrated  into  knowledge  mining  and  used  as  a  image  in  the 
microarray.  Accuracy  of  test  samples  in  a  computer  aided  diagnosis  framework  than  a 
single diagnosis form. In this paper, in medical diagnosis such dataset are highly desirable 
as  medical  expert  can  gain  additional  information  are  needed  for  each  diagnosis,  we 
investigate  knowledge  discovery  from  clinically  collect  dataset  for  liver  cancer  which  is  a 
chronic  disease  a  major  public  health  challenge  in  the  world  .  According  to  international 
statistics 200 million civil liver patient living in the world wide and this number is expected 
to rise with in 2 years therefore we propose a algorithm Particle swarm optimization based 
Feasible Ensemble Classifier used for gene selection and accurate liver cancer classification 
,FEC  technique  shows  good  discriminating  power  in  gene  expression  analysis.  The  PSO-
FEC provides better classification accuracy than GA-FEC classifier, The FEC method can 
be easily extended for nonlinear classifier. 
 
 
 
 
 
 
 
 
P.Uma Devi, ME.,(P.hd)., 
A.P/CSE Dept. 
 Arulmigu Meenakshi 
Amman College of Engg 
Thiruvannamalai Dt, 
 Near Kanchipuram , 
Umasri05@yahoo.co.in 
Dr. K.Arulanandam, Prof & Head, 
CSE Department, 
 Ganadipathy Tulsis Jain Engineering 
College, Vellore,  
sakthisivamkva@gmail.com 
N.Saranya Arulmigu Meenakshi 
Amman College of Engg 
Thiruvannamalai Dt, Near 
Kanchipuram , 
Saranya.n2010@gmail.com 
57 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
AN EFFICIENT FALSE HITS REDUCTION BY AUTHENTICATED 
MULTISTEP NEAREST NEIGHBOR SEARCH 
 
Abstract  
 
  For an increasing number of modern database applications, efficient support of similarity 
search  becomes  an  important  task.  Multistep  processing  is  commonly  used  for  nearest 
neighbor  (NN)  and  similarity  search  in  applications  for  costly  distance  computations. 
Today, many such applications require a proof of result correctness. In this setting, clients 
issue  NN  queries  to  a  server  that  maintains  a  database  signed  by  a  trusted  authority.  The 
server  returns  the  NN  set  along  with  supplementary  information  that  permits  result 
verification  using  the  data  set  signature.  An  adaptation  of  the  multistep  NN  algorithm 
incurs  prohibitive  network    overhead    due    to    the    transmission  of    false    hits  that  the  
records  that  are  not  in  the  NN  set.  In  order  to  alleviate  this  problem,  it  presents  a  novel 
technique  that  reduces  the  size  of  each  false  hit  and  for  a  distributed  setting,  where  the 
database is horizontally partitioned over several servers 
 
FEATURE BASED SEMANTIC MULTI-DOCUMENT UPDATE 
SUMMARY GENERATION 
K.Ambika ,     A.Kogilavani
 
 
Department of Computer Science &     Department of Computer Science& 
Engineering    Engineering      
Kongu Engineering College,    Kongu Engineering College,  
Perundurai,    Perundurai,  
Tamilnadu, India    Tamilnadu, India 
ambikamecse2012@gmail.com    vani_sowbar@yahoo.co.in 
 
 
Abstract 
  Multi-document  summarization  is  an  automatic  procedure  aimed  at  extraction  of 
information  from  multiple  texts  written  about  the  same  topic.  This  paper  proposes  an 
approach  to  produce  an  extractive  semantic  summary  from  multiple  documents.  Initially 
constructing  a  list  of  sentences  for  each  document  is  done  with  the  help  of  annotating  the 
sentences  according  to  the  aspects.  To  calculate  the  score  of  each  sentence,  the  set  of 
features  like  Word,  Position,  Length,  Centrality,  Sentence  with  Proper  Noun,  Numerical 
Data,  Annotated  sentence,  Preposition  and  Named  Entities  features  are  used.  Finally  top 
ranking sentences are selected for initial summary. Then phrase matching process is used to 
remove  redundancies  and  to  generate  update  summary.  Experiment  evaluation  shows  that 
the proposed system outperforms the existing system. 
Jasmine Alice Manonmani. J   
M.E - Software Engineering 
Jayaram College of Engg and Tech, 
Anna University, Trichy 
Pagalavadi, Tamilnadu State 621014, 
India 
sarah.manonmani@gmail.com 
Senthilmathi. T M.E., 
Asst Professor, Dept. of CS 
Jayaram College of Engg and Tech, 
Anna University, Trichy 
Pagalavadi, Tamilnadu State 621014, 
tsenthilmathi@gmail.com                    
 
 
58    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
IMPROVING THE INTRUSION DETECTION SYSTEM USING AN 
ELEGANT ADAPTIVE  LEARNING TECHNIQUE 
 
S.Suganya, 
PG Student,  
CSE, 
Kongu Engineering College, 
Erode, Tamil Nadu, India 
btechsugan21@gmail.com                           
 
Abstract 
  Security is  an important  issue of a network. There is a possibility for the  third parties to 
interrupt the communication in a network. So it is necessary to secure the system from the 
adversaries.  The  technique  which  is  used  to  detect  the  interruption  is  called  as  Intrusion 
Detection  System  (IDS).  Many  solutions  have  been  proposed  for  improving  IDS.  One  of 
them  is  IDS  using  Artificial  Neural  Network  (ANN).  To  classify  the  different  types  of 
attacks,  ANN  uses  back  propagation  algorithm  with  feed  forward  neural  network.  But  the 
main  drawback  of  ANN  is  that  it  is  inefficient  to  use  for  larger  networks.  The  proposed 
system focuses to improve the IDS with larger networks by implementing a new technique 
called  Adaptive  Learning  system  (ALS).  The  ALS  technique  maintains  a  detection  model 
which  has  the  ability  to  identify  the  known  interrupt  in  the  system.  Since  it  classifies  the 
activities of the system,  if any new intrusion or some malfunctioning takes place the ALS 
will easily identify through the detection model and it will classify those unknown activities 
an anomaly. This will improve the efficiency and lifespan of the network. Experiments will 
be evaluated with KDD CUP 99 data sets to test the behavior of the system.  
 
WEB USER INTERFERENCE BY CLUSTERING 
M.Malathy
       
M.C.BABU 
2
nd 
year P.G Student                         Lecturer of CSE 
St. Peters University,    `  St. PETERS UNIVERSITY,  
Chennai.         Chennai. 
Malathyuk@Gmail.Com       
 
Abstract  
  This  paper  focuses  on  the  definition  and  identification  of  Web  user-sessions, 
aggregations  of  several  TCP  connections  generated  by  the  same  source  host.  The 
identification of a user-session is non trivial. Traditional approaches rely on threshold based 
mechanisms.  However,  these  techniques  are  very  sensitive  to  the  value  chosen  for  the 
threshold,  which  may  be  difficult  to  set  correctly.  By  applying  clustering  techniques,  we 
define  a  novel  methodology  to  identify  Web  user-sessions  without  requiring  an  a  priori 
definition of threshold values. We define a clustering based approach, we discuss pros and 
cons  of  this  approach,  and  we  apply  it  to  real  traffic  traces.  The  proposed  methodology  is 
applied  to  artificially  generated  traces  to  evaluate  its  benefits  against  traditional  threshold 
based  approaches.  Web  user-sessions  tend  to  be  Poisson,  but  correlation  may  arise  during 
periods of network/hosts anomalous behavior. 
 
R.Manjuladevi 
Assistant professor, Kongu 
Engineering College, Erode, 
Tamil Nadu, India 
 
59 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
AN INDEXING METHOD FOR XML DATA 
P.Nataraj, 
PG Scholar, 
Department of CSE, 
Kongu Engineering College, 
Perundurai, Erode. 
Email: natarajbe.cse@gmail.com 
 
Abstract 
   XML  has  now  become  the  standard  for  transporting  data  between  different  web 
applications.  Due  to  the  use  of  XML  in  web  applications,  updating  takes  place  so 
frequently. We need a better labeling scheme that will effectively handle the updating in the 
web. There are many XML labeling scheme that can assign labels for each and every nodes 
in the XML tree structure. When an updating takes place, we need to assign a new label for 
that node in tree. This also results in changing all labels, due to changes in tree structures. 
This  result  in  increase  in  complexity  for  labeling,  when  new  data  was  added  in  web.  We 
need a XML labeling technique that can able to insert a new label without changing already 
available  labels  in  XML  tree.  We  propose  a  new  labeling  scheme  which  was  based  on 
Improved Binary String Labeling. XMill compression will reduce the label size. 
 
CUSTOMIZED NEWS FILTERING AND SUMMARIZATION 
SYSTEM BASED ON PERSONAL INTEREST 
 
Anand babu M.H 
mhanandbabu@gmail.com 
Department of M.E Software Engineering 
Anna University of Technology, 
Thiruchirapalli 
 
Abstract 
  Information  on  the  World  Wide  Web  is  consisted  with  large  amounts  of  news  contents. 
Recommendation, filtering, and summarization of Web news have received much attention 
in  Web  intelligence,  aiming  to  find  interesting  news  and  summarize  concise  content  for 
users.  In  this  paper,  we  present  our  research  on  developing  the  News  Filtering  and 
Summarization system (CNFS). An embedded learning component of CNFS induces a user 
interest  model  and  recommends  Customized  news.  A  keyword  knowledge  base  is 
maintained  and  provides  a  real-time  update  to  reflect  the  general  Web  news  topic 
information  and  the  users  interest  preferences.  The  non-news  content  irrelevant  to  the 
news  Web  page  is  filtered  out.  Keywords  that  capture  the  main  topic  of  the  news  are 
extracted using lexical chains to represent semantic relations between words. An Example 
run of our CNFS system demonstrates the superiority of this Web intelligence system. 
 
 
 
Dr P.Jayanthi, 
Assistant Professor (SG), 
Department of CSE, 
Kongu Engineering College, 
Email: pjayanthikec@gmail.com 
60    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
LOW POWER FILTER DESIGN USING OPTIMIZED 
MULTIPLEXER BASED MULTIPLIER AND ADDER CELL . 
 
            G.Anjuga Priyanka    G.Sathish Kumar      Prof.B.M.Prabhu     Prof.L.Raja 
Angel College of Engineering and Technology, 
Tirupur 
 
Abstract 
  The  main  components  to  design  a  digital  filter  are  Adder,  Multiplier  and  delay  element. 
The Filter is optimized with the proposed architecture for the adder and multiplier which is 
based  on  the  concept  of  multiplexers.  The  proposed  architecture  for  the  adder  and 
multiplier  is  reconfigured  architecture  with  the  concept  of  multiplexer.  The  proposed 
architecture the full adder circuit has only 14 transistor which results in the low power and 
occupies  less  area.  An  obvious  method  to  reduce  power  consumption  is  to  reduce  number 
of transistors in a circuit.Among the three inputs in the full adder one of the input is used as 
a  select  line  for  multiplexer.6  multiplexers  and  an  inverter  is  used  in  the  proposed 
architecture  .  After  analyzing  the  performance  characteristics  of  conventional  multiplier 
types,  it  is  observed  that  the  multiplexer-based  multiplication  algorithm  is  more 
advantageous.  The  multiplexer  based  adder  is  designed  in  tanner  s-edit  and  the  circuit  is 
simulated.The proposed adder consumes 23% less power than the most power efficient 10-
transistor  adders  and  is  64%  faster  of  all  other  tested  adders.  Therefore,  is  suitable  to  be 
applied to build larger low-power high performance VLSI systems. 
 
 
OPTIMUM THROUGHPUT ESTIMATION IN MULTIBAND 
MULTIANTENNA WIRELESS MESH NETWORKS 
 
Deepika.S      DR.H.Mangalam
 
P.G scholar,       Professor, 
Sri Krishna college of engineering       Sri Krishna college of engineering 
and technology,      and technology,   
Coimbatore, India, 641008      Coimbatore, India, 641008, 
Email: deepsece03@gmail.com ,   
 
Abstract 
  The shortage of bandwidth has made both industry and government to explore new ways 
of  using  limited  resources.Thus  recent  advances  in  signal  processing  combined  with  those 
in  antenna  technology  provide  MIMO  capabilities,  thereby  creating  oppurtunities  for 
enhancing the throughput of wireless networks.Both SDR and MIMO together enable next 
generation  wireless  network  such  as  mesh  networks  to  support  dynamic  and  adaptive 
bandwidth  sharing  along  time,frequency  and  space.  Use  of  multiple  antennas  at  the 
transmitter  will  suppress  the  interference  caused  by  the  receiver  and  facilitate  multiple 
spectrum  bands.Establish  nodes  in  WMN  and  find  the  shortest  path  thenafter  evaluate  the 
approximation  algorithm  to  predict  the  loss  caused  by  constrain  and  estimate  the 
throughput.Here  LP constrain relaxation techniques is used to characterize and analyze the 
maximum achievable throughput  that multihop,multiband  
61 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
BACKGROUND MODELING AND SUBTRACTION OF DYNAMIC 
SCENES 
SUGANYA DEVI A, M.TECH-IT, 
Sasurie College of Engineering, Tirupur, India 
(Suganyadevi.arjunan@gmail.com) 
Abstract 
   This  project  presents  an  approach  for  video  metrology  from  videos  acquired  by  a 
stationary camera, we first recover the accurate scene in the place based upon we will fine 
tracking the moving objects that from the particular place.   We finally fuse the multi frame 
measurements  using  the  least  median  of  squares  (LMedS)  as  a  robust  cost  function.  The 
authors  examine  the  problem  of  segmenting  foreground  objects  in  live  video  when 
background  scene  textures  change  over  time.  In  particular,  we  formulate  background 
subtraction as minimizing a penalized instantaneous risk functional  yielding a local online 
discriminative  algorithm  that  can  quickly  adapt  to  temporal  changes.  We  analyze  the 
algorithms  convergence,  discuss  its  robustness  to  non  stationary,  and  provide  an  efficient 
nonlinear  extension  via  sparse  kernels.  To  accommodate  interactions  among  neighboring 
pixels,  a  global  algorithm  is  then  derived  that  explicitly  distinguishes  objects  versus 
background using maximum a posteriori inference in a Markov random field (implemented 
via graph-cuts). By exploiting the parallel nature of the proposed algorithms, we develop an 
implementation  that  can  run  efficiently  on  the  highly  parallel  graphics  processing  unit 
(GPU).  Empirical  studies  on  a  wide  variety  of  datasets  demonstrate  that  the  proposed 
approach achieves quality that is comparable to state-of-the-art offline methods, while still 
being suitable for real-time video analysis. 
A COMPARISON STUDY OF GENETIC ALGORITHM AND 
ARTIFICIAL IMMUNE SYSTEM 
 
Swathy Priyadharsini P 
Bannari Amman Institute of Technology,  
Sathyamangalam Erode, 
Tamil Nadu, India  
swa.pspd@gmail.com 
Abstract 
  Bloom  filter  is  a  probabilistic  and  space  efficient  data  structure  designed  to  check  the 
membership of an element in a set. The trade-off to use Bloom filter may have configurable 
risk of false positives. The percentages of  a false positive can be made low if the hash bit 
map  is  sufficiently  massive.  Spam  is  an  unsolicited  or  irrelevant  message  sent  on  the 
internet  to  an  outsized  range  of  users  or  newsgroup.  A  spam  word  may  be  a  list  of  well-
known words that usually appear in spam mails.  In the proposed system, Bin Bloom Filter 
(BBF) groups the words into number of bloom filters that have different false positive rates 
primarily based on the weights of the spam words. Clonal Selection Algorithm is one of the 
methods in Artificial Immune System (AIS) involved with computational methods inspired 
by  the  process  of  the  biological  immune  system.  This  paper  demonstrates  the  CSA 
algorithm  for  minimizing  the  total  membership  invalidation  cost  of  the  BBF  which  finds 
the optimal false positive rates and number of elements to be stored in bloom filters of Bin. 
The  experimental  results  demonstrate  the  application  of  CSA  in  BBF  and  compare  the 
results with Genetic Algorithm (GA). 
Arulanand Natarajan 
Anna University of Technology 
Coimbatore 
Tamil Nadu, India 
arulnat@yahoo.com 
 
62    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
BIOMETRICS AS AN AUTHENTICATION MEASURE 
Anantha kumar. T 
Junior Research Fellow 
Department of Computer Science and Engineering 
Bannari Amman Institute of Technology, Sathyamangalam, Erode 
anandmecse@gmail.com 
Abstract  
  The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). 
Biometrics refers to the automatic identification of a person based on his/her physiological 
or  behavioral  characteristics.  This  method  of  identification  is  preferred  over  traditional 
methods  involving  passwords  and  PIN  numbers  for  its  accuracy  and  case  sensitiveness.  A 
biometric  system  is  essentially  a  pattern  recognition  system  which  makes  a  personal 
identification  by  determining  the  authenticity  of  a  specific  physiological  or  behavioral 
characteristic possessed by the user. An important issue in designing a practical system is to 
determine  how  an  individual  is  identified.  Depending  on  the  context,  a  biometric  system 
can be either a verification (authentication) system or an identification system. Verification 
involves confirming or denying a person's claimed identity while in identification, one has 
to  establish  a  person's  identity.  Biometric  systems  are  divided  on  the  basis  of  the 
authentication  medium  used.  They  are  broadly  divided  as  identifications  of  Hand 
Geometry,  Vein  Pattern,  Voice  Pattern,  DNA,  Signature  Dynamics,  Finger  Prints,  Iris 
Pattern and Face Detection. These methods are used on the basis of the scope of the testing 
medium, the accuracy required and speed required. Every medium of authentication has its 
own  advantages  and  shortcomings.    With  the  increased  use  of  computers  as  vehicles  of 
information  technology,  it  is  necessary  to  restrict  unauthorized  access  to  or  fraudulent  use 
of  sensitive/personal  data.  Biometric  techniques  being  potentially  able  to  augment  this 
restriction are enjoying a renewed interest. 
 
FREE AND OPEN SOURCE SOFTWARE FOR DISASTER MANAGEMENT 
Prasanna Balaji M.S 
Department of Computer Science and Engineering 
Bannari Amman Institute of Technology 
prasannabalajims@gmail.com 
Abstract 
  Free and open source software is increasingly being used in many spheres of development 
including disaster management. With the economic downturn, stakeholders at both ends of 
the  technology  divide  are  turning  to  free  and  open  source  software  solutions.  Despite  the 
successes of open source, few challenges including sustainability remain a problem. While 
use of open source varies between developed and developing nations, cheaper cost and 
vendor  independence  have  been  cited  as  the  key  factors  in  favour  of  its  use.  The  paper 
illustrates  empowerment  of  communities  in  developing  nations  through  appropriate  open 
source applications. Explicitly, the paper describes the functioning of the Sahana disaster 
management  system  deployed  during  the  2004,  Indian  Ocean  Tsunami.  Sahana  used  free 
and  open  source  software  to  create  number  of  functionalities.  Success  of  these 
functionalities has contributed to efficient and effective management of disaster relief. The 
paper  offers  a  set  of  generic  policy  options  for  the  use  of  open  source  in  disaster 
management. 
63 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
Dynamic Bandwidth Adaptation supported Adaptive Call Admission 
Control Mechanism for 3GPP: LTE Networks 
 
Senpaka Priya V 
Department of Computer Science and 
Engineering, 
Bannari Amman Institute of Technology 
Erode, TN, India 
senpakapriya89@gmail.com 
 
J.Vijay Franklin  
Department of Computer Science and 
Engineering, 
Bannari Amman Institute of Technology 
Erode, TN, India 
vijay_frank@inbox.com 
Abstract 
   In this continuous fast  world of mobile devices  there is always  a  growing demand 
of high rate services. So a call has to be continuous with same data rates during a handoff. 
This  paper  deals  with  a  novel  approach  to  reduce  the  call  dropping  probability  while 
ensuring  QoS  demands  are  met  in  LTE  wireless  networks.  The  reduction  is  based  on 
Adaptive  Call  Admission  Control  (Ad-CAC)  scheme  which  gives  priority  to  handoff  call 
over  the  new  calls.  The  Dynamic  Bandwidth  Adaptation  (DBA)  approach  is  used  to 
maximize  the  overall  system  utilization  while  keeping  the  blocking  rates  low.  This 
approach also maintains a low new call blocking rates. 
Keywords-Ad-CAC, DBA, Handoff call, New call, QoS 
 
An Efficient Jamming Detection In Wireless Mesh Networks 
 
Ms.J.Soniya. (M.E), 
anna university of technology Coimbatore 
j.soniya0709@gmail.com 
 
 
Abstract 
 
Wireless  mesh  networks  (WMNs)  have  emerged  as  a  key  technology  for  next-
generation wireless networking. Because of their advantages over other wireless networks, 
WMNs are undergoing rapid progress and inspiring numerous applications. However, many 
technical issues still exist in this field. We develop a cross-layer approach for mesh access 
networks to simultaneously address the unidirectional link problem. The main ideas of our 
approach  are  to  eliminate  the  unidirectional  link  at  the  network  layer  and  introducing  bi 
directional  link  at  the  same  layer  also  we  are  detecting  the  jammers  in  the  network  layer. 
Jamming  is  difficult  to  mitigate  in  broadcast  networks  because  transmitting  and  receiving 
are inherently symmetric operations: A user that possesses the key to decode a transmission 
can also use that key to jam the transmission. We describe a code tree system that provides 
input  to  the  physical  layer  and  helps  the  physical  layer  circumvent  jammers.  Finally,  we 
demonstrate  that  our  scheme  approaches  the  best  possible  performance  by  performing  an 
extensive analysis of the system using network simulator version 2. 
Mr.M.Newlin Raj kumar 
M.S.,M.B.A.,(Ph.D)., 
Assistant professor of CSE Dept., 
anna university of technology 
Coimbatore. 
newlin_rajkumar@yahoo.co.in   
64    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
Enhancing Privacy And Reducing The Traffic Levels In 
Vehicular Ad-Hoc Networks 
 
A.Naveenkumar, 
P.G Scholar,  
anaveenkumar@live.com, 
Angel College of Engineering  
and Technology, Tripur. 
 
Abstract  
Vehicular Ad Hoc Networks is a kind of special wireless ad hoc network, which has the 
characteristics  of  high  node  mobility  and  fast  topology  changes.  The  Vehicular  Networks 
can  provide  wide  variety  of  services,  ranges  from  safety  and  crash  avoidance  to  internet 
access  and  multimedia  applications.  Attacking  and  misusing  such  network  could  cause 
destructive  consequences.  It  is  therefore  necessary  to  integrate  security  requirements  into 
the  design  of  VANETs  and  defend  VANET  systems  against  misbehaviour,  in  order  to 
ensure correct and smooth operations of the network. In this paper, We propose a security 
system for VANETs to achieve privacy desired by vehicles and traceability required by law 
enforcement  authorities,  in  addition  to  satisfying  fundamental  security  requirements 
including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, 
we  propose  a  privacy-preserving  defense  technique  for  network  authorities  to  handle 
misbehaviour in VANET access, considering the challenge that privacy provides avenue for 
misbehaviour.  The  proposed  system  employs  an  identity-based  cryptosystem  where 
certificates are not needed for authentication. We show the fulfilment and feasibility of our 
system with respect to the security goals and efficiency. 
 
Threat Modelling Using An Attack Surface Metric 
Isaiarasi.S 
M.E - Software Engineering 
Jayaram College of Engineering  
and Technology  
Anna University, Trichy 
isaikannan@yahoo.com 
 
Abstract  
Measurement  of  software  security  is  a  long-standing  challenge  to  the  research 
community. At the same time, practical security metrics and measurements are essential for 
secure  software  development.  Hence,  the  need  for  metrics  is  more  pressing  now  due  to  a 
growing  demand  for  secure  software.  In  this  paper,  we  propose  using  a  software  systems 
attack  surface  measurement  as  an  indicator  of  the  systems  security.  We  formalize  the 
notion  of  a  systems  attack  surface  and  introduce  an  attack  surface  metric  to  measure  the 
attack  surface  in  a  systematic  manner.  Our  measurement  method  is  agnostic  to  a  software 
systems implementation language and is applicable to systems of all sizes; we demonstrate 
our  method  by  measuring  the  attack  surfaces  of  small  desktop  applications  and  large 
enterprise systems implemented in C and Java.  
V.Surendhiran, 
P.G Scholar,  
surendhiran.svs@gmail.com, 
Angel College of Engineering 
 and Technology, Tripur. 
 
Sakthivel.V, 
M.E - Software Engineering, 
Jayaram College of Engineering  
and Technology, 
Anna University, Trichy 
mvsakthi@gmail.com 
 
65 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
Secure Routing Through Trusted Nodes For Mobile Adhoc Networks 
 
Dhanya Simon, PG Scholar 
Sri Ramakrishna Engineering College, Coimbatore. 
Email: simondhanya@gmail.com 
 
Abstract 
The  infrastructure-less  property  of  MANET,  Dynamic  network  topology  and  lack  of 
certificate  authority  make  the  security  problems  of  MANET  need  to  pay  more  attention. 
This  algorithm  is  to  provide  secure  routing  in  ad  hoc  mobile  networks.  We  use  trust 
establishment through friends and special challenges are used for authenticating the nodes. 
The friend nodes are rated on the basis of the amount of  data transmission they accomplish 
and their friendship with other nodes in the network. This provides a robust mechanism for 
preventing attacks by isolating malicious nodes in the network. 
 
 
A Modified Approach For Continuous User Authentication And 
Intrusion Detection In High Security Mobile Ad Hoc Networks 
 
A. Caroline, Asst Prof, 
Department of CSE, 
Dr.S.J.S.Paul Memorial College of engineering and 
technology,Pondicherry.carol_lynns@yahoo.co.in 
 
Abstract 
Since  Mobile  adhoc  networks  are  made  up  entirely  of  wireless  mobile  nodes,  they  are 
inherently  more  susceptible  to  security  threats  compared  to  fixed  networks.  Access  to 
wireless links is virtually impossible to control.. Authentication is the hallmark of security 
and  failure  to  achieve  this  will  be  the  stumbling  block  in  the  way  of  securing  MANETs. 
Intrusion  detection  systems  for  MANETs  are  indispensable  for  a  reliable  system.  In  this 
paper  a  modified  approach  has  been  proposed  by  considering  the  connectivity  of  the 
network  for  scheduling  decisions  in  High  security  Mobile  adhoc  networks.  In  such 
environment  we  introduce  a  packet  scheduling  mechanisms  which  approximates  an  ideal 
scheduling  mechanism  which  shares  the  throughput  among  the  contending  flows. 
Furthermore,  the  connectivity  of  the  network  is  ensured  by  connectivity  improvement 
algorithm.  Simulation  results  are  presented  to  show  the  performance  of  the  proposed 
approach. 
 
66    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
An Efficient Approach For Detecting Mobile Replica Node Attack In 
Wireless Sensor Network 
Ms.Saranya 
Second Year [M.E] 
Dept of Information Technology 
M.A.M College of Engineering 
Trichy, India 
saranyasenthilvel@gmail.com 
Abstract   
The  sensor  networks  are  unattended  and  the  sensor  nodes  are  not  equipped  with  the 
tamper-resistance  hardware  so  that  ,  an  adversary  can  capture  and  compromise  sensor 
nodes, make replicas of them, and then mount a variety of attacks with these replicas. These 
replica node attacks are dangerous  in which the adversary takes the secret keying materials 
from  a  compromised  node,  generates  a  large  number  of  attacker-controlled  replicas  that 
share  the  compromised  nodes  keying  materials  and  ID,  and  then  spreads  these  replicas 
throughout  the  network.  With  a  single  captured  node,  the  adversary  can  create  as  many 
replica  nodes  as  he  has  the  hardware  to  generate.  Previous  works  against  replica  node 
attacks  detection  suffer  from  a  high  communication  /storage  overhead  and  also  work  for 
only static sensor network . They do not work in mobile sensor networks, where sensors are 
expected  to  move.  An  Efficient  and  Distributed  Detection  (EDD)  scheme  along  with 
Sequential Hypothesis testing  for detecting replica node attacks in mobile sensor networks 
is proposed. The security  and performance  analysis indicate that the proposed scheme can 
identify  replica  node  attacks  with  a  high  detection  probability  at  the  cost  of  a  low 
computation/communication/storage overhead. 
A Optimal Information Hiding Technique With Tree Based Similarity 
 
S.Kalaivani 
PG Scholar, 
Computer Science and Engineering, 
 Srinivasan Engineering College, 
sivanesan.kalaivani@gmail.com 
 
Abstract 
 
The  information  hiding  deals  with  distortion  reduction  using  steganography  and 
security  enhancement  using  cryptography.  Distortion  reduction  is  done  using  Tree  Based 
Parity  Check  which  uses  Majority  vote  strategy.  The  Tree  Based  Parity  Check  is  very 
optimal  for  cloaking  a  message  on  image.  The  proposed  majority  vote  strategy  results  in 
least distortion. The SHA-1 algorithm is implemented for security enhancement. The result 
obtained  in  proposed  method  works  effectively  even  with  large  payload. 
Ms. Nerthikaa 
Second Year [M.E] 
Dept  of  Computer  science 
and Engineering 
Srinivasan  College  of 
Engineering 
Perambalur,India 
nerthi.sekar@gmail.com 
 
V. Maheshwari, 
Assistant Professor, Computer 
Science  and Engineering, 
Srinivasan Engineering College. 
maheshwari.vetri.sec@gmailcom 
 
67 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
An Effective Minimization Of Storage Overhead For Tracking Down The 
Invasion Of Replicated Nodes In Wireless Sensor Networks 
R.Rajavaishnavi, 
PG Scholar,  
Computer Science and Engineering,  
Srinivasan Engineering College 
twinkline1512@gmail.com 
Abstract   
   Wireless  sensor  networks  are  vulnerable  because  nodes  are  often  placed  in  a  hostile  or 
dangerous  environment  where  they  are  not  physically  protected.  A  central  problem  in 
sensor  network  security  is  that  sensors  are  susceptible  to  physical  node  capture  attacks. 
Once  a  sensor  is  compromised,  the  adversary  can  easily  launch  replica  attacks  by 
duplicating  the  compromised  node,  distributing  the  replicas  throughout  the  network,  and 
starting  a  variety  of  insider  attacks.  Previous  works  against  replica  attacks  suffer  from  a 
high communication /storage overhead or poor detection accuracy.  A new protocol called 
Node  Location  Maintenance  (NLM)  protocol  is  used.  This  employs  a  table  of  values  at 
each  node  to  record  the  trace  of  the  random  walks.  Each  witness  node  will  create  a  new 
entry in its table for every new location claim. Randomized, efficient and distributed (RED) 
protocol  is  used  for  the  detection  of  node  replication  attacks.    RED  executes  routinely  at 
fixed  intervals  of  time.  The  security  and  performance  analysis  indicate  that  the  proposed 
scheme  can  identify  replica  attacks  with  a  high  detection  probability  at  the  cost  of  a  low 
computation/communication/storage overhead. 
  
Correlation - Based Traffic Analysis Attacks On Anonymity Networks 
M.Kumaresan, 
II MCA., 
mkumaresan45@ 
gmail.com 
 
Department of Computer Science, PREC 
Abstract 
Mixes  have  been  used  in  many  anonymous  communication  systems  and  are 
supposed  to  provide  countermeasures  to  defeat  traffic  analysis  attacks.  In  this  project, 
we  focus  on  a  particular  class  of  traffic  analysis  attacks,  flow  correlation  attacks,  by 
which an adversary attempts to analyze the network traffic and correlate the traffic of a 
flow over an input link with that over an output link. Two classes of correlation methods 
are considered, namely time-domain methods and frequency-domain methods. Based on 
our  threat  model  and  known  strategies  in  existing  mix  networks,  we  perform  extensive 
experiments  to  analyze  the  performance  of  mixes.  We  find  that  all  but  a  few  batching 
strategies  fail  against  flow-correlation  attacks,  allowing  the  adversary  to  either  identify 
ingress  or  egress  points  of  a  flow  or  to  reconstruct  the  path  used  by  the  flow.  Counter 
intuitively,  some  batching  strategies  are  actually  detrimental  against  attacks.  The 
empirical  results  provided  in  this  project  give  an  indication  to  designers  of  Mix 
networks about appropriate configurations and mechanisms to be used to counter flow-
correlation attacks. 
Prof.S.Chinnadurai, 
Assistant Professor, Computer 
Science and Engineering, 
Srinivasan Engineering College 
duchinna198227@gmail.com 
 
N.Rajavel, 
II MCA,  
rajveluvasu 
@gmail.com 
 
C.Raja, 
II MCA,  
k.crajas917@gmail.
com 
R.Gnanakumarn, 
Asst. Professor, 
rgkumaran@gmail
.com 
68    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
Quick Response (QR) Code: A Review 
A.K.Shafreen Banu 
Asst. Professor, 
Department of IT,  
Bishop Heber College,  
Trichy-620017. 
shafreenbanu@gmail.com. 
 
Abstract 
A QR  code (abbreviated  from Quick  Response  code)  is  a  type  of matrix  barcode (or 
two-dimensional  code)  first  designed  for  the  automotive  industry.  More  recently,  the 
system  has  become  popular  outside  of  the  industry  due  to  its  fast  readability  and  large 
storage capacity compared to traditional UPC barcodes. The code consists of black modules 
arranged in a square pattern on a white background. The information encoded can be made 
up  of  four  standardized  kinds  ("modes")  of  data  (numeric,  alphanumeric,  byte/binary),  or 
by supported extensions virtually any kind of data. The technology has seen frequent use in 
the United  Kingdom and  the United  States;  QR  usage  is  growing  fastest 
in Canada and Hong  Kong.  QR  code  was  created  by Toyota subsidiary Denso Wave  in 
1994 to  track  vehicles  during  the  manufacturing  process,  the  QR  code  is  one  of  the  most 
popular  types  of  two  dimensional  barcodes.  It  was  designed  to  allow  its  contents  to  be 
decoded at high-speed. 
 
Modified Multimedia Architecture For Mobile Multimedia Application 
S.Parthasarathy 
M.E Student, 
Anna University of Technology Madurai,  
Madurai. 
parthasarathy.me.2010@gmail.com 
 
Abstract 
Dynamically  modified  SRAM  array  for  low-power  mobile  multimedia 
application.  The  proposed  structure  use  a  lower  voltage  for  cells  storing  low-order 
bits and a nominal voltage for cells storing higher order bits .Parametric failures due 
to  manufacturing  variations  limit  the  opportunities  for  power  saving  in  SRAM.  The 
architecture allows reconfigure the number of bits in the low-voltage mode to change 
the  error  characteristics  of  the  array  in  run-time.  We  can  obtain  more  than  45% 
savings  in  memory  power  with  a  marginal  (10%)  reduction  in  image  quality  under 
Simulations  in  predictive  70  nm  nodes  INDEX  TERMS    Image  Processing,  low 
power, multimedia, process variation, SRAM. 
 
 
M.Lovelin Ponn Felciah 
Asst. Professor,  
Department of IT,  
Bishop Heber College,  
Trichy-620017. 
lovelinponnfelciah@yahoo.co.in 
 
 
G.Kavinraj 
Student, II M.Sc. IT, 
Department of Information 
Technology, Bishop Heber 
College, Trichy-620017. 
kavin.bhc@gmail.com 
 
Mr.V.Arun,  
Assistant Professor of ECE,  
Anna University of 
Technology, Madurai, 
 Madurai. 
69 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
A Novel Hybrid Approach To Detect Color Texts In Natural Scene 
Images 
C.Selvi (M.E-CSE) 
PG Scholar 
Selvichandran.it@gmail.com 
Gnanamani College of Technology 
 
Abstract 
Large amounts of information are embedded in natural scenes which are often required 
to  be  automatically  recognized  and  processed.  This  requires  automatic  detection, 
segmentation  and  recognition  of  visual  text  entities  in  natural  scene  images.  In  this  paper, 
we present a hybrid approach to detect color texts in natural scene images. The approaches 
used  in  this  project  are  region  based  and  connected  component  based  approach.  A  text 
region  detector  is  designed  to  estimate  the  probabilities  of  text  position  and  scale,  which 
helps to segment candidate text components with an efficient local binarization algorithm. 
To combine unary component properties and binary contextual component relationships, a 
conditional  random  field  (CRF)  model  with  supervised  parameter  learning  is  proposed. 
Finally,  text  components  are  grouped  into  text  lines/words  with  a  learning-based  energy 
minimization method. In our proposed system, a selective metric-based clustering is used to 
extract textual information in real-world images, thus enabling the processing of  character 
segmentation into individual components to increase final recognition rates. This project is 
evaluated on natural scene image dataset. 
 
VP8 Video Codecs For Mobile Applications 
Basavaraju S, 
TE Dept, Dr AIT Bangalore 
rajhunsur@yahoo.co.in 
 
Abstract 
Google  has  recently  released  the  video  compression  format  VP8  to  the  open  source 
community.  This  new  compression  format  competes  against  the  existing  H.264  video 
standard  developed  by  the  ITU-T  Video  Coding  Experts  Group  (VCEG)  in  collaboration 
with  the  ISO/IEC  Moving  PictureExperts  Group  (MPEG).  This  paper  is  about  coding 
standards in terms of video bit rate-distortion (quality) performance and the video network 
track  variability  with  different  long  video  sequences..  VP8  is  based  on  decomposition  of 
frames  into  square  sub-blocks  of  pixels,  prediction  of  such  sub-blocks  using  previously 
constructed blocks, and adjustment of such predictions (as well as synthesis of unpredicted 
blocks) using a discrete cosine transform (hereafter abbreviated as DCT). 
Mr.A.A.R.Senthil Kumaar, M.E., 
(Ph.D). , 
Head of the Department, 
Gnanamani College of Technology. 
 
Dr B Siva Kumar , 
Professor and HOD of TE Dept,  
Dr AIT Ban galore, 
sivabs2000@yahoo.co.uk 
 
70    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
Image Based Learning To Enhance The Study Of Visual Impaired Person 
 
Mrs J Kokila, 
PG Student,  
Department of  CSE, 
Oxford Engineering College,  
Tiruchirappalli 
Jkcse09@gmail.com 
Abstract                                                                                           
Bag-of-visual  Words  (BoWs)  representation  has  been  applied  for  various  problems  in 
the  field  of  multimedia  and  computer  vision.  In  this  paper,  descriptive  visual  words 
(DVWs) and descriptive visual phrases (DVPs) are proposed as the visual correspondences 
to  the  text  words  and  phrases,  where  visual  phrases  refer  to  the  frequently  co-occurring 
visual word pairs. The proposed framework will  select images and transform it into a text 
file using descriptive visual words and visual phrases method. The text file will be read by 
the speech synthesizer which tells to the visually impaired person.  Independent navigation 
is  always  a  challenge  to  visually  impaired  person,  whenever  they  learning  in  the  image 
based books such as science, social science, biology, computer science books. We apply the 
identified  DVWs  and  DVPs  in  several  applications  including  large-scale  near-duplicated 
image  retrieval,  image  re-ranking,  object  recognition  and  text  to  speech  synthesis.  The 
proposed  image  re-ranking  algorithm:  DWP  Rank  performs  the  state-of-the-art  algorithm 
by 12.4% in mean average precision and about 11 times faster in efficiency. 
 
Efficient Iris Recognition Based Biometric Techniques  For Embedded 
System 
Ranjisha.R, 
 Vivekanadha College of Engineering,  
Thiruchengode Tamilnadu, India  
ranjis29@gmail.com, 
 
Abstract  
Several  systems  require  authenticating  a  persons  identity  before  giving  access  to 
resources.  With  new  advances  in  technology,  biometrics  is  one  of  the  most  promising 
techniques  in  human  recognition.  Biometrics  intends  to  identify  a  person  by  his  physical 
and/or  behavioral  characteristics.  This  paper  presents  an  approach  for  designing  personal 
tokens where iris biometric authentication is applied. An iris-recognition algorithm first has 
to localize the inner and outer boundaries of the iris in an image of an eye. The set of pixels 
containing only the iris, normalized to compensate for pupil dilation or constriction, is then 
analyzed  to  extract  iris  code  needed  to  compare  two  iris  images.  These  iris  codes  can  be 
stored  in  the  data  base  or  in  personal  token.  For  identification  or  verification,  a  iris  code 
created by imaging an iris is compared to stored template(s) in a database. Iris segmentation 
is  very  important  for  an  iris  recognition  system.  If  the  iris  regions  were  not  correctly 
segmented,  there  would  possibly  exist  four  kinds  of  noises  in  segmented  iris  regions: 
eyelashes, eyelids, reflections and pupil, which will result in poor recognition performance.  
Hence  this  paper  also  proposes  methods  which  will  enhance  the  quality  of  segmented  iris 
image by removing the noises 
Mr.N.Sathish Kumar, 
UG Student,   
Department of CSE,  
Oxford Engineering College,  
Tiruchirappalli . 
nsathish.oec@gmail.com  
 
                                           
nsathish.oec@gmail.c
om  
 
 
Mr.P.Thanga Durai, 
UG Student,  
 Department of CSE, Oxford 
Engineering College,  
Tiruchirappalli 
power.vpy@gmail.com 
                              
 
Prof. P.Moorthy, 
Vivekanandha College of 
Engineering 
Thiruchengode Tamilnadu, India 
selvaec@gmail.com 
71 
Proceedings of NCIIT 2012   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
 
Image Retrieval Using Multi-Feature Score Fusion Through Genetic 
Algorithm 
 
 
 
 
 
 
 
Abstract 
Our work deals with image retrieval based on multi-feature score fusion using Genetic 
algorithm.   In this the retrieval results from color feature  and texture feature are analyzed, 
and  the  method  of  fusing  multi-feature  score  is  described.  The  color  information  of  an 
image  is  represented  by  the  hue,  saturation  and  intensity  values.  The  texture  features  are 
determined  by  calculating  the  energy,  entropy,  contrast  and  correlation  values.  Genetic 
algorithm is applied for assigning fusion weights of multi-feature scores. Genetic algorithm 
proves  to  be  more  efficient  because  it  can  assign  weight  functions  in  a  randomized  way. 
The  final  query  ranking  is  based  on  the  total  normalized  distance  in  color  and  texture 
features.  The  color  and  texture  features  of  all  the  data  base  images  are  calculated  and 
compared  with  the  same  features  of  the  input  image.  The  top  10  images  with  least 
difference are retrieved as the output.  
  
An Artificial Device To Regain Memories For Accidently Memory Lost 
Persons 
 
Dinakar.S, 
Lecturer,  
Dept of CSE,  
SNS College of Technology,  
Coimbatore, TamilNadu. 
s.dinakar27@gmail.com 
 
Abstract 
 
Brain is considered as one among the most complex organs in the human body. It is known 
as  super  computer  which  cannot  be  decoded  by  any  computer  in  the  world.  The  proposed 
describes  about  the  retrieval  of  stored  information  from  the  memory  for  each  and  every 
human activity. But in case of accidentally memory lost persons the process is not attained 
fully  so  we  make  use  of  a  silicon  chip  that  generates  the  deep  brain  simulation  known  as 
reference signal that can simulate the person activity without any interruption. 
 
 
S.Bhuvaneswari, 
Lecturer,  
Dept of CSE, 
 SNS College of 
 Technology, 
Coimbatore, 
TamilNadu. 
bhuvana_it04@gmail
.com 
M.Velmurugan, 
Student, 
 Dept of CSE,  
SNS College of 
Technology, 
Coimbatore, 
TamilNadu. 
murugan.vel92@
gmail.com 
N.Vivek Bharathi, 
Student,  
Dept CSE,  
SNS College of 
Technology, 
 Coimbatore, 
TamilNadu. 
vivekbharathi.P.n
@gmail.com 
Sanmukapriya.V 
Department of ECE, 
Sri Shakthi Institute of  
Engineering and Technology, 
Coimbatore  62. 
sanmukapriyacbe@gmail.co
m  
 
Shanmugapriya.V  
Department of ECE, 
Sri Shakthi Institute of  
Engineering and Technology, 
Coimbatore  62. 
priyavino487@gmail.com 
 
S.Sangeetha       
Asst. Prof /Department of 
ECE, 
Sri Shakthi Institute of  
Engineering and Technology, 
Coimbatore  62. 
 
72    Proceedings of NCIIT 2012
   
Sponsored by DRDO, New Delhi                                                     Organized by Bannari Amman Institute of Technology 
 
Intelligent Car Backup Warning System 
 
Ms. K. Vanithamani, 
Associate Professor, 
Electrical and Electronics Engineering, 
Coimbatore Institute of Technology,  
Coimbatore                                        
                                     
Abstract 
When  the  car  is  in  reverse  gear,  most  of  the  drivers  use  back-up  camera,  or    reverse 
radar to know the road situation behind the vehicle. Pedestrians can know if the vehicle is 
in reverse gear or not, by seeing a light in the rear side of the car. So, the pedestrians should 
be  more  careful  while  the  car  is  in  reverse  gear.  This  is  the  drawback,  while  the  car  is  in 
reverse gear. So, most often backup collision occurs. To prevent collision the driver should 
turn around and looks out of the car.  But it is not possible for all the time. Therefore, this 
research  tries  to  design  an  intelligent  car  reverse  warning  system  using  an  embedded 
controller. This system uses sensors to detect the objects when the car is engaged in reverse 
gear. Then it will produce an alarm signal. If the driver is not attentive and if the car crosses 
the  predefined  distance,  the  motor  speed  get  slows  down  and  if  it  is  more  closer  to  the 
obstacle means the car  will stop immediately. Touch panel is used to give the input in the 
real  time  environment.  Fuzzy  logic  rules    are  used  to  develop  an    intelligent  car  reversing 
system. 
 
A. Janetlin Anna Kiruba, 
M.E, Embedded And Real 
Time Systems, 
Coimbatore Institute of 
Technology, Coimbatore